IMPLEMENTASI METODE ACCESS CONTROL LIST UNTUK MEMONITORING AKSES JARINGAN MENGGUNAKAN SQUID PROXY
DOI:
https://doi.org/10.46880/jmika.Vol6No1.pp79-84Keywords:
Squid, Proxy, Access Control ListAbstract
There is no doubt that technological advances, Many can be done easily without having to go through a long process. For example, by utilizing a network connection in various ways. Like looking to collect and get data whether it's using a LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). This application mentions that every user who wants to use the Internet must register with the Administrator by using the Mac Address on the device. So, not too many devices are connected to the network so that it makes an Internet network.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Asaziduhu Gea, Mufria J. Purba, Alfonso Agung Putra, Jamaluddin Jamaluddin, Rimbun Siringoringo
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.