<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mtsega</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mtsega"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Mtsega"/>
	<updated>2026-04-30T17:27:44Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=3932</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=3932"/>
		<updated>2010-12-18T04:49:17Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 FA10 Schedule|Fall 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
* [[Windows File Sharing and Printer Sharing with SAMBA]]&lt;br /&gt;
* [[How to Setup NAT]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
=== Major Linux Distributions ===&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
=== Online Linux Tutuorials ===&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User:Mtsega&amp;diff=3931</id>
		<title>User:Mtsega</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User:Mtsega&amp;diff=3931"/>
		<updated>2010-12-18T04:36:00Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: moved User:Mtsega to How to Setup NAT&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[How to Setup NAT]]&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3930</id>
		<title>How to Setup NAT</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3930"/>
		<updated>2010-12-18T04:36:00Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: moved User:Mtsega to How to Setup NAT&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
Network Address Translation (NAT) configuration with iptables firewall on Linux operating system. This system can act as gateway and provide Internet access to multiple hosts in Local Area Network (LAN) using a single public IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Requirement ==&lt;br /&gt;
&lt;br /&gt;
*Two Network interface cards (NICs)&lt;br /&gt;
*Iptables &lt;br /&gt;
*Linux operating system &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Network Configuration ==&lt;br /&gt;
&lt;br /&gt;
Edit configuration file /etc/network/interfaces using text editor like nano and add eth0 and eth1 configuration. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;WAN interface (eth0 - connection to ISP)&#039;&#039;&#039;&lt;br /&gt;
This is IP address, subnet mask, default gateway, and network address from your Internet Service Provider (ISP). If you get static IP address from your ISP follow step 1 and replace this addresses with your addresses otherwise go to step 2.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Step 1&#039;&#039;&#039;&lt;br /&gt;
    auto eth0&lt;br /&gt;
    iface eth0 inet static&lt;br /&gt;
    address 172.16.1.2&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 172.16.1.0 &lt;br /&gt;
    gateway 172.16.1.1&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Step 2&#039;&#039;&#039;&lt;br /&gt;
   auto eth0&lt;br /&gt;
   iface eth0 inet dhcp &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;LAN interface (eth1 - LAN connection and default gateway for local hosts)&#039;&#039;&#039;        &lt;br /&gt;
    auto eth1&lt;br /&gt;
    iface eth1 inet static&lt;br /&gt;
    address 192.168.1.1&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 192.168.1.0	&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;DNS setup&#039;&#039;&#039;&lt;br /&gt;
Set up Domain Name System servers IP addresses by editing /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
 nameserver 172.16.2.254 (replace this with your Domain Name System servers IP addresses)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NAT configuration with iptables ==&lt;br /&gt;
&lt;br /&gt;
To delete existing rules from every iptables table, execute the following commands:&lt;br /&gt;
 iptables -F&lt;br /&gt;
 iptables -t nat -F&lt;br /&gt;
 iptables -t mangle -F&lt;br /&gt;
&lt;br /&gt;
*Enable NAT:&lt;br /&gt;
 iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE&lt;br /&gt;
 iptables -A FORWARD -i eth1 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enable IP Forwarding ==&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/ip_forward&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local host configuration ==&lt;br /&gt;
&lt;br /&gt;
Configure LAN hosts to access Internet through the gateway.&lt;br /&gt;
 address 192.168.1.254&lt;br /&gt;
 netmask: 255.255.255.0&lt;br /&gt;
 dns  172.16.2.254&lt;br /&gt;
 network 192.168.1.0 &lt;br /&gt;
 gateway: 192.168.1.1&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3929</id>
		<title>How to Setup NAT</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3929"/>
		<updated>2010-12-18T04:24:06Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
Network Address Translation (NAT) configuration with iptables firewall on Linux operating system. This system can act as gateway and provide Internet access to multiple hosts in Local Area Network (LAN) using a single public IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Requirement ==&lt;br /&gt;
&lt;br /&gt;
*Two Network interface cards (NICs)&lt;br /&gt;
*Iptables &lt;br /&gt;
*Linux operating system &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Network Configuration ==&lt;br /&gt;
&lt;br /&gt;
Edit configuration file /etc/network/interfaces using text editor like nano and add eth0 and eth1 configuration. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;WAN interface (eth0 - connection to ISP)&#039;&#039;&#039;&lt;br /&gt;
This is IP address, subnet mask, default gateway, and network address from your Internet Service Provider (ISP). If you get static IP address from your ISP follow step 1 and replace this addresses with your addresses otherwise go to step 2.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Step 1&#039;&#039;&#039;&lt;br /&gt;
    auto eth0&lt;br /&gt;
    iface eth0 inet static&lt;br /&gt;
    address 172.16.1.2&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 172.16.1.0 &lt;br /&gt;
    gateway 172.16.1.1&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Step 2&#039;&#039;&#039;&lt;br /&gt;
   auto eth0&lt;br /&gt;
   iface eth0 inet dhcp &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;LAN interface (eth1 - LAN connection and default gateway for local hosts)&#039;&#039;&#039;        &lt;br /&gt;
    auto eth1&lt;br /&gt;
    iface eth1 inet static&lt;br /&gt;
    address 192.168.1.1&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 192.168.1.0	&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;DNS setup&#039;&#039;&#039;&lt;br /&gt;
Set up Domain Name System servers IP addresses by editing /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
 nameserver 172.16.2.254 (replace this with your Domain Name System servers IP addresses)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NAT configuration with iptables ==&lt;br /&gt;
&lt;br /&gt;
To delete existing rules from every iptables table, execute the following commands:&lt;br /&gt;
 iptables -F&lt;br /&gt;
 iptables -t nat -F&lt;br /&gt;
 iptables -t mangle -F&lt;br /&gt;
&lt;br /&gt;
*Enable NAT:&lt;br /&gt;
 iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE&lt;br /&gt;
 iptables -A FORWARD -i eth1 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enable IP Forwarding ==&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/ip_forward&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local host configuration ==&lt;br /&gt;
&lt;br /&gt;
Configure LAN hosts to access Internet through the gateway.&lt;br /&gt;
 address 192.168.1.254&lt;br /&gt;
 netmask: 255.255.255.0&lt;br /&gt;
 dns  172.16.2.254&lt;br /&gt;
 network 192.168.1.0 &lt;br /&gt;
 gateway: 192.168.1.1&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3928</id>
		<title>How to Setup NAT</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3928"/>
		<updated>2010-12-18T04:22:17Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
Network Address Translation (NAT) configuration with iptables firewall on Linux operating system. This system can act as gateway and provide Internet access to multiple hosts in Local Area Network (LAN) using a single public IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Requirement ==&lt;br /&gt;
&lt;br /&gt;
*Two Network interface cards (NICs)&lt;br /&gt;
*Iptables &lt;br /&gt;
*Linux operating system &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Network Configuration ==&lt;br /&gt;
&lt;br /&gt;
Edit configuration file /etc/network/interfaces using text editor like nano and add eth0 and eth1 configuration. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;WAN interface (eth0 - connection to ISP)&#039;&#039;&#039;&lt;br /&gt;
This is IP address, subnet mask, default gateway, and network address from your Internet Service Provider (ISP). If you get static IP address from your ISP follow step 1 and replace this addresses with your addresses otherwise go to step 2.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Step 1&#039;&#039;&#039;&lt;br /&gt;
    auto eth0&lt;br /&gt;
    iface eth0 inet static&lt;br /&gt;
    address 172.16.1.2&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 172.16.1.0 &lt;br /&gt;
    gateway 172.16.1.1&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Step 2&#039;&#039;&#039;&lt;br /&gt;
   auto eth0&lt;br /&gt;
   iface eth0 inet dhcp &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;LAN interface (eth1 - LAN connection and default gateway for local hosts)&#039;&#039;&#039;        &lt;br /&gt;
    auto eth1&lt;br /&gt;
    iface eth1 inet static&lt;br /&gt;
    address 192.168.1.1&lt;br /&gt;
    netmask 255.255.255.0&lt;br /&gt;
    network 192.168.1.0	&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;DNS setup&#039;&#039;&#039;&lt;br /&gt;
Set up Domain Name System servers IP addresses by editing /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
 nameserver 172.16.2.254 (replace this with your Domain Name System servers IP addresses)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NAT configuration with iptables ==&lt;br /&gt;
&lt;br /&gt;
To delete existing rules from every iptables table, execute the following commands:&lt;br /&gt;
 iptables -F&lt;br /&gt;
 iptables -t nat -F&lt;br /&gt;
 iptables -t mangle -F&lt;br /&gt;
&lt;br /&gt;
*Enable NAT:&lt;br /&gt;
 iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE&lt;br /&gt;
 iptables -A FORWARD -i eth1 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enable IP Forwarding ==&lt;br /&gt;
&lt;br /&gt;
 echo 1 &amp;gt; /proc/sys/net/ipv4/ip_forward&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local host configuration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Configure LAN hosts to access Internet through the gateway. ==&lt;br /&gt;
 address 192.168.1.254&lt;br /&gt;
 netmask: 255.255.255.0&lt;br /&gt;
 dns  172.16.2.254&lt;br /&gt;
 network 192.168.1.0 &lt;br /&gt;
 gateway: 192.168.1.1&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3927</id>
