分享

华为 Router配置采用手工方式建立IPSec隧道

 昵称65145086 2020-03-31

一、组网需求

1、如图所示,RouterA为企业分支网关,RouterB为企业总部网关,分支与总部通过公网建立通信。分支子网为10.1.1.0/24,总部子网为10.1.2.0/24。
企业希望对分支子网与总部子网之间相互访问的流量进行安全保护。分支与总部通过公网建立通信,可以在分支网关与总部网关之间建立一个IPSec隧道来实施安全保护。由于维护网关较少,可以考虑采用手工方式建立IPSec隧道。

2、网络拓扑

3、采用如下思路配置采用手工方式建立IPSec隧道:

配置接口的IP地址和到对端的静态路由,保证两端路由可达。
配置ACL,以定义需要IPSec保护的数据流。
配置IPSec安全提议,定义IPSec的保护方法。
配置安全策略,并引用ACL和IPSec安全提议,确定对何种数据流采取何种保护方法。
在接口上应用安全策略组,使接口具有IPSec的保护功能。

二、操作步骤

1、配置接口IP地址

  1. <Huawei>system-view
  2. [Huawei]sysname RouterA
  3. [RouterA]interface GigabitEthernet 0/0/2
  4. [RouterA-GigabitEthernet0/0/2]ip address 10.1.1.1 24
  5. [RouterA-GigabitEthernet0/0/2]q
  6. [RouterA]interface GigabitEthernet 0/0/1
  7. [RouterA-GigabitEthernet0/0/1]ip address 202.138.163.1 24
  8. [RouterA-GigabitEthernet0/0/1]q
  9. <Huawei>system-view
  10. [Huawei]sysname RouterB
  11. [RouterB]interface GigabitEthernet 0/0/1
  12. [RouterB-GigabitEthernet0/0/1]ip address 202.138.162.1 24
  13. [RouterB-GigabitEthernet0/0/1]q
  14. [RouterB]interface GigabitEthernet 0/0/2
  15. [RouterB-GigabitEthernet0/0/2]ip address 10.1.2.1 24
  16. [RouterB-GigabitEthernet0/0/2]q
  17. <Huawei>system-view
  18. [Huawei]sysname Internet
  19. [Internet]interface GigabitEthernet 0/0/1
  20. [Internet-GigabitEthernet0/0/1]ip address 202.138.163.2 24
  21. [Internet-GigabitEthernet0/0/1]q
  22. [Internet]interface GigabitEthernet 0/0/0
  23. [Internet-GigabitEthernet0/0/0]ip address 202.138.162.2 24
  24. [Internet-GigabitEthernet0/0/0]q

2、配置静态路由

  1. [RouterA]ip route-static 202.138.162.0 255.255.255.0 202.138.163.2
  2. [RouterA]ip route-static 10.1.2.0 255.255.255.0 202.138.163.2
  3. [RouterB]ip route-static 202.138.163.0 255.255.255.0 202.138.162.2
  4. [RouterB]ip route-static 10.1.1.0 255.255.255.0 202.138.162.2
  5. [Internet]ip route-static 10.1.2.0 255.255.255.0 202.138.162.1
  6. [Internet]ip route-static 10.1.1.0 255.255.255.0 202.138.163.1

3、在Router上配置ACL,定义各自要保护的数据流

  1. [RouterA]acl number 3001
  2. [RouterA-acl-adv-3001]rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
  3. [RouterA-acl-adv-3001]q
  4. [RouterB]acl number 3001
  5. [RouterB-acl-adv-3001]rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
  6. [RouterB-acl-adv-3001]q

4、在Router上创建IPSec安全提议

  1. [RouterA]ipsec proposal tran1
  2. [RouterA-ipsec-proposal-tran1]esp authentication-algorithm sha1
  3. [RouterA-ipsec-proposal-tran1]quit
  4. [RouterB]ipsec proposal tran1
  5. [RouterB-ipsec-proposal-tan1]esp authentication-algorithm sha1
  6. [RouterB-ipsec-proposal-tan1]quit

查看

  1. [RouterA]display ipsec proposal name tran1
  2. IPSec proposal name: tran1
  3. Encapsulation mode: Tunnel
  4. Transform : esp-new
  5. ESP protocol : Authentication SHA1-HMAC-96
  6. Encryption DES

