运营商设备做LAC,客户紫光恒越R5900路由器做LNS,一直连接不通,求助
Current State null, code ConfReq(01), id 0, len 22
IP Address(3), len 6, val 00 00 00 00
Primary DNS Server Address(81), len 6, val 00 00 00 00
Secondary DNS Server Address(83), len 6, val 00 00 00 00
*Feb 11 10:58:35:292 2022 LNS PPP/7/EXTERNAL_EVENT:
PPP External Event:
Virtual-Access0 deliver packet to user space success
*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Received an L2TP data packet:
Source IP: 192.50.0.21
Destination IP: 192.50.10.178
Source port: 1701
Destination port: 1701
*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Successfully parsed the L2TP header (L2TP header length=6):TunnelID:39338,SessionID:40280,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0
*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Processed an L2TP data packet. TunnelID=39338, SessiOnID=40280.
*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
No FlowCtrl: Received an L2TP Data Packet. TunnelID=39338, SessiOnID=40280.
*Feb 11 10:58:35:453 2022 LNS L2TPV2/7/KDUMP: -Slot=2;
Sent a packet to PPP on interface Virtual-Access0 (length=6):
c0 21 06 02 00 04
*Feb 11 10:58:35:453 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;
PPP External Event:
Virtual-Access0 Send negotiate packet to service board succeeded
*Feb 11 10:58:35:292 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Input LCP(c021) Packet, PktLen 8
Current State closing, code TermAck(06), id 2, len 4
*Feb 11 10:58:35:293 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP RTA(Receive Terminate Ack) Event
State closing
*Feb 11 10:58:35:293 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: closing --> closed
*Feb 11 10:58:35:293 2022 LNS L2TPV2/7/CONTROL-PKT:
Received CDN packet from port 1701 (TunnelID=39338, length=38, Ns=4, Nr=2). Packet content:
c8 02 00 26 99 aa 9d 58 00 04 00 02 80 08 00 00
00 00 00 0e 80 0a 00 00 00 01 00 01 00 00 80 08
00 00 00 0e 00 01
*Feb 11 10:58:35:294 2022 LNS L2TPV2/7/EVENT:
Parsed Message-Type AVP: 14.
*Feb 11 10:58:35:294 2022 LNS L2TPV2/7/EVENT:
Parsed Result-Code AVP. Result-Code=1, Error-Code=0, Error-Message="".
*Feb 11 10:58:35:294 2022 LNS L2TPV2/7/EVENT:
Parsed Assigned-Session-ID AVP: 1.
*Feb 11 10:58:35:295 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP daemon receive interface down event!
*Feb 11 10:58:35:295 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Lower Down Event
State closed
*Feb 11 10:58:35:295 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: closed --> initial
*Feb 11 10:58:35:295 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Close Event
State initial
%Feb 11 10:58:35:297 2022 LNS IFNET/3/PHY_UPDOWN: Physical state on the interface Virtual-Access0 changed to down.
*Feb 11 10:58:35:309 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP daemon receive interface down event!
*Feb 11 10:58:35:312 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Lower Down Event
State initial
*Feb 11 10:58:35:313 2022 LNS PPP/7/FSM_ERROR_0:
PPP Error:
Virtual-Access0 LCP: FSM Illegal Event!
*Feb 11 10:58:35:313 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Close Event
State initial
*Feb 11 10:58:35:478 2022 LNS L2TPV2/7/KEVENT: -Slot=2;
Interface Virtual-Access0 deleted.
*Feb 11 10:58:35:961 2022 LNS L2TPV2/7/KEVENT: -Slot=1;
Interface Virtual-Access0 deleted.
*Feb 11 10:58:35:320 2022 LNS L2TPV2/7/KEVENT:
Interface Virtual-Access0 deleted.
*Feb 11 10:58:35:325 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: Successfully freed the User ID 671088642.
*Feb 11 10:58:35:498 2022 LNS L2TPV2/7/EVENT:
TunnelID=39338: Delay-ACK timer expired, received duplicate Hello packet for 0 times and sent ZLB-ACK packet for 1 times. Ns=2, Nr=5.
