您好,欢迎来到江浙沪招生考试网 !

设为首页|加入收藏|联系我们|网站地图|

江浙沪招生考试网

您现在的位置: test4exam >> 计算机考试 >> 华为3Com考试 >> 正文

实验2 配置L2TP VPN

日期:2014/11/28 16:38:47 来源:本站原创 访问量:

 

步骤四:步骤一:配置LAC

 [RTA] l2tp enable

 

[RTA]l2tp-group 1

[RTA-l2tp1] tunnel password simple aabbcc

[RTA-l2tp1] tunnel name LAC

[RTA-l2tp1] start l2tp ip 2.2.2.1 domain abc.com

步骤五:步骤二:配置LNS

RTB上进行配置。首先启动L2TP功能:

[RTB]l2tp enable

然后配置abc.com域,并配置IP地址池。此域用于提供对L2TP VPN用户进行身份验证的参数,此地址池用于对L2TP VPN客户端分配IP地址:

[RTB]domain abc.com

[RTB-isp-abc.com]authentication ppp local

[RTB-isp-abc.com]ip pool 1 192.168.1.2 192.168.1.100

随后添加一个本地用户,并配置其密码和服务类型,用于对L2TP VPN用户进行身份验证:

[RTB-isp-abc.com]local-user vpdnuser

[RTB-luser-vpdnuser]password simple Hello

[RTB-luser-vpdnuser]service-type ppp

接着配置L2TP组,指定其接受来自abc.com域且名为LAC的对端设备发起的控制连接,并配置了相应的隧道本端名称、隧道验证密码等:

[RTB-luser-vpdnuser]l2tp-group 1

[RTB-l2tp1]allow l2tp virtual-template 1 remote LAC domain abc.com

[RTB-l2tp1]tunnel password simple aabbcc

[RTB-l2tp1]tunnel name LNS

最后还需要配置一个虚模版接口,以便对拨入的L2TP VPN用户进行身份验证,为其分配地址并与其进行IP通信:

[RTB-l2tp1]interface Virtual-Template1

[RTB-Virtual-Template1]ppp authentication-mode chap domain abc.com

[RTB-Virtual-Template1]remote address pool 1

[RTB-Virtual-Template1]ip address 192.168.1.1 255.255.255.0

 

步骤六:步骤三:配置PPPoE客户端,发起L2TP呼叫

PCA上创建PPPoE连接。在Windows XP中,在任务栏上单击【开始】->【所有程序】->【附件】->【通讯】->【新建连接向导】,打开如2-2所示的【新建连接向导】窗口。

                                                                                                                                                图2-1 【新建连接向导】窗口

单击【下一步】,进入2-3所示的窗口。选择【连接到Internet】。

                                                                                                                                                      图2-2 选择网络连接类型

单击【下一步】,进入2-4所示的窗口,选择【手动设置我的连接】。

单击【下一步】,进入2-5所示的窗口,选择【用要求用户名和密码的宽带连接来连接】。

                                                                                                                                                   图2-3 选择配置连接的方式

                                                                                                                                                            图2-4 选择连接类型

单击【下一步】,进入2-6所示的窗口,在【ISP名称】文本框中输入连接名称,例如“我的PPPoE连接”。

单击【下一步】,指定可使用此连接的用户,再单击【下一步】进入2-7所示的窗口。在【用户名】处输入用户名vpdnuser@abc.com,在【密码】和【确认密码】处输入密码Hello。如有必要,清除【把它作为默认的Internet连接】复选框。

单击【下一步】,再单击【完成】,即可完成连接设置。

                                                                                                                                                            图2-5 设置连接名称

                                                                                                                                                图2-6 设置Internet账户信息

在任务栏单击【开始】->【设置】->【控制面板】,打开【网络连接】窗口,可以看到刚刚配置的“我的PPPoE连接”,双击之,进入2-8所示的窗口,单击【连接】按钮即可发起连接。拨号成功后在【网络连接】窗口中可以看到此连接的状态为“已连接上”。

                                                                                                                                                                  图2-7 发起连接

步骤七:步骤四:检测私网连通性

PCAping PCB,检测连通性。应该可以连通。

步骤八:步骤五:观察隧道建立过程

RTARTB上用display命令查看相关信息,可见RTARTB之间建立了一个L2TP隧道,其中有一个L2TP会话:

[RTA]display l2tp tunnel

 Total tunnel = 1

 

 LocalTID RemoteTID RemoteAddress    Port   Sessions RemoteName

 1        1         2.2.2.1          1701   1        LNS

 

[RTA]display l2tp session

 Total session = 1

 

