在大多數虛擬專用撥號網路(VPDN)場景中,客戶端撥打網路接入伺服器(NAS)。 然後NAS發起到家庭網關(HGW)的VPDN第2層隧道協定(L2TP)或第2層轉發(L2F)協定隧道。 這會在NAS(即L2TP訪問集中器(LAC)端點)和HGW(即L2TP網路伺服器(LNS)端點)之間建立VPDN連線。這意味著,只有NAS和HGW之間的鏈路使用L2TP ,而且該隧道不包括從客戶端PC到NAS的鏈路。但是,運行Windows 2000作業系統的PC客戶端現在能夠成為LAC並從PC通過NAS發起L2TP隧道並在HGW/LNS上終止。此組態範例顯示如何設定此類通道。
嘗試此設定之前,請確保符合以下要求:
熟悉VPDN
注意:本文檔中不包含NAS配置。
本文中的資訊係根據以下軟體和硬體版本:
LNS:執行Cisco IOS®軟體版本12.2(1)的Cisco 7200系列路由器
客戶端:帶數據機的Windows 2000 PC
本文中的資訊是根據特定實驗室環境內的裝置所建立。文中使用到的所有裝置皆從已清除(預設)的組態來啟動。如果您的網路正在作用,請確保您已瞭解任何指令可能造成的影響。
本文檔中包含的LNS的配置不是特定於平台的,可以應用於任何支援VPDN的路由器。
配置Windows 2000客戶端PC的過程僅適用於Windows 2000,不適用於任何其他作業系統。
如需文件慣例的詳細資訊,請參閱思科技術提示慣例。
如簡介中所述,在Windows 2000中,您可以從客戶端PC啟動L2TP隧道,並使該隧道在Internet服務提供商(ISP)網路中的任何位置終止。使用VPDN術語時,此設定稱為「客戶端啟動」隧道。由於客戶端啟動的隧道是由PC上的客戶端軟體啟動的隧道,因此PC將承擔LAC的角色。因為無論怎樣,使用者端都會使用點對點通訊協定(PPP)、詢問交握驗證通訊協定(CHAP)或密碼驗證通訊協定(PAP)進行驗證,所以通道本身不需要進行驗證。
使用客戶端啟動的隧道的優點和缺點
客戶端啟動的隧道既有優點,也有缺點,下面將概述其中一些優點:
優勢:
它保護從客戶端通過ISP共用網路和企業網路的整個連線。
它不需要在ISP網路上進行額外配置。如果沒有客戶端啟動的隧道,需要將ISP NAS或其Radius/TACACS+伺服器配置為啟動到HGW的隧道。因此,企業必須與許多ISP協商,以允許使用者通過其網路建立隧道。通過客戶端啟動的隧道,終端使用者可以連線到任何ISP,然後手動啟動通往企業網路的隧道。
缺點:
其可擴充性不如ISP發起的隧道。由於客戶端啟動的隧道為每個客戶端建立單個隧道,因此HGW必須單獨終止大量隧道。
使用者端必須管理用於啟動通道的使用者端軟體。這通常是企業支援相關問題的根源。
客戶端必須擁有一個ISP帳戶。由於客戶端發起的隧道只能在與ISP建立連線後建立,因此客戶端必須具有連線到ISP網路的帳戶。
工作原理
以下是本文範例的運作方式:
客戶端PC撥入NAS,使用客戶端的ISP帳戶進行身份驗證,然後從ISP獲取IP地址。
客戶端發起並建立到L2TP網路伺服器HGW(LNS)的L2TP隧道。 客戶端將重新協商IP控制協定(IPCP),並從LNS獲取新的IP地址。
建立兩個撥號網路(DUN)連線:
一個DUN連線,用於撥入ISP。請諮詢您的ISP以獲得有關此主題的詳細資訊。
L2TP隧道的另一個DUN連線。
要為L2TP建立和配置DUN連線,請在Windows 200客戶端PC上執行以下步驟:
從「開始」選單中選擇「設定」>「控制面板」>「網路和撥號連線」>「新建連線」。
使用嚮導建立名為L2TP的連線。確保在「Network Connection Type(網路連線型別)」視窗中選擇「Connect to a private network through the Internet(通過Internet連線到專用網路)」。還必須指定LNS/HGW的IP地址或名稱。
新連線(名稱為L2TP)將出現在「控制面板」下的「網路和撥號連線」視窗中。在此處,按一下右鍵可編輯屬性。
按一下Networking(網路)頁籤,確保我呼叫的伺服器類型設定為L2TP。
如果計畫從HGW通過本地池或DHCP為此客戶端分配動態內部(企業網路)地址,請選擇TCP/IP協議。確保將客戶端配置為自動獲取IP地址。您也可以自動發出網域命名系統(DNS)資訊。
Advanced按鈕允許您定義靜態Windows Internet命名服務(WINS)和DNS資訊。Options頁籤允許您關閉IPSec或為連線分配不同的策略。在Security頁籤下,可以定義使用者身份驗證引數。例如,PAP、CHAP或MS-CHAP或Windows域登入。有關應在客戶端上配置的引數的資訊,請諮詢網路系統管理員。
配置連線後,您可以按兩下連線以彈出登入螢幕,然後連線。
如果L2TP隧道使用IP安全(IPSec)和/或Microsoft點對點加密(MPPE),則必須在LNS/HGW上的虛擬模板配置下定義此命令。
ppp encrypt mppe 40
請記住,這需要加密的Cisco IOS軟體功能集(至少是IPSec功能集或帶3DES的IPSec)。
預設情況下,IPSec在Windows 2000上啟用。如果要禁用它,必須使用登錄檔編輯器修改Windows登錄檔:
警告:在修改登錄檔之前採取適當的預防措施(如備份登錄檔)。您還應參閱Microsoft網站瞭解修改登錄檔所需的正確步驟。
要將ProhibitIpSec登錄檔值新增到基於Windows 2000的電腦,請使用Regedt32.exe在登錄檔中查詢此項:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rasman\Parameters
