天天看點

華為使用GRE隧道跨越Internet互動OSPF路由資訊

  • 網絡拓撲圖
華為使用GRE隧道跨越Internet互動OSPF路由資訊

網絡拓撲圖

  • 組網需求

BJ_FW和SD_FW通過Internet相連,倆者公網路由可達。總部和分部都有私有的IP網絡,内部部署了OSPF動态路由。通過在倆台FW之間建立GRE隧道實作倆個私有IP網絡跨越Internet互動OSPF路由資訊

  • 配置思路
  1. BJ_FW和SD_FW分别建立一個Tunnel接口。
  2. 在Tunnel接口中指定隧道的源IP位址和目的IP等封裝參數。
  3. 配置OSPF動态路由。
  4. 啟用一個OSPF程序,指定運作OSPF協定的接口。隧道各端Tunnel接口通過GRE隧道建立起鄰接關系。
  5. 配置安全政策,允許GRE隧道的建立和流量的轉發。
  • 操作步驟
  • 配置internet裝置

a)配置接口的IP位址

[internet]inter g4/0/0
[internet-GigabitEthernet4/0/0]ip add 1.1.1.1 29
[internet-GigabitEthernet4/0/0]quit
[internet]inter g4/0/1
[internet-GigabitEthernet4/0/1]ip add 2.2.2.1 29
[internet-GigabitEthernet4/0/1]quit
[internet]inter loopb0
[internet-LoopBack0]ip add 5.5.5.5 32
[internet-LoopBack0]quit           
  • 配置BJ_FW裝置

a)配置接口IP位址

[BJ_FW]inter g1/0/0
[BJ_FW-GigabitEthernet1/0/0]ip add 1.1.1.2 29
[BJ_FW-GigabitEthernet1/0/0]service-manage  ping per
[BJ_FW-GigabitEthernet1/0/0]quit
[BJ_FW]inter g1/0/6
[BJ_FW-GigabitEthernet1/0/6]ip add 10.1.1.1 24
[BJ_FW-GigabitEthernet1/0/6]service-manage  ping per
[BJ_FW-GigabitEthernet1/0/6]
[BJ_FW-GigabitEthernet1/0/6]quit
[BJ_FW]inter loopb0
[BJ_FW-LoopBack0]ip add 50.50.50.1 32
[BJ_FW-LoopBack0]quit
[BJ_FW]inter Tunnel 1
[BJ_FW-Tunnel1]ip add 172.16.1.1 29
[BJ_FW-Tunnel1]quit           

b)将接口加入安全區域

[BJ_FW]firewall zone untrust 
[BJ_FW-zone-untrust]add inter g1/0/0
[BJ_FW-zone-untrust]quit
[BJ_FW]firewall zone trust 
[BJ_FW-zone-trust]add inter g1/0/6
[BJ_FW-zone-trust]quit
[BJ_FW]firewall zone dmz
[BJ_FW-zone-dmz]add inter Tunnel 1
[BJ_FW-zone-dmz]quit           

c)配置OSPF路由

将北京的私網網段和Tunnel接口對應的網段172.16.1.0/24通過OSPF釋出出去

[BJ_FW]ospf 1 router-id 50.50.50.1
[BJ_FW-ospf-1]area 0
[BJ_FW-ospf-1-area-0.0.0.0]net 172.16.1.0 0.0.0.255
[BJ_FW-ospf-1-area-0.0.0.0]net 10.1.1.0 0.0.0.255
[BJ_FW-ospf-1-area-0.0.0.0]net 50.50.50.1 0.0.0.0
[BJ_FW-ospf-1-area-0.0.0.0]quit           

d)配置Tunnel接口的封裝參數

[BJ_FW]inter Tunnel 1
[BJ_FW-Tunnel1]tunnel-protocol gre
[BJ_FW-Tunnel1]source 1.1.1.2
[BJ_FW-Tunnel1]destination 2.2.2.2
[BJ_FW-Tunnel1]gre key cipher 123456789
[BJ_FW-Tunnel1]keepalive
[BJ_FW-Tunnel1]quit           

e)配置域間安全政策

配置Trust域和DMZ的域間安全政策,允許封裝前的封包通過域間安全政策

[BJ_FW-policy-security]rule name policy1
[BJ_FW-policy-security-rule-policy1]source-zone trust dmz
[BJ_FW-policy-security-rule-policy1]destination-zone dmz trust
[BJ_FW-policy-security-rule-policy1]act per
[BJ_FW-policy-security-rule-policy1]quit           

配置Local和Untrust的域間安全政策,允許封裝後的GRE封包通過域間安全政策

[BJ_FW-policy-security]rule name policy2
[BJ_FW-policy-security-rule-policy2]source-zone local untrust
[BJ_FW-policy-security-rule-policy2]destination-zone untrust local
[BJ_FW-policy-security-rule-policy2]service gre
[BJ_FW-policy-security-rule-policy2]act per
[BJ_FW-policy-security-rule-policy2]quit           

配置trust和Untrust的域間安全政策,允許内部網絡通路網際網路

BJ_FW-policy-security]rule name policy3
[BJ_FW-policy-security-rule-policy3]source-zone trust
[BJ_FW-policy-security-rule-policy3]destination-zone untrust
[BJ_FW-policy-security-rule-policy3]source-address 10.1.1.0 24
[BJ_FW-policy-security-rule-policy3]source-address 10.1.2.0 24
[BJ_FW-policy-security-rule-policy3]source-address 10.1.3.0 24
[BJ_FW-policy-security-rule-policy3]quit           

配置nat,私網IP轉換出口IP通路網際網路

[BJ_FW-policy-nat]rule name policy_nat1
[BJ_FW-policy-nat-rule-policy_nat1]source-zone trust
[BJ_FW-policy-nat-rule-policy_nat1]destination-zone untrust
[BJ_FW-policy-nat-rule-policy_nat1]source-address 10.1.1.0 24
[BJ_FW-policy-nat-rule-policy_nat1]source-address 10.1.2.0 24
[BJ_FW-policy-nat-rule-policy_nat1]source-address 10.1.3.0 24
[BJ_FW-policy-nat-rule-policy_nat1]act source-nat easy-ip
[BJ_FW-policy-nat-rule-policy_nat1]quit           

f)配置預設路由

[BJ_FW]ip route-static 0.0.0.0 0.0.0.0 g1/0/0 1.1.1.1           
  • 配置BJ_Core裝置

a)建立vlan将接口加入相應vlan,并配置接口的IP位址

[BJ_Core]vlan b 100 200 300
[BJ_Core]inter g0/0/24
[BJ_Core-GigabitEthernet0/0/24]port link-ty ac
[BJ_Core-GigabitEthernet0/0/24]port de vlan 100
[BJ_Core-GigabitEthernet0/0/24]quit
[BJ_Core]inter g0/0/10
[BJ_Core-GigabitEthernet0/0/10]port link-ty ac
[BJ_Core-GigabitEthernet0/0/10]port de vlan 100
[BJ_Core-GigabitEthernet0/0/10]quit
[BJ_Core]inter g0/0/1
[BJ_Core-GigabitEthernet0/0/1]port link-ty ac
[BJ_Core-GigabitEthernet0/0/1]port de vlan 200
[BJ_Core]inter g0/0/2
[BJ_Core-GigabitEthernet0/0/2]port link-ty ac
[BJ_Core-GigabitEthernet0/0/2]port de vlan 300
[BJ_Core-GigabitEthernet0/0/2]quit
[BJ_Core]inter vlan 100
[BJ_Core-Vlanif100]ip add 10.1.1.254 24
[BJ_Core-Vlanif100]quit
[BJ_Core]inter vlan 200
[BJ_Core-Vlanif200]ip add 10.1.2.254 24
[BJ_Core-Vlanif200]quit
[BJ_Core]inter vlan 300
[BJ_Core-Vlanif300]ip add 10.1.3.254 24
[BJ_Core-Vlanif300]quit
[BJ_Core]inter loopb0
[BJ_Core-LoopBack0]ip add 50.50.50.2 32
[BJ_Core-LoopBack0]quit           

