0% found this document useful (0 votes)
43 views17 pages

IPSec VPN Lab

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views17 pages

IPSec VPN Lab

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

RASHTRIYA RAKSHA UNIVERSITY

Pioneering National Security and


Police University of India An institute
of national importance.
National Security is Supreme!
Lavad – Dahegam, Gandhinagar –
382305

School of Information Technology & Artificial Intelligence


Cyber Security (SITAICS)

M.Sc. / Post Graduate Diploma in


Cyber Security & Digital Forensics
2nd Semester
(Session 2023-24)

Network security and log analysis

Submitted by: Balireddy chandramouli Reddy Submitted to:


Name:-Stefina Macwan
Enrolment no:230031102521058 Assistant Professor

SITAICS, RRU

Lab Manual Network Security | pg. 8


Assignment- Port Security

Port security is a network security feature used on switches to control access to Ethernet ports. It works
by associating MAC addresses with specific switch ports, allowing only authorized devices to connect.
Unauthorized devices attempting to connect can be blocked or trigger security actions. It helps prevent
unauthorized access and enhances network security.

Lab Manual Network Security | pg. 9


Lab Manual Network Security | pg. 10
First, we need to enable port security and define which MAC addresses are allowed to send
frames:

Lab Manual Network Security | pg. 11


Next, by using the show port-security interface fa0/1 we can see that the switch has learned the
MAC address of host A:

Lab Manual Network Security | pg. 12


Sow now we can check that by connecting another pc to that port and pinging pc1

So we are unable to do that due to port security

Lab Manual Network Security | pg. 13


Lab Manual Network Security | pg. 14
RASHTRIYA RAKSHA UNIVERSITY
Pioneering National Security and
Police University of India An institute
of national importance.
National Security is Supreme!
Lavad – Dahegam, Gandhinagar –
382305

School of Information Technology & Artificial Intelligence


Cyber Security (SITAICS)

M.Sc. / Post Graduate Diploma in


Cyber Security & Digital Forensics
2nd Semester
(Session 2023-24)

Network security and log analysis

Submitted by: Balireddy chandramouli Reddy Submitted to:


Name:-Stefina Macwan
Enrolment no:230031102521058 Assistant Professor

SITAICS, RRU

Lab Manual Network Security | pg. 15


Configuration of IPsec VPN Tunnel ( Site to Site)

Site-to-Site IPSec VPN Tunnels are used to allow the secure transmission of data, voice
and video between two sites (e.g offices or branches). The VPN tunnel is created over the
Internet public network and encrypted using a number of advanced encryption
algorithms to provide confidentiality of the data transmitted between the two sites.

Step 1: Configuration of PCs and Routers

PC1:

PC2:

Lab Manual Network Security | pg. 16


HQ

Internet

Lab Manual Network Security | pg. 17


Branch

Step-2 : Check Configuration working or not

Step 3: Configuration for IPSec VPN Tunnel HQ

Lab Manual Network Security | pg. 18


Lab Manual Network Security | pg. 19
Branch

Lab Manual Network Security | pg. 20


Step 4: Test

Step 5: Traffic Analysis Internet to Branch Routers

Lab Manual Network Security | pg. 21


Lab Manual Network Security | pg. 22
Traffic Analysis on Branch Routers to PC2 ( No IPSEC)

Lab Manual Network Security | pg. 23


Lab Manual Network Security | pg. 24

You might also like