Technical Report
Technical Report
Technical Report
Microsoft account
[COMPANY NAME] [Company address]
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN
Using CLI
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway Switch Port
Objectives
Verify connectivity throughout the network.
Configure R1 to support a site-to-site IPsec VPN with R3.
Background / Scenario
The network topology shows three routers. Your task is to configure R1 and R3 to support a site-to-
site IPsec VPN when traffic flows between their respective LANs. The IPsec VPN tunnel is from R1 to
R3 via R2. R2 acts as a pass-through and has no knowledge of the VPN. IPsec provides secure
transmission of sensitive information over unprotected networks, such as the Internet. IPsec operates
at the network layer and protects and authenticates IP packets between participating IPsec devices
(peers), such as Cisco routers.
ISAKMP Phase 1 Policy Parameters
Parameters R1 R3
Note: Bolded parameters are defaults. Only unbolded parameters have to be explicitly configured.
IPsec Phase 2 Policy Parameters
Parameters R1 R3
e. Verify that the Security Technology package has been enabled by using the show
version command.
Step 3: Identify interesting traffic on R1.
Configure ACL 110 to identify the traffic from the LAN on R1 to the LAN on R3 as interesting. This
interesting traffic will trigger the IPsec VPN to be implemented when there is traffic between the R1 to
R3 LANs. All other traffic sourced from the LANs will not be encrypted. Because of the implicit deny
all, there is no need to configure a deny ip any any statement.
R1(config)# access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0
0.0.0.255
Step 4: Configure the IKE Phase 1 ISAKMP policy on R1.
Configure the crypto ISAKMP policy 10 properties on R1 along with the shared crypto key vpnpa55.
Refer to the ISAKMP Phase 1 table for the specific parameters to configure. Default values do not
have to be configured. Therefore, only the encryption method, key exchange method, and DH method
must be configured.
Note: The highest DH group currently supported by Packet Tracer is group 5. In a production
network, you would configure at least DH 14.
R1(config)# crypto isakmp policy 10
R1(config-isakmp)# encryption aes 256
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 5
R1(config-isakmp)# exit
R1(config)# crypto isakmp key vpnpa55 address 10.2.2.2
b. If the Security Technology package has not been enabled, enable the package and reload R3.
Yes its already enabled