设置列表
对齐方式
H3C MSR830 6EI WINET 配置如下,开通了L2TP OVER IPSEC VPN,但实际无论是手机还是win10 都无法访问,麻烦大神帮忙看下配置有没有问题,实在不懂...多谢
39.77.126.16为路由器拨号后获取的外部地址。
version 7.1.064, Release 0809P34
#
sysname H3C
#
clock timezone Beijing add 08:00:00
clock protocol ntp
#
ip pool l2tp1 192.168.10.2 192.168.10.255
#
dialer-group 1 rule ip permit
#
ip load-sharing mode per-flow src-ip global
#
dhcp enable
dhcp server always-broadcast
#
dns proxy enable
#
lldp global enable
#
password-recovery enable
#
vlan 1
#
dhcp server ip-pool lan1
gateway-list 192.168.1.1
network 192.168.1.0 mask 255.255.255.0
address range 192.168.1.3 192.168.1.254
dns-list 192.168.1.1
#
ddns policy WAN0(GE0/0)
url ***.***/nic/update?hostname=&myip=
username carspar
password cipher XXXX
#
interface Dialer0
ppp chap password cipher XXXXXX
ppp chap user 05XXXX
ppp ipcp dns admit-any
ppp ipcp dns request
ppp pap local-user 05XXXX password cipher XXXXXX=
dialer bundle enable
dialer-group 1
dialer timer idle 0
dialer timer autodial 5
ip address ppp-negotiate
nat outbound
ddns apply policy WAN0(GE0/0) fqdn ***.***
#
interface Dialer1
#
interface Dialer2
#
interface Dialer3
#
interface Dialer4
#
interface Dialer5
#
interface Dialer6
#
interface Dialer7
#
interface Dialer8
#
interface Dialer1023
#
interface Virtual-Template0
#
interface Virtual-Template1
ppp authentication-mode chap domain system
remote address pool l2tp1
ip address 192.168.10.1 255.255.255.0
#
interface NULL0
#
interface Vlan-interface1
ip address 192.168.1.1 255.255.255.0
tcp mss 1280
#
interface GigabitEthernet0/0
port link-mode route
description Single_Line1
pppoe-client dial-bundle-number 0
ipsec apply policy 1
#
interface GigabitEthernet0/1
port link-mode route
#
interface GigabitEthernet0/2
port link-mode bridge
#
interface GigabitEthernet0/3
port link-mode bridge
#
interface GigabitEthernet0/4
port link-mode bridge
#
interface GigabitEthernet0/5
port link-mode bridge
#
security-zone name Local
#
security-zone name Trust
#
security-zone name DMZ
#
security-zone name Untrust
#
security-zone name Management
#
scheduler logfile size 16
#
line class console
user-role network-admin
#
line class tty
user-role network-operator
#
line class vty
user-role network-operator
#
line con 0
user-role network-admin
#
line vty 0 63
authentication-mode scheme
user-role network-operator
#
ip route-static 0.0.0.0 0 Dialer0
#
info-center format unicom
info-center loghost oasislog.h3c.com
info-center source default loghost level debugging
#
ntp-service enable
ntp-service unicast-server ***.***
#
password-control enable
undo password-control aging enable
undo password-control history enable
password-control length 6
password-control login-attempt 3 exceed lock-time 10
password-control update-interval 0
password-control login idle-time 0
#
domain system
authentication ppp local
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
service-type telnet http
authorization-attribute user-role network-admin
#
local-user carspar class network
password cipher $c$3$W3PEA3m5v0wdJGVsHV60IKchSQas6LbwcZAo+g==
service-type ppp
authorization-attribute user-role network-operator
#
ipsec transform-set 1
encapsulation-mode transport
esp encryption-algorithm aes-cbc-128
esp authentication-algorithm sha1
#
ipsec transform-set 2
encapsulation-mode transport
esp encryption-algorithm aes-cbc-256
esp authentication-algorithm sha1
#
ipsec transform-set 3
encapsulation-mode transport
esp encryption-algorithm 3des-cbc
esp authentication-algorithm sha1
#
ipsec transform-set 4
encapsulation-mode transport
esp encryption-algorithm des-cbc
esp authentication-algorithm sha1
#
ipsec transform-set 5
encapsulation-mode transport
esp encryption-algorithm aes-cbc-192
esp authentication-algorithm sha1
#
ipsec transform-set 6
encapsulation-mode transport
#
ipsec policy-template 1 1
transform-set 1 2 3 4 5 6
ike-profile 1
#
ipsec policy 1 1 isakmp template 1
#
l2tp-group 1 mode lns
allow l2tp virtual-template 1
undo tunnel authentication
#
ike profile 1
keychain 1
exchange-mode aggressive
local-identity address 39.77.126.16
match remote identity address 0.0.0.0 0.0.0.0
proposal 1 2 3 4 5 6
#
ike proposal 1
encryption-algorithm aes-cbc-128
dh group2
authentication-algorithm md5
#
ike proposal 2
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
#
ike proposal 3
encryption-algorithm 3des-cbc
dh group2
#
ike proposal 4
encryption-algorithm aes-cbc-256
dh group2
#
ike proposal 5
dh group2
#
ike proposal 6
encryption-algorithm aes-cbc-192
dh group2
#
ike keychain 1
pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$K1qJSp4UPhZ7MuGnGphkoc0oCDHY443SeUzaYg==
#
ip http enable
#
wlan global-configuration
nas-id cm-0-1390588-219801A13FM18600008X
#
wlan ap-group default-group
vlan 1
#
cloud-management server domain oasis.h3c.com
#
return
(0)
最佳答案
看配置L2TP没什么问题,无法访问是拨不上号吗,还是拨号后无法访问内网。
1、把ipsec策略应用到拨号口,物理口的undo
可参考如下案例:
https://zhiliao.h3c.com/Theme/details/77438
https://zhiliao.h3c.com/Theme/details/71091
(0)
您好,请知:
IPSEC VPN故障排查:
1、检查公网地址的连通性
2、检查ipsec acl是否配置正确(两端ACL以互为镜像的方式配置)
3、检查ike keychain/ike profile 协商参数配置是否正确(工作模式、keychain、identity、本端/对端隧道地址或隧道名称、NAT穿越功能v7自适应)
4、检查ipsec proposal(v5平台) /ipsec transform-set(v7平台)参数两端是否一致(封装模式、安全协议、验证算法、加密算法)
5、检查设备是否创建ipsec策略,并加载协商参数(acl、ike profile 、ipsec transform-set、对端隧道IP)
6、检查ipsec策略是否应用在正确的接口上
IPSEC排查命令:
1、disp ipsec policy
2、disp acl
3、dis cu conf ike-profile
4、dis cu conf ike-keychain
5、display ike proposal
6、display ipsec transform-set
7、disp ike sa (verbose)
8、disp ipsec sa
9、reset ipsec sa
10、reset ike sa
L2TP VPN故障排查:
1、检查路由是否可达。
2、检查LNS内是否创建了用户名、密码,并赋予了服务权限。
3、检查LNS内是否创建了地址池。
4、检查LNS内是否创建了VT并调用了地址池。
5、检查LNS内是否创建了L2TP组,并调用了VT。
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
hi 搞了多次还是没有搞定,今天也闲鱼找了个人,他也没有搞定,不知可否帮忙解决一下?多谢了!我的联系方式我私信您,非常感谢!