• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

手机APN L2TP

2022-02-11提问
  • 0关注
  • 1收藏,2168浏览
粉丝:1人 关注:0人

问题描述:

运营商设备做LAC,客户紫光恒越R5900路由器做LNS,一直连接不通,求助    


  Current State null, code ConfReq(01), id 0, len 22

      IP Address(3), len 6, val 00 00 00 00

      Primary DNS Server Address(81), len 6, val 00 00 00 00

      Secondary DNS Server Address(83), len 6, val 00 00 00 00

*Feb 11 10:58:35:292 2022 LNS PPP/7/EXTERNAL_EVENT:

  PPP External Event:

      Virtual-Access0 deliver packet to user space success

*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Received an L2TP data packet:

  Source IP: 192.50.0.21

  Destination IP: 192.50.10.178

  Source port: 1701

  Destination port: 1701

*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Successfully parsed the L2TP header (L2TP header length=6):TunnelID:39338,SessionID:40280,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0

*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Processed an L2TP data packet. TunnelID=39338, SessiOnID=40280.

*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 No FlowCtrl: Received an L2TP Data Packet. TunnelID=39338, SessiOnID=40280.

*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDUMP: -Slot=2;

 Sent a packet to PPP on interface Virtual-Access0 (length=6):

 c0 21 06 02 00 04

*Feb 11 10:58:35:453 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;

  PPP External Event:

      Virtual-Access0 Send negotiate packet to service board succeeded

*Feb 11 10:58:35:292 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Input LCP(c021) Packet, PktLen 8

      Current State closing, code TermAck(06), id 2, len 4

*Feb 11 10:58:35:293 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP RTA(Receive Terminate Ack) Event

      State closing

*Feb 11 10:58:35:293 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: closing --> closed

*Feb 11 10:58:35:293 2022 LNS L2TPV2/7/CONTROL-PKT:

 Received CDN packet from port 1701 (TunnelID=39338, length=38, Ns=4, Nr=2). Packet content:

 c8 02 00 26  99 aa 9d 58  00 04 00 02  80 08 00 00

 00 00 00 0e  80 0a 00 00  00 01 00 01  00 00 80 08

 00 00 00 0e  00 01

*Feb 11 10:58:35:294 2022 LNS L2TPV2/7/EVENT:

 Parsed Message-Type AVP: 14.

*Feb 11 10:58:35:294 2022 LNS L2TPV2/7/EVENT:

 Parsed Result-Code AVP. Result-Code=1, Error-Code=0, Error-Message="".

*Feb 11 10:58:35:294 2022 LNS L2TPV2/7/EVENT:

 Parsed Assigned-Session-ID AVP: 1.

*Feb 11 10:58:35:295 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP daemon receive interface down event!

*Feb 11 10:58:35:295 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Lower Down Event

      State closed

*Feb 11 10:58:35:295 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: closed --> initial

*Feb 11 10:58:35:295 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Close Event

      State initial

%Feb 11 10:58:35:297 2022 LNS IFNET/3/PHY_UPDOWN: Physical state on the interface Virtual-Access0 changed to down.

*Feb 11 10:58:35:309 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP daemon receive interface down event!

*Feb 11 10:58:35:312 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Lower Down Event

      State initial

*Feb 11 10:58:35:313 2022 LNS PPP/7/FSM_ERROR_0:

  PPP Error:

      Virtual-Access0 LCP: FSM Illegal Event!

*Feb 11 10:58:35:313 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Close Event

      State initial

*Feb 11 10:58:35:478 2022 LNS L2TPV2/7/KEVENT: -Slot=2;

 Interface Virtual-Access0 deleted.

*Feb 11 10:58:35:961 2022 LNS L2TPV2/7/KEVENT: -Slot=1;

 Interface Virtual-Access0 deleted.

*Feb 11 10:58:35:320 2022 LNS L2TPV2/7/KEVENT:

 Interface Virtual-Access0 deleted.

*Feb 11 10:58:35:325 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: Successfully freed the User ID 671088642.

*Feb 11 10:58:35:498 2022 LNS L2TPV2/7/EVENT:

 TunnelID=39338: Delay-ACK timer expired, received duplicate Hello packet for 0 times and sent ZLB-ACK packet for 1 times. Ns=2, Nr=5.

*Feb 11 10:58:40:198 2022 LNS L2TPV2/7/EVENT:

 TunnelID=47092: Delay-Cleanup timer expired and deleted the local tunnel.

