华为ensp防火墙ipsec-vpn点到多点场景(1总-3分)

需求很简单,中间的R代表互联网(公网),企业场景1总部对三分部,用过防火墙进行ipsec vpn点到多点部署。

解题思路,只要是会ipsec vpn的点到点,既可以做出点到多点实验效果。

该场景适用于点到多点的毕设、大作业、课程等场景,该拓扑只不过是把各公司内网简化成一台pc,同学们要有举一反三的能力

不要质疑我答案的正确性,我百分百保证,你照着敲大概率也会做不通,要具有排障能力。

R配置

#
sysname R
#
undo info-center enable
#
interface GigabitEthernet0/0/0
 ip address 100.1.21.2 255.255.255.252 
#
interface GigabitEthernet0/0/1
 ip address 100.1.22.2 255.255.255.252 
#
interface GigabitEthernet0/0/2
 ip address 100.1.23.2 255.255.255.252 
#
interface GigabitEthernet0/0/3
 ip address 100.1.24.2 255.255.255.252 
FW1配置:
sysname FW1
#
acl number 3000
 rule 1 permit ip source 172.16.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255 
acl number 3001
 rule 1 permit ip source 172.16.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255  
acl number 3002
 rule 1 permit ip source 172.16.10.0 0.0.0.255 destination 192.168.40.0 0.0.0.255 
#
ipsec proposal tran1
 esp authentication-algorithm sha1 
 esp encryption-algorithm aes-256 
#
ike proposal 10
 encryption-algorithm aes-256 
 dh group2 
 authentication-algorithm sha1 
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256 
 prf hmac-sha2-256 
#
ike peer f2
 pre-shared-key 18812668402
 ike-proposal 10
 remote-address 100.1.22.1 
ike peer f3
 pre-shared-key 18812668402
 ike-proposal 10
 remote-address 100.1.23.1 
ike peer f4
 pre-shared-key 18812668402
 ike-proposal 10
 remote-address 100.1.24.1 
#
ipsec policy ips 1 isakmp
 security acl 3000
 ike-peer f2
 proposal tran1
ipsec policy ips 2 isakmp
 security acl 3001
 ike-peer f3
 proposal tran1
ipsec policy ips 3 isakmp
 security acl 3002
 ike-peer f4
 proposal tran1
#
interface GigabitEthernet1/0/0
 undo shutdown
 ip address 100.1.21.1 255.255.255.252
 service-manage ping permit
 ipsec policy ips
#
interface GigabitEthernet1/0/1
 undo shutdown
 ip address 172.16.10.2 255.255.255.0
 service-manage ping permit
#
firewall zone trust
 add interface GigabitEthernet1/0/1
#
firewall zone untrust
 add interface GigabitEthernet1/0/0
#
ip route-static 0.0.0.0 0.0.0.0 100.1.21.2
#
security-policy
 rule name L-U
  source-zone local
  source-zone untrust
  destination-zone local
  destination-zone untrust
  action permit
 rule name f-f4
  source-zone trust
  destination-zone untrust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.40.0 mask 255.255.255.0
  action permit
 rule name f4-f
  source-zone untrust
  destination-zone dmz
  destination-zone trust
  source-address 192.168.40.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action permit
 rule name f-f2
  source-zone trust
  destination-zone untrust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.20.0 mask 255.255.255.0
  action permit
 rule name f2-f
  source-zone untrust
  destination-zone dmz
  destination-zone trust
  source-address 192.168.20.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action permit
 rule name f-f3
  source-zone trust
  destination-zone untrust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.30.0 mask 255.255.255.0
  action permit
 rule name f3-f
  source-zone untrust
  destination-zone dmz
  destination-zone trust
  source-address 192.168.30.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action permit
 rule name f-isp
  source-zone trust
  destination-zone untrust
  source-address 172.16.10.0 mask 255.255.255.0
  action permit
#
nat-policy
 rule name z-f234
  source-zone trust
  destination-zone untrust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.40.0 mask 255.255.255.0
  destination-address 192.168.20.0 mask 255.255.255.0
  destination-address 192.168.30.0 mask 255.255.255.0
  action no-nat
 rule name any-isp
  source-zone trust
  destination-zone untrust
  source-address 172.16.10.0 mask 255.255.255.0
  action source-nat easy-ip
fw2配置

sysname FW2
#
acl number 3000
 rule 5 permit ip source 192.168.20.0 0.0.0.255 destination 172.16.10.0 0.0.0.255  
#
ipsec proposal tran1
 esp authentication-algorithm sha1 
 esp encryption-algorithm aes-256 
#
ike proposal 10
 encryption-algorithm aes-256 
 dh group2 
 authentication-algorithm sha1 
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256 
 prf hmac-sha2-256 
#
ike peer f
 pre-shared-key 18812668402
 ike-proposal 10
 remote-address 100.1.21.1 
#
ipsec policy map1 1 isakmp
 security acl 3000
 ike-peer f
 proposal tran1
#
interface GigabitEthernet1/0/0
 undo shutdown
 ip address 192.168.20.254 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/1
 undo shutdown
 ip address 100.1.22.1 255.255.255.252
 service-manage ping permit
 ipsec policy map1
#
firewall zone trust
 add interface GigabitEthernet1/0/0
#
firewall zone untrust
 add interface GigabitEthernet1/0/1
#
ip route-static 0.0.0.0 0.0.0.0 100.1.22.2
#
security-policy
 rule name L-U
  source-zone local
  source-zone untrust
  destination-zone local
  destination-zone untrust
  action permit
 rule name f2-f
  source-zone trust
  destination-zone untrust
  source-address 192.168.20.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action permit
 rule name f-f2
  source-zone untrust
  destination-zone trust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.20.0 mask 255.255.255.0
  action permit
 rule name f2-isp
  source-zone trust
  destination-zone untrust
  source-address 192.168.20.0 mask 255.255.255.0
  action permit
#
nat-policy
 rule name f2-f
  source-zone trust
  destination-zone untrust
  source-address 192.168.20.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action no-nat
 rule name f2-isp
  source-zone trust
  destination-zone untrust
  source-address 192.168.20.0 mask 255.255.255.0
  action source-nat easy-ip
fw3配置

sysname FW3 
#
acl number 3000
 rule 5 permit ip source 192.168.30.0 0.0.0.255 destination 172.16.10.0 0.0.0.255 

#
ipsec proposal tran1
 esp authentication-algorithm sha1 
 esp encryption-algorithm aes-256 
#
ike proposal 10
 encryption-algorithm aes-256 
 dh group2 
 authentication-algorithm sha1 
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256 
 prf hmac-sha2-256 
#
ike peer f
 pre-shared-key 18812668402
 ike-proposal 10
 remote-address 100.1.21.1
#
ipsec policy map1 1 isakmp
 security acl 3000
 ike-peer f
 proposal tran1
#
interface GigabitEthernet1/0/0
 undo shutdown
 ip address 192.168.30.254 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/1
 undo shutdown
 ip address 100.1.23.1 255.255.255.252
 service-manage ping permit
 ipsec policy map1
#
firewall zone trust
 add interface GigabitEthernet1/0/0
#
firewall zone untrust
 add interface GigabitEthernet1/0/1
#
ip route-static 0.0.0.0 0.0.0.0 100.1.23.2
#
security-policy
 rule name L-U
  source-zone local
  source-zone untrust
  destination-zone local
  destination-zone untrust
  action permit
 rule name f3-f
  source-zone trust
  destination-zone untrust
  source-address 192.168.30.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action permit
 rule name f-f3
  source-zone untrust
  destination-zone trust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.30.0 mask 255.255.255.0
  action permit
 rule name f3-isp
  source-zone trust
  destination-zone untrust
  source-address 192.168.30.0 mask 255.255.255.0
  action permit
#
nat-policy
 rule name f3-f
  source-zone trust
  destination-zone untrust
  source-address 192.168.30.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action no-nat
 rule name f3-isp
  source-zone trust
  destination-zone untrust
  source-address 192.168.30.0 mask 255.255.255.0
  action source-nat easy-ip

