LONTAR KOMPUTER VOL. 10, NO. 1 APRIL 2019

DOI : 10.24843/LKJITI.2019.v10.i01.p06

Accredited B by RISTEKDIKTI Decree No. 51/E/KPT/2017

p-ISSN 2088-1541

e-ISSN 2541-5832

The Simulation of Access Control List (ACLs) Network Security for Frame Relay Network at PT. KAI Palembang

Kurniatia1, Rahmat Novrianda Dasmena2

aTeknik Komputer, Universitas Bina Darma Jenderal A. Yani street number 03 Palembang, Indonesia 1[email protected]

2[email protected]

Abstract

PT. KAI Palembang is a branch of PT. Kereta Api Indonesia (KAI) Persero located in South Sumatra Province, where PT. KAI Persero is an Indonesian State-Owned Enterprise that organizes railway transportation which provide services including passenger and goods transportation. PT. KAI Palembang has a computer network connected to PT. KAI Persero central is located in Jakarta. Now, PT. KAI Palembang is trying to improve computer network security, where one of them is limiting the access of users who connected to PT. KAI Palembang computer network. This can be done by implementing Access Control Lists (ACLs) and Frame Relay on PT. KAI Palembang computer network. In this research used the Network Development Life Cycle (NDLC) method which has several stages, namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. This research method is used because the results of this research will be displayed in the Cisco packet tracer simulator. In addition, the results of this research were tested using a ping test between computers to show that the ACLs design had been running well.

Keywords: Network, ACLs, NDLC, Cisco Packet Tracer, ping test

  • 1.    Introduction

PT. KAI Palembang is an Indonesian state-owned enterprise located in South Sumatra Province, which provides rail transportation services for both passengers and goods. PT. KAI Palembang has a computer network that was connected to the PT. KAI Persero central computer network located in Jakarta, where the two networks were connected using a router device. A router is a device that will pass IP packets from a network to another network using the addressing and certain protocol method to pass that data packet [1]. IP packets contains IP Address which is a series of binary numbers between 32-bit to 128-bit which is used as the identification address for each host computer on the internet network [2]. Router have function to connect many small networks to a larger network and are called internetwork with TCP / IP technology-based to expand from LAN to WAN and MAN, router also used to connect networks that use different media [3]. Routing needs to be done to the router device so that it can be used, where routing is the process of directing data packets to get the destination from one location to another [4]. To do the routing process, a routing protocol is needed, where the routing protocol is the protocol used in dynamic routing and allows routers to share information about networks and connections between routers [5]. In this research, Enhanced Interior Gateway Routing Protocol (EIGRP) is used, which is a cisco routing protocol that works on cisco routers and on internal route processors that found on layer core switches and cisco distribution layer switches and EIGRP is also a classes and enhaced distance vector protocol [6]. In addition, also need a switch device which have function as a link between the computer network of rooms were located in PT. KAI Palembang. A switch commonly called a smart hub was used to connect between one computer and another computer in a LAN [7].

The problem that occurs in this research is the lower levels of network security, so it is necessary to make efforts for improve computer network security by limiting user access to communication between networks on the PT. KAI Palembang computer network. Therefore in this research, do the application of Access Control List (ACLs) and Frame Relay on the PT. KAI Palembang computer network. ACLs are a list of licensing or rejection statements that are applied to network addresses or the uppermost protocol layer and ACLs also used to select packets that go in and out of the network [8] while Frame relay is a technology that relies on frame- frame that is forwarded to send data [9], where Frame is a packet data [10]. In order to implement both of these technologies, so necessary to build a Virtual Local Area Network (VLAN) by utilizing router and switch, where VLAN are logical groupings of users and network resources that are connected to determined ports on a switch administratively [11]. VLAN is an option because it regulate networks based on their classification techniques, namely through MAC addressing, ports and so on that make flexible VLAN networks [12]. The entire research was carried out using a Cisco packet tracer simulator, where cisco packet tracer is a simulator of network tools issued by cisco that often used as a medium of learning and training and also often used in computer network simulation research fields [13]. The main purpose of the cisco packet tracer is to provide tools for participants and instructors to be able to understand the principles of computer networking and also build skills in the network configuration field that use cisco [13].

