8.7.1.1 Lab - Configuring A Site-To-Site VPN Using Cisco IOS and CCP - Instructor
8.7.1.1 Lab - Configuring A Site-To-Site VPN Using Cisco IOS and CCP - Instructor
Topology
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
IP Addressing Table
Objectives
Part 1: Configure Basic Device Settings
Configure hostnames, interface IP addresses, and access passwords.
Configure the OSPF dynamic routing protocol.
Part 2: Configure a Site-to-Site VPN Using Cisco IOS
Configure IPsec VPN settings on R1 and R3.
Verify site-to-site IPsec VPN configuration.
Test IPsec VPN operation.
Part 3: Configure a Site-to-Site VPN Using CCP
Configure IPsec VPN settings on R1.
Create a mirror configuration for R3.
Apply the mirror configuration to R3.
Verify the configuration.
Test the VPN configuration using CCP.
Background / Scenario
VPNs can provide a secure method of transmitting data over a public network, such as the Internet. VPN
connections can help reduce the costs associated with leased lines. Site-to-Site VPNs typically provide a
secure (IPsec or other) tunnel between a branch office and a central office. Another common implementation
that uses VPN technology is remote access to a corporate office from a telecommuter location, such as a
small office or home office.
In this lab, you will build and configure a multi-router network, and then use Cisco IOS and CCP to configure a
site-to-site IPsec VPN and then test it. The IPsec VPN tunnel is from router R1 to router R3 via R2. R2 acts
as a pass-through and has no knowledge of the VPN. IPsec provides secure transmission of sensitive
information over unprotected networks, such as the Internet. IPsec acts at the network layer, protecting and
authenticating IP packets between participating IPsec devices (peers), such as Cisco routers.
The router commands and output in this lab are from a Cisco 1841 router using Cisco IOS software, release
15.1(4)M8 (Advanced IP Services image). Other routers and Cisco IOS versions can be used. See the Router
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Interface Summary Table at the end of the lab to determine which interface identifiers to use based on the
equipment in the lab. Depending on the model of the router, the commands available and output produced
may vary from what is shown in this lab.
Note: Make sure that the routers and the switches have been erased and have no startup configurations.
Instructor Note: Instructions for erasing switches and routers are provided in Lab 0.0.0.0.
Required Resources
3 Routers (Cisco 1841 with Cisco IOS Release 15.1(4)M8 Advanced IP Services image or comparable)
2 Switches (Cisco 2960 or comparable)
2 PCs (Windows Vista or Windows 7 with CCP 2.5, latest Java version, Internet Explorer, and Flash
Player)
Serial and Ethernet cables as shown in the topology
Console cables to configure Cisco networking devices
CCP Notes:
Refer to Lab 0.0.0.0 for instructions on how to install and run CCP.
If the PC on which CCP is installed is running Windows Vista or Windows 7, it may be necessary to right-
click the CCP icon or menu item, and select Run as administrator.
To run CCP, it may be necessary to temporarily disable antivirus programs and O/S firewalls. Make sure
that all pop-up blockers are turned off in the browser.
Instructor Notes:
This lab is divided into three parts. Each part can be administered individually or in combination with others as
time permits. The main goal of this lab is to configure a site-to-site VPN between two routers, first using the Cisco
IOS CLI and then using CCP. R1 and R3 are on separate networks and communicate through R2, which
simulates an ISP. The routers in this lab are configured with OSPF, although it is not typical for stub networks to
communicate with an ISP using an interior routing protocol. You can also use static routes for basic (non-VPN)
communication between R1 and R2 and between R1 and R3, if desired.
Students can work in teams of two for router configuration, one person configuring R1 and the other R3.
Although switches are shown in the topology, students can omit the switches and use crossover cables between
the PCs and routers R1 and R3.
The running configurations for all three routers are captured after Part 1 of the lab is completed. The running
configurations for R1 and R3 from Part 2 and Part 3 are captured and listed separately. All configurations are
found at the end of the lab.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
c. Configure a clock rate of 64000 for the serial router interfaces with a DCE serial cable attached.
