在PIX上配置PPPOEClient与PPPOESERVER通信
来源:优易学(YouYiXue.com) 2009-11-20 21:27:37   【优易学:中国教育考试第一门户】   资料下载   IT书店

//开始发送广播,寻找PPPOE SERVER
  PPPoE: Ver:1 Type:1 Code:09=PADI Sess:0 Len:12
  PPPoE: Type:0101:SVCNAME-Service Name Len:0
  PPPoE: Type:0103:HOSTUNIQ-Host Unique Tag Len:4
  PPPoE: 00000001
  PPPoE: PPPoE:(Rcv) Dest:00aa.0001.0102 Src:cc9f.09e4.0000 Type:0x8863=PPPoE-Discovery
  PPPoE: Ver:1 Type:1 Code:07=PADO Sess:0 Len:48
  PPPoE: Type:0101:SVCNAME-Service Name Len:0
  PPPoE: Type:0103:HOSTUNIQ-Host Unique Tag Len:4
  PPPoE: 00000001
  PPPoE: Type:0102:ACNAME-AC Name Len:12
  PPPoE: PPPOE_Server
  PPPoE: Type:0104:ACCOOKIE-AC Cookie Len:16
  PPPoE: 9682A160
  PPPoE: 3EDB1E03
  PPPoE: DDDF8016
  PPPoE: 2E032E1C
  PPPoE:
  PPPoE: PADO
  PPPoE: send_padr:(Snd) Dest:cc9f.09e4.0000 Src:00aa.0001.0102 Type:0x8863=PPPoE-Discovery
  PPPoE: Ver:1 Type:1 Code:19=PADR Sess:0 Len:48
  PPPoE: Type:0101:SVCNAME-Service Name Len:0
  PPPoE: Type:0103:HOSTUNIQ-Host Unique Tag Len:4
  PPPoE: 00000001
  PPPoE: Type:0102:ACNAME-AC Name Len:12
  PPPoE: PPPOE_Server
  PPPoE: Type:0104:ACCOOKIE-AC Cookie Len:16
  PPPoE: 9682A160
  PPPoE: 3EDB1E03
  PPPoE: DDDF8016
  PPPoE: 2E032E1C
  PPPoE:
  PPPoE: PPPoE:(Rcv) Dest:00aa.0001.0102 Src:cc9f.09e4.0000 Type:0x8863=PPPoE-Discovery
  PPPoE: Ver:1 Type:1 Code:65=PADS Sess:3 Len:48
  PPPoE: Type:0101:SVCNAME-Service Name Len:0
  PPPoE: Type:0103:HOSTUNIQ-Host Unique Tag Len:4
  PPPoE: 00000001
  PPPoE: Type:0102:ACNAME-AC Name Len:12
  PPPoE: PPPOE_Server
  PPPoE: Type:0104:ACCOOKIE-AC Cookie Len:16
  PPPoE: 9682A160
  PPPoE: 3EDB1E03
  PPPoE: DDDF8016
  PPPoE: 2E032E1C
  PPPoE:
  PPPoE: PADS
  PPPoE: IN PADS from PPPoE tunnel
  PPPoE: Opening PPP link and starting negotiations.
  到这里PIX上的pppoe 会话已经结束,已经得到从PPPOE SERVER上分配的地址
  PPPOE SERVER上开启debug之后,收到PIX上的PPPOE 会话请求
  PPPOE_SERVER#
  *Mar 1 00:34:17.583: PPPoE 0: I PADI R:00aa.0001.0102 L:ffff.ffff.ffff Et0/0
  *Mar 1 00:34:17.583: PPPoE 0: O PADO, R:00aa.0001.0102 L:cc9f.0788.0000 Et0/0
  *Mar 1 00:34:17.639: PPPoE 0: I PADR R:00aa.0001.0102 L:cc9f.0788.0000 Et0/0
  *Mar 1 00:34:17.639: PPPoE : encap string prepared
  *Mar 1 00:34:17.639: [2]PPPoE 2: Access IE handle allocated
  *Mar 1 00:34:17.639: [2]PPPoE 2: pppoe SSS switch updated
  *Mar 1 00:34:17.639: [2]PPPoE 2: AAA unique ID allocated
  *Mar 1 00:34:17.643: [2]PPPoE 2: No AAA accounting method list
