{"id":2493,"date":"2023-08-15T18:04:18","date_gmt":"2023-08-15T11:04:18","guid":{"rendered":"https:\/\/www.cloudaja.id\/artikel\/?p=2493"},"modified":"2023-08-18T22:37:39","modified_gmt":"2023-08-18T15:37:39","slug":"simulasi-ddos-mitigation-menggunakan-pnetlab","status":"publish","type":"post","link":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/","title":{"rendered":"Simulasi DDoS Mitigation menggunakan PNETLab"},"content":{"rendered":"<p>Kita tau bahwa perangkat jaringan memiliki harga yang relatif mahal, apalagi brand dan spesifikasi yang dimiliki produk tersebut sangat tinggi, alhasil harganya pun juga akan semakin mahal, naah <a href=\"https:\/\/pnetlab.com\/pages\/main\" target=\"_blank\" rel=\"noreferrer noopener\">PNETLab<\/a> hadir untuk memudahkan kita untuk belajar dan memahami perangkan jaringan tanpa membelinya, dengan cara mensimulasikan perangkat-perangkat jaringan tersebut. Artikel ini akan sedikit membahas tentang PNETLab itu sendiri seperti menambahkan perangkat, routing BGP dan OSPF, VLAN, Firewall, dan juga yang tidak kalah penting adalah mensimulasikan serangan DDoS Mitigation besera cara mencegahnya.<\/p>\n\n<p>PNETLab juga menyediakan link beserta file yang dapat kita download untuk melakukan simulasi. kamu bisa cek link ini ya -&gt; <a href=\"https:\/\/github.com\/ishare2-org\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/ishare2-org<\/a> dan <a href=\"https:\/\/labhub.eu.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/labhub.eu.org\/<\/a><\/p>\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar Isi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"><\/path><\/svg><\/span><\/span><\/span><\/a><\/span>\n<\/div>\n<nav><ul class=\"ez-toc-list ez-toc-list-level-1 \">\n<li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Instalasi\">Instalasi<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Desain_Topologi\">Desain Topologi<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Perangkat\">Perangkat<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-3\">\n<a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Konfigurasi\">Konfigurasi<\/a><ul class=\"ez-toc-list-level-4\">\n<li class=\"ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Routing_BGP\">Routing BGP<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Firewall\">Firewall<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Routing_OSPF\">Routing OSPF<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#VLAN\">VLAN<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-3\">\n<a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Simulasi_DDoS\">Simulasi DDoS<\/a><ul class=\"ez-toc-list-level-4\">\n<li class=\"ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Uji_Coba_Serangan\">Uji Coba&nbsp;Serangan<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#DDoS_Mitigation\">DDoS Mitigation<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Pengecekan\">Pengecekan<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#Kesimpulan\">Kesimpulan<\/a><\/li>\n<\/ul><\/nav>\n<\/div>\n<h3 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Instalasi\"><\/span>Instalasi<span class=\"ez-toc-section-end\"><\/span>\n<\/h3>\n\n<p>untuk tahap ini pastikan kalian mempunyai spesifikasi komputer atau laptop yang mumpuni, lebih-lebih kamu juga mempunyai bare metal server. setelah itu kamu bisa mengunjungi <a href=\"https:\/\/pnetlab.com\/pages\/documentation?slug=install-PNETlab\" rel=\"noreferrer noopener\" target=\"_blank\">https:\/\/pnetlab.com\/pages\/documentation?slug=install-PNETlab<\/a> untuk melihat detail instalasi jika kamu menggunakan VMware, jika kamu mempunyai bare metal server kamu bisa mengikuti <a href=\"https:\/\/pnetlab.com\/pages\/documentation?slug=install-bare-metal\" rel=\"noreferrer noopener\" target=\"_blank\">https:\/\/pnetlab.com\/pages\/documentation?slug=install-bare-metal<\/a><\/p>\n\n<h3 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Desain_Topologi\"><\/span>Desain Topologi<span class=\"ez-toc-section-end\"><\/span>\n<\/h3>\n<p>tahap ini kita akan melakukan desain jaringan sesuai dengan kebutuhan kita, kali ini aku akan sedikit memberikan gambaran kecil desain jaringan yang menggunakan teknologi Routing dan VLAN<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"670\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-21.png\" alt=\"\" class=\"wp-image-2514\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-21.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-21-300x168.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-21-1024x572.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-21-768x429.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><figcaption class=\"wp-element-caption\">Desain Jaringan menggunakan PNETLab<\/figcaption><\/figure><\/div>\n<p>nah jaringan diatas terdiri dari Router, Firewall, Switch Layer 2, Switch Layer 3 dan client berupa OS Linux (Server)<\/p>\n<h3 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Perangkat\"><\/span>Perangkat<span class=\"ez-toc-section-end\"><\/span>\n<\/h3>\n\n<p>untuk menambahkan perangkat atau Device kamu cukup <strong>klik Kanan<\/strong> kemudian pilih <strong>Node <\/strong>lalu pilih perangkat atau device yang kamu inginkan<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"670\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-20.png\" alt=\"\" class=\"wp-image-2513\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-20.