实验4 L0000010L2TP实验中文版v11.docx
- 文档编号:3674473
- 上传时间:2022-11-24
- 格式:DOCX
- 页数:12
- 大小:41.41KB
实验4 L0000010L2TP实验中文版v11.docx
《实验4 L0000010L2TP实验中文版v11.docx》由会员分享,可在线阅读,更多相关《实验4 L0000010L2TP实验中文版v11.docx(12页珍藏版)》请在冰豆网上搜索。
实验4L0000010L2TP实验中文版v11
实验4L2TP实验69
4.1L2TP实验69
4.1.1实验目的69
4.1.2实验环境69
4.1.3实验组网图69
4.1.4实验步骤69
4.1.5思考题81
实验4L2TP实验
4.1L2TP实验
4.1.1实验目的
掌握L2TP的两种配置方法。
了解L2TP的基本控制流程。
4.1.2实验环境
Quidway2600系列路由器3台,以太网交换机或集线器1台,PC机2台,V35或V24DTE/DCE线缆2对;
VRP版本要求:
VRP1.74版本以上。
4.1.3实验组网图
图4-1实验组网图
4.1.4实验步骤
1.本实验中,路由器RT1用来模拟接入用户,而RT2和RT3分别作为LAC(L2TPAccessConcentratorL2TP的接入集中器)和LNS(L2TPNetworkServerL2TP的网络服务器)。
本实验中没有采用RADIUS验证,而是采用的AAA本地验证。
下面是各路由器的基本配置,以供大家在配置时进行参考:
路由器RT1的配置:
[rt1]interfaceserial0
[rt1-Serial0]undoipaddress
[rt1-Serial0]ppppaplocal-useruser1@passwordsimplebb
[rt1-Serial0]ipaddressppp-negotiate
路由器RT2的配置:
[rt2]local-useruser1@passwordsimplebb//配置用户列表
[rt2]l2tpenable//允许VPDN功能
[rt2]aaa-enable//允许AAA验证
[rt2]aaaauthentication-schemepppdefaultlocal
[rt2]aaaaccounting-schemeoptional
[rt2]interfaceSerial0
[rt2-Serial0]ipaddress202.98.0.1255.255.0.0
[rt2-Serial0]interfaceserial1
[rt2-Serial1]pppauthentication-modepap
[rt2-Serial1]quit
[rt2]l2tp-group1//创建VPDN组
[rt2-l2tp1]startl2tpip202.98.0.2fullusernameuser1@
[rt2-l2tp1]tunnelnamelac
[rt2-l2tp1]tunnelauthentication
[rt2-l2tp1]tunnelpasswordsimpleasd
路由器RT3的配置:
[rt3]local-useruser1@passwordsimplebb
[rt3]l2tpenable
[rt3]ippool1172.31.0.2172.31.0.10//配置本地地址池
[rt3]interfaceSerial0
[rt3-Serial0]ipaddress202.98.0.2255.255.0.0
[rt3-Serial0]quit
[rt3]aaa-enable
[rt3]aaaauthentication-schemepppdefaultlocal
[rt3]aaaaccounting-schemeoptional
[rt3-Serial0]interfaceVirtual-Template1//创建逻辑接口Virtual-Template
[rt3-Virtual-Template1]ipaddress172.31.0.1255.255.0.0
[rt3-Virtual-Template1]pppauthentication-modepap
[rt3-Virtual-Template1]remoteaddresspool1
[rt3-Virtual-Template1]quit
[rt3]l2tp-group1
[rt3-l2tp1]allowl2tpvirtual-template1remotelac
[rt3-l2tp1]tunnelnamelns