*Feb 11 10:58:45:979 2022 LNS L2TPV2/7/CONTROL-PKT:

 Received SCCRQ packet from port 1701 (length=103, Ns=0, Nr=0). Packet content:

 c8 02 00 67  00 00 00 00  00 00 00 00  80 08 00 00

 00 00 00 01  80 08 00 00  00 02 01 00  80 0f 00 00

 00 07 67 7a  6d 32 6d 6c  32 74 70 00  0c 00 00 00

 08 48 55 41  57 45 49 80  0a 00 00 00  03 00 00 00

 03 80 08 00  00 00 09 00  01 80 08 00  00 00 0a 00

 40 80 16 00  00 00 0b d4  50 c8 f8 33  0f 44 a0 41

 8e d0 51 7d  0c de 0c

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Message-Type AVP: 1.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Protocol-Version AVP. Version=1, Revision=0.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Host-Name AVP: gzm2ml2tp.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Vendor-Name AVP: HUAWEI.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Framing-Capabilities AVP: 3.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Assigned-Tunnel-ID AVP: 1.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Receive-Window-Size AVP: 64.

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:

 Parsed Challenge AVP: d4 50 c8 f8 33 0f 44 a0 41 8e d0 51 7d 0c de 0c

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Message-Type AVP:

 80 08 00 00  00 00 00 02

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Protocol-Version AVP:

 80 08 00 00  00 02 01 00

*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Host-Name AVP:

 80 09 00 00  00 07 4c 4e  53

*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Framing-Capabilities AVP:

 80 0a 00 00  00 03 00 00  00 00

*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Assigned-Tunnel-ID AVP:

 80 08 00 00  00 09 12 0d

*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Bearer-Capabilities AVP:

 80 0a 00 00  00 04 00 00  00 03

*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Receive-Window-Size AVP:

 80 08 00 00  00 0a 04 00

*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Challenge AVP:

 80 16 00 00  00 0b ad 4e  40 75 22 ac  37 2b 27 ac

 f9 2a 1f c9  48 d6

*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Challenge-Response AVP:

 80 16 00 00  00 0d bb 69  d6 e9 91 eb  04 5b 49 5f

 e0 7a 27 28  52 96

*Feb 11 10:58:45:982 2022 LNS L2TPV2/7/EVENT:

 TunnelID=4621: Processed SCCRQ packet in Idle state, sent SCCRP packet and changed the tunnel state to Wait-connect.

*Feb 11 10:58:45:992 2022 LNS L2TPV2/7/CONTROL-PKT:

 Received SCCCN packet from port 1701 (TunnelID=4621, length=42, Ns=1, Nr=1). Packet content:

 c8 02 00 2a  12 0d 00 00  00 01 00 01  80 08 00 00

 00 00 00 03  80 16 00 00  00 0d e5 33  4a b4 b8 e8

 20 34 81 dd  42 f8 ba 15  e5 29

*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/EVENT:

 Parsed Message-Type AVP: 3.

*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/EVENT:

 Parsed Challenge-Response AVP: e5 33 4a b4 b8 e8 20 34 81 dd 42 f8 ba 15 e5 29

*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/KEVENT:

cioctl add tunnel vrf 0 lip 192.50.10.178 rip 192.50.0.20 lport 1701 rport 1701 ltid 4621 rtid 1 type 1

*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/KEVENT:

result drv add tunnel 0

*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/EVENT:

 TunnelID=4621: Processed SCCCN packet in Wait-connect state, and changed the tunnel state to Established.

*Feb 11 10:58:46:155 2022 LNS L2TPV2/7/KEVENT: -Slot=2;

cioctl add tunnel vrf 0 lip 192.50.10.178 rip 192.50.0.20 lport 1701 rport 1701 ltid 4621 rtid 1 type 1

*Feb 11 10:58:46:155 2022 LNS L2TPV2/7/KEVENT: -Slot=2;

result drv add tunnel 0

*Feb 11 10:58:46:637 2022 LNS L2TPV2/7/KEVENT: -Slot=1;

cioctl add tunnel vrf 0 lip 192.50.10.178 rip 192.50.0.20 lport 1701 rport 1701 ltid 4621 rtid 1 type 1

*Feb 11 10:58:46:637 2022 LNS L2TPV2/7/KEVENT: -Slot=1;

result drv add tunnel 0

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/CONTROL-PKT:

