Potrebno je iskonfigurisati mrežu kao na slici. Za to je potrebno postaviti 3 rutera.

Size: px
Start display at page:

Download "Potrebno je iskonfigurisati mrežu kao na slici. Za to je potrebno postaviti 3 rutera."

Transcription

1 SecLab 01 Site to Site VPN Cilj vežbe Cilj vežbe je upoznavanje sa IPSec, SSH i Telent protokolima. U vežbi će se konfigurisati jednostavna mreža sa dinamičkim protokolom za rutiranje RIP. Nakon toga će se konfigurisati VPN (Virtual Private Network) na 2 krajnja rutera u mreži. Ruteri koji se koriste u ovom scenariju mogu biti Cisco Prikazaće se kako izgleda neenkriptovana komunikacija kada se koristi Telnet protokol za daljinski pristup računaru. Zatim će se prikazati kako izgleda enkriptovana komunikacija na aplikacionom sloju kada se koristi SSH protokol za daljinski pristup računaru. Na kraju, pokazaće se kako se uspostavlja enkripcija na mrežnom sloju kada se enkriptuje ceo saobraćaj na višim slojevima, a ne samo specifičan saobraćaj za jednu aplikaciju. To će se izvršiti uz pomoć IPsec protokola. Za razumevanje vežbe potrebno je osnovno znanje RIP protokola i protokola dinamičkog rutiranja. Kreiranje projekta i osnovna podešavanja Potrebno je iskonfigurisati mrežu kao na slici. Za to je potrebno postaviti 3 rutera. Konfiguracija osnovne funkcionalne mreže i RIP protokola Korak 1.1. Would you like to enter the initial configuration dialog? [yes/no]: no Potrebno je iskonfigurisati ruter US, sledećim komandama: Router>enable # Neke privilegovane EXEC komande se koriste za akcije koje utiču na sistem. Preporučuje se podešavanje lozinke za takve komande da bi se sprečila neautorizovana upotreba. Postoje dva tipa takvih komandi enable (neenkriptovana) i enable secret (enkriptovana. configure terminal # komanda se koristi u Global configuration komandnom modu za konfigurisanje rutera Router(config)#no logging console

2 Router(config)#interface s0/0 # komanda se koristi u Interfejs configuration komandnom modu za konfigurisanje interfejsa. U ovom slučaju se konfiguriše serijski interfejs s0/0 Router(config-if)#ip address # dodela IP adrese Router(config-if)#no shutdown # komanda služi da se omogući aktivira interface koji se konfiguriše Router(config-if)#interface loop 1 # konfigurisanje loopback interfejsa. Koji za ovu vežbu simulira mreže koje se nalaze iza rutera US Router(config-if)#ip address # dodela IP adrese Router(config-if)#router rip # aktiviranje RIP protokola Router(config-router)#version 2 # podešavanje verzije RIP protokola na 2 Router(config-router)#network # oglašavanje mreže Router(config-router)#network Router(config-router)#no auto-summary # Router(config-router)#exit # izlaz iz komandnog moda za konfiguraciju Router(config)#exit copy running-config startup-config # snimanje trenutne konfiguracije Destination filename [startup-config]? Building configuration... [ OK] Korak 1.2. Zatim je potrebno iskonfigurisati ruter ISP. Router>enable configure terminal Router(config)#no logging console Router(config)#interface s0/0 Router(config-if)#ip address Router(config-if)#no shutdown Router(config-if)#exit Router(config)#interface s0/1 Router(config-if)#ip address Router(config-if)#no shutdown Router(config)#router rip Router(config-router)#version 2 Router(config-router)#network Router(config-router)#network Router(config-router)#no auto-summary Router(config-router)#exit Router(config)#exit copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK] Korak 1.3. I na kraju ruter Pakistan: Router> Router>enable configure terminal Router(config)#no logging console Router(config)#interface s0/0 Router(config-if)#ip address Router(config-if)#no shutdown Router(config-if)#interface loop 1 Router(config-if)#ip address Router(config-if)#router rip Router(config-router)#version 2 Router(config-router)#network Router(config-router)#network Router(config-router)#no auto-summary Router(config-router)#exit Router(config)#exit copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK]

3 Korak 1.4. Provera konekcije sa prvim ruterom (US) se vrši komandom: ping Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 20/40/68 ms Konfiguracija Telnet servisa Telnet je osnovi protokola koji se koristi na Internetu i u lokalnim TCP/IP mrežama za udaljeni pristup računarima. Omogućava dvosmernu komunikaciju baziranu na tekstu. Telnet je razvijen U početku je denisan dokumentom RFC 15, a proširen RFC 854. Omogućava pristup udaljenom računaru i njegovom komandnom interfejsu. Problem je što Telnet koristi neenkriptovanu komunikaciju (koristi se običan tekst), što otvara mogućnost otkrivanja lozinki i drugih važnih informacija. Nedostatak Telnet a će se pokazati u sledećem primeru. Korak 2.1. Prvo je na ruteru Pakistan, potrebno omogućiti Telnet pristup. Router> enable configure terminal Router(config)# line vty 0 4 # ova i sledeće dve naredbe podešavaju telnet server i korisničko ime za logovanje Router(config-line)# login % Login disabled on line 130, until 'password' is set % Login disabled on line 131, until 'password' is set % Login disabled on line 132, until 'password' is set % Login disabled on line 133, until 'password' is set % Login disabled on line 134, until 'password' is set Router(config-line)# password proba #podešavanje lozinke za logovanje preko telnet servisa Router(config)#enable password proba Router(config-line)# exit + Korak 2.2. Da bi se mogla izvršiti analiza saobraćaja potrebno je pokrenuti WireShark. Korak 2.3. Zatim se na ruteru US pokreće telnet klijent za pristup na udaljeni ruter Pakistan. Pored naredbe telnet navodi se i IP adresa udaljenog rutera. telnet Trying Open User Access Verification Password: # Na ovom mestu se unosi password Router>enable Password: # Na ovom mestu se unosi enable password exit [Connection to closed by foreign host] exit

4 Korak 2.4. Sada je potrebno pregledati pakete koji su poslati preko mreže. Da bi se to postiglo potrebno je pokrenuti WireShark. Sada je potrebno selektovati telnet pakete koji su upućeni ruteru Pakistan. To se vrši desnim klikom na bilo koji paket prikazan u WireSharku koji u Destination polju ima vrednost IP adrese rutera na koji je izvršeno logovanje (Pakistan ima IP adresu ) i u polju Protocol ima vrednost TELNET. Desni klik miša je potrebno izvršiti na IP adresi u vrsti gde se nalazi i vrednost TELNET i odabrati opciju menija Apply as Filter > Selected. Dalje je potrebno dodati još kriterijuma u filter za prikaz paketa. To se vrši desnim klikom miša, kao što je prikazano na slici, i odabirom opcije Apply as Filter >... and Selected. Sada se u polju filter pojavlju sledeći prikaz: (ip.dst== ) && (telnet) kao što je prikazano na slici.

