IARJSET International Advanced Research Journal in Science, Engineering and Technology ISO 3297:2007 Certified  Impact Factor 7.105  Vol. 9, Issue 8, August 2022 DOI: 10.17148/IARJSET.2022.9809 © IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License 60 ISSN (O) 2393-8021, ISSN (P) 2394-1588 PPTP VPN and L2TP/IPsec VPN Performance as Voice Data Security in VoIP Martono Dwi Atmadja 1 , Farida Arinie Soelistianto 2 , Harrij Mukti Khristiana 3 Electrical Engineering Major Lecturer, Malang state Polytechnic, Malang, Indonesia 1,2,3 Abstract: VoIP technology is a technology that allows long-distance voice communication by utilizing internet media. Communication between users through the internet requires a level of security that are confidential (private). However, using an open internet network requires a communication data security method with the implementation of network performance and security. This can be done with the application of the Virtual Private Network (VPN) method. VPN applications on VoIP are affected by the security system by encrypting data from VoIP communications. VPN PPTP computer network security technology in virtual private IP or as a tunnel as a secure data transmission medium. The PPTP VPN and L2TP/IPsec VPN methods are a Layer 2 (Layer 2 Tunnel Protocol) L2TP protocol, while the PPTP protocol uses only IP addresses, usernames and passwords for authentication. L2TP uses an additional authentication system, namely a Pre-shared key or secret. The purpose of this study is to compare security based on the protocol used with sniffing techniques and to obtain the Quality of Service (QOS) parameter values that includes bandwidth and delay. Performance test for bandwidth from the largest upload side, when using L2TP/IPsec VPN The average bandwidth value when uploading the G.711 codec is 76kbit/sec. While the download is around 77kbit/sec. Keywords: VoIP, VPN PPTP, VPN L2TP/IPsec, QoS I. INTRODUCTION The telecommunications technology industry is growing rapidly under customer service needs. The Telecommunications Operator must be able to read the customer's needs against the user's interests, and if it is unable to handle this then the Operator will only serve as a capacity provider. With the development of this service as well as optimization in financing and speed of access, the use of computer networks has also become one of the telecommunications technologies that develop in line with customer needs. IP-based communication technology that is embedded in the internet network is not only for data packet services and for word wide web, HTTP and FTP applications. One of the telecommunications technologies currently developing is voice communication via the internet. VoIP (Voice over Internet Protocol) telephone call technology via the internet [1]. The received voice is converted into a digital code and then passed through the network in the form of data packets [2]. The difference in telephone via VoIP lies in the security system compared to analogue voice [3]. In real-time packet data usage, call encryption is made so that it is not vulnerable to eavesdropping and the voice received by the recipient is clear. Disadvantages of VoIP need internet sender and receiver to be connected. When the network is experiencing bottlenecks, there are more and more communication connections via VoIP, so they are unable to access the server because of data overload. VoIP communication still needs a study on data security in voice communication when it takes place. When voice communication occurs, the possibility of eavesdropping, data content hijacking or not being able to access the server when the server is overloaded [4]. To handle this kind of condition, it is possible to apply a data security method to VoIP services using the PTPP VPN protocol security. VPN (Virtual Private Network) is a service that connects one network to another with a private system through the internet network [5]. Another capability of a VPN is to provide secure access through a server connection by hiding traces of personal data. VPN works by managing data encryption in the exchange of data before connecting to the public. Utilization of VPN as an alternative to using the internet network traversed by voice encryption by using private keys, certificates, or unique usernames so that they can authenticate in establishing connections. In network authentication with 80kbps (standard G.711) bandwidth requirement. VoIP communication between buildings requires security on the network (private) [6]. This can be done by using a VPN. Users can access information sources from outside that are in the local network. The importance of VPN security and privacy of data on transmission from unauthorized users in the same transmission can be limited by encryption and tunnelling of the VPN. The data that VPN receives and sends is guaranteed to be from a private source. VPN tunnelling creates a private connection path using other network infrastructure. VPN began with Swipe in 1993 with PPTP (Point to Point Tunnelling Protocol) then developed with IPsec until it was available in the form of Open VPN [7]. PPTP (Point to Point Tunnelling Protocol) is a network protocol that functions as a secure data transfer from a remote client to a company's private server by creating a VPN via TCP/IP. While Internet Protocol Security (IPsec) is a tunnelling protocol that works at layer 3. Provides the algorithm used in the service and places the cryptographic key according to the required service. This study aims to analyse the characteristics of voice security on VoIP by using a protocol that