Dewi, Richy Puspita (2023) PERANCANGAN KEAMANAN JARINGAN INTER-VLAN ROUTING PT XYZ MENGGUNAKAN METODE ACCESS CONTROL LIST. Other thesis, Universitas Amikom Purwokerto.
![[thumbnail of COVER.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/text.png)
COVER.pdf
Download (256kB)
![[thumbnail of DAFTAR ISI.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/text.png)
DAFTAR ISI.pdf
Download (83kB)
![[thumbnail of ABSTRAK.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/text.png)
ABSTRAK.pdf
Download (119kB)
![[thumbnail of BAB I.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB I.pdf
Restricted to Registered users only
Download (133kB)
![[thumbnail of BAB II.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB II.pdf
Restricted to Registered users only
Download (219kB)
![[thumbnail of BAB III.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB III.pdf
Restricted to Registered users only
Download (114kB)
![[thumbnail of BAB IV.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB IV.pdf
Restricted to Registered users only
Download (541kB)
![[thumbnail of BAB V.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
BAB V.pdf
Restricted to Registered users only
Download (66kB)
![[thumbnail of DAFTAR PUSTAKA.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/image.png)
DAFTAR PUSTAKA.pdf
Restricted to Registered users only
Download (130kB)
![[thumbnail of LAMPIRAN.pdf]](https://eprints.amikompurwokerto.ac.id/style/images/fileicons/text.png)
LAMPIRAN.pdf
Restricted to Repository staff only
Download (278kB)
Abstract
PT XYZ is one or the Remote STO from Tasikmalaya’s Witel which is under the auspices of Telkom Indonesia. One of the problems of the PT XYZ is that it requires a computer network security so that data can be maintained and avoid theft of personal data or company data. The author purposes a solution in the form of an inter-vlan routing network topology using the Access Control List (ACL) security method at the PT XYZ to protect important personal and company data. This paper aims to apply the concept of inter-vlan routing using multilayer switch that suit the needs of the PT XYZ, with the appliance of vlan management and network security becomes easier. In an effort to improve network security, authors implement ACLs to restrict access rights in each division. This study used the PPDIOO method and packet tracer simulation application 8.1.1 for the network design process. The results of this study show that vlans run well un the process of distributing networks and ACLs can be implemented properly for data security in the company so that data transactions in each vlan area run well and safely.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Dosen Pembimbing: Retno Waluyo. S.Kom., M.MSI dan Agus Pramono, M.T |
Uncontrolled Keywords: | Jaringan Komputer, VLAN, Access Control List, Cisco Packet Tracer |
Subjects: | T Technology > T Technology (General) |
Divisions: | Fakultas Ilmu Komputer > Teknologi Informasi |
Depositing User: | UPT Perpustakaan Pusat Universitas Amikom Purwokerto |
Date Deposited: | 15 Jun 2023 02:53 |
Last Modified: | 15 Jun 2023 02:53 |
URI: | https://eprints.amikompurwokerto.ac.id/id/eprint/1589 |