Several subjects in Computer science necessitate practical and realistic classes in addition to supporting the theoretical underpinning taught to the students. In various subjects’ practical exposure ...& skill is imperative to meet the industry requirements. However, educational establishments can't provide an out-and-out environment for every student to practice. Providing an appropriate Lab for apprentices that bestows desired exposure and feel of a real Network has been a challenging task for every educational establishment. Virtual Labs have been a major milestone and are effectively implemented in numerous colleges and universities throughout the world. In this article, the author is providing a complete setup and functionality of Implementing Virtual Private Networks using virtual Labs to reflect a more realistic and appropriate Networking environment for instructional and educational purposes. Fresh graduates or Diploma holders rarely have practical exposure and experience in deploying and implementing VPNs. Establishing a Virtual Private Network is a cumbersome job, and lack of practical exposure makes it even difficult for a fresher to establish one exclusively for the employer. The Author is providinga guideline for the users so that they can establish Virtual Private Networks using virtual machines. Hencepresenting an environment wherein students can have numerous deployments of VPNs with different features. The students gain the required exposure and develop an understanding of Virtual Private Networks meticulously and pragmatically.
Employee mobility is an important issue for companies that have a goal to become global company. The company often asks the employees to do some assignments outside the office area, either inside or ...outside of their home country. A portable virtual private network (VPN) is a device that enables the employees to perform remote access connection to internal computer resources via internet. Therefore, the employee can still work on their assignments in company server while doing business travelling. In this paper, the secure and low power portable VPN prototype is being proposed. The prototype of the VPN portable gateway device is built using OpenVPN-R core applications that are modified from OpenVPN version 2.3.10 with OpenSSL version 1.0.2h. It is implemented into a single board computer (SBC) Raspberry Pi 3 Model B +. The modification performed in this system is the inclusion of Rabbit stream cipher algorithm to OpenSSL as one of the alternative options of TLS ciphersuites on OpenVPN. The prototype portable VPN gateway device generated from this research has Rabbit ciphersuites, platform independent, and has additional features inbuilt firewall. The simulation results show that the proposed prototype can perform secure data transfer. On the other hand the proposed Rabbit stream cipher algorithm shows better performance than other algorithm in terms of data transfer rate, CPU utilization, and memory usage which leads to smaller power consumption.
Network infrastructures have not ceased to develop over time, and this is justified by the appearance of new kinds of communication, such as (augmented reality, telemedicine, video on demand), the ...ceaseless need for bandwidth and the demand for better quality of service. SD-WAN is one of the innovations brought to the telecommunications sector, thus offering good exploitation of the company's network resources in order to guarantee quality transfer. However, modern networks are experiencing an increase in terms of sites to be connected and an evolution in terms of the need for exchange security, encrypted VPN technology is the most opted solution. The Automatic tunneling VPN allows connecting an important number of sites in a flexible way, dynamically and automatically. Better managing exchanges through these multiple tunnels was a major challenge for the engineers. SD-WAN offers itself as the best solution to meet this requirement. To better design and implement its network architecture based on SD-WAN and automatic VPN, it is necessary to take in consideration the good practices of engineering. Optimizing and evaluating the performance of its architecture can extend the life of the infrastructure and ensure quality traffic delivery. In order to upgrade the network infrastructure of our institute and contribute to its evolution, this paper presents the proposed architecture with an evaluation of the performance of the transported traffic. The study is based on the simulation of an infrastructure based on the Fortigate firewall.
VPN adalah sebuah teknologi komunikasi yang menggunakan jaringan private (pribadi) yang dapat terhubung ke sebuah jaringan publik. Dengan cara tersebut, maka akan didapatkan hak dan pengaturan yang ...sama seperti halnya berada didalam jaringan lokal itu sendiri, walaupun sebenarnya menggunakan jaringan publik. Pada penelitian ini yang dipakai adalah protokol GRE over IPSec. GRE adalah protokol enkapsulasi yang secara default tidak mendukung keamanan enkripsi. Maka untuk menambahkan lapisan enkripsi di GRE Tunnel dengan dukungan IPSec dan protokol enkripsi IKEv2. Maka dibuat lah kombinasi antara GRE dan IPSec pada Fortigate yang memungkinkan pengguna untuk membuat jalur tuneling aman antara dua jaringan yang berbeda. Seluruh lalu lintas data yang melewati jalur tuneling akan dienkripsi menggunakan protokol IPSec. Setelah berhasil membangun VPN tunnel GRE Over IPSec, kemudian jaringan tersebut di uji. Hasil pengujian terhadap GRE Over IPSec tunnel VPN dengan protokol IKEv2 sudah berjalan dengan baik dan paket yang melalui tunnel tersebut sudah terenkripsi dengan aman. Sedangkan Dari hasil pengujian yang telah dilakukan terhadap performa jaringan GRE over IPSec pada Fortigate dilakukan untuk mengukur performa dari delay dan throughput paket yang dikirim, pengujian dilakukan dua kali pengujian yaitu upload dan download. Menurut THIPON dari jaringan yang dibangun termasuk kedalam kategori “sangat bagus”.