		<title>How to Setup NAT</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3927"/>
		<updated>2010-12-18T04:14:28Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Introduction ==&lt;br /&gt;
Network Address Translation (NAT) configuration with iptables firewall on Linux operating system. This system can act as gateway and provide Internet access to multiple hosts in Local Area Network (LAN) using a single public IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Requirement ==&lt;br /&gt;
&lt;br /&gt;
Two Network interface cards (NICs)&lt;br /&gt;
Iptables &lt;br /&gt;
Linux operating system &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Network Configuration ==&lt;br /&gt;
&lt;br /&gt;
Edit configuration file /etc/network/interfaces using text editor like nano and add eth0 and eth1 configuration. &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;WAN interface (eth0 - connection to ISP)&#039;&#039;&#039;&lt;br /&gt;
This is IP address, subnet mask, default gateway, and network address from your Internet Service Provider (ISP). If you get static IP address from your ISP follow step 1 and replace this addresses with your addresses otherwise go to step 2.&lt;br /&gt;
&lt;br /&gt;
**&#039;&#039;&#039;Step 1&#039;&#039;&#039;&lt;br /&gt;
      auto eth0&lt;br /&gt;
	iface eth0 inet static&lt;br /&gt;
	address 172.16.1.2&lt;br /&gt;
	netmask 255.255.255.0&lt;br /&gt;
	network 172.16.1.0 &lt;br /&gt;
	gateway 172.16.1.1&lt;br /&gt;
&lt;br /&gt;
**&#039;&#039;&#039;Step 2&#039;&#039;&#039;&lt;br /&gt;
      auto eth0&lt;br /&gt;
	iface eth0 inet dhcp &lt;br /&gt;
&lt;br /&gt;
	LAN interface (eth1 - LAN connection and default gateway for local hosts)&lt;br /&gt;
        auto eth1&lt;br /&gt;
	iface eth1 inet static&lt;br /&gt;
	address 192.168.1.1&lt;br /&gt;
	netmask 255.255.255.0&lt;br /&gt;
	network 192.168.1.0	&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;DNS setup&#039;&#039;&#039;&lt;br /&gt;
Set up Domain Name System servers IP addresses by editing /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
nameserver 172.16.2.254 (replace this with your Domain Name System servers IP addresses)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== NAT configuration with iptables ==&lt;br /&gt;
&lt;br /&gt;
To delete existing rules from every iptables table, execute the following commands:&lt;br /&gt;
iptables -F&lt;br /&gt;
iptables -t nat -F&lt;br /&gt;
iptables -t mangle -F&lt;br /&gt;
Enable NAT:&lt;br /&gt;
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE&lt;br /&gt;
iptables -A FORWARD -i eth1 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enable IP Forwarding ==&lt;br /&gt;
&lt;br /&gt;
echo 1 &amp;gt; /proc/sys/net/ipv4/ip_forward&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local host configuration ==&lt;br /&gt;
&lt;br /&gt;
Configure LAN hosts to access Internet through a gateway:&lt;br /&gt;
 address 192.168.1.254&lt;br /&gt;
 netmask: 255.255.255.0&lt;br /&gt;
 dns  172.16.2.254&lt;br /&gt;
 network 192.168.1.0 &lt;br /&gt;
 gateway: 192.168.1.1&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2540&amp;diff=3856</id>
		<title>Franske CNT-2540</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2540&amp;diff=3856"/>
		<updated>2010-12-13T15:33:18Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2540: Accessing the WAN classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2540 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2540 FA10 Schedule|Fall 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2540 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
*[[Frame relay multipoint lab]]&lt;br /&gt;
*[[How to configure SDM to secure a router]]&lt;br /&gt;
*[[ISDN WAN Connections]]&lt;br /&gt;
*[[IEEE 802.1x Port-Based Authentication]]&lt;br /&gt;
*[[Password Recovery and Device Reset Procedures]]&lt;br /&gt;
*[[How to Configure GRE VPN]]&lt;br /&gt;
= Resources =&lt;br /&gt;
== Certification ==&lt;br /&gt;
* [[CCNA Voucher Information]]&lt;br /&gt;
== General WAN Information ==&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1915.html Cisco Guide to Troubleshooting Serial Line Problems]&lt;br /&gt;
== WAN Protocols ==&lt;br /&gt;
=== Frame Relay ===&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk713/tk237/tsd_technology_support_protocol_home.html Cisco Frame Relay Technology Pages]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/design/guide/nd2009.html Cisco Frame Relay Internetwork Design Guide]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1918.html Cisco Guide to Troubleshooting Frame Relay Connections]&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk713/tk237/technologies_tech_note09186a008014f8a7.shtml Cisco Comprehensive Guide to Configuring and Troubleshooting Frame Relay with configuration examples]&lt;br /&gt;
&lt;br /&gt;
== Subnetting ==&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3855</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3855"/>
		<updated>2010-12-13T15:21:50Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Test and Verify VPN Connectivity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Cable the network according the topology diagram.&lt;br /&gt;
&lt;br /&gt;
*Clear existing configurations on the routers.&lt;br /&gt;
&lt;br /&gt;
*Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure R1, R2 and ISP routers with IP addresses and masks.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
*Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
*Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
*Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
*Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
*Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
*Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
*Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
        inbound ah sas:&lt;br /&gt;
        inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
        outbound ah sas:&lt;br /&gt;
        outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3854</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3854"/>
		<updated>2010-12-13T15:17:29Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Cable the network according the topology diagram.&lt;br /&gt;
&lt;br /&gt;
*Clear existing configurations on the routers.&lt;br /&gt;
&lt;br /&gt;
*Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure R1, R2 and ISP routers with IP addresses and masks.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
*Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
*Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
*Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
*Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
*Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
*Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
*Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
*Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
        inbound ah sas:&lt;br /&gt;
        inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
        outbound ah sas:&lt;br /&gt;
        outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3853</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3853"/>
		<updated>2010-12-13T15:07:18Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Configure Router and GRE Tunnel Interfaces  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Cable the network according the topology diagram.&lt;br /&gt;
&lt;br /&gt;
*Clear existing configurations on the routers.&lt;br /&gt;
&lt;br /&gt;
*Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure R1, R2 and ISP routers with IP addresses and masks.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3852</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3852"/>
		<updated>2010-12-13T15:05:15Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /*  Prepare the Network and Basic Configurations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*Cable the network according the topology diagram.&lt;br /&gt;
&lt;br /&gt;
*Clear existing configurations on the routers.&lt;br /&gt;
&lt;br /&gt;
*Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3851</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3851"/>
		<updated>2010-12-13T15:04:08Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /*  Prepare the Network and Basic Configurations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*[Cable the network according the topology diagram.]&lt;br /&gt;
&lt;br /&gt;
*[Clear existing configurations on the routers.]&lt;br /&gt;
&lt;br /&gt;
*[Perform basic router configuration.]&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3850</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3850"/>
		<updated>2010-12-13T15:03:00Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /*  Prepare the Network and Basic Configurations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
*[[Cable the network according the topology diagram.]]&lt;br /&gt;
&lt;br /&gt;
*[[Clear existing configurations on the routers.]]&lt;br /&gt;
&lt;br /&gt;
*[[Perform basic router configuration.]]&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3849</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3849"/>
		<updated>2010-12-13T08:57:09Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Cable the network according the topology diagram.&lt;br /&gt;
&lt;br /&gt;
Clear existing configurations on the routers.&lt;br /&gt;
&lt;br /&gt;
Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3848</id>
		<title>How to Setup NAT</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Setup_NAT&amp;diff=3848"/>
		<updated>2010-12-13T08:55:21Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: moved User:Mtsega to How to Configure GRE VPN&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[How to Configure GRE VPN]]&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3847</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3847"/>
		<updated>2010-12-13T08:55:21Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: moved User:Mtsega to How to Configure GRE VPN&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Cable the network according the topology diagram.&lt;br /&gt;
Clear existing configurations on the routers.&lt;br /&gt;
Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3846</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3846"/>
		<updated>2010-12-13T08:53:42Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Cable the network according the topology diagram.&lt;br /&gt;
Clear existing configurations on the routers.&lt;br /&gt;
Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
 Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
 FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
 FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
 Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
 Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
 D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
 Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
 Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
 D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
 C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
 C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
 S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
 Target IP address: 192.168.20.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.10.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.10.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3845</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3845"/>
		<updated>2010-12-13T08:49:13Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Cable the network according the topology diagram.&lt;br /&gt;
Clear existing configurations on the routers.&lt;br /&gt;
Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
 R1#configure terminal&lt;br /&gt;
 R1(config)#interface f0/0&lt;br /&gt;
 R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
 R1(config-if)#no shut&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface s0/0/0&lt;br /&gt;
 R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
 R1(config-if)#no shutdown&lt;br /&gt;
 R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2#configure terminal&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#int f0/0&lt;br /&gt;
 R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
 R2(config-if)#no shut&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
 R2#&lt;br /&gt;
&lt;br /&gt;
 ISP#configure terminal&lt;br /&gt;
 ISP(config)#interface s0/0/0&lt;br /&gt;
 ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shutdown&lt;br /&gt;
 ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
 ISP(config-if)#inte s0/0/1&lt;br /&gt;
 ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
 ISP(config-if)#no shut&lt;br /&gt;
 ISP(config-if)#end&lt;br /&gt;
 ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
 R1(config)#interface tunnel 0&lt;br /&gt;
 R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
 R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
 R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
 R2(config)#interface tunnel 0&lt;br /&gt;
 R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
 R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
 R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
&lt;br /&gt;
 R1(config)#router eigrp 1&lt;br /&gt;
 R1(config-router)#no auto-summary&lt;br /&gt;
 R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
 R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2#conf ter&lt;br /&gt;
 R2(config)#router eigrp 1&lt;br /&gt;
 R2(config-router)#no auto-summary&lt;br /&gt;
 R2(config-router)#network 192.168.20.0&lt;br /&gt;
 R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
 R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
 R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
 R2#ping ip&lt;br /&gt;
 Target IP address: 192.168.10.1&lt;br /&gt;
 Repeat count [5]:&lt;br /&gt;
 Datagram size [100]:&lt;br /&gt;
 Timeout in seconds [2]:&lt;br /&gt;
 Extended commands [n]: y&lt;br /&gt;
 Source address or interface: 192.168.20.1&lt;br /&gt;
 Type of service [0]:&lt;br /&gt;
 Set DF bit in IP header? [no]:&lt;br /&gt;
 Validate reply data? [no]:&lt;br /&gt;
 Data pattern [0xABCD]:&lt;br /&gt;
 Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
 Sweep range of sizes [n]:&lt;br /&gt;
 Type escape sequence to abort.&lt;br /&gt;
 Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
 Packet sent with a source address of 192.168.20.1&lt;br /&gt;
 !!!!!&lt;br /&gt;
 Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp policy 1&lt;br /&gt;
 R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
 R1(config-isakmp)#group 5&lt;br /&gt;
 R1(config-isakmp)#encryption aes&lt;br /&gt;
 R1(config-isakmp)#hash sha&lt;br /&gt;
 R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
 R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
 R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
 R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R1(config-crypto-map)#match add 101&lt;br /&gt;
 R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R1(config)#int s0/0/0&lt;br /&gt;
 R1(config-if)#crypto map vpn&lt;br /&gt;
 R1(config-if)#end&lt;br /&gt;
 R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp policy 1&lt;br /&gt;
 R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
 R2(config-isakmp)#group 5&lt;br /&gt;
 R2(config-isakmp)#encryption aes&lt;br /&gt;
 R2(config-isakmp)#hash sha&lt;br /&gt;
 R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
 R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
 R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
 R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
 % NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
 R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
 R2(config-crypto-map)#match add 102&lt;br /&gt;
 R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
 R2(config)#int s0/0/1&lt;br /&gt;
 R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
 R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
Target IP address: 192.168.20.1&lt;br /&gt;
Repeat count [5]:&lt;br /&gt;
Datagram size [100]:&lt;br /&gt;
Timeout in seconds [2]:&lt;br /&gt;
Extended commands [n]: y&lt;br /&gt;
Source address or interface: 192.168.10.1&lt;br /&gt;
Type of service [0]:&lt;br /&gt;
Set DF bit in IP header? [no]:&lt;br /&gt;
Validate reply data? [no]:&lt;br /&gt;
Data pattern [0xABCD]:&lt;br /&gt;
Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
Sweep range of sizes [n]:&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
Packet sent with a source address of 192.168.10.1&lt;br /&gt;
!!!!!&lt;br /&gt;
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3844</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3844"/>
		<updated>2010-12-13T08:34:56Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Cnt2540.png]]&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Cable the network according the topology diagram.&lt;br /&gt;
Clear existing configurations on the routers.&lt;br /&gt;
Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
R1#configure terminal&lt;br /&gt;
R1(config)#interface f0/0&lt;br /&gt;
R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
R1(config-if)#no shut&lt;br /&gt;
R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
R1(config)#interface s0/0/0&lt;br /&gt;
R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
R1(config-if)#no shutdown&lt;br /&gt;
R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
R2#configure terminal&lt;br /&gt;
R2(config)#int s0/0/1&lt;br /&gt;
R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
R2(config-if)#no shut&lt;br /&gt;
R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
R2(config-if)#int f0/0&lt;br /&gt;
R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
R2(config-if)#no shut&lt;br /&gt;
R2(config-if)#end&lt;br /&gt;
R2#&lt;br /&gt;
&lt;br /&gt;
ISP#configure terminal&lt;br /&gt;
ISP(config)#interface s0/0/0&lt;br /&gt;
ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
ISP(config-if)#no shutdown&lt;br /&gt;
ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
ISP(config-if)#inte s0/0/1&lt;br /&gt;
ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
ISP(config-if)#no shut&lt;br /&gt;
ISP(config-if)#end&lt;br /&gt;
ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
R1(config)#interface tunnel 0&lt;br /&gt;
R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
R2(config)#interface tunnel 0&lt;br /&gt;
R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
R1(config)#router eigrp 1&lt;br /&gt;
R1(config-router)#no auto-summary&lt;br /&gt;
R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#conf ter&lt;br /&gt;
R2(config)#router eigrp 1&lt;br /&gt;
R2(config-router)#no auto-summary&lt;br /&gt;
R2(config-router)#network 192.168.20.0&lt;br /&gt;
R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
&lt;br /&gt;
R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
R2#ping ip&lt;br /&gt;
Target IP address: 192.168.10.1&lt;br /&gt;
Repeat count [5]:&lt;br /&gt;
Datagram size [100]:&lt;br /&gt;
Timeout in seconds [2]:&lt;br /&gt;
Extended commands [n]: y&lt;br /&gt;
Source address or interface: 192.168.20.1&lt;br /&gt;
Type of service [0]:&lt;br /&gt;
Set DF bit in IP header? [no]:&lt;br /&gt;
Validate reply data? [no]:&lt;br /&gt;
Data pattern [0xABCD]:&lt;br /&gt;
Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
Sweep range of sizes [n]:&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
Packet sent with a source address of 192.168.20.1&lt;br /&gt;
!!!!!&lt;br /&gt;
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto isakmp policy 1&lt;br /&gt;
R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
R1(config-isakmp)#group 5&lt;br /&gt;
R1(config-isakmp)#encryption aes&lt;br /&gt;
R1(config-isakmp)#hash sha&lt;br /&gt;
R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
% NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
R1(config-crypto-map)#match add 101&lt;br /&gt;
R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
R1(config)#int s0/0/0&lt;br /&gt;
R1(config-if)#crypto map vpn&lt;br /&gt;
R1(config-if)#end&lt;br /&gt;
R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto isakmp policy 1&lt;br /&gt;
R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
R2(config-isakmp)#group 5&lt;br /&gt;
R2(config-isakmp)#encryption aes&lt;br /&gt;
R2(config-isakmp)#hash sha&lt;br /&gt;
R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
% NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
R2(config-crypto-map)#match add 102&lt;br /&gt;
R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
R2(config)#int s0/0/1&lt;br /&gt;
R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
Target IP address: 192.168.20.1&lt;br /&gt;
Repeat count [5]:&lt;br /&gt;
Datagram size [100]:&lt;br /&gt;
Timeout in seconds [2]:&lt;br /&gt;
Extended commands [n]: y&lt;br /&gt;
Source address or interface: 192.168.10.1&lt;br /&gt;
Type of service [0]:&lt;br /&gt;
Set DF bit in IP header? [no]:&lt;br /&gt;
Validate reply data? [no]:&lt;br /&gt;
Data pattern [0xABCD]:&lt;br /&gt;
Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
Sweep range of sizes [n]:&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
Packet sent with a source address of 192.168.10.1&lt;br /&gt;
!!!!!&lt;br /&gt;
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Cnt2540.png&amp;diff=3843</id>
		<title>File:Cnt2540.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Cnt2540.png&amp;diff=3843"/>
		<updated>2010-12-13T08:32:22Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3842</id>
		<title>How to Configure GRE VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Configure_GRE_VPN&amp;diff=3842"/>
		<updated>2010-12-13T08:17:13Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: Created page with &amp;#039; == &amp;#039;&amp;#039;&amp;#039;Introduction&amp;#039;&amp;#039;&amp;#039; == This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP t…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== &#039;&#039;&#039;Introduction&#039;&#039;&#039; ==&lt;br /&gt;
This network create a VPN tunnel between R1 and R2 using GRE tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels.  GRE creates a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. Routing protocols can be used over a GRE tunnel just as though it were a point to point circuit. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039; Prepare the Network and Basic Configurations&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Cable the network according the topology diagram.&lt;br /&gt;
Clear existing configurations on the routers.&lt;br /&gt;
Perform basic router configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Configure Router and GRE Tunnel Interfaces &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure R1, R2 and ISP routers with IP addresses and masks. &lt;br /&gt;
&lt;br /&gt;
R1#configure terminal&lt;br /&gt;
R1(config)#interface f0/0&lt;br /&gt;
R1(config-if)#ip address 192.168.10.1 255.255.255.0&lt;br /&gt;
R1(config-if)#no shut&lt;br /&gt;
R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
R1(config)#interface s0/0/0&lt;br /&gt;
R1(config-if)#ip address 10.2.2.2 255.255.255.252&lt;br /&gt;
R1(config-if)#no shutdown&lt;br /&gt;
R1(config-if)#&lt;br /&gt;
&lt;br /&gt;
R2#configure terminal&lt;br /&gt;
R2(config)#int s0/0/1&lt;br /&gt;
R2(config-if)#ip address 10.1.1.2 255.255.255.252&lt;br /&gt;
R2(config-if)#no shut&lt;br /&gt;
R2(config-if)#&lt;br /&gt;
&lt;br /&gt;
R2(config-if)#int f0/0&lt;br /&gt;
R2(config-if)#ip address 192.168.20.1 255.255.255.0&lt;br /&gt;
R2(config-if)#no shut&lt;br /&gt;
R2(config-if)#end&lt;br /&gt;
R2#&lt;br /&gt;
&lt;br /&gt;
ISP#configure terminal&lt;br /&gt;
ISP(config)#interface s0/0/0&lt;br /&gt;
ISP(config-if)#ip address 10.2.2.1 255.255.255.252&lt;br /&gt;
ISP(config-if)#no shutdown&lt;br /&gt;
ISP(config-if)#&lt;br /&gt;
&lt;br /&gt;
ISP(config-if)#inte s0/0/1&lt;br /&gt;
ISP(config-if)#ip address 10.1.1.1 255.255.255.252&lt;br /&gt;
ISP(config-if)#no shut&lt;br /&gt;
ISP(config-if)#end&lt;br /&gt;
ISP#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure PC1 and PC2 with IP address and default gateway&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Configure GRE Tunnel interface on R1 and R2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
R1(config)#interface tunnel 0&lt;br /&gt;
R1(config-if)#description GRE-Tunnel to R2&lt;br /&gt;
R1(config-if)#ip address 192.168.1.1 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R1(config-if)#tunnel source 10.2.2.2&lt;br /&gt;
R1(config-if)#tunnel destination 10.1.1.2&lt;br /&gt;
R1(config-if)#end&lt;br /&gt;
Tunnel source is R1’s serial 0/0/0 interface and tunnel destination is R2’s serial 0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
R2(config)#interface tunnel 0&lt;br /&gt;
R2(config-if)#description GRE-Tunnel to R1&lt;br /&gt;
R2(config-if)#ip address 192.168.1.2 255.255.255.252&lt;br /&gt;
&lt;br /&gt;
R2(config-if)#tunnel source 10.1.1.2&lt;br /&gt;
R2(config-if)#tunnel destination 10.2.2.2&lt;br /&gt;
R2(config-if)#end&lt;br /&gt;
Tunnel source is R2’s serial 0/0/1 interface and tunnel destination is R1’s serial 0/0/0 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Enable EIGRP with process ID 1 on R1 and R2&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Advertise the LAN interface Fa0/0 and the tunnel interfaces on both R1 and R2. Do not advertise to ISP router. &lt;br /&gt;
R1(config)#router eigrp 1&lt;br /&gt;
R1(config-router)#no auto-summary&lt;br /&gt;
R1(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
R1(config-router)#network 192.168.10.0 0.0.0.255&lt;br /&gt;
R1(config-router)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#conf ter&lt;br /&gt;
R2(config)#router eigrp 1&lt;br /&gt;
R2(config-router)#no auto-summary&lt;br /&gt;
R2(config-router)#network 192.168.20.0&lt;br /&gt;
R2(config-router)#network 192.168.1.0 0.0.0.3&lt;br /&gt;
R2(config-router)#end&lt;br /&gt;
&lt;br /&gt;
Apply default route on R1 and R2&lt;br /&gt;
&lt;br /&gt;
R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
&lt;br /&gt;
R2(config)#ip route 0.0.0.0 0.0.0.0 s0/0/0&lt;br /&gt;
Before you configure authentication and encryption test that the network is working as planned. So that you will know what to troubleshoot incase you encounter a problem at the end and It is easier to troubleshootin before you apply authentication and encryption.&lt;br /&gt;
&lt;br /&gt;
Check the interfaces on R1, R2, and ISP routers using show ip interface brief command.&lt;br /&gt;
&lt;br /&gt;
R2#show ip int brief&lt;br /&gt;
&lt;br /&gt;
Interface                  IP-Address      OK? Method Status                Protocol&lt;br /&gt;
FastEthernet0/0            192.168.20.1    YES manual up                    up&lt;br /&gt;
FastEthernet0/1            unassigned      YES unset  administratively down down&lt;br /&gt;
Serial0/0/0                unassigned      YES unset  administratively down down&lt;br /&gt;
Serial0/0/1                10.1.1.2        YES manual up                    up&lt;br /&gt;
Tunnel0                    192.168.1.2     YES manual up                    up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show ip route command to check the routing table on R1 and R2.&lt;br /&gt;
&lt;br /&gt;
R1#show ip route&lt;br /&gt;
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
Gateway of last resort is 10.2.2.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
C    192.168.10.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
D    192.168.20.0/24 [90/26882560] via 192.168.1.2, 00:01:33, Tunnel0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       10.2.2.0 is directly connected, Serial0/0/0&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
S*   0.0.0.0/0 [1/0] via 10.2.2.1&lt;br /&gt;
&lt;br /&gt;
Test connectivity using ping command between PC1 and PC2 or use extended ping from R1 LAN interface Fa0/0 to R2 LAN interface and vice-versa.&lt;br /&gt;
&lt;br /&gt;
R2#ping ip&lt;br /&gt;
Target IP address: 192.168.10.1&lt;br /&gt;
Repeat count [5]:&lt;br /&gt;
Datagram size [100]:&lt;br /&gt;
Timeout in seconds [2]:&lt;br /&gt;
Extended commands [n]: y&lt;br /&gt;
Source address or interface: 192.168.20.1&lt;br /&gt;
Type of service [0]:&lt;br /&gt;
Set DF bit in IP header? [no]:&lt;br /&gt;
Validate reply data? [no]:&lt;br /&gt;
Data pattern [0xABCD]:&lt;br /&gt;
Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
Sweep range of sizes [n]:&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;br /&gt;
Packet sent with a source address of 192.168.20.1&lt;br /&gt;
!!!!!&lt;br /&gt;
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;IPsec Encryption and Authentication&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
Configure an Internet Security Association and Key Management Protocol (ISAKMP) policy, an ISAKMP key, and an IPSec transform set. The ISAKMP policy, key, and IPSec transform set must match on both sides of a single tunnel.&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto isakmp policy 1&lt;br /&gt;
R1(config-isakmp)#authentication  pre-share&lt;br /&gt;
R1(config-isakmp)#group 5&lt;br /&gt;
R1(config-isakmp)#encryption aes&lt;br /&gt;
R1(config-isakmp)#hash sha&lt;br /&gt;
R1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto isakmp key 0 blindhog address 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R2 serial 0/0/1 to R1 serial 0/0/0 interface.&lt;br /&gt;
R1(config)#access-list 101 permit GRE host 10.2.2.2 host 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R1&lt;br /&gt;
&lt;br /&gt;
R1(config)#crypto map vpn 11 ipsec-isakmp&lt;br /&gt;
% NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
R1(config-crypto-map)#description VPN from R1 to R2&lt;br /&gt;
&lt;br /&gt;
R1(config-crypto-map)#set peer 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
R1(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
R1(config-crypto-map)#match add 101&lt;br /&gt;
R1(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
R1(config)#int s0/0/0&lt;br /&gt;
R1(config-if)#crypto map vpn&lt;br /&gt;
R1(config-if)#end&lt;br /&gt;
R1#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto isakmp policy 1&lt;br /&gt;
R2(config-isakmp)#authentication pre-sha&lt;br /&gt;
R2(config-isakmp)#group 5&lt;br /&gt;
R2(config-isakmp)#encryption aes&lt;br /&gt;
R2(config-isakmp)#hash sha&lt;br /&gt;
R2(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto isakmp key 0 blindhog address 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac&lt;br /&gt;
R2(cfg-crypto-trans)#exit&lt;br /&gt;
&lt;br /&gt;
Extended access control list that permit ip only from R1 serial 0/0/0 to R2 serial 0/0/1 interface. &lt;br /&gt;
R2(config)#access-list 102 permit GRE host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the crypto map on R2&lt;br /&gt;
&lt;br /&gt;
R2(config)#crypto map vpn 12 ipsec-isakmp&lt;br /&gt;
% NOTE: This new crypto map will remain disabled until a peer&lt;br /&gt;
        and a valid access list have been configured.&lt;br /&gt;
&lt;br /&gt;
R2(config-crypto-map)#description VPN from R2 to R1&lt;br /&gt;
&lt;br /&gt;
R2(config-crypto-map)#set peer 10.2.2.2&lt;br /&gt;
&lt;br /&gt;
R2(config-crypto-map)#set transform-set aes-sha&lt;br /&gt;
R2(config-crypto-map)#match add 102&lt;br /&gt;
R2(config-crypto-map)#exit&lt;br /&gt;
&lt;br /&gt;
R2(config)#int s0/0/1&lt;br /&gt;
R2(config-if)#crypto map vpn&lt;br /&gt;
&lt;br /&gt;
R2(config-if)#end&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Test and Verify VPN Connectivity&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Use show ip route command on R1 to check that a route exist to 192.168.20.0/24 network through the tunnel interface. Do the same on R2 to verify that a route exist to 192.168.10.0/24 network through the tunnel interface.&lt;br /&gt;
&lt;br /&gt;
 R2#show ip route&lt;br /&gt;
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;br /&gt;
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;br /&gt;
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;br /&gt;
       E1 - OSPF external type 1, E2 - OSPF external type 2&lt;br /&gt;
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;br /&gt;
       ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;br /&gt;
       o - ODR, P - periodic downloaded static route&lt;br /&gt;
&lt;br /&gt;
Gateway of last resort is 10.1.1.1 to network 0.0.0.0&lt;br /&gt;
&lt;br /&gt;
