H3CIPV6之ipsec+IKE野蠻模式典型組網配置案例_第1頁
H3CIPV6之ipsec+IKE野蠻模式典型組網配置案例_第2頁
H3CIPV6之ipsec+IKE野蠻模式典型組網配置案例_第3頁
H3CIPV6之ipsec+IKE野蠻模式典型組網配置案例_第4頁
H3CIPV6之ipsec+IKE野蠻模式典型組網配置案例_第5頁
已閱讀5頁,還剩4頁未讀 繼續免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

R1組網說明:本案例采用H3CHCL模擬器來模擬IPV6IPSECIKE+蠻模式典型組網配置。為了確保數據的傳輸安全,在R1與R2之間建立IPSECVPF隧道采用野蠻模式。最后R1與R2之間采用OSPFV3路由協議互聯。配置思路:1、按照網絡拓撲圖正確配置 IP地址2、 R1與R2之間運行OSPFV3路由協議3、 R1與R2采用IPSECIKE野蠻模式建立VPN隧道。配置過程:第一階段調試(基礎網絡配置):SW1:<H3C>sysSystemView:returntoUserViewwithCtrl+Z.[H3C]sysnameSW1[SW1]intloopback0[SW1-LoopBackO]ipaddress3.3.3.332[SW1-LoopBackO]quit[SW1]ospfv31[SW1-ospfv3-1]import-routedirect[SW1-ospfv3-1]router-id3.3.3.3[SW1-ospfv3-1]quit[SW1]intgi1/0/1[SW1-GigabitEthernet1/0/1]portlink-moderoute[SW1-GigabitEthernet1/0/1]des<connecttoR2>[SW1-GigabitEthernet1/0/1]ipv6address3::264[SW1-GigabitEthernet1/0/1]ospfv31area0[SW1-GigabitEthernet1/0/1]quitR1:<H3C>sysSystemView:returntoUserViewwithCtrl+Z.[H3C]sysnameR1[R1]intloopback0[R1-LoopBack0]ipaddress1.1.1.132[R1-LoopBack0]quit[R1]ospfv31[R1-ospfv3-1]router-id1.1.1.1[R1-ospfv3-1]import-routedirect[R1-ospfv3-1]quit[R1]intgi0/0[R1-GigabitEthernet0/0]ipv6address1::164[R1-GigabitEthernet0/0]ospfv31area0[R1-GigabitEthernet0/0]quit[R1]ints1/0[R1-Serial1/0]des<connecttoR2>[R1-Serial1/0]ipv6address2::164[R1-Serial1/0]ospfv31area0[R1-Serial1/0]quitR2:<H3C>sysSystemView:returntoUserViewwithCtrl+Z.[H3C]sysnameR2[R2]intloopback0[R2-LoopBack0]ipaddress2.2.2.232[R2-LoopBack0]quit[R2]ospfv31[R2-ospfv3-1]import-routedirect[R2-ospfv3-1]router-id2.2.2.2[R2-ospfv3-1]quit[R2]ints1/0[R2-Serial1/0]des<connecttoR1>[R2-Serial1/0]ipv6address2::264[R2-Serial1/0]ospfv31area0[R2-Serial1/0]quit[R2]intgi0/0[R2-GigabitEthernet0/0]des<connecttoSW1>[R2-GigabitEthernet0/0]ipv6address3::164[R2-GigabitEthernet0/0]ospfv31area0[R2-GigabitEthernet0/0]quit第一階段測試:物理機填寫IP地址:第二階段調試(IPSEC+IKE予蠻模式關鍵配置點):[R1]aclipv6advaneed3000[R1-acl-ipv6-adv-3000]rule0permitipv6source1::/64destination3::/64[R1-acl-ipv6-adv-3000]quit[R1]ikeidentityfqdnr1[R1]ikeproposal1[R1-ike-proposal-1]quit[R1]ikekeychainjames[R1-ike-keychain-james]pre-shared-keyaddressipv62::264keysimplejames[R1-ike-keychain-james]quit[R1]ikeprofilejames[R1-ike-profile-james]keychainjames[R1-ike-profile-james]proposal1[R1-ike-profile-james]matchremoteidentityaddressipv62::2[R1-ike-profile-james]exchange-modeaggressive[R1-ike-profile-james]quit[R1]ipsectransform-setjames[R1-ipsec-transform-set-james]protocolesp[R1-ipsec-transform-set-james]encapsulation-modetunnel[R1-ipsec-transform-set-james]espauthentication-algorithmmd5[R1-ipsec-transform-set-james]espencryption-algorithmdes-cbc[R1-ipsec-transform-set-james]quit[R1]ipsecipv6-policyjames1isakmp[R1-ipsec-ipv6-policy-isakmp-james-1]securityaclipv63000[R1-ipsec-ipv6-policy-isakmp-james-1]transform-setjames[R1-ipsec-ipv6-policy-isakmp-james-1]ike-profilejames[R1-ipsec