Você está na página 1de 19

DESIGN AND IMPLEMENTATION OF SINGLE DOMAIN

CONTROLLER IN HEAD OFFICE AND BRANCH OFFICES WITH

FACILITIES VPN IN ROUTER MIKROTIK

FINALPROJECTREPORT

Resolvedasaconditionforobtainingadegree

AHLIMADYA(AMD)

ComputerEngineering

By:

SAMUEL SOANGGAON HUTAPEA

1105112039

STUDYCOMPUTERENGINEERING
MAJORINGINCOMPUTERENGINEERINGANDINFORMATICS
MEDANSTATEPOLYTECHNIC
MEDAN
2014

PREFACE

PraiseandgreatgratitudetoAlmightyGodsubmittedbytheauthortothe

LordJesusChristMySaviorforblessingsandhelptocompletethisthesison

time.

ThisFinalProjectisarrangedtofulfilltherequirementsforobtainingAmd

degree,inComputerEngineeringStudyProgram,Majoringincomputer

engineeringandinformatics,MedanStatePolytechic.

Onthisoccasionwithgreathumility,Iwouldliketothankyoutoallof

thosewhohavegivenmehelpandguidancesothatthisthesiscanbefinished.

CompletionofwritingofthisFinalproject,theauthorwouldliketothankto:

1.M.Syahruddin,S.T.,M.T.,DirectorMedanStatePolytechnic.

2.FerriFachrizalS.T.,M.T., HeadofDepartment ofcomputerengineering

andinformaticsinMedanStatePolytechnic.

3.ZakariaSembiring,ST.,M.Sc.,HeadoftheComputerEngineeringProgram

atPolytechnicofMedanandsupervisorinthecompletionofthisfinal

project.

4.AllteachingstaffMedanStatePolytechnicthathasgiveninstructiontothe

authorduringthelectures.

5.PT.SocfinIndonesiawhichhasprovidedthesciencerelatedtothefinal

project.

6.Thewholefriends-friendsintheComputerEngineeringprogramto the

criticism,adviceandsupportgiventotheauthor.

vi

7.MyfamilyhasencouragedthecreationofthisFinalProject.

Finalwords,theauthorsaythankyousomuchindeedforallforthosewhoIcan

notmentionsthenames.HopefullythisFinalprojectcanbeusefulforusand

becometheinputforthepartiesinneed.

Medan,

Agustus2013

Author,

Samuel Soanggaon Hutapea

NIM.1105112039

vii

TABLE OF CONTENTS

VALIDATION SHEET ...................................................................................

ii

APPROVAL SHEET .......................................................................................

iii

PAGE OFFERINGS ........................................................................................

iv

PREFACE ........................................................................................................

TABLE OF CONTENTS.................................................................................

vii

TABLE OF FIGURES.....................................................................................

LIST OF TABLE ...........................................................................................

xiv

ABSTRACT ...................................................................................................

xv

CHAPTER 1 INTRODUCTION.....................................................................

1.1 Background ................................................................................................

1.2 Formulation of the Problem ......................................................................

1.3 Boundary Problem.....................................................................................

1.4 Motivation Final Project............................................................................

1.5 The purpose of Final Poject .......................................................................

1.6 Benefits of Final Project...........................................................................

1.7 Methods Final Project...............................................................................

1.7.1 Literature ............................................................................................ 5


17.2 Design System ..................................................................................... 5
17.3 Implementation and Testing ................................................................. 5
1.7.4 Analysis and Discussion ...................................................................... 6
1.7.5 Arranging of Final Project and Documentation.................................... 6
1.8 Systematic Preparation..............................................................................

1.8.1 Chapter I. Introduction ....................................................................... 6


1.8.2 Chapter II. Basic Theory .................................................................... 6

viii

1.8.3 Chapter III. Design System................................................................ 6


1.8.4 Chapter IV. Result and Discussion ...................................................... 7
1.8.5 Chapter V. Conclusions and Future Work........................................... 7
1.8.6 References.......................................................................................... 8
CHAPTER 2 BASIC THEORY ......................................................................

2.1 Computer Networks...................................................................................

2.1.1 OSI Model ......................................................................................... 19


2.2 Virtual Private Network (VPN).................................................................

22

2.2.1 Concept VPN ..................................................................................... 23


2.2.2 The Advantages of VPN ..................................................................... 23
2.2.3 Protokol PPTP VPN ........................................................................... 26
2.3 IP address ...................................................................................................

26

2.4 Router.........................................................................................................

26

2.5 Mikrotik .....................................................................................................

27

2.6 Domain Controller .....................................................................................

30

2.7 Active Directory .........................................................................................

32

CHAPTER 3 DESIGN SYSTEM ....................................................................

