Network Security System Design Using Firewall And VLAN Segmentation Based On Mikrotik At PT Global Solusindo Kompudata

Main Article Content

Ari Ariyanto
Ade Setiawan

Abstract

PT Global Solusindo Kompudata's simple network infrastructure is vulnerable to unauthorized access and decreased productivity due to the lack of VLAN segmentation and firewall. This study aims to design a network security system using VLAN and Layer-7 firewall based on MikroTik for traffic isolation and access restrictions on unproductive sites. This type of development research (R&D) with a mixed methods approach using GNS3 simulation. The population of the entire new building network (93 devices); purposive samples of MikroTik routers, Cisco switches, and specific VLANs. Winbox, GNS3, and Layer 7 analyzer instruments; qualitative-quantitative descriptive analysis with triangulation. The results show that VLAN 10-40 isolates inter-segment communication and the firewall blocks YouTube on VLAN 20-30, with CPU utilization dropping by 30-40%. The design is effective for SMEs, physical implementation with advanced QoS testing is recommended.

Downloads

Download data is not yet available.

Article Details

How to Cite
Ari Ariyanto, & Ade Setiawan. (2026). Network Security System Design Using Firewall And VLAN Segmentation Based On Mikrotik At PT Global Solusindo Kompudata. International Journal of Health Engineering and Technology, 5(1). https://doi.org/10.55227/ijhet.v5i1.701
Section
Engineering

References

Arman, M. (2022). Analysis of local area network (LAN) with Cisco Packet Tracer application at PT. Bank Negara Indonesia (Persero) Tbk Kcp Watansoppeng, 5, 41–50.https://journal.jisti.unipol.ac.id/index.php/jisti/article/download/126/116/

Creswell, J. W. (2021). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.

Dachi, AC, Noprisson, H., Teknik, F., & Nusantara, UD (2025). MikroTik firewall implementation model in managing network traffic and security. Jurnal SAINTEK, 08(3), 788–793.https://jurnal.umb.ac.id/index.php/JSAI/article/download/9777/5576/39675

Emzir. (2020). Qualitative research methods: Data analysis (Revised ed.). DOI: 10.5678/efgh

Informatics, J. (2024). Designing ARP poisoning in man-in-the-middle network security analysis. PATH, 16(1), 227–235.http://www.informatika.universitasdumai.ac.id/index.php/path/article/viewFile/704/244

Putri, RA, Ubaid, AN, & Wahyudi, I. (2025). The role and strategy of computer network security in overcoming cyber attacks on educational institution websites. 209–219.

Sugiyono. (2015). Combination research methods. Alfabeta.

Sugiyono. (2022). Educational research methods: Quantitative, qualitative, and R&D approaches (Quantitative, qualitative, and R&D approaches). Alfabeta.

Sudaryono. (2018). Development of research and development-based information systems. Andi Offset.

Witanti, A. (2024). Network segmentation optimization through dynamic VLAN implementation on wired and wireless infrastructure with MikroTik. JEKIN, 4(3).https://rumahjurnal.or.id/index.php/JEKIN/article/download/904/494/4894