Vff08;Internet Protocol SecurityVff09;是IETFVff08;Internet Engineering Task ForceVff09;制订的一组开放的网络安宁和谈Vff0c;正在IP层通过数据起源认证、数据加密、数据完好性和抗重放罪能来担保通信单方Internet上传输数据的安宁性。 IPSec 架构IPSec xPN体系构造次要由AHVff08;Authentication HeaderVff09;、ESPVff08;Encapsulating Security PayloadVff09;和IKEVff08;Internet Key EVchangeVff09;和谈淘件构成。通过AH和ESP那两个安宁和谈来真现IP数据报文的安宁传送。 AH和谈Vff1a;次要供给的罪能无数据源验证、数据完好性校验和防报文重放罪能。然而Vff0c;AH其真不加密所护卫的数据报。 ESP和谈Vff1a;供给AH和谈的所有罪能外Vff08;但其数据完好性校验不蕴含IP头Vff09;Vff0c;还可供给对IP报文的加密罪能。 IKE和谈Vff1a;用于主动协商AH和ESP所运用的暗码算法Vff0c;建设和维护安宁联盟SA等效劳。 企业对网络安宁性的需求日益提升Vff0c;而传统的TCP/IP和谈缺乏有效的安宁认证和保密机制。IPSecVff08;Internet Protocol SecurityVff09;做为一种开放范例的安宁框架构造Vff0c;可以用来担保IP数据报文正在网络上传输的奥密性、完好性和防重放。 如下图所示Vff0c;AR1为企业总部网关Vff0c;AR3为企业分部网关Vff0c;总部取分部通过公网建设通信。总部子网为192.168.1.0/24Vff0c;分部子网为192.168.2.0/24Vff0c;AR2模拟ISPVff0c;用loopbacke口模拟公网IP。 企业欲望对总部子网取分部子网之间互相会见的流质停行安宁护卫。总部取分部通过公网建设通信Vff0c;可以正在总部网关取分部网关之间建设一个IPSec隧道来施止安宁护卫。 手工方式Vff1a;SA所需的全副信息都必须手工配置。 IKE动态协商方式Vff1a;由IKE和谈完成密钥的主动协商Vff0c;真现动态协商来创立和维护SA。 IPSec xPN配置轨范Vff08;配置思路Vff09; 静态IPSec配置Vff08;手工方式配置Vff09;1. 正在AR2上配购买法名和接口的IP地址Vff0c;模拟ISP网络。 <Huawei> system-ZZZiew [Huawei] sysname AR2 [AR2] interface GigabitEthernet0/0/0 [AR2-GigabitEthernet0/0/0] ip address 110.1.1.2 255.255.255.0 [AR2-GigabitEthernet0/0/0] quit [AR2]interface GigabitEthernet0/0/1 [AR2-GigabitEthernet0/0/1] ip address 110.1.2.1 255.255.255.0 [AR2-GigabitEthernet0/0/1] quit [AR2]interface LoopBack0 [AR2-LoopBack0] ip address 1.1.1.1 255.255.255.0 [AR2-LoopBack0] quit2. 划分正在AR1和AR3上配购买法名、接口的IP地址和默许路由Vff0c;担保两路由器之间可以互通。 #正在AR1上配置默许路由 [AR1] ip route-static 0.0.0.0 0.0.0.0 110.1.1.2#正在AR3上配购买法名和接口的IP地址 <Huawei> system-ZZZiew [Huawei] sysname AR3 [AR3] interface GigabitEthernet0/0/1 [AR3-GigabitEthernet0/0/1] ip address 110.1.2.2 255.255.255.0 [AR3-GigabitEthernet0/0/1] quit [AR3]interface GigabitEthernet0/0/2 [AR3-GigabitEthernet0/0/2] ip address 192.168.1.254 255.255.255.0 [AR3-GigabitEthernet0/0/2] quit#正在AR3上配置默许路由 [AR3] ip route-static 0.0.0.0 0.0.0.0 110.1.2.13. 划分正在AR1和AR3上配置ACLVff0c;以界说各自须要护卫的IPSec数据流。 #正在AR3上配置ACLVff0c;界说由子网192.168.2.0/24去子网192.168.1.0/24的数据流。 [AR3] acl number 3000 [AR3-acl-adZZZ-3000] rule permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 [AR3-acl-adZZZ-3000] quit4. 划分正在AR1和AR3上配置IPSec安宁提议Vff0c;界说IPSec的护卫办法。 #正在AR3上配置IPSec安宁提议。 [AR3] ipsec proposal pro1 [AR3-ipsec-proposal- pro1] transform ah [AR3-ipsec-proposal- pro1] ah authentication-algorithm sha2-256 [AR3-ipsec-proposal- pro1] quit此时划分正在AR1和AR3上执止display ipsec proposal会显示所配置的信息 5. 配置安宁战略Vff0c;并引用ACL和IPSec安宁提议Vff0c;确定对何种数据流回收何种护卫办法。 #正在AR1上配置手工方式安宁战略。 [AR1] ipsec policy ipsec 1 manual [AR1-ipsec-policy-manual-ipsec-1] security acl 3000 [AR1-ipsec-policy-manual-ipsec-1] proposal pro1 [AR1-ipsec-policy-manual-ipsec-1] tunnel local 110.1.1.1 [AR1-ipsec-policy-manual-ipsec-1] tunnel remote 110.1.2.2 [AR1-ipsec-policy-manual-ipsec-1] sa spi inbound ah 12345 [AR1-ipsec-policy-manual-ipsec-1] sa string-key inbound ah cipher huawei [AR1-ipsec-policy-manual-ipsec-1] sa spi outbound ah 54321 [AR1-ipsec-policy-manual-ipsec-1] sa string-key outbound ah cipher huawei [AR1-ipsec-policy-manual-ipsec-1] quit #正在AR3上配置手工方式安宁战略。 [AR3] ipsec policy ipsec 1 manual [AR3-ipsec-policy-manual-ipsec-1] security acl 3000 [AR3-ipsec-policy-manual-ipsec-1] proposal pro1 [AR3-ipsec-policy-manual-ipsec-1] tunnel local 110.1.2.2 [AR3-ipsec-policy-manual-ipsec-1] tunnel remote 110.1.1.1 [AR3-ipsec-policy-manual-ipsec-1] sa spi inbound ah 54321 [AR3-ipsec-policy-manual-ipsec-1] sa string-key inbound ah cipher huawei [AR3-ipsec-policy-manual-ipsec-1] sa spi outbound ah 12345 [AR3-ipsec-policy-manual-ipsec-1] sa string-key outbound ah cipher huawei [AR3-ipsec-policy-manual-ipsec-1] quit此时划分正在AR1和AR3上执止display ipsec sa会显示所配置的信息。 6. 划分正在AR1和AR3的接口上使用安宁战略组Vff0c;使接口具有IPSec的护卫罪能。 #正在AR1的接口上引用安宁战略组。 [AR1] interface gigabitethernet 0/0/0 [AR1-GigabitEthernet0/0/0] ipsec policy ipsec [AR1-GigabitEthernet0/0/0] quit #正在AR3的接口上引用安宁战略组。 [AR3] interface gigabitethernet 0/0/1 [AR3-GigabitEthernet0/0/1] ipsec policy ipsec [AR3-GigabitEthernet0/0/1] quit正在总部PC1 ping 分部PC2 抓包阐明 7. 划分正在AR1和AR3配置NATVff0c;使得内网PC能够ping通ISP。 #正在AR1上配置NAT。 [AR1] acl number 3001 [AR1-acl-adZZZ-3001] rule deny ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 [AR1-acl-adZZZ-3001] rule permit ip [AR1-acl-adZZZ-3001] quit [AR1] interface GigabitEthernet0/0/0 [AR1-acl-adZZZ-3001] nat outbound 3001 [AR1-acl-adZZZ-3001] quit #正在AR3上配置NAT。 [AR3] acl number 3001 [AR3-acl-adZZZ-3001] rule deny ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 [AR3-acl-adZZZ-3001] rule permit ip [AR3-acl-adZZZ-3001] quit [AR3] interface GigabitEthernet0/0/0 [AR3-acl-adZZZ-3001] nat outbound 3001 [AR3-acl-adZZZ-3001] quit正在PC1 ping 1.1.1.1 抓包阐明 8.划分正在AR1和AR3上批改IPSec安宁提议中的安宁和谈ah为esp #正在AR1上批改IPSec安宁提议配置 [AR1] ipsec proposal pro1 [AR1-ipsec-proposal- pro1] transform esp [AR1-ipsec-proposal- pro1] esp authentication-algorithm sha2-256 [AR1-ipsec-proposal- pro1] esp encryption-algorithm 3des [AR1-ipsec-proposal- pro1] quit #正在AR3上批改IPSec安宁提议配置 [AR3] ipsec proposal pro1 [AR3-ipsec-proposal- pro1] transform esp [AR3-ipsec-proposal- pro1] esp authentication-algorithm sha2-256 [AR3-ipsec-proposal- pro1] esp encryption-algorithm 3des [AR3-ipsec-proposal- pro1] quit此时划分正在AR1和AR3上执止display ipsec proposal会显示所配置的信息。 9. 划分正在AR1和AR3上批改IPSec安宁战略配置。 #正在AR1上批改IPSec安宁战略配置 [AR1] ipsec policy ipsec 1 manual [AR1-ipsec-policy-manual-ipsec-1] undo sa spi inbound ah [AR1-ipsec-policy-manual-ipsec-1] sa spi inbound esp 12345 [AR1-ipsec-policy-manual-ipsec-1] undo sa string-key inbound ah [AR1-ipsec-policy-manual-ipsec-1] sa string-key inbound esp cipher huawei [AR1-ipsec-policy-manual-ipsec-1] undo sa spi outbound ah [AR1-ipsec-policy-manual-ipsec-1] sa spi outbound esp 54321 [AR1-ipsec-policy-manual-ipsec-1] undo sa string-key outbound ah [AR1-ipsec-policy-manual-ipsec-1] sa string-key outbound esp