33

3.1 Tools and Application ................................................................................

33

3.1.1 Device Hadware ................................................................................. 33


3.1.2 Software............................................................................................. 35
3.2 Design System ............................................................................................

36

3.3 Configuration Windows Server 2008R2 ...................................................

52

3.3.1 Create AD DS .................................................................................... 52


CHAPTER 4 RESULT AND DISCUSSION .................................................

69

4.1 Output of Several tracert process..............................................................

69

4.2 Output of several ping Process ..................................................................

70

ix

4.3 Output of process Login Domain ..............................................................

72

CHAPTER 5 CONCLUSIONS AND FUTURE WORK................................

76

5.1 Conclusions ................................................................................................

76

5.2 Future Work ..............................................................................................

76

REFERENCES ................................................................................................

77

TABLE OF FIGURES

Figure2.1TopologyBus.................................................................................. 10

Figure2.2TopolgyStar.................................................................................... 11

Figure2.3TopologyRing................................................................................. 13

Figure2.4TopologyMesh................................................................................ 14

Figure2.5TopologyTree................................................................................. 16

Figure2.6TopologyLinear.............................................................................. 17

Figure2.7OsiLayer......................................................................................... 20

Figure2.8AccessVPN..................................................................................... 24

Figure2.9IntranetVPN.................................................................................... 25

Figure2.10ExtranetVPN................................................................................. 25

Figure3.1ResourcesRouterVPNServer......................................................... 34

Figure3.2ResourcesRouterBandRouterC.................................................... 34

Figure3.3TopologyVPN................................................................................. 36

Figure3.4EnablePPTPServer......................................................................... 38

Figure3.5PPPSecretRouterB........................................................................ 39

Figure3.6PPPSecretRouterC........................................................................ 40

Figure3.7RouteVPNServertorouterB.......................................................... 40

Figure3.8RouteVPNServertoRouterC........................................................ 41

Figure3.9ConfigurationFirewallVPNServer................................................. 42

Figure3.10AddScript...................................................................................... 44

Figure3.11AddScheduler............................................................................... 45

Figure3.12CheckLog..................................................................................... 46

xi

Figure3.13DialUsbmodemrouterB.............................................................. 47

Figure3.14DialUsbmodemrouterC.............................................................. 47

Figure3.15NewPPTPClientrouterB............................................................. 47

Figure3.16NewPPTPClientrouterC............................................................. 47

Figure3.17DialPPTPClientrouterB.............................................................. 48

Figure3.18DialPPTPClientrouterC.............................................................. 48

Figure3.19IpAddressRouterB...................................................................... 49

Figure3.20IpAddressRouterC...................................................................... 49

Figure3.21ConfigRouteinRouterB.............................................................. 50

Figure3.22ConfigRouteinRouterC.............................................................. 50

Figure3.23ConfigFirewallRouterBandRouterC......................................... 51

Figure3.24ConfigFirewallAllRouter............................................................. 52

Figure3.25ServerManager.............................................................................. 53

Figure3.26ActiveDirectoryDomainServicesInstallationWizard................... 53

Figure3.27Confimation................................................................................... 54

Figure3.28Results........................................................................................... 54

Figure3.29DCPromoWizard.......................................................................... 55

Figure3.30Step2afterDCPromoWizard....................................................... 55

Figure3.31Step3DCPromo........................................................................... 56

Figure3.32Step4DCPromo........................................................................... 57

Figure3.33Step5DCPromo........................................................................... 57

Figure3.34Step6DCPromo........................................................................... 58

Figure3.35Step7DCPromo........................................................................... 59

Figure3.36Step8DCPromo........................................................................... 59

xii

Figure3.37Step9DCPromo........................................................................... 60

Figure3.38CreateNewOU............................................................................. 61

Figure3.39RouterB........................................................................................ 61

Figure3.40RouterC........................................................................................ 61

Figure3.41TheResultofMakingOU.............................................................. 62

Figure3.42CreateUserinOURouterB........................................................... 62

Figure3.43CreateUserinOURouterC........................................................... 62

Figure3.44CreatePasswordUserRaisa........................................................... 63

Figure3.45CreatePasswordUserAurakasih.................................................... 63

Figure3.46MakingofauserintheOUisFinished.......................................... 63

Figure3.47CreateGroup................................................................................. 64

Figure3.48CreateGroupName....................................................................... 64

Figure3.49SamuelGroup................................................................................ 65

Figure3.50MembersGroup............................................................................. 65

Figure3.51Permissionsforhomeshare............................................................ 66

Figure3.52IPaddressWindowsServer............................................................ 67

Figure3.53IPaddressuserRaisa...................................................................... 68

Figure3.54IPaddressuserAurakasih.............................................................. 68

Figure4.1Tracert192.168.60.10...................................................................... 69