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-20-300x168.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-20-1024x572.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-20-768x429.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><figcaption class=\"wp-element-caption\">Menambahkan Perangkat atau Device&nbsp;(NODE)<\/figcaption><\/figure><\/div>\n<p>nah untuk perangkat-perangkat tersebut bisa ditambahkan menggunakan FTP seperti FileZilla, untuk tutorial nya menyusul yaa&nbsp;\ud83d\ude42<\/p>\n<h3 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Konfigurasi\"><\/span>Konfigurasi<span class=\"ez-toc-section-end\"><\/span>\n<\/h3>\n<p>nah pada tahap konfigurasi, ini aku akan jelaskan secara singkat saja mengingat pembahasan yang dibahas pada artikel ini hanya secara umum saja, untuk secara detail akan aku bahas di artikel selanjutnya<\/p>\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Routing_BGP\"><\/span>Routing BGP<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n<p>kenapa routing BGP&nbsp;? karena kita akan mensimulasikan selayaknya kita memiliki sebuah provider, nah jika kita ingin terhubung ke internet dan perangkat kita bisa diakses oleh umum, maka kita perlu Routing BGP.<\/p>\n<p>untuk konfigurasi BGP pada desain ini, kita akan menggunakan VLAN sebagai pengubung secara langsung antar router atau Peer-To-Peer dengan dilewatkan Firewall,<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"583\" height=\"423\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-8.png\" alt=\"\" class=\"wp-image-2501\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-8.png 583w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-8-300x218.png 300w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\"><figcaption class=\"wp-element-caption\">Routing BGP<\/figcaption><\/figure><\/div>\n<p>nah pada gambar diatas terlihat 2 Router yang terhubung namun ditengahnya terdapat firewall, untuk apa&nbsp;? <strong>sebagai pelindung pertama atau layer pertama yang akan melakukan filtering jika terjadi sebuah serangan<\/strong> lalu AS yang kita pakai kali ini random saja, kita pakai <strong>AS 14045<\/strong> sebagai <strong>AS Internal <\/strong>kita, sedangkan untuk router atasnya (upstream) kita berikan <strong>AS 14014<\/strong>untuk router yang kita pakai adalah Router Mikrotik v6 versi <a href=\"https:\/\/www.natanetwork.com\/vps-mikrotik\/\">CHR<\/a><\/p>\n\n<p>untuk konfigurasi <strong>router-edge <\/strong>seperti dibawah ini&nbsp;:<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-13.png\" alt=\"\" class=\"wp-image-2506\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-13.png 800w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-13-300x194.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-13-768x496.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption class=\"wp-element-caption\">Konfigurasi Router Edge (Router Internal)<\/figcaption><\/figure><\/div>\n<p>sedangkan <strong>router-upstream<\/strong> seperti dibawah ini&nbsp;:<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"473\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-9.png\" alt=\"\" class=\"wp-image-2502\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-9.png 800w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-9-300x177.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-9-768x454.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption class=\"wp-element-caption\">Konfigursai Router&nbsp;Upstream<\/figcaption><\/figure><\/div>\n<p>singkatnya konfigurasi diatas menggunakan Interface VLAN123 yang kemudian Routing BGP dengan AS yang disebutkan serta saling terkoneksi melalui port yang ditentukan<\/p>\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Firewall\"><\/span>Firewall<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n\n<p>karena terdapat perangkat firewall yang berada di antara 2 router, maka kita perlu melakukan konfigurasi tambahan, dengan merubah konfigurasi default dari firewall yaitu <strong>mode NAT<\/strong> menjadi <strong>mode Transparent (switch atau Layer 2)<\/strong><\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"367\" height=\"298\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-2.png\" alt=\"\" class=\"wp-image-2495\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-2.png 367w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-2-300x244.png 300w\" sizes=\"auto, (max-width: 367px) 100vw, 367px\"><figcaption class=\"wp-element-caption\">Mode Transparent Firewall<\/figcaption><\/figure><\/div>\n<p>konfigurasi selanjutnya adalah menambahkan interface VLAN dan menambahkan <strong>Policy<\/strong><\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"653\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-12.png\" alt=\"\" class=\"wp-image-2505\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-12.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-12-300x163.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-12-1024x557.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-12-768x418.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><figcaption class=\"wp-element-caption\">Halaman Interface<\/figcaption><\/figure><\/div>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"653\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-18.png\" alt=\"\" class=\"wp-image-2511\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-18.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-18-300x163.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-18-1024x557.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-18-768x418.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><figcaption class=\"wp-element-caption\">Halaman untuk&nbsp;Policy<\/figcaption><\/figure><\/div>\n<p>pada menu <strong>Policy <\/strong>kita menambahkan filter untuk VLAN123 yang digunakan untuk proses peering antar 2 router agar kedua router bisa saling terhubung, pastikan untuk VLAN123 action berisi <strong>Accept <\/strong>karena jika <strong>DENY <\/strong>maka Routing BGP tidak akan berjalan karena terblokir oleh firewall<\/p>\n\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Routing_OSPF\"><\/span>Routing OSPF<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n<p>untuk kebutuhan routing jaringan internal, kita cukup menggunakan routing OSPF<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"385\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-7.png\" alt=\"\" class=\"wp-image-2500\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-7.png 682w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-7-300x169.png 300w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\"><figcaption class=\"wp-element-caption\">Topologi Routing Internal<\/figcaption><\/figure><\/div>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-11.png\" alt=\"\" class=\"wp-image-2504\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-11.png 800w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-11-300x194.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-11-768x496.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption class=\"wp-element-caption\">Routing OSPF Router&nbsp;Edge<\/figcaption><\/figure><\/div>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"186\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-3.png\" alt=\"\" class=\"wp-image-2496\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-3.png 679w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-3-300x82.png 300w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\"><figcaption class=\"wp-element-caption\">Routing OSPF Switch Cisco Layer&nbsp;3<\/figcaption><\/figure><\/div>\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"VLAN\"><\/span>VLAN<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n<p>dan untuk konfigurasi VLAN, kita lakukan di Switch Layer 3 sebagai Interface dan di Switch Layer 2 hanya sebagai Trunk dan Access saja<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"159\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-5.png\" alt=\"\" class=\"wp-image-2498\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-5.png 679w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-5-300x70.png 300w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\"><figcaption class=\"wp-element-caption\">Interface VLAN di Switch Layer&nbsp;3<\/figcaption><\/figure><\/div>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"234\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-4.png\" alt=\"\" class=\"wp-image-2497\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-4.png 683w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-4-300x103.png 300w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\"><figcaption class=\"wp-element-caption\">Interface VLAN Access dan Trunk di Switch Layer&nbsp;2<\/figcaption><\/figure><\/div>\n<h3 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Simulasi_DDoS\"><\/span>Simulasi DDoS<span class=\"ez-toc-section-end\"><\/span>\n<\/h3>\n<p>simulasi yang kita lakukan adalah melakukan DDoS berupa TCP SYN Flood DoS Attack sekaligus cara mencegahnya menggunakan firewall.<\/p>\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Uji_Coba_Serangan\"><\/span>Uji Coba&nbsp;Serangan<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n\n<p>kita akan melakukan uji coba serangan ke Server17 dengan IP 142.168.1.106 kemudian kita lakukan pemantauan di <strong>router-edge <\/strong>apakah kita dapat melihat serangan yang terjadi<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"655\" height=\"46\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-6.png\" alt=\"\" class=\"wp-image-2499\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-6.png 655w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-6-300x21.png 300w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\"><figcaption class=\"wp-element-caption\">Uji Coba serangan ke target&nbsp;IP<\/figcaption><\/figure><\/div>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-19.png\" alt=\"\" class=\"wp-image-2512\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-19.png 800w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-19-300x194.