D    192.168.10.0/24 [90/26882560] via 192.168.1.1, 00:13:17, Tunnel0&lt;br /&gt;
C    192.168.20.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;
     10.0.0.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       10.1.1.0 is directly connected, Serial0/0/1&lt;br /&gt;
     192.168.1.0/30 is subnetted, 1 subnets&lt;br /&gt;
C       192.168.1.0 is directly connected, Tunnel0&lt;br /&gt;
S*   0.0.0.0/0 [1/0] via 10.1.1.1&lt;br /&gt;
&lt;br /&gt;
Use ping or extended ping command to test connectivity between 192.168.10.0/24 and 192.168.20.0/24 network.&lt;br /&gt;
&lt;br /&gt;
R1#ping ip&lt;br /&gt;
Target IP address: 192.168.20.1&lt;br /&gt;
Repeat count [5]:&lt;br /&gt;
Datagram size [100]:&lt;br /&gt;
Timeout in seconds [2]:&lt;br /&gt;
Extended commands [n]: y&lt;br /&gt;
Source address or interface: 192.168.10.1&lt;br /&gt;
Type of service [0]:&lt;br /&gt;
Set DF bit in IP header? [no]:&lt;br /&gt;
Validate reply data? [no]:&lt;br /&gt;
Data pattern [0xABCD]:&lt;br /&gt;
Loose, Strict, Record, Timestamp, Verbose[none]:&lt;br /&gt;
Sweep range of sizes [n]:&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:&lt;br /&gt;
Packet sent with a source address of 192.168.10.1&lt;br /&gt;
!!!!!&lt;br /&gt;
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/36 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Use show crypto engine connections active, show crypto map  and show crypto ipsec sa command s to verify connection.&lt;br /&gt;
R2#show crypto engine connections active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
ID  Type    Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
    1  IPsec   AES+SHA                   0       81 10.1.1.2&lt;br /&gt;
    2  IPsec   AES+SHA                  82        0 10.1.1.2&lt;br /&gt;
 2001  IKE     SHA+AES                   0        0 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2# show crypto map&lt;br /&gt;
Crypto Map &amp;quot;vpn&amp;quot; 12 ipsec-isakmp&lt;br /&gt;
        Description: VPN from R2 to R1&lt;br /&gt;
        Peer = 10.2.2.2&lt;br /&gt;
        Extended IP access list 102&lt;br /&gt;
            access-list 102 permit gre host 10.1.1.2 host 10.2.2.2&lt;br /&gt;
        Current peer: 10.2.2.2&lt;br /&gt;
        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;br /&gt;
        Responder-Only (Y/N): N&lt;br /&gt;
        PFS (Y/N): N&lt;br /&gt;
        Transform sets={&lt;br /&gt;
                aes-sha:  { esp-aes esp-sha-hmac  } ,&lt;br /&gt;
        }&lt;br /&gt;
        Interfaces using crypto map vpn:&lt;br /&gt;
                Serial0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R2#show crypto ipsec sa&lt;br /&gt;
&lt;br /&gt;
interface: Serial0/0/1&lt;br /&gt;
    Crypto map tag: vpn, local addr 10.1.1.2&lt;br /&gt;
&lt;br /&gt;
   protected vrf: (none)&lt;br /&gt;
   local  ident (addr/mask/prot/port): (10.1.1.2/255.255.255.255/47/0)&lt;br /&gt;
   remote ident (addr/mask/prot/port): (10.2.2.2/255.255.255.255/47/0)&lt;br /&gt;
   current_peer 10.2.2.2 port 500&lt;br /&gt;
     PERMIT, flags={origin_is_acl,}&lt;br /&gt;
    #pkts encaps: 304, #pkts encrypt: 304, #pkts digest: 304&lt;br /&gt;
    #pkts decaps: 302, #pkts decrypt: 302, #pkts verify: 302&lt;br /&gt;
    #pkts compressed: 0, #pkts decompressed: 0&lt;br /&gt;
    #pkts not compressed: 0, #pkts compr. failed: 0&lt;br /&gt;
    #pkts not decompressed: 0, #pkts decompress failed: 0&lt;br /&gt;
    #send errors 168, #recv errors 0&lt;br /&gt;
&lt;br /&gt;
     local crypto endpt.: 10.1.1.2, remote crypto endpt.: 10.2.2.2&lt;br /&gt;
     path mtu 1500, ip mtu 1500, ip mtu idb Serial0/0/1&lt;br /&gt;
     current outbound spi: 0x192C42F5(422331125)&lt;br /&gt;
     PFS (Y/N): N, DH group: none&lt;br /&gt;
&lt;br /&gt;
     inbound esp sas:&lt;br /&gt;
      spi: 0xF0333FAE(4029890478)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 1, flow_id: AIM-VPN/SSL-1:1, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473306/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     inbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     inbound pcp sas:&lt;br /&gt;
&lt;br /&gt;
     outbound esp sas:&lt;br /&gt;
      spi: 0x192C42F5(422331125)&lt;br /&gt;
        transform: esp-aes esp-sha-hmac ,&lt;br /&gt;
        in use settings ={Tunnel, }&lt;br /&gt;
        conn id: 2, flow_id: AIM-VPN/SSL-1:2, sibling_flags 80000046, crypto map: v&lt;br /&gt;
        sa timing: remaining key lifetime (k/sec): (4473305/2869)&lt;br /&gt;
        IV size: 16 bytes&lt;br /&gt;
        replay detection support: Y&lt;br /&gt;
        Status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
     outbound ah sas:&lt;br /&gt;
&lt;br /&gt;
     outbound pcp sas:&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2520&amp;diff=3441</id>
		<title>Franske CNT-2520</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2520&amp;diff=3441"/>
		<updated>2010-10-17T04:39:42Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2520 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [http://spreadsheets.google.com/viewform?formkey=dG5TdVF2c0hiU19jSGNvX2xtbXFfZ2c6MA First Day Sign-In]&lt;br /&gt;
* [[Franske CNT-2520 SP10 Syllabus|Spring 2010 Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2520 SP10 Schedule|Spring 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2520 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2520 Lab Point Sheet|Lab/Homework Point Sheet]]&lt;br /&gt;
* [[Franske CNT-2520 Homework|Homework Assignments]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
* [[Xmodem Console IOS Download Procedure using ROMMON]]&lt;br /&gt;
* [[Vyatta]]&lt;br /&gt;
* [[Chapter Command List (chapters 1.5.1-11.6.3)]]&lt;br /&gt;
* [[VMWare Setup|Instructions for creating VMWare machines from the CNT template]]&lt;br /&gt;
* [[Securing Router Logins with SSH]]&lt;br /&gt;
* [[Password Recovery Instructions]]&lt;br /&gt;
* [[Third Party Firmware]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
=== Subnetting ===&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;br /&gt;
&lt;br /&gt;
== Old Course Information ==&lt;br /&gt;
=== Fall 2009 ===&lt;br /&gt;
* [[Franske CNT-2520 FA09 Syllabus|Fall 2009 Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2520 FA09 Schedule|Fall 2009 Course Schedule]]&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530&amp;diff=3440</id>
		<title>Franske CNT-2530</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530&amp;diff=3440"/>
		<updated>2010-10-17T04:36:55Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2530: Switching Fundamentals and Intermediate Routing classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2530 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2530 FA10 Schedule|Fall 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2530 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2530 Lab Point Sheet|Lab Point Sheet]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
*[[Cacti]]&lt;br /&gt;
*[[How to Setup Security on a Home Wireless Router]]&lt;br /&gt;
*[[Cisco Wireless Access Points]]&lt;br /&gt;
*[[Network Access Control]]&lt;br /&gt;
*[[Lab Report Example]]&lt;br /&gt;
*[[How to Clear Switch Configuration]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
=== Subnetting ===&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;br /&gt;
=== Multilayer Switching ===&lt;br /&gt;
* [http://www.zurich.ibm.com/pdf/AnritsuGlossary.pdf &amp;quot;Must Have Reference On Multi-Layer Switching&amp;quot;, Anritsu Corp.]&lt;br /&gt;
* [http://www.pulsewan.com/data101/pdfs/layer3_switching.pdf Layer-3 Switching: An Introduction by Robert Ciampa]&lt;br /&gt;
* [http://www.routeralley.com/ra/docs/multilayer_switching.pdf MultiLayer Switching v1.11 by Aaron Balchunas]&lt;br /&gt;
* [http://www.cisco.com/application/pdf/paws/41860/howto_L3_intervlanrouting.pdf How To Configure InterVLAN Routing on Layer 3 Switches]&lt;br /&gt;
* [http://faculty.ccri.edu/tonyrashid/Files/CCNP/Layer3Switching.pdf Layer 3 Switching Demystified]&lt;br /&gt;
=== Enterprise Wireless ===&lt;br /&gt;
* [http://www.ecsl.cs.sunysb.edu/tr/TR166.pdf Coverage and Capacity Issues in Enterprise Wireless LAN Deployment, Raniwala, A. and Chiueh, T.]&lt;br /&gt;
* [http://www.cisco.com/en/US/prod/collateral/wireless/ps5755/ps6301/ps6305/product_data_sheet0900aecd802570d0.html Cisco Wireless Control System (WCS)]&lt;br /&gt;
* [http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6521/prod_white_paper0900aecd8040f7b2_ps6108_Products_White_Paper.html The Benefits of Centralization in Wireless LANs]&lt;br /&gt;
* [http://www.danielmkrueger.com/Docs/The%20Lightweight%20Access%20Point%20Protocol.pdf The Light Weight Access Point Protocol, Krueger, D.]&lt;br /&gt;
* [http://www.conticomp.com/PDF/LWAPP_td.pdf Understanding the Lightweight Access Point Protocol (LWAPP)]&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00807112e2.shtml Wireless LAN Controller Module (WLCM) Configuration Examples]&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3439</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3439"/>
		<updated>2010-10-17T04:27:25Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To clear switch configuration you need access to the Cisco Catalyst Switch console through either a physical console or a Telnet connection.&lt;br /&gt;
&lt;br /&gt;
== Clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command in Privileged EXEC mode.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration is cleared except the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM).&lt;br /&gt;
&lt;br /&gt;
== Verify the VLAN information Before deletion ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command in Privileged EXEC mode.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
At the prompt press Enter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
       --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3438</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3438"/>
		<updated>2010-10-17T04:17:37Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
To clear switch configuration you need access to the Cisco Catalyst Switch console through either a physical console or a Telnet connection.&lt;br /&gt;
&lt;br /&gt;
== Clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command in Privileged EXEC mode.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration is cleared except the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM).&lt;br /&gt;
&lt;br /&gt;
== Verify the VLAN information Before deletion ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command in Privileged EXEC mode.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
       --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3437</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3437"/>
