Complete the SEED lab found below. Upon successful completion of the lab, you will submit screenshots (pasted into a Microsoft Word document) and then submit to Blackboard as proof of lab completion.
The learning objective of this lab is for students to see how a VPN works in action and how a VPN can help bypass egress firewalls. We will implement a very simple VPN in this lab and use it to bypass firewalls.
A typical VPN depends on two pieces of technologies: IP tunneling and encryption. The tunneling technology is the most essential one to help bypass firewalls; the encryption technology is for protecting the content of the traffic that goes through the VPN tunnel.
For the sake of simplicity, we will only focus on the tunneling part, so the traffic inside our tunnel is not encrypted. We have a separate VPN lab, which covers both tunneling and encryption. If readers are interested, they can work on our VPN lab to learn how to build a complete VPN. In this lab, we only focus on how to use VPN tunnel to bypass firewalls.


0 comments