將此登錄檔值新增到登錄檔項:
Value Name: ProhibitIpSec Data Type: REG_DWORD Value: 1
注意:要使更改生效,必須重新啟動基於Windows 2000的電腦。有關詳細資訊,請參閱這些Microsoft文章。
Q258261 — 禁用用於L2TP的IPSec策略
Q240262 — 如何使用預共用金鑰配置L2TP/IPSec連線
有關使用Windows 2000的更複雜的設定,請參閱使用Microsoft IAS為L2TP配置Cisco IOS和Windows 2000客戶端。
本節提供用於設定本文件中所述功能的資訊。
注意:要查詢有關本文檔中使用的命令的其他資訊,請使用命令查詢工具(僅限註冊客戶)。
以下網路圖顯示了客戶端PC、ISP NAS和企業HGW之間發生的各種協商。疑難排解一節中的偵錯範例也說明這些事務。
本檔案會使用以下設定:
fifi(VPDN LNS/HGW)
注意:僅包括LNS配置的相關部分。
fifi(VPDN LNS/HGW) |
---|
hostname fifi ! username l2tp-w2k password 0 ww !--- This is the password for the Windows 2000 client. !--- With AAA, the username and password can be offloaded to the external !--- AAA server. ! vpdn enable !--- Activates VPDN. ! vpdn-group l2tp-w2k !--- This is the default L2TP VPDN group. accept-dialin protocol l2tp !--- This allows L2TP on this VPDN group. virtual-template 1 !--- Use virtual-template 1 for the virtual-interface configuration. no l2tp tunnel authentication !--- The L2TP tunnel is not authenticated. !--- Tunnel authentication is not needed because the client will be !--- authenticated using PPP CHAP/PAP. Keep in mind that the client is the !--- only user of the tunnel, so client authentication is sufficient. ! interface loopback 0 ip address 1.1.1.1 255.255.255.255 ! interface Ethernet1/0 ip address 200.0.0.14 255.255.255.0 ip router isis duplex half tag-switching ip ! interface Virtual-Template1 !--- Virtual-Template interface specified in the vpdn-group configuration. ip unnumbered Loopback0 peer default ip address pool pptp !--- IP address for the client obtained from IP pool named pptp (defined below). ppp authentication chap ! ip local pool pptp 1.100.0.1 1.100.0.10 !--- This defines the "Internal" IP address pool (named pptp) for the client. ip route 199.0.0.0 255.255.255.0 200.0.0.45 |
本節提供的資訊可用於確認您的組態是否正常運作。
輸出直譯器工具(僅供註冊客戶使用)支援某些show命令,此工具可讓您檢視show命令輸出的分析。
show vpdn — 顯示有關活動L2x隧道和VPDN中消息識別符號的資訊。
show vpdn session window — 顯示VPDN會話視窗的資訊。
show user — 提供連線到路由器的所有使用者的綜合清單。
show caller user username detail — 顯示特定使用者的引數,例如鏈路控制協定(LCP)、NCP和IPCP狀態,以及分配的IP地址、PPP和PPP捆綁引數等。
show vpdn --------- L2TP Tunnel and Session Information Total tunnels 1 sessions 1 !--- Note that there is one tunnel and one session. LocID RemID Remote Name State Remote Address Port Sessions 25924 1 JVEYNE-W2K1.c est 199.0.0.8 1701 1 !--- This is the tunnel information. !--- The Remote Name shows the client PC's computer name, as well as the !--- IP address that was originally given to the client by the NAS. (This !--- address has since been renegotiated by the LNS.) LocID RemID TunID Intf Username State Last Chg Fastswitch 2 1 25924 Vi1 l2tp-w2k est 00:00:13 enabled !--- This is the session information. !--- The username the client used to authenticate is l2tp-w2k. %No active L2F tunnels %No active PPTP tunnels %No active PPPoE tunnels show vpdn session window -------------------- L2TP Session Information Total tunnels 1 sessions 1 LocID RemID TunID ZLB-tx ZLB-rx Rbit-tx Rbit-rx WSize MinWS Timeouts Qsize 2 1 25924 0 0 0 0 0 0 0 0 %No active L2F tunnels %No active PPTP tunnels %No active PPPoE tunnels show user ---------- Line User Host(s) Idle Location * 0 con 0 idle 00:00:00 Interface User Mode Idle Peer Address Vi1 l2tp-w2k Virtual PPP (L2TP ) 00:00:08 !--- User l2tp-w2k is connected on Virtual-Access Interface 1. !--- Also note that the connection is identified as an L2TP tunnel. show caller user l2tp-w2k detail -------------------------- User: l2tp-w2k, line Vi1, service PPP L2TP Active time 00:01:08, Idle time 00:00:00 Timeouts: Absolute Idle Limits: - - Disconnect in: - - PPP: LCP Open, CHAP (<- local), IPCP !--- The LCP state is Open. LCP: -> peer, AuthProto, MagicNumber <- peer, MagicNumber, EndpointDisc NCP: Open IPCP !--- The IPCP state is Open. IPCP: <- peer, Address -> peer, Address IP: Local 1.1.1.1, remote 1.100.0.2 !--- The IP address assigned to the client is 1.100.0.2 (from the IP pool !--- on the LNS). VPDN: NAS , MID 2, MID Unknown HGW , NAS CLID 0, HGW CLID 0, tunnel open !--- The VPDN tunnel is open. Counts: 48 packets input, 3414 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 20 packets output, 565 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets
本節提供的資訊可用於對組態進行疑難排解。
輸出直譯器工具(僅供註冊客戶使用)支援某些show命令,此工具可讓您檢視show命令輸出的分析。
注意:發出debug命令之前,請參閱有關Debug命令的重要資訊。
debug ppp negotiation — 在協商PPP元件(包括LCP、身份驗證和NCP)時顯示有關PPP流量和交換的資訊。成功的PPP協商首先開啟LCP狀態,然後進行身份驗證,最後協商NCP(通常是IPCP)。
debug vpdn event — 顯示有關屬於正常隧道建立或關閉的事件的消息。
debug vpdn error — 顯示阻止建立隧道的錯誤或導致關閉已建立隧道的錯誤。
debug vpdn l2x-event — 顯示有關作為L2x正常隧道建立或關閉一部分的事件的消息。
debug vpdn l2x-error — 顯示阻止L2x建立或阻止其正常操作的L2x協定錯誤。
註:為了列印目的,其中某些調試輸出行被分成多行。
在LNS上啟用上面指定的debug命令,並從Windows 2000客戶端PC發起呼叫。這裡的調試顯示了來自客戶端的隧道請求、隧道的建立、客戶端的身份驗證以及IP地址的重新協商:
LNS: Incoming session from PC Win2K : ===================================== *Jun 6 04:02:05.174: L2TP: I SCCRQ from JVEYNE-W2K1.cisco.com tnl 1 !--- This is the incoming tunnel initiation request from the client PC. *Jun 6 04:02:05.178: Tnl 25924 L2TP: New tunnel created for remote JVEYNE-W2K1.cisco.com, address 199.0.0.8 !--- The tunnel is created. Note that the client IP address is the one !--- assigned by the NAS. !--- This IP address will be renegotiatied later. *Jun 6 04:02:05.178: Tnl 25924 L2TP: O SCCRP to JVEYNE-W2K1.cisco.com tnlid 1 *Jun 6 04:02:05.178: Tnl 25924 L2TP: Tunnel state change from idle to wait-ctl-reply *Jun 6 04:02:05.346: Tnl 25924 L2TP: I SCCCN from JVEYNE-W2K1.cisco.com tnl 1 *Jun 6 04:02:05.346: Tnl 25924 L2TP: Tunnel state change from wait-ctl-reply to established !--- The tunnel is now established. *Jun 6 04:02:05.346: Tnl 25924 L2TP: SM State established *Jun 6 04:02:05.358: Tnl 25924 L2TP: I ICRQ from JVEYNE-W2K1.cisco.com tnl 1 *Jun 6 04:02:05.358: Tnl/Cl 25924/2 L2TP: Session FS enabled *Jun 6 04:02:05.358: Tnl/Cl 25924/2 L2TP: Session state change from idle to wait-connect *Jun 6 04:02:05.358: Tnl/Cl 25924/2 L2TP: New session created *Jun 6 04:02:05.358: Tnl/Cl 25924/2 L2TP: O ICRP to JVEYNE-W2K1.cisco.com 1/1 *Jun 6 04:02:05.514: Tnl/Cl 25924/2 L2TP: I ICCN from JVEYNE-W2K1.cisco.com tnl 1, cl 1 !--- The LNS receives ICCN (Incoming Call coNnected). The VPDN session is up, then !--- the LNS receives the LCP layer along with the username and CHAP password !--- of the client. A virtual-access will be cloned from the virtual-template 1. *Jun 6 04:02:05.514: Tnl/Cl 25924/2 L2TP: Session state change from wait-connect to established !--- A VPDN session is being established within the tunnel. *Jun 6 04:02:05.514: Vi1 VPDN: Virtual interface created for *Jun 6 04:02:05.514: Vi1 PPP: Phase is DOWN, Setup [0 sess, 0 load] *Jun 6 04:02:05.514: Vi1 VPDN: Clone from Vtemplate 1 filterPPP=0 blocking *Jun 6 04:02:05.566: Tnl/Cl 25924/2 L2TP: Session with no hwidb *Jun 6 04:02:05.570: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up *Jun 6 04:02:05.570: Vi1 PPP: Using set call direction *Jun 6 04:02:05.570: Vi1 PPP: Treating connection as a callin *Jun 6 04:02:05.570: Vi1 PPP: Phase is ESTABLISHING, Passive Open [0 sess, 0 load] *Jun 6 04:02:05.570: Vi1 LCP: State is Listen *Jun 6 04:02:05.570: Vi1 VPDN: Bind interface direction=2 *Jun 6 04:02:07.546: Vi1 LCP: I CONFREQ [Listen] id 1 len 44 !