上一篇博客讲了openswan的部署,现实环境中,可能会有多机房的部署使用,那么今天我就介绍一下生产环境情况,我们只用于简单的远程登录,未考虑到高可用,每个机房都部署了open***,一般是拨北京机房的open***然后通过openswan连接外地各个机房,如果openswan使用不了,就拨外地机房的open***
机器名
|
公网
|
内网地址
|
网段:
|
***-bj
|
1.2.3.4
|
10.1.1.20/24
|
10.1.0.0/16
|
***-sh
|
2.3.4.5
|
10.2.1.20/24
|
10.2.0.0/16
|
***-wh
|
3.4.5.6
|
10.7.1.20/24
|
10.7.0.0/16
|
***-gz
|
4.5.6.7
|
10.3.1.20/24
|
10.3.0.0/16
|
***-sz
|
5.6.7.8
|
10.4.1.20/24
|
10.4.0.0/16
|
注意:open*** server push给客户端的路由是10.0.0.0/8 把路由聚合起来,要不然用多少网段你就得push多少网段,这里我一条搞定
[root@samanage ipsec.d]# cat /etc/ipsec.conf
# /etc/ipsec.conf - Openswan IPsec configuration file
# This file: /usr/local/share/doc/openswan/ipsec.conf-sample
version 2.0 # conforms to second version of ipsec.conf specification
[root@samanage ipsec.d]# ls /etc/ipsec.d/
aacerts certs examples policies zwtosh.conf
cacerts crls ocspcerts private
[root@samanage ipsec.d]# cat zwtosh.conf
leftrsasigkey=0sAQNnt7kSsTQr6YTYLAg……
rightrsasigkey=0sAQOFLbvIwOzFlZu6qN……..
[root@appsh01 ~]# cat /etc/sysconfig/static-routes
any net 10.0.0.0 netmask 255.0.0.0 gw 10.2.1.20
二:北京内网只允许open***的客户端网段通过,open*** server 和 openswan bj server 是一台机器
1.rpm -q ipsec-tools gmp gmp-devel flex bison 没有yum
2. /bin/cp /etc/sysctl.conf /etc/sysctl.conf.$(date +%F)
sysctl -a | egrep "ipv4.*(accept|send)_redirects" | awk -F "=" '{print $1"= 0"}' >> /etc/sysctl.conf
3. sed -i "s/net.ipv4.ip_forward = 0/net.ipv4.ip_forward = 1/g" /etc/sysctl.conf
4. sed -i "s/net.ipv4.conf.default.rp_filter = 1/net.ipv4.conf.default.rp_filter = 0/g" /etc/sysctl.conf
7. tar zxf openswan-2.6.32.tar.gz && cd openswan-2.6.32 && make programs && make install
8. sed –i ”s/protostack=auto/protostack=netkey/g” /etc/ipsec.conf
9. echo “include /etc/ipsec.d/*.conf” >>/etc/ipsec.conf
10.ipsec newhostkey --output /etc/ipsec.secrets
11.[root@***-wh openswan-2.6.32]# ipsec showhostkey --left
# rsakey AQOI3jDZu
leftrsasigkey=0sAQOFLbvIwOzFlP3….
注意北京的openswan 永远作为right
12. Right的key,直接在*** bj 机器上执行 ipsec showhostkey --right即可
13. 在***-wh 上touch /etc/ipsec.d/zwtowh.conf
leftid=@left-whstandby
leftsubnet=10.7.0.0/16
leftrsasigkey=0sAQPCIXIM4vuLjwNbQ…….
leftnexthop=%defaultroute
rightsubnet=10.1.10.0/23
rightrsasigkey=0sAQOFLbvIwOzFlP3………
rightnexthop=%defaultroute
[root@ ***-wh ipsec.d]#
-A POSTROUTING -s 10.7.0.0/255.255.0.0 -d ! 10.1.0.0/255.255.0.0 -o eth0 -j MASQUERADE
IPsec running - pluto pid: 7184
echo “any net 10.0.0.0 netmask 255.0.0.0 gw 10.7.1.20” >> /etc/sysconfig/static-routes
转载于:https://blog.51cto.com/ontheway2015/1105095