sysname FW4
#
acl number 3000
 rule 5 permit ip source 192.168.40.0 0.0.0.255 destination 172.16.10.0 0.0.0.255  
#
ipsec proposal tran1
 esp authentication-algorithm sha1 
 esp encryption-algorithm aes-256 
#
ike proposal 10
 encryption-algorithm aes-256 
 dh group2 
 authentication-algorithm sha1 
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256 
 prf hmac-sha2-256 
#
ike peer f
 pre-shared-key 18812668402
 ike-proposal 10
 remote-address 100.1.21.1 
#
ipsec policy map1 1 isakmp
 security acl 3000
 ike-peer f
 proposal tran1
#
interface GigabitEthernet1/0/0
 undo shutdown
 ip address 192.168.40.254 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/1
 undo shutdown
 ip address 100.1.24.1 255.255.255.252
 service-manage ping permit
 ipsec policy map1
#
firewall zone trust
 add interface GigabitEthernet1/0/0
#
firewall zone untrust
 add interface GigabitEthernet1/0/1
#
ip route-static 0.0.0.0 0.0.0.0 100.1.24.2
#
security-policy
 rule name L-U
  source-zone local
  source-zone untrust
  destination-zone local
  destination-zone untrust
  action permit
 rule name f4-f
  source-zone trust
  destination-zone untrust
  source-address 192.168.40.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action permit
 rule name f-f4
  source-zone untrust
  destination-zone trust
  source-address 172.16.10.0 mask 255.255.255.0
  destination-address 192.168.40.0 mask 255.255.255.0
  action permit
 rule name f4-isp
  source-zone trust
  destination-zone untrust
  source-address 192.168.40.0 mask 255.255.255.0
  action permit
#
nat-policy
 rule name f4-f
  source-zone trust
  destination-zone untrust
  source-address 192.168.40.0 mask 255.255.255.0
  destination-address 172.16.10.0 mask 255.255.255.0
  action no-nat
 rule name f4-isp
  source-zone trust
  destination-zone untrust
  source-address 192.168.40.0 mask 255.255.255.0
  action source-nat easy-ip

杜绝拿着配置复制粘贴,不通就来质疑我的答案,真是可笑!!!

测试总部防火墙到三台防火墙的建立ike隧道的接口地址连通性

连通性正常后,ping各个分部的业务,观察ike sa 和ipsec sa

初次完成全补配置后,测试过程中均丢2个包,丢包为arp的过程,真机不会

ike sa 对等体有三对儿

ipsec sa 的摘要信息也是3对儿

ipsec sa 可以看到你出方向的加密流量

细心的同学可以反复查看该命令,你会发现每次ping后,进出加密流量是增长过程

下课!

### 如何在ENSP防火墙上配置IPSec实现双链路冗余 为了实现在ENSP防火墙上的IPSec配置并确保双链路冗余,需考虑多个方面。首先,由于IPSec仅支持单播报文[^1],这意味着对于大型网络而言,直接利用IPSec进行通信可能会遇到挑战,特别是涉及到动态路由更新时。 #### 解决方案概述 通过引入GRE隧道技术,可以在现有基础上增强功能。GRE不仅能够承载单播报文,还兼容组播和广播报文,这使得即使是在启用IPSec的情况下也能顺利运用诸如OSPF这样的动态路由协议。具体来说: - **建立GRE Tunnel**:创建两个GRE隧道别对应两条物理路径。 - **配置IPSec保护这些Tunnel**:为每一个GRE隧道设置相应的安全策略以保障数据传输的安全性。 - **部署VRRP机制**:用于提供高可用性和负载均衡能力,确保当某一路由失效时另一条线路可立即接管服务而不影响整体性能[^3]。 #### 实际操作指南 以下是具体的命令行配置实例,假设环境中有两台防火墙FW1和FW2以及对应的路由器R1和R2。 ##### 步骤一:定义接口参数 ```shell // 在FW1上执行如下指令 interface GigabitEthernet0/0/1 ip address 192.168.1.1 255.255.255.0 exit ``` ##### 步骤二:构建GRE Tunnels ```shell // 创建第一个GRE tunnel (towards R1) interface Tunnel0 source GigabitEthernet0/0/1 destination 192.168.1.2 // 对端地址应指向R1的实际公网IP ip address 10.0.0.1 255.255.255.252 exit // 创建第二个GRE tunnel (towards R2), 类似于上面的操作但是更改目标地址到R2. ``` ##### 步骤三:设定IPSec Policy ```shell crypto isakmp policy 10 encr aes 256 authentication pre-share group 5 crypto isakmp key CISCOpw address 0.0.0.0 0.0.0.0 crypto ipsec transform-set MY_TRANSFORM_SET esp-aes 256 esp-sha-hmac crypto map MY_MAP 10 ipsec-isakmp set peer 192.168.1.x // 这里的X取决于你要连接的是哪个远程节点(R1 or R2). set transform-set MY_TRANSFORM_SET match address ACL_IPSEC access-list ACL_IPSEC extended permit ip any host 10.0.0.2 // 修改此ACL匹配实际需求 ``` ##### 步骤四:激活VRRP ```shell // 应用至内部局域网侧的接口 interface Vlanif100 vrrp vrid 1 virtual-ip 172.16.200.254 priority 150 // 设置较高优先级使当前设备成为master, 默认值为100 preempt mode timer delay 60 // 启动抢占模式,并延迟一定时间再切换状态以防频繁变动 exit ``` 以上步骤完成后,还需重复上述过程针对第二条链路上的相关组件完成相同配置,以此达到真正的双活效果。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

B站-白话聊网络

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值