Index: Sr. No. Practical Date Signature
Index: Sr. No. Practical Date Signature
Practical 1
Topology
Addressing Table
Background / Scenario
In this activity, you will configure OSPF MD5 authentication for secure routing updates.
The NTP Server is the master NTP server in this activity. You will configure authentication on the NTP
serverand the routers. You will configure the routers to allow the software clock to be synchronized by
NTP to the time server. Also, you will configure the routers to periodically update the hardware clock
with the time learned from NTP.
The Syslog Server will provide message logging in this activity. You will configure the routers to
identify the remote host (Syslog server) that will receive logging messages.
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
You will need to configure timestamp service for logging on the routers. Displaying the correct time
and date inSyslog messages is vital when using Syslog to monitor a network.
You will configure R3 to be managed securely using SSH instead of Telnet. The servers have been
preconfigured for NTP and Syslog services respectively. NTP will not require authentication. The
routers havebeen pre-configured with the following passwords:
• Enable password: ciscoenpa55
• Password for vty lines: ciscovtypa55
Note: Note: MD5 is the strongest encryption supported in the version of Packet Tracer used to develop
this activity (v6.2). Although MD5 has known vulnerabilities, you should use the encryption that meets
the security requirements of your organization. In this activity, the security requirement specifies MD5.
Step 1: Test connectivity. All devices should be able to ping all other IP addresses.Step
2: Configure OSPF MD5 authentication for all the routers in area 0. Configure
OSPF MD5 authentication for all the routers in area 0.
R1(config)# router ospf 1
R1(config-router)# area 0 authentication message-digest
R2(config)# router ospf 1
R2(config-router)# area 0 authentication message-digest
Step 3: Configure the MD5 key for all the routers in area 0. Configure an MD5 key on the
serial interfaces on R1, R2 and R3. Use the password MD5pa55 for key 1.
R1(config)# interface s0/0/0
R1(config-if)# ip ospf message-digest-key 1 md5 MD5pa55
B. Configure NTP
Step 3: Configure routers to update hardware clock. Configure R1, R2, and R3 to
periodically update the hardware clock with the time learned from NTP.
R1(config)# ntp update-calendar
R2(config)# ntp update-calendar
R3(config)# ntp update-calendar
Exit global configuration and verify that the hardware clock was updated using the command show clock.
Practical 2
Step 1: Configure the routers to identify the remote host (Syslog Server) that will receive
logging messages.
R1(config)# logging host 192.168.1.6
R2(config)# logging host 192.168.1.6
R3(config)# logging host 192.168.1.6
The router console will display a message that logging has started.
Step 3: Configure the incoming vty lines on R3. Use the local user accounts
for mandatory login and validation. Accept only SSH connections.
R3(config)# line vty 0 4
R3(config-line)# login local
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
R3 via Telnet.
PC> telnet 192.168.3.1
This connection should fail because R3 has been configured to accept only SSH connections on
the virtual terminal lines.
Addressing Table
https://E-next.in
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Background / Scenario
The network topology shows routers R1, R2 and R3. Currently, all administrative security is
based on knowledge of the enable secret password. Your task is to configure and test local and
server-based AAA solutions.
You will create a local user account and configure local AAA on router R1 to test the console and vty
logins. o
Step 4: Configure the line console to use the defined AAA authentication method.
Enable AAA on R1 and configure AAA authentication for the console login to use the default method list.
R1(config)# line console 0
R1(config-line)# login authentication default
https://E-next.in
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Step 1: Configure domain name and crypto key for use with SSH.
a. Use ccnasecurity.com as the domain name on R1.
R1(config)# ip domain-name ccnasecurity.com
b. Create an RSA crypto key using 1024 bits.
R1(config)# crypto key generate rsa
Choose the size of the key modulus in the range of 360 to 2048 for yourGeneral Purpose
Keys. Choosing a key modulus greater than 512 may takea few minutes.
a named list AAA authentication method for the vty lines on R1.
Configure a named list called SSH-LOGIN to authenticate logins using local AAA.
Step 3: Configure the vty lines to use the defined AAA authentication method.
Configure the vty lines to use the named AAA method and only allow SSH for remote access.
R1(config)# line vty 0 4
R1(config-line)# login authentication SSH-LOGIN R1(config-
line)# transport input ssh R1(config-line)#end
https://E-next.in
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Step 5: Configure the line console to use the defined AAA authentication method.
