1、网络拓扑图

IPSEC vpn详解_Standard

2、IPSEC重要知识点

1)IPSEC SA,由一个三元组来唯一标识:安全参数索引SPI(Security Parameter Index)、目的IP地址和使用的安全协议号(AH或ESP)。其中,SPI是唯一标识SA而生成的一个32位比特的数值,它被封装在AH和ESP头部。

2)IPSec使用认证头AH(Authentication Header)和封装安全载荷ESP(Encapsulating Security Payload)两种IP传输层协议来提供认证或加密等安全服务。

3)传输模式和隧道模式比较

传输模式和隧道模式的区别在于:

  • 从安全性来讲,隧道模式优于传输模式。它可以完全地对原始IP数据报进行验证和加密。隧道模式下可以隐藏内部IP地址,协议类型和端口。
  • 从性能来讲,隧道模式因为有一个额外的IP头,所以它将比传输模式占用更多带宽。
  • 从场景来讲,传输模式主要应用于两台主机或一台主机和一台VPN网关之间通信;隧道模式主要应用于两台VPN网关之间或一台主机与一台VPN网关之间的通信。

当安全协议同时采用AH和ESP时,AH和ESP协议必须采用相同的封装模式。

3、IPSEC配置

R1:

[R1]display current-configuration  

[V200R003C00]

#

sysname R1

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 192.168.1.1 255.255.255.0  

#

interface GigabitEthernet0/0/1

ip address 10.1.1.1 255.255.255.0  

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

ospf 100 router-id 1.1.1.1  

import-route static

area 0.0.0.0  

 network 10.1.1.0 0.0.0.255  

 network 192.168.1.0 0.0.0.255  

#

ip route-static 172.16.1.0 255.255.255.0 GigabitEthernet0/0/1 10.1.1.2//远端的路由

#

user-interface con 0

authentication-mode password

idle-timeout 0 0

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

[R1]

R2:

[r2]display current-configuration  

[V200R003C00]

#

sysname r2

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

acl number 3000  

rule 10 permit ip source 192.168.1.0 0.0.0.255 destination 172.16.1.0 0.0.0.255

 

#

ipsec proposal 2to4

#

ipsec policy test 100 manual

security acl 3000

proposal 2to4

tunnel local 20.1.1.1

tunnel remote 30.1.1.2

sa spi inbound esp 12345

sa string-key inbound esp cipher %$%$u`Vj70TpB0@>_K8vu71O,.2n%$%$

sa spi outbound esp 54321

sa string-key outbound esp cipher %$%$}qY[IWU7cAugi7#,j+l;,.2n%$%$

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 10.1.1.2 255.255.255.0  

#

interface GigabitEthernet0/0/1

ip address 20.1.1.1 255.255.255.0  

ipsec policy test

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

ospf 100 router-id 2.2.2.2  

import-route direct

area 0.0.0.0  

 network 10.1.1.0 0.0.0.255  

#

ip route-static 0.0.0.0 0.0.0.0 GigabitEthernet0/0/1 20.1.1.2

#

user-interface con 0

authentication-mode password

idle-timeout 0 0

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

[r2]

R3:

<r3>display current-configuration  

[V200R003C00]

#

sysname r3

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 20.1.1.2 255.255.255.0  

#

interface GigabitEthernet0/0/1

ip address 30.1.1.1 255.255.255.0  

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

user-interface con 0

authentication-mode password

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

<r3>

R4:

[r4]display current-configuration  

[V200R003C00]

#

sysname r4

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

acl number 3001  

rule 10 permit ip source 172.16.1.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

 

#

ipsec proposal 4to2

#

ipsec policy test 100 manual

security acl 3001

proposal 4to2

tunnel local 30.1.1.2

tunnel remote 20.1.1.1

sa spi inbound esp 54321

sa string-key inbound esp cipher %$%$}qY[IWU7cAugi7#,j+l;,.2n%$%$

sa spi outbound esp 12345

sa string-key outbound esp cipher %$%$u`Vj70TpB0@>_K8vu71O,.2n%$%$

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 30.1.1.2 255.255.255.0  

ipsec policy test

#

interface GigabitEthernet0/0/1

ip address 40.1.1.1 255.255.255.0  

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

ospf 100 router-id 4.4.4.4  

import-route direct

area 0.0.0.0  

 network 40.1.1.0 0.0.0.255  

#

ip route-static 0.0.0.0 0.0.0.0 GigabitEthernet0/0/0 30.1.1.1

#

user-interface con 0

authentication-mode password

idle-timeout 0 0

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

[r4]

R5:

[r5]display current-configuration  

[V200R003C00]

#

sysname r5

#

snmp-agent local-engineid 800007DB03000000000000

snmp-agent  

#

clock timezone China-Standard-Time minus 08:00:00

#

portal local-server load portalpage.zip

#

drop illegal-mac alarm

#

set cpu-usage threshold 80 restore 75

#

aaa  

authentication-scheme default

authorization-scheme default

accounting-scheme default

domain default  

domain default_admin  

local-user admin password cipher %$%$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$

local-user admin service-type http

#

firewall zone Local

priority 15

#

interface GigabitEthernet0/0/0

ip address 40.1.1.2 255.255.255.0  

#

interface GigabitEthernet0/0/1

ip address 172.16.1.1 255.255.255.0  

#

interface GigabitEthernet0/0/2

#

interface NULL0

#

ospf 100 router-id 5.5.5.5  

import-route static

area 0.0.0.0  

 network 40.1.1.0 0.0.0.255  

 network 172.16.1.0 0.0.0.255  

#

ip route-static 192.168.1.0 255.255.255.0 GigabitEthernet0/0/0 40.1.1.1//远端的ip地址

#

user-interface con 0

authentication-mode password

idle-timeout 0 0

user-interface vty 0 4

user-interface vty 16 20

#

wlan ac

#

return

[r5]