USG6000V通过IKE方式协商IPSec(采用预共享秘钥认证)

网络拓扑:

操作步骤

一、配置FW1

1、配置接口IP地址

<USG6000V1>system-view
[USG6000V1]sysname FW1
[FW1]interface  GigabitEthernet  1/0/1
[FW1-GigabitEthernet1/0/1]ip address  1.1.1.1 24
[FW1-GigabitEthernet1/0/1]q

[FW1]interface  GigabitEthernet  1/0/3
[FW1-GigabitEthernet1/0/3]ip address  192.168.1.254 24
[FW1-GigabitEthernet1/0/3]q

2、配置接口加入对于安全区域

[FW1]firewall zone  trust
[FW1-zone-trust]add  interface  GigabitEthernet  1/0/3
[FW1-zone-trust]q

[FW1]firewall zone  untrust
[FW1-zone-untrust]add  interface  GigabitEthernet  1/0/1
[FW1-zone-untrust]q

3、配置域间安全策略(配置Local域和Untrust域的域间安全策略的目的为允许IPSec隧道两端设备通信,使其能够进行隧道协商。)

[FW1]security-policy
[FW1-policy-security]rule name policy1	
[FW1-policy-security-rule-policy1]source-zone  trust
[FW1-policy-security-rule-policy1]destination-zone untrust
[FW1-policy-security-rule-policy1]source-address 192.168.1.0 24
[FW1-policy-security-rule-policy1]destination-address 172.16.1.0 24
[FW1-policy-security-rule-policy1]action permit
[FW1-policy-security-rule-policy1]q

[FW1-policy-security]rule name policy2	
[FW1-policy-security-rule-policy2]source-zone  untrust	
[FW1-policy-security-rule-policy2]destination-zone trust
[FW1-policy-security-rule-policy2]source-address 172.16.1.0 24
[FW1-policy-security-rule-policy2]destination-address 192.168.1.0 24
[FW1-policy-security-rule-policy2]action permit 
[FW1-policy-security-rule-policy2]q

[FW1-policy-security]rule name policy3	
[FW1-policy-security-rule-policy3]source-zone local
[FW1-policy-security-rule-policy3]destination-zone untrust
[FW1-policy-security-rule-policy3]source-address 1.1.1.1 32	
[FW1-policy-security-rule-policy3]destination-address 2.2.2.1 32
[FW1-policy-security-rule-policy3]action permit 
[FW1-policy-security-rule-policy3]q

[FW1-policy-security]rule name policy4
[FW1-policy-security-rule-policy4]source-zone untrust
[FW1-policy-security-rule-policy4]destination-zone local
[FW1-policy-security-rule-policy4]source-address 2.2.2.1 32	
[FW1-policy-security-rule-policy4]destination-address 1.1.1.1 32
[FW1-policy-security-rule-policy4]action permit 
[FW1-policy-security-rule-policy4]q

4、配置静态路由

[FW1]ip route-static 0.0.0.0 0 1.1.1.2

5、定义被保护的数据流

[FW1]acl 3000
[FW1-acl-adv-3000]rule permit ip source 192.168.1.0 0.0.0.255 destination  172.16.1.0 0.0.0.255
[FW1-acl-adv-3000]q

6、配置IPSec安全提议

[FW1]ipsec proposal tran1	
[FW1-ipsec-proposal-tran1]esp authentication-algorithm sha2-256	
[FW1-ipsec-proposal-tran1]esp encryption-algorithm aes-256 
[FW1-ipsec-proposal-tran1]q

7、配置Ike安全提议

[FW1]ike proposal 10
[FW1-ike-proposal-10]authentication-method pre-share
[FW1-ike-proposal-10]authentication-algorithm sha2-256
[FW1-ike-proposal-10]prf hmac-sha2-256
[FW1-ike-proposal-10]encryption-algorithm aes-256
[FW1-ike-proposal-10]dh group14
[FW1-ike-proposal-10]integrity-algorithm hmac-sha2-256 
[FW1-ike-proposal-10]q

8、配置Ike peer(采用预共享秘钥)

[FW1]ike peer b
[FW1-ike-peer-b]ike-proposal 10
[FW1-ike-peer-b]remote-address 2.2.2.1
[FW1-ike-peer-b]pre-shared-key admin@123
[FW1-ike-peer-b]q

9、配置IPSec策略

[FW1]ipsec policy map1 10 isakmp
[FW1-ipsec-policy-isakmp-map1-10]security acl 3000	
[FW1-ipsec-policy-isakmp-map1-10]proposal tran1
[FW1-ipsec-policy-isakmp-map1-10]ike-peer b
[FW1-ipsec-policy-isakmp-map1-10]q

10、接口应用IPSec策略

[FW1]interface  GigabitEthernet 1/0/1
[FW1-GigabitEthernet1/0/1]ipsec policy map1 
[FW1-GigabitEthernet1/0/1]q

