华三IPSec VPN配置方法
防火墙配置思路: ISP路由器 <USG6000V2>system-view <H3C>system-view [H3C]sysname ISP [ISP]interface gigabitethernet 0/1 [ISP-GigabitEthernet0/1]ip address 200.1.1.1 24 [ISP-GigabitEthernet0/1]interface gigabitethernet 0/2 [ISP-GigabitEthernet0/2]ip address 200.1.2.1 24 [ISP-GigabitEthernet0/2]return <ISP>save force 防火墙(总部) 1 配置接口地址并接口加入安全域 <H3C>system-view [H3C]sysname FW1 [FW1]interface gigabitethernet 1/0/1 [FW1-GigabitEthernet1/0/1]ip address 200.1.1.2 24 [FW1-GigabitEthernet1/0/1]manage ping inbound [FW1-GigabitEthernet1/0/1]manage ping outbound [FW1-GigabitEthernet1/0/1]interface gigabitethernet 1/0/2 [FW1-GigabitEthernet1/0/2]ip address 10.1.1.1 24 [FW1-GigabitEthernet1/0/2]manage ping inbound [FW1-GigabitEthernet1/0/2]manage ping outbound [FW1-GigabitEthernet1/0/2]quit [FW1]security-zone name trust //配置trust安全域 [FW1-security-zone-Trust]import interface gigabitethernet1/0/2 [FW1-security-zone-Trust]quit //接口加入安全域 [FW1]security-zone name untrust //配置untrust安全域 [FW1-security-zone-Untrust]import interface gigabitethernet1/0/3 [FW1-security-zone-Untrust]quit //接口加入安全域 2 配置缺省路由 [FW1]ip route-static 0.0.0.0 0 200.1.1.1 //下一跳为公网网关的缺省路由 3 配置NAT策略 [FW1]nat global-policy //配置NAT策略 [FW1-nat-global-policy]rule name ipsec //IPSEC流量不做NAT转换 [FW1-nat…-ipsec]source-zone trust //源安全域 [FW1-nat…-ipsec]destination-zone untrust //目标安全域 [FW1-nat-…ipsec]source-ip subnet 10.1.1.0 24 //指定源地址 [FW1-nat-…ipsec]destination-ip subnet 10.1.2.0 24 //指定目标地址 [FW1-nat…sec]action snat no-nat //动作为不执行源NAT转换 [FW1-nat-global-policy-rule-nat44-ipsec]quit [FW1-nat-global-policy]quit [FW1]nat global-policy //配置NAT策略 [FW1-nat-global-policy]rule name intelnet [FW1-nat…-intelnet]source-zone trust [FW1-nat…-intelnet]destination-zone untrust [FW1-nat…-intelnet]source-ip subnet 10.1.1.0 24 [FW1-nat…telnet]action snat easy-ip //动作源地址做EASY-IP地址转换 [FW1-nat…t44-intelnet]quit [FW1-nat-global-policy]quit 5 配置安全域策略 [FW1]security-policy ip //放行Trust到Untrust的流量 [FW1-security-policy-ip]rule 0 name t-u [FW1-security-policy-ip-0-t-u]source-zone trust [FW1-security-policy-ip-0-t-u]destination-zone untrust [FW1-security-policy-ip-0-t-u]service any [FW1-security-policy-ip-0-t-u]action pass [FW1-security-policy-ip-0-t-u]quit [FW1-security-policy-ip]quit [FW1]security-policy ip //放行Untrust到Trust的流量 [FW1-security-policy-ip]rule 1 name u-t [FW1-security-policy-ip-1-u-t]source-zone untrust [FW1-security-policy-ip-1-u-t]destination-zone trust [FW1-security-policy-ip-1-u-t]service any [FW1-security-policy-ip-1-u-t]action pass [FW1-security-policy-ip-1-u-t]quit [FW1-security-policy-ip]quit [FW1]security-policy ip //放行Untrust至Local的流量 [FW1-security-policy-ip]rule 2 name u-l [FW1-security-policy-ip-2-u-l]source-zone untrust [FW1-security-policy-ip-2-u-l]destination-zone local [FW1-security-policy-ip-2-u-l]service any [FW1-security-policy-ip-2-u-l]action pass [FW1-security-policy-ip-2-u-l]quit [FW1-security-policy-ip]quit [FW1-security-policy-ip]rule 3 name l-u //放行Local到Untrust [FW1-security-policy-ip-3-l-u]source-zone local [FW1-security-policy-ip-3-l-u]destination-zone untrust [FW1-security-policy-ip-3-l-u]service any [FW1-security-policy-ip-3-l-u]action pass [FW1-security-policy-ip-3-l-u]quit [FW1-security-policy-ip]quit
