第一篇:MSR與Android、IOS移動終端建立L2TP over IPSec VPN典型配置案例
MSR與Android、IOS移動終端建立L2TP over IPSec VPN典型配置案例
組網需求:
隨著智能終端的普及,Android 和蘋果的IOS操作系統占有電子市場的絕大份額。越來越多的客戶希望利用這些手持終端設備與防火墻直接建立VPN連接,從而訪問公司內部網絡資源。本案例用于指導網絡工程師對上述組網需求進行配置。
組網圖:
移動終端通過無線與MSR三層可達,路由可達,中間不允許經過nat設備。
設備版本
Android:MIUI V5、原生安卓4.0 IOS版本:IOS 6 IOS 7 MSR版本:2209P37
四、配置步驟:
1、設備開啟L2TP 功能,配置好虛模板地址以及相應的地址池,創建用戶123,密碼123 # l2tp enable # domain system ip pool 1 192.168.13.200 192.168.13.250 # local-user 123 password cipher 123 service-typeppp # l2tp-group 1 undo tunnel authentication allow l2tp virtual-template 0 # interface Virtual-Template0 ppp authentication-mode chap domain system pppipcp remote-address forced remote address pool 1 ip address 192.168.13.1 255.255.255.0 #
2、針對安卓手機配置IPSec: # ike proposal 1 encryption-algorithmaes-cbc 256 dh group2 sa duration 28800 # ike peer android exchange-mode aggressive proposal 1 pre-shared-key cipher 123456789 id-type name
remote-nameaaa local-name rt1 nat traversal # ipsec proposal 1 encapsulation-mode transport # ipsec policy-template android 1 ike-peerandroid proposal 1 # ipsec policy phone 1 isakmp template android # interface GigabitEthernet0/0 port link-mode route ip address 10.153.47.103 255.255.255.0 ipsec policy phone #
3、安卓客戶端的配置: 名稱:隨便起
類型:L2TP/IPSEC PSK 服務器地址:LNS的外網地址 IPSec標示符:aaa 預共享密鑰:123456789
4、針對IOS 用戶的IPSec配置: # ike proposal 2 encryption-algorithm 3des-cbc dh group2 authentication-algorithm md5 sa duration 3600 # ike peer ios proposal 2 pre-shared-key cipher 456123 local-address10.153.47.103 nat traversal # ipsec proposal 2 encapsulation-mode transport esp authentication-algorithm sha1 esp encryption-algorithm aes 128 # ipsec policy-templateios 1 ike-peerios proposal 2 # ipsec policy phone 2 isakmp template ios # interface GigabitEthernet0/0 port link-mode route ip address 10.153.47.103 255.255.255.0 ipsec policy phone #
5、IOS客戶端的配置:
描述:隨便寫
服務器:LNS公網口地址 賬戶:123 密碼:123 密鑰:456123