*Feb 11 10:58:40:198 2022 LNS L2TPV2/7/EVENT:
TunnelID=47092: Delay-Cleanup timer expired and deleted the local tunnel.
*Feb 11 10:58:45:979 2022 LNS L2TPV2/7/CONTROL-PKT:
Received SCCRQ packet from port 1701 (length=103, Ns=0, Nr=0). Packet content:
c8 02 00 67 00 00 00 00 00 00 00 00 80 08 00 00
00 00 00 01 80 08 00 00 00 02 01 00 80 0f 00 00
00 07 67 7a 6d 32 6d 6c 32 74 70 00 0c 00 00 00
08 48 55 41 57 45 49 80 0a 00 00 00 03 00 00 00
03 80 08 00 00 00 09 00 01 80 08 00 00 00 0a 00
40 80 16 00 00 00 0b d4 50 c8 f8 33 0f 44 a0 41
8e d0 51 7d 0c de 0c
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Message-Type AVP: 1.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Protocol-Version AVP. Version=1, Revision=0.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Host-Name AVP: gzm2ml2tp.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Vendor-Name AVP: HUAWEI.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Framing-Capabilities AVP: 3.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Assigned-Tunnel-ID AVP: 1.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Receive-Window-Size AVP: 64.
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/EVENT:
Parsed Challenge AVP: d4 50 c8 f8 33 0f 44 a0 41 8e d0 51 7d 0c de 0c
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Message-Type AVP:
80 08 00 00 00 00 00 02
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Protocol-Version AVP:
80 08 00 00 00 02 01 00
*Feb 11 10:58:45:980 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Host-Name AVP:
80 09 00 00 00 07 4c 4e 53
*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Framing-Capabilities AVP:
80 0a 00 00 00 03 00 00 00 00
*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Assigned-Tunnel-ID AVP:
80 08 00 00 00 09 12 0d
*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Bearer-Capabilities AVP:
80 0a 00 00 00 04 00 00 00 03
*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Receive-Window-Size AVP:
80 08 00 00 00 0a 04 00
*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Challenge AVP:
80 16 00 00 00 0b ad 4e 40 75 22 ac 37 2b 27 ac
f9 2a 1f c9 48 d6
*Feb 11 10:58:45:981 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Challenge-Response AVP:
80 16 00 00 00 0d bb 69 d6 e9 91 eb 04 5b 49 5f
e0 7a 27 28 52 96
*Feb 11 10:58:45:982 2022 LNS L2TPV2/7/EVENT:
TunnelID=4621: Processed SCCRQ packet in Idle state, sent SCCRP packet and changed the tunnel state to Wait-connect.
*Feb 11 10:58:45:992 2022 LNS L2TPV2/7/CONTROL-PKT:
Received SCCCN packet from port 1701 (TunnelID=4621, length=42, Ns=1, Nr=1). Packet content:
c8 02 00 2a 12 0d 00 00 00 01 00 01 80 08 00 00
00 00 00 03 80 16 00 00 00 0d e5 33 4a b4 b8 e8
20 34 81 dd 42 f8 ba 15 e5 29
*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/EVENT:
Parsed Message-Type AVP: 3.
*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/EVENT:
Parsed Challenge-Response AVP: e5 33 4a b4 b8 e8 20 34 81 dd 42 f8 ba 15 e5 29
*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/KEVENT:
cioctl add tunnel vrf 0 lip 192.50.10.178 rip 192.50.0.20 lport 1701 rport 1701 ltid 4621 rtid 1 type 1
*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/KEVENT:
result drv add tunnel 0
*Feb 11 10:58:45:993 2022 LNS L2TPV2/7/EVENT:
TunnelID=4621: Processed SCCCN packet in Wait-connect state, and changed the tunnel state to Established.
