| 华为IPSec VPN站点对站点配置方法 
 
 
 防火墙配置思路: 1   接口配置 1.1接口配置IP地址 1.2接口加入安全域内 2   配置路由(去往对方通信点及加密点)本案例直接用缺省路由 3   配置IPSec 3.1通过ACL定义IPSec“感兴趣流” 这里是配置IPSec需要保护的数据 3.2创建IKE(互联网密钥交换协议)提议 3.3创建IPSec安全提议 3.4配置IKE对等体 本配置的作用是配置和哪一台设备建立IPSEC连接 调用IKE提议 3.5创建IPSec策略 此配置的作用是关联前面配置好的各个参数 调用定义好的IPSec安全提议 调用定义好的IKE提议 调用定义好的“感兴趣流” 3.6出接口调用IPSec策略 4   配置安全策略 放行Local到Untrust;Untrust到Local的流量(udp500和ESP端口服务) 放行Trust到Untrust;Untrust到Trust的流量(端口根据情况) 
 防火墙SH(上海) 1   配置接口地址并接口加入安全域 <USG6000V2>system-view [USG6000V2]sysname SH [SH]undo info-center enable [SH]interface gigabitethernet 1/0/0 [SH-GigabitEthernet1/0/0]ip address 1.1.1.2 24 [SH-G 1/0/0]interface gigabitethernet 1/0/1 [SH-GigabitEthernet1/0/1]ip address 172.16.0.1 24 [SH-GigabitEthernet1/0/1]quit [SH]firewall zone trust [SH-zone-trust]add interface gigabitethernet 1/0/1 [SH-zone-trust]firewall zone untrust [SH-zone-untrust]add interface gigabitethernet 1/0/0 [SH-zone-untrust]quit 
 2   配置路由(去对方通信点及加密点)这里直接使用默认路由完成 [SH]ip route-static 0.0.0.0 0.0.0.0 1.1.1.1 
 3   配置IPSec VPN 3.1配置ACL定义IPSec需要保护的数据流(感兴趣流) [SH]acl number 3000 [SH-acl-adv-3000]step 20 [SH-acl-adv-3000]rule 20permit ip source 172.16.0.0 0.0.0.255 destination 172.16.1.0 0.0.0.255 [SH-acl-adv-3000]quit 
 3.2配置IPSec安全提议(配置如何保护关键数据) [SH]ipsec proposal ZURKJ  //创建一个ZURKJ安全提议 [SH-ipsec-proposal-ZURKJ]encapsulation-modetunnel //使用隧道模式 [SH-ipsec-proposal-ZURKJ]transformesp  //封装模式为esp;esp为加密,ah非加密 [SH-ipsec-proposal-ZURKJ]espencryption-algorithm aes-256  //加密算法使用aes-256 [SH-ipsec-proposal-ZURKJ]espauthentication-algorithm sha2-256  //完整性校验算法使用sha2-256 以上配置参数其实已经是IPSec安全提议中的默认参数了,此举为了解提议参数的主要内容。 3.3配置IKE提议(互联网密钥交换协议) [SH]ike proposal 10  //创建编号为10的ike提议 [SH-ike-proposal-10]authentication-methodpre-share  //使用预共享密钥进行身份认证 [SH-ike-proposal-10]dhgroup14  //协商密钥的过程,使用dh group14算法进行加密 [SH -ike-proposal-10]quit (以上两个配置已经是默认,可以不做配置) 3.4配置IKE对等体(作用配置与哪台设备建立IPSec连接) [SH]ike peer HF  //IKE对等体名称 [SH-ike-peer-HF]exchange-mode main  //使用主模式建议IPSec;当双方都有固定IP地址使用main主模式;如果一方无固定IP,可以使用野蛮模式aggressive。(默认为main模式) [SH-ike-peer-HF]ike-proposal 10  //调用ike提议 [SH-ike-peer-HF]pre-shared-key Admin@zurkj  //配置预共享密钥,两端必须一样 [SH-ike-peer-HF]local-id-type ip  //通过IP地址来互相识别对方,也可以使用域名(默认是IP识别) [SH-ike-peer-HF]remote-address 2.2.2.2  //配置IPSec对等端的IP地址 [SH-ike-peer-HF]quit 
 3.5配置IPSec策略(把前面配置的参数关联到一起) [SH]ipsec policy IPSEC10 isakmp  //创建名为IPSEC的IPSec策略,10表示序列号;isakmp表示周期性动态更新密钥 [SH-ipsec-policy-isakmp-IPSEC-10]ike-peerHF  //调用前面定义好的HF对等端 [SH-ipsec-policy-isakmp-IPSEC-10]proposalZURKJ  //调用前面定义好的IPSec安全提议 [SH -ipsec-policy-isakmp-IPSEC-10]securityacl 3000  //调用前面定义的感兴趣流 [SH-ipsec-policy-isakmp-IPSEC-10]quit 
 3.6 接口调用 [SH]interfacegigabitethernet 1/0/0 [SH-GigabitEthernet1/0/0]ipsecpolicy IPSEC  //调用IPSEC策略 [SH-GigabitEthernet1/0/0]quit  其实就是创建参数模块,再调用参数模块,最后出接口上应用IPSec的过程。 4   配置安全策略(行放流量) [SH]ip service-set ISAKMP type object  //创建一个ISAKMP的自定义服务 [SH-object-service-set-ISAKMP]service protocol udpsource-port 500 destination-port 500  //端口是UDP500 [SH-object-service-set-ISAKMP]quit [SH]security-policy  //安全策略 [SH-policy-security]rule name IPSEC  //配置规则名称为IPSEC [SH-policy-security-rule-IPSEC]source-zone local untrust  //源区域 [SH-policy-security-rule-IPSEC]destination-zone untrustlocal  //目标 [SH-policy-security-rule-IPSEC]source-address 1.1.1.1 32  //源IP [SH-policy-security-rule-IPSEC]destination-address 2.2.2.232  //目标 [SH-policy-security-rule-IPSEC]source-address 2.2.2.2 32 [SH-policy-security-rule-IPSEC]destination-address 1.1.1.232  [SH-policy-security-rule-IPSEC]service