总部采用安全策略组与分支建立多条IPSec隧道

总部采用安全策略组与分支建立多条IPSec隧道

1.项目情况

1.总部和分部路由器都有固定的公网地址
2.总部和分部使用不同的IPSec安全策略

2.拓扑图

image-20250707173540144

3.基础环境搭建

R1

<Huawei>sys
[Huawei]sys R1
[R1]int g0/0/0
[R1-GigabitEthernet0/0/0]ip add 20.1.1.2 24
[R1-GigabitEthernet0/0/0]int g0/0/1
[R1-GigabitEthernet0/0/1]ip add 20.1.2.2 24
[R1-GigabitEthernet0/0/1]int g2/0/0
[R1-GigabitEthernet2/0/0]ip add 20.1.3.2 24

R2

<Huawei>sys
[Huawei]sys R2
[R2]int g0/0/0
[R2-GigabitEthernet0/0/0]ip address 20.1.1.1 24
[R2-GigabitEthernet0/0/0]int vlanif 1
[R2-Vlanif1]ip address 10.1.1.1 24

[R2]ip route-static 20.1.3.0 24 20.1.1.2
[R2]ip route-static 20.1.2.0 24 20.1.1.2

R3

<Huawei>sys
[Huawei]sys R3
[R3]int g0/0/0
[R3-GigabitEthernet0/0/0]ip add 20.1.2.1 24
[R3-GigabitEthernet0/0/0]int vlanif1
[R3-Vlanif1]ip add 10.1.2.1 24

[R3]ip route-static 20.1.3.0 24 20.1.2.2
[R3]ip route-static 20.1.1.0 24 20.1.2.2

R4

<Huawei>sys
Enter system view, return user view with Ctrl+Z.
[Huawei]sys R4
[R4]int g0/0/0
[R4-GigabitEthernet0/0/0]ip add 20.1.3.1 24
[R4-GigabitEthernet0/0/0]int vlanif1
[R4-Vlanif1]ip add 10.1.3.1 24

[R4]ip route-static 20.1.1.0 24 20.1.3.2
[R4]ip route-static 20.1.2.0 24 20.1.3.2

连通性测试

image-20250707170302036

image-20250707170330681

image-20250707170428167

4.在总部路由器上设置-R2

[R2]acl 3100
[R2-acl-adv-3100]rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.3.0 0.0.0.255
[R2-acl-adv-3100]quit
[R2]acl 3200
[R2-acl-adv-3200]rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
[R2-acl-adv-3200]quit

[R2]ipsec proposal prol
[R2-ipsec-proposal-prol]quit

[R2]ike peer rut1 v2
[R2-ike-peer-rut1]pre-shared-key simple 91xueit
[R2-ike-peer-rut1]remote-address 20.1.3.1
[R2-ike-peer-rut1]quit

[R2]ike peer rut2 v2
[R2-ike-peer-rut2]pre-shared-key simple 51cto
[R2-ike-peer-rut2]remote-address 20.1.2.1
[R2-ike-peer-rut2]quit

[R2]ipsec policy policy1 10 isakmp
[R2-ipsec-policy-isakmp-policy1-10]ike-peer rut1
[R2-ipsec-policy-isakmp-policy1-10]proposal prol
[R2-ipsec-policy-isakmp-policy1-10]security acl 3100
[R2-ipsec-policy-isakmp-policy1-10]quit

[R2]ipsec policy policy1 20 isakmp
[R2-ipsec-policy-isakmp-policy1-20]ike-peer rut2    
[R2-ipsec-policy-isakmp-policy1-20]proposal prol
[R2-ipsec-policy-isakmp-policy1-20]security acl 3200
[R2-ipsec-policy-isakmp-policy1-20]quit

[R2]int g0/0/0
[R2-GigabitEthernet0/0/0]ipsec policy policy1
[R2-GigabitEthernet0/0/0]quit

[R2]ip route-static 10.1.2.0 24 20.1.1.2
[R2]ip route-static 10.1.3.0 24 20.1.1.2

R4

<R4>sys

[R4]acl 3100
[R4-acl-adv-3100]rule permit ip source 10.1.3.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
[R4-acl-adv-3100]quit

[R4]ipsec proposal prop
[R4-ipsec-proposal-prop]quit
[R4]ike peer rut1 v2
[R4-ike-peer-rut1]pre-shared-key simple 91xueit
[R4-ike-peer-rut1]remote-address 20.1.1.1
[R4-ike-peer-rut1]quit

[R4]ipsec policy policy1 10 isakmp
[R4-ipsec-policy-isakmp-policy1-10]ike-peer rut1
[R4-ipsec-policy-isakmp-policy1-10]proposal prop
[R4-ipsec-policy-isakmp-policy1-10]security acl 3100
[R4-ipsec-policy-isakmp-policy1-10]quit

[R4]int g0/0/0
[R4-GigabitEthernet0/0/0]ipsec policy policy1
[R4-GigabitEthernet0/0/0]quit

[R4]ip route-static 10.1.1.0 24 20.1.3.2

R3

<R3>sys
[R3]acl 3000
[R3-acl-adv-3000]rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
[R3-acl-adv-3000]ipsec propo    
[R3-acl-adv-3000]quit

[R3]ipsec proposal prop
[R3-ipsec-proposal-prop]quit

[R3]ike peer rut1 v2
[R3-ike-peer-rut1]pre-shared-key simple 51cto
[R3-ike-peer-rut1]remote-address 20.1.1.1
[R3-ike-peer-rut1]quit

[R3]ipsec policy policy1 10 isakmp
[R3-ipsec-policy-isakmp-policy1-10]ike-peer rut1
[R3-ipsec-policy-isakmp-policy1-10]security acl 3000
[R3-ipsec-policy-isakmp-policy1-10]proposal prop
[R3-ipsec-policy-isakmp-policy1-10]quit

[R3]interface GigabitEthernet 0/0/0
[R3-GigabitEthernet0/0/0]ipsec policy policy1
[R3-GigabitEthernet0/0/0]quit

[R3]ip route-static 10.1.1.0 24 20.1.2.2

5.测试连通性

image-20250707231755736

6.配置让两个分公司通过总公司IPSec-VPN通信

由于两个对等识别密码都不一样,所以,R3和R4是不能通过添加访问控制列表和路由而实现通讯

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注