*Feb 11 10:58:46:155 2022 LNS L2TPV2/7/KEVENT: -Slot=2;
cioctl add tunnel vrf 0 lip 192.50.10.178 rip 192.50.0.20 lport 1701 rport 1701 ltid 4621 rtid 1 type 1
*Feb 11 10:58:46:155 2022 LNS L2TPV2/7/KEVENT: -Slot=2;
result drv add tunnel 0
*Feb 11 10:58:46:637 2022 LNS L2TPV2/7/KEVENT: -Slot=1;
cioctl add tunnel vrf 0 lip 192.50.10.178 rip 192.50.0.20 lport 1701 rport 1701 ltid 4621 rtid 1 type 1
*Feb 11 10:58:46:637 2022 LNS L2TPV2/7/KEVENT: -Slot=1;
result drv add tunnel 0
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/CONTROL-PKT:
Received ICRQ packet from port 1701 (TunnelID=4621, length=99, Ns=2, Nr=1). Packet content:
c8 02 00 63 12 0d 00 00 00 02 00 01 80 08 00 00
00 00 00 0a 80 08 00 00 00 0e 00 01 80 0a 00 00
00 0f 00 00 08 ab 80 0a 00 00 00 12 00 00 00 03
80 1e 00 00 00 15 67 64 67 7a 66 79 7a 77 66 77
30 31 73 2e 35 67 67 64 2e 67 7a 69 6f 74 80 15
00 00 00 16 38 36 31 34 30 30 31 39 38 36 30 37
39 32 37
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:
Parsed Message-Type AVP: 10.
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:
Parsed Assigned-Session-ID AVP: 1.
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:
Parsed Call-Serial-Number AVP: 2219.
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:
Parsed Bearer-Type AVP: 3.
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:
Parsed Called-Number AVP: gdgzfyzwfw01s.5ggd.gziot.
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/EVENT:
Parsed Calling-Number AVP: 861400198607927.
*Feb 11 10:58:45:994 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Message-Type AVP:
80 08 00 00 00 00 00 0b
*Feb 11 10:58:45:995 2022 LNS L2TPV2/7/CONTROL-PKT:
Encapsulated Assigned-Session-ID AVP:
80 08 00 00 00 0e a2 2a
*Feb 11 10:58:45:995 2022 LNS L2TPV2/7/EVENT:
TunnelID=4621, SessiOnID=41514: Processed ICRQ packet in Idle state, sent ICRP packet and changed the session state to Wait-connect.
*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/CONTROL-PKT:
Received ICCN packet from port 1701 (TunnelID=4621, length=80, Ns=3, Nr=2). Packet content:
c8 02 00 50 12 0d a2 2a 00 03 00 02 80 08 00 00
00 00 00 0c 80 0a 00 00 00 18 00 00 00 00 80 0a
00 00 00 13 00 00 00 01 00 0a 00 00 00 1a 01 04
05 dc 00 0a 00 00 00 1b 01 04 05 dc 00 0a 00 00
00 1c 01 04 05 dc 00 0a 00 00 00 25 00 00 00 00
*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:
Parsed Message-Type AVP: 12.
*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:
Parsed (Tx)Connect-Speed AVP: 0.
*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:
Parsed Framing-Type AVP: 1.
*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:
Parsed Initial-Received-LCP-CONFREQ AVP: 4.
*Feb 11 10:58:46:005 2022 LNS L2TPV2/7/EVENT:
Parsed Last-Sent-LCP-CONFREQ AVP: 4.
*Feb 11 10:58:46:006 2022 LNS L2TPV2/7/EVENT:
Parsed Last-Received-LCP-CONFREQ AVP: 4.
*Feb 11 10:58:46:006 2022 LNS L2TPV2/7/EVENT:
Parsed Private-Group-ID AVP: .
*Feb 11 10:58:46:007 2022 LNS L2TPV2/7/EVENT:
TunnelID=4621, SessiOnID=41514: Processed ICCN packet in Wait-connect state, and changed the session state to Established.
*Feb 11 10:58:46:007 2022 LNS L2TPV2/7/KEVENT:
Interface Virtual-Access0 created.
*Feb 11 10:58:46:169 2022 LNS L2TPV2/7/KEVENT: -Slot=2;
Interface Virtual-Access0 created.
*Feb 11 10:58:46:652 2022 LNS L2TPV2/7/KEVENT: -Slot=1;
Interface Virtual-Access0 created.
*Feb 11 10:58:46:009 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: Successfully distributed the User ID 671088642.
*Feb 11 10:58:46:021 2022 LNS L2TPV2/7/KEVENT:
LNS Notify ppp up(IF_LINKUP_UP). (ifIndex = 17413)
*Feb 11 10:58:46:022 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP daemon receive interface up event!