Configure AAA authentication for console login to use the default AAA authentication method.
R2(config)# line console 0
R2(config-line)# login authentication default
Step 5: Configure the line console to use the defined AAA authentication method.
Configure AAA authentication for console login to use the default AAA authentication method.
R3(config)# line console 0
R3(config-line)# login authentication default
exit
Username: Admin3
Password: admin3pa55 R3>
!!!Script for R1
!!!Part 1 config t username Admin1 secret
admin1pa55 aaa new-model aaa
authentication login default local line
console 0
login authentication default
!!!Part 2
ip domain-name ccnasecurity.com cryptokey
generate rsa
1024
aaa authentication login SSH-LOGIN localline vty
0 4 login authentication SSH- LOGIN transport
input ssh
!!!!Script for R2
conf t
username Admin2 secret admin2pa55
tacacs-server host 192.168.2.2 tacacs-
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Addressing Table
Background / Scenario
Two employees need access to services provided by the server. PC1 needs only FTP access while PC2
needs only web access. Both computers are able to ping the server, but not each other.
h. .
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62
?
dscp Match packets with given dscp value eq Match only
packets on a given port number established established gt
Match only packets with a greater
= 0. 0. 0. 15
R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 ?
e. Finish the statement by specifying the server address as you did in Part 1 and filtering www traffic.
R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 host 172.22.34.62 eq www
f. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC2 to Server.
Note: The prompt remains the same and a specific type of ICMP traffic does not need to be
specified.
R1(config-ext-nacl)# permit icmp 172.22.34.96 0.0.0.15 host 172.22.34.62
g. All other traffic is denied, by default. Exit out of extended named ACL configuration mode.
a. Ping from PC2 to Server. The ping should be successful, if the ping is unsuccessful,
verify the IP addresses before continuing.
b. FTP from PC2 to Server. The connection should fail.
c. Open the web browser on PC2 and enter the IP address of Server as the URL. The connection
should besuccessful.
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Addressing Table
Step 1: Configure ACL 10 to block all remote access to the routers except from PC-C. Use
the access-list command to create a numbered IP ACL on R1, R2, and R3.
R1(config)# access-list 10 permit host 192.168.3.3
R2(config)# access-list 10 permit host 192.168.3.3
R3(config)# access-list 10 permit host 192.168.3.3
Step 2: Apply ACL 10 to ingress traffic on the VTY lines. Use the access-class
command to apply the access list to incoming traffic on the VTY lines.
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
R1(config-line)# access-class 10 in
R2(config-line)# access-class 10 in
R3(config-line)# access-class 10 in
Note: Check Results will not show a correct configuration for ACL 120 until you modify it in Part 4.
Step 1: Verify that PC-C can access the PC-A via HTTPS using the web browser.
Be sure to disable HTTP and enable HTTPS on server PC-A.
Step 2: Configure ACL 120 to specifically permit and deny the specified traffic. Use
the access-list command to create a numbered IP ACL.
R1(config)# access-list 120 permit udp any host 192.168.1.3 eq domain R1(config)#
access-list 120 permit tcp any host 192.168.1.3 eq smtp R1(config)# access-list 120
permit tcp any host 192.168.1.3 eq ftp R1(config)# access-list 120 deny tcp any host
192.168.1.3 eq 443 R1(config)# access-list 120 permit tcp host 192.168.3.3 host 10.1.1.1 eq
22
Step 3: Apply the ACL to interface S0/0/0. Use the ip access-group command to apply
Step 4: Verify that PC-C cannot access PC-A via HTTPS using the web browser. Part
4: Modify an Existing ACL on R1
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Permit ICMP echo replies and destination unreachable messages from the outside network
(relative to R1).Deny all other incoming ICMP packets.
Step 1: Verify that PC-A cannot successfully ping the loopback interface on R2.
Step 2: Make any necessary changes to ACL 120 to permit and deny the specified traffic. Use
the access-list command to create a numbered IP ACL.
R1(config)# access-list 120 permit icmp any any echo-reply
R1(config)# access-list 120 permit icmp any any unreachable
R1(config)# access-list 120 deny icmp any any
R1(config)# access-list 120 permit ip any any
Step 3: Verify that PC-A can successfully ping the loopback interface on R2. Part5:
Create a Numbered IP ACL 110 on R3
Deny all outbound packets with source address outside the range of internal IP addresses on R3.
Step 1: Configure ACL 110 to permit only traffic from the inside network.
Usethe access-list command to create a numbered IP ACL.
R3(config)# access-list 110 permit ip 192.168.3.0 0.0.0.255 any
Step 2: Apply the ACL to interface G0/1. Use the ip access-group command to apply
theaccess list to incoming traffic on interface G0/1.
Step 1: Configure ACL 100 to block all specified traffic from the outside network.
You should also block traffic sourced from your own internal address space if it is not an RFC 1918
address. In this activity, your internal address space is part of the private address space specified in
RFC 1918. Use theaccess-list command to create a numbered IP ACL. access-list 100 permit
tcp 10.0.0.0
R3(config)#
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
0.255.255.255 eq 22 host
192.168.3.3
R3(config)# access-list 100 deny ip 10.0.0.0 0.255.255.255 any R3(config)#
access-list 100 deny ip 172.16.0.0 0.15.255.255 anyR3(config)# access-list
100 deny ip 192.168.0.0 0.0.255.255 anyR3(config)# access-list 100 deny ip
127.0.0.0 0.255.255.255 any
R3(config)# access-list 100 deny ip 224.0.0.0 15.255.255.255 any R3(config)#
access-list 100 permit ip any any
Step 2: Apply the ACL to interface Serial 0/0/1. Use the ip access-group command to apply
theaccess list to incoming traffic on interface Serial 0/0/1.
R3(config)# interface s0/0/1
R3(config-if)# ip access-group 100 in
Step 3: Confirm that the specified traffic entering interface Serial 0/0/1 is handled correctly.
a. From the PC-C command prompt, ping the PC-A server. The ICMP echo replies are blocked by
the ACLsince they are sourced from the 192.168.0.0/16 address space.
b. Establish an SSH session to 192.168.2.1 from PC-C (should be successful).
Step 4: Check results.
Your completion percentage should be 100%. Click Check Results to see feedback and verification
of whichrequired components have been completed.
!!!Script for R1
access-list 10 permit host 192.168.3.3line vty 0
4
access-class 10 in
access-list 120 permit udp any host 192.168.1.3 eq domainaccess-list
120 permit tcp any host 192.168.1.3 eq smtp
access-list 120 permit tcp any host 192.168.1.3 eq ftp access-list 120 deny
tcp any host 192.168.1.3 eq 443 access-list 120 permit tcp host 192.168.3.3
host 10.1.1.1 eq 22 interface s0/0/0 ip access-group 120 in
access-list 120 permit icmp any any echo-reply access-list
120 permit icmp any any unreachableaccess-list 120 deny
icmp any any access-list 120 permit ip any any
!!!Script for R2
access-list 10 permit host 192.168.3.3
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
line vty 0 4
access-class 10 in
!!!Script for R3
access-list 10 permit host 192.168.3.3line vty 0
4
access-class 10 in
access-list 100 permit tcp 10.0.0.0 0.255.255.255 eq 22 host 192.168.3.3access-list 100
deny ip 10.0.0.0 0.255.255.255 any access-list
100 deny ip 172.16.0.0 0.15.255.255 any access-list 100 deny ip 192.168.0.0
0.0.255.255 any access-list 100 deny ip 127.0.0.0 0.255.255.255 any access-
list 100 deny ip 224.0.0.015.255.255.255 any
access-list 100 permit ip any anyinterface
s0/0/1 ip access-group 100 in
access-list 110 permit ip 192.168.3.0 0.0.0.255 any interface
g0/1 ip access-group 110 in
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Addressing Table
Step 1: Configure an ACL that will block HTTP and HTTPS access.
Configure an ACL named BLOCK_HTTP on R1 with the following
statements. a.Block HTTP and HTTPS traffic from reaching Server3.
R1(config)# deny tcp any host 2001:DB8:1:30::30 eq www
R1(config)# deny tcp any host 2001:DB8:1:30::30 eq 443
b. Allow all other IPv6 traffic to pass.
R1(config)# permit ipv6 any any
Step 2: Apply the ACL to the correct interface. Apply the ACL on
theinterface closest to the source of the traffic to be blocked.
