一、實(shí)驗(yàn)要求
1. 總部需要通過VPN與分支和合作伙伴進(jìn)行通信
1)WEB服務(wù)器對外提供的IP地址為69.1.1.100
2)FW部署Easy-ip實(shí)現(xiàn)訪問公網(wǎng)FTP服務(wù)
2. 分支機(jī)構(gòu)(Branch)員工使用NGFW接入總部。要求實(shí)現(xiàn)分支機(jī)構(gòu)安全訪問IPSec保護(hù)的總部內(nèi)網(wǎng)服務(wù)器。
1)手工方式建立IPSec隧道需要手工配置各項(xiàng)參數(shù):
2)安全參數(shù)索引,使用ESP協(xié)議的安全聯(lián)盟的參數(shù)
a)入方向安全聯(lián)盟的SPI為11111
b)出方向安全聯(lián)盟的SPI為11111。
3)安全聯(lián)盟的認(rèn)證密鑰,使用ESP協(xié)議的安全聯(lián)盟的參數(shù),
a)入方向安全聯(lián)盟的認(rèn)證密鑰為字符串12345;
b)出方向安全聯(lián)盟的認(rèn)證密鑰為字符串12345
4)FW部署Easy-ip實(shí)現(xiàn)訪問公網(wǎng)client4(ping)
3. 合作伙伴(Partner)使用NGFW接入總部。要求實(shí)訓(xùn)合作伙伴通過GRE隧道與總部進(jìn)行通信。
1)地址要求:隧道IP地址范圍為172.16.12.0/24
2)FW部署部署Easy-ip實(shí)現(xiàn)訪問公網(wǎng)FTP服務(wù)
4. 所有的客戶端可以通過公網(wǎng)IP地址來訪問WEB服務(wù)器
注:所有的通信使用靜態(tài)路由來保證。
二、實(shí)驗(yàn)拓補(bǔ)
三、實(shí)驗(yàn)配置
1. 防火墻安全區(qū)域劃分(包括Tunnel接口)
HQ:
trust
priority is 85
interface of the zone is (2):
GigabitEthernet1/0/0
#
untrust
priority is 5
interface of the zone is (3):
GigabitEthernet1/0/2
GigabitEthernet1/0/3
Tunnel1
#
dmz
priority is 50
interface of the zone is (1):
GigabitEthernet1/0/1
Partner
trust
priority is 85
interface of the zone is (2):
GigabitEthernet1/0/0
#
untrust
priority is 5
interface of the zone is (2):
GigabitEthernet1/0/1
Tunnel1
Branch
trust
priority is 85
interface of the zone is (2):
GigabitEthernet1/0/0
#
untrust
priority is 5
interface of the zone is (1):
GigabitEthernet1/0/1
2. 靜態(tài)路由
HQ
ip route-static 0.0.0.0 0.0.0.0 69.1.1.2
ip route-static 0.0.0.0 0.0.0.0 68.1.1.2
ip route-static 10.1.10.0 255.255.255.0 Tunnel1
ip route-static 10.1.20.0 255.255.255.0 68.1.1.2
ip route-static 111.1.1.0 255.255.255.0 69.1.1.2
ip route-static 112.1.1.0 255.255.255.0 68.1.1.2
注:其實(shí)一般公網(wǎng)環(huán)境使用缺省即可,兩條訪問111.1.1.0 & 112.1.1.0的靜態(tài)路由是為了流量能夠正常在公網(wǎng)同行;同時兩條訪問10.1.10.0 & 10.1.20.0的靜態(tài)路由是為了指引訪問這兩個網(wǎng)段的流量怎么使用VPN穿越公網(wǎng)
Partner
ip route-static 0.0.0.0 0.0.0.0 111.1.1.2
ip route-static 10.1.1.0 255.255.255.0 Tunnel1
ip route-static 69.1.1.0 255.255.255.0 111.1.1.2
注:其實(shí)一般公網(wǎng)環(huán)境使用缺省即可,一條訪問69.1.1.0的靜態(tài)路由是為了流量能夠正常在公網(wǎng)同行;另外一條訪問10.1.1.0 的靜態(tài)路由是為了指引訪問這個網(wǎng)段的流量怎么使用VPN穿越公網(wǎng)
Branch
ip route-static 0.0.0.0 0.0.0.0 112.1.1.2
ip route-static 10.1.1.0 255.255.255.0 112.1.1.2
ip route-static 68.1.1.0 255.255.255.0 112.1.1.2
注:其實(shí)一般公網(wǎng)環(huán)境使用缺省即可,一條訪問68.1.1.0的靜態(tài)路由是為了流量能夠正常在公網(wǎng)同行;另外一條訪問10.1.1.0 的靜態(tài)路由是為了指引訪問這個網(wǎng)段的流量怎么使用VPN穿越公網(wǎng)
3. GRE配置
HQ
interface Tunnel1
ip address 172.16.12.1 255.255.255.0
tunnel-protocol gre
source 69.1.1.1
destination 111.1.1.1
Partner
interface Tunnel1
ip address 172.16.12.2 255.255.255.0
tunnel-protocol gre
source 111.1.1.1
destination 69.1.1.1
4. IPSec VPN配置
HQ
acl number 3000
rule 5 permit ip source 10.1.1.1 0 destination 10.1.20.1 0
#
ipsec policy map 10 manual
security acl 3000
proposal 10
tunnel local 68.1.1.1
tunnel remote 112.1.1.1
sa spi inbound esp 11111
sa string-key inbound esp 12345
sa spi outbound esp 11111