5、在Router上配置手工方式安全策略

  1. [RouterA]ipsec policy map1 10 manual
  2. [RouterA-ipsec-policy-manual-map1-10]security acl 3001
  3. [RouterA-ipsec-policy-manual-map1-10]proposal tran1
  4. [RouterA-ipsec-policy-manual-map1-10]tunnel remote 202.138.162.1
  5. [RouterA-ipsec-policy-manual-map1-10]tunnel local 202.138.163.1
  6. [RouterA-ipsec-policy-manual-map1-10]sa spi outbound esp 12345
  7. [RouterA-ipsec-policy-manual-map1-10]sa spi inbound esp 54321
  8. [RouterA-ipsec-policy-manual-map1-10]sa string-key outbound esp simple abc
  9. [RouterA-ipsec-policy-manual-map1-10]sa string-key inbound esp simple cba
  10. [RouterA-ipsec-policy-manual-map1-10]quit
  11. [RouterB]ipsec policy use1 10 manual
  12. [RouterB-ipsec-policy-manual-use1-10]security acl 3001
  13. [RouterB-ipsec-policy-manual-use1-10]proposal tran1
  14. [RouterB-ipsec-policy-manual-use1-10]tunnel remote 202.138.163.1
  15. [RouterB-ipsec-policy-manual-use1-10]tunnel local 202.138.162.1
  16. [RouterB-ipsec-policy-manual-use1-10]sa spi outbound esp 54321
  17. [RouterB-ipsec-policy-manual-use1-10]sa spi inbound esp 12345
  18. [RouterB-ipsec-policy-manual-use1-10]sa string-key outbound esp simple cba
  19. [RouterB-ipsec-policy-manual-use1-10]sa string-key inbound esp simple abc
  20. [RouterB-ipsec-policy-manual-use1-10]quit

查看

  1. [RouterA]display ipsec policy name map1
  2. ===========================================
  3. IPSec policy group: 'map1'
  4. Using interface:
  5. ===========================================
  6. Sequence number: 10
  7. Security data flow: 3001
  8. Tunnel local address: 202.138.163.1
  9. Tunnel remote address: 202.138.162.1
  10. Qos pre-classify: Disable
  11. Proposal name:tran1
  12. Inbound AH setting:
  13. AH SPI:
  14. AH string-key:
  15. AH authentication hex key:
  16. Inbound ESP setting:
  17. ESP SPI: 54321 (0xd431)
  18. ESP string-key: cba
  19. ESP encryption hex key:
  20. ESP authentication hex key:
  21. Outbound AH setting:
  22. AH SPI:
  23. AH string-key:
  24. AH authentication hex key:
  25. Outbound ESP setting:
  26. ESP SPI: 12345 (0x3039)
  27. ESP string-key: abc
  28. ESP encryption hex key:
  29. ESP authentication hex key:

6、在Router接口上引用安全策略组

  1. [RouterA]interface GigabitEthernet 0/0/1
  2. [RouterA-GigabitEthernet0/0/1]ipsec policy map1
  3. [RouterA-GigabitEthernet0/0/1]quit
  4. [RouterB]interface GigabitEthernet 0/0/1
  5. [RouterB-GigabitEthernet0/0/1]ipsec policy use1
  6. [RouterB-GigabitEthernet0/0/1]quit

7、验证结果

配置成功后,在主机PC10.1.1.2上执行ping操作仍然可以ping通主机PC 10.1.2.2,执行命令display ipsec statistics esp可以查看数据包的统计信息

  1. [RouterA]display ipsec sa
  2. ===============================
  3. Interface: GigabitEthernet0/0/1
  4. Path MTU: 1500
  5. ===============================
  6. -----------------------------
  7. IPSec policy name: 'map1'
  8. Sequence number : 10
  9. Acl Group : 3001
  10. Acl rule : 0
  11. Mode : Manual
  12. -----------------------------
  13. Encapsulation mode: Tunnel
  14. Tunnel local : 202.138.163.1
  15. Tunnel remote : 202.138.162.1
  16. Qos pre-classify : Disable
  17. [Outbound ESP SAs]
  18. SPI: 12345 (0x3039)
  19. Proposal: ESP-ENCRYPT-DES-64 ESP-AUTH-SHA1
  20. No duration limit for this SA
  21. [Inbound ESP SAs]
  22. SPI: 54321 (0xd431)
  23. Proposal: ESP-ENCRYPT-DES-64 ESP-AUTH-SHA1
  24. No duration limit for this SA

    本站是提供个人知识管理的网络存储空间,所有内容均由用户发布,不代表本站观点。请注意甄别内容中的联系方式、诱导购买等信息,谨防诈骗。如发现有害或侵权内容,请点击一键举报。
    转藏 分享 献花(0

    0条评论

    发表

    请遵守用户 评论公约

    类似文章 更多