环境:
某大型互联网企业在全国各地都有分支机构,为提高业务的可靠性需要分支单位与总部单位建立互为主备的IPSEC隧道,
总部为双互联网出口、分支为单互联网出口;
需求:
1、当总部出口链路其中一条出现故障,可以实现IPSec备份确保业务不中断;
2、当两条链路均为正常时候实现IPSec流量负载,根据链路质量进行切换;
3、由于分支设备不支持tunnel隧道,不采用tunnel方式建立IPSec隧道。
问题:采用点到多点模式,总部侧采用策略方式,分部侧采用策略模板方式,现阶段是第一阶段无法建立连接,初步猜测采用的IPSec模式不对,IPSec建立不起来
配置文件:
总部配置:
#
version 7.1.075, Alpha 7571
#
sysname MSR1
#
interface GigabitEthernet0/0
port link-mode route
combo enable copper
ip address 1.1.1.1 255.255.255.0
nat outbound 3001
ipsec apply policy zb
#
interface GigabitEthernet0/1
port link-mode route
combo enable copper
ip address 2.2.2.1 255.255.255.0
nat outbound 3001
ipsec apply policy zb2
#
ip route-static 0.0.0.0 0 1.1.1.2
ip route-static 0.0.0.0 0 2.2.2.2
#
acl advanced 3000
rule 0 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
#
acl advanced 3001
rule 0 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
rule 10000 permit ip
#
ipsec transform-set 1
esp encryption-algorithm des-cbc
esp authentication-algorithm sha1
#
ipsec policy zb 1 isakmp
transform-set 1 security
acl 3000 ike-profile 1
#
ipsec policy zb2 1 isakmp
transform-set 1
security acl 3000
ike-profile 2
#
ike profile 1
keychain 1
local-identity address 1.1.1.1
match remote identity address 3.3.3.3 255.255.255.255
proposal 1
#
ike profile 2
keychain 1
local-identity address 2.2.2.1
match remote identity address 3.3.3.3 255.255.255.255
proposal 1
#
ike proposal 1
encryption-algorithm 3des-cbc
authentication-algorithm sha256
#
ike keychain 1
pre-shared-key address 3.3.3.3 255.255.255.255 key cipher 12345678
#
return
分部侧配置:
#
version 7.1.075, Alpha 7571
#
sysname MSR2
#
lldp global enable
#
interface GigabitEthernet0/0
port link-mode route
combo enable copper
ip address 3.3.3.3 255.255.255.0
nat outbound 3001
ipsec apply policy fz
#
interface GigabitEthernet0/1
port link-mode route
combo enable copper
ip address 192.168.2.1 255.255.255.0
#
ip route-static 0.0.0.0 0 3.3.3.1
#
acl advanced 3000
rule 0 permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
#
acl advanced 3001
rule 0 deny ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
rule 1000 permit ip
#
ipsec transform-set 1
esp encryption-algorithm 3des-cbc esp
authentication-algorithm sha1
#
ipsec policy-template zb 1
transform-set 1
security acl 3000
ike-profile 1
#
ipsec policy-template zb2 1
transform-set 1
security acl 3000
ike-profile 2
#
ipsec policy fz 1 isakmp template zb
ipsec policy fz 2 isakmp template zb2
#
ike profile 1
keychain 1
local-identity address 3.3.3.3
match remote identity address 1.1.1.1 255.255.255.255
proposal 1
#
ike profile 2
keychain 1
local-identity address 3.3.3.3
match remote identity address 2.2.2.1 255.255.255.255
proposal 1
#
ike proposal 1
encryption-algorithm 3des-cbc
authentication-algorithm sha256
#
ike keychain 1 pre-shared-key address 1.1.1.1 255.255.255.255 key cipher 12345678
pre-shared-key address 2.2.2.1 255.255.255.255 key cipher 12345678
#
return
ISP侧配置:
略
(0)
最佳答案
分部测应该配以下,ike-profile 2不是ike-profile 1
ipsec policy-template zb 1
transform-set 1
security acl 3000
ike-profile 2
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
我总部用的是策略方式,分部用的是策略模板,因为总部是双出口,需要在两个外网口引用IPSec策略