EVALUATION OF NETWORK ACCESS RESTRICTIONS USING MAC ADDRESS FILTERING ON MICROTIK TO IMPROVE NETWORK SECURITY

ABSTRACT

The more internet users in a place, there must be restrictions on use, where only certain devices can use internet facilities. (Purnama-UBSI, 2019). According to research conducted by Kurani Mega Asteroid and Yayan Hendrian in the journal Computer Engineering AMIK BSI with the title "Analysis of Wireless Local Area Network (WLAN) and Design of Mac Address Filtering using Microtik (Case Study at PT. Graha Prima Swara Jakarta)" where in the journal raised the issue of easy in the translucent of security that uses WPA2 / PSK therefore it is necessary to apply the method of security system using mac address filtering. Where the results are obtained after the implementation of restrictions can make internet access more stable because each user already has their own usage rations. (Asteroid & Hendrian, 2016).
The research conducted by Noviar Armanda Nurdin and Septian Ardiansyah in the journal Computer Science and Tenology with the title "Implementation of Mac Address Filtering using hotspot features with Mikrotik in PT. Pertamina Drilling Service Indonesia Jakarta" in the study there are several main problems faced by clients and problems on computer networks including PT. PDSI Jakarta uses Captive Portal on the WLAN network, so users can still login through several different devices in the area. Therefore, it can be applied the mac address filtering method so that by doing this restriction apart from the connection becomes stable security becomes more awake. In addition, with this mac address restriction, administrators can easily track when something happens that causes the network to be disrupted (Nurdin & Ardiansyah, 2018).
Research on network restrictions has also been conducted by Syaiful and Cahyuni Novia in the journal CYBER-TECHN with the title "Network design with Microtik hotspot and Mac Address Filtering" the report in this study is the absence of internet usage filters for wireless network users, so it is necessary to apply the mac address filtering method that makes the security of internet users more secure, so that users can enjoy access comfortably and safely with restrictions that are done. In addition to producing internet users become more controlled and orderly. From this research produce if applied in the school area so that it can control internet use be it students or teachers. (Novia, 2018). authentication process use one username for all users of access rights, and the network used using wireless networks. In smk Ibn Khaldun has wireless internet access, problems or constraints that occur in the wireless network of Ibn Khaldun Vocational High School including the absence of restrictions on network access, in the use of networks in ibn Khaldun vocational school so that students, teachers, and staff in schools are free to use the network, in the application of the network using Internet Service Provider in terms of network security WLAN (Wireless Local Area Network) still uses WPA2-PSK so that users who do not have the authority can not access to the internet.
To overcome the problem, the solution provided is to use MAC Address Filtering on microtics, namely to limit users who have the right to access the network, by registering a MAC Address to determine the access rights of the user's device, so that the device can be connected if the computer device has registered mac address, and able to provide WLAN network security in schools can work optimally.
Based on the background that has been listed above, this study is proposed with the title "Evaluation of Network Access Restrictions Using MAC Address Filtering on Microtics to Improve Network Security". The reason for the creation of the thesis with the title above is to manage the device that will access the network by registering the MAC Address of the user device concerned, to be able to connect to the network in an effort to improve network security so that the WLAN network at Ibn Khaldun Vocational High School can work optimally.
The purpose in the study with the title of evaluation of network access restrictions using Mac address filtering to improve network security to design network systems in schools using Mac Address Filtering. Furthermore, to implement Mac Address Filtering to improve network security using rb951Ui-2nd microtics, evaluate network security using Mac Address Filtering applied in SmK Ibnu Khaldun.

METHODS
The research approach used in this research is the quantitative approach (Riyanto & Hatmawan, 2020). The population in this study is the number of wireless internet users smk Ibn Khaldun as many as 86 users. Based on the existing population, the scale of the pengukuran to be used is a saturated sample. In this study, researchers used saturated samples which means that the entire population is used as a sample of 86 people.

