Huawei firewall configuration IPsec*** detailed explanation

Detailed IPsec configuration of two Huawei usg6300 series firewalls

Conditions:
FW1:
FW1 FW2
export line: 111.111.111.146 222.222.222.150
Intranet vlan 192.168.100.0/24 172.16.100.0/24
Huawei firewall configuration IPsec*** detailed explanation

Through the configuration of IPsec*** to achieve mutual access between the two ends of the intranet.

Configuration steps:
FW1:

  1. Configure the egress line to access the external network normally:

Click Network-Interface:
Configure port wan0/0/1 as untrust port, IP address is 111.111.111.146/30, gateway: 111.111.111.145
Huawei firewall configuration IPsec*** detailed explanation

Configure static routing:

Click Network-Static Route, add a static route, let all packets outgoing from wan0/0/1 to access the external network.
Huawei firewall configuration IPsec*** detailed explanation

Configure security policy

Configure a security policy to allow the internal network to access the external network:
Huawei firewall configuration IPsec*** detailed explanation

Configure a NAT policy to implement proxy Internet access:
click Policy-NAT policy, create a new NAT policy, configure the source address for NAT address translation:
Huawei firewall configuration IPsec*** detailed explanation

  1. Configure IPsec

Click Network-IPsec, create a new IPsec, select the point-to-point mode: the
first stage:
Huawei firewall configuration IPsec*** detailed explanation

second stage:
Huawei firewall configuration IPsec*** detailed explanation

  1. Configure static route:
    Click Network-Static Route:
    Create a new static route to the peer intranet vlan, the next hop is the gateway of the egress line:
    Huawei firewall configuration IPsec*** detailed explanation

Create a black hole route to prevent routing loops:
Huawei firewall configuration IPsec*** detailed explanation

  1. Configure the security policy:
    Click Policy-Security Policy, create a new security policy, and allow access from this segment of the vlan to the other party's intranet vlan.
    The entire large segment can be released on the route, and then the specific vlans can be specified through the security policy:
    Huawei firewall configuration IPsec*** detailed explanation

Then configure a security policy for returning access:
which vlans are allowed to access the intranet:
Huawei firewall configuration IPsec*** detailed explanation

Configure the security policy from the firewall itself to the external network:
Huawei firewall configuration IPsec*** detailed explanation

When configuring a NAT policy, specify that NAT address translation is not used for access between intranets:
Huawei firewall configuration IPsec*** detailed explanation

At this point, FW1 has been configured, now let's configure FW2:

FW2 :

  1. Also configure the export line to be able to go online normally.
    Click Network-Interface:
    Configure interface IP:
    Huawei firewall configuration IPsec*** detailed explanation

Configure static routing:
Click Network-Routing-Static Routing:

Huawei firewall configuration IPsec*** detailed explanation

Configure the security policy:
click Policy-Security Policy:
allow access from the internal network and the firewall itself to the external network:
Huawei firewall configuration IPsec*** detailed explanation

Configure the mutual access between the firewall and the intranet:
Huawei firewall configuration IPsec*** detailed explanation

Configure the NAT policy to implement source address translation:
Huawei firewall configuration IPsec*** detailed explanation

Well, at this point, the internal network should be able to access the external network normally, and the firewall can also access the external network normally.

  1. Configure IPsec
    Click Network-IPsec, New IPsec:
    Phase 1:
    Huawei firewall configuration IPsec*** detailed explanation

The second stage:
Huawei firewall configuration IPsec*** detailed explanation
The configuration at both ends must be consistent, otherwise the negotiation will fail.

  1. Configure static route: Configure the static route
    to the peer firewall:
    Huawei firewall configuration IPsec*** detailed explanation

Configure a static route to the peer intranet:
Huawei firewall configuration IPsec*** detailed explanation

Configure black hole routing to the peer intranet and place routing loops:
Huawei firewall configuration IPsec*** detailed explanation

  1. Configure security policy:
    Configure security policy to allow this segment of vlan to access the peer intranet:
    Huawei firewall configuration IPsec*** detailed explanation

Configure the reverse security policy to allow the peer VLAN to access the local intranet:
Huawei firewall configuration IPsec*** detailed explanation

  1. Configure NAT strategy
    Click Strategy-NAT Strategy to create a new NAT strategy to realize mutual access between both ends without NAT translation.
    Huawei firewall configuration IPsec*** detailed explanation

After the two ends are configured, IPsec should be negotiated successfully and mutual access can be realized
Huawei firewall configuration IPsec*** detailed explanation

  1. Verification: At
    this point, after the configuration is complete, you can ping or tracert -d the peer IP trace route on the internal network to verify whether the two ends are communicating normally.

Guess you like

Origin blog.51cto.com/2221384/2677918