Implementasi VPN Menggunakan Protokol L2TP Untuk Pengelolaan NAS (Network Attached Storage) Pada STB
Abstract
Implementing Virtual Private Network (VPN) in remote Network Attached Storage (NAS) control using L2TP protocol on Mikrotik Router. This study uses a used device, Set Top Box HG680P, converted into a NAS server as a more economical and environmentally friendly alternative to buying a conventional NAS server. Implementation of L2TP VPN via Mikrotik facilitates remote access with guaranteed security levels. Testing was carried out using two devices, a Laptop and a Smartphone, which were used to access and transfer data via a VPN network. The test results showed that the VPN implementation successfully facilitated access from various locations and data transfer with good performance. In testing, the download speed was 50 Mbps, and the upload speed was 10 Mbps for file sizes from 50 Mb to 1000 Mb. The test results using VPN gave an average speed of all file transfers of 15.12Mb/s with an average transfer time of 4 minutes 14 seconds. Testing was also carried out by disconnecting the VPN connection on Mikrotik. The unconnected VPN on Mikrotik causes the browser to fail to access the site because the VPN cannot access information on the NAS Server. Therefore, VPNs play an important role as a bridge to access the NAS server outside the local network. In access management, restrictions are imposed on each user to increase security when accessing or sharing files on the NAS server with others. The goal is for users to have access restrictions, only being able to access the specified parts. This research is expected to contribute to developing secure, economical, and efficient network solutions, especially in utilizing used devices for data management.
References
“ANALISIS PERFORMA E-LEARNING BERBASIS MOODLE BERJALAN DI SERVER RENDAH BIAYA STB FIBERHOME HG680-P.”
N. Sri, J. Kusuma, G. Sastrawangsa, I. Puritan, and W. Adh, “Rancang Bangun Server Network Attached Storage (NAS) Sebagai Penyimpanan Data Terpusat Studi Kasus SMAN 1 Denpasar.”
D. P. Kuswandono, “DESIGN PENGAMANAN AKSES JARAK JAUH JARINGAN RUMAH DENGAN TEKNOLOGI VPN (VIRTUAL PRIVATE NETWORK) BERBASIS DI CLOUD VPS (VIRTUAL PRIVATE SERVER),” 2018.
M. A. Gunawan and S. Wardhana, “Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network),” vol. 6, no. 1.
A. Purnama Sari and N. Kemala, “PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK,” vol. 7, no. 2, 2020.
R. Patuke, A. Mulyanto, and R. Takdir, “PENGUKURAN KINERJA SET TOP BOX (STB) SEBAGAI PENYIMPANAN CLOUD,” vol. 2, no. 1, 2022.
M. F. Ardiansyah, T. M. Diansyah, R. Liza, and D. Redaksi, “Attribution-ShareAlike 4.0 International Some rights reserved Cloud Computing Penggunaan Set top box Bekas untuk Dimanfaatkan sebagai Cloud Server INFORMASI ARTIKEL A B S T R A K.”
S. Pangestu and I. R. Widiasari, “Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling,” Jurnal Teknik Informatika dan Sistem Informasi, vol. 9, no. 2, 2022.
“Analisis Perbandingan Kinerja QOS Dengan Metode PPTP, L2TP, SSTP Dan IPSEC Pada Jaringan VPN Dengan Menggunakan Mikrotik Pada Kantor Badan Perwakilan Dan Kependudukan Keluarga Berencana Nasional (BKKBN) PekanBaru”.
M. Nasrulloh, “PEMANFAATAN SET TOP BOX SMART TV HG680P UNTUK AKSES INTERNET MURAH BAGI PELAJAR DESA SUNGAI BELIDA PADA MASA PANDEMI COVID-19,” May 2023.
B. Cahya, F. Rizki, A. Sutiyo, Y. El Saputra, and M. Elfarizi, “IMPLEMENTASI FIREWALL PADA MIKROTIK UNTUK KEAMANAN JARINGAN,” 2023. [Online]. Available: https://jurnal.ittc.web.id/index.php/jct/
M. Rafii and N. Wicaksana, “Perancangan Virtual Private Network Layer 2 Tunneling Protocol (L2TP) Berbasis Mikrotik,” vol. 1, no. 1, 2022, [Online]. Available: https://jurnal.netplg.com/
M. A. Gunawan and S. Wardhana, “Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network),” vol. 6, no. 1, 2023.
W. Wijaya, F. Panjaitan, S. Rizal, and M. Ulfa, “Perbandingan Kinerja Sistem Operasi Network Attached Storage: Studi Kasus Truenas dan Xigmanas,” Jurnal Indonesia : Manajemen Informatika dan Komunikasi, vol. 5, no. 1, pp. 255–261, Jan. 2024, doi: 10.35870/jimik.v5i1.468.
I. B. Putu, W. Politeknik, and N. Denpasar, “Rancang Bangun Media Storage Berbasis Armbian Menggunakan Orange-Pi dan Open media vault,” PATRIA ARTHA Technological Journal •, vol. 5, no. 1, 2021.
D. P. Kuswandono, “DESIGN PENGAMANAN AKSES JARAK JAUH JARINGAN RUMAH DENGAN TEKNOLOGI VPN (VIRTUAL PRIVATE NETWORK) BERBASIS DI CLOUD VPS (VIRTUAL PRIVATE SERVER),” 2018.
A. Purnama Sari and N. Kemala, “PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK,” vol. 7, no. 2, 2020.
Y. Mendrofa and R. Fauzi, “IMPLEMENTASI KEAMANAN JARINGAN MENGGUNAKAN PORT KNOCKING,” JURNAL COMASIE, 2023.
Copyright (c) 2025 Dimas Zaldiyanto, Subektiningsih, Irma Rofni Wulandari

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).