Network 版 (精华区)
发信人: ids (Plan9), 信区: Network
标 题: win2000 IPSec配置方法zz
发信站: 哈工大紫丁香 (Fri Aug 22 19:47:47 2003)
How to Configure IPSec Tunneling in Windows 2000
------------------------------------------------------------------------------
--
The information in this article applies to:
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Server
------------------------------------------------------------------------------
--
SUMMARY
You can use IP Security (IPSec) in tunnel mode to encapsulate Internet Protoco
l (IP) packets and optionally encrypt them. The primary reason for using IPSec
tunnel mode (sometimes referred to as "pure IPSec tunnel") in Windows 2000 is
for interoperability with third-party routers or gateways that do not support
Layer 2 Tunneling Protocol (L2TP)/IPSec or PPTP Virtual Private Networking (V
PN) tunneling technology.
MORE INFORMATION
Windows 2000 supports IPSec tunneling for situations where both tunnel endpoin
ts have static IP addresses. This is primarily useful in gateway-to-gateway im
plementations, but may also work for specialized network security scenarios be
tween a gateway/router and a server (like a Windows 2000 router routing traffi
c from its external interface to an internal Windows 2000-based computer secur
ing the internal path by establishing an IPSec tunnel to the internal server p
roviding services to the external clients).
Windows 2000 IPSec tunneling is not supported for client remote access VPN use
because the IETF IPSec RFCs do not currently provide a remote access solution
in the Internet Key Exchange (IKE) protocol for client-to-gateway connections
. The IETF RFC 2661 for Layer 2 Tunneling Protocol (L2TP) was specifically dev
eloped by Cisco, Microsoft, and others for the purpose of providing client rem
ote access VPN connections. In Windows 2000, client remote access VPN connecti
ons are protected using an automatically generated IPSec policy that uses IPSe
c transport mode (not tunnel mode) when the L2TP tunnel type is selected.
Windows 2000 IPSec tunneling also does not support protocol and port-specific
tunnels. While the Microsoft Management Console (MMC) IPSec Policy snap-in is
very general and allows you to associate any type of filter with a tunnel, mak
e sure you use only address information in the specification of a filter for a
tunnel rule.
Details on how the IPSec and IKE protocols work can be found in the Microsoft
Windows 2000 Resource Kit and in the Windows 2000 IPSec end-to-end walkthrough
. Information about where you can find these documents is included at the end
of this article.
This article explains how to configure an IPSec tunnel on a Windows 2000 gatew
ay. Because the IPSec tunnel secures only traffic specified in the IPSec filte
rs you configure, this article also describes how to configure filters in Rout
ing and Remote Access Service (RRAS) to prevent traffic outside the tunnel fro
m being received or forwarded. This article outlines the following scenario to
make it easy to follow the configuration steps:
NetA - Windows 2000 gateway --- Internet --- third-party gateway - NetB
W2KintIP W2KextIP 3rdExtIP 3rdIntIP
NetA is the network ID of the Windows 2000 gateway internal network.
W2KintIP is the IP address assigned to the Windows 2000 gateway internal netwo
rk adapter.
W2KextIP is the IP address assigned to the Windows 2000 gateway external netwo
rk adapter.
3rdExtIP is the IP address assigned to the third-party gateway external networ
k adapter.
3rdIntIP is the IP address assigned to the third-party gateway internal networ
k adapter.
NetB is the network ID of the third-party gateway internal network.
The goal is for the Windows 2000 gateway and the third-party gateway to establ
ish an IPSec tunnel when traffic from NetA needs to be routed to NetB or when
traffic from NetB needs to be routed to NetA so traffic is routed over a secur
e session.
You need to configure an IPSec policy. You must build two filters; one to matc
h packets going from NetA to NetB (tunnel 1), and one to match packets going f
rom NetB to NetA (tunnel 2). You need to configure a filter action to specify
how the tunnel should be secured (a tunnel is represented by a rule, so two ru
les are created).
How to Create IPSec Policy
Typically, a Windows 2000 gateway is not a member of a domain, so a local IPSe
c policy is created. If the Windows 2000 gateway is a member of a domain that
has IPSec policy applied to all members of the domain by default, this prevent
s the Windows 2000 gateway from having a local IPSec policy. In this case, you
can create an Organizational Unit (OU) in Active Directory, make the Windows
2000 gateway a member of this OU, and assign the IPSec policy to the Group Pol
icy Object (GPO) of the OU. For more information, refer to the "Assigning IPSe
c Policy" section of Windows 2000 online help.
