问题描述:
 
												组网及组网描述:
 dis ike sa
    Connection-ID   Remote                Flag         DOI    
------------------------------------------------------------------
    954             124.115.171.130       Unknown      IPsec  
Flags:
RD--READY RL--REPLACED FD-FADING RK-REKEY
dis ip se
dis ips
dis ipsec sa
sys
System View: return to User View with Ctrl+Z.
[H3C]dis cu
[H3C]dis current-configuration 
#
 version 7.1.064, Release 9514P2302
#
 sysname H3C
#
 clock timezone China add 08:00:00
#
context Admin id 1
#
 telnet server enable
#
 irf mac-address persistent timer
 irf auto-update enable
 undo irf link-delay
 irf member 1 priority 1
#
 dns proxy enable
 dns server 211.137.130.19
 dns server 119.29.29.29
 dns server 223.5.5.5
 dns server 114.114.114.114
#
 password-recovery enable
#              
vlan 1
#
object-group ip address ±¾µֱ59150.20.0
 security-zone Untrust
 0 network subnet 159.150.20.0 255.255.255.0
#
object-group ip address x¿௵9
 security-zone Trust
 0 network subnet 159.150.20.0 255.255.255.0
#
object-group ip address ʡͼ192.168.11.0
 security-zone Untrust
 0 network subnet 192.168.11.0 255.255.255.0
#
nqa entry admin test
 type icmp-echo
  destination ip 192.168.11.250
  frequency 5000
  history-record enable
  history-record number 10
  probe count 10
  probe timeout 500
  source ip 159.150.20.1
#
 nqa schedule admin test start-time now lifetime forever
#
interface NULL0
#
interface GigabitEthernet1/0/0
 port link-mode route
 combo enable copper
 ip address 192.168.0.1 255.255.255.0
#
interface GigabitEthernet1/0/1
 port link-mode route
 combo enable fiber
#
interface GigabitEthernet1/0/2
 port link-mode route
 ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet1/0/3
 port link-mode route
 ip address 111.20.110.250 255.255.255.252
 nat outbound 3101
 nat outbound 3000
 nat server protocol tcp global 111.20.110.250 8000 inside 159.150.20.8 8000
 nat server protocol tcp global 111.20.110.250 8888 inside 159.150.20.8 8080
 nat server protocol tcp global 111.20.110.250 10020 inside 159.150.20.9 10020
 ipsec apply policy GE1/0/3
#
interface GigabitEthernet1/0/4
 port link-mode route
 ip address 159.150.20.1 255.255.255.0
 nat hairpin enable
#
interface GigabitEthernet1/0/5
 port link-mode route
#
interface GigabitEthernet1/0/6
 port link-mode route
#
interface GigabitEthernet1/0/7
 port link-mode route
#
interface GigabitEthernet1/0/8
 port link-mode route
#
interface GigabitEthernet1/0/9
 port link-mode route
#
security-zone name Local
#
security-zone name Trust
 import interface GigabitEthernet1/0/4
#
security-zone name DMZ
#
security-zone name Untrust
 import interface GigabitEthernet1/0/3
#
security-zone name Management
 import interface GigabitEthernet1/0/0
 import interface GigabitEthernet1/0/2
#
 scheduler logfile size 16
#
line class aux
 user-role network-operator
#
line class console
 authentication-mode scheme
 user-role network-admin
#
line class vty
 user-role network-operator
#
line aux 0
 authentication-mode scheme
 user-role network-admin
 user-role network-operator
#
line con 0
 authentication-mode scheme
 user-role network-admin
 user-role network-operator
#
line vty 0 4
 authentication-mode scheme
 user-role network-admin
 user-role network-operator
#
line vty 5 63
 authentication-mode scheme
 user-role network-admin
#
 ip route-static 0.0.0.0 0 GigabitEthernet1/0/3 111.20.110.249
 ip route-static 192.168.11.0 24 111.20.110.249
#
 ssh server enable
 sftp server enable
 ssh server port 65522
#
 ntp-service enable
 ntp-service unicast-server ***.***
 ntp-service unicast-server ***.***
#
acl advanced 3000
 rule 1 deny ip source 159.150.20.0 0.0.0.255 destination 192.168.11.0 0.0.0.255
 rule 5 deny ip source 159.150.20.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
 rule 10 permit ip
#
acl advanced 3100
 rule 1 permit ip source 159.150.20.0 0.0.0.255 destination 192.168.11.0 0.0.0.255
#
acl advanced 3101
 rule 0 permit ip source 159.150.20.0 0.0.0.255 destination 192.168.11.0 0.0.0.255
#              
acl advanced name IPsec_GE1/0/3_IPv4_1
 rule 5 permit ip source 159.150.20.0 0.0.0.255 destination 192.168.11.0 0.0.0.255
#
acl advanced name IPsec_GE1/0/3_IPv4_2
 rule 1 permit ip source 159.150.20.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
#
domain system
#
 aaa session-limit ftp 16
 aaa session-limit telnet 16
 aaa session-limit ssh 16
 domain default enable system
#
role name level-0
 description Predefined level-0 role
#
role name level-1