R1(config)# interface S0/0/0
R1(config-if)# clock rate 64000
Step 4: Configure the OSPF routing protocol on R1, R2, and R3.
a. On R1, use the following commands:
R1(config)# router ospf 101
R1(config-router)# network 192.168.1.0 0.0.0.255 area 0
R1(config-router)# network 10.1.1.0 0.0.0.3 area 0
b. On R2, use the following commands:
R2(config)# router ospf 101
R2(config-router)# network 10.1.1.0 0.0.0.3 area 0
R2(config-router)# network 10.2.2.0 0.0.0.3 area 0
c. On R3, use the following commands:
R3(config)# router ospf 101
R3(config-router)# network 192.168.3.0 0.0.0.255 area 0
R3(config-router)# network 10.2.2.0 0.0.0.3 area 0
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Step 10: Save the basic running configuration for all three routers.
Save the running configuration to the startup configuration from the privileged EXEC mode prompt on R1, R2,
and R3.
R1# copy running-config startup-config
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
____________________________________________________________________________________
____________________________________________________________________________________
The IP addresses should be R1 S0/0/0 IP address 10.1.1.1 and R3 S0/0/1 IP address 10.2.2.1. These are the
addresses that are used to send normal traffic between R1 and R3.
a. Each IP address that is used to configure the IKE peers is also referred to as the IP address of the
remote VPN endpoint. Configure the pre-shared key of cisco123 on router R1. Production networks
should use a complex key. This command points to the remote peer R3 S0/0/1 IP address.
R1(config)# crypto isakmp key cisco123 address 10.2.2.1
b. Configure the pre-shared key of cisco123 on router R3. The command for R3 points to the R1 S0/0/0 IP
address.
R3(config)# crypto isakmp key cisco123 address 10.1.1.1
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
c. To view the list of possible set commands that you can do in a crypto map, use the help function.
R1(config-crypto-map)# set ?
identity Identity restriction.
ip Interface Internet Protocol config commands
isakmp-profile Specify isakmp Profile
nat Set NAT translation
peer Allowed Encryption/Decryption peer.
pfs Specify pfs settings
reverse-route Reverse Route Injection.
security-association Security association parameters
transform-set Specify list of transform sets in priority order
d. Setting a peer IP or hostname is required. Set it to R3’s remote VPN endpoint interface using the
following command.
R1(config-crypto-map)# set peer 10.2.2.1
e. Hard code the transform set to be used with this peer, using the set transform-set tag command. Set the
perfect forwarding secrecy type using the set pfs type command, and also modify the default IPsec
security association life time with the set security-association lifetime seconds seconds command.
R1(config-crypto-map)# set pfs group5
R1(config-crypto-map)# set transform-set 50
R1(config-crypto-map)# set security-association lifetime seconds 900
R1(config-crypto-map)# exit
f. Create a mirrored matching crypto map on R3.
R3(config)# crypto map CMAP 10 ipsec-isakmp
R3(config-crypto-map)# match address 101
R3(config-crypto-map)# set peer 10.1.1.1
R3(config-crypto-map)# set pfs group5
R3(config-crypto-map)# set transform-set 50
R3(config-crypto-map)# set security-association lifetime seconds 900
R3(config-crypto-map)# exit
g. The last step is applying the crypto map to interfaces.
Note: The security associations (SAs) are not established until the crypto map has been activated by
interesting traffic. The router generates a notification that crypto is now on.
Apply the crypto maps to the appropriate interfaces on R1 and R3.
R1(config)# interface S0/0/0
R1(config-if)# crypto map CMAP
*Jan 28 04:09:09.150: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
R1(config)# end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
interface: Serial0/0/0
Crypto map tag: CMAP, local addr 10.1.1.1
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
inbound ah sas:
outbound ah sas:
Step 3: Generate some uninteresting test traffic and observe the results.
a. Ping from R1 to the R3 S0/0/1 interface IP address 10.2.2.1. These pings should be successful.
b. Issue the show crypto isakmp sa command.
c. Ping from R1 to the R3 Fa01 interface IP address 192.168.3.1. These pings should be successful.
d. Issue the show crypto isakmp sa command again. Was an SA created for these pings? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
SA was not created. The source address of both pings was the R1 S0/0/0 address of 10.1.1.1. In the first
case, the destination address was 10.2.2.1. In the second case, the destination address was 192.168.3.1.
