NetEngine AR600, AR6100, AR6200, AR6300 产品文档 (huawei.com)
配置设备作为PPPoE Client(IPv6),实现设备接入Internet的示例 - NetEngine AR1000V 典型配置案例(命令行) - 华为 (huawei.com)
USG6000 配置IPv4 PPPoE拨号_usg6000v能配置pppoe-client-CSDN博客
https://support.huawei.com/enterprise/zh/doc/EDOC1100367109/1d45f2e0
在PPPoE拨号环境下实现基于前缀委派(PD)的IPv6(H3C设备)_华三路由器pppoe拨号获取ipv6地址-CSDN博客
11-PPPoE配置-新华三集团-H3C
USG6000 配置IPv4 PPPoE拨号_usg6000v能配置pppoe-client-CSDN博客
AR1000作为pppoe-server
pppoe-server log enable
#
aaa
authentication-scheme default
authentication-mode local
authentication-scheme radius
authentication-mode radius
authorization-scheme default
authorization-mode local
accounting-scheme default
accounting-mode none
local-aaa-user password policy administrator
domain default
authentication-scheme default
accounting-scheme default
radius-server default
domain default_admin
authentication-scheme default
accounting-scheme default
domain pppoe
authentication-scheme radius
accounting-scheme default
radius-server default
local-user admin password irreversible-cipher $1a$B{P!)<&k$;$~w5l.]grZT1@xQ7Iw.}>1$N<UA&e0NQl)<+R#-X!$
local-user admin privilege level 15
local-user admin service-type terminal http
local-user root0 password cipher %^%#Hk+C)w+`FUPJx{/xGX'T![s6-NjaV~+HgU;IEy(R%^%#
local-user root0 privilege level 0
local-user root0 service-type ppp
local-user root1 password cipher %^%#AeB+<ANP%Nv*QA&]'_\/PwISDt^SzA'hOF*MWCP5%^%#
local-user root1 privilege level 0
local-user root1 service-type ppp
local-user root2 password cipher %^%#Mm5R>C>9qD;JIM/+)vEKZPlU)xQ,o#8OkLVZJ0HH%^%#
local-user root2 privilege level 0
local-user root2 service-type ppp
#
#
interface Virtual-Template1
ppp authentication-mode pap
remote address 27.0.4.21
ppp keepalive retry-times 2
timer hold 30
ip address 27.0.4.1 255.255.255.0
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/1
pppoe-server bind Virtual-Template 1
ip address 27.0.0.3 255.255.255.0
#
<Huawei>display pppoe-server session all
Total Session: 1
SID Intf State OIntf RemMAC LocMAC
1 Virtual-Template1 UP GE0/0/1 0c73.eb9c.73d2 5000.0006.0001
<Huawei>
#使用ip pool
#
ip pool pppoe
network 27.0.4.0 mask 255.255.255.0
#
#
interface Virtual-Template1
ppp authentication-mode pap
remote address pool pppoe
ppp keepalive retry-times 2
timer hold 30
ip address 27.0.4.1 255.255.255.0
#
server端使能ipv6
#
ipv6
interface Virtual-Template1
ppp authentication-mode pap
remote address pool pppoe
ppp keepalive retry-times 2
timer hold 30
ipv6 enable
ip address 27.0.4.1 255.255.255.0
ipv6 address 2000::1/64
undo ipv6 nd ra halt
#
huwei[client]
ipv6
interface dialer 1
ipv6 enable
ipv6 address auto link-local
ipv6 address auto global
undo ipv6 nd ra halt
usg6000v作为pppoe-server
1
<USG6000V1>system-view
[USG6000V1]sysname FWB
[FWB]interface GigabitEthernet 1/0/3
[FWB-GigabitEthernet1/0/3]ip address 10.4.0.1 24
[FWB-GigabitEthernet1/0/3]quit
[FWB]firewall zone untrust
[FWB-zone-untrust]add interface GigabitEthernet 1/0/1
[FWB-zone-untrust]quit
[FWB]firewall zone trust
[FWB-zone-trust]add interface GigabitEthernet 1/0/3
2
-
[FWB]user-manage user usera
-
[FWB-localuser-usera]password Password1
-
[FWB-localuser-usera]q
3
-
[FWB]ip pool global1
-
[FWB-ip-pool-global1]section 1 10.2.0.2
-
[FWB-ip-pool-global1]quit
4
-
[FWB]aaa
-
[FWB-aaa]service-scheme scheme1
-
[FWB-aaa-service-scheme1]ip-pool global1
-
[FWB-aaa-service-scheme1]qui
5
[FWB]interface Virtual-Template 1
[FWB-Virtual-Template1]ppp authentication-mode pap
The command is used to configure the PPP authentication mode on the local end.
Confirm that the peer end adopts the corresponding PPP authentication. Continue[
Y/N]:y
[FWB-Virtual-Template1]ip address 10.2.0.1 24
[FWB-Virtual-Template1]remote service-scheme scheme1
[FWB-Virtual-Template1]quit
[FWB]firewall zone untrust
[FWB-zone-untrust]add interface Virtual-Template 1
[FWB-zone-untrust]quit
6
-
[FWB]interface GigabitEthernet 1/0/1
-
[FWB-GigabitEthernet1/0/1]pppoe-server bind virtual-template 1
-
[FWB-GigabitEthernet1/0/1]quit
7
[FWB]security-policy
[FWB-policy-security]rule name policy1
[FWB-policy-security-rule-policy1]source-zone trust
[FWB-policy-security-rule-policy1]source-address 10.4.0.0 24
[FWB-policy-security-rule-policy1]destination-zone untrust
[FWB-policy-security-rule-policy1]destination-address 10.3.0.0 24
[FWB-policy-security-rule-policy1]action permit
[FWB-policy-security-rule-policy1]quit
[FWB-policy-security]rule name policy2
[FWB-policy-security-rule-policy2]source-zone untrust
[FWB-policy-security-rule-policy2]source-address 10.3.0.0 24
[FWB-policy-security-rule-policy2]destination-zone trust
[FWB-policy-security-rule-policy2]destination-address 10.4.0.0 24
[FWB-policy-security-rule-policy2]action permit
[FWB-policy-security-rule-policy2]quit
————————————————
本文为博主原创文章,未经博主允许不得转载。如有疑问,请在该文章中留言联系博主,谢谢!!
原文链接:https://blog.csdn.net/tladagio/article/details/114879838