Packet Tracer Lab 6 - Remote Access VPN

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 มิ.ย. 2024
  • The sixth video in a series that demonstrates how to configure network infrastructure devices using Cisco Packet Tracer. Each video in the series builds upon the previous video, the network evolves step by step introducing important principles and technologies. This video looks at configuring a remote access VPN, this is somewhat more complex than the previous videos (but great fun).

ความคิดเห็น • 21

  • @renevanderkraats3811
    @renevanderkraats3811 8 ปีที่แล้ว +1

    Hi Kevin, thanks for this explanation! It has really helped me configuring my ISR at home. I'm a Cisco-newbie, but your clear explanations made all the puzzle pieces fall into place. I'm gonna check out all the other Packet Tracer Labs for sure!

  • @nick0703
    @nick0703 3 ปีที่แล้ว

    Thanks so much for these videos - this helped me loads with my uni work

  • @kevinlarge5220
    @kevinlarge5220 8 ปีที่แล้ว +1

    Many thanks for your kind comments, it is great to get feedback on the videos. I do intend to make more in the future, I would like to complete a series on routing and routing technologies next. I have been extremely busy at work the last few months and will be for a little while yet, but I will get back to making videos as soon as I can. Best wishes to you all. Kevin

    • @jakexie2093
      @jakexie2093 7 ปีที่แล้ว

      thank you Kelvin, your videos are so awesome and helpful!!! hope to see more :)

  • @AMD64EVER
    @AMD64EVER 8 ปีที่แล้ว

    I see that this is the last video of the course and I want to thank you very much for making these! I'm not a network admin but am trying to get my CCNA and these videos have been incredibly helpful in trying to understand how Packet Tracer works and how to build a base network to practice with!

  • @ridlesambow3729
    @ridlesambow3729 2 ปีที่แล้ว

    This is very helpful as quick refresh for VPN configuration.. Hope you got more views, keep doing the good stuff!!

  • @00antoni
    @00antoni 8 ปีที่แล้ว

    Excellent!

  • @madscientist338
    @madscientist338 2 ปีที่แล้ว

    It was extremely helpful, thx

  • @BoyHell1996
    @BoyHell1996 3 ปีที่แล้ว

    Super good tutorial. The speaking could have been better if you didn't hiss. And I feel like the video duration could have been shorter too. But the config is working damn fine. Mucha gracias.

  • @fbifido2
    @fbifido2 5 ปีที่แล้ว +1

    @3:25 - why did you connect the Cloud-PT to the corporate router?
    I thing it should be connected to the ISP router, and the ISP router should be issuing ip-address to the client pc.

  • @aishamaukembayeva5861
    @aishamaukembayeva5861 4 ปีที่แล้ว

    Thanks a lot for this video. I was able to configure this lab on a Cisco Packet Tracer. When I tried to do the same on the real equipment using a private IP address for testing, AnyConnect gave me a network connetivity issue. Should I do any additional configuration on a router and AnyConnect? I would be grateful if you could help me to resolve this issue.

  • @fbifido2
    @fbifido2 5 ปีที่แล้ว

    The Access Point & DSL-modem devices doesn't offer the option for DHCP/DNS like in real devices?

  • @mr.compnet2263
    @mr.compnet2263 ปีที่แล้ว

    Hi @REMOTETRAININGSOLUTIONS, would like to ask. How do we do if we have two or more remote access client devices wants to get different ip from different vlan inside network?

  • @glebaskovalenka264
    @glebaskovalenka264 6 ปีที่แล้ว

    I followed all the instructions, but when I am trying to connect to VPN tunnel from PC host, I always get: "VPN is Disconnected" and "Connection Time Out". From the router where VPN and crypto were configured, I can see the deleted connection there. Why does it get deleted? Did I miss something in configuration?

    • @sanskarsingh9538
      @sanskarsingh9538 5 ปีที่แล้ว

      make sure you select correct interface in the second last step. It is supposed to be your corporate outbound interface. If it still doesn't work, try redoing configurations.

  • @turnthatprop
    @turnthatprop 7 ปีที่แล้ว

    I have attempted your configuration, however when I get to the entry for "crypto map CLIENT_MAP 10 ipsec-isakmp dynamic DYNMAP" I get the following error: "Attempt to change dynamic map tag for existing crypto map is ignored".
    Any suggestions?

    • @remotetrainingsolutions6855
      @remotetrainingsolutions6855  7 ปีที่แล้ว

      From the message you mention it sounds like you may have already entered the crypto command but with a slightly different name for the dynamic map tag "DYNMAP". Best thing to do is to type show running-config from privileged exec mode and double check the tags. It's normally easy to find this in the running configuration.

    • @turnthatprop
      @turnthatprop 7 ปีที่แล้ว

      RemoteTrainingSolutions No, it actually wasn't that... I did it 5 or 6 times thinking I was an idiot and made a typo. Turns out it must be a bug in Packet Tracer. I received my Cisco 1941 this week and your config worked immediately.
      Also of note is that when connecting from most older gen clients (mac osx ipsec client) that the newer DH groups, encryption and hashing won't work, though I believe that has changed in the latest version. Had you not done yours in the config you did, I wouldn't have been able to connect from my mac!
      Cheers!

    • @remotetrainingsolutions6855
      @remotetrainingsolutions6855  7 ปีที่แล้ว

      Hi turnthatprop, that is very interesting, thanks for sharing the information. I noticed that occasionally when working on more complex Packet Tracer exercises something that worked on one version of Packet Tracer played up or didn't work on another version. Great that it worked fine on the 1941, it would have been very worrying if it had not ;-) Best wishes Kevin