0% found this document useful (0 votes)
6 views

Labs

Network security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Labs

Network security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Topology :

- First configure the addresses to each device


IP Addressing Table

Device Interface IP Address Subnet Mask Default Switch Port


Gateway
R1 G0/0 192.168.1.1 255.255.255.0 N/A S1 F0/1
S0/0/0 (DCE) 10.1.1.2 255.255.255.252 N/A N/A
R2 G0/0 192.168.2.1 255.255.255.0 N/A S2 F0/2
S0/0/0 10.1.1.1 255.255.255.252 N/A N/A
S0/0/1 (DCE) 10.2.2.1 255.255.255.252 N/A N/A
R3 G0/0 192.168.3.1 255.255.255.0 N/A S3 F0/5
S0/0/1 10.2.2.2 255.255.255.252 N/A N/A
PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 S1 F0/2
PC-B NIC 192.168.2.3 255.255.255.0 192.168.2.1 S2 F0/1
PC-C NIC 192.168.3.3 255.255.255.0 192.168.3.1 S3 F0/18
✓ Configure IPsec Parameters on R1

- Enable the Security Technology package

R1(config)# license boot module c1900 technology-package securityk9


Accept the end-user license agreement.
✓ Configure IPsec Parameters on R3
✓ Verify the IPsec VPN

- Verify the tunnel prior to interesting traffic.


Issue the show crypto ipsec sa command on R1. Notice that the number of
packets encapsulated, encrypted, decapsulated, and decrypted are all set to 0.
✓ Create interesting traffic.
o Ping from PC-A to PC-C

✓ Verify the tunnel after interesting traffic.


On R1, re-issue the show crypto ipsec sa command. Notice that the
number of packets is more than 0, which indicates that the IPsec VPN
tunnel is working.
Firewall
In this lab, we are going to study how Linux implements firewall. Linux has already a
built-in firewall called iptables.
6. Testing from the server to client (suppose client IP address is 10.0.2.15):

You might also like