INTRODUCTION 1.1. LITERATURE REVIEWS 2.1. METHADOLOGY 3.1. DESIGN 4.1. IMPLEMENTATION 5.1.

TABLE OF CONTENTS CHAPTER SUBJECT PAGE DECLARATION i DEDICATION ii ACKNOWLEDGEMENTS iii ABSTRACT iv ABSTRAK v TABLE OF CONTENTS vi LISTS OF TABLES x LISTS OF FIGURES xi LISTS OF ABBREVIATIONS xiv

CHAPTER 1 INTRODUCTION 1.1.

Introduction 1 1.2. Project Background 2 1.3. Problem Statement 3 1.4. Project Questions 3 1.5. Project Objectives 4 1.6. Project Contribution 4 1.7. Project Scope 4 1.8. Project Significant 5 1.9. Project Output 5 1.10. Report Organization 5 1.11. Conclusion 6

CHAPTER 2 LITERATURE REVIEWS 2.1.

Introduction 7 2.2. Previous Research and Current Problem Analysis 7 2.3. Wireless Communication 8 2.4. Android Framework 9 2.4.1. Android History 9 2.4.2. Android Architecture 10 2.5. Virtual Private Network VPN 11 2.5.1. Point-to-Point Tunneling PPTP 12 2.5.2. Internet Protocol Security IPSec 12 2.5.3. Transport Layer Security SSLTLS 12 2.6. Internet Protocol Security IPSec 12 2.6.1. IPSec Advantages and Disadvantages 13 2.6.1.1.Advantages 13 2.6.1.2.Disadvantages 13 2.6.2. IPSec Architecture 14 2.6.2.1.IP Security Modes 15 2.6.2.2.Security Protocol 16 2.6.2.3.Authentication and Encryption Algorithm 18 2.6.2.4.Security Association SA and Key Management 18 2.7. Openswan 18 2.7.1. Authentication Types 19 2.7.1.1.Pre Shared Key PSK 19 2.7.1.2.X.509 Certificate 19 2.7.1.3.RSA Keys 20 2.8. RADIUS 20 2.8.1. Authentication Protocols 20 2.9. Layer 2 Tunneling Protocol L2TP with Internet Protocol Security IPSec 21 2.10. Proposed Solution 21 2.11. Conclusion 22

CHAPTER 3 METHADOLOGY 3.1.

Introduction 23 3.2. Planning 23 3.3. Requirement Analysis 24 3.4. Network Design 24 3.5. Implementation 25 3.6. Testing 25 3.7. Documentation 25 3.8. Milestone 26 3.9. Gantt chart 26 3.10. Conclusion 27

CHAPTER 4 DESIGN 4.1.

Introduction 28 4.2. Network Design 28 4.2.1. Network Diagram 28 4.2.2. Logical Design 29 4.2.3. Network Architecture 30 4.3. Project Flowchart 31 4.4. Conclusion 32

CHAPTER 5 IMPLEMENTATION 5.1.

Introduction 33 5.2. Requirement Analysis 33 5.2.1. Hardware Requirements 34 5.2.2. Software Requirements 35 5.3. Server Site Implementation 38 5.3.1. Server Configurations 38 5.3.2. Openswan Configuration 40 5.3.3. Xl2tpd Configuration 43 5.3.4. PPP Configuration 44 5.3.5. FreeRADIUS Configuration 46 5.4. Client Site Implementation 47 5.5. Conclusion 50

CHAPTER 6 TESTING AND ANALYSIS 6.1.