 Received ICRQ packet from port 1701 (TunnelID=4621, length=99, Ns=2, Nr=1). Packet content:

 c8 02 00 63  12 0d 00 00  00 02 00 01  80 08 00 00

 00 00 00 0a  80 08 00 00  00 0e 00 01  80 0a 00 00

 00 0f 00 00  08 ab 80 0a  00 00 00 12  00 00 00 03

 80 1e 00 00  00 15 67 64  67 7a 66 79  7a 77 66 77

 30 31 73 2e  35 67 67 64  2e 67 7a 69  6f 74 80 15

 00 00 00 16  38 36 31 34  30 30 31 39  38 36 30 37

 39 32 37

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:

 Parsed Message-Type AVP: 10.

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:

 Parsed Assigned-Session-ID AVP: 1.

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:

 Parsed Call-Serial-Number AVP: 2219.

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:

 Parsed Bearer-Type AVP: 3.

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:

 Parsed Called-Number AVP: gdgzfyzwfw01s.5ggd.gziot.

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:

 Parsed Calling-Number AVP: 861400198607927.

*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Message-Type AVP:

 80 08 00 00  00 00 00 0b

*Feb 11 10:58:45:995 2022 LNS L2TPV2/7/CONTROL-PKT:

 Encapsulated Assigned-Session-ID AVP:

 80 08 00 00  00 0e a2 2a

*Feb 11 10:58:45:995 2022 LNS L2TPV2/7/EVENT:

 TunnelID=4621, SessiOnID=41514: Processed ICRQ packet in Idle state, sent ICRP packet and changed the session state to Wait-connect.

*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/CONTROL-PKT:

 Received ICCN packet from port 1701 (TunnelID=4621, length=80, Ns=3, Nr=2). Packet content:

 c8 02 00 50  12 0d a2 2a  00 03 00 02  80 08 00 00

 00 00 00 0c  80 0a 00 00  00 18 00 00  00 00 80 0a

 00 00 00 13  00 00 00 01  00 0a 00 00  00 1a 01 04

 05 dc 00 0a  00 00 00 1b  01 04 05 dc  00 0a 00 00

 00 1c 01 04  05 dc 00 0a  00 00 00 25  00 00 00 00

*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:

 Parsed Message-Type AVP: 12.

*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:

 Parsed (Tx)Connect-Speed AVP: 0.

*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:

 Parsed Framing-Type AVP: 1.

*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:

 Parsed Initial-Received-LCP-CONFREQ AVP: 4.

*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:

 Parsed Last-Sent-LCP-CONFREQ AVP: 4.

*Feb 11 10:58:46:006 2022 LNS L2TPV2/7/EVENT:

 Parsed Last-Received-LCP-CONFREQ AVP: 4.

*Feb 11 10:58:46:006 2022 LNS L2TPV2/7/EVENT:

 Parsed Private-Group-ID AVP: .

*Feb 11 10:58:46:007 2022 LNS L2TPV2/7/EVENT:

 TunnelID=4621, SessiOnID=41514: Processed ICCN packet in Wait-connect state, and changed the session state to Established.

*Feb 11 10:58:46:007 2022 LNS L2TPV2/7/KEVENT:

 Interface Virtual-Access0 created.

*Feb 11 10:58:46:169 2022 LNS L2TPV2/7/KEVENT: -Slot=2;

 Interface Virtual-Access0 created.

*Feb 11 10:58:46:652 2022 LNS L2TPV2/7/KEVENT: -Slot=1;

 Interface Virtual-Access0 created.

*Feb 11 10:58:46:009 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: Successfully distributed the User ID 671088642.

*Feb 11 10:58:46:021 2022 LNS L2TPV2/7/KEVENT:

 LNS Notify ppp up(IF_LINKUP_UP). (ifIndex = 17413)

*Feb 11 10:58:46:022 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP daemon receive interface up event!

*Feb 11 10:58:46:023 2022 LNS L2TPV2/7/KDUMP:

 Received a packet from PPP on interface Virtual-Access0 (length=18):

 ff 03 c0 21 01 00 00 0e 03 04 c0 23 05 06 7f b4

 3b 5a

*Feb 11 10:58:46:023 2022 LNS L2TPV2/7/KDATA-PKT:

 Encapsulated an L2TP data packet on interface Virtual-Access0 (length=54):

  Source IP: 192.50.10.178

  Destination IP: 192.50.0.20

  Source port: 1701

  Destination port: 1701

  Tunnel ID: 1

  Session ID: 1

*Feb 11 10:58:46:022 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP l2tp prenego begin!

