Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik
DOI:
https://doi.org/10.29408/jit.v8i2.30230Keywords:
L2TP/IPSec, MikroTik, PPTP, Quality of Service, VPN SecurityAbstract
Virtual Private Network (VPN) has become a critical solution for ensuring secure communication over public networks. This research conducts a comprehensive analysis of the performance and security of two major VPN protocols: Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol with Internet Protocol Security (L2TP/IPSec) implemented on MikroTik devices. The research methodology uses an experimental approach by testing throughput, latency, packet loss, and CPU utilization in various network scenarios. The results show that PPTP provides higher throughput with minimal overhead, but has significant weaknesses in security aspects. Conversely, L2TP/IPSec offers superior security levels with strong encryption, although it results in higher latency and lower throughput. These findings provide important insights for network administrators in choosing VPN protocols that suit organizational needs, considering the trade-off between performance and security
References
[1] H. P. Fitrian, A. A. Nurani, I. Mulhakim, N. Maesaroh, and P. Raharja, "Analisis Manajemen Trafik Jaringan pada Virtual Private Network (VPN) Menggunakan Protokol PPTP, L2TP/IPSec, dan OpenVPN," 2025.
[2] S. Yaqoob, A. Hussain, F. Subhan, G. Pappalardo, and M. Awais, "Deep Learning Based Anomaly Detection for Fog-Assisted IoVs Network," *IEEE Access*, vol. 11, pp. 19024–19038, 2023, doi: 10.1109/ACCESS.2023.3246660.
[3] [3] L. O. Sari and H. Helena, "Implementasi Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik," *MALCOM: Indonesian Journal of Machine Learning and Computer Science*, vol. 4, no. 4, pp. 1496–1504, Sep. 2024, doi: 10.57152/malcom.v4i4.1651.
[4] D. Kim, N. Kim, and J. Ahn, "Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis," *Computers, Materials and Continua*, vol. 78, no. 3, pp. 3867–3889, 2024, doi: 10.32604/cmc.2024.046871.
[5] J. Deep Q-Learning, H. Alavizadeh, H. Alavizadeh, and J. Jang-Jaccard, "Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection," 2022, doi: 10.3390/computers.
[6] Z. Chen, "Research on Internet Security Situation Awareness Prediction Technology Based on Improved RBF Neural Network Algorithm," *Journal of Computational and Cognitive Engineering*, vol. 1, no. 3, pp. 103–108, Aug. 2022, doi: 10.47852/bonviewJCCE149145205514.
[7] A. Fatani, A. Dahou, M. A. A. Al-Qaness, S. Lu, and M. A. Elaziz, "Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System," *Sensors*, vol. 22, no. 1, Jan. 2022, doi: 10.3390/s22010140.
[8] A. Ali et al., "An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network," *Sensors*, vol. 22, no. 2, Jan. 2022, doi: 10.3390/s22020572.
[9] A. Esmaeily and K. Kralevska, "Orchestrating Isolated Network Slices in 5G Networks," *Electronics*, vol. 13, no. 8, Apr. 2024, doi: 10.3390/electronics13081548.
[10] A. K. Balyan et al., "A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method," *Sensors*, vol. 22, no. 16, Aug. 2022, doi: 10.3390/s22165986.
[11] S. Budiyanto and D. Gunawan, "Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol," *IEEE Access*, vol. 11, pp. 60853–60865, 2023, doi: 10.1109/ACCESS.2023.3286032.
[12] N. S. Musa, N. M. Mirza, S. H. Rafique, A. M. Abdallah, and T. Murugan, "Machine Learning and Deep Learning Techniques for Distributed Denial of Service Anomaly Detection in Software Defined Networks - Current Research Solutions," *IEEE Access*, vol. 12, pp. 17982–18011, 2024, doi: 10.1109/ACCESS.2024.3360868.
[13] P. Krishnan, K. Jain, A. Aldweesh, P. Prabu, and R. Buyya, "OpenStackDP: A Scalable Network Security Framework for SDN-based OpenStack Cloud Infrastructure," *Journal of Cloud Computing*, vol. 12, no. 1, Dec. 2023, doi: 10.1186/s13677-023-00406-w.
[14] C. Fu et al., "A Generic High-Performance Architecture for VPN Gateways," *Electronics*, vol. 13, no. 11, Jun. 2024, doi: 10.3390/electronics13112031.
[15] D. Setya Aji, F. Wahyu Christanto, J. Arteri Soekarno-Hatta Tlogosari, K. Semarang, and J. Tengah, "Analisis dan Perbandingan QoS Jaringan Internet dengan Metode PPPoE, PPTP, dan L2TP pada Implementasi Hotspot RT/RW Net," 2023.
[16] D. Soldani et al., "E-BPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond)," *IEEE Access*, vol. 11, pp. 57174–57202, 2023, doi: 10.1109/ACCESS.2023.3281480.
[17] F. Hauser, M. Haberle, and M. Menth, "P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN," *IEEE Access*, vol. 11, pp. 56300–56309, 2023, doi: 10.1109/ACCESS.2023.3283428.
[18] M. A. Gunawan and S. Wardhana, "Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network)," vol. 6, no. 1.
