场景说明:Win设备作为终端,与LNS建立L2TP VPN访问VPC,LNS分配地址给终端,Win侧防火墙仅配置SNAT和基础策略, VPC侧防火墙配置L2TP VPN作为LNS对终端进行认证。
LNS配置:
sysname FW-1 # l2tp enable l2tp domain suffix-separator @ # ip pool L2TP_A //创建L2TP VPN使用的地址池 section 0 172.16.10.1 172.16.10.253 # aaa authentication-scheme default authentication-scheme admin_local authentication-scheme admin_radius_local authentication-scheme admin_hwtacacs_local authentication-scheme admin_ad_local authentication-scheme admin_ldap_local authentication-scheme admin_radius authentication-scheme admin_hwtacacs authentication-scheme admin_ad authentication-scheme admin_ldap authorization-scheme default accounting-scheme default service-scheme L2TP //创建L2TP服务方案,绑定相关地址池 ip-pool L2TP_A domain default service-type internetaccess ssl-vpn l2tp ike //这里需要给认证域开启l2tp功能 internet-access mode auto-online reference user current-domain user-manage group /default/A //创建一个用户组 user-manage user arssra //创建L2TP用户 parent-group /default/A //将用户加入用户组 password arssra //配置用户密码 # l2tp-group 1 //创建l2tp组 tunnel password cipher %$%$0NR|Ot_>@YQa{.MY2:PT,QSC%$%$ //配置L2TP隧道密码 allow l2tp virtual-template 0 remote A //关联VT接口,以及设置隧道名称 # interface Virtual-Template0 ppp authentication-mode chap //配置PPP认证方式为CHAP remote service-scheme L2TP //关联服务方案 ip address 172.16.10.254 255.255.255.0 # interface GigabitEthernet0/0/0 undo shutdown ip binding vpn-instance default ip address 192.168.31.201 255.255.255.0 service-manage http permit service-manage https permit service-manage ping permit # interface GigabitEthernet1/0/1 undo shutdown ip address 100.1.1.1 255.255.255.252 # interface GigabitEthernet1/0/4 undo shutdown ip address 192.168.10.254 255.255.255.0 # firewall zone local set priority 100 # firewall zone trust set priority 85 add interface GigabitEthernet0/0/0 add interface GigabitEthernet1/0/4 # firewall zone untrust set priority 5 add interface GigabitEthernet1/0/1 add interface Virtual-Template0 # firewall zone dmz set priority 50 # security-policy rule name Trust_Untrust_Permit source-zone trust destination-zone untrust source-address 192.168.10.0 mask 255.255.255.0 action permit rule name Untrust_Local_L2TP_Permit source-zone untrust destination-zone local destination-address 100.1.1.1 mask 255.255.255.255 service l2tp action permit rule name Untrust_Trust_Permit source-zone untrust destination-zone trust source-address 172.16.10.0 mask 255.255.255.0 destination-address 192.168.10.0 mask 255.255.255.0 action permit # return
结果:通过VPN客户端可以正常登录到LNS上并访问到VPC