5 Sada se u programu WireShark vrši prikaz samo TELNET paketa upućenih na adresu Da bi se video njihov sadržaj, potrebno je kliknuti na svaki paket posebno na + ispred polja Telent u donjem delu prozora. U svakom paketu se prenosi po jedan karakter. Da bi se video niz podataka koji su sadržani u nizu paketa, potrebno je aktivirati opciju Follow TCP Stream klika desnim tasterom miša. Rezultat te akcije će biti prikaz sličan kao na slici. Na ekranu se vidi da je komunikacija između računara neenkriptovana i da se sadržaj paketa jasno može videti.

6 Konfiguracija SSH ser visa Secure Shell (SSH) je kriptografski mrežni protokol za sigurni prenos podataka i pristup udaljenom računaru preko nesigurne javne mreže. Na računaru kome se pristupa potrebno je da postoji SSH server, a na računaru sa koga se pristupa potrebno je da postoji SSH klijent. Postoje dve glavne verzije ovog protokola: SSH 1 i SSH 2. Dizajniran je da zameni Telnet i druge nesigurne protokole kao što su Berkeley rsh i rexec. SSH koristi kriptografiju sa javnim ključem za autentifikaciju udaljenog računara i korisnika. Prva verzija protokola SSH 1 nastala je god., a druga verzija SSH god. Ta verzija protokola nije kompatibilna sa SSH 1. Posle promovisanja 2.1 verzije protokola, dokumentom RFC 4253 specificirana je verzija koja podržava i verziju 2.0 i ranije verzije protokola na istom serveru. To je verzija 1.99 i ne predstavlja pravu verziju protokola već metod za održavanje kompatibilnosti sa ranijim verzijama. Korak 3.1. Prvo je potrebno restartovati ruter Pakistan da bi se resetovala Telnet konfiguracija. Za to se koristi naredba reload u globalnom konfiguracionom modu. Prilikom restarta sitema biće ponuđeno da se izmenjena konfiguracija sačuva, ali je potrebno odabrati opciju no. Pakistan#reload System configuration has been modified. Save? [yes/no]: no Proceed with reload? [confirm] Nakon restarta sistema, potrebno konfigurisati i startovati SSH server na ruteru Pakistan Router> Router> enable configure terminal Router(config)# hostname Pakistan # dodela imena ruteru (hostu) Pakistan(config)# ip domain-name pakistan.com # dodela imena domena kome pripada ruter. Pravi Internet domen za ovaj host ne postoji, tj. nije dodeljen, ali se za potrebe konfigurisanja SSH mora dodeliti ovaj privremeni domain-name Pakistan(config)# logging console # aktiviranje prikaza sistemskih logova da bi se video izveštaj o generisanom ključu Pakistan(config)# crypto key generate rsa general-keys modulus 1024 # generisanje sertifikata upotrebom RSA algoritma dužine 1024 bita. Naredba crypto ukazuje da se radi o kriptografskim komandama

7 The name for the keys will be: Pakistan.pakistan.com % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be non-exportable...[ok] Pakistan(config)# *Mar 1 00:40:46.107: %SSH-5-ENABLED: SSH 1.99 has been enabled Pakistan(config)# no logging console # isključenje prikaza sistemskih logova Pakistan(config)# username admin priv 15 secret proba # kreiranje korisnika admin sa administratorskim privilegijama (priv 15) i enkriptovanom lozinkom sa md5 hash algoritmom (secret) Pakistan(config)# aaa new-model # aktiviranje prikaza Pakistan(config)# enable secret proba # aktiviranje prikaza Pakistan(config)# line vty 0 4 # aktiviranje prikaza Pakistan(config-line)# transport input ssh # Ova naredba dozvoljava samo SSH pristup. Da bi se dozvolio samo Telnet pristup koristi se telnet umesto ssh, a za sve protokole koristi se all umesto ssh Pakistan(config-line)# Korak 3.2. Posle konfiguracije rutera Pakistan potrebno je pokrenuti analizu saobraćaja kao i u koraku 2.3. Korak 3.3. Sa rutera US daljinski pristup na ruter Pakistan (adresa ) vrši se komandom: ssh -l admin Korak 3.4. Sada je potrebno pregledati pakete koji su poslati preko mreže kao u koraku 2.4. Za razliku od toga koraka filtriraju se i analiziraju samo SSHv2 paketi (potrebno je obratiti pažnju kod filtriranja paketa). Ukoliko su sve akcije dobro izvršene dobiće se prikaz enkriptovane komuniakcije između dva rutera. Kao što se vidi na slici sva korisnikova komunikacija je skrivena. Konfiguracija VPN i IPsec protokola Internet Protocol Security (IPsec) je proširenje IP protokola koje služi da obezbedi sigurnu IP komunikaciju uz pomoć autentifikacije i enkripcije svih paketa na nivou mrežnog sloja OSI modela ( Internet sloj TCP/IP modela). IPsec obuhvata protokole za uspostavljanje obostrane autentifikacije između agenata na početku sesije i razmenu kriptografskih ključeva u toku sesije.

