Penerapan Sistem Keamanan (Firewall) Pada Jaringan Smart Home
Abstract
Currently, technological developments are increasingly advanced and developing, technological developments that are very rapid with the development of the times to meet human needs. One of them is the need for safe and comfortable home technology. The application of technology in the house is to use the concept of smart home by using firewall network security. Firewall on a smart home network is a concept where Internet of Things devices are safe from hacking by unknown people and cannot be controlled by other smartphone devices. Simulation is an important part of the application of the concept that will be carried out, especially to find out that research and studies are carried out using the simulation method as a way to solve problems. Cisco Packet Tracer 7.3 is an application that can help in terms of simulating Internet of Things devices. The results obtained from the firewall security concept simulation are that in the use of IoT devices such as house doors, windows, garages, lights, webcams and air conditioners are guaranteed to be secure because the devices that have permissions that can be connected.
References
[2] R. I. Akbar, D. G. Purnama, and A. Salsabila, “Pengembangan Model SmartHome berbasis IoT,” Pros. Semin. Nas. Penelit. LPPM UMJ, pp. 1–8, 2023.
[3] D. Durianto, Ananta, “Konfigurasi Cicso ASA Firewall Menggunakan ASDM,” vol. 5, no. Volume 5 No. 2, p. 305, 2021.
[4] M. U. Dewi, “Kelebihan Firewall Kekurangan Firewall,” 2021.
[5] A. Restu Mukti, C. Mukmin, E. Randa Kasih, D. Palembang Jalan Jenderal Ahmad Yani No, S. I. Ulu, and S. Selatan, “Perancangan Smart Home Menggunakan Konsep Internet of Things (IOT) Berbasis Microcontroller,” J. JUPITER, vol. 14, no. 2, pp. 516–522, 2022.
[6] H. Andrianto and G. Intan Saputra, “Smart Home System Berbasis IoT dan SMS Smart Home System Based on IoT and SMS,” Telka, vol. 6, no. 1, pp. 40–48, 2020.
[7] A. Gallileo et al., “Rancangan smarthome berbasis mikrokontroler sebagai pengendali pintu rumah dan garasi serta lampu,” vol. 12, no. 1, 2025.
[8] Y. Efendi, “Internet Of Things (Iot) Sistem Pengendalian Lampu Menggunakan Raspberry Pi Berbasis Mobile,” J. Ilm. Ilmu Komput., vol. 4, no. 2, pp. 21–27, 2018, doi: 10.35329/jiik.v4i2.41.
[9] D. Suarna and E. S. Edy, “Implementasi Internet of Things (IoT) dalam Memonitoring Komsumsi Listrik,” Bull. Inf. Technol., vol. 4, no. 2, pp. 163–170, 2023, doi: 10.47065/bit.v4i2.631.
[10] A. N. Ismail and F. Nuryana, “Angan Jaringan Smart Home,” 2024.
[11] F. Adani and S. Salsabil, “Internet of Things: Sejarah Teknologi Dan Penerapannya,” Isu Teknol. Stt Mandala, vol. 14, no. 2, pp. 92–99, 2019.
[12] M. Faqih Febriansyah, R. Setiawan, and T. Sutabri, “IJM: Indonesian Journal of Multidisciplinary Kemudahan dan Keamanan Dalam Rumah Pintar: Tinjauan Terhadap Teknologi Smart Home,” IJM Indones. J. Multidiscip., vol. 2, pp. 24–31, 2024, [Online]. Available: https://journal.csspublishing/index.php/ijm
[13] A. Dogman and M. Jewiley, “Design and Implement IoT Smart Home via Cisco Packet Tracer : Applications & Simulations,” Sixth Int. Conf. - Smart Cities State Map –Libya, no. December, p. 2, 2020.
[14] S. T. Kurniawan, “Perancangan Dan Penerapan Stateful Firewall Pada Arsitektur Dual-Homed Host,” J. Teknol. Pint., vol. 3, no. 2, pp. 1–17, 2023, [Online]. Available: http://teknologipintar.org/index.php/teknologipintar/article/view/356%0Ahttp://teknologipintar.org/index.php/teknologipintar/article/download/356/340
[15] D. Wicaksono, “Firewall Sistem Keamanan Jaringan Menggunakan Firewall dengan Metode Port Blocking dan Firewall Filtering,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 9, no. 2, pp. 1380–1392, 2022, doi: 10.35957/jatisi.v9i2.2103.
[16] F. A. Syaifuddin, D. A. Maulana, and M. F. Amrulloh, “Analisis Keamanan Jaringan Menggunakan Firewall untuk Mencegah Serangan Brute Force dan Fraud,” vol. 4, no. 2, pp. 895–902, 2024.
[17] R. Sulaiman, R. S. Al Fathul, and A. M. Raya, “Implementasi Metode Access Control List Pada Mikrotik Dalam Mengamankan Jaringan Internet Di Kantor Lurah Air Selemba,” J. Tek. Inform. dan Teknol. Inf., vol. 4, no. 1, pp. 75–85, 2024, doi: 10.55606/jutiti.v4i1.2880.
[18] S. Dewi, F. Firmansyah, and U. Hasan, “Penerapan Metode Access Control List Pada Jaringan VLAN Menggunakan Router Cisco,” IMTechno J. Ind. Manag. Technol., vol. 3, no. 1, pp. 37–41, 2022, doi: 10.31294/imtechno.v3i1.927.
[19] K. Kamarudin and M. Gazali, “Sistem Keamanan Berlapis Menggunakan Metode Access Control List Dan Enkripsi Source Code Pada Web Login,” J. Teknol. Inf., vol. 2, no. 2, pp. 48–60, 2021, doi: 10.32546/jutech.v2i2.1657.
[20] S. Jayanto, A. Tantoni, and H. Asyari, “Implementasi Keamanan Jaringan dengan Packet Filtering Berbasis Mikrotik Untuk Internet Positif Di SMKN 1 Praya,” J. Ranah Publik Indones. Kontemporer, vol. 1, no. 2, pp. 65–77, 2021, doi: 10.47134/rapik.v1i2.10.
[21] R. Prahastian, “Penggunaan Simulator Cisco Packet Tracer 7.2 Pada Rumah Kaca Pintar Untuk Tanaman Kopi Berbasis IoT,” Universitas Islam Negeri Sayarif Hidayatullah Jakarta, 2019.
[22] A. Afrizal and F. Fitriani, “Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung,” J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), vol. 3, no. 1, p. 13, 2019, doi: 10.35870/jtik.v3i1.78.
Copyright (c) 2025 Algazali Raihan Batubara, Ilham Faisal, Imran Lubis

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the EXPLORER right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share (copy and redistribute the material in any medium or format) and adapt (remix, transform, and build upon the material) the work for any purpose, even commercially with an acknowledgement of the work's authorship and initial publication in EXPLORER.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in EXPLORER.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).





.png)















