本文共 5320 字,大约阅读时间需要 17 分钟。
-----对于路由器通过tunnel接口建立不需知道感兴趣流的L2L ***,配置反向路由注入觉得应该是没有作业的
----参照以前的博文:
A.基本配置:①FW1:----接口配置:interface Ethernet0 nameif Inside security-level 100 ip address 192.168.1.1 255.255.255.0 no shutinterface Ethernet1 nameif Outside security-level 0 ip address 202.100.1.1 255.255.255.0 no shut----路由配置:route Outside 0.0.0.0 0.0.0.0 202.100.1.10----策略配置:access-list OUTSIDE extended permit icmp any anyaccess-group OUTSIDE in interface Outside----PAT配置:access-list PAT extended permit ip 192.168.0.0 255.255.0.0 anyaccess-list NONAT extended permit ip 192.168.0.0 255.255.0.0 172.16.0.0 255.255.0.0global (Outside) 1 interfacenat (Inside) 0 access-list NONATnat (Inside) 1 access-list PAT②FW2:----接口配置:interface Ethernet0 nameif Inside security-level 100 ip address 172.16.1.1 255.255.255.0 no shutinterface Ethernet1 nameif Outside security-level 0 ip address 202.100.2.1 255.255.255.0 no shut----路由配置:route Outside 0.0.0.0 0.0.0.0 202.100.2.10----策略配置:access-list OUTSIDE extended permit icmp any anyaccess-group OUTSIDE in interface Outside----PAT配置:access-list PAT extended permit ip 172.16.0.0 255.255.0.0 anyaccess-list NONAT extended permit ip 172.16.0.0 255.255.0.0 192.168.0.0 255.255.0.0global (Outside) 1 interfacenat (Inside) 0 access-list NONATnat (Inside) 1 access-list PATB.***配置:①FW1:----第一阶段策略:crypto isakmp policy 10authentication pre-shareencryption 3deshash md5group 2tunnel-group 202.100.2.1 type ipsec-l2ltunnel-group 202.100.2.1 ipsec-attributespre-shared-key cisco----第二阶段转换集:crypto ipsec transform-set transet esp-des esp-md5-hmac----感兴趣流:access-list *** extended permit ip 192.168.0.0 255.255.0.0 172.16.0.0 255.255.0.0④配置crypto map并应用、在接口开启isakmp:crypto map crymap 20 match address ***crypto map crymap 20 set peer 202.100.2.1crypto map crymap 20 set transform-set transetcrypto map crymap interface Outsidecrypto isakmp enable Outside①FW2:----第一阶段策略:crypto isakmp policy 10authentication pre-shareencryption 3deshash md5group 2tunnel-group 202.100.1.1 type ipsec-l2ltunnel-group 202.100.1.1 ipsec-attributespre-shared-key cisco----第二阶段转换集:crypto ipsec transform-set transet esp-des esp-md5-hmac----感兴趣流:access-list *** extended permit ip 172.16.0.0 255.255.0.0 192.168.0.0 255.255.0.0 ④配置crypto map并应用、在接口开启isakmp:crypto map crymap 20 match address ***crypto map crymap 20 set peer 202.100.1.1crypto map crymap 20 set transform-set transetcrypto map crymap interface Outsidecrypto isakmp enable OutsideC.测试:①不用触发***,查看防火墙的outside接口路由,可以看到只有一条默认路由----因为没有配置反向路由注入FW1(config)# show route outside Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static routeGateway of last resort is 202.100.1.10 to network 0.0.0.0C 202.100.1.0 255.255.255.0 is directly connected, OutsideS* 0.0.0.0 0.0.0.0 [1/0] via 202.100.1.10, OutsideFW1(config)# ②增加反向路由注入配置,也不用触发***,可以看到outside多一条静态路由FW1(config)# crypto map crymap 20 set reverse-routeFW1(config)# show route outsideCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static routeGateway of last resort is 202.100.1.10 to network 0.0.0.0S 172.16.0.0 255.255.0.0 [1/0] via 202.100.1.10, OutsideC 202.100.1.0 255.255.255.0 is directly connected, OutsideS* 0.0.0.0 0.0.0.0 [1/0] via 202.100.1.10, Outside③修改感兴趣流的ACL,静态路由也跟着变化FW1(config)# access-list *** extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0FW1(config)# show route outsideCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static routeGateway of last resort is 202.100.1.10 to network 0.0.0.0S 172.16.0.0 255.255.0.0 [1/0] via 202.100.1.10, OutsideS 172.16.1.0 255.255.255.0 [1/0] via 202.100.1.10, OutsideC 202.100.1.0 255.255.255.0 is directly connected, OutsideS* 0.0.0.0 0.0.0.0 [1/0] via 202.100.1.10, Outside----原有的感兴趣流没有删除,只是增加了一条更详细的ACL,静态路由也增加了一条更详细的路由----由此可见,反向路由注入的条目只是的感兴趣流的目标网络有关,并且与是否触发***也没有关系
转载地址:http://dxjal.baihongyu.com/