企业网络路由交换互联互通 IPSEC VPN

一、 网络设计要求

1、北京与上海分公司实现互联互通,针对财务部门的敏感数据使用IPSEV VPN加密访问

2、北京总部汇聚交换机3560作为DHCP服务器自动分配IP地址

3、北京总部下属三个部门技术部VLAN10 总经理: VLAN 20 财务部:VLAN30,上海分公司下设财务部VLAN 40

4、使用安全访问控制策略控制不允许技术部访问财务部,允许总经理访问财务部

5、北京总部核心路由器2811与上海分公司路由器2811建立IPSEC VPN,北京分公司与上海分公司财务部之间的访问实现IPSEC VPN加密传输。技术部门等其他部门实现正常上网功能,增加模拟备份线路主线路坏掉后通过浮动静态路由实现走备用线路。

6、北京路由器配置静态路由实现内部各个部门的通信,汇聚及核心配置默认路由,内部各个部门能够正常访问公司内部FTP/WEB/MAIL等相关服务器资源。

7、上海分公司为节省成本使用单台路由器作为接入网关并配置单臂路由实现内部不同网段之间的互访。

二、 网络拓扑设计:

大多数的网络都可以被层次性划分为三个逻辑服务单元:核心骨干网(Backbone)、汇聚网(Distribute)和接入网(Local-access),模块化网络设计方法的目标在于把一个大型的网络元素划分成一个个互连的网络层次。层次性结构如下图所示:

企业网络路由交换互联互通IPSECVPN

一、 地址规划:

部门

地址空间

所属VLAN

总经理

副总经理

192.168.20.0/24

VLAN 20

北京技术部

192.168.10.0/24

VLAN 10

北京财务部

192.168.30.0/24

VLAN 20

北京服务器区

10.100.0.0/24

VLAN 30

上海财务部

192.168.40.0/24

VLAN 40

上海服务器

10.100.1.0/24

VLAN 50

二、 网络配置说明

1、北京汇聚交换机配置

ip dhcp pool Jishubu ------配置技术部DHCP地址池

network 192.168.10.0 255.255.255.0

default-router 192.168.10.254

ip dhcp pool Boss ------配置总经理DHCP地址池

network 192.168.20.0 255.255.255.0

default-router 192.168.20.254

ip dhcp pool Caiwu ------配置财务DHCP地址池

network 192.168.30.0 255.255.255.0

default-router 192.168.30.254

ip routing ------开启交换机路由模式

spanning-tree mode pvst

interface FastEthernet0/1

switchport access vlan 99 ------配置与路由器互联VLAN

switchport mode access

interface FastEthernet0/21

switchport trunk encapsulation dot1q

switchport mode trunk -----配置与接入交换机trunk

interface FastEthernet0/22

switchport trunk encapsulation dot1q

switchport mode trunk

!

interface FastEthernet0/23

switchport trunk encapsulation dot1q

switchport mode trunk

!

interface FastEthernet0/24

switchport trunk encapsulation dot1q

switchport mode trunk

!!

interface Vlan1

no ip address

shutdown

!

interface Vlan10

ip address 192.168.10.254 255.255.255.0 ---配置技术部网关

ip access-group 101 in ---配置安全策略ACL绑定都三层VLAN接口实现数据*过包**滤及控制

!

interface Vlan20

ip address 192.168.20.254 255.255.255.0 ---配置总经理网关

!

interface Vlan30

ip address 192.168.30.254 255.255.255.0 ---配置财务部网关

!

interface Vlan50

ip address 10.100.0.254 255.255.255.0 ---配置服务器网关

!

!

interface Vlan99

ip address 10.0.0.2 255.255.255.252 ---配置与路由器互联IP

!

ip classless

ip route 0.0.0.0 0.0.0.0 10.0.0.1 -- ---配置默认路由到路由器

!

ip flow-export version 9

!

!

access-list 101 deny ip 192.168.10.0 0.0.0.255 192.168.30.0 0.0.0.255 –ACL安全扩展列表拒绝的原IP和要访问的目的IP段

access-list 101 permit ip any any---其他数据报文允许放行

!

end

2、北京出口核心路由器配置

!

hostname BJ_Router

!

!

ip cef

no ipv6 cef

!

!

crypto isakmp policy 1 ---配置IPSEC IKE协商

authentication pre-share ---认证共享密钥

group 2

!

crypto isakmp key mykey address 1.1.1.2 ---对端上海IKE IP

!

!

!

crypto ipsec transform-set myset esp-3des esp-sha-hmac ---加密参数与上海一致

!

crypto map mymap 10 ipsec-isakmp

set peer 1.1.1.2

set transform-set myset

match address 101 --- 配置的IPSECVPN与定义的ACL 关联产生IPSECVPN加密

!