*Feb 11 10:58:46:023 2022 LNS L2TPV2/7/KDUMP:
Received a packet from PPP on interface Virtual-Access0 (length=18):
ff 03 c0 21 01 00 00 0e 03 04 c0 23 05 06 7f b4
3b 5a
*Feb 11 10:58:46:023 2022 LNS L2TPV2/7/KDATA-PKT:
Encapsulated an L2TP data packet on interface Virtual-Access0 (length=54):
Source IP: 192.50.10.178
Destination IP: 192.50.0.20
Source port: 1701
Destination port: 1701
Tunnel ID: 1
Session ID: 1
*Feb 11 10:58:46:022 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP l2tp prenego begin!
*Feb 11 10:58:46:022 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: mandatory-lcp, lcp establish begin!
*Feb 11 10:58:46:022 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Open Event
State initial
*Feb 11 10:58:46:022 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: initial --> starting
*Feb 11 10:58:46:022 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Lower Up Event
State starting
*Feb 11 10:58:46:023 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: starting --> reqsent
*Feb 11 10:58:46:023 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Output LCP(c021) Packet, PktLen 18
Current State reqsent, code ConfReq(01), id 0, len 14
AuthProto(3), len 4, PAP c0 23
MagicNumber(5), len 6, val 7f b4 3b 5a
*Feb 11 10:58:46:023 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP l2tp prenego end!
*Feb 11 10:58:46:023 2022 LNS L2TPV2/7/EVENT:
TunnelID=4621, SessiOnID=41514: LNS in Established state notify PPP phy-up result = 0.
%Feb 11 10:58:46:024 2022 LNS IFNET/3/PHY_UPDOWN: Physical state on the interface Virtual-Access0 changed to up.
*Feb 11 10:58:46:031 2022 LNS PPP/7/EXTERNAL_EVENT:
PPP External Event:
Virtual-Access0 deliver packet to user space success
*Feb 11 10:58:46:031 2022 LNS PPP/7/EXTERNAL_EVENT:
PPP External Event:
Virtual-Access0 deliver packet to user space success
*Feb 11 10:58:46:031 2022 LNS L2TPV2/7/KDUMP:
Received a packet from PPP on interface Virtual-Access0 (length=12):
ff 03 c0 21 02 00 00 08 01 04 05 dc
*Feb 11 10:58:46:031 2022 LNS L2TPV2/7/KDATA-PKT:
Encapsulated an L2TP data packet on interface Virtual-Access0 (length=48):
Source IP: 192.50.10.178
Destination IP: 192.50.0.20
Source port: 1701
Destination port: 1701
Tunnel ID: 1
Session ID: 1
*Feb 11 10:58:46:032 2022 LNS L2TPV2/7/KDUMP:
Received a packet from PPP on interface Virtual-Access0 (length=8):
ff 03 c0 21 01 01 00 04
*Feb 11 10:58:46:032 2022 LNS L2TPV2/7/KDATA-PKT:
Encapsulated an L2TP data packet on interface Virtual-Access0 (length=44):
Source IP: 192.50.10.178
Destination IP: 192.50.0.20
Source port: 1701
Destination port: 1701
Tunnel ID: 1
Session ID: 1
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Received an L2TP data packet:
Source IP: 192.50.0.20
Destination IP: 192.50.10.178
Source port: 1701
Destination port: 1701
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDUMP: -Slot=2;
Sent a packet to PPP on interface Virtual-Access0 (length=10):
c0 21 01 00 00 08 01 04 05 dc
*Feb 11 10:58:46:192 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;
PPP External Event:
Virtual-Access0 Send negotiate packet to service board succeeded
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Received an L2TP data packet:
Source IP: 192.50.0.20
Destination IP: 192.50.10.178
Source port: 1701
Destination port: 1701
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:192 2022 LNS L2TPV2/7/KDUMP: -Slot=2;
Sent a packet to PPP on interface Virtual-Access0 (length=16):
c0 21 04 00 00 0e 03 04 c0 23 05 06 7f b4 3b 5a
*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Input LCP(c021) Packet, PktLen 12
Current State reqsent, code ConfReq(01), id 0, len 8
MRU(1), len 4, val 05 dc
*Feb 11 10:58:46:192 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;
PPP External Event:
Virtual-Access0 Send negotiate packet to service board succeeded
*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP RCR+(Receive Config Good Request) Event
State reqsent
