当前位置: 首页 > news >正文

L2TP实验 作业

拓扑图

实验需求

让FW1(PPPoE Client)模拟拨号用户,向内部服务器发送建立拨号连接的请求,并保证连通

实验步骤

安全区域

firewall zone trust 
add int g1/0/0
策略

security-policy     
default action permit 
 

NAS

int g1/0/1
ip address 20.1.1.1 24

firewall zone trust 
add int g1/0/0
firewall zone untrust 

add int g1/0/1
 

LNS

int g1/0/0
ip add 20.1.1.2 24
int g 1/0/1    
ip address 192.168.1.254 24
 

firewall zone trust 
add int g1/0/1
firewall zone untrust 
add int g1/0/0
 

客户端
interface Dialer 1
dialer user user1
dialer-group 1
dialer bundle 1
ip address ppp-negotiate
ppp chap user user1
ppp chap password cipher Password123
dialer-rule 1 ip permit 
int g1/0/0    
pppoe-client dial-bundle-number 1
 

服务端

interface Virtual-Template 1
ppp authentication-mode chap 
The command is used to configure the PPP authentication mode on the local end. 
Confirm that the peer end adopts the corresponding PPP authentication. Continue[
Y/N]:y
ip address 2.2.2.2 24
firewall zone dmz     
]add interface Virtual-Template 1

pppoe-server bind virtual-template 1
aaa
domain default 
Info: The domain default is for common users.
service-type l2tp 

user-manage user user1 domain default 
password Password123

创建隧道

l2tp enable 
l2tp-group 1
tunnel authentication
tunnel password cipher Hello123
start l2tp ip 20.1.1.2 fullusername user1

LNS

ip pool l2tp
Info: It is successful to create an IP address pool.
section 0 172.16.0.2 172.16.0.100
aaa
service-scheme l2tp
Info: Create a new service scheme.
ip-pool l2tp
domain default 
Info: The domain default is for common users.
service-type l2tp
q
user-manage user user1 domain default 
password Password123

nterface Virtual-Template1    
ppp authentication-mode chap 
ip add 172.16.0.1 24
remote service-scheme l2tp
q
firewall zone dmz
add int Virtual-Template 1

l2tp enable 
l2tp-group 1
allow l2tp virtual-template 1 remote lac domain default    
tunnel authentication
tunnel password cipher Hello123
 

认证

l2tp-group 1   
mandatory-chap 
mandatory-lcp


IP route-static 0.0.0.0 0.0.0.0 Dialer1
 

安全策略

security-policy
default action deny 
 Warning: Setting the default interzone packet filtering to deny may affect actu
al data traffic. You are advised to configure the security policy based on the a
ctual services. Are you sure you want to continue? [Y/N]y
rule name l_un
source-zone local 
destination-zone untrust 
source-address 20.1.1.1 32
destination-address 20.1.1.2 32
service l2tp 
service protocol udp source-port 0 to 65535 desti
nation-port 1701
 

rule name l2tp
source-zone untrust 
destination-zone local 
source-address 20.1.1.1 32
destination-address 20.1.1.2 32
service l2tp
service protocol udp destination-port 1701
action permit 
rule name icmp
source-zone dmz 
destination-zone trust 
source-address 172.16.0.0 24
destination-address 192.168.1.0 24
action permit 
 


http://www.mrgr.cn/news/95081.html

相关文章:

  • 数学之握手问题
  • 基于单片机控制的电动汽车双闭环调速系统(论文+源码)
  • 微前端 qiankun vite vue3
  • Day20:丑数
  • 爬虫案例-爬取某狗音乐
  • 神经网络中层与层之间的关联
  • C++ 各种map对比
  • C语言的内存函数
  • 动平衡仿真程序设计
  • 【链表】一文搞定链表算法:从基础到实战
  • 【PCB工艺】电流、电压与电阻的关系 以及 含有电容和电感的电路
  • JavaScript 金额运算精度丢失问题及解决方案
  • Can通信流程
  • vector容器以及deque
  • 指令系统1(数据传输指令)
  • java面试题,什么是动态代理?、动态代理和静态代理有什么区别?说一下反射机制?JDK Proxy 和 CGLib 有什么区别?动态代理的底层
  • Windows 图形显示驱动开发-WDDM 3.0功能- 硬件翻转队列(五)
  • 876.链表的中间节点
  • 图莫斯TOOMOSS上位机TCANLINPro使用CAN UDS功能时 编写、加载27服务dll解锁算法文件
  • 霍尔传感器与电流互感器的区别