强叔侃墙______第5章_GRE L2TP VPN

5.2.2 配置GRE基本参数


GRE   隧道的配置也很简单,可以分为两个步骤。

1.配置Tunnel接口

在FW_A 上配置Tunel接口的封装参数。

interface Tunnel1
 description 2.2.2.2
 ip address 10.1.1.1 255.255.255.0
 tunnel-protocol gre
 source 1.1.1.1
firewall zone dmz
 set priority 50
 add interface Tunnel1
#

在FW_A将Tunnel接口加入安全区域。Tunnel接口可以加入到任意一个安全区域中,这里我们把Tunnel接口加入到DMZ区域
firewall zone dmz
 set priority 50
 add interface Tunnel1
#

在FW_B上配置Tunnel接口的封闭参数。

interface Tunnel1
 ip address 10.1.1.2 255.255.255.0
 tunnel-protocol gre
 source 2.2.2.2
 destination 1.1.1.1
#

在FW_B上将Tunnel接口加往前安全区域。同样,我们把 Tunnel接口加入 到DMZ区域。

firewall zone dmz
 set priority 50
 add interface Tunnel1

 2.配置路由,把需要进行GRE封装的报文引导至Tunnel接口

(1)静态路由

在FW_A上配置静态路由,将去往总部私网的路由的下一跳设置为Tunnel接口。

[FW_A]ip route-static 192.168.2.0 24 Tunnel 1

在FW_B上配置静态路由,将去往分支机构私网的路由的下一跳设置为Tunnel操。

[FW_B]ip route-static 192.168.1.0 24 Tunnel 1

ENSP配置实例:

防火墙使用USG6000V



FW_1配置

#
interface GigabitEthernet0/0/0
 undo shutdown
 ip binding vpn-instance default
 ip address 192.168.0.1 255.255.255.0
 service-manage http permit
 service-manage https permit
 service-manage ping permit
 service-manage ssh permit
 service-manage snmp permit
 service-manage telnet permit
 service-manage netconf permit
#
interface GigabitEthernet1/0/0
 undo shutdown
 ip address 1.1.1.1 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/1
 undo shutdown
 ip address 192.168.1.1 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/2
 undo shutdown
#
interface GigabitEthernet1/0/3
 undo shutdown
#
interface GigabitEthernet1/0/4
 undo shutdown
#
interface GigabitEthernet1/0/5
 undo shutdown
#
interface GigabitEthernet1/0/6
 undo shutdown
#
interface Virtual-if0
#
interface NULL0
#
interface Tunnel1
 ip address 10.1.1.1 255.255.255.0
 tunnel-protocol gre
 source 1.1.1.1
 destination 1.1.1.2
#
firewall zone local
 set priority 100
#
firewall zone trust
 set priority 85
 add interface GigabitEthernet0/0/0
 add interface GigabitEthernet1/0/1
 add interface Tunnel1
#
firewall zone untrust
 set priority 5
 add interface GigabitEthernet1/0/0
#
firewall zone dmz
 set priority 50
#
l2tp-group default-lns
#
ip route-static 192.168.2.0 255.255.255.0 Tunnel1
#
undo ssh server compatible-ssh1x enable
#
user-interface con 0
 authentication-mode password
 set authentication password cipher $1a$Le(646zngE$iuv)Su\U:SA)2v.=*e'(l@i<S8@K@
4VkgQOPw\F%$
user-interface vty 0 4
 authentication-mode aaa
 protocol inbound ssh
user-interface vty 16 20
#
sa
#
location
#
 multi-interface
  mode proportion-of-weight
#
security-policy
 rule name untrust_to_local
  source-zone untrust
  destination-zone local
  source-address 1.1.1.2 32
  destination-address 1.1.1.1 32
  action permit
#
traffic-policy
#
policy-based-route
#
nat-policy
#
pcp-policy
#
dns-transparent-policy
#
return

