beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 33

background image

i

Table of Contents

L2TP Configuration······················································································································································· 1

L2TP Overview···································································································································································1

Introduction ·······························································································································································1

Typical L2TP Networking Application····················································································································1

Basic Concepts of L2TP············································································································································2

L2TP Tunneling Modes and Tunnel Establishment Process···················································································4

L2TP Features ····························································································································································7

Protocols and Standards··········································································································································7

L2TP Configuration Task List·············································································································································7

Configuring Basic L2TP Capability ·································································································································8

Configuring an LAC··························································································································································9

Configuring an LAC to Initiate Tunneling Requests for Specified Users ·····························································9

Configuring an LAC to Transfer AVP Data in Hidden Mode···············································································9

Configuring AAA Authentication for VPN Users on LAC Side········································································· 10

Configuring an LAC to Establish an L2TP Tunnel······························································································· 11

Configuring an LNS······················································································································································· 12

Creating a Virtual Template Interface ················································································································· 12

Configuring the Local Address and the Address Pool for Allocation······························································· 12

Configuring an LNS to Grant Certain L2TP Tunneling Requests ······································································ 13

Configuring User Authentication on an LNS ······································································································ 13

Configuring AAA Authentication for VPN Users on LNS Side ········································································· 15

Enabling L2TP Multi-Instance································································································································ 15

Specifying to Send ACCM ··································································································································· 16

Configuring L2TP Connection Parameters ··················································································································· 16

Configuring L2TP Tunnel Authentication ············································································································· 16

Setting the Hello Interval······································································································································· 16

Enabling Tunnel Flow Control ······························································································································ 17

Disconnecting Tunnels by Force··························································································································· 17

Displaying and Maintaining L2TP ································································································································ 17

L2TP Configuration Examples ······································································································································· 18

Configuration Example for NAS-Initiated VPN ·································································································· 18

Configuration Example for Client-Initiated VPN································································································· 20

Configuration Example for LAC-Auto-Initiated VPN··························································································· 22

Configuration Example for L2TP Multi-Domain Application ············································································· 24

Complicated Network Application······················································································································ 28

Troubleshooting L2TP····················································································································································· 28