Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance

Riyan Almakhi, Ade Surya Budiman, Rachmawati Darma Astuti

Abstract


Security of data and network devices is essential in the development of a computer network, either in the creation of new computer networks or in the development of existing computer networks. PT. Pan Pacific Insurance as a company that holds large amounts of data along with its supporting computer network's infrastructure, focuses on security aspects in addition to performance aspects in its computer network. To get the flexibility of its computer network, the company developed a wireless local area network (WLAN) in line with the relocation of its head office. The Existing company's network needs to be improved with a WLAN network, so it does not only improve employee performance and provides the best security for company data. For those purposes, the authors applied the use of Cisco Wireless LAN Controller (WLC), Cisco Access Point and applied the WPA+WPA2 PSK security protocol for the SSID used by employees. Using this protocol when employees want to connect to the network wireless, they will be forced to type the password that has been set. In addition to implementing the security protocol, the author also applies the Web Policy Authentication security protocol for the SSID used by guests. So that guests who want to connect to a wireless network will be directed to a web browser to be asked to enter a username and password first. A series of security protocols, also added with network segmentation on each SSID to use a different network address. Thus, the essence of network security and performance is expected to increase. From the results of the tests carried out, obtained security guarantees on the PT. Pan Pacific Insurance successfully directs every user connected to the network as part of the security protocol implemented. Furthermore, with network segmentation, user traffic is more controlled because guests get their network segmentation, so they don't interfere with network traffic for users or company staff in company operations.

Keywords


Network Security Protocol, Network Segmentation, Wireless LAN Controller , WPA+WPA2 PSK, Web Policy Authentication

Full Text:

PDF

References


M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” JOINT (Journal of Information Technology), vol. 2, no. 1, pp. 17–24, 2020.

A. N. Kadhim and S. B. Sadkhan, “Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends,” Jul. 2021.

M. A. Abo-Soliman and M. A. Azer, “Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, Aug. 2018, pp. 1–8. doi: 10.1145/3230833.3230836.

Y. Valaboju, “A Comprehensive Overview of WLAN Security Attacks,” International Journal of Scientific Research & Engineering Trends, vol. 7, no. 1, pp. 244–251, Jan. 2021.

Baihaqi, Y. Yanti, and Zulfan, “Implementasi Sistem Keamanan WPA2-PSK pada Jaringan WiFi,” Serambi Engineering, vol. III, no. 1, pp. 248–254, 2018.

Z. Akram, M. A. Saeed, and M. Daud, “Real Time Exploitation of Security Mechanisms of Residential WLAN Access Points,” in 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Mar. 2018, pp. 1–5. doi: 10.1109/ICOMET.2018.8346378.

A. Acosta-Lopez, E. Y. Melo-Monroy, and P. A. Linares-Murcia, “Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools,” Revista Facultad de Ingeniería, vol. 27, no. 47, pp. 71–78, Sep. 2018, doi: 10.19053/01211129.v26.n46.2017.7309.

M. Rusdan and M. Sabar, “Pengembangan Jaringan Wireless Menggunakan User Authentication Berbasis Radius Dalam Industri 4.0,” INFOTECH Journal, vol. 5, no. 1, pp. 44–52, 2019.

Y. Ma and H. Ning, “Improvement of EAP Authentication Method Based on Radius Server,” in 2018 IEEE 18th International Conference on Communication Technology (ICCT), Oct. 2018, pp. 1324–1328. doi: 10.1109/ICCT.2018.8600077.

M. Ghazian, M. T. Kurniawan, and U. Y. K. S. Hediyanto, “Analisis dan Perancangan Security System Dalam Rancangan Berdasarkan Standar EN506002-5 Dengan Metode PPDIOO Life-Cycle Approach,” in e-Proceeding of Engineering, 2018, pp. 3140–3147.

M. F. Fahlepi, C. Iswahyudi, and E. Sutanta, “Analisis dan Perancangan Jaringan Nirkabel (WLAN) Studi Kasus di Jogjakarta Montessori School Menggunakan Metodologi PPDIOO,” Jurnal JARKOM, vol. 5, no. 2, 2017.

R. Froom, Sivasubramanian, and E. Frahim, Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813. Cisco Press, 2010.

D. Yuliana and I. K. A. Mogi, “Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir,” Jurnal Elektronik Ilmu Komputer Udayana, vol. 9, no. 2, pp. 235–240, 2020.

M. F. Rahmat, E. Rohadi, I. Sirrajudin, and F. Chrissandy, “Study and Analysis of Network Topology Performance Using Wireless Distribution System Technology,” Journal of Information Technology and Computer Science, vol. 6, no. 2, pp. 130–136, 2021, [Online]. Available: www.jitecs.ub.ac.id

N. Darchis, “Web Authentication on WLAN Controller,” Cisco Systems Inc., 2022. https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/115951-web-auth-wlc-guide-00.html (accessed Mar. 18, 2022).




DOI: https://doi.org/10.26418/justin.v11i1.53745

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 JUSTIN (Jurnal Sistem dan Teknologi Informasi)

ara komputer
View My Stats

Creative Commons License
All article in Justin is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License