b)配置預設路由

[BJ_Core]ip route-static 0.0.0.0 0.0.0.0 Vlanif 100 10.1.1.1           

c)配置OSPF路由

[BJ_Core]ospf 1 router-id 50.50.50.2
[BJ_Core-ospf-1]area 0
[BJ_Core-ospf-1-area-0.0.0.0]net 50.50.50.2 0.0.0.0
[BJ_Core-ospf-1-area-0.0.0.0]net 10.1.1.0 0.0.0.255
[BJ_Core-ospf-1-area-0.0.0.0]net 10.1.2.0 0.0.0.255
[BJ_Core-ospf-1-area-0.0.0.0]net 10.1.3.0 0.0.0.255
[BJ_Core-ospf-1-area-0.0.0.0]quit           
  • 配置SD_FW裝置

a)配置接口IP位址

[SD_FW]inter g1/0/0
[SD_FW-GigabitEthernet1/0/0]ip add 2.2.2.2 29
[SD_FW-GigabitEthernet1/0/0]service-manage  ping per
[SD_FW-GigabitEthernet1/0/0]quit
[SD_FW]inter g1/0/6
[SD_FW-GigabitEthernet1/0/6]ip add 10.2.1.1 24
[SD_FW-GigabitEthernet1/0/6]service-manage  ping per
[SD_FW-GigabitEthernet1/0/6]
[SD_FW-GigabitEthernet1/0/6]quit
[SD_FW]inter loopb0
[SD_FW-LoopBack0]ip add 50.50.60.1 32
[SD_FW-LoopBack0]quit
[SD_FW]inter Tunnel 1
[SD_FW-Tunnel1]ip add 172.16.1.2 29
[SD_FW-Tunnel1]quit           

b)将接口加入安全區域

[SD_FW]firewall zone untrust 
[SD_FW-zone-untrust]add inter g1/0/0
[SD_FW-zone-untrust]quit
[SD_FW]firewall zone trust 
[SD_FW-zone-trust]add inter g1/0/6
[SD_FW-zone-trust]quit
[SD_FW]firewall zone dmz
[SD_FW-zone-dmz]add inter Tunnel 1
[SD_FW-zone-dmz]quit           

c)配置OSPF路由

将山東的私網網段和Tunnel接口對應的網段172.16.1.0/24通過OSPF釋出出去

[SD_FW]ospf 1 router-id 50.50.60.1
[SD_FW-ospf-1]area 0
[SD_FW-ospf-1-area-0.0.0.0]net 172.16.1.0 0.0.0.255
[SD_FW-ospf-1-area-0.0.0.0]net 10.2.1.0 0.0.0.255
[SD_FW-ospf-1-area-0.0.0.0]net 50.50.60.1 0.0.0.0
[SD_FW-ospf-1-area-0.0.0.0]quit           

d)配置Tunnel接口的封裝參數

[SD_FW]inter Tunnel 1
[SD_FW-Tunnel1]tunnel-protocol gre
[SD_FW-Tunnel1]source 2.2.2.2
[SD_FW-Tunnel1]destination 1.1.1.2
[SD_FW-Tunnel1]gre key cipher 123456789
[SD_FW-Tunnel1]keepalive
[SD_FW-Tunnel1]quit           

e)配置域間安全政策

配置Trust域和DMZ的域間安全政策,允許封裝前的封包通過域間安全政策

[SD_FW-policy-security]rule name policy1
[SD_FW-policy-security-rule-policy1]source-zone trust dmz
[SD_FW-policy-security-rule-policy1]destination-zone dmz trust
[SD_FW-policy-security-rule-policy1]act per
[SD_FW-policy-security-rule-policy1]quit           

配置Local和Untrust的域間安全政策,允許封裝後的GRE封包通過域間安全政策

[SD_FW-policy-security]rule name policy2
[SD_FW-policy-security-rule-policy2]source-zone local untrust
[SD_FW-policy-security-rule-policy2]destination-zone untrust local
[SD_FW-policy-security-rule-policy2]service gre
[SD_FW-policy-security-rule-policy2]act per
[SD_FW-policy-security-rule-policy2]quit           

