eNSP—防火墙+IPSec 站点到站点的虚拟专用网络

拓扑如下:
在这里插入图片描述
组网需求:
1、FW1内部网络172.16.1.0/24模拟站点一内部网络,pc1模拟站点一内部客户端。
2、FW2内部网络192.168.1.0/24模拟站点二内部网络,pc2模拟站点二内部客户端。
3、10.0.12.0/24和10.0.23.0/24网络模拟互联网,Internet路由器模拟互联网路由器。
4、本IPSec VPN组网的通信网络为192.168.1.0/24和172.16.1.0/24(感兴趣流),加密点为两个防火墙的外部接口地址。
4、PC1可以与PC2互通。

【1】FW1的配置命令:
#基本配置

[SRG]sysname fw1
[fw1]int g0/0/1
[fw1-GigabitEthernet0/0/1]ip add 172.16.1.254 24
[fw1-GigabitEthernet0/0/1]int g0/0/2
[fw1-GigabitEthernet0/0/2]ip add 10.0.12.1 24
[fw1-GigabitEthernet0/0/2]quit

[fw1]ip route-static 0.0.0.0 0.0.0.0 10.0.12.2

#配置接口加入到相应的安全区域

[fw1]firewall zone trust 
[fw1-zone-trust]add interface g0/0/1
[fw1-zone-trust]quit
[fw1]firewall zone untrust 
[fw1-zone-untrust]add interface g0/0/2
[fw1-zone-untrust]quit

【2】采用IKE安全策略方式建立IPSec隧道主要配置如下:

#配置访问控制列表匹配两端通信网络之间的IPSec VPN加密感兴趣流

[fw1]acl 3000
[fw1-acl-adv-3000]rule 5 permit ip source 172.16.1.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

#配置ike安全提议

[fw1]ike proposal 10
[fw1-ike-proposal-10]encryption-algorithm 3des-cbc 
[fw1-ike-proposal-10]dh group2
[fw1-ike-proposal-10]authentication-algorithm md5
[fw1-ike-proposal-10]quit

#配置ike Peer

[fw1]ike peer fw2	
[fw1-ike-peer-fw2]pre-shared-key qyt
[fw1-ike-peer-fw2]ike-proposal 10
[fw1-ike-peer-fw2]remote-address 10.0.23.1
[fw1-ike-peer-fw2]quit

#配置IPSec安全提议

[fw1]ipsec proposal qyt1	
[fw1-ipsec-proposal-qyt1]esp authentication-algorithm sha1 
[fw1-ipsec-proposal-qyt1]esp encryption-algorithm aes 
[fw1-ipsec-proposal-qyt1]quit

#配置IPSec安全策略组

[fw1]ipsec policy qytmap 10 isakmp 	
[fw1-ipsec-policy-isakmp-qytmap-10]security acl 3000
[fw1-ipsec-policy-isakmp-qytmap-10]ike-peer fw2
[fw1-ipsec-policy-isakmp-qytmap-10]proposal qyt1
[fw1-ipsec-policy-isakmp-qytmap-10]quit

#在接口上应用安全策略组

[fw1]int g0/0/2
[fw1-GigabitEthernet0/0/2]ipsec policy qytmap
[fw1-GigabitEthernet0/0/2]quit

【3】防火墙的域间策略主要配置如下:

#配置local区与untrust区的zone间策略
#放行untrust区到local区双方向的远端加密点到本端加密点的esp和ike流量

[fw1]policy interzone local untrust outbound 
[fw1-policy-interzone-local-untrust-outbound]policy 2	
[fw1-policy-interzone-local-untrust-outbound-2]policy source 10.0.12.1 0	
[fw1-policy-interzone-local-untrust-outbound-2]policy destination 10.0.23.1 0
[fw1-policy-interzone-local-untrust-outbound-2]policy service service-set ike 	
[fw1-policy-interzone-local-untrust-outbound-2]policy service service-set esp 
[fw1-policy-interzone-local-untrust-outbound-2]action permit 
[fw1-policy-interzone-local-untrust-outbound-2]quit
[fw1-policy-interzone-local-untrust-outbound]quit

