本地Cisco与云端H3C建立GRE over IPsec

一、目标

  • 内网Cisco路由器与云端H3C路由器建立GRE over IPsec,最终实现Tunnel接口互通;
  • 为内网与云端运行动态路由协议(RIP、OSPF、ISIS、BGP)建立基础。

二、拓扑

image.png
  • 拓扑中Cisco VPN路由器为旁挂到核心交换机部署,接口IP为私网IP;
  • 如拓扑所示,Cisco VPN路由器访问互联网需经过两道NAT转换;
  • 云端H3C VSR1000接口配置为私网IP:172.25.25.88,公网IP为:39.98.xxx.xxx;
  • 由于Cisco VPN路由器为私网IP,所以IPsecVPN需配置为野蛮模式。

三、GRE over IPsec配置

3.1 配置思路

  • 创建Loopback接口,配置IPsec感兴趣流为本端Loopback接口IP至云端Loopback接口IP,云端反之同理;
  • 配置IPsec野蛮模式VPN;
  • 创建Tunnel接口,为Tunnel接口配置IP地址;
  • 指定Tunnel接口源IP为Loopback接口的IP,目标IP为对端Loopback接口的IP;
  • Tunnel接口互ping测试。

3.2 本地Cisco VPN路由器配置

创建Loopback接口:
interface Loopback10 
 ip address 10.195.195.2 255.255.255.255
 exit

配置感兴趣流ACL:
ip access-list extended ipsecacl
 permit ip host 10.195.195.2 host 10.195.195.1
 exit

配置IKE阶段加密和验证方式:
crypto isakmp policy 30
 encr 3des
 hash md5
 authentication pre-share
 group 2
 exit

指定IPsec VPN为野蛮模式(采用FQDN认证,FQDN配置为"1841"),指向IPsec对等体:
crypto isakmp peer address 39.98.xxx.xxx
 set aggressive-mode password xxxxxxx
 set aggressive-mode client-endpoint fqdn 1841
 exit

配置IPsec阶段加密和验证方式(配置转换集):
crypto ipsec transform-set vsrset esp-3des esp-md5-hmac 
 exit

关联对等体、转换集和感兴趣流:
crypto map vsrvpn 30 ipsec-isakmp 
 set peer 39.98.xxx.xxx
 set transform-set vsrset 
 match address ipsecacl
 exit

接口调用IPsec策略:
interface FastEthernet0/0
 crypto map vsrvpn
 exit

创建Tunel接口:
interface Tunnel10
 ip address 10.100.100.2 255.255.255.252
 tunnel source Loopback10
 tunnel destination 10.195.195.1
 exit
  • 出口防火墙(Cisco ASA)必须配置NAT Bypass,用于使IPsec VPN互访的流量不做NAT,即在NAT中Bypass掉VPN感兴趣流的互访流量:
object network 10.195.195.2
 host 10.195.195.2
 exit
object network 10.195.195.1
 host 10.195.195.1
 exit

通过配置Twice NAT旁路掉VPN感兴趣流的互访流量:
nat (inside,outside) source static 10.195.195.2 10.195.195.2 destination static 10.195.195.1 10.195.195.1

3.3 云端H3C vSR1000路由器配置

创建Loopback接口:
interface LoopBack10
 ip address 10.195.195.1 255.255.255.255
 quit

配置感兴趣流ACL:
云端为IPsec接收方,IPsec隧道的建立应由本地Cisco路由器主动发起,所以云端路由器不需配置感兴趣流ACL。

配置IKE阶段加密和验证方式:
ike proposal 1
 encryption-algorithm 3des-cbc
 dh group2
 authentication-algorithm md5
 quit

指定野蛮模式的本机身份:
ike identity fqdn vsr

创建IKE Keychain:
ike keychain kcvsr
 pre-shared-key hostname 1841 key simple xxxxxxx
 quit

创建IKE Profile,关联Keychain、配置为野蛮模式、指定对端FQDN、关联IKE Proposal:
ike profile 1841
 keychain kcvsr
 exchange-mode aggressive
 match remote identity fqdn 1841
 proposal 1
 quit