8 Za razliku od drugih sigurnosnih protokola kao što su Secure Sockets Layer (SSL), Transport Layer Security (TLS) i Secure Shell (SSH) i koji rade na višim slojevima TCP/IP modela, IPsec radi na Internet sloju TCP/IP modela. Tako SSH ili SSL štite samo saobraćaj na nivou jedne aplikacije, dok IPsec štiti celokupnu komunikaciju. IPsec je otvoreni standard i koristi sledeće protokole za razne funkcije: Authentication Headers (AH) Encapsulating Security Payloads (ESP) Security Associations (SA) Internet Security Association and Key Management Protocol (ISAKMP) Da bi se izvršila konfiguracija IPsec virtuelne privatne mreže između dva rutera potrebno je izvršiti sledeće korake. Korak 4.1. Ponovo se mogu restartovati svi ruteri u scenariju. Dateljnije objašnjenje sigurnosnih naredbi se nalazi u Cisco IOS Security Command Reference Release Konfiguracija VPN a na ruteru US: Router> Router>enable configure terminal Router(config)#crypto isakmp policy 7 # podešava identifikator Diffie-Hellman grupe Router(config-isakmp)#authentication pre-share # pre-share metod autentifikacije je dobar za male mreže Router(config-isakmp)#encryption aes 128 # podešava identifikator Advanced Encryption Standard sa dužinom ključa 128 bita Router(config-isakmp)#group 2 Router(config-isakmp)#hash sha # podešava hash algoritam za omogućavanje integriteta podataka. Osigurava da paketi stižu sa naznačenog mesta i da nisu modifikovani u toku transporta Router(config-isakmp)#lifetime 100 Router(config-isakmp)#exit Router(config)#crypto isakmp key 0 vpnkey address no-xauth # podešava ključ za autentifikaciju. 0 znači da sledi neenkriptovana lozinka. vpnkey je ključ. address služi za unos adrese udaljenog rutera. no-xauth se koristi da spreči rutere u produženoj autentifikaciji. Router(config)#crypto ipsec transform-set vpntrans esp-aes 128 esp-sha-hmac # definiše transform set. Vpntrans je ime transform seta. esp-aes 128 je tip transformacije - ESP sa 128-bit Advanced Encryption Standard (AES) algoritmom enkripcije Router(cfg-crypto-trans)#exit Router(config)#ip access-list extended vpn-acl # definiše ime access liste Router(config-ext-nacl)#permit ip Router(config-ext-nacl)#exit Router(config)#crypto map vpn-map 10 ipsec-isakmp # kreira i modifikuje kripto mapu za sesiju % NOTE: This new crypto map will remain disabled until a peer and a valid access list have been configured. Router(config-crypto-map)#set peer # podešava adresu rutera na drugoj strani veze (peer) Router(config-crypto-map)#match address vpn-acl # određuje extended access listu koja je definisana komadom ip access-list extended za crypto map Router(config-crypto-map)#set transform-set vpntrans # podešava koji se transform set koristi za crypto map. Router(config-crypto-map)#exit Router(config)# Router(config)#interface s0/0 Router(config-if)#crypto map vpn-map Router(config-if)#exit Router(config)#exit copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK] Korak 4.2.

9 Konfiguracija VPN a na ruteru Pakistan: Router> Router>enable configure terminal Router(config)#crypto isakmp policy 7 Router(config-isakmp)#authentication pre-share Router(config-isakmp)#encryption aes 128 Router(config-isakmp)#group 2 Router(config-isakmp)#lifetime 100 Router(config)#crypto isakmp key 0 vpnkey address no-xauth Router(config)#crypto ipsec transform-set vpntrans esp-aes esp-sha-hmac Router(cfg-crypto-trans)#exit Router(config)#ip access-list extended vpn-acl Router(config-ext-nacl)#permit ip Router(config-ext-nacl)#exit Router(config)#crypto map vpn-map 10 ipsec-isakmp % NOTE: This new crypto map will remain disabled until a peer and a valid access list have been configured. Router(config-crypto-map)#set peer Router(config-crypto-map)#set transform-set vpntrans Router(config-crypto-map)#match address vpn-acl Router(config-crypto-map)#interface s0/0 Router(config-if)#crypto map vpn-map Router(config-if)# Provera rada Korak 5.1. Uspostavljanje VPN tunela između dva rutera se vrši pokretanjem inicijalne komunikacije uz pomoć programa ping sa ruterom Prvi izgubljeni paket se dešava zbog uspostavljana tunela. ping Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:.!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 36/54/72 ms Korak 5.2. Provera konfiguracije na ruteru US: show crypto isakmp sa dst src state conn-id slot status QM_IDLE 1 0 ACTIVE Korak 5.3. Provera konfiguracije na ruteru US: show crypto ipsec sa interface: Serial0/0 Crypto map tag: vpn-map, local addr protected vrf: (none) local ident (addr/mask/prot/port): ( / /0/0) remote ident (addr/mask/prot/port): ( / /0/0) current_peer port 500 PERMIT, flags={origin_is_acl,} #pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4 #pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 1, #recv errors 0

10 local crypto endpt.: , remote crypto endpt.: path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0 current outbound spi: 0x7967A8A8( ) inbound esp sas: spi: 0x286E5D21( ) transform: esp-aes esp-sha-hmac, in use settings ={Tunnel, } conn id: 2001, flow_id: SW:1, crypto map: vpn-map sa timing: remaining key lifetime (k/sec): ( /3540) IV size: 16 bytes replay detection support: Y Status: ACTIVE inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x7967A8A8( ) transform: esp-aes esp-sha-hmac, in use settings ={Tunnel, } conn id: 2002, flow_id: SW:2, crypto map: vpn-map sa timing: remaining key lifetime (k/sec): ( /3536) IV size: 16 bytes replay detection support: Y Status: ACTIVE outbound ah sas: outbound pcp sas: Korak 5.4. Uz pomoć programskog paketa WireShark može se videti da sadržaj paketa kod Telnet pristupa više nije nezaštićen. Takođe, u listi paketa u koloni protokola se više ne vide Telnet nego samo ESP paketi. Zadatak 1.1. Izvšiti konfiguraciju jednostavne IPsec virtualne privatne mreže (VPN) za scenario prikazan na slici.

11 U ovom scenariju koristiti: DES enkripciju umesto AES, odabrati md5 hash algoritam (ne sha kao u prethodnom primeru), podesiti ključ za identifikaciju i nazvati ga kljuczavpn, transform set nazvati settransformacije, access listu nazvati acl lista, crypto map nazvati mapica, IP adrese interfejsa su date na slici. Na sva tri rutera (SiteA, SiteB i Internet) podesiti RIP dinamičko rutiranje. Napomena: kod podešavanja DES enkripcije i drugih komandi koje su nepoznate može se upotrebiti? da bi se prikazale sve moguće opcije u nastavku naredbe i njihovo značenje, kao što je prikazano u sledećem primeru: Router(config-isakmp)#encryption? 3des Three key triple DES aes AES - Advanced Encryption Standard. des DES - Data Encryption Standard (56 bit keys). Router(config-isakmp)#encryption des? < cr> ili Router(config-isakmp)#hash? md5 Message Digest 5 sha Secure Hash Standard Rešenje 1.1. Konfiguracija rutera SiteA configure terminal Router(config)#crypto isakmp policy 7 Router(config-isakmp)#authentication pre-share Router(config-isakmp)#encryption des Router(config-isakmp)#group 2 Router(config-isakmp)#hash md5 Router(config-isakmp)#lifetime 100 Router(config)#crypto isakmp key 0 kljuczavpn address no-xauth Router(config)#crypto ipsec transform-set settransformacije esp-des Router(cfg-crypto-trans)#exit Router(config)#ip access-list extended vpn-lista Router(config-ext-nacl)#permit ip