!!

interface FastEthernet0/0

ip address 10.0.0.1 255.255.255.252

ip nat inside

duplex auto

speed auto

!

interface FastEthernet0/1

ip address 1.1.1.1 255.255.255.252

ip nat outside

duplex auto

speed auto

crypto map mymap

!

interface Ethernet1/0

no ip address

duplex auto

speed auto

!

interface Ethernet1/1

no ip address

duplex auto

speed auto

!

interface Ethernet1/2

ip address 10.1.2.1 255.255.255.252

ip nat outside

duplex auto

speed auto

!

interface Ethernet1/3

no ip address

duplex auto

speed auto

!

interface Vlan1

no ip address

!

ip nat inside source list 198 interface FastEthernet0/1 overload-配置NAT实现上网功能

ip classless

ip route 192.168.10.0 255.255.255.0 10.0.0.2 –配置北京内网回程路由

ip route 192.168.20.0 255.255.255.0 10.0.0.2 –配置北京内网回程路由

ip route 192.168.30.0 255.255.255.0 10.0.0.2 –配置北京内网回程路由

ip route 0.0.0.0 0.0.0.0 1.1.1.2 -–配置默认路由到上海

ip route 0.0.0.0 0.0.0.0 10.1.2.2 100 ---此处配置静态路由优先级为100低于默认路由优先级1,因此此静态路由隐藏路由表中,当第一条路由生效后才生效。

!

ip flow-export version 9

!

!

access-list 101 permit ip 192.168.30.0 0.0.0.255 192.168.40.0 0.0.0.255—IPSECVPN的加密数据ACL列表

access-list 198 permit ip 192.168.10.0 0.0.0.255 any ----允许NAT上网的ACL

access-list 198 permit ip 192.168.20.0 0.0.0.255 any ----允许NAT上网的ACL

!

!

line con 0

!

line aux 0

!

line vty 0 4

login

!

!

!

end

3、北京出口核心路由器配置!

hostname SH_Router

!crypto isakmp policy 1 ---IPSEC VPN配置与北京路由器参数一致

authentication pre-share

group 2

!

crypto isakmp key mykey address 1.1.1.1

!

!

!

crypto ipsec transform-set myset esp-3des esp-sha-hmac

!

crypto map mymap 10 ipsec-isakmp

set peer 1.1.1.1

set transform-set myset

match address 101 ----IPSEC VPN的感兴趣流为ACL101 触发IPSEC VPN

!

!

interface FastEthernet0/0

no ip address

duplex auto

speed auto

!

interface FastEthernet0/0.1

encapsulation dot1Q 40

ip address 192.168.40.254 255.255.255.0 ----上海财务部的网关子接口终结VLAN40对接财务部交换机透传的VLAN40报文

!

interface FastEthernet0/0.2

encapsulation dot1Q 100

ip address 10.100.1.254 255.255.255.0 ----上海服务器的网关子接口终结VLAN100对接接入交换机透传的VLAN100报文

!

interface FastEthernet0/1

ip address 1.1.1.2 255.255.255.252

duplex auto

speed auto

crypto map mymap

!

interface Ethernet1/0

no ip address

duplex auto

speed auto

!

interface Ethernet1/1

no ip address

duplex auto

speed auto

!

interface Ethernet1/2

no ip address

duplex auto

speed auto

!

interface Ethernet1/3

ip address 10.1.3.1 255.255.255.252

duplex auto

speed auto

!

interface Vlan1

no ip address

!

ip classless

ip route 0.0.0.0 0.0.0.0 1.1.1.1

ip route 0.0.0.0 0.0.0.0 10.1.3.2 100

!

ip flow-export version 9

!

!

access-list 101 permit ip 192.168.40.0 0.0.0.255 192.168.30.0 0.0.0.255---配置IPSEC VPN的定义感兴趣流触发IPSECVPN

!

!

!

!

!

line con 0

!

line aux 0

!

line vty 0 4

login

!

!

!

end

(以下IPSEC VPN增值讲解)

VPN加密实验讲解:

BJ_Router#show crypto ipsec sa

interface: FastEthernet0/1

Crypto map tag: mymap, local addr 1.1.1.1

protected vrf: (none)

local ident (addr/mask/prot/port): (192.168.30.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (192.168.40.0/255.255.255.0/0/0)

current_peer 1.1.1.2 port 500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0 -------默认没有VPN加密数据传输

#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0

#pkts not decompressed: 0, #pkts decompress failed: 0

#send errors 0, #recv errors 0

local crypto endpt.: 1.1.1.1, remote crypto endpt.:1.1.1.2

path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1

current outbound spi: 0x0(0)

inbound esp sas:

inbound ah sas:

inbound pcp sas:

outbound esp sas:

outbound ah sas:

outbound pcp sas:

北京财务部PC5 ping 上海财务部

PC>ping 192.168.40.1

Pinging 192.168.40.1 with 32 bytes of data:

Request timed out.

