PENERAPAN PRIVATE ACCESS MENGGUNAKAN METODE PPTP DAN OVPN DI YAYASAN UMMU’L QURO DEPOK JAKARTA
DOI:
https://doi.org/10.31000/jika.v6i3.5877Abstract
During the COVID-19 pandemic, the need for information technology is necessary and very important by various field such as institutions or individuals to increase productivity, both from the fields of work, health or learning. It's also affected the Ummu'l Quro Foundation Depok as an educational institution that requires communication and data exchange in carrying out its activities.
This is a challenge for the Ummul Quro Foundation during this pandemic because of the location between kindergartens, elementary schools, junior high schools that are far apart, and so far the data exchange process is still using media such as flash drives, which is very ineffective, especially during the COVID19 pandemic.
Therefore, requirement of bulid a network can accommodate the need for effective data exchangeusing the internet as a medium to carried out data over long distances. Using the VPN method as a solution for exchanging data online allows the security of data traffic communication on a computer network. This is very important, especially if the data is confidential. Data security needs to be implemented to prevent attacks or data theft. There are many ways to secure data on a computer network using a VPN, including the PPTP and OVPN methods to interconnect using a VPS as a backup for networks where there is no public IP available, both of which will be implemented using a mikrotik routerboard.
References
Alviendra, Ilmalik Muhammad. & Setijadi, Eko (2022). Pengembangan dan Penerapan Sistem Virtual Private Network(VPN) pada Internet of Things(IOT) Menggunakan Simulasi. Jurnal Teknik ITS, 11(1), 15-22
Gondokusuman Yogyakarta, K., Alif Mustofa, T., Sutanta, E., & Triyono, J. (2019). Perancangan Dan Implementasi Sistem Monitoring Jaringan Wi-Fi Menggunakan Mikhmon Online Di Wisma Muslim. Jurnal JARKOM, 7(2), 65-76.
Habibi, R., & Karnovi, R. (2020). Tutorial Membuat Aplikasi Sistem Monitoring Terhadap Job Operational Human Capital (1 ed.). Kreatif Industri Nusantara.
Hasan, M. dkk. (2016). Analisa Dan Pengembangan Jaringan Wireless Berbasis Mikrotik Router Os V.5.20 Di Sekolah Dasar Negeri 24 Palu. Jurnal Elektronik Sistem Informasi dan Komputer, 2(1), 10–19. stmik-binamulia.ac.id
Haqqi, M., & Badrul, M. (2016). Segmentasi Jaringan Dengan Menggunakan Virtual Local Area Network (Study Kasus Pt. Jalur Nugraha Ekakurir). Jurnal Teknik Komputer, 2(2), 7–16.
Khasanah, S. N. (2016). Keamanan Jaringan Dengan Packet Filtering Firewall (Studi Kasus: PT Sukses Berkat Mandiri Jakarta). IOSR Journal of Economics and Finance, 3(1).
Madcoms. (2019). Panduan Lengkap Membangun Sistem Jaringan Komputer Dengan Mikrotik Router OS. Yogyakarta:ANDI.
Mufida, E., Irawan, D., & Chrisnawati, G. (2017). Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta. Jurnal Matrik, 16(2), 9.
Nalendra, A. K. (2020). Manajemen Jaringan Komputer (1 ed.). Jakarta: PUSTAKA AKADEMI KOMUNITAS INDONESIA.
Oktivasari, P., & Utomo, A. B. (2016). Analisa Virtual Private Network Menggunakan. Penelitian Komunikasi Dan Opini Publik, 20(2), 185–202.
Phang, V., & Setyaningsih, E. (2021) Perancangan Virtual Private Network Dengan Protokol PPTP Menggunakan MikroTik Untuk Kebutuhan Remote Access. Jurnal POLEKTRO: Jurnal Power Elektronik, 10(2), 68-71
Pengertian VMware Beserta Manfaat dan Cara Kerja VMware yang Perlu Anda Ketahui, diakses pada tanggal 04 Januari 2022 pukul 23:30. from Riyadi, H. https://www.nesabamedia.com/pengertian-vmware/.
Purnama Sari, A., & Kemala, N. (2020). Perancangan Jaringan Virtual Private Network Berbasis Ip Security Menggunakan Router Mikrotik. Jurnal Prosisko, 7(2), 150-164
Putra, Jordy Lesmana, Indriyani, Luthfi, Angraini, Y. (2018). Penerapan Sistem Keamanan Jaringan Menggunakan. IJCIT (Indonesian Journal on Computer and Information Technology), 3(2), 260–267.
Rifkie, P. (2018). Security Jaringan Komputer Berbasis CEH. Informatika.
Ruwaida, D., & Kurnia, D. (2018). Rancang Bangun File Transfer Protocol (Ftp) Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smks Dwiwarna . 3(1).
Ruwaida, D., & Kurnia, D. (2018). Rancang Bangun File Transfer Protocol (Ftp) Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smks Dwiwarna . CESS (Journal of Computer Engineering System and Science), 3(1), 45-49.
Sudarsono, A. (2021). Pengantar Aplikasi Komputer (1 ed., Nomor June). Jakarta: Insan Cendikia Mandiri.
Yuliandoko, H. (2018). Jaringan Komputer Wire dan Wireless Beserta Penerapannya (1 ed.). Jakarta: Deepublish. www.deepublish.co.id
Downloads
Published
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.