12 Router(config-ext-nacl)#exit Router(config)#crypto map mapica 10 ipsec-isakmp % NOTE: This new crypto map will remain disabled until a peer and a valid access list have been configured. Router(config-crypto-map)#set peer Router(config-crypto-map)#match address vpn-lista Router(config-crypto-map)#set transform-set settransformacije Router(config-crypto-map)#exit Router(config)#interface s0/0 Router(config-if)#crypto map mapica Router(config-if)#exit Router(config)#exit copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK] Konfiguracija rutera SiteB Router> Router>enable configure terminal Router(config)#crypto isakmp policy 7 Router(config-isakmp)#authentication pre-share Router(config-isakmp)#encryption des Router(config-isakmp)#hash md5 Router(config-isakmp)#group 2 Router(config-isakmp)#lifetime 100 Router(config)#crypto isakmp key 0 kljuczavpn address no-xauth Router(config)#crypto ipsec transform-set settransformacije esp-des Router(cfg-crypto-trans)#exit Router(config)#ip access-list extended vpn-lista Router(config-ext-nacl)#permit ip Router(config-ext-nacl)#exit Router(config)#crypto map mapica 10 ipsec-isakmp % NOTE: This new crypto map will remain disabled until a peer and a valid access list have been configured. Router(config-crypto-map)#set peer Router(config-crypto-map)#set transform-set settransformacije Router(config-crypto-map)#match address vpn-lista Router(config-crypto-map)#interface s0/0 Router(config-if)#crypto map mapica Router(config-if)#exit

Za razumevanje vežbe potrebno je osnovno znanje RIP protokola i protokola dinamičkog rutiranja.

Za razumevanje vežbe potrebno je osnovno znanje RIP protokola i protokola dinamičkog rutiranja. SecLab 01 Site-to-Site VPN Cilj vežbe Cilj vežbe je upoznavanje sa IPSec, SSH i Telent protokolima. U vežbi će se konfigurisati jednostavna mreža sa dinamičkim protokolom za rutiranje RIP. Nakon toga će

More information

Cilj ove vežbe je upoznavanje sa osnovnim konceptima firewall sistema, access listama (ACL) i filtriranjem mrežnih paketa.

Cilj ove vežbe je upoznavanje sa osnovnim konceptima firewall sistema, access listama (ACL) i filtriranjem mrežnih paketa. SecLab 02 Cisco Access liste (ACL) Cilj vežbe Cilj ove vežbe je upoznavanje sa osnovnim konceptima firewall sistema, access listama (ACL) i filtriranjem mrežnih paketa. Filtriranje mrežnog saobraćaja i

More information

Chapter 8: Lab A: Configuring a Site-to-Site VPN Using Cisco IOS

Chapter 8: Lab A: Configuring a Site-to-Site VPN Using Cisco IOS Chapter 8: Lab A: Configuring a Site-to-Site VPN Using Cisco IOS Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A

More information

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2017 Cisco and/or its affiliates. All rights

More information

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration

More information

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP CCNA Security Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP Topology Note: ISR G2 devices use GigabitEthernet interfaces instead of FastEthernet Interfaces. 2015 Cisco and/or its affiliates.

More information

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example Document ID: 91193 Contents Introduction Prerequisites Requirements Components Used Conventions Background

More information

Configuring IOS to IOS IPSec Using AES Encryption

Configuring IOS to IOS IPSec Using AES Encryption Configuring IOS to IOS IPSec Using AES Encryption Document ID: 43069 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Configurations Verify Troubleshoot Troubleshooting

More information

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example Document ID: 26402 Contents Introduction Prerequisites Requirements Components Used Conventions Configure

More information

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example Document ID: 68815 Contents Introduction Prerequisites Requirements

More information

HOME-SYD-RTR02 GETVPN Configuration

HOME-SYD-RTR02 GETVPN Configuration GETVPN OVER DMVPN Topology Details HOME-SYD-RTR02 is GETVPN KS. R2 & R3 are GETVPN Members. R2 is DMVPN Hub. R3 is DMVPN Spoke. HOME-PIX01 is Firewall between R2 and R3. IP Addressing Details HOME-SYD-RTR01

More information

Securizarea Calculatoarelor și a Rețelelor 28. Implementarea VPN-urilor IPSec Site-to-Site

Securizarea Calculatoarelor și a Rețelelor 28. Implementarea VPN-urilor IPSec Site-to-Site Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 28. Implementarea VPN-urilor IPSec Site-to-Site Site-to-Site IPsec VPNs Behaviour

More information

VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example

VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example Document ID: 66171 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Configure

More information

RFC 430x IPsec Support

RFC 430x IPsec Support The includes features Phase 1 and RFC430x IPsec Support Phase 2 that implement Internet Key Exchange (IKE) and IPsec behavior as specified in RFC 4301. Finding Feature Information, page 1 Information About,

More information

Securizarea Calculatoarelor și a Rețelelor 29. Monitorizarea și depanarea VPN-urilor IPSec Site-to-Site

Securizarea Calculatoarelor și a Rețelelor 29. Monitorizarea și depanarea VPN-urilor IPSec Site-to-Site Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 29. Monitorizarea și depanarea VPN-urilor IPSec Site-to-Site Site-to-Site IPsec

More information

Table of Contents. Cisco Enhanced Spoke to Client VPN Configuration Example for PIX Security Appliance Version 7.0

Table of Contents. Cisco Enhanced Spoke to Client VPN Configuration Example for PIX Security Appliance Version 7.0 Table of Contents Enhanced Spoke to Client VPN Configuration Example for PIX Security Appliance Version 7.0...1 Document ID: 64693...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1

More information

Table of Contents. Cisco PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example

Table of Contents. Cisco PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example Table of Contents PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example...1 Document ID: 64692...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 Configure...2

More information

Sharing IPsec with Tunnel Protection

Sharing IPsec with Tunnel Protection The feature allows sharing an IPsec security association database (SADB) between two or more generic routing encapsulation (GRE) tunnel interfaces when tunnel protection is used. Shared tunnel interfaces

