Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan

Authors

  • Prayogi Wicaksana Putra Indonesia University YPTK Padang
  • Febri Hadi Universitas Putra Indonesia YPTK Padang
  • Aulia Fitrul Hadi Universitas Putra Indonesia YPTK Padang

DOI:

https://doi.org/10.35134/komtekinfo.v8i3.128

Keywords:

Virtual Private Network (VPN), Mikrotik, Protokol Tunneling Layer 2 (L2TP), IPsec, Network Development Life Cycle (NDLC)

Abstract

One of the ways to maintain and improve the quality of service and security on the network of an agency of the Barangin Sub-District Office, Sawahlunto City (Central) is to add a VPN feature. Administrators who always monitor the flow of traffic by accessing routers and access points to find out network conditions. There are times when the Administrator is on a public network, he or she cannot access routers and access point devices because the Public IP obtained is Dynamic (random). To solve this problem, it is done through the Network Development Life Cycle (NDLC) method by combining the L2TP and IPsec VPN protocol systems on Mikrotik. A Virtual Private Network (VPN) is a private and secure network using a public network such as the internet. One of the bases for securing VPN technology is Internet Protocol Security (IPSec). IPSec is a protocol used to secure datagram transmission on TCP/IP-based networks. This study aims to design and implement a VPN network system by utilizing a public network, where this system provides advanced security enhancements on the internet network using IPSec. The information/data sent will be confidential with an automatic encryption method through the L2TP tunnel method from the server to the branch/client computer and vice versa. The VPN is implemented using a layer 2 (L2TP) tunneling protocol using two Mikrotik routers. There are few changes to the computer network configuration to minimize costs and implementation time. Tests are carried out to implement security on the network using the command prompt, where the admin observes packet loss and delay parameters to determine the increase in security quality on the network.

References

Pambudi, R., & Muslim, M. A. (2017). Implementasi Policy Base Routing dan Failover Menggunakan Router Mikrotik untuk Membagi Jalur Akses Internet di FMIPA Unnes. Jurnal Teknologi Dan Sistem Komputer, 5(2), 57. doi:10.14710/jtsiskom.5.2.2017.57-61

Doni, F. R. (2019). Implementasi Manajemen Bandwidth pada Jaringan Komputer dengan Router Mikrotik. EVOLUSI : Jurnal Sains dan Manajemen, 7(2). doi:10.31294/evolusi.v7i2.5843.

Setiawan, B., Suryanita, R., & Djauhari, Z. (2017). Prediksi Tingkat Kinerja Struktur Gedung Kantor Berdasarkan Mutu Beton dengan Metode Jaringan Saraf Tiruan. SIKLUS: Jurnal Teknik Sipil, 3(2), 107–116. doi:10.31849/siklus.v3i2.393

Siyamto, Y. (2018). Analisis Kualitas Layanan Jaringan WLAN Dengan Metode QoS Pada Taman Internet Kota Batam. Jurnal Teknik Ibnu Sina (JT-IBSI), 3(2). doi:10.36352/jt-ibsi.v3i2.136.

Simpony, B. K. (2021). Simple Queue Untuk Manajemen User dan Bandwidth di Jaringan Hotspot Menggunakan Mikrotik. Jurnal Informatika, 8(1), 87–92. doi:10.31294/ji.v8i1.9385

Utomo, M. C. C., Mahmudy, W. F., & Anam, S. (2017). Kombinasi Logika Fuzzy dan Jaringan Syaraf Tiruan untuk Prakiraan Curah Hujan Timeseries di Area Puspo – Jawa Timur. Jurnal Teknologi Informasi dan Ilmu Komputer, 4(3). doi:10.25126/jtiik.201743299

Setiawan, E. B. (2012). Analisa Quality Of Services (QoS) Voice Over Internet Protocol (Voip) dengan Protokol H.323 Dan Session Initial Protocol (SIP). Komputa : Jurnal Ilmiah Komputer Dan Informatika, 1(2). doi:10.34010/komputa.v1i2.55.

Amiza, I. D., Lindawati, L., & Soim, S. (2020). Implementasi dan Analisis Quality of Service (QoS) pada OpenMeetings dengan Virtual Private Network (VPN). Jurnal Fokus Elektroda : Energi Listrik, Telekomunikasi, Komputer, Elektronika Dan Kendali), 5(4), 19. doi:10.33772/jfe.v5i4.13325

Rahayu, C., & Hartati, T. (2020). Implementasi Autentikasi Keamanan Dan Manajemen Bandwidth pada Jaringan Internet di SDN 001 Sekupang. doi:10.31219/osf.io/37tdb.

Mufida, E., Irawan, D., & Chrisnawati, G. (2017). Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta. Jurnal Matrik, 16(2), 9. doi:10.30812/matrik.v16i2.7.

Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., & Zorn, G. (1999). Point-to-Point Tunneling Protocol (PPTP). doi:10.17487/rfc2637).

Warman, I., & Hanafi, A. (2019). Analisa Perbandingan Kinerja Generic Routing Encapsulation (GRE) Tunnel dengan Point to Point Protocol Over Ethernet (Pppoe) Tunnel Mikrotik Routeros. Jurnal TeknoIf, 7(1), 58. doi:10.21063/jtif.2019.v7.1..

Nadeau, T., & van, H. (Eds.). (2006). MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. doi:10.17487/rfc4382

Nadeau, T., & van, H. (Eds.). (2006). MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. doi:10.17487/rfc4382.

Information technology. Security techniques. Network security. (n.d.). doi:10.3403/30192110u.

Trihadi, S., Budianto, F., & Arifin, W. (2008). Perancangan Virtual Private Network Dengan Server Linux pada PT. Dharma Guna Sakti. CommIT (Communication and Information Technology) Journal, 2(1), 25. doi:10.21512/commit.v2i1.488

wandanaaris. (2020). Network Security: Interkoneksi Jaringan dengan L2TP + IPSec. doi:10.31227/osf.io/rnw6a.

Desmira, D., & Wiryadinata, R. (2020). Implementasi Jaringan VPN Berbasis Mikrotik: Studi Kasus pada Kantor Kecamatan Walantaka. Jurnal Ilmu Komputer Dan Bisnis, 11(2), 2455–2464. doi:10.47927/jikb.v11i2.8

Downloads

Published

2021-08-14

How to Cite

Prayogi Wicaksana, Hadi, F. ., & Aulia Fitrul Hadi. (2021). Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan. Jurnal KomtekInfo, 8(3), 169–175. https://doi.org/10.35134/komtekinfo.v8i3.128

Issue

Section

Articles