Configuring user authentication on an lns – H3C Technologies H3C SecPath F1000-E User Manual
Page 271
259
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter L2TP group view.
l2tp-group group-number N/A
3.
Specify the virtual template
interface for receiving calls, the
tunnel name on the LAC, and
the domain name.
•
If the L2TP group number is 1
(the default):
allow l2tp virtual-template
virtual-template-number
[ remote remote-name ]
[ domain domain-name ]
•
If the L2TP group number is
not 1:
allow l2tp virtual-template
virtual-template-number
remote remote-name
[ domain domain-name ]
Use either command.
By default, an LNS denies all
incoming calls.
If the L2TP group number is 1, you
do not need to specify the LAC
side tunnel name. In L2TP group 1,
the LNS allows the LAC to initiate a
tunneling request by using any
tunnel name.
NOTE:
•
The start l2tp command and the allow l2tp command are mutually exclusive. Configuring one of them
automatically disables the other one.
•
The LAC side tunnel name configured on the LNS must be consistent with the local tunnel name
configured on the LAC.
Configuring user authentication on an LNS
An LNS may be configured to authenticate a user that has passed authentication on the LAC to increase
security. In this case, the user is authenticated twice, once on the LAC and once on the LNS. Only when
the two authentications succeed can an L2TP tunnel be set up. This helps raise security.
An LNS authenticates users by using one of the following methods:
•
Proxy authentication—The LNS uses the LAC as an authentication proxy. The LAC sends the LNS all
user authentication information from users and the authentication mode configured on the LAC itself.
The LNS then checks the user validity according to the received information and the locally
configured authentication method.
•
Mandatory CHAP authentication—The LNS uses CHAP authentication to re-authenticate users who
have passed authentication on the LAC.
•
LCP re-negotiation—The LNS ignores the LAC proxy authentication information and performs a
new round of LCP negotiation with the user.
The three authentication methods have different priorities, where LCP re-negotiation has the highest
priority and proxy authentication has the lowest priority. Which method the LNS uses depends on your
configuration:
•
If you configure both LCP re-negotiation and mandatory CHAP authentication, the LNS uses LCP
re-negotiation.
•
If you configure only mandatory CHAP authentication, the LNS performs CHAP authentication of
users.
•
If you configure neither LCP re-negotiation nor mandatory CHAP authentication, the LNS uses the
LAC for proxy authentication of users.
1.
Configuring mandatory CHAP authentication:
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS