Analisis Performa Site to Site IP Security Virtual Private Network (VPN) Menggunakan Algoritma Enkripsi ISAKMP
Abstract
Keywords
References
[1] F. A. Salman, “Implementation of IPsec-VPN Tunneling using GNS3,” Indones. J. Electr. Eng. Comput. Sci., vol. 7, no. 3, pp. 855–860, 2017.
[2] A. A. Eskandar, M. R. Syed, and M. B. Zarei, “SIP over IP VPN : Performance Analysis,” in Computer Engineering and Applied Computing (WorldComp), 2014, vol. 1, no. 1.
[3] I. AFRIANTO and E. B. SETIAWAN, KAJIAN VIRTUAL PRIVATE NETWORK ( VPN ) SEBAGAI SISTEM PENGAMANAN ( Studi Kasus Jaringan Komputer Unikom ), vol. 12, no. 1. 2014.
[4] S. R. Ahmed and P. Rajamohan, “Comprehensive performance analysis and special issues of Virtual Private Network strategies in the computer communication: A novel study,” Int. J. Eng. Sci. Technol., vol. 3, no. 7, 2013.
[5] D. Tjahjono, R. Shaikh, and W. Ren, “ESTABLISHING AN IPSEC (INTERNET PROTOCOL SECURITY) VPN (VIRTUAL PRIVATE NETWORK) TUNNEL,” US 8,893,262 B2, 2014.
[6] R. A. May, “POLICY-BASED CONFIGURATION OF INTERNET PROTOCOL SECURITY FORA VIRTUAL PRIVATE NETWORK,” US 9,065,802 B2, 2015.
[7] D. Suprijatmono and D. S. Kartawijaya, “Rancang Bangun Jaringan PABX Berbasis IP Menggunakan Metode IPsec VPN Gateway,” Sainstech, vol. 28, no. 2, pp. 39–49, 2018.
[8] R. Arlan, R. Munadi, and N. Andini, “IMPLEMENTASI DAN ANALISIS SISTEM KEAMANAN IP SECURITY (IPSEC) DI DALAM MULTI PROTOCOL LABEL SWITCHING-VIRTUAL PRIVATE NETWORK (MPLS-VPN) PADA LAYANAN BERBASIS IP MULTIMEDIA SUBSYSTEM (IMS),” e-Proceeding Eng. , vol. 3, no. 3, pp. 4630–4640, 2016.
[9] F. Bensalah, E. Casablanca, and N. EL KAMOUN, “Analytical performance and Evaluation of the Scalability of Layer 3 Tunneling Protocols: Case of Voice Traffic Over IP,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 17, no. May, pp. 361–369, 2017.
[10] M. Elezi and B. Raufi, “Conception of Virtual Private Networks using IPsec suite of protocols , comparative analysis of distributed database queries using different IPsec modes of encryption,” Procedia - Soc. Behav. Sci., vol. 195, pp. 1938–1948, 2015.
[11] C. Wang and J. Chen, “Implementation of GRE Over IPsec VPN Enterprise Network Based on Cisco Packet Tracer,” in 2nd International Conference on Soft Computing in Information Communication Technology, 2014.
[12] C. Paquet, Implementasi Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition, 2nd ed. USA: Cisco Press, 2013.
[13] A. M. Gamundani and M. Bere, “A VPN Security Solution for Connectivity over Insecure Network Channels : A A VPN Security Solution for Connectivity over Insecure Network Channels : A novel study .,” SSRG Int. J. Comput. Sci. Eng., vol. 1, no. October, pp. 1–8, 2014.
[14] G. Aggarwal, P. Shah, A. Thrivikramannair, and D. Blair, “TECHNIQUE FOR USING OER WITH AN ECT SOLUTION FOR MULT-HOMED SITES,” US 8,706,883 B2, 2014.
[15] S. Frankel and S. Krishnan, IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap (No. RFC 6071). 2011.
DOI: 10.30595/juita.v7i2.4491
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2579-8901