配置trust和Untrust的域間安全政策,允許内部網絡通路網際網路

[SD_FW-policy-security]rule name policy3
[SD_FW-policy-security-rule-policy3]source-zone trust
[SD_FW-policy-security-rule-policy3]destination-zone untrust
[SD_FW-policy-security-rule-policy3]source-address 10.2.1.0 24
[SD_FW-policy-security-rule-policy3]source-address 10.2.2.0 24
[SD_FW-policy-security-rule-policy3]source-address 10.2.3.0 24
[SD_FW-policy-security-rule-policy3]quit           

配置nat,私網IP轉換出口IP通路網際網路

[SD_FW-policy-nat]rule name policy_nat1
[SD_FW-policy-nat-rule-policy_nat1]source-zone trust
[SD_FW-policy-nat-rule-policy_nat1]destination-zone untrust
[SD_FW-policy-nat-rule-policy_nat1]source-address 10.2.1.0 24
[SD_FW-policy-nat-rule-policy_nat1]source-address 10.2.2.0 24
[SD_FW-policy-nat-rule-policy_nat1]source-address 10.2.3.0 24
[SD_FW-policy-nat-rule-policy_nat1]act source-nat easy-ip
[SD_FW-policy-nat-rule-policy_nat1]quit           

f)配置預設路由

[BJ_FW]ip route-static 0.0.0.0 0.0.0.0 g1/0/0 2.2.2.1           
  • 配置SD_Core裝置

a)建立vlan将接口加入相應vlan,并配置接口的IP位址

[SD_Core]vlan b 100 200 300
[SD_Core]inter g0/0/24
[SD_Core-GigabitEthernet0/0/24]port link-ty ac
[SD_Core-GigabitEthernet0/0/24]port de vlan 100
[SD_Core-GigabitEthernet0/0/24]quit
[SD_Core]inter g0/0/10
[SD_Core-GigabitEthernet0/0/10]port link-ty ac
[SD_Core-GigabitEthernet0/0/10]port de vlan 100
[SD_Core-GigabitEthernet0/0/10]quit
[SD_Core]inter g0/0/1
[SD_Core-GigabitEthernet0/0/1]port link-ty ac
[SD_Core-GigabitEthernet0/0/1]port de vlan 200
[SD_Core]inter g0/0/2
[SD_Core-GigabitEthernet0/0/2]port link-ty ac
[SD_Core-GigabitEthernet0/0/2]port de vlan 300
[SD_Core-GigabitEthernet0/0/2]quit
[SD_Core]inter vlan 100
[SD_Core-Vlanif100]ip add 10.2.1.254 24
[SD_Core-Vlanif100]quit
[SD_Core]inter vlan 200
[SD_Core-Vlanif200]ip add 10.2.2.254 24
[SD_Core-Vlanif200]quit
[SD_Core]inter vlan 300
[SD_Core-Vlanif300]ip add 10.2.3.254 24
[SD_Core-Vlanif300]quit
[SD_Core]inter loopb0
[SD_Core-LoopBack0]ip add 50.50.60.2 32
[SD_Core-LoopBack0]quit           

b)配置預設路由

[SD_Core]ip route-static 0.0.0.0 0.0.0.0 Vlanif 100 10.2.1.1           

c)配置OSPF路由

[SD_Core]ospf 1 router-id 50.50.60.2
[SD_Core-ospf-1]area 0
[SD_Core-ospf-1-area-0.0.0.0]net 50.50.60.2 0.0.0.0
[SD_Core-ospf-1-area-0.0.0.0]net 10.2.1.0 0.0.0.255
[SD_Core-ospf-1-area-0.0.0.0]net 10.2.2.0 0.0.0.255
[SD_Core-ospf-1-area-0.0.0.0]net 10.2.3.0 0.0.0.255
[SD_Core-ospf-1-area-0.0.0.0]quit           
  • 結果驗證

a)BJ_PC1和SD_PC2能夠互相ping通

華為使用GRE隧道跨越Internet互動OSPF路由資訊

北京PC能夠和山東PC互相ping通

b)SD_PC1和BJ_PC2能夠互相ping通

華為使用GRE隧道跨越Internet互動OSPF路由資訊

山東PC能夠和北京PC互相ping通

c)在BJ_FW使用display ip routing-table指令檢視路由表,可以看到山東内網私有網段出口為Tunnel 1

<BJ_FW>dis ip routing-table 
2022-11-26 10:41:07.380 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
         Destinations : 18       Routes : 18       