*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Output LCP(c021) Packet, PktLen 12
Current State reqsent, code ConfAck(02), id 0, len 8
MRU(1), len 4, val 05 dc
*Feb 11 10:58:46:031 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: reqsent --> acksent
*Feb 11 10:58:46:032 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Input LCP(c021) Packet, PktLen 18
Current State acksent, code ConfRej(04), id 0, len 14
AuthProto(3), len 4, PAP c0 23
MagicNumber(5), len 6, val 7f b4 3b 5a
*Feb 11 10:58:46:032 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP RCN(Receive Config Nak/Reject) Event
State acksent
*Feb 11 10:58:46:032 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Output LCP(c021) Packet, PktLen 8
Current State acksent, code ConfReq(01), id 1, len 4
*Feb 11 10:58:46:040 2022 LNS PPP/7/EXTERNAL_EVENT:
PPP External Event:
Virtual-Access0 deliver packet to user space success
*Feb 11 10:58:46:040 2022 LNS PPP/7/EXTERNAL_EVENT:
PPP External Event:
Virtual-Access0 deliver packet to user space success
*Feb 11 10:58:46:040 2022 LNS L2TPV2/7/KDUMP:
Received a packet from PPP on interface Virtual-Access0 (length=8):
ff 03 c0 21 05 02 00 04
*Feb 11 10:58:46:040 2022 LNS L2TPV2/7/KDATA-PKT:
Encapsulated an L2TP data packet on interface Virtual-Access0 (length=44):
Source IP: 192.50.10.178
Destination IP: 192.50.0.20
Source port: 1701
Destination port: 1701
Tunnel ID: 1
Session ID: 1
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Received an L2TP data packet:
Source IP: 192.50.0.20
Destination IP: 192.50.10.178
Source port: 1701
Destination port: 1701
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDUMP: -Slot=2;
Sent a packet to PPP on interface Virtual-Access0 (length=6):
c0 21 02 01 00 04
*Feb 11 10:58:46:201 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;
PPP External Event:
Virtual-Access0 Send negotiate packet to service board succeeded
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Received an L2TP data packet:
Source IP: 192.50.0.20
Destination IP: 192.50.10.178
Source port: 1701
Destination port: 1701
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Input LCP(c021) Packet, PktLen 8
Current State acksent, code ConfAck(02), id 1, len 4
*Feb 11 10:58:46:201 2022 LNS L2TPV2/7/KDUMP: -Slot=2;
Sent a packet to PPP on interface Virtual-Access0 (length=24):
80 21 01 00 00 16 03 06 00 00 00 00 81 06 00 00
00 00 83 06 00 00 00 00
*Feb 11 10:58:46:201 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;
PPP External Event:
Virtual-Access0 Send negotiate packet to service board succeeded
*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP RCA(Receive Config Ack) Event
State acksent
*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Close Event
State acksent
*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: acksent --> closing
*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Output LCP(c021) Packet, PktLen 8
Current State closing, code TermReq(05), id 2, len 4
*Feb 11 10:58:46:040 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Input IPCP(8021) Packet, PktLen 26
Current State null, code ConfReq(01), id 0, len 22
IP Address(3), len 6, val 00 00 00 00
Primary DNS Server Address(81), len 6, val 00 00 00 00
Secondary DNS Server Address(83), len 6, val 00 00 00 00
*Feb 11 10:58:46:048 2022 LNS PPP/7/EXTERNAL_EVENT:
PPP External Event:
Virtual-Access0 deliver packet to user space success
*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Received an L2TP data packet:
Source IP: 192.50.0.20
Destination IP: 192.50.10.178
Source port: 1701
Destination port: 1701
*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Successfully parsed the L2TP header (L2TP header length=6):TunnelID:4621,SessionID:41514,Type:0,Length:0,Sequence:0,Offset: 0,Priority:0
*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
Processed an L2TP data packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDATA-PKT: -Slot=2;
No FlowCtrl: Received an L2TP Data Packet. TunnelID=4621, SessiOnID=41514.
