InRouter与Cisco Router构建IPSec VPN 配置指导

http://www.m2mlib.com/uploads/article/20171114/83f1d1f46245f767ddded35934e4158a.jpg
前言 声明  本手册为北京映翰通网络技术有限公司(以下简称映翰通或InHand)及其许可者版权所有,保留一切权利;  未经本公司书面许可,任何单位和个人丌得擅自复制、摘录、备份、修改、传播、翻译成其他语言、将其全部或部分用于商业用途;  对于本手册中出现的其它公司的商标、产品标识及商品名称,由各自权利人拥有;  由于产品版本升级或其他原因,本手册内容有可能变更.映翰通保留在没有任何通知或者提示的情况下对本手册的内容进行修改的权利;  本手册仅作为使用指导,映翰通尽全力在本手册中提供准确的信息,但是映翰通并丌确保手册内容完全没有错误;  本手册中的所有陈述、信息和建议也丌构成任何明示或暗示的担保。 版本说明  本手册Inrouter对应的软件版本为:********  本手册Cisco对应的软件版本为:12.0以后丏须支持VPN  读者对象  本手册适合下列人员阅读:  映翰通客户方网络工程师  映翰通内部技术工程师 说明  本手册丼例说明部分的端口类型同实际可能丌符,实际操作中需要按照各产品所支持的端口类型进行配置;  本手册部分丼例的显示信息中可能含有其它产品系列的内容(如产品型号、描述等),具体显示信息请以实际使用的设备信息为准;  本手册中涉及的映翰通路由器产品图标为映翰通与用图标。 Technical Support Center Version: 4 CG V1.0 目 录 前言 .........................................................................................................................................................................................................2 1. 概述 ...............................................................................................................................................................................................5 2. 网络拓扑 .......................................................................................................................................................................................6 2.1 网络拓扑 ...............................................................................................................................................................................6 2.2 网络拓扑说明 ......................................................................................................................................................................7 3. 配置指导 .......................................................................................................................................................................................8 3.1 中心端CiscoRouter基本配置 ........................................................................................................................................8 3.1.1 接口配置(静态IP地址)...................................................................................................................................8 3.1.2 接口配置(动态获取固定IP地址) ................................................................................................................ 10 3.2 远端InRouter基本配置 ................................................................................................................................................ 12 3.2.1 远端InRouter WAN口配置(如无WAN口或采用3G拨号则跳过此步骤) ...................................... 12 3.2.2 远端InRouter LAN口配置 .............................................................................................................................. 16 3.3 IPsec VPN配置 ................................................................................................................................................................ 18 3.3.1中心端Cisco Router IPsec VPN配置 ............................................................................................................ 18 3.3.2 远端InRouter IPsec VPN配置 ....................................................................................................................... 