1.
*Mar 15 17:15:06:498 2018 H3C SSLVPNK/7/SSLVPN_ERROR: IPAC: IP access not authorized. Peer address is 10.1.1.2.
这个错误是缺少什么配置的?拨进去之后无法ping通注入的路由表里的终端
2.我想问下sslvpn用手机客户端,iphone可以成功拨入,但是安卓的不行。提示认证失败。然后说EMO没配置
(0)
最佳答案
1、是不是没有配置下面的东西
表1-10 配置SSL VPN访问控制策略
操作 |
命令 |
说明 |
进入系统视图 |
system-view |
- |
进入SSL VPN访问实例视图 |
sslvpn context context-name |
- |
进入SSL VPN策略组视图 |
policy-group group-name |
- |
配置对Web接入进行过滤 |
filter web-access advanced-acl-number |
缺省情况下,禁止所有客户端访问Web接入资源 如果引用的ACL不存在,则SSL VPN网关拒绝所有SSL VPN客户端访问Web资源 |
配置对TCP接入进行过滤 |
filter tcp-access advanced-acl-number |
缺省情况下,禁止所有客户端访问TCP接入服务 如果引用的ACL不存在,则SSL VPN网关拒绝所有SSL VPN客户端访问TCP接入服务 |
配置对IP接入进行过滤 |
filter ip-tunnel advanced-acl-number |
缺省情况下,禁止所有IP接入报文通过。 如果引用的ACL不存在,则SSL VPN网关拒绝所有IP接入方式的访问 |
2、这个问题需要去业务软件区咨询一下安卓的客户端
(0)
安卓客户端安装了,还有业务软件区?
sslvpn context ctx vpn-instance vpn1 gateway gw domain domain ip-tunnel interface SSLVPN-AC1 ip-tunnel address-pool ippool mask 255.255.255.0 ip-tunnel dns-server primary 114.114.114.114 ip-route-list rtlist include 10.1.1.0 255.255.255.0 include 10.10.10.0 255.255.255.0 policy-group pgroup filter ip-tunnel acl 3000 filter web-access acl 3000 filter tcp-access acl 3000 ip-tunnel access-route ip-route-list rtlist default-policy-group pgroup service enable 有配置的
2、选择非RC4算法的加密套件试一下
[F1070_IRF-ssl-server-policy-test]ciphersuite ?
dhe_rsa_aes_128_cbc_sha Cipher suite that uses DHE RSA, 128-bit AES_CBC, and
SHA
dhe_rsa_aes_256_cbc_sha Cipher suite that uses DHE RSA, 256-bit AES_CBC, and
SHA
exp_rsa_des_cbc_sha Export cipher suite that uses RSA, DES_CBC, and SHA
exp_rsa_rc2_md5 Export cipher suite that uses RSA, RC2, and MD5
exp_rsa_rc4_md5 Export cipher suite that uses RSA, RC4, and MD5
rsa_3des_ede_cbc_sha Cipher suite that uses RSA, 3DES_EDE_CBC, and SHA
rsa_aes_128_cbc_sha Cipher suite that uses RSA, 128-bit AES_CBC, and SHA
rsa_aes_256_cbc_sha Cipher suite that uses RSA, 256-bit AES_CBC, and SHA
rsa_des_cbc_sha Cipher suite that uses RSA, DES_CBC, and SHA
rsa_rc4_128_md5 Cipher suite that uses RSA, 128-bit RC4, and MD5
rsa_rc4_128_sha Cipher suite that uses RSA, 128-bit RC4, and SHA
(0)
用你这个还是认证失败
sslvpn context ctx
vpn-instance vpn1
gateway gw domain domain
ip-tunnel interface SSLVPN-AC1
ip-tunnel address-pool ippool mask 255.255.255.0
ip-tunnel dns-server primary 114.114.114.114
ip-route-list rtlist
include 10.1.1.0 255.255.255.0
include 10.10.10.0 255.255.255.0
policy-group pgroup
filter ip-tunnel acl 3000
filter web-access acl 3000
filter tcp-access acl 3000
ip-tunnel access-route ip-route-list rtlist
default-policy-group pgroup
service enable
有配置在里面的
acl 3000是允许所有的
(0)
加了的,我加入到信任域
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
sslvpn context ctx vpn-instance vpn1 gateway gw domain domain ip-tunnel interface SSLVPN-AC1 ip-tunnel address-pool ippool mask 255.255.255.0 ip-tunnel dns-server primary 114.114.114.114 ip-route-list rtlist include 10.1.1.0 255.255.255.0 include 10.10.10.0 255.255.255.0 policy-group pgroup filter ip-tunnel acl 3000 filter web-access acl 3000 filter tcp-access acl 3000 ip-tunnel access-route ip-route-list rtlist default-policy-group pgroup service enable 有配置的