  *Mar 1 00:34:17.643: [2]PPPoE 2: Service request sent to SSS
  *Mar 1 00:34:17.643: [2]PPPoE 2: Created R:cc9f.0788.0000 L:00aa.0001.0102 Et0/0
  *Mar 1 00:34:17.647: [2]PPPoE 2: State REQ_NASPORT Event MORE_KEYS
  *Mar 1 00:34:17.647: [2]PPPoE 2: O PADS R:00aa.0001.0102 L:cc9f.0788.0000 Et0/0
  *Mar 1 00:34:17.651: ppp2 PPP: Using default call direction
  *Mar 1 00:34:17.651: ppp2 PPP: Treating connection as a dedicated line
  *Mar 1 00:34:17.651: ppp2 PPP: Session handle[73000003] Session id[2]
  *Mar 1 00:34:17.651: ppp2 PPP: Authorization required
  *Mar 1 00:34:17.655: [2]PPPoE 2: State START_PPP Event DYN_BIND
  *Mar 1 00:34:17.655: [2]PPPoE 2: data path set to PPP
  PPPOE_SERVER#
  *Mar 1 00:34:20.679: ppp2 PAP: I AUTH-REQ id 1 len 24 from "wangwanli"
  *Mar 1 00:34:20.679: ppp2 PAP: Authenticating peer wangwanli
  *Mar 1 00:34:20.687: ppp2 PPP: Sent PAP LOGIN Request
  *Mar 1 00:34:20.687: ppp2 PPP: Received LOGIN Response PASS
  *Mar 1 00:34:20.691: [2]PPPoE 2: State LCP_NEGO Event PPP_LOCAL
  *Mar 1 00:34:20.691: PPPoE 2/SB: Sent vtemplate request on base Vi1
  *Mar 1 00:34:20.699: [2]PPPoE 2: State CREATE_VA Event VA_RESP
  *Mar 1 00:34:20.699: [2]PPPoE 2: Vi1.1 interface obtained
  *Mar 1 00:34:20.699: [2]PPPoE 2: State PTA_BIND Event STAT_BIND
  *Mar 1 00:34:20.699: [2]PPPoE 2: data path set to Virtual Acess
  PPPOE_SERVER#
  *Mar 1 00:34:20.703: [2]PPPoE 2: Connected PTA
  *Mar 1 00:34:20.707: Vi1.1 PPP: Sent LCP AUTHOR Request
  *Mar 1 00:34:20.707: Vi1.1 PPP: Sent IPCP AUTHOR Request
  *Mar 1 00:34:20.711: Vi1.1 LCP: Received AAA AUTHOR Response PASS
  *Mar 1 00:34:20.711: Vi1.1 IPCP: Received AAA AUTHOR Response PASS
  *Mar 1 00:34:20.711: Vi1.1 PAP: O AUTH-ACK id 1 len 5
  //PAP认证通过
  pixfirewall# show vpdn session pppoe state
  PPPoE Session Information (Total tunnels=1 sessions=1)
  SessID TunID Intf State Last Chg
  3 1 outside SESSION_UP 2928 secs
  pixfirewall# show vpdn pppinterface //查看ppp会话,以及ppp认证方式
  PPP virtual interface id = 1
  PPP authentication protocol is PAP
  Server ip address is 192.168.0.1
  Our ip address is 200.0.0.1
  Transmitted Pkts: 122, Received Pkts: 121, Error Pkts: 0
  MPPE key strength is None
  MPPE_Encrypt_Pkts: 0, MPPE_Encrypt_Bytes: 0
  MPPE_Decrypt_Pkts: 0, MPPE_Decrypt_Bytes: 0
  Rcvd_Out_Of_Seq_MPPE_Pkts: 0
  pixfirewall#

上一页  [1] [2] 

责任编辑:虫虫

收藏此页】【 】【打印】【回到顶部
文章搜索:
 相关文章
热点资讯
热门课程培训