Convert Serial To IPsec VPN
Convert Serial To IPsec VPN
Topology Diagram
Addressing Table
Device R1 Interface Fa0/0 S0/0/0 S0/0/0 R2 Fa0/0 S0/0/1 S0/0/0 R3 PC-A PC-B PC-C ISP-A Controllers S0/0/1 Fa0/0 NIC NIC NIC Serial Network IP Address 192.168.1.1 172.16.1.2 172.16.1.1 192.168.2.1 10.2.2.1 10.45.1.101 10.2.2.2 192.168.3.1 192.168.1.3 192.168.2.3 192.168.3.3 10.45.1.102 Subnet Mask 255.255.255.0 255.255.255.252 255.255.255.252 255.255.255.0 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.252
Page 1 of 6
All contents are Copyright 19922010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Broadband Technologies
Device
NIC
Learning Objectives
Verify connectivity throughout the network. Eliminate the serial connection between the Hospital and the Medical Center. Configure router R1 to support a site-to-site IPsec VPN with R3.
Scenario
One of the advantages to high speed broadband connectivity is that it can replace more expensive technologies, such as point-to-point serial T1 connections. When combined with an IPsec VPN tunnel, broadband can provide a secure, always-on connection between two locations. In this scenario, a medical clinic has leased space in its remote office to a radiology practice. The radiologist must have secure connectivity with the hospital to exchange images and to transfer patient information. A T1 serial connection provides that access now, but the costs are becoming prohibitive. The hospital IT department suggested that the Medical Center configure an IPsec site-to-site VPN tunnel between the remote office router and a router located in the hospital radiology department. The hospital IT technician sent the IPsec configuration parameters to the Medical Center and has already configured the router R3 to make the connection. The network topology shows the three routers. Your task is to disconnect the serial link between the Medical Center router (R2) as it will not be needed once the VPN is set up. Then configure router R1 to support a siteto-site IPsec VPN when traffic flows between the remote office LAN and the hospital LAN. The IPsec VPN tunnel is from router R1 to router R3 via R2 and the ISP network. Both R2 and the ISP data center act as a pass-through and have no knowledge of the VPN. IPsec provides secure transmission of sensitive information over unprotected networks such as the Internet. IPsec acts at the network layer, protecting and authenticating IP packets between participating IPsec devices (peers), such as Cisco routers. Review the VPN Configuration Overview Document for more information.
All contents are Copyright 19922010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 6
Broadband Technologies
Note: Bolded parameters are defaults. Only unbolded parameters have to be explicitly configured.
The routers have been pre-configured with the following: Password for console line: ciscoconpa55 Password for vty lines: ciscovtypa55 Enable password: ciscoenpa55 RIP version 2
All contents are Copyright 19922010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
Broadband Technologies
All contents are Copyright 19922010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 6
Broadband Technologies
Step 5. Prepare router R3 to use the new VPN connection. Activate the IPSec-ISAKMP map on the R3 interface that connects to the ISP. Use the command crypto map VPN-MAP at the interface configuration mode prompt and observe that ISAKMP is now set to ON. R3(config)#interface s0/0/0 R3(config-if)#crypto map VPN-MAP *Jan 3 07:16:26.785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
Use the PING command to verify that router R1 can reach router R3 through router R2 and the ISP connection. A VPN tunnel cannot be created if the two endpoint routers (R1 and R3) cannot communicate with each other through the various networks. Identify interesting traffic on R1. Configure ACL 110 to identify the traffic from the LAN on R1 to the LAN on R3 as interesting. This interesting traffic will trigger the IPsec VPN to be implemented whenever there is traffic between R1 to R3 LANs. All other traffic sourced from the LANs will not be encrypted. Remember that due to the implicit deny all, there is no need to configure a deny any any statement. Note that this access list is similar to the access list configured on router R3. access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 Configure the ISAKMP Phase 1 properties on R1. Configure the crypto ISAKMP policy 10 properties on R1 along with the shared crypto key vpnpa55. Refer to the ISAKMP Phase 1 table for the specific parameters to configure. Default values do not have to be configured therefore only the encryption, key exchange method, and DH method must be configured. Use the configuration on R3 as an example. Configure the ISAKMP Phase 2 properties on R1. Create the transform-set VPN-SET to use esp-aes and esp-sha-hmac. Then create the crypto map VPN-MAP that binds all of the Phase 2 parameters together. Use sequence number 10 and identify it as an ipsec-isakmp map. Configure the crypto map on the outgoing interface. Finally, bind the VPN-MAP crypto map to the outgoing Serial 0/0/0 interface. Note: This is not graded. R1(config)# interface S0/0/0 R1(config-if)# crypto map VPN-MAP
Issue the show crypto ipsec sa command on R1. Notice that the number of packets encapsulated, encrypted, decapsulated and decrypted are all set to 0.
All contents are Copyright 19922010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 6
From PC-A, ping PC-C. Step 3. Verify the tunnel after interesting traffic. On R1, re-issue the show crypto ipsec sa command. Now notice that the number of packets is more than 0 indicating that the IPsec VPN tunnel is working. Step 4. Create uninteresting traffic. From PC-A, ping PC-B. Step 5. Verify the tunnel. On R1, re-issue the show crypto ipsec sa command. Finally, notice that the number of packets has not changed verifying that uninteresting traffic is not encrypted. Step 6. Check results. Your completion percentage should be 100%. Click Check Results to see feedback and verification of which required components have been completed.
All contents are Copyright 19922010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 6