Implementasi Sistem Monitoring Perangkat Rectifier dan AC Berbasis Jaringan VPN Menggunakan Mikrotik pada Ruang Server

Authors

  • Taufik Rahman Universitas Bina Sarana Informatika
  • Muhammad Farid Anfasa Universitas Bina Sarana Informatika

DOI:

https://doi.org/10.29408/jit.v9i1.32536

Keywords:

Rectifier, MikroTik, VPN, Network Topology, Air Conditioner, Monitoring, Network Security, Remote Access

Abstract

Server rooms in the telecommunications sector require a reliable monitoring system to maintain service continuity, especially for supporting devices such as rectifiers and air conditioners (AC) which play an important role in power and temperature stability. A problem that often occurs is the limitation of monitoring that has not been integrated and cannot be accessed safely remotely, so it has the potential to cause delays in interference detection. This study aims to implement a monitoring system for rectifier devices and air conditioners based on the Virtual Private Network (VPN) network using MikroTik in the server room. The research methodology includes the stages of problem identification, literature study, system needs analysis, network topology design, VPN implementation and monitoring system, as well as testing and evaluating network performance. The VPN is configured on the MikroTik router to provide a secure communication path between the server room and the network administrator. The test was carried out by comparing the network conditions before and after implementation using connectivity parameters and monitoring access stability. The results of the study show that the proposed monitoring system is able to provide real-time monitoring of the condition of rectifiers and air conditioners with a better level of safety. MikroTik-based VPN implementations are proven to support stable and secure connectivity, thus speeding up the early detection process of interference and improving the operational reliability of server space. This system is expected to be a practical solution in managing server space infrastructure in telecommunication environments.

References

[1] A. Lawrence and L. Simon, “Annual Outage Analysis 2023,” Uptime Institute. [Online]. Available: https://uptimeinstitute.com/resources/research-and-reports/annual-outage-analysis-2023

[2] A. Tanenbaum, N. Feamster, and D. Wetherall, Computer Networks, Global Edition, 6/E. 2021. L. Zhao, S. Qu, J. Zeng, and Q. Zhao, “Energy-saving and management of telecom operators’ remote computer rooms using IoT technology,” IEEE Access, vol. 8, pp. 166197–166211, 2020, doi: 10.1109/ACCESS.2020.3022641.

[4] W. Odom, CCNA 200-301 Official Cert Guide , Volume 1 , Second Edition. Hoboken, New Jersey: Cisco Press, 2024.

[5] T. Copyright and W. Stallings, “C Ryptography and N Etwork S Ecurity :,” 2013.

[6] Emils, “Virtual Private Networks,” Atlassian Confluence 9.2.11. [Online]. Available: https://help.mikrotik.com/docs/spaces/ROS/pages/119144597/Virtual+Private+Networks

[7] B. Pratama, Zulhendra, A. Hadi, and L. Mursyida, “Development of Network Infrastructure Monitoring System at Vocational High School Using MikroTik and Telegram Integration,” J. Hypermedia Technol. Learn., vol. 2, no. 2, pp. 194–208, 2024, doi: 10.58536/j-hytel.v2i3.133

[8] P. E and A. R. Adi, “Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo,” J-Intech, vol. 12, no. 02, pp. 340–352, 2024, doi: 10.32664/j-intech.v12i02.1468.

[9] N. P. Riyanto, F. A. Thariq, and M. Putra, “Perancangan Dan Implementasi Sistem Jaringan Server Dengan Vpn Berbasis Mikrotik Menggunakan Metode Network Development Life Cycle (NDLC),” vol. 32, no. 3, pp. 167–186, 2021, doi: https://doi.org/10.31539/intecoms.v8i1.13761.

[10] H. D. Nugroho and Y. Sutanto, “Implementasi Keamanan Data Pada Jaringan Router MikroTik Menggunakan VPN L2TP Dan IPSec,” J. Electr. Electron. …, vol. 4, no. 1, 2025, doi: https://doi.org/10.58991/at4tdq03.

[11] B. Purwanto and W. A. Dewa, “Sistem Monitoring Jaringan dengan Memanfaatkan Fitur The Dude Mikrotik Router Os,” J. Teknol. Informasi, Teor. Konsep dan Implentasi, vol. 11, no. 1, pp. 33–37, 2020, doi: 10.36382/jti-tki.v11i1.488.

[12] A. F. Fajri, N. Novinaldi, A. P. Nanda, I. Isnardi, and E. Iswandy, “Perancangan Remote Site Mikrotik dengan VPN (PPPoE) Menggunakan Rest Api di SMA Muhammadiyah 3 Padang,” J. Pustaka Robot Sister (Jurnal Pus. Akses Kaji. Robot. Sist. Tertanam, dan Sist. Terdistribusi), vol. 2, no. 1, pp. 5–11, 2024, doi: 10.55382/jurnalpustakarobotsister.v2i1.378.

[13] M. A. Amirulloh, Basuki, F. S. Hadi, and D. A. R. Wati, “Pengembangan Trainer Air Conditioner Split Daya 1 PK Berbasis Internet of Things (IoT),” J. Inform. Multimed. dan Tek., vol. 2, no. 1, pp. 1–6, 2025, doi: 10.71456/jimt.v2i1.1351.

[14] H. Pratama and N. F. Puspitasari, “Penerapan Protokol L2TP/IPSec dan Port Forwarding untuk Remote Mikrotik pada Jaringan Dynamic IP Implementation of L2TP / IPSec Protocol and Port Forwarding for Remote Mikrotik on Dynamic IP Networks,” Citec J., vol. 7, no. 1, pp. 51–62, 2020.

[15] H. A. Al-Atsari and I. Suharjo, “Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi,” vol. 4, no. 11, pp. 1977–1996, 2023, doi: https://doi.org/10.46799/jsa.v4i11.757.

[16] P. Wicaksana, F. Hadi, and A. F. Hadi, “Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan,” J. KomtekInfo, vol. 8, no. 3, pp. 169–175, 2021, doi: 10.35134/komtekinfo.v8i3.128.

[17] F. M. Arianto, D. D. Maulana, and A. H. Zulfahmi, “Optimasi Rectifier Untuk Meningkatkan Kinerja Server Pada Pt.Garuda Media Telematika,” Elconika J. Tek. Elektro, vol. 3, no. 1, pp. 15–21, 2024, doi: 10.33752/elconika.v3i1.8257.

[18] F. P. E. Putra, M. K. R.A, M. W. Ridho, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” vol. 8, no. 2, pp. 334–344, 2025, doi: https://dx.doi.org/10.29408/jit.v8i2.30230.

[19] S. C. Prasath, N. Darwin, R. S. Ramkumar, S. Nithishkumar, and P. L. Somasundharam, “IoT-Powered UPS Battery Monitoring: Ensuring High availability and reliability for Critical Systems,” E3S Web Conf., vol. 399, pp. 1–8, 2023, doi: 10.1051/e3sconf/202339904007.

[20] F. P. E. Putra, M. Khairi, M. I. Hidayatullah, and I. Maulana, “Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT),” vol. 8, no. 2, pp. 356–366, 2025, doi: https://dx.doi.org/10.29408/jit.v8i2.30257

Downloads

Published

20-01-2026

How to Cite

Rahman, T., & Farid Anfasa, M. F. A. (2026). Implementasi Sistem Monitoring Perangkat Rectifier dan AC Berbasis Jaringan VPN Menggunakan Mikrotik pada Ruang Server. Infotek: Jurnal Informatika Dan Teknologi, 9(1), 219–230. https://doi.org/10.29408/jit.v9i1.32536

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.