Network Security System Design Using Firewall And VLAN Segmentation Based On Mikrotik At PT Global Solusindo Kompudata
Main Article Content
Abstract
PT Global Solusindo Kompudata's simple network infrastructure is vulnerable to unauthorized access and decreased productivity due to the lack of VLAN segmentation and firewall. This study aims to design a network security system using VLAN and Layer-7 firewall based on MikroTik for traffic isolation and access restrictions on unproductive sites. This type of development research (R&D) with a mixed methods approach using GNS3 simulation. The population of the entire new building network (93 devices); purposive samples of MikroTik routers, Cisco switches, and specific VLANs. Winbox, GNS3, and Layer 7 analyzer instruments; qualitative-quantitative descriptive analysis with triangulation. The results show that VLAN 10-40 isolates inter-segment communication and the firewall blocks YouTube on VLAN 20-30, with CPU utilization dropping by 30-40%. The design is effective for SMEs, physical implementation with advanced QoS testing is recommended.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Arman, M. (2022). Analysis of local area network (LAN) with Cisco Packet Tracer application at PT. Bank Negara Indonesia (Persero) Tbk Kcp Watansoppeng, 5, 41–50.https://journal.jisti.unipol.ac.id/index.php/jisti/article/download/126/116/
Creswell, J. W. (2021). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.
Dachi, AC, Noprisson, H., Teknik, F., & Nusantara, UD (2025). MikroTik firewall implementation model in managing network traffic and security. Jurnal SAINTEK, 08(3), 788–793.https://jurnal.umb.ac.id/index.php/JSAI/article/download/9777/5576/39675
Emzir. (2020). Qualitative research methods: Data analysis (Revised ed.). DOI: 10.5678/efgh
Informatics, J. (2024). Designing ARP poisoning in man-in-the-middle network security analysis. PATH, 16(1), 227–235.http://www.informatika.universitasdumai.ac.id/index.php/path/article/viewFile/704/244
Putri, RA, Ubaid, AN, & Wahyudi, I. (2025). The role and strategy of computer network security in overcoming cyber attacks on educational institution websites. 209–219.
Sugiyono. (2015). Combination research methods. Alfabeta.
Sugiyono. (2022). Educational research methods: Quantitative, qualitative, and R&D approaches (Quantitative, qualitative, and R&D approaches). Alfabeta.
Sudaryono. (2018). Development of research and development-based information systems. Andi Offset.
Witanti, A. (2024). Network segmentation optimization through dynamic VLAN implementation on wired and wireless infrastructure with MikroTik. JEKIN, 4(3).https://rumahjurnal.or.id/index.php/JEKIN/article/download/904/494/4894