Lab 13‐1: IPSEC in Packet Tracer - AidanP017/Aidan-NET-330 GitHub Wiki

Purpose

In this lab, we used Cisco Packet Tracer to configure site-to-site IPSEC for the Champlain and Middlebury college servers.


Assignments

The following assignments were used for the networks.

Network Network Address
Champlain College Private 172.16.84.0/24
Champlain College Public 216.93.144.0/24
Middlebury College Public 140.230.18.0/24
Middlebury College Private 192.168.25.0/24

Configuring the Interfaces

To start, we configured the appropriate interfaces for both networks.

Champlain Server

image

Middlebury Server

image

Champlain Router

image

image

image

Middlebury Router

image

image

image

VTEL ISP Router

image

Connectivity Testing

After configuring, it should be possible to ping between the Champlain and Middlebury routers based on their public IPs.

image

image

image


Additional Configurations on the Champlain Router

Some additional configurations were made to the Champlain router including an access list, ISAKMP policy, and IPSEC policy.

Access List

For the access list, it is given a number of 101 (must be above 100) and permits traffic from the source address of 172.16.84.0/24 to the destination address of 192.168.25.0/24.

image

ISAKMP Policy

The first part of the IKE configuration will create an ISAKMP policy with the number "10" and the shared authentication key of "NET330". The encryption, key exchange, and DH methods were also configured in correspondence with Middlebury's public IP (140.230.18.1).

image

IPSEC Policy

The IPSEC policy is set up to configure the parameters for the internal tunnel that will transfer data between the two networks.

First, we created the transform-set "VPN-SET" using esp-aes and esp-sha-hmac as the cryptographic settings.

image

Then, we created the crypto map "VPN-MAP" that binds all of the Phase 2 parameters together. The sequence number "10" is used and the map is identified as an ipsec-isakmp map.

image

After binding the crypto map to the outgoing interface, it should be set up.

image


Additional Configurations on the Middlebury Router

The same additional configurations as the Champlain router were made on the Middlebury router, but addresses and other settings were reflected where necessary.

Access List

image

ISAKMP Policy

image

IPSEC Policy

image

image


Encryption Testing

If everything was configured successfully, the command show crypto ipsec sa should show encrypted packets in the stats. This should result from pinging between the Champlain and Middlebury servers.

image

image

image

image