Skripsi
IMPLEMENTASI SECURE SOCKET TUNNELING PROTOCOL (SSTP) UNTUK KEAMANAN DATA PADA JARINGAN KOMPUTER.
Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps of the secure socket tunneling protocol Virtual Private Network (VPN) method is one way to protect the exchange of important information data over the internet network, especially by using the Secure Socket Tunneling Protocol (SSTP) protocol method can make communication between multiple networks through a Tunneling through the internet network becomes more secure Using methods of collecting data or information from various sources such as journals, books, the web, and from other related information from this research project entitled implementation of secure socket tunneling protocol (SSTP) for data security on computer networks . The results will show how much speed decrease occurs when the connection passes through the encryption layer. Pingflood measures how an SSTP VPN handles a "pingflood" attack, which is sending a large number of ping requests to a server simultaneously to disrupt a connection. The VPN server can run well under different conditions depending on the speed and number of data packets sent. The implementation of Secure Socket Tunneling Protocol (SSTP) is to optimize the SSTP VPN configuration and MikroTik devices to improve performance. Keywords: secure socket tunneling protocol, Virtual Private Network, Pingflood
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2307006714 | T131881 | T1318812023 | Central Library (Referens) | Available |
No other version available