Javascript must be enabled to continue!
Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols
View through CrossRef
In today’s industry, company’s activities are scattered in several locations and need internet for communication purposes. However, it will be dangerous if third-parties have access to their information. One of the solutions for securing information exchange is by using Virtual Private Network (VPN). The VPN protocols that will be used are Point-to-Point Tunneling Protocol (PPTP) with the help of Internet Protocol Security (IPSec). These protocols are simulated in VirtualBox that has been previously installed with two Mikrotik routers and two Windows 7 operating systems. The PPTP and IPSec protocols are configured in both routers through Winbox software. For the computers, the IP addresses are configured along with iPerf software for bandwidth analysis. In this VPN simulation, both computers can communicate with each other and have no problem in accessing the internet. In PPTP’s network, the average bandwidth is 1.293 Mbits/sec. Meanwhile, in PPTP with IPSec’s network, the average bandwidth is 0.853 Mbits/sec. There is a slight difference considering that in PPTP, the data packets are only encapsulated. On the other hand, the data packets in IPSec protocol are both encapsulated and encrypted.
Atma Jaya Catholic University of Indonesia
Title: Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols
Description:
In today’s industry, company’s activities are scattered in several locations and need internet for communication purposes.
However, it will be dangerous if third-parties have access to their information.
One of the solutions for securing information exchange is by using Virtual Private Network (VPN).
The VPN protocols that will be used are Point-to-Point Tunneling Protocol (PPTP) with the help of Internet Protocol Security (IPSec).
These protocols are simulated in VirtualBox that has been previously installed with two Mikrotik routers and two Windows 7 operating systems.
The PPTP and IPSec protocols are configured in both routers through Winbox software.
For the computers, the IP addresses are configured along with iPerf software for bandwidth analysis.
In this VPN simulation, both computers can communicate with each other and have no problem in accessing the internet.
In PPTP’s network, the average bandwidth is 1.
293 Mbits/sec.
Meanwhile, in PPTP with IPSec’s network, the average bandwidth is 0.
853 Mbits/sec.
There is a slight difference considering that in PPTP, the data packets are only encapsulated.
On the other hand, the data packets in IPSec protocol are both encapsulated and encrypted.
Related Results
Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang
Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on...
A Generic High-Performance Architecture for VPN Gateways
A Generic High-Performance Architecture for VPN Gateways
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As netwo...
Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
The use and analysis of IPSec Site to Site VPN simulation with MikroTik devices in a GNS3 emulation environment is discussed in this study. The main objective of this study is to u...
VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS
VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS
Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. This concept paper provides a comprehensive review of security protocols ...
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
This study presents a technical implementation and comparative analysis of a multi-site Wide Area Network (WAN) architecture connecting a central Headquarters (HQ) in Tripoli to th...
PERAN TATA KELOLA PERUSAHAAN DALAM MEMODERASI PENGARUH IMPLEMANTASI GREEN ACCOUNTING, CORPORATE SOCIAL RESPONSIBILITY DAN FIRM SIZE TERHADAP KINERJA KEUANGAN
PERAN TATA KELOLA PERUSAHAAN DALAM MEMODERASI PENGARUH IMPLEMANTASI GREEN ACCOUNTING, CORPORATE SOCIAL RESPONSIBILITY DAN FIRM SIZE TERHADAP KINERJA KEUANGAN
This study examines the role of corporate governance in moderating the influence of green accounting disclosure, corporate social responsibility (CSR), and firm size on the financi...
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
Implementasi VPN dengan Metode IPSEC Site-To-Site Menggunakan Perangkat Fortigate dan Mikrotik pada PT. Adi Mitra Solusi
Implementasi VPN dengan Metode IPSEC Site-To-Site Menggunakan Perangkat Fortigate dan Mikrotik pada PT. Adi Mitra Solusi
Perkembangan teknologi informasi memberikan keuntungan besar bagi perusahaan, terutama dalam keamanan dan efisiensi pertukaran data. PT. Adi Mitra Solusi, yang bergerak di bidang j...

