Lab 1: Site-to-Site IPSec VPN with NAT

CCIE - Practical Implementation of IPsec VPN - Secure DMVPN CCIE - Practical Implementation of IPSEC VPN - Secure DMVPN
29 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€67.35
List Price:  €96.21
You save:  €28.86
£55.83
List Price:  £79.77
You save:  £23.93
CA$100.76
List Price:  CA$143.95
You save:  CA$43.19
A$112.23
List Price:  A$160.33
You save:  A$48.10
S$95.14
List Price:  S$135.93
You save:  S$40.78
HK$543.62
List Price:  HK$776.63
You save:  HK$233.01
CHF 63.04
List Price:  CHF 90.06
You save:  CHF 27.02
NOK kr797.48
List Price:  NOK kr1,139.30
You save:  NOK kr341.82
DKK kr502.49
List Price:  DKK kr717.87
You save:  DKK kr215.38
NZ$124.10
List Price:  NZ$177.29
You save:  NZ$53.19
د.إ257.07
List Price:  د.إ367.26
You save:  د.إ110.18
৳8,361.55
List Price:  ৳11,945.58
You save:  ৳3,584.03
₹5,962.79
List Price:  ₹8,518.63
You save:  ₹2,555.84
RM314.04
List Price:  RM448.65
You save:  RM134.61
₦108,335.42
List Price:  ₦154,771.52
You save:  ₦46,436.10
₨19,495.71
List Price:  ₨27,852.21
You save:  ₨8,356.49
฿2,390.81
List Price:  ฿3,415.60
You save:  ฿1,024.78
₺2,467.44
List Price:  ₺3,525.07
You save:  ₺1,057.62
B$434.14
List Price:  B$620.23
You save:  B$186.09
R1,296.68
List Price:  R1,852.48
You save:  R555.80
Лв131.68
List Price:  Лв188.12
You save:  Лв56.44
₩102,198.93
List Price:  ₩146,004.73
You save:  ₩43,805.79
₪256.56
List Price:  ₪366.53
You save:  ₪109.97
₱4,090.81
List Price:  ₱5,844.26
You save:  ₱1,753.45
¥10,994.99
List Price:  ¥15,707.80
You save:  ¥4,712.81
MX$1,408.98
List Price:  MX$2,012.91
You save:  MX$603.93
QR255.09
List Price:  QR364.43
You save:  QR109.34
P967.82
List Price:  P1,382.66
You save:  P414.84
KSh9,046.20
List Price:  KSh12,923.70
You save:  KSh3,877.50
E£3,562.49
List Price:  E£5,089.49
You save:  E£1,527
ብር8,907.19
List Price:  ብር12,725.10
You save:  ብር3,817.91
Kz63,830.88
List Price:  Kz91,190.88
You save:  Kz27,360
CLP$69,323.69
List Price:  CLP$99,038.09
You save:  CLP$29,714.40
CN¥510.80
List Price:  CN¥729.75
You save:  CN¥218.94
RD$4,245.36
List Price:  RD$6,065.06
You save:  RD$1,819.70
DA9,465.07
List Price:  DA13,522.10
You save:  DA4,057.03
FJ$162.39
List Price:  FJ$232
You save:  FJ$69.60
Q539.11
List Price:  Q770.19
You save:  Q231.08
GY$14,638.77
List Price:  GY$20,913.42
You save:  GY$6,274.65
ISK kr9,772.70
List Price:  ISK kr13,961.60
You save:  ISK kr4,188.90
DH703.98
List Price:  DH1,005.73
You save:  DH301.75
L1,291.33
List Price:  L1,844.84
You save:  L553.50
ден4,143.97
List Price:  ден5,920.21
You save:  ден1,776.24
MOP$559.97
List Price:  MOP$800
You save:  MOP$240.02
N$1,289.45
List Price:  N$1,842.15
You save:  N$552.70
C$2,574.80
List Price:  C$3,678.44
You save:  C$1,103.64
रु9,534.71
List Price:  रु13,621.60
You save:  रु4,086.89
S/260.99
List Price:  S/372.86
You save:  S/111.86
K283.85
List Price:  K405.52
You save:  K121.66
SAR262.91
List Price:  SAR375.60
You save:  SAR112.69
ZK1,936.45
List Price:  ZK2,766.47
You save:  ZK830.02
L335.12
List Price:  L478.77
You save:  L143.64
Kč1,694.03
List Price:  Kč2,420.15
You save:  Kč726.12
Ft27,771.44
List Price:  Ft39,675.18
You save:  Ft11,903.74
SEK kr774.38
List Price:  SEK kr1,106.30
You save:  SEK kr331.92
ARS$71,792.58
List Price:  ARS$102,565.23
You save:  ARS$30,772.64
Bs484.55
List Price:  Bs692.24
You save:  Bs207.69
COP$307,165.41
List Price:  COP$438,826.54
You save:  COP$131,661.12
₡35,530.54
List Price:  ₡50,760.09
You save:  ₡15,229.55
L1,777.33
List Price:  L2,539.15
You save:  L761.82
₲546,250
List Price:  ₲780,390.60
You save:  ₲234,140.59
$U3,115.91
List Price:  $U4,451.49
You save:  $U1,335.58
zł287.82
List Price:  zł411.19
You save:  zł123.37
Already have an account? Log In

Transcript

Hello again, this is your host Habib zecharia. And this is our first lap for IPsec VPN with Nat topology. Basically the two sites, site a and site b, r one r two is considered to be a one site location. Our three will be a remote site or branch office perhaps. And basically the link between r two and three I'm showing as a pseudo link. But this could be also an internet cloud.

That means r two r three can only communicate with r two, but it has no reachability to r1. This is basically common scenario at At a lot of organizations, you cannot basically a remote site cannot basically communicate with an internal router, it can only communicate to the edge router. So our two will will be have as our edge router, and our two will have the NAT configuration. So let's start with this task number one, establish connectivity between r one and r three using static routes. Task number two is configure static Nat in r two so that our ones serial interface one slash zero is seen in r two. Right so that's how our tree will communicate with r1 through our To add the third configuration will be the IPsec VPN configuration.

And as I said the IPsec configuration is has a lot of command lines that we will apply. Basically, it's a learning process and anyone who would do this probably two or three times will get to know how to apply IPsec VPN. Now this topology will basically covered the traditional IPsec VPN implementation in our second lab, which is going to be on dmvpn and how to secure the dmvpn tunnels, we're gonna have a much simpler way of doing IPsec VPN by This is basically a very practical lab. And what I will advise my students is really to try it, doing it at home and gaining that comfort level. Okay, so let's start I've started the routers already. And let me bring our one and start configuring it.

Some of the configurations are basically a replica. And it's easier if you use a notepad to do that configuration. But anyway, let's stop doing it. I hope it's clear and the fonts are clear in the video. So first thing is r1. We don't have to give it a host name because it's already showing as r1.

We will start by configuring the loopback interface give it an IP address loopback usually doesn't need the no shut command interface. That's the first interface and the IP address according to the topology is 120 10 dot 10 dot 125525 Let me bring our two now. Give it up to are two has another interface. Let's give it a clock rate even though it's not necessary. The best practice in serial interfaces is to always give the clock rate for the DC. I think we will go back to our one and just give a clock rate as well.

Let me save it. Okay, so let me bring our three Okay, the interfaces are up in r three. The other requirement that we want to provide is a static route between the routers. So let me bring back r1 and apply the static route. So the default route for r1 is going to be IP route and all the traffic will be directed to our tos serial interface one slash one, and that IP is 120 dot 10 dot 10 dot two. Okay, now let me do this Same thing for r three.

All the traffic and r three is directed to our tos serial interface, one slash two, which is dot two. Okay. Now let me bring our two. So our two will have two routes, basically one route to reach the loopback interface inside B and another loopback interface inside a. So let's do that IP I don't know what's happening here IP route. Let me save the configuration.

Now. Basically task two is completed task two was no. Task one is completed with establishing connectivity between r one and r three using static routes. So let me bring our one and we will basically ping our threes. loopback interface. So ping, dirty, dirty, dirty, dirty from source 10 dot 10 dot 10 dot 10.

And yes, we can ping. So that's good. We achieved our first task. Now task number two is configure static Nat. So are two is basically our router here but it could be also a firewall that will do nothing, right. So.

So the configuration of firewall in a router. It's almost the same if you do this if you do it in from Seelye mode. So we have two interfaces in r two. So interface serial one slash one will act as our IP Nat inside and interface one slash s one slash two will be IP Nat outside. Let's exit. Now we will have to basically apply the static Nat.

So IP Nat source, the source is basically static 120 dot 10 dot 10 dot one will be translated to 220 dot 20 dot 20 dot one IP Nat inside There we go. Now if you notice I used one 220 20 dot 20 dot one, where as this interface has got to configure it. Basically if you look at this topology dot one is part of this subnet as well so we could use dot one dot four, because dot three is assigned here, dot five dot six and so on. So we chose dot one okay. So if I do show IP Nat translations, so this tell me the the inside global which is 220 dot 2020 dot one, which is inside global is translated to inside local IP, which is 120 10. dot 10 dot one. So that's what we wanted.