*Feb 11 10:58:46:022 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: mandatory-lcp, lcp establish begin!

*Feb 11 10:58:46:022 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Open Event

      State initial

*Feb 11 10:58:46:022 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: initial --> starting

*Feb 11 10:58:46:022 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Lower Up Event

      State starting

*Feb 11 10:58:46:023 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: starting --> reqsent

*Feb 11 10:58:46:023 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Output LCP(c021) Packet, PktLen 18

      Current State reqsent, code ConfReq(01), id 0, len 14

      AuthProto(3), len 4, PAP c0 23

      MagicNumber(5), len 6, val 7f b4 3b 5a

*Feb 11 10:58:46:023 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP l2tp prenego end!

*Feb 11 10:58:46:023 2022 LNS L2TPV2/7/EVENT:

 TunnelID=4621, SessiOnID=41514: LNS in Established state notify PPP phy-up result = 0.

%Feb 11 10:58:46:024 2022 LNS IFNET/3/PHY_UPDOWN: Physical state on the interface Virtual-Access0 changed to up.

*Feb 11 10:58:46:031 2022 LNS PPP/7/EXTERNAL_EVENT:

  PPP External Event:

      Virtual-Access0 deliver packet to user space success

*Feb 11 10:58:46:031 2022 LNS PPP/7/EXTERNAL_EVENT:

  PPP External Event:

      Virtual-Access0 deliver packet to user space success

*Feb 11 10:58:46:031 2022 LNS L2TPV2/7/KDUMP:

 Received a packet from PPP on interface Virtual-Access0 (length=12):

 ff 03 c0 21 02 00 00 08 01 04 05 dc

*Feb 11 10:58:46:031 2022 LNS L2TPV2/7/KDATA-PKT:

 Encapsulated an L2TP data packet on interface Virtual-Access0 (length=48):

  Source IP: 192.50.10.178

  Destination IP: 192.50.0.20

  Source port: 1701

  Destination port: 1701

  Tunnel ID: 1

  Session ID: 1

*Feb 11 10:58:46:032 2022 LNS L2TPV2/7/KDUMP:

 Received a packet from PPP on interface Virtual-Access0 (length=8):

 ff 03 c0 21 01 01 00 04

*Feb 11 10:58:46:032 2022 LNS L2TPV2/7/KDATA-PKT:

 Encapsulated an L2TP data packet on interface Virtual-Access0 (length=44):

  Source IP: 192.50.10.178

  Destination IP: 192.50.0.20

  Source port: 1701

  Destination port: 1701

  Tunnel ID: 1

  Session ID: 1

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Received an L2TP data packet:

  Source IP: 192.50.0.20

  Destination IP: 192.50.10.178

  Source port: 1701

  Destination port: 1701

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDUMP: -Slot=2;

 Sent a packet to PPP on interface Virtual-Access0 (length=10):

 c0 21 01 00 00 08 01 04 05 dc

*Feb 11 10:58:46:192 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;

  PPP External Event:

      Virtual-Access0 Send negotiate packet to service board succeeded

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Received an L2TP data packet:

  Source IP: 192.50.0.20

  Destination IP: 192.50.10.178

  Source port: 1701

  Destination port: 1701

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDUMP: -Slot=2;

 Sent a packet to PPP on interface Virtual-Access0 (length=16):

 c0 21 04 00 00 0e 03 04 c0 23 05 06 7f b4 3b 5a

*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Input LCP(c021) Packet, PktLen 12

      Current State reqsent, code ConfReq(01), id 0, len 8

      MRU(1), len 4, val 05 dc

*Feb 11 10:58:46:192 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;

  PPP External Event:

      Virtual-Access0 Send negotiate packet to service board succeeded

*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP RCR+(Receive Config Good Request) Event

      State reqsent

*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Output LCP(c021) Packet, PktLen 12

      Current State reqsent, code ConfAck(02), id 0, len 8

      MRU(1), len 4, val 05 dc

*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: reqsent --> acksent

*Feb 11 10:58:46:032 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Input LCP(c021) Packet, PktLen 18