 description Predefined level-1 role
#
role name level-2
 description Predefined level-2 role
#
role name level-3
 description Predefined level-3 role
#
role name level-4
 description Predefined level-4 role
#
role name level-5
 description Predefined level-5 role
#
role name level-6
 description Predefined level-6 role
#
role name level-7
 description Predefined level-7 role
#
role name level-8
 description Predefined level-8 role
#
role name level-9
 description Predefined level-9 role
#
role name level-10
 description Predefined level-10 role
#              
role name level-11
 description Predefined level-11 role
#
role name level-12
 description Predefined level-12 role
#
role name level-13
 description Predefined level-13 role
#
role name level-14
 description Predefined level-14 role
#
user-group system
#
local-user admin class manage
 password hash $h$6$7DOCZmGOhXvDCJ2K$crTMYJlvSMqI7R1gnxFNl0mPgvOn9RlBa9aLsBjmLB9bEoiYylAhy7SdcvlN0Nsg4Q+FRyybEdhYwVBngiZ7mQ==
 service-type ssh telnet terminal http https
 authorization-attribute user-role level-3
 authorization-attribute user-role network-admin
 authorization-attribute user-role network-operator
#
local-user relyon class manage
 password hash $h$6$/hZphBR5l2e0GjRb$EWxNjIAXJHwwrJkJ4XDYrFkbSexzcezYUhvph8t2RVrFrLciCF9qcXPTJTNXLP6LEqGsiT9SkqS6plt7b5Uv3A==
 service-type ssh telnet terminal http
 authorization-attribute user-role network-admin
 authorization-attribute user-role network-operator
#
ipsec transform-set ceshi
 esp encryption-algorithm aes-cbc-128 
 esp authentication-algorithm sha1 
#
ipsec transform-set GE1/0/3_IPv4_2
 esp encryption-algorithm 3des-cbc 
 esp authentication-algorithm md5 
#
ipsec policy GE1/0/3 1 isakmp
 transform-set ceshi 
 security acl name IPsec_GE1/0/3_IPv4_1 
 local-address 111.20.110.250
 remote-address 124.115.171.130
 qos pre-classify
 ike-profile GE1/0/3_IPv4_1
 sa duration time-based 28800
 sa idle-time 28800
#
ipsec policy GE1/0/3 2 isakmp
 transform-set GE1/0/3_IPv4_2 
 security acl name IPsec_GE1/0/3_IPv4_2 
 local-address 111.20.110.250
 remote-address 117.32.154.10
 ike-profile GE1/0/3_IPv4_2
 sa duration time-based 28800
#
 ike invalid-spi-recovery enable
 ike dpd interval 10 on-demand
 ike identity fqdn 203@2020
#
ike profile g1/0/3_ipv4_1
#
ike profile GE1/0/3_IPv4_1
 keychain 1
 dpd interval 5 periodic
 exchange-mode aggressive
 local-identity address 111.20.110.250
 match remote identity address 124.115.171.130 255.255.255.255
 match remote identity fqdn LSJ
 match local address GigabitEthernet1/0/3
 proposal 1 
#              
ike profile GE1/0/3_IPv4_2
 keychain GE1/0/3_IPv4_2
 exchange-mode aggressive
 local-identity fqdn tc
 match remote identity fqdn scbl
 match local address GigabitEthernet1/0/3
 proposal 1 
#
ike proposal 1
 encryption-algorithm aes-cbc-128
 dh group2
#
ike proposal 2
 encryption-algorithm aes-cbc-128
 dh group2
#
ike keychain 1
 match local address GigabitEthernet1/0/3
 pre-shared-key hostname LSJ key cipher $c$3$yWSp84Avi/1AmCqqTBPDEFXsQOHNr0i0pw==
#
ike keychain GE1/0/3_IPv4_2
 match local address GigabitEthernet1/0/3
 pre-shared-key hostname scbl key cipher $c$3$YyVrhDq1mYkE3btJluUn9kabLAXFvBrMHw==
#
 ip http enable
 ip https port 65443
 ip https enable
 webui log enable
#
security-policy ip
 rule 4 name 55
  action pass
  logging enable
  counting enable
  source-zone Untrust
  destination-zone Local
 rule 5 name 66
  action pass
  logging enable
  counting enable
  source-zone Local
  destination-zone Untrust
 rule 8 name x¿ʡͼ
  action pass
  logging enable
  counting enable
  source-zone Trust
  destination-zone Untrust
  source-ip x¿௵9
  destination-ip ʡͼ192.168.11.0
 rule 9 name ʡͼµ½x¿
  action pass
  logging enable
  counting enable
  source-zone Untrust
  destination-zone Trust
  source-ip ʡͼ192.168.11.0
  destination-ip x¿௵9
 rule 0 name 11
  action pass
  counting enable
  source-zone Untrust
  destination-zone Trust
 rule 1 name 22
  action pass
  counting enable
  source-zone Trust
  destination-zone Untrust
 rule 2 name 33
  action pass
  counting enable
  source-zone Trust
  destination-zone Local
 rule 3 name 44
  action pass
  counting enable
  source-zone Local
  destination-zone Trust
 rule 6 name 77
  action pass
  counting enable
  source-zone Trust
  destination-zone Trust
 rule 7 name 88
  action pass
  counting enable
  source-zone Untrust
  destination-zone Untrust
 rule 10 name ȫͨ 
  action pass
  logging enable
  counting enable
  source-zone Local
  destination-zone Local