Cấu hình Route-Based Site-to-Site IPSec VPN trên SRX bằng CLI

Thảo luận trong 'Firewall Juniper' bắt đầu bởi 37nguyenson, 2/11/21.

  1. 37nguyenson

    37nguyenson Member

    Bài viết này sẽ hướng dẫn các bạn cấu hình Route-Based Site-to-Site IPSec VPN trên thiết bị Juniper SRX theo mô hình ví dụ phía dưới.

    [​IMG]

    Trên mô hình đã được cấu hình IP, Zone, Static route, Policy từ zone Trust đến zone Untrust theo ví dụ, các bạn có thể xem cách cấu hình tại bài viết này.

    1. Cấu hình IKE phase 1 :

    + Trên SRX-A :

    root@SRX-A#set security ike proposal IKE-PROP lifetime-seconds 3600
    root@SRX-A#set security ike proposal IKE-PROP authentication-method pre-shared-keys
    root@SRX-A#set security ike proposal IKE-PROP authentication-algorithm sha1
    root@SRX-A#set security ike proposal IKE-PROP encryption-algorithm aes-128-cbc
    root@SRX-A#set security ike proposal IKE-PROP dh-group group5

    root@SRX-A#set security ike policy IKE-POL proposals IKE-PROP
    root@SRX-A#set security ike policy IKE-POL mode main
    root@SRX-A#set security ike policy IKE-POL pre-shared-key ascii-text juniper123

    root@SRX-A#set security ike gateway IKE-GW ike-policy IKE-POL
    root@SRX-A#set security ike gateway IKE-GW address 2.2.2.2
    root@SRX-A#set security ike gateway IKE-GW external-interface ge-0/0/0.0


    - Cho phép IKE trên Untrust zone.

    root@SRX-A#set security zones security-zone untrust host-inbound-traffic system-services ike

    + Trên SRX-B :

    root@SRX-B#set security ike proposal IKE-PROP lifetime-seconds 3600
    root@SRX-B#set security ike proposal IKE-PROP authentication-method pre-shared-keys
    root@SRX-B#set security ike proposal IKE-PROP authentication-algorithm sha1
    root@SRX-B#set security ike proposal IKE-PROP encryption-algorithm aes-128-cbc
    root@SRX-B#set security ike proposal IKE-PROP dh-group group5

    root@SRX-B#set security ike policy IKE-POL proposals IKE-PROP
    root@SRX-B#set security ike policy IKE-POL mode main
    root@SRX-B#set security ike policy IKE-POL pre-shared-key ascii-text juniper123

    root@SRX-B#set security ike gateway IKE-GW ike-policy IKE-POL
    root@SRX-B#set security ike gateway IKE-GW address 1.1.1.1
    root@SRX-B#set security ike gateway IKE-GW external-interface ge-0/0/0.0


    - Cho phép IKE trên Untrust zone.

    root@SRX-B#set security zones security-zone untrust host-inbound-traffic system-services ike

    2. Cấu hình IKE phase 2 trên cả SRX-A và SRX-B :

    set security ipsec proposal IPSEC-PROP lifetime-seconds 3600
    set security ipsec proposal IPSEC-PROP protocol esp
    set security ipsec proposal IPSEC-PROP authentication-algorithm hmac-sha1-96
    set security ipsec proposal IPSEC-PROP encryption-algorithm aes-128-cbc

    set security ipsec policy IPSEC-POL proposals IPSEC-PROP
    set security ipsec policy IPSEC-POL perfect-forward-secrecy keys group5

    set security ipsec vpn IPSEC-VPN ike gateway IKE-GW
    set security ipsec vpn IPSEC-VPN ike ipsec-policy IPSEC-POL
    set security ipsec vpn IPSEC-VPN vpn-monitor
    set security ipsec vpn IPSEC-VPN establish-tunnels immediately

    set security ipsec vpn IPSEC-VPN bind-interface st0.1


    3. Cấu hình tunnel interface trên cả SRX-A và SRX-B :

    set interfaces st0 unit 1 family inet
    set security zones security-zone VPN interfaces st0.1


    4. Cấu hình routing :

    + SRX-A :

    root@SRX-A#set routing-options static route 172.16.10.0/24 next-hop st0.1

    + SRX-B :

    root@SRX-B#set routing-options static route 192.168.10.0/24 next-hop st0.1

    5. Cấu hình Security Policy :

    - Tạo address-book trên cả hai thiết bị.

    set security address-book global address NET-A 192.168.10.0/24
    set security address-book global address NET-B 172.16.10.0/24


    - Tạo Security Policy SRX-A

    root@SRX-A#set security policies from-zone trust to-zone VPN policy Trust-to-VPN match source-address NET-A destination-address NET-B application any
    root@SRX-A#set security policies from-zone trust to-zone VPN policy Trust-to-VPN then permit

    root@SRX-A#set security policies from-zone VPN to-zone trust policy VPN-to-Trust match source-address NET-B destination-address NET-A application any
    root@SRX-A#set security policies from-zone VPN to-zone trust policy VPN-to-Trust then permit


    - Tạo Security Policy SRX-B

    root@SRX-B#set security policies from-zone trust to-zone VPN policy Trust-to-VPN match source-address NET-B destination-address NET-A application any
    root@SRX-B#set security policies from-zone trust to-zone VPN policy Trust-to-VPN then permit

    root@SRX-B#set security policies from-zone VPN to-zone trust policy VPN-to-Trust match source-address NET-A destination-address NET-B application any
    root@SRX-B#set security policies from-zone VPN to-zone trust policy VPN-to-Trust then permit


    6. Kiểm tra kết nối trên các Host :


    [​IMG]

    - Một số lệnh giúp bạn kiểm tra trạng thái của VPN.

    show security ike security-associations
    show security ipsec security-associations
    show security ipsec statistics
    show route


    [​IMG]

    [​IMG]

    [​IMG]

    !!! Cám ơn các bạn đã theo dõi bài viết !!!
     

trang này