		<updated>2010-10-16T19:10:48Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration is cleared except the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM).&lt;br /&gt;
&lt;br /&gt;
== Verify the VLAN information ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
       --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3436</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3436"/>
		<updated>2010-10-16T17:28:02Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* To clear switch configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== To clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration is cleared except the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM).&lt;br /&gt;
&lt;br /&gt;
== To verify the VLAN information ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
       --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3435</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3435"/>
		<updated>2010-10-16T17:23:52Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Reload the switch */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== To clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== To verify the VLAN information ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
       --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3434</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3434"/>
		<updated>2010-10-16T17:22:49Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: /* Reload the switch */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== To clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== To verify the VLAN information ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
        --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3433</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3433"/>
		<updated>2010-10-16T17:21:11Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== To clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== To verify the VLAN information ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
        --- System Configuration Dialog ---&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3432</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3432"/>
		<updated>2010-10-16T17:17:30Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== To clear switch configuration ==&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
 Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
 [OK]&lt;br /&gt;
 Erase of nvram: complete&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== To verify the VLAN information ==&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
 Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Delete the VLAN information from Flash ==&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
 Delete filename [vlan.dat]?&lt;br /&gt;
 Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
 Switch# &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reload the switch ==&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
 System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
 Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
 Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
 Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== After reload check the vlan information ==&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3431</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3431"/>
		<updated>2010-10-16T04:26:29Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;To clear switch configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
[OK]&lt;br /&gt;
Erase of nvram: complete&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To verify the VLAN information&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Delete the VLAN information from Flash&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
Delete filename [vlan.dat]?&lt;br /&gt;
Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
Switch# &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reload the switch&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;After reload&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
 ---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3430</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3430"/>
		<updated>2010-10-16T04:24:48Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;To clear switch configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
[OK]&lt;br /&gt;
Erase of nvram: complete&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To verify the VLAN information&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 10   Faculty/Staff                    active&lt;br /&gt;
 20   Students                         active&lt;br /&gt;
 30   Wireless                         active&lt;br /&gt;
 99   Management                       active&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Delete the VLAN information from Flash&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
Delete filename [vlan.dat]?&lt;br /&gt;
Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
Switch# &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reload the switch&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;After reload&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
 VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
 1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
 1002 fddi-default                     act/unsup&lt;br /&gt;
&lt;br /&gt;
 1003 token-ring-default               act/unsup&lt;br /&gt;
&lt;br /&gt;
 1004 fddinet-default                  act/unsup&lt;br /&gt;
&lt;br /&gt;
 1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3429</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3429"/>
		<updated>2010-10-16T04:21:46Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;To clear switch configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
[OK]&lt;br /&gt;
Erase of nvram: complete&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To verify the VLAN information&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
10   Faculty/Staff                    active&lt;br /&gt;
&lt;br /&gt;
20   Students                         active&lt;br /&gt;
&lt;br /&gt;
30   Wireless                         active&lt;br /&gt;
&lt;br /&gt;
99   Management                       active&lt;br /&gt;
&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Delete the VLAN information from Flash&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
Delete filename [vlan.dat]?&lt;br /&gt;
Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
Switch# &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reload the switch&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;After reload&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3428</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3428"/>
		<updated>2010-10-16T04:20:23Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;To clear switch configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
&lt;br /&gt;
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
[OK]&lt;br /&gt;
Erase of nvram: complete&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To verify the VLAN information&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
10   Faculty/Staff                    active&lt;br /&gt;
20   Students                         active&lt;br /&gt;
30   Wireless                         active&lt;br /&gt;
99   Management                       active&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Delete the VLAN information from Flash&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
Delete filename [vlan.dat]?&lt;br /&gt;
Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
Switch# &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reload the switch&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;After reload&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VHD_Backup&amp;diff=3427</id>
		<title>VHD Backup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VHD_Backup&amp;diff=3427"/>
		<updated>2010-10-16T04:16:47Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: moved VHD Backup to How to Clear Switch Configuration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[How to Clear Switch Configuration]]&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3426</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3426"/>
		<updated>2010-10-16T04:16:47Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: moved VHD Backup to How to Clear Switch Configuration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;To clear switch configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
[OK]&lt;br /&gt;
Erase of nvram: complete&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To verify the VLAN information&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
10   Faculty/Staff                    active&lt;br /&gt;
20   Students                         active&lt;br /&gt;
30   Wireless                         active&lt;br /&gt;
99   Management                       active&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Delete the VLAN information from Flash&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
Delete filename [vlan.dat]?&lt;br /&gt;
Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
Switch# &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reload the switch&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;After reload&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3425</id>
		<title>How to Clear Switch Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Clear_Switch_Configuration&amp;diff=3425"/>
		<updated>2010-10-16T04:13:12Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;To clear switch configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the erase starting-config command.&lt;br /&gt;
&lt;br /&gt;
Switch#erase startup-config&lt;br /&gt;
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]&lt;br /&gt;
[OK]&lt;br /&gt;
Erase of nvram: complete&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At this stage, the switch configuration has reset to the factory defaults, with the exclusion of the VLAN information. VLANs are kept in a seperate file from the startup-config (NVRAM). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;To verify the VLAN information&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Issue the show vlan brief command&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
10   Faculty/Staff                    active&lt;br /&gt;
20   Students                         active&lt;br /&gt;
30   Wireless                         active&lt;br /&gt;
99   Management                       active&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
Switch#&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Delete the VLAN information from Flash&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Switch#delete flash:vlan.dat&lt;br /&gt;
