Task 3: Verify The Ipsec VPN Operation.: Step 1: Display Isakmp Security Associations
Task 3: Verify The Ipsec VPN Operation.: Step 1: Display Isakmp Security Associations
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
e. Issue the debug ip ospf hello command. You should see OSPF hello packets passing between R1
and R3.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Step 4: Generate some interesting test traffic and observe the results.
a. Use an extended ping from R1 to the R3 G0/1 interface IP address 192.168.3.1. Extended ping allows
you to control the source address of the packets. Respond as shown in the following example. Press
Enter to accept the defaults, except where a specific response is indicated.
R1# ping
Protocol [ip]:
Target IP address: 192.168.3.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 192.168.1.1
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.1, timeout is 2 seconds:
Packet sent with a source address of 192.168.1.1
..!!!
Success rate is 100 percent (3/5), round-trip min/avg/max = 92/92/92 ms
b. Re-issue the show crypto isakmp sa command.