Comparative Analysis of Mikrotik Site Filter Using Address List Techniques, Layer7 Protocols, Web Proxy, Mangle and DNS Static

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Filtering techniques on Mikrotik routers can be done in various ways. Whether or not a technique in filtering can be seen from passing or not a package that has been defined. Development of filtering techniques in a router more and more, in line with the rapid development of hardware development. The researchers conducted an analysis comparison site on the proxy filter using that technique 5 Address List, Layer7 Protocols, Web Proxy, Mangle and Static DNS. The experiment was done by blocking youtube.com site and facebook.com and implemented on router Mikrotik RB750. From the experiment 5, the filtering technique shows the results of success, with different filtering output behaviors as well as the different block flow mechanisms of each filtering technique.

     

     


  • Keywords


    Address List, Layer7 Protocols, Web Proxy, Mangle, Static DNS.

  • References


      [1] Hidayat, A. (2018). Design Of Radius Server On Server Network Internet Faculty Of Computer Science University Muhammadiyah Metro. IJISCS (International Journal Of Information System and Computer Science), 2(1), 13-30.

      [2] Suyetno, Tedyyana, A., & Putra, F. P. (2017). Analisa Perbandingan Filter Situs Dan Manajemen Bandwidth Pada Proxy Server Dan Web Proxy Pada Mikrotik. Jurnal Infotekmesin, 8(1), 19–25.

      [3] Hersatya, G. (2013). Implementasi Filtering Dengan Layer 7 Protocols Mikrotik Routeros. Journal Teknik Informatika, Fakultas Ilmu Komputer, Universitas Dian Nuswantoro Semarang, 1(Internet Filtering), 1–4.

      [4] Kustanto, D., & Daniel, S. (2008). Membangun Server Internet Dengan Mikrotik OS. Yogyakarta: Gava Media Yogyakarta.

      [5] Hidayat, A. (2016). Panduan Belajar Mandiri Administrasi Server Jaringan Menggunakan Linux Ubuntu. Laduni Alifatama. Lampung (ISBN: 978-602-1397-56-5)

      [6] Siddik, M. (2017). IMPLEMENTASI MIKROTIK ROUTER BOARD 750 SEBAGAI FIREWALL BLOK SITUS PADA JARINGAN LAN. JURTEKSI ROYAL Vol 3 No 2,

      [7] Lukas, Jonathan. (2006). Jaringan Komputer, Graha Ilmu, Jakarta.

      [8] Hidayat, A. (2017). Konfigurasi Server Cloud Storage pada Jaringan LAN pada LAB Diploma III Manajemen Informatika UM Metro. MIKROTIK: Jurnal Manajemen Informatika, 7(1).

      [9] Hidayat, A. (2017). BUILDING A EXPERT SYSTEM APPLICATION FOR HELP PROBLEM SOLVING NETWORK ON MIKROTIK ROUTER. MIKROTIK: Jurnal Manajemen Informatika, 6(1).

      [10] Lukas, Jonathan. (2006). Jaringan Komputer, Graha Ilmu, Jakarta.

      [11] Hidayat, A. (2018). Perancangan Virtual Local Area Network (VLAN) Pada Lab Komputer D-III Sistem Informasi Universitas Muhammadiyah Metro (UM Metro). Konferensi Nasional Sistem Informasi (KNSI) 2018)

      [12] Winarno dan Smitdev, (2014). Membuat Jaringan Komputer di Windows dan Linux, PT. Elex Media Komputindo, Jakarta.

      [13] Hidayat, A. (2018). SISTEM PROTEKSI FAIL OVER DENGAN RSTP PADA SERVER ROUTER INTERNET FIKOM UM METRO BERBASIS MIKROTIK. SEMNASTEKNOMEDIA ONLINE, 6(1), 1-1.

      [14] Norton Peters. (1999). Complete Guide to Networking. Sams, India.

      [15] Hidayat, A. (2017). Konfigurasi Server Cloud Storage pada Jaringan LAN pada LAB Diploma III Manajemen Informatika UM Metro. MIKROTIK: Jurnal Manajemen Informatika, 7(1).

      [16] Sinarmata, Janner, (2006). Teknologi Komputer dan Informasi, Andi Offset, Yogyakarta.

      [17] Komputer, Wahana, (2013). Internet Aman & Sehat, Andi Offset, Yogyakarta

      [18] Sutanta, Edy, (2005). Komunikasi Data dan Jaringan, Graha Ilmu, Yogyakarta.

      [19] Komputer, Wahana, (2009). Administrasi Jaringan dengan Ubuntu 9, Andi Offset, Yogyakarta..

      [20] Sugeng, Winarno, (2015). Jaringan Komputer dengan TCP/IP, Modula.

      [21] Bhayangkara, F. J., & Riadi, I. (2014). Implementasi Proxy Server dan Load Balancing Menggunakan Metode Per Connection Classifier (PCC) Berbasis Mikrotik (Studi kasus: Shmily. net). JSTIE (Jurnal Sarjana Teknik Informatika)(E-Journal), 2(2), 409-420.


 

View

Download

Article ID: 19872
 
DOI: 10.14419/ijet.v7i3.4.19872




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.