Security Design for Local Area Networks Using Port Firewall Security
DOI:
https://doi.org/10.46984/sebatik.v29i2.2699Keywords:
Firewall, Keamanan, Jaringan, Port Security, MAC Address.Abstract
Network security design is a crucial aspect in maintaining data integrity, confidentiality, and availability. This study develops and tests an effective network security system using the firewall security port method. This method focuses on identifying and restricting access to physical switch ports to prevent unauthorized access and protect the system from external threats. The research method uses experimental stages through subjective means to describe current practices. Through configuration and testing in a simulated environment, this study shows that the implementation of MAC address-based port security effectively blocks illegal devices without disrupting the connectivity of legitimate devices. This study provides evidence and practical guidelines that the firewall security port method is an efficient solution for improving network access layer security. The conclusions of this study provide a basis for organizations to implement proactive security measures in the face of evolving cyber threats.
References
Chen, J., Mohamed, M. A., Dampage, U., Rezaei, M., Salmen, S. H., Obaid, S. A., & Annuk, A. (2021). A multi-layer security scheme for mitigating smart grid vulnerability against faults and cyber-attacks. Applied Sciences, 11(21), 9972.
Dara, Y. C., Hariadi, F., & Lede, P. A. R. L. (2022). Analisis Penerapan Sistem Keamanan Jaringan Menggunakan Metode Dhcp Snooping Dan Switch Port Security. Jurnal Inovatif, 1(3), 187-196.
Dasmen, R. N., Firmansyah, M. H., Khadafi, M., & Yolanda, T. (2022). Penerapan Keamanan Jaringan Menggunakan Metode Firewall Security Port: Network Security Implementation Using Firewall Security Port Method. Decode: Jurnal Pendidikan Teknologi Informasi, 2(1), 1-7.
Dewi, S., Firmansyah, F., & Hasan, U. (2022). Penerapan metode access control list pada jaringan VLAN menggunakan router Cisco. IMTechno: Journal of Industrial Management and Technology, 3(1), 37-41.
Dwinanto, I., & Setiyani, H. (2021). Implementasi Keamanan Komputer Pada Aspek Confidentiality, Integrity, Availability (CIA) Menggunakan Tools Lynis Audit System. Jurnal Maklumatika, 35-46.
Firmansyah, F., Purnama, R. A., & Astuti, R. D. (2021). Optimalisasi Keamanan Wireless Menggunakan Filtering MAC Address: Optimalisasi Keamanan Wireless Menggunakan Filtering Mac Address. Jurnal Teknologi Informasi: Jurnal Keilmuan Dan Aplikasi Bidang Teknik Informatika, 15(1), 25-33.
Melati Sukma, W. N., Reynata, A., Yasmine, D. A., & Putra Pratama, D. M. (2023). Systematic Literature Review (SLR): Keamanan Dalam Sistem Informasi. Journal of Comprehensive Science (JCS), 2(6).
Novianto, E., Ujianto, E. I. H., & Rianto, R. (2023). Keamanan informasi (information security) pada aplikasi sistem informasi manajemen kepegawaian dengan defense in depth. J-Icon: Jurnal Komputer dan Informatika, 11(1), 1-6.
Nurfaishal, M. D., & Akbar, Y. (2024). Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hopping, DHCP Snooping. Jurnal Indonesia: Manajemen Informatika dan Komunikasi, 5(3), 3278-3290.
Pratomo, A. B. (2023). Pengembangan Sistem Firewall Pada Jaringan Komputer Berbasis Mikrotik Routeros. Bulletin of Network Engineer and Informatics, 1(2), 51-59.
Putri, R. M., Zulkifli, Z., & Fajri, R. M. (2023). Simulasi Keamanan Jaringan Dengan Metode Network Development Life Cycle Menggunakan Switch Port Security Pada PT Pinus Merah Abadi (Doctoral dissertation, Universitas indo global mandiri).
Ramli, H., & Alifsyah, M. Y. (2023). Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS). J. Renew. Energy Smart Device, 1(1), 25-30.
Razzanda, I. M., & Koprawi, M. (2024). Implementasi IDS dan IPS terhadap Serangan TCP Port Scanning dan ICMP Flooding. The Indonesian Journal of Computer Science, 13(4).
Santoso, N. A., Affandi, K. B., & Kurniawan, R. D. (2022). Implementasi keamanan jaringan menggunakan port knocking. Jurnal Janitra Informatika Dan Sistem Informasi, 2(2), 90-95.
Saputra, B. R. (2022). Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping Dan VLAN Mengggunakan CISCO. JATISI (Jurnal Teknik Informatika dan Sistem Informasi), 9(4), 3481-3488.
Satria, A., & Ramadhani, F. (2023). Analisis Keamanan Jaringan Komputer dengan Menggunakan Switch Port Security di Cisco Packet Tracer. sudo Jurnal Teknik Informatika, 2(2), 52-60.
Shanker, R., & Singh, A. (2021, December). Analysis of Network Attacks at Data Link Layer and its Mitigation. In 2021 International Conference on Computing Sciences (ICCS) (pp. 274-279). IEEE.
Sharma, G., Vidalis, S., Anand, N., Menon, C., & Kumar, S. (2021). A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues. Electronics, 10(19), 2365.
Wicaksono, D. (2022). Sistem Keamanan Jaringan Menggunakan Firewall Dengan Metode Port Blocking Dan Firewall Filtering (Doctoral dissertation, JATISI).
Wulan, W., Hadita, H., Fauzi, A., Putri, A. M., Fitriyani, F., Astriyani, R., ... & Cahyani, Y. I. (2024). Tinjauan Ancaman dan Risiko pada Sistem Keamanan Internet of Things, Berbasis Cloud Computing dalam Penggunaan E-Commerce dan Rencana Strategis. Jurnal Kewirausahaan dan Multi Talenta, 2(2), 126-137.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ahmad Fahrijal Pukeng, Hervan Havid

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain all their rights to the published works, such as (but not limited to) the following rights; Copyright and other proprietary rights relating to the article, such as patent rights, The right to use the substance of the article in own future works, including lectures and books, The right to reproduce the article for own purposes, The right to self-archive the article






