[index] AT-AR1050V コマンドリファレンス 5.5.4
NoteダイナミックDNSサービスに障害が発生した場合、IPsec VPNの確立が行えない場合があります。信頼性が必要とされるネットワークでは、固定IPアドレス契約の利用をご検討ください。
Note検証済みダイナミックDNSサービスは弊社ホームページをご確認ください。
ISP接続用ユーザー名 | user@ispA | user@ispB |
ISP接続用パスワード | isppasswdA | isppasswdB |
PPPoEサービス名 | 指定なし | 指定なし |
WAN側IPアドレス | 動的割り当て(IPCP) | 動的割り当て(IPCP) |
DNSサーバー | 自動取得(IPCP) | 自動取得(IPCP) |
接続形態 | 端末型 | 端末型 |
WAN側物理インターフェース | eth1 | eth1 |
WAN側(ppp0)IPアドレス | 接続時にISP-Aから取得 | 接続時にISP-Bから取得 |
LAN側(vlan1)IPアドレス | 192.168.10.1/24 | 192.168.20.1/24 |
IKEバージョン | ||
ローカルID | test1.example.com | test2.example.com |
リモートID | test2.example.com | test1.example.com |
サーバーのFQDN | members.example.com | members.example.com |
サーバーのTCPポート番号 | 443 | 443 |
サーバー接続用ユーザー名 | test | test |
サーバー接続用パスワード | test | test |
ホスト名 | test1.example.com | test2.example.com |
IPアドレスを登録するインターフェース | ppp0 | ppp0 |
NoteルーターA、Bが使用するホスト名やダイナミックDNSサーバーにアクセスするためのアカウントは、あらかじめ取得してあるものとします。
ホスト名やアカウントの取得については、ダイナミックDNSサービスの利用開始手順をご覧ください。
Note本設定例では例示用IPアドレス、URLなどを使用しており、実際に設定する値とは異なります。実際の設定時には、ユーザーごとに通知される各種情報をご使用ください。
ddns enable
?
」をCLIから入力するには、Ctrl/V
キーを入力してから ?
を入力してください。単に ?
を入力するとCLIヘルプが表示されてしまうためご注意ください。ddns-update-method example update-url https://<USERNAME>:<PASSWORD>@members.example.com/update?hostname=<HOST-NAME>&myip=<IPADDRESS> host-name test1.example.com username test password test update-interval 60 retry-interval 1 maximum-retries 5
interface eth1 encapsulation ppp 0
interface ppp0 ip ddns-update-method example ppp ipcp dns request keepalive ip address negotiated ppp username user@ispA ppp password isppasswdA ip tcp adjust-mss pmtu
interface vlan1 ip address 192.168.10.1/24
zone private network lan ip subnet 192.168.10.0/24 network peer ip subnet 192.168.20.0/24 interface tunnel0 network tunnel ip subnet 172.16.0.0/30
zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0
application esp protocol 50
application isakmp protocol udp sport 500 dport 500
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit dns from public.wan.ppp0 to public.wan rule 40 permit https from public.wan.ppp0 to public.wan rule 50 permit isakmp from public.wan.ppp0 to public.wan rule 60 permit isakmp from public.wan to public.wan.ppp0 rule 70 permit esp from public.wan.ppp0 to public.wan rule 80 permit esp from public.wan to public.wan.ppp0 protect
nat rule 10 masq any from private to public enable
crypto pki trustpoint vpn_trust enrollment terminal subject-name /CN=test1.example.com subject-alt-name test1.example.com
crypto isakmp profile cert_vpn local authentication certificate remote authentication certificate pki trustpoint vpn_trust transform 1 integrity SHA256 encryption AES256 group 14
crypto isakmp peer hostname test2.example.com profile cert_vpn
interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination test2.example.com tunnel local name test1.example.com tunnel remote name test2.example.com tunnel protection ipsec tunnel oper-status-control ipsec tunnel mode ipsec ipv4 ip address 172.16.0.1/30 ip tcp adjust-mss 1260
ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 tunnel0 ip route 192.168.20.0/24 Null 254
end
ddns enable
?
」をCLIから入力するには、Ctrl/V
キーを入力してから ?
を入力してください。単に ?
を入力するとCLIヘルプが表示されてしまうためご注意ください。ddns-update-method example update-url https://<USERNAME>:<PASSWORD>@members.example.com/update?hostname=<HOST-NAME>&myip=<IPADDRESS> host-name test2.example.com username test password test update-interval 60 retry-interval 1 maximum-retries 5
interface eth1 encapsulation ppp 0
interface ppp0 ip ddns-update-method example ppp ipcp dns request keepalive ip address negotiated ppp username user@ispB ppp password isppasswdB ip tcp adjust-mss pmtu
interface vlan1 ip address 192.168.20.1/24
zone private network lan ip subnet 192.168.20.0/24 network peer ip subnet 192.168.10.0/24 interface tunnel0 network tunnel ip subnet 172.16.0.0/30
zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0
application esp protocol 50
application isakmp protocol udp sport 500 dport 500
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit dns from public.wan.ppp0 to public.wan rule 40 permit https from public.wan.ppp0 to public.wan rule 50 permit isakmp from public.wan.ppp0 to public.wan rule 60 permit isakmp from public.wan to public.wan.ppp0 rule 70 permit esp from public.wan.ppp0 to public.wan rule 80 permit esp from public.wan to public.wan.ppp0 protect
nat rule 10 masq any from private to public enable
crypto pki trustpoint vpn_trust enrollment terminal subject-name /CN=test2.example.com subject-alt-name test2.example.com
crypto isakmp profile cert_vpn local authentication certificate remote authentication certificate pki trustpoint vpn_trust transform 1 integrity SHA256 encryption AES256 group 14
crypto isakmp peer hostname test1.example.com profile cert_vpn
interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination test1.example.com tunnel local name test2.example.com tunnel remote name test1.example.com tunnel protection ipsec tunnel oper-status-control ipsec tunnel mode ipsec ipv4 ip address 172.16.0.2/30 ip tcp adjust-mss 1260
ip route 0.0.0.0/0 ppp0 ip route 192.168.10.0/24 tunnel0 ip route 192.168.10.0/24 Null 254
end
awplus(config)# crypto pki trustpoint vpn_trust ↓ Created trustpoint "vpn_trust". awplus(ca-trustpoint)# enrollment terminal ↓ awplus(ca-trustpoint)# subject-name /CN=test1.example.com ↓ awplus(ca-trustpoint)# subject-alt-name test1.example.com ↓ awplus(ca-trustpoint)# end ↓
-----BEGIN CERTIFICATE-----
から -----END CERTIFICATE-----
の行までをクリップボードにコピーします。awplus# crypto pki authenticate vpn_trust ↓ Paste the certificate PEM file into the terminal. Type "abort" to cancel.
awplus# crypto pki authenticate vpn_trust ↓ Paste the certificate PEM file into the terminal. Type "abort" to cancel. -----BEGIN CERTIFICATE----- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX ... xaPuyjGcQ3kCjW32sO0InQxjLPCp/celKKRZbIwETAor -----END CERTIFICATE----- Complete ("END CERTIFICATE" detected). Subject : /C=JP/O=EXAMPLE/CN=SampleRootCA Issuer : /C=JP/O=EXAMPLE/CN=SampleRootCA Valid From : Apr 7 05:32:30 2023 GMT Valid To : Apr 4 05:32:30 2033 GMT Fingerprint : D51BB535 8CBCFE2C BDD6E56B 759BB5C9 4CF9DCBF This is a self-signed CA certificate. The certificate has been validated successfully. Accept this certificate? (y/n): y Successfully authenticated trustpoint "vpn_trust".
-----BEGIN CERTIFICATE REQUEST-----
から -----END CERTIFICATE REQUEST-----
の行までをクリップボードにコピーしてPC上のファイル(ここでは「example_csr.pem」とします)に保存してください。awplus# crypto pki enroll vpn_trust ↓ Using private key "server-default"... Cut and paste this request to the certificate authority: ----------------------------------------------------------------- -----BEGIN CERTIFICATE REQUEST----- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX ... sQCD7gbOkrMSEpDCSdB85P5on2Gs+CwpHsYlhA== -----END CERTIFICATE REQUEST----- -----------------------------------------------------------------
-----BEGIN CERTIFICATE-----
から -----END CERTIFICATE-----
の行までをクリップボードにコピーします。awplus# crypto pki import vpn_trust pem terminal ↓ Paste the certificate PEM file into the terminal. Type "abort" to cancel.
awplus# crypto pki import vpn_trust pem terminal ↓ Paste the certificate PEM file into the terminal. Type "abort" to cancel. -----BEGIN CERTIFICATE----- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX ... WF/C9/ijoy0UIjDFJms6uBo5gw== -----END CERTIFICATE----- Complete ("END CERTIFICATE" detected). Subject : /O=AlliedWare Plus/CN=test1.example.com Issuer : /C=JP/O=EXAMPLE/CN=SampleRootCA Valid From : Apr 19 07:41:24 2023 GMT Valid To : Apr 18 07:41:24 2024 GMT Fingerprint : FAB1FC57 6CD0DC6A 7198C3F2 67E37C0F 6FAE8AFB This is not a valid CA certificate. Attempting to import as a server certificate. The certificate has been validated successfully. Accept this certificate? (y/n): y The certificate was successfully imported.
