April 14, 2023, 8:50 a.m. | Ahmet Talha Şen

System Weakness - Medium systemweakness.com

Objectives

Part 1: Establish a Remote Access VPN

Part 2: Capture and Examine Network Traffic

Background / Scenario

In this Packet Tracer activity, you will configure a remote-access VPN client to connect a laptop in the Cafe to a network in the Data Center. You will then use a “sniffer” to observe unencrypted and encrypted traffic.

Part 1: Establish a Remote Access VPN

Step 1: Create a VPN using the Packet Tracer’s VPN client.

C:\>ipconfig

Wireless0 Connection:(default port)

Connection-specific DNS …

access cisco cisco-packet-tracer cybersecurity networking network security packet remote access vpn

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information System Security Engineer 2

@ Wyetech | Annapolis Junction, Maryland

Staff Vulnerability/Configuration Management Security Engineer

@ ServiceNow | Hyderabad, India

Security Engineer

@ AXS | London, England, UK