Use the MMC to work on the IP Security Policy Management snap-in (a quick way
to load this is to click Start, click Run, and then type secpol.msc).
Right-click IP Security Policies on Local Machine, and then click Create IP Se
curity Policy.
Click Next, and then type a name for your policy (for example, IPSec Tunnel wi
th third-party Gateway).
NOTE: You can also type more information in the Description box.
Click to clear the Activate the default response rule check box, and then clic
k Next.
Click Finish (keep the Edit check box selected).
NOTE: The IPSec policy is created with default settings for the IKE main mode
(phase 1) on the General tab, in Key Exchange. The IPSec tunnel consists of tw
o rules, each of which specifies a tunnel endpoint. Because there are two tunn
el endpoints, there are two rules. The filters in each rule must represent the
source and destination IP addresses in IP packets that are sent to that rule'
s tunnel endpoint.
How to Build a Filter List from NetA to NetB
In the new policy properties, click to clear the Use Add Wizard check box, and
then click Add to create a new rule.
On the IP Filter List tab, click Add.
Type an appropriate name for the filter list, click to clear the Use Add Wizar
d check box, and then click Add.
In the Source address area, click A specific IP Subnet, and then fill in the I
P Address and Subnet mask boxes to reflect NetA.
In the Destination address area, click A specific IP Subnet, and fill in the I
P Address and Subnet mask boxes to reflect NetB.
Click to clear the Mirrored check box.
On the Protocol tab, make sure the protocol type is set to Any, because IPSec
tunnels do not support protocol-specific or port-specific filters.
If you want to type a description for your filter, click the Description tab.
It is generally a good idea to give the filter the same name you used for the
filter list. The filter name is displayed in the IPSec monitor when the tunnel
is active.
Click OK, and then click Close.
How to Build a Filter List from NetB to NetA
On the IP Filter List tab, click Add.
Type an appropriate name for the filter list, click to clear the Use Add Wizar
d check box, and then click Add.
In the Source address area, click A specific IP Subnet, and then fill in the I
P Address and Subnet mask boxes to reflect NetB.
In the Destination address area, click A specific IP Subnet, and fill in the I
P Address and Subnet mask boxes to reflect NetA.
Click to clear the Mirrored check box.
If you want to type a description for your filter, click the Description tab.
Click OK, and then click Close.
How to Configure a Rule for a NetA-to-NetB Tunnel
On the IP Filter List tab, click the filter list you created.
On the Tunnel Setting tab, click The tunnel endpoint is specified by this IP A
ddress box, and then type 3rdextip (where 3rdextip is the IP address assigned
to the third-party gateway external network adapter).
On the Connection Type tab, click All network connections (or click LAN connec
tions if W2KextIP is not an ISDN, PPP, or direct connect serial connection).
On the Filter Action tab, click to clear the Use Add Wizard check box, and the
n click Add to create a new filter action because the default actions allow in
coming traffic in the clear.
Keep the Negotiate security option enabled, and click to clear the Accept unse
cured communication, but always respond using IPSec check box. You must do thi
s to ensure secure operation.
NOTE: None of the check boxes at the bottom of the Filter Action dialog box sh
ould be checked as an initial configuration for a filter action that applies t
o tunnel rules. Only the Perfect Forward Secrecy (PFS) check box is a valid se
tting for tunnels if the other end of the tunnel is also configured to use PFS
. The other two check boxes are not valid for tunnel filter actions.
Click Add, and keep the High (ESP) option selected (or you can select the Cust
om (for expert users) option if you want to define specific algorithms and ses
sion key lifetimes). Encapsulating Security Payload (ESP) is one of the two IP
Sec protocols.
Click OK. On the General tab, type a name for the new filter action (for examp
le, IPSec tunnel: ESP DES/MD5), and then click OK.
Select the filter action you just created.
On the Authentication Methods tab, configure the authentication method you wan
t (use preshared key for testing, otherwise, use certificates). Kerberos is te
chnically possible if both ends of the tunnel are in trusted domains, and that
trusted domain's IP address (IP address of a domain controller) is reachable
on the network by both ends of the tunnel during IKE negotiation of the tunnel
(before it is established). This is a rare case.
Click Close.
How to Configure a Rule for a NetB-to-NetA Tunnel
In IPSec policy properties, click Add to create a new rule.
On the IP Filter List tab, click the filter list you created (from NetB to Net
A).