进入IPSEC配置流程 1 配置IPSEC的“感兴趣流“ [fw1]acl advanced 3001 //配置3001高级ACL [fw1-acl-ipv4-adv-3001]step 20 [fw1-acl-ipv4-adv-3001]rule permit ip source 10.1.1.00.0.0.255 destination 10.1.2.0 0.0.0.255 2 配置IKE提议 [fw1]ike proposal 1 //创建ike提议进程号为1 [fw1-…]encryption-algorithm aes-cbc-128 //加密算法 [fw1-…]authentication-method pre-share //认证方法为对预共享秘钥 [fw1-…]authentication-algorithm sha //认证算法sha [fw1-ike-proposal-1]quit 3 配置ike keychain(IKE秘钥) [fw1]ike keychain zurkj //创建预共享秘钥 [fw1-ike-keychain-zurkj]pre-shared-key address 200.1.1.2255.255.255.255 key simple zurkj.com //指定对端地址并设置秘钥为zurkj.com [fw1-ike-keychain-zurkj]quit 4 配置IKE Profile(IKE模板) [fw1]ike profile zurkj //创建IKE模板zurkj [fw1-…]keychain zurkj.com //指定使用秘钥 [fw1-…]local-identity address 200.1.1.2 //指定使用IP地址标识本端身份 [fw1-ike-profile-zurkj]match remote identity address200.1.2.2 255.255.255.255 //指定匹配对端身份类型为IP地址 [fw1-ike-profile-zurkj]proposal 1 //指定使用的提议Proposal 1 [fw1-ike-profile-zurkj]quit 5 配置IPSEC transform-set(IPSEC转换集/模板) [fw1]ipsec transform-set zurkj //创建IPSEC转换集zurkj [fw1-…]protocol esp //指定安全协议为ESP(默认) [fw1-…]encapsulation-mode tunnel //指定封装协议为隧道模式(默认) [fw1-…]esp encryption-algorithm aes-cbc-128 //指定ESP加密算法 [fw1-ipsec-transform-set-zurkj]esp authentication-algorithmsha1 //指定ESP认证算法 [fw1-ipsec-transform-set-zurkj]quit 6 配置IPSEC策略 [fw1]ipsec policy zurkj 10 isakmp [fw1-ipsec-policy-isakmp-zurkj-10]transform-set zurkj [fw1-ipsec-policy-isakmp-zurkj-10]security acl 3001 [fw1-ipsec-policy-isakmp-zurkj-10]local-address 200.1.1.2 [fw1-ipsec-policy-isakmp-zurkj-10]remote-address 200.1.2.2 [fw1-ipsec-policy-isakmp-zurkj-10]ike-profile zurkj [fw1-ipsec-policy-isakmp-zurkj-10]quit 7 接口调用IPSEC策略 [fw1]interface gigabitethernet 1/0/3 [fw1-GigabitEthernet1/0/3]ipsec apply policy 1 [fw1-GigabitEthernet1/0/3]quit
以下为配置脚本: FW1配置脚本 - security-zone name trust
- import interface gigabitethernet 1/0/2
- quit
- security-zone name untrust
- import interface gigabitethernet 1/0/3
- quit
- ip route-static 0.0.0.0 0 200.1.1.1
- nat global-policy
- rule name ipsec
- source-zone trust
- destination-zone untrust
- source-ip subnet 10.1.1.0 24
- destination-ip subnet 10.1.2.0 24
- action snat no-nat
- quit
- quit
- nat global-policy
- rule name internet
- source-zone trust
- destination-zone untrust
- source-ip subnet 10.1.1.0 24
- action snat easy-ip
- quit
- quit
- security-policy ip
- rule 0 name t-u
- source-zone trust
- destination-zone untrust
- service any
- action pass
- quit
- quit
- security-policy ip
- rule 1 name u-t
- source-zone untrust
- destination-zone trust
- service any
- action pass
- quit
- quit
- security-policy ip
- rule 2 name u-l
- source-zone untrust
- destination-zone local
- service any
- action pass
- quit
- quit
- security-policy ip
- rule 3 name l-u
- source-zone local
