daftar isi

12
DAFTAR ISI Halaman HALAMAN JUDUL ................................................................. i HALAMAN PERSETUJUAN ............................................................... ii HALAMAN PENGESAHAN ................................................................ iii HALAMAN PERNYATAAN ................................................................ iv MOTTO .. .................................................................... ....... v HALAMAN PERSEMBAHAN .............................................................. vi KATA PENGANTAR ................................................................. vii DAFTAR ISI ..................................................................... ix DAFTAR GAMBAR ............................................................... xiii DAFTAR TABEL ................................................................. xiv ix

Upload: arwanto-cahya

Post on 06-Oct-2015

214 views

Category:

Documents


0 download

DESCRIPTION

daftar isi

TRANSCRIPT

DAFTAR ISI

Halaman

HALAMAN JUDUL...............................................................................iHALAMAN PERSETUJUAN..........................................................................

ii HALAMAN PENGESAHAN........................................................................... iii

HALAMAN PERNYATAAN........................................................................... ivMOTTO......................................................................................................... vHALAMAN PERSEMBAHAN........................................................................ viKATA PENGANTAR...................................................................................... viiDAFTAR ISI........................................................................................

ixDAFTAR GAMBAR.............................................................................

xiiiDAFTAR TABEL..................................................................................

xivDAFTAR KODE SCRIPT...xvBAB I PENDAHULUAN.....................................................................1

1.1 Latar Belakang Masalah............................................................11.2 Identifikasi Masalah...................................................................31.3 Batasan Masalah........................................................................31.4 Rumusan Masalah......................................................................41.5 Tujuan Penelitian........................................................................51.6 Manfaat Penelitian.....................................................................5BAB II LANDASAN TEORI....................................................................8

2.1 Kajian Pustaka Terdahulu...........................................................62.2 Landasan Teori.............................................................................91. Protokol TCP/IP......................................................................92. Internet Protokol Address......................................................113. Mikrotik ................................................................................154. EoIP .......................................................................................155. VPN (Virtual Pritvate Netwrok ) ........................................ 176. PPTP ...........................................................197. PPOE208. VPN Metode SSTP 229. Linux .2310. Wireshark .2411. Network Forensics .

2412. Protokol ARP .

2613. Protokol ICMP ..2714. Protokol HTTP ..

2715. Protokol FTP ..

2816. Protokol UDP

2917. Protokol DNS

3018. Protokol WLAN

3119. Protokol TLS/SSL ..

3220. OSI Layer

3221. Network Sniffing

3422. Protokol Routing . 3523. Computer Security ..3624. Network Security ..40BAB III METODE PENELITAN..................................................................412.1 Subyek Penelitian........................................................................412.2 Alat Penelitian.............................................................................411. Perangkat Keras....................................................................412. Perangkat Lunak...................................................................412.3 Metode Pengumpulan Data.................................................... 421. Studi Literatur ...............................................422. Browsing...............................................................................423. Observasi .............................................................................434. Metode Wawancara ...........................................................435. Metode Eksperimen ............................................................433.4 Analisis Sistem ...............................................................................443.5 Perancangan Jaringan..................................................................453.6 Implementasi Sistem ...................................................................463.7 Pengujian Sistem .........................................................................461. Uji Kelayakan ...........................................................................462. Strees testing ...........................................................................47BAB IV HASIL DAN PEMBAHASAN..484.1 Analisis dan Perancangan .491. Analisis Sistem.512. Perancangan Jaringan 504.2 Implementasi 521. Perangkat yang dibutuhkan .522. Konfigurasi EoIP ..533. Membuat Certificate Key .584. Instalasi Certificate ke mikrotik ..595. Konfigurasi SSTP .624.3 Pengujian

1. Pengujian Kelayakan 662. Pengujian Strees Testing ..78BAB V KESIMPULAN DAN SARAN..82A. Kesimpulan.82B. Saran..83DAFTAR PUSTAKA