  • 2.    Reseach Methods

The research method used in the current research is the Action Research method wherein this method is described, interpreted and explained a condition at the same time in order to make changes or interventions with the aim of improvement and participation [14]. The following in Figure 1 are the stages of the action research method used:

Diagnosing

Learning

Evaluating

Action Planning

METODE

ACTION RESEARCH

Kelola : Rahmat Novriatida D

Action

Taking

Figure 1. Action Research Method [15]

  • 3.    Result and Discussion

    3.1.    Network Topology Design of PT. KAI Palembang

In Figure 2. below is the result of a topology design that researcher have designed on PT. KAI Palembang computer network, where the researcher added 2 routers and implemented a star-

bus topology with the aim that there were alternative paths could be used if the main line was cut off. The following picture below is the Network Topology that designed using the Cisco packet tracer simulator.

Figure 2. Network Topology Design in PT. KAI Palembang.

  • 3.2.    Virtual Local Area Network (VLAN) mapping

Virtual Local Area Network (VLAN) is a network that connect the same network although different locations with configuration in switch device using the trunking method, the switch is connected with a router to connect a predetermined VLAN network [16]. VLAN mapping is done to ease the Frame Relay configuration and VLAN also divide the device into several rooms based on their functions. The following table below is the VLAN mapping that used in this research:

Table 1. VLAN mapping

No.

Rooms

VLAN

1

IT and Service Room

10

2

Safety Room

20

3

Financial and Billing Room

30

4

Documentation Room

40

5

Rail and Bridges Room

50

6

HR and General Room

60

  • 3.3.    IP Address Scheme in PT. KAI Palembang

To be able to communicate on a private network or on the internet public network every host on the computer network must be identified by an IP address

Table 2. IP Address Scheme

No.

Rooms

Network address

IP address

Subnet mask

Default gateway

1

IT and Service Room

192.168.1.0/28

192.168.1.2 s/d

192.168.1.3

255.255.255.0

192.168.1.1

2

Safety Room

192.168.2.0/28

192.168.2.2 s/d

192.168.2.3

255.255.255.0

192.168.2.1

3

Financial and Billing Room

192.168.6.0/28

192.168.6.2 s/d

192.168.6.4

255.255.255.0

192.168.6.1

4

Documentation Room

192.168.5.0/28

192.168.5.2 s/d

192.168.5.4

255.255.255.0

192.168.5.1

5

Rail and

Bridges Room

192.168.3.0/28

192.168.3.2 s/d

192.168.3.5

255.255.255.0

192.168.3.1

6

HR and General Room

192.168.4.0/28

192.168.4.2 s/d

192.168.4.5

255.255.255.0

192.168.4.1

  • 3.4.    ACLs design

The following table below is the access control list (ACLs) design that will be applied in this research:

Table 3. ACLs Design

No.

Rooms

Cannot access

1

HR and General Room

IT Server

2

All rooms except the IT room

Internet (ISP)

3

Financial Room

IT Server

  • 3.5.    Frame Relay Design

The researcher designed frame relay from PT. KAI Palembang headed to PT. KAI Central in Jakarta. The researcher added a cloud as a media to connect of two networks with a WAN shell, where the design is as follows

Table 4. Frame Relay Design

No.

Router

IP Address

DLCI

1

Palembang

10.1.1.1/24

100

2

Jakarta

10.1.1.2/24

200

  • 3.6.    VLAN Configure on switch in the IT room

To give the identity of a VLAN or VLAN identity number is called a VLAN ID. Used to mark related VLAN, by configuring it as follows:

Figure 3. VLAN Configure on a switch

  • 1)    Configure the access link interface to the PC

The interface configuration to the PC aim to access the VLAN ID that was created on the switch. Then to connect the interface using an access link command used to connect a computer with switch access links is a configured switch port.

