H3C Technologies H3C SecPath F1000-E User Manual
Page 33
i
Table of Contents
L2TP Configuration······················································································································································· 1
L2TP Overview···································································································································································1
Introduction ·······························································································································································1
Typical L2TP Networking Application····················································································································1
Basic Concepts of L2TP············································································································································2
L2TP Tunneling Modes and Tunnel Establishment Process···················································································4
L2TP Features ····························································································································································7
Protocols and Standards··········································································································································7
L2TP Configuration Task List·············································································································································7
Configuring Basic L2TP Capability ·································································································································8
Configuring an LAC··························································································································································9
Configuring an LAC to Initiate Tunneling Requests for Specified Users ·····························································9
Configuring an LAC to Transfer AVP Data in Hidden Mode···············································································9
Configuring AAA Authentication for VPN Users on LAC Side········································································· 10
Configuring an LAC to Establish an L2TP Tunnel······························································································· 11
Configuring an LNS······················································································································································· 12
Creating a Virtual Template Interface ················································································································· 12
Configuring the Local Address and the Address Pool for Allocation······························································· 12
Configuring an LNS to Grant Certain L2TP Tunneling Requests ······································································ 13
Configuring User Authentication on an LNS ······································································································ 13
Configuring AAA Authentication for VPN Users on LNS Side ········································································· 15
Enabling L2TP Multi-Instance································································································································ 15
Specifying to Send ACCM ··································································································································· 16
Configuring L2TP Connection Parameters ··················································································································· 16
Configuring L2TP Tunnel Authentication ············································································································· 16
Setting the Hello Interval······································································································································· 16
Enabling Tunnel Flow Control ······························································································································ 17
Disconnecting Tunnels by Force··························································································································· 17
Displaying and Maintaining L2TP ································································································································ 17
L2TP Configuration Examples ······································································································································· 18
Configuration Example for NAS-Initiated VPN ·································································································· 18
Configuration Example for Client-Initiated VPN································································································· 20
Configuration Example for LAC-Auto-Initiated VPN··························································································· 22
Configuration Example for L2TP Multi-Domain Application ············································································· 24
Complicated Network Application······················································································································ 28
Troubleshooting L2TP····················································································································································· 28