第一篇:MSR与Android、IOS移动终端建立L2TP over IPSec VPN典型配置案例
MSR与Android、IOS移动终端建立L2TP over IPSec VPN典型配置案例
组网需求:
随着智能终端的普及,Android 和苹果的IOS操作系统占有电子市场的绝大份额。越来越多的客户希望利用这些手持终端设备与防火墙直接建立VPN连接,从而访问公司内部网络资源。本案例用于指导网络工程师对上述组网需求进行配置。
组网图:
移动终端通过无线与MSR三层可达,路由可达,中间不允许经过nat设备。
设备版本
Android:MIUI V5、原生安卓4.0 IOS版本:IOS 6 IOS 7 MSR版本:2209P37
四、配置步骤:
1、设备开启L2TP 功能,配置好虚模板地址以及相应的地址池,创建用户123,密码123 # l2tp enable # domain system ip pool 1 192.168.13.200 192.168.13.250 # local-user 123 password cipher 123 service-typeppp # l2tp-group 1 undo tunnel authentication allow l2tp virtual-template 0 # interface Virtual-Template0 ppp authentication-mode chap domain system pppipcp remote-address forced remote address pool 1 ip address 192.168.13.1 255.255.255.0 #
2、针对安卓手机配置IPSec: # ike proposal 1 encryption-algorithmaes-cbc 256 dh group2 sa duration 28800 # ike peer android exchange-mode aggressive proposal 1 pre-shared-key cipher 123456789 id-type name
remote-nameaaa local-name rt1 nat traversal # ipsec proposal 1 encapsulation-mode transport # ipsec policy-template android 1 ike-peerandroid proposal 1 # ipsec policy phone 1 isakmp template android # interface GigabitEthernet0/0 port link-mode route ip address 10.153.47.103 255.255.255.0 ipsec policy phone #
3、安卓客户端的配置: 名称:随便起
类型:L2TP/IPSEC PSK 服务器地址:LNS的外网地址 IPSec标示符:aaa 预共享密钥:123456789
4、针对IOS 用户的IPSec配置: # ike proposal 2 encryption-algorithm 3des-cbc dh group2 authentication-algorithm md5 sa duration 3600 # ike peer ios proposal 2 pre-shared-key cipher 456123 local-address10.153.47.103 nat traversal # ipsec proposal 2 encapsulation-mode transport esp authentication-algorithm sha1 esp encryption-algorithm aes 128 # ipsec policy-templateios 1 ike-peerios proposal 2 # ipsec policy phone 2 isakmp template ios # interface GigabitEthernet0/0 port link-mode route ip address 10.153.47.103 255.255.255.0 ipsec policy phone #
5、IOS客户端的配置:
描述:随便写
服务器:LNS公网口地址 账户:123 密码:123 密钥:456123