H3C-×××的配置

发布时间:2019-08-17 08:51:07编辑:auto阅读(1767)

    H3C-×××的配置

    拓扑图

    1. 配置IP地址
      <R1>system-view
      [R1]interface e0/1
      [R1-Ethernet0/1]ip address 192.168.100.254 255.255.255.0
      [R1]interface e0/0
      [R1-Ethernet0/0]ip address 192.168.13.1 255.255.255.0
       
      <R2>system-view
      [R2]interface e0/1
      [R2-Ethernet0/1]ip address 192.168.200.254 255.255.255.0
      [R2]interface e0/0
      [R2-Ethernet0/0]ip address 192.168.23.2 255.255.255.0
       
       
      <R3>system-view
      [R3]interface e0/0
      [R3-Ethernet0/0]ip address 192.168.13.3 255.255.255.0
      [R3]interface e0/1
      [R3-Ethernet0/1]ip address 192.168.23.3 255.255.255.0
       
      PC1的设置

      PC2的设置

    2. 配置手工方式的Tunnel
      [R1]acl 3000
      [R1-acl-3000]rule permit ip source 192.168.100.1 0.0.0.255 destination 192.168.200.2 0.0.0.255
      [R1-acl-3000]rule deny ip source any destination any
      [R1-acl-3000]quit
      //创建访问规则
      [R1]ipsec proposal trans1
      [R1-ipsec-proposal-trans1]encapsulation-mode tunnel
      [R1-ipsec-proposal-trans1]transform esp-new
      [R1-ipsec-proposal-trans1]esp-new authentication md5-hmac-96
      [R1-ipsec-proposal-trans1]esp-new encryption-algorithm des
      [R1-ipsec-proposal-trans1]quit
      //创建提议,以及对提议的加密、认证方式
      [R1]ipsec policy p1 100 manual
      [R1-ipsec-policy-p1-100]security acl 3000
      [R1-ipsec-policy-p1-100]proposal trans1
      [R1-ipsec-policy-p1-100]tunnel local 192.168.13.1
      [R1-ipsec-policy-p1-100]tunnel remote 192.168.23.2
      [R1-ipsec-policy-p1-100]sa inbound esp spi 123456
      [R1-ipsec-policy-p1-100]sa inbound esp string-key asdf
      [R1-ipsec-policy-p1-100]sa outbound esp spi 654321
      [R1-ipsec-policy-p1-100]sa outbound esp string-key fdsa
      [R1-ipsec-policy-pl -100]quit
      //创建策略,包含上述提议,该策略将应用于Tunnel中,需要注意的是Tunnel两端的路由器策略配置,R1中的tunnel local地址是R2的tunnel remote, inbound是R2的outbound。
      [R1]interface e0/0
      [R1-Ethernet0/0]ipsec policy p1
      //在出口上应用策略
       
