CertExams.com Simulator Lab Exercises Answers

Configuring and Verifying Policy based VPN

Description: Lab exercise explains configuration and verification of policy based vpn

Network Diagram:

lab image

Instructions:

I. Configuration on site1 on device R1

1. Configure the Ethernet interface ip address

2. Configure the default route

3. Configure security zones, and assign interfaces to the zones

4. Configure host-inbound services for each zone. Specify allowed system services for the security zone.

5. Configure address book entries for each zone.

6. Configuring IKE Phase1 proposals

7. Configure IKE Phase 1 policies and reference the IKE proposals

8. Configure the IKE Phase 1 gateway and reference the IKE policy configured in Step 7

9. Configuring IPSEC Phase 2 Proposals

10. Configure the IPSEC Phase 2 policies and reference the IPSEC proposals

11. Configure the IPSEC Phase 2 VPN tunnel and reference the IPSEC Phase 2 policy configured in Step 10

12. Create the policies to define the interesting traffic

I. Configuration on Site2 (on device R2)

1. Configure the Ethernet interface ip address

2. Configure the default route

3. Configure security zones, and assign interfaces to the zones

4. Configure host-inbound services for each zone.

5. Configure address book entries for each zone.

6. Configuring IKE Phase1 proposals

7. Configure IKE Phase 1 policies and reference the IKE proposals

8. Configure the IKE Phase 1 gateway and reference the IKE policy configured in Step 7

9. Configuring IPSEC Phase2 Proposals

10. Configure the IPSEC Phase 2 policies and reference the IKE proposals

11. Configure the IPSEC Phase 2 VPN tunnel and reference the IPSEC Phase 2 policy configured in Step 10

12. Create the policies to define the interesting traffic

Please refer to the CertExams.com Juniper Network Simulator softwarefor complete lab.


CertExams Blog!  Certexams.com Facebook Page Certexams.com Twitter Page Certexams on YouTube