      Current State acksent, code ConfRej(04), id 0, len 14

      AuthProto(3), len 4, PAP c0 23

      MagicNumber(5), len 6, val 7f b4 3b 5a

*Feb 11 10:58:46:032 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP RCN(Receive Config Nak/Reject) Event

      State acksent

*Feb 11 10:58:46:032 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Output LCP(c021) Packet, PktLen 8

      Current State acksent, code ConfReq(01), id 1, len 4

*Feb 11 10:58:46:040 2022 LNS PPP/7/EXTERNAL_EVENT:

  PPP External Event:

      Virtual-Access0 deliver packet to user space success

*Feb 11 10:58:46:040 2022 LNS PPP/7/EXTERNAL_EVENT:

  PPP External Event:

      Virtual-Access0 deliver packet to user space success

*Feb 11 10:58:46:040 2022 LNS L2TPV2/7/KDUMP:

 Received a packet from PPP on interface Virtual-Access0 (length=8):

 ff 03 c0 21 05 02 00 04

*Feb 11 10:58:46:040 2022 LNS L2TPV2/7/KDATA-PKT:

 Encapsulated an L2TP data packet on interface Virtual-Access0 (length=44):

  Source IP: 192.50.10.178

  Destination IP: 192.50.0.20

  Source port: 1701

  Destination port: 1701

  Tunnel ID: 1

  Session ID: 1

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Received an L2TP data packet:

  Source IP: 192.50.0.20

  Destination IP: 192.50.10.178

  Source port: 1701

  Destination port: 1701

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDUMP: -Slot=2;

 Sent a packet to PPP on interface Virtual-Access0 (length=6):

 c0 21 02 01 00 04

*Feb 11 10:58:46:201 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;

  PPP External Event:

      Virtual-Access0 Send negotiate packet to service board succeeded

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Received an L2TP data packet:

  Source IP: 192.50.0.20

  Destination IP: 192.50.10.178

  Source port: 1701

  Destination port: 1701

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Input LCP(c021) Packet, PktLen 8

      Current State acksent, code ConfAck(02), id 1, len 4

*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDUMP: -Slot=2;

 Sent a packet to PPP on interface Virtual-Access0 (length=24):

 80 21 01 00 00 16 03 06 00 00 00 00 81 06 00 00

 00 00 83 06 00 00 00 00

*Feb 11 10:58:46:201 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;

  PPP External Event:

      Virtual-Access0 Send negotiate packet to service board succeeded

*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP RCA(Receive Config Ack) Event

      State acksent

*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Close Event

      State acksent

*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: acksent --> closing

*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Output LCP(c021) Packet, PktLen 8

      Current State closing, code TermReq(05), id 2, len 4

*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Input IPCP(8021) Packet, PktLen 26

      Current State null, code ConfReq(01), id 0, len 22

      IP Address(3), len 6, val 00 00 00 00

      Primary DNS Server Address(81), len 6, val 00 00 00 00

      Secondary DNS Server Address(83), len 6, val 00 00 00 00

*Feb 11 10:58:46:048 2022 LNS PPP/7/EXTERNAL_EVENT:

  PPP External Event:

      Virtual-Access0 deliver packet to user space success

*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Received an L2TP data packet:

  Source IP: 192.50.0.20

  Destination IP: 192.50.10.178

  Source port: 1701

  Destination port: 1701

*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0

*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;

 No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.

*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDUMP: -Slot=2;

 Sent a packet to PPP on interface Virtual-Access0 (length=6):

 c0 21 06 02 00 04

*Feb 11 10:58:46:209 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;

  PPP External Event:

      Virtual-Access0 Send negotiate packet to service board succeeded

*Feb 11 10:58:46:048 2022 LNS PPP/7/FSM_PACKET_0:

  PPP Packet:

      Virtual-Access0 Input LCP(c021) Packet, PktLen 8

      Current State closing, code TermAck(06), id 2, len 4

*Feb 11 10:58:46:048 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP RTA(Receive Terminate Ack) Event

      State closing

*Feb 11 10:58:46:048 2022 LNS L2TPV2/7/CONTROL-PKT:

 Received CDN packet from port 1701 (TunnelID=4621, length=38, Ns=4, Nr=2). Packet content:

 c8 02 00 26  12 0d a2 2a  00 04 00 02  80 08 00 00

 00 00 00 0e  80 0a 00 00  00 01 00 01  00 00 80 08

 00 00 00 0e  00 01

*Feb 11 10:58:46:049 2022 LNS L2TPV2/7/EVENT:

 Parsed Message-Type AVP: 14.

