ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG

Arif Hidayat

Abstract


Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.


Keywords


VPN, Teknologi VPN, Virtual Private Network

Full Text:

PDF

References


Luke, Jonathan. (2006). Computer Networking, Graha Ilmu, Jakarta.

Wahyudin, W. (2019). Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN). Jurnal Teknik Komputer, 5(1), 7-14.

Ruslianto, I. (2019). Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura. Computer Engineering, Science and System Journal, 4(1), 74-77.

Maryanto, M., Maisyaroh, M., & Santoso, B. (2018). Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data. PIKSEL (Penelitian Ilmu Komputer Sistem Embedded dan Logic), 6(2), 179-188. Zarkasyi, M. H., Permana, A. G., & Dillak, H. C. (2018).

Implementasi Virtual Private Network (vpn) Server Dengan Menggunakan Mikrotik Os Di Pt. charisma Persada Nusantara. eProceedings of Applied Science, 4(3).

Kustanto, 2008, Building an Internet Server with Mikrotik OS , Gava Media

Norton Peters. (1999). Complete Guide to Networking . Sams, India.

Hidayat, A. (2017). Configure Cloud Storage Server on LAN Network at LAB Diploma III of Information Management of UM Metro. MIKROTIK: Journal of Information Management , 7 (1).

Hidayat, Arif, Self-Service Learning Guide Server Network Administration Using Ubuntu Linux, CV. Laduni Alifatana, Metro Lampung (ISBN: 978-602-1397-56-5)

Hartono, Jorgiyanto , 1999, Introduction Computer, Andi Offset, Yogyakarta

Hidayat, A. (2016). Implementation of Control Panel Hosting with VestaCP on Intranet Server LAB Multimedia D-III Information Management UM Metro. MIKROTIK: Journal of Information Management , 6 (2).

Winarno and Smitdev, 2014, Creating Computer Networking in Windows and Linux, PT. Elex Media Komputindo, Jakarta .

Sinarmata , Janner, 2006, Computer Technology and Information, Andi Offset, Yogyakarta.

Hidayat, A. (2018). Comparative Analysis of Mikrotik Site Filter Using Address List Techniques, Layer7 Protocols, Web Proxy, Mangle and DNS Static. International Journal of Engineering & Technology, 7(3.4), 272-275.

Computers, Wahana, Network Administration with Ubuntu 9, Andi Offset, 2009.

Sutanta, Edy, Data Communications and Network , Graha Ilmu, 2005.

Hidayat, A. (2018). SISTEM PROTEKSI FAIL OVER DENGAN RSTP PADA SERVER ROUTER INTERNET FIKOM UM METRO BERBASIS MIKROTIK. SEMNASTEKNOMEDIA ONLINE, 6(1), 1-1.

Sugeng, Winarno, Computer Network with TCP / IP, Modula, 2015

Hidayat, A., & Saputra, I. P. (2018). ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA. NET, TANJUNG HARAPAN LAMPUNG TIMUR). Jurnal RESISTOR (Rekayasa Sistem Komputer), 1(2), 118-124.

Computers , Wahana, 2013, Safe & Healthy Internet, Andi Offset, Yogyakarta

Hidayat, A., & Saputra, I. P. (2018). ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA. NET, TANJUNG HARAPAN LAMPUNG TIMUR). Jurnal RESISTOR (Rekayasa Sistem Komputer), 1(2), 118-124.


Refbacks

  • There are currently no refbacks.


Flag Counter

web
statistics View My Stats

Creative Commons Licence
This work is licensed by STMIK Pringsewu under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.