本文档介绍如何在 Cisco Secure PIX 防火墙上配置以太网上的点对点协议 (PPPoE) 客户端。PIX OS 6.2 版引入了此功能,该版本适用于低端 PIX (501/506)。
PPPoE 结合两种广泛接受的标准(以太网和 PPP),以提供一种经过身份验证的向客户端系统分配 IP 地址的方法。PPPoE 客户端通常是通过远程宽带连接(例如 DSL 或电缆服务)连接到 ISP 的个人计算机。ISP 会部署 PPPoE,因为 PPPoE 支持使用其现有的远程访问基础设施进行高速宽带接入,且更便于客户使用。PIX 防火墙 6.2 版引入了 PPPoE 客户端功能。这样使小型办公室、家庭办公室 (SOHO) 中的 PIX 防火墙用户可使用 DSL 调制解调器连接到 ISP。
目前,仅 PIX 的外部接口支持此功能。在外部接口上也进行配置后,将用 PPPoE/PPP 报头封装所有流量。PPPoE 的默认身份验证机制是口令身份验证协议 (PAP)。
PPPoE 提供一种在以太网网络上部署 PPP 身份验证方法的标准方法。ISP 使用该方法时,PPPoE 允许对 IP 地址进行经过身份验证的分配。在这种类型的实现中,PPPoE 客户端和服务器由通过 DSL 或其他宽带连接运行的第 2 层桥接协议互联。
用户可手动选择配置质询握手身份验证协议 (CHAP) 或 MS-CHAP。PIX OS 6.2 和 6.3 版不支持第二层隧道协议 (L2TP) 和点对点隧道协议 (PPTP) 与 PPPoE 配合使用。
PPPoE 由以下两个主要阶段组成:
活动发现阶段 - 在此阶段,PPPoE 客户端查找 PPPoE 服务器(称为接入集中器)。在此阶段期间,将分配会话 ID 并建立 PPPoE 层。
PPP 会话阶段 - 在此阶段,将协商 PPP 选项并执行身份验证。完成链路建立后,PPPoE 即充当第 2 层封装方法,从而使数据可以在 PPPoE 报头中通过 PPP 链路进行传输。
在系统初始化时,PPPoE 客户端通过交换一系列的数据包与 AC 建立会话。建立会话后,即建立 PPP 链路,其中包括使用口令身份验证协议 (PAP) 进行身份验证。建立 PPP 会话后,每个数据包会封装在 PPPoE 和 PPP 报头中。
本文档没有任何特定的要求。
本文档中的信息基于以下软件和硬件版本:
含 PIX OS 6.3(4) 版的 PIX 501
配置为 PPPoE 服务器的含 Cisco IOS® 软件 12.3(10) 版的 Cisco 1721 路由器
本文档中的信息都是基于特定实验室环境中的设备编写的。本文档中使用的所有设备最初均采用原始(默认)配置。如果您使用的是真实网络,请确保您已经了解所有命令的潜在影响。
有关文档约定的更多信息,请参考 Cisco 技术提示约定。
本部分提供了可用于配置本文所述功能的信息。
注:要查找有关本文档使用的命令的其他信息,请使用命令查找工具(仅注册客户)。
本文档使用以下网络设置:
本文档使用以下配置。
在此实验室测试中,Cisco 1721 路由器充当 PPPoE 服务器。在您的家庭/远程办公室中不需要此设备,因为您的 ISP 将托管 PPPoE 服务器。
Cisco 1721 路由器作为 PPPoE 服务器 |
---|
!--- Username matches that on the PIX. username cisco password cisco !--- Enable virtual private dial-up network (VPDN). vpdn enable ! !--- Define the VPDN group that you use for PPPoE. vpdn-group pppoex accept-dialin protocol pppoe virtual-template 1 ! interface Ethernet0 ip address 172.21.48.30 255.255.255.224 !--- Enable PPPoE sessions on the interface. pppoe enable ! interface Virtual-Template1 mtu 1492 !--- Do not use a static IP assignment within a virtual template since !--- routing problems can occur. Instead, use the ip unnumbered command !--- when you configure a virtual template. ip unnumbered Ethernet0 peer default ip address pool pixpool !--- Define authentication protocol. ppp authentication pap ! ip local pool pixpool 11.11.11.1 11.11.11.100 |
PIX(501 或 506)作为 PPPoE 客户端 |
---|
pix501#write terminal Building configuration... : Saved : PIX Version 6.3(4) interface ethernet0 10baset interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted hostname pix501 domain-name cisco.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names pager lines 24 mtu outside 1500 mtu inside 1500 !--- Enable PPPoE client functionality on the interface. !--- It is off by default. The setroute option creates a default !--- route if no default route exists. ip address outside pppoe setroute ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 192.168.1.0 255.255.255.0 0 0 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable telnet timeout 5 ssh timeout 5 console timeout 0 !--- Define the VPDN group that you use for PPPoE. !--- Configure this first. vpdn group pppoex request dialout pppoe !--- Associate the username that the ISP assigns to the VPDN group. vpdn group pppoex localname cisco !--- Define authentication protocol. vpdn group pppoex ppp authentication pap !--- Create a username and password pair for the PPPoE !--- connection (which your ISP provides). vpdn username cisco password ********* terminal width 80 Cryptochecksum:e136533e23231c5bbbbf4088cee75a5a : end [OK] pix501# |
本部分提供的信息可用于确认您的配置是否正常运行。
命令输出解释程序工具(仅限注册用户)支持某些 show 命令,使用此工具可以查看对 show 命令输出的分析。
show ip address outside pppoe - 显示当前的 PPPoE 客户端配置信息。
show vpdn tunnel pppoe - 显示特定隧道类型的隧道信息。
show vpdn session pppoe - 显示 PPPoE 会话的状态。
show vpdn pppinterface - 显示 PPPoE 隧道的接口标识值。为每个 PPPoE 隧道创建一个 PPP 虚拟接口。
show vpdn group - 显示为 PPPoE 隧道定义的组。
show vpdn username - 显示本地用户名信息。
以下是 show ip address outside pppoe 命令的输出:
501(config)#show ip address outside pppoe PPPoE Assigned IP addr: 11.11.11.1 255.255.255.255 on Interface: outside Remote IP addr: 172.21.48.30
以下是 show vpdn tunnel pppoe 命令的输出:
501(config)#show vpdn tunnel pppoe PPPoE Tunnel Information (Total tunnels=1 sessions=1) Tunnel id 0, 1 active sessions time since change 20239 secs Remote MAC Address 00:08:E3:9C:4C:71 3328 packets sent, 3325 received, 41492 bytes sent, 0 received
以下是 show vpdn session pppoe 命令的输出:
501(config)#show vpdn session pppoe PPPoE Session Information (Total tunnels=1 sessions=1) Remote MAC is 00:08:E3:9C:4C:71 Session state is SESSION_UP Time since event change 20294 secs, interface outside PPP interface id is 1 3337 packets sent, 3334 received, 41606 bytes sent, 0 received
以下是 show vpdn pppinterface 命令的输出:
501(config)#show vpdn pppinterface PPP virtual interface id = 1 PPP authentication protocol is PAP Server ip address is 172.21.48.30 Our ip address is 11.11.11.1 Transmitted Pkts: 3348, Received Pkts: 3345, Error Pkts: 0 MPPE key strength is None MPPE_Encrypt_Pkts: 0, MPPE_Encrypt_Bytes: 0 MPPE_Decrypt_Pkts: 0, MPPE_Decrypt_Bytes: 0 Rcvd_Out_Of_Seq_MPPE_Pkts: 0
以下是 show vpdn group 命令的输出:
501(config)#show vpdn group vpdn group pppoex request dialout pppoe vpdn group pppoex localname cisco vpdn group pppoex ppp authentication pap
以下是 show vpdn username 命令的输出:
501(config)#show vpdn username vpdn username cisco password *********
本部分提供了可用于对配置进行故障排除的信息。
以下是 PIX 上常见错误配置中的示例调试。开启这些调试。
pix#show debug debug ppp negotiation debug pppoe packet debug pppoe error debug pppoe event
身份验证故障(例如用户名/口令有误)。
Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: d0c3305c PPP pap recv authen nak: 41757468656e7469636174696f6e206661696c757265 PPP PAP authentication failed Rcvd Link Control Protocol pkt, Action code is: Termination Request, len is: 0
身份验证协议无效(例如 PAP/CHAP 配置有误)。
Xmit Link Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 05064a53ae2a LCP Option: MAGIC_NUMBER, len: 6, data: 4a53ae2a Rcvd Link Control Protocol pkt, Action code is: Config Request, len is: 14 Pkt dump: 010405d40304c0230506d0c88668 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 4, data: c023 LCP Option: MAGIC_NUMBER, len: 6, data: d0c88668 Xmit Link Control Protocol pkt, Action code is: Config NAK, len is: 5 Pkt dump: 0305c22305 LCP Option: AUTHENTICATION_TYPES, len: 5, data: c22305 Rcvd Link Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 05064a53ae2a LCP Option: MAGIC_NUMBER, len: 6, data: 4a53ae2a
PPPoE 服务器不响应,每 30 秒重试一次。
send_padi:(Snd) Dest:ffff.ffff.ffff Src:0007.5057.e27e T ype:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:09=PADI Sess:0 Len:12 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 padi timer expired send_padi:(Snd) Dest:ffff.ffff.ffff Src:0007.5057.e27e Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:09=PADI Sess:0 Len:12 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 padi timer expired send_padi:(Snd) Dest:ffff.ffff.ffff Src:0007.5057.e27e Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:09=PADI Sess:0 Len:12 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 padi timer expired
命令输出解释程序工具(仅限注册用户)支持某些 show 命令,使用此工具可以查看对 show 命令输出的分析。
注意:在发出debug命令之前,请参阅有关Debug命令的重要信息。
debug pppoe packet - 显示数据包信息。
debug pppoe error - 显示错误消息。
debug pppoe event - 显示协议事件信息。
debug ppp negotiation - 使您可以查看客户端是否传递 PPP 协商信息。
debug ppp io—显示 PPTP PPP 虚拟接口的数据包信息。
debug ppp upap - 显示 PAP 身份验证。
debug ppp error—显示 PPTP PPP 虚拟接口的错误消息。
debug ppp chap - 显示有关客户端是否通过身份验证的信息。
要对 PPPoE 客户端启用调试,请使用以下这些命令:
!--- Displays packet information. 501(config)#debug pppoe packet !--- Displays error messages. 501(config)#debug pppoe error !--- Displays protocol event information. 501(config)#debug pppoe event send_padi:(Snd) Dest:ffff.ffff.ffff Src:0008.a37f.be88 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:09=PADI Sess:0 Len:12 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 padi timer expired PPPoE:(Rcv) Dest:0008.a37f.be88 Src:0008.e39c.4c71 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:07=PADO Sess:0 Len:45 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 Type:0102:ACNAME-AC Name Len:9 3640 Type:0104:ACCOOKIE-AC Cookie Len:16 D69B0AAF 0DEBC789 FF8E1A75 2E6A3F1B PPPoE: PADO send_padr:(Snd) Dest:0008.e39c.4c71 Src:0008.a37f.be88 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:19=PADR Sess:0 Len:45 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 Type:0102:ACNAME-AC Name Len:9 3640 Type:0104:ACCOOKIE-AC Cookie Len:16 D69B0AAF 0DEBC789 FF8E1A75 2E6A3F1B PPPoE:(Rcv) Dest:0008.a37f.be88 Src:0008.e39c.4c71 Type:0x8863=PPPoE-Discovery Ver:1 Type:1 Code:65=PADS Sess:1 Len:45 Type:0101:SVCNAME-Service Name Len:0 Type:0103:HOSTUNIQ-Host Unique Tag Len:4 00000001 Type:0102:ACNAME-AC Name Len:9 3640 Type:0104:ACCOOKIE-AC Cookie Len:16 D69B0AAF 0DEBC789 FF8E1A75 2E6A3F1B PPPoE: PADS IN PADS from PPPoE tunnel PPPoE: Virtual Access interface obtained.PPPoE: Got ethertype=800 on PPPoE interface=outside PPPoE: Got ethertype=800 on PPPoE interface=outside PPPoE: Got ethertype=800 on PPPoE interface=outside
以下输出显示 PPPoE 客户端的其他调试命令:
501(config)#debug ppp negotiation 501(config)#debug ppp io 501(config)#debug ppp upap 501(config)#debug ppp error PPP virtual access open, ifc = 0 Xmit Link Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 0506609b39f5 LCP Option: MAGIC_NUMBER, len: 6, data: 609b39f5 PPP xmit, ifc = 0, len: 14 data: ff03c0210101000a0506609b39f5 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c02101010012010405d40304c023050659d9f6360000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Config Request, len is: 14 Pkt dump: 010405d40304c023050659d9f636 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 4, data: c023 LCP Option: MAGIC_NUMBER, len: 6, data: 59d9f636 Xmit Link Control Protocol pkt, Action code is: Config ACK, len is: 14 Pkt dump: 010405d40304c023050659d9f636 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 4, data: c023 LCP Option: MAGIC_NUMBER, len: 6, data: 59d9f636 PPP xmit, ifc = 0, len: 22 data: ff03c02102010012010405d40304c023050659d9f636 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c02101020012010405d40304c023050659d9f6360000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Config Request, len is: 14 Pkt dump: 010405d40304c023050659d9f636 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 4, data: c023 LCP Option: MAGIC_NUMBER, len: 6, data: 59d9f636 Xmit Link Control Protocol pkt, Action code is: Config ACK, len is: 14 Pkt dump: 010405d40304c023050659d9f636 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 4, data: c023 LCP Option: MAGIC_NUMBER, len: 6, data: 59d9f636 PPP xmit, ifc = 0, len: 22 data: ff03c02102020012010405d40304c023050659d9f636 Xmit Link Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 0506609b39f5 LCP Option: MAGIC_NUMBER, len: 6, data: 609b39f5 PPP xmit, ifc = 0, len: 14 data: ff03c0210101000a0506609b39f5 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210201000a0506609b39f500000000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 0506609b39f5 LCP Option: MAGIC_NUMBER, len: 6, data: 609b39f5 Xmit Link Control Protocol pkt, Action code is: Echo Request, len is: 4 Pkt dump: 609b39f5 PPP xmit, ifc = 0, len: 12 data: ff03c02109000008609b39f5 PPP xmit, ifc = 