You are on page 1of 5

Network laboratory

NAME OF THE
SUBJECT:
TEACHER: Erika Estrada Castañeda
GROUP: TI-4
DATE: 24/03/2023
Andrade Barraza Alan Armando
NAME OF THE
De Leon Molina Edna Veronica
STUDENT:
Felix Garcia Omar Alejandro

1.- GENERAL DATA:

NAME OF THE No. De


PRACTICE: Práctica:

OVERALL OBJETIVE: Verify connectivity througout the network

SPECIFIC GOAL:

COMPETENCES TO
BE DEVELOPED:
The network topology shows three routers. Your task is to configure routers R1
and R3 to support a site-to-site
IPsec VPN when traffic flows from their respective LANs. The IPsec VPN tunnel is
from router R1 to router R3
via R2. R2 acts as a pass-through and has no knowledge of the VPN. IPsec
INTRODUCTION: provides secure transmission of
sensitive information over unprotected networks such as the Internet. IPsec acts at
the network layer, protecting
and authenticating IP packets between participating IPsec devices (peers), such
as Cisco routers.

2.- PROCESS
MATERIAL / EQUIPMENT / CANT. MATERIAL / EQUIPMENT / CANT.
REAGENTS REAGENTS
pc 1 switch 1
Cable serial 1
router 1
Cable directo 2

GENERAL DEVELOPMENT OF PRACTICE.


STEP DESCRIPTION OF THE ACTIVITY.
NO.
1 Task 1: Configure IPsec parameters on R1
Step 1. Test connectivity.
Step 2. enable the security technology package
Step 3. identify interesting traffic on R1
Step 4. configure the IKE phase 1 ISAKMP policy on R1
Step 5. configure the IKE phase 2 IPsec policy on R2
Step 6. configure the crypto map on the outgoing interface
Network laboratory

TASK 2: CONFIGURE IPsec parameters on R3


Step 1. enable the security technology package
Step 2. configure router R3 to support a site-to-site VPN whit R1
2
Step 3. configure the IKE phase 1 ISAKMO properties on R3
Step 4. configure the IKE phase 2 IPsec policy on R3
Step 5. configure the crypto map on the outgoing interface
TAKS 3:verify the IPsec VPN
Step 1. verify the tunnel prior to interesting traffic
Step 2. create interesting traffic
3 Step 3. verify the tunner after interesting traffic
Step 4. create uninteresting traffic
Step 5. verify the tunnel
Step 6. check results
4
5
6

3.- PRACTICE REPORT

3.1 Results:

3.2 Photographic evidence and drawings:

Part 1

Xc
Network laboratory
Network laboratory

Part 2

3.3 OBSERVATIONS AND CONCLUSIONS:


Network laboratory

______________________________

INSTRUCTOR'S SIGNATURE

You might also like