lab9
lab9
Section: F
SRN: PES1UG21CS357
Task 1:
As the VPN server is properly configured, we can ping host V from the VPN server
In the first screenshot, it can be seen that the interface name is tun0 but, in the
second screenshot the name has been changed to CS3570.
Task 2.B:
Task 2.C:
The first ping is successful as tun is configured in the 192.168.53.0/24 network and
the ping is also from the same network. The second ping fails as it isn’t on the
same network.
Task 2.D:
The ping is successful and prints the source and destination of the ICMP request
packets
Task 3:
The ping packets to 192.168.53.5 and 192.168.60.5 are encapsulated in UDP
segments and sent to the server where the ICMP packets are extracted and
forwarded to the correct ip.
Task 4:
We are able to ping host V from host U as the packets are passing through the
tunnel. But there is only request and no reply as that part has not yet been setup.
Task 5:
We can reach host V from host U and vice versa through tunnelling. We are able to
get both the request and reply for the ping and telnet requests in the wireshark
terminal.
Task 6:
We have established a telnet connection from host U to host V. when the VPN
connection is broken, the telnet connection also breaks. So, typing anything in the
telnet window makes no difference. Re-establishing the connection takes some
time and is not immediate. But, when the connection gets established, the text
that was typed gets sent.