Implementasi Virtual Interface Menggunakan Metode EOIP Tunnel Pada Jaringan WAN PT. Indo Matra Lestari

Sidik Sidik, Ade Sudaryana, Rame Santoso

Abstract


Computer networks have become an important point in companies that have many branch offices to coordinate the transfer of data. PT Indo Matra Lestari's connection uses a VPN system using the PPTP method. Data Center is used as a VPN server, the client is the Head Office and Citereup Branch Offices. Between the Head Office and the Citereup Branch Office there is no direct connection so access to data made between the Head Office and the Citereup Branch Office is slow, because the data must pass through the Data Center before reaching its destination. Moreover, the data accessed is private to the company and only accessed on the local network. The solution used to create a direct and secure network path between the Head Office and Branch Offices is to use the EoIP Tunnel on the proxy router. Tunneling method in EoIP can make network bridging between proxy devices, EoIP Tunnel will change to Virtual Interface on the proxy router so that it is as if the proxy router is connected locally. Tunnel ID on the EoIP Tunnel functions as a tunneling path security. The application of the EoIP Tunnel makes the point to point connection point between Mikrotik devices faster in data access because the data access is directed to the destination. In order for this EoIP Tunnel connection to run optimally and well, a network management is needed in managing internet bandwidth usage


Keywords


virtual, interface, EoIP, Tunneling

Full Text:

PDF

References


Cahyadi, D. (2010). Pemanfaatan Fitur Tunneling Menggunakan Virtual Interface EoIP di MikrotikRouterOS Untuk Koneksi Bridging Antar Kantor Melalui Jaringan ADSL Telkom Speedy. Jurnal Informatika Mulawarman, 5(2), 50–54.

Kurniawan, W. (2007). Jaringan Komputer. Yogyakarta: Penerbit ANDI.

Meyatmaja, E., & Syafrizal, M. (2012). PERANCANGAN VIRTUAL PRIVATE NETWORK PADA PIKA MEDIA KOMUNIKA. Jurnal DASI, 13(4), 11–16.

Pramana, I. J., Widyastuti, N., & Triyono, J. (2014). IMPLEMENTASI RADIUS SERVER PADA JARINGAN VIRTUAL PRIVATE NETWORK. Jurnal JARKOM, 1(2), 122–130.

Riadi, I. (2011). Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik. Jurnal Sistem Informasi Indonesia, 1(1), 71–80.

Sumarno, E., & Probo Hasmoro, H. (2013). Implementasi metode load balancing dengan dua jalur. Indonesian Jurnal on Networking and Security, 2(1), 28–34.

Triyono, J., Rachmawati, Y., & Dhimas Irnawan, F. (2014). ANALISIS PERBANDINGAN KINERJA JARINGAN VPN BERBASIS MIKROTIK MENGGUNAKAN PROTOKOL PPTP DAN L2TP SEBAGAI MEDIA TRANSFER DATA. Jurnal JARKOM, 1(2), 112–121.




DOI: https://doi.org/10.31294/jtk.v6i1.6830

Copyright (c) 2020 Sidik Sidik, Ade Sudaryana, Rame Santoso

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

ISSN: 2442-2436 (print), and 2550-0120


 dipublikasikan oleh LPPM Universitas Bina Sarana Informatika Jakarta

Jl. Kramat Raya No.98, Kwitang, Kec. Senen, Kota Jakarta Pusat, DKI Jakarta 10450
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License