NGFW-IPSec的高可用性

一,主备链路备份

1.1拓扑图

 

 Cloud1和Cloud2桥接了物理机网卡,方便可以使用web图形化。

 1.2需求说明

  FW1双出口连接ISP,两条链路为主备。在FW2上配置tunnel口配置主备IPSec建立连接。

1.3配置

1.3.1基础配置

  VLAN,IP地址,安全区域的配置省略

1.3.2 FW2配置Tunnel口

[FW2]interface Tunnel  1          //配置tunnel口
[FW2-Tunnel1]tunnel-protocol ipsec    //指定tunnel口协议
[FW2-Tunnel1]ip address  unnumbered  interface  GigabitEthernet  1/0/0   //像物理口借地址
[FW2-Tunnel1]interface Tunnel 2
[FW2-Tunnel2]tunnel-protocol ipsec                           
[FW2-Tunnel2]ip address  unnumbered  interface  GigabitEthernet  1/0/0

1.3.3静态路由联动IP-Link

FW1:浮动路由主备链路

[FW1]ip-link  check  enable  
[FW1]ip-link  name  link1
[FW1-iplink-link1]destination  202.100.1.254 interface  GigabitEthernet  1/0/1 mode  icmp  next-hop  202.100.1.254 
[FW1]ip route-static  0.0.0.0 0 202.100.1.254 track  ip-link  link1
[FW1]ip route-static  0.0.0.0 0 202.100.2.254 preference  70

FW2:感兴趣流指向tunnel口,两逻辑口为主备

[FW2]ip-link  check  enable  
[FW2]ip-link  name link1
[FW2-iplink-link1]destination  202.100.1.254 interface  GigabitEthernet  1/0/0 mode  icmp  next-hop 202.100.3.254
[FW2]ip route-static  0.0.0.0 0 202.100.3.254
[FW2]ip route-static 10.1.1.0 24 Tunnel 1 track  ip-link  link1
[FW2]ip route-static  10.1.1.0 24 Tunnel  2 preference  70

1.3.3IPSec

FW1:

[FW1]ike proposal  1
[FW1-ike-proposal-1]dis this
2022-10-15 03:30:11.870 
#
ike proposal 1
 encryption-algorithm aes-256
 dh group14
 authentication-algorithm sha2-256
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256
 prf hmac-sha2-256
#
return
[FW1]ike peer ha
[FW1-ike-peer-ha]remote-address 202.100.3.11
[FW1-ike-peer-ha]pre-shared-key Huawei@123
[FW1-ike-peer-ha]undo version 2
[FW1-ike-peer-ha]ike-proposal 1
[FW1-ike-peer-ha]ike peer ha2
[FW1-ike-peer-ha2]remote-address 202.100.3.11
[FW1-ike-peer-ha2]pre-shared-key Huawei@123
[FW1-ike-peer-ha2]undo version 2
[FW1-ike-peer-ha2]ike-proposal 1
[FW1-ike-peer-ha2]acl number 3000
[FW1-acl-adv-3000]rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
[FW1-acl-adv-3000]acl number 3001 
[FW1-acl-adv-3001]rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
[FW1-acl-adv-3001]ipsec proposal 1
[FW1-ipsec-proposal-1]ipsec policy ipsec1 1 isakmp
[FW1-ipsec-policy-isakmp-ipsec1-1]security  acl 3000
[FW1-ipsec-policy-isakmp-ipsec1-1]proposal  1
[FW1-ipsec-policy-isakmp-ipsec1-1]ike-peer ha
[FW1-ipsec-policy-isakmp-ipsec1-1]ipsec policy ipsec2 2 isakmp
[FW1-ipsec-policy-isakmp-ipsec2-2]security  acl  3001
[FW1-ipsec-policy-isakmp-ipsec2-2]proposal  1
[FW1-ipsec-policy-isakmp-ipsec2-2]ike-peer ha2
[FW1-GigabitEthernet1/0/1]ipsec policy  ipsec1
[FW1-GigabitEthernet1/0/0]ipsec policy  ipsec2

FW2:

