IMPLEMENTASI VIRTUAL PRIVATE NETWORK OVER GRE TUNNEL
Abstract
VPN network is very interesting to be discussed and widely so that many have done research then this research will do the implementation of VPN network using GRE Tunnel technology. This research will answer how this virtual interface can connect more than one router with another router by using GRE protocol to deliver packets, protocols and more so that user needs such as connecting layer 2 between sites can be fulfilled through VPN GRE Tunnel. Finally after the preparation for this research started to install simulator GNS3, Mikrotik RouterOS, VirtualBox, operating system. Network administration by writing an ip address. Configuration on a loopbaack adapter, MikroTik-HeadOffice, MikroTik-Branch, and Pc-Branch. Once connected is formed a virtual interface and given IP address as ip binder of two public ip. Then proved by ping and tracert between Pc-Branch can be interconnected, so can also exchange data with sharing files so that can be done mapping drive. With Packet Sniffer and Torch tools on Mikrotik can see traffic passing through the virtual GRE tunnel interface. After experimenting with the GNS3 simulator application in such a way with the console script and proven with the image that the VPN network with GRE tunnel interface can connect more than 2 MikroTik-Branch routers through MikroTik-HeadOffice as the network backbone. With its built VPN GRE tunnel network, the data communication is safe because it is inside the tunnel even in the internet network. Further research, combining GRE Tunnel with others.
Downloads
References
GNS3. (2017). Frequently Asked Questions. Retrieved February 2017, from GNS3: https://www.gns3.com/software/faq
Jaha, A. A. (2015, March). Performance Evaluation of Remote Access VPN Protocols on Wireless Networks. International Journal of Computer and Information Technology, 04, 201-206. Dipetik March 01, 2017
Krithikaa, M., Priyadharsini, M., & Subha, C. (2016). Virtual Private Network - A Survey. International Journal of Trend in Research and Development, 3(1), 78-81.
MikroTik. (2015, December 07). Manual:Interface/Gre. Retrieved March 12, 2017, from WIKI Mikrotik: https://wiki.mikrotik.com
Nigam, S., & Gupta, E. N. (2016). Implementation of New IPv6 Tunneling Transition Technique: II6T. International Journal of Innovative Research in Computer and Communication Engineering, 4(6), 12128-12132. doi:10.15680/IJIRCCE.2016. 0406347
NIXON, D. J., DEVARAJ, D. A., & MOHAMMED, M. A. (2016, Agustus). CONFIGURING IPSEC TO ENCRYPT GRE TUNNELS TO PROVIDE NETWORK LAYER SECURITY FOR NON−IP TRAFFIC SUCH AS IPX USING GNS3. International Journal of Engineering Science Invention Research & Development, III(II), 112-119. Dipetik March 02, 2017
Perpusku, A. (2016, June). Metode Penelitian Eksperimental (Pengertian, Karakteristik, & Jenis-jenisnya). Retrieved March 01, 2017, from Perpusku: http://www.perpusku.com/2016/06/pengertian-karakteristik-jenis-metode-penelitian-eksperimental.html