You are on page 1of 14

INFORMATION SECURITY MANAGEMENT

DIGITAL ASSIGNMENT-3

Name: Lakshya Sadana


Reg. No.: 18BCE0074
Course Code: CSE3502
VPN configuration and Firewall configuration in Packet Tracer

VPN Configuration in Packet Tracer

What is a VPN?
A virtual private network (VPN) gives you online privacy and anonymity
by creating a privatenetwork from a public internet connection. VPNs
mask your internet protocol (IP) address soyour online actions are
virtually untraceable. Most important, VPN services establish secure and
encrypted connections to provide greater privacy than even a secured
Wi-Fi hotspot.
Network Configuration

Router 0 configuration

Setting IP as 192.168.1.1 on Fa0/0 and IP as 1.0.0.2 on Fa0/1 for Router0


PC0 configuration –

Setting IP as 192.168.2.2 and default gateway as 192.168.2.1 for PC1


Router1 configuration

Configuring IP as 1.0.0.1 and 2.0.0.1 for Fa0/0 and Fa0/1 respectively in


Router 1
Router 0 CLI

Router2 CLI
Adding Static routes

Testing for VPN


VPN Tunnel is successfully established! On pinging 192.168.2.2 from PC0
we can see that it traces a route through 172.16.2.1 using the tracert
command. Similarly for PC1.
Firewall Configuration in Packet Tracer
What is a Firewall?
A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block specific
traffic based on a defined set of security rules.
Topology –

Security Level -
100 - inside
0 - outside
1-99 – DMZ
Setting IP address and Security Level for both VLAN connected to the
firewall

Setting IP address on Router


Setting IP for Server –

Configure DHCP Server and DNS IP on ASA


Verifying DHCP request on PC0 and PC1
Configure default route on ASA

Configure OSPF on ISP network


Create Object Network and enable NAT on ASA

On pinging 8.8.8.8 from the PC0 and PC1 after this step, the request gets
timed out. Hence we have to create an ASL on ASA.
Create ASL on ASA
Verification

Here we can see that once the ASL is configured, both PC0 and PC1 are
able to request 8.8.8.8
This shows that our firewall connection is successful.
Also sending a simple PDU packet from PC0/PC1 to Server is successful.
Using commands show Nat and show xlate to further verify the firewall
configuration. On adding another PC also we can see that it is able to
connect to the server via the DHCP.In this way we can add as many PCs as
we want and they will be able to communicate to the server [internet]
through the firewall.

On the bottom right we can see the PDU packets that have been
successfully sent from PC to server.

You might also like