Fadhil Azmi
Fakultas Ilmu Komputer, Universitas Dehasen Bengkulu

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Analysis and Application of Access Control List (ACL) Methods on Computer Networks Fadhil Azmi; Toibah Umi Kalsum; Hendri Alamsyah
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 2 No. 1 (2022): JUNI
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i1.642

Abstract

Advances in information technology are currently growing to meet the needs of humans who want to obtain information easily, quickly and precisely. Therefore, we must continue to pursue and improve the quality and quantity of information technology. The purpose of this study is to find out how to perform the analysis and application of the Access Control List (ACL) method in a computer network. Mikrotik RB750 router is good to use for network security both in terms of reliability and in terms of cost. The method of network security using a firewall and address list is good because it can perform network security and restrictions on addresses that can be accessed and cannot be accessed. With this computer network security, computer network users can get internet access and local network access that is stable and smooth.