PERANCANGAN KEAMANAN JARINGAN INTER-VLAN ROUTING PT XYZ MENGGUNAKAN METODE ACCESS CONTROL LIST

Dewi, Richy Puspita (2023) PERANCANGAN KEAMANAN JARINGAN INTER-VLAN ROUTING PT XYZ MENGGUNAKAN METODE ACCESS CONTROL LIST. Other thesis, Universitas Amikom Purwokerto.

[thumbnail of COVER.pdf] Text
COVER.pdf

Download (256kB)
[thumbnail of DAFTAR ISI.pdf] Text
DAFTAR ISI.pdf

Download (83kB)
[thumbnail of ABSTRAK.pdf] Text
ABSTRAK.pdf

Download (119kB)
[thumbnail of BAB I.pdf] Image
BAB I.pdf
Restricted to Registered users only

Download (133kB)
[thumbnail of BAB II.pdf] Image
BAB II.pdf
Restricted to Registered users only

Download (219kB)
[thumbnail of BAB III.pdf] Image
BAB III.pdf
Restricted to Registered users only

Download (114kB)
[thumbnail of BAB IV.pdf] Image
BAB IV.pdf
Restricted to Registered users only

Download (541kB)
[thumbnail of BAB V.pdf] Image
BAB V.pdf
Restricted to Registered users only

Download (66kB)
[thumbnail of DAFTAR PUSTAKA.pdf] Image
DAFTAR PUSTAKA.pdf
Restricted to Registered users only

Download (130kB)
[thumbnail of LAMPIRAN.pdf] Text
LAMPIRAN.pdf
Restricted to Repository staff only

Download (278kB)

Abstract

PT XYZ is one or the Remote STO from Tasikmalaya’s Witel which is under the auspices of Telkom Indonesia. One of the problems of the PT XYZ is that it requires a computer network security so that data can be maintained and avoid theft of personal data or company data. The author purposes a solution in the form of an inter-vlan routing network topology using the Access Control List (ACL) security method at the PT XYZ to protect important personal and company data. This paper aims to apply the concept of inter-vlan routing using multilayer switch that suit the needs of the PT XYZ, with the appliance of vlan management and network security becomes easier. In an effort to improve network security, authors implement ACLs to restrict access rights in each division. This study used the PPDIOO method and packet tracer simulation application 8.1.1 for the network design process. The results of this study show that vlans run well un the process of distributing networks and ACLs can be implemented properly for data security in the company so that data transactions in each vlan area run well and safely.
Item Type: Thesis (Other)
Additional Information: Dosen Pembimbing: Retno Waluyo. S.Kom., M.MSI dan Agus Pramono, M.T
Uncontrolled Keywords: Jaringan Komputer, VLAN, Access Control List, Cisco Packet Tracer
Subjects: T Technology > T Technology (General)
Divisions: Fakultas Ilmu Komputer > Teknologi Informasi
Depositing User: UPT Perpustakaan Pusat Universitas Amikom Purwokerto
Date Deposited: 15 Jun 2023 02:53
Last Modified: 15 Jun 2023 02:53
URI: https://eprints.amikompurwokerto.ac.id/id/eprint/1589

Actions (login required)

View Item
View Item