R1(config)# interface GigabitEthernet0/1
R1(config-if)# ipv6 traffic-filter BLOCK_HTTP in
Addressing Table
Step 1: Create a policy map to determine what to do with matched traffic. Use the
policy-map type inspect command and create a policy map named IN-2-OUT-
PMAP.
R3(config)# policy-map type inspect IN-2-OUT-PMAP
Step 2: Specify a class type of inspect and reference class map IN-NET-CLASS-MAP.
R3(config-pmap)# class type inspect IN-NET-CLASS-MAP
Using the zone-pair security command, create a zone pair named IN-2-OUT-ZPAIR. Specify the
source anddestination zones that were created in Task 1.
R3(config)# zone-pair security IN-2-OUT-ZPAIR source IN-ZONE destination
OUTZONE
Step 2: Specify the policy map for handling the traffic between the two zones.
Attach a policy-map and its associated actions to the zone pair using the service-policy type inspect
command and reference the policy map previously created, IN-2-OUT-PMAP.
R3(config-sec-zone-pair)# service-policy type inspect IN-2-OUT-PMAP
R3(config-sec-zone-pair)# exit
R3(config)#
Zone-pair: IN-2-OUT-ZPAIR
_
10.2.2.2:22 (SSH = port 22)
Step 3: From PC-C, exit the SSH session on R2 and close the command prompt window.
Step 4: From internal PC-C, open a web browser to the PC-A server web page.
Enter the server IP address 192.168.1.3 in the browser URL field, and click Go. The HTTP
session should succeed. While the HTTP session is active, issue the command show policy-map
type inspect zone-pairsessions on R3 to view established sessions.
Note: If the HTTP session times out before you execute the command on R3, you will have to click the Go
button on PC-C to generate a session between PC-C and PC-A.
R3# show policy-map type inspect zone-pair sessions
Verify that external hosts CANNOT access internal resources after configuring the ZPF.
Addressing Table
Background / Scenario
Your task is to enable IPS on R1 to scan traffic entering the 192.168.1.0 network.
The server labeled Syslog is used to log IPS messages. You must configure the router to identify
the syslogserver to receive logging messages. Displaying the correct time and date in syslog
messages is vital when using syslog to monitor the network. Set the clock and configure the
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
timestamp service for logging on the routers. Finally, enable IPS to produce an alert and drop
ICMP echo reply packets inline.
The server and PCs have been preconfigured. The routers have also been preconfigured with the following:
Step 4: Configure the IPS signature storage location. On R1, configure the
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
c. Verify that the timestamp service for logging is enabled on the router using the show run
command.
Enable the timestamp service if it is not enabled.
R1(config)# service timestamps log datetime msec
d. Send log messages to the syslog server at IP address 192.168.1.50. R1(config)#
logging host 192.168.1.50
R1(config-sigdef-sig)# engine
R1(config-sigdef-sig-engine)# event-action produce-alert R1(config-sigdef-sig-engine)#
event-action deny-packet-inline
R1(config-sigdef-sig-engine)# exit
R1(config-sigdef-sig)# exit R1(config-
sigdef)# exit
Do you want to accept these changes? [confirm] <Enter>
applied?
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
G0/1 outbound.
_
The pings should fail. This is because the IPS rule for event-action of an echo request was set to
“deny-
packet-
inline”.
b. From PC-A, attempt to ping PC-C. Were the pings successful? Explain.
_
The ping should be successful. This is because the IPS rule does not cover echo reply. When PC-A
pings
PC-C, PC-C responds with an echo reply.
Step 4: View the syslog messages.
a. Click the Syslog server.
b. Select the Services tab.
c. In the left navigation menu, select SYSLOG to view the log file.
!!!Script for R1
clock set 10:20:00 10 january 2014 mkdiripsdir
configt
license boot module c1900 technology-package securityk9yes end
reload config t
ip ips config location flash:ipsdir ip ips name
iosips ip ips notify logservice timestamps
log datetime mseclogging host 192.168.1.50
ip ips signature-category category all
retired true exitcategory ios_ips basic
retired false exit exit interface g0/1
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Background / Scenario
There have been a number of attacks on the network recently. For this reason, the network
administrator has assigned you the task of configuring Layer 2 security.