[FW2]ike proposal  1
[FW2-ike-proposal-1]dis this
2022-10-15 03:37:01.290 
#
ike proposal 1
 encryption-algorithm aes-256
 dh group14
 authentication-algorithm sha2-256
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256
 prf hmac-sha2-256
#
return
[FW2]ike peer ha
[FW2-ike-peer-ha]remote-address 202.100.1.10
[FW2-ike-peer-ha]pre-shared-key Huawei@123
[FW2-ike-peer-ha]undo version 2
[FW2-ike-peer-ha]ike-proposal 1
[FW2-ike-peer-ha]ike peer ha2
[FW2-ike-peer-ha2]remote-address 202.100.2.10
[FW2-ike-peer-ha2]pre-shared-key Huawei@123
[FW2-ike-peer-ha2]undo version 2
[FW2-ike-peer-ha2]ike-proposal 1
[FW2-ike-peer-ha2]acl number 3000
[FW2-acl-adv-3000]rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
[FW2-acl-adv-3000]acl number 3001
[FW2-acl-adv-3001]rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
[FW2-acl-adv-3001]ipsec proposal 1
[FW2-ipsec-proposal-1]dis this
2022-10-15 03:40:27.440 
#
ipsec proposal 1
 esp authentication-algorithm sha2-256
 esp encryption-algorithm aes-256
#
return
[FW2-ipsec-proposal-1]ipsec policy ipsec1 1 isakmp
[FW2-ipsec-policy-isakmp-ipsec1-1]proposal 1
[FW2-ipsec-policy-isakmp-ipsec1-1]security acl 3000
[FW2-ipsec-policy-isakmp-ipsec1-1]ike-peer ha
[FW2-ipsec-policy-isakmp-ipsec1-1]ipsec policy ipsec2 2 isakmp
[FW2-ipsec-policy-isakmp-ipsec2-2]proposal 1
[FW2-ipsec-policy-isakmp-ipsec2-2]security acl 3001
[FW2-ipsec-policy-isakmp-ipsec2-2]ike-peer ha2
[FW2-ipsec-policy-isakmp-ipsec2-2]interface Tunnel 1
[FW2-Tunnel1]ipsec policy ipsec1
[FW2-Tunnel1]interface Tunnel 2
[FW2-Tunnel2]ipsec policy ipsec2

1.3.4配置对象(地址集和服务)

FW1(FW2略):

[FW1]ip address-set ipsec type  object
[FW1-object-address-set-ipsec]address  202.100.1.10 mask  32
[FW1-object-address-set-ipsec]address 202.100.2.10 mask 32
[FW1-object-address-set-ipsec]address 202.100.3.11 mask 32
[FW1-object-address-set-ipsec]ip address-set  vpn_pc type  object 
[FW1-object-address-set-vpn_pc]address  10.1.1.0 mask  24
[FW1-object-address-set-vpn_pc]address  10.1.2.0 mask  24 
[FW1-object-address-set-vpn_pc]ip service-set  ISAKMP  type  objec
[FW1-object-service-set-ISAKMP]service  protocol  udp  source-port  500 destination-port 500

1.3.5安全策略

FW1(FW2略):

[FW1]security-policy
[FW1-policy-security]rule name ipsec 
[FW1-policy-security-rule-ipsec]source-zone  local  untrust   
[FW1-policy-security-rule-ipsec]destination-zone local  untrust   
[FW1-policy-security-rule-ipsec]source-address address-set  ipsec  
[FW1-policy-security-rule-ipsec]destination-address address-set  ipsec 
[FW1-policy-security-rule-ipsec]service ISAKMP  esp 
[FW1-policy-security-rule-ipsec]action  permit  
[FW1-policy-security-rule-ipsec]rule name vpn_pc 
[FW1-policy-security-rule-vpn_pc]source-zone  trust  untrust   
[FW1-policy-security-rule-vpn_pc]destination-zone trust untrust 
[FW1-policy-security-rule-vpn_pc]source-address address-set  vpn_pc  
[FW1-policy-security-rule-vpn_pc]destination-address address-set  vpn_pc  
[FW1-policy-security-rule-vpn_pc]action  permit

1.4 测试现象

1.PC1发起访问,并抓包。(做的时候发现ping不通,因为忘记了将Tunnel口加安全区域)

 

 2.查看路由表(浮动路由)

[FW1]display  ip routing-table  protocol  static 
2022-10-15 04:15:54.350 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Public routing table : Static
         Destinations : 1        Routes : 2        Configured Routes : 2

Static routing table status : <Active>
         Destinations : 1        Routes : 1

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0          RD   202.100.1.254   GigabitEthernet1/0/1

Static routing table status : <Inactive>
         Destinations : 1        Routes : 1

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  70   0          R    202.100.2.254   GigabitEthernet1/0/0
[FW2]display  ip routing-table  protocol  static 
2022-10-15 04:16:26.640 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Public routing table : Static
         Destinations : 2        Routes : 3        Configured Routes : 3

Static routing table status : <Active>
         Destinations : 2        Routes : 2

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0          RD   202.100.3.254   GigabitEthernet1/0/0
       10.1.1.0/24  Static  60   0           D   202.100.3.11    Tunnel1

Static routing table status : <Inactive>
         Destinations : 1        Routes : 1

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

       10.1.1.0/24  Static  70   0               202.100.3.11    Tunnel2

3,断开R1的G0/0/0,查看IP-link的变化和路由表的变化。这里IP-link检测到链路故障,优先级较高的路由失效,优先级较低的生效,重新协商了ipsec。

[FW1]display  ip routing-table  protocol  static 
2022-10-15 04:19:50.400 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Public routing table : Static
         Destinations : 1        Routes : 2        Configured Routes : 2

Static routing table status : <Active>
         Destinations : 1        Routes : 1

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  70   0          RD   202.100.2.254   GigabitEthernet1/0/0

Static routing table status : <Inactive>
         Destinations : 1        Routes : 1

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0               202.100.1.254   Unknown
[FW2]display  ip routing-table  protocol  static 
2022-10-15 04:19:54.240 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Public routing table : Static
         Destinations : 2        Routes : 3        Configured Routes : 3

Static routing table status : <Active>
         Destinations : 2        Routes : 2

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0          RD   202.100.3.254   GigabitEthernet1/0/0
       10.1.1.0/24  Static  70   0           D   202.100.3.11    Tunnel2

Static routing table status : <Inactive>
         Destinations : 1        Routes : 1

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

       10.1.1.0/24  Static  60   0               202.100.3.11    Tunnel1

二,隧道化链路备份

2.1拓扑图

 

 

 Cloud1和Cloud2桥接了物理机网卡,方便可以使用web图形化。

2.2需求说明

  FW1双出口与ISP连接,两条链路负载均衡。联动IP-Link对链路监测。FW1与FW2建立IPSec,负载均衡链路其中一条故障也不会影响内网PC的通信。

2.3配置

IP地址,安全区域的配置省略。

2.3.1静态路由联动IP-Link

[FW1]ip-link  check  enable  
[FW1]ip-link  name link1
[FW1-iplink-link1]destination  202.100.1.254 interface  GigabitEthernet  1/0/1  mode  icmp  next-hop  202.100.1.254
[FW1-iplink-link1]ip-link name link2
[FW1-iplink-link2]destination  202.100.2.254 interface  GigabitEthernet  1/0/0 mode  icmp  next-hop  202.100.2.254
[FW1]ip route-static  0.0.0.0  0 202.100.1.254 track  ip-link  link1
[FW1]ip route-static  0.0.0.0 0 202.100.2.254 track  ip-link  link2
[FW1]ip route-static 10.1.2.0 24 Tunnel 1
[FW2]ip route-static  0.0.0.0 0 202.100.3.254

2.3.2 FW1配置Tunnel口

[FW1]interface  Tunnel  1
[FW1-Tunnel1]ip address  1.1.1.1 32
[FW1-Tunnel1]tunnel-protocol ipsec
[FW1-Tunnel1]firewall zone untrust
[FW1-zone-untrust]add interface Tunnel 1

AR1:

[AR1]ip route-static  1.1.1.1 32 202.100.1.10
[AR1]ip route-static  1.1.1.1 32 202.100.2.10

2.3.3配置IPSec

FW1:

[FW1]ike proposal  1
[FW1-ike-proposal-1]dis this
2022-10-15 05:53:00.240 
#
ike proposal 1
 encryption-algorithm aes-256
 dh group14
 authentication-algorithm sha2-256
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256
 prf hmac-sha2-256
#
return
[FW1-ike-proposal-1]ike peer fw2
[FW1-ike-peer-fw2]undo version 2
[FW1-ike-peer-fw2]remote-address 202.100.3.11
[FW1-ike-peer-fw2]ike-proposal 1 
[FW1-ike-peer-fw2]pre-shared-key Huawei@123 [FW1
-ike-peer-fw2]acl number 3000 [FW1-acl-adv-3000]rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 [FW1-acl-adv-3000]ipsec proposal 1 [FW1-ipsec-proposal-1]dis this 2022-10-15 05:55:35.670 # ipsec proposal 1 esp authentication-algorithm sha2-256 esp encryption-algorithm aes-256 # return [FW1-ipsec-proposal-1]ipsec policy ipsec1 1 isakmp [FW1-ipsec-policy-isakmp-ipsec1-1]security acl 3000 [FW1-ipsec-policy-isakmp-ipsec1-1]ike-peer fw2 [FW1-ipsec-policy-isakmp-ipsec1-1]proposal 1 [FW1-Tunnel1]ipsec policy ipsec1

