[index] AT-AR4000S-Cloud リファレンスマニュアル 5.5.3
(本製品) |
(AR4050S) |
|
接続用ユーザー名 | user01@ispA | user02@ispA |
接続用パスワード | isppasswdA-01 | isppasswdA-02 |
PPPoEサービス名 | 指定なし | 指定なし |
WAN側IPアドレス | 10.0.0.1 | 10.0.0.2 |
接続用ユーザー名 | user01@ispB | user02@ispB |
接続用パスワード | isppasswdB-01 | isppasswdB-02 |
PPPoEサービス名 | 指定なし | 指定なし |
WAN側IPアドレス | 10.1.0.1 | 10.1.0.2 |
WAN側物理インターフェース(1) | eth2 | eth1 |
WAN側物理インターフェース(2) | eth3 | eth2 |
WAN側IPアドレス(1) | 10.0.0.1/32 (ppp0) | 10.0.0.2/32 (ppp0) |
WAN側IPアドレス(2) | 10.1.0.1/32 (ppp1) | 10.1.0.2/32 (ppp1) |
LAN側IPアドレス(1) | 192.168.10.1/24 (eth0) | 192.168.11.1/24 (vlan11) |
LAN側IPアドレス(2) | 192.168.20.1/24 (eth1) | 192.168.21.1/24 (vlan21) |
IPsecトンネルIPアドレス(1) | 172.16.0.1/30 (tunnel0) | 172.16.0.2/30 (tunnel0) |
IPsecトンネルIPアドレス(2) | 172.17.0.5/30 (tunnel1) | 172.17.0.6/30 (tunnel1) |
eth0 | 192.168.10.1/24 | 管理用IPアドレス |
eth1 | 未設定 | |
eth2 | 未設定 | |
eth3 | 未設定 |
Note構成が異なる場合はインターフェース名などを適宜読み替えてください。
interface eth2 encapsulation ppp 0
interface eth3 encapsulation ppp 1
interface ppp0 keepalive ppp username user01@ispA ppp password isppasswdA-01 ip address 10.0.0.1/32 ip tcp adjust-mss pmtu
interface ppp1 keepalive ppp username user01@ispB ppp password isppasswdB-01 ip address 10.1.0.1/32 ip tcp adjust-mss pmtu
interface eth0 ip address 192.168.10.1/24
interface eth1 ip address 192.168.20.1/24
zone private network peer ip subnet 192.168.11.0/24 ip subnet 192.168.21.0/24 network tun ip subnet 172.16.0.0/30 ip subnet 172.16.0.4/30 network eth0 ip subnet 192.168.10.0/24 network eth1 ip subnet 192.168.20.0/24
zone public network eth2 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.1 network eth3 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.1
application esp protocol 50
application isakmp protocol udp dport 500
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit isakmp from public.eth2.ppp0 to public.eth2 rule 40 permit isakmp from public.eth2 to public.eth2.ppp0 rule 50 permit esp from public.eth2.ppp0 to public.eth2 rule 60 permit esp from public.eth2 to public.eth2.ppp0 rule 70 permit isakmp from public.eth3.ppp1 to public.eth3 rule 80 permit isakmp from public.eth3 to public.eth3.ppp1 rule 90 permit esp from public.eth3.ppp1 to public.eth3 rule 100 permit esp from public.eth3 to public.eth3.ppp1 protect
nat rule 10 masq any from private to public.eth2 with src public.eth2.ppp0 rule 20 masq any from private to public.eth3 with src public.eth3.ppp1 enable
crypto isakmp key secret1 address 10.0.0.2 crypto isakmp key secret2 address 10.1.0.2
linkmon probe name PROBE0 destination 172.16.0.2 egress interface tunnel0 source tunnel0 enable
linkmon probe name PROBE1 destination 172.16.0.6 egress interface tunnel1 source tunnel1 enable
linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1
linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss
policy-based-routing ip policy-route 20 from private.eth1 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable
interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.1/30 ip tcp adjust-mss 1260
interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.5/30 ip tcp adjust-mss 1260
ping-poll 1 ip 172.16.0.2 normal-interval 10 up-count 5 sample-size 10 active
trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp
ip route 10.0.0.2/32 ppp0 ip route 10.1.0.2/32 ppp1 ip route 192.168.11.0/24 tunnel0 ip route 192.168.11.0/24 tunnel1 10 ip route 192.168.11.0/24 Null 254 ip route 192.168.21.0/24 tunnel0 ip route 192.168.21.0/24 tunnel1 10 ip route 192.168.21.0/24 Null 254
end
no spanning-tree rstp enable
interface eth1 encapsulation ppp 0
interface eth2 encapsulation ppp 1
interface ppp0 keepalive ppp username user02@ispA ppp password isppasswdA-02 ip address 10.0.0.2/32 ip tcp adjust-mss pmtu
interface ppp1 keepalive ppp username user02@ispB ppp password isppasswdB-02 ip address 10.1.0.2/32 ip tcp adjust-mss pmtu
vlan database vlan 11,21 state enable
interface port1.0.1 switchport access vlan 11
interface port1.0.2 switchport access vlan 21
interface vlan11 ip address 192.168.11.1/24
interface vlan21 ip address 192.168.21.1/24
zone private network peer ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network tun ip subnet 172.16.0.0/30 interface tunnel0 ip subnet 172.16.0.4/30 interface tunnel1 network v11 ip subnet 192.168.11.0/24 network v21 ip subnet 192.168.21.0/24
zone public network eth1 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.2 network eth2 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.2
application esp protocol 50
application isakmp protocol udp dport 500
