[index] AT-AR2050V/AT-AR3050S/AT-AR4050S コマンドリファレンス 5.5.0
NoteAMFマスター機能を使用するにはAMFマスターライセンスが必要です。
NoteAMFマスター機能はAT-AR4050Sでのみ利用可能です。
NoteAT-AR4050Sは外部メディアとしてUSBメモリーとSDHCカードの両方をサポートしていますが、AMFバックアップ機能においてはSDHCカードのみ使用可能です。
AMFネットワーク名 | AMF001 | ||
AMFマスター | ルーターC | ||
AMFバックアップ用外部メディア | SDHCカード | ||
AMF仮想リンク | ルーターA・C間:192.168.10.1(ルーターA:AMFメンバー) - 192.168.100.2(ルーターC:AMFマスター) | ||
ルーターB・C間:192.168.10.2(ルーターB:AMFメンバー) - 192.168.100.2(ルーターC:AMFマスター) | |||
※ルーターA・Bのうち、VRRPマスタールーターとして動作しているほうが実際にAMF仮想リンクの接続を行います。 (VRRPバックアップルーターとして動作しているほうのAMF仮想リンクはブロックとなります) |
|||
(AT-AR4050S) |
|||
(実際に接続するのはVRRPマスターのみ) |
|||
ISP接続用ユーザー名 | user@isp1(共通) | user@isp2 | |
ISP接続用パスワード | isppasswd1(共通) | isppasswd2 | |
PPPoEサービス名 | 指定なし(共通) | 指定なし | |
WAN側IPアドレス | 10.0.0.1/32(共通) | 10.0.0.2/32 | |
DNSサーバーIPアドレス | 自動取得(IPCP)(共通) | 自動取得(IPCP) | |
WAN側物理インターフェース | eth1 | eth1 | eth1 |
WAN側(ppp0)IPアドレス | 10.0.0.1/32(VRRPマスター側でのみ有効) | 10.0.0.2/32 | |
LAN側(vlan1)IPアドレス | 192.168.10.1/24 | 192.168.10.2/24 | 192.168.30.1/24 |
NoteルーターA/Bのうち、VRRPマスタールーターとして動作しているほうが実際にIPsec接続を行います。
no spanning-tree rstp enable
interface eth1 encapsulation ppp 0
interface ppp0 ppp ipcp dns request keepalive ip address negotiated ppp username user@isp1 ppp password isppasswd1 ip tcp adjust-mss pmtu
vlan database vlan 10 state enable
hostname RouterA
atmf network-name AMF001
atmf virtual-link id 1 ip 192.168.10.1 remote-id 1 remote-ip 192.168.100.2
interface port1.0.1 switchport switchport atmf-crosslink switchport mode trunk switchport trunk allowed vlan add 10
interface vlan10 ip address 192.168.10.1/24
router vrrp 10 vlan10 virtual-ip 192.168.10.100 backup circuit-failover eth1 2 priority 101 ha associate enable
zone private network lan ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network peer ip subnet 192.168.30.0/24 network tunnel ip subnet 192.168.100.0/30 network vrrp ip subnet 224.0.0.18/32
zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0
application esp protocol 50
application isakmp protocol udp sport 500 dport 500
firewall rule 10 permit isakmp from public.wan.ppp0 to public.wan rule 20 permit isakmp from public.wan to public.wan.ppp0 rule 30 permit esp from public.wan.ppp0 to public.wan rule 40 permit esp from public.wan to public.wan.ppp0 rule 50 permit any from private to private rule 60 permit any from private to public rule 70 permit dns from public.wan.ppp0 to public.wan protect
nat rule 10 masq any from private to public enable
crypto isakmp key secret address 10.0.0.2
interface tunnel0 ip address 192.168.100.1/30 tunnel source 10.0.0.1 tunnel destination 10.0.0.2 tunnel mode ipsec ipv4 tunnel protection ipsec ip tcp adjust-mss 1260 mtu 1300
ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 192.168.10.10 ip route 192.168.30.0/24 tunnel0 ip route 192.168.30.0/24 Null 254
ip dns forwarding
end
no spanning-tree rstp enable
interface eth1 encapsulation ppp 0
interface ppp0 ppp ipcp dns request keepalive ip address negotiated ppp username user@isp1 ppp password isppasswd1 ip tcp adjust-mss pmtu
vlan database vlan 10 state enable
hostname RouterB
atmf network-name AMF001
atmf virtual-link id 1 ip 192.168.10.2 remote-id 2 remote-ip 192.168.100.2
interface port1.0.1 switchport switchport atmf-crosslink switchport mode trunk switchport trunk allowed vlan add 10
interface vlan10 ip address 192.168.10.2/24
router vrrp 10 vlan10 virtual-ip 192.168.10.100 backup ha associate wan-bypass 1 enable
zone private network lan ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network peer ip subnet 192.168.30.0/24 network tunnel ip subnet 192.168.100.0/30 network vrrp ip subnet 224.0.0.18/32
zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0
application esp protocol 50
application isakmp protocol udp sport 500 dport 500
firewall rule 10 permit isakmp from public.wan.ppp0 to public.wan rule 20 permit isakmp from public.wan to public.wan.ppp0 rule 30 permit esp from public.wan.ppp0 to public.wan rule 40 permit esp from public.wan to public.wan.ppp0 rule 50 permit any from private to private rule 60 permit any from private to public rule 70 permit dns from public.wan.ppp0 to public.wan protect