--- LCP negotiation begins. *Jun 6 04:02:07.546: Vi1 LCP: MagicNumber 0x21A20F49 (0x050621A20F49) *Jun 6 04:02:07.546: Vi1 LCP: PFC (0x0702) *Jun 6 04:02:07.546: Vi1 LCP: ACFC (0x0802) *Jun 6 04:02:07.546: Vi1 LCP: Callback 6 (0x0D0306) *Jun 6 04:02:07.546: Vi1 LCP: MRRU 1614 (0x1104064E) *Jun 6 04:02:07.546: Vi1 LCP: EndpointDisc 1 Local *Jun 6 04:02:07.546: Vi1 LCP: (0x131701708695CDF2C64730B5B6756CE8) *Jun 6 04:02:07.546: Vi1 LCP: (0xB1AB1600000001) *Jun 6 04:02:07.550: Vi1 LCP: O CONFREQ [Listen] id 1 len 19 *Jun 6 04:02:07.550: Vi1 LCP: MRU 1460 (0x010405B4) *Jun 6 04:02:07.550: Vi1 LCP: AuthProto CHAP (0x0305C22305) *Jun 6 04:02:07.550: Vi1 LCP: MagicNumber 0xFA95EEC3 (0x0506FA95EEC3) *Jun 6 04:02:07.550: Vi1 LCP: O CONFREJ [Listen] id 1 len 11 *Jun 6 04:02:07.550: Vi1 LCP: Callback 6 (0x0D0306) *Jun 6 04:02:07.550: Vi1 LCP: MRRU 1614 (0x1104064E) *Jun 6 04:02:07.710: Vi1 LCP: I CONFNAK [REQsent] id 1 len 8 *Jun 6 04:02:07.710: Vi1 LCP: MRU 1514 (0x010405EA) *Jun 6 04:02:07.710: Vi1 LCP: O CONFREQ [REQsent] id 2 len 15 *Jun 6 04:02:07.710: Vi1 LCP: AuthProto CHAP (0x0305C22305) *Jun 6 04:02:07.710: Vi1 LCP: MagicNumber 0xFA95EEC3 (0x0506FA95EEC3) *Jun 6 04:02:07.718: Vi1 LCP: I CONFREQ [REQsent] id 2 len 37 *Jun 6 04:02:07.718: Vi1 LCP: MagicNumber 0x21A20F49 (0x050621A20F49) *Jun 6 04:02:07.718: Vi1 LCP: PFC (0x0702) *Jun 6 04:02:07.718: Vi1 LCP: ACFC (0x0802) *Jun 6 04:02:07.718: Vi1 LCP: EndpointDisc 1 Local *Jun 6 04:02:07.718: Vi1 LCP: (0x131701708695CDF2C64730B5B6756CE8) *Jun 6 04:02:07.718: Vi1 LCP: (0xB1AB1600000001) *Jun 6 04:02:07.718: Vi1 LCP: O CONFACK [REQsent] id 2 len 37 *Jun 6 04:02:07.718: Vi1 LCP: MagicNumber 0x21A20F49 (0x050621A20F49) *Jun 6 04:02:07.718: Vi1 LCP: PFC (0x0702) *Jun 6 04:02:07.718: Vi1 LCP: ACFC (0x0802) *Jun 6 04:02:07.718: Vi1 LCP: EndpointDisc 1 Local *Jun 6 04:02:07.718: Vi1 LCP: (0x131701708695CDF2C64730B5B6756CE8) *Jun 6 04:02:07.718: Vi1 LCP: (0xB1AB1600000001) *Jun 6 04:02:07.858: Vi1 LCP: I CONFACK [ACKsent] id 2 len 15 *Jun 6 04:02:07.858: Vi1 LCP: AuthProto CHAP (0x0305C22305) *Jun 6 04:02:07.858: Vi1 LCP: MagicNumber 0xFA95EEC3 (0x0506FA95EEC3) *Jun 6 04:02:07.858: Vi1 LCP: State is Open !--- LCP negotiation is complete. *Jun 6 04:02:07.858: Vi1 PPP: Phase is AUTHENTICATING, by this end [0 sess, 0 load] *Jun 6 04:02:07.858: Vi1 CHAP: O CHALLENGE id 5 len 25 from "fifi" *Jun 6 04:02:07.870: Vi1 LCP: I IDENTIFY [Open] id 3 len 18 magic 0x21A20F49 MSRASV5.00 *Jun 6 04:02:07.874: Vi1 LCP: I IDENTIFY [Open] id 4 len 27 magic 0x21A20F49 MSRAS-1-JVEYNE-W2K1 *Jun 6 04:02:08.018: Vi1 CHAP: I RESPONSE id 5 len 29 from "l2tp-w2k" *Jun 6 04:02:08.018: Vi1 CHAP: O SUCCESS id 5 len 4 !