PENERAPAN NETWORK ACCESS CONTROL AUTENTIKASI INTERNAL NETWORK SECURITY PROTOKOL 802.1 X
Abstract
Full Text:
PDFReferences
W. Jia and W. Zhou, “Distributed Network Systems : From Concepts to Implementations (Network Theory and Applications),” 2005.
A. L. Aprianto1, I. Winarno, and S. M. Kom2, “Implementasi Network Access Control Pada Jaringan EEPIS,” 2009.
C. Fisher, “Network Access Control: Disruptive Technology?,” 2007. [Online]. Available: https://epublications.regis.edu/theses
Shesia Rizki Damara, “Analisis dan Implementasi Kontrol Akses Jaringan dan Kebijakan pada PT. Asuransi Jiwa Sinarmas MSIG Tbk Menggunakan Sistem Genian NAC,” Jurnal Ilmiah Komputasi, vol. 19, no. 3, Sep. 2020, doi: 10.32409/jikstik.19.3.67.
A. M. Fanggidae, H. Hermawan, and H. I. Pratiwi, “Sistem Monitoring Server Dengan Menggunakan SNMP,” Widyakala Journal, vol. 6, no. 2, p. 163, Sep. 2019, doi: 10.36262/widyakala.v6i2.218.
Rudi Candra Satriawan, “PENGEMBANGAN Sistem Autentikasi Single Sign On Menggunakan Protocol Ldap (Lightweight Directory Access Protocol),” 2017.
S. B. P. Yudi Mulyanto, “Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawa Dengan Metode Network Development Life Cycle (NDLC),” JINTEKS (Jurnal Informatika Teknologi dan Sains) , vol. 2, no. 4, pp. 223–233, 2020.
K. Evan, P. Wiguna, and I. P. Hariyadi, “Otomatisasi Keamanan Router Dan Switch Berbasis Cisco Menggunakan Ansible,” 2020.
S. Hidayatulloh, P. M. Ilham, and M. Lase, “Calculation Application for Subnetting IPv4 Address on Android,” Journal Of Informatics And Telecommunication Engineering, vol. 4, no. 1, pp. 112–118, Jul. 2020, doi: 10.31289/jite.v4i1.3827.
B. S. D. V. V. T. S. M. Š. Dejana T. Vojnak, “Performance Comparison of the type-2 hypervisor VirtualBox and VMWare Workstation,” 2019. [Online]. Available: https://www.geeksforgeeks.org/virtualization-vmware-full-v
S. Varrette, M. Guzek, V. Plugaru, X. Besseron, and P. Bouvry, “HPC performance and energy-efficiency of Xen, KVM and VMware hypervisors,” in Proceedings - Symposium on Computer Architecture and High Performance Computing, 2013, pp. 89–96. doi: 10.1109/SBAC-PAD.2013.18.
J. C. Neumann, The book of GNS3 : build virtual network labs using Cisco, Juniper, and more.
T. Habibullah and D. Arnaldy, “Implementasi Network Monitoring System Nagios dengan Event Handler dan Notifikasi Telegram Messenger,” 2016.
M. Syani and B. Saputro, “Mamay Syani, Bayu Saputro Implementasi Remote Monitoring Pada Virtual Private Server Berbasis Telegram Bot API (Studi Kasus Politeknik TEDC Bandung).”
Tati Ernawati and Fikri Faiz Fadhlur Rachmat, “Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 5, no. 1, pp. 180–186, Feb. 2021, doi: 10.29207/resti.v5i1.2825.
DOI: https://doi.org/10.25134/nuansa.v16i2.5800
NUANSA INFORMATIKA : JURNAL TEKNOLOGY DAN INFORMASI
p-ISSN :1858-3911 , e-ISSN : 2614-5405
DOI : https://doi.org/10.25134/nuansa
Accreditation : SINTA 5
Organized by Faculty of Computer Science, Universitas Kuningan, Indonesia.
Website : https://journal.uniku.ac.id/index.php/ilkom
Email : [email protected]
Address : Jalan Cut Nyak Dhien No.36A Kuningan, Jawa Barat, Indonesia.
StatCounter
View My Stats Creative Commons
NUANSA INFORMATIKA is licensed under a Lisensi Creative Commons Atribusi 4.0 Internasional.