LAMPIRANDAFTAR GAMBARGambar 2.1. Implementasi EoIP ..16

Gambar 2.2. Implementasi VPN 19

Gambar 2.3. Implementasi VPN PPTP ..20

Gambar 2.4 Implementasi VPN PPOE ..21

Gambar 2.5 Implementasi SSTP 22

Gambar 2.6 Distro Linux ..23

Gambar 2.7 Tampilan Wireshark ..24

Gambar 2.8 Kedudukan Network Forensics ..25

Gambar 2.9 Format Pesan Protokol ARP 26

Gambar 2.10 Hasil Eksekusi aplikasi ping ..26Gambar 2.11 Format Protokol UDP 29

Gambar 2.12 Format Protokol DNS .30

Gambar 2.13 Arsitektur Protokol 802.11 31

Gambar 2.14 Model OSI Layer .32

Gambar 2.15 Diagram Information Security .38

Gambar 3.1 Rancangan EoIP Over SSTP 44

Gambar 4.1 Kondisi jaringan Lab teknik Informatika saat ini 50Gambar 4.2 Desain Rancangan Topologi EoIP Over SSTP .51Gambar 4.3 Winbox .54Gambar 4.4 Konfigurasi IP Address Router Lab 1 ..54Gambar 4.5 Konfigurasi IP Address Router Lab 2 54Gambar 4.6 Konfigurasi Client ...56Gambar 4.7 Tes Koneksi Antar lokal lab 1 dengan lab 2 57Gambar 4.8 Sharing File 57Gambar 4.9 Interface EoIP yang sudah berjalan .58Gambar 4.10 Certififcate Key .. 60Gambar 4.11 Memindahkan File Certificate ..60Gambar 4.12 Hasil transfer di File List Mikrotik.61Gambar 4.13 Import Certificate Key .62Gambar 4.14 NTP Client di Mikrotik .63Gambar 4.15 Konfigurasi Waktu .63Gambar 4.16 Address List SSTP ..65Gambar 4.17 Tes Ping ke Jaringan Lokal Sebelah .66Gambar 4.18 Tes Sharing File .67Gambar 4.19 Tampilan Option pada Wireshark ..68Gambar 4.20 Proses sniffing EoIP ..69

Gambar 4.21 Hasil Sniffing EoIP ..69Gambar 4.22 Interface List menunjukan EoIP server sudah berjalan ..70Gambar 4.23 Halaman Option wireshark sniffing SSTP ..71Gambar 4.24 Tampilan wireshark EoIP over VPN SSTP setelah dijalankan71Gambar 4.25 Hasil Sniffing EoIP Over SSTP .72Gambar 4.26 Grafik Sebelum menggunakan EoIP over VPN metode SSTP..76

Gambar 4.27 Grafik Sesudah menggunakan EoIP over VPN metode SSTP..77

Gambar 4.28 Grafik Hasil Pengujian Metode Stress Testing 81DAFTAR TABELTabel 2.1 Perbandingan Penelitian Terdahulu........................................... 9Tabel 2.2 Pembagian Kelas Alamat IP .................................12Tabel 2.3 Subneting 14Tabel 2.4 Blok Alamat IP Private ..14Tabel 3.1 Tabel Pengujian Uji Kelayakan .47

Tabel 3.1 Tabel Pengujian Menggunakan Strees Testing . 48Tabel 4.1 Tabel Daftar Nama Responden Pengujian Uji Kelayakan.. 71Tabel 4.2 Tabel Pertanyaan Uji Kelayakan Sebelum EoIP Over VPN SSTP.. 73Tabel 4.3 Tabel Daftar Pertanyaan Hasil Uji Kelayakan EoIP over VPN SSTP 74Tabel 4.4 Tabel Resume Hasil Pengujian Uji Kelayakan .. 76

Tabel 4.5 Tabel Daftar Nama Responden Stress Testing .. 78Tabel 4.6 Tabel Pengujian Menggunakan Stress Testing . 79DAFTAR KODE SCRIPTKode Script 4.1 Konfigurasi IP address Router 1 .55

Kode Script 4.2 Konfigurasi IP address Router 2 ..55

Kode Script 4.3. Konfigurasi EoIP pada Router Lab 2 55Kode Script 4.4. Konfigurasi EoIP pada Router Lab 2 .55Kode Script 4.5. Konfigurasi bridge antara interface EoIP dengan Lokal 56Kode Script 4.6. Membuat CA .59Kode Script 4.7. Membuat certificate private key .59Kode Script 4.8 . Membuat Client Key 59Kode Script 4.9. Memeriksa Certificate key 59Kode Script 4.10 Konfigurasi NTP ..63

Kode Script 4.11. Konfigurasi Server SSTP di Lab 1 64Kode Script 4.12 Konfigurasi SSTP Client di Lab 2 ..64Kode Script 4.13 Konfigurasi EoIP Lab 1 setelah SSTP aktif . 65Kode Script 4.14 Konfigurasi EoIP Lab 2 setelah SSTP aktif ...66ixiii

xiv