CCNA Extra Class 04: Configure the IPSec VPN Site to Site Tunnel in Cisco
How to Configure IPSec VPN Site to Site Tunneling in Cisco Routers
Addressing Table
| Device | Interface | IP address | Gateway | Comment | 
| R1 | Gig0/0 | 192.168.10.1/24 |  |  | 
| Se0/0/0 | 10.10.10.1/30 |  |  | |
| R2 | Se0/0/0 | 10.10.10.2/30 |  |  | 
| Se0/0/1 | 10.20.20.2/30 |  |  | |
| Gig0/0 | 192.168.20.1/24 |  |  | |
| R3 | Gig0/0 | 192.168.30.1/24 |  |  | 
| Se0/0/0 | 10.20.20.1/30 |  |  | |
| PC-A | Fa0 | 192.168.10.10/24 | 192.168.10.1 |  | 
| PC-B | Fa0 | 192.168.20.10/24 | 192.168.20.1 |  | 
| PC-C | Fa0 | 192.168.30.10/24 | 192.168.30.1 |  | 
ISAKMP Phase 1 Policy Parameters
| Parameters | R1 (Site-1) | R3 (Site-3) | |
| Key
  Distribution Method | Manual or
  ISAKMP | ISAKMP Policy 100 | ISAKMP Policy 100 | 
| Hash
  Algorithm | MD5 or SHA-1 | SHA-1 | SHA-1 | 
| Authentication
  Method | Pre-shared
  keys or RSA | pre-share | pre-share | 
| Group: Key
  Exchange | DH Group 1,
  2, or 5 | DH 5 | DH 5 | 
| Lifetime: IKE
  SA Lifetime | 86400 seconds
  or less | 86400 | 86400 | 
| Encryption
  Algorithm | DES, 3DES, or
  AES | AES 128 | AES 128 | 
| ISAKMP Key |  | VPN | VPN | 
IPsec Phase 2 Policy Parameters
| Parameters | R1 (Site-1) | R3 (Site-3) | 
| Transform Set
  Name | VPN-SET | VPN-SET | 
| ESP Transform
  Encryption | esp-aes | esp-aes | 
| ESP Transform
  Authentication | esp-sha-hmac | esp-sha-hmac | 
| Peer IP
  Address | 10.20.20.1 | 10.10.10.1 | 
| Traffic to be
  Encrypted | access-list
  110 (source 192.168.10.0
  dest 192.168.30.0) | access-list
  110 (source 192.168.30.0
  dest 192.168.10.0) | 
| Crypto Map
  Name | VPN-MAP | VPN-MAP | 
| SA
  Establishment | ipsec-isakmp | ipsec-isakmp | 
N:B: All the bold characters should be changed while configuring each sites.
Objectives -
Perform all step according to the R1 (site-01)
Part 3: Verify the IPsec VPN
Step 1: Verify the tunnel prior to interesting traffic.
Step 2: Create interesting traffic.
Step 3: Verify the tunnel after interesting traffic
Step 4: Create uninteresting traffic
Step 5: Verify the tunnel.
Step 6: Check results.
Configuration as Per Instructions -
Part 1: Configure IPsec Parameters on R1 (site-01)
Step-01: Test connectivity
Ping "PC-A to PC-C" for testing connectivity check and tracert command for checking the path selection while travelling data source to destination.
Step-02: Enable the Security Technology package.
R1#show version
R1(config)#license boot module c2900 technology-package securityk9


