ΠšΡ€Π΅ΠΈΡ€Π°ΡšΠ΅ Π½Π° IPSec GRE Ρ‚ΡƒΠ½Π΅Π» ΠΏΠΎΠΌΠ΅Ρ“Ρƒ Mikrotik hEX S ΠΈ Juniper SRX ΠΏΡ€Π΅ΠΊΡƒ USB ΠΌΠΎΠ΄Π΅ΠΌ

Ρ†Π΅Π»

ΠŸΠΎΡ‚Ρ€Π΅Π±Π½ΠΎ Π΅ Π΄Π° сС ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΈΡ€Π° VPN Ρ‚ΡƒΠ½Π΅Π» ΠΏΠΎΠΌΠ΅Ρ“Ρƒ Π΄Π²Π° ΡƒΡ€Π΅Π΄ΠΈ, ΠΊΠ°ΠΊΠΎ Mikrotik ΠΈ Juniper SRX Π»ΠΈΠ½ΠΈΡ˜Π°Ρ‚Π°.

Π¨Ρ‚ΠΎ ΠΈΠΌΠ°ΠΌΠ΅ Π½ΠΈΠ΅?

Од ΠœΠΈΠΊΡ€ΠΎΡ‚ΠΈΠΊ, ΠΈΠ·Π±Ρ€Π°Π²ΠΌΠ΅ ΠΌΠΎΠ΄Π΅Π» Π½Π° Π²ΠΈΠΊΠΈ-страницата Π½Π° ΠœΠΈΠΊΡ€ΠΎΡ‚ΠΈΠΊ ΡˆΡ‚ΠΎ ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΏΠΎΠ΄Π΄Ρ€ΠΆΡƒΠ²Π° ΡˆΠΈΡ„Ρ€ΠΈΡ€Π°ΡšΠ΅ Π½Π° Ρ…Π°Ρ€Π΄Π²Π΅Ρ€ΠΎΡ‚ IPSec, спорСд нашС мислСњС, Ρ‚ΠΎΡ˜ сС ΠΏΠΎΠΊΠ°ΠΆΠ° доста ΠΊΠΎΠΌΠΏΠ°ΠΊΡ‚Π΅Π½ ΠΈ Π΅Ρ„Ρ‚ΠΈΠ½, ΠΈΠΌΠ΅Π½ΠΎ Mikrotik hEXS.

Π£Π‘Π‘-ΠΌΠΎΠ΄Π΅ΠΌΠΎΡ‚ Π΅ ΠΊΡƒΠΏΠ΅Π½ ΠΎΠ΄ Π½Π°Ρ˜Π±Π»ΠΈΡΠΊΠΈΠΎΡ‚ ΠΌΠΎΠ±ΠΈΠ»Π΅Π½ ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€, ΠΌΠΎΠ΄Π΅Π»ΠΎΡ‚ Π΅ Huawei E3370. НС ΠΈΠ·Π²Ρ€ΡˆΠΈΠ²ΠΌΠ΅ Π½ΠΈΠΊΠ°ΠΊΠ²ΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ Π·Π° ΠΈΡΠΊΠ»ΡƒΡ‡ΡƒΠ²Π°ΡšΠ΅ ΠΎΠ΄ ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€ΠΎΡ‚. Π‘Π΅ Π΅ стандардно ΠΈ сошиСно ΠΎΠ΄ самиот ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€.

ΠˆΠ°Π΄Ρ€ΠΎΡ‚ΠΎ содрТи Ρ†Π΅Π½Ρ‚Ρ€Π°Π»Π΅Π½ Ρ€ΡƒΡ‚Π΅Ρ€ Juniper SRX240H.