 LocalSID  RemoteSID  LocalTID

  11984     3303       1

 

<RTB>display l2tp tunnel

 Total tunnel = 1

 

 LocalTID RemoteTID RemoteAddress    Port   Sessions RemoteName

 1        1         1.1.1.1          1701   1        LAC

 

<RTB>display l2tp session

 Total session = 1

 

 LocalSID  RemoteSID  LocalTID

  3303      11984      1

reset命令终止隧道:

<RTB>reset l2tp tunnel name LAC

 Clear L2TP tunnel remote name = LAC

display命令查看相关信息,发现隧道和会话都消失。

RTARTB上打开debugging开关。

<RTA>debugging l2tp event

<RTA>debugging l2tp control

 

<RTB>debugging l2tp event

<RTB>debugging l2tp control

重新发起呼叫,通过debugging信息观察隧道建立的过程:

<RTA>

%Jun 29 16:10:23:450 2009 RTA IFNET/4/UPDOWN:

 Line protocol on the interface Virtual-Template0:0 is UP

*Jun 29 16:10:23:453 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: LAC is establishing a call on interface: Virtual-Template0:0

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Handle call UP, IfIndex =3145728

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: LNS address in RADIUS = 2.2.2.1

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: VPDN group number in RADIUS = 1

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: LNS address = 2.2.2.1

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Add new call 11564 to tunnel 1 call list (total 1)

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Get UDP port number successfully: port 1701

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: START_CONTROL_CONNECTION_REQUEST

*Jun 29 16:10:23:598 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Protocol version:  100

*Jun 29 16:10:23:699 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Host name: LAC

*Jun 29 16:10:23:799 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Vendor name: H3C

*Jun 29 16:10:23:910 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Framing capability :3

*Jun 29 16:10:24:11 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned Tunnel ID: 1

*Jun 29 16:10:24:61 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Receive window size: 128

*Jun 29 16:10:24:212 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Challenge :59 1A BB 52 70 E2 15 CD 82 C2 CC 3F 49 2F AB D4

*Jun 29 16:10:24:313 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 started the Hello timer (60 seconds)

*Jun 29 16:10:24:414 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 sent a SCCRQ message

*Jun 29 16:10:24:515 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:24:615 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 2

*Jun 29 16:10:24:666 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=0 tunnel ID=1 MsgType = 2 Length = 117

*Jun 29 16:10:24:767 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc a control message from the peer: type=2, len = 117

*Jun 29 16:10:24:878 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv SCCRP when in state 2

*Jun 29 16:10:24:978 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 started the Hello timer (60 seconds)

*Jun 29 16:10:25:79 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Checked SCCRP MSG TYPE = 2

*Jun 29 16:10:25:230 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Protocol version, value:  100

*Jun 29 16:10:25:281 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Framing capability, value: 3

*Jun 29 16:10:25:432 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Host name, value: LNS

*Jun 29 16:10:25:532 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Remote tunnel ID: 1

*Jun 29 16:10:25:633 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Bearer capability, value: 3

*Jun 29 16:10:25:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Receive window size: 128

*Jun 29 16:10:25:885 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Challenge, Value: 81 14 35 54 9E DC AA 1D 55 3F 1D CA 6D 7F 51 AE

*Jun 29 16:10:25:996 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Challenge response: 9F 97 EC A2 E6 84 68 56 77 FD EC 56 74 9A 6B 5D

*Jun 29 16:10:26:46 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: START_CONTROL_CONNECTION_CONNECTED

*Jun 29 16:10:26:147 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Challenge response:1D B5 3C B0 3C 23 C7 16 BC 70 76 22 2F F2 D3 2F

*Jun 29 16:10:26:248 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 sent SCCCN to tunnel 1

*Jun 29 16:10:26:349 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1: waiting for calls

*Jun 29 16:10:26:449 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: INCOMING_CALL_REQUEST

*Jun 29 16:10:26:550 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned call ID: 11564

*Jun 29 16:10:26:651 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Call serial number: 11564

*Jun 29 16:10:26:802 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Bearer type : 3

*Jun 29 16:10:26:953 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Physical channel number: 0

*Jun 29 16:10:27:64 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Dialed number: 8888

*Jun 29 16:10:27:215 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 sent a ICRQ message

*Jun 29 16:10:27:316 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:27:417 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 11

*Jun 29 16:10:27:517 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=11564 tunnel ID=1 MsgType = 11 Length = 28

*Jun 29 16:10:27:618 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc a control message from the peer: type=11, len = 28

*Jun 29 16:10:27:719 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 recv ICRP in state 4 from Call 0

*Jun 29 16:10:27:769 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 restarted the Hello timer (60 seconds)