--- CHAP authentication is successful. If authentication fails, check the !--- username and password on the LNS. *Jun 6 04:02:08.018: Vi1 PPP: Phase is UP [0 sess, 0 load] *Jun 6 04:02:08.018: Vi1 IPCP: O CONFREQ [Closed] id 1 len 10 *Jun 6 04:02:08.018: Vi1 IPCP: Address 1.1.1.1 (0x030601010101) *Jun 6 04:02:08.158: Vi1 CCP: I CONFREQ [Not negotiated] id 5 len 10 *Jun 6 04:02:08.158: Vi1 CCP: MS-PPC supported bits 0x01000001 (0x120601000001) *Jun 6 04:02:08.158: Vi1 LCP: O PROTREJ [Open] id 3 len 16 protocol CCP (0x80FD0105000A120601000001) *Jun 6 04:02:08.170: Vi1 IPCP: I CONFREQ [REQsent] id 6 len 34 *Jun 6 04:02:08.170: Vi1 IPCP: Address 0.0.0.0 (0x030600000000) *Jun 6 04:02:08.170: Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000) *Jun 6 04:02:08.170: Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000) *Jun 6 04:02:08.170: Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000) *Jun 6 04:02:08.170: Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000) *Jun 6 04:02:08.170: Vi1 IPCP: Pool returned 1.100.0.2 !--- This is the new "Internal" IP address for the client returned by the !--- LNS IP address pool. *Jun 6 04:02:08.170: Vi1 IPCP: O CONFREJ [REQsent] id 6 Len 28 *Jun 6 04:02:08.170: Vi1 IPCP: PrimaryDNS 0.0.0.0 (0x810600000000) *Jun 6 04:02:08.170: Vi1 IPCP: PrimaryWINS 0.0.0.0 (0x820600000000) *Jun 6 04:02:08.170: Vi1 IPCP: SecondaryDNS 0.0.0.0 (0x830600000000) *Jun 6 04:02:08.170: Vi1 IPCP: SecondaryWINS 0.0.0.0 (0x840600000000) *Jun 6 04:02:08.174: Vi1 IPCP: I CONFACK [REQsent] id 1 Len 10 *Jun 6 04:02:08.174: Vi1 IPCP: Address 1.1.1.1 (0x030601010101) *Jun 6 04:02:08.326: Vi1 IPCP: I CONFREQ [ACKrcvd] id 7 Len 10 *Jun 6 04:02:08.326: Vi1 IPCP: Address 0.0.0.0 (0x030600000000) *Jun 6 04:02:08.326: Vi1 IPCP: O CONFNAK [ACKrcvd] id 7 Len 10 *Jun 6 04:02:08.330: Vi1 IPCP: Address 1.100.0.2 (0x030601640002) *Jun 6 04:02:08.486: Vi1 IPCP: I CONFREQ [ACKrcvd] id 8 Len 10 *Jun 6 04:02:08.486: Vi1 IPCP: Address 1.100.0.2 (0x030601640002) *Jun 6 04:02:08.486: Vi1 IPCP: O CONFACK [ACKrcvd] id 8 Len 10 *Jun 6 04:02:08.490: Vi1 IPCP: Address 1.100.0.2 (0x030601640002) *Jun 6 04:02:08.490: Vi1 IPCP: State is Open *Jun 6 04:02:08.490: Vi1 IPCP: Install route to 1.100.0.2 *Jun 6 04:02:09.018: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up !--- The interface is up.
