Design and Implementation of Network Security Using Fortinet Firewall at the Communication and Information Service of Central Lombok Regency
DOI:
https://doi.org/10.59934/jaiea.v5i1.1356Keywords:
Network Security, Fortinet Fortigate Firewall, WAF, IPS, AntivirusAbstract
In an increasingly complex digital era, government agencies such as the Communication and Information Service (Diskominfo) of Central Lombok Regency face serious challenges related to network security. This research aims to design and implement a Fortinet FortiGate firewall-based network security system, in order to detect and address cyber threats that have the potential to disrupt operations and public services. The method used is the Network Development Life Cycle (NDLC), which includes the stages of analysis, design, simulation, implementation, monitoring, and management. The system was tested using common attack scenarios such as PortSscanning and Denial of Service (DoS) with the help of tools such as nmap, sqlmap and hping3. The results show that the implementation of FortiGate, including features such as Web Application Firewall (WAF), Intrusion Prevention System (IPS) and Antivirus, is able to provide comprehensive protection and real-time response to threats. This study also shows that the Fortigate-based network security system is able to significantly improve the network security posture of the Communication and Information Service (Diskominfo) of Central Lombok Regency. This system provides multi-layered, reliable, and easy-to-manage protection, and is an important foundation in maintaining the sustainability of local government digital services.
Downloads
References
S. Aryanti, Khairil, and H. Aspriyono, "Development of a Mikrotik-Based Wifi Network Security System Using the Network Development Life Cycle (NDLC) Method," Engineering, vol. 17, no. 2, pp. 88–95, 2023, doi: 10.33369/teknosia.v17i2.31582.
Nanang Sadikin & Mukhlis, "Implementation of Computer Network Security for Internet Access Using Key Security," Information, vol. 6, no. 1, pp. 20–27, 2020, [Online]. Available: https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/77%0Ahttps://maklumatika.i-tech.ac.id/index.php/maklumatika/article/download/77/85
F. R. Arbie and M. Raharjo, "Implementation of Network Security with the Security Profiles Method using Fortigate at the State Civil Apparatus Commission," J. Inform. Terpadu, vol. 10, no. 1, pp. 27–34, 2024, doi: 10.54914/jit.v10i1.1060.
M. Annas, R. T. Adek, and Y. Afrillia, “Web Application Firewall (WAF) Design to Detect and Anticipate Hacking in Web-Based Applications,” J. Adv. Comput. Knowl. Algorithms, vol. 1, no. 3, pp. 52–58, 2024, doi: 10.29103/jacka.v1i3.16315.
E. Dwi Setiawan, Ridwansyah, and M. Raharjo, "Designing Next-Generation Firewall Network Security Using Fortinet Routers at Pt. Alodokter Teknologi Solusi," J. Inform. Terpadu, vol. 9, no. 1, pp. 34–39, 2023, [Online]. Available: https://journal.nurulfikri.ac.id/index.php/JIT
A. Riduan and N. Sadikin, "Firewall Design Using Fortigate at PT Swadharma Duta Data," J. Information, vol. 8, no. 1, pp. 90–98, 2021, [Online]. Available: https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/122
D. Prima Jaya, H. Aspriyono, and E. Suryana, "Implementation of Computer Network Security Using Fortigate as a Firewall at the Computer Lab of IAIN Bengkulu," Gatotkaca J., vol. 2, no. 1, pp. 31–38, 2021, [Online]. Available: https://doi.org/10.37638/gatotkaca.2.1.31-38
N. Bayu and A. Susila, "Application of Fortigate Technology in the Development of SSL-VPN-Based VPN Networks (Case Study: Ministry of PANRB)," Log. J. Computing Science. and Educators., vol. 2, no. 1, pp. 153–159, 2023, [Online]. Available: https://journal.mediapublikasi.id/index.php/logic/article/view/2899
N. Sadikin and M. Sari, "Implementation of Password Policy on Domain Security Policy Group Policy Object (GPO) of Active Directory Domain Services for Network Security in Windows Server," J. Information, vol. 10, no. 1, pp. 1–9, 2023, [Online]. Available: https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/152
A. T. Laksono and M. A. H. Nasution, "Implementation of Local Area Network Computer Network Security Using Access Control List in Company X," J. Sist. Computer. and Inform., vol. 1, no. 2, p. 83, 2020, doi: 10.30865/json.v1i2.1920.
