# Lab 1.4
###### tags: `Lab`


## Reset
```
ena
write erase
reload <Read what you get here and think ty>
```
## Flow van het labo
### fase 1:
netwrek intern opzetten
### fase 2:
tunnel opzetten ,maar beide interfaces moeten eerste een dynamisch dhcp address krigjen vanuit het school netwerk, dit zal vervolgens als statisch ingesteld moeten worden
en vervolgens default gateway instellen op die van de klas 172.23.80.1
er mag maar 1 acceslist zijn op de vpn tunnel configuratie en maar 1 acces list naar buiten (met andere woorden, maar 1 keer een weg naar buiten configureren om effetief naar het internet te mogen gaan trafiek tusen bedie sbnetten mag niet ge-nat worden)
Tijdens het spelen met acces lists moet je onthouden dat je die acceslist niet zomaar kan aanpassen
> bij het aanpassen van een acces list is het belangrijk dat je de juiste voglorde hanteerd, deze volgorde is belangrijkt (als je dus iets wilt aanapssen best alles verwijderen en daarna alles weer terug configureren - van de acceslist ofc)
## BRa
```there shall be layout
ena
conf t
no ip domain-lookup
hostname br_a
int fa0/0
desc wan_a
ip add dhcp #ip add 172.23.80.47 255.255.254.0
ip nat outside
no shut
int fa0/1
desc lan_a
ip add 192.168.1.1 255.255.255.0
ip nat inside
no shut
int fa0/3/0
desc lan_c
ip add 192.168.10.1 255.255.255.0
ip nat inside
no shut
ip dhcp excluded-address 192.168.1.1
ip dhcp pool network_br_a
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
dns-server 8.8.8.8
service dhcp
ip dhcp excluded-address 192.168.10.1
ip dhcp pool network_br_c
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 8.8.8.8
service dhcp
ip route 0.0.0.0 0.0.0.0 172.23.80.1
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
crypto isakmp key firewallcx 172.23.80.45
ip access-list extend VPN-TRAFFIC
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
permit ip 192.168.1.0 0.0.0.255 192.168.20.0 0.0.0.255
permit ip 192.168.10.0 0.0.0.255 192.168.2.0 0.0.0.255
permit ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
crypto ipsec transform-set TS esp-3des esp-md5-hmac
crypto map CMAP 10
set peer 172.23.80.45
set transform-set TS
match address VPN-TRAFFIC
int Fa0/0
crypto map CMAP
ip nat inside source list 100 interface fastethernet0/0 overload
access-list 100 remark -=[Define NAT Service]=-
access-list 100 deny ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 100 deny ip 192.168.1.0 0.0.0.255 192.168.20.0 0.0.0.255
access-list 100 deny ip 192.168.10.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 100 deny ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
access-list 100 permit ip 192.168.1.0 0.0.0.255 any
access-list 100 permit ip 192.168.10.0 0.0.0.255 any
access-list 100 remark
end
```
## BRb
```retarded hoe dit zelf werkt kekw
ena
conf t
no ip domain-lookup
hostname br_b
int fa0/0
desc wan_b
ip add dhcp # ip add 172.23.80.45 255.255.254.0
ip nat outside
no shut
int fa0/1
desc lan_b
ip address 192.168.2.1 255.255.255.0
ip nat inside
no shut
ip route 0.0.0.0 0.0.0.0 fa0/0
access-list 1 permit 192.168.2.0 0.0.0.255
ip nat inside source list 1 interface fa0/0 overload
end
```
### Change default route
```
ena
conf t
no ip route 0.0.0.0 0.0.0.0 fa0/0
ip route 0.0.0.0 0.0.0.0 172.23.80.1
```
### Setup VPN
```
no access-list 1
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
crypto isakmp key firewallcx address 172.23.80.47
ip access-list extended VPN-TRAFFIC
permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
crypto ipsec transform-set TS esp-3des esp-md5-hmac
crypto map CMAP 10 ipsec-isakmp
set peer 172.23.80.47
set transform-set TS
match address VPN-TRAFFIC
interface FastEthernet0/0
crypto map CMAP
```
### Setup NAT
```
ip nat inside source list 100 interface fastethernet0/0 overload
access-list 100 remark -=[Define NAT Service]=-
access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 permit ip 192.168.2.0 0.0.0.255 any
access-list 100 remark
```
### Setup extra subnet
```
conf t
int fa0/3/1
desc lan_d
ip add 192.168.20.1 255.255.255.0
ip nat inside
no shut
```
### Setup DHCP
```
ip dhcp excluded-address 192.168.2.1
ip dhcp pool network_br_b
network 192.168.2.0 255.255.255.0
default-router 192.168.2.1
dns-server 8.8.8.8
service dhcp
ip dhcp excluded-address 192.168.20.1
ip dhcp pool network_br_d
network 192.168.20.0 255.255.255.0
default-router 192.168.20.1
dns-server 8.8.8.8
service dhcp
```
### Setup extra VPN shit
```
ip access-list extended VPN-TRAFFIC
permit ip 192.168.2.0 0.0.0.255 192.168.10.0 0.0.0.255
permit ip 192.168.20.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255
no access-list 100
ip nat inside source list 100 interface fastethernet0/0 overload
access-list 100 remark -=[Define NAT Service]=-
access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 100 deny ip 192.168.20.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 100 permit ip 192.168.2.0 0.0.0.255 any
access-list 100 permit ip 192.168.20.0 0.0.0.255 any
access-list 100 remark
```
# Wanker
2c33.11be.f358