This is not “interesting” traffic. The ACL 101 that is associated with the crypto map for R1 defines
interesting traffic as IP packets from the 192.168.1.0/24 network to the 192.168.3.0/24 network.
e. Issue the debug ip ospf hello command. You should see OSPF hello packets passing between R1 and
R3.
R1# debug ip ospf hello
OSPF hello events debugging is on
R1#
*Apr 7 18:04:46.467: OSPF: Send hello to 224.0.0.5 area 0 on FastEthernet0/1 from
192.168.1.1
*Apr 7 18:04:50.055: OSPF: Send hello to 224.0.0.5 area 0 on Serial0/0/0 from
10.1.1.1
*Apr 7 18:04:52.463: OSPF: Rcv hello from 10.2.2.2 area 0 from Serial0/0/0 10.1.1.2
*Apr 7 18:04:52.463: OSPF: End of hello processing
*Apr 7 18:04:55.675: OSPF: Send hello to 224.0.0.5 area 0 on FastEthernet0/1 from
192.168.1.1
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Step 4: Generate some interesting test traffic and observe the results.
a. Use an extended ping from R1 to the R3 Fa01 interface IP address 192.168.3.1. Extended ping allows
you to control the source address of the packets. Respond as shown in the following example. Press
Enter to accept the defaults, except where a specific response is indicated.
R1# ping
Protocol [ip]:
Target IP address: 192.168.3.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 192.168.1.1
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.1, timeout is 2 seconds:
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
interface: Serial0/0/0
Crypto map tag: CMAP, local addr 10.1.1.1
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
inbound ah sas:
outbound ah sas:
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Step 1: Configure a username and password pair and enable HTTP router access.
a. From the CLI, configure a username admin and password cisco12345 to use with CCP on R1 and R3.
R1(config)# username admin privilege 15 secret cisco12345
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
b. At the CCP Dashboard, click Discover to discover and connect to R1. If the discovery process fails, click
Discover Details to determine the problem and resolve the issue.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
The remote device (R3 S0/0/1) IP address and the pre-shared key (cisco12345), which will be
established in Task 2, Step 4.
b. Click Launch the selected task to begin the CCP Site-to-Site VPN wizard.
c. On the initial Site-to-Site VPN Wizard window, the Quick Setup option is selected by default. Click View
Defaults to see what settings this option uses. What type of encryption does the default transform set
use?
___________________________________________________________________________________
ESP_3DES
d. In the initial Site-to-Site VPN wizard window, choose the Step by Step wizard, and then click Next. Why
would you use this option over the Quick setup option?
____________________________________________________________________________________
____________________________________________________________________________________
So that you have more control over the VPN settings used.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Association between devices. When finished, your screen should look similar to the following. When you
have entered these settings correctly, click Next.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
d. For assistance in answering the following questions, click Help. What is the function of the encryption
algorithm in the IKE policy?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The encryption algorithm encrypts and decrypts the payload of the control packets that pass over the
secure IKE channel.
What is the purpose of the hash function?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The hash validates that the entire control packet has not been tampered with during transit. The hash
also authenticates the remote peer as the origin of the packet via a secret key.
What function does the authentication method serve?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Both endpoints verify that the IPsec traffic that they have received is sent by the remote IPsec peer.
How is the Diffie-Hellman group in the IKE policy used?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The Diffie-Hellman group is used by each of the endpoints to generate a shared secret key, which is
never transmitted across the network. Each Diffie-Hellman group has an associated key length.
What event happens at the end of the IKE policy’s lifetime?