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-19-768x496.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption class=\"wp-element-caption\">Monitoring serangan menggunakan Torch<\/figcaption><\/figure><\/div>\n<p>kita dapat melihat bahwa terdapat traffic sebanyak kurang lebih 12000 dalam beberapa detik saja serta speed nya sampai dengan 42Mb, nah dapat kita pastikan bahwa serangan berhasil masuk ke server17<\/p>\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"DDoS_Mitigation\"><\/span>DDoS Mitigation<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n<p>nah untuk melakukan DDoS Mitigation, kita akan melakukan konfigurasi pada firewall, firewall yang kita gunakan adalah Fortigate.<\/p>\n<p>Masuk ke halaman interface Fortigate, kemudian cari menu <strong>Policy &amp; Object -&gt; Firewall Policy <\/strong>kemudian <strong>Create New<\/strong><\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"653\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-10.png\" alt=\"\" class=\"wp-image-2503\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-10.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-10-300x163.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-10-1024x557.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-10-768x418.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><figcaption class=\"wp-element-caption\">Halaman Firewall&nbsp;Policy<\/figcaption><\/figure><\/div>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"653\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-17.png\" alt=\"\" class=\"wp-image-2510\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-17.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-17-300x163.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-17-1024x557.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-17-768x418.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><\/figure><\/div>\n<p>isikan sesuai dengan desain diatas, kemudian jangan lupa untuk destination kita harus menambahkan manual pada menu <strong>Select Entries <\/strong>kemudian <strong>Create <\/strong>dan masukkan IP dari <strong>Server17 <\/strong>kemudian <strong>Apply<\/strong><\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Notes&nbsp;: nah kenapa IP dari Server17&nbsp;? cara ini kita gunakan untuk melakukan proses <strong>Blackhole<\/strong> terhadap IP Server17 yang efeknya adalah Server17 tidak akan bisa mengakses internet dan DDoS akan terhenti di firewall.<\/p>\n<\/blockquote>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"653\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-16.png\" alt=\"\" class=\"wp-image-2509\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-16.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-16-300x163.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-16-1024x557.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-16-768x418.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><\/figure><\/div>\n<p>jangan lupa posisi Policy yang kita tambahkan barusan dipindah kan ke atas sendiri dengan cara drag n drop saja.<\/p>\n<h4 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Pengecekan\"><\/span>Pengecekan<span class=\"ez-toc-section-end\"><\/span>\n<\/h4>\n\n<p>Setelah dilakukan penambahan policy kita cek apakah serangan sudah terblokir atau belum menggunakan fitur interface pada <strong>router-edge<\/strong><\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-14.png\" alt=\"\" class=\"wp-image-2507\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-14.png 800w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-14-300x194.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-14-768x496.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption class=\"wp-element-caption\">Halaman Interface<\/figcaption><\/figure><\/div>\n<p>nah bisa kita lihat sekarang serangan sudah terhenti dan tidak ada serangan yang masuk ke Server17.<\/p>\n<p>jika kita perhatikan di halaman firewall policy pada bagian kanan policy yang kita tambahkan akan muncul berapa paket yang telah diblokir oleh firewall<\/p>\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"653\" src=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-15.png\" alt=\"\" class=\"wp-image-2508\" srcset=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-15.png 1200w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-15-300x163.png 300w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-15-1024x557.png 1024w, https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/image-15-768x418.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><figcaption class=\"wp-element-caption\">Paket yang terblokir oleh&nbsp;Firewall<\/figcaption><\/figure><\/div>\n<p>seperti yang terlihat di gambar diatas, serangan sebanyak 1,4 Juta paket sebesar 1,7G telah berhasil terblock oleh firewall.