Ò»¡¢×éÍøÐèÇó

ÈçͼËùʾ£¬Í¨¹ýÔÚNGFWÓëH3C·ÓÉÖ®¼ä½¨Á¢ipsec VPN£¬½«2¸ö¾ÖÓòÍøÁ¬½ÓÆðÀ´£¬ÊµÏÖ192.168.0.0/24Óë192.168.1.0/24Á½¸öÍø¶ÎµÄͨÐÅ¡£

   

¶þ¡¢ÍøÂçÍØÆË

          

          

Èý¡¢ÅäÖÃÒªµã    

       1¡¢ÅäÖÃNGFW1

             1£©»ù±¾ÉÏÍøÅäÖÃ

             2£©IKE½×¶Î1

             3£©IKE½×¶Î2    

             4£©ÅäÖ÷ÓÉ    

              5£©ÅäÖòßÂÔ         

       2¡¢ÅäÖÃH3C·ÓÉÆ÷

   

ËÄ¡¢ÅäÖò½Öè    

1¡¢ÅäÖÃNGFW1    

1)»ù±¾ÉÏÍøÅäÖÃ

ÅäÖÃÏêϸ¹ý³ÌÇë²ÎÕÕ ¡°Â·ÓÉģʽµäÐ͹¦ÄÜ--µ¥ÏßÉÏÍø--¾²Ì¬µØÖ·Ïß·ÉÏÍøÅäÖá°Ò»½Ú£º

½Ó¿ÚIPÅäÖÃÈçÏ£º

    image.png    

·ÓÉÅäÖÃÈçÏÂ

    image.png    

     

2)´´½¨VPN           

½øÈë£ºÍøÂçÅäÖÃ---IPSecÏòµ¼£¬°´ÕÕÏòµ¼µÄÌáʾ½øÐÐÅäÖãº

    image.png              

            Ãû³Æ£º VPN£¬ÓÃÓÚ±êʶ×÷Ó㬽ӿÚģʽÏ£¬½«ÓÃÓÚVPNÐéÄâ½Ó¿ÚµÄÃû×Ö

                   image.png    

            Ô¶³ÌÍø¹Ø£º  ¶Ô¶Ë·À»ðǽµÄÍâÍø½Ó¿ÚµÄ£É£ÐµØÖ·200.1.1.2

¡¡¡¡¡¡  Á÷³ö½Ó¿Ú:  ·À»ðǽÓë¶Ô¶ËÉ豸½¨Á¢VPNËùʹÓõĽӿڣ¬Í¨³£ÎªÍâÍø½Ó¿Ú.

            ÈÏÖ¤·½·¨£º  Óë¹²ÏíÃØÔ¿

            Óë¹²ÏíÃØÔ¿£º  ÃØÔ¿£¬Á½¶ËÉ豸Ïàͬ¼´¿É¡£

                 image.png        

          ±¾µØÍâÁª¶Ë¿Ú£º  ÄÚÍøËùÔڵĽӿÚ

          ±¾µØ×ÓÍø£º ±¾µØÍøÂçËù±£»¤µÄ×ÓÍø£¬¸Ã²ÎÊýÓÃÓÚÅäÖÃÍøÂçµÄIPSEC¸ÐÐËȤÁ÷

          Ô¶³Ì×ÓÍø£º Ô¶³ÌÍøÂçËù±£»¤µÄ×ÓÍø£¬¸Ã²ÎÊýÓÃÓÚÅäÖÃÍøÂçµÄIPSEC¸ÐÐËȤÁ÷

   

          µã»÷ ¡®Íê³É¡£

                 image.png    

   

            3)ÐÞ¸ÄVPN²ÎÊý£¨¿ÉÑ¡£¬±¾ÀýÖÐÎÞÐèÐ޸ģ©        ÈçÐèÒª£¬¿ÉÒÔË«»÷ÉÏͼÖеÄvpnÀ´Ð޸IJÎÊý¡£

                image.png    

         ¸ü¶àÓйØIPSEC½×¶Î1ºÍ½×¶Î2 µÄ²ÎÊý¿ÉÒÔͨ¹ýµã»÷¡®×ª»»Îª×Ô¶¨ÒåͨµÀ¡¯À´½øÐÐÐ޸ġ£

               image.png    

               image.png

                image.png

                image.png

                image.png         

            Ãû³Æ£º VPN£¬ÓÃÓÚ±êʶ×÷Ó㬽ӿÚģʽÏ£¬½«ÓÃÓÚVPNÐéÄâ½Ó¿ÚµÄÃû×Ö

            Ô¶³ÌÍø¹Ø£º  ¾²Ì¬IPµØÖ·

            IPµØÖ·£º ¶Ô¶Ë·À»ðǽµÄÍâÍø½Ó¿ÚµÄ£É£ÐµØÖ·£¬200.1.1.2

¡¡¡¡¡¡  ½Ó¿Ú:  ·À»ðǽÓë¶Ô¶ËÉ豸½¨Á¢VPNËùʹÓõĽӿڣ¬Í¨³£ÎªÍâÍø½Ó¿Ú.

