Applying Sticky and Violation Shutdown Mode on Security Port Switch for Security Wan Infrastructure Network

Authors

  • Ikhsan Ritonga Universitas Harapan Medan
  • Ilham Faisal Universitas Harapan Medan
  • Tengku Mohd.Diansyah Universitas Harapan Medan

DOI:

https://doi.org/10.59934/jaiea.v4i2.921

Keywords:

Switch Port Security, Sticky Mode, Violation Shutdown, Network Security, WAN Infrastructure

Abstract

Network security is a crucial aspect of managing information technology infrastructure. The risk of network threats, such as data theft and operational disruptions, increases as access points proliferate. One technique to mitigate these risks is port security. This study aims to implement and evaluate the effectiveness of switch port security in enhancing security within a Wide Area Network (WAN) infrastructure. The port security feature is configured using sticky mode and violation shutdown, allowing the recognition and authorization of legitimate devices based on their Media Access Control (MAC) addresses. A simulation using Cisco Packet Tracer was conducted to test this approach, where port security was applied to prevent unauthorized access. The results show that switch port security with sticky mode and violation shutdown effectively identifies and blocks unauthorized devices. When a device with an unknown MAC address attempts to access the network, the switch automatically disables the corresponding port, ensuring that only authorized devices can connect. The process of recovering disabled ports also proved to be quick and straightforward for network administrators. In conclusion, the implementation of switch port security in WAN infrastructure significantly strengthens network security, protects data from unauthorized access, and ensures optimal network availability and performance.

Downloads

Download data is not yet available.

References

D. Wicaksono, “Firewall Sistem Keamanan Jaringan Menggunakan Firewall dengan Metode Port Blocking dan Firewall Filtering,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 9, no. 2, pp. 1380–1392, 2022, doi: 10.35957/jatisi.v9i2.2103.

R. Hanipah and H. Dhika, “Analisa Pencegahan Aktivitas Ilegal Didalam Jaringan Dengan Wireshark,” DoubleClick J. Comput. Inf. Technol., vol. 4, no. 1, p. 11, 2020, doi: 10.25273/doubleclick.v4i1.5668.

R. Rahmat, R. Wiji Wahyuningrum, E. Haerullah, and S. Sodikin, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Aplikasi Spiceworks,” PROSISKO J. Pengemb. Ris. dan Obs. Sist. Komput., vol. 9, no. 1, pp. 44–52, 2022, doi: 10.30656/prosisko.v9i1.4671.

A. Subki, M. N. Karim, and J. Juhartini, “PENGEMBANGAN JARINGAN HOTSPOT MENGGUNAKAN MIKROTIK ROUTERBOARD RB951Ui-2HnD PADA SMKN 2 SELONG,” Explore, vol. 10, no. 1, p. 14, 2020, doi: 10.35200/explore.v10i1.43.

W. Sulistyo and S. Sartomo, “Model Keamanan Jaringan Menggunakan Firewall Port Blocking,” Krea-TIF J. Tek. Inform., vol. 10, no. 1, pp. 10–18, 2022, doi: 10.32832/kreatif.v10i1.6678.

Z. Miftah, “Simulasi Keamanan Jaringan Dengan Metode Dhcp Snooping Dan Vlan,” Fakt. Exacta, vol. 11, no. 2, p. 167, 2018, doi: 10.30998/faktorexacta.v11i2.2456.

R. O. Nitra and M. Ryansyah, “Implementasi Sistem Keamanan Jaringan Menggunakan Firewall Security Port pada Vitaa Multi Oxygen,” J. Sist. dan Teknol. Inf., vol. 7, no. 1, p. 52, 2019, doi: 10.26418/justin.v7i1.29979.

K. Al Fikri and Djuniadi, “Keamanan Jaringan Menggunakan Switch Port Security,” InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. 5, no. 2, pp. 302–307, 2021, [Online]. Available: http://bit.ly/InfoTekJar

Downloads

Published

2025-02-15

How to Cite

Ritonga, I., Ilham Faisal, & Tengku Mohd.Diansyah. (2025). Applying Sticky and Violation Shutdown Mode on Security Port Switch for Security Wan Infrastructure Network. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(2), 1427–1433. https://doi.org/10.59934/jaiea.v4i2.921