Question: Part 3 : Verify Your VPN Implementation using WiresharkNow that your VPN client has been configured, your final task is to validate the implementation. Your

Part 3: Verify Your VPN Implementation using WiresharkNow that your VPN client has been configured, your final task is to validate the implementation. Your plan is to analyze isakmp packets using Wireshark to confirm your ECDH selection is being used for the IKE exchange, and to confirm that the connection is able to renew its IPsec Security Associations following your PFS deployment. For testing purposes, the VPN server has been configured with a 20 second lifetime in order to force frequent tunnel recreation phases.Open Wireshark and start a packet capture on the Student interface. Then, connect to your VPN using the credentials remotetester01/ password1. Once connected, filter isakmp frames in Wireshark and wait for at least one CREATE_CHILD_SA exchange to take place (an exchange refers to an Responder Request followed by a Initiator Response) before ending your capture. These exchanges represent the renewal/rekeying of the IKE and IPsec SAs.1. Make a screen capture showing the CREATE_CHILD_SA exchangeAt the beginning of the capture, select the IKE_SA_INIT Responder Response frame, expand the ISAKMP section in the packet details pane, and search for the Security Association payload. Within the SA payload, search the accepted proposal for the Transform ID (D-H) field to see which DH algorithm has been selected for the IKE SA.2. Make a screen capture showing the selected Diffie-Hellman transform.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!