Table of Contents 1 L2TP Configuration Commands 1-1

Size: px
Start display at page:

Download "Table of Contents 1 L2TP Configuration Commands 1-1"

Transcription

1 Table of Contents 1 L2TP Configuration Commands 1-1 L2TP Configuration Commands 1-1 allow l2tp 1-1 display l2tp session 1-2 display l2tp tunnel 1-3 interface virtual-template 1-3 l2tp enable 1-4 l2tp sendaccm enable 1-5 l2tpmoreexam enable 1-5 l2tp-auto-client enable 1-6 l2tp-group 1-6 mandatory-chap 1-7 mandatory-lcp 1-7 reset l2tp tunnel 1-8 start l2tp 1-9 tunnel authentication 1-9 tunnel avp-hidden 1-10 tunnel flow-control 1-11 tunnel name 1-11 tunnel password 1-12 tunnel timer hello 1-12 i

2 1 L2TP Configuration Commands L2TP Configuration Commands allow l2tp allow l2tp virtual-template virtual-template-number remote remote-name [ domain domain-name ] undo allow virtual-template-number: Number of the virtual template interface for creating a virtual access (VA) interface, in the range of 0 to remote-name: Name of the tunnel peer initiating a connection request, a case sensitive string of 1 to 30 characters. domain-name: Name of the domain initiating a connection request, a case insensitive string of 1 to 30 characters. Use the allow l2tp command to specify the virtual template interface for receiving calls, the tunnel name on the LAC, and the domain name. Use the undo allow command to remove the configuration. By default, an LNS denies all incoming calls. The domain domain-name combination is required in L2TP multi-instance applications. The remote remote-name combination is optional for L2TP group 1, the default L2TP group. In other words, for L2TP group 1, the syntax of the command is allow l2tp virtual-template virtual-template-number [ remote remote-name ] [ domain domain-name ]. A peer with any name can initiate a tunneling request. If you specify the remote remote-name combination for L2TP group 1, L2TP group 1 will not serve as the default L2TP group. In Windows 2000 beta 2, if the local end name for the VPN connection is null, the peer name received by the device is null, too. You can configure a default L2TP group to test the connectivity and receive the tunneling request initiated by such an unknown remote end. The allow l2tp command is available for only LNSs. If the tunnel name on the LAC is specified, ensure that it is the same as the tunnel name configured on the LAC. Related commands: l2tp-group. 1-1

3 # Accept the L2TP tunneling request initiated by the peer (LAC) of aaa and create a virtual access interface according to virtual template 1. [Sysname] l2tp-group 2 [Sysname-l2tp2] allow l2tp virtual-template 1 remote aaa # Specify L2TP group 1 as the default L2TP group, accept the L2TP tunneling request initiated by any peer, and create a virtual access interface based on virtual template 1. [Sysname-l2tp1] allow l2tp virtual-template 1 display l2tp session display l2tp session Any view 1: Monitor level Use the display l2tp session command to display information about L2TP sessions. Related commands: display l2tp tunnel. # Display information about L2TP sessions. <Sysname> display l2tp session Total session = 1 LocalSID RemoteSID LocalTID Table 1-1 display l2tp session command output description Field Total session LocalSID RemoteSID LocalTID Number of active sessions Unique ID of the session at the local end Unique ID of the session at the remote end Unique ID of the tunnel at the local end 1-2

4 display l2tp tunnel display l2tp tunnel Any view 1: Monitor level Use the display l2tp tunnel command to display information about L2TP tunnels. # Display information about L2TP tunnels. <Sysname> display l2tp tunnel Total tunnel = 1 LocalTID RemoteTID RemoteAddress Port Sessions RemoteName lns Table 1-2 display l2tp tunnel command output description Field Total tunnel LocalTID RemoteTID RemoteAddress Port Sessions RemoteName Number of active tunnels Unique ID of the tunnel at the local end Unique ID of the tunnel at the remote end IP address of the peer Port number of the peer Number of sessions within the tunnel Name of the tunnel at the peer interface virtual-template interface virtual-template virtual-template-number undo interface virtual-template virtual-template-number System view 1-3

5 virtual-template-number: Serial number for identifying the virtual template interface, in the range of 0 to Use the interface virtual-template command to create a virtual template interface and enter its view. Use the undo interface virtual-template command to remove a virtual template interface. By default, no virtual template interface exists. A virtual template interface is intended to provide parameters for virtual access interfaces to be dynamically created by the device, such as logical MP interfaces and logical L2TP interfaces. Related commands: allow l2tp. # Create virtual template interface 1 and enter virtual template interface view. [Sysname] interface virtual-template 1 [Sysname-Virtual-Template1] l2tp enable l2tp enable undo l2tp enable System view Use the l2tp enable command to enable the L2TP function. Use the undo l2tp enable command to disable the L2TP function. By default, the L2TP function is disabled. L2TP must be enabled for relevant L2TP configurations to take effect. Related commands: l2tp-group. # Enable the L2TP function. [Sysname] l2tp enable 1-4

