哪位大神那里有路由器上配置nat穿越的案例(IPSEC场景),请大神求大神分享,按照官网的配置案例,配置完是不通的
暂无评论
202.1.1.1,内网:192.168.10.0/24192.168.20.0/24ike nat-traversal(默认关闭)system-view
# 内网口
interface GigabitEthernet0/0
ip address 192.168.10.1 255.255.255.0
# 公网口
interface GigabitEthernet0/1
ip address 202.1.1.1 255.255.255.0
# 1) 感兴趣流ACL(IPSec保护的流量)
acl advanced 3001
rule permit ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
# 2) NAT豁免ACL(拒绝IPSec流量做NAT)
acl advanced 3000
rule deny ip source 192.168.10.0 0.0.0.255 destination 192.168.20.0 0.0.0.255
rule permit ip source 192.168.10.0 0.0.0.255
# 3) 公网口应用NAT
interface GigabitEthernet0/1
nat outbound 3000
# 全局开启NAT穿越(默认关闭!)
ike nat-traversal
# IKE提议(两端一致)
ike proposal 10
encryption-algorithm aes-256
authentication-algorithm sha1
dh group14
# IKE profile(野蛮模式,匹配分支ID)
ike profile ToBranch
proposal 10
pre-shared-key simple 123456 # 两端密钥一致
aggressive-mode # 野蛮模式(NAT后必须)
match remote identity name branch # 对端ID(分支配置的name)
# 分支公网IP(或0.0.0.0动态)
ike peer Branch
pre-shared-key simple 123456
proposal 10
profile ToBranch
remote-address 0.0.0.0 # 分支动态IP用这个
# IPSec变换集(ESP,不支持AH)
ipsec transform-set 10
esp encryption-algorithm aes-256
esp authentication-algorithm sha1
# IPSec策略(绑定ACL+IKE)
ipsec policy Map1 10 isakmp
transform-set 10
ike-peer Branch
match address 3001 # 感兴趣流
# 公网口应用IPSec策略
interface GigabitEthernet0/1
ipsec policy Map1
ip route-static 192.168.20.0 255.255.255.0 202.2.2.2 # 分支公网IP
system-view
# 内网口
interface GigabitEthernet0/0
ip address 192.168.20.1 255.255.255.0
# 公网口(PPPoE拨号,或DHCP)
interface GigabitEthernet0/1
pppoe-client dial-bundle-number 1
# 默认路由走拨号
ip route-static 0.0.0.0 0 Dialer 1
# 感兴趣流ACL
acl advanced 3001
rule permit ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255
# NAT豁免ACL
acl advanced 3000
rule deny ip source 192.168.20.0 0.0.0.255 destination 192.168.10.0 0.0.0.255
rule permit ip source 192.168.20.0 0.0.0.255
# 公网口应用NAT
interface GigabitEthernet0/1
nat outbound 3000
ike nat-traversal # 全局开启NAT-T
ike proposal 10
encryption-algorithm aes-256
authentication-algorithm sha1
dh group14
# 分支IKE profile(配置本地ID=branch)
ike profile ToHQ
proposal 10
pre-shared-key simple 123456
aggressive-mode
local-identity name branch # 本地ID,总部match这个
# IKE peer指向总部公网IP
ike peer HQ
pre-shared-key simple 123456
proposal 10
profile ToHQ
remote-address 202.1.1.1 # 总部固定IP
ipsec transform-set 10
esp encryption-algorithm aes-256
esp authentication-algorithm sha1
ipsec policy Map1 10 isakmp
transform-set 10
ike-peer HQ
match address 3001
interface GigabitEthernet0/1
ipsec policy Map1
ip route-static 192.168.10.0 255.255.255.0 202.1.1.1
ike nat-traversal 全局命令,官网常省略,NAT 后必开# 看IKE/IPSec SA
display ike sa
display ipsec sa
# 看NAT转换(确认感兴趣流没被NAT)
display nat session table
# 看路由
display ip routing-table
# debug(开了后看报错)
debugging ike all
debugging ipsec all
terminal debugging
ike nat-traversallocal-identity name
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论