Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang

View through CrossRef
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on a server and can be accessed by clients, such as at the Malang State Polytechnic. As an institution engaged in the world of education, the development of data communication is centralized by utilizing the established intranet network. The use of an intranet network allows for data communication that is vulnerable to eavesdropping. To overcome this, use a VPN network. PPTP VPN and L2TP/IPsec VPN have different performances, especially in the level of security provided. In this study, the performance analysis of the PPTP VPN and L2TP/IPsec VPN networks was carried out which was implemented on an FTP Server on a Raspberry Pi server and a Mikrotik router for the VPN configuration. In this study, we designed PPTP VPN and L2TP/IPsec VPN by configuring the Mikrotik RB9412nD-TC router and configuring FTP Server using the proftpd application on the Raspberry Pi server. For security analysis using hacking method to get VPN Server login data and sniffing method to get FTP Server login data, FTP data. For performance analysis using parameters delay, throughput, and packet loss.
Title: Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang
Description:
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on a server and can be accessed by clients, such as at the Malang State Polytechnic.
As an institution engaged in the world of education, the development of data communication is centralized by utilizing the established intranet network.
The use of an intranet network allows for data communication that is vulnerable to eavesdropping.
To overcome this, use a VPN network.
PPTP VPN and L2TP/IPsec VPN have different performances, especially in the level of security provided.
In this study, the performance analysis of the PPTP VPN and L2TP/IPsec VPN networks was carried out which was implemented on an FTP Server on a Raspberry Pi server and a Mikrotik router for the VPN configuration.
In this study, we designed PPTP VPN and L2TP/IPsec VPN by configuring the Mikrotik RB9412nD-TC router and configuring FTP Server using the proftpd application on the Raspberry Pi server.
For security analysis using hacking method to get VPN Server login data and sniffing method to get FTP Server login data, FTP data.
For performance analysis using parameters delay, throughput, and packet loss.

Related Results

Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols
Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols
In today’s industry, company’s activities are scattered in several locations and need internet for communication purposes. However, it will be dangerous if third-parties have acces...
Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
The use and analysis of IPSec Site to Site VPN simulation with MikroTik devices in a GNS3 emulation environment is discussed in this study. The main objective of this study is to u...
A Generic High-Performance Architecture for VPN Gateways
A Generic High-Performance Architecture for VPN Gateways
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As netwo...
STUDI EKSPERIMENTAL TENTANG KEKUATAN DINDING BATA DENGAN PERKUATAN
STUDI EKSPERIMENTAL TENTANG KEKUATAN DINDING BATA DENGAN PERKUATAN
Abstract: Experimental study on the strength of brick walls have been done through literature review and laboratory testing to determine flexural, compressive and shear behaviour o...
Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik
Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik
The use of public networks such as free Wi-Fi is increasingly widespread along with the development of information technology. However, public networks have a high level of vulnera...
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
This study presents a technical implementation and comparative analysis of a multi-site Wide Area Network (WAN) architecture connecting a central Headquarters (HQ) in Tripoli to th...
IMPLEMENTASI TENTANG FTP SERVER (MAULIDUN NUR)
IMPLEMENTASI TENTANG FTP SERVER (MAULIDUN NUR)
AbstractFTP adalah singkatan dari File Transfer Protocol, protokol untuk bertukar file melalui jaringan. FTP sering digunakan untuk mendownload sebuah file dari server maupun untuk...
BUILDING A LINUX-BASED VPN SERVER USING POINT TO POINT TUNNELING PROTOCOL (PPTP)
BUILDING A LINUX-BASED VPN SERVER USING POINT TO POINT TUNNELING PROTOCOL (PPTP)
Virtual Private Network (VPN) technology has an important role in today's world of communication, VPNs are able to create local networks using facilities. Because a corporate VPN c...

Back to Top