       
      [R2]acl 3001
      [R2-acl-3001]rule permit ip source 192.168.200.2 0.0.0.255 destination 192.168.100.1 0.0.0.255
      [R2-acl-3001]rule deny ip source any destination any
      [R2-acl-3001]quit
      //创建访问规则
      [R2]ipsec proposal trans2
      [R2-ipsec-proposal-trans2]encapsulation-mode tunnel
      [R2-ipsec-proposal-trans2]transform esp-new
      [R2-ipsec-proposal-trans2]esp-new authentication md5-hmac-96
      [R2-ipsec-proposal-trans2]esp-new encryption-algorithm des
      [R2-ipsec-proposal-trans2]quit
      //创建提议,以及对提议的加密、认证方式
      [R2]ipsec policy p2 200 manual
      [R2-ipsec-policy-p2-200]security acl 3001
      [R2-ipsec-policy-p2-200]proposal trans2
      [R2-ipsec-policy-p2-200]tunnel local 192.168.23.2
      [R2-ipsec-policy-p2-200]tunnel remote 192.168.13.1
      [R2-ipsec-policy-p2-200]sa inbound esp spi 654321
      [R2-ipsec-policy-p2-200]sa inbound esp string-key fdsa
      [R2-ipsec-policy-p2-200]sa outbound esp spi 123456
      [R2-ipsec-policy-p2-200]sa outbound esp string-key asdf
      [R2-ipsec-policy-p2-200]quit
      [R2]interface e0/0
      [R2-Ethernet0/0]ipsec policy p2
    3. 在Tunnel两端的路由器上各添加一条默认路由,是内网地址能够和外部连接。
      ip route-static 0.0.0.0 0.0.0.0 192.168.13.3 preference 60   //R1上的默认路由
      ip route-static 0.0.0.0 0.0.0.0 192.168.23.3 preference 60   //R2上的默认路由
    4. 查看Tunnel状态,以及PC1和PC2之间的连通性。
      ipsec policy name: p1
       ipsec policy sequence: 100
       negotiation mode: manual
       security acl: 3000
       local address: 192.168.13.1
       remote address: 192.168.23.2
       proposal name: trans1
       esp(inbound) setting:
         esp spi: 654321 (0x9fbf1)
         esp string-key: fdsa
         esp encryption-hex:
         esp authen-hex:
       esp(outbound) setting:
         esp spi: 123456 (0x1e240)
         esp string-key: asdf
         esp encryption-hex:
         esp authen-hex:
       OutBound SA has been established.
       InBound SA has been established.
      //路由器R1端的Tunnel状态
      ipsec policy name: p2
      ipsec policy sequence: 200
      negotiation mode: manual
      security acl: 3001
      local address: 192.168.23.2
      remote address: 192.168.13.1
      proposal name: trans2
      esp(inbound) setting:
       esp spi: 123456 (0x1e240)
       esp string-key: asdf
       esp encryption-hex:
       esp authen-hex:
      esp(outbound) setting:
       esp spi: 654321 (0x9fbf1)
       esp string-key: fdsa
       esp encryption-hex:
       esp authen-hex:
      OutBound SA has been established.
      InBound SA has been established.
      //路由器R2端的Tunnel状态
       
      //在PC1上pingPC2
      正在 Ping 192.168.200.2 具有 32 字节的数据:
      来自 192.168.200.2 的回复: 字节=32 时间=3ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=9ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=3ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=3ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=9ms TTL=254
    5. 配置自动方式的Tunnel。
      [R1]ipsec policy p3 300 isakmp
      [R1-ipsec-policy-p3-300]security acl 3000
      [R1-ipsec-policy-p3-300]proposal trans1
      [R1-ipsec-policy-p3-300]tunnel local 192.168.13.1
      [R1-ipsec-policy-p3-300]tunnel remote 192.168.23.2
      [R1-ipsec-policy-p3-300]quit
      [R1]ike pre-shared-key 12345 remote 192.168.23.2
      [R1]interface e0/0
      [R1-Ethernet0/0]ipsec policy p3
      //提议和手工方式一样,策略修改为自动方式的,而且共享密钥的设置,Tunnel两端要一致。
      [R2]ipsec policy p4 400 isakmp
      [R2-ipsec-policy-p4-400]security acl 3001
      [R2-ipsec-policy-p4-400]proposal trans2
      [R2-ipsec-policy-p4-400]tunnel local 192.168.23.2
      [R2-ipsec-policy-p4-400]tunnel remote 192.168.13.1
      [R2-ipsec-policy-p4-400]quit
      [R2]ike pre-shared-key 12345 remote 192.168.13.1
      [R2]interface e0/0
      [R2-Ethernet0/0]ipsec policy p4
    6. Tunnel状态以及PC1和PC2之间的连通性。
      ipsec policy name: p3
      ipsec policy sequence: 300
      negotiation mode: isakmp
      security acl: 3000
      remote address 0: 192.168.23.2
      Proposal name: trans1
      ipsec sa duration: 3600 seconds
      ipsec sa duration: 1843200 kilobytes
      OutBound SA has been established.
      InBound SA has been established.
      //路由器R1端的Tunnel状态
      ipsec policy name: p4
      ipsec policy sequence: 400
      negotiation mode: isakmp
      security acl: 3001
      remote address 0:192.168.13.1
      Proposal name: trans2
      ipsec sa duration: 3600 seconds
      ipsec sa duration: 1843200 kilobytes
      OutBound SA has been established.
      InBound SA has been established.
      //路由器R2端的Tunnel状态
      正在 Ping 192.168.200.2 具有 32 字节的数据:
      来自 192.168.200.2 的回复: 字节=32 时间=3ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=9ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=3ms TTL=254
      来自 192.168.200.2 的回复: 字节=32 时间=3ms TTL=254
      //从PC1 ping PC2的情况

     

关键字

上一篇: A Crash Course in 3D

下一篇: spring security3 dem