Simulation L2TP/IPSEC VPN Site-to-Site on Mikrotik Using GNS Emulator
DOI:
https://doi.org/10.53840/ejpi.v12i2.276Abstract
The use and analysis of IPSec Site to Site VPN simulation with MikroTik devices in a GNS3 emulation environment is discussed in this study. The main objective of this study is to use GNS3 emulators to simulate and execute IPSec site-to-site connections. The L2TP VPN technique is recommended as a way to run an IPSec site-to-site connection. The research methodology consists of four stages, starting with preparation, which involves the installation of Winbox, GNS3, and virtual machines. Network topology and process diagrams are then included in the design, and network configurations, L2TP VPN, and IPSec are included in the implementation. The test is completed by presenting the results of the IPSec L2TP VPN test.
Downloads
References
Aprillianto, B., & Pamungkas, D. (2023). Analysis of the development of a virtual network laboratory model using GNS3.
Ardianto, F., & Akbar, T. (2017). The design of the remote network security monitoring system uses the Mikrotik Operational System through the Virtual Private Network.
Candra, A. M., & Samsugi, S. (2021). Design and implementation of Access Point System Manager (CAPSMAN) Mikrotik Controller using the Winbox application. TELEFORTECH, 2(2), 26–32. https://doi.org/10.33365/tft.v2i2.1990
Dewi, S., Riyadi, F., Suwastitaratu, T., & Hikmah, N. (2020). Network security uses VPN (Virtual Private Network) with the PPTP (Point To Point Tunneling Protocol) method at the Kertaraharja Ciamis Village Office. Journal of Science and Management, 8(1).
Fitri, S., Pipit, D. A., & Aqim, A. (2019). Designing and building an IPSEC-based VPN network using Mikrotik Routerboard at PT. Seminar Nasional Teknologi Informasi dan Komunikasi (SeNTIK), 3(1), 211–217.
Jayanto, R. D. (2019). Design and build a network monitoring system using the Mikrotik Router OS.
Jaya, B., Yuhandri, Y., & Sumijan, S. (2020). Improved security of Mikrotik routers against Denial of Service (DoS) attacks. Journal of Information Systems and Technology, 2(4), 115–123. https://doi.org/10.37034/jsisfotek.v2i4.32
Korniyenko, B., Galata, L., & Ladieva, L. (2019). Research on GNS3-based enterprise network information protection systems. In Proceedings of ATIT IEEE.
Mentang, R., Sinsuw, A. A. E., & Najoan, X. B. N. (2015). Design and analysis of wireless network security using a Wireless Intrusion Detection System. Electrical and Computer Engineering, 5(7).
Munawar, Z., Kom, M., & Putri, N. I. (2020). Computer network security in the era of big data. Journal of Information Systems (J SIKA), 2(1), 14–20.
Prasetyo, B., Budiman, E., & Mahendra Putra, G. (2019). The implementation of the Network Monitoring System (NMS) as an early warning system on Mikrotik routers with SMS Gateway services (Case Study: Mulawarman University). Proceedings of Seminar Nasional Komputer dan Teknologi Informasi, 4(1).
Pratama, H., & Puspitasari, N. F. (2020). Implementation of L2TP/IPSec protocol and port forwarding for remote Mikrotik on dynamic IP networks. Citec Journal, 7(1).
Purnama Sari, A., & Kemala, N. (2020). IP Security based Virtual Private Network design using Mikrotik Router. Prosisko Journal, 7(2).
Rahino, B. G., & Susila, A. (2022). Implementation of Mikrotik VPN network (L2TP/IPSec) for remote access as security during Work From Home. OKTAL: Journal of Computer Science and Science, 1(11), 1911–1918. https://doi.org/10.53801/oktal.v1i11.192
Riskiono, S. D. (2019). Analysis and design of alternative network transmission lines using Virtual Private Networks (VPNs).
Santoso, B. (2018). Internet Protocol Security (IPSec) method with Virtual Private Network (VPN) for data communication. Journal of Computer Science Research, Embedded Systems & Logic, 6(2), 179–188.
Santoso, B., Sani, A., Husain, T., & Hendri, N. (2021). Site to site VPN implementations use L2TP and IPSec protocols. TEKNOKOM, 4(1), 30–36. https://doi.org/10.31943/teknokom.v4i1.59
Ulum, F. (2018). The network security design on the Mikrotik Router OS uses the Port Knocking method.
Wicaksana, P., Hadi, F., & Hadi, A. F. (2021). The design of the VPN server implementation uses the L2TP and IPSec protocols as network security. KomtekInfo, 8(3), 169–175. https://doi.org/10.35134/komtekinfo.v8i3.128
Yaqin, A. (2020). Development of a network security system with Mikrotik at SMK Muhammadiyah 2 Kuningan. Journal of Artificial Intelligence, 4(36), 117–122.
Zhang, Z., Chandel, S., Jingyao, S., Shilin, Y., Yunnan, Y., & Jingji, Z. (2018). VPN: A scam or a trap? In Proceedings of the 2nd International Conference on Computational Methodology and Communication.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 e-Jurnal Penyelidikan dan Inovasi

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.