____________________________________________________________________________________
____________________________________________________________________________________
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
____________________________________________________________________________________
IKE renegotiates the IKE association.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Step 8: Review the summary configuration and deliver commands to the router.
a. Review the Summary of the Configuration window. It should look similar to the one below. Do not click the
Test VPN connectivity after configuring check box. This is done after configuring R3. Click Finish to
continue.
b. In the Deliver Configuration to router window, click Deliver. After the commands have been delivered,
click OK. How many commands were delivered?
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
____________________________________________________________________________________
31 with CCP 2.5
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
The text at the top of the window states that the configuration generated should only be used as a guide
for setting up a site-to-site VPN. What commands are missing to allow this crypto policy to function on
R3?
____________________________________________________________________________________
____________________________________________________________________________________
The commands to apply the crypto map to the S0/0/1 interface.
Hint: Look at the description entry following the crypto map SDM_CMAP_1 command.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
a. On R3, enter privileged EXEC mode and then global configuration mode.
b. Copy the commands from the text file into the R3 CLI.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
R1(config-crypto-map)# exit
R1(config)#interface S0/0/0
R1(config-if)# crypto map SDM_CMAP_1
R1(config-if)#
*Jan 30 17:03:16.603: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 28 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
f. If the debug is successful and the tunnel is up, you should see the screen below. If the testing fails, CCP
displays failure reasons and recommended actions. Click OK to remove the window.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 29 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 30 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
j. Issue the show crypto ipsec sa command. How many packets have been transformed between R1 and
R3?
____________________________________________________________________________________
116 from the CCP testing
R3# show crypto ipsec sa
interface: Serial0/0/1
Crypto map tag: SDM_CMAP_1, local addr 10.2.2.1
inbound ah sas:
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 31 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
outbound ah sas:
Reflection
1. Would traffic on the Fast Ethernet link between PC-A and the R1 Fa0/0 interface be encrypted by the site-to-
site IPsec VPN tunnel? Explain.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
No. This site-to-site VPN only encrypts from router R1 to R3. A sniffer could be used to see the traffic from
PC-A to the R1 default gateway.
2. Compared to using the CCP VPN wizard GUI, what are some factors to consider when configuring site-to-site
IPsec VPNs using the manual CLI?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary but could include the following:
Traditional CLI methods are time-consuming and prone to keystroke errors. They also require the
administrator to have an extensive knowledge of IPsec VPNs and Cisco IOS command syntax.
CCP gives the maximum flexibility and greatly simplifies IPsec VPN configuration. CCP also provides help
and explanations on various technologies and settings available.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 32 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(Fa0/0) (Fa0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(Fa0/0) (Fa0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(Fa0/0) (Fa0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Router Configs
Note: ISR G2 devices have Gigabit Ethernet interfaces instead of Fast Ethernet Interfaces.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 33 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
archive
log config
hidekeys
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
no fair-queue
clock rate 64000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
interface Vlan1
no ip address
!
router ospf 101
network 10.1.1.0 0.0.0.3 area 0
network 192.168.1.0 0.0.0.255 area 0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
line con 0
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 34 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
exec-timeout 0 0
password 7 14141B180F0B29242A38322631
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 5 0
password 7 05080F1C2243581D0015160118
login
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 35 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
no fair-queue
!
interface Serial0/0/1
ip address 10.2.2.2 255.255.255.252
clock rate 64000
!
interface Vlan1
no ip address
!
router ospf 101
network 10.1.1.0 0.0.0.3 area 0
network 10.2.2.0 0.0.0.3 area 0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
control-plane
!
line con 0
exec-timeout 0 0
password 7 05080F1C22434D061715160118
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 5 0
password 7 02050D4808091935555E080A16
login
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 36 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 37 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
interface Vlan1
no ip address
!
router ospf 101
network 10.2.2.0 0.0.0.3 area 0
network 192.168.3.0 0.0.0.255 area 0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
line con 0
exec-timeout 0 0
password 7 01100F17580405002F5C4F1A0A
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 5 0
password 7 14141B180F0B3C3F3D38322631
login
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 38 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
archive
log config
hidekeys
!
crypto isakmp policy 10
encr aes 256
authentication pre-share
group 5
lifetime 3600
crypto isakmp key cisco123 address 10.2.2.1
!
