[index] AT-AR3050S/AT-AR4050S/AT-AR4050S-5G コマンドリファレンス 5.5.3
接続用ユーザー名 | user01@ispA | user02@ispA |
接続用パスワード | isppasswdA-01 | isppasswdA-02 |
PPPoEサービス名 | 指定なし | 指定なし |
WAN側IPアドレス | 10.0.0.1 | 10.0.0.2 |
接続用ユーザー名 | user01@ispB | user02@ispB |
接続用パスワード | isppasswdB-01 | isppasswdB-02 |
PPPoEサービス名 | 指定なし | 指定なし |
WAN側IPアドレス | 10.1.0.1 | 10.1.0.2 |
WAN側物理インターフェース | eth1 | eth1 |
WAN側IPアドレス(1) | 10.0.0.1/32 (ppp0) | 10.0.0.2/32 (ppp0) |
WAN側IPアドレス(2) | 10.1.0.1/32 (ppp1) | 10.1.0.2/32 (ppp1) |
LAN側IPアドレス(1) | 192.168.10.1/24 (vlan10) | 192.168.11.1/24 (vlan11) |
LAN側IPアドレス(2) | 192.168.20.1/24 (vlan20) | 192.168.21.1/24 (vlan21) |
IPsecトンネルIPアドレス(1) | 172.16.0.1/30 (tunnel0) | 172.16.0.2/30 (tunnel0) |
IPsecトンネルIPアドレス(2) | 172.16.0.5/30 (tunnel1) | 172.16.0.6/30 (tunnel1) |
no spanning-tree rstp enable
interface eth1 encapsulation ppp 0 encapsulation ppp 1
interface ppp0 keepalive ppp username user01@ispA ppp password isppasswdA-01 ip address 10.0.0.1/32 ip tcp adjust-mss pmtu
interface ppp1 keepalive ppp username user01@ispB ppp password isppasswdB-01 ip address 10.1.0.1/32 ip tcp adjust-mss pmtu
vlan database vlan 10,20 state enable
interface port1.0.1 switchport access vlan 10
interface port1.0.2 switchport access vlan 20
interface vlan10 ip address 192.168.10.1/24
interface vlan20 ip address 192.168.20.1/24
zone private network peer ip subnet 192.168.11.0/24 ip subnet 192.168.21.0/24 network tun ip subnet 172.16.0.0/30 interface tunnel0 ip subnet 172.16.0.4/30 interface tunnel1 network v10 ip subnet 192.168.10.0/24 network v20 ip subnet 192.168.20.0/24
zone public network wan1 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.1 network wan2 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.1
application esp protocol 50
application isakmp protocol udp dport 500
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit any from public.wan1.ppp0 to public.wan1 rule 40 permit isakmp from public.wan1 to public.wan1.ppp0 rule 50 permit esp from public.wan1 to public.wan1.ppp0 rule 60 permit any from public.wan2.ppp1 to public.wan2 rule 70 permit isakmp from public.wan2 to public.wan2.ppp1 rule 80 permit esp from public.wan2 to public.wan2.ppp1 protect
nat rule 10 masq any from private to public.wan1 with src public.wan1.ppp0 rule 20 masq any from private to public.wan2 with src public.wan2.ppp1 enable
crypto isakmp key secret1 address 10.0.0.2 crypto isakmp key secret2 address 10.1.0.2
linkmon probe name PROBE0 destination 172.16.0.2 egress interface tunnel0 source tunnel0 enable
linkmon probe name PROBE1 destination 172.16.0.6 egress interface tunnel1 source tunnel1 enable
linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1
linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss
policy-based-routing ip policy-route 20 from private.v20 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable
interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.1/30 ip tcp adjust-mss 1260
interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.5/30 ip tcp adjust-mss 1260
ping-poll 1 ip 172.16.0.2 normal-interval 10 up-count 5 sample-size 10 active
trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp
ip route 10.0.0.2/32 ppp0 ip route 10.1.0.2/32 ppp1 ip route 192.168.11.0/24 tunnel0 ip route 192.168.11.0/24 tunnel1 10 ip route 192.168.11.0/24 Null 254 ip route 192.168.21.0/24 tunnel0 ip route 192.168.21.0/24 tunnel1 10 ip route 192.168.21.0/24 Null 254
end
no spanning-tree rstp enable
interface eth1 encapsulation ppp 0 encapsulation ppp 1
interface ppp0 keepalive ppp username user02@ispA ppp password isppasswdA-02 ip address 10.0.0.2/32 ip tcp adjust-mss pmtu
interface ppp1 keepalive ppp username user02@ispB ppp password isppasswdB-02 ip address 10.1.0.2/32 ip tcp adjust-mss pmtu
vlan database vlan 11,21 state enable
interface port1.0.1 switchport access vlan 11
interface port1.0.2 switchport access vlan 21
interface vlan11 ip address 192.168.11.1/24
interface vlan21 ip address 192.168.21.1/24