Delete filename [vlan.dat]?&lt;br /&gt;
Delete flash:vlan.dat? [confirm]&lt;br /&gt;
&lt;br /&gt;
Switch# &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reload the switch&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Do not save at the prompt. Otherwise, the switch  reloads with the current running configuration and does not clear the switch configuration.&lt;br /&gt;
&lt;br /&gt;
Switch#reload&lt;br /&gt;
&lt;br /&gt;
System configuration has been modified. Save? [yes/no]: n&lt;br /&gt;
Proceed with reload? [confirm]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;output omitted&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Would you like to terminate autoinstall? [yes]: y&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
         --- System Configuration Dialog ---&lt;br /&gt;
&lt;br /&gt;
Would you like to enter the initial configuration dialog? [yes/no]: n&lt;br /&gt;
Switch&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;After reload&#039;&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
check the VLAN information with the show vlan brief command.&lt;br /&gt;
&lt;br /&gt;
Switch#show vlan brief&lt;br /&gt;
&lt;br /&gt;
VLAN Name                             Status    Ports&lt;br /&gt;
---- -------------------------------- --------- -------------------------------&lt;br /&gt;
1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4&lt;br /&gt;
                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8&lt;br /&gt;
                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12&lt;br /&gt;
                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16&lt;br /&gt;
                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20&lt;br /&gt;
                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24&lt;br /&gt;
                                                Gi0/1, Gi0/2&lt;br /&gt;
1002 fddi-default                     act/unsup&lt;br /&gt;
1003 token-ring-default               act/unsup&lt;br /&gt;
1004 fddinet-default                  act/unsup&lt;br /&gt;
1005 trnet-default                    act/unsup&lt;br /&gt;
Compiled Thu 19-Jul-07 20:06 by nachen&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530_FA10_Schedule&amp;diff=3336</id>
		<title>Franske CNT-2530 FA10 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530_FA10_Schedule&amp;diff=3336"/>
		<updated>2010-10-01T21:18:14Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{SyllabusInfo&lt;br /&gt;
|coursename = Switching Fundamentals and Intermediate Routing&lt;br /&gt;
|coursenumber = CNT-2530&lt;br /&gt;
|numcredits = 3&lt;br /&gt;
|instructor = Dr. Ben Franske&lt;br /&gt;
|term = Fall 2010 Q1 (8/23/2010-10/15/2010)&lt;br /&gt;
|meetings = M W 9:00am-11:30am, F 9:00am-10:40am&lt;br /&gt;
|location = B143&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
This schedule provides an outline of the topics expected to be covered in this course as well as the readings and assignments due each week. Topics and readings may change in which case you will be notified in class or by e-mail and the latest version of this document is always available from the course wiki. &#039;&#039;&#039;Please have all readings completed prior to the start of each class and be prepared to take part in the discussion.&#039;&#039;&#039; Unless otherwise noted online quizzes and exams are due at 11:59pm on the date indicated.&lt;br /&gt;
&lt;br /&gt;
==Session 1: August 23==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Cisco Network Academy Course Enrollment&lt;br /&gt;
* Course Overview, Syllabus and Schedule&lt;br /&gt;
* Introduction to Switching Fundamentals &amp;amp; Intermediate Routing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 2: August 25==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* LAN Design&lt;br /&gt;
**Switched LAN Architecture&lt;br /&gt;
**Matching Switches to Specific LAN Functions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 1: LAN Design&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 3: August 27==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 1 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 4: August 30==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Basic Switch Concepts &amp;amp; Configuration&lt;br /&gt;
**Introduction to Ethernet/802.3 LANs&lt;br /&gt;
**Forwarding Frames Using a Switch&lt;br /&gt;
**Switch Management Configuration&lt;br /&gt;
**Configuring Switch Security&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 5: September 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* VLANs&lt;br /&gt;
**Introducing VLANs&lt;br /&gt;
**VLAN Trunking&lt;br /&gt;
**Configure VLANs and Trunks&lt;br /&gt;
**Troubleshooting VLANs and Trunks&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 6: September 3==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==NO CLASS: September 6==&lt;br /&gt;
* Labor Day - NO CLASS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 7: September 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* VTP&lt;br /&gt;
**VTP Concepts&lt;br /&gt;
**VTP Operation&lt;br /&gt;
**Configure VTP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 8: September 10==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4 Online Assessment&lt;br /&gt;
* Service Project Idea Submitted&lt;br /&gt;
&lt;br /&gt;
==Session 9: September 13==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* STP&lt;br /&gt;
**Redundant Layer 2 Topologies&lt;br /&gt;
**Introduction to STP&lt;br /&gt;
**STP Convergence&lt;br /&gt;
**PVST+, RSTP, and Rapid PVST+&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 10: September 15==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Inter-VLAN Routing&lt;br /&gt;
**Inter-VLAN Routing&lt;br /&gt;
**Configuring Inter-VLAN Routing&lt;br /&gt;
**Troubleshooting Inter-VLAN Routing&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 11: September 17==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 12: September 20==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Basic Wireless Concepts &amp;amp; Configuration&lt;br /&gt;
**The Wireless LAN&lt;br /&gt;
**Wireless LAN Security&lt;br /&gt;
**Configure Wireless LAN Access&lt;br /&gt;
**Troubleshooting Simple WLAN Problems&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==NO CLASS: September 22==&lt;br /&gt;
* Student Success Day - Make sure to attend at least two sessions for homework credit!&lt;br /&gt;
&lt;br /&gt;
==Session 13: September 24==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 14: September 27==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time / Project Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 15: September 29==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Introduction to Multi-Layer Switching&lt;br /&gt;
* Multi-layer Switching Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* [http://www.pulsewan.com/data101/pdfs/layer3_switching.pdf Layer-3 Switching: An Introduction by Robert Ciampa]&lt;br /&gt;
* [http://www.cisco.com/application/pdf/paws/41860/howto_L3_intervlanrouting.pdf How To Configure InterVLAN Routing on Layer 3 Switches]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 16: October 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Internet History&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 17: October 4==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Introduction to Enterprise Wireless&lt;br /&gt;
* Enterprise Wireless Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 18: October 6==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Internet History&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 19: October 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Internet History&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Online Final Exam &#039;&#039;&#039;(Open 12:00pm-8:00pm)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 20: October 11==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Final Skills Assessment By Appointment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 21: October 13==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Final Skills Assessment By Appointment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 22: October 15==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Final Skills Assessment By Appointment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
*  Lab Reports (All Labs/Homework Due!)&lt;br /&gt;
* CNT Service Project(s)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The instructor reserves the right to modify and adjust the schedule and assignments as needed during the course of this class. The most up to date version will always be available on the course website or from the instructor.&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530_FA10_Schedule&amp;diff=3335</id>
		<title>Franske CNT-2530 FA10 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530_FA10_Schedule&amp;diff=3335"/>
		<updated>2010-10-01T21:01:02Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{SyllabusInfo&lt;br /&gt;
|coursename = Switching Fundamentals and Intermediate Routing&lt;br /&gt;
|coursenumber = CNT-2530&lt;br /&gt;
|numcredits = 3&lt;br /&gt;
|instructor = Dr. Ben Franske&lt;br /&gt;
|term = Fall 2010 Q1 (8/23/2010-10/15/2010)&lt;br /&gt;
|meetings = M W 9:00am-11:30am, F 9:00am-10:40am&lt;br /&gt;
|location = B143&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
This schedule provides an outline of the topics expected to be covered in this course as well as the readings and assignments due each week. Topics and readings may change in which case you will be notified in class or by e-mail and the latest version of this document is always available from the course wiki. &#039;&#039;&#039;Please have all readings completed prior to the start of each class and be prepared to take part in the discussion.&#039;&#039;&#039; Unless otherwise noted online quizzes and exams are due at 11:59pm on the date indicated.&lt;br /&gt;
&lt;br /&gt;
==Session 1: August 23==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Cisco Network Academy Course Enrollment&lt;br /&gt;
* Course Overview, Syllabus and Schedule&lt;br /&gt;
* Introduction to Switching Fundamentals &amp;amp; Intermediate Routing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 2: August 25==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* LAN Design&lt;br /&gt;
