Analisa dan Perancangan Jaringan Berbasis VPN Pada PT. Finroll

Johan Muliadi Kerta, David Wennoris, Tonny Gunawan, Erny Erny

Abstract


Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future.

 


Keywords


public network, data security, VPN

Full Text:

PDF

References


Sukmawan, B. (2000). Metoda Enkripsi Blowfish. http://www.bimacipta.com/blowfish.htm

Davis, C. R. (2001). IPSec: Securing VPNS. USA: McGraw-Hill.

Downs, K., Spanier, S., Ford, M. Stevenson, T., Lew, H.K. (1998). Internetworking Technologies Handbook, 2nd edition. Indianapolis: Macmillan Technical Publishing..

Gupta, M.. (2003). Building a Virtual Private Network. USA: Premier Press.

Lammle, T. (2004). CCNATM Cisco Certified Network Associate STUDY GUIDE. Jakarta: PT. Elex Media Komputindo.

Lukas, J. (2006). Jaringan Komputer. Yogyakarta: Graha Ilmu.

Mikrotik Indonesia (2007), Mikrotik RouterOS V2.9 Reference Manual http://www.mikrotik.com/testdocs/ros/2.9/

Paessler Bandwidth Management Software (2007). Monitor and Manage bandwidth with PRTG. http://www.paessler.com/prtg

Perlmutter, B., & Zarkower, J. (1999). Virtual Private Networking: A View From The Trenches. New Jersey: Prentice Hall.

Stallings, W. (2003). Cryptography and Network Security: Principles and Practice, 3rd edition. New Jersey: Prentice Hall.




DOI: https://doi.org/10.21512/comtech.v1i2.2576

Refbacks

  • There are currently no refbacks.



Public Visitor Statistics:ComTech stats
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.