Network Security Design Using Virtual Private Network (VPN) Method By Utilizing Point To Point Tunneling Protocol (PPTP) Technology On Local Area Network (LAN)
Keywords:
Design Network, Mikrotik, Point To Point Tunneling, Protocol, Virtual Private NetworkAbstract
Computer networks provide the ability as a communication medium that can accelerate the work process both in terms of time and space. In addition, information technology can facilitate access to information. So that the development of information technology is very influential in all human life. communication that is no longer limited by space and time, one way to build data communication security in the internet network is to use a Virtual Private Network (VPN) network. Virtual Private Network (VPN) technology allows users who are in different locations to access resources in the local network, get the same rights and settings as physically being in the place where the local network is located, Virtual Private Network (VPN) is one of the right answers for network security solutions in the scope of Local Area Network (LAN) to the scope of Wide Area Network (WAN) even. VPN is a way to use a public network as a private network safely via the internet. Along with the increasing use of the Internet, many companies have switched to using the internet as part of their network to save costs.
References
Burhanuddin, Burhanuddin, and Mohammad Badrul. "Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network." Techno Nusa Mandiri 11.2 (2014): 227370.
Putra, Jordy Lasmana, Luthfi Indriyani, and Yeni Angraini. "Penerapan sistem keamanan jaringan menggunakan VPN dengan metode PPTP pada pt. asri pancawarna." IJCIT (Indonesian Journal on Computer and Information Technology) 3.2 (2018).
Umam, Chairul, Emilia Roza, and Irfan Irfan. "Perancangan Jaringan Keamanan Virtual Private Network (VPN) Site to Site." (2016).
Iqbal, Muhammad, and Imam Riadi. "Analysis of security virtual private network (VPN) using openVPN." International Journal of Cyber-Security and Digital Forensics 8.1 (2019): 58-65.
Cheung, Kwok Ho, and J. Mišić. "On virtual private networks security design issues." Computer Networks 38.2 (2002): 165-179.
Akinsanya, Michael Oladipo, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "Virtual private networks (vpn): a conceptual review of security protocols and their application in modern networks." Engineering Science & Technology Journal 5.4 (2024): 1452-1472.
Ezra, Paul Joan, et al. "Secured communication using virtual private network (VPN)." Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (2022): 309-319.
Ezra, Paul Joan, et al. "Secured communication using virtual private network (VPN)." Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (2022): 309-319.
Scott, Charlie, Paul Wolfe, and Mike Erwin. Virtual private networks. " O'Reilly Media, Inc.", 1999.
Afira, Riandana, Radius Prawiro, and Annisa Izzaty Jamhur. "VIRTUAL PRIVATE NETWORK (VPN) BASED ON IP SECURITY DESIGN ON TOPOLOGY." JOURNAL OF DYNAMICS (International Journal of Dynamics in Engineering and Sciences) 8.2 (2023): 56-59.
Schneier, Bruce, and Mudge. "Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)." Proceedings of the 5th ACM Conference on Computer and Communications Security. 1998.
Hamzeh, K., et al. "RFC2637: Point-to-Point Tunneling Protocol." (1999).
Putra, Chrystia Aji, Yisti Vita Via, and Wahyu SJ Saputra. "Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing." International Conference on Science and Technology (ICST 2018). Atlantis Press, 2018.
Jahan, Sohely, Md Saifur Rahman, and Sajeeb Saha. "Application specific tunneling protocol selection for Virtual Private Networks." 2017 international conference on networking, systems and security (nsyss). IEEE, 2017.
Oktivasari, Prihatin, and Andri Budhi Utomo. "Analysis Of Virtual Private Network Using Openvpn And Point To Point Tunneling Protocol-Analisa Virtual Private Network Menggunakan Openvpn Dan Point To Point Tunneling Protocol." Jurnal Penelitian Komunikasi dan Opini Publik 20.2 (2016).
Satryawati, Eka, Dwi Agung Pangestu, and Ade Surya Budiman. "Implementasi virtual private networ menggunakan point-to-point tunneling protocol." Jurnal Elektro dan Informatika Swadharma 2.1 (2022): 36-42.
Febrianti, Riana, and Muhamad Ryansyah. "Implementation of virtual private network using point to point tunneling protocol mikrotik router at state fighter vocational school haurgeulis indramayu." Jurnal Mantik 6.3 (2022): 3350-3357.
Arora, Poonam, Prem R. Vemuganti, and Praveen Allani. "Comparison of VPN protocols–IPSec, PPTP, and L2TP." Department of Electrical and Computer Engineering George Mason University, Project Report ECE 646 (2011).
Siadi, Ilham Wahyudi, Iskandar Fitri, and Rini Nuraini. "Tunneling Design with Point to Point Protocol over Ethernet (PPPoE) using Mikrotik RB-941 (Case Study of SMK Taruna Bhakti): Tunneling Design with Point to Point Protocol over Ethernet (PPPoE) using Mikrotik RB-941 (Case Study of SMK Taruna Bhakti)." Jurnal Mantik 4.1 (2020): 238-247.
Raj, T. Mohan, S. Shahul Hammed, and A. Amala Deepan. "Enhancing security measures by tunnelling protocol in distributed grid network." International Journal of Computer Applications 38.1 (2012).
Haya, Aqilla Fadia, et al. "BUILDING A LINUX-BASED VPN SERVER USING POINT TO POINT TUNNELING PROTOCOL (PPTP)." Jurnal ilmiah Sistem Informasi dan Ilmu Komputer 1.2 (2021): 11-17.
Kazemi, Keihan, and Ali Fanian. "Tunneling protocols identification using light packet inspection." 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC). IEEE, 2015.
Audrey, Berby Febriana. "Virtual Private Network Menggunakan Point To Point Tunnel Protocol Berbasis Mikrotik." Journal Of Network And Computer Applications (ISSN: 2964-6669) 1.1 (2022): 1-10.
Schwenk, Jörg. "Point-to-Point Security." Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Cham: Springer International Publishing, 2022. 85-97.
Narayan, Shaneel, et al. "Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols." 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2016.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal Of Computer Sciences and Mathematics Engineering

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
COPYRIGHT
Copyright of any article in the International Journal of Computer Sciences and Mathematics Engineering is held by the author under a Creative Commons Attribution-ShareAlike 4.0 International License.
- The author acknowledges that the International Journal Of Computer Sciences and Mathematics Engineering has the right to be the first to publish under a Creative Commons Attribution-ShareAlike 4.0 International License – CC BY-SA.
- Authors can submit articles separately, arrange for non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional respository, publication into books, etc.), by acknowledging that the manuscript has been published for the first time in the International Journal of Computer Sciences and Mathematics Engineering.
LICENCE
The International Journal Of Computer Sciences and Mathematics Engineering is published under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License. This license permits anyone to copy and redistribute this material in any form or format, compose, modify, and make derivatives of this material for any purpose, including commercial purposes, as long as they give credit to the Author for the original work.