6 l2tp sendaccm enable l2tp sendaccm enable undo l2tp sendaccm enable System view Use the l2tp sendaccm enable command to enable an LNS to send ACCM. Use the undo l2tp sendaccm enable command to disable an LNS from sending ACCM. By default, an LNS sends ACCM. # Disable the ACCM sending function. [Sysname] undo l2tp sendaccm enable l2tpmoreexam enable l2tpmoreexam enable undo l2tpmoreexam enable System view Use the l2tpmoreexam enable command to enable the L2TP multi-instance function. Use the undo l2tpmoreexam enable command to disable the L2TP multi-instance function. By default, the L2TP multi-instance function is disabled. This command is available for only LNSs. Related commands: l2tp enable. # Enable the L2TP multi-instance function for the LNS. 1-5

7 [Sysname] l2tpmoreexam enable l2tp-auto-client enable l2tp-auto-client enable undo l2tp-auto-client enable Virtual template interface view Use the l2tp-auto-client enable command to trigger an LAC to establish an L2TP tunnel. Use the undo l2tp-auto-client enable command to remove the established L2TP tunnel. By default, an LAC does not establish an L2TP tunnel. # Trigger the LAC to establish an L2TP tunnel. [Sysname] interface virtual-template 1 [Sysname-Virtual-Template1] l2tp-auto-client enable l2tp-group l2tp-group group-number undo l2tp-group group-number System view group-number: Number for identifying the L2TP group, in the range of 1 to Use the l2tp-group command to create an L2TP group and enter its view. Use the undo l2tp-group command to remove an L2TP group. By default, no L2TP group exists. When you use the undo l2tp-group command to remove an L2TP group, all configuration information associated with the group will be deleted. 1-6

8 Related commands: allow l2tp, start l2tp. # Create an L2TP group numbered 2 and enter its view. [Sysname] l2tp-group 2 [Sysname-l2tp2] mandatory-chap mandatory-chap undo mandatory-chap Use the mandatory-chap command to force the LNS to perform a CHAP authentication of the user. Use the undo mandatory-chap command to disable CHAP authentication on the LNS. By default, an LNS does not perform CHAP authentication of users. An LNS authenticates the client in addition to the proxy authentication that occurs at the LAC for higher security. If the mandatory-chap command is used, two authentications are performed for the clients connected to the VPN through an NAS-initialized tunnel: one on the NAS side and the other on the LNS side. Some PPP clients may not support the second authentication. In this case, the LNS-side CHAP authentication will fail. Related commands: mandatory-lcp. # Perform CHAP authentication by force. [Sysname-l2tp1] mandatory-chap mandatory-lcp mandatory-lcp undo mandatory-lcp 1-7

9 Use the mandatory-lcp command to force an LNS to perform LCP negotiation with users. Use the undo mandatory-lcp command to disable the LCP negotiation. By default, an LNS does not perform LCP negotiation with users. When starting a PPP session, a client of NAS-initialized VPN will first negotiate with the network access server (NAS) for LCP parameters. If the negotiation succeeds, the NAS initializes a tunnel and then transfers the negotiated results to the LNS. Then the LNS verifies whether the client is valid depending on the proxy authentication information. You can use the mandatory-lcp command to force the LNS to perform LCP re-negotiation for the client. In this case, the proxy authentication information of the NAS will be neglected. Some PPP clients may not support LCP re-negotiation. In this case, the LCP re-negotiation will fail. Related commands: mandatory-chap. # Perform LCP negotiation by force. [Sysname-l2tp1] mandatory-lcp reset l2tp tunnel reset l2tp tunnel { id tunnel-id name remote-name } User view tunnel-id: Local ID of the tunnel, in the range of 1 to remote-name: Name of the tunnel at the remote end, a case sensitive string of 1 to 30 characters. Use the reset l2tp tunnel command to disconnect one or more specified tunnels and all sessions of the tunnels. A tunnel disconnected by force can be re-established when a client makes a call. If you specify a tunnel name, all tunnels with the name will be disconnected. If no tunnel with the name exists, nothing happens. If you specify a tunnel ID, only the tunnel with the ID is disconnected. Related commands: display l2tp tunnel. 1-8