FW2省略,对端地址指定1.1.1.1,其他配置镜像即可。

2.3.3 地址集和服务

[FW1]ip address-set  ipsec type  object  
[FW1-object-address-set-ipsec]address  202.100.3.11 mask  32
[FW1-object-address-set-ipsec]address  1.1.1.1 mask  32
[FW1-object-address-set-ipsec]ip address-set vpn_pc type object
[FW1-object-address-set-vpn_pc]address  10.1.1.0 mask  24
[FW1-object-address-set-vpn_pc]address  10.1.2.0 mask  24
[FW1]ip service-set  ISAKMP type  object  
[FW1-object-service-set-ISAKMP]service  protocol  udp  source-port  500 destination-port 500

2.3.4 安全策略

[FW1-policy-security-rule-icmp]rule name ipsec 
[FW1-policy-security-rule-ipsec]source-zone  local  untrust   
[FW1-policy-security-rule-ipsec]destination-zone local  untrust   
[FW1-policy-security-rule-ipsec]source-address address-set  ipsec  
[FW1-policy-security-rule-ipsec]destination-address address-set  ipsec 
[FW1-policy-security-rule-ipsec]service ISAKMP  esp 
[FW1-policy-security-rule-ipsec]action  permit  
[FW1-policy-security-rule-ipsec]rule name vpn_pc 
[FW1-policy-security-rule-vpn_pc]source-zone  trust  untrust   
[FW1-policy-security-rule-vpn_pc]destination-zone trust untrust 
[FW1-policy-security-rule-vpn_pc]source-address address-set  vpn_pc  
[FW1-policy-security-rule-vpn_pc]destination-address address-set  vpn_pc  
[FW1-policy-security-rule-vpn_pc]action  permit

2.4测试现象

1.查看路由表,双出口负载均衡

[FW1-policy-security]dis ip routing-table 
2022-10-15 06:09:25.410 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
         Destinations : 10       Routes : 11       

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0          RD   202.100.1.254   GigabitEthernet1/0/1
                    Static  60   0          RD   202.100.2.254   GigabitEthernet1/0/0

2.PC1发起与PC2的通信

 

 

 3.查看IKE SA,IPSEC SA

[FW1]dis ike sa
2022-10-15 06:15:39.190 

IKE SA information :
 Conn-ID    Peer                                          VPN              Flag(s)               Phase  RemoteType  RemoteID        
------------------------------------------------------------------------------------------------------------------------------------
 5          202.100.3.11:500                                               RD|ST|A               v1:2   IP          202.100.3.11    
 4          202.100.3.11:500                                               RD|ST|A               v1:1   IP          202.100.3.11    

  Number of IKE SA : 2
[FW1]dis ipsec sa
2022-10-15 06:15:56.530 

ipsec sa information:

===============================
Interface: Tunnel1
===============================

  -----------------------------
  IPSec policy name: "ipsec1"
  Sequence number  : 1
  Acl group        : 3000
  Acl rule         : 5
  Mode             : ISAKMP
  -----------------------------
    Connection ID     : 5
    Encapsulation mode: Tunnel
    Holding time      : 0d 0h 1m 16s
    Tunnel local      : 1.1.1.1:500
    Tunnel remote     : 202.100.3.11:500
    Flow source       : 10.1.1.0/255.255.255.0 0/0-65535
    Flow destination  : 10.1.2.0/255.255.255.0 0/0-65535

    [Outbound ESP SAs] 
      SPI: 197028313 (0xbbe69d9)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/3524
      Max sent sequence-number: 5         
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 4/240

    [Inbound ESP SAs] 
      SPI: 194143668 (0xb9265b4)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/3524
      Max received sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 4/240
      Anti-replay : Enable
      Anti-replay window size: 1024

4.查看加密统计,ping5次丢包一次,查看表对比ping之前的结果,加密增加5个,解密增加4个,正确的。

5.制造链路故障查看现象,断开AR1的G0/0/0口

 

 6.IP-Link生效,故障链路的静态路由变为失效。

[FW1]display  ip routing-table  
2022-10-15 06:22:55.410 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
         Destinations : 9        Routes : 9        

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0          RD   202.100.2.254   GigabitEthernet1/0/0
        1.1.1.1/32  Direct  0    0           D   127.0.0.1       Tunnel1

 