[rt3-l2tp1]tunnelauthentication
[rt3-l2tp1]tunnelpasswordsimpleasd
2.下面我们来观察一下L2TP的隧道建立流程。
首先在RT2和RT3上用“debuggingl2tpcontrol”命令打开控制报文调试开关,然后在RT1上ping172.31.0.1。
下面是在RT2上可以看到的有关隧道建立的调试信息:
[rt2]debuggingl2tpcontrol
L2TP:
:
PutAVPMessageType:
START_CONTROL_CONNECTION_REQUEST
L2TP:
:
PutAVPProtocolversion:
100
L2TP:
:
PutAVPHostname:
lac
L2TP:
:
PutAVPVendorname:
HuaWei
L2TP:
:
PutAVPFramingcapability:
3
L2TP:
:
PutAVPAssignedTunnelID:
1
L2TP:
:
PutAVPReceivewindowsize:
60
L2TP:
:
PutAVPChallenge:
00278100446B00794B0015FB
L2TP:
:
Tunnel1Create60secondsHellotimer
L2TP:
:
OTunnel1SendSCCRQ
L2TP:
:
ProcPeercontroltype=2,len=117
L2TP:
:
ITunnel1rcvSCCRPinstate2
L2TP:
:
Tunnel1Resume60secondHellotimer
L2TP:
:
CheckSCCRPMSGType2
L2TP:
:
ParseAVPProtocolversion,value:
100
L2TP:
:
ParseAVPFramingcapability,value:
3
L2TP:
:
ParseAVPHostname,value:
lns
L2TP:
:
ParseAVPRemotetunnelID:
1
L2TP:
:
ParseAVPBearercapability,value:
3
L2TP:
:
ParseAVPReceivewindowsize:
60
L2TP:
:
ParseAVPChallenge,Value:
00278100446B00794B0015
FB
L2TP:
:
ParseAVPChallengeresponse:
ED1EC5D1BCD329D26CBB3B23A4A
85F
L2TP:
:
PutAVPMessageType:
START_CONTROL_CONNECTION_CONNECTED
//表示隧道已经成功建立起来了
L2TP:
:
PutAVPChallengeresponse:
44FC62BC45C19F1CA4971FA12ED1B5
6
L2TP:
:
OTunnel1sendSCCCNtotunnel1
L2TP:
:
Tunnel1StartWaitingCalls
L2TP:
:
PutAVPMessageType:
INCOMING_CALL_REQUEST
L2TP:
:
PutAVPAssignedcallID:
1
L2TP:
:
PutAVPCallserialnumber:
1
L2TP:
:
PutAVPBearertype:
3
L2TP:
:
PutAVPPhysicalchannelnumber:
0
L2TP:
:
OCall1sendINCOMING_CALL_REQUEST.
L2TP:
:
ProcPeercontroltype=11,len=28
L2TP:
:
ICall1RecvICRPinstate4fromCall0
L2TP:
:
Tunnel1Resume60secondHellotimer
L2TP:
:
CheckICRPMSGTYPE=11
L2TP:
:
ParseAVPremotecallID:
1
L2TP:
:
PutAVPMessageType:
INCOMING_CALL_CONNECTED
//表示会话已经成功建立
L2TP:
:
PutAVPTxconnectspeed:
64000
L2TP:
:
PutAVPFramingtype:
3
L2TP:
:
PutAVPInitialreceivedLCPoptions.
L2TP:
:
PutAVPLastsentLCPoptions.
L2TP:
:
PutAVPLastreceivedLCPoptions.
L2TP:
:
PutAVPProxyauthentype:
3
L2TP:
:
PutAVPProxyauthenName:
user1@
L2TP:
:
PutAVPProxyauthenID:
1
L2TP:
:
ParseAVPProxyauthenticateresponse:
6262
L2TP:
:
PutAVPProxyprivategroupnumber:
0
L2TP:
:
PutAVPRxconnectspeed:
64000
L2TP:
:
OCall1sendICCNtoRemoteCall1
L2TP:
:
ProcPeercontrollen=12
L2TP:
:
Tunnel1Hellotimer60secondexpired
L2TP:
:
PutAVPMessageType:
HELLO
L2TP:
:
Tunnel1sendctrlmsg:
Hello
L2TP:
:
ProcPeercontroltype=6,len=20
L2TP:
:
ITunnel1rcvHelloinstate4
下面是在RT3上显示的调试信息:
[rt3]debuggingl2tpcontrol
L2TP:
:
RecvaSCCRQorStopCCNpasstoupperlayer
L2TP:
:
ProcPeercontroltype=1,len=97
L2TP:
:
Tunnel1rcvSCCRQinstate1from202.98.0.1
L2TP:
:
CheckSCCRQMSGType1
L2TP:
:
ParseAVPProtocolversion:
100
L2TP:
:
ParseAVPHostname,value:
lac
L2TP:
:
TunnelPasswordinL2tpGroup:
asd
%03:
30:
16:
LineprotocoliponinterfaceVirtual-Template1(Virtual-Template1:
0),
changedstatetoUP
L2TP:
:
ParseAVPVendorname,value:
HuaWei
L2TP:
:
ParseAVPFramingcapability:
3
L2TP:
:
ParseAVPRemotecallnumber,value:
1
L2TP:
:
ParseAVPReceivewindowsize,value:
60
L2TP:
:
ParseAVPChallenge,value:
000027810000446b0000794b000015
fb
L2TP:
:
PutAVPMessageType:
START_CONTROL_CONNECTION_REPLY
L2TP:
:
PutAVPProtocolversion:
100
L2TP:
:
PutAVPFramingcapability:
3
L2TP:
:
PutAVPHostname:
lns
L2TP:
:
PutAVPAssignedTunnelID:
1
L2TP:
:
PutAVPBearercapability:
3
L2TP:
:
PutAVPReceivewindowsize:
60
L2TP:
:
PutAVPChallenge:
00278100446B00794B0015FB
L2TP:
:
PutAVPChallengeresponse:
ED1EC5D1BCD329D26CBB3B23A4A85
F
L2TP:
:
OTunnel1sendSTART_CONTROL_CONNECTION_REPLYtoTunnel1
L2TP:
:
Tunnel1Create60secondsHellotimer
L2TP:
:
ProcPeercontroltype=3,len=42
L2TP:
:
Tunnel1rcvSCCCNinstate3
L2TP:
:
Tunnel1Resume60secondHellotimer
L2TP:
:
CheckSCCCNMSGType3
L2TP:
:
ParseAVPChallengeresponse
44FC62BC45C19F1CA4971FA12ED1B56
L2TP:
:
Tunnel1StartWaitingCalls
//表示隧道已经成功建立
L2TP:
:
ProcPeercontroltype=10,len=58
L2TP:
:
Call1recvICRQinstate2fromCall0
L2TP:
:
Tunnel1Resume60secondHellotimer
L2TP:
:
CheckICRQMSGType10
L2TP:
:
ParseAVPRemotecallID1
L2TP:
:
ParseAVPCallserialnumber:
1
L2TP:
:
ParseAVPBearertype:
3
L2TP:
:
ParseAVPPhysicalchannelID:
0
L2TP:
:
PutAVPMessageType:
INCOMING_CALL_REPLY
L2TP:
:
PutAVPAssignedcallID:
1
L2TP:
:
Call1sendINCOMING_CALL_REPLYtoRemoteCall1
L2TP:
:
ProcPeercontroltype=12,len=158
L2TP:
:
Call1rcvICCNinstate5fromRemoteCall1
L2TP:
:
Tunnel1Resume60secondHellotimer
L2TP:
:
CheckICCNMSGType12
L2TP:
:
ParseAVPTxconnectspeed:
64000
L2TP:
:
ParseAVPFramingtype:
3
L2TP:
:
ParseAVPInitialrecvlcpconfigrequest:
145DC563071F92
L2TP:
:
ParseAVPLastsentlcpconfigrequest:
145DC34C02356ED
37D63
L2TP:
:
ParseAVPLastreceivedlcpconfigrequest:
145DC563071F92
L2TP:
:
ParseAVPProxyauthenticatetype3.
L2TP:
:
ParseAVPProxyauthenticatename:
user1@
L2TP:
:
ParseAVPProxyauthenID:
16170092
L2TP:
:
ParseAVPProxyauthenticateresponse:
6262
L2TP:
:
ParseAVPPrivategroupID.
//表示会话已经成功建立
L2TP:
:
ParseAVP(Rx)connectspeed64000
L2TP:
:
ProcPeercontroltype=6,len=20
L2TP:
:
ITunnel1rcvHelloinstate4
L2TP:
:
Tunnel1Hellotimer60secondexpired
L2TP:
:
PutAVPMessageType:
HELLO
L2TP:
:
Tunnel1sendctrlmsg:
Hello
L2TP:
:
ProcPeercontrollen=12
L2TP:
:
ProcPeercontroltype=6,len=20
L2TP:
:
ITunnel1rcvHelloinstate4
L2TP:
:
Tunnel1Hellotimer60secondexpired
L2TP:
:
PutAVPMessageType:
HELLO
L2TP:
:
Tunnel1sendctrlmsg:
Hello
L2TP:
:
ProcPeercontrollen=12
L2TP:
:
ProcPeercontroltype=6,len=20
L2TP:
:
ITunnel1rcvHelloinstate4
L2TP:
:
Tunnel1Hellotimer60secondexpired
L2TP:
:
PutAVPMessageType:
HELLO
L2TP:
:
Tunnel1sendctrlmsg:
Hello
L2TP:
:
ProcPeercontrollen=12
另外,我们还可以在RT2和RT3上通过“displayl2tptunnel”命令来看隧道是否已经建立起来了,下面隧道建立后显示的信息:
[rt2]displayl2tptunnel
LocalIDRemoteIDReNameRemAddressSessionsPort
11lns202.98.0.211701
Totaltunnel=1
同样,我们可以在RT2和RT3上通过“displayl2tpsession”命令来看会话是否建立起来,下面是会话建立后显示的信息:
[rt2]displayl2tpsession
LocalIDRemoteIDTunnelID
111
Totalsession=1
3.下面我们来观察一下L2TP的隧道和会话的拆除过程。
首先在RT1的serial0接口上执行“shutdown”命令,然后在RT2上可以看到下面的调试信息:
[rt2]debuggingl2tpcontrol
%04:
26:
23:
InterfaceSerial1changedstatetoDOWN
L2TP:
:
PutAVPMessageType:
CALL_DISCONNECT_NOTIFY
L2TP:
:
PutAVPResultcode:
LOSS_OF_CARRIER
L2TP:
:
PutAVPAssignedcallID:
1
L2TP:
:
OCall1sendCALL_DISCONNECT_NOTIFY
L2TP:
:
CleanCallStructureID=1
L2TP:
:
ProcPeercontrollen=12
L2TP:
:
Tunnel1Hellotimer60secondexpired
L2TP:
:
OTunnel1SendStopCCNtoTunnel1
L2TP:
:
PutAVPMessageType:
STOP_CONTROL_CONNECTION_NOTIFICATION
L2TP:
:
PutAVPAssignedTunnelID:
1
L2TP:
:
PutAVPResultcode:
LOSS_OF_CARRIER
在RT3上可以看到如下的调试信息:
[rt3]debuggingl2tpcontrol
%04:
06:
48:
LineprotocoliponinterfaceVirtual-Template1(Virtual-Template1:
0),
changedstatetoDOWN
L2TP:
:
ProcPeercontroltype=14,len=38
L2TP:
:
ICall1recvCDNinstate9fromRemoteCall
L2TP:
:
Tunnel1Resume60secondHellotimer
L2TP:
:
CheckCDNMSGType14
L2TP:
:
ParseAVPResultcode:
1
L2TP:
:
ParseAVPRemotecallID:
1
L2TP:
:
CleanCallStructureID=1
L2TP:
:
ProcPeercontroltype=4,len=38
L2TP:
:
ITunnel1recvStopCCNinstate4
L2TP:
:
CheckStopCCNmsgtype4
L2TP:
:
ParseAVPRemoteTunnelID:
1
L2TP:
:
ParseAVPResultcode:
1
L2TP:
:
ResetCallsOnTunnelID=1Reason=0
L2T
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 实验4 L0000010L2TP实验中文版v11 实验 L0000010L2TP 中文版 v11