We wanted our three to communicate with r1 using the inside global IP which is 220 20 dot 20 dot one and that's how Nat netting works. Okay. So with this we have actually completed task number two. Now task number three is where we will put all our attention now, which is configuring IPsec VPN. Now if you look at the architecture slide I have said there is IPsec policy that will run first, that's what we will start working on. So let's add the tunnel will be created from r1 all the way to r three, r two has no purpose at this time.

All the work will be done on our work. And our three let me bring our one. So as I said most of the most of the, the commands will be replicated between r one and r three. Let me put both of them here. Let me actually bring r one on top and r three at the bottom. And we will continue applying the same commands into both of the routers, so we don't miss anything.

And I will recommend that you do this at your own pace. The more you practice, the more you will get to know the commands as I mentioned in my previous slides, I say cam is the protocol that drives all other components. And we will add all other components now hash MD five, authentication, pre share, group to encryption will be three deaths. One thing I didn't discuss is about group two group is basically referring to diffie Hellman group and Cisco routers support groups that are from one to 24. For simplicity, I always use group two and it provides 1025 four bits, encryption, okay. Or basically, it can communicate, establish communication using 1064 bits.

That's that's the right way to say it. So that's done. Let me apply the same commands here in our three authentication to encryption three trade So this is all we have to do for ISO camp policy. Now let's add the crypto ISO camp key. Let's use Cisco 123 address. Now this address is the peer IP address in our topology it is going to be 220 dot 20 dot 23.

This IP is the IP of the neighboring device which is our threes interface here. Okay let's do the same thing in our three crypto I can notice I'm missing crypto. I think we said Cisco 123 and the address is 220 20 dot one. If you notice our three is going to establish communication with our tos global inside IP address. Remember that so that's why we are using 220 dot 20 dot 20 dot one as the peer device. Now that is done now we will configure and we will configure something known IPsec transform set to use desk for encryption and Mt five for hashing.

Okay, so let's create the transform set. crypto IPsec transform set, and I'll call it Tran. That's the name I'll give it. We can use ESP does. And e SP, MD five. HMC.

Same thing in our three we have to match all the steps between these two routers. So they can negotiate the authentication and encryption one this time transferring all the interesting traffic Okay, we made a mistake here. I mean that there you go. Now we will create the access list for the interesting traffic. So, access list 101 permit IP host to host same thing here in our three access list 101 permit IP host. So that's how our access list is done.

Now there's a step that we need to do which is the crypto map. Let's do that. crypto map. VPN 10 IPsec. Again, sorry about the typo. It's been a long day.

Said peer Now we know who is our peer that's how our peer match address on a one. Set. Transform set. Tran. Let's apply the same in our three crypto map. VPN 10.

Said peer Don't forget our pier is the global inside IP address. No one. So that is done. Now as you know, we apply crypto map to the interfaces when it comes to VPN. Similarly we do for the access list we apply access group to the interfaces but when it comes to VPN, we apply the crypto map into the interfaces. So in r1 we will apply the crypto map to this interface.

For our three we will apply to this interface which is serial one slash two for r1. It's serial one slash zero. So let's do that interface, serial one slash zero crypto map, v, p n. Let's do the same thing here in our three, interface, one slash two, one slash two. And we said it's crypto map, VPN. Let's save it. Now our configuration is totally complete.

Let's generate interesting traffic that's when the VPN will kick in. So if I do ping 3030 3030 from the source, which is 10 dot 10 dot 10 dot 10 you can see it's going through which is great. Now let's check the policy the policies the security Association. So if I do show crypto I say cam as a I can see that I can see to 20 2023 from the source 120 dot 10 dot 10 dot one and the status is active. The other thing we could do is basically do show crypto IPsec sa, that's another security Association. And we could include number.

And there you go. It tells us how many encapsulations happened, how many decapsulation is happen, and what failed. And what got decompressed. The other command I wanted to show you was the number of connections that are active. So if I do show crypto engine connections active. This tells me that IPsec is active the algorithm is Diaz plus MD five.

So there was a decryption here. Same thing here. So with this, I conclude our first lab, which is basically an implementation of site to site VPN with Nat. This topology could have been simpler. Basically, if you didn't want to introduce Nat in the middle, you could just connect r1 to r three and just follow the same steps but there will be No Nat configurations because there will be no r1 there'll be no r two. So that would have been very simpler lab.

But I introduced this lab to make it a little bit complicated and also to to move to mimic real world topology. I hope you have enjoyed this lab and once again, thank you and we will do the second lab shortly. Thank you

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.