TP8-Configure and Verify A Site-to-Site IPsec VPN Using CLI
TP8-Configure and Verify A Site-to-Site IPsec VPN Using CLI
TP8-Configure and Verify A Site-to-Site IPsec VPN Using CLI
1
b. If the Security Technology package has not been enabled, use the following
command to enable the package.
c. Accept the end-user license agreement.
d. Save the running-config and reload the router to enable the security license.
e. Verify that the Security Technology package has been enabled by using the
show version command.
2
Step 3: Identify interesting traffic on R1.
3
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters
together. Use sequence number 10 and identify it as an ipsec-isakmp map.
4
b. If the Security Technology package has not been enabled, enable the package
and reload R3.
5
Step 2: Configure router R3 to support a site-to-site VPN with R1.
Configure reciprocating parameters on R3. Configure ACL 110 identifying the
traffic from the LAN on R3 to the LAN on R1 as interesting.
6
Step 3: Configure the IKE Phase 1 ISAKMP properties on R3.
Configure the crypto ISAKMP policy 10 properties on R3 along with the shared
crypto key vpnpa55.
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters
together. Use sequence number 10 and identify it as an ipsec-isakmp map.
7
Step 2: Create interesting traffic.
Ping PC-C from PC-A
8
Step 4: Create uninteresting traffic.
Ping PC-B from PC-A.
Note: Issuing a ping from router R1 to PC-C or R3 to PC-A is not interesting
traffic
9
10