F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, "Implementation of Mikrotik Network Security System Using Firewall Filtering and Port Knocking," J. Inf. and Technology System., vol. 5, no. 4, pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.
A. E. Syaputra et al., Computer Network Security. 2025. [Online]. Available: https://repository.sadapenerbit.com/index.php/books/catalog/book/235
D. Wicaksono, "Network Security System Firewall Using Firewall with Port Blocking and Firewall Filtering Methods," JATISI (Tek Journal. Inform. and Sist. Information), vol. 9, no. 2, pp. 1380–1392, 2022, doi: 10.35957/jatisi.v9i2.2103.
J. Education and M. Efendi, "Available online EISSN: 2502-471X DEVELOPMENT OF CISCO'S SIMULATION-BASED NETWORK SECURITY SYSTEM MODULE," pp. 399–408, 2016.
N. Sadikin, "Implementation of Security Control on Information Technology Infrastructure to Prevent and Overcome Ransomware Malware for Enterprise Information Security," J. Information, vol. 10, no. 2, pp. 77–86, 2023, [Online]. Available: https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/234
R. Hendrawan, L. Widyawati, and O. Asroni, “Implementation of Multihomed Firewall Based on IDS and DMZ Technology Using PfSense,” J. Artif. Intell. Eng. Appl., vol. 4, no. 3, pp. 1823–1828, 2025, doi:10.59934/jaiea.v4i3.1028.
S. Dewi, "Network Security Using VPN (Virtual Private Network) with PPTP (Point to Point Tunneling Protocol) Method at the Kertaraharja Ciamis Village Office," EVOLUTION J. Science and Management., vol. 8, no. 1, pp. 128–139, 2020, doi: 10.31294/evolution.v8i1.7658.
G. H. A. Kusuma, "Designing a Web Server Network Security System Scheme using Web Application Firewall and Fortigate to Prevent Data Leaks during the Covid-19 Pandemic," J. Informatics Adv. …, vol. 2, no. 2, pp. 1–4, 2021, [Online]. Available: http://journal.univpancasila.ac.id/index.php/jiac/article/view/3259
S. Parulian, D. A. Pratiwi, and M. Cahya Yustina, "Threats and Solutions to Cyber Attacks in Indonesia," Telecommun. Networks, Electron. Comput. Technol., vol. 1, no. 2, pp. 85–92, 2021, [Online]. Available: http://ejournal.upi.edu/index.php/TELNECT/
R. Yulianto and F. Aprilyani, "Computer Network Security System Using NDLC Method with Linux Zentyal at the Coordinating Ministry for Maritime Affairs," J. Tek. Inform. Inter-National Statistics, vol. VI, no. 2, pp. 79–86, 2020.
Y. Mulyanto, E. S. Susanto, M. I. Akbar, and F. Idifitriani, "Computer Network Security Analysis Using Intrusion Detection System (IDS) and Firewall Methods," Digit. Transform. Technol., vol. 3, no. 2, pp. 864–870, 2024, doi: 10.47709/digitech.v3i2.3402.
K. Aziz, S. Zakir, W. Aprison, and L. Efriyanti, "Implementation of Network Security with Firewall Filtering Method Using Mikrotik at SMKN 3 Payakumbuh," JATI (Journal of Mhs. Tek. Inform., vol. 8, no. 3, pp. 3343–3352, 2024, doi: 10.36040/jati.v8i3.9662.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.







