Implementation of VLAN and ACL for Network Security at SDIT Ibnu Hajar Bekasi

DOI: https://doi.org/10.33650/jeecom.v7i2.12564

Authors (s)


(1) * Taufik Rahman   (Universitas Bina Sarana Informatika)  
        Indonesia
(2)  Qori Aprianto   (Universitas Bina Sarana Informatika)  
        Indonesia
(*) Corresponding Author

Abstract


In the age of modern technology, network security is essential to ensure that educational institutions operate properly. The purpose of this research is to improve the network security of SDIT Ibnu Hajar Bekasi City by applying technologies such as Virtual Local Area Network and Access Control List. This research uses the Network Development Life Cycle (NDLC) approach, which consists of the stages of initiation, planning, design, implementation, testing, and maintenance. By using vlan network segmentation, data traffic is divided into specific groups, such as administration, computer labs, instructors, and students. For now, Acls are used to set access rights between network segments according to user needs and authorization. Simulation testing on Cisco Packet Tracer shows that the implementation of vlans and acls improves network stability and security, reduces average latency, and decreases broadcast traffic. The acl configuration results show that students cannot access the teacher and administration networks. However, teachers can still access administration and laboratories. This study shows that the use of vlans and acls can improve the security and effectiveness of network management in schools.



Keywords

VLAN;Access Control List;Network Security;Network Segmentation;NDLC



Full Text: PDF



References


Al-furqan Abra, A., & Syarif Aziz, A. (2025). implementation of access control list (acl) in the design of virtual local area network at smkn 1 al-mubarkeya. In Journal of Information Technology Students) (Vol. 9, Issue 1).

Bangun, R., Vlan, J., Menggunakan, D., Cisco, S., Tracer, P., & Susanto, R. (2020). InfoTekJar : National Journal of Informatics and Network Technology Attribution-NonCommercial 4.0 International. Some rights reserved. 4(2). https://doi.org/10.30743/infotekjar.v4i2.2297.

Coll, E. (2023). The OSI Layers and Protocol Stacks. Teracom Training Institute. https://books.google.co.id/books?

Sitohang, S., & Pangaribuan, H. (n.d.). analysis of network security and performance in the implementation of vlan as a traffic segmentation effort using cisco packet tracer. In Journal of Applied Informatics Science (JSIT) E-ISSN (Issue 2).

Fajri, T. I., Hasma, N. A., Syafnur, A., Niesa, C., Nofitri, R., Irawati, N., ... & Asbar, V. (2025). Basic Concepts of Computer Networks. Serasi Media Teknologi.

Intan Octavia Br Sipayung, P., Purba, V., Information Systems Studies, P., Computer Science, F., & Timur, J. (2024). Analysis, Design, and Simulation of VLAN Networks Using the PPDIOO Method (Case Study: SMAS Santo Yusup Surabaya). 14(1), 110–118. https://doi.org/10.36350/jbs.v14i1.

Manuaba, I. B. K., Agus, F., Ramayu, I. M. S., Saputro, V. A., Pakpahan, A. V., Skawanti, J. R., & Judijanto, L. (2025). Computer Networks. PT. Sonpedia Publishing Indonesia.

Hasan, U., & Dewi, S. (2022). Application of Access Control List Method in VLAN Network Using Cisco Router. In IMTechno: Journal of Industrial Management and Technology (Vol. 3, Issue 1). http://jurnal.bsi.ac.id/index.php/imtechno.

Andriani, R., Pahlipi, R., Bayu,), Pamungkas, A., Universitas, I., & Yogyakarta, A. (2021). penerapan teknik vlan untuk mengoptimalisasi kirim data Afibra I Cahyando, 2) (Vol. 3, Issue 2).

Rahman, T., & Pamungkas, E. T. (2024). jika | 438 optimization of computer networks at smk travina prima with the implementation of intervlan, vlsm, and hsrp. In Jurnal Informatika) Universitas Muhammadiyah Tangerang P (Vol. 8, Issue 4).

Krianto Sulaiman, O., & Saripurna, D. (2021). Network Security System Analysis Using Access Control List (ACL). International Journal of Information System & Technology Akreditasi, 5(2), 192–197.

Laksono, A. T., & Nasution, M. A. H. (2020). Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X. Jurnal Sistem Komputer Dan Informatika (JSON), 1(2), 83. https://doi.org/10.30865/json.v1i2.1920.

Gios Sholid, R., Alhaq, H., Syofiana Sari, R., Danang Wijanarko, S., & Korespondensi, P. (n.d.). Implementation of Virtual Local Area Network with Cisco Packet Tracer for Campus Network Traffic Management. https://doi.org/10.70308/grata.v2i1.71

Djuanda, D. N. (2024). Strategi Keamanan Jaringan Teknologi Informasi dan Sistem dengan VLAN dan Daftar Kontrol Akses: Studi Kasus dan Implementasi. 2(1), 25–31. https://doi.org/10.58777/its.v2i1.305.

Rahman, R., Dwicki, D. H., & Furqan, M. F. R. (2025). Implementation of Virtual LAN Networks and Access Control Lists for Access Segmentation in School Network Simulation Studies. Journal of Systems & Technology (SYSTEC).


Dimensions, PlumX, and Google Scholar Metrics

10.33650/jeecom.v7i2.12564


Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Taufik Rahman, Qori Aprianto

 
This work is licensed under a Creative Commons Attribution License (CC BY-SA 4.0)

Journal of Electrical Engineering and Computer (JEECOM)
Published by LP3M Nurul Jadid University, Indonesia, Probolinggo, East Java, Indonesia.