Implementasi Sistem Monitoring Perangkat Rectifier dan AC Berbasis Jaringan VPN Menggunakan Mikrotik pada Ruang Server
DOI:
https://doi.org/10.29408/jit.v9i1.32536Keywords:
Rectifier, MikroTik, VPN, Network Topology, Air Conditioner, Monitoring, Network Security, Remote AccessAbstract
Server rooms in the telecommunications sector require a reliable monitoring system to maintain service continuity, especially for supporting devices such as rectifiers and air conditioners (AC) which play an important role in power and temperature stability. A problem that often occurs is the limitation of monitoring that has not been integrated and cannot be accessed safely remotely, so it has the potential to cause delays in interference detection. This study aims to implement a monitoring system for rectifier devices and air conditioners based on the Virtual Private Network (VPN) network using MikroTik in the server room. The research methodology includes the stages of problem identification, literature study, system needs analysis, network topology design, VPN implementation and monitoring system, as well as testing and evaluating network performance. The VPN is configured on the MikroTik router to provide a secure communication path between the server room and the network administrator. The test was carried out by comparing the network conditions before and after implementation using connectivity parameters and monitoring access stability. The results of the study show that the proposed monitoring system is able to provide real-time monitoring of the condition of rectifiers and air conditioners with a better level of safety. MikroTik-based VPN implementations are proven to support stable and secure connectivity, thus speeding up the early detection process of interference and improving the operational reliability of server space. This system is expected to be a practical solution in managing server space infrastructure in telecommunication environments.
References
[1] A. Lawrence and L. Simon, “Annual Outage Analysis 2023,” Uptime Institute. [Online]. Available: https://uptimeinstitute.com/resources/research-and-reports/annual-outage-analysis-2023
[2] A. Tanenbaum, N. Feamster, and D. Wetherall, Computer Networks, Global Edition, 6/E. 2021. L. Zhao, S. Qu, J. Zeng, and Q. Zhao, “Energy-saving and management of telecom operators’ remote computer rooms using IoT technology,” IEEE Access, vol. 8, pp. 166197–166211, 2020, doi: 10.1109/ACCESS.2020.3022641.
[4] W. Odom, CCNA 200-301 Official Cert Guide , Volume 1 , Second Edition. Hoboken, New Jersey: Cisco Press, 2024.
[5] T. Copyright and W. Stallings, “C Ryptography and N Etwork S Ecurity :,” 2013.
[6] Emils, “Virtual Private Networks,” Atlassian Confluence 9.2.11. [Online]. Available: https://help.mikrotik.com/docs/spaces/ROS/pages/119144597/Virtual+Private+Networks
[7] B. Pratama, Zulhendra, A. Hadi, and L. Mursyida, “Development of Network Infrastructure Monitoring System at Vocational High School Using MikroTik and Telegram Integration,” J. Hypermedia Technol. Learn., vol. 2, no. 2, pp. 194–208, 2024, doi: 10.58536/j-hytel.v2i3.133
[8] P. E and A. R. Adi, “Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo,” J-Intech, vol. 12, no. 02, pp. 340–352, 2024, doi: 10.32664/j-intech.v12i02.1468.
[9] N. P. Riyanto, F. A. Thariq, and M. Putra, “Perancangan Dan Implementasi Sistem Jaringan Server Dengan Vpn Berbasis Mikrotik Menggunakan Metode Network Development Life Cycle (NDLC),” vol. 32, no. 3, pp. 167–186, 2021, doi: https://doi.org/10.31539/intecoms.v8i1.13761.
[10] H. D. Nugroho and Y. Sutanto, “Implementasi Keamanan Data Pada Jaringan Router MikroTik Menggunakan VPN L2TP Dan IPSec,” J. Electr. Electron. …, vol. 4, no. 1, 2025, doi: https://doi.org/10.58991/at4tdq03.
[11] B. Purwanto and W. A. Dewa, “Sistem Monitoring Jaringan dengan Memanfaatkan Fitur The Dude Mikrotik Router Os,” J. Teknol. Informasi, Teor. Konsep dan Implentasi, vol. 11, no. 1, pp. 33–37, 2020, doi: 10.36382/jti-tki.v11i1.488.
[12] A. F. Fajri, N. Novinaldi, A. P. Nanda, I. Isnardi, and E. Iswandy, “Perancangan Remote Site Mikrotik dengan VPN (PPPoE) Menggunakan Rest Api di SMA Muhammadiyah 3 Padang,” J. Pustaka Robot Sister (Jurnal Pus. Akses Kaji. Robot. Sist. Tertanam, dan Sist. Terdistribusi), vol. 2, no. 1, pp. 5–11, 2024, doi: 10.55382/jurnalpustakarobotsister.v2i1.378.
[13] M. A. Amirulloh, Basuki, F. S. Hadi, and D. A. R. Wati, “Pengembangan Trainer Air Conditioner Split Daya 1 PK Berbasis Internet of Things (IoT),” J. Inform. Multimed. dan Tek., vol. 2, no. 1, pp. 1–6, 2025, doi: 10.71456/jimt.v2i1.1351.
[14] H. Pratama and N. F. Puspitasari, “Penerapan Protokol L2TP/IPSec dan Port Forwarding untuk Remote Mikrotik pada Jaringan Dynamic IP Implementation of L2TP / IPSec Protocol and Port Forwarding for Remote Mikrotik on Dynamic IP Networks,” Citec J., vol. 7, no. 1, pp. 51–62, 2020.
[15] H. A. Al-Atsari and I. Suharjo, “Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi,” vol. 4, no. 11, pp. 1977–1996, 2023, doi: https://doi.org/10.46799/jsa.v4i11.757.
[16] P. Wicaksana, F. Hadi, and A. F. Hadi, “Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan,” J. KomtekInfo, vol. 8, no. 3, pp. 169–175, 2021, doi: 10.35134/komtekinfo.v8i3.128.
[17] F. M. Arianto, D. D. Maulana, and A. H. Zulfahmi, “Optimasi Rectifier Untuk Meningkatkan Kinerja Server Pada Pt.Garuda Media Telematika,” Elconika J. Tek. Elektro, vol. 3, no. 1, pp. 15–21, 2024, doi: 10.33752/elconika.v3i1.8257.
[18] F. P. E. Putra, M. K. R.A, M. W. Ridho, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” vol. 8, no. 2, pp. 334–344, 2025, doi: https://dx.doi.org/10.29408/jit.v8i2.30230.
[19] S. C. Prasath, N. Darwin, R. S. Ramkumar, S. Nithishkumar, and P. L. Somasundharam, “IoT-Powered UPS Battery Monitoring: Ensuring High availability and reliability for Critical Systems,” E3S Web Conf., vol. 399, pp. 1–8, 2023, doi: 10.1051/e3sconf/202339904007.
[20] F. P. E. Putra, M. Khairi, M. I. Hidayatullah, and I. Maulana, “Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT),” vol. 8, no. 2, pp. 356–366, 2025, doi: https://dx.doi.org/10.29408/jit.v8i2.30257
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Infotek: Jurnal Informatika dan Teknologi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Semua tulisan pada jurnal ini menjadi tanggung jawab penuh penulis. Jurnal Infotek memberikan akses terbuka terhadap siapapun agar informasi dan temuan pada artikel tersebut bermanfaat bagi semua orang. Jurnal Infotek ini dapat diakses dan diunduh secara gratis, tanpa dipungut biaya sesuai dengan lisense creative commons yang digunakan.
Jurnal Infotek is licensed under a Creative Commons Attribution 4.0 International License.
Statistik Pengunjung


