I have uploaded two files, one word document with instructions and questions, the other is a packet tracer file, all configured already.Would you be able to write out the commands for each task that...

1 answer below »
I have uploaded two files, one word document with instructions and questions, the other is a packet tracer file, all configured already.
Would you be able to write out the commands for each task that must be configured so I can do it again to practice.






The security policy of Company ABCD require the use of the following VPN polic:




crypto policy 20




Encryption aes




hash md5




authentication pre-share use "NET477"




group 5




ISKAMP lifetime 86400




The following should be configured on both sites' routers:




Tasks:




1-Define the intersting traffic using an access-list




2-Configure the crypto policy #20




3-Configure the Transform-set




4-Configure the crypto Map




5-Apply the crypto Map on the interfaces




6-Verify the config and Test




7-Intiate a traffic from either location to bring the IPsec VPN tunnel UP





NET-477 Fall 2022 Lab#2 Total 100 points Due October 25th 11:59 PM CST Submit a file, named --Lab2.zip containing the followings: Part #1 complete the pka lab exercise “Site-to-Site VPN in the zipped folder (80 points) Include a screenshot of your pka configuration below along with answers to the below questions in part#2, also your pka file should be submitted along with this document,your lab should have all the tasks completed as indicated in the work area also to get full credit your tests should be successfully verified prior submission. Note: You don’t need to configure any routing on any routers in this lab (If you do, points will be deducted), all routes are configured for you via static default routes you only need to focus on completing all the required tasks to build, configure and test the IPsec Tunnel. Part#2 (20 points) Answer the following questions: 1. Which action do IPsec peers take during the IKE Phase 2 exchange? (5 points) 2. If you are using Firewalls at each end of the IPSec VPN tunnel what are the protocols that need to be allowed in order for the tunnel to be established? (5 points) 3. When is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites? (5 points) 4. Which term describes a situation where VPN traffic that is is received by an interface is routed back out that same interface? (5 points) Part#1: Include your screenshots here: Part#2: Include your answers here make sure you refer to the question’s number:
Answered Same DayOct 25, 2022

Answer To: I have uploaded two files, one word document with instructions and questions, the other is a packet...

Naveen Kumar answered on Oct 25 2022
50 Votes
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here