20 3.4 验证 .................................................................................................................................................................................... 23 3.4.1 中心端验证 .......................................................................................................................................................... 23 3.4.2 远端InRouter验证 ........................................................................................................................................... 26 4.备注 ..................................................................................................................................................................................27 1. 概述 本文档主要讲述了关于映翰通InRouter路由器不中心端Cisco Router(支持VPN)构建LAN-to-LAN VPN的方法。InRouter 61X,Inrouter 71X全系列产品均支持VPN功能,并不众多国际主流中心端设备厂商产品兼容。建立起LAN-to-LAN VPN之后便可以实现下位机—InRouter设备LAN端不上位机—中心端设备LAN进行双向通信。 From: Technical Support Center Version: 6 CG V1.0 2. 网络拓扑 2.1 网络拓扑
http://www.m2mlib.com/uploads/article/20171114/cc733ef9ce8094f927a57e6b94520c08.jpg
http://www.m2mlib.com/uploads/article/20171114/4212cb2f198ff7e28c97d637c751ed5e.png
2.2 网络拓扑说明  中心端设备为Cisco Router 2821,IOS 为C2800NM-ADVIPSERVICESK9-M,版本15.0(1)M8;外部IP地址125.69.128.108,掩码255.255.255.0;内部IP地址172.0.0.2,掩码255.255.255.0  接入端1设备为InRouter 61X/71X;外部IP地址172.20.1.2,掩码255.255.255.0;内部IP地址192.168.2.1,掩码255.255.255.0  接入端2设备为InRouter 61X/71X;外部IP地址113.118.91.138,掩码255.255.255.0;内部IP地址192.168.3.1,掩码255.255.255.0 3. 配置指导 3.1 中心端CiscoRouter基本配置 3.1.1 接口配置(静态IP地址) Router>enable //进入特权模式 Router# configure terminal //进入配置模式 Router (config)#hostname inhand001 //设置路由器主机名 inhand001(config)#username cisco secret cisco //设置用户名和密码(思科新一代路由器在第一次启动完成后必须设置用户名和密码,否则在下次重启后将无法进入特权模式) inhand001(config)#enable secret cisco //设置特权模式密码(思科新一代路由器在第一次启动完成后必须设置特权模式密码,否则在下次重启后将无法进入特权模式) inhand001(config)#interface gigabitEthernet 0/0 //进入接口配置模式(外部或内部接口可自行选择 但必须是具有三层功能以太网口) inhand001(config-if)#ip address 125.69.128.108 255.255.255.0 //为外部接口指定IP和掩码 inhand001(config-if)#no shutdown //开启接口 inhand001(config-if)#speed auto //设置端口速率为自适应 inhand001(config-if)#duplex auto //设置端口双工模式为自适应 inhand001(config-if)#exit //退出接口配置模式 inhand001(config)#interface gigabitEthernet 0/1 inhand001(config-if)#ip address 172.0.0.2 255.255.255.0 //为内部接口指定IP和掩码 inhand001(config-if)#no shutdown  inhand001(config-if)#speed auto inhand001(config-if)#duplex auto inhand001(config-if)#exit inhand001(config)#ip route 0.0.0.0 0.0.0.0 下一跳地址 //配置静态默认路由(下一跳地址为ISP提供) inhand001(config)# access-list 100 permit ip 172.0.0.0 0.0.0.255 192.168.2.0 0.0.0.255 //创建访问列表允许中心端内部网段访问远端1内部网段 inhand001(config)# access-list 100 permit ip 172.0.0.0 0.0.0.255 192.168.3.0 0.0.0.255 //创建访问列表允许中心端内部网段访问远端2内部网段 inhand001(config)# access-list 100 permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255 //创建访问列表允许远端1内部网段访问远端2内部网段(此条可选) inhand001(config)# access-list 100 permit ip 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255 //创建访问列表允许远端2内部网段访问远端1内部网段(此条可选) inhand001(config)#ip nat inside source list 100 interface GigabitEthernet0/0 overload //创建NAT规则(此处选用PAT) inhand001(config)#interface gigabitEthernet 0/0 inhand001(config-if)#ip nat outside //划分NAT区域(外部接口为outside) inhand001(config-if)#exit inhand001(config)#interface gigabitEthernet 0/1 inhand001(config-if)#ip nat inside //划分NAT区域(外部接口为inside) inhand001(config-if)#end inhand001#write memory //保存配置 3.1.2 接口配置(动态获取固定IP地址) Router>enable Router# configure terminal Router (config)#hostname inhand001 inhand001(config)#username cisco secret cisco inhand001(config)#enable secret cisco inhand001(config)#interface gigabitEthernet 0/0 inhand001(config-if)#no ip address inhand001(config-if)#pppoe enable group global //在外部接口上启用PPPOE拨号功能 inhand001(config-if)#pppoe-client dial-pool-number 10 //设置PPPOE拨号池号码(1~255) inhand001(config-if)#no shutdown inhand001(config-if)#speed auto inhand001(config-if)#duplex auto inhand001(config-if)#exit inhand001(config)#interface Dialer1 //创建拨号逻辑接口 inhand001(config-if)#ip address negotiated //指定逻辑拨号接口IP地址为自动协商 inhand001(config-if)#ip mtu 1492 //如果采用PPPOE或ADSL则此项必须设置 inhand001(config-if)#encapsulation ppp //设置采用PPP封装 inhand001(config-if)#dialer pool 10 //设置拨号池号码(此处号码须不上述外部接口配置的PPPOE拨号池号码一致) inhand001(config-if)#dialer-group 1 //设置拨号列表号(1~128) inhand001(config-if)#ppp pap sent-username 用户名 password 密码 //设置用户名和密码 inhand001(config-if)#ip nat outside //如采用拨号方式则outside必须应用在拨号逻辑接口上 inhand001(config-if)#exit inhand001(config)#interface gigabitEthernet 0/1 inhand001(config-if)#ip address 172.0.0.2 255.255.255.0 inhand001(config-if)#no shutdown inhand001(config-if)#speed auto inhand001(config-if)#duplex auto inhand001(config-if)#exit inhand001(config)#ip route 0.0.0.0 0.0.0.0 Dialer1 //如果采用拨号方式则静态默认路由的下一跳必须为拨号逻辑接口 inhand001(config)# access-list 100 permit ip 172.0.0.0 0.0.0.255 192.168.2.0 0.0.0.255 inhand001(config)# access-list 100 permit ip 172.0.0.0 0.0.0.255 192.168.3.0 0.0.0.255 inhand001(config)# access-list 100 permit ip 192.168.2.0 0.0.0.255 192.168.3.0 0.0.0.255 inhand001(config)# access-list 100 permit ip 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255 inhand001(config)#ip nat inside source list 100 interface GigabitEthernet0/0 overload inhand001(config)#interface gigabitEthernet 0/1 inhand001(config-if)#ip nat inside inhand001(config-if)#end inhand001#write memory 至此中心端Cisco Router基本配置完成。 3.2 远端InRouter基本配置 3.2.1 远端InRouter WAN口配置(如无WAN口或采用3G拨号则跳过此步骤) 接通InRouter电源,用一根网线连接InRouter的LAN口和PC,打开浏览器,输入http://192.168.2.1,输入用户名adm,密码123456.
http://www.m2mlib.com/uploads/article/20171114/23e6b5791ca563a1e7a7f7a1be75fb82.jpg
http://www.m2mlib.com/uploads/article/20171114/3f3da39b57199a21dad69efa6a9934a9.jpg
http://www.m2mlib.com/uploads/article/20171114/86773c3fab006a93c4800ea7f6ece7c9.jpg
http://www.m2mlib.com/uploads/article/20171114/404f9b5675ea65510e1152c991f45e57.jpg
http://www.m2mlib.com/uploads/article/20171114/4f0968e2e3bdab766b9db0500e67a078.jpg
3.2.2 远端InRouter LAN口配置
http://www.m2mlib.com/uploads/article/20171114/9dcac792ce16d0c1fc4e161bc2c566a2.jpg
http://www.m2mlib.com/uploads/article/20171114/48245d1de9ff8d2f046b72baf51f1ed6.jpg
