当前位置:   article > 正文

玩转华为ENSP模拟器系列 | 两个网关之间通过手工方式创建IPSec VdPdNd隧道_两台网关 ipsec

两台网关 ipsec

素材来源:华为防火墙配置指南

一边学习一边整理试验笔记,并与大家分享,侵权即删,谢谢支持!

附上汇总贴:玩转华为ENSP模拟器系列 | 合集_COCOgsta的博客-CSDN博客_华为模拟器实验


目标

手工方式建立IPSec隧道需要手工配置安全协议,入方向和出方向的安全参数索引(SPI),以及安全协议采用的入方向和出方向的验证密钥。当与FW进行通信的对等体设备数量较少时,或是在小型静态环境中,手工配置安全联盟是可行的,但不推荐。

组网需求

图1所示,网络A和网络B之间采用网关对网关组网模式进行资源传输。网络A和网络B分别通过FW_A和FW_B连接到Internet。网络环境描述如下:

  • 网络A属于10.1.1.0/24子网,通过接口GE1/0/3与FW_A连接。
  • 网络B属于10.1.2.0/24子网,通过接口GE1/0/3与FW_B连接。
  • FW_A和FW_B路由可达。

配置思路

  1. 根据网络规划为FW分配接口,配置接口的IP地址并将接口加入相应的安全区域。
  1. 通过配置高级ACL规则组来定义需要保护的数据流。
  1. 配置域间安全策略。
  1. 配置IPSec安全提议。
  1. 配置IPSec策略。
  1. 应用IPSec策略。

操作步骤

配置FW_A。

  1. 配置接口IP地址。

    1. 配置接口GE1/0/3的IP地址。
      1. <sysname> system-view
      2. [sysname] sysname FW_A
      3. [FW_A] interface gigabitethernet 1 / 0 / 3
      4. [FW_A-GigabitEthernet1/0/3] ip address 10.1.1.1 24
      5. [FW_A-GigabitEthernet1/0/3] quit
      6. 复制代码
    2. 配置接口GE1/0/1的IP地址。
      1. [FW_A] interface gigabitethernet 1 / 0 / 1
      2. [FW_A-GigabitEthernet1/0/1] ip address 1.1.3.1 24
      3. [FW_A-GigabitEthernet1/0/1] quit
      4. 复制代码
  1. 配置接口加入相应安全区域。

    1. 将接口GE1/0/3加入Trust区域。
      1. [FW_A] firewall zone trust
      2. [FW_A-zone-trust] add interface gigabitethernet 1 / 0 / 3
      3. [FW_A-zone-trust] quit
      4. 复制代码
    2. 将接口GE1/0/1加入Untrust区域。
      1. [FW_A] firewall zone untrust
      2. [FW_A-zone-untrust] add interface gigabitethernet 1 / 0 / 1
      3. [FW_A-zone-untrust] quit
      4. 复制代码
  1. 配置域间安全策略。