<\/p>\n<h3 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Kesimpulan\"><\/span>Kesimpulan<span class=\"ez-toc-section-end\"><\/span>\n<\/h3>\n<p>nah untuk kesimpulan nya adalah, serangan yang mengancam terhadap server kita akan sangat berbahaya jika tidak kita lakukan DDoS Mitigation, terlebih akan merusak traffic bahkan merusak perangkat keras kita. oleh karena itu firewall sangat penting untuk berada didalam desain jaringan kita!<\/p>\n<p>feel free komen jika ada salah kata, penjelasan dan lainnya yaa&nbsp;! selamat membacaa Terimakasih&nbsp;\ud83d\ude42<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Kita tau bahwa perangkat jaringan memiliki harga yang relatif mahal, apalagi brand dan spesifikasi yang dimiliki produk tersebut sangat tinggi, alhasil harganya pun juga akan semakin mahal, naah PNETLab hadir untuk memudahkan kita untuk belajar dan memahami perangkan jaringan tanpa membelinya, dengan cara mensimulasikan perangkat-perangkat jaringan tersebut. Artikel ini akan sedikit membahas tentang PNETLab itu [&hellip;]<\/p>","protected":false},"author":3,"featured_media":2516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"seo_booster_metabox":"","footnotes":""},"categories":[1,3],"tags":[165,163,130,166,103,167,164],"class_list":["post-2493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking","category-others","tag-ddos","tag-ddos-mitigation","tag-mikrotik","tag-pnetlab","tag-routing","tag-simulation","tag-switching"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Simulasi DDoS Mitigation menggunakan PNETLab - CloudAja Artikel<\/title>\n<meta name=\"description\" content=\"DDoS Mitigation sangat diperlukan pada topologi jaringan kita, selain melindungi dari serangan juga melindungi dari virus\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simulasi DDoS Mitigation menggunakan PNETLab - CloudAja Artikel\" \/>\n<meta property=\"og:description\" content=\"DDoS Mitigation sangat diperlukan pada topologi jaringan kita, selain melindungi dari serangan juga melindungi dari virus\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudAja Artikel | Cloud Hosting Indonesia\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-15T11:04:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-18T15:37:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/ArtikelCloudAja-DDoSMitigation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1921\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"A. Yahya Hudan Permana\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yahya Hudan Permana\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/\"},\"author\":{\"name\":\"A. Yahya Hudan Permana\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/person\\\/1d52c35e58d5a33373e0b6e77dee379b\"},\"headline\":\"Simulasi DDoS Mitigation menggunakan PNETLab\",\"datePublished\":\"2023-08-15T11:04:18+00:00\",\"dateModified\":\"2023-08-18T15:37:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/\"},\"wordCount\":960,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/ArtikelCloudAja-DDoSMitigation.png\",\"keywords\":[\"ddos\",\"ddos mitigation\",\"mikrotik\",\"pnetlab\",\"routing\",\"simulation\",\"switching\"],\"articleSection\":[\"Networking\",\"Others\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/\",\"name\":\"Simulasi DDoS Mitigation menggunakan PNETLab - CloudAja Artikel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/ArtikelCloudAja-DDoSMitigation.png\",\"datePublished\":\"2023-08-15T11:04:18+00:00\",\"dateModified\":\"2023-08-18T15:37:39+00:00\",\"description\":\"DDoS Mitigation sangat diperlukan pada topologi jaringan kita, selain melindungi dari serangan juga melindungi dari virus\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/ArtikelCloudAja-DDoSMitigation.png\",\"contentUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/ArtikelCloudAja-DDoSMitigation.png\",\"width\":1921,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/simulasi-ddos-mitigation-menggunakan-pnetlab\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Simulasi DDoS Mitigation menggunakan PNETLab\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/\",\"name\":\"CloudAja Artikel | Cloud Hosting Indonesia\",\"description\":\"tips dan trik seputar Cloud Hosting Indonesia\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#organization\",\"name\":\"CloudAja Artikel | Cloud Hosting Indonesia\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/logo-cloudaja.resized.png\",\"contentUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/logo-cloudaja.resized.png\",\"width\":120,\"height\":81,\"caption\":\"CloudAja Artikel | Cloud Hosting Indonesia\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/person\\\/1d52c35e58d5a33373e0b6e77dee379b\",\"name\":\"A. Yahya Hudan Permana\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/MG_9183-96x96.jpg\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/MG_9183-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/MG_9183-96x96.jpg\",\"caption\":\"A. Yahya Hudan Permana\"},\"description\":\"Selamat Membaca ! Semoga bermanfaat Artikel yang kami buat ya !\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/author\\\/yahya\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Simulasi DDoS Mitigation menggunakan PNETLab - CloudAja Artikel","description":"DDoS Mitigation sangat diperlukan pada topologi jaringan kita, selain melindungi dari serangan juga melindungi dari virus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/","og_locale":"en_US","og_type":"article","og_title":"Simulasi DDoS Mitigation menggunakan PNETLab - CloudAja Artikel","og_description":"DDoS Mitigation sangat diperlukan pada topologi jaringan kita, selain melindungi dari serangan juga melindungi dari virus","og_url":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/","og_site_name":"CloudAja Artikel | Cloud Hosting Indonesia","article_published_time":"2023-08-15T11:04:18+00:00","article_modified_time":"2023-08-18T15:37:39+00:00","og_image":[{"width":1921,"height":1080,"url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/ArtikelCloudAja-DDoSMitigation.png","type":"image\/png"}],"author":"A. Yahya Hudan Permana","twitter_card":"summary_large_image","twitter_misc":{"Written by":"A. Yahya Hudan Permana","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#article","isPartOf":{"@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/"},"author":{"name":"A. Yahya Hudan Permana","@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/person\/1d52c35e58d5a33373e0b6e77dee379b"},"headline":"Simulasi DDoS Mitigation menggunakan PNETLab","datePublished":"2023-08-15T11:04:18+00:00","dateModified":"2023-08-18T15:37:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/"},"wordCount":960,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#organization"},"image":{"@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/ArtikelCloudAja-DDoSMitigation.png","keywords":["ddos","ddos mitigation","mikrotik","pnetlab","routing","simulation","switching"],"articleSection":["Networking","Others"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/","url":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/","name":"Simulasi DDoS Mitigation menggunakan PNETLab - CloudAja Artikel","isPartOf":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/ArtikelCloudAja-DDoSMitigation.png","datePublished":"2023-08-15T11:04:18+00:00","dateModified":"2023-08-18T15:37:39+00:00","description":"DDoS Mitigation sangat diperlukan pada topologi jaringan kita, selain melindungi dari serangan juga melindungi dari virus","breadcrumb":{"@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#primaryimage","url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/ArtikelCloudAja-DDoSMitigation.png","contentUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2023\/08\/ArtikelCloudAja-DDoSMitigation.png","width":1921,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudaja.id\/artikel\/simulasi-ddos-mitigation-menggunakan-pnetlab\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudaja.id\/artikel\/"},{"@type":"ListItem","position":2,"name":"Simulasi DDoS Mitigation menggunakan PNETLab"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudaja.id\/artikel\/#website","url":"https:\/\/www.cloudaja.id\/artikel\/","name":"CloudAja Artikel | Cloud Hosting Indonesia","description":"tips dan trik seputar Cloud Hosting Indonesia","publisher":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudaja.id\/artikel\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cloudaja.id\/artikel\/#organization","name":"CloudAja Artikel | Cloud Hosting Indonesia","url":"https:\/\/www.cloudaja.id\/artikel\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/09\/logo-cloudaja.resized.png","contentUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/09\/logo-cloudaja.resized.png","width":120,"height":81,"caption":"CloudAja Artikel | Cloud Hosting Indonesia"},"image":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/person\/1d52c35e58d5a33373e0b6e77dee379b","name":"A. Yahya Hudan Permana","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/12\/MG_9183-96x96.jpg","url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/12\/MG_9183-96x96.jpg","contentUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/12\/MG_9183-96x96.jpg","caption":"A. Yahya Hudan Permana"},"description":"Selamat Membaca ! Semoga bermanfaat Artikel yang kami buat ya !","url":"https:\/\/www.cloudaja.id\/artikel\/author\/yahya\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts\/2493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/comments?post=2493"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts\/2493\/revisions"}],"predecessor-version":[{"id":2517,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts\/2493\/revisions\/2517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/media\/2516"}],"wp:attachment":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/media?parent=2493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/categories?post=2493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/tags?post=2493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}