欢迎光临散文网 会员登陆 & 注册

华三IPsec-野蛮模式

2023-06-04 13:26 作者:青松一路似相逢  | 我要投稿

【拓扑图】

IPsec规划图

【需求】FW3(分部)通过NAT设备与FW4(总部1)建立IPsec隧道;FW3(分部)通过NAT设备与FW8(总部2)建立IPsec隧道


----------------------------------------------------分部配置如下-----------------------------------------------

【FW1】

interface GigabitEthernet1/0/5

 ip address 1.1.1.2 255.255.255.0

 nat outbound 2000

#

interface GigabitEthernet1/0/10

 ip address 10.0.12.1 255.255.255.0

#

security-zone name Trust

 import interface GigabitEthernet1/0/10

#

security-zone name Untrust

 import interface GigabitEthernet1/0/5

#

 ip route-static 0.0.0.0 0 1.1.1.1

 ip route-static 192.168.10.0 24 10.0.12.2

#

acl basic 2000

 rule 5 permit source 10.0.12.0 0.0.0.255

#

nat policy

 rule name 5

  action easy-ip

#

security-policy ip

 rule 0 name test-any

  action pass

#

【FW3】

interface GigabitEthernet1/0/5

 ip address 10.0.12.2 255.255.255.0

 ipsec apply policy zb1policy

或者

 ipsec apply policy zb2policy

#

interface GigabitEthernet1/0/10

 ip address 192.168.10.1 255.255.255.0

#

security-zone name Trust

 import interface GigabitEthernet1/0/10

#

security-zone name Untrust

 import interface GigabitEthernet1/0/5

#

 ip route-static 0.0.0.0 0 10.0.12.1

#

acl advanced 3000

 rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

 rule 10 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

#

ipsec transform-set 5

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm sha256

#

ipsec transform-set 10

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm sha256

#

ipsec policy zb1policy 5 isakmp

 transform-set 10

 security acl 3000

 remote-address 2.2.2.2

 ike-profile 10

#

ipsec policy zb2policy 5 isakmp

 transform-set 5

 security acl 3000

 remote-address 3.3.3.2

 ike-profile 5

#

ike profile 5

 keychain 5

 exchange-mode aggressive

 local-identity user-fqdn fb

 match remote identity address 3.3.3.2 255.255.255.255

 proposal 5

#

ike profile 10

 keychain 10

 exchange-mode aggressive

 local-identity user-fqdn fb

 match remote identity address 2.2.2.2 255.255.255.255

 proposal 10

#

ike proposal 5

 encryption-algorithm 3des-cbc

 dh group14

 authentication-algorithm sha256

#

ike proposal 10

 encryption-algorithm 3des-cbc

 dh group14

 authentication-algorithm sha256

#

ike keychain 5

 pre-shared-key address 3.3.3.2 255.255.255.255 key cipher $c$3$JpP3sPfDJjtOON3t7atiLT19pTaZc0X3QQ==

#

ike keychain 10

 pre-shared-key address 2.2.2.2 255.255.255.255 key cipher $c$3$RFQqv8wL0FmwZW5CEL9snwo6MJaFq5gDBg==

#

security-policy ip

 rule 0 name test-any

  action pass

#


----------------------------------------------------总部1配置如下-----------------------------------------------

【FW2】

interface GigabitEthernet1/0/5

 ip address 2.2.2.2 255.255.255.0

 nat outbound 2000

 nat server protocol udp global 2.2.2.2 500 inside 172.0.12.2 500 rule ServerRule_2

 nat server protocol udp global 2.2.2.2 4500 inside 172.0.12.2 4500 rule ServerRule_3

 nat server protocol 50 global 2.2.2.2 inside 172.0.12.2 rule ServerRule_1

#

interface GigabitEthernet1/0/10

 ip address 172.0.12.1 255.255.255.0

#

security-zone name Trust

 import interface GigabitEthernet1/0/10

#

security-zone name Untrust

 import interface GigabitEthernet1/0/5

#

 ip route-static 0.0.0.0 0 2.2.2.1

 ip route-static 192.168.20.0 24 172.0.12.2

#

acl basic 2000

 rule 5 permit source 172.0.12.0 0.0.0.255

#

security-policy ip

 rule 0 name test-any

  action pass

#


【FW4】

interface GigabitEthernet1/0/5

 port link-mode route

 combo enable copper

 ip address 172.0.12.2 255.255.255.0

 ipsec apply policy fbpolicy1

#

interface GigabitEthernet1/0/10

 port link-mode route

 combo enable copper

 ip address 192.168.20.1 255.255.255.0

#

security-zone name Trust

 import interface GigabitEthernet1/0/10

#

security-zone name Untrust

 import interface GigabitEthernet1/0/5

#

 ip route-static 0.0.0.0 0 172.0.12.1

#

acl advanced 3000

 rule 5 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

#

ipsec transform-set 10

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm sha256

#

ipsec policy-template fbpolicy 5

 transform-set 10

 security acl 3000

 ike-profile 10

#

ipsec policy fbpolicy1 5 isakmp template fbpolicy

#

ike profile 10

 keychain 10

 exchange-mode aggressive

 match remote identity user-fqdn fb

 proposal 10

#

ike proposal 10

 encryption-algorithm 3des-cbc

 dh group14

 authentication-algorithm sha256

#

ike keychain 10

 pre-shared-key hostname fb key cipher $c$3$jy74ZpWrbna/X8mV5+JgWknoKqSrnftSxQ==

#

security-policy ip

 rule 0 name test-any

  action pass

#


----------------------------------------------------总部2配置如下-----------------------------------------------

【FW8】

interface GigabitEthernet1/0/5

 ip address 3.3.3.2 255.255.255.0

 ipsec apply policy fbpolicy1

#

interface GigabitEthernet1/0/10

 ip address 192.168.30.1 255.255.255.0

#

security-zone name Trust

 import interface GigabitEthernet1/0/10

#

security-zone name Untrust

 import interface GigabitEthernet1/0/5

#

 ip route-static 0.0.0.0 0 3.3.3.1

#

acl advanced 3000

 rule 5 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

#

ipsec transform-set 5

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm sha256

#

ipsec policy-template fbpolicy 5

 transform-set 5

 security acl 3000

 ike-profile 5

#

ipsec policy fbpolicy1 5 isakmp template fbpolicy

#

ike profile 5

 keychain 5

 exchange-mode aggressive

 match remote identity user-fqdn fb

 proposal 5

#

ike proposal 5

 encryption-algorithm 3des-cbc

 dh group14

 authentication-algorithm sha256

#

ike keychain 5

 pre-shared-key hostname fb key cipher $c$3$teL4sOn7Lb5MHZaqJMQK0gNmybAgBbdc2Q==

#

security-policy ip

 rule 0 name test-any

  action pass

#


【验证】

分部到总部1

分部出接口应用总部1的IPsec策略
私网流量互通


分部到总部2

分部出接口应用总部2的ipsec策略
私网流量互通


华三IPsec-野蛮模式的评论 (共 条)

分享到微博请遵守国家法律