ISAKMP  //调用ISAKMP服务 [SH-policy-security-rule-IPSEC]service esp  //esp服务 [SH-policy-security-rule-IPSEC]action permit  //动作为放行 [SH-policy-security-rule-IPSEC]quit [SH-policy-security]quit [SH]security-policy  [SH-policy-security]rule name T-U [SH-policy-security-rule-T-U]source-zone trust [SH-policy-security-rule-T-U]destination-zone untrust [SH-policy-security-rule-T-U]action permit [SH-policy-security-rule-T-U]quit [HF-policy-security]rule name U-T [SH-policy-security-rule-U-T]source-zone untrust [SH-policy-security-rule-U-T]destination-zone trust [SH-policy-security-rule-U-T]action permit [SH-policy-security-rule-U-T]quit [SH-policy-security]quit 
 防火墙HF(合肥) 接口 <USG6000V2>system-view [HF]sysname HF [HF]undo info-center enable [HF]interface gigabitethernet 1/0/0 [HF-GigabitEthernet1/0/0]ip address 2.2.2.2 24 [HF-GigabitEthernet1/0/0]interface gigabitethernet 1/0/1 [HF-GigabitEthernet1/0/1]ip address 172.16.1.1 24 [HF-GigabitEthernet1/0/1]quit [HF]firewall zone trust [HF-zone-trust]add interface gigabitethernet 1/0/1 [HF-zone-trust]firewall zone untrust [HF-zone-untrust]add interface gigabitethernet 1/0/0 [HF-zone-untrust]quit 
   [HF]ip route-static 0.0.0.0 0.0.0.0 2.2.2.1 
 感兴趣流 [HF]acl number 3000 [HF-acl-adv-3000]step 20 [HF-acl-adv-3000]rule 20 permit ip source 172.16.1.00.0.0.255 destination 172.16.0.0 0.0.0.255 [HF-acl-adv-3000]quit 
 IKE提议 [HF]ike proposal 10 [HF-ike-proposal-10]authentication-method pre-share [HF-ike-proposal-10]dh group14 [HF-ike-proposal-10]quit 
 IPSec安全提议 [HF]ipsec proposal ZURKJ [HF-ipsec-proposal-ZURKJ]encapsulation-mode tunnel [HF-ipsec-proposal-ZURKJ]transform esp [HF-ipsec-proposal-ZURKJ]esp encryption-algorithm aes-256 [HF-ipsec-proposal-ZURKJ]esp authentication-algorithmsha2-256 [HF-ipsec-proposal-ZURKJ]quit 
 IKE对等端 [HF]ike peer SH [HF-ike-peer- SH]exchange-mode main [HF-ike-peer- SH]ike-proposal 10 [HF-ike-peer- SH]pre-shared-key Admin@zurkj [HF-ike-peer- SH]local-id-type ip [HF-ike-peer- SH]remote-address 1.1.1.2 [HF-ike-peer- SH]quit 
 IPSec策略 [HF]ipsec policy IPSEC 10 isakmp [HF-ipsec-policy-isakmp-IPSEC-10]ike-peer SH [HF-ipsec-policy-isakmp-IPSEC-10]proposal ZURKJ [HF-ipsec-policy-isakmp-IPSEC-10]security acl 3000 [HF-ipsec-policy-isakmp-IPSEC-10]quit 
 安全(流量)策略 [HF]ip service-set ISAKMP type object [HF-object-service-set-ISAKMP]service protocol udpsource-port 500 destination-port 500 [HF-object-service-set-ISAKMP]quit 
 [HF]security-policy  [HF-policy-security]rule name IPSEC [HF-policy-security-rule-IPSEC]source-zone local untrust [HF-policy-security-rule-IPSEC]destination-zone untrustlocal [HF-policy-security-rule-IPSEC]source-address 1.1.1.2 32 [HF-policy-security-rule-IPSEC]destination-address 2.2.2.232 [HF-policy-security-rule-IPSEC]source-address 2.2.2.2 32 [HF-policy-security-rule-IPSEC]destination-address 1.1.1.232 [HF-policy-security-rule-IPSEC]service ISAKMP [HF-policy-security-rule-IPSEC]service esp   [HF-policy-security-rule-IPSEC]action permit [HF-policy-security-rule-IPSEC]quit [HF]security-policy  [HF-policy-security]rule name T-U [HF-policy-security-rule-T-U]source-zone trust [HF-policy-security-rule-T-U]destination-zone untrust [HF-policy-security-rule-T-U]action permit [HF-policy-security-rule-T-U]quit [HF-policy-security]rule name U-T [HF-policy-security-rule-U-T]source-zone untrust [HF-policy-security-rule-U-T]destination-zone trust [HF-policy-security-rule-U-T]action permit [HF-policy-security-rule-U-T]quit [HF-policy-security]quit |