Improving Virtual Private Network Security Using Mikrotik-Based IKE/IPSEC Protocol
##plugins.themes.bootstrap3.article.main##
Abstract
This research discusses protocols VPN (Virtual Private Network), namely PPTP, SSTP, L2TP, and IPsec, analyzes the authentication methods used in each protocol. The method used in this research is qualitative and involves testing the connectivity, authentication and configuration used in each VPN protocol. The parameters used in this research are configuration complexity, flexibility, security and the time required to connect to the VPN network. In the IKE/IPsec protocol, a comparison authentication analysis between Pre-Shared Key and certificate is carried out. Authentication using certificates is proven to be more secure even though it requires more complicated configuration compared to Pre-Shared Key. . The result of this research is the use of IKE / IPsec protocol has flexibility and good security. The algorithms in this protocol can be selected according to the needs and desired security.
##plugins.themes.bootstrap3.article.details##
Alsa’deh, A., Meinel, C., Westphal, F., Gawron, M., & Groneberg, B. (2013). CGA integration into IPsec/IKEv2 authentication. SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, 326–330. https://doi.org/10.1145/2523514.2527097
Arini, MT, & Patmono, G. (2015). Analisis dan Pengujian Permasalahan Pada Sistem Remote Access IPsec. FST UIN Syarif Hidayatullah.
Dr. Degdo Suprayitno, Dr. Ahmad, Tartila, Dr. Ir. H. Sa’dianoor, & Dr. Yuri Alfrin Aladdin. (2024). METODOLOGI PENELITIAN KUALITATIF : Teori Komprehensif dan Referensi Wajib bagi Peneliti. PT. Sonpedia Publishing Indonesia.
Marwa, A., Malika, B., & Nacira, G. (2013). Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol. 2013 World Congress on Computer and Information Technology, WCCIT 2013, 1–5. https://doi.org/10.1109/WCCIT.2013.6618745
Nana, D. I. M. (2022). Optimasi Keamanan Jaringan Point to Point Menggunakan VPN IPSec dan GRE. Jurnal Jupiter, 14(2).
Perlman, R., & Kaufman, C. (2000). Key exchange in IPSec: analysis of IKE. In IEEE Internet Computing. https://doi.org/10.1109/4236.895016
Raisul Azhar. (2017). ANALISA QOS PADA JARINGAN SITE TO SITE VPN MENGGUNAKAN PROTOCOL SSTP. Proceeding Seminar Nasional & Ilmu Sosial 2017.
Reza Arfind, Hendra Supendar, & Riza Fahlapi. (2023). Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik. Jurnal Komputer Antartika, 1(3).
Sadiqui, A. (2020). Computer Network Security. ISTE. https://doi.org/10.1201/9781420093759.ch25
Shaheen, S. H., Yousaf, M., & Majeed, M. Y. (2015). Comparative analysis of Internet Key Exchange protocols. International Conference on Information and Communication Technologies. https://doi.org/10.1109/ICICT.2015.7469595
Sulistiyono, S. (2020). PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK. PROSISKO: Jurnal Pengembangan Riset Dan Observasi Sistem Komputer, 7(2), 150–164. https://doi.org/10.30656/prosisko.v7i2.2523
Tubagus Entus Madhadi, & Lintang Yuniar Banowosari. (2021). Analisis Perbandingan Performasi QoS VPN Encryption Protocol Pada Jaringan Berbasis Hybrid Cloud. Jurnal Ilmiah Komputasi, 20(1). https://doi.org/10.32409/jikstik.20.1.2695
Usanto, U. (2021). RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN. JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA, 1(2), 55–65. https://doi.org/10.56486/jeis.vol1no2.180
Zamalia, W. O., Aksara, L. M. F., & Yamin, Muh. (2018). Analisis Perbandingan Performa Qos, Pptp, L2Tp, Sstp Dan Ipsec Pada Jaringan Vpn Menggunakan Mikrotik. SemanTIK, 4(2), 29–36.