亚洲综合日韩无码久久,超高清欧美videosseⅹo,精品国产免费第一区二区三区日韩,午夜国产精品久久影院,亚洲国产中文精品无码久久一线北

您好,歡迎來到江浙滬招生考試網(wǎng) !

設為首頁|加入收藏|聯(lián)系我們|網(wǎng)站地圖|

江浙滬招生考試網(wǎng)

您現(xiàn)在的位置: test4exam >> 計算機考試 >> 華為3Com考試 >> 正文

實驗2 配置L2TP VPN

日期:2014/11/28 16:38:47 來源:本站原創(chuàng) 訪問量:

 

步驟四:步驟一:配置LAC

 [RTA] l2tp enable

 

[RTA]l2tp-group 1

[RTA-l2tp1] tunnel password simple aabbcc

[RTA-l2tp1] tunnel name LAC

[RTA-l2tp1] start l2tp ip 2.2.2.1 domain abc.com

步驟五:步驟二:配置LNS

RTB上進行配置。首先啟動L2TP功能:

[RTB]l2tp enable

然后配置abc.com域,并配置IP地址池。此域用于提供對L2TP VPN用戶進行身份驗證的參數(shù),此地址池用于對L2TP VPN客戶端分配IP地址:

[RTB]domain abc.com

[RTB-isp-abc.com]authentication ppp local

[RTB-isp-abc.com]ip pool 1 192.168.1.2 192.168.1.100

隨后添加一個本地用戶,并配置其密碼和服務類型,用于對L2TP VPN用戶進行身份驗證:

[RTB-isp-abc.com]local-user vpdnuser

[RTB-luser-vpdnuser]password simple Hello

[RTB-luser-vpdnuser]service-type ppp

接著配置L2TP組,指定其接受來自abc.com域且名為LAC的對端設備發(fā)起的控制連接,并配置了相應的隧道本端名稱、隧道驗證密碼等:

[RTB-luser-vpdnuser]l2tp-group 1

[RTB-l2tp1]allow l2tp virtual-template 1 remote LAC domain abc.com

[RTB-l2tp1]tunnel password simple aabbcc

[RTB-l2tp1]tunnel name LNS

最后還需要配置一個虛模版接口,以便對撥入的L2TP VPN用戶進行身份驗證,為其分配地址并與其進行IP通信:

[RTB-l2tp1]interface Virtual-Template1

[RTB-Virtual-Template1]ppp authentication-mode chap domain abc.com

[RTB-Virtual-Template1]remote address pool 1

[RTB-Virtual-Template1]ip address 192.168.1.1 255.255.255.0

 

步驟六:步驟三:配置PPPoE客戶端,發(fā)起L2TP呼叫

PCA上創(chuàng)建PPPoE連接。在Windows XP中,在任務欄上單擊【開始】->【所有程序】->【附件】->【通訊】->【新建連接向導】,打開如2-2所示的【新建連接向導】窗口。

                                                                                                                                                圖2-1 【新建連接向導】窗口

單擊【下一步】,進入2-3所示的窗口。選擇【連接到Internet】。

                                                                                                                                                      圖2-2 選擇網(wǎng)絡連接類型

單擊【下一步】,進入2-4所示的窗口,選擇【手動設置我的連接】。

單擊【下一步】,進入2-5所示的窗口,選擇【用要求用戶名和密碼的寬帶連接來連接】。

                                                                                                                                                   圖2-3 選擇配置連接的方式

                                                                                                                                                            圖2-4 選擇連接類型

單擊【下一步】,進入2-6所示的窗口,在【ISP名稱】文本框中輸入連接名稱,例如“我的PPPoE連接”。

單擊【下一步】,指定可使用此連接的用戶,再單擊【下一步】進入2-7所示的窗口。在【用戶名】處輸入用戶名vpdnuser@abc.com,在【密碼】和【確認密碼】處輸入密碼Hello。如有必要,清除【把它作為默認的Internet連接】復選框。

