This case study is done in max of 3 students per group/pod. If you dont manage to complete the case
study during the lab hours, you can return a report with the configuration file including some
screenshots via email either to marko.uusitalo(at)metropolia.fi or bruk.yirdaw(at)metropolia.fi along
with the group members names.
Refer to the topology 1 below and connect and configure the devices to build a site-to-site VPN
between Palo Alto 200 and either Cisco ASA 5505 or Juniper SRX 210 within the same pod.
Refer to the table 1 and 2 for the address table and IP Subnet per pod respectively.
Topology 1
Note: the IP address you configure to the E0/3 on the PA 200 connecting to the Test Network is
10.94.33.pod#. The IP address you will configure on the Routers FastEthernet 0/0 connecting to the
Test Network is 10.94.33.1pod#.
Tasks
Part I: Basic setup
Cable the network as shown in topology 1
Configure all the PCs to obtain IP address from the DHCP from the directly connected
security devices
Once you have outside access from PC 2 in the DMZ, download run a web server
(SimpleServer) on PC 2
Run the Kiwi Syslog from the Desktop of PC2
Configure basic configurations on the router (host names, interface IP addresses)
Configure a static default route pointing to 10.94.33.254
Verify connectivity by pinging outside world 8.8.8.8