On the Tunnel Setting tab, click The tunnel endpoint is specified by this IP A
ddress box, and then type w2kextip (where w2kextip is the IP address assigned
to the Windows 2000 gateway external network adapter).
On the Connection Type tab, click All network connections (or click LAN connec
tions if W2KextIP is not an ISDN, PPP, or direct connect serial connection). A
ny outbound traffic on the interface type that matches the filters attempts to
be tunneled to the tunnel endpoint specified in the rule. Inbound traffic tha
t matches the filters is discarded because it should be received secured by an
IPSec tunnel.
On the Filter Action tab, click the filter action you created.
On the Authentication Methods tab, configure the same method used in the first
rule (same method must be used in both rules).
Click Close, make sure both rules you created are enabled in your policy, and
then click Close.
How to Assign Your New IPSec Policy to Your Windows 2000 Gateway
In the IP Security Policies on Local Machine MMC snap-in, right-click your new
policy, and then click Assign. A green arrow appears in the folder icon next
to your policy.
After your policy is assigned, you have two additional active filters (RRAS au
tomatically creates IPSec filters for L2TP traffic). To see the active filters
, type the following command at a command prompt:
netdiag /test:ipsec /debug
You can optionally redirect the output of this command to a text file so you c
an view it with a text editor (such as Notepad) by typing the following comman
d:
netdiag /test:ipsec /debug > filename.txt
The netdiag command is available after you install the Microsoft Windows 2000
Resource Kit, which you can install from your Windows 2000 CD-ROM. To install
the kit, locate the Support\Tools folder, and then double-click the Setup.exe
file. After installation, you may need to run the netdiag command from the %Sy
stemRoot%\Program Files\Support Tools folder (where %SystemRoot% is the drive
where Windows 2000 is installed).
The tunnel filters look similar to the following example:
Local IPSec Policy Active: 'IPSec tunnel with {tunnel endpoint}' IP Security P
olicy Path:
SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local\ipsecPolicy{-longnumber
-}
There are two filters
From NetA to NetB
Filter ID: {-long number-}
Policy ID: {-long number-}
IPSEC_POLICY PolicyId = {-long number-}
Flags: 0x0
Tunnel Addr: 0.0.0.0
PHASE 2 OFFERS Count = 1
Offer #0:
ESP[ DES MD5 HMAC]
Rekey: 0 seconds / 0 bytes.
AUTHENTICATION INFO Count = 1
Method = Preshared key: -actual key-
Src Addr: NetA Src Mask: -subnet mask-
Dest Addr: NetB Dest Mask: -subnet mask-
Tunnel Addr: 3rdExtIP Src Port: 0 Dest Port: 0
Protocol: 0 TunnelFilter: Yes
Flags : Outbound
From NetB to NetA
Filter ID: {-long number-}
Policy ID: {-long number-}
IPSEC_POLICY PolicyId = {-long number-}
Flags: 0x0
Tunnel Addr: 0.0.0.0
PHASE 2 OFFERS Count = 1
Offer #0:
ESP[ DES MD5 HMAC]
Rekey: 0 seconds / 0 bytes.
AUTHENTICATION INFO Count = 1
Method = Preshared key: -actual key-
Src Addr: NetB Src Mask: -subnet mask-
Dest Addr: NetA Dest Mask: -subnet mask-
Tunnel Addr: W2KextIP Src Port: 0 Dest Port: 0
Protocol: 0 TunnelFilter: Yes
Flags: Inbound
How to Configure RRAS Filtering
If you want to prevent traffic that does not have a source or destination addr
ess matching NetA or NetB, create an output filter for the external interface
in the RRAS MMC so it drops all traffic except packets from NetA to NetB, and
an input filter so it drops all traffic except packets from NetB to NetA. You
also need to allow traffic to/from W2KextIP and 3rdExtIP to allow IKE negotiat
ion when the tunnel is being created. RRAS filtering is performed above IPSec,
you do not have to allow the IPSec protocol because it never reaches the IP p
acket filter layer. The following example is a very simple representation of t
he Windows 2000 TCP/IP architecture:
Application layer
Transport layer (TCP|UDP|ICMP|RAW)
---- Network layer start ----
IP Packet Filter (where NAT/RRAS filtering is done)
IPSec (where IPSec filters are implemented)
Fragmentation/Reassembly
---- Network layer end ------
NDIS Interface
Datalink layer
Physical layer
To configure the filters in RRAS, load the RRAS MMC and use the following step
s:
Expand your server tree under Routing and Remote Access, expand the IP Routing
subtree, and then click General.
Right-click W2KextIP, and then click Properties.