*Feb 11 10:58:46:209 2022 LNS L2TPV2/7/KDUMP: -Slot=2;
Sent a packet to PPP on interface Virtual-Access0 (length=6):
c0 21 06 02 00 04
*Feb 11 10:58:46:209 2022 LNS PPP/7/EXTERNAL_EVENT: -Slot=2;
PPP External Event:
Virtual-Access0 Send negotiate packet to service board succeeded
*Feb 11 10:58:46:048 2022 LNS PPP/7/FSM_PACKET_0:
PPP Packet:
Virtual-Access0 Input LCP(c021) Packet, PktLen 8
Current State closing, code TermAck(06), id 2, len 4
*Feb 11 10:58:46:048 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP RTA(Receive Terminate Ack) Event
State closing
*Feb 11 10:58:46:048 2022 LNS L2TPV2/7/CONTROL-PKT:
Received CDN packet from port 1701 (TunnelID=4621, length=38, Ns=4, Nr=2). Packet content:
c8 02 00 26 12 0d a2 2a 00 04 00 02 80 08 00 00
00 00 00 0e 80 0a 00 00 00 01 00 01 00 00 80 08
00 00 00 0e 00 01
*Feb 11 10:58:46:049 2022 LNS L2TPV2/7/EVENT:
Parsed Message-Type AVP: 14.
*Feb 11 10:58:46:049 2022 LNS L2TPV2/7/EVENT:
Parsed Result-Code AVP. Result-Code=1, Error-Code=0, Error-Message="".
*Feb 11 10:58:46:049 2022 LNS L2TPV2/7/EVENT:
Parsed Assigned-Session-ID AVP: 1.
*Feb 11 10:58:46:049 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: closing --> closed
*Feb 11 10:58:46:058 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP daemon receive interface down event!
*Feb 11 10:58:46:058 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Lower Down Event
State closed
*Feb 11 10:58:46:059 2022 LNS PPP/7/FSM_STATE_0:
PPP State Change:
Virtual-Access0 LCP: closed --> initial
*Feb 11 10:58:46:059 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Close Event
State initial
%Feb 11 10:58:46:068 2022 LNS IFNET/3/PHY_UPDOWN: Physical state on the interface Virtual-Access0 changed to down.
*Feb 11 10:58:46:085 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: PPP daemon receive interface down event!
*Feb 11 10:58:46:086 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Lower Down Event
State initial
*Feb 11 10:58:46:086 2022 LNS PPP/7/FSM_ERROR_0:
PPP Error:
Virtual-Access0 LCP: FSM Illegal Event!
*Feb 11 10:58:46:086 2022 LNS PPP/7/FSM_EVENT_0:
PPP Event:
Virtual-Access0 LCP Close Event
State initial
*Feb 11 10:58:46:256 2022 LNS L2TPV2/7/KEVENT: -Slot=2;
Interface Virtual-Access0 deleted.
*Feb 11 10:58:46:739 2022 LNS L2TPV2/7/KEVENT: -Slot=1;
Interface Virtual-Access0 deleted.
*Feb 11 10:58:46:098 2022 LNS L2TPV2/7/KEVENT:
Interface Virtual-Access0 deleted.
*Feb 11 10:58:46:101 2022 LNS PPP/7/EXTERNAL_EVENT_0:
PPP External Event:
Virtual-Access0: Successfully freed the User ID 671088642.
*Feb 11 10:58:46:298 2022 LNS L2TPV2/7/EVENT:
TunnelID=4621: Delay-ACK timer expired, received duplicate Hello packet for 0 times and sent ZLB-ACK packet for 1 times. Ns=2, Nr=5.