crypto ipsec security-association lifetime seconds 1800
!
crypto ipsec transform-set 50 esp-aes 256 esp-sha-hmac
!
crypto map CMAP 10 ipsec-isakmp
set peer 10.2.2.1
set security-association lifetime seconds 900
set transform-set 50
set pfs group5
match address 101
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
no fair-queue
clock rate 64000
crypto map CMAP
!
interface Serial0/0/1
no ip address
shutdown
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 39 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 40 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
archive
log config
hidekeys
!
crypto isakmp policy 10
encr aes 256
authentication pre-share
group 5
lifetime 3600
crypto isakmp key cisco123 address 10.1.1.1
!
crypto ipsec security-association lifetime seconds 1800
!
crypto ipsec transform-set 50 esp-aes 256 esp-sha-hmac
!
crypto map CMAP 10 ipsec-isakmp
set peer 10.1.1.1
set security-association lifetime seconds 900
set transform-set 50
set pfs group5
match address 101
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
clock rate 2000000
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 41 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
!
interface Serial0/0/1
ip address 10.2.2.1 255.255.255.252
crypto map CMAP
!
interface Vlan1
no ip address
!
router ospf 101
network 10.2.2.0 0.0.0.3 area 0
network 192.168.3.0 0.0.0.255 area 0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
!
control-plane
!
line con 0
exec-timeout 0 0
password 7 03075218050022434019181604
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 5 0
password 7 14141B180F0B3C3F3D38322631
login
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 42 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
!
security passwords min-length 10
logging message-counter syslog
no logging buffered
enable secret 5 $1$jV0j$TkWKZZFegFd3ZYmfsmXaC1
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
archive
log config
hidekeys
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp policy 10
encr aes 256
hash md5
authentication pre-share
group 5
lifetime 28800
crypto isakmp key cisco12345 address 10.2.2.1
!
crypto ipsec transform-set Lab-Transform esp-aes 256 esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to 10.2.2.1
set peer 10.2.2.1
set transform-set Lab-Transform
match address 100
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.0
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 43 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
clock rate 64000
crypto map SDM_CMAP_1
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
interface Vlan1
no ip address
!
router ospf 101
network 10.1.1.0 0.0.0.3 area 0
network 192.168.1.0 0.0.0.255 area 0
!
ip forward-protocol nd
no ip http server
ip http secure-server
!
access-list 100 remark CCP_ACL Category=4
access-list 100 remark IPsec Rule
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
!
control-plane
!
line con 0
exec-timeout 0 0
password 7 094F471A1A0A141D051C053938
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 5 0
password 7 01100F175804101B385C4F1A0A
login
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 44 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
!
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R3
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
logging message-counter syslog
!
no aaa new-model
dot11 syslog
ip source-route
!
ip cef
no ip domain lookup
!
no ipv6 cef
multilink bundle-name authenticated
!
archive
log config
hidekeys
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp policy 10
encr aes 256
hash md5
authentication pre-share
group 5
lifetime 28800
crypto isakmp key cisco12345 address 10.1.1.1
!
!
crypto ipsec transform-set Lab-Transform esp-aes 256 esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
set peer 10.1.1.1
set transform-set Lab-Transform
match address SDM_1
!
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 45 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
clock rate 2000000
!
interface Serial0/0/1
ip address 10.2.2.1 255.255.255.252
crypto map SDM_CMAP_1
!
interface Vlan1
no ip address
!
router ospf 101
network 10.2.2.0 0.0.0.3 area 0
network 192.168.3.0 0.0.0.255 area 0
!
ip forward-protocol nd
no ip http server
ip http authentication local
ip http secure-server
!
ip access-list extended SDM_1
remark CCP_ACL Category=4
remark IPsec Rule
permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
!
control-plane
!
line con 0
exec-timeout 0 0
password 7 110A1016141D08030A3A2A373B
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 5 0
password 7 14141B180F0B3C3F3D38322631
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 46 of 47
Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP
login
!
scheduler allocate 20000 1000
end
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 47 of 47