H3C ADVPN Hub-Spoke 配置实验

0 阅读3分钟

网络规划

目标:部署一个 HUB + 两个 Spoke(SITE1、SITE2)环境,实现分支间互通和 Hub-Spoke 私网路由传递。

节点LoopbackTunnel IP公网/HUB IP
HUB172.16.100.1/3210.10.10.1/2415.1.1.1
SITE1172.16.100.11/3210.10.10.2/24NAT/15.1.1.2
SITE2172.16.100.12/3210.10.10.3/24NAT/15.1.1.3

ADVPN 一定程度缓解了多站点IPSECVPN 的实施难度

拓扑示意:

image.png


实施步骤

1 VAM Server 配置(HUB)

# 静态路由到 HUB 公网出口
ip route-static 0.0.0.0 0 15.1.1.2

# ADVPN Domain 配置
domain advpn
 authentication advpn local
 domain default enable advpn

# 用户配置
local-user HUB class network
 password simple HUB
 service-type advpn

local-user SITE1 class network
 password simple SITE1
 service-type advpn

local-user SITE2 class network
 password simple SITE2
 service-type advpn

# VAM Server Hub/Spoke 配置
vam server advpn-domain ADVPN id 1
 hub-group HUB
 hub private-address 10.10.10.1
 #hub private-address 10.10.10.2
 #hub private-address 10.10.10.3
 spoke private-address range 10.10.10.0 10.10.10.255

vam server advpn-domain ADVPN id 1
 pre-shared-key simple ADVPN
 authentication-method chap
 server enable

说明:Hub Group 中 Hub Tunnel IP 可多地址,形成 Full-Mesh;Spoke 使用 私有IP 范围配置。


2 HUB Client 配置

# Loopback 配置
interface Loopback0
 ip address 172.16.100.1 32

# VAM Client
vam client name HUB
 advpn-domain ADVPN
 server primary ip-address 15.1.1.1
 pre-shared-key simple ADVPN
 user HUB password simple HUB
 client enable

# IKE 配置
ike keychain ADVPN
 pre-shared-key address 0.0.0.0 0.0.0.0 key simple ADVPN

ike profile ADVPN
 keychain ADVPN

# IPsec 配置
ipsec transform-set ADVPN
 encapsulation-mode transport
 esp encryption-algorithm des-cbc
 esp authentication-algorithm sha1

ipsec profile ADVPN isakmp
 transform-set ADVPN
 ike-profile ADVPN

# OSPF 配置
ospf 1 router-id 172.16.100.1
 area 0.0.0.0
  network 10.1.1.0 0.0.0.255
  network 10.10.10.0 0.0.0.255
  network 172.16.100.1 0.0.0.0

# Tunnel 接口配置
interface Tunnel1 mode advpn gre
 ip address 10.10.10.1 255.255.255.0
 ospf network-type p2mp
 source GigabitEthernet0/0
 tunnel protection ipsec profile ADVPN
 vam client HUB

# 可替换为udp封装 效果类似
interface Tunnel1 mode advpn udp
 ip address 10.10.10.1 255.255.255.0
 ospf network-type p2mp
 source GigabitEthernet0/0
 tunnel protection ipsec profile ADVPN
 vam client HUB

3 Spoke 配置(SITE1 & SITE2)

# Loopback
interface Loopback0
 ip address 172.16.100.11 32

# VAM Client
vam client name SITE1
 advpn-domain ADVPN
 server primary ip-address 15.1.1.1
 pre-shared-key simple ADVPN
 user SITE1 password simple SITE1
 client enable

# IKE/IPsec
ike keychain ADVPN
 pre-shared-key address 0.0.0.0 0.0.0.0 key simple ADVPN

ike profile ADVPN
 keychain ADVPN

ipsec transform-set ADVPN
 encapsulation-mode transport
 esp encryption-algorithm des-cbc
 esp authentication-algorithm sha1

ipsec profile ADVPN isakmp
 transform-set ADVPN
 ike-profile ADVPN

# OSPF
ospf 1 router-id 172.16.100.11
 area 0.0.0.0
  network 10.10.10.0 0.0.0.255
  network 172.16.100.11 0.0.0.0

# Tunnel 接口
interface Tunnel1 mode advpn gre
 ip address 10.10.10.2 255.255.255.0
 ospf network-type p2mp
 source GigabitEthernet0/0
 tunnel protection ipsec profile ADVPN
 vam client SITE1

# 可替换为udp封装 效果类似
interface Tunnel1 mode advpn udp
 ip address 10.10.10.2 255.255.255.0
 ospf network-type p2mp
 source GigabitEthernet0/0
 tunnel protection ipsec profile ADVPN
 vam client SITE1

SITE2 配置同理,Loopback 172.16.100.12,Tunnel 10.10.10.3。


4 测试与验证

  1. 查看 ADVPN 客户端状态:

image.png

  1. 查看 VAM 注册情况:

image.png

  1. 验证 OSPF 邻居与路由:

image.png

  1. 测试 HUB-Spoke 连通性:

image.png

5 小知识

Q1:为什么 IPsec 隧道采用传输模式而非隧道模式?

A:

ADVPN 中隧道头由 GRE/UDP 承担,IPsec 仅负责数据加密,因此选用传输模式即可,既能保障安全,又避免性能损失与路由问题。


Q2:OSPF 网络类型为什么选择 P2MP?

A:

ADVPN 中选用 P2MP 而不是 Broadcast/P2P ,是因为 Broadcast 存在 DR/BDR 选举问题,P2P 只支持单邻居,都无法适应 Spoke-Spoke 动态隧道拓扑。P2MP 无选举、支持多邻居,才是最佳选择。


Q3:Hub 节点是否必须具备公网地址?

A:

为保证 ADVPN 正常工作(Spoke 注册、动态隧道建立、多 Hub 互联),Hub 节点必须能够从公网侧被访问,拥有公网地址或稳定的 NAT 映射是基本要求。