IMPLEMENTASI VIRTUAL PRIVATE NETWOR MENGGUNAKAN POINT-TO-POINT TUNNELING PROTOCOL

  • Satryawati E
  • Pangestu D
  • Budiman A
N/ACitations
Citations of this article
55Readers
Mendeley users who have this article in their library.

Abstract

Today's technological development is very rapid, especially in the field of network security. The field of network security is a matter that will be a very important part because the network security system is used to guarantee the confidentiality, theft, or burglary of data on a company. In its implementation, a VPN network (Virtual Private Network) uses a site-to-site Point to Point Tunel Protocol (PPTP) method to connect between two places that are located far apart. The main facility of using PPTP is being able to use a public-switched telephone network (PSTN) to build a VPN. At PT Indosis Integrasi Jakarta, the place where the author conducts research there are several problems that the author found, namely, when sending data between the head office and branch offices in Bandung, there is no security that ensures that the data is safe. With the current state of the network, uninterested parties will easily access or steal confidential company data.

Cite

CITATION STYLE

APA

Satryawati, E., Pangestu, D. A., & Budiman, A. S. (2022). IMPLEMENTASI VIRTUAL PRIVATE NETWOR MENGGUNAKAN POINT-TO-POINT TUNNELING PROTOCOL. JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA, 2(1), 36–42. https://doi.org/10.56486/jeis.vol2no1.160

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free