该场景可通过在总部部署IPsec VPN网关并结合RADIUS认证服务器(如网康NGFW)实现分支终端的认证接入。具体方案如下: 1. **总部配置**: - 配置IPsec VPN网关,启用IKEv1或IKEv2协商。 - 创建IKE Profile,开启XAUTH认证: ``` [Sysname] ike profile to_branch [Sysname-ike-profile-to_branch] client-authentication xauth ``` - 关联RADIUS服务器,用于对分支用户进行用户名和密码认证。 - 配置安全策略,授权通过认证的分支流量访问外网。 2. **分支侧配置**: - 配置IPsec VPN连接,预共享密钥(如:netentsec)与总部一致。 - 设置本地标识(如FQDN: fenzhi)。 - 在拨号时输入由总部统一分配的用户名和密码,完成XAUTH认证。 3. **效果**: - 分支终端只有在通过RADIUS认证后,IPsec隧道才能建立成功。 - 隧道建立后,分支流量经总部转发并可访问外网,未认证则无法接入。 此方案已在多分支企业中广泛应用,可有效集中管理用户权限,减轻总部策略配置负担,提升安全性。参考设备:网康NGFW系列防火墙。
[Huawei] sysname RouterA
[RouterA] interface GigabitEthernet0/0/1
[RouterA-GigabitEthernet0/0/1] ip address 202.100.1.1 255.255.255.0
[RouterA-GigabitEthernet0/0/1] quit
[RouterA] interface GigabitEthernet0/0/0
[RouterA-GigabitEthernet0/0/0] ip address 192.168.1.1 255.255.255.0
[RouterA-GigabitEthernet0/0/0] quit
[RouterA] ip route-static 202.100.2.0 24 202.100.1.2
[RouterA] ip route-static 192.168.2.0 24 202.100.1.2
[Huawei] sysname RouterB
[RouterB] interface GigabitEthernet0/0/1
[RouterB-GigabitEthernet0/0/1] ip address 202.100.2.1 255.255.255.0
[RouterB-GigabitEthernet0/0/1] quit
[RouterB] interface GigabitEthernet0/0/0
[RouterB-GigabitEthernet0/0/0] ip address 192.168.2.1 255.255.255.0
[RouterB-GigabitEthernet0/0/0] quit
[RouterB] ip route-static 202.100.1.0 24 202.100.2.2
[RouterB] ip route-static 192.168.1.0 24 202.100.2.2
[RouterA - acl - adv - 3100] rule permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
[RouterA - acl - adv - 3100] quit
[RouterB - acl - adv - 3100] rule permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
[RouterB - acl - adv - 3100] quit
[RouterA - ipsec - proposal - prop1] esp authentication - algorithm sha2 - 256
[RouterA - ipsec - proposal - prop1] encryption - algorithm aes - cbc - 256
[RouterA - ipsec - proposal - prop1] quit
[RouterB - ipsec - proposal - prop1] esp authentication - algorithm sha2 - 256
[RouterB - ipsec - proposal - prop1] encryption - algorithm aes - cbc - 256
[RouterB - ipsec - proposal - prop1] quit
[RouterA - ike - peer - peer1] pre - shared - key cipher Huawei@123
[RouterA - ike - peer - peer1] remote - address 202.100.2.1
[RouterA - ike - peer - peer1] quit
[RouterB - ike - peer - peer2] pre - shared - key cipher Huawei@123
[RouterB - ike - peer - peer2] remote - address 202.100.1.1
[RouterB - ike - peer - peer2] quit
[RouterA - ipsec - policy - isakmp - policy1 - 10] security - acl 3100
[RouterA - ipsec - policy - isakmp - policy1 - 10] ike - peer peer1
[RouterA - ipsec - policy - isakmp - policy1 - 10] proposal prop1
[RouterA - ipsec - policy - isakmp - policy1 - 10] quit
[RouterB - ipsec - policy - isakmp - policy2 - 10] security - acl 3100
[RouterB - ipsec - policy - isakmp - policy2 - 10] ike - peer peer2
[RouterB - ipsec - policy - isakmp - policy2 - 10] proposal prop1
[RouterB - ipsec - policy - isakmp - policy2 - 10] quit
[RouterA - GigabitEthernet0/0/1] ipsec policy policy1
[RouterA - GigabitEthernet0/0/1] quit
[RouterB - GigabitEthernet0/0/1] ipsec policy policy2
[RouterB - GigabitEthernet0/0/1] quit
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论