Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols

View through CrossRef
In today’s industry, company’s activities are scattered in several locations and need internet for communication purposes. However, it will be dangerous if third-parties have access to their information. One of the solutions for securing information exchange is by using Virtual Private Network (VPN). The VPN protocols that will be used are Point-to-Point Tunneling Protocol (PPTP) with the help of Internet Protocol Security (IPSec). These protocols are simulated in VirtualBox that has been previously installed with two Mikrotik routers and two Windows 7 operating systems. The PPTP and IPSec protocols are configured in both routers through Winbox software. For the computers, the IP addresses are configured along with iPerf software for bandwidth analysis. In this VPN simulation, both computers can communicate with each other and have no problem in accessing the internet. In PPTP’s network, the average bandwidth is 1.293 Mbits/sec. Meanwhile, in PPTP with IPSec’s network, the average bandwidth is 0.853 Mbits/sec. There is a slight difference considering that in PPTP, the data packets are only encapsulated. On the other hand, the data packets in IPSec protocol are both encapsulated and encrypted.
Title: Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols
Description:
In today’s industry, company’s activities are scattered in several locations and need internet for communication purposes.
However, it will be dangerous if third-parties have access to their information.
One of the solutions for securing information exchange is by using Virtual Private Network (VPN).
The VPN protocols that will be used are Point-to-Point Tunneling Protocol (PPTP) with the help of Internet Protocol Security (IPSec).
These protocols are simulated in VirtualBox that has been previously installed with two Mikrotik routers and two Windows 7 operating systems.
The PPTP and IPSec protocols are configured in both routers through Winbox software.
For the computers, the IP addresses are configured along with iPerf software for bandwidth analysis.
In this VPN simulation, both computers can communicate with each other and have no problem in accessing the internet.
In PPTP’s network, the average bandwidth is 1.
293 Mbits/sec.
Meanwhile, in PPTP with IPSec’s network, the average bandwidth is 0.
853 Mbits/sec.
There is a slight difference considering that in PPTP, the data packets are only encapsulated.
On the other hand, the data packets in IPSec protocol are both encapsulated and encrypted.

Related Results

Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang
Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on...
A Generic High-Performance Architecture for VPN Gateways
A Generic High-Performance Architecture for VPN Gateways
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As netwo...
Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
The use and analysis of IPSec Site to Site VPN simulation with MikroTik devices in a GNS3 emulation environment is discussed in this study. The main objective of this study is to u...
VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS
VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS
Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. This concept paper provides a comprehensive review of security protocols ...
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
This study presents a technical implementation and comparative analysis of a multi-site Wide Area Network (WAN) architecture connecting a central Headquarters (HQ) in Tripoli to th...
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
Implementasi VPN dengan Metode IPSEC Site-To-Site Menggunakan Perangkat Fortigate dan Mikrotik pada PT. Adi Mitra Solusi
Implementasi VPN dengan Metode IPSEC Site-To-Site Menggunakan Perangkat Fortigate dan Mikrotik pada PT. Adi Mitra Solusi
Perkembangan teknologi informasi memberikan keuntungan besar bagi perusahaan, terutama dalam keamanan dan efisiensi pertukaran data. PT. Adi Mitra Solusi, yang bergerak di bidang j...

Back to Top