LNS上的此調試輸出顯示Windows 2000客戶端斷開呼叫連線。請注意LNS識別斷開連線並執行隧道完全關閉的各種消息:
*Jun 6 04:03:25.174: Vi1 LCP: I TERMREQ [Open] id 9 Len 16 (0x21A20F49003CCD7400000000) !--- This is the incoming session termination request. This means that the client !--- disconnected the call. *Jun 6 04:03:25.174: Vi1 LCP: O TERMACK [Open] id 9 Len 4 *Jun 6 04:03:25.354: Vi1 Tnl/Cl 25924/2 L2TP: I CDN from JVEYNE-W2K1.cisco.com tnl 1, CL 1 *Jun 6 04:03:25.354: Vi1 Tnl/CL 25924/2 L2TP: Destroying session *Jun 6 04:03:25.358: Vi1 Tnl/CL 25924/2 L2TP: Session state change from established to idle *Jun 6 04:03:25.358: Vi1 Tnl/CL 25924/2 L2TP: Releasing idb for LAC/LNS tunnel 25924/1 session 2 state idle *Jun 6 04:03:25.358: Vi1 VPDN: Reset *Jun 6 04:03:25.358: Tnl 25924 L2TP: Tunnel state change from established to no-sessions-left *Jun 6 04:03:25.358: Tnl 25924 L2TP: No more sessions in tunnel, shutdown (likely) in 10 seconds !--- Because there are no more calls in the tunnel, it will be shut down. *Jun 6 04:03:25.362: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to down *Jun 6 04:03:25.362: Vi1 LCP: State is Closed *Jun 6 04:03:25.362: Vi1 IPCP: State is Closed *Jun 6 04:03:25.362: Vi1 PPP: Phase is DOWN [0 sess, 0 load] *Jun 6 04:03:25.362: Vi1 VPDN: Cleanup *Jun 6 04:03:25.362: Vi1 VPDN: Reset *Jun 6 04:03:25.362: Vi1 VPDN: Unbind interface *Jun 6 04:03:25.362: Vi1 VPDN: Unbind interface *Jun 6 04:03:25.362: Vi1 VPDN: Reset *Jun 6 04:03:25.362: Vi1 VPDN: Unbind interface *Jun 6 04:03:25.362: Vi1 IPCP: Remove route to 1.100.0.2 *Jun 6 04:03:25.514: Tnl 25924 L2TP: I StopCCN from JVEYNE-W2K1.cisco.com tnl 1 *Jun 6 04:03:25.514: Tnl 25924 L2TP: Shutdown tunnel !--- The tunnel is shut down. *Jun 6 04:03:25.514: Tnl 25924 L2TP: Tunnel state change from no-sessions-left to idle *Jun 6 04:03:26.362: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to down
修訂 | 發佈日期 | 意見 |
---|---|---|
1.0 |
04-Feb-2010 |
初始版本 |