Perkembangan jaringan internet sudah tidak terbendung lagi,
hal ini dapat menyebabkan potensi terjadinya ancamanan didalam dunia intenet.
Penggunaan Virtual Private Network (VPN) nampaknya menjadi salah satu metode
keamanan jaringan yang sangat baik dalam melakukan pendistribusian layanan
paket data didalam jaringan internet. Penggunaan VPN mampu memangkas alokasi penggunaan
bandwidth serta meminimalisir terjadinya kebocoran terhadap paket data yang
sedang ditransfer. Site to Site merupakan salah satu metode VPN IPSec Tunneling
yang sering digunakan untuk menghubungkan antara lokasi yang berbeda agar
menjadi satu kesatuan network. Penggunaan IPSec dapat melindungi transfer data
antara host to host, network to network hingga network to host dikarenakan
melakukan pengenkripsi terhadap paket data yang ditransfer. Hasil pengujian
dalam pengimplementasian jaringan Site to Site IP Security Virtual Private
Network With Algorithm Encryption ISAKMP didapatkan pengurangan hops terhadap
jaringan yang menggunakan tunnel dengan Time to Live (TTL)=126 sedangkan
jaringan tanpa menggunakan tunnel memiliki nilai TTL sebesar 124.
Analisis Performa Site to Site IP Security Virtual Private Network (VPN) Menggunakan Algoritma Enkripsi ISAKMP (Performance Analysis Site to Site IP Security Virtual Private Network (VPN) with Algorithm Encryption ISAKMP) peer reviwer
[1] F. A.
Salman, “Implementation of IPsec-VPN Tunneling using GNS3,” Indones. J. Electr. Eng. Comput. Sci.,
vol. 7, no. 3, pp. 855–860, 2017.
[2] A. A.
Eskandar, M. R. Syed, and M. B. Zarei, “SIP over
IP VPN : Performance
Analysis,” in Computer Engineering and Applied
Computing (WorldComp),
2014, vol. 1, no. 1.
[3] I. AFRIANTO
and E. B. SETIAWAN, KAJIAN VIRTUAL
PRIVATE NETWORK ( VPN ) SEBAGAI SISTEM PENGAMANAN ( Studi Kasus Jaringan
Komputer
Unikom ), vol. 12, no. 1. 2014.
[4] S. R. Ahmed
and P. Rajamohan, “Comprehensive performance analysis and special issues of
Virtual Private Network strategies in the computer communication: A novel
study,” Int. J. Eng. Sci. Technol.,
vol. 3, no. 7, 2013.
[5] D.
Tjahjono, R. Shaikh, and W. Ren, “ESTABLISHING AN IPSEC (INTERNET PROTOCOL
SECURITY) VPN (VIRTUAL PRIVATE NETWORK) TUNNEL,” US 8,893,262 B2, 2014.
[6] R. A. May,
“POLICY-BASED CONFIGURATION OF INTERNET PROTOCOL SECURITY FORA VIRTUAL PRIVATE
NETWORK,” US 9,065,802 B2,
2015.
[7] D.
Suprijatmono and D. S. Kartawijaya, “Rancang Bangun Jaringan PABX Berbasis IP
Menggunakan Metode IPsec VPN Gateway,” Sainstech,
vol. 28, no. 2, pp. 39–49, 2018.
[8] R. Arlan,
R. Munadi, and N. Andini, “IMPLEMENTASI DAN ANALISIS SISTEM
KEAMANAN IP SECURITY (IPSEC) DI DALAM
MULTI PROTOCOL LABEL SWITCHINGVIRTUAL PRIVATE NETWORK
(MPLS-VPN) PADA LAYANAN BERBASIS IP MULTIMEDIA SUBSYSTEM (IMS),” e-Proceeding Eng. , vol. 3, no. 3, pp.
4630–4640, 2016.
[9] F.
Bensalah, E. Casablanca, and N. EL KAMOUN,
“Analytical performance and Evaluation of the
Scalability of Layer 3 Tunneling Protocols: Case of Voice Traffic Over IP,” IJCSNS Int. J. Comput. Sci. Netw. Secur.,
vol. 17, no. May, pp. 361–369, 2017.
[10] M. Elezi
and B. Raufi, “Conception of Virtual Private Networks using IPsec suite of protocols
, comparative analysis of distributed database queries using different IPsec
modes of encryption,” Procedia - Soc.
Behav. Sci., vol. 195, pp. 1938–1948, 2015.
[11] C. Wang and
J. Chen, “Implementation of GRE Over
IPsec VPN Enterprise Network Based on Cisco Packet
Tracer,” in 2nd International Conference on Soft
Computing in Information Communication Technology, 2014.
[12] C. Paquet, Implementasi Cisco IOS Network Security
(IINS) Foundation Learning Guide Second Edition, 2nd ed. USA: Cisco Press,
2013.
[13] A. M.
Gamundani and M. Bere, “A VPN Security
Solution for Connectivity over Insecure Network
Channels : A A VPN Security Solution for Connectivity over Insecure Network
Channels : A novel study .,” SSRG Int. J.
Comput. Sci. Eng., vol. 1, no. October, pp. 1–8, 2014.
[14] G.
Aggarwal, P. Shah, A. Thrivikramannair, and D.
Blair, “TECHNIQUE FOR USING OER WITH AN ECT SOLUTION
FOR MULT-HOMED SITES,” US
8,706,883 B2, 2014.
[15] S. Frankel
and S. Krishnan, IP Security (IPsec) and
Internet Key Exchange (IKE) Document Roadmap (No. RFC 6071). 2011.