IMPLEMENTASI VIRTUAL PRIVATE NETWOR MENGGUNAKAN POINT-TO-POINT TUNNELING PROTOCOL

Eka Satryawati, Dwi Agung Pangestu, Ade Surya Budiman

Abstract


Today's technological development is very rapid, especially in the field of network security. The field of network security is a matter that will be a very important part because the network security system is used to guarantee the confidentiality, theft, or burglary of data on a company. In its implementation, a VPN network (Virtual Private Network) uses a site-to-site Point to Point Tunel Protocol (PPTP) method to connect between two places that are located far apart. The main facility of using PPTP is being able to use a public-switched telephone network (PSTN) to build a VPN. At PT Indosis Integrasi Jakarta, the place where the author conducts research there are several problems that the author found, namely, when sending data between the head office and branch offices in Bandung, there is no security that ensures that the data is safe. With the current state of the network, uninterested parties will easily access or steal confidential company data.

Full Text:

PDF

References


Amillia, F., Marzuki, & Agustina. (2014). Analisis Perbandingan Kinerja Protokol Dynamic Source Routing (DSR) dan Geographic Routing Protocol (GRP) Pada Mobile Ad Hoc Network. Manet. 12(1), 9–15.

Khasanah, S. N., & Kuryanti, S. J. (2019). Rancangan Virtualisasi Server Menggunakan VMWare Vsphare. EVOLUSI - Jurnal Sains Dan Manajemen, 7(1), 42–46. https://doi.org/10.31294/evolusi.v7i1.5091

Mufida, E., Irawan, D., & Chrisnawati, G. (2017). Remote Site Mikrotik VPN dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus Pada Yayasan Teratai Global Jakarta.

Muftikhali, Q. E., Yansen, A., Danar, F., Kusumawati, A., & Hidayat, S. (2018). Optimasi Algoritma Genetika Dalam Menentukan Rute Optimal Topologi Cincin Pada Wide Area Network. 13(1), 1–6.

Oktivasari, P., & Utomo, A. B. (2016). Analisa Virtual Private Network Menggunakan Openvpn Dan Point To Point Tunneling Protocol Analysis of Virtual Private Network Using Openvpn and Point To. Jurnal Penelitian Komunikasi Dan Opini Publik, 20(2), 185–202.

Putra, J. L., Indriyani, L., & Angraini, Y. (2018). Penerapan Sistem Keamanan Jaringan Menggunakan VPN Dengan Metode PPTP Pada PT. Asri Pancawarna. 3(2), 260–267.

Rachmawan, A., & Prihanto, A. (2018). Jurnal Perbandingan Protokol L2TP dan PPTP Untuk Membangun Jaringan Intranet Di atas VPN. 53–57.

Triyono, J., Rachmawati, Y., & Irnawan, F. D. (2014). Analisa Perbandingan Kinerja Jaringan VPN Berbasis Mikrotik Menggunakan Protokol PPTP dan L2TP Sebagai Media Transfer Data. 1(2), 112–121.

Varianto, E., & Badrul, M. (2015). Implementasi Virtual Private Network dan Proxy Server Menggunakan Clear OS Pada PT. Valdo Internasional. 1(1), 54–65.

Yuniati, Y., Fitriawan, H., Fahdi, D., & Patih, J. (2014). Analisa Perancangan Server VOIP (Voice Internet Protocol) Dengan OpenSource Asteriks dan VPN (Virtual Private Network). 12(1), 112–121.




DOI: https://doi.org/10.56486/jeis.vol2no1.160

Article Metrics

Abstract view : 398 times
PDF - 391 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Eka Satryawati, Dwi Agung Pangestu, Ade Surya Budiman

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

TERINDEKS OLEH :