Switch (config) #int fa0 / 2

Switch (config-if) #switchport access vlan 10

Switch (config-if) #switchport mode access

Switch (config) #int fa0 / 3

Switch (config-if) #switchport access vlan 20

Switch (config-if) #switchport mode access

Switch (config) #int fa0 / 4

Switch (config-if) #switchport access vlan 30

Switch (config-if) #switchport mode access

Switch (config-if) #int fa0 / 5

Switch (config-if) #switchport access vlan 40

Switch (config-if) #switchport mode access

Switch (config-if) #int fa0 / 6

Switch (config-if) #switchport access vlan 50

Switch (config-if) #switchport mode access

Switch (config-if) #int fa0/7

Switch (config-if) #switchport access vlan 60

Switch (config-if) #switchport mode access

Switch (config-if) #ex

2) Setting interconnection between VLAN

Figure 4. Setting interconnection between VLAN

  • 3.7.    Frame Relay Configuration

Frame Relay have function for communication between branches of the company, for example the branch office PT. KAI Palembang wants to communicate with the PT. KAI central in Jakarta and the communication process become more simple.

  • 1)    Palembang Router Configuration

ψ RσUtw Palembeng                                                          c * S’

Physical ont-⅛ CLl

IOS Command Line Interface

RouterFLB>eπ SOTrcerPLBfrTOTiC C-Snter conf ιgur *tιcn ccsnanda, tana per line Cnd with CWΠ√2. AoutectLB.cβnfLgI■Iat eel/ O

AoutecrLBscenfig-IfMLp addc∙∙∙ 20.20.2(1.1 2BB. Σ≡≡ . 2 BE .0 RoucexFLB < conf Ig-If J iencapsulecLon fr*M-x∙Xa/ OouterPLB(σonftg-if JITr∙s∙∙-relay InverfBc-Olci IOl

BouterPLB-IceflfLg-IfMfraBMi-ZeLey Lnvezface-dlei IOL

BouxerPLBrIcofifLg-IfMno Bh

Route cFLB < conf Lg^ ι £ ,ι t

ILiniPSOrO-B-UFDOWK Lxce pxot∞l an Xatexface SexLaiazO1 PAangnd etale tn dove

⅝LIXtFS0Γ0-6-CPDCWK- LUx protocol on Interface Serlal3∕0r Changed state to up

RoutarFLB -I OOflflga it.'t SRC Zely O

RouiarPLB-Iconfxg-ItMxp Mddxaae 100.LC-1.1 IBS .XSi .2Bi .O

RautaxPLB -I conf Lg-Xf) Ino an

BouterPLB-IcoflfLg-IfMint se2∕0

BouterPLBtcoflfLg-IfMLp address 10.10 10.1 2K.2SS.2iB.0

RoueerFLBtcanrig-IfJ r

00:01:03: WOJSFr-B-AiXJCHS: Froceoe 1, Knr IOO . 1OO - IOO . 2 an SerialJyO Erne TtlLL xc

DOWXr KieXgAbcr Dcvn- Interface deem ox Satacbed

RoucezFLB-Ic-MLfLg-LfMno Bit

RouterFLB < confl^^Mj^^^

Cupv       PdMe

Figure 5. Palembang Router Configuration

  • 2)    Jakarta Router Configuration



  • 3)    Cloud configuration

Cloud is a combination of the computer technology used (computing) in a network with internetbased development (cloud) that has a function to run programs or applications through connected computers at the same time, but not all are connected through the internet using cloud computing. This cloud-based computer is a technology that makes the internet the central server for managing data and user applications. This technology allows users to run programs without installation and allows users to access their personal data through computers with internet access. As well as the benefits of cloud in everyday life can store all data on the server centrally, data security, high flexibility and scalability and long-term investment.

  • a) Port to the Palembang Router

Figure 7. Port to the Palembang Router b) Port to Jakarta Router

Figure 8. Port To the Jakarta Router

c) Connect frame relay from Palembang to Jakarta

Figure 9. Frame Relay From Palembang to Jakarta

  • 3.8.    EIGRP Routing Configuration

Each router that is in one domain has a identical database to each other, so that large network can be broken down into smaller areas and react very quickly to changes that occur on the network. Here is the configuration:

RouterPLB (config) #router eigrp 10

RouterPLB (config-router) #no auto-summary

RouterPLB (config-router) #network 192.168.1.0 0.0.0.255

RouterPLB (config-router) #network 192.168.2.0 0.0.0.255

RouterPLB (config-router) #network 192.168.3.0 0.0.0.255

RouterPLB (config-router) #network 192.168.4.0 0.0.0.255

RouterPLB (config-router) #network 192.168.5.0 0.0.0.255

RouterPLB (config-router) #network 192.168.6.0 0.0.0.255

RouterPLB (config-router) #network 100.10.1.0 0.0.0.255

RouterPLB (config-router) #network 10.10.10.0 0.0.0.255

RouterPLB (config-router) #network 20.20.20.0 0.0.0.255

RouterPLB (config-router) #end

RouterPLB # wr

  • 1.    Configure the EIGRP Router on the JKT Router

RouterJKT (config) #router eigrp 10

RouterJKT (config-router) #no auto-summary

RouterJKT (config-router) #network 20.20.20.0 0.0.0.255

RouterJKT (config-router) #end

  • 2.    Configuring the EIGRP Router on the ISP Router

RouterISP (config) #router eigrp 10

RouterISP (config-router) #no auto-summary

RouterISP (config-router) #network 10.10.10.0 0.0.0.255

RouterISP (config-router) #end

This testing phase is intended to find out whether the Access Control List (ACLs) configuration has been running properly according to the ACLs design table that has been presented previously. Following are some examples of ping test from several computer clients on the PT. KAI Palembang computer network:

  • 3.9.    Ping test from HR and General Room to Lampung Router

To be able to test the connection from HR and general room to the Lampung Router, the researcher ping the HR and general room client to the Lampung Router IP address : 101.11.10.2. The following results can be seen in the picture below.

Figure 10. Ping test on HR and General Room to Lampung Router

  • 3.10.    Ping test from IT Room to an ISP Router (Internet).

To be able to test the connection from the IT room to the ISP, the researcher ping the IT Room client to the ISP IP address : 10.20.30.2. The following results can be seen in the picture below.

Figure 11. Ping test IT Room to an ISP Router (Internet)

  • 3.11.    Ping test from Financial Room to the Lampung Router

To be able to test the connection from the Financial room to the Lampung Router, the researcher ping the Financial room client to the Lampung Router IP address : 101.11.10.2. The following results can be seen in the picture below.

Figure 12. Ping test Financial Room to the Lampung Router

  • 3.12.    Ping test from Documentation Room to the ISP Router (Internet)

To be able test the connection from Documentation Room to the ISP, the researcher ping the Documentation room client to the ISP IP address : 10.20.30.2. The following results can be seen in the picture below.

Figure 13. Ping test Documentation Room to the ISP Router (Internet)

3.13. Ping test from IT Room to the Billing Room

Figure 14. Ping test IT Room to the Billing Room

From the results of connection testing between several clients on the PT. KAI Palembang computer network that has been obtained above, it can be seen that the Access Control List (ACLs) configuration has run according to the ACLs design table (Table 3). Can be seen in table 5 below:

Table 5. Connection testing results

No.

Testing                  Result

1

Ping test on HR and General Room

not connected to Lampung Router

2

Ping test IT Room to an ISP Router

connected

(Internet)

3

Ping test Financial Room to the

not connected

Lampung Router

4

Ping test Documentation Room to

not connected

the ISP Router (Internet)

5

Ping test IT Room to the Billing

connected

Room

  • 4.    Conclusion

This research use the Network Development Life Cycle (NDLC) method, where the NDLC method stages that have been carried out in this research are Analysis, Design and Simulation Prototyping so that the next stages such as Implementation, Monitoring and Management can be carried out by next researchers. From the final results of this research which the connection testing between several clients on PT. KAI Palembang computer network show that the

application of Access Control Lists (ACLs) can limit a user's access to communication, where only users who are registered in the users list database are permitted through ACLs configuration that can connected and communicated. That way, the results of this research can be used as a solution for the network security problems faced by PT. KAI Palembang.

References

  • [1]    A. N. Asyikin, N. Saputera, and E. Yohanes, “Sistem Manajemen Hotspot di Politeknik

Negeri Banjarmasin menggunakan Mikrotik Router OS,” Jurnal Poros Teknik, vol. 5, no. 1, pp. 31–35, 2013.

  • [2]    N. Yulianto and F. Bacharuddin, “Perancangan Sistem Informasi Parkir dengan WiFi

berbasis Arduino,” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 7, no. 3, pp. 132–137, 2016.