Π¨Ρ‚ΠΎ сС случи

Π‘Π΅ΡˆΠ΅ ΠΌΠΎΠΆΠ½ΠΎ Π΄Π° сС ΠΈΠΌΠΏΠ»Π΅ΠΌΠ΅Π½Ρ‚ΠΈΡ€Π° Ρ€Π°Π±ΠΎΡ‚Π½Π° шСма која Π²ΠΈ ΠΎΠ²ΠΎΠ·ΠΌΠΎΠΆΡƒΠ²Π° Π΄Π° ΠΊΡ€Π΅ΠΈΡ€Π°Ρ‚Π΅ IPsec ΠΊΠΎΠ½Π΅ΠΊΡ†ΠΈΡ˜Π° ΠΏΡ€Π΅ΠΊΡƒ ΠΌΠΎΠ±ΠΈΠ»Π΅Π½ ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€, Π±Π΅Π· статична адрСса, ΠΊΠΎΡ€ΠΈΡΡ‚Π΅Ρ˜ΡœΠΈ ΠΌΠΎΠ΄Π΅ΠΌ, Π²ΠΎ кој Π΅ Π·Π°Π²ΠΈΡ‚ΠΊΠ°Π½ Ρ‚ΡƒΠ½Π΅Π»ΠΎΡ‚ GRE.

Овој Π΄ΠΈΡ˜Π°Π³Ρ€Π°ΠΌ Π·Π° ΠΏΠΎΠ²Ρ€Π·ΡƒΠ²Π°ΡšΠ΅ сС користи ΠΈ Ρ€Π°Π±ΠΎΡ‚ΠΈ Π½Π° Beeline ΠΈ Megafon USB ΠΌΠΎΠ΄Π΅ΠΌΠΈ.

ΠšΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΡ˜Π°Ρ‚Π° Π΅ ΠΊΠ°ΠΊΠΎ ΡˆΡ‚ΠΎ слСдува:

ЏунипСр SRX240H инсталиран Π²ΠΎ Ρ˜Π°Π΄Ρ€ΠΎΡ‚ΠΎ
Π›ΠΎΠΊΠ°Π»Π½Π° адрСса: 192.168.1.1/24
ΠΠ°Π΄Π²ΠΎΡ€Π΅ΡˆΠ½Π° адрСса: 1.1.1.1/30
GW: 1.1.1.2

ΠžΠ΄Π΄Π°Π»Π΅Ρ‡Π΅Π½Π° Ρ‚ΠΎΡ‡ΠΊΠ°

Mikrotik hEX S
Π›ΠΎΠΊΠ°Π»Π½Π° адрСса: 192.168.152.1/24
ΠΠ°Π΄Π²ΠΎΡ€Π΅ΡˆΠ½Π° адрСса: Π”ΠΈΠ½Π°ΠΌΠΈΡ‡Π½Π°

Мал Π΄ΠΈΡ˜Π°Π³Ρ€Π°ΠΌ кој ќС Π²ΠΈ ΠΏΠΎΠΌΠΎΠ³Π½Π΅ Π΄Π° Ρ€Π°Π·Π±Π΅Ρ€Π΅Ρ‚Π΅ ΠΊΠ°ΠΊΠΎ Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½ΠΈΡ€Π°:

ΠšΡ€Π΅ΠΈΡ€Π°ΡšΠ΅ Π½Π° IPSec GRE Ρ‚ΡƒΠ½Π΅Π» ΠΏΠΎΠΌΠ΅Ρ“Ρƒ Mikrotik hEX S ΠΈ Juniper SRX ΠΏΡ€Π΅ΠΊΡƒ USB ΠΌΠΎΠ΄Π΅ΠΌ

ΠšΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΡ˜Π° Juniper SRX240:

ИзданиС Π½Π° софтвСр JUNOS [12.1X46-D82]

ΠšΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΡ˜Π° Π½Π° смрСка

interfaces {
    ge-0/0/0 {
        description Internet-1;
        unit 0 {
            family inet {
                address 1.1.1.1/30;
            }
        }
    }
    gr-0/0/0 {
        unit 1 {
            description GRE-Tunnel;
            tunnel {
                source 172.31.152.2;
                destination 172.31.152.1;
            }
            family inet;    
    vlan {
        unit 0 {
            family inet {
                address 192.168.1.1/24;
            }
        }
    st0 {
        unit 5 {
            description "Area - 192.168.152.0/24";
            family inet {
                mtu 1400;
            }
        }
routing-options {
    static {
        route 0.0.0.0/0 next-hop 1.1.1.2;
        route 192.168.152.0/24 next-hop gr-0/0/0.1;
        route 172.31.152.0/30 next-hop st0.5;
    }
    router-id 192.168.1.1;
}
security {
    ike {
        traceoptions {
            file vpn.log size 256k files 5;
            flag all;
        }
        policy ike-gretunnel {
            mode aggressive;
            description area-192.168.152.0;
            proposal-set standard;
            pre-shared-key ascii-text "mysecret"; ## SECRET-DATA
        }
        gateway gw-gretunnel {
            ike-policy ike-gretunnel;
            dynamic inet 172.31.152.1;
            external-interface ge-0/0/0.0;
            version v2-only;
        }
    ipsec {
        }
        policy vpn-policy0 {
            perfect-forward-secrecy {
                keys group2;
            }
            proposal-set standard;
        }
        vpn vpn-gretunnel {
            bind-interface st0.5;
            df-bit copy;
            vpn-monitor {
                optimized;
                source-interface st0.5;
                destination-ip 172.31.152.1;
            }
            ike {
                gateway gw-gretunnel;
                no-anti-replay;
                ipsec-policy vpn-policy0;
                install-interval 10;
            }
            establish-tunnels immediately;
        }
    }
    policies {  
        from-zone vpn to-zone vpn {
            policy st-vpn-vpn {
                match {
                    source-address any;
                    destination-address any;
                    application any;
                }
                then {
                    permit;
                    log {
                        session-init;   
                        session-close;
                    }
                    count;
                }
            }
        }
        from-zone trust to-zone vpn {
            policy st-trust-to-vpn {
                match {
                    source-address any;
                    destination-address any;
                    application any;
                }
                then {                  
                    permit;
                    log {
                        session-init;
                        session-close;
                    }
                    count;
                }
            }
        }
        from-zone vpn to-zone trust {
            policy st-vpn-to-trust {
                match {
                    source-address any;
                    destination-address any;
                    application any;
                }
                then {
                    permit;
                    log {
                        session-init;
                        session-close;
                    }
                    count;
                }
            }
        }
    zones {                             
        security-zone trust {
                vlan.0 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                        protocols {
                            all;
                        }
                    }
                }
        security-zone vpn {
            interfaces {
                st0.5 {
                    host-inbound-traffic {
                        protocols {
                            ospf;
                        }
                    }
                }
                gr-0/0/0.1 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                        protocols {
                            all;        
                        }
                    }
                }
        security-zone untrust {
            interfaces {
                ge-0/0/0.0 {
                    host-inbound-traffic {
                        system-services {
                            ping;
                            ssh;
                            ike;
                        }
                    }
                }
            }
        }
vlans {                                 
    vlan-local {
        vlan-id 5;
        l3-interface vlan.1;
    }

ΠšΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΡ˜Π° Π½Π° Mikrotik hEX S:

Π’Π΅Ρ€Π·ΠΈΡ˜Π° Π½Π° софтвСрот RouterOS [6.44.3]

ΠšΠΎΠ½Ρ„ΠΈΠ³ΡƒΡ€Π°Ρ†ΠΈΡ˜Π° Π½Π° Mikrotik

/ip address
add address=172.31.152.1/24 comment=GRE-Tunnel interface=gre-srx network=172.31.152.0
add address=192.168.152.1/24 comment=Local-Area interface=bridge network=192.168.152.0

/interface gre
add comment=GRE-Tunnel-SRX-HQ !keepalive local-address=172.31.152.1 name=gre-srx remote-address=172.31.152.2

/ip ipsec policy group
add name=srx-gre

/ip ipsec profile
add dh-group=modp1024 dpd-interval=10s name=profile1

/ip ipsec peer
add address=1.1.1.1/32 comment=GRE-SRX exchange-mode=aggressive local-address=172.31.152.1 name=peer2 profile=profile1

/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-128-cbc,3des
add enc-algorithms=aes-128-cbc,3des name=proposal1