單擊【下一步】,再單擊【完成】,即可完成連接設置。

                                                                                                                                                            圖2-5 設置連接名稱

                                                                                                                                                圖2-6 設置Internet賬戶信息

在任務欄單擊【開始】->【設置】->【控制面板】,打開【網(wǎng)絡連接】窗口,可以看到剛剛配置的“我的PPPoE連接”,雙擊之,進入2-8所示的窗口,單擊【連接】按鈕即可發(fā)起連接。撥號成功后在【網(wǎng)絡連接】窗口中可以看到此連接的狀態(tài)為“已連接上”。

                                                                                                                                                                  圖2-7 發(fā)起連接

步驟七:步驟四:檢測私網(wǎng)連通性

PCAping PCB,檢測連通性。應該可以連通。

步驟八:步驟五:觀察隧道建立過程

RTARTB上用display命令查看相關信息,可見RTARTB之間建立了一個L2TP隧道,其中有一個L2TP會話:

[RTA]display l2tp tunnel

 Total tunnel = 1

 

 LocalTID RemoteTID RemoteAddress    Port   Sessions RemoteName

 1        1         2.2.2.1          1701   1        LNS

 

[RTA]display l2tp session

 Total session = 1

 

 LocalSID  RemoteSID  LocalTID

  11984     3303       1

 

<RTB>display l2tp tunnel

 Total tunnel = 1

 

 LocalTID RemoteTID RemoteAddress    Port   Sessions RemoteName

 1        1         1.1.1.1          1701   1        LAC

 

<RTB>display l2tp session

 Total session = 1

 

 LocalSID  RemoteSID  LocalTID

  3303      11984      1

reset命令終止隧道:

<RTB>reset l2tp tunnel name LAC

 Clear L2TP tunnel remote name = LAC

display命令查看相關信息,發(fā)現(xiàn)隧道和會話都消失。

RTARTB上打開debugging開關。

<RTA>debugging l2tp event

<RTA>debugging l2tp control

 

<RTB>debugging l2tp event

<RTB>debugging l2tp control

重新發(fā)起呼叫,通過debugging信息觀察隧道建立的過程:

<RTA>

%Jun 29 16:10:23:450 2009 RTA IFNET/4/UPDOWN:

 Line protocol on the interface Virtual-Template0:0 is UP

*Jun 29 16:10:23:453 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: LAC is establishing a call on interface: Virtual-Template0:0

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Handle call UP, IfIndex =3145728

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: LNS address in RADIUS = 2.2.2.1

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: VPDN group number in RADIUS = 1

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: LNS address = 2.2.2.1

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Add new call 11564 to tunnel 1 call list (total 1)

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Get UDP port number successfully: port 1701

*Jun 29 16:10:23:454 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: START_CONTROL_CONNECTION_REQUEST

*Jun 29 16:10:23:598 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Protocol version:  100

*Jun 29 16:10:23:699 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Host name: LAC

*Jun 29 16:10:23:799 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Vendor name: H3C

*Jun 29 16:10:23:910 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Framing capability :3

*Jun 29 16:10:24:11 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned Tunnel ID: 1

*Jun 29 16:10:24:61 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Receive window size: 128

*Jun 29 16:10:24:212 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Challenge :59 1A BB 52 70 E2 15 CD 82 C2 CC 3F 49 2F AB D4

*Jun 29 16:10:24:313 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 started the Hello timer (60 seconds)

*Jun 29 16:10:24:414 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 sent a SCCRQ message

*Jun 29 16:10:24:515 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:24:615 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 2

*Jun 29 16:10:24:666 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=0 tunnel ID=1 MsgType = 2 Length = 117

*Jun 29 16:10:24:767 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc a control message from the peer: type=2, len = 117

*Jun 29 16:10:24:878 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv SCCRP when in state 2

*Jun 29 16:10:24:978 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 started the Hello timer (60 seconds)

*Jun 29 16:10:25:79 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Checked SCCRP MSG TYPE = 2

*Jun 29 16:10:25:230 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Protocol version, value:  100

*Jun 29 16:10:25:281 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Framing capability, value: 3