Click Output Filters, and then click Add.
Click to select the Source network and Destination network check boxes.
In the Source network area, fill in the IP address and Subnet mask boxes to re
flect NetA.
In the Destination network area, fill in the IP address and Subnet mask boxes
to reflect NetB.
Keep the protocol set to Any, and then click OK.
Click Add, and then click to select the Source network and Destination network
check boxes.
In the Source network area, fill in the IP address and Subnet mask boxes to re
flect W2KextIP.
In the Destination network area, fill in the IP address and Subnet mask boxes
to reflect 3rdExtIP (for IKE negotiation use subnet mask of 255.255.255.255).
Keep the protocol set to Any, and then click OK.
Click to select the Drop all packets except those that meet the criteria below
check box, and then click OK.
Click Input Filters, click Add, and then click to select the Source network an
d Destination network check boxes.
In the Source network area, fill in the IP address and Subnet mask boxes to re
flect NetB.
In the Destination network area, fill in the IP address and Subnet mask boxes
to reflect NetA.
Keep the protocol set to Any, and then click OK.
Click Add, and then click to select the Source network and Destination network
check boxes.
In the Source network area, fill in the IP address and Subnet mask boxes to re
flect 3rdExtIP.
In the Destination network area, fill in the IP address and Subnet mask boxes
to reflect W2KextIP (or IKE negotiation use subnet mask of 255.255.255.255).
Keep the protocol set to Any, and then click OK.
Click to select the Drop all packets except those that meet the criteria below
check box, and then click OK twice.
NOTE: If the RRAS server has more than one interface connected to the Internet
, or if you have multiple IPSec tunnels, type RRAS exempt filters for each IPS
ec tunnel (each source and destination IP subnet) for every Internet interface
.
How to Configure Static Routes in RRAS
The Windows 2000 gateway needs to have a route in its route table for NetB, wh
ich you can configure by adding a static route in the RRAS MMC. If the Windows
2000 gateway is multihomed with two or more network adapters on the same exte
rnal network (or two or more networks that can reach the destination tunnel IP
3rdExtIP), the potential exists for the following:
Outbound tunnel traffic leaves on one interface, and the inbound tunnel traffi
c is received on a different interface. Even if you use IPSec offload network
adapters, receiving on a different interface (than outbound tunnel traffic is
sent on) does not allow the receiving network adapter to process the encryptio
n in hardware, because only the outbound interface gets to offload the Securit
y Association (SA).
Outbound tunnel traffic leaves on an interface that is different than the inte
rface that has the tunnel endpoint IP address. The source IP of the tunneled p
acket is the source IP on the outbound interface. If this is not the source IP
that is expected by the other end, the tunnel is not established (or packets
are dropped by the remote endpoint if the tunnel has already been established)
.
To address the issue of sending outbound tunnel traffic on the wrong interface
, define a static route to bind traffic to NetB to the appropriate external in
terface:
In the RRAS MMC, expand your server tree, expand the IP Routing subtree, right
-click Static Routes, and then click New Static Route.
In the Interface area, click W2KextIP (if this is the interface you want to al
ways use for outbound tunnel traffic).
Fill the Destination and Network Mask boxes to reflect NetB.
In the Gateway box, type 3rdextip.
Keep the Metric value set to its default (1), and then click OK.
NOTE: To address the issue of receiving inbound tunnel traffic on the wrong in
terface, do not advertise the interface's IP address using a routing protocol
and configure a filter in RRAS to drop packets to NetA or W2KextIP as indicate
d in the "How to Configure RRAS Filtering" section of this article.
Testing Your IPSec Tunnel
You can initiate the tunnel by pinging from a computer on NetA to a computer o
n NetB (or from NetB to NetA). If you created the filters correctly and assign
ed the correct policy, the two gateways establish an IPSec tunnel so they can
send the ICMP traffic from the ping command in encrypted format.
Even if the ping command works, you should verify that the ICMP traffic was se
nt in encrypted format from gateway to gateway. You can use the following tool
s to accomplish this.
Enable Auditing for Logon Events and Object Access
This logs events in the security log informing you if IKE security association
negotiation was attempted, and if was successful or not.
Using the Group Policy MMC snap-in, expand Local Computer Policy, and go to Co
mputer Configuration/Windows Settings/Security Settings/Local Policies/Audit P
olicy.
Enable success and failure auditing for "Audit logon events" and "Audit object
access."
NOTE: If the Windows 2000 gateway is a member of a domain and if you are using
a domain policy for auditing, the domain policy overwrites your local policy.
