4.3.9 Packet Tracer Configure Site To Site VPN Answer Key
4.3.9 Packet Tracer Configure Site To Site VPN Answer Key
4.3.9 Packet Tracer Configure Site To Site VPN Answer Key
Objectives
Part 1: Verify Connectivity between Branch and HQ
Part 2: Create and Verify Site-to-Site VPN
Background / Scenario
In this Packet Tracer activity, you will add the commands required to configure a site-to-site IPsec VPN
between Branch to HQ. The ISP acts as a pass-through and has no knowledge of the VPN. IPsec provides
secure transmission of sensitive information over unprotected networks, such as the internet. IPsec acts at
the network layer, protecting and authenticating IP packets between participating IPsec devices (peers), such
as Cisco routers. The Internet Security Association and Key Management Protocol (ISAKMP) is part of IPsec
protocol suite and will be used to negotiate the parameters and keys to establish a security association (SA)
between the two sites.
Instructions
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Packet Tracer - Configure a Site-to-Site VPN
Password: BRsecurity
c. Enter the enable command, and then BRc1sc0@! as the enable password.
Branch> enable
Password: BRc1sc0@!
Branch#
d. Enter global configuration mode.
Branch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Branch(config)#
e. Copy the following commands and paste them into BRouter1. The comments are there for your
information and will not impact the configuration.
!Comment: Configure an ISAKMP policy with a priority of 10, 256 bit AES
encryption, pre-shared authentication key, D-H group 5, and a lifetime of 900
seconds
!
crypto isakmp policy 10
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Packet Tracer - Configure a Site-to-Site VPN
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Packet Tracer - Configure a Site-to-Site VPN
Branch(config-if)#
Note: The router generates a notification that crypto is now on. However, the SAs are not established until the
crypto map has been activated by interesting traffic.
Step 4: Configure the NAT ACL to define interesting traffic that is not using the VPN tunnel.
a. Network Address Translation (NAT) will not be executed for traffic that is travelling through the tunnel.
Remove ACL 102 from the current configuration.
Branch(config)# no access-list 102
b. NAT will be used on all traffic that is NOT travelling through the tunnel. Add the following ACL commands
to the configuration to identify traffic that will go through network address translation.
Note: The ACL will include access to servers at the ISP.
access-list 102 permit ip 10.0.3.0 0.0.0.255 10.1.0.0 0.0.255.255
access-list 102 permit ip 10.0.3.0 0.0.0.255 10.2.0.0 0.0.255.255
access-list 102 permit ip 10.0.3.0 0.0.0.255 10.3.0.0 0.0.255.255
© 2021 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com