华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置

2024-06-04 8707阅读

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第1张

实现效果:

1、总部和各分部固定IP的ipsec ***连接,网段192.168.10.0至192.168.20.0、192.168.30.0都能互相进行互相访问,并且都还能上互联网。 总部***设备在核心交换机上旁挂,并且做nat穿越出口路由器。

2、 分部之间相互访问是经过总部的***绕行

总部AR1出口路由器配置:

dis current-configuration

[V200R003C00]

acl number 3000

rule 5 deny ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

//先把***的网段拿 掉

rule 10 deny ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

//先把***的网段拿 掉

rule 15 permit ip source 192.168.10.0 0.0.0.255 //上外网

rule 20 permit ip source 172.16.0.0 0.0.0.255 //上外网,必须保证***主机能访问公网

interface GigabitEthernet0/0/0 //放行udp 500 4500两个*** 穿越端口

ip address 1.1.1.2 255.255.255.0

nat server protocol udp global current-interface 4500 inside 172.16.0.2 4500

nat server protocol udp global current-interface 500 inside 172.16.0.2 500

nat outbound 3000

interface GigabitEthernet0/0/1

ip address 10.0.0.1 255.255.255.0

ip route-static 0.0.0.0 0.0.0.0 1.1.1.1

ip route-static 172.16.0.0 255.255.255.0 10.0.0.2

ip route-static 192.168.10.0 255.255.255.0 10.0.0.2

总部核心交换机配置:

dhcp enable

interface Vlanif10

ip address 192.168.10.1 255.255.255.0

dhcp select interface

interface Vlanif100

ip address 172.16.0.1 255.255.255.0

interface Vlanif999

ip address 10.0.0.2 255.255.255.0

interface MEth0/0/1

interface GigabitEthernet0/0/1

port link-type access

port default vlan 100

interface GigabitEthernet0/0/2

port link-type access

port default vlan 999

interface GigabitEthernet0/0/3

port link-type access

port default vlan 10

ip route-static 192.168.30.0 255.255.255.0 172.16.0.2 //把内网访问***的网段引给***

ip route-static 0.0.0.0 0.0.0.0 10.0.0.1 //上外网

ip route-static 192.168.20.0 255.255.255.0 172.16.0.2 //把内网访问***的网段引给***

3台防火墙策略全部放行不做限制

总部FW1配置:

acl number 3000

rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

rule 10 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

acl number 3001

rule 5 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

rule 10 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

ipsec proposal prop27111711204

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ipsec proposal prop28111045368

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 1

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 2

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike peer ike271117112046

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 1

remote-id-type ip

remote-id 2.2.2.1

local-id 1.1.1.2

dpd type periodic

remote-address 2.2.2.1

ike peer ike281110453684

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 2

remote-id-type ip

remote-id 3.3.3.1

local-id 1.1.1.2

dpd type periodic

remote-address 3.3.3.1

ipsec policy ipsec2711171120 1 isakmp

security acl 3000

ike-peer ike271117112046

proposal prop27111711204

tunnel local applied-interface

alias to-gz

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

ipsec policy ipsec2711171120 2 isakmp

security acl 3001

ike-peer ike281110453684

proposal prop28111045368

tunnel local applied-interface

alias to-sz

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

interface GigabitEthernet1/0/0

undo shutdown

ip address 172.16.0.2 255.255.255.0

service-manage ping permit

ipsec policy ipsec2711171120

firewall zone local

set priority 100

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

add interface GigabitEthernet1/0/0

firewall zone untrust

set priority 5

firewall zone dmz

set priority 50

ip route-static 0.0.0.0 0.0.0.0 172.16.0.1

ip route-static 192.168.10.0 255.255.255.0 172.16.0.1

FW1的 WEB配置:

2条一个去sz,一个去gz

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第2张

保证两个分部可以通过总部节点通,要加上这条网段,两条***都得加:

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第3张

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第4张

FW2的配置:

acl number 3000

rule 5 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

rule 10 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.30.0 0.0.0.255

rule 15 deny ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

ipsec proposal prop27111785448

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 1

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike peer ike271117854480

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 1

remote-id-type ip

remote-id 1.1.1.2

local-id 2.2.2.1

dpd type periodic

remote-address 1.1.1.2

ipsec policy ipsec2711178542 1 isakmp

security acl 3000

ike-peer ike271117854480

proposal prop27111785448

tunnel local applied-interface

alias to-zongbu

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

interface GigabitEthernet1/0/0

undo shutdown

ip address 192.168.20.1 255.255.255.0

dhcp select interface

interface GigabitEthernet1/0/1

undo shutdown

ip address 2.2.2.1 255.255.255.0

service-manage ping permit

ipsec policy ipsec2711178542

interface GigabitEthernet1/0/6

undo shutdown

firewall zone local

set priority 100

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

add interface GigabitEthernet1/0/0

firewall zone untrust

set priority 5

add interface GigabitEthernet1/0/1

firewall zone dmz

set priority 50

ip route-static 0.0.0.0 0.0.0.0 2.2.2.2

security-policy

default action permit

policy-based-route

nat-policy

rule name ***

source-zone trust

destination-zone untrust

source-address 192.168.20.0 mask 255.255.255.0

destination-address 192.168.10.0 mask 255.255.255.0

destination-address 192.168.30.0 mask 255.255.255.0

action no-nat

rule name internet

source-zone trust

destination-zone untrust

action source-nat easy-ip

FW2的WEB配置:

最后一条要手动添加去往sz的网段

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第5张

nat配置:

***的不做nat的一定要放上面

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第6张

去往sz的也得加上去,一共两个网段

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第7张

上外网的nat

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第8张

图中***那条策略不做转nat转换,并且放在最上面第一条,上网NAT的放在第二条。

上网nat配置完后成这里会多一条地址不加密的:

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第9张

FW3配置:

acl number 3000

rule 5 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.10.0 0.0.0.255

rule 10 permit ip source 192.168.30.0 0.0.0.255 destination 192.168.20.0 0.0.0.255

ipsec proposal prop28111041145

encapsulation-mode auto

esp authentication-algorithm sha2-256

esp encryption-algorithm aes-256

ike proposal default

encryption-algorithm aes-256 aes-192 aes-128

dh group14

authentication-algorithm sha2-512 sha2-384 sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike proposal 1

encryption-algorithm aes-256

dh group14

authentication-algorithm sha2-256

authentication-method pre-share

integrity-algorithm hmac-sha2-256

prf hmac-sha2-256

ike peer ike281110411459

exchange-mode auto

pre-shared-key adminadmin

ike-proposal 1

remote-id-type ip

remote-id 1.1.1.2

local-id 3.3.3.1

dpd type periodic

remote-address 1.1.1.2

ipsec policy ipsec2811104114 1 isakmp

security acl 3000

ike-peer ike281110411459

proposal prop28111041145

tunnel local applied-interface

alias to-bj

sa trigger-mode auto

sa duration traffic-based 10485760

sa duration time-based 3600

interface GigabitEthernet0/0/0

undo shutdown

ip binding ***-instance default

ip address 10.1.1.10 255.255.255.0

alias GE0/METH

service-manage https permit

interface GigabitEthernet1/0/1

undo shutdown

ip address 192.168.30.1 255.255.255.0

service-manage ping permit

dhcp select interface

interface Virtual-if0

interface NULL0

firewall zone local

set priority 100

firewall zone trust

set priority 85

add interface GigabitEthernet0/0/0

add interface GigabitEthernet1/0/1

firewall zone untrust

set priority 5

add interface GigabitEthernet1/0/0

firewall zone dmz

set priority 50

ip route-static 0.0.0.0 0.0.0.0 3.3.3.3

security-policy

default action permit

nat-policy

rule name to-***

source-zone trust

destination-zone untrust

source-address 192.168.30.0 mask 255.255.255.0

destination-address 192.168.10.0 mask 255.255.255.0

destination-address 192.168.20.0 mask 255.255.255.0

action no-nat

rule name to-internet

source-zone trust

destination-zone untrust

source-address 192.168.30.0 mask 255.255.255.0

action source-nat easy-ip

FW3的web配置:

最后一条网段要手动添加上去

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第10张

NAT配置:

和gz分部配置同样

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第11张

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第12张

上网 nat,写了具体网段(和gz分部不同)

华为防火墙总部加多分部ipsec-*** nat穿越,***核心旁挂式组网案例命令行和web配置 第13张

FW3做nat时写了具体网段后,***里面没有像gz分部那样多出一个网段。


    免责声明:我们致力于保护作者版权,注重分享,被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自自研大数据AI进行生成,内容摘自(百度百科,百度知道,头条百科,中国民法典,刑法,牛津词典,新华词典,汉语词典,国家院校,科普平台)等数据,内容仅供学习参考,不准确地方联系删除处理! 图片声明:本站部分配图来自人工智能系统AI生成,觅知网授权图片,PxHere摄影无版权图库和百度,360,搜狗等多加搜索引擎自动关键词搜索配图,如有侵权的图片,请第一时间联系我们,邮箱:ciyunidc@ciyunshuju.com。本站只作为美观性配图使用,无任何非法侵犯第三方意图,一切解释权归图片著作权方,本站不承担任何责任。如有恶意碰瓷者,必当奉陪到底严惩不贷!

    目录[+]