scholarly journals Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server

Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.

Author(s):  
PARDEEP MEHTA ◽  

The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need a way to maintain fast, secure and reliable communications wherever their offices are. Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines can become quite expensive and often rises in cost as the distance between the offices increases. As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came Intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices.


2021 ◽  
Vol 5 (9 (113)) ◽  
pp. 56-69
Author(s):  
Gulzinat Ordabayeva ◽  
Abdizhapar Saparbayev ◽  
Bibinur Kirgizbayeva ◽  
Gulzat Dzhsupbekova ◽  
Nazira Rakhymbek

A Software-Defined Network (SDN) on a Wide Area Network (WAN) is a computer network that is controlled and created by software. SD-WAN is an emerging research area that has received a lot of attention from industry and government. This technology offers tremendous opportunities to support the creation of consolidated data centers and secure networks. This is an innovation that allows the network to be monitored and programmed so that it can respond to network events caused by security breaches. This solution provides network security, offers a single network management console, and provides complete control over the network architecture. Also controls security in the cloud software-defined infrastructure (SDI), such as dynamically changing the network configuration when forwarding packets, blocking, redirecting, changing Media Access Control (MAC) or Internet Protocol (IP) addresses, limiting the packet flow rate etc. Using SD-WAN technology, it is possible to reduce the cost of dedicated bandwidth channels, achieve a high-quality Virtual Private Network (VPN), and the ability to automatically select a channel for certain channels. The main advantages of SD-WAN are the management of an unlimited number of devices from a single center, reducing the cost of deploying branch infrastructure. According to the results of the survey, 7 % of respondents use SD-WAN for security solutions, 14% at the piloting stage. As a result of the research, it was revealed that by 2024, to increase the flexibility and support of cloud applications, more than 60 % of SD-WAN customers will implement the SASE (Secure Access Service Edge) architecture, which is 30% more than in 2020 and the main concept - application security and cloud functions. Keywords: OpenFlow, Software defined wide area network (SD-WAN), architecture, DDoS attack, WAN network


Author(s):  
David Romyn ◽  
Mark Kebbell

In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.


2015 ◽  
Vol 12 (1) ◽  
Author(s):  
Irawan Afrianto ◽  
Eko Budi Setiawan

Jaringan komputer dapat dikatakan sebagai sebuah sistem yang terdiri dari berbagai komputer beserta resource-nya yang didesain agar dapat menggunakan sumber daya yang ada, sehingga dapat mengakses informasi yang diperlukan. Informasi tersebut dapat diakses melalui komputer yang lain dengan konsep computer networking, baik itu Local Area Network, Metropolitan Area Network, Wide Area Network ataupun juga internet. Untuk mengamankan suatu koneksi pada jaringan dapat menggunakan jaringan yang bersifat virtual yang dikenal dengan istilah Virtual Private Network (VPN).Virtual Private Network (VPN) adalah sebuah teknologi komunikasi yang memungkinkan untuk dapat terkoneksi ke jaringan publik dan menggunakannya untuk bergabung dengan jaringan lokal. Dengan cara tersebut maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam kantor atau network itu sendiri, walaupun sebenarnya menggunakan jaringan milik publik.UNIKOM sebagai salah satu perguruan tinggi yang dalam melakukan kegiatan operasionalnya terdiri dari beberapa stakeholder yang saling terhubung dalam jaringan komputer, perlu menerapkan konsep VPN untuk mengamankan informasi yang dimiliki pada suatu jaringan, ataupun untuk memudahkan dalam mengakses jaringan lokal yang ada di UNIKOM walaupun dalam mengaksesnya menggunakan jaringan yang bersifat public (internet).Hasil dari penelitian ini adalah berupa suatu rekomendasi dasar yang dapat digunakan oleh UNIKOM untuk menerapkan konsep Virtual Private Network (VPN) dalam pengembangan jaringan komputer yang dimiliki sehingga dalam pengaksesan informasi dapat berlangsung lebih aman dan efektif.


