DAFTAR ISI
HALAMAN JUDUL ................................................................................ i LEMBAR PENGESAHAN DOSEN PEMBIMBING ............................... ii LEMBAR PENGESAHAN PENGUJI ...................................................... iii LEMBAR PERNYATAAN KEASLIAN HASIL TUGAS AKHIR ........... iv HALAMAN PERSEMBAHAN ................................................................ v HALAMAN MOTTO ............................................................................... vi KATA PENGANTAR .............................................................................. vii ABSTRAKSI ........................................................................................... ix TAKARIR ................................................................................................ x DAFTAR GAMBAR ................................................................................ xi DAFTAR TABEL .................................................................................... xiii DAFTAR ISI ............................................................................................ xiv
BAB 1 PENDAHULUAN 1. 1 Latar Belakang ...........................................................................1 1. 2 Rumusan Masalah ......................................................................2 1. 3 Batasan Masalah.........................................................................2 1. 4 Tujuan Penelitian .......................................................................3 1. 5 Manfaat Penelitian......................................................................3 1. 6 Metodologi Penelitian ................................................................3 1.6.1 Study Pustaka ............................................................................. 3 1.6.2 Implementasi Dan Konfigurasi Sistem ..................................3 1.7 Sistematika Penulisan ...................................................................4
BAB II LANDASAN TEORI 2. 1 Jaringan Komputer .....................................................................6
xiv
2. 2 Pengertian VPN........................................................................ 10 2. 3 Perkembangan VPN .................................................................10 2. 4 Kelebihan dan Kekurangan VPN .............................................. 12 2. 5 Tipe-Tipe VPN ......................................................................... 13 2. 6 Tunelling .................................................................................. 14 2. 7 Metode Pengamanan VPN ........................................................ 15 2.7.1 Authentication.....................................................................15 2.7.2 Encapsulation ...................................................................... 15 2.7.2 Encryption .......................................................................... 16 2. 8 Protokol-Protokol VPN ............................................................ 16 2.8.1 PPTP (Point-to-Point Tunneling Protokol) .......................... 16 2.8.2 L2TP (Layer Two Tunneling Protokol) ............................... 21 2.8.3 IPSec (IP Security) .............................................................. 25 2. 9 File Transfer Protokol (FTP) .................................................... 28 2. 10 Internet Control Message Protokol.......................................... 29 2. 11 Parameter Kinerja Komputer .................................................. 29 2. 12 Studi Perbandingan .................................................................29 2.12.1 Tujuan Penelitian Komparatif............................................ 30 2.13 Gambaran Umum Perbandingan Protokol PPTP, L2TP, Ipsec...30 2.13.1 Keamanan ......................................................................... 30 2.13.1.1 Authentication ........................................................... 30 2.13.1.2 Integrity .....................................................................31 2.13.1.3 Confidentially ............................................................ 31 2.13.1.4 Key Managament ....................................................... 31
xv
BAB III METODOLOGI 3. 1 Gambaran Umum Sistem .......................................................... 33 3. 2 Kebutuhan Sistem ....................................................................34 3.2.1 Kebutuhan Perangkat Keras .............................................. 34 3.2.2 Kebutuhan Perangkat Lunak ............................................. 35 3. 3 Pembangunan Sistem ............................................................... 36 3.3.1 Konfigurasi R1 .................................................................36 3.3.2 Konfigurasi R2 .................................................................44 3.3.3 Konfigurasi R3 .................................................................46 3.3.4 Konfigurasi FTP Server .................................................... 54 3. 4 Pengambilan Data ....................................................................55 3. 5 Metode Analisis Data ............................................................... 55
BAB IV HASIL DAN PEMBAHASAN 4. 1 Hasil dan Pembahasan Keamanan............................................. 57 4. 2 Perbandingan Performa File Tranfer ......................................... 60 4. 3 Perbandingan Performa ICMP .................................................. 66 BAB V KESIMPULAN DAN SARAN 5. 1 Kesimpulan .............................................................................. 74 5. 2 Saran ........................................................................................ 74
xvi
DAFTAR GAMBAR
Gambar 2.1 Gambaran Umum Jaringan Komputer ..................................7 Gambar 2.2 Gambaran Umum Keneksi LAN ..........................................8 Gambar 2.3 Gambaran Umum Koneksi MAN .........................................9 Gambar 2.4 Gambaran Umum Koneksi WAN.........................................9 Gambar 2.5 Metode Tunnelling............................................................. 15 Gambar 2.6 Paket Data PPTP................................................................ 19 Gambar 2.7 Tunnel PPTP .....................................................................20 Gambar 2.8 Model Compulsory L2TP .................................................. 22 Gambar 2.9 Model Voluntary L2TP ...................................................... 23 Gambar 2.10 Paket Data L2TP .............................................................. 24 Gambar 3.1 Topologi Jaringan VPN (Virtual Private Network) ............. 33 Gambar 3.2 Konfigurasi IP Address ...................................................... 37 Gambar 3.3 Konfigurasi IP Routing ...................................................... 37 Gambar 3.4 Winbox Leader ..................................................................38 Gambar 3.5 PPTP Server ...................................................................... 38 Gambar 3.6 Konfigurasi Secret PPTP ................................................... 39 Gambar 3.7 Konfigurasi Routing static VPN PPTP ............................... 39 Gambar 3.8 L2TP Server ...................................................................... 40 Gambar 3.9 Konfigurasi Secret L2TP ................................................... 40 Gambar 3.10 Konfigurasi Routing static VPN L2TP ............................. 41 Gambar 3.11 Konfigurasi Ipsec Peer ..................................................... 42 Gambar 3.12 Konfigurasi Ipsec Proposal .............................................. 42 Gambar 3.13 Kofigurasi Ipsec Policy .................................................... 43 Gambar 3.14 Konfigurasi Routing Static ............................................... 44 Gambar 3.15 Winbox ............................................................................ 44 Gambar 3.16 Konfigurasi IP Address .................................................... 46 Gambar 3.17 Konfigurasi IP Routing .................................................... 47 Gambar 3.18 Konfigurasi PPTP client ................................................... 48 Gambar 3.19 Konfigurasi Routing Static PPTP .....................................49
xi
Gambar 3.20 Konfigurasi L2TP Client .................................................. 49 Gambar 3.21 Konfigurasi Routing Static L2TP .....................................50 Gambar 3.22 Konfigurasi Ipsec Peer ..................................................... 51 Gambar 3.23 Konfigurasi Ipsec Proposal .............................................. 52 Gambar 3.24 Konfigurasi Ipsec Policy .................................................. 53 Gambar 3.25 Konfigurasi Routing Static ............................................... 54 Gambar 3.26 Pembuatan User Ftp ......................................................... 54 Gambar 3.27 Konfigurasi Path Directory .............................................. 55 Gambar 4.1 Hasil Sniffing Tanpa Imlementasi VPN ............................. 57 Gambar 4.2 Hasil Sniffing Dengan Implementasi PPTP ........................ 58 Gambar 4.3 Hasil Sniffing Dengan Implementasi L2TP ........................ 59 Gambar 4.4 Hasil Snffing Dengan Impelentasi Ipsec............................. 59 Gambar 4.5 Hasil Pengirim FTP dengan Protokol PPTP ....................... 60 Gambar 4.6 Hasil Pengiriman FTP dengan Protokol L2TP .................... 61 Gambar 4.7 Hasil Pengiriman FTP dengan Ipsec...................................62 Gambar 4.8 Grafik Perbandingan Transfer Time Pada Performa File Transfer ................................................................................................ 65 Gambar 4.9 Grafik Perbandingan Througput Pada Performa Tranter Time ............................................................................................................. 65 Gambar 4.10 Grafik Perbandingan Delay Pada Performa Transfer File .66 Gambar 4.11 Hasil Pengiriman Paket Ping Pada Protokol PPTP............ 67 Gambar 4.12 Hasil Pengiriman Paket Pign Pada Protokol L2TP............ 68 Gambar 4.13 Hasil Pengiriman Paket Ping Pada Protokol Ipsec ............ 69 Gambar 4.14 Grafik Perbandingan Transfer Time Pada Performa ICMP ............................................................................................................. 72 Gambar 4.15 Grafik Perbandingan Throughput Pada Performa ICMP ...72 Gambar 4.16 Grafik Perbandingan Delay Pada Performa ICMP ............ 73
xii
DAFTAR TABEL
Tabel 2.1Lapisan Dimana Ketiga Protokol Tunneling Diimplementasikan ............................................................................................................. 30 Tabel 2.2 Dukungan Untuk Protokol Komunikasi .................................30 Tabel 2.3 Perbandingan Protokol Berdasarkan Fitur Keamanan Terkait 32 Tabel 3.1 Alokasi Alamat IP .................................................................34 Tabel 4.1 Perbandingan Performa File Transfer ....................................63 Tabel 4.2 Perbandingan Performa ICMP ............................................... 70
xiii