L2TP实验

一、实验拓扑

L2TP实验_第1张图片

二、实验内容

手工部署IPSec VPN

三、实验步骤

1、配置接口IP和安全区域

[PPPoE Client]firewall zone trust 
[PPPoE Client-zone-trust]add int g 1/0/0

[NAS]firewall zone untrust 
[NAS-zone-untrust]add int g 1/0/1	
[NAS]firewall zone trust 
[NAS-zone-trust]add int g 1/0/0

[LNS]firewall zone untrust 
[LNS-zone-untrust]add int g 1/0/0
[LNS]firewall zone trust 
[LNS-zone-trust]add int g 1/0/1

2、配置公网路由

[FW1]ip route-static 0.0.0.0 0 1.1.1.2

[FW2]ip route-static 0.0.0.0 0 1.1.2.2

3、L2TP配置

(1)PPPoE Client

[PPPoE Client]int Dialer 1
[PPPoE Client-Dialer1]dialer user user1
[PPPoE Client-Dialer1]dialer-group 1
[PPPoE Client-Dialer1]ip address ppp-negotiate 
[PPPoE Client-Dialer1]ppp chap user user1
[PPPoE Client-Dialer1]ppp chap password cipher Password123
[PPPoE Client]dialer-rule 1 ip permit 
[PPPoE Client]int g 1/0/0
[PPPoE Client-GigabitEthernet1/0/0]pppoe-client dial-bundle-number 1

(2)NAS

[LAC]interface Virtual-Template 1	
[LAC-Virtual-Template1]ppp authentication-mode chap 
 The command is used to configure the PPP authentication mode on the local end. 
Confirm that the peer end adopts the corresponding PPP authentication. Continue[
Y/N]:y
[LAC-Virtual-Template1]ip address 2.2.2.2 24
[LAC]firewall zone dmz	
[LAC-zone-dmz]add interface Virtual-Template 1
 
[LAC]int g 1/0/0	
[LAC-GigabitEthernet1/0/0]pppoe-server bind virtual-template 1
[LAC-GigabitEthernet1/0/0]q
 
[LAC]aaa
Info: The domain default is for common users.
[LAC-aaa-domain-default]service-type 
 
[LAC]user-manage user user1 domain default 
[LAC-localuser-user1]password Password123

4、建立L2TP隧道

[LAC] enable 
[LAC]-group 1
[LAC--1]tunnel authentication 	
[LAC--1]tunnel password cipher 
[LAC--1]tunnel password cipher Hello123
[LAC--1]tunnel name lac
[LAC--1]start  ip 20.1.1.2 fullusername user1

5、 LNS配置

[LNS]ip pool 
[LNS-ip-pool-]section 0 172.16.1.2 172.16.1.100 
[LNS-aaa]service-scheme 
Info: Create a new service scheme.
[LNS-aaa-service-]ip-pool 
[LNS-aaa]domain default 
Info: The domain default is for common users.
[LNS-aaa-domain-default]
[LNS-aaa-domain-default]service-type 
[LNS]user-manage user user1 domain default 
[LNS-localuser-user1]password Password123
[LNS]interface Virtual-Template 1
[LNS-Virtual-Template1]ppp authentication-mode chap
[LNS-Virtual-Template1]ip address 172.16.0.1 24
[LNS-Virtual-Template1]remote service-scheme 
[LNS]firewall zone dmz	
[LNS-zone-dmz]add interface Virtual-Template 1
[LNS] enable 
[LNS]-group 1
[LNS--1]allow  
[LNS--1]allow  virtual-template 1 remote lac domain default
[LNS--1]tunnel authentication 
[LNS--1]tunnel password cipher Hello123

6、 路由补充

[PPPoE Client]ip route-static 0.0.0.0 0 Dialer 1  出接口方式
 
[PPPoE Client]firewall zone dmz  将Dialer 1接口划分到dmz区域,方便发包:
[PPPoE Client-zone-dmz]add interface Dialer 1

7、将所有设备的默认安全策略放通

[PPPoE Client]security-policy
[PPPoE Client-policy-security]default action permit
 
[LAC]security-policy
[LAC-policy-security]default action permit
 
[LNS]security-policy	
[LNS-policy-security]default action permit 

8、安全策略配置

(1)NAS

[LAC]security-policy
[LAC-policy-security]default action deny   先恢复默认策略为拒绝
 Warning: Setting the default interzone packet filtering to deny may affect actu
al data traffic. You are advised to configure the security policy based on the a
ctual services. Are you sure you want to continue? [Y/N]y
[LAC-policy-security]rule name local_to_untrust
[LAC-policy-security-rule-local_to_untrust]source-zone local
[LAC-policy-security-rule-local_to_untrust]destination-zone untrust
[LAC-policy-security-rule-local_to_untrust]source-address 20.1.1.1 mask 255.255.
255.255
[LAC-policy-security-rule-local_to_untrust]destination-zone
[LAC-policy-security-rule-local_to_untrust]destination-address 20.1.1.2 mask255.
255.255.255
[LAC-policy-security-rule-local_to_untrust]service 
[LAC-policy-security-rule-local_to_untrust]service protocol udp source-port 0 to
 65535 destination-port 1701	
[LAC-policy-security-rule-local_to_untrust]action permit 

(2)LNS

[LNS]security-policy 	
[LNS-policy-security]default action deny 
[LNS-policy-security]dis this
security-policy
 rule name untrust_to_local
  source-zone untrust
  destination-zone local
  source-address 20.1.1.1 mask 255.255.255.255
  destination-address 20.1.1.2 mask 255.255.255.255
  service 
  service protocol udp destination-port 1701
  action permit
 rule name dmz_to_trust
  source-zone dmz
  destination-zone trust
  source-address 172.16.1.0 mask 255.255.255.0
  destination-address 192.168.1.0 mask 255.255.255.0
  action permit

你可能感兴趣的:(网络)