            NAT´©Ô½£º  Èç¹ûVPNÉ豸֮¼äÓÐNAT£¬ÔòÐèÒª¹´Ñ¡¡£

¡¡¡¡¡¡  ±£³Ö´æ»îƵÂÊ:  ͨ¹ý·¢ËÍÊý¾Ý°üÀ´±£³ÖNATµÄת»»µÄ´æ»î£¬·ÀÖ¹NAT±í³¬Ê±¶øÏûʧ

            ÈÏÖ¤·½Ê½£º  Óë¹²ÏíÃØÔ¿

            Ô¤¹²ÏíÃØÔ¿£º  ÃØÔ¿£¬Á½¶ËÉ豸Ïàͬ¼´¿É          

     

            ÆäËû²ÎÊýÊÊÓÃĬÈϲÎÊý£¬²ÎÊýϸ½ÚÇë²Î¿¼¡¶½×¶Î1²ÎÊý¡·Ò»½Ú      

   

           ¿ÉÒÔµã»÷  ½×¶Î2 Ñ¡ÔñÆ÷ ÏÂÃæµÄ ¡®±à¼­¡¯°´Å¥À´±à¼­½×¶Î2.²ÎÊý£¬Îñ±Ø¹´Ñ¡ ¡®×Ô¶¯ÃÜÔ¿±£³Ö´æ»î¡¯¡£

   

    4£©ÅäÖÃvpn·ÓɺͲßÂÔ

          ¸Ã²¿·ÖÅäÖÃÓÉÏòµ¼×Ô¶¯Íê³É£¬¿ÉÒÔµã»÷²é¿´£¬²¢¸ù¾ÝÒªÇó½øÐÐÐ޸ġ£

            ·ÓÉ£º  ÍøÂçÉèÖÃ--·ÓÉ--¾²Ì¬Â·ÓÉ

                image.png   

       VPN·ÃÎʲßÂÔ£ºVPNÏòµ¼×Ô¶¯Éú³ÉËùÐèµÄ·À»ðǽµØÖ·¶ÔÏóºÍ²ßÂÔ¡£

            ²Ëµ¥£º °²È«²ßÂÔ--²ßÂÔ---²ßÂÔ£¬Ä¬ÈÏΪȫͨ²ßÂÔ£¬¿É¸ù¾ÝÒµÎñÐèÇóÀ´¶Ô²ßÂÔ½øÐÐÐ޸ġ£

            image.png

2¡¢ÅäÖÃH3C·ÓÉÆ÷

acl number 3001                                         //¶¨Òåacl£¬ÓëRGWµÄ¿ìËÙÑ¡ÔñÆ÷Ïà¶ÔÓ¦£¬¶¨ÒåIPsec¼ÓÃÜÁ÷¡£

 rule 1 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255

#                            

ike peer xzxfj                                               //¶¨Òå½×¶Î1

 exchange-mode aggressive                        //Ò°Âùģʽ     

 pre-shared-key simple xzfgw@123            //Ô¤¹²ÏíÃÜÔ¿

 id-type name

 remote-name xzxfj1

 remote-address 100.1.1.2                           //Ô¶³ÌÍø¹ÜµØÖ·£¬RGWµÄÍâÍø¿ÚµØÖ·

 local-address 202.1.1.2                               // ±¾µØµØÖ·

 dpd 1                                                         //ÊÇ·ñ¿ªÆôdpd

 nat traversal                                                //ÊÇ·ñ¿ªÆônat´©Ô½

#

ipsec proposal xzxfj                                      //¶¨Òå½×¶Î2

 transform esp                                              //¶¨Òå½×¶Î2ʹÓõķâװģʽ£¬RGWĬÈÏʹÓÃESP    

 esp authentication-algorithm sha1

#

ipsec policy test 1 isakmp                               //¶¨Òåipsec ²ßÂÔ£¬ acl 3001µÄÊý¾ÝÁ÷»áÆ¥ÅäÏàÓ¦µÄ½×¶Î1ºÍ½×¶Î2