*Jun 29 16:10:27:870 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Checked ICRP MSG TYPE = 11

*Jun 29 16:10:27:971 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP remote call ID: 13787

*Jun 29 16:10:28:82 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: INCOMING_CALL_CONNECTED

*Jun 29 16:10:28:182 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Tx connect speed: 0

*Jun 29 16:10:28:283 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Framing type : 3

*Jun 29 16:10:28:434 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Initial received LCP options

*Jun 29 16:10:28:535 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Last sent LCP options

*Jun 29 16:10:28:636 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Last received LCP options

*Jun 29 16:10:28:737 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication type : 2

*Jun 29 16:10:28:837 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication name : vpdnuser@abc.com

*Jun 29 16:10:28:938 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication challenge

*Jun 29 16:10:29:39 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication ID : 1

*Jun 29 16:10:29:150 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Proxy authenticate response:95 01 9b 56 4e 1b 7b 26 2a ee 75 3a 34 24 d7 a9

*Jun 29 16:10:29:251 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy private group number : 0

*Jun 29 16:10:29:351 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Rx connect speed: 0

*Jun 29 16:10:29:452 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 sent a ICCN message to remote Call 13787

*Jun 29 16:10:29:503 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:29:603 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 16

*Jun 29 16:10:29:754 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=11564 tunnel ID=1 MsgType = 16 Length = 36

*Jun 29 16:10:29:855 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc a control message from the peer: type=16, len = 36

*Jun 29 16:10:29:956 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:107 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:218 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:319 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:420 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:520 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:621 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:33:528 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

<RTA>

<RTA>

*Jun 29 16:10:43:604 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

<RTA>

*Jun 29 16:10:53:681 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

断开连接,观察debugging信息:

<RTA>

*Jun 29 16:10:56:752 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

%Jun 29 16:10:56:781 2009 RTA IFNET/4/UPDOWN:

 Line protocol on the interface Virtual-Template0:0 is DOWN

*Jun 29 16:10:56:782 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: CALL 11564 DOWN on interface: Virtual-Template0:0

*Jun 29 16:10:56:783 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc l2tp down msg, call in the state 9

*Jun 29 16:10:56:783 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: CALL_DISCONNECT_NOTIFY

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Result code: LOSS_OF_CARRIER

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned call ID: 11564

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 sent a CDN message

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Cleared the data structure of call 11564

*Jun 29 16:10:56:881 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc call ID = 11564 Down

*Jun 29 16:10:56:982 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Disabled L2TP successfully on interface 3145728

*Jun 29 16:10:57:82 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:57:183 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 39856

*Jun 29 16:10:57:294 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=0 tunnel ID=1 Length = 12

*Jun 29 16:10:57:395 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc peer control len = 12

<RTA>

<RTA>

*Jun 29 16:11:23:524 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Hello timer of tunnel 1 expired in 60 seconds

*Jun 29 16:11:23:524 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 sent StopCCN to Tunnel 1

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: STOP_CONTROL_CONNECTION_NOTIFICATION

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned Tunnel ID: 1

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Result code: LOSS_OF_CARRIER

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Cleared Tunnel remote ID:1, local ID:1

*Jun 29 16:11:23:770 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Received ctrl message is ZLB, discard it

<RTA>

这样就可以了解呼叫中L2TP的主要信息交换过程。限于篇幅,此处不列出RTBdebugging输出信息,请自行观察。

实验任务二:配置客户LAC模式

步骤一:执行基本配置

步骤二:配置公网路由

删除所有静态路由。在RTA上删除所有PPPoEL2TP配置。

[RTA-GigabitEthernet0/0]undo pppoe-server bind

All PPPoE Sessions on GigabitEthernet0/0 will be deleted, continue?[Y/N]:y

 

[RTA]undo domain abc.com

[RTA]undo l2tp enable

[RTA]undo l2tp-group 1

[RTA]undo interface Virtual-Template 0

[RTA]undo local-user vpdnuser

[RTA]undo domain abc.com

RTARTBSWA上配置OSPF

[RTA]ospf

[RTA-ospf-1]area 0

[RTA-ospf-1-area-0.0.0.0]network 1.0.0.0 0.255.255.255

[RTA-ospf-1-area-0.0.0.0]network 3.0.0.0 0.255.255.255

 

[SWA]ospf

[SWA-ospf-1]area 0

[SWA-ospf-1-area-0.0.0.0]network 1.0.0.0 0.255.255.255

[SWA-ospf-1-area-0.0.0.0]network 2.0.0.0 0.255.255.255

 

