SIMULASI DAN IMPLEMENTASI FIREWALL BERBASIS SQUID UNTUK KEAMANAN INTERNET

Authors

  • Iwan Agi Berutu Universitas Negeri Medan
  • Khildan Rifail Azis Universitas Negeri Medan
  • Yunita Rahmi Universitas Negeri Medan
  • Dedy Kiswanto Universitas Negeri Medan

DOI:

https://doi.org/10.36002/jutik.v11i2.3767

Keywords:

Ubuntu, Firewall, Network, Proxy, Squid

Abstract

Network security is a crucial aspect of information systems, especially in the internal networks of institutions or organizations. This study aims to develop a Squid-based firewall system as an effective network security solution to control and filter internet access. The method used involves open-source system development by utilizing Debian Linux and Squid Proxy software. Installation and configuration processes were conducted to manage access restrictions based on HTTP/HTTPS protocols, IP addresses, and usage time. The implementation results show that the developed firewall system is capable of blocking unwanted websites, regulating access times, and recording user activities through system logs. This system also offers ease for administrators in monitoring and managing network traffic efficiently. With this approach, institutions or organizations are expected to enhance their internal network security without incurring high licensing costs. This research contributes to the utilization of open-source technology for independently and affordably addressing network security needs.

References

[1] W. W. Purba and R. Efendi, “Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT,” Aiti, vol. 17, no. 2, pp. 143–158, 2021, doi: 10.24246/aiti.v17i2.143-158.

[2] D. A. Artika, B. D. Febrianti, S. P. Syaifullah, D. Kiswanto, I. Komputer, and U. N. Medan, “Mengimplementasikan Proxy Server (Squid Server),” JATI (J. Mahasiswa Teknik Informatika),vol. 8, no. 6, pp. 12512–12520, 2024.

[3] S. Dwiyatno, E. Rakhmat, S. Sulistiyono, and M. R. Mahruzzaman, “Penerapan Internet Sehat Sebagai Internet Service Provider Menggunakan Network Monitoring System Zabbix Dan Squid Proxy,” J. Innov. Futur. Technol., vol. 3, no. 2, pp. 25–40, 2021, doi: 10.47080/iftech.v3i2.1532.

[4] M. Husaini, Taufiq Timur Warisaji, and Ilham Saifudin, “Perbandingan Kinerja Pemblokiran Situs Porno Menggunakan Layer 7 Protocol dan Squid Proxy,” JUSTINDO (Jurnal Sist. dan Teknol. Inf. Indones., vol. 9, no. 1, pp. 10–16, 2024, doi: 10.32528/justindo.v9i1.981.

[5] I. Saputra, T. U. Kalsum, and H. Alamsyah, “The Implementation Of Network Management And Security Using Mikrotik And Proxy Server At SMK N 3 Seluma,” J. Media Comput. Sci., vol. 3, no. 1, pp. 17–32, 2024, doi: 10.37676/jmcs.v3i1.5422.

[6] A. Susanto, “Pengaturan Keamanan Squid Proxy Pada Jaringan Lokal Dan Internet Menggunkan Openldap,” J. Teknol. Pint., vol. 2, no. 3, pp. 1–13, 2022, [Online]. Available: http://teknologipintar.org/index.php/teknologipintar/article/view/121

[7] N. A. Santoso, K. B. Affandi, and R. D. Kurniawan, “Implementasi Keamanan Jaringan Menggunakan Port Knocking,” J. Janitra Inform. dan Sist. Inf., vol. 2, no. 2, pp. 90–95, 2022, doi: 10.25008/janitra.v2i2.156.

[8] A. Bustami and S. Bahri, “Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi : Systematic Review,” Unistek, vol. 7, no. 2, pp. 59–70, 2020, doi: 10.33592/unistek.v7i2.645.

[9] Farhan, Dwi,Rifda, “Implementasi Bot Telegram Untuk Monitoring Mikrotik Pada Planets Network Solution” Jurnal Teknologi Informasi dan Komputer, Volume 9, Nomor 6, Oktober 2023

[10] Gea, A., Purba, M. J., Putra, A. A., Jamaluddin, J., & Siringoringo, R. (2022). Implementasi Metode Access Control List Untuk Memonitoring Akses Jaringan Menggunakan Squid Proxy. METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi, 6(1), 79-84.

Downloads

Published

2025-10-10

How to Cite

Iwan Agi Berutu, Khildan Rifail Azis, Yunita Rahmi, & Dedy Kiswanto. (2025). SIMULASI DAN IMPLEMENTASI FIREWALL BERBASIS SQUID UNTUK KEAMANAN INTERNET. Jurnal Teknologi Informasi Dan Komputer, 11(2), 164–174. https://doi.org/10.36002/jutik.v11i2.3767

Most read articles by the same author(s)

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.