Request timed out.

Reply from 192.168.40.1: bytes=32 time=0ms TTL=125

Reply from 192.168.40.1: bytes=32 time=0ms TTL=125

Ping statistics for 192.168.40.1:

Packets: Sent = 4, Received = 2, Lost = 2 (50% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

BJ_Router#show crypto ipsec sa

interface: FastEthernet0/1

Crypto map tag: mymap, local addr 1.1.1.1

protected vrf: (none)

local ident (addr/mask/prot/port): (192.168.30.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (192.168.40.0/255.255.255.0/0/0)

current_peer 1.1.1.2 port 500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 3, #pkts encrypt: 3, #pkts digest: 0 ----加密数据报文增加

#pkts decaps: 2, #pkts decrypt: 2, #pkts verify: 0

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0

#pkts not decompressed: 0, #pkts decompress failed: 0

#send errors 1, #recv errors 0

local crypto endpt.: 1.1.1.1, remote crypto endpt.:1.1.1.2

path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1

current outbound spi: 0x373C0B92(926682002)

inbound esp sas:

spi: 0x61C82399(1640506265)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

conn id: 2002, flow_id: FPGA:1, crypto map: mymap

sa timing: remaining key lifetime (k/sec): (4525504/3442)

IV size: 16 bytes

replay detection support: N

Status: ACTIVE

inbound ah sas:

inbound pcp sas:

outbound esp sas:

spi: 0x373C0B92(926682002)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

conn id: 2003, flow_id: FPGA:1, crypto map: mymap

sa timing: remaining key lifetime (k/sec): (4525504/3442)

IV size: 16 bytes

replay detection support: N

Status: ACTIVE

outbound ah sas:

outbound pcp sas:

北京财务部PC5 再ping 4个报文

PC>

PC>ping 192.168.40.1

Pinging 192.168.40.1 with 32 bytes of data:

Reply from 192.168.40.1: bytes=32 time=8ms TTL=125

Reply from 192.168.40.1: bytes=32 time=0ms TTL=125

Reply from 192.168.40.1: bytes=32 time=0ms TTL=125

Reply from 192.168.40.1: bytes=32 time=0ms TTL=125

BJ_Router#show crypto ipsec sa

interface: FastEthernet0/1

Crypto map tag: mymap, local addr 1.1.1.1

protected vrf: (none)

local ident (addr/mask/prot/port): (192.168.30.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (192.168.40.0/255.255.255.0/0/0)

current_peer 1.1.1.2 port 500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 7, #pkts encrypt: 7, #pkts digest: 0 -----ping 通 4个 报文 增加4个VPN加密报文

#pkts decaps: 6, #pkts decrypt: 6, #pkts verify: 0

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0

#pkts not decompressed: 0, #pkts decompress failed: 0

#send errors 1, #recv errors 0

local crypto endpt.: 1.1.1.1, remote crypto endpt.:1.1.1.2

path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1

current outbound spi: 0x373C0B92(926682002)

inbound esp sas:

spi: 0x61C82399(1640506265)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

conn id: 2002, flow_id: FPGA:1, crypto map: mymap

sa timing: remaining key lifetime (k/sec): (4525504/3191)

IV size: 16 bytes

replay detection support: N

Status: ACTIVE

inbound ah sas:

inbound pcp sas:

outbound esp sas:

spi: 0x373C0B92(926682002)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

conn id: 2003, flow_id: FPGA:1, crypto map: mymap

sa timing: remaining key lifetime (k/sec): (4525504/3191)

IV size: 16 bytes

replay detection support: N

Status: ACTIVE

北京财务部PC5 路由跟踪天津财务

PC>

PC>tracert 192.168.40.1

Tracing route to 192.168.40.1 over a maximum of 30 hops:

1 0 ms 0 ms 0 ms 192.168.30.254

2 0 ms 1 ms 1 ms 10.0.0.1

3 * 0 ms 0 ms 1.1.1.2

4 0 ms 0 ms 1 ms 192.168.40.1

Trace complete.

北京路由器配置静态浮动路由,当IPSEC VPN线路出问题后走备份线路,模拟shutdown 北京路由器F0/1接口

PC>tracert 192.168.40.1

Tracing route to 192.168.40.1 over a maximum of 30 hops:

1 1 ms 0 ms 8 ms 192.168.30.254

2 0 ms 1 ms 0 ms 10.0.0.1

3 0 ms 0 ms 0 ms 10.1.2.2

4 0 ms 0 ms 0 ms 10.1.3.1

5 0 ms 1 ms 0 ms 192.168.40.1

Trace complete.