Implementation Port Security for Security Systems Network at the Computing Laboratory of Adisutjipto College of Technology

Sudaryanto Sudaryanto

Abstract


At the Computing Laboratory Adisutjipto College of Technology (STTA) there are switch devices and several personal computers connected directly to the server, so that the equipment in the laboratory can be used by students, employees and lecturers freely to explore the world without borders (internet) by utilizing the STTA bandwidth. The absence of a security system in the laboratory, users can use bandwidth without administrator permission to carry out activities that are not in accordance with the provisions of bandwidth usage in the STTA environment, thus disrupting Practical activities in the Laboratory. Many techniques can be done in minimizing the crime rate or the use of irresponsible users in this network, one technique that will be used to secure local networks is to use security ports on the switch. With port security implemented in the Laboratory STTA computing theft or excessive bandwidth usage can be reduced 70,19% and the use of Unshielded twisted-pair (UTP) cables with unregistered computer devices can be prevented.

Keywords


Network Security, Manageable Switch, Port Security

Full Text:

PDF

References


Sulaiman, K. (2016). Analisis Sistem Keamanan Jaringan Dengan Menggunakan Switch Port Security. CESS (Journal Of Computer Engineering, System And Science) (Vol. 1, ISSN :2502-7131)

Kusumaningrum, A. (2016, November). Pengujian Kinerja Jaringan Sistem Akses File Berbasis Client Server Menggunakan Samba Server. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 2, pp. 129-134).

Marin, G.A. (2015, November). Network Security Basics, Security & Privacy. IEEE. (Vol. 3, No 6 pp. 68-72).

Saleh, I., Wintolo, H., & Nugraheni, D. (2014, November). Analisa Perbandingan Waktu Dan Kecepatan Transfer Pada Multi Protocol Label Switching (Mpls) Dengan Virtual Private Network (VPN) Untuk Perpindahan Dokumen Pada Jaringankomputer. In Compiler STT Adisutjipto Yogyakarta (Vol. 3, pp. 101-111).

Pratama, A.W., Wintolo, H., & Astuti, Y. (2013). Konfigurasi Inter-Vlan Pada Cisco Berbasis Graphics User Interface (GUI) Sebagai Pembelajaran Peralatan Jaringan Komputer Cisco. In Compiler STT Adisutjipto Yogyakarta (Vol. 2, pp. 13-19).

Suhendar, A. S. S., Sajati, H., & Astuti, Y. (2013). Perancangan Algoritma Anggi (Aa) Dengan Memanfaatkan Diffie-Hellman Dan Ronald Rivest (Rc4)Untuk Membangun Sistem Keamanan Berbasis Port Knacking. In Compiler STT Adisutjipto Yogyakarta (Vol. 2, pp. 59-66)

Kusumaningrum, A., & Sianturi, R. (2015). Perancangan Pengamanan Server Secara Otomatis Menggunakan Metode Adam (Automatic Event Detection And Activity Monitoring). In Compiler STT Adisutjipto Yogyakarta (Vol. 4, pp. 29-35)

Sudaryanto, S. (2018). The Effect Of Multi Layer Switching For Data Transfer Speeds On Computer Network. In Compiler STT Adisutjipto Yogyakarta (Vol. 7, No. 2)

Sofana, I. (2010). Cisco CCNA & Jaringan Komputer. Bandung. Informatika Bandung.

Sutanto, F. A., Yulianton, H., & Razaq, J. A. (2011). Rancang Bangun Vlan

Untuk Segmentasi Jaringan Pada Cyber Campus Laboratory Universitas Stikubank. Dinamik, 16(2).




DOI: http://dx.doi.org/10.28989/senatik.v4i0.239

Article Metrics

Abstract view : 489 times
PDF - 665 times

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Conference SENATIK P-ISSN :2337-3881 and  E-ISSN : 2528-1666

Jumlah penggunjung = Web Analytics orang

Statistik Senatik

Flag Counter