Perkembangan jaringan internet sudah tidak terbendung lagi, hal ini dapat menyebabkan potensi terjadinya ancamanan didalam dunia intenet. Penggunaan Virtual Private Network (VPN) nampaknya menjadi salah satu metode keamanan jaringan yang sangat baik dalam melakukan pendistribusian layanan paket data didalam jaringan internet. Penggunaan VPN mampu memangkas alokasi penggunaan bandwidth serta meminimalisir terjadinya kebocoran terhadap paket data yang sedang ditransfer. Site to Site merupakan salah satu metode VPN IPSec Tunneling yang sering digunakan untuk menghubungkan antara lokasi yang berbeda agar menjadi satu kesatuan network. Penggunaan IPSec dapat melindungi transfer data antara host to host, network to network hingga network to host dikarenakan melakukan pengenkripsi terhadap paket data yang ditransfer. Hasil pengujian dalam pengimplementasian jaringan Site to Site IP Security Virtual Private Network With Algorithm Encryption ISAKMP didapatkan pengurangan hops terhadap jaringan yang menggunakan tunnel dengan Time to Live (TTL)=126 sedangkan jaringan tanpa menggunakan tunnel memiliki nilai TTL sebesar 124.
[1] F. A. Salman, “Implementation of IPsec-VPN Tunneling using GNS3,” Indones. J. Electr. Eng. Comput. Sci., vol. 7, no. 3, pp. 855–860, 2017.
[2] A. A. Eskandar, M. R. Syed, and M. B. Zarei, “SIP over IP VPN : Performance Analysis,” in Computer Engineering and Applied Computing (WorldComp), 2014, vol. 1, no. 1.
[3] I. AFRIANTO and E. B. SETIAWAN, KAJIAN VIRTUAL PRIVATE NETWORK ( VPN ) SEBAGAI SISTEM PENGAMANAN ( Studi Kasus Jaringan Komputer Unikom ), vol. 12, no. 1. 2014.
[4] S. R. Ahmed and P. Rajamohan, “Comprehensive performance analysis and special issues of Virtual Private Network strategies in the computer communication: A novel study,” Int. J. Eng. Sci. Technol., vol. 3, no. 7, 2013.
[5] D. Tjahjono, R. Shaikh, and W. Ren, “ESTABLISHING AN IPSEC (INTERNET PROTOCOL SECURITY) VPN (VIRTUAL PRIVATE NETWORK) TUNNEL,” US 8,893,262 B2, 2014.
[6] R. A. May, “POLICY-BASED CONFIGURATION OF INTERNET PROTOCOL SECURITY FORA VIRTUAL PRIVATE NETWORK,” US 9,065,802 B2, 2015.
[7] D. Suprijatmono and D. S. Kartawijaya, “Rancang Bangun Jaringan PABX Berbasis IP Menggunakan Metode IPsec VPN Gateway,” Sainstech, vol. 28, no. 2, pp. 39–49, 2018.
[8] R. Arlan, R. Munadi, and N. Andini, “IMPLEMENTASI DAN ANALISIS SISTEM KEAMANAN IP SECURITY (IPSEC) DI DALAM MULTI PROTOCOL LABEL SWITCHINGVIRTUAL PRIVATE NETWORK (MPLS-VPN) PADA LAYANAN BERBASIS IP MULTIMEDIA SUBSYSTEM (IMS),” e-Proceeding Eng. , vol. 3, no. 3, pp. 4630–4640, 2016.
[9] F. Bensalah, E. Casablanca, and N. EL KAMOUN, “Analytical performance and Evaluation of the Scalability of Layer 3 Tunneling Protocols: Case of Voice Traffic Over IP,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 17, no. May, pp. 361–369, 2017.
[10] M. Elezi and B. Raufi, “Conception of Virtual Private Networks using IPsec suite of protocols , comparative analysis of distributed database queries using different IPsec modes of encryption,” Procedia - Soc. Behav. Sci., vol. 195, pp. 1938–1948, 2015.
[11] C. Wang and J. Chen, “Implementation of GRE Over IPsec VPN Enterprise Network Based on Cisco Packet Tracer,” in 2nd International Conference on Soft Computing in Information Communication Technology, 2014.
[12] C. Paquet, Implementasi Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition, 2nd ed. USA: Cisco Press, 2013.
[13] A. M. Gamundani and M. Bere, “A VPN Security Solution for Connectivity over Insecure Network Channels : A A VPN Security Solution for Connectivity over Insecure Network Channels : A novel study .,” SSRG Int. J. Comput. Sci. Eng., vol. 1, no. October, pp. 1–8, 2014.
[14] G. Aggarwal, P. Shah, A. Thrivikramannair, and D. Blair, “TECHNIQUE FOR USING OER WITH AN ECT SOLUTION FOR MULT-HOMED SITES,” US 8,706,883 B2, 2014.
[15] S. Frankel and S. Krishnan, IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap (No. RFC 6071). 2011.