More information

Configuration Example of ASA VPN with Overlapping Scenarios Contents

Configuration Example of ASA VPN with Overlapping Scenarios Contents Configuration Example of ASA VPN with Overlapping Scenarios Contents Introduction Prerequisites Requirements Components Used Background Information Translation on both VPN Endpoints ASA 1 Create the necessary

More information

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec Document ID: 14122 Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot

More information

Network Security 2. Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys

Network Security 2. Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys 1 1 Network Security 2 Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys 2 Learning Objectives 4.1 Prepare a Router for Site-to-Site VPN using Pre-shared Keys 4.2 Configure a Router for IKE Using

More information

Quick Note 060. Configure a TransPort router as an EZVPN Client (XAUTH and MODECFG) to a Cisco Router running IOS 15.x

Quick Note 060. Configure a TransPort router as an EZVPN Client (XAUTH and MODECFG) to a Cisco Router running IOS 15.x Quick Note 060 Configure a TransPort router as an EZVPN Client (XAUTH and MODECFG) to a Cisco Router running IOS 15.x 17 August 2017 Contents 1 Introduction... 3 1.1 Introduction... 3 1.2 Cisco EasyVPN...

More information

Invalid Security Parameter Index Recovery

Invalid Security Parameter Index Recovery When an invalid security parameter index error (shown as Invalid SPI ) occurs in IP Security (IPsec) packet processing, the feature allows for an Internet Key Exchange (IKE) security association (SA) to

More information

Invalid Security Parameter Index Recovery

Invalid Security Parameter Index Recovery When an invalid security parameter index error (shown as Invalid SPI ) occurs in IP Security (IPsec) packet processing, the feature allows for an Internet Key Exchange (IKE) security association (SA) to

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Configuring VPN backup for Avaya S8700 Media Servers and Avaya G600 Media Gateways Controlling Avaya G350 Media Gateways, using the Avaya Security Gateway and

More information

UPUTSTVO ZA KORIŠĆENJE NOVOG SPINTER WEBMAIL-a

UPUTSTVO ZA KORIŠĆENJE NOVOG SPINTER WEBMAIL-a UPUTSTVO ZA KORIŠĆENJE NOVOG SPINTER WEBMAIL-a Webmail sistem ima podršku za SSL (HTTPS). Korištenjem ovog protokola sva komunikacija između Webmail sistema i vašeg Web čitača je kriptovana. Prilikom pristupa

More information

Network Security CSN11111

Network Security CSN11111 Network Security CSN11111 VPN part 2 12/11/2010 r.ludwiniak@napier.ac.uk Five Steps of IPSec Step 1 - Interesting Traffic Host A Router A Router B Host B 10.0.1.3 10.0.2.3 Apply IPSec Discard Bypass IPSec

More information

Lab 4.5.5a Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel Using CLI

Lab 4.5.5a Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel Using CLI Lab 4.5.5a Configure a PIX Security Appliance Site-to-Site IPSec VPN Tunnel Using CLI Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Prepare to configure

More information

Syslog "%CRYPTO 4 RECVD_PKT_MAC_ERR:" Error Message with Ping Loss Over IPsec Tunnel Troubleshooting

Syslog %CRYPTO 4 RECVD_PKT_MAC_ERR: Error Message with Ping Loss Over IPsec Tunnel Troubleshooting Syslog "%CRYPTO 4 RECVD_PKT_MAC_ERR:" Error Message with Ping Loss Over IPsec Tunnel Troubleshooting Document ID: 116085 Contributed by Cisco TAC Engineers. Oct 24, 2013 Contents Introduction Prerequisites

More information

Contents. Introduction. Prerequisites. Background Information

Contents. Introduction. Prerequisites. Background Information Contents Introduction Prerequisites Background Information Limitation Configure Network Diagram Initial configuration R2 R3 IPSec configuration R2 EzPM configuration Workaround Verify Troubleshooting Related

More information

How to Configure the Cisco VPN Client to PIX with AES

How to Configure the Cisco VPN Client to PIX with AES How to Configure the Cisco VPN Client to PIX with AES Document ID: 42761 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configurations Network Diagram

More information

Applying the Tunnel Template on the Home Agent

Applying the Tunnel Template on the Home Agent Tunnel templates allow a mobile router to carry multicast sessions to mobile networks as it roams. The for Multicast feature allows the configuration of multicast sessions on statically created tunnels

More information

Configure IKEv1 IPsec Site-to-Site Tunnels with the ASDM or CLI on the ASA

Configure IKEv1 IPsec Site-to-Site Tunnels with the ASDM or CLI on the ASA Configure IKEv1 IPsec Site-to-Site Tunnels with the ASDM or CLI on the ASA Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configure Via the ASDM VPN Wizard Configure

More information

Lab Configure a Router with the IOS Intrusion Prevention System

Lab Configure a Router with the IOS Intrusion Prevention System Lab 2.1.6 Configure a Router with the IOS Intrusion Prevention System Objective Scenario Topology In this lab, the students will complete the following tasks: Initialize the Intrusion Protection System

More information

Lab 9: VPNs IPSec Remote Access VPN

Lab 9: VPNs IPSec Remote Access VPN Lab 9: VPNs IPSec Remote Access VPN Rich Macfarlane 2015 Aim: Details The aim of this lab is to introduce Virtual Private Network (VPN) concepts, using an IPSec remote access VPN between a remote users

More information

Korisničko uputstvo za instalaciju i podešavanje securew2 programa za pristup eduroam servisu

Korisničko uputstvo za instalaciju i podešavanje securew2 programa za pristup eduroam servisu Korisničko uputstvo za instalaciju i podešavanje securew2 programa za pristup eduroam servisu Termin supplicant se koristi u IEEE 802.1X standardu. U širem značenju, ovaj termin predstavlja entitet (korisnik

More information

Uputstvo za podešavanje mail klijenta

Uputstvo za podešavanje mail klijenta Uputstvo za podešavanje mail klijenta 1. Podešavanje Thunderbird mail klijenta 1.1 Dodavanje mail naloga Da biste podesili Vaš mail klijent (u ovom slučaju Thunderbird) da prima i šalje mail-ove potrebno

More information

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI Topology Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Port G0/0 192.168.1.1 255.255.255.0

More information

VDSL modem Zyxel VMG1312-B10A/B30A

VDSL modem Zyxel VMG1312-B10A/B30A VDSL modem Zyxel VMG1312-B10A/B30A Default Login Details LAN IP Address http://192.168.2.1 User Name user Password 1234 Funkcionalnost lampica Power lampica treperi kratko vrijeme nakon uključivanja modema,