  • [3]    H. A. Musril, “Analisis Unjuk Kerja RIPv2 dan EIGRP dalam Dynamic Routing Protocol,”

Jurnal Elektro Telekomunikasi Terapan (JETT), vol. 2, no. 2, 2015.

  • [4]    S. Alimi, Sukiswo, and I. Santoso, “Kinerja Routing Fisheye State Routing (FSR) pada

Jaringan WPAN 802.15.4 (Zigbee) Topologi Mesh,” TRANSIENT, vol. 2, no. 1, pp. 87– 96, 2013.

  • [5]    F. U. Hasanah and N. Mubarakah, “Analisis Kinerja Routing Dinamis dengan Teknik RIP

(Routing Information Protocol) pada Topologi Ring dalam Jaringan LAN (Local Area Network) menggunakan Cisco Packet Tracer,” SINGUDA ENSIKOM, vol. 7, no. 3, pp. 118–124, 2014.

  • [6]    D. Yolanda, S. H. Pramono, and M. F. E. Purnomo, “Simulasi Kinerja Routing Protokol

Open Shortest Path First (OSPF) dan Enhanced Interior Gateway Routing Protocol (EIGRP) menggunakan Simulator Jaringan OPNET Modeler v. 14.5,” Jurnal Mahasiswa TEUB, vol. 1, no. 2, pp. 1–6, 2013.

  • [7]    J. Enterprise, Trik Membuat Jaringan Komputer dan Wifi, 1st ed. Jakarta: PT. Elex

Media Komputindo, 2014.

  • [8]    P. Simanjuntak, C. E. Suharyanto, and Jamilah, “Analisis Penggunaan Access Control

List (ACL) dalam Jaringan Komputer di Kawasan Batamindo Industrial Park Batam,” Journal Information System Development (ISD), vol. 2, no. 2, 2017.

  • [9]    R. N. Dasmen, “Simulasi Teknologi Frame Relay pada Jaringan VPN Menggunakan

Cisco Packet Tracer,” Jurnal Digital, vol. 1, no. 1, pp. 45–55, 2018.

  • [10]   H. Supendar and Y. Handrianto, “Teknik Frame Relay dalam Membangun Wide Area

Network dengan Metode Network Development Life Cycle,” Bina Insani ICT Journal, vol. 4, no. 2, pp. 121–130, 2017.

  • [11]    H. Yani, P. A. Jusia, and H. Rohayani. AH, “Analisis dan Perancangan Sistem Manajemen Network berbasis Virtual Local Area Network (Studi Kasus: PT. Sumbertama Nusa Pertiwi),” in Seminar Nasional Teknologi Informasi dan Multimedia 2013, 2013.

  • [12]    R. Tulloh, “Analisis Performansi VLAN pada Jaringan Software Defined Network (SDN),” Jurnal INFOTEL (Informatika - Telekomunikasi - Elektronika), vol. 9, no. 4, pp. 406–411, 2017.

  • [13]    Zulkipli, M. Efendi, and Sihkabuden, “Pengembangan Modul Sistem Keamanan Jaringan berbasis Simulasi Cisco,” Jurnal Pendidikan: Teori Penelitian dan Pengembangan, vol. 1, no. 3, pp. 399–408, 2016.

  • [14]    R. N. Dasmen, “Implementasi Metode VLSM (Variable Length Subnet Mask) pada Pemetaan IP Address LAN (Local Area Network) STIPER Sriwigama Palembang,” Computatio: Journal of Computer Science Information Systems, vol. 2, no. 2, pp. 112– 118, 2018.

  • [15]    R. N. Dasmen, “Implementasi Raspberry Pi 3 sebagai Wireless Access Point pada STIPER Sriwigama Palembang,” Jurnal Informatika: Jurnal Pengembangan IT, vol. 3, no. 3, pp. 387–393, 2018.

  • [16]    O. K. Sulaiman, “Simulasi Perancangan Sistem Jaringan Inter VLAN Routing di Universitas Negeri Medan,” CESS (Journal of Computer Engineering, System and Scence), vol. 2, no. 1, pp. 17–21, 2017.

61