H3C IPSec配置实例

发布时间:2019-09-07 08:10:53编辑:auto阅读(2372)

     

     

     


     

    配置步骤:

    一、.使得R1R3之间(公网之间)能够通信

    [R1]ip route-static 0.0.0.0 0.0.0.0 12.1.1.2

    [R3]ip route-static 0.0.0.0 0.0.0.0 23.1.1.2

     

    二、IPSEC配置

    R1配置:

    1.配置感兴趣的数据流

    [R1]acl  num 3000

    [R1-acl-adv-3000]rule  permit  ip source  192.168.1.1 0.0.0.0 destination 192.168.2.1 0.0.0.0

     

    2.IKE策略配置

    [R1]ike proposal  10                             //创建IKE提议,并进入IKE视图

    [R1-ike-proposal-10]encryption-algorithm 3des-cbc     //IKE提议使用的加密算法

    [R1-ike-proposal-10]authentication-method  pre-share  //IKE提议使用的密钥处理方式

    [R1-ike-proposal-10]authentication-algorithm  md5    //IKE提议使用的验证算法

    [R1-ike-proposal-10]dh group2                     //IKE提议使用的DH交换组

    [R1-ike-proposal-10]sa duration 86400               //ISAKMP SA生存周期

    [R1-ike-proposal-10]

     

    3.配置IKE对等体及密钥

    [R1]ike peer  R3                         //创建IKE对等体,并进入IKE对等体视图

    [R1-ike-peer-r3]exchange-mode main         //IKE对等体的协商模式

    [R1-ike-peer-r3]pre-shared-key h3c           //IKE对等体的密钥

    [R1-ike-peer-r3]local-address 12.1.1.1         //本端安全网关地址

    [R1-ike-peer-r3]remote-address 23.1.1.3       //对端安全网关地址

    [R1-ike-peer-r3]remote-name R3             //对端安全网关名称

    [R1]ike local-name  R1                   //本端安全网关名称

    [R1]

     

     

    4. IPSEC安全提议配置

    [R1]ipsec  proposal r1                                //创建IPSEC安全提议

     [R1-ipsec-proposal-r1]transform  esp                   //安全协议

    [R1-ipsec-proposal-r1]esp encryption-algorithm  3des       //ESP协议采用加密算法

    [R1-ipsec-proposal-r1]esp authentication-algorithm  md5    //ESP协议采用验证算法

    [R1-ipsec-proposal-r1]encapsulation-mode tunnel           //ESP协议采用工作模式

    [R1-ipsec-proposal-r1]

     

    5.配置IKE协商的安全策略

    [R1]ipsec  policy 1 10 isakmp                           //创建一条安全策略

    [R1-ipsec-policy-isakmp-1-10]security acl 3000             //配置安全c策略所引用的ACL

    [R1-ipsec-policy-isakmp-1-10]proposal  r1                //配安全策略所引用的安全提议

    [R1-ipsec-policy-isakmp-1-10]ike-peer r3                  //引用的IKE对等体

    [R1-ipsec-policy-isakmp-1-10]pfs dh-group5                //DH

    [R1-ipsec-policy-isakmp-1-10]sa duration time-based  86400  //ipsec SA生存周期

    [R1-ipsec-policy-isakmp-1-10]q

     

    6.在接口上应用安全策略

    [R1]int s0/2/0

    [R1-Serial0/2/0]ipsec  policy 1   //在接口上应用安全策略

    [R1]

     

     

     

    R3的配置

    [R3]ip route-static 0.0.0.0 0.0.0.0 23.1.1.2

    [R3]acl number  3000

    [R3-acl-adv-3000]rule pe

    [R3-acl-adv-3000]rule permit  ip source 192.168.2.1 0.0.0.0 destination  192.168.1.1 0.0.0.0

    [R3-acl-adv-3000]q

     

    [R3]ike proposal  10

    [R3-ike-proposal-10]encryption-algorithm  3des-cbc

    [R3-ike-proposal-10]authentication-method pre-share

    [R3-ike-proposal-10]authentication-algorithm md5

    [R3-ike-proposal-10]dh group2

    [R3-ike-proposal-10]sa duration 86400

    [R3-ike-proposal-10]q

     

    [R3]ike peer R1

    [R3-ike-peer-r1]exchange-mode main

    [R3-ike-peer-r1]pre-shared-key  h3c

    [R3-ike-peer-r1]local-a 23.1.1.3

    [R3-ike-peer-r1]remote-address 12.1.1.1

    [R3-ike-peer-r1]remote-name R1

    [R3-ike-peer-r1]Q

     

    [R3]ipsec proposal r3

    [R3-ipsec-proposal-r3]transform esp

    [R3-ipsec-proposal-r3]esp encryption-algorithm  3des

    [R3-ipsec-proposal-r3]esp authentication-algorithm md5

    [R3-ipsec-proposal-r3]encapsulation-mode tunnel

    [R3-ipsec-proposal-r3]q

     

    [R3]ipsec  policy 1 10 isakmp

    [R3-ipsec-policy-isakmp-1-10]security  acl 3000

    [R3-ipsec-policy-isakmp-1-10]proposal  r3

    [R3-ipsec-policy-isakmp-1-10]ike-peer R1     

    [R3-ipsec-policy-isakmp-1-10]sa duration  time-based  86400

    [R3-ipsec-policy-isakmp-1-10]q

     

    [R3]int s0/2/0

    [R3-Serial0/2/0]ipsec  policy  1

    [R3-Serial0/2/0]q

     

    三、测试实验结果

     [R1]ping -a 192.168.1.1 192.168.2.1

      PING 192.168.2.1: 56  data bytes, press CTRL_C to break

        Reply from 192.168.2.1: bytes=56 Sequence=1 ttl=255 time=5 ms

        Reply from 192.168.2.1: bytes=56 Sequence=2 ttl=255 time=20 ms

        Request time out

        Reply from 192.168.2.1: bytes=56 Sequence=4 ttl=255 time=26 ms

        Request time out

     

      --- 192.168.2.1 ping statistics ---

        5 packet(s) transmitted

        3 packet(s) received

        40.00% packet loss

        round-trip min/avg/max = 5/17/26 ms

     [R1]

    此时两个内网之间能够正常通信。实验完成

     

     

     

     

    调试命令:

    1.显示IKE对等体配置参数

    [R1]dis ike peer

     

    ---------------------------

     IKE Peer: r3

       exchange mode: main on phase 1

       pre-shared-key cipher nw1kqzgZJnA=

       peer id type: ip

       peer ip address: 23.1.1.3

       local ip address: 12.1.1.1

       peer name: R3

       nat traversal: disable

       dpd:

    ---------------------------

     

    [R1]

     

    2.显示当前ISAKMP SA的信息

    [R1]dis ike sa

        total phase-1 SAs:  1

        connection-id  peer            flag        phase   doi

      ----------------------------------------------------------

            3          23.1.1.3        RD|ST         2     IPSEC

            2          23.1.1.3        RD|ST         1     IPSEC

     

      flag meaning

      RD--READY ST--STAYALIVE RL--REPLACED FD--FADING TO--TIMEOUT

    [R1]

     

     

     

    3.显示每个IKE提议的配置参数

    [R1]dis ike sa

        total phase-1 SAs:  1

        connection-id  peer            flag        phase   doi

      ----------------------------------------------------------

            3          23.1.1.3        RD|ST         2     IPSEC

            2          23.1.1.3        RD|ST         1     IPSEC

     

      flag meaning

      RD--READY ST--STAYALIVE RL--REPLACED FD--FADING TO--TIMEOUT

    [R1]dis ike pro

    [R1]dis ike proposal

     priority authentication authentication encryption Diffie-Hellman duration

                  method       algorithm    algorithm     group       (seconds)

    ---------------------------------------------------------------------------

      10       PRE_SHARED     MD5         3DES_CBC        MODP_1024      86400   

      default  PRE_SHARED     SHA         DES_CBC         MODP_768       86400   

    [R1]

     

    4.显示IPsec安全策略信息

    [R1]dis ipsec  policy

     

    ===========================================

    IPsec Policy Group: "1"

    Using interface: {Serial0/2/0}

    ===========================================

     

      -----------------------------

      IPsec policy name: "1"

      sequence number: 10

      mode: isakmp

      -----------------------------

        security data flow : 3000

        selector mode: standard

        ike-peer name:  r3

        perfect forward secrecy: DH group 5

        proposal name:  r1

        IPsec sa local duration(time based): 86400 seconds

        IPsec sa local duration(traffic based): 1843200 kilobytes

    [R1]

     

     

    5.显示IPSEC安全提议信息

    [R1]dis ipsec  proposal

     

      IPsec proposal name: r1

        encapsulation mode: tunnel

        transform: esp-new

        ESP protocol: authentication md5-hmac-96, encryption 3des

    [R1]

     

     

     

     

    6.显示IPSEC SA的信息

    [R1]dis ipsec  sa

    ===============================

    Interface: Serial0/2/0

        path MTU: 1500

    ===============================

     

      -----------------------------

      IPsec policy name: "1"

      sequence number: 10

      mode: isakmp

      -----------------------------

        connection id: 3

        encapsulation mode: tunnel

        perfect forward secrecy: DH group 5

        tunnel:

            local  address: 12.1.1.1

            remote address: 23.1.1.3

        Flow :

            sour addr: 192.168.1.1/255.255.255.255  port: 0  protocol: IP

            dest addr: 192.168.2.1/255.255.255.255  port: 0  protocol: IP

     

        [inbound ESP SAs]

          spi: 2476921505 (0x93a2d2a1)

          proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5

          sa remaining key duration (bytes/sec): 1887435624/84789

          max received sequence-number: 14

          udp encapsulation used for nat traversal: N

     

        [outbound ESP SAs]

          spi: 1974141924 (0x75ab03e4)

          proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5

          sa remaining key duration (bytes/sec): 1887435624/84789

          max sent sequence-number: 15

          udp encapsulation used for nat traversal: N

    [R1]

     

    7.显示IPSEC处理的报文信息

    [R1]dis ipsec  statistics

      the security packet statistics:

        input/output security packets: 14/14

        input/output security bytes: 1176/1176

        input/output dropped security packets: 0/1

        dropped security packet detail:

          not enough memory: 0

          can't find SA: 1

          queue is full: 0

          authentication has failed: 0

          wrong length: 0

          replay packet: 0

          packet too long: 0

          wrong SA: 0

    [R1]

     

关键字