zone private network peer ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network tun ip subnet 172.16.0.0/30 interface tunnel0 ip subnet 172.16.0.4/30 interface tunnel1 network v11 ip subnet 192.168.11.0/24 network v21 ip subnet 192.168.21.0/24
zone public network wan1 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.2 network wan2 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.2
application esp protocol 50
application isakmp protocol udp dport 500
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit any from public.wan1.ppp0 to public.wan1 rule 40 permit isakmp from public.wan1 to public.wan1.ppp0 rule 50 permit esp from public.wan1 to public.wan1.ppp0 rule 60 permit any from public.wan2.ppp1 to public.wan2 rule 70 permit isakmp from public.wan2 to public.wan2.ppp1 rule 80 permit esp from public.wan2 to public.wan2.ppp1 protect
nat rule 10 masq any from private to public.wan1 with src public.wan1.ppp0 rule 20 masq any from private to public.wan2 with src public.wan2.ppp1 enable
crypto isakmp key secret1 address 10.0.0.1 crypto isakmp key secret2 address 10.1.0.1
linkmon probe name PROBE0 destination 172.16.0.1 egress interface tunnel0 source tunnel0 enable
linkmon probe name PROBE1 destination 172.16.0.5 egress interface tunnel1 source tunnel1 enable
linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1
linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss
policy-based-routing ip policy-route 20 from private.v21 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable
interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.2/30 ip tcp adjust-mss 1260
interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.6/30 ip tcp adjust-mss 1260
ping-poll 1 ip 172.16.0.1 normal-interval 10 up-count 5 sample-size 10 active
trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp
ip route 10.0.0.1/32 ppp0 ip route 10.1.0.1/32 ppp1 ip route 192.168.10.0/24 Null 254 ip route 192.168.10.0/24 tunnel1 10 ip route 192.168.10.0/24 tunnel0 ip route 192.168.20.0/24 Null 254 ip route 192.168.20.0/24 tunnel1 10 ip route 192.168.20.0/24 tunnel0
end
copy running-config startup-config
」の書式で実行します。awplus# copy running-config startup-config ↓ Building configuration... [OK]
awplus# write memory ↓ Building configuration... [OK]
awplus(config)# log buffered level informational facility local5 ↓
awplus# show log | include Firewall ↓
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 encapsulation ppp 1 ! interface ppp0 keepalive ppp username user01@ispA ppp password isppasswdA-01 ip address 10.0.0.1/32 ip tcp adjust-mss pmtu ! interface ppp1 keepalive ppp username user01@ispB ppp password isppasswdB-01 ip address 10.1.0.1/32 ip tcp adjust-mss pmtu ! vlan database vlan 10,20 state enable ! interface port1.0.1 switchport access vlan 10 ! interface port1.0.2 switchport access vlan 20 ! interface vlan10 ip address 192.168.10.1/24 ! interface vlan20 ip address 192.168.20.1/24 ! zone private network peer ip subnet 192.168.11.0/24 ip subnet 192.168.21.0/24 network tun ip subnet 172.16.0.0/30 interface tunnel0 ip subnet 172.16.0.4/30 interface tunnel1 network v10 ip subnet 192.168.10.0/24 network v20 ip subnet 192.168.20.0/24 ! zone public network wan1 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.1 network wan2 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.1 ! application esp protocol 50 ! application isakmp protocol udp dport 500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit any from public.wan1.ppp0 to public.wan1 rule 40 permit isakmp from public.wan1 to public.wan1.ppp0 rule 50 permit esp from public.wan1 to public.wan1.ppp0 rule 60 permit any from public.wan2.ppp1 to public.wan2 rule 70 permit isakmp from public.wan2 to public.wan2.ppp1 rule 80 permit esp from public.wan2 to public.wan2.ppp1 protect ! nat rule 10 masq any from private to public.wan1 with src public.wan1.ppp0 rule 20 masq any from private to public.wan2 with src public.wan2.ppp1 enable ! crypto isakmp key secret1 address 10.0.0.2 crypto isakmp key secret2 address 10.1.0.2 ! linkmon probe name PROBE0 destination 172.16.0.2 egress interface tunnel0 source tunnel0 enable ! linkmon probe name PROBE1 destination 172.16.0.6 egress interface tunnel1 source tunnel1 enable ! linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1 ! linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss ! policy-based-routing ip policy-route 20 from private.v20 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable ! interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.1/30 ip tcp adjust-mss 1260 ! interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.5/30 ip tcp adjust-mss 1260 ! ping-poll 1 ip 172.16.0.2 normal-interval 10 up-count 5 sample-size 10 active ! trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp ! ip route 10.0.0.2/32 ppp0 ip route 10.1.0.2/32 ppp1 ip route 192.168.11.0/24 tunnel0 ip route 192.168.11.0/24 tunnel1 10 ip route 192.168.11.0/24 Null 254 ip route 192.168.21.0/24 tunnel0 ip route 192.168.21.0/24 tunnel1 10 ip route 192.168.21.0/24 Null 254 ! end
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 encapsulation ppp 1 ! interface ppp0 keepalive ppp username user02@ispA ppp password isppasswdA-02 ip address 10.0.0.2/32 ip tcp adjust-mss pmtu ! interface ppp1 keepalive ppp username user02@ispB ppp password isppasswdB-02 ip address 10.1.0.2/32 ip tcp adjust-mss pmtu ! vlan database vlan 11,21 state enable ! interface port1.0.1 switchport access vlan 11 ! interface port1.0.2 switchport access vlan 21 ! interface vlan11 ip address 192.168.11.1/24 ! interface vlan21 ip address 192.168.21.1/24 ! zone private network peer ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network tun ip subnet 172.16.0.0/30 interface tunnel0 ip subnet 172.16.0.4/30 interface tunnel1 network v11 ip subnet 192.168.11.0/24 network v21 ip subnet 192.168.21.0/24 ! zone public network wan1 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.2 network wan2 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.2 ! application esp protocol 50 ! application isakmp protocol udp dport 500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit any from public.wan1.ppp0 to public.wan1 rule 40 permit isakmp from public.wan1 to public.wan1.ppp0 rule 50 permit esp from public.wan1 to public.wan1.ppp0 rule 60 permit any from public.wan2.ppp1 to public.wan2 rule 70 permit isakmp from public.wan2 to public.wan2.ppp1 rule 80 permit esp from public.wan2 to public.wan2.ppp1 protect ! nat rule 10 masq any from private to public.wan1 with src public.wan1.ppp0 rule 20 masq any from private to public.wan2 with src public.wan2.ppp1 enable ! crypto isakmp key secret1 address 10.0.0.1 crypto isakmp key secret2 address 10.1.0.1 ! linkmon probe name PROBE0 destination 172.16.0.1 egress interface tunnel0 source tunnel0 enable ! linkmon probe name PROBE1 destination 172.16.0.5 egress interface tunnel1 source tunnel1 enable ! linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1 ! linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss ! policy-based-routing ip policy-route 20 from private.v21 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable ! interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.2/30 ip tcp adjust-mss 1260 ! interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.6/30 ip tcp adjust-mss 1260 ! ping-poll 1 ip 172.16.0.1 normal-interval 10 up-count 5 sample-size 10 active ! trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp ! ip route 10.0.0.1/32 ppp0 ip route 10.1.0.1/32 ppp1 ip route 192.168.10.0/24 Null 254 ip route 192.168.10.0/24 tunnel1 10 ip route 192.168.10.0/24 tunnel0 ip route 192.168.20.0/24 Null 254 ip route 192.168.20.0/24 tunnel1 10 ip route 192.168.20.0/24 tunnel0 ! end
enable configure terminal no ip route 192.168.11.0/24 tunnel0 no ip route 192.168.21.0/24 tunnel0 end
enable configure terminal ip route 192.168.11.0/24 tunnel0 ip route 192.168.21.0/24 tunnel0 end
enable configure terminal no ip route 192.168.10.0/24 tunnel0 no ip route 192.168.20.0/24 tunnel0 end
enable configure terminal ip route 192.168.10.0/24 tunnel0 ip route 192.168.20.0/24 tunnel0 end
(C) 2015 - 2023 アライドテレシスホールディングス株式会社
PN: 613-002107 Rev.AY