• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

MSR系列路由器DVPN功能(Full-mesh)的配置

2007-10-27 发表
  • 0关注
  • 0收藏 488浏览
粉丝: 关注:

MSR系列路由器

DVPN功能(Full-mesh)的典型配置

关键字:MSR; DVPN; 动态隧道

 

一、组网需求

Full-Mesh的组网方式下, VAM Server负责管理、维护各个节点的信息;AAA服务器负责对VAM Client进行认证和计费管理;两个Hub互为备份,负责数据的转发和路由信息的交换。SpokeHub建立永久隧道连接。任意的两个Spoke之间在有数据时动态建立隧道连接。

设备清单:MSR系列路由器6

二、组网图:

三、配置步骤:

适用设备和版本:MSR系列、Version 5.20, Release 1508后所有版本(标准版)。

VAM Server AAA Server 配置

#

 sysname VAMSERVER

#

 //指定VAM Server上的监听IP地址

 vam server ip 192.168.1.22

#

 domain default enable system

#

//配置认证方式本例中路由器作为AAA Server

domain system

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

#

//创建VPN,域ID1

vam server vpn 1

 server enable

 //预共享密钥为123

 pre-shared-key simple 123

 //指定VPN 1 的两个Hub地址

 hub private-ip 10.0.1.1

 hub private-ip 10.0.1.2

#

//创建VPN,域ID2

vam server vpn 2

 server enable

 authentication-method pap

 pre-shared-key simple 456

 hub private-ip 10.0.2.1

 hub private-ip 10.0.2.2

#

//创建本地用户,用于认证HubSpoke设备

local-user dvpn1hub1

 password simple dvpn1hub1

 level 3

 service-type dvpn

local-user dvpn1hub2

 password simple dvpn1hub2

 level 3

 service-type dvpn

local-user dvpn1spoke1

 password simple dvpn1spoke1

 level 3

 service-type dvpn

local-user dvpn1spoke2

 password simple dvpn1spoke2

 level 3

 service-type dvpn

local-user dvpn2hub1

 password simple dvpn2hub1

 level 3

 service-type dvpn

local-user dvpn2hub2

 password simple dvpn2hub2

 level 3

 service-type dvpn

local-user dvpn2spoke2

 password simple dvpn2spoke2

 level 3

 service-type dvpn

#

interface GigabitEthernet0/0

 port link-mode route

 ip address 192.168.1.22 255.255.255.0

#

user-interface con 0

user-interface tty 97 102

user-interface aux 0

user-interface vty 0 4

#

HUB 1 配置

#

 sysname hub1

#

//配置IKE对等体

ike peer vam

 pre-shared-key abcde

#

//配置IPSec安全提议

ipsec proposal vam

 esp authentication-algorithm sha1

#

//配置IPSec安全框架

ipsec profile vamp

 pfs dh-group2

 //引用配置好的IKE 对等体

 ike-peer vam

 //引用配置好的IPSec安全提议

 proposal vam

 sa duration traffic-based 600

#

//创建VPN1的客户端dvpn1hub1

vam client name dvpn1hub1

 client enable

 //配置VAM Server IP

 server primary ip-address 192.168.1.22

 user dvpn1hub1 password simple dvpn1hub1

 vpn 1

 //配置VAM Client 的预共享密钥

 pre-shared-key simple 123

#

//创建VPN2的客户端dvpn2hub1

vam client name dvpn2hub1

 client enable

 server primary ip-address 192.168.1.22

 user dvpn2hub1 password simple dvpn2hub1

 vpn 2

 pre-shared-key simple 456

#

interface GigabitEthernet0/0

 port link-mode route

 ip address 192.168.1.1 255.255.255.0

