IMPLEMENTASI VIRTUAL PRIVATE NETWORK OVER GRE TUNNEL

Taufik Rahman

Abstract Views : 398 Times | Views : 336 Times

Abstract


VPN network is very interesting to be discussed and widely so that many have done research then this research will do the implementation of vpn network using GRE Tunnel technology. This research will answer how this virtual interface can connect more than one router with another router by using GRE protocol to deliver packets, protocols and more so that user needs such as connecting layer 2 between sites can be fulfilled through VPN GRE Tunnel. Finally after the preparation for this research started install simulator GNS3, mikrotik routerOS, virtualbox, operating system. Network administration by writing ip address. Configuration on loopbaack adapter, MikroTik-HeadOffice, MikroTik-Branch and Pc-Branch. Once connected is formed a virtual interface and given ip address as ip binder of two public ip. Then proved by ping and tracert between Pc-Branch can be interconnected, so can also exchange data with sharing files so that can be done mapping drive. With Packet Sniffer and Torch tools on Mikrotik can see traffic passing through the virtual gre tunnel interface. After experimenting with the GNS3 simulator application in such a way with the console script and proven with the image that the vpn network with gre tunnel interface can connect more than 2 MikroTik-Branch routers through MikroTik-HeadOffice as network backbone. With its built vpn gre tunnel network, the data communication is safe because it is inside the tunnel even in the internet network. Further research, combining GRE Tunnel with others.



View Counter: Abstract | 398 | times, Article PDF | PDF | 336 | times

Full Text:

PDF

References


Ahmed, F., Butt, Z. U., & Siddiqui, U. A. (2016). MPLS based VPN Implementation in a Corporate Environment. Journal of Information Technology & Software Engineering, 6(5), 1-7. doi: 10.4172/2165-7866.1000193

GNS3. (2017). Frequently Asked Questions. Retrieved February 2017, from GNS3: https://www.gns3.com/software/faq

Jaha, A. A. (2015, March). Performance Evaluation of Remote Access VPN Protocols on Wireless Networks. International Journal of Computer and Information Technology, 04, 201-206. Dipetik March 01, 2017

Krithikaa, M., Priyadharsini, M., & Subha, C. (2016). Virtual Private Network - A Survey. International Journal of Trend in Research and Development, 3(1), 78-81.

MikroTik. (2015, December 07). Manual:Interface/Gre. Retrieved March 12, 2017, from WIKI Mikrotik: https://wiki.mikrotik.com

Nigam, S., & Gupta, E. N. (2016). Implementation of New IPv6 Tunneling Transition Technique: II6T. International Journal of Innovative Research in Computer and Communication Engineering, 4(6), 12128-12132. doi:10.15680/IJIRCCE.2016. 0406347

NIXON, D. J., DEVARAJ, D. A., & MOHAMMED, M. A. (2016, Agustus). CONFIGURING IPSEC TO ENCRYPT GRE TUNNELS TO PROVIDE NETWORK LAYER SECURITY FOR NON−IP TRAFFIC SUCH AS IPX USING GNS3. International Journal of Engineering Science Invention Research & Development, III(II), 112-119. Dipetik March 02, 2017

Perpusku, A. (2016, June). Metode Penelitian Eksperimental (Pengertian, Karakteristik, & Jenis-jenisnya). Retrieved March 01, 2017, from Perpusku: http://www.perpusku.com/2016/06/pengertian-karakteristik-jenis-metode-penelitian-eksperimental.html


Article Metrics

Abstract view : 398 times
PDF - 336 times

Refbacks

  • There are currently no refbacks.