0% found this document useful (0 votes)
129 views7 pages

Configure and Verify A Site-to-Site IPsec VPN Using CLI

The document outlines the configuration and verification of a Site-to-Site IPsec VPN between three routers (R1, R2, R3) using CLI commands. It details the addressing table, ISAKMP and IPsec Phase 1 and 2 policy parameters, and step-by-step instructions for enabling security packages, configuring access control lists, and establishing the VPN tunnel. Additionally, it includes verification steps to ensure the VPN is functioning correctly and an extension task to add more routers and networks.

Uploaded by

Amounou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views7 pages

Configure and Verify A Site-to-Site IPsec VPN Using CLI

The document outlines the configuration and verification of a Site-to-Site IPsec VPN between three routers (R1, R2, R3) using CLI commands. It details the addressing table, ISAKMP and IPsec Phase 1 and 2 policy parameters, and step-by-step instructions for enabling security packages, configuring access control lists, and establishing the VPN tunnel. Additionally, it includes verification steps to ensure the VPN is functioning correctly and an extension task to add more routers and networks.

Uploaded by

Amounou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Configure and Verify a Site-to-Site IPsec VPN Using CLI Topology

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway Switch Port

G0/0 192.168.10.1 255.255.255.0 N/A S1 F0/1


R1
S0/0/0 (DCE) 10.10.10.2 255.255.255.25 N/A N/A
2
G0/0 192.168.20.1 255.255.255.0 N/A S2 F0/1
R2 S0/0/0 10.10.10.1 255.255.255.25 N/A N/A
2
S0/0/1 (DCE) 10.20.20.1 255.255.255.25 N/A N/A
2
G0/0 192.168.30.1 255.255.255.0 N/A S3 F0/1
R3
S0/0/1 10.20.20.2 255.255.255.25 N/A N/A
2

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 1 of
Cisco Public. 7
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Background / Scenario
The network topology shows three routers. Your task is to configure R1 and R3 to support a
site-to-site IPsec VPN when traffic flows between their respective LANs. The IPsec VPN tunnel is
from R1 to R3 via R2. R2 acts as a pass-through and has no knowledge of the VPN. IPsec
provides secure transmission of sensitive information over unprotected networks, such as the
Internet. IPsec operates at the network layer and protects and authenticates IP packets
between participating IPsec devices (peers), such as Cisco routers.
ISAKMP Phase 1 Policy Parameters

Parameters R1 R3

Key Distribution Method Manual or ISAKMP ISAKMP ISAKMP


Encryption Algorithm DES, 3DES, or AES AES 128 AES 128
Hash Algorithm MD5 or SHA-1 SHA-1 SHA-1
Authentication Method Pre-shared keys or RSA pre-share pre-share
Key Exchange DH Group 1, 2, or 5 DH 5 DH 5
IKE SA Lifetime 86400 seconds or less 86400 86400
ISAKMP Key vpn vpn

Note: Bolded parameters are defaults. Only unbolded parameters have to be explicitly configured.
IPsec Phase 2 Policy Parameters

Parameters R1 R3

Transform Set Name VPN-P2 VPN-P2


ESP Transform Encryption esp-aes esp-aes
ESP Transform Authentication esp-sha-hmac esp-sha-hmac
Peer IP Address 10.20.20.2 10.10.10.2
access-list 100 (source access-list 100 (source
Traffic to be Encrypted 192.168.10.0 dest 192.168.30.0 dest
192.168.30.0) 192.168.10.0)
Crypto Map Name VPN-MAP VPN-MAP
SA Establishment ipsec-isakmp ipsec-isakmp

The routers have been pre-configured with the following:


 OSPF 10 (area 0)

Part 1: Configure IPsec Parameters on R1


Step 1: Test connectivity.
Ping from PC-A to PC-C.
Perform a traceroute from PC-A to PC-C. Take a print screen of your results.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 2 of
Cisco Public. 7
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Step 2: Enable the Security Technology package.


a. On R1, issue the show version command to view the Security Technology package license
information.
b. If the Security Technology package has not been enabled, use the following command
to enable the package.
R1(config)# license boot module c1900 technology-package securityk9
c. Accept the end-user license agreement.
d. Save the running-config and reload the router to enable e the security license.
e. Verify that the Security Technology package has been enabled by using the show version
command.

Step 3: Identify interesting traffic on R1.


Configure ACL 100 to identify the traffic from the LAN on R1 to the LAN on R3 as interesting.
This interesting traffic will trigger the IPsec VPN to be implemented when there is traffic
between the R1 to R3 LANs. All other traffic sourced from the LANs will not be encrypted.
Because of the implicit deny all, there is no need to configure a deny ip any any statement.
R1(config)# access-list 100 permit ip 192.168.10.0 0.0.0.255 192.168.30.0
0.0.0.255

Step 4: Configure the IKE Phase 1 ISAKMP policy on R1.