二、配置FW2

1、配置接口IP地址

<USG6000V1>system-view
[USG6000V1]sysname FW2
[FW2]interface  GigabitEthernet  1/0/3
[FW2-GigabitEthernet1/0/3]ip address  172.16.1.254 24
[FW2-GigabitEthernet1/0/3]q

[FW2]interface  GigabitEthernet  1/0/1
[FW2-GigabitEthernet1/0/1]ip address 2.2.2.1 24
[FW2-GigabitEthernet1/0/1]q

2、配置接口加入对于安全区域

[FW2]firewall zone  trust
[FW2-zone-trust]add  interface  GigabitEthernet  1/0/3
[FW2-zone-trust]q

[FW2]firewall zone  untrust
[FW2-zone-untrust]add  interface  GigabitEthernet  1/0/1
[FW2-zone-untrust]q

3、配置域间安全策略

[FW2]security-policy
[FW2-policy-security]rule name policy1
[FW2-policy-security-rule-policy1]source-zone trust
[FW2-policy-security-rule-policy1]destination-zone untrust
[FW2-policy-security-rule-policy1]source-address 172.16.1.0
[FW2-policy-security-rule-policy1]destination-address 192.168.1.0 24
[FW2-policy-security-rule-policy1]action permit 
[FW2-policy-security-rule-policy1]q

[FW2-policy-security]rule name policy2	
[FW2-policy-security-rule-policy2]source-zone untrust
[FW2-policy-security-rule-policy2]destination-zone trust
[FW2-policy-security-rule-policy2]source-address 192.168.1.0 24
[FW2-policy-security-rule-policy2]destination-zone 172.16.1.0 24
[FW2-policy-security-rule-policy2]action permit 
[FW2-policy-security-rule-policy2]q

[FW2-policy-security]rule name policy3	
[FW2-policy-security-rule-policy3]source-zone local
[FW2-policy-security-rule-policy3]destination-zone untrust
[FW2-policy-security-rule-policy3]source-address 2.2.2.1 32
[FW2-policy-security-rule-policy3]destination-address 1.1.1.1 32
[FW2-policy-security-rule-policy3]action permit 
[FW2-policy-security-rule-policy3]q

[FW2-policy-security]rule name policy4
[FW2-policy-security-rule-policy4]source-zone untrust	
[FW2-policy-security-rule-policy4]destination-zone local
[FW2-policy-security-rule-policy4]source-address 1.1.1.1 32
[FW2-policy-security-rule-policy4]destination-address 2.2.2.1 32
[FW2-policy-security-rule-policy4]action permit 
[FW2-policy-security-rule-policy4]q

4、配置静态路由

[FW2]ip route-static 0.0.0.0 0 2.2.2.2

5、定义被保护的数据流

[FW2]acl 3000
[FW2-acl-adv-3000]rule permit ip source  172.16.1.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
[FW2-acl-adv-3000]q

6、配置IPSec安全提议

[FW2]ipsec proposal tran1
[FW2-ipsec-proposal-tran1]esp authentication-algorithm sha2-256	
[FW2-ipsec-proposal-tran1]esp encryption-algorithm aes-256 
[FW2-ipsec-proposal-tran1]q

7、配置Ike安全提议

[FW2]ike proposal 10
[FW2-ike-proposal-10]authentication-method pre-share	
[FW2-ike-proposal-10]authentication-algorithm sha2-256	
[FW2-ike-proposal-10]prf hmac-sha2-256
[FW2-ike-proposal-10]encryption-algorithm aes-256	
[FW2-ike-proposal-10]dh group14
[FW2-ike-proposal-10]integrity-algorithm hmac-sha2-256 
[FW2-ike-proposal-10]q

8、配置Ike peer(采用预共享秘钥)

[FW2]ike peer a
[FW2-ike-peer-a]ike-proposal 10	
[FW2-ike-peer-a]remote-address 1.1.1.1 
[FW2-ike-peer-a]pre-shared-key admin@123
[FW2-ike-peer-a]q

9、配置IPSec策略

[FW2]ipsec policy map1 10 isakmp
[FW2-ipsec-policy-isakmp-map1-10]security acl 3000	
[FW2-ipsec-policy-isakmp-map1-10]proposal  tran1	
[FW2-ipsec-policy-isakmp-map1-10]ike-peer a
[FW2-ipsec-policy-isakmp-map1-10]q

10、接口应用IPSec策略

[FW2]interface  GigabitEthernet  1/0/1
[FW2-GigabitEthernet1/0/1]ipsec policy map1 
[FW2-GigabitEthernet1/0/1]q

三、配置ISP

1、配置接口IP地址

<Huawei>system-view 
[Huawei]sysname ISP

[ISP]interface  GigabitEthernet 0/0/1
[ISP-GigabitEthernet0/0/1]ip address  2.2.2.2 24
[ISP-GigabitEthernet0/0/1]q

[ISP]interface  GigabitEthernet 0/0/0
[ISP-GigabitEthernet0/0/0]ip address 1.1.1.2 24
[ISP-GigabitEthernet0/0/0]q

四、验证

1、ping测试

2、查看结果

  • 3
    点赞
  • 29
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

友人a笔记

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值