• 华为防火墙ipsec vpn nat穿越2种场景配置案例


    第一种方法,分部出口有nat设备,且总部用模版,总部外线为固定地址,分部出口可以无固定地址。

    在这里插入图片描述

    主要配置:

    所有默认策略全部放行,具体怎么开策略可以等通后用命令dis firewall session table ver看
    security-policy
    default active permit

    i.配置接口IP地址
    system-view
    [sysname] sysname FW_A
    [FW_A] interface GigabitEthernet 1/0/1
    [FW_A-GigabitEthernet1/0/1] ip address 10.1.1.1 24
    [FW_A-GigabitEthernet1/0/1] quit
    [FW_A] interface GigabitEthernet 1/0/2
    [FW_A-GigabitEthernet1/0/2] ip address 1.1.2.1 24
    [FW_A-GigabitEthernet1/0/2] quit

    ii.将接口加入相应的安全区域。
    [FW_A] firewall zone trust
    [FW_A-zone-trust] add interface GigabitEthernet 1/0/1
    [FW_A-zone-trust] quit
    [FW_A] firewall zone untrust
    [FW_A-zone-untrust] add interface GigabitEthernet 1/0/2
    [FW_A-zone-untrust] quit

    c.配置默认路由下一跳地址为1.1.2.2为公网地址
    [FW_A] ip route-static 0.0.0.0 0 1.1.2.2

    2.在FW_A上配置IPSec。
    a.定义被保护的数据流。
    [FW_A] acl 3000
    [FW_A-acl-adv-3000] rule 5 permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255

    b.配置IPSec安全提议tran1。采用默认参数。
    [FW_A] ipsec proposal tran1
    [FW_A-ipsec-proposal-tran1] esp authentication-algorithm sha2-256 //默认就有
    [FW_A-ipsec-proposal-tran1] esp encryption-algorithm aes-256 //默认就有
    [FW_A-ipsec-proposal-tran1] quit

    c.配置IKE安全提议。采用默认参数。
    [FW_A] ike proposal 10
    [FW_A-ike-proposal-10] authentication-method pre-share //默认就有
    [FW_A-ike-proposal-10] prf hmac-sha2-256 //默认就有
    [FW_A-ike-proposal-10] encryption-algorithm aes-256 //默认就有
    [FW_A-ike-proposal-10] dh group14 //默认就有
    [FW_A-ike-proposal-10] integrity-algorithm hmac-sha2-256 //默认就有
    [FW_A-ike-proposal-10] quit

    d.配置IKE Peer。
    [FW_A] ike peer c
    [FW_A-ike-peer-c] ike-proposal 10
    [FW_A-ike-peer-c] pre-shared-key admin123
    [FW_A-ike-peer-c] quit

    e.配置IPSec策略模板temp。
    [FW_A] ipsec policy-template temp 1
    [FW_A-ipsec-policy-templet-temp-1] security acl 3000
    [FW_A-ipsec-policy-templet-temp-1] proposal tran1
    [FW_A-ipsec-policy-templet-temp-1] ike-peer c
    [FW_A-ipsec-policy-templet-temp-1] quit

    f.创建IPSec策略并引用IPSec策略模板temp。
    [FW_A] ipsec policy map1 10 isakmp template temp

    g.在接口GigabitEthernet 1/0/2上应用IPSec策略组map1。
    [FW_A] interface GigabitEthernet 1/0/2
    [FW_A-GigabitEthernet1/0/2] ipsec policy map1
    [FW_A-GigabitEthernet1/0/2] quit

    3.配置FW_C的基础配置。 a.配置接口IP地址,并将接口加入域。

    请根据图1的数据配置接口IP地址。

    将接口GigabitEthernet 1/0/1加入Trust区域
    接口GigabitEthernet 1/0/2加入Untrust区域

    详细步骤可参见FW_A的配置。

    c.配置静态路由,下一跳地址为10.1.5.1出口路由地址
    ip route-static 0.0.0.0 0.0.0.0 10.1.5.1

    4.在FW_C上配置IPSec策略。 a.定义被保护的数据流。
    [FW_C] acl 3000
    [FW_C-acl-adv-3000] rule 5 permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255

    b.配置IPSec安全提议tran1。采用默认参数。
    [FW_C] ipsec proposal tran1
    [FW_C-ipsec-proposal-tran1] esp authentication-algorithm sha2-256 //默认就有
    [FW_C-ipsec-proposal-tran1] esp encryption-algorithm aes-256 //默认就有
    [FW_C-ipsec-proposal-tran1] quit

