| 华三IPSec VPN配置方法 
 
 防火墙配置思路: ISP路由器 <USG6000V2>system-view <H3C>system-view [H3C]sysname ISP [ISP]interface gigabitethernet 0/1 [ISP-GigabitEthernet0/1]ip address 200.1.1.1 24 [ISP-GigabitEthernet0/1]interface gigabitethernet 0/2 [ISP-GigabitEthernet0/2]ip address 200.1.2.1 24 [ISP-GigabitEthernet0/2]return <ISP>save force 防火墙(总部) 1    配置接口地址并接口加入安全域 <H3C>system-view [H3C]sysname FW1 [FW1]interface gigabitethernet 1/0/1 [FW1-GigabitEthernet1/0/1]ip address 200.1.1.2 24 [FW1-GigabitEthernet1/0/1]manage ping inbound [FW1-GigabitEthernet1/0/1]manage ping outbound [FW1-GigabitEthernet1/0/1]interface gigabitethernet 1/0/2 [FW1-GigabitEthernet1/0/2]ip address 10.1.1.1 24 [FW1-GigabitEthernet1/0/2]manage ping inbound [FW1-GigabitEthernet1/0/2]manage ping outbound [FW1-GigabitEthernet1/0/2]quit [FW1]security-zone name trust  //配置trust安全域 [FW1-security-zone-Trust]import interface gigabitethernet1/0/2 [FW1-security-zone-Trust]quit  //接口加入安全域 [FW1]security-zone name untrust  //配置untrust安全域 [FW1-security-zone-Untrust]import interface gigabitethernet1/0/3 [FW1-security-zone-Untrust]quit  //接口加入安全域 2    配置缺省路由 [FW1]ip route-static 0.0.0.0 0 200.1.1.1  //下一跳为公网网关的缺省路由 3    配置NAT策略 [FW1]nat global-policy  //配置NAT策略 [FW1-nat-global-policy]rule name ipsec  //IPSEC流量不做NAT转换 [FW1-nat…-ipsec]source-zone trust  //源安全域 [FW1-nat…-ipsec]destination-zone untrust  //目标安全域 [FW1-nat-…ipsec]source-ip subnet 10.1.1.0 24  //指定源地址 [FW1-nat-…ipsec]destination-ip subnet 10.1.2.0 24  //指定目标地址 [FW1-nat…sec]action snat no-nat  //动作为不执行源NAT转换 [FW1-nat-global-policy-rule-nat44-ipsec]quit [FW1-nat-global-policy]quit [FW1]nat global-policy //配置NAT策略 [FW1-nat-global-policy]rule name intelnet [FW1-nat…-intelnet]source-zone trust [FW1-nat…-intelnet]destination-zone untrust [FW1-nat…-intelnet]source-ip subnet 10.1.1.0 24 [FW1-nat…telnet]action snat easy-ip  //动作源地址做EASY-IP地址转换 [FW1-nat…t44-intelnet]quit [FW1-nat-global-policy]quit 5    配置安全域策略 [FW1]security-policy ip //放行Trust到Untrust的流量 [FW1-security-policy-ip]rule 0 name t-u [FW1-security-policy-ip-0-t-u]source-zone trust [FW1-security-policy-ip-0-t-u]destination-zone untrust [FW1-security-policy-ip-0-t-u]service any [FW1-security-policy-ip-0-t-u]action pass [FW1-security-policy-ip-0-t-u]quit [FW1-security-policy-ip]quit [FW1]security-policy ip //放行Untrust到Trust的流量 [FW1-security-policy-ip]rule 1 name u-t [FW1-security-policy-ip-1-u-t]source-zone untrust [FW1-security-policy-ip-1-u-t]destination-zone trust [FW1-security-policy-ip-1-u-t]service any [FW1-security-policy-ip-1-u-t]action pass [FW1-security-policy-ip-1-u-t]quit [FW1-security-policy-ip]quit [FW1]security-policy ip //放行Untrust至Local的流量 [FW1-security-policy-ip]rule 2 name u-l [FW1-security-policy-ip-2-u-l]source-zone untrust [FW1-security-policy-ip-2-u-l]destination-zone local [FW1-security-policy-ip-2-u-l]service any [FW1-security-policy-ip-2-u-l]action pass [FW1-security-policy-ip-2-u-l]quit [FW1-security-policy-ip]quit [FW1-security-policy-ip]rule 3 name l-u  //放行Local到Untrust [FW1-security-policy-ip-3-l-u]source-zone local [FW1-security-policy-ip-3-l-u]destination-zone untrust [FW1-security-policy-ip-3-l-u]service any [FW1-security-policy-ip-3-l-u]action pass [FW1-security-policy-ip-3-l-u]quit [FW1-security-policy-ip]quit 