(0)
最佳答案
[LNS]dis current-configuration
#
version 7.1.064, Release 0809P29
#
sysname LNS
#
ip pool unicom-l2tp-user 10.40.0.1 10.40.3.200
ip pool unicom-l2tp-user gateway 10.40.3.254
#
dhcp enable
#
lldp global enable
#
password-recovery enable
#
vlan 1
#
l2vpn enable
#
controller Cellular2/0/0
#
interface Virtual-Template1
ppp authentication-mode pap chap
remote address pool unicom-l2tp-user
ip address 10.40.3.254 255.255.252.0
#
interface NULL0
#
interface GigabitEthernet2/0/0
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/1
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/2
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/3
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/4
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/5
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/6
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/7
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/8
port link-mode route
combo enable copper
#
interface GigabitEthernet2/0/9
port link-mode route
combo enable copper
#
interface GigabitEthernet2/1/0
port link-mode route
#
interface GigabitEthernet2/1/1
port link-mode route
#
interface GigabitEthernet2/1/2
port link-mode route
#
interface GigabitEthernet2/1/3
port link-mode route
#
interface GigabitEthernet2/2/0
port link-mode route
description 联通5G
ip address 192.50.10.178 255.255.255.252
#
interface GigabitEthernet2/2/1
port link-mode route
#
interface GigabitEthernet2/2/2
port link-mode route
#
interface GigabitEthernet2/2/3
port link-mode route
description 区府内网
ip address 10.160.245.6 255.255.255.252
#
interface M-GigabitEthernet0
#
interface Ten-GigabitEthernet2/0/10
port link-mode route
#
interface Ten-GigabitEthernet2/0/11
port link-mode route
#
interface Ten-GigabitEthernet2/0/12
port link-mode route
#
interface Ten-GigabitEthernet2/0/13
port link-mode route
#
scheduler logfile size 16
#
line class console
user-role network-admin
#
line class tty
user-role network-operator
#
line class vty
user-role network-operator
#
line con 0 1
user-role network-admin
#
line vty 0 63
authentication-mode scheme
user-role network-operator
#
ip route-static 0.0.0.0 0 10.160.245.5
ip route-static 10.160.0.0 16 10.160.245.5
ip route-static 172.25.0.0 16 10.160.245.5
ip route-static 192.50.0.0 24 192.50.10.177
ip route-static 192.50.0.1 32 192.50.10.177
ip route-static 192.50.0.3 32 192.50.10.177
ip route-static 192.50.0.20 32 192.50.10.177
ip route-static 192.50.0.21 32 192.50.10.177
ip route-static 192.50.0.32 32 192.50.10.177
#
snmp-agent
snmp-agent local-engineid 8000291780DC2DCB3A285A00000001
snmp-agent community read cipher $c$3$bf62+Dzlvpr4MkhR94bxVip6dFzJ2uhCDtNIErE=
snmp-agent sys-info version all
#
ssh server enable
ssh user admin service-type stelnet authentication-type password
#
acl number 3177
rule 0 permit ip destination 172.25.200.0 0.0.0.255
rule 5 permit ip destination 10.160.20.20 0
rule 2000 deny ip
#
radius scheme vpdn
primary authentication 10.160.20.20 key cipher $c$3$zMGs1ZU98oCuSczQaMYpuSpcU0GEGAOB4Q==
primary accounting 10.160.20.20 key cipher $c$3$aRbqzi4bg6EmnjRLmzBlU7PLVDdot2STkA==
user-name-format without-domain
nas-ip 10.160.245.6
#
domain system
authentication ppp local
accounting ppp local
#
domain vpdn
authentication ppp local
accounting ppp local
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
password hash $h$6$pLAXNMqqTHZl50Cs$5ui2fO0zvKizbi/73L75hU/jQPRl/9O/OudvwFUCKRE0psM5rAUBYuUnvJVRUkPLwpfF5UDpYsWVnv+fAryyVA==
service-type ssh https
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
local-user ceshi class network
password cipher $c$3$pL5U35nKjDZRk9hLob+e55Hg3LK00+U1b7pi2eu0tg==
service-type ppp
authorization-attribute user-role network-operator
#
local-user l2tp class network
password cipher $c$3$YhWAlhEwYnrMv9fX42G9cv7MoQ0t6VA=
service-type advpn
service-type ppp
authorization-attribute user-role network-operator
#
l2tp-group 1 mode lns
allow l2tp virtual-template 1 remote gzm2ml2tp
tunnel name LNS
tunnel password cipher $c$3$PxBU3Ygtw5QvjEayVWPvAah7wVvxYgljfLOvVQ==
#
l2tp enable
#
ip http enable
ip https enable
#
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论