/ip route
add distance=10 dst-address=192.168.0.0/16 gateway=gre-srx

/ip ipsec identity
add comment=IPSec-GRE my-id=address:172.31.152.1 peer=peer2 policy-template-group=srx-gre secret=mysecret

/ip ipsec policy
set 0 disabled=yes
add dst-address=0.0.0.0/0 proposal=proposal1 sa-dst-address=1.1.1.1 sa-src-address=172.31.152.1 src-address=172.31.152.0/30 tunnel=yes

/ip address
add address=172.31.152.1/24 comment=GRE-Tunnel interface=gre-srx network=172.31.152.0
add address=192.168.152.1/24 comment=Local-Area interface=bridge network=192.168.152.0

Π Π΅Π·ΡƒΠ»Ρ‚Π°Ρ‚ΠΎΡ‚ Π΅:
Од страната Juniper SRX

netscreen@srx240> ping 192.168.152.1  
PING 192.168.152.1 (192.168.152.1): 56 data bytes
64 bytes from 192.168.152.1: icmp_seq=0 ttl=64 time=29.290 ms
64 bytes from 192.168.152.1: icmp_seq=1 ttl=64 time=28.126 ms
64 bytes from 192.168.152.1: icmp_seq=2 ttl=64 time=26.775 ms
64 bytes from 192.168.152.1: icmp_seq=3 ttl=64 time=25.401 ms
^C
--- 192.168.152.1 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max/stddev = 25.401/27.398/29.290/1.457 ms

Од ΠœΠΈΠΊΡ€ΠΎΡ‚ΠΈΠΊ

net[admin@GW-LTE-] > ping 192.168.1.1 
  SEQ HOST                                     SIZE TTL TIME  STATUS                                                                                                                                               
    0 192.168.1.1                                56  64 34ms 
    1 192.168.1.1                                56  64 40ms 
    2 192.168.1.1                                56  64 37ms 
    3 192.168.1.1                                56  64 40ms 
    4 192.168.1.1                                56  64 51ms 
    sent=5 received=5 packet-loss=0% min-rtt=34ms avg-rtt=40ms max-rtt=51ms 

Наоди

По Π·Π°Π²Ρ€ΡˆΠ΅Π½Π°Ρ‚Π° Ρ€Π°Π±ΠΎΡ‚Π°, Π΄ΠΎΠ±ΠΈΠ²ΠΌΠ΅ стабилСн VPN Ρ‚ΡƒΠ½Π΅Π», ΠΎΠ΄ далСчинската ΠΌΡ€Π΅ΠΆΠ° ΠΌΠΎΠΆΠ΅ΠΌΠ΅ Π΄Π° пристапимС Π΄ΠΎ Ρ†Π΅Π»Π°Ρ‚Π° ΠΌΡ€Π΅ΠΆΠ° ΡˆΡ‚ΠΎ сС Π½Π°ΠΎΡ“Π° Π·Π°Π΄ смрСката ΠΈ, соодвСтно, Π½Π°Π·Π°Π΄.

НС ΠΏΡ€Π΅ΠΏΠΎΡ€Π°Ρ‡ΡƒΠ²Π°ΠΌ Π΄Π° користитС IKE2 Π²ΠΎ ΠΎΠ²Π°Π° шСма, сС појави ΡΠΈΡ‚ΡƒΠ°Ρ†ΠΈΡ˜Π° Π΄Π΅ΠΊΠ° ΠΏΠΎ Ρ€Π΅ΡΡ‚Π°Ρ€Ρ‚ΠΈΡ€Π°ΡšΠ΅Ρ‚ΠΎ Π½Π° ΠΎΠ΄Ρ€Π΅Π΄Π΅Π½ ΡƒΡ€Π΅Π΄, IPSec Π½Π΅ сС Π·Π³ΠΎΠ»Π΅ΠΌΠΈ.

Π˜Π·Π²ΠΎΡ€: www.habr.com

Π”ΠΎΠ΄Π°Π΄Π΅Ρ‚Π΅ ΠΊΠΎΠΌΠ΅Π½Ρ‚Π°Ρ€