Dewi, Richy Puspita (2023) PERANCANGAN KEAMANAN JARINGAN INTER-VLAN ROUTING PT XYZ MENGGUNAKAN METODE ACCESS CONTROL LIST. Other thesis, Universitas Amikom Purwokerto.
Text
COVER.pdf
Download (256kB)
COVER.pdf
Download (256kB)
Text
DAFTAR ISI.pdf
Download (83kB)
DAFTAR ISI.pdf
Download (83kB)
Text
ABSTRAK.pdf
Download (119kB)
ABSTRAK.pdf
Download (119kB)
Image
BAB I.pdf
Restricted to Registered users only
Download (133kB)
BAB I.pdf
Restricted to Registered users only
Download (133kB)
Image
BAB II.pdf
Restricted to Registered users only
Download (219kB)
BAB II.pdf
Restricted to Registered users only
Download (219kB)
Image
BAB III.pdf
Restricted to Registered users only
Download (114kB)
BAB III.pdf
Restricted to Registered users only
Download (114kB)
Image
BAB IV.pdf
Restricted to Registered users only
Download (541kB)
BAB IV.pdf
Restricted to Registered users only
Download (541kB)
Image
BAB V.pdf
Restricted to Registered users only
Download (66kB)
BAB V.pdf
Restricted to Registered users only
Download (66kB)
Image
DAFTAR PUSTAKA.pdf
Restricted to Registered users only
Download (130kB)
DAFTAR PUSTAKA.pdf
Restricted to Registered users only
Download (130kB)
Text
LAMPIRAN.pdf
Restricted to Repository staff only
Download (278kB)
LAMPIRAN.pdf
Restricted to Repository staff only
Download (278kB)
Abstract
PT XYZ is one or the Remote STO from Tasikmalaya’s Witel which is under the auspices of Telkom Indonesia. One of the problems of the PT XYZ is that it requires a computer network security so that data can be maintained and avoid theft of personal data or company data. The author purposes a solution in the form of an inter-vlan routing network topology using the Access Control List (ACL) security method at the PT XYZ to protect important personal and company data. This paper aims to apply the concept of inter-vlan routing using multilayer switch that suit the needs of the PT XYZ, with the appliance of vlan management and network security becomes easier. In an effort to improve network security, authors implement ACLs to restrict access rights in each division. This study used the PPDIOO method and packet tracer simulation application 8.1.1 for the network design process. The results of this study show that vlans run well un the process of distributing networks and ACLs can be implemented properly for data security in the company so that data transactions in each vlan area run well and safely.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Dosen Pembimbing: Retno Waluyo. S.Kom., M.MSI dan Agus Pramono, M.T |
Uncontrolled Keywords: | Jaringan Komputer, VLAN, Access Control List, Cisco Packet Tracer |
Subjects: | T Technology > T Technology (General) |
Divisions: | Fakultas Ilmu Komputer > Teknologi Informasi |
Depositing User: | UPT Perpustakaan Pusat Universitas Amikom Purwokerto |
Date Deposited: | 15 Jun 2023 02:53 |
Last Modified: | 15 Jun 2023 02:53 |
URI: | https://eprints.amikompurwokerto.ac.id/id/eprint/1589 |