IPSEC  ×××   野蛮模式    DCHP的结合!

   []、野蛮模式

 

   []、相关配置参数;

ike local-name  id-name             名称

ike peer peer-name                 peer对等体的声明;

pre-shared-key  string              共享密钥

remote-address  x.x.x.x             对端地址

exchange-mode aggressive           密钥交换模式:野蛮模式

id-type name                      id类型:基于名称

remote-name id-name              对端名称

   []、案例

拓扑:

 

案例说明:

 

(1)、案例说明:

  使用到的设备:  三台h3c的防火墙;一台三层交换机作为dhcp服务器使用!

  (2)、实验的目的:

     实现×××IPSEC的野蛮模式和dhcp的结合!

  (3)、案例的说明:

     内网的地址都属于192.168.0.0   网段

     外网的地址都属于193.168.0.0   网段

 

配置信息:

 

Firewall 1:

为相应的接口配置相应的地址;

<F1>system-view

System View: return to User View with Ctrl+Z.

[F1]interface eth 0/2

[F1-Ethernet0/2]ip address 192.168.10.1 255.255.255.0

[F1-Ethernet0/2]interface eth 0/1

[F1-Ethernet0/1]ip address 193.168.10.1 255.255.255.0

 

 

[F1]firewall zone trust

[F1-zone-trust]add eth 

[F1-zone-trust]add interface eth0/1

[F1-zone-trust]add interface eth0/2

 

配置默认路由:

[F1]ip route-static 0.0.0.0 0 193.168.10.2

 

ike peer peer1                           

 exchange-mode aggressive                 

 pre-shared-key 1234                     

 id-type name                            

 remote-name fw2                         

 remote-address 192.168.20.1             

 local-address 193.168.10.1

 

 

ipsec proposal hanyu

 

acl number 3000                           

 rule 0 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

 rule 1 deny ip                          

acl number 3001                          

 rule 0 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

 rule 1 deny ip    

 

 

Firwall  2

 

<F2>system-view

System View: return to User View with Ctrl+Z.

[F2]interface eth 0/2

[F2-Ethernet0/2]ip address 192.168.20.1 255.255.255.0

[F2-Ethernet0/2]interface eth 0/1

 [F2-Ethernet0/1]ip address dhcp-alloc          使用动态的地址获得方式!

 

 

[F2]firewall zone trust

[F2-zone-trust]add interface eth 0/1

[F2-zone-trust]add interface eth 0/2

 

默认路由

[F2]ip route-static 0.0.0.0 0 193.168.20.2

 

 

Firewall4

<F4>system-view

System View: return to User View with Ctrl+Z.

[F4]interface eth 0/2

[F4-Ethernet0/2]ip address 192.168.30.1 255.255.255.0

[F4-Ethernet0/2]

[F4-Ethernet0/2]

[F4-Ethernet0/2]interface eth 0/1

[F4-Ethernet0/1]ip address dhc   

[F4-Ethernet0/1]ip address dhcp-alloc

[F4-Ethernet0/1]

[F4-Ethernet0/1]

[F4-Ethernet0/1]quit

[F4]ip route 

[F4]ip route-static 0.0.0.0 0 193.168.30.2

 

 

 

[F4]fire    

[F4]firewall zone tr 

[F4]firewall zone trust

[F4-zone-trust]add eth

[F4-zone-trust]add interface eth 

[F4-zone-trust]add interface Ethernet 0/1

[F4-zone-trust]add interface Ethernet 0/2

 

 

 

SW   交换机的配置;

<SW13>system-view

Enter system view, return to user view with Ctrl+Z.

[SW13]vlan 5

[SW13]vlan 5

[SW13-vlan5]port eth

[SW13-vlan5]port Ethernet 0/5

[SW13-vlan5]vlan 10

[SW13-vlan10]port ethernet 0/10

[SW13-vlan10]vlan 15

[SW13-vlan15]port ethernet 0/15

[SW13-vlan15]inter vlan 5

[SW13-Vlan-interface5]ip add 193.168.10.2 255.255.255.0

[SW13-Vlan-interface5]inter vlan 10

[SW13-Vlan-interface10]ip address 193.168.20.2 255.255.255.0

[SW13-Vlan-interface10]inter vlan 15

[SW13-Vlan-interface15]ip address 193.168.30.2 255.255.255.0

 

 

 

[SW13]dhcp enable

[SW13]dhcp server ip-pool fw2

[SW13-dhcp-fw2]network 193.168.20.0

[SW13-dhcp-fw2]dhcp server ip-pool fw3

[SW13-dhcp-fw3]network 193.168.30.0

[SW13]dhcp server forbidden-ip 193.168.20.2

[SW13]dhcp server forbidden-ip 193.168.30.2

 

 详细的配置信息:

请查看附件

                                     

验证结果: