GRE隧道與IPsec的結(jié)合
在前面,我們講解過了關(guān)于采用積極模式并PSK的IPsec VPN配置和基于PSK的IPsec VPN配置的相關(guān)內(nèi)容,那么下面我們主要分析一下GRE和IPsec的相關(guān)內(nèi)容。GRE隧道本身不帶安全特性,可以通過結(jié)合基于PSK的IPsec來實(shí)現(xiàn)安全功能.拓?fù)淙缦?
1.R1基本配置:
- R1(config)#interface loopback0
- R1(config-if)#ip address 10.1.1.1 255.255.255.0
- R1(config-if)#no shutdown
- R1(config-if)#interface serial0/0
- R1(config-if)#ip address 192.168.1.1 255.255.255.252
- R1(config-if)#clock rate 56000
- R1(config-if)#no shutdown
- R1(config)#interface tunnel 0
- R1(config-if)#ip unnumbered serial0/0
- R1(config-if)#tunnel source serial0/0
- R1(config-if)#tunnel destination 192.168.1.1
- R1(config-if)#tunnel mode gre ip /---可以不打,默認(rèn)即為GRE---/
- R1(config-if)#no shutdown
- R1(config-if)#exit
2.定義感興趣流量與路由協(xié)議:
- R1(config)#access-list 100 permit gre host 192.168.1.1 host 192.168.1.2
- R1(config)#ip route 0.0.0.0 0.0.0.0 serial0/0
- R1(config)#ip route 10.2.2.0 255.255.255.0 serial0/0
3.全局啟用ISAKMP并定義對等體及其PSK(預(yù)共享密鑰):
- R1(config)#crypto isakmp enable
- R1(config)#crypto isakmp key 91lab address 192.168.1.2
4.定義IKE策略:
- R1(config)#crypto isakmp policy 10
- R1(config-isakmp)#encryption aes 128 /---默認(rèn)是DES加密---/
- R1(config-isakmp)#hash sha /---默認(rèn)是SHA-1---/
- R1(config-isakmp)#authentication pre-share
- R1(config-isakmp)#group 2 /---默認(rèn)是768位的DH1---/
- R1(config-isakmp)#lifetime 3600 /---默認(rèn)是86400秒---/
- R1(config-isakmp)#exit
5.定義IPSec轉(zhuǎn)換集(transform set):
- R1(config)#crypto ipsec transform-set tt esp-aes 128 esp-sha-hmac
- R1(cfg-crypto-trans)#mode tunnel
- R1(cfg-crypto-trans)#exit
6.定義crypto map并應(yīng)用在接口上:
- R1(config)#crypto map cisco 10 ipsec-isakmp
- R1(config-crypto-map)#match address 100
- R1(config-crypto-map)#set peer 192.168.1.2 /---定義要應(yīng)用crypto map的對等體地址---/
- R1(config-crypto-map)#set transform-set tt /---定義crypto map要應(yīng)用的IPsec轉(zhuǎn)換集---/
- R1(config-crypto-map)#exit
- R1(config)#interface serial0/0
- R1(config-if)#crypto map cisco
- *Mar 1 00:08:31.131: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
- R1(config-if)#end
- R1#
R1配置完成.
同理,R2相關(guān)配置如下:
- !
- !
- crypto isakmp policy 10
- encr aes
- authentication pre-share
- group 2
- crypto isakmp key 91lab address 192.168.1.1
- !
- !
- crypto ipsec transform-set tt esp-aes esp-sha-hmac
- !
- crypto map cisco 10 ipsec-isakmp
- set peer 192.168.1.1
- set transform-set tt
- match address 100
- !
- !
- !
- interface Tunnel0
- ip unnumbered Serial0/0
- tunnel source Serial0/0
- tunnel destination 192.168.1.1
- !
- interface Loopback0
- ip address 10.2.2.1 255.255.255.0
- !
- interface Serial0/0
- ip address 192.168.1.2 255.255.255.252
- crypto map cisco
- !
- ip route 0.0.0.0 0.0.0.0 Serial0/0
- !
- access-list 100 permit gre host 10.2.2.1 host 10.1.1.1
- !