Week 5 Optional Assignment
Week 5 Optional Assignment
Week 5 Optional Assignment
Introduction
This report outlines the process of configuring a site-to-site IPsec VPN between two routers, R1
and R3, while traversing a third router, R2 that does not have any VPN knowledge. The
objective of this assignment was to enable secure communication between two local area
networks (LANs) using IPsec, which encrypts and authenticates IP packets at the network layer.
The report details the steps taken to set up the routers, configure necessary parameters, and
verify the VPN’s functionality.
Addressing table
Key Distribution
Manual or ISAKMP ISAKMP ISAKMP
Method
Encryption
DES, 3DES, or AES AES 256 AES 256
Algorithm
Hash Algorithm MD5 or SHA-1 SHA-1 SHA-1
Authentication
Pre-shared keys or RSA pre-share pre-share
Method
Key Exchange DH Group 1, 2, or 5 DH 5 DH 5
Parameters R1 R3
Traffic to be Encrypted access-list 110 (source 192.168.1.0 access-list 110 (source 192.168.3.0
dest 192.168.3.0) dest 192.168.1.0)
After rebooting, I confirmed the activation again, and the securityk9 module was successfully enabled.
Step 3: Identify interesting traffic on R1.
Configure ACL 110 to identify the traffic from the LAN on R1 to the LAN on R3 as interesting. This
interesting traffic will trigger the IPsec VPN to be implemented when there is traffic between the R1 to
R3 LANs. All other traffic sourced from the LANs will not be encrypted. Because of the implicit deny
all, there is no need to configure a deny ip any any statement.
R1(config)# access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0
0.0.0.255
Conclusion
Through this exercise, I learned the importance of configuring both the ISAKMP and IPsec
settings for a secure VPN connection between routers. The step-by-step process highlighted how
to identify interesting traffic using ACLs and set up both phases of the VPN. My experience
reinforced the need for meticulous configuration and testing, as even minor errors can disrupt
connectivity. Overall, this activity deepened my understanding of network security and VPN
configuration, valuable skills.