-ipv6-policy-isakmp-james-1]remote-addressipv62::2[R1-ipsec-ipv6-policy-isakmp-james-1]quit[R1]ints1/0[R1-Serial1/0]ipsecapplyipv6-policyjames[R1-Serial1/0]quitR2:[R2]aclipv6advanced3000[R2-acl-ipv6-adv-3000]rule0permitipv6source3::/64destination1::/64[R2-acl-ipv6-adv-3000]quit[R2]ikeidentityfqdnr2[R2]ikeproposal1[R2-ike-proposal-1]quit[R2]ikekeychainjames[R2-ike-keychain-james]pre-shared-keyhostnamer1keysimplejames[R2-ike-keychain-james]quit[R2]ipsectransform-setjames[R2-ipsec-transform-set-james]protocolesp[R2-ipsec-transform-set-james]encapsulation-modetunnel[R2-ipsec-transform-set-james]espauthentication-algorithmmd5[R2-ipsec-transform-set-james]espencryption-algorithmdes-cbc[R2-ipsec-transform-set-james]quit[R2]ikeprofilejames[R2-ike-profile-james]keychainjames[R2-ike-profile-james]proposal1[R2-ike-profile-james]matchremoteidentityfqdnr1[R2-ike-profile-james]exchange-modeaggressive[R2-ike-profile-james]quit[R2]ipsecipv6-policy-templatejames1[R2-ipsec-ipv6-policy-template-james-1]securityaclipv63000[R2-ipsec-ipv6-policy-template-james-1]ike-profilejames[R2-ipsec-ipv6-policy-template-james-1]transform-setjames[R2-ipsec-ipv6-policy-template-james-1]quit[R2]ipsecipv6-policyjames1isakmptemplatejames[R2]ints1/0[R2-Serial1/0]ipsecapplyipv6-policyjames[R2-Serial1/0]quit第二階段測試:查看R1的IPSEC顯示信息:[Rl]disipsectunnelTunnelID:0Sta七口日:ActivePerfectforwardaecrecy:Inaidevpn-instanc已=S真SFI:QU^QUD^;230707375 [ESP]inbound: 2239B5553 [ESF]Tunnel:Localaddress:2;:1remoteaddress;2;;2Flow:souraddr:1::port:0prorecal:ipv6descaddr:3::port:0protocol:ipvft[Rl]查看R2的IPSEC顯示信息:[R2]disipsecipv6-policyIPsecEolxcy:jamesInterface:Seriall/OSequencenumber:1Mode:TemplacePolicytemplatename:james[R2]|[R2]dlsipsecipv6-policy-templaceIPsecPolicyTexnplare:jam.esSequencenumber:1TrafficFlowConfidentiality:DisabledSecuritydataflow:3000Selectormode:standardLocaladdress:IKEprofile:JamesIKEv2profile:Remoteaddress:Transformset:JamesIPsecSAlocalduration(timebased.):IPsecSAlocalduration(trafficbased):SAidletime![R2]|TOC\o"1-5"\h\z[RZjaisipsecuransrorm-seu ■IPsectransformsec:james HState:complete ■Encapsulationmode:tunnel ■ESN:Disabled HPFS: .Transform:ESP HESPprotocol:Integrity;MD5 .Encryption:DE5-CBC ■[R2]|[R2]disIpseqvurmelTunnelID;QSeamus:ActivePerfectCoryraxdsecrecy:Insidevpn-insvance:SA"5Sfl;outbound:2239S5SS3 {0x0cl59b±51} [ESP]inbound: 2907B7375 {0itll551D2f) [ESP]Tunnel:localaddress;2;;2remoEeaddress:2::1Flow:sour耳口口匚;3;:/6^port;;0prorocol:ipv-&desLaddr:1!:/6^portiQprotocol:ipv^[R2]|[R3]disikema匚口口nection-ID RemoteFlagDOI12::1Flags:RD―EtEADYRL--ELEPLACEDFD-FADING[R2]|RDRE-REKEVIF^ec物理機依然可以PING通SW1:\_IKbL*-!iL_2 S5B0O^-Mfl5-GE_3Q<SWl>tFefc2414:24:SS:5?-62□SOSW1SHELL;S/BEELLLOGIS:Censelalegged二血fzamccnO?<S?1><SW1><3W1><5wi>pmoIDVfi1:52Pijig6(5€da:凰bycGfl)3n2--->1:i2rpeens7TRLZtabre

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論