*Feb 11 10:58:46:049 2022 LNS L2TPV2/7/EVENT:

 Parsed Result-Code AVP. Result-Code=1, Error-Code=0, Error-Message="".

*Feb 11 10:58:46:049 2022 LNS L2TPV2/7/EVENT:

 Parsed Assigned-Session-ID AVP: 1.

*Feb 11 10:58:46:049 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: closing --> closed

*Feb 11 10:58:46:058 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP daemon receive interface down event!

*Feb 11 10:58:46:058 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Lower Down Event

      State closed

*Feb 11 10:58:46:059 2022 LNS PPP/7/FSM_STATE_0:

  PPP State Change:

      Virtual-Access0 LCP: closed --> initial

*Feb 11 10:58:46:059 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Close Event

      State initial

%Feb 11 10:58:46:068 2022 LNS IFNET/3/PHY_UPDOWN: Physical state on the interface Virtual-Access0 changed to down.

*Feb 11 10:58:46:085 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: PPP daemon receive interface down event!

*Feb 11 10:58:46:086 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Lower Down Event

      State initial

*Feb 11 10:58:46:086 2022 LNS PPP/7/FSM_ERROR_0:

  PPP Error:

      Virtual-Access0 LCP: FSM Illegal Event!

*Feb 11 10:58:46:086 2022 LNS PPP/7/FSM_EVENT_0:

  PPP Event:

      Virtual-Access0 LCP Close Event

      State initial

*Feb 11 10:58:46:256 2022 LNS L2TPV2/7/KEVENT: -Slot=2;

 Interface Virtual-Access0 deleted.

*Feb 11 10:58:46:739 2022 LNS L2TPV2/7/KEVENT: -Slot=1;

 Interface Virtual-Access0 deleted.

*Feb 11 10:58:46:098 2022 LNS L2TPV2/7/KEVENT:

 Interface Virtual-Access0 deleted.

*Feb 11 10:58:46:101 2022 LNS PPP/7/EXTERNAL_EVENT_0:

  PPP External Event:

      Virtual-Access0: Successfully freed the User ID 671088642.

*Feb 11 10:58:46:298 2022 LNS L2TPV2/7/EVENT:

 TunnelID=4621: Delay-ACK timer expired, received duplicate Hello packet for 0 times and sent ZLB-ACK packet for 1 times. Ns=2, Nr=5.

组网及组网描述:


最佳答案

粉丝:2人 关注:3人

Received CDN packet from port 1701 (TunnelID=4621, length=38, Ns=4, Nr=2). Packet content: 

