Click Launch Easy VPN Server Wizard. In the Command Delivery Status window, click OK. When the message Select Pre-shared Keys for the authentication type and click Next to continue.

CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 26 `

b. Click Launch Easy VPN Server Wizard.

c. The Easy VPN Server wizard checks the router configuration to see if AAA is enabled. If not, the Enable AAA window displays. AAA must be enabled on the router before the Easy VPN Server configuration starts. Click Yes to continue with the configuration. d. If prompted to deliver the configuration to the router, click Deliver.

e. In the Command Delivery Status window, click OK. When the message

“AAA has been successfully enabled on the router ” displays, click OK. f. Now that AAA is enabled, you can start the Easy VPN Server wizard by clicking Next in the Welcome window. Read through the descriptions of the tasks that the wizard guides you through. CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 26 How does the client receive the IPsec policies? They are centrally managed and pushed to the client by the server. How does the Easy VPN remote server configuration differ from the site-to-site? Both configure IKE polices and IPsec transforms. The remote access server configures a virtual template interface and authentication, group policy lookup, and user authentication, among others. g. Click Next when you are finished answering the above questions. Step 2: Configure the virtual tunnel interface and authentication a. Select the Serial000 interface from the pull-down menu as the interface for the Easy VPN Server. This is the interface on which the client connections terminate.

b. Select Pre-shared Keys for the authentication type and click Next to continue.

CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 26 Step 3: Select the IKE proposal. a. In the Internet Key Exchange IKE Proposals window, the default IKE proposal is used for R2. What is the encryption method used with the default IKE policy? 3DES CCNA Security All contents are Copyright © 1992 –2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 26 What is the hash algorithm used to ensure that the keys have not been tampered with? SHA_1 b. Click Next to accept the default IKE policy. Note: Configurations on both sides of the tunnel must match exactly. However, the Cisco VPN client automatically selects the proper configuration for itself. Therefore, no IKE configuration is necessary on the client PC. Step 4: Select the transform set. a. In the Transform Set window, the CCP default transform set is used. What is the ESP encryption method used with the default transform set? ESP_3DES

b. Click Next to accept the default transform set.