CCNA Extra Class 04: Configure the IPSec VPN Site to Site Tunnel in Cisco
How to Configure IPSec VPN Site to Site Tunneling in Cisco Routers
Addressing Table
Device |
Interface |
IP address |
Gateway |
Comment |
R1 |
Gig0/0 |
192.168.10.1/24 |
|
|
Se0/0/0 |
10.10.10.1/30 |
|
|
|
R2 |
Se0/0/0 |
10.10.10.2/30 |
|
|
Se0/0/1 |
10.20.20.2/30 |
|
|
|
Gig0/0 |
192.168.20.1/24 |
|
|
|
R3 |
Gig0/0 |
192.168.30.1/24 |
|
|
Se0/0/0 |
10.20.20.1/30 |
|
|
|
PC-A |
Fa0 |
192.168.10.10/24 |
192.168.10.1 |
|
PC-B |
Fa0 |
192.168.20.10/24 |
192.168.20.1 |
|
PC-C |
Fa0 |
192.168.30.10/24 |
192.168.30.1 |
|
ISAKMP Phase 1 Policy Parameters
Parameters |
R1 (Site-1) |
R3 (Site-3) |
|
Key
Distribution Method |
Manual or
ISAKMP |
ISAKMP Policy 100 |
ISAKMP Policy 100 |
Hash
Algorithm |
MD5 or SHA-1 |
SHA-1 |
SHA-1 |
Authentication
Method |
Pre-shared
keys or RSA |
pre-share |
pre-share |
Group: Key
Exchange |
DH Group 1,
2, or 5 |
DH 5 |
DH 5 |
Lifetime: IKE
SA Lifetime |
86400 seconds
or less |
86400 |
86400 |
Encryption
Algorithm |
DES, 3DES, or
AES |
AES 128 |
AES 128 |
ISAKMP Key |
|
VPN |
VPN |
IPsec Phase 2 Policy Parameters
Parameters |
R1 (Site-1) |
R3 (Site-3) |
Transform Set
Name |
VPN-SET |
VPN-SET |
ESP Transform
Encryption |
esp-aes |
esp-aes |
ESP Transform
Authentication |
esp-sha-hmac |
esp-sha-hmac |
Peer IP
Address |
10.20.20.1 |
10.10.10.1 |
Traffic to be
Encrypted |
access-list
110 (source 192.168.10.0
dest 192.168.30.0) |
access-list
110 (source 192.168.30.0
dest 192.168.10.0) |
Crypto Map
Name |
VPN-MAP |
VPN-MAP |
SA
Establishment |
ipsec-isakmp |
ipsec-isakmp |
N:B: All the bold characters should be changed while configuring each sites.
Objectives -
Perform all step according to the R1 (site-01)
Part 3: Verify the IPsec VPN
Step 1: Verify the tunnel prior to interesting traffic.
Step 2: Create interesting traffic.
Step 3: Verify the tunnel after interesting traffic
Step 4: Create uninteresting traffic
Step 5: Verify the tunnel.
Step 6: Check results.
Configuration as Per Instructions -
Part 1: Configure IPsec Parameters on R1 (site-01)
Step-01: Test connectivity
Ping "PC-A to PC-C" for testing connectivity check and tracert command for checking the path selection while travelling data source to destination.
Step-02: Enable the Security Technology package.
R1#show version
R1(config)#license boot module c2900 technology-package securityk9