{"title":"计算机网络中访问控制列表(ACL)方法的分析与应用","authors":"Fadhil Azmi, Toibah Umi Kalsum, H. Alamsyah","doi":"10.53697/jkomitek.v2i1.642","DOIUrl":null,"url":null,"abstract":"Advances in information technology are currently growing to meet the needs of humans who want to obtain information easily, quickly and precisely. Therefore, we must continue to pursue and improve the quality and quantity of information technology. The purpose of this study is to find out how to perform the analysis and application of the Access Control List (ACL) method in a computer network. Mikrotik RB750 router is good to use for network security both in terms of reliability and in terms of cost. The method of network security using a firewall and address list is good because it can perform network security and restrictions on addresses that can be accessed and cannot be accessed. With this computer network security, computer network users can get internet access and local network access that is stable and smooth.","PeriodicalId":371693,"journal":{"name":"Jurnal Komputer, Informasi dan Teknologi (JKOMITEK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis and Application of Access Control List (ACL) Methods on Computer Networks\",\"authors\":\"Fadhil Azmi, Toibah Umi Kalsum, H. Alamsyah\",\"doi\":\"10.53697/jkomitek.v2i1.642\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advances in information technology are currently growing to meet the needs of humans who want to obtain information easily, quickly and precisely. Therefore, we must continue to pursue and improve the quality and quantity of information technology. The purpose of this study is to find out how to perform the analysis and application of the Access Control List (ACL) method in a computer network. Mikrotik RB750 router is good to use for network security both in terms of reliability and in terms of cost. The method of network security using a firewall and address list is good because it can perform network security and restrictions on addresses that can be accessed and cannot be accessed. With this computer network security, computer network users can get internet access and local network access that is stable and smooth.\",\"PeriodicalId\":371693,\"journal\":{\"name\":\"Jurnal Komputer, Informasi dan Teknologi (JKOMITEK)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Jurnal Komputer, Informasi dan Teknologi (JKOMITEK)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53697/jkomitek.v2i1.642\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Komputer, Informasi dan Teknologi (JKOMITEK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53697/jkomitek.v2i1.642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and Application of Access Control List (ACL) Methods on Computer Networks
Advances in information technology are currently growing to meet the needs of humans who want to obtain information easily, quickly and precisely. Therefore, we must continue to pursue and improve the quality and quantity of information technology. The purpose of this study is to find out how to perform the analysis and application of the Access Control List (ACL) method in a computer network. Mikrotik RB750 router is good to use for network security both in terms of reliability and in terms of cost. The method of network security using a firewall and address list is good because it can perform network security and restrictions on addresses that can be accessed and cannot be accessed. With this computer network security, computer network users can get internet access and local network access that is stable and smooth.