VPN adalah sebuah teknologi komunikasi yang menggunakan jaringan private (pribadi) yang dapat terhubung ke sebuah jaringan publik. Dengan cara tersebut, maka akan didapatkan hak dan pengaturan yang ...sama seperti halnya berada didalam jaringan lokal itu sendiri, walaupun sebenarnya menggunakan jaringan publik. Pada penelitian ini yang dipakai adalah protokol GRE over IPSec. GRE adalah protokol enkapsulasi yang secara default tidak mendukung keamanan enkripsi. Maka untuk menambahkan lapisan enkripsi di GRE Tunnel dengan dukungan IPSec dan protokol enkripsi IKEv2. Maka dibuat lah kombinasi antara GRE dan IPSec pada Fortigate yang memungkinkan pengguna untuk membuat jalur tuneling aman antara dua jaringan yang berbeda. Seluruh lalu lintas data yang melewati jalur tuneling akan dienkripsi menggunakan protokol IPSec. Setelah berhasil membangun VPN tunnel GRE Over IPSec, kemudian jaringan tersebut di uji. Hasil pengujian terhadap GRE Over IPSec tunnel VPN dengan protokol IKEv2 sudah berjalan dengan baik dan paket yang melalui tunnel tersebut sudah terenkripsi dengan aman. Sedangkan Dari hasil pengujian yang telah dilakukan terhadap performa jaringan GRE over IPSec pada Fortigate dilakukan untuk mengukur performa dari delay dan throughput paket yang dikirim, pengujian dilakukan dua kali pengujian yaitu upload dan download. Menurut THIPON dari jaringan yang dibangun termasuk kedalam kategori “sangat bagus”.
Development of information technologies has taken revolution in automation technology. The use of new telecommunication technologies makes possible observing diagnostic parameters from distance and ...to undertake maintenance activities based on result of observation. In this way is possible to eliminate and prevent a lot of slowdowns – that contributes increase of availability and reliability of machine works
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, ...sehingga kerahasiaan informasi bisa terjaga dengan baik dan kemudahan, kecepatan pertukaran data bisa di implementasikan sehingga dapat menjadi suatu nilai lebih. VPN dapat terjadi antara dua PC atau bisa juga antara dua atau lebih jaringan yang berbeda. VPN dapat dibentuk dengan menggunakan teknologi tunneling dan encryption. Server OpenVPN menghasilkan profil jaringan terenkripsi, kemudian semua pengguna dapat membentuk jaringan VPN dan mereka dapat menggunakan layanan organisasi seolah-olah mereka secara geografis berada di tempat yang sama, konfigurasi ini juga memungkinkan penggunaan layanan atau aplikasi eksternal apa pun tanpa memengaruhi keamanan organisasi, VPN dapat berjalan pada IPv6 dan IPv4, dengan kelebihan yang banyak OpenVPN melintasi NAT (Network Address Translation). Jaringan VPN ini dibuat untuk memudahkan pekerja yang sedang melaksanakan aktivitas WFH (Work From Home) VPN sebuah koneksi virtual yang bersifat private dan tidak semua orang bisa mengaksesnya. Implementasi VPN dapat mempermudah komunikasi data jarak jauh tanpa khawatir ada tabrakan data, karena dengan menggunakan jaringan virtual ini dapat terhubung secara bersamaan. Dengan VPN, pengguna mempunyai keamanan data yang lebih dibandingkan dengan menggunakan jaringan lokal biasa. Ketika pengguna terhubung ke jaringan VPN maka akan mempunyai IP yang berbeda dengan IP Physical dibuktikan dengan tool tracert terlihat IP dan hoop. Raspberry Pi berfungsi untuk membuat sertifikat VPN client, karena fungsi tersebut tidak digabungkan ke dalam VPS Server karena masalah keamanan jaringan.
Enterprise networks are becoming increasingly sophisticated and large in scale due to the critical need for interconnectivity. For the interconnection of sites, VPN technology is essential. Indeed, ...this technology allows a partially or completely meshed connection between the various sites in a secure way. IPsec is one of the most widely deployed VPN technologies due to its many advantages, including data confidentiality, integrity and authentication. However, implementing this technology requires considerable technical expertise given the diversity of gateway manufacturers that a company may have, advanced engineering given the set of technical parameters that a VPN tunnel may have for its proper functioning, and caution when setting up a large-scale network given that a simple error may prevent the creation of tunnels. Taking these limitations into account, the automation of IT infrastructures has become indispensable, known as DevOps, which promotes continuous communication, collaboration, integration, visibility and transparency between the teams responsible for application development (Dev) and those responsible for IT operations (Ops). With infrastructure automation, networks are becoming easier to manage, diagnose and configure. This paper proposes a new architecture that automates the deployment of VPN tunnels via a web-based graphical interface. This architecture is adapted with a variety of equipment manufacturers and delivers configurations generated via an SSH channel in an automatic way.
Advances in Information and Communication Technology have led to revolutionary changes in computer networking, especially in Indonesia, which has witnessed significant technological growth over the ...last four years. Despite this progress, inter-agency data exchange, particularly in governmental organizations, remains vulnerable to security risks. This study focuses on enhancing the security measures for the Electronic Health Information Report (E-Link) system at Madiun District Health Office by implementing a Virtual Private Network (VPN) using MikroTik. A multi-method approach, comprising direct observation, interviews, and literature review, was adopted for this investigation. The findings confirm that the utilization of Point-to-Point Tunneling Protocol (PPTP) via MikroTik substantially elevates the security and governs controlled access to the E-Link application. Therefore, the implementation of a VPN not only fortifies the security but also improves the accessibility of health data systems.