Figure4.2Tracert192.168.50.5........................................................................ 70

Figure4.3Ping192.168.60.10.......................................................................... 71

Figure4.4Ping192.168.50.5............................................................................ 71

Figure4.5Ping192.168.50.5............................................................................ 72

Figure4.6Configurationdomaininwindowsclient.......................................... 73

xiii

Figure4.7LoginClientAurakasihtodomain.................................................... 73

Figure4.8Welcometodomain......................................................................... 74

Figure4.9SERVER1....................................................................................... 74

Figure4.10folderhomeshare........................................................................... 75

Figure4.11IsiFolderHomeshare.................................................................... 75

xiv

LIST OF TABLE

Table2.1OsiLayer.......................................................................................... 20

Table3.1StructureIP....................................................................................... 36

xv

ABSTRACT

TheInternetisaglobalnetworkandisopen,whereanyusercancommunicate
andexchangeinformation.AlongwiththewidespreaduseoftheInternet,many
companies who then utilize the Internet astheir personal networksto save costs
andsimplifycommunication.However,securityissuesarestillamajorfactor.
OneofthetechnologiesthatcanmeetthoseneedsisatechnologySitetoSite
VirtualPrivateNetwork(VPN).SitetoSiteVPNisatechnologythatenablesthe
privatedatanetworkconnectiontothepublicnetworkwith connectbetweentwo
ormoreofficesarelocatedfarapart.ByimplementingaVPN,companiescan
maximizedomaincontrollerinthecentralofficeasadomaincontrollerinthe
branchoffice.Withthistechnology,thecompanycanbeobtaincostsavingsfrom
thenumberofserversandandassistITontheprocessmaintancenetworkbranch
officesfromthecentraloffice.

Keywords:VPN,Internet,Security,DomainController.

CHAPTER I

INTRODUCTION

Thischapterdiscussabouttheproblemtakenasthefinaltitle(Background),after

backgrounddiscussedistheproblemsencounteredinthefinalproject

(Formulationoftheproblem),Theextenttowhichthefinaltaskwillbediscussed

(BoundaryProblem),whichisarealproblemthatcanbesolvedbyTitle

(MotivationFinalProject),Resolvingtheproblemformulationoftheproblem

(ThepurposeofFinalProject),thebenefitsofthecontentsofthefinalproject

(BenefitsofFinalProject),thestepsinmakingthefinaltask(MethodsFinal

Project),adescriptionofthepreparationofthefinalproject(Systematic

preparation),timeinthefinalworkplan(Workschedule),requiredequipment

(Equipment),andReference.

1.1

Background

Presently,thecompanyrequiretobemoreprofessionalincarryingout

communicationsbetweenheadofficeandbranchoffices. Some waystodevelop

goodcompanyoneofwhichsupportsthequalityofhumanresourcesisneededin

thefieldoftechnologytoacceleratecommunicationofinformationincompleting

thework.

VirtualPrivateNetwork(VPN)isatechnologytosolvetheproblem.VPN

isavirtualconnectionwithinapublicnetworkthathassecuritymechanismsinit,

VPNs alsobeinterpretedas anetwork ofnetworks,orcan bereferredtoasthe

tunnel.Intheprocessofobtainingtheinformation,thecomputerwillbe

connectedtothepublicnetworkortheInternetandsecuritymechanismsand

proceduresintheVPNonlyallowsuserswhohaveaccesstoaVPNthatcan

obtaintheinformationthatflowsthroughtheVPNnetwork.

WithaVPN,thenwecancombinewithdesigningaSingleDomain

Controllerattheheadofficeandbranchoffices.Thedomaincontrollerisaserver

thatmanagesallsecurity-relatedaspectsoftheaccount,thusmakingsecurity

administrationcanbedonecentrallyandDomainControllerisalsoamajor

featureofwindows server.Thedomaincontrolleris usuallyinstalledon alocal

areanetwork(LAN),becauseitusesVPNfacilities,thecomputersatthehead

officeandbranchofficeswillbelikeinalocalareanetwork.

Basedonthebackgroundoutlinedabove,theauthorsintendtotakethe

topic of this Final Project with the title of DESIGN AND

IMPLEMENTATIONOFSINGLEDOMAINCONTROLLERINHEAD

OFFICEANDBRANCHOFFICESWITHFACILITIESVPNIN ROUTER

MIKROTIK.

1.2

FormulationoftheProblem

Basedonthebackgroundthathasbeenoutlinedabove,therearesome

problemsasfollows:

1.HowtodesignasingledomaincontrollerintheVPNnetworkusing

Mikrotikrouters?

2.HowtoimplementasingledomaincontrollerinVirtualPrivate

Network(VPN)?

3.HowtotestasingledomaincontrollerinVirtualPrivateNetwork

(VPN)?

1.3

BoundaryProblem

Thescopeofprobleminthisthesishaveaboundaryproblemasfollows:

1.Serversandclientsusingtheoperatingsystemoutsideofthe

Windowsserveroperatingsystem.

2.MethodsusedinVPNnetworkisamethodofsitetosite.

3.Routersareusedis3routers.

4.RoutersthatuseMikrotikrouters.

5.ProtocolusedintheVPNnetworkisPPTPProtocol.

1.4

MotivationFinalProject

Theproblemfacedbythecompanyinanefforttofacilitate

communicationbetweenheadofficeandbranchofficesistousethetitle"Design

andImplementation ofasingledomaincontrollerin theheadofficeandbranch

offices withfacilitiesinMikrotikVPNrouter".Sothecompany can controlthe

branchofficesfromthecentraloffice.

1.5

ThepurposeofFinalProject

Thepurposeofthisfinalprojectis:

1.TodesignasystemofsingledomaincontrollerintheVPN networkusing

Mikrotikrouters.

2.ToimplementasingledomaincontrollerinVirtualPrivateNetwork

(VPN).

3.TotestthesingledomaincontrollerinVirtualPrivateNetwork(VPN).

1.6

Benefitsoffinalproject

Thebenefitsofthisfinalprojectisdividedinto3parts:

1.Institution

ThisFinalProjectcanbeamoduleandreferenceforstudentsinMedan

StatePolytechnic.

2.Community-Broad

ThisFinalProjectcanbeusefultobroadenandfacilitateanetwork

engineertocontrolsystemattheheadofficeandbranchoffices.

3.Author

Fortheauthorthisfinalprojectwillbeoneoftheskillsthatmaybein

needintheworldofworklater.

1.7Methodsfinalproject

This sectionarediscussed including literature, designthe system,

implementingandtesting,analysis anddiscussion,arrangingofthefinal project

anddocumentation.

1.7.1 Literature

Atthisstage,astudyoftheproblemsofreferencesavailable,andvarious

sourcesofdomaincontroller,aswellasfind informationabout asecureprotocol

used forVPNconnectionsontherouter mikrotik. Basedonthe studiesthat have

beendonecanbe concludedthat theuseofthedomaincontroller fromwindows

serverandroutermikrotikwithfacilitiesL2TPprotocol(L2TP).

1.7.2 DesignSystem

Atthisstage,willbedesignedforbothVPNrouters,asingledomain

controllerandwindowsserverdesignfeatures.

1.7.3 ImplementationandTesting

Atthisstageinthedesignphaseofasingledomaincontroller.The

operatingsystemthatisusedtodesignasingledomaincontrolleriswindows

server.Testingwillbedoneatthisstageistoconnectthetworoutersinthe

networkVPN,andinstallingsingledomaincontrollerincomputerclientthatis

connectedintheVPNnetwork,thenumberofhostsinuseduring

implementationisis2hostinrouterheadofficeand1hostinrouterbranchoffice.

1.7.4 AnalysisandDiscussion

Atthis stage oftheanalysis will bedoneon the systemthatwas created

basedonfinalprojectgoalsandidentifytheproblemsthatmayarise.Inthisstage

ofthediscussionalsodonetrialsthathavebeendoneinthepreviousstage.

1.7.5 ArrangingofFinalProjectandDocumentation

Atthis stageisthearranging ofareportcontaining documentation about

creatingasingledomaincontrollerintheVPNnetwork,aswellastheresults

fromoftrialsthathavebeenmade.

1.8SystematicPreparation

ThissectionarediscussedincludingChapter1,Chapter2,Chapter3,Chapter

4,andChapter5.

1.8.1 CHAPTER1.INTRODUCTION

ThischaptercontainstheBackground,FormulationoftheProblem,

Boundary Problem,MotivationFinalProject,Benefitsoffinalproject,Methods

finalproject,Systematicpreparation,Equipment,andReference.
7

1.8.2 CHAPTER2.BASICTHEORY

Thischaptercontainssomesupportingtheoriesthatrelatetothesubject

andunderlyingFinalProject.

1.8.3 CHAPTER3.DESIGNSYSTEM

ThischapterdiscussesthedesignofNetworkSystems,designing features

inusewindowsserverandnetworktopology.

1.8.4 CHAPTER4.RESULTANDDISCUSSION

Thischapterdiscussestheresultsof systemdesignhasbeendoneatthe

designstage ofthesystemand discusses the testscenarios againsta systemthat

hasbeencreated.

1.8.5 CHAPTER5.CONCLUSIONSANDFUTUREWORK

Thischaptercontainsthefinalconclusionaftertesting,evaluationof

networksystems,andsuggestionsobtainedfromtheresultsoftrialsthathave

beenconductednetworksystems.

Você também pode gostar