10 # Disconnect all tunnels with the remote name of aaa. <Sysname> reset l2tp tunnel name aaa start l2tp start l2tp { ip ip-address }&<1-5> { domain domain-name fullusername user-name } undo start { ip ip-address }&<1-5>: IP addresses of the tunnel peers (LNSs). &<1-5> means that you can specify up to five IP addresses. domain-name: Name of the domain initiating a connection request, a case insensitive string of 1 to 30 characters. user-name: Fully qualified name of the user initiating a connection request, a case sensitive string of 1 to 32 characters. Use the start l2tp command to enable the device to initiate tunneling requests to one or more IP addresses for one or more specified VPN users. Use the undo start to remove the configuration. The start l2tp command is available for only LACs. An LAC can initiate tunneling requests for users in a specified domain. For example, if the domain name of a company is aabbcc.net, users with such a domain name are considered VPN users. You can specify a single VPN user by giving the fully qualified name of the user. When an LAC detects a VPN user, it initiates an L2TP tunneling request to LNSs one by one in their configuration order until it receives the acknowledgement of an LNS, which is considered the tunnel peer. # Initiate L2TP tunneling requests to LNS for users in domain aabbcc.net. [Sysname-l2tp1] start l2tp ip domain aabbcc.net tunnel authentication tunnel authentication undo tunnel authentication 1-9

11 Use the tunnel authentication command to enable the L2TP tunnel authentication function. Use the undo tunnel authentication command to disable the L2TP tunnel authentication function. By default, L2TP tunnel authentication is enabled. Generally, authentication is required at both ends of a tunnel for the sake of security. However, you can disable the authentication when you check network connectivity or it is required to receive tunneling requests from unknown tunnel peers. # Disable L2TP tunnel authentication. [Sysname-l2tp1] undo tunnel authentication tunnel avp-hidden tunnel avp-hidden undo tunnel avp-hidden Use the tunnel avp-hidden command to specify to transfer attribute value pair (AVP) data in hidden mode. Use the undo tunnel avp-hidden command to restore the default. By default, AVP data is transferred over the tunnel in plain text mode. The tunnel avp-hidden command is available for only LACs. # Transfer AVP data in hidden mode. 1-10

12 [Sysname-l2tp1] tunnel avp-hidden tunnel flow-control tunnel flow-control undo tunnel flow-control Use the tunnel flow-control command to enable the L2TP tunnel flow control function. Use the undo tunnel flow-control command to disable the L2TP tunnel flow control function. By default, the L2TP tunnel flow control function is disabled. # Enable the L2TP tunnel flow control function. [Sysname-l2tp1] tunnel flow-control tunnel name tunnel name name undo tunnel name name: Name for the tunnel at the local end, a case sensitive string of 1 to 30 characters. Use the tunnel name command to specify the name of a tunnel at the local end. Use the undo tunnel name command to restore the default. By default, a tunnel takes the system name of the device as its name at the local end. Related commands: sysname in Basic System Configuration Commands of the System Volume. 1-11

13 # Specify the local name for a tunnel as itsme. [Sysname-l2tp1] tunnel name itsme tunnel password tunnel password { cipher simple } password undo tunnel password cipher: Displays the password in cipher text. simple: Displays the password in plain text. password: Password for tunnel authentication, case sensitive. If you specify the cipher keyword, you can enter a password in either plain text or cipher text. If you specify the simple keyword, you can enter a password only in plain text. A plain text password is a string of 1 to 16 characters, for example, aabbcc. A cipher text password consists of 24 characters, for example, _(TT8F)Y\5SQ=^Q`MAF4<1!!. Use the tunnel password command to specify the password for tunnel authentication. Use the undo tunnel password command to remove the configuration. By default, the password for tunnel authentication is null. # Set the password for tunnel authentication to yougotit, specifying to display the password in cipher text. [Sysname-l2tp1] tunnel password cipher yougotit tunnel timer hello tunnel timer hello hello-interval undo tunnel timer hello 1-12

14 hello-interval: Interval at which the LAC or the LNS sends Hello packets when receiving no packets, in the range of 60 to 1,000 seconds. Use the tunnel timer hello command to set the hello interval in sending hello packets in a tunnel. Use the undo tunnel timer hello command to restore the default. By default, the interval is 60 seconds. You can set different hello intervals for the LNS and LAC. # Set the hello interval to 99 seconds. [Sysname-l2tp1] tunnel timer hello

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

PPP configuration commands

PPP configuration commands Contents PPP configuration commands 1 ip address ppp-negotiate 1 ip pool 1 link-protocol ppp 2 ppp authentication-mode 2 ppp chap password 4 ppp chap user 5 ppp ipcp remote-address forced 5 ppp pap local-user