In this case, modify the domain policy.
IP Security Monitor
This tool shows IPSec statistics and active SAs. After you attempt to establis
h the tunnel using the ping command, you can see if an SA was created (if the
tunnel creation is successful, an SA is displayed). If the ping command is suc
cessful but there is no SA, the ICMP traffic was not protected by IPSec. If yo
u see a "soft association" that did not previously exist, then IPSec agreed to
allow this traffic to go on the clear (without encryption).
To load IP Security Monitor, click Start, click Run, and then type ipsecmon.
Network Monitor
You can use Network Monitor to capture traffic going through the W2KextIP inte
rface while you attempt to ping the computer. If you can see ICMP packets in t
he capture with source and destination IP addresses corresponding to the IP ad
dress of the computer from which you are pinging and the computer you are tryi
ng to ping, then IPSec is not protecting the traffic. If you do not see this I
CMP traffic but see ISAKMP and ESP packets instead, IPSec is protecting traffi
c. If you are using just the Authentication Header (AH) IPSec protocol, you wi
ll see the ISAKMP traffic followed by the ICMP packets. ISAKMP packets are the
actual IKE negotiation taking place, and ESP packets are the payload data enc
rypted by the IPSec protocol.
You can install Network Monitor from your Windows 2000 Server CD-ROM. It is no
t available on the Windows 2000 Professional CD-ROM, but you can install the t
ool on a computer running Windows 2000 Professional if you have Microsoft Syst
ems Management Server (SMS).
For additional information about installing Network Monitor in Windows 2000, c
lick the article number below to view the article in the Microsoft Knowledge B
ase:
Q243270 How to Install Network Monitor in Windows 2000
Actual Test
Before you attempt to ping from a computer on one subnet to the other (NetA or
NetB), type ipconfig at a command prompt. The network interfaces that are ini
tialized in the TCP/IP stack are displayed.
Run the IP Security Monitor tool.
Load Network Monitor, click Capture/Network, and then click the W2KextIP inter
face (you can start a capture by clicking Capture/Start).
Attempt to ping the computer. The first ICMP echo packets may timeout while th
e IPSec tunnel is being built. If the ping attempt is not successful, check th
e security and system logs.
If the ping attempt is successful, stop the Network Monitor capture and see if
the ICMP traffic went on the clear or if you just see the ISAKMP and IPSec pr
otocol packets. Check IP Security Monitor to see if an SA was created using th
e NetA to NetB filter you created. Also check the security log. You should see
Event ID 541 (IKE security association established).
Type ipconfig at a command prompt again so you see that there is no additional
TCP/IP interface while the tunnel is up. This is because IPSec is actually pr
otecting the traffic going through the physical interface (W2KextIP).
If the remote gateway is also a Windows 2000 node, keep in mind the following
information:
The default gateway for clients in NetA should be W2KextIP; the default gatewa
y for clients in NetB should be 3rdIntIP.
An IPSec tunnel does not change the way traffic is routed in the Windows 2000
gateway (which is able to route packets because routing is enabled in RRAS; th
e actual LAN or WAN interface metrics are still used.
For more information on RRAS, please see the Windows 2000 online help, which i
s also available on the following Microsoft Web site:
http://www.microsoft.com/windows2000/techinfo/proddoc/default.asp
You can find the Windows 2000 Resource Kit, walkthroughs, and other technical
documentation at the following Microsoft Web site:
http://www.microsoft.com/windows2000/techinfo/planning/
For additional information about soft associations, click the article number b
elow to view the article in the Microsoft Knowledge Base:
Q234580 'Soft Associations' Between IPSec-Enabled and Non-IPSec-Enabled Comput
ers
For IETF standards information, refer to the appropriate Web sites:
IPSec
http://www.ietf.org/html.charters/ipsec-charter.html
L2TP
http://www.ietf.org/html.charters/pppext-charter.html
ftp://ftp.isi.edu/in-notes/rfc2661.txt
http://www.ietf.org/html.charters/l2tpext-charter.html
The third-party contact information included in this article is provided to he
lp you find the technical support you need. This contact information is subjec
t to change without notice. Microsoft in no way guarantees the accuracy of thi
s third-party contact information.
--
o_o ...oO
( V )
( | | )
' " " `
※ 来源:.哈工大紫丁香 bbs.hit.edu.cn [FROM: 218.9.120.250]
Powered by KBS BBS 2.0 (http://dev.kcn.cn)
页面执行时间:207.060毫秒