 进入IPSEC配置流程 1    配置IPSEC的“感兴趣流“ [fw1]acl advanced 3001 //配置3001高级ACL [fw1-acl-ipv4-adv-3001]step 20 [fw1-acl-ipv4-adv-3001]rule permit ip source 10.1.1.00.0.0.255 destination 10.1.2.0 0.0.0.255 2    配置IKE提议 [fw1]ike proposal 1 //创建ike提议进程号为1 [fw1-…]encryption-algorithm aes-cbc-128  //加密算法 [fw1-…]authentication-method pre-share  //认证方法为对预共享秘钥 [fw1-…]authentication-algorithm sha  //认证算法sha [fw1-ike-proposal-1]quit 3    配置ike keychain(IKE秘钥) [fw1]ike keychain zurkj //创建预共享秘钥 [fw1-ike-keychain-zurkj]pre-shared-key address 200.1.1.2255.255.255.255 key simple zurkj.com //指定对端地址并设置秘钥为zurkj.com [fw1-ike-keychain-zurkj]quit 4    配置IKE Profile(IKE模板) [fw1]ike profile zurkj //创建IKE模板zurkj [fw1-…]keychain zurkj.com  //指定使用秘钥 [fw1-…]local-identity address 200.1.1.2  //指定使用IP地址标识本端身份 [fw1-ike-profile-zurkj]match remote identity address200.1.2.2 255.255.255.255  //指定匹配对端身份类型为IP地址 [fw1-ike-profile-zurkj]proposal 1  //指定使用的提议Proposal 1 [fw1-ike-profile-zurkj]quit 5    配置IPSEC transform-set(IPSEC转换集/模板) [fw1]ipsec transform-set zurkj  //创建IPSEC转换集zurkj [fw1-…]protocol esp //指定安全协议为ESP(默认) [fw1-…]encapsulation-mode tunnel  //指定封装协议为隧道模式(默认) [fw1-…]esp encryption-algorithm aes-cbc-128  //指定ESP加密算法 [fw1-ipsec-transform-set-zurkj]esp authentication-algorithmsha1  //指定ESP认证算法 [fw1-ipsec-transform-set-zurkj]quit 6    配置IPSEC策略 [fw1]ipsec policy zurkj 10 isakmp [fw1-ipsec-policy-isakmp-zurkj-10]transform-set zurkj [fw1-ipsec-policy-isakmp-zurkj-10]security acl 3001 [fw1-ipsec-policy-isakmp-zurkj-10]local-address 200.1.1.2 [fw1-ipsec-policy-isakmp-zurkj-10]remote-address 200.1.2.2 [fw1-ipsec-policy-isakmp-zurkj-10]ike-profile zurkj [fw1-ipsec-policy-isakmp-zurkj-10]quit 7    接口调用IPSEC策略 [fw1]interface gigabitethernet 1/0/3 [fw1-GigabitEthernet1/0/3]ipsec apply policy 1 [fw1-GigabitEthernet1/0/3]quit 
 以下为配置脚本: FW1配置脚本 复制代码security-zone name trust
import interface gigabitethernet 1/0/2
quit
security-zone name untrust
import interface gigabitethernet 1/0/3
quit
ip route-static 0.0.0.0 0 200.1.1.1
nat global-policy
rule name ipsec 
source-zone trust
destination-zone untrust
source-ip subnet 10.1.1.0 24
destination-ip subnet 10.1.2.0 24
action snat no-nat
quit
quit
nat global-policy
rule name internet
source-zone trust
destination-zone untrust
source-ip subnet 10.1.1.0 24
action snat easy-ip
quit
quit
security-policy ip
rule 0 name t-u
source-zone trust
destination-zone untrust
service any
action pass
quit
quit
security-policy ip
rule 1 name u-t
source-zone untrust
destination-zone trust
service any
action pass
quit
