Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

PLEASE Emergency. configure hostname as student id a LIKE R1(SUKD1900337) and need Packet tracer file (.pkt) Packet tracer file (.pkt) I need MUST.. LAB-Lab on

PLEASE Emergency. configure hostname as student id a LIKE R1(SUKD1900337)

and need

  • Packet tracer file (.pkt)
  • Packet tracer file (.pkt) I need MUST..image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
LAB-Lab on Configure and Verify a Site-to-Site IPsec VPN using CLI through Cisco Packet Tracer Simulation Software. Learning Objectives Upon completion of this activity, you will be able to: Part 1: All Configuration, Interfaces & Test Connectivity of the Topology. Part 2: Configure IPsec Parameters on RI Part 2: Configure IPsec Parameters on R2 Part 3: Verify the IPsec VPN [Verify connectivity throughout the network and Configure Rl to support a site-to-site IPsec VPN with R2.] TOPOLOGY Coco Packet Tracer File Edit Options View Tools Extensions Help 7QQQE Logical Physical x 1546. y: 122 192.168.3.0/24 41941 R3 2960-24TT S3 PC PT PC3 192.168.3.3 192.168.1.0/24 192.168.2.0/24 VPN 2960-24TT S1 1941 R2 1941 R1 2960-24TT S2 PC PT PC1 192.168.1.3 PC-PT PC2 192.168.2.3 Diagram 1: IPSEC Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port GO/O 192.168.1.1 255.255.255.0 N/A S1 F0/1 R1 S0/0/0 10.1.1.1 255.255.255.252 N/A N/A GO/O 192.168.3.1 255.255.255.0 N/A S3 FO/2 R3 so/0/0 10.1.1.2 255.255.255.252 N/A N/A so/0/1 10.2.2.1 255.255.255.252 N/A N/A GO/O 192.168.2.1 255.255.255.0 N/A S2 F0/5 R2 SO/0/1 10.2.2.2 255.255.255.252 N/A N/A PC-1 NIC 192.168.1.3 255.255.255.0 192.168.1.1 S1 FO/2 PC-2 NIC 192.168.2.3 255.255.255.0 192.168.2.1 S2 F0/1 PC-3 NIC 192.168.3.3 255.255.255.0 192.168.3.1 S3 F0/18 Objectives Verify connectivity throughout the network. Configure R1 to support a site-to-site IPsec VPN with R3. Background / Scenario The network topology shows three routers. Your task is to configure R1 and R2 to support a site-to-site IPsec VPN when traffic flows between their respective LANs. The IPsec VPN tunnel is from R1 to R2 via R3. R3 acts as a pass-through and has no knowledge of the VPN. IPsec provides secure transmission of sensitive information over unprotected networks, such as the Internet. IPsec operates at the network layer and protects and authenticates IP packets between participating IPsec devices (peers), such as Cisco routers. R1 R3 ISAKMP AES 256 ISAKMP Phase 1 Policy Parameters Parameters Key Distribution Method Manual or ISAKMP Encryption Algorithm DES, 3DES, or AES Hash Algorithm MD5 or SHA-1 Authentication Method Pre-shared keys or RSA Key Exchange DH Group 1, 2, or 5 IKE SA Lifetime 86400 seconds or less ISAKMP Key SHA-1 ISAKMP AES 256 SHA-1 pre-share DH 5 pre-share DH 5 86400 vpnpa55 86400 vpnpa55 Note: Bolded parameters are defaults. Only unbolded parameters have to be explicitly configured. IPsec Phase 2 Policy Parameters R1 R2 VPN-SET VPN-SET esp-aes AASIAAAAAAA Parameters Transform Set Name ESP Transform Encryption ESP Transform Authentication Peer IP Address Traffic to be Encrypted esp-sha-hmac 10.2.2.2 Access-list 110 (source 192.168.1.0 dest 192.168.2.0) VPN-MAP ipsec-isakmp esp-aes esp-sha-hmac 10.1.1.1 Access-list 110 (source 192.168.2.0 dest 192.168.1.0) VPN-MAP ipsec-isakmp Crypto Map Name SA Establishment The routers have been pre-configured with the following: Password for console line: ciscoconpa55 Password for yty lines: ciscovtypa55

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions