美文网首页
本地Cisco与云端H3C建立GRE over IPsec

本地Cisco与云端H3C建立GRE over IPsec

作者: 小岳_ | 来源:发表于2021-01-20 22:00 被阅读0次

一、目标

  • 内网Cisco路由器与云端H3C路由器建立GRE over IPsec,最终实现Tunnel接口互通;
  • 为内网与云端运行动态路由协议(RIP、OSPF、ISIS、BGP)建立基础。

二、拓扑

image.png
  • 拓扑中Cisco VPN路由器为旁挂到核心交换机部署,接口IP为私网IP;
  • 如拓扑所示,Cisco VPN路由器访问互联网需经过两道NAT转换;
  • 云端H3C VSR1000接口配置为私网IP:172.25.25.88,公网IP为:39.98.xxx.xxx;
  • 由于Cisco VPN路由器为私网IP,所以IPsecVPN需配置为野蛮模式。

三、GRE over IPsec配置

3.1 配置思路

  • 创建Loopback接口,配置IPsec感兴趣流为本端Loopback接口IP至云端Loopback接口IP,云端反之同理;
  • 配置IPsec野蛮模式VPN;
  • 创建Tunnel接口,为Tunnel接口配置IP地址;
  • 指定Tunnel接口源IP为Loopback接口的IP,目标IP为对端Loopback接口的IP;
  • Tunnel接口互ping测试。

3.2 本地Cisco VPN路由器配置

创建Loopback接口:
interface Loopback10 
 ip address 10.195.195.2 255.255.255.255
 exit

配置感兴趣流ACL:
ip access-list extended ipsecacl
 permit ip host 10.195.195.2 host 10.195.195.1
 exit

配置IKE阶段加密和验证方式:
crypto isakmp policy 30
 encr 3des
 hash md5
 authentication pre-share
 group 2
 exit

指定IPsec VPN为野蛮模式(采用FQDN认证,FQDN配置为"1841"),指向IPsec对等体:
crypto isakmp peer address 39.98.xxx.xxx
 set aggressive-mode password xxxxxxx
 set aggressive-mode client-endpoint fqdn 1841
 exit

配置IPsec阶段加密和验证方式(配置转换集):
crypto ipsec transform-set vsrset esp-3des esp-md5-hmac 
 exit

关联对等体、转换集和感兴趣流:
crypto map vsrvpn 30 ipsec-isakmp 
 set peer 39.98.xxx.xxx
 set transform-set vsrset 
 match address ipsecacl
 exit

接口调用IPsec策略:
interface FastEthernet0/0
 crypto map vsrvpn
 exit

创建Tunel接口:
interface Tunnel10
 ip address 10.100.100.2 255.255.255.252
 tunnel source Loopback10
 tunnel destination 10.195.195.1
 exit
  • 出口防火墙(Cisco ASA)必须配置NAT Bypass,用于使IPsec VPN互访的流量不做NAT,即在NAT中Bypass掉VPN感兴趣流的互访流量:
object network 10.195.195.2
 host 10.195.195.2
 exit
object network 10.195.195.1
 host 10.195.195.1
 exit

通过配置Twice NAT旁路掉VPN感兴趣流的互访流量:
nat (inside,outside) source static 10.195.195.2 10.195.195.2 destination static 10.195.195.1 10.195.195.1

3.3 云端H3C vSR1000路由器配置

创建Loopback接口:
interface LoopBack10
 ip address 10.195.195.1 255.255.255.255
 quit

配置感兴趣流ACL:
云端为IPsec接收方,IPsec隧道的建立应由本地Cisco路由器主动发起,所以云端路由器不需配置感兴趣流ACL。

配置IKE阶段加密和验证方式:
ike proposal 1
 encryption-algorithm 3des-cbc
 dh group2
 authentication-algorithm md5
 quit

指定野蛮模式的本机身份:
ike identity fqdn vsr

创建IKE Keychain:
ike keychain kcvsr
 pre-shared-key hostname 1841 key simple xxxxxxx
 quit

创建IKE Profile,关联Keychain、配置为野蛮模式、指定对端FQDN、关联IKE Proposal:
ike profile 1841
 keychain kcvsr
 exchange-mode aggressive
 match remote identity fqdn 1841
 proposal 1
 quit

配置IPsec阶段加密和验证方式(配置转换集):
ipsec transform-set ts1841
 esp encryption-algorithm 3des-cbc 
 esp authentication-algorithm md5
 quit

创建IPsec策略模板(H3C、华为配置必须通过模板方式配置野蛮模式的IPsec VPN),模板关联转换集和IKE profile:
ipsec policy-template pt1841 1
 transform-set ts1841 
 ike-profile 1841
 quit

将与IPsec策略模板与IPsec VPN策略关联:
ipsec policy ipsecvsr 1 isakmp template pt1841

接口调用IPsec策略:
interface GigabitEthernet1/0
 ipsec apply policy ipsecvsr
 quit

创建Tunel接口:
interface Tunnel10 mode gre
 ip address 10.100.100.1 255.255.255.252
 source LoopBack10
 destination 10.195.195.2
 quit

3.4 状态验证

  • 在Cisco VPN路由器上主动发起流量,以触发野蛮模式IPsec VPN隧道的建立
1841-Spoke#ping 10.195.195.1 source 10.195.195.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.195.195.1, timeout is 2 seconds:
Packet sent with a source address of 10.195.195.2 
.!!!!
  • 验证本地Cisco VPN路由器IPsec VPN隧道状态
验证IKE阶段状态:
1841-Spoke#show crypto isakmp sa 
IPv4 Crypto ISAKMP SA
dst             src             state          conn-id status
39.98.xxx.xxx   172.16.101.101  QM_IDLE           1004 ACTIVE

IPv6 Crypto ISAKMP SA

验证IPsec阶段状态:
1841-Spoke#show crypto ipsec sa                                         

interface: FastEthernet0/0
    Crypto map tag: vsrvpn, local addr 172.16.101.101

   protected vrf: (none)
   local  ident (addr/mask/prot/port): (10.195.195.2/255.255.255.255/0/0)
   remote ident (addr/mask/prot/port): (10.195.195.1/255.255.255.255/0/0)
   current_peer 39.98.xxx.xxx port 4500
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 338, #pkts encrypt: 338, #pkts digest: 338
    #pkts decaps: 338, #pkts decrypt: 338, #pkts verify: 338
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0
    #pkts not decompressed: 0, #pkts decompress failed: 0
    #send errors 1, #recv errors 0

     local crypto endpt.: 172.16.101.101, remote crypto endpt.: 39.98.xxx.xxx
     path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0
     current outbound spi: 0x26A607EF(648415215)
     PFS (Y/N): N, DH group: none

     inbound esp sas:
      spi: 0xFC90A349(4237337417)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2053, flow_id: FPGA:53, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1769282/204)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE
      spi: 0x3CE66A5(63858341)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2055, flow_id: FPGA:55, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1782998/2905)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE

     inbound ah sas:

     inbound pcp sas:

     outbound esp sas:
      spi: 0xDAE1C959(3672230233)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2054, flow_id: FPGA:54, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1769282/204)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE
      spi: 0x26A607EF(648415215)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2056, flow_id: FPGA:56, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1782998/2905)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE

     outbound ah sas:

     outbound pcp sas:
  • 验证云端VSR 1000路由器IPsec VPN隧道状态
验证IKE阶段状态:
[VSR1K]display ike sa
    Connection-ID   Local               Remote              Flag      DOI    
-------------------------------------------------------------------------
    63              172.25.25.88        121.69.xxx.xxx        RD        IPsec  
Flags:
RD--READY RL--REPLACED FD-FADING RK-REKEY

验证IPsec阶段状态:
[VSR1K]display ipsec sa 
-------------------------------
Interface: GigabitEthernet1/0
-------------------------------

  -----------------------------
  IPsec policy: ipsecvsr
  Sequence number: 1
  Mode: Template
  -----------------------------
    Tunnel id: 0
    Encapsulation mode: tunnel
    Perfect Forward Secrecy: 
    Inside VPN: 
    Extended Sequence Numbers enable: N
    Traffic Flow Confidentiality enable: N
    Path MTU: 1436
    Tunnel:
        local  address: 172.25.25.88
        remote address: 121.69.xxx.xxx
    Flow:
        sour addr: 10.195.195.1/255.255.255.255  port: 0  protocol: ip
        dest addr: 10.195.195.2/255.255.255.255  port: 0  protocol: ip

    [Inbound ESP SAs]
      SPI: 648415215 (0x26a607ef)
      Connection ID: 47244640256
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843199/2739
      Max received sequence-number: 5
      Anti-replay check enable: Y
      Anti-replay window size: 64
      UDP encapsulation used for NAT traversal: Y
      Status: Active

    [Outbound ESP SAs]
      SPI: 63858341 (0x03ce66a5)
      Connection ID: 47244640257
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843199/2739
      Max sent sequence-number: 5
      UDP encapsulation used for NAT traversal: Y
      Status: Active

  -----------------------------
  IPsec policy: ipsecvsr
  Sequence number: 1
  Mode: Template
  -----------------------------
    Tunnel id: 0
    Encapsulation mode: tunnel
    Perfect Forward Secrecy: 
    Inside VPN: 
    Extended Sequence Numbers enable: N
    Traffic Flow Confidentiality enable: N
    Path MTU: 1436
    Tunnel:
        local  address: 172.25.25.88
        remote address: 121.69.xxx.xxx
    Flow:
        sour addr: 10.195.195.1/255.255.255.255  port: 0  protocol: ip
        dest addr: 10.195.195.2/255.255.255.255  port: 0  protocol: ip

    [Inbound ESP SAs]
      SPI: 3672230233 (0xdae1c959)
      Connection ID: 21474836482
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843200/38
      Max received sequence-number: 0
      Anti-replay check enable: Y
      Anti-replay window size: 64
      UDP encapsulation used for NAT traversal: Y
      Status: Active

    [Outbound ESP SAs]
      SPI: 4237337417 (0xfc90a349)
      Connection ID: 30064771075
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843200/38
      Max sent sequence-number: 0
      UDP encapsulation used for NAT traversal: Y
      Status: Active
  • 验证Tunnel接口连通性:
[VSR1K]ping -a 10.100.100.1 10.100.100.2
Ping 10.100.100.2 (10.100.100.2) from 10.100.100.1: 56 data bytes, press CTRL+C to break
56 bytes from 10.100.100.2: icmp_seq=0 ttl=255 time=10.069 ms
56 bytes from 10.100.100.2: icmp_seq=1 ttl=255 time=9.780 ms
56 bytes from 10.100.100.2: icmp_seq=2 ttl=255 time=10.331 ms
56 bytes from 10.100.100.2: icmp_seq=3 ttl=255 time=9.759 ms
56 bytes from 10.100.100.2: icmp_seq=4 ttl=255 time=9.911 ms

--- Ping statistics for 10.100.100.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 9.759/9.970/10.331/0.212 ms

四、最后

  • 如果条件允许,不建议使用野蛮模式的IPsec VPN,因为安全性较差。

相关文章

网友评论

      本文标题:本地Cisco与云端H3C建立GRE over IPsec

      本文链接:https://www.haomeiwen.com/subject/eprlzktx.html