H3C,华为和CISCO设备之间的ipsec vpn 配置实例
ISCO设备(PIX/ASA/ROUTER):外网口ip:1.1.1.1 内网服务器:192.168.1.1
H3C secpath:外网口ip:2.2.2.2 内网服务器:192.168.2.2
通过ipsec vpn,允许两台服务器之间通讯
CISCO配置:
#步骤1
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
#步骤2
crypto ipsec transform-setMyset esp-des esp-sha-hmac
crypto map Myvpn 1 matchaddress VPN
crypto map Myvpn 1 set peer 2.2.2.2
crypto map Myvpn 1 settransform-set Myset
crypto map Myvpn interfaceoutsidecrypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
tunnel-group 2.2.2.2 type ipsec-l2l
tunnel-group 2.2.2.2 ipsec-attributes
pre-shared-key 123456
#定义感兴趣流量
access-list VPN extendedpermit ip host 192.168.1.1 host 192.168.2.2
H3C的配置:
#
ike peer peermtom
pre-shared-key 123456
remote-address 1.1.1.1
local-address 2.2.2.2
#
#对应cisco的步骤1(蓝色标记的参数两边必须一致)
ike proposal 1
authentication-algorithm sha
authentication-method pre-share
encryption-algorithm 3des-cbc
dh group2
sa duration 86400
#
#对应cisco的步骤2(蓝色标记的参数两边必须一致)
ipsec proposal promtom
encapsulation-mode tunnel
transform esp
esp encryption-algorithm 3des
esp authentication-algorithm sha1
#
#
ipsec policy policymtom 10 isakmp
security acl 3333
ike-peer peermtom
proposal promtom
#
#定义感兴趣流量(必须与cisco中定义的感兴趣流量互为镜像)
acl number 3333
rule 0 permit ip source 192.168.2.2 0destination 192.168.1.1 0
rule 5 deny ip
#
#将内网服务器地址从nat转换列表中去除(应尽量放在第一行)
假设防火墙上用于NAT转换的acl为2000:
acl number 2000
rule 0 deny source 192.168.2.2 0
……
# 配置到对方内网服务器的静态路由
ip route-static 192.168.1.1 32 g1/0 (g1/0为防火墙外网口)
#在外网接口上应用ipsec
#int g1/0
ipsecpolicy policymtom
本文出自 “技术笨小孩” 博客,转载请与作者联系!
郑重声明:本站内容如果来自互联网及其他传播媒体,其版权均属原媒体及文章作者所有。转载目的在于传递更多信息及用于网络分享,并不代表本站赞同其观点和对其真实性负责,也不构成任何其他建议。