 security acl 3001

 ike-peer xzxfj

 proposal xzxfj

#

interface GigabitEthernet0/0                              //ÄÚÍø½Ó¿Ú

 port link-mode route

 description Link_To_NE40-E1/1/15

 ip address 192.168.1.0 255.255.255.0

 tcp mss 1300

#

interface GigabitEthernet0/1                              //»¥ÁªÍø½Ó¿Ú

 port link-mode route

 description Link_To_Internet

 ip address 202.1.1.2 255.255.255.192

 tcp mss 1300

 ipsec policy test                                                //ipsec ²ßÂÔÓ¦Óõ½ÍâÍø½Ó¿ÚÉÏ

#

 ip route-static 0.0.0.0 0.0.0.0 202.1.1.1              //ÅäÖÃĬÈÏÍø¹Ø

#    

     

Îå¡¢¼ì²éÅäÖýá¹û   

²é¿´VPN¼àÊÓÆ÷£¬¹Û²ì״̬£º ½øÈë¡°ÐéÄâ×¨Íø¡±--¡°¼àÊÓÆ÷¡±--"IPsec¼à²â¡±    

    

Á½¸öÍøÂç²ÉÓà ping²âÊÔ·½Ê½£¬192.168.1.0/24ºÍ192.168.0.0/24Á½¸öÄÚÍø¿ÉÒÔÏ໥·ÃÎÊ¡£

   

             h3c·ÓÉÆ÷²Î¿¼ÃüÁî:

            £¨1£©display ipsec sa

            <H3C>dis ipsec sa

                

            Interface: Ethernet3/0

                path MTU: 1500

                

              -----------------------------

              IPsec policy name: "ipsec"         

              sequence number: 10               

              mode: isakmp                       

              -----------------------------

                connection id: 3    

                encapsulation mode: tunnel      

                perfect forward secrecy: None

                tunnel:

                    local  address: 10.0.0.1     

                    remote address: 10.0.0.2     

                flow:    (0 times matched)       

                    sour addr: 192.168.0.0/255.255.255.0  port: 0  protocol: IP

                    dest addr: 10.0.0.2/255.255.255.255  port: 0  protocol: IP

                

                [inbound ESP SAs]             

                  spi: 198902729 (0xbdb03c9)

                  proposal: ESP-ENCRYPT-DES ESP-AUTH-MD5

                  sa key duration (bytes/sec): 1887436800/3600

                  sa remaining key duration (bytes/sec): 1887436800/3595

                  max received sequence-number: 1

                  udp encapsulation used for nat traversal: N

                

                [outbound ESP SAs]              

                  spi: 1513366915 (0x5a342583)

                  proposal: ESP-ENCRYPT-DES ESP-AUTH-MD5

                  sa key duration (bytes/sec): 1887436800/3600

                  sa remaining key duration (bytes/sec): 1887436800/3595

                  max sent sequence-number: 1

                  udp encapsulation used for nat traversal: N

            £¨2£©display ipsec sa brief

            <H3C>dis ipsec sa br

            total phase-2 SAs: 2

            Src Address     Dst Address     SPI        Protocol  Algorithm

            -------------------------------------------------------------------------------------

            10.0.0.1        10.0.0.2        1513366915 ESP       E:DES;

                                                              A:HMAC-MD5-96;

            10.0.0.2        10.0.0.1        198902729  ESP       E:DES;

                                                              A:HMAC-MD5-96;

            £¨3£©display ike sa

            <H3C>dis ike sa

            total phase-1 SAs:  1

               connection-id     peer            flag        phase   doi

              ------------------------------------------------------------------------------------------------------

                 3             10.0.0.2        RD|ST         2     IPSEC

                 2             10.0.0.2        RD|ST         1     IPSEC

                

            £¨4£©display ipsec statistics all

            <H3C>dis ipsec statistics all

              the security packet statistics:

            input/output security packets: 10/10         

                input/output security bytes: 840/840        

                input/output dropped security packets: 0/1

                dropped security packet detail:             

                  no enough memory: 0

                  can't find SA: 1

                  queue is full: 0

                  authentication is failed: 0

                  wrong length: 0

                  replay packet: 0

                  too long packet: 0

                  wrong SA: 0

            Èç¹ûÏëÇå¿ÕÊý¾ÝÒÔ±ãÖØÐÂͳ¼Æ£¬¿ÉÔËÐÐÃüÁreset ipsec statistics¡£