0, len: 20 data: ff03c0230101001005636973636f05636973636f PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210a00000859d9f636000000000000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: 59d9f636 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0230201000500000000000000000000000000000000000000000000 000000000000000000000000 PPP upap rcvd authen ack: ff03c02302010005000000000000000000000000000000000000000000000000000000000000000 00000 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff0380210101000a0306ac15301e00000000000000000000000000000000 000000000000000000000000 Rcvd IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 0306ac15301e IPCP Option: Config IP, IP = 172.21.48.30 Xmit IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 030600000000 IPCP Option: Config IP, IP = 0.0.0.0 PPP xmit, ifc = 0, len: 14 data: ff0380210101000a030600000000 Xmit IP Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 0306ac15301e IPCP Option: Config IP, IP = 172.21.48.30 PPP xmit, ifc = 0, len: 14 data: ff0380210201000a0306ac15301e PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff0380210301000a03060b0b0b0200000000000000000000000000000000 000000000000000000000000 Rcvd IP Control Protocol pkt, Action code is: Config NAK, len is: 6 Pkt dump: 03060b0b0b02 IPCP Option: Config IP, IP = 11.11.11.1 Xmit IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 03060b0b0b02 IPCP Option: Config IP, IP = 11.11.11.1 PPP xmit, ifc = 0, len: 14 data: ff0380210102000a03060b0b0b02 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210901000c59d9f636015995a10000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Request, len is: 8 Pkt dump: 59d9f636015995a1 Xmit Link Control Protocol pkt, Action code is: Echo Reply, len is: 8 Pkt dump: 609b39f5015995a1 PPP xmit, ifc = 0, len: 16 data: ff03c0210a01000c609b39f5015995a1 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff0380210202000a03060b0b0b0200000000000000000000000000000000 000000000000000000000000 Rcvd IP Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 03060b0b0b02 IPCP Option: Config IP, IP = 11.11.11.1 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210902000c59d9f6360159937b0000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Request, len is: 8 Pkt dump: 59d9f6360159937b Xmit Link Control Protocol pkt, Action code is: Echo Reply, len is: 8 Pkt dump: 609b39f50159937b PPP xmit, ifc = 0, len: 16 data: ff03c0210a02000c609b39f50159937b Xmit Link Control Protocol pkt, Action code is: Echo Request, len is: 4 Pkt dump: 609b39f5 PPP xmit, ifc = 0, len: 12 data: ff03c02109010008609b39f5 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210a01000859d9f636000000000000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: 59d9f636
使用 ppp ms-chap 命令进行身份验证时进行调试
配置 PPP MS-CHAP 身份验证时,此线路是您在 PIX 中需要做出的唯一更改(所有其余线路保持不变)。
vpdn group pppoex ppp authentication pap 命令更改为 vpdn group pppoex ppp authentication mschap。
对新的身份验证方法启用调试。
501(config)#debug ppp negotiation 501(config)#debug ppp io 501(config)#debug ppp upap 501(config)#debug ppp error 501(config)#debug ppp chap PPP virtual access open, ifc = 0 Xmit Link Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 05063ff50e18 LCP Option: MAGIC_NUMBER, len: 6, data: 3ff50e18 PPP xmit, ifc = 0, len: 14 data: ff03c0210101000a05063ff50e18 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c02101010013010405d40305c22380050659f4cf2500000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Config Request, len is: 15 Pkt dump: 010405d40305c22380050659f4cf25 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 5, data: c22380 LCP Option: MAGIC_NUMBER, len: 6, data: 59f4cf25 Xmit Link Control Protocol pkt, Action code is: Config ACK, len