×××的定义 虚拟专网(×××-VIRTUAL PRIVATE NETWORK)指的是在公用网络上建立专用网络的技术。之所以称为虚拟网主要是因为整个×××网络的任意两个节点之间的连接并没有传统专网所需的端到端的物理链路,而是架构在公用网络服务商所提供的网络平台(如INTERNET,ATM,FRAME RELAY等)之上的逻辑网络,用户数据在逻辑链路中传输。 ×××的功能 1、通过隧道(TUNNEL)或虚电路(VIRTUAL CIRCUIT)实现网络互联 2、支持用户安全管理 3、能够进行网络监控、故障诊断 ×××解决方案的优点 1、省钱:它可以节省长途电话费和长途专线电话费和长途专线网络费可以为用户节省30-25%的 网络应用的开销。 2、选择灵活、速度快:通过***网关,用户可以选择多种internet连通技术,而且对于 INTERNET的容量可以实现按需定制; 3、安全性好:×××的认证机制将更好地保证用户的隐私权和收发数据的完整性; 4、实现投资的保护:×××技术的应用可以建立在用户现有的防火墙的基础上,用户正在使用的 应用软件也不受影响。 ×××技术原理 1、 ×××系统使分布在不同地方的专用网络在不可信任的公共网络上安全的通信。 2、 ×××设备根据网管设置的规则,确定是否需要对数据进行加密或让数据直接通过。 3、 对需要加密的数据,×××设备对整个数据包进行加密和附上数字签名。 4、 ×××设备加上新的收据包头,其中包括目的地×××设备需要的安全信息和一些初始化参数。 5、 ×××设备对加密后的数据、鉴别包以及源IP地址、目标×××设备IP地址进行重新封装,重新封装后的数据包通过虚拟通道在公网上传输。 6、 当数据包到达目标×××设备时,数据包被解封装,数据包被解封装,数字签名,数字签名被 核对无误后,收据包被解密。 ×××配置实例 Intranet 内联网配置: Figure 3-8: Intranet ××× Scenario Physical Elements Headquarters Router 配置 hq-sanjose# show running-config Building configuration... Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname hq-sanjose ! boot system flash bootflash: boot bootldr bootflash:c7100-boot-mz.120-1.1.T boot config slot0:hq-sanjose-cfg-small no logging buffered ! crypto isakmp policy 1 authentication pre-share lifetime 84600 crypto isakmp key test12345 address 172.24.2.5 ! crypto ipsec transform-set proposal1 ah-sha-hmac esp-des esp-sha-hmac mode transport ! ! crypto map s1first local-address Serial1/0 crypto map s1first 1 ipsec-isakmp set peer 172.24.2.5 set transform-set proposal1 match address 101 ! interface Tunnel0 bandwidth 180 ip address 172.17.3.3 255.255.255.0 no ip directed-broadcast tunnel source 172.17.2.4 tunnel destination 172.24.2.5 crypto map s1first ! interface FastEthernet0/0 ip address 10.1.3.3 255.255.255.0 no ip directed-broadcast no keepalive full-duplex no cdp enable ! interface FastEthernet0/1 ip address 10.1.6.4 255.255.255.0 no ip directed-broadcast no keepalive full-duplex no cdp enable ! interface Serial1/0 ip address 172.17.2.4 255.255.255.0 no ip directed-broadcast no ip mroute-cache no keepalive fair-queue 64 256 0 framing c-bit cablelength 10 dsu bandwidth 44210 clock source internal no cdp enable crypto map s1first ! ip route 10.1.4.0 255.255.255.0 Tunnel0 ! access-list 101 permit gre host 172.17.2.4 host 172.24.2.5 ! line con 0 transport input none line aux 0 line vty 0 4 login ! end Remote Office Router 配置: ro-rtp# show running-config Building configuration... Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname ro-rtp ! boot system flash bootflash: boot bootldr bootflash:c7100-boot-mz.120-1.1.T boot config slot0:ro-rtp-cfg-small no logging buffered ! crypto isakmp policy 1 authentication pre-share lifetime 84600 crypto isakmp key test12345 address 172.17.2.4 ! crypto ipsec transform-set proposal1 ah-sha-hmac esp-des esp-sha-hmac mode transport ! ! crypto map s1first local-address Serial1/0 crypto map s1first 1 ipsec-isakmp set peer 172.17.2.4 set transform-set proposal1 match address 101 ! interface Tunnel1 bandwidth 180 ip address 172.24.3.6 255.255.255.0 no ip directed-broadcast tunnel source 172.24.2.5 tunnel destination 172.17.2.4 crypto map s1first ! interface FastEthernet0/0 ip address 10.1.4.2 255.255.255.0 no ip directed-broadcast no keepalive full-duplex no cdp enable ! interface Serial1/0 ip address 172.24.2.5 255.255.255.0 no ip directed-broadcast no ip mroute-cache no keepalive fair-queue 64 256 0 framing c-bit cablelength 10 dsu bandwidth 44210 clock source internal no cdp enable crypto map s1first ! ip route 10.1.3.0 255.255.255.0 Tunnel1 ip route 10.1.6.0 255.255.255.0 Tunnel1 ! access-list 101 permit gre host 172.24.2.5 host 172.17.2.4 ! line con 0 transport input none line aux 0 line vty 0 4 login ! end Extranet外联网配置: Figure 3-9: Extranet ××× Scenario Physical Elements Headquarters Router配置: hq-sanjose# show running-config Building configuration... Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname hq-sanjose ! boot system flash bootflash: boot bootldr bootflash:c7100-boot-mz.120-1.1.T boot config slot0:hq-sanjose-cfg-small no logging buffered ! crypto isakmp policy 1 authentication pre-share lifetime 84600 crypto isakmp key test12345 address 172.24.2.5 crypto isakmp key test67890 address 172.23.2.7 ! crypto ipsec transform-set proposal1 ah-sha-hmac esp-des esp-sha-hmac ode transport ! crypto ipsec transform-set proposal4 ah-sha-hmac esp-des esp-sha-hmac ! ! crypto map s1first local-address Serial1/0 crypto map s1first 1 ipsec-isakmp set peer 172.24.2.5 set transform-set proposal1 match address 101 ! crypto map s4second local-address Serial2/0 crypto map s4second 2 ipsec-isakmp set peer 172.23.2.7 set transform-set proposal4 match address 111 ! interface Tunnel0 bandwidth 180 ip address 172.17.3.3 255.255.255.0 no ip directed-broadcast tunnel source 172.17.2.4 tunnel destination 172.24.2.5 crypto map s1first ! interface FastEthernet0/0 ip address 10.1.3.3 255.255.255.0 no ip directed-broadcast no keepalive full-duplex no cdp enable ! interface FastEthernet0/1 ip address 10.1.6.4 255.255.255.0 no ip directed-broadcast ip nat inside no keepalive full-duplex no cdp enable ! interface Serial1/0
转载于:https://blog.51cto.com/hhlenglish/36793