2021
DOI: 10.36448/expert.v11i2.1829
|View full text |Cite
|
Sign up to set email alerts
|

Implementasi Virtual Private Network Menggunakan L2TP/IPsec pada BBPK Jakarta

Abstract: Some companies already use computer networks as a tool to communicate, including companies that already have subsidiaries in various regions. This is inseparable from the use of an internet network that can be interconnected. In BBPK Jakarta network, data delivery and exchange conducted between Cilandak building employees and Hang Jebat building still use email and WhatsApp facilities. In addition to being less secure or having the possibility of being hacked by irresponsible parties, it is also constrained by… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 1 publication
0
3
0
1
Order By: Relevance
“…Pembuatan VPN merupakan salah satu cara untuk meningkatkan keamanan data pada jaringan komputer (Virtual Private Network) VPN dapat mengirimkan data pengguna melalui layanan jaringan publik yang murah, terutama melalui internet. Hal ini tidak terlepas dari penggunaan jaringan internet yang dapat saling terhubung satu sama lain [2]. VPN lebih terjangkau daripada jaringan pribadi yang tradisional, itulah sebabnya banyak bisnis dan penyedia telekomunikasi menggunakan VPN [3].…”
Section: Pendahuluanunclassified
“…Pembuatan VPN merupakan salah satu cara untuk meningkatkan keamanan data pada jaringan komputer (Virtual Private Network) VPN dapat mengirimkan data pengguna melalui layanan jaringan publik yang murah, terutama melalui internet. Hal ini tidak terlepas dari penggunaan jaringan internet yang dapat saling terhubung satu sama lain [2]. VPN lebih terjangkau daripada jaringan pribadi yang tradisional, itulah sebabnya banyak bisnis dan penyedia telekomunikasi menggunakan VPN [3].…”
Section: Pendahuluanunclassified
“…One thing that can be done is to simplify or make it easier for users to make network settings [17], or automate the network configuration backup system so that when the system turns off and starts up again there is no need to repeat the system configuration, but automatically uses the network configuration that was last used [18]. In addition, it is also necessary to first analyze the type of network that will be used, for example VPN or OpenVPN if you have started to focus on network security [19], considering that in several fields, VPN is proven to be implemented [20].…”
Section: Conclusion and Recommendationsmentioning
confidence: 99%
“…IPSec technology is a security protocol used to secure network connections between two points, while VPN technology allows users to access private networks through public internet connections [3]. However, despite the enhanced network security provided by these technologies, it is still necessary to conduct a security analysis on the network being used to determine the level of network security achieved [4]. Therefore, this journal aims to perform a network security analysis using IPSec and VPN technologies, conduct experiments on network configurations to establish connections between the server and client and determine the level of network security achieved.…”
Section: Introductionmentioning
confidence: 99%
“…However, the Internet also poses security risks due to its openness and accessibility to everyone, making it insecure for transmitting confidential information [2]. VPN data serves as a network security solution by creating a tunnel that allows a trusted network to connect with external networks over the Internet [4]. The use of L2TP (Layer 2 Tunneling Protocol) / IPSec (IP Security) protocol provides dual-layer protection for data transmission.…”
Section: Introductionmentioning
confidence: 99%