**Switched LAN Architecture&lt;br /&gt;
**Matching Switches to Specific LAN Functions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 1: LAN Design&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 3: August 27==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 1 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 4: August 30==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Basic Switch Concepts &amp;amp; Configuration&lt;br /&gt;
**Introduction to Ethernet/802.3 LANs&lt;br /&gt;
**Forwarding Frames Using a Switch&lt;br /&gt;
**Switch Management Configuration&lt;br /&gt;
**Configuring Switch Security&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 5: September 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* VLANs&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 2 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 6: September 3==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 3 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==NO CLASS: September 6==&lt;br /&gt;
* Labor Day - NO CLASS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 7: September 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* VTP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 8: September 10==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 4 Online Assessment&lt;br /&gt;
* Service Project Idea Submitted&lt;br /&gt;
&lt;br /&gt;
==Session 9: September 13==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* STP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 10: September 15==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Inter-VLAN Routing&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 5 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 11: September 17==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 6 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 12: September 20==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Basic Wireless Concepts &amp;amp; Configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==NO CLASS: September 22==&lt;br /&gt;
* Student Success Day - Make sure to attend at least two sessions for homework credit!&lt;br /&gt;
&lt;br /&gt;
==Session 13: September 24==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Chapter 7 Online Assessment&lt;br /&gt;
&lt;br /&gt;
==Session 14: September 27==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Open Lab Time / Project Time&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 15: September 29==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Introduction to Multi-Layer Switching&lt;br /&gt;
* Multi-layer Switching Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
* [http://www.pulsewan.com/data101/pdfs/layer3_switching.pdf Layer-3 Switching: An Introduction by Robert Ciampa]&lt;br /&gt;
* [http://www.cisco.com/application/pdf/paws/41860/howto_L3_intervlanrouting.pdf How To Configure InterVLAN Routing on Layer 3 Switches]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 16: October 1==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Internet History&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 17: October 4==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Introduction to Enterprise Wireless&lt;br /&gt;
* Enterprise Wireless Lab&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 18: October 6==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Internet History&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 19: October 8==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Internet History&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
* Online Final Exam &#039;&#039;&#039;(Open 12:00pm-8:00pm)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Session 20: October 11==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Final Skills Assessment By Appointment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 21: October 13==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Final Skills Assessment By Appointment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Session 22: October 15==&lt;br /&gt;
&#039;&#039;&#039;Topics:&#039;&#039;&#039;&lt;br /&gt;
* Final Skills Assessment By Appointment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Readings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Due:&#039;&#039;&#039;&lt;br /&gt;
*  Lab Reports (All Labs/Homework Due!)&lt;br /&gt;
* CNT Service Project(s)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The instructor reserves the right to modify and adjust the schedule and assignments as needed during the course of this class. The most up to date version will always be available on the course website or from the instructor.&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vt1.jpg&amp;diff=3018</id>
		<title>File:Vt1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vt1.jpg&amp;diff=3018"/>
		<updated>2010-07-31T02:47:30Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3017</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3017"/>
		<updated>2010-07-31T00:34:16Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png|600px|thumb|left|alt text]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3016</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3016"/>
		<updated>2010-07-31T00:33:41Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png|600px*600px|thumb|left|alt text]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3015</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3015"/>
		<updated>2010-07-31T00:32:00Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png|500px|thumb|left|alt text]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3014</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3014"/>
		<updated>2010-07-31T00:31:21Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png|200px|thumb|left|alt text]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3013</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3013"/>
		<updated>2010-07-31T00:22:40Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png]][[File:Cnt_vb2_0001.png]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3011</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3011"/>
		<updated>2010-07-31T00:15:08Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3010</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3010"/>
		<updated>2010-07-31T00:13:34Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[File:Cnt_vb2_0001.png]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3009</id>
		<title>How to Install a Printer</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=How_to_Install_a_Printer&amp;diff=3009"/>
		<updated>2010-07-31T00:12:30Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;VHD Backup&#039;&#039;&#039;==&lt;br /&gt;
ViertuaBox 1 :- Double click Network and select your adapter (Adapter1). &lt;br /&gt;
Under Adapter 1 .&lt;br /&gt;
Attached to - select Host-only Adapter.&lt;br /&gt;
Name - Virtualbox Host-only Ethernet Adapter.&lt;br /&gt;
Click Advanced - choose adapter type and then press OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Cnt_vb2_0001.png]]&lt;br /&gt;
For configuring the network - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under Network and Internet click view network status and tasks  &amp;gt;&amp;gt; double click Local Area connection &amp;gt;&amp;gt; select properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Then Properties.  Depanding on your network type you can assign static IP address by selecting use the following IP address or you can set to obtain an IP address automaticaly.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Follow the same step as VirtualBox 1 for configuring network on ViertualBox 2. &lt;br /&gt;
&lt;br /&gt;
On your local machine - Go to Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; clieck VirtualBox-only Network &amp;gt;&amp;gt; Select Properties &amp;gt;&amp;gt; TCP/IP4 &amp;gt;&amp;gt; Properties then configure the IP settings.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Turn on the network discovery and file sharing on the VirtualBoxs and local machine. You can see all the devices within the network when you turn on network discovery. You can also use the Ping command to check connection between the systems. Check your Firewall,  if Firewall is blocking the network from being discovered.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can view the network map by going to - Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; under Network and Internet double click View network status and tasks &amp;gt;&amp;gt; see ful map.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Once you make sure VirtualBOX 1 and VirtualBox 2 are communicating,  you can backup the image and files from one VirtualBox to VHD of the other VirtualBox using the network. On my case I used CNT_Ente machine as a VirtualBox 2 and CNT_VB1 machine as a VirtualBox 1 which is the machine the VHD attached. &lt;br /&gt;
On VirtualBox 1 (CNT_VB1) attach the VHD to do that go to -&lt;br /&gt;
Start &amp;gt;&amp;gt; Right click Computer &amp;gt;&amp;gt; Manage &amp;gt;&amp;gt; Disk Management &amp;gt;&amp;gt; right click Disk management &amp;gt;&amp;gt; select Attach VHD &amp;gt;&amp;gt; Browse and locate your VHD (C:\VHDs\myvhd.vhd) &amp;gt;&amp;gt; then click Ok.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
For the VHD to be accesed by other machines in the network.&lt;br /&gt;
Computer &amp;gt;&amp;gt; Right click Virtual Hard Disk (myvhd(H:)) &amp;gt;&amp;gt; Properties &amp;gt;&amp;gt; select sharing tab &amp;gt;&amp;gt; In Advanced sharing &amp;gt;&amp;gt; Mark share this folder. &lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Then click Permissions under Advaned sharing&amp;gt;&amp;gt; under permissions - Allow Full control, change and read.&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On VirtualBox 2 (CNT_Ente) to start the backup go to:&lt;br /&gt;
Start &amp;gt;&amp;gt; Control Panel &amp;gt;&amp;gt; Under System and Security click Backup your computer &amp;gt;&amp;gt; Browse and select a network location. You need to provied username and password of VirtualBox 1.&lt;br /&gt;
You can Set up Backup or backup a system image&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Select the network location that you are going to save the backup. To backup system image -&lt;br /&gt;
 Select Create a system image &amp;gt;&amp;gt; On a network location Browse and select VHD (\\Cnt_vb1-pc\h\) &amp;gt;&amp;gt; Then click  OK &amp;gt;&amp;gt;Confirm your backup setting and press Next &amp;gt;&amp;gt;  press Start backup. This will take several minits.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;br /&gt;
Backup on prograss.&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
Once the back is done it will ask you if you want to create a system repair disc?&lt;br /&gt;
￼&lt;br /&gt;
&lt;br /&gt;
￼&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Cnt_vb2_0001.png&amp;diff=3008</id>
		<title>File:Cnt vb2 0001.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Cnt_vb2_0001.png&amp;diff=3008"/>
		<updated>2010-07-31T00:10:18Z</updated>

		<summary type="html">&lt;p&gt;Mtsega: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mtsega</name></author>
	</entry>
</feed>