For optimum performance and security, the administrator would like to ensure that the root bridge is
the 3560 Central switch. To prevent spanning-tree manipulation attacks, the administrator wants to
ensure that the STP parameters are secure. To prevent against CAM table overflow attacks, the
network administrator has decided to configure port security to limit the number of MAC addresses
each switch port can learn. If the number of MAC addresses exceeds the set limit, the administrator
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
would like the port to be shutdown. All switch devices have been preconfigured with the following:
o Enable password: ciscoenpa55 oConsole password:
ciscoconpa55
o SSH username and password: SSHadmin / ciscosshpa55
Part 1: Configure Root Bridge
.From Central, issue the show spanning-tree command to determine the current root bridge, to see the ports in
use, and to see their status.
Which switch is the current root bridge?
Step 2: Assign Central as the primary root bridge. Using the spanning-tree vlan 1
rootprimary command, and assign Central as the root bridge.
Central(config)# spanning-tree vlan 1 root primary
Step 3: Assign SW-1 as a secondary root bridge. Assign SW-1 as the secondary root bridge using
the spanning-tree vlan 1 root secondary command. SW-1(config)# spanning-tree vlan 1 root
secondary
Based on the new root-bridge, what is the resulting spanning tree? (Draw the spanning-tree topology.)
BPDU guard is a feature that can help prevent rogue switches and spoofing on access ports. Enable BPDU guard
on SW-A and SW-B access ports.
SW-A(config)# interface range f0/1 - 4
SW-A(config-if-range)# spanning-tree bpduguard enable
Step 1: Configure basic port security on all ports connected to host devices.
This procedure should be performed on all access ports on SW-A and SW-B. Set the maximum
number oflearned MAC addresses to 2, allow the MAC address to be learned dynamically, and
set the violation to shutdown. Note: A switch port must be configured as an access port to enable
port security.
SW-A(config)# interface range f0/1 - 22
SW-A(config-if-range)# switchport mode access
SW-A(config-if-range)# switchport port-security
SW-A(config-if-range)# switchport port-security maximum 2
SW-A(config-if-range)# switchport port-security violation shutdown SW-A(config-
if-range)# switchport port-security mac-address sticky
Background / Scenario
A company’s network is currently set up using two separate VLANs: VLAN 5 and VLAN 10. In
addition, all trunk ports are configured with native VLAN 15. A network administrator wants to
add a redundant link between switch SW-1 and SW-2. The link must have trunking enabled and
all security requirements should be in place.
In addition, the network administrator wants to connect a management PC to switch SW-A. The
administrator would like to enable the management PC to connect to all switches and the router, but
does not want any other devices to connect to the management PC or the switches. The administrator
would like to create a new VLAN 20 for management purposes.
All devices have been preconfigured
with: o Enable secret password:
ciscoenpa55 oConsole password:
ciscoconpa55
oSSH username and password: SSHadmin / ciscosshpa55
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Step 2: Enable trunking, including all trunk security mechanisms on the link between SW-1 and
SW-2.
Trunking has already been configured on all pre-existing trunk interfaces. The new link must be
configured fortrunking, including all trunk security mechanisms. On both SW-1 and SW-2, set the
port to trunk, assign native VLAN 15 to the trunk port, and disable auto-negotiation.
SW-1(config)# interface f0/23
SW-1(config-if)# switchport mode trunk
SW-1(config-if)# switchport trunk native vlan 15
SW-1(config-if)# switchport nonegotiate
SW-1(config-if)# no shutdown
b. Create an interface VLAN 20 and assign an IP address within the 192.168.20.0/24 network.
SW-A(config)# interface vlan 20
SW-A(config-if)# ip address 192.168.20.1 255.255.255.0
Step 2: Enable the same management VLAN on all other switches.
a. Create the management VLAN on all switches: SW-B, SW-1, SW-2, and Central.
SW-B(config)# vlan 20
SW-B(config-vlan)# exit
SW-1(config)# vlan 20
SW-1(config-vlan)# exit
SW-2(config)# vlan 20
SW-2(config-vlan)# exit
Central(config)# vlan 20
Central(config-vlan)# exit
b. Create an interface VLAN 20 on all switches and assign an IP address within the
192.168.20.0/24network.