RESULTS AND DISCUSSION
The population used by the Study evaluation of Network Access Restrictions Using Mac Address Filtering on Microtik to Improve Network Security amounted to 86 users consisting of staff, teachers and students of Ibn Khaldun Vocational School.
The sampling technique used in this study used saturated sampling. Saturated sampling is a sample determination technique when all members of the population are used as samples. The number of samples used as many as 30 users.
In the study Evaluation of Network Access Restrictions Using Mac Address Filtering On Microtics To Improve Network Security has research variables and interrelated indicators. The variables used are variable X = Network Security and Variable Y = Network Services. The indicators used in variable X = Avaibility, Privacy, Integrity, and Authentication. While variable indicator Y = Throughput, Packet Loss, Delay (Yuisar & Yulianti, 2015).
The population in this study is the number of wireless internet users smk Ibn Khaldun as many as 86 users. Based on the existing population, the measurement scale to be used is a saturated sample. In this study, researchers used saturated samples which means the entire population is used as a sample of 86 people. Questionnaires or Questionnaires in the evaluation study evaluated restrictions on network access on microtics to improve network security. The source object is the students and teachers of Ibn Khaldun Vocational School. The process of measuring variables uses a likert scale that contains statements that have been provided answers. The answer consists of five answer options, and each of those answers has a value.
Testing for validity in this study used a statistical formula of the person product moment correlation coefficient with a 5% signification rate. Because testing applies to so many research questionnaire items, technical calculation of statistical correlation coefficients uses the SPSS program, where each item will be tested in relation to the total score of the variable in question. With the following conditions 1. If the value r of the table < r calculates, then the questionnaire item is declared valid 2. If the table r value > r calculates, then the questionnaire item is declared invalid.
The value of the table r is obtained from the table r statistics with the formula df = N-2, in this study the value N = 86 then obtained df = 84 with the value of the table r = 0.212. From the calculation using SPSS obtained the following results(Ghozali, 2018) : Based on table 1, it can be known from 20 statements stated that there are 7 statements namely P2, P3, P5, P9, P11, P13 and P14 in which it is not valid, because r calculates < r table (0.3610), then will be tested reliability for questionnaire after the implementation of Mac Address Filtering for better results as in the following table Reliability tests aim to determine the reliability of a series of statement items in their reliability measuring a variable. In this study the reliability test was conducted with Cronbach's Alpha test with the provision that if the alpha value > 0.60 then the questionnaire was declared consistent/ reliable. Based on the results of spss calculations obtained the following results  Based on table 3 of the results of the questionnaire disseminated with calculations using SPSS obtained by Cronbach's Alpha 0.656, it can be done that the questionnaire is declared reliable / consistent because the value is more than 0.6 and is not worth continuing to the normality test. Table 3 Reliability Test Table After Based on table 3 questionnaire results disseminated with calculations using SPSS obtained cronbach's Alpha 0.913, it can be done that the questionnaire is declared reliable / consistent because the value is more than 0.6 and worthy of continuing to the normality test.
The normality test is used to determine whether the data population is normal or abnormally distributed, by comparing sig values. The normality test uses the Shapiro-wilk method, because the amount of data in this study is 86 respondents, the method is acceptable in this study. Under the following conditions: if the sig value > 0.05 then the data is declared normal distributed. if the sig value < 0.05 then the data is declared normal distributed. The following are the results of the normality test using SPSS calculations: In table 4 it can be explained that the sig value in the shapiro-wilk column of the questionnaire before implementation with a value of 0.007 and the questionnaire after implementation with a value of 0.000. Based on the sig values of both questionnaires, it can be concluded that 0.007 < 0.05 and 0.000 < 0.05 which means that the data in this study can be said to be abnormally distributed, because the sig value is less than 0.05.
After the normality test, the data showed abnormal results therefore continued by doing the wilcoxcon test. The wilcoxcon test is part of the non-parametric statistical method. This wilcoxcon test is used to test data with abnormal distributions. Wilcoxcon is also used to find

Reliability Statistics
Cronbach's Alpha N of Items .913 20 In table 5 it can be explained that the value of Asymp.Sig. (2-tailed before and after implementation with a value of 0.000. Based on asymp.sig. (2-tailed) Of the two parameters, it can be concluded 0.000 < 0.05 and it can be concluded that Ha was received and Ho was rejected.
Based on the hypothesis test on the Evaluation of Network Access Restrictions using Mac Address Filtering on Microtics to Improve Network Security there is an increase. This result is known from the calculation of the hypothesis, namely the value of Asymp.Sig. (2-tailed) 0.000 < 0.05 thus Ha is accepted. Therefore, the evaluation of network access restrictions on microtics using Mac Address Filtering to improve network security has a positive impact with increased network security. Here are the average calculations using SPSS. Based on these calculations it can be known that the increase after the implementation of network access restrictions using Mac Address Filtering to increase network security increased by 8.71%.

CONCLUSION
Based on the writing of this thesis research, which has discussed evaluating network access restrictions using Mac Address Filtering on Mikrotik to improve network security, it can be concluded