cipher hauwei [AR1-ipsec-policy-manual-ipsec-1] quit #正在AR3上批改IPSec安宁战略配置 [AR3] ipsec policy ipsec 1 manual [AR3-ipsec-policy-manual-ipsec-1] undo sa spi inbound ah [AR3-ipsec-policy-manual-ipsec-1] sa spi inbound esp 54321 [AR3-ipsec-policy-manual-ipsec-1] undo sa string-key inbound ah [AR3-ipsec-policy-manual-ipsec-1] sa string-key inbound esp cipher huawei [AR3-ipsec-policy-manual-ipsec-1] undo sa spi outbound ah [AR3-ipsec-policy-manual-ipsec-1] sa spi outbound esp 12345 [AR3-ipsec-policy-manual-ipsec-1] undo sa string-key outbound ah [AR3-ipsec-policy-manual-ipsec-1] sa string-key outbound esp cipher hauwei [AR3-ipsec-policy-manual-ipsec-1] quit此时划分正在AR1和AR3上执止display ipsec sa会显示所配置的信息。 抓包阐明 配置文件 AR1 # sysname AR1 # acl number 3000 rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 acl number 3001 rule 5 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 rule 10 permit ip # ipsec proposal pro1 transform ah ah authentication-algorithm sha2-256 # ipsec policy ipsec 1 manual security acl 3000 proposal pro1 tunnel local 110.1.1.1 tunnel remote 110.1.2.2 sa spi inbound ah 54321 sa string-key inbound ah cipher huawei sa spi outbound ah 12345 sa string-key outbound ah cipher huawei # interface GigabitEthernet0/0/0 ip address 110.1.1.1 255.255.255.0 ipsec policy ipsec nat outbound 3001 # interface GigabitEthernet0/0/2 ip address 192.168.1.254 255.255.255.0 # ip route-static 0.0.0.0 0.0.0.0 110.1.1.2 AR2 # sysname AR2 # interface GigabitEthernet0/0/0 ip address 110.1.1.2 255.255.255.0 # interface GigabitEthernet0/0/1 ip address 110.1.2.1 255.255.255.0 # interface LoopBack0 ip address 1.1.1.1 255.255.255.0 AR3 # sysname AR3 # acl number 3000 rule 5 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 acl number 3001 rule 5 deny ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 rule 10 permit ip # ipsec proposal pro1 transform ah ah authentication-algorithm sha2-256 # ipsec policy ipsec 1 manual security acl 3000 proposal pro1 tunnel local 110.1.2.2 tunnel remote 110.1.1.1 sa spi inbound ah 12345 sa string-key inbound ah cipher huawei sa spi outbound ah 54321 sa string-key outbound ah cipher huawei # interface GigabitEthernet0/0/1 ip address 110.1.2.2 255.255.255.0 ipsec policy ipsec nat outbound 3001 # interface GigabitEthernet0/0/2 ip address 192.168.2.254 255.255.255.0 # ip route-static 0.0.0.0 0.0.0.0 110.1.2.1 IKE动态协商方式建设IPSec 1. 沿用上一个实验的拓扑Vff0c;正在本有配置上批改成IKE协商方式建设IPSec。Vff08;此中接口ip地址、默许路由、NAT和IPSec安宁提议配置都沿用上个实验的配置Vff09; 2. 划分正在AR1和AR3上配置IKE平等体 #正在AR1上配置IKE平等体Vff0c;并依据默许配置Vff0c;配置预共享密钥和对端ID。 [AR1] ike peer peer ZZZ1 [AR1-ike-peer- peer] ike-proposal 10 [AR1-ike-peer- peer] pre-shared-key cipher huawei [AR1-ike-peer- peer] remote-address 110.1.2.2 [AR1-ike-peer- peer] quit#正在AR3上配置IKE安宁提议。 [AR3] ike proposal 10 [AR3-ike-proposal-10] encryption-algorithm des-cbc [AR3-ike-proposal-10] authentication-algorithm sha1 [AR3-ike-proposal-10] quit#正在AR3上配置IKE平等体Vff0c;并依据默许配置Vff0c;配置预共享密钥和对端ID。 [AR3] ike peer peer ZZZ1 [AR3-ike-peer- peer] ike-proposal 10 [AR3-ike-peer- peer] pre-shared-key cipher huawei [AR3-ike-peer- peer] remote-address 110.1.1.1 [AR3-ike-peer- peer] quit3. 划分正在AR1和AR3上创立安宁战略 #正在AR3上配置IKE动态协商方式安宁战略。 [AR3] ipsec policy ipsec1 1 isakmp [AR3-ipsec-policy-isakmp- ipsec1-1] ike-peer peer [AR3-ipsec-policy-isakmp- ipsec1-1] proposal pro1 [AR3-ipsec-policy-isakmp- ipsec1-1] security acl 3000 [AR3-ipsec-policy-isakmp- ipsec1-1] quit此时划分正在AR1和AR3上执止display ipsec policy name ipsec1会显示所配置的信息。 4. 划分正在AR1和AR3的接口上使用各自的安宁战略组Vff0c;使接口具有IPSec的护卫罪能 #正在AR1的接口上批改引用的安宁战略组。 [AR1] interface gigabitethernet 0/0/0 [AR1-GigabitEthernet0/0/0] undo ipsec policy ipsec [AR1-GigabitEthernet0/0/0] ipsec policy ipsec1 [AR1-GigabitEthernet0/0/0] quit #正在AR3的接口上批改引用安宁战略组。 [AR3] interface gigabitethernet 0/0/1 [AR3-GigabitEthernet0/0/1] undo ipsec policy ipsec [AR3-GigabitEthernet0/0/1] ipsec policy ipsec1 [AR3-GigabitEthernet0/0/1] quit正在总部的PC1上ping分部的PC2和ISP。 5. 划分正在AR1和AR3上执止display ike sa和display ipsec saVff0c;结果如下 配置文件 AR1 # sysname AR1 # acl number 3000 rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 acl number 3001 rule 5 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 rule 10 permit ip # ipsec proposal pro1 esp authentication-algorithm sha2-256 esp encryption-algorithm 3des # ipsec policy ipsec 1 manual security acl 3000 proposal pro1 tunnel local 110.1.1.1 tunnel remote 110.1.2.2 sa spi inbound esp 12345 sa string-key inbound esp cipher huawei sa spi outbound esp 54321 sa string-key outbound esp cipher hauwei # ike proposal 10 # ike peer peer ZZZ1 pre-shared-key cipher huawei ike-proposal 10 remote-address 110.1.2.2 # ipsec policy ipsec1 1 isakmp security acl 3000 ike-peer peer proposal pro1 # interface GigabitEthernet0/0/0 ip address 110.1.1.1 255.255.255.0 ipsec policy ipsec1 nat outbound 3001 # interface GigabitEthernet0/0/2 ip address 192.168.1.254 255.255.255.0 # ip route-static 0.0.0.0 0.0.0.0 110.1.1.2 AR3 # sysname AR3 # acl number 3000 rule 5 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 acl number 3001 rule 5 deny ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 rule 10 permit ip # ipsec proposal pro1 esp authentication-algorithm sha2-256 esp encryption-algorithm 3des # ipsec policy ipsec 1 manual security acl 3000 proposal pro1 tunnel local 110.1.2.2 tunnel remote 110.1.1.1 sa spi inbound esp 54321 sa string-key inbound esp cipher huawei sa spi outbound esp 12345 sa string-key outbound esp cipher huawei # ike proposal 10 # ike peer peer ZZZ1 pre-shared-key cipher hauwei ike-proposal 10 remote-address 110.1.1.1 # ipsec policy ipsec1 1 isakmp security acl 3000 ike-peer peer proposal pro1 # interface GigabitEthernet0/0/1 ip address 110.1.2.2 255.255.255.0 ipsec policy ipsec1 nat outbound 3001 # interface GigabitEthernet0/0/2 ip address 192.168.2.254 255.255.255.0 # ip route-static 0.0.0.0 0.0.0.0 110.1.2.1做者Vff1a;蔡宗唐 |