    1. 配置Trust域与Untrust域之间的域间安全策略。
      1. [FW_A] security-policy
      2. [FW_A-policy-security] rule name policy1
      3. [FW_A-policy-security-rule-policy1] source-zone trust
      4. [FW_A-policy-security-rule-policy1] destination-zone untrust
      5. [FW_A-policy-security-rule-policy1] source-address 10.1.1.0 24
      6. [FW_A-policy-security-rule-policy1] destination-address 10.1.2.0 24
      7. [FW_A-policy-security-rule-policy1] action permit
      8. [FW_A-policy-security-rule-policy1] quit
      9. [FW_A-policy-security] rule name policy2
      10. [FW_A-policy-security-rule-policy2] source-zone untrust
      11. [FW_A-policy-security-rule-policy2] destination-zone trust
      12. [FW_A-policy-security-rule-policy2] source-address 10.1.2.0 24
      13. [FW_A-policy-security-rule-policy2] destination-address 10.1.1.0 24
      14. [FW_A-policy-security-rule-policy2] action permit
      15. [FW_A-policy-security-rule-policy2] quit
      16. 复制代码
    2. 配置Untrust域与Local域之间的域间安全策略。
      1. [FW_A-policy-security] rule name policy3
      2. [FW_A-policy-security-rule-policy3] source-zone local
      3. [FW_A-policy-security-rule-policy3] destination-zone untrust
      4. [FW_A-policy-security-rule-policy3] source-address 1.1.3.1 32
      5. [FW_A-policy-security-rule-policy3] destination-address 1.1.5.1 32
      6. [FW_A-policy-security-rule-policy3] action permit
      7. [FW_A-policy-security-rule-policy3] quit
      8. [FW_A-policy-security] rule name policy4
      9. [FW_A-policy-security-rule-policy4] source-zone untrust
      10. [FW_A-policy-security-rule-policy4] destination-zone local
      11. [FW_A-policy-security-rule-policy4] source-address 1.1.5.1 32
      12. [FW_A-policy-security-rule-policy4] destination-address 1.1.3.1 32
      13. [FW_A-policy-security-rule-policy4] action permit
      14. [FW_A-policy-security-rule-policy4] quit
      15. [FW_A-policy-security] quit
      16. 复制代码
  1. 配置到达网络B的静态路由,此处假设到达网络B的下一跳地址为1.1.3.2。
  1. [FW_A] ip route- static 10.1.2.0 255.255.255.0 1.1.3.2
  2. [FW_A] ip route- static 1.1.5.0 255.255.255.0 1.1.3.2
  3. 复制代码
  1. 配置高级ACL 3000,允许10.1.1.0/24网段访问10.1.2.0/24网段。
  1. [FW_A] acl 3000
  2. [FW_A-acl-adv-3000] rule 5 permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
  3. [FW_A-acl-adv-3000] quit
  4. 复制代码
  1. 配置IPSec安全提议tran1。
  1. [FW_A] ipsec proposal tran1
  2. [FW_A-ipsec-proposal-tran1] encapsulation-mode tunnel
  3. [FW_A-ipsec-proposal-tran1] transform esp
  4. [FW_A-ipsec-proposal-tran1] esp authentication-algorithm sha2- 256
  5. [FW_A-ipsec-proposal-tran1] esp encryption-algorithm aes- 256
  6. [FW_A-ipsec-proposal-tran1] quit
  7. 复制代码
  1. 配置名称为map1,序号为10的IPSec策略。
  1. [FW_A] ipsec policy map1 10 manual
  2. [FW_A-ipsec-policy-manual-map1-10] security acl 3000
  3. [FW_A-ipsec-policy-manual-map1-10] proposal tran1
  4. [FW_A-ipsec-policy-manual-map1-10] tunnel remote 1.1.5.1
  5. [FW_A-ipsec-policy-manual-map1-10] tunnel local 1.1.3.1
  6. [FW_A-ipsec-policy-manual-map1-10] sa spi inbound esp 12345678
  7. [FW_A-ipsec-policy-manual-map1-10] sa spi outbound esp 87654321
  8. [FW_A-ipsec-policy-manual-map1-10] sa string-key inbound esp abcdefg
  9. [FW_A-ipsec-policy-manual-map1-10] sa string-key outbound esp gfedcba
  10. [FW_A-ipsec-policy-manual-map1-10] quit
  11. 复制代码
  1. 在接口GE1/0/1上应用IPSec策略组map1。
  1. [FW_A] interface gigabitethernet 1 / 0 / 1
  2. [FW_A-GigabitEthernet1/0/1] ipsec policy map1
  3. [FW_A-GigabitEthernet1/0/1] quit
  4. 复制代码

配置FW_B。

  1. 配置接口IP地址。

    1. 配置接口GE1/0/3的IP地址。
      1. <sysname> system-view
      2. [sysname] sysname FW_B
      3. [FW_B] interface gigabitethernet 1 / 0 / 3
      4. [FW_B-GigabitEthernet1/0/3] ip address 10.1.2.1 24
      5. [FW_B-GigabitEthernet1/0/3] quit
      6. 复制代码
    2. 配置接口GE1/0/1的IP地址。
      1. [FW_B] interface gigabitethernet 1 / 0 / 1
      2. [FW_B-GigabitEthernet1/0/1] ip address 1.1.5.1 24
      3. [FW_B-GigabitEthernet1/0/1] quit
      4. 复制代码
  1. 配置接口加入相应安全区域。

