0% found this document useful (0 votes)
59 views

Experiment No: 8: Advanced System Security & Digital Forensics Lab Manual Sem 7 Dloc

The document describes an experiment exploring VPN security using Cisco Packet Tracer. It details the steps taken to set up a VPN tunnel between two routers for secure communication. Networks were configured on the routers and PCs. A default route was set on each router. Ping tests confirmed connectivity between routers and networks. A VPN tunnel was created between routers using GRE encapsulation. Routing was configured to allow communication across the tunnel. Ping and tracert tests verified the functioning VPN tunnel.

Uploaded by

RAHUL GUPTA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Experiment No: 8: Advanced System Security & Digital Forensics Lab Manual Sem 7 Dloc

The document describes an experiment exploring VPN security using Cisco Packet Tracer. It details the steps taken to set up a VPN tunnel between two routers for secure communication. Networks were configured on the routers and PCs. A default route was set on each router. Ping tests confirmed connectivity between routers and networks. A VPN tunnel was created between routers using GRE encapsulation. Routing was configured to allow communication across the tunnel. Ping and tracert tests verified the functioning VPN tunnel.

Uploaded by

RAHUL GUPTA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Experiment No: 8

Aim:

Exploring VPN security using Cisco Packet tracer


(student edition)

Name and roll no Class Date of Date of


of student and performance submission
Division
Name: Rahul Gupta BE-B 20/9/21 28/9/21

Roll no: 279

Advanced System Security & Digital Forensics Lab Manual Sem 7


DLOC
Introduction:
Creation of a VPN tunnel between two routers for safecommunication.

Refer to the diagram shown. Set up this topology using packet tracer. Then refer to
the step by step guidelines on configuration

PC 0 PC 1

Total networks taken here are 4.

network 192.168.1.0/24
network 192.168.2.0/24
network 1.0.0.0/8
network 2.0.0.0/8

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
STEP 1: Configuring the routers and PCs with IP addresses.

CONFIGURATION OF ROUTER R1:

Router>enable
Router#config t
Router(config)#host r1
r1(config)#int fa0/0
r1(config-if)#ip add 192.168.1.1 255.255.255.0
r1(config-if)#no shut
r1(config-if)#exit
r1(config)#int fa0/1
r1(config-if)#ip address 1.0.0.1 255.0.0.0
r1(config-if)#no shut

CONFIGURATION OF ROUTER R2:

Router>enable
Router#config t
Router(config)#host r2
r2(config)#int fa0/0
r2(config-if)#ip add 1.0.0.2 255.0.0.0
r2(config-if)#no shut
r2(config-if)#exit
r2(config)#int fa0/1
r2(config-if)#ip add 2.0.0.1 255.0.0.0
r2(config-if)#no shut

CONFIGURATION OF ROUTER R3:

Router>enable
Router#config t
Router(config)#host r3
r3(config)#int fa0/0

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
r3(config-if)#ip add 2.0.0.2 255.0.0.0
r3(config-if)#no shut
r3(config-if)#exit
r3(config)#int fa0/1
r3(config-if)#ip add 192.168.2.1 255.255.255.0
r3(config-if)#no shut

STEP 2: Configuring default routing on the routers

DEFAULT ROUTING CONFIGURATION ON ROUTER R1:


r1>enable
r1#config t
Enter configuration commands, one per line. End with CNTL/Z.
r1(config)#ip route 0.0.0.0 0.0.0.0 1.0.0.2
r1(config)#

DEFAULT ROUTING CONFIGURATION ON ROUTER R3:


r3>enable
r3#config t
Enter configuration commands, one per line. End with CNTL/Z.
r3(config)#ip route 0.0.0.0 0.0.0.0 2.0.0.1
r3(config)#

STEP 3: Pinging the routers to check connectivity

First router r1

r1#ping 2.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2.0.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 26/28/33 ms

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Now we go to router r3 and test network by pinging router r1 interface.

r3#ping 1.0.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 25/28/32 ms

STEP 4: CREATING A VPN TUNNEL between R1 and R3:

FIRST CREATE A VPN TUNNEL ON ROUTER R3:


r1#config t
r1(config)#interface tunnel 10
r1(config-if)#ip address 172.16.1.1 255.255.0.0
r1(config-if)#tunnel source fa0/1
r1(config-if)#tunnel destination 2.0.0.2
r1(config-if)#no shut

NOW CREATE A VPN TUNNEL ON ROUTER R3:


r3#config t
r3(config)#interface tunnel 100
r3(config-if)#ip address 172.16.1.2 255.255.0.0
r3(config-if)#tunnel source fa0/0
r3(config-if)#tunnel destination 1.0.0.1
r3(config-if)#no shut

STEP 5: CHECK communication between the two routers:

r1#ping 172.16.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.1.2, timeout is 2 seconds:

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 30/32/36 ms
r1#

r3#ping 172.16.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 33/45/83 ms

STEP 6: Now Do routing for created VPN Tunnel on Both Router R1 and R3:

r1(config)#ip route 192.168.2.0 255.255.255.0 172.16.1.2

r3(config)#ip route 192.168.1.0 255.255.255.0 172.16.1.1

STEP 7: TEST VPN TUNNEL CONFIGURATION:

r1#show interfaces Tunnel 10

Tunnel10 is up, line protocol is up (connected)

Hardware is Tunnel

Internet address is 172.16.1.1/16


MTU 17916 bytes, BW 100 Kbit/sec, DLY 50000 usec,

reliability 255/255, txload 1/255, rxload 1/255

Encapsulation TUNNEL, loopback not set

Keepalive not set

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Tunnel source 1.0.0.1 (FastEthernet0/1), destination 2.0.0.2

Tunnel protocol/transport GRE/IP

Key disabled, sequencing disabled

Checksumming of packets disabled

Tunnel TTL 255

Fast tunneling enabled

Tunnel transport MTU 1476 bytes

Tunnel transmit bandwidth 8000 (kbps)

Tunnel receive bandwidth 8000 (kbps)

Last input never, output never, output hang never

Last clearing of "show interface" counters never

Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 1

Queueing strategy: fifo

Output queue: 0/0 (size/max)

5 minute input rate 32 bits/sec, 0 packets/sec

5 minute output rate 32 bits/sec, 0 packets/sec

52 packets input, 3508 bytes, 0 no buffer

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 input packets with dribble condition detected
52 packets output, 3424 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out

STEP 8: TEST VPN TUNNEL CREATION AT ROUTER r3

r3#show interface Tunnel 100


Tunnel100 is up, line protocol is up (connected)
Hardware is Tunnel
Internet address is 172.16.1.2/16
MTU 17916 bytes, BW 100 Kbit/sec, DLY 50000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Keepalive not set
Tunnel source 2.0.0.2 (FastEthernet0/0), destination 1.0.0.1
Tunnel protocol/transport GRE/IP
Key disabled, sequencing disabled
Checksumming of packets disabled
Tunnel TTL 255
Fast tunneling enabled
Tunnel transport MTU 1476 bytes
Tunnel transmit bandwidth 8000 (kbps)
Tunnel receive bandwidth 8000 (kbps)
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 1
Queueing strategy: fifo
Output queue: 0/0 (size/max)
5 minute input rate 32 bits/sec, 0 packets/sec
5 minute output rate 32 bits/sec, 0 packets/sec

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
52 packets input, 3424 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 input packets with dribble condition detected
53 packets output, 3536 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops

STEP 9: TRACING VPN PATH

If you want to check what path vpn tunnel is using just go to any of the PCs
and then ping another PC located in a different network. Then trace the path
using tracert.
Its result will show the path followed by VPN Tunnel created by you.

PC>ipconfig
FastEthernet0 Connection:(default port)
Link-local IPv6 Address ........ : FE80::2E0:8FFF:FE0B:AEB2
IP Address ..................... : 192.168.2.2
Subnet Mask. ................... : 255.255.255.0
Default Gateway ................ : 192.168.2.1

PC>ping 192.168.1.2
Pinging 192.168.1.2 with 32 bytes of data:
Reply from 192.168.1.2: bytes=32 time=61ms TTL=126
Reply from 192.168.1.2: bytes=32 time=55ms TTL=126
Reply from 192.168.1.2: bytes=32 time=55ms TTL=126
Reply from 192.168.1.2: bytes=32 time=57ms TTL=126
Ping statistics for 192.168.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 55ms, Maximum = 61ms, Average = 57ms

Advanced System Security & Digital Forensics Lab Manual Sem 7 DLOC
PC>tracert 192.168.1.2
Tracing route to 192.168.1.2 over a
maximum of 30 hops:1 3 ms 0 ms 18 ms
192.168.2.1
2 35 ms 30 ms 30 ms 172.16.1.1
3 65 ms 59 ms 60 ms 192.168.1.2
Trace complete
PC>

OUTPUT

Advanced System Security & Digital Forensics Lab Manual Sem 7


DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Advanced System Security & Digital Forensics Lab Manual Sem 7
DLOC
Conclusion: We have studied and explored VPN security using Cisco Packet
tracer.

Advanced System Security & Digital Forensics Lab Manual Sem 7


DLOC

You might also like