*Jun 29 16:10:25:432 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Host name, value: LNS

*Jun 29 16:10:25:532 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Remote tunnel ID: 1

*Jun 29 16:10:25:633 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Bearer capability, value: 3

*Jun 29 16:10:25:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Receive window size: 128

*Jun 29 16:10:25:885 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Challenge, Value: 81 14 35 54 9E DC AA 1D 55 3F 1D CA 6D 7F 51 AE

*Jun 29 16:10:25:996 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Challenge response: 9F 97 EC A2 E6 84 68 56 77 FD EC 56 74 9A 6B 5D

*Jun 29 16:10:26:46 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: START_CONTROL_CONNECTION_CONNECTED

*Jun 29 16:10:26:147 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Challenge response:1D B5 3C B0 3C 23 C7 16 BC 70 76 22 2F F2 D3 2F

*Jun 29 16:10:26:248 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 sent SCCCN to tunnel 1

*Jun 29 16:10:26:349 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1: waiting for calls

*Jun 29 16:10:26:449 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: INCOMING_CALL_REQUEST

*Jun 29 16:10:26:550 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned call ID: 11564

*Jun 29 16:10:26:651 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Call serial number: 11564

*Jun 29 16:10:26:802 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Bearer type : 3

*Jun 29 16:10:26:953 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Physical channel number: 0

*Jun 29 16:10:27:64 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Dialed number: 8888

*Jun 29 16:10:27:215 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 sent a ICRQ message

*Jun 29 16:10:27:316 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:27:417 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 11

*Jun 29 16:10:27:517 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=11564 tunnel ID=1 MsgType = 11 Length = 28

*Jun 29 16:10:27:618 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc a control message from the peer: type=11, len = 28

*Jun 29 16:10:27:719 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 recv ICRP in state 4 from Call 0

*Jun 29 16:10:27:769 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 restarted the Hello timer (60 seconds)

*Jun 29 16:10:27:870 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Checked ICRP MSG TYPE = 11

*Jun 29 16:10:27:971 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP remote call ID: 13787

*Jun 29 16:10:28:82 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: INCOMING_CALL_CONNECTED

*Jun 29 16:10:28:182 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Tx connect speed: 0

*Jun 29 16:10:28:283 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Framing type : 3

*Jun 29 16:10:28:434 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Initial received LCP options

*Jun 29 16:10:28:535 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Last sent LCP options

*Jun 29 16:10:28:636 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Last received LCP options

*Jun 29 16:10:28:737 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication type : 2

*Jun 29 16:10:28:837 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication name : vpdnuser@abc.com

*Jun 29 16:10:28:938 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication challenge

*Jun 29 16:10:29:39 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy authentication ID : 1

*Jun 29 16:10:29:150 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Parse AVP Proxy authenticate response:95 01 9b 56 4e 1b 7b 26 2a ee 75 3a 34 24 d7 a9

*Jun 29 16:10:29:251 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Proxy private group number : 0

*Jun 29 16:10:29:351 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Rx connect speed: 0

*Jun 29 16:10:29:452 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 sent a ICCN message to remote Call 13787

*Jun 29 16:10:29:503 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:29:603 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 16

*Jun 29 16:10:29:754 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=11564 tunnel ID=1 MsgType = 16 Length = 36

*Jun 29 16:10:29:855 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc a control message from the peer: type=16, len = 36

*Jun 29 16:10:29:956 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:107 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:218 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:319 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:420 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:520 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:30:621 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

*Jun 29 16:10:33:528 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

<RTA>

<RTA>

*Jun 29 16:10:43:604 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

<RTA>

*Jun 29 16:10:53:681 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

斷開連接,觀察debugging信息:

<RTA>

*Jun 29 16:10:56:752 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc peer data. Result 0

%Jun 29 16:10:56:781 2009 RTA IFNET/4/UPDOWN:

 Line protocol on the interface Virtual-Template0:0 is DOWN

*Jun 29 16:10:56:782 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: CALL 11564 DOWN on interface: Virtual-Template0:0

