Accept the end-user license agreement. ✓ Configure IPsec Parameters on R3 ✓ Verify the IPsec VPN
- Verify the tunnel prior to interesting traffic.
Issue the show crypto ipsec sa command on R1. Notice that the number of packets encapsulated, encrypted, decapsulated, and decrypted are all set to 0. ✓ Create interesting traffic. o Ping from PC-A to PC-C
✓ Verify the tunnel after interesting traffic.
On R1, re-issue the show crypto ipsec sa command. Notice that the number of packets is more than 0, which indicates that the IPsec VPN tunnel is working. Firewall In this lab, we are going to study how Linux implements firewall. Linux has already a built-in firewall called iptables. 6. Testing from the server to client (suppose client IP address is 10.0.2.15):