




已阅读5页,还剩29页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1简介2配置前提3使用iNode客户端基于证书认证的L2TP over IPsec功能配置举例3.1组网需求3.2配置思路3.3使用版本3.4配置步骤3.4.1 Device的配置3.4.2 Host的配置3.5验证配置3.6配置文件4 IPsec over GRE的典型配置举例4.1组网需求4.2配置思路4.3使用版本4.4配置步骤4.4.1 Device A的配置4.4.2 Device B的配置4.5验证配置4.6配置文件5 GRE over IPsec的典型配置举例5.1组网需求5.2配置思路5.3使用版本5.4配置步骤5.4.1 Device A的配置5.4.2 Device B的配置5.5验证配置5.6配置文件6 IPsec同流双隧道的典型配置举例6.1组网需求6.2使用版本6.3配置步骤6.3.1 Device A的配置6.3.2 Device B的配置6.4验证配置6.5配置文件7相关资料1简介本文档介绍IPsec的典型配置举例。2配置前提本文档适用于使用Comware V7软件版本的MSR系列路由器,如果使用过程中与产品实际情况有差异,请参考相关产品手册,或以设备实际情况为准。本文档中的配置均是在实验室环境下进行的配置和验证,配置前设备的所有参数均采用出厂时的缺省配置。如果您已经对设备进行了配置,为了保证配置效果,请确认现有配置和以下举例中的配置不冲突。本文档假设您已了解IPsec特性。3使用iNode客户端基于证书认证的L2TP over IPsec功能配置举例3.1组网需求如图1所示,PPP用户Host与Device建立L2TP隧道,Windows server 2003作为CA服务器,要求:通过L2TP隧道访问Corporate network。用IPsec对L2TP隧道进行数据加密。采用RSA证书认证方式建立IPsec隧道。图1基于证书认证的L2TP over IPsec配置组网图3.2配置思路由于使用证书认证方式建立IPsec隧道,所以需要在ike profile中配置local-identity为dn,指定从本端证书中的主题字段取得本端身份。3.3使用版本本举例是在R0106版本上进行配置和验证的。3.4配置步骤3.4.1Device的配置(1)配置各接口IP地址#配置接口GigabitEthernet2/0/1的IP地址。 system-viewDevice interface gigabitethernet 2/0/1Device-GigabitEthernet2/0/1 ip address 0 24Device-GigabitEthernet2/0/1 quit#配置接口GigabitEthernet2/0/2的IP地址。Device interface gigabitethernet 2/0/2Device-GigabitEthernet2/0/2 ip address 1 24Device-GigabitEthernet2/0/2 quit#配置接口GigabitEthernet2/0/3的IP地址。Device interface gigabitethernet 2/0/3Device-GigabitEthernet2/0/3 ip address 24Device-GigabitEthernet2/0/3 quit(2)配置L2TP#创建本地PPP用户l2tpuser,设置密码为hello。Device local-user l2tpuser class networkDevice-luser-network-l2tpuser password simple helloDevice-luser-network-l2tpuser service-type pppDevice-luser-network-l2tpuser quit#配置ISP域system对PPP用户采用本地验证。Device domain systemDevice-isp-system authentication ppp localDevice-isp-system quit#启用L2TP服务。Device l2tp enable#创建接口Virtual-Template0,配置接口的IP地址为/24。Device interface virtual-template 0Device-Virtual-Template0 ip address #配置PPP认证方式为PAP。Device-Virtual-Template0 ppp authentication-mode pap#配置为PPP用户分配的IP地址为。Device-Virtual-Template0 remote address Device-Virtual-Template0 quit#创建LNS模式的L2TP组1。Device l2tp-group 1 mode lns#配置LNS侧本端名称为lns。Device-l2tp1 tunnel name lns#关闭L2TP隧道验证功能。Device-l2tp1 undo tunnel authentication#指定接收呼叫的虚拟模板接口为VT0。Device-l2tp1 allow l2tp virtual-template 0Device-l2tp1 quit(3)配置PKI证书#配置PKI实体security。Device pki entity securityDevice-pki-entity-security common-name deviceDevice-pki-entity-security quit#新建PKI域。Device pki domain headgateDevice-pki-domain-headgate ca identifier LYQDevice-pki-domain-headgate certificate request url 1/certsrv/mscep/mscep.dllDevice-pki-domain-headgate certificate request from raDevice-pki-domain-headgate certificate request entity securityDevice-pki-domain-headgate undo crl check enableDevice-pki-domain-headgatepublic-key rsa general name abc length 1024Device-pki-domain-headgate quit#生成RSA算法的本地密钥对。Device public-key local create rsa name abcThe range of public key modulus is (512 2048).If the key modulus is greater than 512,it will take a few minutes.Press CTRL+C to abort.Input the modulus length default = 1024:Generating Keys.+.+Create the key pair successfully.#获取CA证书并下载至本地。Device pki retrieve-certificate domain headgate caThe trusted CAs finger print is: MD5 fingerprint:8649 7A4B EAD5 42CF 5031 4C99 BFS3 2A99 SHA1 fingerprint:61A9 6034 181E 6502 12FA 5A5F BA12 0EA0 5187 031CIs the finger print correct?(Y/N):yRetrieved the certificates successfully.#手工申请本地证书。Device pki request-certificate domain headgateStart to request general certificate .Certificate requested successfully.(4)配置IPsec隧道#创建IKE安全提议。Device ike proposal 1Device-ike-proposal-1 authentication-method rsa-signatureDevice-ike-proposal-1 encryption-algorithm 3des-cbcDevice-ike-proposal-1 dh group2Device-ike-proposal-1 quit#配置IPsec安全提议。Device ipsec transform-set tran1Device-ipsec-transform-set-tran1 esp authentication-algorithm sha1Device-ipsec-transform-set-tran1 esp encryption-algorithm 3desDevice-ipsec-transform-set-tran1 quit#配置IKE profile。Device ike profile profile1Device-ike-profile-profile1 local-identity dnDevice-ike-profile-profile1 certificate domain headgateDevice-ike-profile-profile1 proposal 1Device-ike-profile-profile1 match remote certificate deviceDevice-ike-profile-profile1 quit#在采用数字签名认证时,指定总从本端证书中的主题字段取得本端身份。Deviceike signature-identity from-certificate#创建一条IPsec安全策略模板,名称为template1,序列号为1。Deviceipsec policy-template template1 1Device-ipsec-policy-template-template1-1 transform-set tran1Device-ipsec-policy-template-template1-1 ike-profile profile1Device-ipsec-policy-template-template1-1 quit#引用IPsec安全策略模板创建一条IPsec安全策略,名称为policy1,顺序号为1。Device ipsec policy policy1 1 isakmp template template1#在接口上应用IPsec安全策略。Device interface gigabitethernet 2/0/2Device-GigabitEthernet2/0/2 ipsec apply policy policy1Device-GigabitEthernet2/0/2 quit3.4.2Host的配置(1)从证书服务器上申请客户端证书#登录到证书服务器:1/certsrv,点击“申请一个证书”。图1进入申请证书页面#点击“高级证书申请”。图2高级证书申请#选择第一项:创建并向此CA提交一个申请。图3创建并向CA提交一个申请#填写相关信息。需要的证书类型,选择“客户端身份验证证书”;密钥选项的配置,勾选“标记密钥为可导出”前的复选框。#点击,弹出一提示框:在对话框中选择“是”。#点击安装此证书。图4安装证书(2)iNode客户端的配置(使用iNode版本为:iNode PC 5.2(E0409))#打开L2TP VPN连接,并单击“属性(Y)”。图5打开L2TP连接#输入LNS服务器的地址,并启用IPsec安全协议,验证证方法选择证书认证。图6基本配置#单击按钮,进入“L2TP设置”页签,设置L2TP参数如下图所示。图7L2TP设置#单击“IPsec设置”页签,配置IPsec参数。图8IPsec参数设置#单击“IKE设置”页签,配置IKE参数。图9IKE参数设置#单击“路由设置”页签,添加访问Corporate network的路由。图10路由设置#完成上述配置后,单击按钮,回到L2TP连接页面。3.5验证配置#在L2TP连接对话框中,输入用户名“l2tpuser”和密码“hello”,单击按钮。图11连接L2TP#在弹出的对话框中选择申请好的证书,单击按钮。图12证书选择#通过下图可以看到L2TP连接成功。图13连接成功图14连接成功#在Device上使用display ike sa命令,可以看到IPsec隧道第一阶段的SA正常建立。 display ike sa Connection-ID Remote Flag DOI- 10 RD IPSECFlags:RD-READY RL-REPLACED FD-FADING#在Device上使用display ipsec sa命令可以看到IPsec SA的建立情况。 display ipsec sa-Interface: GigabitEthernet2/0/2- - IPsec policy: policy1 Sequence number: 1 Mode: template - Tunnel id: 0 Encapsulation mode: tunnel Perfect forward secrecy: Path MTU: 1443 Tunnel: local address: 1 remote address: Flow: sour addr: 1/55 port: 1701 protocol: udp dest addr: /55 port: 0 protocol: udp Inbound ESP SAs SPI: 2187699078 (0x8265a386) Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843197/3294 Max received sequence-number: 51 Anti-replay check enable: Y Anti-replay window size: 64 UDP encapsulation used for NAT traversal: N Status: Active Outbound ESP SAs SPI: 3433374591 (0xcca5237f) Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843197/3294 Max sent sequence-number: 52 UDP encapsulation used for NAT traversal: N Status: Active3.6配置文件#interface Virtual-Template0ppp authentication-mode papremote address ip address #interface GigabitEthernet2/0/1ip address 0 #interface GigabitEthernet2/0/2ip address 1 ipsec apply policy policy1#interface GigabitEthernet2/0/3ip address #domain systemauthentication ppp local#local-user l2tpuser class networkpassword cipher $c$3$nl46fURLtkCkcbdnB6irTXma+E6u0c+hservice-type pppauthorization-attribute user-role network-operator#pki domain headgateca identifier LYQcertificate request url 1/certsrv/mscep/mscep.dllcertificate request from racertificate request entity securitypublic-key rsa general name abcundo crl check enable#pki entity securitycommon-name host#ipsec transform-set tran1esp encryption-algorithm 3des-cbcesp authentication-algorithm sha1#ipsec policy-template template1 1transform-set tran1ike-profile profile1#ipsec policy policy1 1 isakmp template template1#l2tp-group 1 mode lnsallow l2tp virtual-template 0undo tunnel authenticationtunnel name lns#l2tp enable#ike signature-identity from-certificate#ike profile profile1certificate domain headgatelocal-identity dnmatch remote certificate deviceproposal 1#ike proposal 1authentication-method rsa-signatureencryption-algorithm 3des-cbcdh group2#4IPsec over GRE的典型配置举例4.1组网需求如图15所示,企业远程办公网络通过IPsec VPN接入企业总部,要求:通过GRE隧道传输两网络之间的IPsec加密数据。图15IPsec over GRE组网图4.2配置思路为了对数据先进行IPsec处理,再进行GRE封装,访问控制列表需匹配数据的原始范围,并且要将IPsec应用到GRE隧道接口上。为了对网络间传输的数据先进行IPsec封装,再进行GRE封装,需要配置IPsec隧道的对端IP地址为GRE隧道的接口地址。4.3使用版本本举例是在R0106版本上进行配置和验证的。4.4配置步骤4.4.1Device A的配置(1)配置各接口IP地址#配置接口GigabitEthernet2/0/1的IP地址。 system-viewDeviceA interface gigabitethernet 2/0/1DeviceA-GigabitEthernet2/0/1 ip address DeviceA-GigabitEthernet2/0/1 tcp mss 1350DeviceA-GigabitEthernet2/0/1 quit#配置接口GigabitEthernet2/0/2的IP地址。DeviceA interface gigabitethernet 2/0/2DeviceA-GigabitEthernet2/0/2 ip address 8 DeviceA-GigabitEthernet2/0/2 quit(2)配置GRE隧道#创建Tunnel0接口,并指定隧道模式为GRE over IPv4隧道。DeviceA interface tunnel 0 mode gre#配置Tunnel0接口的IP地址为/24。DeviceA-Tunnel0 ip address #配置Tunnel0接口的源端地址为8/24(Device A的GigabitEthernet2/0/2的IP地址)。DeviceA-Tunnel0 source 8#配置Tunnel0接口的目的端地址为0/24(Device B的GigabitEthernet2/0/2的IP地址)。DeviceA-Tunnel0 destination 0DeviceA-Tunnel0 quit#配置从Device A经过Tunnel0接口到Remote office network的静态路由。DeviceA ip route-static tunnel 0(3)配置IPsec VPN#配置IKE keychain。DeviceA ike keychain keychain1DeviceA-ike-keychain-keychain1 pre-shared-key address key simple 123DeviceA-ike-keychain-keychain1 quit#创建ACL3000,定义需要IPsec保护的数据流。DeviceA acl number 3000DeviceA-acl-adv-3000 rule 0 permit ip source 55 destination 55DeviceA-acl-adv-3000 quit#配置IPsec安全提议。DeviceA ipsec transform-set tran1DeviceA-ipsec-transform-set-tran1 esp encryption-algorithm desDeviceA-ipsec-transform-set-tran1 esp authentication-algorithm sha1DeviceA-ipsec-transform-set-tran1 quit#创建一条IKE协商方式的IPsec安全策略,名称为policy1,序列号为1。DeviceA ipsec policy policy1 1 isakmpDeviceA-ipsec-policy-isakmp-policy1-1 security acl 3000DeviceA-ipsec-policy-isakmp-policy1-1 remote-address DeviceA-ipsec-policy-isakmp-policy1-1 transform-set tran1DeviceA-ipsec-policy-isakmp-policy1-1 quit#在GRE隧道接口上应用安全策略。DeviceA interface tunnel 0DeviceA-Tunnel0 ipsec apply policy policy1DeviceA-Tunnel0 quit4.4.2Device B的配置(1)配置各接口IP地址#配置接口GigabitEthernet2/0/1的IP地址。 system-viewDeviceB interface gigabitethernet 2/0/1DeviceB-GigabitEthernet2/0/1 ip address DeviceB-GigabitEthernet2/0/1 tcp mss 1350DeviceB-GigabitEthernet2/0/1 quit#配置接口GigabitEthernet2/0/2的IP地址。DeviceB interface gigabitethernet 2/0/2DeviceB-GigabitEthernet2/0/2 ip address 0 DeviceB-GigabitEthernet2/0/2 quit(2)配置GRE隧道#创建Tunnel0接口,并指定隧道模式为GRE over IPv4隧道。DeviceB interface tunnel 0 mode gre#配置Tunnel0接口的IP地址为/24。DeviceB-Tunnel0 ip address #配置Tunnel0接口的源端地址为0/24(Device B的GigabitEthernet2/0/2的IP地址)。DeviceB-Tunnel0 source 0#配置Tunnel0接口的目的端地址为8/24(Device A的GigabitEthernet2/0/2的IP地址)。DeviceB-Tunnel0 destination 8DeviceB-Tunnel0 quit#配置从DeviceB经过Tunnel0接口到Corporate network的静态路由。DeviceB ip route-static tunnel 0(3)配置IPsec VPN#配置IKE keychain。DeviceB ike keychain keychain1DeviceB-ike-keychain-keychain1 pre-shared-key address key simple 123DeviceB-ike-keychain-keychain1 quit#创建ACL3000,定义需要IPsec保护的数据流。DeviceB acl number 3000DeviceB-acl-adv-3000 rule 0 permit ip source 55 destination 55DeviceB-acl-adv-3000 quit#配置IPsec安全提议。DeviceB ipsec transform-set tran1DeviceB-ipsec-transform-set-tran1 esp encryption-algorithm desDeviceB-ipsec-transform-set-tran1 esp authentication-algorithm sha1DeviceB-ipsec-transform-set-tran1 quit#创建一条IKE协商方式的IPsec安全策略,名称为policy1,序列号为1。DeviceB ipsec policy policy1 1 isakmpDeviceB-ipsec-policy-isakmp-policy1-1 security acl 3000DeviceB-ipsec-policy-isakmp-policy1-1 remote-address DeviceB-ipsec-policy-isakmp-policy1-1 transform-set tran1DeviceB-ipsec-policy-isakmp-policy1-1 quit#在GRE隧道接口上应用安全策略。DeviceB interface tunnel 0DeviceB-Tunnel0 ipsec apply policy policy1DeviceB-Tunnel0 quit4.5验证配置#以Corporate network的主机向Remote office network的主机发起通信为例,从 ping ,会触发IPsec协商,建立IPsec隧道,在成功建立IPsec隧道后,可以ping通。C:Userscorporatenetwork ping Pinging with 32 bytes of data:Request timed out.Reply from : bytes=32 time=2ms TTL=254Reply from : bytes=32 time=2ms TTL=254Reply from : bytes=32 time=1ms TTL=254Ping statistics for : Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),Approximate round trip times in milli-seconds:Minimum = 1ms, Maximum = 2ms, Average = 1ms#在Device A上使用display ike sa命令,可以看到第一阶段的SA正常建立。 display ike sa Connection-ID Remote Flag DOI- 1 RD IPSECFlags:RD-READY RL-REPLACED FD-FADING#在Device A上使用display ipsec sa命令可以看到IPsec SA的建立情况。 display ipsec sa-Interface: Tunnel0- - IPsec policy: policy1 Sequence number: 1 Mode: isakmp - Tunnel id: 0 Encapsulation mode: tunnel Perfect forward secrecy: Path MTU: 1419 Tunnel: local address: remote address: Flow: sour addr: /55 port: 0 protocol: ip dest addr: /55 port: 0 protocol: ip Inbound ESP SAs SPI: 3128557135 (0xba79fe4f) Transform set: ESP-ENCRYPT-DES-CBC ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843199/3550 Max received sequence-number: 3 Anti-replay check enable: Y Anti-replay window size: 64 UDP encapsulation used for NAT traversal: N Status: Active Outbound ESP SAs SPI: 2643166978 (0x9d8b8702) Transform set: ESP-ENCRYPT-DES-CBC ESP-AUTH-SHA1 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1843199/3550 Max sent sequence-number: 3 UDP encapsulation used for NAT traversal: N Status: Active#在Device A上通过命令display interface tunnel 0可以查看经过GRE隧道传输的流量情况。 display interface tunnel 0Tunnel0Current state: UPLine protocol state: UPDescription: Tunnel0 InterfaceBandwidth: 64kbpsMaximum Transmit Unit: 1476Internet Address is /24 PrimaryTunnel source 8, destination 0Tunnel keepalive disabledTunnel TTL 255Tunnel protocol/transport GRE/IP GRE key disabled Checksumming of GRE packets disabledOutput queue - Urgent queuing: Size/Length/Discards 0/100/0Output queue - Protocol queuing: Size/Length/Discards 0/500/0Output queue - FIFO queuing: Size/Length/Discards 0/75/0Last clearing of counters: NeverLast 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/secLast 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/secInput: 40 packets, 3300 bytes, 0 dropsOutput: 41 packets, 3464 bytes, 0 drops#从Remote office network的主机向Corporate network的主机发起通信验证方法相同,此不赘述。4.6配置文件Device A:#interface GigabitEthernet2/0/1ip address tcp mss 1350#interface GigabitEthernet2/0/2ip address 8 #interface Tunnel0 mode greip address source 8destination 0ipsec apply policy policy1#ip route-static 24 Tunnel0#acl number 3000rule 0 permit ip source 55 destination 55#ipsec transform-set tran1esp encryption-algorithm des-cbcesp authentication-algorithm sha1#ipsec policy policy1 1 isakmptransform-set tran1security acl 3000remote-address #i
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年数字内容创作者考试试卷及答案
- 2025年小学数学期末考试题及答案
- 2025年物业管理与服务行业能力考试卷及答案
- 2025年数据分析与处理技能测试题及答案
- 2025年兽医学专业核心知识考试题及答案
- 2025年汽车工程技术专业考试题及答案
- 2025年跨文化交际能力评估试卷及答案
- 2025年跨境电商业务管理考试试卷及答案
- 2025年健康管理师考试试卷及答案指导
- 2025年环境工程技术人员考试题及答案
- 香港证券及期货从业资格考试温习手册版HK
- 2025年中考物理知识点归纳(挖空版)
- 2024年安徽省初中学业水平考试生物试题含答案
- 2024年演出经纪人考试必背1000题及完整答案(各地真题)
- 团员组织关系转接介绍信(样表)
- GB/T 18926-2008包装容器木构件
- 通道县生物多样性调查
- 汉语拼音音节表带声调
- 假发行业英语术语整理
- 中国银行营业网点基础服务礼仪规范
- 一份很详细的模具报价单
评论
0/150
提交评论