More information

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1 Table of Contents 1 PPP Configuration Commands 1-1 PPP Configuration Commands 1-1 ip address ppp-negotiate 1-1 link-protocol ppp 1-2 mtu 1-2 ppp account-statistics enable 1-3 ppp authentication-mode 1-3

More information

HP VSR1000 Virtual Services Router

HP VSR1000 Virtual Services Router HP VSR1000 Virtual Services Router Layer 2 - WAN Access Configuration Guide Part number: 5998-6023 Software version: VSR1000_HP-CMW710-R0202-X64 Document version: 6W100-20140418 Legal and notice information

More information

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5)

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced

More information

H3C MSR Series Routers

H3C MSR Series Routers H3C MSR Series Routers Layer 2 - WAN Command Reference(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320 Copyright 2014, Hangzhou

More information

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7) HP MSR Router Series Layer 2 - WAN Access Configuration Guide(V7) Part number: 5998-6465 Software version: CMW710-R0106 Document version: 6PW101-20140807 Legal and notice information Copyright 2014 Hewlett-Packard

More information

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7) HP MSR Router Series Layer 2 - WAN Access Configuration Guide(V7) Part number: 5998-7721b Software version: CMW710-R0304 Document version: 6PW104-20150914 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HPE FlexNetwork MSR Router Series

HPE FlexNetwork MSR Router Series HPE FlexNetwork MSR Router Series Comware 7 Layer 2 - WAN Access Configuration Guides Part number: 5998-8783 Software version: CMW710-E0407 Document version: 6W100-20160526 Copyright 2016 Hewlett Packard

More information

HP A-MSR Router Series Layer 2 - WAN. Command Reference. Abstract

HP A-MSR Router Series Layer 2 - WAN. Command Reference. Abstract HP A-MSR Router Series Layer 2 - WAN Command Reference Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended for network

More information

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values RADIUS s and RADIUS Disconnect-Cause Values The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network access server

More information

thus, the newly created attribute is accepted if the user accepts attribute 26.

thus, the newly created attribute is accepted if the user accepts attribute 26. Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

RADIUS Attributes. RADIUS IETF Attributes

RADIUS Attributes. RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

H3C SR6602-X Routers. Comware 7 Layer 2 WAN Access. Command Reference. Hangzhou H3C Technologies Co., Ltd.

H3C SR6602-X Routers. Comware 7 Layer 2 WAN Access. Command Reference. Hangzhou H3C Technologies Co., Ltd. H3C SR6602-X Routers Comware 7 Layer 2 WAN Access Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR6602X-CMW710-R7607 Document version: 20170401-6W100 Copyright

More information

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values First Published: September 23, 2005 Last Updated: August 18, 2010 The Internet Engineering Task Force (IETF) draft standard

More information

H3C WA Series WLAN Access Points. Layer 2 WAN Command Reference. Hangzhou H3C Technologies Co., Ltd.

H3C WA Series WLAN Access Points. Layer 2 WAN Command Reference. Hangzhou H3C Technologies Co., Ltd. H3C WA Series WLAN Access Points Layer 2 WAN Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 6W100-20100910 Copyright 2010, Hangzhou H3C Technologies Co., Ltd.

More information

thus, the newly created attribute is accepted if the user accepts attribute 26.

thus, the newly created attribute is accepted if the user accepts attribute 26. Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

L2TP Network Server. LNS Service Operation

L2TP Network Server. LNS Service Operation This chapter describes the support for Layer 2 Tunneling Protocol (L2TP) Network Server (LNS) functionality on Cisco ASR 5500 chassis and explains how it is configured. The product Administration Guides

More information

PPP Configuration Options

PPP Configuration Options PPP Configuration Options 1 PPP Configuration Options PPP can be configured to support various functions including: Authentication using either PAP or CHAP Compression using either Stacker or Predictor

More information

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1 Table of Contents 1 802.1x Configuration 1-1 Introduction to 802.1x 1-1 Architecture of 802.1x Authentication 1-1 The Mechanism of an 802.1x Authentication System 1-3 Encapsulation of EAPoL Messages 1-3

More information

H3C MSR Router Series

H3C MSR Router Series H3C MSR Router Series Comware 7 Layer 2 - WAN Access Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0615P08 Document version: 6W201-20180803 Copyright

More information

Configuring Client-Initiated Dial-In VPDN Tunneling

Configuring Client-Initiated Dial-In VPDN Tunneling Configuring Client-Initiated Dial-In VPDN Tunneling Client-initiated dial-in virtual private dialup networking (VPDN) tunneling deployments allow remote users to access a private network over a shared

More information

Loopback detection configuration commands

Loopback detection configuration commands Contents Loopback detection configuration commands 1 display loopback-detection 1 loopback-detection action 2 loopback-detection enable 2 loopback-detection interval-time 3 i Loopback detection configuration

More information

L2TP Access Concentrator

L2TP Access Concentrator This chapter describes the Layer 2 Tunneling Protocol (L2TP) Access Concentrator (LAC) functionality support on Cisco ASR 5x00 chassis and explains how it is configured. The product Administration Guides

More information

Configuring L2TP over IPsec

Configuring L2TP over IPsec CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over

More information

RADIUS Tunnel Attribute Extensions

RADIUS Tunnel Attribute Extensions The feature allows a name to be specified (other than the default) for the tunnel initiator and the tunnel terminator in order to establish a higher level of security when setting up VPN tunneling. Finding

More information

QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T

QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T QoS: Classification, Policing, and Marking on LAC Configuration Guide, Cisco IOS Release 12.4T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 802.1x Configuration... 1-1 1.1 802.1x Overview... 1-1 1.1.1 802.1x Standard Overview... 1-1 1.1.2 802.1x System Architecture... 1-1 1.1.3 802.1x Authentication

More information

Per VRF AAA. Finding Feature Information. Last Updated: January 18, 2012

Per VRF AAA. Finding Feature Information. Last Updated: January 18, 2012 Per VRF AAA Last Updated: January 18, 2012 The Per VRF AAA feature allows ISPs to partition authentication, authorization, and accounting (AAA) services on the basis of Virtual Private Network (VPN) routing

More information

Command Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Command Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 Static Routing Configuration Commands... 1-1 1.1 Static Routing Configuration Commands... 1-1 1.1.1 delete static-routes all... 1-1 1.1.2 ip route-static...

More information

Controlled/uncontrolled port and port authorization status

Controlled/uncontrolled port and port authorization status Contents 802.1X fundamentals 1 802.1X architecture 1 Controlled/uncontrolled port and port authorization status 1 802.1X-related protocols 2 Packet formats 2 EAP over RADIUS 4 Initiating 802.1X authentication

More information

H3C MSR Router Series

H3C MSR Router Series H3C MSR Router Series Comware 5 Layer 2 - WAN Access Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW520-R2516 Document version: 20180820-C-1.13 Copyright 2006-2018,

More information

Configuring Virtual Private Networks

Configuring Virtual Private Networks Configuring Virtual Private Networks This chapter describes how to configure, verify, maintain, and troubleshoot a Virtual Private Network (VPN). It includes the following main sections: VPN Technology

More information

RWL Tech Note Comware Routers with L2TP VPN

RWL Tech Note Comware Routers with L2TP VPN Prepared by Richard Litchfield HPE Networking Solution Architect Hewlett Packard Enterprise Australia 410 Concord Road Rhodes NSW 2138 AUSTRALIA Date Prepared: 24-Aug-17 Document Information Document Version

More information

ppp accounting through quit

ppp accounting through quit ppp accounting through quit ppp accounting, page 3 ppp authentication, page 5 ppp authentication ms-chap-v2, page 9 ppp authorization, page 11 ppp chap hostname, page 13 ppp chap password, page 15 ppp

More information

Operation Manual User Access. Table of Contents

Operation Manual User Access. Table of Contents Table of Contents Table of Contents Chapter 1 PPP Configuration... 1-1 1.1 Introduction to PPP... 1-1 1.1.1 Introduction to PPP... 1-1 1.2 Configuring PPP... 1-2 1.2.1 Configuring PPP Encapsulation on

More information

Portal configuration commands

Portal configuration commands Contents Portal configuration commands 1 display portal acl 1 display portal connection statistics 5 display portal free-rule 7 display portal interface 9 display portal-roaming 11 display portal server

More information

VPDN Tunnel Management

VPDN Tunnel Management VPDN Tunnel Management Finding Feature Information VPDN Tunnel Management Last Updated: July 22, 2011 This module contains information about managing virtual private dialup network (VPDN) tunnels and monitoring

More information

virtual-template virtual-template template-number no virtual-template Syntax Description

virtual-template virtual-template template-number no virtual-template Syntax Description VPDN Commands virtual-template virtual-template To specify which virtual template will be used to clone virtual access interfaces (VAI), use the virtual-template command in BBA group configuration mode

More information

ND1009:2002/05 PNO-ISC/SPEC/009

ND1009:2002/05 PNO-ISC/SPEC/009 NICC Document ND1009:2002/05 ND1009:2002/05 PNO-ISC/SPEC/009 Layer 2 Tunnelling Protocol Network Interoperability Consultative Committee Oftel 50 Ludgate Hill London EC4M 7JJ UK http://www.oftel.gov.uk/ind_groups/nicc/

More information

Operation Manual Login and User Interface. Table of Contents

Operation Manual Login and User Interface. Table of Contents Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2

More information

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements RADIUS Attribute 66 Tunnel-Client-Endpoint The RADIUS Attribute 66 (Tunnel-Client-Endpoint) feature allows the hostname of the network access server (NAS) to be specified--rather than the IP address of

More information

RADIUS Logical Line ID

RADIUS Logical Line ID The feature, also known as the Logical Line Identification (LLID) Blocking feature enables administrators to track their customers on the basis of the physical lines on which customer calls originate.

