Net 412 (Practical Part) Networks and Communication Department LAB 2.

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
CPIT 470 Lab 2 Lab Instructor: Aisha Ehsan.
CISCO ROUTER BY Mark Sullivan Nancy Tung Xiao Yan Wu.
Chapter 11 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Configure a router with a basic configuration  Configure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Static Routing Routing Protocols and Concepts – Chapter 2.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Implementing VPN Solutions Laurel Boyer, CCIE 4918 Presented, June 2003.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Virtual Private Networks Warren Toomey. Available WAN Links.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Junos Intermediate Routing
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring and Testing Your Network Network Fundamentals – Chapter.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Module 10: Providing Secure Access to Remote Offices.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
1 Pertemuan 8 Getting Information about Remote Devices.
Lab6 Configure Dynamic route.  RIP(Routing information protocol)  IGRP(interior gate way routing protocol)
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
GRE.
100% Exam Passing Guarantee & Money Back Assurance
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
LAN Connections.
Using a Cisco Router as a DHCP Server
CSCI 465 Data Communications and Networks Lecture 26
Now you don’t need to take any stress about the Cisco Exam
WAN Connections.
100% Exam Passing Guarantee & Money Back Assurance
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
NET 536 Network Security Firewalls and VPN
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
NETW 208 RANK The power of possibility/netw208rank.com
Virtual Private Networks (VPN)
Routing and Switching Essentials v6.0
Chapter 6: Network Layer
Net 412 (Practical Part) LAB 5-port security
Net 412 (Practical Part) LAB 3 - Telnet
Virtual Private Network (VPN)
Routing Protocols and Concepts – Chapter 2
Network Models, Hardware, Protocols and number systems
Security Protocols in the Internet
Firewalls Routers, Switches, Hubs VPNs
Net 412 (Practical Part) LAB 4 - SSH
Virtual Private Networks (VPNs)
VPN: Virtual Private Network
NET 536 Network Security Lecture 5: IPSec and VPN
Net 412 (Practical Part) Networks and Communication Department LAB 1.
Communication Networks NETW 501 Tutorial 1
Fundamentals of Computer Networks
Chapter 11: Network Address Translation for IPv4
Virtual Private Networks (VPNs)
Topic 12: Virtual Private Networks
Virtual Private Network
Presentation transcript:

Net 412 (Practical Part) Networks and Communication Department LAB 2

Configuring Point-to-Point GRE VPN Tunnels Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that allows the encapsulation of a wide variety of network layer protocols inside point-to-point links. A GRE tunnel is used when packets need to be sent from one network to another over the Internet or an insecure network. With GRE, a virtual tunnel is created between the two endpoints (Cisco routers) and packets are sent through the GRE tunnel. It is important to note that packets travelling inside a GRE tunnel are not encrypted as GRE does not encrypt the tunnel but encapsulates it with a GRE header. If data protection is required, IPSec must be configured to provide data confidentiality – this is when a GRE tunnel is transformed into a secure VPN GRE tunnel Networks and Communication Department

Part 1: Configure Networks : Open the packet tracer. Add 2-laptops, 2-switch general-pt,3 3-router 1941. Link all the devices together type of link copper cross . Links between R1 and R3 , R3 and R2 are copper cross ovell Configure Ip address for all Network like topology above Networks and Communication Department

Topology Networks and Communication Department

Configure pc 0 Networks and Communication Department

Configure R1 Networks and Communication Department

Configure R1 Networks and Communication Department

Configure R3 Networks and Communication Department

Configure R3 Networks and Communication Department

Configure R2 Networks and Communication Department

Configure R2 Networks and Communication Department

Configure pc 1 Networks and Communication Department

Show Ip route Networks and Communication Department Router 3 has no idea about networks 192.168.1.0 and 192.168.3.0 Networks and Communication Department

Part 2: Configure GRE Tunnel on Router 1 R1>en R1#config t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#int tunnel 0 R1(config-if)#ip address 192.168.2.1 255.255.255.0 R1(config-if)#tunnel source g0/1 R1(config-if)#tunnel destination 11.1.1.1 R1(config-if)#tunnel mode gre ip R1(config-if)#ex R1(config)#ip route 192.168.3.0 255.255.255.0 192.168.2.2 R2(config)#ip route 0.0.0.0 0.0.0.0 g0/1 R1(config)#do wri Networks and Communication Department

Part 2: Configure GRE Tunnel on Router 1 Networks and Communication Department

Cont. Part 2: Configure GRE Tunnel on Router 1 Networks and Communication Department

Part 3: Configuring GRE Tunnel on Router 2(private Network): R2>en R2#config t Enter configuration commands, one per line. End with CNTL/Z. R2(config)#int tunnel 0 R2(config-if)# %LINK-5-CHANGED: Interface Tunnel0, changed state to up R2(config-if)#ip address 192.168.2.2 255.255.255.0 R2(config-if)#tunnel source g0/1 R2(config-if)#tunnel destination 10.1.1.1 R2(config-if)#tunnel mode gre ip R2(config-if)#ex R2(config)#ip route 192.168.1.0 255.255.255.0 192.168.2.1 R2(config)#ip route 0.0.0.0 0.0.0.0 g0/1 R2(config)#do wri Networks and Communication Department

Part 3: Configuring GRE Tunnel on Router 2(private Network): Networks and Communication Department

Part 4: Tracing the path of networks connected , Use command show ip route R1#show ip route Networks and Communication Department

Part 4 Networks and Communication Department

Part 4 Networks and Communication Department

Part 5: After configuring tunnel, two tunnel endpoints can see each other can verify using an ICMP echo from one end Ping pc-0 from pc-1 Networks and Communication Department

Part 5 Networks and Communication Department

Part 5 Networks and Communication Department

Part 6: use the simulation panel to trace the packet movement. Now both networks (192.168.1.0/24 and 192.168.3.0/24) are able to freely communicate with each other over the GRE Tunnel . Networks and Communication Department

Part 6 Networks and Communication Department

The End Any Questions ? Networks and Communication Department