三,主备网关备份

3.1拓扑图

  Cloud1和Cloud2桥接了物理机网卡,方便可以使用web图形化。

3.2需求说明

  FW1和FW2做三层上下行连接交换机的主备备份,虚拟IP的主机位均是100。建立双机热备后使用虚拟IP与FW3建立IPSec VPN,使得trust区域的PC可以通过VPN互通。

3.3配置

3.3.1基础配置

  VLAN,IP地址,安全区域的配置省略。因为双机热备不会备份路由,配置静态路由指向AR1如下。

[FW1]ip route-static  0.0.0.0 0 202.100.1.254
[FW2]ip route-static  0.0.0.0 0 202.100.1.254
[FW3]ip route-static  0.0.0.0 0 202.100.2.254

3.3.2双机热备

FW1:

[FW1]interface  GigabitEthernet  1/0/1
[FW1-GigabitEthernet1/0/1]vrrp vrid  1 virtual-ip  202.100.1.100  active   //指定为主设备
[FW1-GigabitEthernet1/0/1]interface  GigabitEthernet  1/0/0              
[FW1-GigabitEthernet1/0/0]vrrp vrid 2 virtual-ip 10.1.1.100 active
[FW1-GigabitEthernet1/0/0]quit
[FW1]hrp  interface  GigabitEthernet  1/0/2 remote  172.16.1.11   //指定心跳线接口和对端地址
[FW1]hrp  enable

FW2:

[FW2]interface GigabitEthernet  1/0/1
[FW2-GigabitEthernet1/0/1]vrrp vrid 1 virtual-ip 202.100.1.100 standby  //指定为备设备
[FW2-GigabitEthernet1/0/1]interface GigabitEthernet  1/0/0            
[FW2-GigabitEthernet1/0/0]vrrp vrid 2 virtual-ip 10.1.1.100 standby
[FW2-GigabitEthernet1/0/0]quit
[FW2]hrp  interface  GigabitEthernet  1/0/2 remote  172.16.1.10      //指定心跳线接口和对端地址
[FW2]hrp enable

3.3.3对象的配置(地址集,服务)

HRP_M[FW1]ip address-set ipsec type  object   (+B)                //地址集,方便安全策略使用
HRP_M[FW1-object-address-set-ipsec]address  202.100.1.100 mask  32 (+B)
HRP_M[FW1-object-address-set-ipsec]address 202.100.2.12 mask 32 (+B)
HRP_M[FW1]ip address-set  vpn_pc type  object   (+B)
HRP_M[FW1-object-address-set-vpn_pc]address  10.1.1.0 mask  24 (+B)
HRP_M[FW1-object-address-set-vpn_pc]address  10.1.2.0 mask  24 (+B)
HRP_M[FW1]ip service-set  ISAKMP  type  object   (+B)              //加密流量的端口方便安全策略使用
HRP_M[FW1-object-service-set-ISAKMP]service  protocol  udp  source-port  500 destination-port 500 (+B)
[FW3]ip address-set ipsec type  object
[FW3-object-address-set-ipsec]address  202.100.1.100 mask  32
[FW3-object-address-set-ipsec]address 202.100.2.12 mask 32
[FW3-object-address-set-ipsec]ip address-set  vpn_pc type  object 
[FW3-object-address-set-vpn_pc]address  10.1.1.0 mask  24
[FW3-object-address-set-vpn_pc]address  10.1.2.0 mask  24 
[FW3-object-address-set-vpn_pc]ip service-set  ISAKMP  type  objec
[FW3-object-service-set-ISAKMP]service  protocol  udp  source-port  500 destination-port 500

3.3.4 IPSec配置

FW1:

HRP_M[FW1]ike proposal  1 (+B)      //ike提议使用默认
HRP_M[FW1-ike-proposal-1]dis this
2022-10-15 01:24:38.090 
#
ike proposal 1
 encryption-algorithm aes-256
 dh group14
 authentication-algorithm sha2-256
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256
 prf hmac-sha2-256
#
return
HRP_M[FW1-ike-proposal-1]ike peer fw2 (+B)  //配置ike对等体
HRP_M[FW1-ike-peer-fw2]ike-proposal 1 (+B)  //调用ike提议
HRP_M[FW1-ike-peer-fw2]undo version  2 (+B)  //使用version1,默认v1,v2都开启,发起时使用v2
HRP_M[FW1-ike-peer-fw2]pre-shared-key  Huawei@123 (+B)  //预定义密钥
HRP_M[FW1-ike-peer-fw2]remote-address 202.100.2.12 (+B)  //指定对端地址
HRP_M[FW1]ipsec proposal 1 (+B)        //ipsec提议使用默认
HRP_M[FW1-ipsec-proposal-1]dis this
2022-10-15 01:31:23.110 
#
ipsec proposal 1
 esp authentication-algorithm sha2-256
 esp encryption-algorithm aes-256
#
return
HRP_M[FW1-ipsec-proposal-1]acl number 3000 (+B)      //配置感兴趣流,及加密的流量是谁
HRP_M[FW1-acl-adv-3000]rule permit  ip source  10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 (+B)
HRP_M[FW1-acl-adv-3000]ipsec policy ipsec1 1 isakmp (+B)    //配置ipsec策略
HRP_M[FW1-ipsec-policy-isakmp-ipsec1-1]proposal  1 (+B)    //调用ipsec提议
HRP_M[FW1-ipsec-policy-isakmp-ipsec1-1]security  acl  3000 (+B)  //调用感兴趣流
HRP_M[FW1-ipsec-policy-isakmp-ipsec1-1]ike-peer fw2 (+B)      //调用对等体
HRP_M[FW1-ipsec-policy-isakmp-ipsec1-1]tunnel local 202.100.1.100  //指定本段地址为vrrp的虚拟地址 HRP_M[FW1
-ipsec-policy-isakmp-ipsec1-1]interface GigabitEthernet1/0/1 (+B)  //在接口下调用IPsec策略 HRP_M[FW1-GigabitEthernet1/0/1]ipsec policy ipsec1 (+B)

FW3:

[FW3]ike proposal 1        //ike提议与对端保持一致
[FW3-ike-proposal-1]dis this
2022-10-15 01:44:18.470 
#
ike proposal 1
 encryption-algorithm aes-256
 dh group14
 authentication-algorithm sha2-256
 authentication-method pre-share
 integrity-algorithm hmac-sha2-256
 prf hmac-sha2-256
#
return
[FW3-ike-proposal-1]ike peer HQ   //ike对等体使用version1
[FW3-ike-peer-HQ]ike-proposal 1
[FW3-ike-peer-HQ]undo version  2
[FW3-ike-peer-HQ]pre-shared-key  Huawei@123
[FW3-ike-peer-HQ]remote-address 202.100.1.100
[FW3-ike-peer-HQ]acl number 3000    //感兴趣流
[FW3-acl-adv-3000]rule permit  ip source  10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
[FW3-acl-adv-3000]ipsec proposal 1    //ipsec提议保持一致
[FW3-ipsec-proposal-1]dis this
2022-10-15 01:47:29.350 
#
ipsec proposal 1
 esp authentication-algorithm sha2-256
 esp encryption-algorithm aes-256
#
return
[FW3-ipsec-proposal-1]ipsec policy ipsec1 1 isakmp //ipsec策略
[FW3-ipsec-policy-isakmp-ipsec1-1]security  acl  3000
[FW3-ipsec-policy-isakmp-ipsec1-1]ike-peer HQ
[FW3-ipsec-policy-isakmp-ipsec1-1]proposal  1
[FW3-ipsec-policy-isakmp-ipsec1-1]interface GigabitEthernet1/0/0    //接口下调用ipsec策略
[FW3-GigabitEthernet1/0/0]ipsec policy  ipsec1

3.3.5 安全配置

HRP_M[FW1]security-policy   (+B)
HRP_M[FW1-policy-security]rule name ipsec (+B)
HRP_M[FW1-policy-security-rule-ipsec]source-zone  local  untrust   (+B)
HRP_M[FW1-policy-security-rule-ipsec]destination-zone local  untrust   (+B)
HRP_M[FW1-policy-security-rule-ipsec]source-address address-set  ipsec  (+B)
HRP_M[FW1-policy-security-rule-ipsec]destination-address address-set  ipsec (+B)
HRP_M[FW1-policy-security-rule-ipsec]service ISAKMP  esp (+B)
HRP_M[FW1-policy-security-rule-ipsec]action  permit  (+B)
HRP_M[FW1-policy-security-rule-ipsec]rule name vpn_pc (+B)
HRP_M[FW1-policy-security-rule-vpn_pc]source-zone  trust  untrust   (+B)
HRP_M[FW1-policy-security-rule-vpn_pc]destination-zone trust untrust (+B)
HRP_M[FW1-policy-security-rule-vpn_pc]source-address address-set  vpn_pc  (+B)
HRP_M[FW1-policy-security-rule-vpn_pc]destination-address address-set  vpn_pc  (+B)
HRP_M[FW1-policy-security-rule-vpn_pc]action  permit  (+B)
[FW3]security-policy   
[FW3-policy-security]rule name ipsec 
[FW3-policy-security-rule-ipsec]source-zone  local  untrust   
[FW3-policy-security-rule-ipsec]destination-zone local  untrust   
[FW3-policy-security-rule-ipsec]source-address address-set  ipsec  
[FW3-policy-security-rule-ipsec]destination-address address-set  ipsec 
[FW3-policy-security-rule-ipsec]service ISAKMP  esp 
[FW3-policy-security-rule-ipsec]action  permit  
[FW3-policy-security-rule-ipsec]rule name vpn_pc 
[FW3-policy-security-rule-vpn_pc]source-zone  trust  untrust   
[FW3-policy-security-rule-vpn_pc]destination-zone trust untrust 
[FW3-policy-security-rule-vpn_pc]source-address address-set  vpn_pc  
[FW3-policy-security-rule-vpn_pc]destination-address address-set  vpn_pc  
[FW3-policy-security-rule-vpn_pc]action  permit

