Implementasi authentication captive portal pada wireless local area network pt. Rikku mitra sriwijaya

1Citations
Citations of this article
59Readers
Mendeley users who have this article in their library.

Abstract

PT. Rikku Mitra Sriwijaya is one of the companies that supply cleaning service personnel. This company already has Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, LAN PT. Rikku Mitra Sriwijaya currently uses WPA2-PSK as a security system for authenticate users to be able to access the internet. However, the use of WPA2-PSK as WLAN security still has weaknesses due to the use of the a same password for many users can be connected to the PT. Rikku Mitra Sriwijaya WLAN hotspot will be a chance of occurrence the cyber crime. This happens because it will be very easy for users who are not responsible for enter to WLAN PT. Rikku Mitra Sriwijaya. From the information obtained, in 2017 PT. Rikku Mitra Sriwijaya has lost and damaged their data and information. Therefore, captive portal authentication will be applied in this research as an effort to increase PT. Rikku Mitra Sriwijaya WLAN security that replace WPA2-PSK. This research process uses the Network Development Life Cycle (NDLC) method, this method is network oriented which has 6 stages with a cycle that has no beginning and ending. The entire configuration needed to build an captive portal authentication utilizes the Winbox program. This research has been carried out resulted limitation for users authentication specifically for users who have registered on PT. Rikku Mitra Sriwijaya WLAN is allowed to access the internet of this company. Furthermore, Winbox program also can be used for monitoring all connected users to PT. Rikku Mitra Sriwijaya WLAN both active and inactive users.

Cite

CITATION STYLE

APA

Novrianda, R. (2018). Implementasi authentication captive portal pada wireless local area network pt. Rikku mitra sriwijaya. Register: Jurnal Ilmiah Teknologi Sistem Informasi, 4(2), 67–80. https://doi.org/10.26594/register.v4i2.1245

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free