[fw1]policy interzone untrust local inbound 
[fw1-policy-interzone-local-untrust-inbound]policy 2
[fw1-policy-interzone-local-untrust-inbound-2]policy source 10.0.23.1 0
[fw1-policy-interzone-local-untrust-inbound-2]policy destination 10.0.12.1 0
[fw1-policy-interzone-local-untrust-inbound-2]policy service service-set ike 	
[fw1-policy-interzone-local-untrust-inbound-2]policy service service-set esp 
[fw1-policy-interzone-local-untrust-inbound-2]action permit 

#配置trust区与untrust区的zone间策略
#放行untrust区和trust区双方向上通信网络之间的流量

[fw1]policy interzone untrust trust inbound 	
[fw1-policy-interzone-trust-untrust-inbound]policy 1
[fw1-policy-interzone-trust-untrust-inbound-1]policy source 192.168.1.1 0	
[fw1-policy-interzone-trust-untrust-inbound-1]policy destination 172.16.1.1 0
[fw1-policy-interzone-trust-untrust-inbound-1]action permit 
[fw1-policy-interzone-trust-untrust-inbound-1]quit
[fw1-policy-interzone-trust-untrust-inbound]quit
[fw1]policy interzone trust untrust outbound 
[fw1-policy-interzone-trust-untrust-outbound]policy 1
[fw1-policy-interzone-trust-untrust-outbound-1]policy source 172.16.1.1 0
[fw1-policy-interzone-trust-untrust-outbound-1]policy destination 192.168.1.1 0	
[fw1-policy-interzone-trust-untrust-outbound-1]action permit

【4】FW2的配置命令:
#基本配置

[SRG]sysname fw2
[fw2]int g0/0/1
[fw2-GigabitEthernet0/0/1]ip add 192.168.1.254 24
[fw2-GigabitEthernet0/0/1]int g0/0/2
[fw2-GigabitEthernet0/0/2]ip add 10.0.23.1 24
[fw2-GigabitEthernet0/0/2]quit

[fw2] ip route-static 0.0.0.0 0.0.0.0 10.0.23.2

#配置接口加入到相应的安全区域

[fw2]firewall zone trust 
[fw2-zone-trust]add interface g0/0/1
[fw2-zone-trust]quit
[fw2]firewall zone untrust 
[fw2-zone-untrust]add interface g0/0/2
[fw2-zone-untrust]quit

【5】采用IKE安全策略方式建立IPSec隧道主要配置如下:

#配置访问控制列表匹配两端通信网络之间的IPSec VPN加密感兴趣流

[fw2]acl 3000
[fw2-acl-adv-3000]rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 172.16.1.0 0.0.0.255
[fw2-acl-adv-3000]quit

#配置ike安全提议

[fw2]ike proposal 10
[fw2-ike-proposal-10]encryption-algorithm 3des-cbc 	
[fw2-ike-proposal-10]dh group2
[fw2-ike-proposal-10]authentication-algorithm md5 
[fw2-ike-proposal-10]quit

#配置ike Peer

[fw2]ike peer fw1	
[fw2-ike-peer-fw1]pre-shared-key qyt
[fw2-ike-peer-fw1]ike-proposal 10
[fw2-ike-peer-fw1]remote-address 10.0.12.1
[fw2-ike-peer-fw1]quit

#配置IPSec安全提议

[fw2]ipsec proposal qyt1	
[fw2-ipsec-proposal-qyt1]esp authentication-algorithm sha1 
[fw2-ipsec-proposal-qyt1]esp encryption-algorithm aes 
[fw2-ipsec-proposal-qyt1]quit