Configure the crypto ISAKMP policy 10 properties on R1 along with the shared crypto key vpn. Refer
to the ISAKMP Phase 1 table for the specific parameters to configure. Default values do not have to
be configured. Therefore, only the encryption method, key exchange method, and DH method must
be configured.
Note: The highest DH group currently supported by Packet Tracer is group 5. In a production
network, you would configure at least DH 14.
R1(config)# crypto isakmp policy 10
R1(config-isakmp)# encryption aes 128
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 5
R1(config-isakmp)# exit
R1(config)# crypto isakmp key vpn address 10.20.20.2

Step 5: Configure the IKE Phase 2 IPsec policy on R1.


a. Create the transform-set VPN-P2 to use esp-aes and esp-sha-hmac.
R1(config)# crypto ipsec transform-set VPN-P2 esp-aes esp-sha-hmac
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters together.
Use sequence number 10 and identify it as an ipsec-isakmp map.
R1(config)# crypto map VPN-MAP 10 ipsec-isakmp
R1(config-crypto-map)# description VPN connection to R3
R1(config-crypto-map)# set peer 10.20.20.2
R1(config-crypto-map)# set transform-set VPN-P2
R1(config-crypto-map)# match address 100
R1(config-crypto-map)# exit

Step 6: Configure the crypto map on the outgoing interface.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 3 of
Cisco Public. 7
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI
Bind the VPN-MAP crypto map to the outgoing Serial 0/0/0 interface.

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 4 of
Cisco Public. 7
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

R1(config)# interface s0/0/0


R1(config-if)# crypto map VPN-MAP

Part 2: Configure IPsec Parameters on R3


Step 1: Enable the Security Technology package.
a. On R3, issue the show version command to verify that the Security Technology
package license information has been enabled.
b. If the Security Technology package has not been enabled, enable the package and reload R3.

Step 2: Configure router R3 to support a site-to-site VPN with R1.


Configure reciprocating parameters on R3. Configure ACL 110 identifying the traffic from the
LAN on R3 to the LAN on R1 as interesting.
R3(config)# access-list 100 permit ip 192.168.30.0 0.0.0.255 192.168.10.0
0.0.0.255

Step 3: Configure the IKE Phase 1 ISAKMP properties on R3.


Configure the crypto ISAKMP policy 10 properties on R3 along with the shared crypto key vpn.
R3(config)# crypto isakmp policy 10
R3(config-isakmp)# encryption aes 128
R3(config-isakmp)# authentication pre-share
R3(config-isakmp)# group 5
R3(config-isakmp)# exit
R3(config)# crypto isakmp key vpn address 10.10.10.2

Step 4: Configure the IKE Phase 2 IPsec policy on R3.


a. Create the transform-set VPN-SET to use esp-aes and esp-sha-hmac.
R3(config)# crypto ipsec transform-set VPN-P2 esp-aes esp-sha-hmac
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters together.
Use sequence number 10 and identify it as an ipsec-isakmp map.
R3(config)# crypto map VPN-MAP 10 ipsec-isakmp
R3(config-crypto-map)# description VPN connection to R1
R3(config-crypto-map)# set peer 10.10.10.2
R3(config-crypto-map)# set transform-set VPN-P2
R3(config-crypto-map)# match address 100
R3(config-crypto-map)# exit

Step 5: Configure the crypto map on the outgoing interface.


Bind the VPN-MAP crypto map to the outgoing Serial 0/0/1 interface. Note: This is not graded.
R3(config)# interface s0/0/1
R3(config-if)# crypto map VPN-MAP

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 5 of
Cisco Public. 7
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Part 3: Verify the IPsec VPN


Step 1: Verify the tunnel prior to interesting traffic.
Issue the show crypto ipsec sa command on R1. Notice that the number of packets
encapsulated, encrypted, decapsulated, and decrypted are all set to 0.

Step 2: Create interesting traffic.


Ping PC-C from PC-A.

Step 3: Verify the tunnel after interesting traffic.


On R1, re-issue the show crypto ipsec sa command. Notice that the number of packets is more
than 0, which indicates that the IPsec VPN tunnel is working.

Step 4: Create uninteresting traffic.


Ping PC-B from PC-A. Note: Issuing a ping from router R1 to PC-C or R3 to PC-A is not interesting
traffic.

Step 5: Verify the tunnel.


On R1, re-issue the show crypto ipsec sa command. Notice that the number of packets has not
changed, which verifies that uninteresting traffic is not encrypted.

Step 6: Perform a traceroute. What is the difference between PC-A and PC-C now compared to
at the beginning of the task?

Part 4: Extension Task next page!

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 6 of
Cisco Public. 7
Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Extension Task
Extension Task – Add TWO additonal routers between R2 and R3. Use networks of your choice.
Configure OSPF on these networks. Add an additional PC off one of these networks. Observe a
traceroute to the new network. Observe a traceroute to the PC-C.

Reference : Modified from Cisco Networking Academy

© 2020 Cisco and/or its affiliates. All rights reserved. This document is Page 7 of
Cisco Public. 7

You might also like