FW_2配置

interface GigabitEthernet0/0/0
 undo shutdown
 ip binding vpn-instance default
 ip address 192.168.0.1 255.255.255.0
 service-manage http permit
 service-manage https permit
 service-manage ping permit
 service-manage ssh permit
 service-manage snmp permit
 service-manage telnet permit
 service-manage netconf permit
#
interface GigabitEthernet1/0/0
 undo shutdown
 ip address 1.1.1.2 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/1
 undo shutdown
 ip address 192.168.2.1 255.255.255.0
 service-manage ping permit
#
interface GigabitEthernet1/0/2
 undo shutdown
#
interface GigabitEthernet1/0/3
 undo shutdown
#
interface GigabitEthernet1/0/4
 undo shutdown
#
interface GigabitEthernet1/0/5
 undo shutdown
#
interface GigabitEthernet1/0/6
 undo shutdown
#
interface Virtual-if0
#
interface NULL0
#
interface Tunnel1
 ip address 10.1.1.2 255.255.255.0
 tunnel-protocol gre
 source 1.1.1.2
 destination 1.1.1.1
#
firewall zone local
 set priority 100
#
firewall zone trust
 set priority 85
 add interface GigabitEthernet0/0/0
 add interface GigabitEthernet1/0/1
 add interface Tunnel1
#
firewall zone untrust
 set priority 5
 add interface GigabitEthernet1/0/0
#
firewall zone dmz
 set priority 50
#
l2tp-group default-lns
#
ip route-static 192.168.1.0 255.255.255.0 Tunnel1
ip route-static 192.168.2.0 255.255.255.0 Tunnel1
#
undo ssh server compatible-ssh1x enable
#
user-interface con 0
 authentication-mode password
 set authentication password cipher $1a$2Y!g7:cbMY$awf#O:;`g2P0JkFM-uQ'eyG345_o~
V5}PxVC-~#R$
user-interface vty 0 4
 authentication-mode aaa
 protocol inbound ssh
user-interface vty 16 20
#
sa
#
location
#
 multi-interface
  mode proportion-of-weight
#
security-policy
 rule name untrust_to_local
  source-zone untrust
  destination-zone local
  source-address 1.1.1.1 32
  destination-address 1.1.1.2 32
  action permit
#
traffic-policy
#
policy-based-route
#
nat-policy
#
pcp-policy
#
dns-transparent-policy
#
return

验证相关命令

[FW_A]display firewall session  table verbose 
 Current Total Sessions : 23

 icmp  VPN: public --> public  ID: c487fe49cbdbc9075185a9bcf07
 Zone: trust --> trust  TTL: 00:00:20  Left: 00:00:13
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:975 --> 192.168.2.2:2048 PolicyName: ---

 gre  VPN: public --> public  ID: c487fe49cbdabb0771b5a9bc9db
 Zone: untrust --> local  TTL: 00:10:00  Left: 00:09:59
 Interface: InLoopBack0  NextHop: 127.0.0.1  MAC: 0000-0000-0000
 <--packets: 0 bytes: 0 --> packets: 1174 bytes: 98,616
 1.1.1.2:0 --> 1.1.1.1:0 PolicyName: untrust_to_local

 icmp  VPN: public --> public  ID: c487fe49cbdbe508f385a9bcf0d
 Zone: trust --> trust  TTL: 00:00:20  Left: 00:00:07
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:2511 --> 192.168.2.2:2048 PolicyName: ---


查看策略命中情况

[FW_A]display security-policy all 
Total:2 
RULE ID RULE NAME                      STATE      ACTION       HITTED          
-------------------------------------------------------------------------------
0       default                        enable     deny         479              
3       untrust_to_local               enable     permit       2               
-------------------------------------------------------------------------------

[FW_A]display gre statistic 
  Packets forward to GRE for Decapsulation:
    InPkts/InBytes:1,686/9,281,470,464
    InPktSum/InSlicePkts:1,686/0
    Hit tunnel failed:0, Hit pro failed:0
    Version err :0, Checksum err :0, Key err :0
    GRE Slice Pkts Recomp Failed :0
    Transmit After Decap:1,686
    Transmit Failed After Decap:0
    Decode IP Err:0
    Packets Deal on Local CPU/Other CPU:0/0

  Packets forward to GRE for Encapsulation:
    OutPkts/OutBytes:1,936/162,624
    Outerr:0, Max cur err:0, Unknow pkt err:0
    Total Trans After Encap:1,936
    Trans to ipsec:0, Transmit without encrypt:0
    Trans Common Pkts:0
    To Other CPU or Local CPU Failed:0
    Hit Fib Failed:0

关闭缺省包过渡

[USG6000V] security-policy

[USG6000V-policy-security]default action permit 

5.2.3 配置GRE安全机制

大家可能会有担忧,如果Internet上的恶意用户伪装成FW_A向FW_B发送GRE报文,那伪装者不就可以访问FW_B中的资源了吗,FW_A和FW_B在建立GRE隧道时,如何做到互信的呢?下面我们讲一下GRE安全机制。

1.关键字验证

下图展示了GRE头中的信息,其中Key位为1表示启用了关键字验证功能,下面的“Key:0x00003039”是关键字的值,转换为

十进制就是12345。


在FW_A上设置关键字为12345:

[FW_A-Tunnel1]gre key 12345

同时,在FW_B上设置关键字为12345:

[FW_B-Tunnel1]gre key 12345

2.校验和验证

虽然GRE隧道两端的防火墙实现了互信,但是如果报文在Internet传输途中也可能被恶意用户篡改,如何保证报文在传输时的完整性呢?这里又用到了GRE头中的"Checksum"字段。

防火墙在为报文封装GRE时将GRE头中的Checksum位的值置1,然后根据报文的信息计算检验和,并将校验和填到Checksum字段中。当隧道对端收到该报文时,也会根据报文信息计算检验和,并与报文中携带的校验和进行比较,如果检验结果一致,则接受此报文;如果不一致,则丢弃此报文。

校验和验证功能是单向的,对端防火墙是否开启不影响本端的校验和验证功能。实际环境 中,建议在隧道两端防火墙上则时开启。

下图中GRE的Checksum们为1,表示启用了校验和验证功能,下面的"Checksum 0x8f91" 是校验和的值。


配置校验和验证步骤也很简单,在FW_A上开启校验和验证 :

[FW_A-Tunnel1]gre checksum

的FW_B上开户校验和验证:

[FW_B-Tunnel1]gre checksum 

3.Keepalive

GRE的安全机制可以实现隧道两端防火墙互信,并保证报文传输的完整性。但是这是还有一个问题,如果隧道对端出现故障时,

隧道本端如何感知呢?

GRE隧道是一种无状态类型的隧道,所谓的无状态类型是指隧道本端并不维护与对端的状态。换句话说假如隧道对端出现故障,那隧道本端是感受不到的。为了解决这个问题,GRE隧道提供了Keepalive保活机制。

FW_B Tunnel 1 口关闭模拟对端故障。FW_A无没有开启Keepalive功能 。

查看FW_A 的Tunnel 1端口状态,是UP的。

[FW_A]display interface Tunnel 
Tunnel1 current state : UP
Line protocol current state : UP
Last line protocol up time : 2018-03-07 14:12:33
Description:Huawei, USG6000V1 Series, Tunnel1 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is 10.1.1.1/24
Encapsulation is TUNNEL, loopback not set
Tunnel source 1.1.1.1 (GigabitEthernet1/0/0), destination 1.1.1.2
Tunnel protocol/transport GRE/IP, key enabled
keepalive disabled
Checksumming of packets enabled
Current system time: 2018-03-07 14:22:21
    300 seconds input rate 0 bits/sec, 0 packets/sec
    300 seconds output rate 200 bits/sec, 0 packets/sec
    0 seconds input rate 0 bits/sec, 0 packets/sec
    0 seconds output rate 0 bits/sec, 0 packets/sec
    0 packets input,  0 bytes
    0 input error
    117 packets output,  10672 bytes
    1 output error
    Input:
      Unicast: 0 packets, Multicast: 0 packets
    Output:
      Unicast: 117 packets, Multicast: 0 packets
    Input bandwidth utilization  :    0%
    Output bandwidth utilization :    0%

FW_A开启Keepalive功能,查看FW_A 的Tunnel 1端口状态,是DOWN的。


Keepalive功能是单向的,对端是否开户Keepalive功能不影响本端的Keepalive功能。实际环境中,建议在隧道两端防火墙上同时开启。

下面给出开启Keepalive功能的命令,在FW_A上开启Keepalive功能:

[FW_A-Tunnel1]keepalive 

在FW_B上开启Keepalive功能:

[FW_B-Tunnel1]keepalive 

介绍到这里,大家是不是觉得有了GRE隧道就万事大吉呢,其实不然,GRE隧道自身有个缺陷:不带有安全加密功能。没有加密功能的GRE报文,只能是穿了个透明的马甲,隧道中的报文都是明文传输。所以我们在实际使用时,很少单纯使用GRE,

而是经常会把GRE与IPSec一同使用。由于IPSec技术具备很强的加密功能,就解决了GRE的安全性问题。这也是我们后面要介绍的

GRE over IPSec技术。


5.2.4安全策略配置思路


tunnel加到dmz 安全区

(1)我们先配置一个最宽泛的域间安全策略,以便调测GRE。

[FW_A]secu	
[FW_A]security-policy 
[FW_A-policy-security]def	
[FW_A-policy-security]default act	
[FW_A-policy-security]default action permit
Warning:Setting the default packet filtering to permit poses security risks. You
 are advised to configure the security policy based on the actual data flows. Ar
e you sure you want to continue?[Y/N]y
[FW_A-policy-security]
(2)配置好GRE后,在PC_A上ping PC_B,然后查看会话表,以FW_A为例

[FW_A]display firewall session table  ver
 Current Total Sessions : 6
 icmp  VPN: public --> public  ID: c387f6c53182c90a655aa143f5
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:16
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:64579 --> 192.168.2.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c53182f3046585aa143f6
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:17
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:64835 --> 192.168.2.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c53182ad055805aa143f1
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:12
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 0 bytes: 0 --> packets: 1 bytes: 60
 192.168.1.2:63555 --> 192.168.2.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c53182bb0656c5aa143f3
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:14
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:64067 --> 192.168.2.2:2048 PolicyName: default

 gre  VPN: public --> public  ID: c487f6c53180e50771b5aa140ff
 Zone: untrust --> local  TTL: 00:10:00  Left: 00:09:58
 Interface: InLoopBack0  NextHop: 127.0.0.1  MAC: 0000-0000-0000
 <--packets: 153 bytes: 4,896 --> packets: 277 bytes: 21,200
 1.1.1.2:0 --> 1.1.1.1:0 PolicyName: untrust_to_local

 icmp  VPN: public --> public  ID: c487f6c53182d70cc145aa143f4
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:15
 Interface: Tunnel1  NextHop: 192.168.2.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:64323 --> 192.168.2.2:2048 PolicyName: default

从上述信息可知,PC_A可以ping 通PC_B, GRE会话也正常创建。

从会话表中我们可以看到两条流,一条是trust-->dmz之间的ICMP报文,一条是untrust-->local之间的GRE报文。由此我们可以

得到FW_A上的报文走向。FW_A需要配置trust-->dmz区域的安全策略,允许PC_A到PC_B的报文通过。

还需要配置untrust-->local区域安全策略,允许FW_A与FW_B建立GRE隧道.


PC_B  ping  PC_A,查看会话表:

[FW_A]display firewall session table verbose 
 Current Total Sessions : 13
 icmp  VPN: public --> public  ID: c387f6c5317c2f03d05aa14967
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:08
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:26953 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c387f6c5317c4b09785aa14969
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:10
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:27465 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317df3016fa5aa14964
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:05
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:26185 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317c3d02cd15aa14966
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:07
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:26697 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317c05039565aa14960
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:01
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:25161 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317de5047885aa14961
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:02
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:25417 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317dd7057075aa14962
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:03
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:25673 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317c2106bcd5aa14965
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:06
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:26441 --> 192.168.1.2:2048 PolicyName: default

 gre  VPN: public --> public  ID: c487f6c53180e50771b5aa140ff
 Zone: untrust --> local  TTL: 00:10:00  Left: 00:09:59
 Interface: InLoopBack0  NextHop: 127.0.0.1  MAC: 0000-0000-0000
 <--packets: 432 bytes: 13,824 --> packets: 832 bytes: 64,448
 1.1.1.2:0 --> 1.1.1.1:0 PolicyName: untrust_to_local

 icmp  VPN: public --> public  ID: c487f6c5317c13080a45aa14963
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:04
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:25929 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317c91090895aa14968
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:07
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:27209 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487f6c5317dbb0f8535aa1495e
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:00
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.1.2  MAC: 5489-9834-5d12
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:24649 --> 192.168.1.2:2048 PolicyName: default

从会话表中我们可以看到两条流,一条是dmz-->trust之间的ICMP报文,一条是untrust-->local之间的GRE报文。由此我们可以

得到FW_A上的报文走向。FW_A需要配置dmz--trust区域的安全策略,允许PC_B到PC_A的报文通过。

还需要配置untrust-->local区域安全策略,允许FW_A与FW_B建立GRE隧道.