*Jun 29 16:10:56:783 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc l2tp down msg, call in the state 9

*Jun 29 16:10:56:783 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: CALL_DISCONNECT_NOTIFY

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Result code: LOSS_OF_CARRIER

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned call ID: 11564

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Call 11564 sent a CDN message

*Jun 29 16:10:56:784 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Cleared the data structure of call 11564

*Jun 29 16:10:56:881 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Proc call ID = 11564 Down

*Jun 29 16:10:56:982 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Disabled L2TP successfully on interface 3145728

*Jun 29 16:10:57:82 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 recv ctrl message and restarted Hello timer

*Jun 29 16:10:57:183 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Received message type: 39856

*Jun 29 16:10:57:294 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Board 0 recv from SOCK call ID=0 tunnel ID=1 Length = 12

*Jun 29 16:10:57:395 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Proc peer control len = 12

<RTA>

<RTA>

*Jun 29 16:11:23:524 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Hello timer of tunnel 1 expired in 60 seconds

*Jun 29 16:11:23:524 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Tunnel 1 sent StopCCN to Tunnel 1

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Message Type: STOP_CONTROL_CONNECTION_NOTIFICATION

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Assigned Tunnel ID: 1

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Put AVP Result code: LOSS_OF_CARRIER

*Jun 29 16:11:23:525 2009 RTA L2TP/7/L2TDBG: L2TP_EVENT: Cleared Tunnel remote ID:1, local ID:1

*Jun 29 16:11:23:770 2009 RTA L2TP/7/L2TDBG: L2TP_CONTROL: Received ctrl message is ZLB, discard it

<RTA>

這樣就可以了解呼叫中L2TP的主要信息交換過程。限于篇幅,此處不列出RTBdebugging輸出信息,請自行觀察。

實驗任務二:配置客戶LAC模式

步驟一:執(zhí)行基本配置

步驟二:配置公網(wǎng)路由

刪除所有靜態(tài)路由。在RTA上刪除所有PPPoEL2TP配置。

[RTA-GigabitEthernet0/0]undo pppoe-server bind

All PPPoE Sessions on GigabitEthernet0/0 will be deleted, continue?[Y/N]:y

 

[RTA]undo domain abc.com

[RTA]undo l2tp enable

[RTA]undo l2tp-group 1

[RTA]undo interface Virtual-Template 0

[RTA]undo local-user vpdnuser

[RTA]undo domain abc.com

RTA、RTBSWA上配置OSPF

[RTA]ospf

[RTA-ospf-1]area 0

[RTA-ospf-1-area-0.0.0.0]network 1.0.0.0 0.255.255.255

[RTA-ospf-1-area-0.0.0.0]network 3.0.0.0 0.255.255.255

 

[SWA]ospf

[SWA-ospf-1]area 0

[SWA-ospf-1-area-0.0.0.0]network 1.0.0.0 0.255.255.255

[SWA-ospf-1-area-0.0.0.0]network 2.0.0.0 0.255.255.255

 

[RTB]ospf

[RTB-ospf-1]area 0

[RTB-ospf-1-area-0.0.0.0]network 2.0.0.0 0.255.255.255

步驟三:安裝iNode客戶端

PCA上安裝iNode客戶端。啟動安裝程序,跟隨安裝向導完成安裝即可。

注意:

要使iNode客戶端支持L2TP功能,在安裝過程中必須確認安裝虛擬網(wǎng)卡(Virtual NIC)。

步驟四:配置iNode客戶端

啟動iNode客戶端程序,在其主界面窗口中單擊菜單【文件】|【新建連接】,啟動新建連接向導,如2-9所示。

單擊【下一步】,進入2-10所示窗口,單擊選定【L2TP IPSec VPN協(xié)議】。

                                                                                                                                                      圖2-8 進入新建連接向導

                                                                                                                                                            圖2-9 選擇認證協(xié)議

單擊【下一步】,進入2-11所示窗口,單擊選定【普通連接】。

單擊【下一步】,進入2-12所示窗口,在【連接名】處輸入一個連接名稱,例如“我的VPN連接”,在【登錄用戶名】處輸入用戶名,在【登錄密碼】處輸入密碼。

                                                                                                                                                         圖2-10 選擇連接類型

                                                                                                                                                   圖2-11 設置用戶名和密碼

單擊【下一步】,進入2-13所示窗口,輸入LNS服務器地址。

單擊【高級】進入2-14所示的窗口,進入【L2TP設置】選項卡,輸入隧道名稱LAC,選擇認證模式為CHAP,單擊選定【使用隧道驗證密碼】并輸入隧道驗證密碼aabbcc。單擊【確定】回到2-13所示窗口。

                                                                                                                                                  圖2-12 VPN連接基本設置

                                                                                                                                                  圖2-13 VPN連接高級屬性

單擊【下一步】進入2-15所示的窗口,單擊【創(chuàng)建】,即可創(chuàng)建新建連接。

                                                                                                                                                   圖2-14 完成新建連接向導

步驟五:配置LNS

RTB上保留上一實驗任務中的LNS配置即可。為方便起見,此處列出相關的配置作為參考:

[RTB]l2tp enable

[RTB]domain abc.com

[RTB-isp-abc.com]authentication ppp local

[RTB-isp-abc.com]ip pool 1 192.168.1.2 192.168.1.100

[RTB-isp-abc.com]local-user vpdnuser

[RTB-luser-vpdnuser]password simple Hello

[RTB-luser-vpdnuser]service-type ppp

[RTB-luser-vpdnuser]l2tp-group 1

[RTB-l2tp1]allow l2tp virtual-template 1 remote LAC domain abc.com

[RTB-l2tp1]tunnel password simple aabbcc

[RTB-l2tp1]tunnel name LNS

[RTB-l2tp1]interface Virtual-Template1

[RTB-Virtual-Template1]ppp authentication-mode chap domain abc.com

[RTB-Virtual-Template1]remote address pool 1

 

步驟六:發(fā)起L2TP呼叫,建立L2TP隧道

PCA上用查看連接,可見除了物理的以太網(wǎng)連接之外,還出現(xiàn)了一個新的連接,其地址處于192.168.1.0/24網(wǎng)段,是從RTB的接口Virtual-template 1上動態(tài)獲得的。

C:\Documents and Settings\User>ipconfig

 

Windows IP Configuration

 

 

Ethernet adapter {7E6CC322-8F6E-490A-AD0D-A86FBDF2D2B6}:

 

        Media State . . . . . . . . . . . : Media disconnected

 

Ethernet adapter 本地連接 3:

 

        Connection-specific DNS Suffix  . :

        IP Address. . . . . . . . . . . . : 192.168.1.3

        Subnet Mask . . . . . . . . . . . : 255.255.255.255

        Default Gateway . . . . . . . . . : 192.168.1.3

 

Ethernet adapter 本地連接:

 

        Connection-specific DNS Suffix  . :

        IP Address. . . . . . . . . . . . : 3.3.3.2

        Subnet Mask . . . . . . . . . . . : 255.255.255.0

        Default Gateway . . . . . . . . . : 3.3.3.1

 

RTB上用display命令查看L2TP隧道和會話信息,可見隧道已建立,其中包含一個會話:

<RTB>display l2tp tunnel

 Total tunnel = 1

 

 LocalTID RemoteTID RemoteAddress    Port   Sessions RemoteName

 1        1         3.3.3.2          1082   1        LAC

<RTB>display l2tp session

 Total session = 1

 

 LocalSID  RemoteSID  LocalTID

  30512     41         1

相關閱讀
·推薦文章

Copyright ©2013-2015 江浙滬招生考試網(wǎng) All Rights Reserved.
地址: 蘇州市姑蘇區(qū)閶胥路483號(工投創(chuàng)業(yè)園)  電話:0512-85551931 郵編: 214000
郵箱: [email protected] 版權所有:蘇州邁峰教育科技有限公司 蘇ICP備15050684號-2