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0           D   1.1.1.1                GigabitEthernet1/0/0
        1.1.1.0/29  Direct  0    0           D   1.1.1.2               GigabitEthernet1/0/0
        1.1.1.2/32  Direct  0    0           D   127.0.0.1           GigabitEthernet1/0/0
       10.1.1.0/24  Direct  0    0           D   10.1.1.1            GigabitEthernet1/0/6
       10.1.1.1/32  Direct  0    0           D   127.0.0.1          GigabitEthernet1/0/6
       10.1.2.0/24  OSPF    10   2           D   10.1.1.254      GigabitEthernet1/0/6
       10.1.3.0/24  OSPF    10   2           D   10.1.1.254      GigabitEthernet1/0/6
       10.2.1.0/24  OSPF    10   1563        D   172.16.1.2      Tunnel1
       10.2.2.0/24  OSPF    10   1564        D   172.16.1.2      Tunnel1
       10.2.3.0/24  OSPF    10   1564        D   172.16.1.2      Tunnel1
     50.50.50.1/32  Direct  0    0           D   127.0.0.1         LoopBack0
     50.50.50.2/32  OSPF    10   1           D   10.1.1.254      GigabitEthernet1/0/6
     50.50.60.1/32  OSPF    10   1562        D   172.16.1.2      Tunnel1
     50.50.60.2/32  OSPF    10   1563        D   172.16.1.2      Tunnel1
      127.0.0.0/8   Direct  0    0           D   127.0.0.1           InLoopBack0
      127.0.0.1/32  Direct  0    0           D   127.0.0.1          InLoopBack0
     172.16.1.0/29  Direct  0    0           D   172.16.1.1      Tunnel1
     172.16.1.1/32  Direct  0    0           D   127.0.0.1       Tunnel1           

d)在SD_FW使用display ip routing-table指令檢視路由表,可以看到北京内網私有網段出口為Tunnel 1

<SD_FW>dis ip routing-table 
2022-11-26 10:46:12.610 
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
         Destinations : 18       Routes : 18       

Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface

        0.0.0.0/0   Static  60   0           D   2.2.2.1         GigabitEthernet1/0/0
        2.2.2.0/29  Direct  0    0           D   2.2.2.2         GigabitEthernet1/0/0
        2.2.2.2/32  Direct  0    0           D   127.0.0.1       GigabitEthernet1/0/0
       10.1.1.0/24  OSPF    10   1563        D   172.16.1.1      Tunnel1
       10.1.2.0/24  OSPF    10   1564        D   172.16.1.1      Tunnel1
       10.1.3.0/24  OSPF    10   1564        D   172.16.1.1      Tunnel1
       10.2.1.0/24  Direct  0    0           D   10.2.1.1        GigabitEthernet1/0/6
       10.2.1.1/32  Direct  0    0           D   127.0.0.1       GigabitEthernet1/0/6
       10.2.2.0/24  OSPF    10   2           D   10.2.1.254      GigabitEthernet1/0/6
       10.2.3.0/24  OSPF    10   2           D   10.2.1.254      GigabitEthernet1/0/6
     50.50.50.1/32  OSPF    10   1562        D   172.16.1.1      Tunnel1
     50.50.50.2/32  OSPF    10   1563        D   172.16.1.1      Tunnel1
     50.50.60.1/32  Direct  0    0           D   127.0.0.1       LoopBack0
     50.50.60.2/32  OSPF    10   1           D   10.2.1.254      GigabitEthernet1/0/6
      127.0.0.0/8   Direct  0    0           D   127.0.0.1       InLoopBack0
      127.0.0.1/32  Direct  0    0           D   127.0.0.1       InLoopBack0
     172.16.1.0/29  Direct  0    0           D   172.16.1.2      Tunnel1
     172.16.1.2/32  Direct  0    0           D   127.0.0.1       Tunnel1           

繼續閱讀