scholarly journals Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan

KOMTEKINFO ◽  
2021 ◽  
pp. 169-175
Author(s):  
Prayogi Wicaksana ◽  
Febri Hadi ◽  
Aulia Fitrul Hadi

One of the ways to maintain and improve the quality of service and security on the network of an agency of the Barangin Sub-District Office, Sawahlunto City (Central) is to add a VPN feature. Administrators who always monitor the flow of traffic by accessing routers and access points to find out network conditions. There are times when the Administrator is on a public network, he or she cannot access routers and access point devices because the Public IP obtained is Dynamic (random). To solve this problem, it is done through the Network Development Life Cycle (NDLC) method by combining the L2TP and IPsec VPN protocol systems on Mikrotik. A Virtual Private Network (VPN) is a private and secure network using a public network such as the internet. One of the bases for securing VPN technology is Internet Protocol Security (IPSec). IPSec is a protocol used to secure datagram transmission on TCP/IP-based networks. This study aims to design and implement a VPN network system by utilizing a public network, where this system provides advanced security enhancements on the internet network using IPSec. The information/data sent will be confidential with an automatic encryption method through the L2TP tunnel method from the server to the branch/client computer and vice versa. The VPN is implemented using a layer 2 (L2TP) tunneling protocol using two Mikrotik routers. There are few changes to the computer network configuration to minimize costs and implementation time. Tests are carried out to implement security on the network using the command prompt, where the admin observes packet loss and delay parameters to determine the increase in security quality on the network.

2021 ◽  
Vol 6 (4) ◽  
pp. 90-101
Author(s):  
Mohd Faris Mohd Fuzi ◽  
Mohamad Ridzuan Mohd Alias ◽  
Naginder Kaur ◽  
Iman Hazwam Abd Halim

Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.


2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Dahnial Dahnial

<p align="center"><strong>ABSTRACT</strong></p><p><em>The internet as a data transmission backbone has security threats in sending data. To overcome the security problem of every data communication that is done through a public network (public network), then a connection is needed that requires a connection between workstations running privately, so that only workstations that have access can connect, by using a virtual private network or VPN. The advantage of a VPN is that data sent over an encrypted VPN is quite safe and the secret is maintained even through the internet network because the data sent will go through the tunnel. Tunneling itself is a method for transferring data from one network to another by using a veiled internet network. Two protocols can be chosen in a VPN, namely Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). However, the performance of each of these protocols is unknown yet. To find out the performance of the two protocols we need a test with a simulation method. Using a Mikrotik router and Wireshark application with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput on 2 clients connected to the mikrotik router and each client uses a different protocol. All clients will stream videos simultaneously to get a data packet capture. The test results will be grouped into four categories, namely bad, moderate, good and very good. It is expected that data will be able to show the quality of service of both protocols. so that it can be used as a reference in the selection of VPN protocol to be used.</em></p><p><strong><em>Keywords: </em></strong><em>Quality of Service, PPTP, L2TP</em></p><p align="center"><strong>ABSTRAK</strong></p><p><em>Internet sebagai backbone pengiriman data memiliki ancaman keamanan dalam pengiriman data. Untuk mengatasi masalah keamanan setiap komunikasi data yang dilakukan melalui jaringan publik (public network) maka diperlukan suatu mekanisme yang memungkinkan koneksi antar workstation berjalan secara private, sehingga hanya workstation yang memiliki akses yang dapat saling terhubung, dengan cara memanfaatkan virtual private network atau VPN.</em> <em>Keuntungan VPN adalah data yang dikirimkan melalui VPN terenkripsi sehingga cukup aman dan rahasianya tetap terjaga meskipun melalui jaringan internet, karena data yang dikirim akan melalui tunnel.</em> <em>Tunneling sendiri merupakan metode untuk transfer data dari suatu jaringan ke jaringan lain dengan memanfaatkan jaringan internet secara terselubung. Terdapat dua protokol yang dapat dipilih dalam VPN yaitu Point to Point Tunneling Protocol (PPTP) dan Layer 2 Tunneling Protocol (L2TP). Akan tetapi belum diketahui performa dari masing – masing protokol tersebut. Untuk mengetahui kinerja dari kedua protokol tersebut diperlukan sebuah pengujian dengan metode simulasi. Menggunakan router mikrotik dan aplikasi Wireshark dengan parameter Quality of Service (QoS) yang terdiri dari Packet Loss, Delay, dan Throughtput pada 2 client yang terhubung ke router mikrotik dan setiap client akan menggunakan protokol yang berbeda. Semua client akan melakukan video streaming secara bersamaan untuk mendapatkan capture paket data. Hasil pengujian akan dikelompokkan menjadi empat kategori, yaitu kategori buruk, sedang, bagus dan sangat bagus. Diharapkan akan dihasilkan sebuah data yang dapat menunjukkan kualitas dari layanan kedua protokol tersebut. sehingga dapat dijadikan acuan dalam pemilihan protokol vpn yang akan digunakan.</em></p><strong><em>Kata kunci:</em></strong><em> Quality of Service, PPTP, L2TP</em>


2019 ◽  
Vol 7 (01) ◽  
pp. 60
Author(s):  
I Kadek Susila Satwika

The need to access data remotely is a person's need to be more efficient in doing a job. Currently there are many remote access application programs, one of which is TeamViewer by utilizing the internet public network. By installing a TeamViewer program on a client and server computer someone can do data work and repair remotely as long as it is connected to the internet. To be able to do remote access, of course, a client must already know the user and password from the server computer. The disadvantage of TeamViewer is that other people will easily remote access data simply by entering the user and password that the computer has on the server. To overcome this problem, VPN technology is used with the PPTP protocol where only the IP address of the client that has been registered on the proxy device can access data on the server. VPN allows clients to connect to the server privately through public networks. To find out the performance of the VPN network that is built, QoS (Quality of Service) parameter analysis is needed which includes delay, jitter, throughput and packet loss. From the results of the tests carried out, the results of QOS with an index of 3.75, which if converted to the standard TIPHON, VPN network at STMIK STIKOM Indonesia has a satisfactory quality.


Author(s):  
Alok Vishwakarma

Virtual Private Network, Its ‘Virtual', Its ‘Private' and it's a ‘Network'. A virtual private network (VPN) provides a secure connection between a sender and a receiver over a public non-secure network such as the Internet. A secure connection is generally associated with private networks. (A private network is a network that is owned, or at least controlled via leased lines, by an organization.). We can define a VPN by the following relationship: VPN = Tunneling + Security + QoS Parameters. This Chapter deals with Advantages of VPNs, Types of VPNs, VPN Architectures, VPN Models, VPN Devices, Technologies and Protocols Used to Enable Remote Access VPNs.


Author(s):  
Yesha Bhatt ◽  
Dr. Priyanka Sharma ◽  
Jatin Patel

In the present advanced time, innovation plays a vital part inside the improvement of business, E-commerce, and Finance. In present days Network security become a significant thought. Internet gives a great facility to everyone like internet banking, Online shopping, Communications, organizations or associations. Therefore, the online exchange of cash requires the most extreme security of secret information put away or move over the Internet. The security of these exchanges has made it more important because of the high impact of Cybercrimes on a Digital Money. Because of the high-speed advancement of computerized devices and their appearance to the Internet made insecure client’s information. Now a days, security and privacy threats has become increasingly more complex which enhance the necessity for a modernized ensured medium to get the significant information into the internet. In this paper, presented Virtual Private Network (VPN) is an excellent method to secure devices and data from the hackers. VPN is a private network which works over a public network transit the encrypted data so that hackers are not able to use it. The reason for VPN is to give the different security model like Authenticity, Confidentiality and Integrity of data that is the reason these are getting trendy, low in budget and simple to utilize. VPN services are accessible for smart phones, PCs and tablets. It is a rising innovation which assumes a significant part in WLAN by giving secure information transmission over Internet.


