Claim Missing Document
Check
Articles

Found 2 Documents
Search

DESIGN OF PRIVATE CLOUD STORAGEĀ  USING SECURITY METHODS IDS AND IPS Deval Gusrion; Silky Safira; Retno Devita; Ruri Hartika Zain; Rini Sovia
Jurnal Ipteks Terapan (Research Of Applied Science And Education ) Vol. 15 No. 4 (2021): Jurnal Ipteks Terapan ( Research of Applied Science and Education )
Publisher : Lembaga Layanan Pendidikan Tinggi Wilayah X

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1242.307 KB) | DOI: 10.22216/jit.v%vi%i.725

Abstract

Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet. By usingtechnology internet that is able to implement server a virtual, which has the aim of building a cloud computing server at the District Communications and Information Office. Padang Pariaman uses the Operating System (OS) Proxmox VE (Virtual Environment) 6.4. Cloud computing is able to provide storage services that can be used simultaneously. The results of this study produce a cloud computing server that implements a security system with themethods ids (intrusion detection system) and ips (intrusion prevention system)that are able to process data(storagestorage), use software simultaneously in the network, and use infrastructure within the scope of this research.network cloud computing at the District Communications and Information Office. Padang Pariaman using aservice model private cloud
IMPLEMENTATION OF VPN SERVER USING L2TP PROTOCOL AND IPSEC METHODS AS NETWORK SECURITY Ruri Hartika Zain; Retno Devita; Ipriadi -; Ondra Eka Putra
Jurnal Ipteks Terapan (Research Of Applied Science And Education ) Vol. 16 No. 4 (2022): Jurnal Ipteks Terapan : research of applied science and education
Publisher : Lembaga Layanan Pendidikan Tinggi Wilayah X

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (657.104 KB) | DOI: 10.22216/jit.v16i4.2004

Abstract

This study aims to design a VPN network system by utilizing a public network, where this system aims to provide security by using IPSec in providing confidential information through the L2TP tunnel method from the server to the branch/client computer and vice versa. VPN is implemented using layer 2 tunneling protocol (L2TP) using two Mikrotik routers. There are only a few changes in the computer network configuration to minimize costs and implementation time. Tests are carried out to implement security on the network using the command prompt, where the admin observes packet loss and delay parameters to find out the increase in security quality on the network