虽然防火墙工作在透明模式,但它作为IPsec VPN的端点时,仍然需要配置三层接口(VLANIF)作为VPN隧道的源和终点,同时通过透明转发让业务流量通过防火墙。
总部防火墙的配置与分公司对称,仅IP地址互换。
IKE SA 状态为 READY。IPsec SA 状态为 READY。在分公司内网一台主机上执行:
路由配置:两台防火墙的VLANIF接口需要能够互相通信。如果PTN设备之间通过公网连接,需要在两端配置默认路由指向PTN设备或运营商网关。
NAT穿越:如果防火墙经过NAT设备接入公网,需要在IPsec策略中开启NAT穿越功能:
防火墙透明模式的特殊性:透明模式下防火墙对业务流量不修改IP报文,因此IPsec加密后的报文可以正常通过防火墙转发。VPN隧道本身由VLANIF接口建立,不受透明模式影响。
安全策略:务必配置允许Local安全域之间的策略,否则VPN协商报文会被阻断。
暂无评论
【分公司】
交换机 ↔ 防火墙(透明模式) ↔ PTN ↔ 外网 ↔ 总公司PTN ↔ 防火墙(透明模式) ↔ 服务器区
| 区域 | 设备 | 接口 / VLAN | IP / 掩码 | 用途 |
|---|---|---|---|---|
| 分公司内网 | 交换机 | VLAN 10 | 192.168.10.0/24 | 终端 / 业务 |
| 分公司 | 防火墙 | VLANIF 100 | 10.1.1.1/30 | IPSec 本地端点 |
| 分公司 | 防火墙 | 物理口 G1/0/1、G1/0/2 | 无 IP | 加入 Bridge,透传 VLAN 10、100 |
| 总部内网 | 服务器区 | VLAN 20 | 192.168.20.0/24 | 业务服务器 |
| 总部 | 防火墙 | VLANIF 100 | 10.1.1.2/30 | IPSec 对端端点 |
| 总部 | 防火墙 | 物理口 G1/0/1、G1/0/2 | 无 IP | 加入 Bridge,透传 VLAN 20、100 |
# 进入系统视图
sysname FW-Branch
# 关闭路由模式,启用透明模式
undo firewall route-mode enable
firewall bridge-mode enable
# 创建Bridge组(默认Bridge 1)
interface Bridge-Aggregation 1
port access vlan 10 # 内网业务VLAN
port access vlan 100 # IPSec端点VLAN
quit
# 物理口加入Bridge
interface GigabitEthernet 1/0/1
port link-type access
port default vlan 10
bridge-set 1
quit
interface GigabitEthernet 1/0/2
port link-type access
port default vlan 100
bridge-set 1
quit
# 配置IPSec端点VLANIF
interface Vlan-interface 100
ip address 10.1.1.1 255.255.255.252
quit
# 静态路由:总部业务网段 → 对端VLANIF
ip route-static 192.168.20.0 255.255.255.0 10.1.1.2
# 缺省路由(可选,根据PTN规划)
ip route-static 0.0.0.0 0.0.0.0 10.1.1.2
acl advanced 3000
rule 10 permit ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
rule 20 deny ip
quit
ipsec transform-set TS-IPSEC
esp encryption-algorithm aes-256
esp authentication-algorithm sha2-256
quit
ike proposal IKE-PROP
encryption-algorithm aes-256
authentication-algorithm sha2-256
dh group14
quit
ike keychain IKE-KEY
pre-shared-key address 10.1.1.2 255.255.255.255 key simple Huawei@123
quit
ike peer IKE-PEER
pre-shared-key simple Huawei@123
ike-proposal IKE-PROP
remote-address 10.1.1.2
local-address 10.1.1.1
quit
ipsec policy IPSEC-POLICY 10 isakmp
security acl 3000
transform-set TS-IPSEC
ike-peer IKE-PEER
quit
# 在IPSec端点VLANIF应用策略
interface Vlan-interface 100
ipsec apply policy IPSEC-POLICY
quit
security-policy ip
rule name IPSec-Allow
source-zone trust
destination-zone untrust
source-address 192.168.10.0 24
destination-address 192.168.20.0 24
service esp
service udp destination-port 500
service udp destination-port 4500
action permit
quit
rule name Local-IPSec
source-zone local
destination-zone untrust
service esp
service udp destination-port 500
service udp destination-port 4500
action permit
quit
sysname FW-HQ
undo firewall route-mode enable
firewall bridge-mode enable
interface Bridge-Aggregation 1
port access vlan 20
port access vlan 100
quit
interface GigabitEthernet 1/0/1
port link-type access
port default vlan 20
bridge-set 1
quit
interface GigabitEthernet 1/0/2
port link-type access
port default vlan 100
bridge-set 1
quit
interface Vlan-interface 100
ip address 10.1.1.2 255.255.255.252
quit
ip route-static 192.168.10.0 255.255.255.0 10.1.1.1
ip route-static 0.0.0.0 0.0.0.0 10.1.1.1
acl advanced 3000
rule 10 permit ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255
rule 20 deny ip
quit
ipsec transform-set TS-IPSEC
esp encryption-algorithm aes-256
esp authentication-algorithm sha2-256
quit
ike proposal IKE-PROP
encryption-algorithm aes-256
authentication-algorithm sha2-256
dh group14
quit
ike keychain IKE-KEY
pre-shared-key address 10.1.1.1 255.255.255.255 key simple Huawei@123
quit
ike peer IKE-PEER
pre-shared-key simple Huawei@123
ike-proposal IKE-PROP
remote-address 10.1.1.1
local-address 10.1.1.2
quit
ipsec policy IPSEC-POLICY 10 isakmp
security acl 3000
transform-set TS-IPSEC
ike-peer IKE-PEER
quit
interface Vlan-interface 100
ipsec apply policy IPSEC-POLICY
quit
security-policy ip
rule name IPSec-Allow
source-zone trust
destination-zone untrust
source-address 192.168.20.0 24
destination-address 192.168.10.0 24
service esp
service udp destination-port 500
service udp destination-port 4500
action permit
quit
rule name Local-IPSec
source-zone local
destination-zone untrust
service esp
service udp destination-port 500
service udp destination-port 4500
action permit
quit
# 查看IKE SA
display ike sa
# 查看IPSec SA
display ipsec sa
# 查看VLANIF与Bridge
display interface Vlan-interface 100
display bridge-set 1
# 测试连通性
ping -a 192.168.10.1 192.168.20.1
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论