前段时间用单位的MSR3600设置VPN,目前VPN已经配置成功并且通过公网可以连接,但是VPN连接上之后无法访问路由器下面的设备。现在路由器下面连接了两台服务器,期中一台服务器地址是192.168.142.250,另一台服务器做的虚拟化,配置的地址分别是192.168.142.251-192.168.142.253。通过VPN连接到交换机之后可以ping通192.168.142.1,但是服务器的IP地址都ping不通,而且通过软件也访问不了服务器。用路由器直接ping可以通,用核心交换机直接Ping也可以通,但是核心交换机下的电脑ping不同。不清楚这个是怎么回事,劳烦各位大神指点一二。
version 7.1.064, Release 0809P28
#
sysname Internet-Roter
#
clock timezone Beijing add 08:00:00
clock protocol ntp
#
telnet server enable
#
security-zone intra-zone default permit
#
track 1 nqa entry admin pppoe0591 reaction 1
#
track 2 nqa entry admin pppoe0309 reaction 1
#
track 3 nqa entry admin zx reaction 1
#
ospf 10 router-id 10.255.255.1
default-route-advertise always
import-route direct
area 0.0.0.0
network 172.255.255.1 0.0.0.0
#
ip pool l2tp1 192.168.50.100 192.168.50.200
#
dialer-group 10 rule ip permit
#
ip unreachables enable
ip ttl-expires enable
#
dhcp enable
dhcp server always-broadcast
#
dns proxy enable
#
lldp global enable
#
password-recovery enable
#
vlan 1
#
object-group service FW
0 service tcp destination eq 12306
#
policy-based-route pbr permit node 10
if-match acl 3010
apply next-hop 192.168.2.1 track 1
#
policy-based-route pbr permit node 20
if-match acl 3020
apply next-hop 192.168.1.1 track 2
#
nqa entry admin pppoe0309
type icmp-echo
description ip 192.168.1.1
frequency 100
reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
source ip 192.168.1.2
#
nqa entry admin pppoe0591
type icmp-echo
destination ip 192.168.2.1
frequency 100
reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
source ip 192.168.2.2
#
nqa entry admin zx
type icmp-echo
destination ip 113.200.75.1
frequency 100
reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
source ip 113.200.75.75
#
nqa schedule admin pppoe0591 start-time now lifetime forever
nqa schedule admin zx start-time now lifetime forever
#
controller Cellular0/0
#
interface Aux0
#
interface Virtual-Template0
#
interface Virtual-Template1
ppp authentication-mode chap
remote address pool l2tp1
ip address 192.168.50.1 255.255.255.0
#
interface NULL0
#
interface Vlan-interface1
description LAN-interface
ip address 192.168.142.1 255.255.255.0
tcp mss 1280
undo dhcp select server
#
interface GigabitEthernet0/0
port link-mode route
description PPPOE-02989630591
ip address 192.168.2.2 255.255.255.0
nat outbound 3000
#
interface GigabitEthernet0/1
port link-mode route
description DianXin-ZhuanXin
ip address 113.200.75.75 255.255.255.0
nat outbound 3000
#
interface GigabitEthernet0/2
port link-mode route
description PPPOE-02989630309
ip address 192.168.1.2 255.255.255.0
nat outbound 3000
#
interface GigabitEthernet0/3
port link-mode route
ip address 172.255.255.1 255.255.255.252
ospf network-type p2p
ip policy-based-route pbr
#
interface GigabitEthernet0/27
port link-mode route
#
interface GigabitEthernet0/4
port link-mode bridge
#
interface GigabitEthernet0/5
port link-mode bridge
#
interface GigabitEthernet0/6
port link-mode bridge
#
interface GigabitEthernet0/7
port link-mode bridge
#
interface GigabitEthernet0/8
port link-mode bridge
#
interface GigabitEthernet0/9
port link-mode bridge
#
interface GigabitEthernet0/10
port link-mode bridge
#
interface GigabitEthernet0/11
port link-mode bridge
#
interface GigabitEthernet0/12
port link-mode bridge
#
interface GigabitEthernet0/13
port link-mode bridge
#
interface GigabitEthernet0/14
port link-mode bridge
#
interface GigabitEthernet0/15
port link-mode bridge
#
interface GigabitEthernet0/16
port link-mode bridge
#
interface GigabitEthernet0/17
port link-mode bridge
#
interface GigabitEthernet0/18
port link-mode bridge
#
interface GigabitEthernet0/19
port link-mode bridge
#
interface GigabitEthernet0/20
port link-mode bridge
#
interface GigabitEthernet0/21
port link-mode bridge
#
interface GigabitEthernet0/22
port link-mode bridge
#
interface GigabitEthernet0/23