#配置IPSec安全策略组

[fw2]ipsec policy qytmap 10 isakmp 	
[fw2-ipsec-policy-isakmp-qytmap-10]security acl 3000
[fw2-ipsec-policy-isakmp-qytmap-10]ike-peer fw1
[fw2-ipsec-policy-isakmp-qytmap-10]proposal qyt1
[fw2-ipsec-policy-isakmp-qytmap-10]quit

#在接口上应用安全策略组

[fw2]int g0/0/2
[fw2-GigabitEthernet0/0/2]ipsec policy qytmap

【6】防火墙的域间策略主要配置如下:

#配置local区与untrust区的zone间策略
#放行untrust区到local区双方向的远端加密点到本端加密点的esp和ike流量

[fw2]policy interzone local untrust outbound 
[fw2-policy-interzone-local-untrust-outbound]policy 2	
[fw2-policy-interzone-local-untrust-outbound-2]policy source 10.0.23.1 0	
[fw2-policy-interzone-local-untrust-outbound-2]policy destination 10.0.12.1 0
[fw2-policy-interzone-local-untrust-outbound-2]policy service service-set ike 
[fw2-policy-interzone-local-untrust-outbound-2]policy service service-set esp 	
[fw2-policy-interzone-local-untrust-outbound-2]action permit 
[fw2-policy-interzone-local-untrust-outbound-2]quit
[fw2-policy-interzone-local-untrust-outbound]quit
[fw2]policy interzone untrust local inbound 
[fw2-policy-interzone-local-untrust-inbound]policy 2
[fw2-policy-interzone-local-untrust-inbound-2]policy source 10.0.12.1 0
[fw2-policy-interzone-local-untrust-inbound-2]policy destination 10.0.23.1 0
[fw2-policy-interzone-local-untrust-inbound-2]policy service service-set ike 
[fw2-policy-interzone-local-untrust-inbound-2]policy service service-set esp 
[fw2-policy-interzone-local-untrust-inbound-2]action permit 

#配置trust区与untrust区的zone间策略
#放行untrust区和trust区双方向上通信网络之间的流量

[fw2]policy interzone trust untrust outbound 
[fw2-policy-interzone-trust-untrust-outbound]policy 1
[fw2-policy-interzone-trust-untrust-outbound-1]policy source 192.168.1.1 0
[fw2-policy-interzone-trust-untrust-outbound-1]policy destination 172.16.1.1 0	
[fw2-policy-interzone-trust-untrust-outbound-1]action permit 
[fw2-policy-interzone-trust-untrust-outbound-1]quit
[fw2-policy-interzone-trust-untrust-outbound]quit
23:11:27  2022/03/02
[fw2]policy interzone untrust trust inbound 
[fw2-policy-interzone-trust-untrust-inbound]policy 1
[fw2-policy-interzone-trust-untrust-inbound-1]policy source 172.16.1.1 0
[fw2-policy-interzone-trust-untrust-inbound-1]policy destination 192.168.1.1 0
[fw2-policy-interzone-trust-untrust-inbound-1]action permit 

【7】AR1的配置命令:

[Huawei]int g0/0/1
[Huawei-GigabitEthernet0/0/1]ip add 10.0.12.2 24
[Huawei-GigabitEthernet0/0/1]quit
[Huawei]int g0/0/2
[Huawei-GigabitEthernet0/0/2]ip add 10.0.23.2 24
[Huawei-GigabitEthernet0/0/2]quit	

[Huawei]ip route-static 192.168.1.0 24 10.0.23.1	
[Huawei]ip route-static 172.16.1.0 24 10.0.12.1

实验结果:PC1可以ping通PC2
在这里插入图片描述

!!!
PS:在防火墙策略那边使用不了ike的解决方法(如果没有自定义ike服务,策略那边就会使用不了ike),使用这两条命令去定义:
[FW1]ip service-set ike type object
[FW1-object-service-set-ike]service 0 protocol udp source-port 0 to 65535 destination-port 500
在这里插入图片描述

评论 7
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值