Simulasi Topologi Jaringan Berbasis ACL Menggunakan Cisco Packet Tracer
DOI:
https://doi.org/10.30812/corisindo.v1.5342Keywords:
Access Control List (ACL), Cisco Packet Tracer, Simulasi Jaringan, Keamanan JaringanAbstract
Penelitian ini bertujuan untuk mensimulasikan topologi jaringan berbasis Access Control List (ACL) menggunakan perangkat lunak Cisco Packet Tracer. ACL digunakan untuk mengatur lalu lintas jaringan dengan memfilter paket berdasarkan alamat IP, protokol, dan port tertentu, sehingga meningkatkan keamanan jaringan. Proses simulasi melibatkan perancangan topologi jaringan, konfigurasi perangkat, penerapan aturan ACL, serta pengujian dan optimasi kinerja ACL. Hasil simulasi menunjukkan bahwa penerapan ACL dalam lingkungan virtual mampu merepresentasikan pengendalian akses secara efektif dan efisien. Studi ini juga menegaskan manfaat edukatif dari Cisco Packet Tracer dalam mendukung pembelajaran konsep keamanan jaringan secara praktis
References
[1] K.-Y. Zeng and J.-H. Yang, “Towards the optimization of access control list,” Ruan Jian Xue Bao/Journal of Software, 2007. [Online]. Available: https://www.scopus.com/pages/publications/34249336420
[2] Y. Cao and L. Ai, “Experimental simulation and comparative analysis of an access control list at different deployment locations,” in Proc. 2022 IEEE 2nd Int. Conf. on Computer Communication and Artificial Intelligence (CCAI), 2022. [Online]. Available: https://www.scopus.com/pages/publications/85134410894
[3] A. X. Liu, E. Torng, and C. R. Meiners, “Compressing network access control lists,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 12, pp. 1969–1977, 2011. [Online]. Available: https://www.scopus.com/pages/publications/80055048663
[4] K. Kundu, S. Chaurasia, P. Pandey, and R. K. Gatla, “Simulating a local area network with Cisco Packet Tracer: A comprehensive IP packet switching network demonstration,” in Proc. Int. Conf. on Power Energy, Environment and Intelligent Control (PEEIC), 2023. [Online]. Available: https://www.scopus.com/pages/publications/85188092188
[5] Z. Trabelsi and H. Saleous, “Exploring the opportunities of Cisco Packet Tracer for hands-on security courses on firewalls,” in Proc. IEEE Global Engineering Education Conf. (EDUCON), 2019. [Online]. Available: https://www.scopus.com/pages/publications/85067503893
[6] I. B. Irawan Purnama, “Role of packet tracer in simulating server services on the client-server computer network,” J. Phys.: Conf. Ser., vol. 1477, no. 4, 2020. [Online]. Available: https://www.scopus.com/pages/publications/85087519104
[7] M. Feng, “Network security management and implementation based on ACL,” in Advances in Intelligent Systems and Computing, vol. 887, pp. 199–203, 2019. [Online]. Available: https://www.scopus.com/pages/publications/85056824313
[8] S. Dhaka, “Traffic management and security in wired network,” in Communications in Computer and Information Science, vol. 1076, pp. 278–285, 2019. [Online]. Available: https://www.scopus.com/pages/publications/85066909359
[9] S. H. Moz, M. A. Hosen, and N. F. I. Tanny, “Campus network configuration, monitoring and data flow simulation using Cisco Packet Tracer,” in Proc. 6th Int. Conf. on Inventive Computation Technologies (ICICT), 2023. [Online]. Available: https://www.scopus.com/pages/publications/85163466682
[10] F. H. Li and X. Cao, “Implementation of the demonstration center network ACL technology,” in Proc. Int. Conf. on Management, Information and Educational Engineering (MIEE), 2015. [Online]. Available: https://www.scopus.com/pages/publications/84957376892
[11] T. Ishikawa and N. Yoshiura, “Decreasing access control list processed in hardware,” in Lecture Notes in Computer Science, vol. 5939, pp. 205–215, 2009. [Online]. Available: https://www.scopus.com/pages/publications/70350453941