is: 15 Pkt dump: 010405d40305c22380050659f4cf25 LCP Option: Max_Rcv_Units, len: 4, data: 05d4 LCP Option: AUTHENTICATION_TYPES, len: 5, data: c22380 LCP Option: MAGIC_NUMBER, len: 6, data: 59f4cf25 PPP xmit, ifc = 0, len: 23 data: ff03c02102010013010405d40305c22380050659f4cf25 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210201000a05063ff50e1800000000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 05063ff50e18 LCP Option: MAGIC_NUMBER, len: 6, data: 3ff50e18 Xmit Link Control Protocol pkt, Action code is: Echo Request, len is: 4 Pkt dump: 3ff50e18 PPP xmit, ifc = 0, len: 12 data: ff03c021090000083ff50e18 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c2230103001508bfe11df6d8fb524333363430202020200000000000 000000000000000000000000 PPP chap receive challenge: rcvd a type MS-CHAP-V1 pkt PPP xmit, ifc = 0, len: 63 data: ff03c2230203003b31488506adb9ae0f4cac35866242b2bac2863870291e4a88e1458f0 12526048734778a210325619092d3f831c3bcf3eb7201636973636f PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210a00000859f4cf25000000000000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: 59f4cf25 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c2230303000400000000000000000000000000000000000000000000 000000000000000000000000 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff0380210101000a0306ac15301e00000000000000000000000000000000 000000000000000000000000 Rcvd IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 0306ac15301e IPCP Option: Config IP, IP = 172.21.48.30 Xmit IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 030600000000 IPCP Option: Config IP, IP = 0.0.0.0 PPP xmit, ifc = 0, len: 14 data: ff0380210101000a030600000000 Xmit IP Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 0306ac15301e IPCP Option: Config IP, IP = 172.21.48.30 PPP xmit, ifc = 0, len: 14 data: ff0380210201000a0306ac15301e PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff0380210301000a03060b0b0b0200000000000000000000000000000000 000000000000000000000000 Rcvd IP Control Protocol pkt, Action code is: Config NAK, len is: 6 Pkt dump: 03060b0b0b02 IPCP Option: Config IP, IP = 11.11.11.1 Xmit IP Control Protocol pkt, Action code is: Config Request, len is: 6 Pkt dump: 03060b0b0b02 IPCP Option: Config IP, IP = 11.11.11.1 PPP xmit, ifc = 0, len: 14 data: ff0380210102000a03060b0b0b02 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff0380210202000a03060b0b0b0200000000000000000000000000000000 000000000000000000000000 Rcvd IP Control Protocol pkt, Action code is: Config ACK, len is: 6 Pkt dump: 03060b0b0b02 IPCP Option: Config IP, IP = 11.11.11.1 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210901000c59f4cf2501592b7e0000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Request, len is: 8 Pkt dump: 59f4cf2501592b7e Xmit Link Control Protocol pkt, Action code is: Echo Reply, len is: 8 Pkt dump: 3ff50e1801592b7e PPP xmit, ifc = 0, len: 16 data: ff03c0210a01000c3ff50e1801592b7e Xmit Link Control Protocol pkt, Action code is: Echo Request, len is: 4 Pkt dump: 3ff50e18 PPP xmit, ifc = 0, len: 12 data: ff03c021090100083ff50e18 PPP rcvd, ifc = 0, pppdev: 1, len: 42, data: ff03c0210a01000859f4cf25000000000000000000000000000000000000 000000000000000000000000 Rcvd Link Control Protocol pkt, Action code is: Echo Reply, len is: 4 Pkt dump: 59f4cf25
如果已配置了默认路由,则 PIX 不会建立 PPPoE,因为 PIX 不能用 PPPoE 提供的默认路由改写现有的默认路由。如果希望从服务器(setroute选项)上使用默认路由,用户需要清除配置上的默认路由。
只能定义用户名和一个 PPPoE 服务器。
启用 PPPoE 和开放最短路径优先 (OSPF),并且在检索 IP 地址后执行 write memory 时,通过 PPPoE 或 DHCP 下载的默认路由将保存到配置。解决方法是先执行 write memory,然后再从 PPPoE 服务器下载地址。
用于生成默认路由的 PPPoE setroute 选项与 PIX 防火墙上的 OSPF 动态路由协议不兼容。在 OSPF 进程下配置“network”语句后,将从路由表中删除 PPPoE 生成的默认路由。解决方法是使用静态路由。