port link-mode bridge
#
interface GigabitEthernet0/24
port link-mode bridge
#
interface GigabitEthernet0/25
port link-mode bridge
#
interface GigabitEthernet0/26
port link-mode bridge
#
object-policy ip Local-Local
rule 0 pass counting
#
object-policy ip Local-Trust
rule 0 pass logging counting
#
object-policy ip Local-Untrust
rule 0 pass logging counting
#
object-policy ip Trust-Local
rule 0 pass logging counting
#
object-policy ip Trust-Trust
rule 0 pass logging counting
#
object-policy ip Trust-Untrust
rule 0 pass logging counting
#
object-policy ip Untrust-Local
rule 1 pass service FW counting
#
security-zone name Local
#
security-zone name Trust
import interface GigabitEthernet0/0
import interface GigabitEthernet0/1
import interface GigabitEthernet0/2
import interface GigabitEthernet0/3
import interface Vlan-interface1
#
security-zone name DMZ
#
security-zone name Untrust
#
security-zone name Management
#
zone-pair security source Local destination Local
object-policy apply ip Local-Local
#
zone-pair security source Local destination Trust
object-policy apply ip Local-Trust
#
zone-pair security source Local destination Untrust
object-policy apply ip Local-Untrust
#
zone-pair security source Trust destination Local
object-policy apply ip Trust-Local
#
zone-pair security source Trust destination Trust
object-policy apply ip Trust-Trust
#
zone-pair security source Trust destination Untrust
object-policy apply ip Trust-Untrust
#
scheduler logfile size 16
#
line class aux
user-role network-admin
#
line class tty
user-role network-operator
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line vty 0 63
authentication-mode scheme
user-role network-admin
user-role network-operator
#
ip route-static 0.0.0.0 0 192.168.2.1 preference 100
ip route-static 0.0.0.0 0 192.168.1.1 preference 150
ip route-static 0.0.0.0 0 113.200.75.1 track 3
#
ssh server enable
ssh server acl 2000
ssh server port 12306
#
ntp-service enable
ntp-service unicast-server 114.118.7.161
#
acl advanced 3000
rule 0 permit ip
#
acl advanced 3010
description PPPOE-02989630591
rule 0 permit ip source 172.16.10.0 0.0.1.255
rule 5 permit ip source 172.16.20.0 0.0.1.255
rule 10 permit ip source 172.16.30.0 0.0.1.255
#
acl advanced 3020
description PPPOE-02989630309
rule 0 permit ip source 172.16.15.0 0.0.0.255
rule 5 permit ip source 172.16.25.0 0.0.0.255
rule 10 permit ip source 172.16.40.0 0.0.0.255
#
password-control enable
undo password-control aging enable
undo password-control length enable
undo password-control composition enable
undo password-control history enable
password-control length 6
password-control login-attempt 3 exceed lock-time 2
password-control update-interval 0
password-control login idle-time 0
undo password-control complexity user-name check
undo password-control change-password first-login enable
#
domain system
#
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
service-type ftp
service-type ssh telnet terminal http https
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
local-user administrator class manage
service-type ssh telnet terminal http https
authorization-attribute user-role level-15
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
#
local-user bdxsj class network
password cipher $c$3$q+cRoZssZx7xAsDlo/1ejLfz21JrYr6v4Oinlu9y
access-limit 50
service-type ppp
authorization-attribute user-role network-operator
#
l2tp-group 1 mode lns
allow l2tp virtual-template 1
undo tunnel authentication
tunnel name VPN
#
l2tp enable
#
ip http enable
ip https enable
#
wlan global-configuration
#
wlan ap-group default-group
vlan 1
#
return
(0)
最佳答案
你这不是路由器,你这是防火墙
l2tp配置完了记得在安全策略里面放行一下流量啊
不然就只能打通vpn 隧道,但是明细路由不通。
给你个方向:新建安全策略(你可以在web里配置比较方便)然后源安全区域选untrust目的区域选择trust 服务选择l2tp,动作:放行。把策略的排序往上面拖一下。应该可以解决
(0)
WEB页面里面没有interface Virtual-Template1
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明