You are on page 1of 10

Created By Validated

Standar Operational Procedure


NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 1 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

A. PURPOSE
The purpose of making this Standard Operational Procedure is to provide guidelines for access
within the internal network (LAN) as well as access from outside the Internal Network into the
internal network for corporate purposes.

B. SCOPE
The scope or scope of this SOP includes access services within the internal network / Local area
Network as well as access from outside the company / external access to the internal network for
both Employees, Management and from Third Parties in this case the Vendors who cooperate with
PT. CCH Indonesia .

C. REFERENCE
• LAN : LAN (Local Area Network) a computer network that only covers the local area. This means
that this network can only be used by users in the LAN area. LAN connects the device to the
internet network through a simple network device.
• WiFi : (Wireless Fidelity) technology that utilizes electronic equipment to exchange data
wirelessly (using radio waves) over a computer network, including high-speed Internet connections
• Employee: a person who serves as a worker in a company or institution to carry out the
operations of his workplace with remuneration in the form of money.
• Leader: person who is authorized by the company to run the company on behalf of the
entrepreneur.
• Third Party: A party outside the company that cooperates with the company to carry out its
business activities.
• IT Department: Department within a company that handles Network and Telecommunications
for smooth communication of both data and voice.
• Phishing: an attempt to obtain information on someone's data by using phishing techniques. The
data targeted by phishing are personal data (name, age, address), account data (username and
password), and financial data (credit card information, accounts).
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 2 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

• VPN: (Virtual Private Network) is a connection service that gives you access to websites securely
(secure) and privately (private) by changing the connection path through the server and hiding the
data exchange that occurs.
• Hacking : The act of finding an entry point (Entrance) that may exist in a computer system or
computer network and until it successfully takes over.
• RJ45: an ethernet cable connector that functions as a connector on a LAN (Local Area Network)
computer network topology and other network topologies

D. GENERAL PROVISIONS
1. PT.CCH Indonesia employees who have been determined (Office, Manager, Staff) and
PT.CCH Indonesia guests can use the network/Internet available in the company.
2. Guest access can only be done through a Wifi connection, which must request
authorization/permission from the party who has the authority or the IT Department to
access it.
3. Employees can use local network access without a password except for access that
requires authorization or authentication through a portal with a single account in certain
applications.
4. Employees who have obtained permission to use computers are required to change the
standard password provided every 90 days and report it to the IT Department.
5. Employees are not allowed to make configuration changes to the computer without the
permission of the IT Department.
6. Employees who have been determined to access certain applications (ECC, ERP, etc.) are
prohibited from changing passwords without the permission of the IT department.
7. Employees are not allowed to bring their own IT devices (Laptop, Flashdisk, External Hard
Drive, etc.) using the local network or the Internet.
8. Employees are not allowed to do Phishing activities, or Hacking activities.
9. Employees are not allowed to access blocked or sensitive material belonging to the
company.
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 3 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

10. Access to websites or domains containing pornography, pornography, gambling, social


media is not permitted.
11. The size of the file sent via E-mail is not more than 5 MB, if the file size exceeds the
specified one, it can be uploaded to cloud storage and provide a download link to the
recipient of the Email to download it.

E. DESCRIPTION OF PROCEDURE
 Internal Network Access Procedure (LAN)
o The Head of Division/Production/Office will inform or submit a request for
computers or access to the Local Network or the internet to the IT
Department.
o The IT Department will carry out checks and checks and validate the
submission data to the Management.
o If the management does not agree/Reject then the application or access
request is cancelled.
o If the request is approved, the Department will carry out a number of
preparations such as, computer equipment, account creation by considering
the user level, user data and user needs based on information from
management.
o Employees who have been appointed receive a set of computers equipped
with standard passwords and must change them every 90 days.
o Naming computers in accordance with the order of computers given to
employees.
o Every computer gets access to local Network and Internet.
o Employees are given access to CCHFS (File Server) according to their position
and department.
O Employees who are given access to company applications such as ECC, ERP,
TPB3 etc. are not allowed to change passwords or share passwords without
the permission of the IT Department or the authorized department.
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 4 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

o The computer is connected via a wall-mounted RJ45 cable or via Wifi.


o For PT.CCH Indonesia Guests, access is only allowed to use Wifi Connections,
both HP and Laptops by asking permission from the authorized department.
o Foreign devices detected accessing the Internal network via Wifi without
information to the IT department will be temporarily or permanently
blocked.
 Internal/External Network Access Procedures
o Employees or third parties request permission to access the internal
network from a party who has network authority or the IT Department at
least 1 day in advance.
o The party who has the authority or the IT Department will evaluate the
access request from the employee or third party.
o If the request is approved then the access is given along with the password
to access it.
o Employees or third parties can access via VPN into PT.CCH's internal
network through the VPN connection.
o On the client's computer/smartphone, all you have to do is enter the login
data and password provided by the IT department and approved by the
party who has the authority in this case Management.
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 5 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

F. PROCEDURE FLOW DIAGRAMS


F1. LAN Access Application Flowchart

START

Submission of Computer/Network
Access from Head of Section.

NO
submission
validation

YES
 Computer Setup
 Account Creation
 Comp+User
Configuration

Handover of Computers and


Access Permits to Employees

FINISH
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 6 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

F2. Flowchart of Requesting Access From Outside/External To Internal Network (VPN)

START

Employee/Third Party
Applying for Network
Access

Network Access
Request
Validation

Provision of Login and Password


Data

NO
Access Done

Yes
Device Check
Change Password

FINISH
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 7 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

HOW TO ACCESS INSTRUCTIONS THROUGH VPN


1. On the computer, open the start menu on the menu in the lower left corner of the computer
monitor screen.

2. Click on the PC Settings menu and select Network.


3. On Network select Menu on the left and select Connection
4. On the connection menu, select the menu on the left, namely VPN
5. On the VPN Menu select Add New Connection
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 8 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

6. On the New Connection Menu, enter the login data as follows:


VPN Provider : Microsoft
Connection Name : VPN CCH
Server Name/Address : 202.150.139.158
Type Of Sign info : User Name and Password
User Name : SYSOP
Password : User*6491
Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 9 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

7. After the login data is input in the new connection a VPN CCH will appear
8. Click on Network (Location on Taskbar Bottom right of Monitor Screen) to bring up
VPN CCH Virtual Adapter

9. Click VPN CCH to access Internal Network via VPN CCH


Created By Validated
Standar Operational Procedure
NETWORK ACCESS

No. Documen Revise Date Page


(..........................) (..........................)
Distribution 02/IT/X/2021 2 24/08/2023 Page 10 Of 10 Doni Hadhika / IT Cora Ko/ Director
Code

10. Make sure the network computer has appeared a virtual adapter, namely VPN CCH
11. Check on the server in the VPN > PPTP Server section that the client is connected

12. Finish

You might also like