Penerapan Syslog Monitoring Jaringan Menggunakan The Dude dan EoIP Tunnel

Taufik Rahman, Herman Kuswanto


In the era of technology 4.0, the use of the internet is very quickly followed by the development of increasingly complex supporting devices, each activity of devices that are connected or disconnected in the network will send or issue messages that will affect the devices around them because each device has a different role on the network . Messages issued by the device must be considered, especially by network administrators. In general, the message is stored locally in the memory or drive of the device, it will be very dangerous if the device is turned off so the message is lost. or messages sent over the network to a centralized server. One technology that can be used to collect messages is the Dude application through a virtual private network, EoIP Tunnel. From the results of research that has been done, it can be said that system messages (syslog) from computer network devices both internet or intranet using the dude server can be implemented and are very safe because all activities that occur on switches are manageable, access points and routers on campus will be stored. When problems occur regarding network connections, syslog on the dude server can be opened using wordpad or similar applications. Virtual tunnel network, EoIP Tunnel can be configured on MikroTik routers by network administrators, so that syslog can be sent and entered into the dude server. EoIP tunnel development can be used or running simultaneously with OSPF routing.


SYSLOG; The Dude; EoIP; Tunnel; MikroTik


G. Slomovitz, “Latent semantic analysis (LSA) for syslog correlation,” 2017 Int. Conf. Electron. Commun. Comput. CONIELECOMP 2017, 2017.

W. MikroTik, “Manual:Interface/EoIP - MikroTik Wiki,” 2018. [Online]. Available: [Accessed: 10-Nov-2018].

C. M. Kozierok, The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. 2005.

A. Kaushik, “Use of Open Source Technologies for Enterprise Server Monitoring Using Snmp,” Technology, vol. 02, no. 07, pp. 2246–2252, 2010.

R. Vaarandi, B. Blumbergs, M. Kont, R. Vaarandi, B. Blumbergs, and M. Kont, “An Unsupervised Framework for Detecting Anomalous Messages from Syslog Log Files An Unsupervised Framework for Detecting Anomalous Messages from Syslog Log Files,” NOMS 2018 - 2018 IEEE/IFIP Netw. Oper. Manag. Symp., pp. 1–6, 2018.

M. Ljubojevic, A. Bajic, and D. Mijic, “Centralized monitoring of computer networks using Zenoss open source platform,” 2018 17th Int. Symp. INFOTEH-JAHORINA, INFOTEH 2018 - Proc., vol. 2018–Janua, no. March, pp. 1–5, 2018.

S. Kobayashi, K. Otomo, K. Fukuda, and H. Esaki, “Mining Causality of Network Events in Log Data,” IEEE Trans. Netw. Serv. Manag., vol. 15, no. 1, pp. 53–67, 2018.

S. Zhang et al., “Syslog processing for switch failure diagnosis and prediction in datacenter networks,” 2017 IEEE/ACM 25th Int. Symp. Qual. Serv. IWQoS 2017, pp. 1–10, 2017.

E. Baseman, S. Blanchard, Z. Li, and S. Fu, “Relational synthesis of text and numeric data for anomaly detection on computing system logs,” Proc. - 2016 15th IEEE Int. Conf. Mach. Learn. Appl. ICMLA 2016, vol. 1, pp. 882–885, 2017.

T. Tan, S. Gao, W. Yang, Y. Song, and C. Lin, “Two new term weighting methods for router syslogs anomaly detection,” Proc. - 18th IEEE Int. Conf. High Perform. Comput. Commun. 14th IEEE Int. Conf. Smart City 2nd IEEE Int. Conf. Data Sci. Syst. HPCC/SmartCity/DSS 2016, pp. 1454–1460, 2017.

Q. Vuong, H. M. Tran, and S. T. Le, “Distributed Event Monitoring for Software Defined Networks,” 2015 Int. Conf. Adv. Comput. Appl., pp. 90–97, 2015.

T. Kimura, A. Watanabe, T. Toyono, and K. Ishibashi, “Proactive failure detection learning generation patterns of large-scale network logs,” Proc. 11th Int. Conf. Netw. Serv. Manag. CNSM 2015, pp. 8–14, 2015.

A. Aeri and S. Tukadiya, “A comparative study of network based system log Management tools,” 2015 Int. Conf. Comput. Commun. Informatics, pp. 1–6, 2015.

K. Rianafirin and M. T. Kurniawan, “Design Network Security Infrastructure Cabling Using Network Development Life Cycle Methodology and ISO/IEC 27000 Series in Yayasan Kesehatan (Yakes) Telkom Bandung,” in 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), 2017, pp. 1–6.

T. Rahman, “Jaringan Hotspot Menggunakan Dua Radius MikroTik dan Ethernet Over Internet Protocol Tunnel,” vol. 2, no. 2, pp. 135–148, 2018.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Terindeks oleh :










Program Studi D4 Teknik Informatika
Politeknik Harapan Bersama Tegal
Jl. Mataram No.09 Pesurungan Lor Kota Tegal

Telp. +62283 - 352000

Email :


Copyright: JPIT (Jurnal Informatika: Jurnal Pengembangan IT) p-ISSN: 2477-5126 (print), e-ISSN 2548-9356 (online) 

Flag Counter
View Visitor Statistic


Creative Commons License
JPIT (Jurnal Informatika: Jurnal Pengembangan IT) is licensed under a Creative Commons Attribution 4.0 International License.