More information

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring a physical subscriber line for RADIUS Access and Accounting enables an L2TP access concentrator (LAC) and an L2TP network

More information

Operation Manual 802.1x. Table of Contents

Operation Manual 802.1x. Table of Contents Table of Contents Table of Contents... 1-1 1.1 802.1x Overview... 1-1 1.1.1 Architecture of 802.1x... 1-1 1.1.2 Operation of 802.1x... 1-3 1.1.3 EAP Encapsulation over LANs... 1-4 1.1.4 EAP Encapsulation

More information

Configuring Resource Pool Management

Configuring Resource Pool Management Configuring Resource Pool Management This chapter describes the Cisco Resource Pool Management (RPM) feature. It includes the following main sections: RPM Overview How to Configure RPM Verifying RPM Components

More information

Understanding and Troubleshooting Idle Timeouts

Understanding and Troubleshooting Idle Timeouts Understanding and Troubleshooting Idle Timeouts Document ID: 23423 Contents Introduction Prerequisites Requirements Components Used Conventions Common Problems and Symptoms Idle Timeouts Interesting Traffic

More information

Table of Contents. 2 Static Route Configuration Commands 2-1 Static Route Configuration Commands 2-1 delete static-routes all 2-1 ip route-static 2-1

Table of Contents. 2 Static Route Configuration Commands 2-1 Static Route Configuration Commands 2-1 delete static-routes all 2-1 ip route-static 2-1 Table of Contents 1 IP Routing Table Commands 1-1 IP Routing Table Commands 1-1 display ip routing-table 1-1 display ip routing-table acl 1-3 display ip routing-table ip-address 1-5 display ip routing-table

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Security Command Reference Part number: 5998-2887 Software version: Release2208 Document version: 6W100-20130228 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Configuring Security on the GGSN

Configuring Security on the GGSN CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco

More information

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER CHAPTER 27 This chapter describes IP tunneling features implemented on the Cisco 10000 series routers and includes the following topics: GRE Tunnel IP Source and Destination VRF Membership, page 27-1 Restrictions

More information

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN This chapter describes how to configure /IKEv1 on the ASA. About /IKEv1 VPN, on page 1 Licensing Requirements for, on page 3 Prerequisites for Configuring, on page 4 Guidelines and Limitations, on page

More information

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains

More information

The router sends hello keepalive packets at 60 second intervals.

The router sends hello keepalive packets at 60 second intervals. hello hello To configure the interval used to exchange hello keepalive packets in a Layer 2 control channel, use the hello command in L2TP class configuration mode. To disable the sending of hello keepalive

More information

H3C SecBlade FW/VPN Cards. Operation Manual. Hangzhou H3C Technologies Co., Ltd. Manual Version: T R C-1.

H3C SecBlade FW/VPN Cards. Operation Manual. Hangzhou H3C Technologies Co., Ltd.  Manual Version: T R C-1. Manual Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Manual Version: T2-08164R-20070423-C-1.03 Product Version: S9500-CMW310-R1628 Copyright 2006-2007, Hangzhou H3C Technologies Co., Ltd. and

More information

Table of Contents 1 WLAN Security Configuration Commands 1-1

Table of Contents 1 WLAN Security Configuration Commands 1-1 Table of Contents 1 WLAN Security Configuration Commands 1-1 authentication-method 1-1 cipher-suite 1-2 gtk-rekey client-offline enable 1-2 gtk-rekey enable 1-3 gtk-rekey method 1-4 ptk-lifetime 1-5 security-ie

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 Network Security Overview... 1-1 1.1 Introduction to the Network Security Features Provided by CMW... 1-1 1.2 Hierarchical Line Protection... 1-2 1.3 RADIUS-Based

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-2 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-3 EAP over LAN 1-4 EAP over RADIUS 1-5 802.1X Authentication

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

This feature was introduced. This feature was integrated into Cisco IOS Release 12.2(27)SBA.

