华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解

马肤

温馨提示:这篇文章已超过469天没有更新,请注意相关的内容是否还可用!

摘要:华为防火墙总部与多个分部实施IPSEC VPN网络配置,实现NAT穿越功能。VPN核心采用旁挂式组网方式,提供灵活的网络架构。通过命令行和Web配置界面,实现防火墙的便捷管理和操作。这一案例展示了华为防火墙在网络安全领域的强大性能和高效解决方案,确保数据传输的安全性和可靠性。

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第1张

实现效果:

1、总部和各分部固定IP的ipsec vpn连接,网段192.168.10.0至192.168.20.0、192.168.30.0都能互相进行互相访问,并且都还能上互联网。 总部vpn设备在核心交换机上旁挂,并且做nat穿越出口路由器。

2、 分部之间相互访问是经过总部的vpn绕行

总部AR1出口路由器配置:

dis current-configuration

[V200R003C00]

acl number 3000

rule 5 deny ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

//先把vpn的网段拿 掉

rule 10 deny ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

//先把vpn的网段拿 掉

rule 15 permit ip source 192.168.10.0 0.0.0.255 //上外网

rule 20 permit ip source 172.16.0.0 0.0.0.255 //上外网,必须保证vpn主机能访问公网

interface GigabitEthernet0/0/0 //放行udp 500 4500两个vpn 穿越端口

ip address 1.1.1.2 255.255.255.0

nat server protocol udp global current-interface 4500 inside 172.16.0.2 4500

nat server protocol udp global current-interface 500 inside 172.16.0.2 500

nat outbound 3000

interface GigabitEthernet0/0/1

ip address 10.0.0.1 255.255.255.0

ip route-static 0.0.0.0 0.0.0.0 1.1.1.1

ip route-static 172.16.0.0 255.255.255.0 10.0.0.2

ip route-static 192.168.10.0 255.255.255.0 10.0.0.2

总部核心交换机配置:

dhcp enable

interface Vlanif10

ip address 192.168.10.1 255.255.255.0

dhcp select interface

interface Vlanif100

ip address 172.16.0.1 255.255.255.0

interface Vlanif999

ip address 10.0.0.2 255.255.255.0

interface MEth0/0/1

interface GigabitEthernet0/0/1

port link-type access

port default vlan 100

interface GigabitEthernet0/0/2

port link-type access

port default vlan 999

interface GigabitEthernet0/0/3

port link-type access

port default vlan 10

ip route-static 192.168.30.0 255.255.255.0 172.16.0.2 //把内网访问vpn的网段引给vpn

ip route-static 0.0.0.0 0.0.0.0 10.0.0.1 //上外网

ip route-static 192.168.20.0 255.255.255.0 172.16.0.2 //把内网访问vpn的网段引给vpn

3台防火墙策略全部放行不做限制

总部FW1配置:

acl number 3000

rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

rule 10 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

acl number 3001

rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

rule 10 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

ipsec proposal prop27111711204

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ipsec proposal prop28111045368

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 1

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 2

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike peer ike271117112046

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 1

remote-id-type ip

remote-id 2.2.2.1

local-id 1.1.1.2

dpd type periodic

remote-address 2.2.2.1

ike peer ike281110453684

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 2

remote-id-type ip

remote-id 3.3.3.1

local-id 1.1.1.2

dpd type periodic

remote-address 3.3.3.1

ipsec policy ipsec2711171120 1 isakmp

security acl 3000

ike-peer ike271117112046

proposal prop27111711204

tunnel local applied-interface

alias to-gz

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

ipsec policy ipsec2711171120 2 isakmp

security acl 3001

ike-peer ike281110453684

proposal prop28111045368

tunnel local applied-interface

alias to-sz

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

interface GigabitEthernet1/0/0

undo shutdown

ip address 172.16.0.2 255.255.255.0

service-manage ping permit

ipsec policy ipsec2711171120

firewall zone local

set priority 100

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

add interface GigabitEthernet1/0/0

firewall zone untrust

set priority 5

firewall zone dmz

set priority 50

ip route-static 0.0.0.0 0.0.0.0 172.16.0.1

ip route-static 192.168.10.0 255.255.255.0 172.16.0.1

FW1的 WEB配置:

2条一个去sz,一个去gz

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第2张

保证两个分部可以通过总部节点通,要加上这条网段,两条vpn都得加:

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第3张

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第4张

FW2的配置:

acl number 3000

rule 5 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

rule 10 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

rule 15 deny ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

ipsec proposal prop27111785448

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 1

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike peer ike271117854480

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 1

remote-id-type ip

remote-id 1.1.1.2

local-id 2.2.2.1

dpd type periodic

remote-address 1.1.1.2

ipsec policy ipsec2711178542 1 isakmp

security acl 3000

ike-peer ike271117854480

proposal prop27111785448

tunnel local applied-interface

alias to-zongbu

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

interface GigabitEthernet1/0/0

undo shutdown

ip address 192.168.20.1 255.255.255.0

dhcp select interface

interface GigabitEthernet1/0/1

undo shutdown

ip address 2.2.2.1 255.255.255.0

service-manage ping permit

ipsec policy ipsec2711178542

interface GigabitEthernet1/0/6

undo shutdown

firewall zone local

set priority 100

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

add interface GigabitEthernet1/0/0

firewall zone untrust

set priority 5

add interface GigabitEthernet1/0/1

firewall zone dmz

set priority 50

ip route-static 0.0.0.0 0.0.0.0 2.2.2.2

security-policy

default action permit

policy-based-route

nat-policy

rule name vpn

source-zone trust

destination-zone untrust

source-address 192.168.20.0 mask 255.255.255.0

destination-address 192.168.10.0 mask 255.255.255.0

destination-address 192.168.30.0 mask 255.255.255.0

action no-nat

rule name internet

source-zone trust

destination-zone untrust

action source-nat easy-ip

FW2的WEB配置:

最后一条要手动添加去往sz的网段

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第5张

nat配置:

vpn的不做nat的一定要放上面

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第6张

去往sz的也得加上去,一共两个网段

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第7张

上外网的nat

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第8张

图中vpn那条策略不做转nat转换,并且放在最上面第一条,上网NAT的放在第二条。

上网nat配置完后成这里会多一条地址不加密的:

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第9张

FW3配置:

acl number 3000

rule 5 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

rule 10 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

ipsec proposal prop28111041145

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 1

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike peer ike281110411459

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 1

remote-id-type ip

remote-id 1.1.1.2

local-id 3.3.3.1

dpd type periodic

remote-address 1.1.1.2

ipsec policy ipsec2811104114 1 isakmp

security acl 3000

ike-peer ike281110411459

proposal prop28111041145

tunnel local applied-interface

alias to-bj

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

interface GigabitEthernet0/0/0

undo shutdown

ip binding vpn-instance default

ip address 10.1.1.10 255.255.255.0

alias GE0/METH

service-manage https permit

interface GigabitEthernet1/0/1

undo shutdown

ip address 192.168.30.1 255.255.255.0

service-manage ping permit

dhcp select interface

interface Virtual-if0

interface NULL0

firewall zone local

set priority 100

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

add interface GigabitEthernet1/0/1

firewall zone untrust

set priority 5

add interface GigabitEthernet1/0/0

firewall zone dmz

set priority 50

ip route-static 0.0.0.0 0.0.0.0 3.3.3.3

security-policy

default action permit

nat-policy

rule name to-vpn

source-zone trust

destination-zone untrust

source-address 192.168.30.0 mask 255.255.255.0

destination-address 192.168.10.0 mask 255.255.255.0

destination-address 192.168.20.0 mask 255.255.255.0

action no-nat

rule name to-internet

source-zone trust

destination-zone untrust

source-address 192.168.30.0 mask 255.255.255.0

action source-nat easy-ip

FW3的web配置:

最后一条网段要手动添加上去

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第10张

NAT配置:

和gz分部配置同样

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第11张

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第12张

上网 nat,写了具体网段(和gz分部不同)

华为防火墙总部加多分部ipsec-vpn nat穿越,vpn核心旁挂式组网案例命令行和web配置,华为防火墙与多分部IPSEC VPN组网案例,NAT穿越与旁挂式VPN配置详解 第13张

FW3做nat时写了具体网段后,vpn里面没有像gz分部那样多出一个网段。


0
收藏0
文章版权声明:除非注明,否则均为VPS857原创文章,转载或复制请以超链接形式并注明出处。

相关阅读

  • 【研发日记】Matlab/Simulink自动生成代码(二)——五种选择结构实现方法,Matlab/Simulink自动生成代码的五种选择结构实现方法(二),Matlab/Simulink自动生成代码的五种选择结构实现方法详解(二)
  • 超级好用的C++实用库之跨平台实用方法,跨平台实用方法的C++实用库超好用指南,C++跨平台实用库使用指南,超好用实用方法集合,C++跨平台实用库超好用指南,方法与技巧集合
  • 【动态规划】斐波那契数列模型(C++),斐波那契数列模型(C++实现与动态规划解析),斐波那契数列模型解析与C++实现(动态规划)
  • 【C++】,string类底层的模拟实现,C++中string类的模拟底层实现探究
  • uniapp 小程序实现微信授权登录(前端和后端),Uniapp小程序实现微信授权登录全流程(前端后端全攻略),Uniapp小程序微信授权登录全流程攻略,前端后端全指南
  • Vue脚手架的安装(保姆级教程),Vue脚手架保姆级安装教程,Vue脚手架保姆级安装指南,Vue脚手架保姆级安装指南,从零开始教你如何安装Vue脚手架
  • 如何在树莓派 Raspberry Pi中本地部署一个web站点并实现无公网IP远程访问,树莓派上本地部署Web站点及无公网IP远程访问指南,树莓派部署Web站点及无公网IP远程访问指南,本地部署与远程访问实践,树莓派部署Web站点及无公网IP远程访问实践指南,树莓派部署Web站点及无公网IP远程访问实践指南,本地部署与远程访问详解,树莓派部署Web站点及无公网IP远程访问实践详解,本地部署与远程访问指南,树莓派部署Web站点及无公网IP远程访问实践详解,本地部署与远程访问指南。
  • vue2技术栈实现AI问答机器人功能(流式与非流式两种接口方法),Vue2技术栈实现AI问答机器人功能,流式与非流式接口方法探究,Vue2技术栈实现AI问答机器人功能,流式与非流式接口方法详解
  • 发表评论

    快捷回复:表情:
    评论列表 (暂无评论,0人围观)

    还没有评论,来说两句吧...

    目录[+]

    取消
    微信二维码
    微信二维码
    支付宝二维码