    c.配置IKE安全提议。采用默认参数。
    [FW_C] ike proposal 10
    [FW_C-ike-proposal-10] authentication-method pre-share //默认就有
    [FW_C-ike-proposal-10] prf hmac-sha2-256 //默认就有
    [FW_C-ike-proposal-10] encryption-algorithm aes-256 //默认就有
    [FW_C-ike-proposal-10] dh group14 //默认就有
    [FW_C-ike-proposal-10] integrity-algorithm hmac-sha2-256 //默认就有
    [FW_C-ike-proposal-10] quit

    d.配置IKE Peer。
    [FW_C] ike peer a
    [FW_C-ike-peer-a] ike-proposal 10
    [FW_C-ike-peer-a] remote-address 1.1.2.1
    [FW_C-ike-peer-a] pre-shared-key admin123
    [FW_C-ike-peer-a] quit

    e.配置IPSec策略map1。
    [FW_C] ipsec policy map1 10 isakmp
    [FW_C-ipsec-policy-isakmp-map1-10] security acl 3000
    [FW_C-ipsec-policy-isakmp-map1-10] proposal tran1
    [FW_C-ipsec-policy-isakmp-map1-10] ike-peer a
    [FW_C-ipsec-policy-isakmp-map1-10] quit

    f.在接口GigabitEthernet 1/0/2上应用IPSec策略组map1。
    [FW_C] interface GigabitEthernet 1/0/2
    [FW_C-GigabitEthernet1/0/2] ipsec policy map1
    [FW_C-GigabitEthernet1/0/2] quit

    c.出路路由器配置。
    acl number 2000
    rule 5 permit source 10.1.2.0 0.0.0.255

    interface GigabitEthernet0/0/0
    ip address 10.1.5.1 255.255.255.0

    interface GigabitEthernet0/0/1
    ip address 1.1.5.1 255.255.255.0
    nat outbound 2000

    ip route-static 0.0.0.0 0.0.0.0 1.1.5.2
    ip route-static 10.1.2.0 255.255.255.0 10.1.5.2

    结果验证

    1.配置完成后,PC2发起访问,之后PC1与PC2之间可以相互访问。PC2同时可以访问到公网。

    2.PC2可以Ping通FW_A的1.1.2.1,同时在FW_B上可以查看NAT转换session表项。
    display firewall session table
    Current Total Sessions : 2
    udp VPN:public --> public 10.1.5.2:500[1.1.5.1:2048]–>1.1.2.1:500
    udp VPN:public --> public 10.1.5.2:4500[1.1.5.1:2048]–>1.1.2.1:4500

    3.总部防火墙FW_A上可以查看到对应的IKE SA。
    display ike sa
    IKE SA information :
    Conn-ID Peer VPN Flag(s) Phase RemoteType RemoteID

    83887864    1.1.5.1:500           RD|A     v2:2   IP          1.1.5.1
    83887652    1.1.5.1:500           RD|A     v2:1   IP          1.1.5.1
    
    • 1
    • 2

    Number of IKE SA : 2

    Flag Description:
    RD–READY ST–STAYALIVE RL–REPLACED FD–FADING TO–TIMEOUT
    HRT–HEARTBEAT LKG–LAST KNOWN GOOD SEQ NO. BCK–BACKED UP
    M–ACTIVE S–STANDBY A–ALONE NEG–NEGOTIATING

    4.分支上FW_C可以查看到对端为总部的IKE SA,FW_C是发起方,标志位为ST。
    display ike sa
    IKE SA information :
    Conn-ID Peer VPN Flag(s) Phase RemoteType RemoteID

    62887864    1.1.2.1:500           RD|ST|A  v2:2   IP          1.1.2.1
    62887652    1.1.2.1:500           RD|ST|A  v2:1   IP          1.1.2.1
    
    • 1
    • 2

    Number of IKE SA : 2

    Flag Description:
    RD–READY ST–STAYALIVE RL–REPLACED FD–FADING TO–TIMEOUT
    HRT–HEARTBEAT LKG–LAST KNOWN GOOD SEQ NO. BCK–BACKED UP
    M–ACTIVE S–STANDBY A–ALONE NEG–NEGOTIATING

    5.总部防火墙FW_A上可以查看到一对双向的IPSec SA,对应分支FW_C。
    display ipsec sa brief
    Current ipsec sa num:2

    Spu board slot 1, cpu 1 ipsec sa information:
    Number of SAs:2
    Src address Dst address SPI VPN Protocol Algorithm