[19] B. D. D. Arianti, Jamaluddin, and H. Kuswanto, "Analisis penerapan RT-RW Net menggunakan Topologi Mesh-Wireless untuk meningkatkan pemahaman Administrasi Sistem Jaringan Siswa," Infotek : Jurnal Informatika dan Teknologi, vol. 7, no. 1, pp. 236-245, Jan. 2024, doi: 10.29408/jit.v7i1.24809.
[20] P. Bidang, K. Sains, P. Informatika, and A. Maulana, "Analisa Performa Interkoneksi VPN Menggunakan Metode L2TPv3," *Jurnal Edik Informatika*, vol. 10, no. 2, 2024, doi: 10.22202/ei.2024.v10i2.7538.
[21] C. Park, J. Lee, Y. Kim, J. G. Park, H. Kim, and D. Hong, "An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks," *IEEE Internet of Things Journal*, vol. 10, no. 3, pp. 2330–2345, Feb. 2023, doi: 10.1109/JIOT.2022.3211346.
[22] T. Rahman, G. M. V. T. Mariatmojo, H. Nurdin, and H. Kuswanto, "Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi," *Teknika*, vol. 11, no. 2, pp. 138–147, Jul. 2022, doi: 10.34148/teknika.v11i2.482.
[23] D. Zaldiyanto and I. Rofni Wulandari, "Implementasi VPN Menggunakan Protokol L2TP untuk Pengelolaan NAS (Network Attached Storage) pada STB," *Bulletin of Information Technology*, vol. 5, no. 4, pp. 387–395, 2024, doi: 10.47065/bit.v5i2.1770.
[24] L. O. Sari, E. Safrianti, and D. Wahyuningtias, "Analisis Keamanan Jaringan Berbasis Point to Point Protocol Over Ethernet (PPPoE) Menggunakan Mikrotik," *MALCOM: Indonesian Journal of Machine Learning and Computer Science*, vol. 4, no. 3, pp. 943–954, May 2024, doi: 10.57152/malcom.v4i3.1301.
[25] S. Park, S. Kwon, Y. Park, D. Kim, and I. You, "Session Management for Security Systems in 5G Standalone Network," *IEEE Access*, vol. 10, pp. 73421–73436, 2022, doi: 10.1109/ACCESS.2022.3187053.
[26] L. M. Silalahi et al., "Application of MPLS Tunnel Services L2TP-VPN Optimization Concept with Traffic Engineering Method for Looping-Protection Services Analysis," *International Journal of Electronics and Telecommunications*, vol. 69, no. 1, pp. 115–120, 2023, doi: 10.24425/ijet.2023.144339.
[27] X. J. Li, M. Ma, and Y. Sun, "An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids," *Algorithms*, vol. 16, no. 6, Jun. 2023, doi: 10.3390/a16060288.
[28] R. Elsya Putra et al., "Nomor 2," *Agustus*, vol. 22, pp. 340–347, 2023. [Online]. Available: https://ojs.trigunadharma.ac.id/index.php/jis/index
[29] A. F. Gentile, D. Macrì, F. De Rango, M. Tropea, and E. Greco, "A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment," *Future Internet*, vol. 14, no. 9, Sep. 2022, doi: 10.3390/fi14090264.
[30] G. Jekateryńczuk, D. Jankowski, R. Veyland, and Z. Piotrowski, "Detecting Malicious Devices in IPsec Traffic with IPv4 Steganography," *Applied Sciences*, vol. 14, no. 9, May 2024, doi: 10.3390/app14093934.
[31] E. P. Saputra, A. Saryoko, M. Maulidah, N. Hidayati, and S. Dalis, "Analisis Quality of Service (QoS) Performa Jaringan Internet Wireless LAN PT. Bhineka Swadaya Pertama," *Jurnal Sains dan Manajemen*, vol. 11, no. 1, 2023.
[32] S. W. Nourildean, "Virtual Private Network Firewall Integration for Wireless Local Area Network Improvement against Jammers," *International Journal of Electrical and Electronic Engineering and Telecommunications*, vol. 13, no. 1, pp. 58–66, 2024, doi: 10.18178/ijeetc.13.1.58-66.
[33] E. Elkana, D. Djoko, and A. Widodo, "Application of VPN Based on L2TP untuk Mengakses e-Rapor di SMKN 5 Semarang." [Online]. Available: https://elektroda.uho.ac.id/
[34] Z. Sui, H. Shu, F. Kang, Y. Huang, and G. Huo, "A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches," *Applied Sciences*, vol. 13, no. 3, Feb. 2023, doi: 10.3390/app13031974.
[35] M. Wahyu, A. S. Fitrani, and Hindarto, "Penerapan Bot Telegram untuk Sistem Monitoring Jaringan Intranet Daerah di Instansi Pemerintahan," Infotek : Jurnal Informatika dan Teknologi, vol. 7, no. 1, pp. 112-122, Januari 2024, doi: 10.29408/jit.v7i1.24014.
[36] T. Kemendikbud, A. Dwi Prameswari, and R. D. Marcus, "Peningkatan Keamanan Jaringan Virtual Private Network Menggunakan Protokol IKE/IPSec Berbasis Mikrotik," *J-INTECH (Journal of Information and Technology)*.