#

//配置VPN1的隧道接口Tunnel1

interface Tunnel1

 ip address 10.0.1.1 255.255.255.0

 tunnel-protocol dvpn udp

 source GigabitEthernet0/0

 ospf network-type broadcast

 vam client dvpn1hub1

 ipsec profile vamp

#

//配置VPN2的隧道接口Tunnel2

interface Tunnel2

 ip address 10.0.2.1 255.255.255.0

 tunnel-protocol dvpn udp

 source GigabitEthernet0/0

 ospf network-type broadcast

 vam client dvpn2hub1

 ipsec profile vamp

#

//配置公网路由

ospf 100

 area 0.0.0.0

  network 192.168.1.0 0.0.0.255

#

//配置私网路由

ospf 200

 area 0.0.0.0

  network 10.0.1.0 0.0.0.255

#

ospf 300

 area 0.0.0.0

  network 10.0.2.0 0.0.0.255

#

HUB 2 配置

#

 sysname hub2

#

//配置IKE对等体

ike peer vam

 pre-shared-key abcde

#

//配置IPSec安全提议

ipsec proposal vam

 esp authentication-algorithm sha1

#

//配置IPSec安全框架

ipsec profile vamp

 pfs dh-group2

 //引用配置好的IKE 对等体

 ike-peer vam

 //引用配置好的IPSec安全提议

 proposal vam

 sa duration traffic-based 600

#

//创建VPN1的客户端dvpn1hub2

vam client name dvpn1hub2

 client enable

 server primary ip-address 192.168.1.22

 user dvpn1hub2 password simple dvpn1hub2

 vpn 1

 pre-shared-key simple 123

#

//创建VPN2的客户端dvpn2hub2

vam client name dvpn2hub2

 client enable

 server primary ip-address 192.168.1.22

 user dvpn2hub2 password simple dvpn2hub2

 vpn 2

 pre-shared-key simple 456

#

interface Ethernet0/0

 port link-mode route

 ip address 192.168.1.2 255.255.255.0

#

//配置VPN1的隧道接口Tunnel1

interface Tunnel1

 ip address 10.0.1.2 255.255.255.0

 tunnel-protocol dvpn udp

 source Ethernet0/0

 ospf network-type broadcast

 vam client dvpn1hub2

 ipsec profile vamp

#

//配置VPN2的隧道接口Tunnel2

interface Tunnel2

 ip address 10.0.2.2 255.255.255.0

 tunnel-protocol dvpn udp

 source Ethernet0/0

 ospf network-type broadcast

 vam client dvpn2hub2

 ipsec profile vamp

#

//配置公网路由

ospf 100

 area 0.0.0.0

  network 192.168.1.0 0.0.0.255

#

//配置私网路由

ospf 200

 area 0.0.0.0

  network 10.0.1.0 0.0.0.255

#

ospf 300

 area 0.0.0.0

  network 10.0.2.0 0.0.0.255

#

Spoke 1 配置

#

 sysname spoke1

#

//配置IKE对等体

ike peer vam

 pre-shared-key abcde

#

//配置IPSec安全提议

ipsec proposal vam

 esp authentication-algorithm sha1

#

//配置IPSec安全框架

ipsec profile vamp

 pfs dh-group2

 ike-peer vam

 proposal vam

 sa duration traffic-based 600

#

//创建VPN1的客户端dvpn1spoke1

vam client name dvpn1spoke1

 client enable

 server primary ip-address 192.168.1.22

 user dvpn1spoke1 password simple dvpn1spoke1

 vpn 1

 pre-shared-key simple 123

#

interface Ethernet0/0

 port link-mode route

 ip address 192.168.1.3 255.255.255.0

#

//配置VPN1的隧道接口Tunnel1

interface Tunnel1

 ip address 10.0.1.3 255.255.255.0

 tunnel-protocol dvpn udp

 source Ethernet0/0

 ospf network-type broadcast

 vam client dvpn1spoke1

 ipsec profile vamp

#

ospf 100

 area 0.0.0.0

  network 192.168.1.0 0.0.0.255

#

ospf 200

 area 0.0.0.0

  network 10.0.1.0 0.0.0.255

#

Spoke 2 配置

#

 sysname spoke2

#

//配置IKE对等体

ike peer vam

 pre-shared-key abcde

#

//配置IPSec安全提议

ipsec proposal vam

 esp authentication-algorithm sha1

#

//配置IPSec安全框架

ipsec profile vamp

 pfs dh-group2

 ike-peer vam

 proposal vam

 sa duration traffic-based 600

#

//创建VPN1的客户端dvpn1spoke2

vam client name dvpn1spoke2

 client enable

 server primary ip-address 192.168.1.22

 user dvpn1spoke2 password simple dvpn1spoke2

 vpn 1

 pre-shared-key simple 123

#

//创建VPN2的客户端dvpn2spoke2

vam client name dvpn2spoke2

 client enable

 server primary ip-address 192.168.1.22

 user dvpn2spoke2 password simple dvpn2spoke2

 vpn 2

 pre-shared-key simple 456

#

interface Ethernet0/0

 port link-mode route

 ip address 192.168.1.4 255.255.255.0

#

//配置VPN1的隧道接口Tunnel1

interface Tunnel1

 ip address 10.0.1.4 255.255.255.0

 tunnel-protocol dvpn udp

 source Ethernet0/0

 ospf network-type broadcast

 vam client dvpn1spoke2

 ipsec profile vamp

#

//配置VPN2的隧道接口Tunnel2

interface Tunnel2

 ip address 10.0.2.4 255.255.255.0

 tunnel-protocol dvpn udp

 source Ethernet0/0

 ospf network-type broadcast

 vam client dvpn2spoke2

 ipsec profile vamp

#

ospf 100

 area 0.0.0.0

  network 192.168.1.0 0.0.0.255

#

ospf 200

 area 0.0.0.0

  network 10.0.1.0 0.0.0.255

#

ospf 300

 area 0.0.0.0

  network 10.0.2.0 0.0.0.255

#

 

四、配置关键点

1) DVPNV5平台上的实现与V3平台有极大的区别,配置命令改变较大,在V3平台上支持的是DVPN第一期,而在V5平台上支持的是DVPN第二期;

2) 本例中将AAA ServerVAM集中在同一台MSR上,在实际应用中可以使用单独的设备作为AAA Server,具体配置方法可参考操作手册安全一章;

五、验证

1)通过命令dis vam server address-map all可以查看注册到VAM Server上的设备信息,确保所有的HUBSpoke都正常注册到VAM Sever

<VAMSERVER>dis vam server address-map all

 VPN name:  1

 Total address-map number:  4

 Private-ip     Public-ip        Type        Holding time

 10.0.1.1       192.168.1.1      Hub         0H 22M  8S

 10.0.1.2       192.168.1.2      Hub         0H 37M  0S

 10.0.1.3       192.168.1.3      Spoke       0H 29M 11S

 10.0.1.4       192.168.1.4      Spoke       0H 22M 51S

 VPN name:  2

 Total address-map number:  3

 Private-ip     Public-ip        Type        Holding time

 10.0.2.1       192.168.1.1      Hub         0H 22M  8S

 10.0.2.2       192.168.1.2      Hub         0H 36M 45S

 10.0.2.4       192.168.1.4      Spoke       0H 22M 50S

2)在HUB设备设备使用命令dis dvpn session all可以看到所有建立好的隧道信息;

