Implementasi VPN Menggunakan Metode Point to Point Tunneling Protocol
Abstract
The XYZ office is a government agency covering various fields, ranging from government, economy, development, people's welfare, community life development and public service affairs. However, work activities in agencies were disrupted due to the COVID-19 pandemic which caused the government to impose a Large-Scale Social Restriction (PSBB) policy to suppress the spread of this virus, resulting in agency workers having to work from home. Therefore we need an appropriate means to be able to support these activities. One of them is making a technology design by implementing a VPN on a proxy router with the PPTP (Point to Point Tunnelling Protocol) method so that it can make it easier for employees to communicate without thinking about location. In addition, users can still remotely access the local network even though they are outside the office network. more secure. Based on the results of testing the network security at the XYZ Office before using the VPN Server, it proved that the wiretapping attackers could still obtain data in the form of website login information, proxy logins, or view data contents when exchanging data. Meanwhile, when the user connects to the VPN Server, the eavesdropper cannot see the contents of the data in it, then with the implementation of a VPN with the PPTP method, employees who are working from home can connect and communicate well with each other, with that work and information exchange will become more flexible and faster
Downloads
References
R. Kemenkes, “Keputusan Menteri Kesehatan Republik Indonesia Nomor HK.01.07/MenKes/413/2020 Tentang Pedoman Pencegahan dan Pengendalian Corona Virus Disease 2019 (Covid-19),” MenKes/413/2020, vol. 2019, p. 207, 2020.
E. Mufida, D. Irawan, and G. Chrisnawati, “Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta,” J. Matrik, vol. 16, no. 2, p. 9, 2017, doi: 10.30812/matrik.v16i2.7.
L. Auditya, C. Kartiko, and C. Wiguna, “Jurnal Edik Informatika Jurnal Edik Informatika,” Penelit. Bid. Komput. Sains dan Pendidik. Inform., vol. 7, no. 1, pp. 9–18, 2020.
S. Dewi, “Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis,” EVOLUSI J. Sains dan Manaj., vol. 8, no. 1, pp. 128–139, 2020, doi: 10.31294/evolusi.v8i1.7658.
Y. Putra, Jordy Lesmana, Indriyani, Luthfi, Angraini, “Penerapan Sistem Keamanan Jaringan Menggunakan,” IJCIT (Indonesian J. Comput. Inf. Technol., vol. 3, no. 2, pp. 260–267, 2018.
S. Watmah, “Implementasi VPN Menggunakan Point-To-Point Tunneling Protocol ( PPTP ) Mikrotik Router Pada BPRS Bumi Artha Sampang,” Insa.– J. Inov. dan Sains Tek. Elektro ISSN 2722-574X, vol. 1, no. 1, pp. 6–12, 2020.
T. Rahman, “Implementasi Virtual Private Network,” J. Ilmu Pengetah. dan Teknol. Komput., vol. 3, no. 1, pp. 1–12, 2017.
R. Toyib, M. Muntahanah, and J. Prima, “Pemanfaatan Vpn Dengan Ip Cloud Mikrotik Menggunakan Jaringan 3G (Studi Kasus : Pt. Bprs Muamalat Harkat Bengkulu),” Sistemasi, vol. 8, no. 1, p. 90, 2019, doi: 10.32520/stmsi.v8i1.428.
I. K. Susila and I. M. Sukafona, “Analisis Quality Of Service Jaringan Virtual Private Network ( VPN ) di STMIK STIKOM Indonesia,” 2019.
A. W. Santosa, “Implementasi Freenas Sebagai Penyimpanan pada Proxmox Menggunakan Metode Failover: Server Freenas,” 2017.
H. Supendar, “Implementasi Remote Site Pada Virtual Private Network Berbasis Mikrotik,” Bina Insa. ICT J., vol. 3, no. 1, p. 234340, 2016.
Afrianto and E. B. Setiawan, "Kajian Virtual Private Network (VPN) Sebagai Sistem Pengamanan Data Pada Jaringan Komputer (Studi Kasus Jaringan Komputer Unikom)," Jurnal Majalah Ilmiah Unikom, vol. Vol. 12, pp. 43-52, 2014.
Anwar, R. S., & Agustina, N. (2020). Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server. 4(2), 143–152.
Arnita, A., & Farid, M. (2020). Implementasi jaringan virtual private network dengan teknologi Multi Protocol Label Switching ( MPLS ). 5(2), 28–39
Zarkasyi, M. H., Agus, I., Permana, G., Dillak, H. C., & Kom, S. (2018). Implementasi Virtual Private Network (Vpn) Server Dengan Menggunakan Mikrotik Os Di Pt . Charisma Persada, 4(3), 2463–2474.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi VPN Menggunakan Metode Point to Point Tunneling Protocol
Pages: 184−190
Copyright (c) 2022 Ria Andriani, Ahmad Sa’di, Andriyan Dwi Putra

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).