nat rule 10 masq any from private to public enable
crypto isakmp key secret address 10.0.0.2
interface tunnel0 ip address 192.168.100.1/30 tunnel source 10.0.0.1 tunnel destination 10.0.0.2 tunnel mode ipsec ipv4 tunnel protection ipsec ip tcp adjust-mss 1260 mtu 1300
ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 192.168.10.10 ip route 192.168.30.0/24 tunnel0 ip route 192.168.30.0/24 Null 254
ip dns forwarding
end
no spanning-tree rstp enable
interface eth1 encapsulation ppp 0
interface ppp0 ppp ipcp dns request keepalive ip address negotiated ppp username user@isp2 ppp password isppasswd2 ip tcp adjust-mss pmtu
vlan database vlan 30 state enable
hostname RouterC
atmf network-name AMF001 atmf master
atmf virtual-link id 1 ip 192.168.100.2 remote-id 1 remote-ip 192.168.10.1 atmf virtual-link id 2 ip 192.168.100.2 remote-id 1 remote-ip 192.168.10.2
interface port1.0.1-1.0.8 switchport switchport mode access switchport access vlan 30
interface vlan30 ip address 192.168.30.1/24
zone private network lan ip subnet 192.168.30.0/24 network peer ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network tunnel ip subnet 192.168.100.0/30
zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0
application esp protocol 50
application isakmp protocol udp sport 500 dport 500
firewall rule 10 permit isakmp from public.wan.ppp0 to public.wan rule 20 permit isakmp from public.wan to public.wan.ppp0 rule 30 permit esp from public.wan.ppp0 to public.wan rule 40 permit esp from public.wan to public.wan.ppp0 rule 50 permit any from private to private rule 60 permit any from private to public rule 70 permit dns from public.wan.ppp0 to public.wan protect
nat rule 10 masq any from private to public enable
crypto isakmp key secret address 10.0.0.1
interface tunnel0 ip address 192.168.100.2/30 tunnel source 10.0.0.2 tunnel destination 10.0.0.1 tunnel mode ipsec ipv4 tunnel protection ipsec ip tcp adjust-mss 1260 mtu 1300
ip route 0.0.0.0/0 ppp0 ip route 192.168.10.0/24 tunnel0 ip route 192.168.10.0/24 Null 254 ip route 192.168.20.0/24 tunnel0 ip route 192.168.20.0/24 Null 254
ip dns forwarding
end
copy running-config startup-config
」の書式で実行します。awplus# copy running-config startup-config ↓ Building configuration... [OK]
awplus# write memory ↓ Building configuration... [OK]
awplus(config)# log buffered level informational facility kern msgtext Firewall ↓
awplus# show log | include Firewall ↓
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 ! interface ppp0 ppp ipcp dns request keepalive ip address negotiated ppp username user@isp1 ppp password isppasswd1 ip tcp adjust-mss pmtu ! vlan database vlan 10 state enable ! hostname RouterA ! atmf network-name AMF001 ! atmf virtual-link id 1 ip 192.168.10.1 remote-id 1 remote-ip 192.168.100.2 ! interface port1.0.1 switchport switchport atmf-crosslink switchport mode trunk switchport trunk allowed vlan add 10 ! interface vlan10 ip address 192.168.10.1/24 ! router vrrp 10 vlan10 virtual-ip 192.168.10.100 backup circuit-failover eth1 2 priority 101 ha associate enable ! zone private network lan ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network peer ip subnet 192.168.30.0/24 network tunnel ip subnet 192.168.100.0/30 network vrrp ip subnet 224.0.0.18/32 ! zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0 ! application esp protocol 50 ! application isakmp protocol udp sport 500 dport 500 ! firewall rule 10 permit isakmp from public.wan.ppp0 to public.wan rule 20 permit isakmp from public.wan to public.wan.ppp0 rule 30 permit esp from public.wan.ppp0 to public.wan rule 40 permit esp from public.wan to public.wan.ppp0 rule 50 permit any from private to private rule 60 permit any from private to public rule 70 permit dns from public.wan.ppp0 to public.wan protect ! nat rule 10 masq any from private to public enable ! crypto isakmp key secret address 10.0.0.2 ! interface tunnel0 ip address 192.168.100.1/30 tunnel source 10.0.0.1 tunnel destination 10.0.0.2 tunnel mode ipsec ipv4 tunnel protection ipsec ip tcp adjust-mss 1260 mtu 1300 ! ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 192.168.10.10 ip route 192.168.30.0/24 tunnel0 ip route 192.168.30.0/24 Null 254 ! ip dns forwarding ! end
