283
[Router-Ethernet1/2] ip address 172.21.1.1 255.255.0.0
[Router-Ethernet1/2] quit
# Assign an IP address to Ethernet 1/3.
[Router] interface ethernet1/3
[Router-Ethernet1/3] ip address 10.22.2.10 255.255.255.0
[Router-Ethernet1/3] quit
# Configure a RADIUS scheme that uses the CAMS/IMC server, setting the IP address to
10.110.91.146/24, and the keys to sysname.
[Router] radius scheme cams
[Router-radius-cams] server-type extended
[Router-radius-cams] primary authentication 10.110.91.146
[Router-radius-cams] primary accounting 10.110.91.146
[Router-radius-cams] key authentication sysname
[Router-radius-cams] key accounting sysname
[Router-radius-cams] quit
# Configure domain system to use the RADIUS scheme for PPP user authentication and
accounting, and use the IP address pool 10.200.1.0/24 to assign IP addresses to remote hosts.
[Router] domain system
[Router-isp-system] authentication ppp radius-scheme cams
[Router-isp-system] ip pool 1 10.200.1.2 10.200.1.254
[Router-isp-system] quit
# Configure the IP address of the VT interface, enable PAP authentication on this interface,
specify the address pool to be used to assign addresses for PPP users, enable L2TP access
based EAD, and set the fragment match mode to exactly.
[Router] interface virtual-template 1
[Router-Virtual-Template1] ip address 10.200.1.1 255.255.255.0
[Router-Virtual-Template1] ppp authentication-mode pap
[Router-Virtual-Template1] remote address pool 1
[Router-Virtual-Template1] ppp access-control enable
[Router-Virtual-Template1] ppp access-control match-fragments exactly
[Router-Virtual-Template1] quit
# Enable the L2TP service, configure an L2TP group, configure the local tunnel name as LNS,
and disable tunnel authentication.
[Router] l2tp enable
[Router] l2tp-group 1
[Router-l2tp1] tunnel name LNS
[Router-l2tp1] undo tunnel authentication
[Router-l2tp1] allow l2tp virtual-template 1
[Router-l2tp1] quit
# Enable firewall, specify the default filtering action as denying packets, and enable fragment
inspection.
[Router] firewall enable
[Router] firewall default deny
[Router] firewall fragments-inspect
# Configure security ACL 2000 so that users passing security authentication can access the
Internet.
[Router] acl number 2000
[Router-acl-basic-2000] rule 0 permit
[Router-acl-basic-2000] quit