LNS侧收到了拆除VA口通知,然后拆除,请排查LAC侧为什么发送该报文

暂无评论

2 个回答
z6Kl9 九段
粉丝:72人 关注:2人

贴配置吧

暂无评论

粉丝:1人 关注:0人

[LNS]dis current-configuration

#

 version 7.1.064, Release 0809P29

#

 sysname LNS

#

 ip pool unicom-l2tp-user 10.40.0.1 10.40.3.200

 ip pool unicom-l2tp-user gateway 10.40.3.254

#

 dhcp enable

#

 lldp global enable

#

 password-recovery enable

#

vlan 1

#

 l2vpn enable

#

controller Cellular2/0/0

#

interface Virtual-Template1

 ppp authentication-mode pap chap

 remote address pool unicom-l2tp-user

 ip address 10.40.3.254 255.255.252.0

#

interface NULL0

#

interface GigabitEthernet2/0/0

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/1

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/2

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/3

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/4

 port link-mode route

 combo enable copper

#             

interface GigabitEthernet2/0/5

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/6

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/7

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/8

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/0/9

 port link-mode route

 combo enable copper

#

interface GigabitEthernet2/1/0

 port link-mode route

#             

interface GigabitEthernet2/1/1

 port link-mode route

#

interface GigabitEthernet2/1/2

 port link-mode route

#

interface GigabitEthernet2/1/3

 port link-mode route

#

interface GigabitEthernet2/2/0

 port link-mode route

 description 联通5G

 ip address 192.50.10.178 255.255.255.252

#

interface GigabitEthernet2/2/1

 port link-mode route

#

interface GigabitEthernet2/2/2

 port link-mode route

#

interface GigabitEthernet2/2/3

 port link-mode route

 description 区府内网

 ip address 10.160.245.6 255.255.255.252

#

interface M-GigabitEthernet0

#

interface Ten-GigabitEthernet2/0/10

 port link-mode route

#

interface Ten-GigabitEthernet2/0/11

 port link-mode route

#

interface Ten-GigabitEthernet2/0/12

 port link-mode route

#

interface Ten-GigabitEthernet2/0/13

 port link-mode route

#

 scheduler logfile size 16

#

line class console

 user-role network-admin

#

line class tty

 user-role network-operator

#

line class vty

 user-role network-operator

#

line con 0 1

 user-role network-admin

#

line vty 0 63

 authentication-mode scheme

 user-role network-operator

#

 ip route-static 0.0.0.0 0 10.160.245.5

 ip route-static 10.160.0.0 16 10.160.245.5

 ip route-static 172.25.0.0 16 10.160.245.5

 ip route-static 192.50.0.0 24 192.50.10.177

 ip route-static 192.50.0.1 32 192.50.10.177

 ip route-static 192.50.0.3 32 192.50.10.177

 ip route-static 192.50.0.20 32 192.50.10.177

 ip route-static 192.50.0.21 32 192.50.10.177

 ip route-static 192.50.0.32 32 192.50.10.177

#

 snmp-agent

 snmp-agent local-engineid 8000291780DC2DCB3A285A00000001

 snmp-agent community read cipher $c$3$bf62+Dzlvpr4MkhR94bxVip6dFzJ2uhCDtNIErE=

 snmp-agent sys-info version all

#

 ssh server enable

 ssh user admin service-type stelnet authentication-type password

#

acl number 3177

 rule 0 permit ip destination 172.25.200.0 0.0.0.255

 rule 5 permit ip destination 10.160.20.20 0

 rule 2000 deny ip

#

radius scheme vpdn

 primary authentication 10.160.20.20 key cipher $c$3$zMGs1ZU98oCuSczQaMYpuSpcU0GEGAOB4Q==

 primary accounting 10.160.20.20 key cipher $c$3$aRbqzi4bg6EmnjRLmzBlU7PLVDdot2STkA==

 user-name-format without-domain

 nas-ip 10.160.245.6

#

domain system

 authentication ppp local

 accounting ppp local

#

domain vpdn

 authentication ppp local

 accounting ppp local

#

 domain default enable system

#

role name level-0

 description Predefined level-0 role

#

role name level-1

 description Predefined level-1 role

#

role name level-2

 description Predefined level-2 role

#

role name level-3

 description Predefined level-3 role

#

role name level-4

 description Predefined level-4 role

#

role name level-5

 description Predefined level-5 role

#

role name level-6

 description Predefined level-6 role

#

role name level-7

 description Predefined level-7 role

#

role name level-8

 description Predefined level-8 role

#

role name level-9

 description Predefined level-9 role

#

role name level-10

 description Predefined level-10 role

#

role name level-11

 description Predefined level-11 role

#

role name level-12

 description Predefined level-12 role

#

role name level-13

 description Predefined level-13 role

#             

role name level-14

 description Predefined level-14 role

#

user-group system

#

local-user admin class manage

 password hash $h$6$pLAXNMqqTHZl50Cs$5ui2fO0zvKizbi/73L75hU/jQPRl/9O/OudvwFUCKRE0psM5rAUBYuUnvJVRUkPLwpfF5UDpYsWVnv+fAryyVA==

 service-type ssh https

 authorization-attribute user-role network-admin

 authorization-attribute user-role network-operator

#

local-user ceshi class network

 password cipher $c$3$pL5U35nKjDZRk9hLob+e55Hg3LK00+U1b7pi2eu0tg==

 service-type ppp

 authorization-attribute user-role network-operator

#

local-user l2tp class network

 password cipher $c$3$YhWAlhEwYnrMv9fX42G9cv7MoQ0t6VA=

 service-type advpn

 service-type ppp

 authorization-attribute user-role network-operator

#

l2tp-group 1 mode lns

 allow l2tp virtual-template 1 remote gzm2ml2tp

 tunnel name LNS

 tunnel password cipher $c$3$PxBU3Ygtw5QvjEayVWPvAah7wVvxYgljfLOvVQ==

#

 l2tp enable

#

 ip http enable

 ip https enable

#

暂无评论

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明