More information

CCIE Security: IOS VPNs Cheatsheet

CCIE Security: IOS VPNs Cheatsheet CCIE Security: IOS VPNs Cheatsheet (config)#int lo0 ip add1.1.1.1 255.255.255.255 int gi0/0 ip add 10.1.1.1 255.255.255.0 no shut ip route 2.2.2.2 255.255.255.255 10.1.1.2 (config)# int lo0 (config-if)#ip

More information

Računarske osnove Interneta (SI3ROI, IR4ROI)

Računarske osnove Interneta (SI3ROI, IR4ROI) Računarske osnove terneta (SI3ROI, IR4ROI) Vežbe MPLS Predavač: 08.11.2011. Dražen Drašković, drazen.draskovic@etf.rs Autori: Dražen Drašković Naučili ste na predavanjima MPLS (Multi-Protocol Label Switching)

More information

IKEv2 with Windows 7 IKEv2 Agile VPN Client and Certificate Authentication on FlexVPN

IKEv2 with Windows 7 IKEv2 Agile VPN Client and Certificate Authentication on FlexVPN IKEv2 with Windows 7 IKEv2 Agile VPN Client and Certificate Authentication on FlexVPN Document ID: 115907 Contributed by Praveena Shanubhogue and Atri Basu, Cisco TAC Engineers. May 20, 2013 Contents Introduction

More information

Sberbank Business Online na Mozilla FireFox

Sberbank Business Online na Mozilla FireFox Sberbank Business Online na Mozilla FireFox Verzija 1.6 Srpanj 2016. Sberbank d.d. Stranica 1 SADRŽAJ 1 INSTALACIJA... 2 2 POKRETANJE MOZILLE FIREFOX... 3 2.1 IMPORT SECURITY MODULA... 4 2.2 AUTOMATSKI

More information

ASA/PIX: Remote VPN Server with Inbound NAT for VPN Client Traffic with CLI and ASDM Configuration Example

ASA/PIX: Remote VPN Server with Inbound NAT for VPN Client Traffic with CLI and ASDM Configuration Example ASA/PIX: Remote VPN Server with Inbound NAT for VPN Client Traffic with CLI and ASDM Configuration Example Contents Introduction Prerequisites Requirements Components Used Related Products Conventions

More information

IPsec Anti-Replay Window Expanding and Disabling

IPsec Anti-Replay Window Expanding and Disabling IPsec Anti-Replay Window Expanding and Disabling Cisco IP security (IPsec) authentication provides anti-replay protection against an attacker duplicating encrypted packets by assigning a unique sequence

More information

RIP v2. Mr Nenad Krajnović Katedra za telekomunikacije

RIP v2. Mr Nenad Krajnović Katedra za telekomunikacije RIP v2 Mr Nenad Krajnović Katedra za telekomunikacije E-mail: krajko@etf.bg.ac.yu Istorijat Nastao kao pokušaj da se RIPv1 protokol popravi i prilagodi novim potrebama Definisan u okviru RFC-a 2453 Ima

More information

DMVPN to Group Encrypted Transport VPN Migration

DMVPN to Group Encrypted Transport VPN Migration DMVPN to Group Encrypted Transport VPN Migration This document provides the steps for Dynamic Multipoint VPN (DMVPN) to Group Encrypted Transport VPN migration. DMVPN to Group Encrypted Transport VPN Migration

More information

AnyConnect to IOS Headend Over IPsec with IKEv2 and Certificates Configuration Example

AnyConnect to IOS Headend Over IPsec with IKEv2 and Certificates Configuration Example AnyConnect to IOS Headend Over IPsec with IKEv2 and Certificates Configuration Example Document ID: 115014 Contributed by Marcin Latosiewicz and Atri Basu, Cisco TAC Engineers. Jan 18, 2013 Contents Introduction

More information

Cisco - VPN Load Balancing on the CSM in Dispatched Mode Configuration Example

Cisco - VPN Load Balancing on the CSM in Dispatched Mode Configuration Example Page 1 of 7 VPN Load Balancing on the CSM in Dispatched Mode Configuration Example Contents Introduction Before You Begin Requirements Components Used Conventions Configurations Tasks Network Diagram CSM

More information

SecLab. SecLab 04 v2.00. SSH server i upotreba javnog i tajnog ključa. Cilj vežbe

SecLab. SecLab 04 v2.00. SSH server i upotreba javnog i tajnog ključa. Cilj vežbe SecLab 04 SecLab 04 SSH server i upotreba javnog i tajnog ključa Cilj vežbe Cilj ove vežbe je upoznavanje sa SSH protokolom u u Linux okruženju uz upotrebu javnog i tajnog ključa. Za ovu vežbu će se koristiti

More information

Uputstvo za korišćenje logrotate funkcije

Uputstvo za korišćenje logrotate funkcije Copyright AMRES Sadržaj Uvod 3 Podešavanja logrotate konfiguracionog fajla 4 Strana 2 od 5 Uvod Ukoliko je aktivirano logovanje za RADIUS proces, može se desiti da posle određenog vremena server bude preopterećen

More information

Modbus TCP i dva PLC S7 1200

Modbus TCP i dva PLC S7 1200 Industrijski sistemi i protokoli Modbus TCP i dva PLC S7 1200 1 Modbus TCP i dva PLC S7 1200 Laboratorijski deo - obavezno: Detaljno proučiti i testirati već napravljeni projekat za PLC-ove, koji se nalazi

More information

SOHO. A Case Study. Case Study: SOHO

SOHO. A Case Study. Case Study: SOHO SOHO A Case Study Authors: Mary Hawkins & Patrick Neff - 2006 Page 1 of 21 Core Area These routers connect to the various offices and to the core router to ensure that all offices are able to connect to

More information

The information presented in this document was created from devices in a specific lab environment. All of the devices started with a cleared (default)

The information presented in this document was created from devices in a specific lab environment. All of the devices started with a cleared (default) CONFIGURATION GUIDE CONFIGURING CISCO VPN CLIENT AND CISCO IOS EASY VPN SERVER Figure 1 Network Diagram 30.30.30.0 C1751V Easy VPN Server 20.20.20.0 IPsec Tunnel Easy VPN 20.20.20.10 Cisco VPN Client INTRODUCTION