配置IPsec阶段加密和验证方式(配置转换集):
ipsec transform-set ts1841
 esp encryption-algorithm 3des-cbc 
 esp authentication-algorithm md5
 quit

创建IPsec策略模板(H3C、华为配置必须通过模板方式配置野蛮模式的IPsec VPN),模板关联转换集和IKE profile:
ipsec policy-template pt1841 1
 transform-set ts1841 
 ike-profile 1841
 quit

将与IPsec策略模板与IPsec VPN策略关联:
ipsec policy ipsecvsr 1 isakmp template pt1841

接口调用IPsec策略:
interface GigabitEthernet1/0
 ipsec apply policy ipsecvsr
 quit

创建Tunel接口:
interface Tunnel10 mode gre
 ip address 10.100.100.1 255.255.255.252
 source LoopBack10
 destination 10.195.195.2
 quit

3.4 状态验证

  • 在Cisco VPN路由器上主动发起流量,以触发野蛮模式IPsec VPN隧道的建立
1841-Spoke#ping 10.195.195.1 source 10.195.195.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.195.195.1, timeout is 2 seconds:
Packet sent with a source address of 10.195.195.2 
.!!!!
  • 验证本地Cisco VPN路由器IPsec VPN隧道状态
验证IKE阶段状态:
1841-Spoke#show crypto isakmp sa 
IPv4 Crypto ISAKMP SA
dst             src             state          conn-id status
39.98.xxx.xxx   172.16.101.101  QM_IDLE           1004 ACTIVE

IPv6 Crypto ISAKMP SA

验证IPsec阶段状态:
1841-Spoke#show crypto ipsec sa                                         

interface: FastEthernet0/0
    Crypto map tag: vsrvpn, local addr 172.16.101.101

   protected vrf: (none)
   local  ident (addr/mask/prot/port): (10.195.195.2/255.255.255.255/0/0)
   remote ident (addr/mask/prot/port): (10.195.195.1/255.255.255.255/0/0)
   current_peer 39.98.xxx.xxx port 4500
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 338, #pkts encrypt: 338, #pkts digest: 338
    #pkts decaps: 338, #pkts decrypt: 338, #pkts verify: 338
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0
    #pkts not decompressed: 0, #pkts decompress failed: 0
    #send errors 1, #recv errors 0

     local crypto endpt.: 172.16.101.101, remote crypto endpt.: 39.98.xxx.xxx
     path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0
     current outbound spi: 0x26A607EF(648415215)
     PFS (Y/N): N, DH group: none

     inbound esp sas:
      spi: 0xFC90A349(4237337417)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2053, flow_id: FPGA:53, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1769282/204)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE
      spi: 0x3CE66A5(63858341)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2055, flow_id: FPGA:55, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1782998/2905)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE

     inbound ah sas:

     inbound pcp sas:

     outbound esp sas:
      spi: 0xDAE1C959(3672230233)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2054, flow_id: FPGA:54, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1769282/204)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE
      spi: 0x26A607EF(648415215)
        transform: esp-3des esp-md5-hmac ,
        in use settings ={Tunnel UDP-Encaps, }
        conn id: 2056, flow_id: FPGA:56, sibling_flags 80000046, crypto map: vsrvpn
        sa timing: remaining key lifetime (k/sec): (1782998/2905)
        IV size: 8 bytes
        replay detection support: Y
        Status: ACTIVE

     outbound ah sas:

     outbound pcp sas:
  • 验证云端VSR 1000路由器IPsec VPN隧道状态
验证IKE阶段状态:
[VSR1K]display ike sa
    Connection-ID   Local               Remote              Flag      DOI    
-------------------------------------------------------------------------
    63              172.25.25.88        121.69.xxx.xxx        RD        IPsec  
Flags:
RD--READY RL--REPLACED FD-FADING RK-REKEY

验证IPsec阶段状态:
[VSR1K]display ipsec sa 
-------------------------------
Interface: GigabitEthernet1/0
-------------------------------