This feature was introduced. This feature was integrated into Cisco IOS Release 12.2(27)SBA. The feature allows an L2TP network server (LNS) participating in Stack Group Bidding Protocol (SGBP) to send a redirect message to the L2TP access concentrator (LAC) if another LNS wins the bid. The LAC

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Security Command Reference Part number: 5998-6695 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Login management commands

Login management commands Contents Login management commands 1 CLI login configuration commands 1 display telnet client configuration 1 telnet 1 telnet ipv6 2 telnet server enable 3 User interface configuration commands 3 acl (user

More information

RADIUS Commands. Cisco IOS Security Command Reference SR

RADIUS Commands. Cisco IOS Security Command Reference SR RADIUS Commands This chapter describes the commands used to configure RADIUS. RADIUS is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation,

More information

Session Recovery. How Session Recovery Works

Session Recovery. How Session Recovery Works With robust hardware failover and redundancy protection, any hardware or software failures on the system can quickly be corrected. However, software failures can occur for numerous reasons, often without

More information

Configuring TACACS+ Authentication for VPDNs

Configuring TACACS+ Authentication for VPDNs Configuring TACACS+ Authentication for VPDNs Document ID: 12429 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram TACACS+ Server Configurations Router

More information

H3C SecPoint User Manual

H3C SecPoint User Manual Hangzhou Huawei-3Com Technology Co., Ltd http://www.huawei-3com.com Manual Version: T2-08014Q-20060804-C-1.01 Copyright 2006, Hangzhou Huawei-3Com Technology Co., Ltd. and its licensors All Rights Reserved

More information

H3C S12500 Series Routing Switches

H3C S12500 Series Routing Switches H3C S12500 Series Routing Switches Security Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: S12500-CMW710-R7128 Document version: 6W710-20121130 Copyright 2012,

More information

VPN. Agenda VPN VPDN. L84 - VPN and VPDN in IP. Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP)

VPN. Agenda VPN VPDN. L84 - VPN and VPDN in IP. Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) VPN Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products Security Command Reference HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

L2TP IPsec Support for NAT and PAT Windows Clients

L2TP IPsec Support for NAT and PAT Windows Clients L2TP IPsec Support for NAT and PAT Windows Clients The L2TP IPsec Support for NAT and PAT Windows Clients feature allows mulitple Windows client to connect to an IPsec-enabled Cisco IOS Layer 2 Tunneling

More information

Autosense for ATM PVCs and MUX SNAP Encapsulation

Autosense for ATM PVCs and MUX SNAP Encapsulation Autosense for ATM PVCs and MUX SNAP Encapsulation The PPPoA/PPPoE Autosense for ATM PVCs feature enables a router to distinguish between incoming PPP over ATM (PPPoA) and PPP over Ethernet (PPPoE) over

More information

H3C S5830V2 & S5820V2 Switch Series

H3C S5830V2 & S5820V2 Switch Series H3C S5830V2 & S5820V2 Switch Series Security Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release2108 Document version: 6W101-20120531 Copyright 2012, Hangzhou

More information

Virtual Private Networks.

Virtual Private Networks. Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies

More information

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Objective A Virtual Private Network (VPN) is a private network that is used to virtually

More information

L2TP Tunnel Setup and Teardown

L2TP Tunnel Setup and Teardown L2TP Tunnel Setup and Teardown Document ID: 23980 Contents Introduction Prerequisites Requirements Components Used Conventions PPP L2TP PPP and L2TP Flow Summary The PPP/L2TP Connection Sequence Debug

More information

Service Managed GatewayTM. Configuring MLPPP using Expert View

Service Managed GatewayTM. Configuring MLPPP using Expert View Service Managed GatewayTM Issue 1.1 Date 19 July 2010 Table of contents 1 Introduction... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Prerequisites... 3 1.4 Navigating to expert view... 3 2 Configuring MLPPP...

More information

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring the Physical Subscriber Line for RADIUS Access and Accounting Last Updated: December 5, 2011 Configuring a physical subscriber line for RADIUS Access and Accounting enables an L2TP access concentrator

More information

IP Router Command Reference

IP Router Command Reference IP Router Configuration IP Router Command Reference Command Hierarchies Configuration Commands Router Commands on page 94 Router L2TP Commands on page 96 Router Interface Commands on page 99 Router Interface

More information

Configuring NAS-Initiated Dial-In VPDN Tunneling

Configuring NAS-Initiated Dial-In VPDN Tunneling Configuring NAS-Initiated Dial-In VPDN Tunneling Network access server (NAS)-initiated dial-in tunneling provides secure tunneling of a PPP session from a NAS to a tunnel server without any special knowledge