[RTB]ospf

[RTB-ospf-1]area 0

[RTB-ospf-1-area-0.0.0.0]network 2.0.0.0 0.255.255.255

步骤三:安装iNode客户端

PCA上安装iNode客户端。启动安装程序,跟随安装向导完成安装即可。

注意:

要使iNode客户端支持L2TP功能,在安装过程中必须确认安装虚拟网卡(Virtual NIC)。

步骤四:配置iNode客户端

启动iNode客户端程序,在其主界面窗口中单击菜单【文件】|【新建连接】,启动新建连接向导,如2-9所示。

单击【下一步】,进入2-10所示窗口,单击选定【L2TP IPSec VPN协议】。

                                                                                                                                                      图2-8 进入新建连接向导

                                                                                                                                                            图2-9 选择认证协议

单击【下一步】,进入2-11所示窗口,单击选定【普通连接】。

单击【下一步】,进入2-12所示窗口,在【连接名】处输入一个连接名称,例如“我的VPN连接”,在【登录用户名】处输入用户名,在【登录密码】处输入密码。

                                                                                                                                                         图2-10 选择连接类型

                                                                                                                                                   图2-11 设置用户名和密码

单击【下一步】,进入2-13所示窗口,输入LNS服务器地址。

单击【高级】进入2-14所示的窗口,进入【L2TP设置】选项卡,输入隧道名称LAC,选择认证模式为CHAP,单击选定【使用隧道验证密码】并输入隧道验证密码aabbcc。单击【确定】回到2-13所示窗口。

                                                                                                                                                  图2-12 VPN连接基本设置

                                                                                                                                                  图2-13 VPN连接高级属性

单击【下一步】进入2-15所示的窗口,单击【创建】,即可创建新建连接。

                                                                                                                                                   图2-14 完成新建连接向导

步骤五:配置LNS

RTB上保留上一实验任务中的LNS配置即可。为方便起见,此处列出相关的配置作为参考:

[RTB]l2tp enable

[RTB]domain abc.com

[RTB-isp-abc.com]authentication ppp local

[RTB-isp-abc.com]ip pool 1 192.168.1.2 192.168.1.100

[RTB-isp-abc.com]local-user vpdnuser

[RTB-luser-vpdnuser]password simple Hello

[RTB-luser-vpdnuser]service-type ppp

[RTB-luser-vpdnuser]l2tp-group 1

[RTB-l2tp1]allow l2tp virtual-template 1 remote LAC domain abc.com

[RTB-l2tp1]tunnel password simple aabbcc

[RTB-l2tp1]tunnel name LNS

[RTB-l2tp1]interface Virtual-Template1

[RTB-Virtual-Template1]ppp authentication-mode chap domain abc.com

[RTB-Virtual-Template1]remote address pool 1

 

步骤六:发起L2TP呼叫,建立L2TP隧道

PCA上用查看连接,可见除了物理的以太网连接之外,还出现了一个新的连接,其地址处于192.168.1.0/24网段,是从RTB的接口Virtual-template 1上动态获得的。

C:\Documents and Settings\User>ipconfig

 

Windows IP Configuration

 

 

Ethernet adapter {7E6CC322-8F6E-490A-AD0D-A86FBDF2D2B6}:

 

        Media State . . . . . . . . . . . : Media disconnected

 

Ethernet adapter 本地连接 3:

 

        Connection-specific DNS Suffix  . :

        IP Address. . . . . . . . . . . . : 192.168.1.3

        Subnet Mask . . . . . . . . . . . : 255.255.255.255

        Default Gateway . . . . . . . . . : 192.168.1.3

 

Ethernet adapter 本地连接:

 

        Connection-specific DNS Suffix  . :

        IP Address. . . . . . . . . . . . : 3.3.3.2

        Subnet Mask . . . . . . . . . . . : 255.255.255.0

        Default Gateway . . . . . . . . . : 3.3.3.1

 

RTB上用display命令查看L2TP隧道和会话信息,可见隧道已建立,其中包含一个会话:

<RTB>display l2tp tunnel

 Total tunnel = 1

 

 LocalTID RemoteTID RemoteAddress    Port   Sessions RemoteName

 1        1         3.3.3.2          1082   1        LAC

<RTB>display l2tp session

 Total session = 1

 

 LocalSID  RemoteSID  LocalTID

  30512     41         1

相关阅读

Copyright ©2013-2015 江浙沪招生考试网 All Rights Reserved.
地址: 苏州市姑苏区阊胥路483号(工投创业园)  电话:0512-85551931 邮编: 214000
邮箱: [email protected] 版权所有:苏州迈峰教育科技有限公司 苏ICP备15050684号-2