Claim Missing Document
Check
Articles

Found 2 Documents
Search

Peningkatan Keamanan Jaringan Virtual Private Network Menggunakan Protokol IKE/IPSEC Berbasis Mikrotik Prameswari, Annisa Dwi; Marcus, Ronald David
J-INTECH (Journal of Information and Technology) Vol 12 No 02 (2024): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v12i02.1493

Abstract

This research discusses protocols VPN (Virtual Private Network), namely PPTP, SSTP, L2TP, and IPsec, analyzes the authentication methods used in each protocol. The method used in this research is qualitative and involves testing the connectivity, authentication and configuration used in each VPN protocol. The parameters used in this research are configuration complexity, flexibility, security and the time required to connect to the VPN network. In the IKE/IPsec protocol, a comparison authentication analysis between Pre-Shared Key and certificate is carried out. Authentication using certificates is proven to be more secure even though it requires more complicated configuration compared to Pre-Shared Key. . The result of this research is the use of IKE / IPsec protocol has flexibility and good security. The algorithms in this protocol can be selected according to the needs and desired security.
Manajemen Dan Keamanan Jaringan Nirkabel Berbasis Wireless Gateway Security Controlling System Marcus, Ronald David; Prameswari, Annisa Dwi
J-INTECH (Journal of Information and Technology) Vol 12 No 02 (2024): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v12i02.1494

Abstract

Along with the development of the internet today, especially the use of WiFi Networks that are already available in various places, forcing network owners or admins to be able to optimize and maintain network traffic to remain stable and secure. Where the security system used must consider the number of users and the area of ​​the network needed. In this study, the author implemented a system that collaborates the UniFi Unify Wireless Controller and Mikrotik Router to optimize Wireless Services to make it easy and safe for users. The approach used in this study is a qualitative approach. The steps that have been taken for the qualitative method approach are conducting a location survey, designing the topology based on the results of the location survey and implementing it directly into a wireless network system with support from the Unify UniFi Wireless Controller and Mikrotik Router, where in this topology it can monitor, manage and control wireless devices in large numbers and controlled in one Controlling System and Gateway. The results of this study are the ease of managing Wifi Networks on a large scale. Management of large numbers of wireless devices in a centralized UniFi wireless controller system and monitoring and setting services to users centrally, both Access Rights, namely bandwidth quotas and access times which are also centralized. Of course, this will make it easier for admins to manage wireless networks on a large scale.