copy running-config startup-config
」の書式で実行します。awplus# copy running-config startup-config ↓ Building configuration... [OK]
awplus# write memory ↓ Building configuration... [OK]
awplus(config)# log buffered level informational facility local5 ↓
awplus# show log | include Firewall ↓
! ddns enable ! ddns-update-method example update-url https://<USERNAME>:<PASSWORD>@members.example.com/update?hostname=<HOST-NAME>&myip=<IPADDRESS> host-name test1.example.com username test password test update-interval 60 retry-interval 1 maximum-retries 5 ! interface eth1 encapsulation ppp 0 ! interface ppp0 ip ddns-update-method example ppp ipcp dns request keepalive ip address negotiated ppp username user@ispA ppp password isppasswdA ip tcp adjust-mss pmtu ! interface vlan1 ip address 192.168.10.1/24 ! zone private network lan ip subnet 192.168.10.0/24 network peer ip subnet 192.168.20.0/24 interface tunnel0 network tunnel ip subnet 172.16.0.0/30 ! zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0 ! application esp protocol 50 ! application isakmp protocol udp sport 500 dport 500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit dns from public.wan.ppp0 to public.wan rule 40 permit https from public.wan.ppp0 to public.wan rule 50 permit isakmp from public.wan.ppp0 to public.wan rule 60 permit isakmp from public.wan to public.wan.ppp0 rule 70 permit esp from public.wan.ppp0 to public.wan rule 80 permit esp from public.wan to public.wan.ppp0 protect ! nat rule 10 masq any from private to public enable ! crypto pki trustpoint vpn_trust enrollment terminal subject-name /CN=test1.example.com subject-alt-name test1.example.com ! crypto isakmp profile cert_vpn local authentication certificate remote authentication certificate pki trustpoint vpn_trust transform 1 integrity SHA256 encryption AES256 group 14 ! crypto isakmp peer hostname test2.example.com profile cert_vpn ! interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination test2.example.com tunnel local name test1.example.com tunnel remote name test2.example.com tunnel protection ipsec tunnel oper-status-control ipsec tunnel mode ipsec ipv4 ip address 172.16.0.1/30 ip tcp adjust-mss 1260 ! ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 tunnel0 ip route 192.168.20.0/24 Null 254 ! end
! ddns enable ! ddns-update-method example update-url https://<USERNAME>:<PASSWORD>@members.example.com/update?hostname=<HOST-NAME>&myip=<IPADDRESS> host-name test2.example.com username test password test update-interval 60 retry-interval 1 maximum-retries 5 ! interface eth1 encapsulation ppp 0 ! interface ppp0 ip ddns-update-method example ppp ipcp dns request keepalive ip address negotiated ppp username user@ispB ppp password isppasswdB ip tcp adjust-mss pmtu ! interface vlan1 ip address 192.168.20.1/24 ! zone private network lan ip subnet 192.168.20.0/24 network peer ip subnet 192.168.10.0/24 interface tunnel0 network tunnel ip subnet 172.16.0.0/30 ! zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0 ! application esp protocol 50 ! application isakmp protocol udp sport 500 dport 500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit dns from public.wan.ppp0 to public.wan rule 40 permit https from public.wan.ppp0 to public.wan rule 50 permit isakmp from public.wan.ppp0 to public.wan rule 60 permit isakmp from public.wan to public.wan.ppp0 rule 70 permit esp from public.wan.ppp0 to public.wan rule 80 permit esp from public.wan to public.wan.ppp0 protect ! nat rule 10 masq any from private to public enable ! crypto pki trustpoint vpn_trust enrollment terminal subject-name /CN=test2.example.com subject-alt-name test2.example.com ! crypto isakmp profile cert_vpn local authentication certificate remote authentication certificate pki trustpoint vpn_trust transform 1 integrity SHA256 encryption AES256 group 14 ! crypto isakmp peer hostname test1.example.com profile cert_vpn ! interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination test1.example.com tunnel local name test2.example.com tunnel remote name test1.example.com tunnel protection ipsec tunnel oper-status-control ipsec tunnel mode ipsec ipv4 ip address 172.16.0.2/30 ip tcp adjust-mss 1260 ! ip route 0.0.0.0/0 ppp0 ip route 192.168.10.0/24 tunnel0 ip route 192.168.10.0/24 Null 254 ! end
(C) 2019 - 2024 アライドテレシスホールディングス株式会社
PN: 613-002735 Rev.AD