sa string-key outbound esp 12345
#
interface GigabitEthernet1/0/3
ipsec policy map
Branch
acl number 3000
rule 5 permit ip source 10.1.20.1 0 destination 10.1.1.1 0
#
ipsec proposal 10
esp authentication-algorithm sha2-256
esp encryption-algorithm aes-256
#
ipsec policy map 10 manual
security acl 3000
proposal 10
tunnel local 112.1.1.1
tunnel remote 68.1.1.1
sa spi inbound esp 11111
sa string-key inbound esp 12345
sa spi outbound esp 11111
sa string-key outbound esp 12345
interface GigabitEthernet1/0/1
ipsec policy map
5. Easy-ip配置
HQ
nat-policy
rule name easy-ip
source-zone trust
egress-interface GigabitEthernet1/0/2
source-address 10.1.1.1 mask 255.255.255.255
action source-nat easy-ip
Partner:
nat-policy
rule name easy-ip
source-zone trust
egress-interface GigabitEthernet1/0/1
source-address 10.1.10.1 mask 255.255.255.255
action source-nat easy-ip
Branch
nat-policy
rule name easy-ip
source-zone trust
egress-interface GigabitEthernet1/0/1
source-address 10.1.20.1 mask 255.255.255.255
action source-nat easy-ip
6. NAT Server配置
HQ
nat server http protocol tcp global 69.1.1.100 www inside 10.1.2.1 www
7. 安全策略配置
HQ
security-policy
rule name gre
source-zone local
source-zone untrust
destination-zone local
destination-zone untrust
service gre
action permit
rule name icmpv4_C3-C1
source-zone trust
source-zone untrust
destination-zone trust
destination-zone untrust
source-address 10.1.1.1 mask 255.255.255.255
source-address 10.1.10.1 mask 255.255.255.255
destination-address 10.1.1.1 mask 255.255.255.255
destination-address 10.1.10.1 mask 255.255.255.255
service icmp
action permit
rule name esp
source-zone local
source-zone untrust
destination-zone local
destination-zone untrust
service esp
action permit
rule name icmpv4_C3-C2
source-zone trust
source-zone untrust
destination-zone trust
destination-zone untrust
source-address 10.1.1.1 mask 255.255.255.255
source-address 10.1.20.1 mask 255.255.255.255
destination-address 10.1.1.1 mask 255.255.255.255
destination-address 10.1.20.1 mask 255.255.255.255
service icmp
action permit
rule name allC-web
source-zone trust
source-zone untrust
destination-zone dmz
source-address 10.1.1.1 mask 255.255.255.255
source-address 111.1.1.1 mask 255.255.255.255
source-address 112.1.1.1 mask 255.255.255.255
source-address 8.8.8.8 mask 255.255.255.255
destination-address 10.1.2.1 mask 255.255.255.255
destination-address 69.1.1.100 mask 255.255.255.255
service http
service icmp
action permit
rule name C3-FTP
source-zone trust
destination-zone untrust
source-address 10.1.1.1 mask 255.255.255.255
destination-address 7.7.7.7 mask 255.255.255.255
service ftp
service icmp
action permit
Partner
security-policy
rule name gre
source-zone local
source-zone untrust
destination-zone local
destination-zone untrust
service gre
action permit
rule name icmpv4
source-zone trust
source-zone untrust
destination-zone trust
destination-zone untrust
source-address 10.1.1.1 mask 255.255.255.255