3.4现象测试

3.4.1双机热备

1.查看vrrp组状态

HRP_M[FW1]display  vrrp brief  
2022-10-15 01:52:33.360 
Total:2     Master:2     Backup:0     Non-active:0      
VRID  State        Interface                Type     Virtual IP     
----------------------------------------------------------------
1     Master       GE1/0/1                  Vgmp     202.100.1.100  
2     Master       GE1/0/0                  Vgmp     10.1.1.100
HRP_S[FW2]display  vrrp brief
2022-10-15 01:52:41.780 
Total:2     Master:0     Backup:2     Non-active:0      
VRID  State        Interface                Type     Virtual IP     
----------------------------------------------------------------
1     Backup       GE1/0/1                  Vgmp     202.100.1.100  
2     Backup       GE1/0/0                  Vgmp     10.1.1.100  

2.查看HRP状态

HRP_S[FW2]display  hrp  state verbose  
2022-10-15 01:53:25.930 
 Role: standby, peer: active
 Running priority: 45000, peer: 45000
 Backup channel usage: 0.00%
 Stable time: 0 days, 0 hours, 34 minutes
 Last state change information: 2022-10-15 1:19:14 HRP link changes to up.

 Configuration:
 hello interval:              1000ms
 preempt:                     60s
 mirror configuration:        off
 mirror session:              off
 track trunk member:          on
 auto-sync configuration:     on
 auto-sync connection-status: on
 adjust ospf-cost:            on
 adjust ospfv3-cost:          on
 adjust bgp-cost:             on
 nat resource:                off

 Detail information:
           GigabitEthernet1/0/1 vrrp vrid 1: standby
           GigabitEthernet1/0/0 vrrp vrid 2: standby
                                  ospf-cost: +65500
                                ospfv3-cost: +65500
                                   bgp-cost: +100

3.4.2 IPSec建立

1.使用PC1 主动向 PC2发起通信

 

 2.IPSec协商成功

HRP_M[FW1]dis ike sa
2022-10-15 02:08:45.450 

IKE SA information :
 Conn-ID    Peer                                          VPN              Flag(s)               Phase  RemoteType  RemoteID        
------------------------------------------------------------------------------------------------------------------------------------
 7          202.100.2.12:500                                               RD|ST|M               v1:2   IP          202.100.2.12    
 6          202.100.2.12:500                                               RD|ST|M               v1:1   IP          202.100.2.12    

  Number of IKE SA : 2
------------------------------------------------------------------------------------------------------------------------------------

 Flag Description:
 RD--READY   ST--STAYALIVE   RL--REPLACED   FD--FADING   TO--TIMEOUT
 HRT--HEARTBEAT   LKG--LAST KNOWN GOOD SEQ NO.   BCK--BACKED UP
 M--ACTIVE   S--STANDBY   A--ALONE  NEG--NEGOTIATING
HRP_M[FW1]dis ipsec sa
2022-10-15 02:09:02.220 

ipsec sa information:

===============================
Interface: GigabitEthernet1/0/1
===============================

  -----------------------------
  IPSec policy name: "ipsec1"
  Sequence number  : 1
  Acl group        : 3000
  Acl rule         : 5
  Mode             : ISAKMP
  -----------------------------
    Connection ID     : 7
    Encapsulation mode: Tunnel
    Holding time      : 0d 0h 3m 7s
    Tunnel local      : 202.100.1.100:500
    Tunnel remote     : 202.100.2.12:500
    Flow source       : 10.1.1.0/255.255.255.0 0/0-65535
    Flow destination  : 10.1.2.0/255.255.255.0 0/0-65535

    [Outbound ESP SAs] 
      SPI: 199143898 (0xbdeb1da)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/3412
      Max sent sequence-number: 5         
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 4/240

    [Inbound ESP SAs] 
      SPI: 187393561 (0xb2b6619)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/3412
      Max received sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 3/180
      Anti-replay : Enable
      Anti-replay window size: 1024

3.当前流量从主设备出

HRP_M[FW1]display  firewall session table  verbose protocol  icmp  
2022-10-15 02:10:07.040 
 Current Total Sessions : 1
 icmp  VPN: public --> public  ID: c487f5699e0571038ee634a167e
 Zone: trust --> untrust  TTL: 00:00:20  Left: 00:00:19
 Recv Interface: GigabitEthernet1/0/0
 Interface: GigabitEthernet1/0/1  NextHop: 202.100.1.254  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 10.1.1.1:29462 --> 10.1.2.1:2048 PolicyName: vpn_pc

4.断开SW2的G0/0/2,使得双机热备主备切换。观察现象,PC1的通信短暂的终端后恢复。

 

 5.双机热备主备切换

HRP_S[FW2]
Oct 15 2022 02:13:12 FW2 HRPI/1/CORE_STATE:1.3.6.1.4.1.2011.6.122.51.2.2.1 The HRP core state changed due to "Unknown". (old_state=normal,new_state=abnormal(active), local_priority=45000, peer_priority=44998)
Oct 15 2022 02:13:12 FW2 %%01HRPI/4/CORE_STATE(l)[20]:The HRP core state changed due to "Unknown". (old_state=normal, new_state=abnormal(active), local_priority=45000, peer_priority=44998)
Oct 15 2022 02:13:11 FW1 HRPI/1/CORE_STATE:1.3.6.1.4.1.2011.6.122.51.2.2.1 The HRP core state changed due to "VRRP change to Down". (old_state=normal,new_state=abnormal(standby), local_priority=44998, peer_priority=45000)
Oct 15 2022 02:13:11 FW1 %%01PHY/4/STATUSDOWN(l)[11]:GigabitEthernet1/0/1 changed status to down.
Oct 15 2022 02:13:11 FW1 %%01IFNET/4/LINK_STATE(l)[12]:The line protocol IP on the interface GigabitEthernet1/0/1 has entered the DOWN state.
Oct 15 2022 02:13:11 FW1 %%01HRPI/4/PRIORITY_CHANGE(l)[13]:The priority of the local VGMP group changed. (change_reason="VRRP change to down.", local_old_priority=45000, local_new_priority=44998)
Oct 15 2022 02:13:11 FW1 %%01RM/4/IPV4_DEFT_RT_CHG(l)[14]:IPV4 default Route is changed. (ChangeType=Delete, InstanceId=0, Protocol=Static, ExitIf=Unknown, Nexthop=202.100.1.254, Neighbour=0.0.0.0, Preference=60, Label=NULL, Metric=0)
Oct 15 2022 02:13:11 FW1 %%01HRPI/4/CORE_STATE(l)[15]:The HRP core state changed due to "VRRP change to Down". (old_state=normal, new_state=abnormal(standby), local_priority=44998, peer_priority=45000)

6.并且通过抓包发现过程中并没有重新建立IPSec

HRP_S[FW1]display  ike sa          
2022-10-15 02:16:47.890 

IKE SA information :
 Conn-ID    Peer                                          VPN              Flag(s)               Phase  RemoteType  RemoteID        
------------------------------------------------------------------------------------------------------------------------------------
 7          202.100.2.12:500                                               RD|ST|S               v1:2   IP          202.100.2.12    
 6          202.100.2.12:500                                               RD|ST|S               v1:1   IP          202.100.2.12    

  Number of IKE SA : 2
------------------------------------------------------------------------------------------------------------------------------------

 Flag Description:
 RD--READY   ST--STAYALIVE   RL--REPLACED   FD--FADING   TO--TIMEOUT
 HRT--HEARTBEAT   LKG--LAST KNOWN GOOD SEQ NO.   BCK--BACKED UP
 M--ACTIVE   S--STANDBY   A--ALONE  NEG--NEGOTIATING

 

 

 

posted @ 2022-10-15 10:56  L_F_A_L  阅读(182)  评论(0)    收藏  举报