quit
security-policy ip
rule 2 name u-l
source-zone untrust
destination-zone local
service any
action pass
quit
quit
security-policy ip
rule 3 name l-u
source-zone local
destination-zone untrust
service any
action pass
quit
quit
acl advanced 3001
step 20
rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
quit
ike proposal 1
encryption-algorithm aes-cbc-128
authentication-method pre-share
quit
ike keychain zurkj 
pre-shared-key address 200.1.2.2 255.255.255.255 key simple zurkj.com
quit
ike profile zurkj
keychain zurkj.com
local-identity address 200.1.1.2
match remote identity address 200.1.2.2 255.255.255.255
proposal 1
quit
ipsec transform-set zurkj
protocol esp
encapsulation-mode tunnel
esp encryption-algorithm aes-cbc-128
esp authentication-algorithm sha1
quit
ipsec policy zurkj 10 isakmp
transform-set zurkj
security acl 3001
local-address 200.1.1.2
remote-address 200.1.2.2
ike-profile zurkj
quit
interface gigabitethernet 1/0/3
ipsec apply policy 1
quit
FW2配置脚本 复制代码system-view
sysname FW2
interface gigabitethernet 1/0/3
ip address 200.1.2.2 24
manage ping inbound
manage ping outbound
interface gigabitethernet 1/0/2
ip address 10.1.2.1 24
manage ping inbound
manage ping outbound
quit
security-zone name trust
import interface gigabitethernet 1/0/2
quit
security-zone name untrust
import interface gigabitethernet 1/0/3
quit
ip route-static 0.0.0.0 0 200.1.2.1
nat global-policy
rule name ipsec 
source-zone trust
destination-zone untrust
source-ip subnet 10.1.2.0 24
destination-ip subnet 10.1.1.0 24
action snat no-nat
quit
quit
nat global-policy
rule name internet
source-zone trust
destination-zone untrust
source-ip subnet 10.1.2.0 24
action snat easy-ip
quit
quit
security-policy ip
rule 0 name t-u
source-zone trust
destination-zone untrust
service any
action pass
quit
quit
security-policy ip
rule 1 name u-t
source-zone untrust
destination-zone trust
service any
action pass
quit
quit
security-policy ip
rule 2 name u-l
source-zone untrust
destination-zone local
service any
action pass
quit
quit
security-policy ip
rule 3 name l-u
source-zone local
destination-zone untrust
service any
action pass
quit
quit
acl advanced 3001
step 20
rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
quit
ike proposal 1
encryption-algorithm aes-cbc-128
authentication-method pre-share
quit
ike keychain zurkj 
pre-shared-key address 200.1.1.2 255.255.255.255 key simple zurkj.com
quit
ike profile zurkj
keychain zurkj.com
local-identity address 200.1.2.2
match remote identity address 200.1.1.2 255.255.255.255
proposal 1
quit
ipsec transform-set zurkj
protocol esp
encapsulation-mode tunnel
esp encryption-algorithm aes-cbc-128
esp authentication-algorithm sha1
quit
ipsec policy zurkj 10 isakmp
transform-set zurkj
security acl 3001
local-address 200.1.2.2
remote-address 200.1.1.2
ike-profile zurkj
quit
interface gigabitethernet 1/0/3
ipsec apply policy 1
quit
 
 
 
 |