- destination-zone untrust
- service any
- action pass
- quit
- quit
- acl advanced 3001
- step 20
- rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
- quit
- ike proposal 1
- encryption-algorithm aes-cbc-128
- authentication-method pre-share
- quit
- ike keychain zurkj
- pre-shared-key address 200.1.2.2 255.255.255.255 key simple zurkj.com
- quit
- ike profile zurkj
- keychain zurkj.com
- local-identity address 200.1.1.2
- match remote identity address 200.1.2.2 255.255.255.255
- proposal 1
- quit
- ipsec transform-set zurkj
- protocol esp
- encapsulation-mode tunnel
- esp encryption-algorithm aes-cbc-128
- esp authentication-algorithm sha1
- quit
- ipsec policy zurkj 10 isakmp
- transform-set zurkj
- security acl 3001
- local-address 200.1.1.2
- remote-address 200.1.2.2
- ike-profile zurkj
- quit
- interface gigabitethernet 1/0/3
- ipsec apply policy 1
- quit
复制代码FW2配置脚本 - system-view
- sysname FW2
- interface gigabitethernet 1/0/3
- ip address 200.1.2.2 24
- manage ping inbound
- manage ping outbound
- interface gigabitethernet 1/0/2
- ip address 10.1.2.1 24
- manage ping inbound
- manage ping outbound
- quit
- security-zone name trust
- import interface gigabitethernet 1/0/2
- quit
- security-zone name untrust
- import interface gigabitethernet 1/0/3
- quit
- ip route-static 0.0.0.0 0 200.1.2.1
- nat global-policy
- rule name ipsec
- source-zone trust
- destination-zone untrust
- source-ip subnet 10.1.2.0 24
- destination-ip subnet 10.1.1.0 24
- action snat no-nat
- quit
- quit
- nat global-policy
- rule name internet
- source-zone trust
- destination-zone untrust
- source-ip subnet 10.1.2.0 24
- action snat easy-ip
- quit
- quit
- security-policy ip
- rule 0 name t-u
- source-zone trust
- destination-zone untrust
- service any
- action pass
- quit
- quit
- security-policy ip
- rule 1 name u-t
- source-zone untrust
- destination-zone trust
- service any
- action pass
- quit
- quit
- security-policy ip
- rule 2 name u-l
- source-zone untrust
- destination-zone local
- service any
- action pass
- quit
- quit
- security-policy ip
- rule 3 name l-u
- source-zone local
- destination-zone untrust
- service any
- action pass
- quit
- quit
- acl advanced 3001
- step 20
- rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
- quit
- ike proposal 1
- encryption-algorithm aes-cbc-128
- authentication-method pre-share
- quit
- ike keychain zurkj
- pre-shared-key address 200.1.1.2 255.255.255.255 key simple zurkj.com
- quit
- ike profile zurkj
- keychain zurkj.com
- local-identity address 200.1.2.2
- match remote identity address 200.1.1.2 255.255.255.255
- proposal 1
- quit
- ipsec transform-set zurkj
- protocol esp
- encapsulation-mode tunnel
- esp encryption-algorithm aes-cbc-128
- esp authentication-algorithm sha1
- quit
- ipsec policy zurkj 10 isakmp
- transform-set zurkj
- security acl 3001
- local-address 200.1.2.2
- remote-address 200.1.1.2
- ike-profile zurkj
- quit
- interface gigabitethernet 1/0/3
- ipsec apply policy 1
- quit
复制代码
|