source-address 10.1.10.1 mask 255.255.255.255
destination-address 10.1.1.1 mask 255.255.255.255
destination-address 10.1.10.1 mask 255.255.255.255
service icmp
action permit
rule name C1-FTP
source-zone trust
destination-zone untrust
source-address 10.1.10.1 mask 255.255.255.255
destination-address 7.7.7.7 mask 255.255.255.255
service ftp
service icmp
action permit
rule name C1-web
source-zone trust
destination-zone untrust
source-address 10.1.10.1 mask 255.255.255.255
source-address 69.1.1.100 mask 255.255.255.255
destination-address 10.1.10.1 mask 255.255.255.255
destination-address 69.1.1.100 mask 255.255.255.255
service http
action permit
Branch
security-policy
rule name esp
source-zone local
source-zone untrust
destination-zone local
destination-zone untrust
service esp
action permit
rule name icmpv4_C3-C2
source-zone trust
source-zone untrust
destination-zone trust
destination-zone untrust
source-address 10.1.1.1 mask 255.255.255.255
source-address 10.1.20.1 mask 255.255.255.255
destination-address 10.1.1.1 mask 255.255.255.255
destination-address 10.1.20.1 mask 255.255.255.255
service icmp
action permit
rule name C2-C4
source-zone trust
source-zone untrust
destination-zone trust
destination-zone untrust
source-address 10.1.20.1 mask 255.255.255.255
source-address 8.8.8.8 mask 255.255.255.255
destination-address 10.1.20.1 mask 255.255.255.255
destination-address 8.8.8.8 mask 255.255.255.255
service icmp
action permit
rule name C2-web
source-zone trust
destination-zone untrust
source-address 10.1.20.1 mask 255.255.255.255
destination-address 69.1.1.100 mask 255.255.255.255
service http
action permit
四、驗(yàn)證結(jié)果(截圖)
1. client3訪問FTP服務(wù)器
注:此為FTP服務(wù)器設(shè)置
注:客戶端Client3成功訪問FTP服務(wù)器的截圖
注:通過抓包抓取FTP的流量(篩選ftp),可以看到有多個ftp的包,點(diǎn)開其中一個流量,可以清晰看到有ftp的封裝。
2. client1訪問FTP服務(wù)器
== 注:此為FTP服務(wù)器設(shè)置==
注:客戶端Client1成功訪問FTP服務(wù)器的截圖
注:通過抓包抓取FTP的流量(篩選ftp),可以看到有多個ftp的包,點(diǎn)開其中一個流量,可以清晰看到有ftp的封裝。
3. client2訪問client4
注:client2通過缺省訪問client4(ping五個包)
注:通過抓包抓取icmp的流量(篩選icmp),可以看到有10個icmp的包(數(shù)據(jù)通信是雙向的,一去一回共10個包),點(diǎn)開其中一個流量,可以清晰看到有icmp的封裝。
4. GRE隧道驗(yàn)證
注:client3通過GRE ping client1五個包
注:通過抓包抓取gre的流量(篩選gre),可以看到有10個gre的包(數(shù)據(jù)通信是雙向的,一去一回共10個包),點(diǎn)開其中一個流量,可以清晰看到有GRE的封裝。
5. IPSec隧道驗(yàn)證
注:client3通過IPsec ping client1五個包
注:通過抓包抓取esp(IPSec加密)的流量(篩選esp),可以看到有10個esp的包(數(shù)據(jù)通信是雙向的,一去一回共10個包),點(diǎn)開其中一個流量,可以清晰看到有esp的封裝。
6. 所有客戶端訪問WEB服務(wù)器驗(yàn)證
注:此為WEB服務(wù)器設(shè)置
注:以上四張圖為各客戶端(Client1、Client2、Client3、Client4)成功訪問WEB服務(wù)器的截圖文章來源:http://www.zghlxwxcb.cn/news/detail-404347.html
Client2:
Client1:
Client4:
Client3:
注:通過抓包抓取tcp(http)的流量(篩選tcp),可以看到有10個tcp的包(數(shù)據(jù)通信是雙向的,一去一回共10個包),點(diǎn)開其中一個流量,可以清晰看到有tcp的封裝(點(diǎn)開可以清晰看到http服務(wù))。文章來源地址http://www.zghlxwxcb.cn/news/detail-404347.html
到了這里,關(guān)于ENSP防火墻綜合實(shí)驗(yàn)(GRE、IPSec、NAT通信)【防火墻安全策略】的文章就介紹完了。如果您還想了解更多內(nèi)容,請?jiān)谟疑辖撬阉鱐OY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!