Respati ◽  
2020 ◽  
Vol 15 (2) ◽  
pp. 16
Author(s):  
Lukman Lukman ◽  
Aiman Mukhlishah

INTISARIKinerja jaringan yang buruk tentu akan berdampak buruk pada kerugian bagi sebuah perusahaan atau instansi, ketika kinerja jaringan yang digunakan oleh perushaan berubah menjadi lambat, pasti sangat berpengaruh terhadap kinerja perusahaan itu sendiri, terlebih jika sebuah perusahaan selalu bergantung pada internet untuk kelancaran bisnisnya. Semakin banyaknya perusahaan perusahaan yang membutuhkan kinerja jaringan yang cepat dan aman maka untuk mengatasi hal tersebut, ada beberapa metode yang bisa digunakan seperti banyaknya pilihan metode VPN (Virtual Private Network).Teknologi VPN adalah suatu komunikasi dalam jaringan sendiri yang terpisah dari jaringan umum. Private network sendiri dianggap lebih efisien karena kecepatan transfer data yang lebih besar dari pada kecepatan transfer data pada jaringan Internet, selain itu masalah keamanan dianggap lebih bagus karena hanya bergerak dalam lingkup terbatas saja. Secara umum, VPN adalah sebuah proses dimana jaringan umum (public network atau internet) diamankan kemudian difungsikan menjadi sebuah jaringan privat (private network). Sebuah VPN tidak didefinisikan oleh rangkaian khusus atau router, tetapi didefinisikan oleh mekanisme keamanan dan prosedur-prosedur yang hanya mengijinkan penggunanya yang ditunjuk akses ke VPN dan informasi yang mengalir melaluiya.Masalah yang dihadapi saat ini yaitu ketika performa jaringan yang lambat akan berpengaruh pada kinerja perusahaan, untuk berhubungan antar kantor menggunakan internet dan email untuk mengirim data dan berkomunikasi maka dibutuhkan jaringan privat untuk memudahkan mengakses file terhadap suatu tempat yang berbeda lokasi. Namun dalam Pemilihan VPN yang akan digunakan memungkinkan kurang tepatnya pemilihan metode yang  digunakan dalam mengelola jaringan intranet untuk perusahaannya.Dari uraian diatas maka penulis melakukan analisis perbandingan sebuah teknik tunneling dengan menggunakan SSTP dan L2TP+IPSec.  SSTP dan L2TP+IPSec merupakan protokol jaringan yang dapat melindungi jaringan dari ancaman luar seperti konflik IP, MAC dan DHCP server jahat, serta membuat performa jaringan lebih baik, dengan metode penggunaan jalur tersendiri yang di lalui atau dilewati. Dari kedua metode  tersebut penulis melakukan perbandingan performa jaringan ketika di terapkan metode SSTP dan L2TP+IPSec sehingga mengetahui performa jaringan mana yang lebih bagus dan cocok digunakan sesuai dengan kebutuhan pengguna.Hasil dari penelitian ini diharapkan dapat membantu siapapun untuk menentukan metode tunneling VPN yang akan digunakan kelak dalam suatu jaringan. Sedangkan dari hasil penelitian bisa diambil kesimpulan bahwa L2TP+IPSec lebih baik dibanding SSTP, dinilai dari parameter QOS yang sudah diuji dan dibandingkan.Kata kunci: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service ABSTRACTPoor network performance will certainly have a bad impact on losses for a company or agency, when the network performance used by the company turns out to be slow, it must be very influential on the performance of the company itself, especially if a company always relies on the internet for the smooth running of its business. More and more companies need fast and secure network performance. To overcome this, there are several methods that can be used such as the choice of VPN (Virtual Private Network) methods.VPN technology is communication within one's own network that is separate from public networks. Private network itself is considered more efficient because the data transfer speed is greater than the data transfer speed on the Internet network, besides that security issues are considered better because it only moves in a limited scope. In general, VPN is a process in which a public network (public network or internet) is secured and then functioned as a private network. A VPN is not defined by a specific circuit or router, but is defined by security mechanisms and procedures that only allow their designated users access to the VPN and the information that flows through it.The problem currently faced is when slow network performance will affect company performance, to connect between offices using the internet and email to send data and communicate, then a private network is needed to facilitate accessing files to a different location. However, the selection of VPNs that will be used allows less precise selection of methods used in managing intranet networks for the company.From the description above, the authors conducted a comparative analysis of a tunneling technique using SSTP and L2TP + IPSec. SSTP and L2TP + IPSec are network protocols that can protect networks from external threats such as IP, MAC and DHCP server conflicts, and make network performance better, by using separate paths that are traversed or traversed. From these two methods, the writer makes a comparison of network performance when applied SSTP and L2TP + IPSec methods so that it knows which network performance is better and is suitable for user needs.The results of this study are expected to help anyone determine the VPN tunneling method that will be used later in a network. While the results of the study can be concluded that L2TP + IPSec is better than SSTP, judged by the QOS parameters that have been tested and compared.Keywords: Tunneling, VPN, SSTP, L2TP, IPSec, Quality Of Service