More information

Implementing Traffic Filters and Firewalls for IPv6 Security

Implementing Traffic Filters and Firewalls for IPv6 Security Implementing Traffic Filters and Firewalls for IPv6 Security Last Updated: August 1, 2012 This module describes how to configure Cisco IOS IPv6 traffic filter and firewall features for your Cisco networking

More information

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

Internet. SonicWALL IP Cisco IOS IP IP Network Mask Prepared by SonicWALL, Inc. 9/20/2001 Introduction: VPN standards are still evolving and interoperability between products is a continued effort. SonicWALL has made progress in this area and is interoperable

More information

co Configuring PIX to Router Dynamic to Static IPSec with

co Configuring PIX to Router Dynamic to Static IPSec with co Configuring PIX to Router Dynamic to Static IPSec with Table of Contents Configuring PIX to Router Dynamic to Static IPSec with NAT...1 Introduction...1 Configure...1 Components Used...1 Network Diagram...1

More information

VPN Connection through Zone based Firewall Router Configuration Example

VPN Connection through Zone based Firewall Router Configuration Example VPN Connection through Zone based Firewall Router Configuration Example Document ID: 112051 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1 Configuring a VPN Using Easy VPN and an IPSec Tunnel This chapter provides an overview of the creation of Virtual Private Networks (VPNs) that can be configured on the Cisco 819, Cisco 860, and Cisco 880

More information

IPsec Data Plane Configuration Guide

IPsec Data Plane Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Application Note 25 Configure an IPsec VPN tunnel between a Digi Transport router and a Cisco router using Certificates and SCEP

Application Note 25 Configure an IPsec VPN tunnel between a Digi Transport router and a Cisco router using Certificates and SCEP Application Note 25 Configure an IPsec VPN tunnel between a Digi Transport router and a Cisco router using Certificates and SCEP UK Support November 2015 1 Contents 1 Introduction... 4 1.1 Outline... 4

More information

VB komande. Programiranje 1

VB komande. Programiranje 1 VB komande Programiranje 1 Zadatak 1: Sastaviti program koji se sastoji iz jedne ListBox kontrole, jedne Textbox kontrole i dva komandna dugmeta. Klikom na prvo komandno dugme umeće se u ListBox sadržaj

More information

EIGRP on SVTI, DVTI, and IKEv2 FlexVPN with the "IP[v6] Unnumbered" Command Configuration Example

EIGRP on SVTI, DVTI, and IKEv2 FlexVPN with the IP[v6] Unnumbered Command Configuration Example EIGRP on SVTI, DVTI, and IKEv2 FlexVPN with the "IP[v6] Unnumbered" Command Configuration Example Document ID: 116346 Contributed by Michal Garcarz and Olivier Pelerin, Cisco TAC Engineers. Sep 18, 2013

More information

Configuring Router to Router IPsec (Pre shared Keys) on GRE Tunnel with IOS Firewall and NAT

Configuring Router to Router IPsec (Pre shared Keys) on GRE Tunnel with IOS Firewall and NAT Configuring RoutertoRouter IPsec (Preshared Keys) on GRE Tunnel with IOS Firewall and NAT Document ID: 9221 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

Implementing Secure Shell

Implementing Secure Shell Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Laboratorijske vežbe

Laboratorijske vežbe Laboratorijske vežbe PAKTIČNA EALIZAIJA MEŽNIH TPLGIJA ZA SNVNE PTKLE UTIANJA KIŠĆENJEM IS 2600 UTEA - Uputstvo - Predmet: Arhitektura Interneta (T4AI) Mladen Koprivica, dipl.ing. Mr Nenad Krajnović, dipl.ing.

More information

SecLab 04. SecLab 04 v2.00. SSH server i upotreba javnog i tajnog ključa. Cilj vežbe

SecLab 04. SecLab 04 v2.00. SSH server i upotreba javnog i tajnog ključa. Cilj vežbe SecLab 04 SSH server i upotreba javnog i tajnog ključa Cilj vežbe Cilj ove vežbe je upoznavanje sa SSH protokolom u u Linux okruženju uz upotrebu javnog i tajnog ključa. Za ovu vežbu će se koristiti Virtuelna

More information

LAN to LAN IPsec Tunnel Between Two Routers Configuration Example

LAN to LAN IPsec Tunnel Between Two Routers Configuration Example LAN to LAN IPsec Tunnel Between Two Routers Configuration Example Document ID: 71462 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

Dynamic Site to Site IKEv2 VPN Tunnel Between Two ASAs Configuration Example

Dynamic Site to Site IKEv2 VPN Tunnel Between Two ASAs Configuration Example Dynamic Site to Site IKEv2 VPN Tunnel Between Two ASAs Configuration Example Contents Introduction Prerequisites Requirements Components Used Background Information Network Diagram Configure Solution 1

More information

CCNA Security PT Practice SBA

CCNA Security PT Practice SBA A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any Exam windows during the exam. 2. Do not close Packet Tracer when you are done.

More information

Instalacija i podešavanje računara, sa WindowsXP OS-om, za pristup Internetu preko modemskih linija RCUB-a

Instalacija i podešavanje računara, sa WindowsXP OS-om, za pristup Internetu preko modemskih linija RCUB-a Instalacija i podešavanje računara, sa WindowsXP OS-om, za pristup Internetu preko modemskih linija RCUB-a Podešavanje Dial-Up Networking-a Ovo podešavanje se vrši iz Control panel-a (Start - Settings

More information

Tehnička škola 9. maj Bačka Palanka I O S. Cisco Internetworking Operating System

Tehnička škola 9. maj Bačka Palanka I O S. Cisco Internetworking Operating System I O S Cisco Internetworking Operating System Pristup sviču ili ruteru Tehnička škola 9. maj Bačka Palanka Pristup sviču ili ruteru je moguć: Direktno preko konzolnog porta (Console port) na uređaju Nije

More information

Unaprjeñenje sigurnosti u mrežama pružatelja

Unaprjeñenje sigurnosti u mrežama pružatelja Unaprjeñenje sigurnosti u mrežama pružatelja usluga Miroslav Šimić miroslav.simic@snt.hr CCIE #19429 Agenda Zaštita mrežne infrastrukture Zaštita na rubovima mreže Uočavanje i sprječavanje napada Agenda

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Configuring the VSA. Overview. Configuration Tasks CHAPTER

Configuring the VSA. Overview. Configuration Tasks CHAPTER CHAPTER 4 This chapter contains the infmation and procedures needed to configure the C7200-VSA (VPN Services Adapter). This chapter contains the following sections: Overview, page 4-1 Configuration Tasks,