SW-B(config)# interface vlan 20
SW-B(config-if)# ip address 192.168.20.2 255.255.255.0
Note: There are multiple ways in which an ACL can be created to accomplish the necessary
security. For thisreason, grading on this portion of the activity is based on the correct connectivity
requirements. The management PC must be able to connect to all switches and the router. All other
PCs should not be able to connect to any devices within the management VLAN.
The pings should have been successful because all devices within the 192.168.20.0 network
should be
able to ping one another. Devices within VLAN20 are not required to route through the router.
c. From D1, ping the management PC. Were the pings successful? Explain.
The ping should have failed because for a device within a different VLAN to successfully ping a
device
within VLAN20, it must be routed. The router has an ACL that prevents all packets from
accessing the
192.168.20.0 network.
Step 5: Check results.
Your completion percentage should be 100%. Click Check Results to view feedback and
verification of whichrequired components have been completed.
If all components appear to be correct and the activity still shows incomplete, it could be
due to the connectivity tests that verify the ACL operation.
Topology
Addressing Table
Background / Scenario
The network topology shows three routers. Your task is to configure R1 and R3 to support a site-to-
site IPsecVPN when traffic flows between their respective LANs. The IPsec VPN tunnel is from R1
to R3 via R2. R2
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
acts as a pass-through and has no knowledge of the VPN. IPsec provides secure transmission of
sensitive information over unprotected networks, such as the Internet. IPsec operates at the network
layer and protects and authenticates IP packets between participating IPsec devices (peers), such as
Cisco routers. ISAKMP Phase 1 Policy Parameters
Parameter R1 R3
s
Key Distribution Manual or ISAKMP ISAKMP ISAKMP
Method
Encryption Algorithm DES, 3DES, or AES AES 256 AES 256
Hash Algorithm MD5 or SHA-1 SHA-1 SHA-1
Authentication Method Pre-shared keys or RSA pre-share pre-share
Key Exchange DH Group 1, 2, or 5 DH 5 DH 5
IKE SA Lifetime 86400 seconds or less 86400 86400
ISAKMP Key vpnpa55 vpnpa55
Note: Bolded parameters are defaults. Only unbolded parameters have to be explicitly configured.
IPsec Phase 2 Policy Parameters
Parameters R1 R3
Transform Set Name VPN-SET VPN-SET
ESP Transform Encryption esp-aes esp-aes
ESP Transform esp-sha-hmac esp-sha-hmac
Authentication
Peer IP Address 10.2.2.2 10.1.1.2
access-list 110 (source access-list 110 (source
Traffic to be Encrypted 192.168.1.0 dest 192.168.3.0 dest
192.168.3.0) 192.168.1.0)
Crypto Map Name VPN-MAP VPN-MAP
SA Establishment ipsec-isakmp ipsec-isakmp
The routers have been pre-configured with the following:
• Password for console line: ciscoconpa55
• Password for vty lines: ciscovtypa55
• Enable password: ciscoenpa55
• SSH username and password: SSHadmin / ciscosshpa55
• OSPF 101
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
a. On R1, issue the show version command to view the Security Technology package license
information.
b. If the Security Technology package has not been enabled, use the following command to
enable the package.
R1(config)# license boot module c1900 technology-package securityk9
c. Accept the end-user license agreement.
d. Save the running-config and reload the router to enable the security license.
e. Verify that the Security Technology package has been enabled by using the show version command.
Step 3: Configure the IKE Phase 1 ISAKMP properties on R3. Configure the crypto
ISAKMP policy 10 properties on R3 along with the shared crypto key vpnpa55.
R3(config)# crypto isakmp policy 10
R3(config-isakmp)# encryption aes 256
R3(config-isakmp)# authentication pre-share R3(config-isakmp)#
group 5
R3(config-isakmp)# exit
R3(config)# crypto isakmp key vpnpa55 address 10.1.1.2
BHAVANS COLLEGE AUTONOMOUS, ANDHERI WEST
PRACTICAL JOURNAL
Class: TYBSCIT Sem: VI Roll No. :TYIT18
Step 5: Configure the crypto map on the outgoing interface. Bind the VPN-MAP
cryptomap to the outgoing Serial 0/0/1 interface. Note: This is not graded.
R3(config)# interface s0/0/1
R3(config-if)# crypto map VPN-MAP
Part 3: Verify the IPsec VPN