FW_B分析

PC_A ping PC_B

[FW_B]display firewall session table verbose 
 Current Total Sessions : 6
 icmp  VPN: public --> public  ID: c487fb7898279101fa65aa14a65
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:17
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.2.2  MAC: 5489-98e9-2490
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:26954 --> 192.168.2.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb789827c9047cf5aa14a64
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:16
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.2.2  MAC: 5489-98e9-2490
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:26698 --> 192.168.2.2:2048 PolicyName: default

 gre  VPN: public --> public  ID: c487fb78982d050507a5aa14097
 Zone: untrust --> local  TTL: 00:10:00  Left: 00:09:58
 Interface: InLoopBack0  NextHop: 127.0.0.1  MAC: 0000-0000-0000
 <--packets: 502 bytes: 32,128 --> packets: 1168 bytes: 77,696
 1.1.1.1:0 --> 1.1.1.2:0 PolicyName: untrust_to_local

 icmp  VPN: public --> public  ID: c487fb789827bb061d85aa14a66
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:18
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.2.2  MAC: 5489-98e9-2490
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:27210 --> 192.168.2.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb78982767065675aa14a63
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:15
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.2.2  MAC: 5489-98e9-2490
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.1.2:26442 --> 192.168.2.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb78982775067195aa14a61
 Zone: dmz --> trust  TTL: 00:00:20  Left: 00:00:13
 Interface: GigabitEthernet1/0/1  NextHop: 192.168.2.2  MAC: 5489-98e9-2490
 <--packets: 0 bytes: 0 --> packets: 1 bytes: 60
 192.168.1.2:25930 --> 192.168.2.2:2048 PolicyName: default

两条隧道

gre建立

PC_A到PC_B 报文通过

 
 

PC_B   ping PC_A

[FW_B]display firewall session table verbose 
 Current Total Sessions : 6
 gre  VPN: public --> public  ID: c487fb78982d050507a5aa14097
 Zone: untrust --> local  TTL: 00:10:00  Left: 00:09:59
 Interface: InLoopBack0  NextHop: 127.0.0.1  MAC: 0000-0000-0000
 <--packets: 534 bytes: 34,176 --> packets: 1208 bytes: 79,456
 1.1.1.1:0 --> 1.1.1.2:0 PolicyName: untrust_to_local

 icmp  VPN: public --> public  ID: c487fb789826670515c5aa14b06
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:18
 Interface: Tunnel1  NextHop: 192.168.1.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:2635 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb789827f30564f5aa14b02
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:14
 Interface: Tunnel1  NextHop: 192.168.1.2  MAC: 0000-0000-0000
 <--packets: 0 bytes: 0 --> packets: 1 bytes: 60
 192.168.2.2:1611 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb789826050694b5aa14b04
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:16
 Interface: Tunnel1  NextHop: 192.168.1.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:2123 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb7898262107c7e5aa14b07
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:19
 Interface: Tunnel1  NextHop: 192.168.1.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:2891 --> 192.168.1.2:2048 PolicyName: default

 icmp  VPN: public --> public  ID: c487fb7898263d0b5205aa14b05
 Zone: trust --> dmz  TTL: 00:00:20  Left: 00:00:17
 Interface: Tunnel1  NextHop: 192.168.1.2  MAC: 0000-0000-0000
 <--packets: 1 bytes: 60 --> packets: 1 bytes: 60
 192.168.2.2:2379 --> 192.168.1.2:2048 PolicyName: default

两条gre隧道建立

PC_B到PC_A报文通过



猜你喜欢

转载自blog.csdn.net/tjjingpan/article/details/79243564