0% found this document useful (2 votes)
529 views11 pages

Configuring A VPN Client For Secure File Transfers 3e - Mason Burton

This document outlines the steps taken in a lab to configure a VPN client on Windows for secure file transfers. It details configuring the VPN connection, comparing unencrypted and encrypted file transfers in Wireshark, adding a VPN connection using PowerShell, implementing a custom IPsec policy, and verifying the VPN implementation using Wireshark.

Uploaded by

masonburton56
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (2 votes)
529 views11 pages

Configuring A VPN Client For Secure File Transfers 3e - Mason Burton

This document outlines the steps taken in a lab to configure a VPN client on Windows for secure file transfers. It details configuring the VPN connection, comparing unencrypted and encrypted file transfers in Wireshark, adding a VPN connection using PowerShell, implementing a custom IPsec policy, and verifying the VPN implementation using Wireshark.

Uploaded by

masonburton56
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Configuring a VPN Client for Secure File Transfers (3e)

Network Security, Firewalls, and VPNs, Third Edition - Lab 09

Student: Email:
Mason Burton [email protected]

Time on Task: Progress:


1 hour, 37 minutes 100%

Report Generated: Monday, March 25, 2024 at 6:05 PM

Section 1: Hands-On Demonstration


Part 1: Configure a Windows VPN Client

30. Make a screen capture showing the VPN connection properties.

Page 1 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

54. Make a screen capture showing the successful ping response.

72. Make a screen capture showing your new tracert results.

Part 2: Compare Secure and Non-Secure File Transfers in Wireshark

Page 2 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

12. Make a screen capture showing the packet that carries the correct password.

28. Make a screen capture showing the Wireshark window and the packet bytes pane for
Packet 69.

Page 3 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

44. Make a screen capture showing the packet details pane for packet 16.

49. Make a screen capture showing the last SSHv2 packet in the SSH file transfer.

Page 4 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

51. Make a screen capture showing the last packets in the ESP exchange.

Page 5 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

Section 2: Applied Learning


Part 1: Configure a Windows VPN Client

19. Make a screen capture showing the IPsec VPN connection encrypted with AES 256.

23. Make a screen capture showing your successful tracert to the remote machine.

Page 6 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

Part 2: Compare Secure and Non-Secure File Transfers in Wireshark

7. Make a screen capture showing the IKE_SA_INIT and IKE_AUTH packets.

22. Make a screen capture showing the filtered FTP packets in your capture file.

Page 7 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

24. Make a screen capture showing the contents of the file.txt file in the packet bytes pane.

27. Make a screen capture showing the filtered SSH packets in your capture file.

Page 8 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

Section 3: Challenge and Analysis


Part 1: Create a New VPN Connection using PowerShell
Document the command you used to add your VPN connection.

Add-VpnConnection -Name 'mason_IPsec' -ServerAddress "202.20.1.2" -TunnelType "IKEv2"


-EncryptionLevel "Required" -AuthenticationMethod "Eap" -SplitTunneling $true -AllUserConnection
$true

Part 2: Implement a Custom IPsec Policy


Make a screen capture showing the successfully executed Set-
VpnConnectionIPsecConfiguration command in PowerShell.

Page 9 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

Page 10 of 11
Configuring a VPN Client for Secure File Transfers (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 09

Part 3: Verify Your VPN Implementation using Wireshark


Make a screen capture showing the CREATE_CHILD_SA exchange.

Make a screen capture showing the selected Diffie-Hellman transform.

Page 11 of 11
Powered by TCPDF (www.tcpdf.org)

You might also like