<hub1>dis dvpn session all

 Interface: Tunnel1  VPN name: 1  Total number: 3

  Private IP:     10.0.1.2

  Public IP:      192.168.1.2

  Session type:   Hub-Hub

  State:  SUCCESS

  Holding time: 0h 12m 1s

  Input:  101 packets,  100 data packets,  1 control packets

           87 multicasts,  0 errors

  Output: 106 packets,  99 data packets,  7 control packets

           87 multicasts,  10 errors

  Private IP:     10.0.1.4

  Public IP:      192.168.1.4

  Session type:   Hub-Spoke

  State:  SUCCESS

  Holding time: 0h 22m 39s

  Input:  183 packets,  182 data packets,  1 control packets

           157 multicasts,  0 errors

  Output: 186 packets,  185 data packets,  1 control packets

           155 multicasts,  0 errors

  Private IP:     10.0.1.3

  Public IP:      192.168.1.3

  Session type:   Hub-Spoke

  State:  SUCCESS

  Holding time: 0h 8m 7s

  Input:  164 packets,  163 data packets,  1 control packets

           54 multicasts,  0 errors

  Output: 77 packets,  76 data packets,  1 control packets

           55 multicasts,  0 errors

 Interface: Tunnel2  VPN name: 2  Total number: 2

  Private IP:     10.0.2.2

  Public IP:      192.168.1.2

  Session type:   Hub-Hub

  State:  SUCCESS

  Holding time: 0h 12m 4s

  Input:  97 packets,  96 data packets,  1 control packets

           84 multicasts,  0 errors

  Output: 100 packets,  93 data packets,  7 control packets

           80 multicasts,  10 errors

  Private IP:     10.0.2.4

  Public IP:      192.168.1.4

  Session type:   Hub-Spoke

  State:  SUCCESS

  Holding time: 0h 22m 40s

  Input:  165 packets,  164 data packets,  1 control packets

           151 multicasts,  0 errors

  Output: 162 packets,  161 data packets,  1 control packets

           148 multicasts,  0 errors

3)在Spoke1设备上使用命令dis dvpn session all可以看到所有建立好的隧道信息,这时候所有的隧道都是静态隧道,还没有动态隧道;

<spoke1>dis dvpn session all

 Interface: Tunnel1  VPN name: 1  Total number: 2

  Private IP:     10.0.1.1

  Public IP:      192.168.1.1

  Session type:   Spoke-Hub

  State:  SUCCESS

  Holding time: 0h 9m 57s

  Input:  88 packets,  87 data packets,  1 control packets

           66 multicasts,  0 errors

  Output: 197 packets,  196 data packets,  1 control packets

           65 multicasts,  0 errors

  Private IP:     10.0.1.2

  Public IP:      192.168.1.2

  Session type:   Spoke-Hub

  State:  SUCCESS

  Holding time: 0h 9m 57s

  Input:  78 packets,  77 data packets,  1 control packets

           62 multicasts,  0 errors

  Output: 80 packets,  79 data packets,  1 control packets

           65 multicasts,  0 errors

 如果Ping Spoke 2tunnle地址后在使用上述命令,会发现多出一条动态的隧  道信息,如下红色字体部分;

<spoke1>ping 10.0.1.4

  PING 10.0.1.4: 56  data bytes, press CTRL_C to break

    Reply from 10.0.1.4: bytes=56 Sequence=1 ttl=254 time=6 ms

    Reply from 10.0.1.4: bytes=56 Sequence=2 ttl=255 time=3 ms

    Reply from 10.0.1.4: bytes=56 Sequence=3 ttl=255 time=3 ms

    Reply from 10.0.1.4: bytes=56 Sequence=4 ttl=255 time=3 ms

    Reply from 10.0.1.4: bytes=56 Sequence=5 ttl=255 time=3 ms

  --- 10.0.1.4 ping statistics ---

    5 packet(s) transmitted

    5 packet(s) received

    0.00% packet loss

    round-trip min/avg/max = 3/3/6 ms

<spoke1>dis dvpn session all

 Interface: Tunnel1  VPN name: 1  Total number: 3

  Private IP:     10.0.1.1

  Public IP:      192.168.1.1

  Session type:   Spoke-Hub

  State:  SUCCESS

  Holding time: 0h 17m 57s

  Input:  143 packets,  142 data packets,  1 control packets

           114 multicasts,  0 errors

  Output: 347 packets,  346 data packets,  1 control packets

           113 multicasts,  0 errors

  Private IP:     10.0.1.2

  Public IP:      192.168.1.2

  Session type:   Spoke-Hub

  State:  SUCCESS

  Holding time: 0h 17m 57s

  Input:  131 packets,  130 data packets,  1 control packets

           110 multicasts,  0 errors

  Output: 134 packets,  132 data packets,  2 control packets

           113 multicasts,  0 errors

  Private IP:     10.0.1.4

  Public IP:      192.168.1.4

  Session type:   Spoke-Spoke

  State:  SUCCESS

  Holding time: 0h 0m 3s

  Input:  5 packets,  4 data packets,  1 control packets

           0 multicasts,  0 errors

  Output: 5 packets,  4 data packets,  1 control packets

           0 multicasts,  0 errors

若您有关于案例的建议,请反馈:

作者在2007-12-11对此案例进行了修订
0 个评论

该案例暂时没有网友评论

编辑评论

举报

×

侵犯我的权益 >
对根叔知了社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔知了社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作