Monday 4 February 2019

Virtual Private Network

Virtual Private Network (VPN)

Open console of router by default you are in user mode
Router>

Write command enable to enter privilege mode
Router>enable                                
Router#    

Write command configure terminal to enter global config mode
Router#configure terminal
Router(config)#

All the configuration are done in  global config mode


Create VPN


Suppose you want to create a VPN between interface IRi and interface IRj of router Ri and router Rj respectively.

  • Assign IP address to all the interfaces.
  • Insert forwarding entries in routers either statically or using RIP.
  • First check from the router Ri that if you are able to ping on interfaces IRj. 
  • Then check from the router Rj that if you are able to ping on interfaces IRi.
  • Open console of  Ri

                Go to global config mode
                Router(config)#
                
                Enter command ->interface tunnel tunnelNumber
                Router(config)#interface tunnel 0

                Enter command ->ip address IPAddressOfTunnel  SubnetMask
                Router(config-if)#ip address 100.0.0.1 255.255.255.0

                Enter command ->tunnel source interfaceIDof-IRi
                Router(config-if)#tunnel source se0/0/0

                Enter command ->tunnel destination IPAddressof-IRj
                Router(config-if)#tunnel destination 10.0.3.1

                Enter command ->no shutdown 
                Router(config-if)#no shutdown




  •  Open console of  Rj
                Go to global config mode
                Router(config)#

                Enter command ->interface tunnel tunnelNumber
                Router(config)#interface tunnel 0

                Enter command ->ip address IPAddressOfTunnel  SubnetMask
                Router(config-if)#ip address 100.0.0.2 255.255.255.0

                Enter command ->tunnel source interfaceIDof-IRj
                Router(config-if)#tunnel source se0/0/0

                Enter command ->tunnel destination IPAddressof-IRi
                Router(config-if)#tunnel destination 10.0.1.1

                Enter command ->no shutdown 
                Router(config-if)#no shutdown

note:- Tunnel number should be same for both tunnel source and tunnel destination

6 comments:

  1. Admiring the time and effort you put into your blog and detailed information you offer. vpnshazam.com provides the range of affordable VPN Dedicated Service packages. For more australia vpn online

    ReplyDelete
  2. Hey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you. https://www.sorrisieservizi.it/internet/vpn-sicura-e-gratuita/

    ReplyDelete
  3. Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic. If possible, as you gain expertise, would you mind updating your blog with extra information? It is extremely helpful for me. https://medium.com/@cambodias6/cambodia-guard-f2a54b8dbcc

    ReplyDelete
  4. A VPN or Virtual Private Network ensures the security and privacy of a private or public network. This is done by using a system or protocol whereby the user's computer is assigned a new IP address which is owned by the VPN. All of the Internet traffic of the user is channelled to the VPN server. Once there, it is decrypted and allowed to travel to the new IP address. The user's Internet service Provider will only see a single stream of encrypted data stream between the user and the VPN server. The ISP will not be able to log and monitor or control the user's internet usage. dark web links

    ReplyDelete
  5. Really a great addition. I have read this marvelous post. Thanks for sharing information about it. I really like that. Thanks so lot for your convene. best security company in cambodia

    ReplyDelete
  6. Reports of hacking, cyber attacks, and divulging of personal information have accelerated over the past decade, causing a corresponding increase in the need for security and protection. While businesses tend to be the major target for cyber attacks, the use of VPNs among individuals is also on the rise. ways to make money online

    ReplyDelete