  -----------------------------
  IPsec policy: ipsecvsr
  Sequence number: 1
  Mode: Template
  -----------------------------
    Tunnel id: 0
    Encapsulation mode: tunnel
    Perfect Forward Secrecy: 
    Inside VPN: 
    Extended Sequence Numbers enable: N
    Traffic Flow Confidentiality enable: N
    Path MTU: 1436
    Tunnel:
        local  address: 172.25.25.88
        remote address: 121.69.xxx.xxx
    Flow:
        sour addr: 10.195.195.1/255.255.255.255  port: 0  protocol: ip
        dest addr: 10.195.195.2/255.255.255.255  port: 0  protocol: ip

    [Inbound ESP SAs]
      SPI: 648415215 (0x26a607ef)
      Connection ID: 47244640256
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843199/2739
      Max received sequence-number: 5
      Anti-replay check enable: Y
      Anti-replay window size: 64
      UDP encapsulation used for NAT traversal: Y
      Status: Active

    [Outbound ESP SAs]
      SPI: 63858341 (0x03ce66a5)
      Connection ID: 47244640257
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843199/2739
      Max sent sequence-number: 5
      UDP encapsulation used for NAT traversal: Y
      Status: Active

  -----------------------------
  IPsec policy: ipsecvsr
  Sequence number: 1
  Mode: Template
  -----------------------------
    Tunnel id: 0
    Encapsulation mode: tunnel
    Perfect Forward Secrecy: 
    Inside VPN: 
    Extended Sequence Numbers enable: N
    Traffic Flow Confidentiality enable: N
    Path MTU: 1436
    Tunnel:
        local  address: 172.25.25.88
        remote address: 121.69.xxx.xxx
    Flow:
        sour addr: 10.195.195.1/255.255.255.255  port: 0  protocol: ip
        dest addr: 10.195.195.2/255.255.255.255  port: 0  protocol: ip

    [Inbound ESP SAs]
      SPI: 3672230233 (0xdae1c959)
      Connection ID: 21474836482
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843200/38
      Max received sequence-number: 0
      Anti-replay check enable: Y
      Anti-replay window size: 64
      UDP encapsulation used for NAT traversal: Y
      Status: Active

    [Outbound ESP SAs]
      SPI: 4237337417 (0xfc90a349)
      Connection ID: 30064771075
      Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5
      SA duration (kilobytes/sec): 1843200/3600
      SA remaining duration (kilobytes/sec): 1843200/38
      Max sent sequence-number: 0
      UDP encapsulation used for NAT traversal: Y
      Status: Active
  • 验证Tunnel接口连通性:
[VSR1K]ping -a 10.100.100.1 10.100.100.2
Ping 10.100.100.2 (10.100.100.2) from 10.100.100.1: 56 data bytes, press CTRL+C to break
56 bytes from 10.100.100.2: icmp_seq=0 ttl=255 time=10.069 ms
56 bytes from 10.100.100.2: icmp_seq=1 ttl=255 time=9.780 ms
56 bytes from 10.100.100.2: icmp_seq=2 ttl=255 time=10.331 ms
56 bytes from 10.100.100.2: icmp_seq=3 ttl=255 time=9.759 ms
56 bytes from 10.100.100.2: icmp_seq=4 ttl=255 time=9.911 ms

--- Ping statistics for 10.100.100.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 9.759/9.970/10.331/0.212 ms

四、最后

  • 如果条件允许,不建议使用野蛮模式的IPsec VPN,因为安全性较差。
最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 159,716评论 4 364
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 67,558评论 1 294
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 109,431评论 0 244
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 44,127评论 0 209
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,511评论 3 287
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,692评论 1 222
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,915评论 2 313
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,664评论 0 202
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,412评论 1 246
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,616评论 2 245
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 32,105评论 1 260
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,424评论 2 254
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 33,098评论 3 238
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,096评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,869评论 0 197
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,748评论 2 276
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,641评论 2 271

推荐阅读更多精彩内容