IMPLEMENTASI SQUID PROXY SEBAGAI FIREWALL UNTUK PENGELOLAAN KEAMANAN JARINGAN

Penulis

  • Ahmad Denil Sitepu Universitas Negeri Medan
  • Bob Valentino Universitas Negeri Medan
  • Idris Putra Hatoguan Universitas Negeri Medan
  • Dedy Kiswanto Universitas Negeri Medan

Kata Kunci:

Network Security, Firewall, Squid Proxy, Hak Akses, Web

Abstrak

Security is a very important element in a computer network. This is done in an effort to provide protection to the computer network to prevent threats from both internal and external in an effort to prevent forced (unauthorized) data retrieval. A network security system needs to be built to control access to important assets, one of which is data, so that the access rights of each computer and user need to be regulated. The Squid proxy method is one technique that can be used to regulate access from users and computers. Squid proxy can be used to regulate network access rights on each LAN (Local Area Network) port. This is very useful for blocking access from one party to another to prevent data theft from unknown or known people. From the tests carried out, it is known that the implementation of a firewall can block the network connection when there is a transfer of access rights.

Unduhan

Diterbitkan

2025-04-29