More information

Quick Note. Configure an IPSec VPN tunnel in Aggressive mode between a TransPort LR router and a Cisco router. Digi Technical Support 7 October 2016

Quick Note. Configure an IPSec VPN tunnel in Aggressive mode between a TransPort LR router and a Cisco router. Digi Technical Support 7 October 2016 Quick Note Configure an IPSec VPN tunnel in Aggressive mode between a TransPort LR router and a Cisco router. Digi Technical Support 7 October 2016 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Site-to-Site VPN Configuration between Avaya SG208 Security Gateway, Enterasys XSR-1805 Security Router, and Cisco VPN 3000 Concentrator using AES-128, Perfect

More information

Site-to-Site VPN. VPN Basics

Site-to-Site VPN. VPN Basics A virtual private network (VPN) is a network connection that establishes a secure tunnel between remote peers using a public source, such as the Internet or other network. VPNs use tunnels to encapsulate

More information

VRIJEDNOSTI ATRIBUTA

VRIJEDNOSTI ATRIBUTA VRIJEDNOSTI ATRIBUTA Svaki atribut (bilo da je primarni ključ, vanjski ključ ili običan atribut) može i ne mora imati ograničenja na svojim vrijednostima. Neka od ograničenja nad atributima: Null / Not

More information

Lab Capturing and Analyzing Network Traffic

Lab Capturing and Analyzing Network Traffic Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information

Microsoft Hyper-V Server 2016 radionica EDU IT Pro, Zagreb,

Microsoft Hyper-V Server 2016 radionica EDU IT Pro, Zagreb, Microsoft Hyper-V Server 2016 radionica EDU IT Pro, Zagreb, 13.04.2017. Podešavanje Hyper-V Servera 2016 za RSAT upravljanje Dario Štefek Lokacije za preuzimanje: Microsoft Hyper-V Server 2016 https://www.microsoft.com/en-us/evalcenter/evaluate-hyper-v-server-2016

More information

Programiranje III razred

Programiranje III razred Tehnička škola 9. maj Bačka Palanka Programiranje III razred Naredbe ciklusa for petlja Naredbe ciklusa Veoma često se ukazuje potreba za ponavljanjem nekih naredbi više puta tj. za ponavljanjem nekog

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

Pre-Fragmentation for IPSec VPNs

Pre-Fragmentation for IPSec VPNs Pre-Fragmentation for IPSec VPNs Feature History Release 12.1(11b)E 12.2(13)T 12.2(14)S Modification This feature was introduced. This feature was integrated into Cisco IOS Release 12.2(13)T. This feature

More information

Configuring Internet Key Exchange (IKE) Features Using the IPSec VPN SPA

Configuring Internet Key Exchange (IKE) Features Using the IPSec VPN SPA 27 CHAPTER Configuring Internet Key Exchange (IKE) Features Using the IPSec VPN SPA This chapter provides information about configuring Internet Key Exchange (IKE) related features using the IPSec VPN

More information

8K GM Scale Improvement

8K GM Scale Improvement The feature supports optimization of the Cooperative Protocol (COOP) announcement messages by increasing the number of Group Members (GM) to 8000. Finding Feature Information, page 1 Prerequisites for,

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

Related Documents. Description. Encryption. Decryption. Software Package Management

Related Documents. Description. Encryption. Decryption. Software Package Management Related Documents Software Package Management Description IPsec (IP Security) supports secure (encrypted) communications over IP networks. Encryption After packet is src-natted, but before putting it into

More information

Lab 6: Osnovna OSPF konfiguracija

Lab 6: Osnovna OSPF konfiguracija Lab 6: snovna SPF konfiguracija Teorijska osnova vježbe: SPF je link-state protokol rutiranja. SPF ruteri međusobno razmjenjuju informacije o stanju linkova, i na taj način grade sliku čitave mreže. Informacije

More information

Configuring Security for VPNs with IPsec

Configuring Security for VPNs with IPsec This module describes how to configure basic IPsec VPNs. IPsec is a framework of open standards developed by the IETF. It provides security for the transmission of sensitive information over unprotected

More information

Lab 3: Osnovna VTP konfiguracija

Lab 3: Osnovna VTP konfiguracija Lab 3: Osnovna VTP konfiguracija TEORIJSKA OSNOVA VJEŽBE VTP protokol koristi se za konfigurisanje VLAN-ova na nivou mreže. Osnovna karakteristika i najznačajnija prednost ovog protokola je ta što drastično

More information

ASA-to-ASA Dynamic-to-Static IKEv1/IPsec Configuration Example

ASA-to-ASA Dynamic-to-Static IKEv1/IPsec Configuration Example ASA-to-ASA Dynamic-to-Static IKEv1/IPsec Configuration Example Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram ASDM Configuration Central-ASA (Static Peer) Remote-ASA

More information

Configuring Secure Shell

Configuring Secure Shell Configuring Secure Shell Last Updated: October 24, 2011 The Secure Shell (SSH) feature is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures

More information

BASIC CONFIGURATION CISCO SWITCH

BASIC CONFIGURATION CISCO SWITCH BASIC CONFIGURATION CISCO SWITCH switch#show running-config ( prikaz trenutne konfiguracije ) switch#show startup-config ( prikaz startne konfiguracije ) switch#configure terminal ( ulaz u global config

More information

IPv6 over IPv4 GRE Tunnel Protection

IPv6 over IPv4 GRE Tunnel Protection The feature allows both IPv6 unicast and multicast traffic to pass through a protected generic routing encapsulation (GRE) tunnel. Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions

More information

VHDLPrimeri Poglavlje5.doc

VHDLPrimeri Poglavlje5.doc 5. VHDL opis kola koja obavljaju osnovne aritmetičke funkcije Sabirači Jednobitni potpuni sabirač definisan je tablicom istinitosti iz Tabele 5.1. Tabela 5.1. cin a b sum cout 0 0 0 0 0 0 0 1 1 0 0 1 0

More information

Lab - Examining Telnet and SSH in Wireshark

Lab - Examining Telnet and SSH in Wireshark Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices

More information

UNIVERZITET U BEOGRADU ELEKTROTEHNIČKI FAKULTET

UNIVERZITET U BEOGRADU ELEKTROTEHNIČKI FAKULTET UNIVERZITET U BEOGRADU ELEKTROTEHNIČKI FAKULTET Katedra za elektroniku Računarska elektronika Grupa br. 11 Projekat br. 8 Studenti: Stefan Vukašinović 466/2013 Jelena Urošević 99/2013 Tekst projekta :

More information