IMPLEMENTASI VIRTUAL PRIVATE NETWORK OVER GRE TUNNEL

  • Taufik Rahman Manajemen Informatika AMIK BSI Jakarta
Keywords: Networking, Virtual, Tunnel, GRE Tunnel technology

Abstract

VPN network is very interesting to be discussed and widely so that many have done research then this research will do the implementation of VPN network using GRE Tunnel technology. This research will answer how this virtual interface can connect more than one router with another router by using GRE protocol to deliver packets, protocols and more so that user needs such as connecting layer 2 between sites can be fulfilled through VPN GRE Tunnel. Finally after the preparation for this research started to install simulator GNS3, Mikrotik RouterOS, VirtualBox, operating system. Network administration by writing an ip address. Configuration on a loopbaack adapter, MikroTik-HeadOffice, MikroTik-Branch, and Pc-Branch. Once connected is formed a virtual interface and given IP address as ip binder of two public ip. Then proved by ping and tracert between Pc-Branch can be interconnected, so can also exchange data with sharing files so that can be done mapping drive. With Packet Sniffer and Torch tools on Mikrotik can see traffic passing through the virtual GRE tunnel interface. After experimenting with the GNS3 simulator application in such a way with the console script and proven with the image that the VPN network with GRE tunnel interface can connect more than 2 MikroTik-Branch routers through MikroTik-HeadOffice as the network backbone. With its built VPN GRE tunnel network, the data communication is safe because it is inside the tunnel even in the internet network. Further research, combining GRE Tunnel with others.

Downloads

Download data is not yet available.

References

Ahmed, F., Butt, Z. U., & Siddiqui, U. A. (2016). MPLS based VPN Implementation in a Corporate Environment. Journal of Information Technology & Software Engineering, 6(5), 1-7. doi: 10.4172/2165-7866.1000193

GNS3. (2017). Frequently Asked Questions. Retrieved February 2017, from GNS3: https://www.gns3.com/software/faq

Jaha, A. A. (2015, March). Performance Evaluation of Remote Access VPN Protocols on Wireless Networks. International Journal of Computer and Information Technology, 04, 201-206. Dipetik March 01, 2017

Krithikaa, M., Priyadharsini, M., & Subha, C. (2016). Virtual Private Network - A Survey. International Journal of Trend in Research and Development, 3(1), 78-81.

MikroTik. (2015, December 07). Manual:Interface/Gre. Retrieved March 12, 2017, from WIKI Mikrotik: https://wiki.mikrotik.com

Nigam, S., & Gupta, E. N. (2016). Implementation of New IPv6 Tunneling Transition Technique: II6T. International Journal of Innovative Research in Computer and Communication Engineering, 4(6), 12128-12132. doi:10.15680/IJIRCCE.2016. 0406347

NIXON, D. J., DEVARAJ, D. A., & MOHAMMED, M. A. (2016, Agustus). CONFIGURING IPSEC TO ENCRYPT GRE TUNNELS TO PROVIDE NETWORK LAYER SECURITY FOR NON−IP TRAFFIC SUCH AS IPX USING GNS3. International Journal of Engineering Science Invention Research & Development, III(II), 112-119. Dipetik March 02, 2017

Perpusku, A. (2016, June). Metode Penelitian Eksperimental (Pengertian, Karakteristik, & Jenis-jenisnya). Retrieved March 01, 2017, from Perpusku: http://www.perpusku.com/2016/06/pengertian-karakteristik-jenis-metode-penelitian-eksperimental.html
Published
2017-08-15
How to Cite
[1]
T. Rahman, “IMPLEMENTASI VIRTUAL PRIVATE NETWORK OVER GRE TUNNEL”, jitk, vol. 3, no. 1, pp. 1-8, Aug. 2017.