[37] D. N. Amadi, A. Budiman, and P. Utomo, "Analysis of the Effectiveness of VPN and PPTP Protocol in E-Link Health Report Application Using NDLC Method," *Journal of Information Systems and Informatics*, vol. 6, no. 2, pp. 949–958, Jun. 2024, doi: 10.51519/journalisi.v6i2.746.
[38] A. Sudianto, B. A. C. Permana, Muhammad Wasil, and Harianto, “Penerapan Sistem Payment Gateway Pada E-Commerce Sebagai Upaya Peningkatan Penjualan”, INFOTEK, vol. 8, no. 1, pp. 271–279, Jan. 2025.
[39] M. Munaza Fathsyah et al., "Implementasi Virtual Private Network Failover Menggunakan Mikrotik Pada Jaringan Lokal Politeknik Negeri Sriwijaya," *Jurnal Teknik Komputer AMIK BSI*, vol. 7, no. 2, 2021, doi: 10.31294/jtk.v4i2.
[40] Y. N. Sari, D. Irfan, and A. Huda, "Network Security Analysis Using Virtual Private Network in Vocational School," *Jurnal Paedagogy*, vol. 9, no. 3, p. 582, Jul. 2022, doi: 10.33394/jp.v9i3.5346.
[41] R. Febrianti, E. Rikardo Nainggolan, U. Radiyah, T. Informatika, and S. Tinggi Manajemen Informatika dan Komputer Nusa Mandiri, "Implementasi VPN Berbasis Point To Point Tunneling Protocol (PPTP) Menggunakan Mikrotik Router Board." [Online]. Available: http://ejournal.bsi.ac.id/ejurnal/index.php/infortech46
[42] Ubaidi and N. Puspa Dewi, "Analisis dan Implementasi VPN pada VPS untuk Peningkatan Aksesibilitas Jaringan di Lingkungan Perguruan Tinggi," *Jurnal Informasi dan Teknologi*, pp. 131–140, Nov. 2023, doi: 10.60083/jidt.v5i3.409.
[43] R. D. Gulo and M. Raharjo, "Implementasi Jaringan VPN PPTP Menggunakan IP Publik VPS Untuk Web Server Pada SMK Yadika 2," *Media Jurnal Informatika*, vol. 15, no. 2, p. 117, Dec. 2023, doi: 10.35194/mji.v15i2.3388.
[44] S. T. Oktavia, D. F. Priambodo, N. Trianto, and R. Purwoko, "Comparative Quality of Service Analysis of VPN Protocols on IPv6," *Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI)*, vol. 12, no. 3, pp. 461–471, Jan. 2024, doi: 10.23887/janapati.v12i3.69264.
[45] R. Elsya Putra et al., "Nomor 2," *Agustus*, vol. 22, pp. 340–347, 2023. [Online]. Available: https://ojs.trigunadharma.ac.id/index.php/jis/index
[46] F. P. E. Putra, Ubaidi, S. A. A. Sugi, K. Mufidah, and Y. R. Febriani, "Analysis of Cyber Attacks on Network Security," *Jurnal Informasi dan Teknologi*, vol. 6, no. 2, pp. 204–208, 2024, doi: 10.60083/jidt.v6i2.569.
[47] E. Suhadi and T. Arifin, "Rancangan Virtual Private Network Pada Kantor Prolov Menggunakan ZeroTier," *JIKA (Jurnal Informatika)*, vol. 8, no. 1, p. 66, Jan. 2024, doi: 10.31000/jika.v8i1.9979.
[48] I. W. Yudik Pradnyana, K. Y. E. Aryanto, and I. G. Aris Gunadi, "Desain Data Center Perbankan dengan Metode Network Development Life Cycle (NDLC) (Studi Kasus PT. BPR XYZ)," *Jurnal Pendidikan Teknologi dan Kejuruan*, vol. 21, no. 2, 2024.
[49] L. Oktaviana Sari, T. Dwi Kharisma, K. H. Binawidya Jl Sobrantas KM, and S. Baru, "Implementation of VPN Using the PPTP Method to Access CCTV Monitoring Data at the Bukit Raya District Office," vol. 9, no. 2, p. 2024.
[50] Z. Gao, F. Chen, Y. Wang, W. He, X. Shi, and G. Xie, "MVPN: A Defense Architecture against VPN Traffic Hijacking Based on MTD," *Electronics*, vol. 12, no. 3, Feb. 2023, doi: 10.3390/electronics12030711.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Infotek: Jurnal Informatika dan Teknologi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Semua tulisan pada jurnal ini menjadi tanggung jawab penuh penulis. Jurnal Infotek memberikan akses terbuka terhadap siapapun agar informasi dan temuan pada artikel tersebut bermanfaat bagi semua orang. Jurnal Infotek ini dapat diakses dan diunduh secara gratis, tanpa dipungut biaya sesuai dengan lisense creative commons yang digunakan.
Jurnal Infotek is licensed under a Creative Commons Attribution 4.0 International License.
Statistik Pengunjung