0% found this document useful (0 votes)
58 views

Configuring VPN Site To Site IPsec - PKT

This document discusses configuring a VPN between two networks using IPsec. It describes configuring interfaces and static routes on routers to connect the networks through an ISP router. Access lists and crypto maps are then configured using pre-shared keys to establish IPsec tunnels and allow encrypted communication between the networks. The configuration is tested by pinging hosts on each network to validate connectivity over the VPN.

Uploaded by

Luis Harima
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Configuring VPN Site To Site IPsec - PKT

This document discusses configuring a VPN between two networks using IPsec. It describes configuring interfaces and static routes on routers to connect the networks through an ISP router. Access lists and crypto maps are then configured using pre-shared keys to establish IPsec tunnels and allow encrypted communication between the networks. The configuration is tested by pinging hosts on each network to validate connectivity over the VPN.

Uploaded by

Luis Harima
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

VPN: stands for Virtual Private Network which is a term used to

describe a digital network within another physical computer network,


VPNs are used to allow individuals access to protected information
stored on a private network by connecting to that network using a
public network.
IPsec is an internet protocol security, and it is a set of protocols that
provides security for internet protocol, it can use cryptography to
provide security, IPsec can be used for the setting up of virtual private
networks VPNs in a secure manner, also known as IP Security.
Configuring the interfaces on the network devices.
On Router1
# int s0/0/0
# ip address 10.1.1.1 255.255.255.252
# no shut
# int g0/0
# ip address 192.168.1.1 255.255.255.0
# no shut
On ISP router:
# int s0/0/1
# ip address 10.1.1.2 255.255.255.252
# no shut
# int s0/0/0
# ip address 15.1.1.2 255.255.255.252
# no shut
On Router3
# int s0/0/1
# ip address 15.1.1.1 255.255.255.252
# no shut
# int g0/0
# ip address 172.16.1.1 255.255.255.0
# no shut
Now we will configure static route on Router1 and Router3 and default
route on the IPS router.
On Router1
# ip route 0.0.0.0 0.0.0.0 10.1.1.2
On Router3
# ip route 0.0.0.0 0.0.0.0 15.1.1.2
On the ISP router:
# ip route 172.16.1.0 255.255.255.0 15.1.1.1
# ip route 192.168.1.0 255.255.255.0 10.1.1.1
Let us run some pings between the two sites.
On PC-1
# ping 192.168.1.5
On PC-A
# ping 172.16.1.5
If the pings are not successful, troubleshoot the issue and make sure
the PCs can ping each other.
Create access-list on Router1
# access-list 100 permit ip 192.168.1.0 0.0.0.255 172.16.1.0 0.0.0.255
Now, I will configure ISAKMP policy on Router1
On Router1:
# cryptop isakmp policy 10
# authentication pre-share
# encryption aes 256
# hash sha
# lifetime 3600
# group 5
Encrypt the key
On Router1
# crypto isakmp key cisco address 15.1.1.1
 IPsec transform set
On Router1
# crypto ipsec transform-set VPN-SET esp-aes 256 esp-sha-hmac
 Now creating the crypto map
# crypto map VPN-MAP 10 ipsec-isakmp
# set peer 15.1.1.1.
# set transform-set VPN-SET
# match address 100
# exit
 Applying the crypto map to the outgoing interface of Router1
# int s0/0/0
# crypto map VPN-MAP
On Router3
# cryptop isakmp policy 10
# authentication pre-share
# encryption aes 256
# group 5
# hash sha
# lifetime 3600
# exit
# crypto key cisco address 10.1.1.1
 IPsec transform set
# crypto ipsec transform-set VPN-SET esp-aes 256 esp-sha-hamc
 Creating the access list
# access-list 100 permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255
 Creating the crypto map
# crypto map VPN-MAP 10 ipsec-isakmp
# set peer 10.1.1.1
# set transform-set VPN-SET
# match address 100
# exit
 Apply the crypto map to the outgoing interface of Router3
# int s0/0/1
# crypto map VPN-MAP

Now , ping from PC-A to PC-1 and from PC-1 to PC-A


Run these show commands on Router1 and Router3
# show crypto isakmp sa
# show crypto ipsec sa
# show crypto isakmp policy
# show crypto map

You might also like