SlideShare a Scribd company logo
C1
C1(config)#ac 100 deny ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
C1(config)#ac 100 deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
C1(config)#ac 100 per ip any any
C1(config)#ip nat in sou list 100 int s0/1/1 over
C1(config)#crypto isakmp policy 1
C1(config-isakmp)#hash md5
C1(config-isakmp)#au pre
C1(config-isakmp)#encry 3des
C1(config-isakmp)#group 2
C1(config-isakmp)#crypto isakmp key cisco add 11.1.1.18
C1(config-isakmp)#crypto isakmp key hanoi add 11.1.1.22
C1(config)#ac 101 per ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
C1(config)#ac 102 per ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
C1(config)#crypto ipsec tran C2 esp-3des esp-md5-hmac
C1(config)#crypto ipsec tran C3 esp-aes esp-sha-hmac
C1(config)#crypto map VPN 2 ipsec-isakmp
C1(config-crypto-map)#set peer 11.1.1.18
C1(config-crypto-map)#set tran C2
C1(config-crypto-map)#match add 101
C1(config)#crypto map VPN 3 ipsec-isakmp
C1(config-crypto-map)#set peer 11.1.1.22
C1(config-crypto-map)#set tran C3
C1(config-crypto-map)#match add 102
C1(config-crypto-map)#int s0/1/1
C1(config-if)#crypto map VPN
C2
C2(config)#ac 100 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
C2(config)#ac 100 per ip any any
C2(config)#ip nat in sou list 100 int s0/1/0 over
C2(config)#crypto isakmp policy 1
C2(config-isakmp)#hash md5
C2(config-isakmp)#au pre
C2(config-isakmp)#encry 3des
C2(config-isakmp)#group 2
C2(config-isakmp)#crypto isakmp key cisco add 11.1.1.2
C2(config)#ac 101 per ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
C2(config)#crypto ipsec tran C1 esp-3des esp-md5-hmac
C2(config)#crypto map VPN 1 ipsec-isakmp
C2(config-crypto-map)#set peer 11.1.1.2
C2(config-crypto-map)#set tran C1
C2(config-crypto-map)#match add 101
C2(config-crypto-map)#int s0/1/0
C2(config-if)#crypto map VPN
C3
C3(config)#ac 100 deny ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
C3(config)#ac 100 per ip any any
C3(config)#ip nat in sou list 100 int s0/2/1 over
C3(config)#crypto isakmp policy 1
C3(config-isakmp)#hash md5
C3(config-isakmp)#au pre
C3(config-isakmp)#encry 3des
C3(config-isakmp)#group 2
C3(config-isakmp)#crypto isakmp key hanoi add 11.1.1.2
C3(config)#ac 101 per ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
C3(config)#crypto ipsec tran C1 esp-aes esp-sha-hmac
C3(config)#crypto map VPN 1 ipsec-isakmp
C3(config-crypto-map)#set peer 11.1.1.2
C3(config-crypto-map)#set tran C1
C3(config-crypto-map)#match add 101
C3(config-crypto-map)#int s0/2/1
C3(config-if)#crypto map VPN

More Related Content

What's hot

Semana 5-redes
Semana 5-redesSemana 5-redes
Semana 5-redesTaringa!
 
packer tracer
packer tracerpacker tracer
packer tracer
Eduardo Bello Monggó
 
Configuracion de los router clase 04 agosto.ppt
Configuracion de los router clase 04 agosto.pptConfiguracion de los router clase 04 agosto.ppt
Configuracion de los router clase 04 agosto.ppt
miguelangelperezhenao
 
Comandos del proyeto
Comandos del proyetoComandos del proyeto
Comandos del proyetoNeylan Salas
 
Uas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail Server
Uas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail ServerUas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail Server
Uas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail Server
Jefri Fahrian
 