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 ! interface ppp0 ppp ipcp dns request keepalive ip address negotiated ppp username user@isp1 ppp password isppasswd1 ip tcp adjust-mss pmtu ! vlan database vlan 10 state enable ! hostname RouterB ! atmf network-name AMF001 ! atmf virtual-link id 1 ip 192.168.10.2 remote-id 2 remote-ip 192.168.100.2 ! interface port1.0.1 switchport switchport atmf-crosslink switchport mode trunk switchport trunk allowed vlan add 10 ! interface vlan10 ip address 192.168.10.2/24 ! router vrrp 10 vlan10 virtual-ip 192.168.10.100 backup ha associate wan-bypass 1 enable ! zone private network lan ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network peer ip subnet 192.168.30.0/24 network tunnel ip subnet 192.168.100.0/30 network vrrp ip subnet 224.0.0.18/32 ! zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0 ! application esp protocol 50 ! application isakmp protocol udp sport 500 dport 500 ! firewall rule 10 permit isakmp from public.wan.ppp0 to public.wan rule 20 permit isakmp from public.wan to public.wan.ppp0 rule 30 permit esp from public.wan.ppp0 to public.wan rule 40 permit esp from public.wan to public.wan.ppp0 rule 50 permit any from private to private rule 60 permit any from private to public rule 70 permit dns from public.wan.ppp0 to public.wan protect ! nat rule 10 masq any from private to public enable ! crypto isakmp key secret address 10.0.0.2 ! interface tunnel0 ip address 192.168.100.1/30 tunnel source 10.0.0.1 tunnel destination 10.0.0.2 tunnel mode ipsec ipv4 tunnel protection ipsec ip tcp adjust-mss 1260 mtu 1300 ! ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 192.168.10.10 ip route 192.168.30.0/24 tunnel0 ip route 192.168.30.0/24 Null 254 ! ip dns forwarding ! end
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 ! interface ppp0 ppp ipcp dns request keepalive ip address negotiated ppp username user@isp2 ppp password isppasswd2 ip tcp adjust-mss pmtu ! vlan database vlan 30 state enable ! hostname RouterC ! atmf network-name AMF001 atmf master ! atmf virtual-link id 1 ip 192.168.100.2 remote-id 1 remote-ip 192.168.10.1 atmf virtual-link id 2 ip 192.168.100.2 remote-id 1 remote-ip 192.168.10.2 ! interface port1.0.1-1.0.8 switchport switchport mode access switchport access vlan 30 ! interface vlan30 ip address 192.168.30.1/24 ! zone private network lan ip subnet 192.168.30.0/24 network peer ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network tunnel ip subnet 192.168.100.0/30 ! zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address dynamic interface ppp0 ! application esp protocol 50 ! application isakmp protocol udp sport 500 dport 500 ! firewall rule 10 permit isakmp from public.wan.ppp0 to public.wan rule 20 permit isakmp from public.wan to public.wan.ppp0 rule 30 permit esp from public.wan.ppp0 to public.wan rule 40 permit esp from public.wan to public.wan.ppp0 rule 50 permit any from private to private rule 60 permit any from private to public rule 70 permit dns from public.wan.ppp0 to public.wan protect ! nat rule 10 masq any from private to public enable ! crypto isakmp key secret address 10.0.0.1 ! interface tunnel0 ip address 192.168.100.2/30 tunnel source 10.0.0.2 tunnel destination 10.0.0.1 tunnel mode ipsec ipv4 tunnel protection ipsec ip tcp adjust-mss 1260 mtu 1300 ! ip route 0.0.0.0/0 ppp0 ip route 192.168.10.0/24 tunnel0 ip route 192.168.10.0/24 Null 254 ip route 192.168.20.0/24 tunnel0 ip route 192.168.20.0/24 Null 254 ! ip dns forwarding ! end
(C) 2015 - 2020 アライドテレシスホールディングス株式会社
PN: 613-002107 Rev.AJ