Author(s):  
PARDEEP MEHTA ◽  

The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need a way to maintain fast, secure and reliable communications wherever their offices are. Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines can become quite expensive and often rises in cost as the distance between the offices increases. As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came Intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices.


Author(s):  
Indrani Palanisamy ◽  
Hamed Abdulla Hamed Al-Bulushi

This exploratory study analyzed the current complications in the Manufacturing organizations for transferring files between two or more sites in-between an organization over an unsecured network communication. Based on the analysis we provide reliable implementation by an appropriate solution to improve and develop the performance of the network communication to help the company to progress the quality of work. The initial phase of the study analyses about Virtual Private Network (VPN) based on the network layers and identifies the underneath difficulties in VPN while data travels over the network in the form of encapsulation and the traffic of the fundamental network. Because of such an encapsulation technique used in VPN, it increases the network traffic which affects the bandwidth of a low-speed internetworking communication. By analyzing various case studies, it was identified Multiprotocol Label Switching (MPLS) technology gives a feasible solution to put the network communication on the right track. It creates secure and reliable connectivity between organization sites and was effectively implemented in the place where slow speed network for connectivity between organizations are found. The recommending this MPLS solution, it helps organizations to share and effectively utilize the servers and service between organizations for secure, reliable and effective communication. Also by considering network security factor as a very significant factor for any network, we have also implemented the Firewall which provides appropriate defense for networks that prevents from internal and external threats. At the same time, the solution also provides support to Wireless LAN Controller (WLC) for providing easy manage and control all wireless access point.     Keywords: Firewall, Multi-protocol Label Switching (MPLS), Servers, Virtual  Private Network (VPN), Wireless LAN Controller (WLC).


2020 ◽  
Vol 8 (6) ◽  
pp. 2236-2339

Network security becomes a major consideration of the current era. Internet provides an enormous ease in almost all the regions like online banking, online shopping, communications, businesses or organisations. Thus, the communication network requires the security of the confidential data stored or transfer over the internet. Due to the quick development of computerized gadgets and their entrance to the internet caused insecurity to user data. Now a days, security and privacy threats has become more and more complicated which amplify the requirement for a modernized protected medium to secure the valuable data into the internet. In this paper, introduced Virtual Private Network (VPN) is a great way to protect devices and information from the hackers. VPN is a private network which operates over a public network transit the encrypted information so that attackers are not able to use it. The purpose of VPN is to provide the different security elements such as authenticity, confidentiality and data integrity that’s why these are becoming trendy, low-priced and easy to use. VPN services are available for smart phones, computers and tablets. This paper also concerns about the development, protocols, tunnelling and security of VPN. It is a rising technology which plays a major role in WLAN by providing secure data transmission over Internet.


2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


Sign in / Sign up

Export Citation Format

Share Document