Comandos Cisco
Comandos CiscoComandos Cisco
Comandos Cisco
mafercita98
 
Tugas e learning2 jarkom3 - Dynamic Routing (RIP)
Tugas e learning2 jarkom3 - Dynamic Routing (RIP)Tugas e learning2 jarkom3 - Dynamic Routing (RIP)
Tugas e learning2 jarkom3 - Dynamic Routing (RIP)
Jefri Fahrian
 
Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...
Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...
Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...
Rezky Ramdhani
 
Vlsm dhcp
Vlsm dhcpVlsm dhcp

What's hot (13)

Programas de for y do
Programas de for y doProgramas de for y do
Programas de for y do
 
Semana 5-redes
Semana 5-redesSemana 5-redes
Semana 5-redes
 
packer tracer
packer tracerpacker tracer
packer tracer
 
Configuracion de los router clase 04 agosto.ppt
Configuracion de los router clase 04 agosto.pptConfiguracion de los router clase 04 agosto.ppt
Configuracion de los router clase 04 agosto.ppt
 
Comandos del proyeto
Comandos del proyetoComandos del proyeto
Comandos del proyeto
 
Lab
LabLab
Lab
 
Uas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail Server
Uas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail ServerUas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail Server
Uas praktikum jarkom 3_Dynamic Routing (RIP), HTTP, DNS, & Mail Server
 
Lab
Lab Lab
Lab
 
Comandos Cisco
Comandos CiscoComandos Cisco
Comandos Cisco
 
Tugas e learning2 jarkom3 - Dynamic Routing (RIP)
Tugas e learning2 jarkom3 - Dynamic Routing (RIP)Tugas e learning2 jarkom3 - Dynamic Routing (RIP)
Tugas e learning2 jarkom3 - Dynamic Routing (RIP)
 
Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...
Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...
Simulasi jaringan menggunakan 2 routing protocol yang berbeda pada cisco pack...
 
Vlsm dhcp
Vlsm dhcpVlsm dhcp
Vlsm dhcp
 
Img 0008
Img 0008Img 0008
Img 0008
 

Viewers also liked

Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security?
Skybox Security
 
AFA Certificate - Deepan Siddarthan
AFA Certificate - Deepan SiddarthanAFA Certificate - Deepan Siddarthan
AFA Certificate - Deepan SiddarthanDeepan Siddarthan
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Redefining Security with the Blockchain by William Mougayar
Redefining Security with the Blockchain by William Mougayar Redefining Security with the Blockchain by William Mougayar
Redefining Security with the Blockchain by William Mougayar
The Business Blockchain
 
Information security in private blockchains
Information security in private blockchainsInformation security in private blockchains
Information security in private blockchains
Coin Sciences Ltd
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
Skybox Security
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it matters
Paul Brody
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
Melanie Swan
 
State of Blockchain Q1 2016
State of Blockchain Q1 2016State of Blockchain Q1 2016
State of Blockchain Q1 2016
CoinDesk
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016
CoinDesk
 

Viewers also liked (10)

Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security?
 
AFA Certificate - Deepan Siddarthan
AFA Certificate - Deepan SiddarthanAFA Certificate - Deepan Siddarthan
AFA Certificate - Deepan Siddarthan
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Redefining Security with the Blockchain by William Mougayar
Redefining Security with the Blockchain by William Mougayar Redefining Security with the Blockchain by William Mougayar
Redefining Security with the Blockchain by William Mougayar
 
Information security in private blockchains
Information security in private blockchainsInformation security in private blockchains
Information security in private blockchains
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it matters
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 
State of Blockchain Q1 2016
State of Blockchain Q1 2016State of Blockchain Q1 2016
State of Blockchain Q1 2016
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016
 

More from hoanv

Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Presentation gamatronic
Presentation gamatronicPresentation gamatronic
Presentation gamatronichoanv
 
Nexans Catalog
Nexans CatalogNexans Catalog
Nexans Cataloghoanv
 
Liverpool hospital
Liverpool hospitalLiverpool hospital
Liverpool hospital
hoanv
 
Firetide introduction-2011
Firetide introduction-2011Firetide introduction-2011
Firetide introduction-2011hoanv
 
Emg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperEmg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaper
hoanv
 
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405hoanv
 

More from hoanv (7)

Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Presentation gamatronic
Presentation gamatronicPresentation gamatronic
Presentation gamatronic
 
Nexans Catalog
Nexans CatalogNexans Catalog
Nexans Catalog
 
Liverpool hospital
Liverpool hospitalLiverpool hospital
Liverpool hospital
 
Firetide introduction-2011
Firetide introduction-2011Firetide introduction-2011
Firetide introduction-2011
 
Emg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperEmg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaper
 
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
 

Hd lab vpn ipsec site to - site

  • 1. C1 C1(config)#ac 100 deny ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255 C1(config)#ac 100 deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 C1(config)#ac 100 per ip any any C1(config)#ip nat in sou list 100 int s0/1/1 over C1(config)#crypto isakmp policy 1 C1(config-isakmp)#hash md5 C1(config-isakmp)#au pre C1(config-isakmp)#encry 3des C1(config-isakmp)#group 2 C1(config-isakmp)#crypto isakmp key cisco add 11.1.1.18 C1(config-isakmp)#crypto isakmp key hanoi add 11.1.1.22 C1(config)#ac 101 per ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255 C1(config)#ac 102 per ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 C1(config)#crypto ipsec tran C2 esp-3des esp-md5-hmac C1(config)#crypto ipsec tran C3 esp-aes esp-sha-hmac C1(config)#crypto map VPN 2 ipsec-isakmp C1(config-crypto-map)#set peer 11.1.1.18 C1(config-crypto-map)#set tran C2 C1(config-crypto-map)#match add 101 C1(config)#crypto map VPN 3 ipsec-isakmp C1(config-crypto-map)#set peer 11.1.1.22 C1(config-crypto-map)#set tran C3 C1(config-crypto-map)#match add 102 C1(config-crypto-map)#int s0/1/1 C1(config-if)#crypto map VPN
  • 2. C2 C2(config)#ac 100 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255 C2(config)#ac 100 per ip any any C2(config)#ip nat in sou list 100 int s0/1/0 over C2(config)#crypto isakmp policy 1 C2(config-isakmp)#hash md5 C2(config-isakmp)#au pre C2(config-isakmp)#encry 3des C2(config-isakmp)#group 2 C2(config-isakmp)#crypto isakmp key cisco add 11.1.1.2 C2(config)#ac 101 per ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255 C2(config)#crypto ipsec tran C1 esp-3des esp-md5-hmac C2(config)#crypto map VPN 1 ipsec-isakmp C2(config-crypto-map)#set peer 11.1.1.2 C2(config-crypto-map)#set tran C1 C2(config-crypto-map)#match add 101 C2(config-crypto-map)#int s0/1/0 C2(config-if)#crypto map VPN C3 C3(config)#ac 100 deny ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255 C3(config)#ac 100 per ip any any C3(config)#ip nat in sou list 100 int s0/2/1 over C3(config)#crypto isakmp policy 1 C3(config-isakmp)#hash md5 C3(config-isakmp)#au pre C3(config-isakmp)#encry 3des C3(config-isakmp)#group 2
  • 3. C3(config-isakmp)#crypto isakmp key hanoi add 11.1.1.2 C3(config)#ac 101 per ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255 C3(config)#crypto ipsec tran C1 esp-aes esp-sha-hmac C3(config)#crypto map VPN 1 ipsec-isakmp C3(config-crypto-map)#set peer 11.1.1.2 C3(config-crypto-map)#set tran C1 C3(config-crypto-map)#match add 101 C3(config-crypto-map)#int s0/2/1 C3(config-if)#crypto map VPN