    1.1.2.1         1.1.5.1       3923280450           ESP      E:AES-256 A:SHA2_256_128 
    1.1.5.1         1.1.2.1       2676437093           ESP      E:AES-256 A:SHA2_256_128
    
    • 1
    • 2

    6.分支节点FW_C上可以查看到一对双向IPSec SA。 display ipsec sa brief
    Current ipsec sa num:2

    Spu board slot 1, cpu 1 ipsec sa information:
    Number of SAs:4
    Src address Dst address SPI VPN Protocol Algorithm

    10.1.5.2         1.1.2.1       2179965693          ESP     E:AES-256 A:SHA2_256_128
    1.1.2.1         10.1.5.2       3813759530          ESP     E:AES-256 A:SHA2_256_128
    
    • 1
    • 2

    第二种方法,即做vpn又做nat,意思是电脑又和总部vpn通,又能上外网,都在一台防火墙设备上实现。

    在这里插入图片描述

    FW_A主要配置:

    acl number 3000
    rule 5 permit ip source 192.168.0.0 0.0.0.255 destination 172.16.0.0 0.0.0.255

    ipsec proposal pro1
    transfrom esp

    ike proposal 10

    ike peer fenbu_1
    pre-shared-key admin
    ike-proposal 10
    nat traversal

    ipsec policy-template temp1 1
    security acl 3000
    ike-peer fenbu_1
    proposal pro1

    ipsec policy policy1 1 isakmp template temp1

    interface GigabitEthernet1/0/0
    undo shutdown
    ip address 1.1.1.1 255.255.255.0
    service-manage ping permit
    ipsec policy policy1

    interface GigabitEthernet1/0/1
    undo shutdown
    ip address 192.168.0.1 255.255.255.0
    service-manage ping permit
    dhcp select interface

    firewall zone trust
    set priority 85
    add interface GigabitEthernet0/0/0
    add interface GigabitEthernet1/0/1

    firewall zone untrust
    set priority 5
    add interface GigabitEthernet1/0/0

    ip route-static 0.0.0.0 0.0.0.0 1.1.1.2

    FW_B主要配置:

    acl number 2000
    rule 5 permit source 172.16.0.0 0.0.0.255

    acl number 3000
    rule 5 permit ip source 172.16.0.0 0.0.0.255 destination 192.168.0.0 0.0.0.255

    ipsec proposal pro1
    transfrom esp

    ike proposal 10

    ike peer zongbu
    pre-shared-key admin
    ike-proposal 10
    remote-address 1.1.1.1
    nat traversal

    ipsec policy policy1 1 isakmp
    security acl 3000
    ike-peer zongbu
    proposal pro1

    interface GigabitEthernet1/0/0
    undo shutdown
    ip address 1.1.1.1 255.255.255.0
    service-manage ping permit
    ipsec policy policy1

    interface GigabitEthernet1/0/1
    undo shutdown
    ip address 172.16.0.1 255.255.255.0
    service-manage ping permit
    dhcp select interface

    firewall zone trust
    set priority 85
    add interface GigabitEthernet0/0/0
    add interface GigabitEthernet1/0/1

    ip route-static 0.0.0.0 0.0.0.0 2.2.2.1

    nat-policy //先匹配vpn的数据,如果是上网的会自动往下走,匹配下面那个策略
    rule name policy_vpn
    source-address 172.16.0.0 mask 255.255.255.0
    destination-address 192.168.0.0 mask 255.255.255.0
    action no-nat

    rule name policy_internet
    source-zone trust
    destination-zone untrust
    source-address 172.16.0.0 mask 255.255.255.0
    action source-nat easy-ip

    注意:

    如果内部还有对外发部的服务器映射端口,那在nat server映射时命令的尾部一定要加上no-reverse,这样就不产生server-map表,要不然vpn不通。
    nat server protocol tcp global 2.2.2.2 80 inside 172.16.0.100 80 no-reverse

  • 相关阅读:
    【Kafka】Kafka基础架构及相关概念
    idea安装MyBatisX插件
    【知识】操作系统题目
    05.SpringCloudAlibaba-注册中心Nacos
    CY3/5/7/FITC荧光素标记乳糖/蜜二糖/单乙酰氨基半乳糖
    第四章 选择结构程序设计
    React + Antd 自定义Select选择框 全选、清空功能
    21天学习挑战赛——Python操作MySQL和SqlServer
    中望CAD 2023 安装教程
    Clickhouse MAP类型
  • 原文地址:https://blog.csdn.net/ydaxia110/article/details/134311947