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

ip mobile mobile-networks through multi-path (mobile router)

ip mobile mobile-networks through multi-path (mobile router) ip mobile mobile-networks through multi-path (mobile router) ip mobile mobile-networks, on page 3 ip mobile prefix-length, on page 5 ip mobile proxy-host, on page 6 ip mobile radius disconnect, on page

More information

VPLS configuration commands

VPLS configuration commands Contents VPLS configuration commands 1 car 1 description 1 display bgp vpls 2 display l2vpn fast-switch-group 7 display mac-address vsi 8 display mpls l2vpn fib ac vpls 10 display mpls l2vpn fib pw vpls

More information

PPPoE Session Limit per NAS Port

PPPoE Session Limit per NAS Port PPPoE Session Limit per NAS Port First Published: March 17, 2003 Last Updated: February 28, 2006 The PPPoE Session Limit per NAS Port feature enables you to limit the number of PPP over Ethernet (PPPoE)

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-1 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-2 EAP over LAN 1-3 EAP over RADIUS 1-5 802.1X Authentication

More information

Provisioning Flows Topics

Provisioning Flows Topics CHAPTER 3 The BAC software provides network and service management tools that enable the provisioning of devices and subscribers in broadband aggregation environments. BAC supports the role of the following

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

HWTACACS Technology White Paper

HWTACACS Technology White Paper S Series Switches HWTACACS Technology White Paper Issue 1.0 Date 2015-08-08 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Understanding the authentication imsi-auth msisdn-auth Configuration for Corporate L2TP APNs

Understanding the authentication imsi-auth msisdn-auth Configuration for Corporate L2TP APNs Understanding the authentication imsi-auth msisdn-auth Configuration for Corporate L2TP APNs Contents Introduction Problem: The msisdn-auth and imsi-auth APN Configuration Options have a Speciffic (non

More information

Introduction Overview of L2TP Support for L2TP Configuration Examples Simple Dial-In System...

Introduction Overview of L2TP Support for L2TP Configuration Examples Simple Dial-In System... Chapter 27 Layer Two Tun unnelli lling Protocol (L2TP) Introduction... 27-2 Overview of L2TP... 27-2 Support for L2TP... 27-3 Configuration... 27-6 Simple Dial-In System... 27-6 Two-Way Communications

More information

Session Recovery. How Session Recovery Works

Session Recovery. How Session Recovery Works With robust hardware failover and redundancy protection, any hardware or software failures on the system can quickly be corrected. However, software failures can occur for numerous reasons, often without

More information

RADIUS Logical Line ID

RADIUS Logical Line ID RADIUS Logical Line ID Feature History for RADIUS Logical Line ID Release Modification 12.2(13)T This feature was introduced. 12.2(15)B This feature was integrated into Cisco IOS Release 12.2(15)B. 12.2(27)SBA

More information

IPv6 and xdsl. Athanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010

IPv6 and xdsl. Athanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010 IPv6 and xdsl Athanassios Liakopoulos (aliako@grnet.gr) Slovenian IPv6 Training, Ljubljana, May 2010 Copy... Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint

More information

Configuring the PPPoE Client

Configuring the PPPoE Client CHAPTER 72 This section describes how to configure the PPPoE client provided with the ASA. It includes the following topics: PPPoE Client Overview, page 72-1 Username and Password, page 72-2 Enabling PPPoE,

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products WLAN Configuration Guide HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

Provisioning Broadband Aggregators Topics

Provisioning Broadband Aggregators Topics CHAPTER 7 The Cisco Broadband Access Center software enables you to provision services on broadband aggregators. Provisioning occurs after you create administrative networks and network devices. See Chapter

More information

JunosE Software for E Series Broadband Services Routers

JunosE Software for E Series Broadband Services Routers JunosE Software for E Series Broadband Services Routers RADIUS Dynamic-Request Server Release 14.3.x Published: 2013-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

Contents. BGP commands 1

Contents. BGP commands 1 Contents BGP commands 1 address-family ipv4 1 address-family ipv6 2 address-family link-state 3 advertise-rib-active 4 aggregate 5 balance 7 balance as-path-neglect 9 bestroute as-path-neglect 10 bestroute

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-2 Introduction to RADIUS 1-2

More information

Dialog Box Displaying the VPN Connection Status.

Dialog Box Displaying the VPN Connection Status. By using SoftEther VPN Client to define the required connection settings of a connection setting and then connecting to that connection setting, you can start the connection to VPN Server. 4.5.1 Starting

More information

TSIN02 - Internetworking

TSIN02 - Internetworking TSIN02 - Internetworking Literature: Lecture 11: SNMP and AAA Forouzan, chapter 21 Diameter next generation's AAA protocol by Håkan Ventura, sections 2-3.3.6 RFC2881 (optional extra material) Outline:

More information