    1. 将接口GE1/0/3加入Trust区域。
      1. [FW_B] firewall zone trust
      2. [FW_B-zone-trust] add interface gigabitethernet 1 / 0 / 3
      3. [FW_B-zone-trust] quit
      4. 复制代码
    2. 将接口GE1/0/1加入Untrust区域。
      1. [FW_B] firewall zone untrust
      2. [FW_B-zone-untrust] add interface gigabitethernet 1 / 0 / 1
      3. [FW_B-zone-untrust] quit
      4. 复制代码
  1. 配置域间安全策略。

    1. 配置Trust域与Untrust域之间的域间安全策略。
      1. [FW_B] security-policy
      2. [FW_B-policy-security] rule name policy1
      3. [FW_B-policy-security-rule-policy1] source-zone trust
      4. [FW_B-policy-security-rule-policy1] destination-zone untrust
      5. [FW_B-policy-security-rule-policy1] source-address 10.1.2.0 24
      6. [FW_B-policy-security-rule-policy1] destination-address 10.1.1.0 24
      7. [FW_B-policy-security-rule-policy1] action permit
      8. [FW_B-policy-security-rule-policy1] quit
      9. [FW_B-policy-security] rule name policy2
      10. [FW_B-policy-security-rule-policy2] source-zone untrust
      11. [FW_B-policy-security-rule-policy2] destination-zone trust
      12. [FW_B-policy-security-rule-policy2] source-address 10.1.1.0 24
      13. [FW_B-policy-security-rule-policy2] destination-address 10.1.2.0 24
      14. [FW_B-policy-security-rule-policy2] action permit
      15. [FW_B-policy-security-rule-policy2] quit
      16. 复制代码
    2. 配置Untrust域与Local域之间的域间安全策略。
      1. [FW_B-policy-security] rule name policy3
      2. [FW_B-policy-security-rule-policy3] source-zone local
      3. [FW_B-policy-security-rule-policy3] destination-zone untrust
      4. [FW_B-policy-security-rule-policy3] source-address 1.1.5.1 32
      5. [FW_B-policy-security-rule-policy3] destination-address 1.1.3.1 32
      6. [FW_B-policy-security-rule-policy3] action permit
      7. [FW_B-policy-security-rule-policy3] quit
      8. [FW_B-policy-security] rule name policy4
      9. [FW_B-policy-security-rule-policy4] source-zone untrust
      10. [FW_B-policy-security-rule-policy4] destination-zone local
      11. [FW_B-policy-security-rule-policy4] source-address 1.1.3.1 32
      12. [FW_B-policy-security-rule-policy4] destination-address 1.1.5.1 32
      13. [FW_B-policy-security-rule-policy4] action permit
      14. [FW_B-policy-security-rule-policy4] quit
      15. [FW_B-policy-security] quit
      16. 复制代码
  1. 配置到达目的网络A的静态路由,此处假设到达网络A的下一跳地址为1.1.5.2。
  1. [FW_B] ip route- static 10.1.1.0 255.255.255.0 1.1.5.2
  2. [FW_B] ip route- static 1.1.3.0 255.255.255.0 1.1.5.2
  3. 复制代码
  1. 配置高级ACL 3000,允许10.1.2.0/24网段访问10.1.1.0/24网段。
  1. [FW_B] acl 3000
  2. [FW_B-acl-adv-3000] rule 5 permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
  3. [FW_B-acl-adv-3000] quit
  4. 复制代码
  1. 配置名称为tran1的IPSec安全提议。
  1. [FW_B] ipsec proposal tran1
  2. [FW_B-ipsec-proposal-tran1] encapsulation-mode tunnel
  3. [FW_B-ipsec-proposal-tran1] transform esp
  4. [FW_B-ipsec-proposal-tran1] esp authentication-algorithm sha2- 256
  5. [FW_B-ipsec-proposal-tran1] esp encryption-algorithm aes- 256
  6. [FW_B-ipsec-proposal-tran1] quit
  7. 复制代码
  1. 配置名称为map1序号为10的IPSec策略。
  1. [FW_B] ipsec policy map1 10 manual
  2. [FW_B-ipsec-policy-manual-map1-10] security acl 3000
  3. [FW_B-ipsec-policy-manual-map1-10] proposal tran1
  4. [FW_B-ipsec-policy-manual-map1-10] tunnel remote 1.1.3.1
  5. [FW_B-ipsec-policy-manual-map1-10] tunnel local 1.1.5.1
  6. [FW_B-ipsec-policy-manual-map1-10] sa spi inbound esp 87654321
  7. [FW_B-ipsec-policy-manual-map1-10] sa spi outbound esp 12345678
  8. [FW_B-ipsec-policy-manual-map1-10] sa string-key inbound esp gfedcba
  9. [FW_B-ipsec-policy-manual-map1-10] sa string-key outbound esp abcdefg
  10. [FW_B-ipsec-policy-manual-map1-10] quit
  11. 复制代码
  1. 在接口GE1/0/1上应用IPSec策略组map1。
  1. [FW_B] interface gigabitethernet 1 / 0 / 1
  2. [FW_B-GigabitEthernet1/0/1] ipsec policy map1
  3. [FW_B-GigabitEthernet1/0/1] quit
  4. 复制代码

结果验证

分别FW_A和FW_B上执行display ipsec sa会显示安全联盟的建立情况。以FW_B为例,出现以下显示信息说明IPSec安全联盟建立成功。

  1. <FW_B> display ipsec sa
  2. ipsec sa information:
  3. ===============================
  4. Interface: GigabitEthernet1/0/1
  5. ===============================
  6. -----------------------------
  7. IPSec policy name: "map1"
  8. Sequence number : 10
  9. Acl group : 3000
  10. Acl rule : -
  11. Mode : Manual
  12. -----------------------------
  13. Encapsulation mode: Tunnel
  14. Tunnel local : 1.1.5.1
  15. Tunnel remote : 1.1.3.1
  16. [Outbound ESP SAs]
  17. SPI: 12345678 (0xbc614e)
  18. Proposal: ESP-ENCRYPT-AES-256 SHA2-256-128
  19. SA encrypted packets (number/bytes): 0/0
  20. No duration limit for this SA
  21. [Inbound ESP SAs]
  22. SPI: 87654321 (0x5397fb1)
  23. Proposal: ESP-ENCRYPT-AES-256 SHA2-256-128
  24. SA decrypted packets (number/bytes): 0/0
  25. No duration limit for this SA
  26. Anti-replay : Disable
  27. 复制代码

网络A上执行ping操作可以ping通网络B,执行命令display ipsec statistics可以查看被加密的数据。例如:

  1. <FW_B> display ipsec statistics
  2. IPSec statistics information:
  3. the security packet statistics:
  4. input/output security packets: 20 / 20
  5. input/output security bytes: 2000/2000
  6. input/output dropped security packets: 0/0
  7. the encrypt packet statistics:
  8. send chip: 63, recv chip: 63, send err: 0
  9. local cpu: 63, other cpu: 0, recv other cpu: 0
  10. intact packet: 63, first slice: 0, after slice: 0
  11. the decrypt packet statistics:
  12. send chip: 244, recv chip: 244, send err: 0
  13. local cpu: 244, other cpu: 0, recv other cpu: 0
  14. reass first slice: 0, after slice: 0
  15. dropped security packet detail:
  16. can't find SA: 0, wrong SA: 0
  17. authentication: 0, replay: 0
  18. front recheck: 0, after recheck: 0
  19. change cpu enc: 0, dec change cpu: 0
  20. fib search: 0, output l3: 0
  21. flow err: 0, slice err: 0, byte limit: 0
  22. negotiate about packet statistics:
  23. IKE fwd packet ok: 93, err: 0
  24. IKE ctrl packet inbound ok: 92, outbound ok: 58
  25. SoftExpr: 0, HardExpr: 0, DPDOper: 0
  26. trigger ok: 0, switch sa: 35684, sync sa: 0
  27. recv IKE nat keepalive: 114731, IKE input: 0


 

 

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/笔触狂放9/article/detail/487591
推荐阅读
  

闽ICP备14008679号