You are on page 1of 5

Computer Network Laboratory Report

Subject code: EC 692


3rd Year 6th Semester, 2022

Name: Saptarshi Kolay


Roll Number: 10200319024

Experiment Number: 11 Date: 27/05/2022

Statement: Configuration of VPN using Cisco Packet

Theory: A virtual private network (VPN) extends a private network across a


public network and enables users to send and receive data across shared or
public networks as if their computing devices were directly connected to the
private network. The benefits of a VPN include increases in functionality,
security, and management of the private network. It provides access to
resources that are inaccessible on the public network and is typically used for
remote workers. Encryption is common, although not an inherent part of a VPN
connection.
A VPN is created by establishing a virtual point-to-point connection
through the use of dedicated circuits or with tunnelling protocols over existing
networks. A VPN available from the public Internet can provide some of the
benefits of a wide area network (WAN). From a user perspective, the resources
available within the private network can be accessed remotely.
Network Figure:

Three routers (Router1, Router0 and Router2) are connected in a bus topology.
PC0 is connected with Router1 and PC1 is connected with Router2. There are four
physical networks – 192.168.0.0/24 between Router1 and PC0, 10.20.30.0/8
between Router0 and Router1, 20.30.40.0/8 between Router0 and Router2 and
192.168.1.0/24 between Router2 and PC1. There is also a VPN between Router1
and Router2, that is 50.60.70.0/16.
Router0 Configuration:
In Router0, only Gig0/0 and Gig0/1 are configured. No routing is done in Router0.

Router1 Configuration:
In Router1, at first Gig0/0 and Gig0/1 are assigned an IP each. Then tunnel 1 is
created with IP 50.60.70.1. The tunnel source is Gig0/1 and destination
20.30.40.1. Finally, a route is configured for the tunnel to communicate with the
local network.
Router2 Configuration:

In Router2, at first Gig0/0 and Gig0/1 are assigned an IP each. Then tunnel 2 is
created with IP 50.60.70.2. The tunnel source is Gig0/0 and destination
10.20.30.1. Finally, a route is configured for the tunnel to communicate with the
local network.
Checking VPN Connection:
Pinging PC1 from PC0:
Tracing Route Between PC0 and PC1:

It is seen that, from PC0 to PC1 the first hop is 192.168.0.1, that is Gig0/0 of Router1.
The second hop is 50.60.70.2, that is the IP address of tunnel 2 and the third hop is
192.168.1.2, that is PC1. So, the tunnel network is used for communication hence, the
VPN is configured properly.

Conclusion: The VPN is configured successfully and it is functional. All the lab work is
done on Cisco Packet Tracer.

Student’s signature_________________ Teacher’s signature____________________

You might also like