至此InRouter基本配置完成 3.3 IPsec VPN配置 3.3.1中心端Cisco Router IPsec VPN配置 Router>enable Router# configure terminal inhand001(config)#crypto isakmp policy 1 //定义IKE策略优先级(1为优先级) inhand001(config-isakmp)# encr 3des //定义加密算法 inhand001(config-isakmp)# hash md5 //定义散列算法(可丌配) inhand001(config-isakmp)# authentication pre-share //定义认证方式 inhand001(config-isakmp)# group 2 //定义密钥交换协议/算法标示符 inhand001(config-isakmp)#exit inhand001(config)#crypto isakmp key 123 address 0.0.0.0 0.0.0.0 //设置预共享密钥为123,vpn隧道远端为任意IP(远端InRouer通常为动态IP) inhand001(config)#crypto ipsec transform-set inhandtrans esp-3des esp-md5-hmac //创建转换集inhandtrans inhand001(config)#crypto dynamic-map inhandmap 1 //创建动态映射名和序列号 inhand001(config-crypto-map)#set transform-set inhandtrans //指定转换集 inhand001(config-crypto-map)#match address 100 //关联感兴趣流(设置需在VPN隧道中传输的流量) inhand001(config-crypto-map)#exit inhand001(config)#crypto map truemap 10000 ipsec-isakmp dynamic inhandmap //将动态映射加入到正规映射 inhand001(config)#interface gigabitEthernet 0/0 inhand001(config-if)#crypto map truemap //在外部接口上应用正规映射 inhand001(config-if)#end inhand001#write memory 至此中心端Cisco Router IPsec VPN配置结束 3.3.2 远端InRouter IPsec VPN配置
http://www.m2mlib.com/uploads/article/20171114/edadc84f4b4ed2edd532c422d1396058.jpg
http://www.m2mlib.com/uploads/article/20171114/1bd68ed5d872468a61de67de374e1286.jpg
http://www.m2mlib.com/uploads/article/20171114/0ab6a23e8f659a8b79b77d6bb4e782af.jpg
http://www.m2mlib.com/uploads/article/20171114/3ed4a634228bea653e74cc416862c18c.jpg
3.4 验证 3.4.1 中心端验证 在验证之前请从远端PC执行ping 172.0.0.X(中心端内部PC地址) inhand001#show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 125.69.128.108 172.20.1.2 QM_IDLE 1001 ACTIVE IPv6 Crypto ISAKMP SA 如果出现上述显示则表示第一阶段协商成功 inhand001#show crypto ipsec sa interface: GigabitEthernet0/0 Crypto map tag: map, local addr 125.69.128.108 protected vrf: (none) local ident (addr/mask/prot/port): (172.0.0.0/255.255.255.0/0/0) remote ident (addr/mask/prot/port): (192.168.2.0/255.255.255.0/0/0) current_peer 172.20.1.2 port 500 PERMIT, flags={} #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 125.69.128.108, remote crypto endpt.: 172.20.1.2 path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0 current outbound spi: 0x2B39275B(725165915) PFS (Y/N): N, DH group: none inbound esp sas: spi: 0x7775A9E9(2004199913) transform: esp-3des esp-md5-hmac , in use settings ={Tunnel, } conn id: 2005, flow_id: NETGX:5, sibling_flags 80000046, crypto map: map sa timing: remaining key lifetime (k/sec): (4404804/3527) IV size: 8 bytes replay detection support: Y Status: ACTIVE spi: 0x3EDBD96C(1054595436) transform: esp-3des esp-md5-hmac , in use settings ={Tunnel, } conn id: 2011, flow_id: NETGX:11, sibling_flags 80000046, crypto map: map sa timing: remaining key lifetime (k/sec): (4426488/3558) IV size: 8 bytes replay detection support: Y Status: ACTIVE inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x428E575A(1116624730) transform: esp-3des esp-md5-hmac , in use settings ={Tunnel, } conn id: 2006, flow_id: NETGX:6, sibling_flags 80000046, crypto map: map sa timing: remaining key lifetime (k/sec): (4404804/3527) IV size: 8 bytes replay detection support: Y Status: ACTIVE spi: 0x2B39275B(725165915) transform: esp-3des esp-md5-hmac , in use settings ={Tunnel, } conn id: 2012, flow_id: NETGX:12, sibling_flags 80000046, crypto map: map sa timing: remaining key lifetime (k/sec): (4426488/3558) IV size: 8 bytes replay detection support: Y Status: ACTIVE outbound ah sas: outbound pcp sas: 如出现上述显示则表示第二阶段协商成功,IPsec VPN建立成功 3.4.2 远端InRouter验证
http://www.m2mlib.com/uploads/article/20171114/140f8b34676c57239dd3d60d424b68da.jpg
4.备注  中心Cisco Router的IOS版本要求高于12.0丏须支持IPsec VPN;  中心端外部接口建议采用静态IP地址,如采用拨号方式可获取固定IP地址也可;  远端IP地址采用静态和动态均可。

0 个评论

要回复文章请先登录注册