Author(s):  
Manuel Mogollon

Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks, such as the public Internet or private IP backbones. When VPNs are used, the Internet offers the appearance, functionality, and usefulness of a dedicated private network. One of the problems in using the Internet as a WAN is that the Internet is a public network and has relatively little security. IPsec provides the following security services to VPNs: data origin authentication, access control, confidentiality (encryption), connectionless integrity, rejection of replayed packets (a form of partial sequence integrity), and limited traffic flow confidentiality.


2019 ◽  
Vol 5 (1) ◽  
pp. 7-14
Author(s):  
Syarif Hidayatulloh ◽  
Wahyudin Wahyudin

The use of information technology and its use in collecting and processing data into information that is useful in decision making will play a role in determining the success of an organization or company in the future. This happened to PT. Jasa Cendekia Indonesia, the computer network that is owned has not met the needs of its employees. A good computer network is one that can serve sharing resources, data security, resources more efficiently and up-to-date information. Basically if a company can hold a computer network that serves the above for employees, of course it will make it easier for employees to do the work and improve the standards of the company itself. The proposed network built by the author for PT. Indonesian Scholar Services is a computer network built with Virtual Private Network technology. Because companies that have communication between the head office and branches that are good and safe, will be the capital for their companies in facing challenges in the era of globalization. Communication that is connected to a fast and secure computer network will make it easier for a company to supervise the activities of its company.


2020 ◽  
Author(s):  
Darma oktavia

Dalam dunia bisnis, biasanya sebuah organisasi ingin membangun Wide Area Network (WAN) untuk menghubungkan beberapa kantor cabangnya. Sebelum munculnya Virtual Private Network (VPN), mereka umumnya menggunakan ” leased line” yang mahal sehingga hanya perusahaan besar yang dapat memilikinya.VPN - WAN memberi solusi alternatif karena dapat mengurangi biaya pembuatan infrastruktur jaringan dan memotong biaya operasional dengan memanfaatkan failitas internet sebagai media komunikasinya. Perusahaan cukup menghubungi Internet Service Provider (ISP) terdekat untuk mendapatkan layanan ini.Setiap paket informasi yang dikirim dapat diakses, diawasi atau bahkan dimanipulasi oleh pengguna. Supaya komunikasi berjalan aman maka diperlukan protokol tambahan khusus yang dirancang untuk mengamankan data yang dikirim. Dewasa ini sudah banyak perusahaan seperti : perusahaan manufaktur, distribusi dan retail; pertambangan minyak dan gas, telekomunikasi, finansial, pemerintahan serta industri transportasi yang menggunakan VPN karena fasilitas –fasilitas yang ditawarkan berupa remote access client, internetworking LAN to LAN serta akses yang terkontrol dengan biaya yang murah. Uji coba yang dilakukan Miercom(LAB penyedia testing kinerja perangkat keras) terhadap Cisco 1841 membuktikan bahwa Cisco 1841 dapat menopang suatu komunikasi dua arah, interkoneksi IP WAN kapasitas E1 dengan enkripsi 3DES yang dapat menunjang throughput sampai dengan 2 Mbps dalam koneksi E1 IP-WAN. Penggunaan VPN akan meningkatkan efektivitas, efisiensi kerja serta skalabilitas perusahaan. Keuntungan lain yang didapat dari VPN adalah pada biaya pulsa yang jauh lebih murah dibandingkan dengan menggunakan” leased line”.


Author(s):  
David Romyn ◽  
Mark Kebbell

In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.


Author(s):  
Lee Chao

In this chapter, we will also discuss the network implementation issues of large computer labs. For a large computer lab, multiple medium online computer labs are connected through a wide area network (WAN) or through the Internet. For this type of network, the network developing process often involves outside companies such as a telephone company and a technology consulting company.


Sign in / Sign up

Export Citation Format

Share Document