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit isakmp from public.eth1.ppp0 to public.eth1 rule 40 permit isakmp from public.eth1 to public.eth1.ppp0 rule 50 permit esp from public.eth1.ppp0 to public.eth1 rule 60 permit esp from public.eth1 to public.eth1.ppp0 rule 70 permit isakmp from public.eth2.ppp1 to public.eth2 rule 80 permit isakmp from public.eth2 to public.eth2.ppp1 rule 90 permit esp from public.eth2.ppp1 to public.eth2 rule 100 permit esp from public.eth2 to public.eth2.ppp1 protect
nat rule 10 masq any from private to public.eth1 with src public.eth1.ppp0 rule 20 masq any from private to public.eth2 with src public.eth2.ppp1 enable
crypto isakmp key secret1 address 10.0.0.1 crypto isakmp key secret2 address 10.1.0.1
linkmon probe name PROBE0 destination 172.16.0.1 egress interface tunnel0 source tunnel0 enable
linkmon probe name PROBE1 destination 172.16.0.5 egress interface tunnel1 source tunnel1 enable
linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1
linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss
policy-based-routing ip policy-route 20 from private.v21 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable
interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.2/30 ip tcp adjust-mss 1260
interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.6/30 ip tcp adjust-mss 1260
ping-poll 1 ip 172.16.0.1 normal-interval 10 up-count 5 sample-size 10 active
trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp
ip route 10.0.0.1/32 ppp0 ip route 10.1.0.1/32 ppp1 ip route 192.168.10.0/24 Null 254 ip route 192.168.10.0/24 tunnel1 10 ip route 192.168.10.0/24 tunnel0 ip route 192.168.20.0/24 Null 254 ip route 192.168.20.0/24 tunnel1 10 ip route 192.168.20.0/24 tunnel0
end
copy running-config startup-config
」の書式で実行します。awplus# copy running-config startup-config ↓ Building configuration... [OK]
awplus# write memory ↓ Building configuration... [OK]
awplus(config)# log buffered level informational facility local5 ↓
awplus# show log | include Firewall ↓
! interface eth2 encapsulation ppp 0 ! interface eth3 encapsulation ppp 1 ! interface ppp0 keepalive ppp username user01@ispA ppp password isppasswdA-01 ip address 10.0.0.1/32 ip tcp adjust-mss pmtu ! interface ppp1 keepalive ppp username user01@ispB ppp password isppasswdB-01 ip address 10.1.0.1/32 ip tcp adjust-mss pmtu ! interface eth0 ip address 192.168.10.1/24 ! interface eth1 ip address 192.168.20.1/24 ! zone private network peer ip subnet 192.168.11.0/24 ip subnet 192.168.21.0/24 network tun ip subnet 172.16.0.0/30 ip subnet 172.16.0.4/30 network eth0 ip subnet 192.168.10.0/24 network eth1 ip subnet 192.168.20.0/24 ! zone public network eth2 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.1 network eth3 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.1 ! application esp protocol 50 ! application isakmp protocol udp dport 500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit isakmp from public.eth2.ppp0 to public.eth2 rule 40 permit isakmp from public.eth2 to public.eth2.ppp0 rule 50 permit esp from public.eth2.ppp0 to public.eth2 rule 60 permit esp from public.eth2 to public.eth2.ppp0 rule 70 permit isakmp from public.eth3.ppp1 to public.eth3 rule 80 permit isakmp from public.eth3 to public.eth3.ppp1 rule 90 permit esp from public.eth3.ppp1 to public.eth3 rule 100 permit esp from public.eth3 to public.eth3.ppp1 protect ! nat rule 10 masq any from private to public.eth2 with src public.eth2.ppp0 rule 20 masq any from private to public.eth3 with src public.eth3.ppp1 enable ! crypto isakmp key secret1 address 10.0.0.2 crypto isakmp key secret2 address 10.1.0.2 ! linkmon probe name PROBE0 destination 172.16.0.2 egress interface tunnel0 source tunnel0 enable ! linkmon probe name PROBE1 destination 172.16.0.6 egress interface tunnel1 source tunnel1 enable ! linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1 ! linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss ! policy-based-routing ip policy-route 20 from private.eth1 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable ! interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.1/30 ip tcp adjust-mss 1260 ! interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.2 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.5/30 ip tcp adjust-mss 1260 ! ping-poll 1 ip 172.16.0.2 normal-interval 10 up-count 5 sample-size 10 active ! trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp ! ip route 10.0.0.2/32 ppp0 ip route 10.1.0.2/32 ppp1 ip route 192.168.11.0/24 tunnel0 ip route 192.168.11.0/24 tunnel1 10 ip route 192.168.11.0/24 Null 254 ip route 192.168.21.0/24 tunnel0 ip route 192.168.21.0/24 tunnel1 10 ip route 192.168.21.0/24 Null 254 ! end
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 ! interface eth2 encapsulation ppp 1 ! interface ppp0 keepalive ppp username user02@ispA ppp password isppasswdA-02 ip address 10.0.0.2/32 ip tcp adjust-mss pmtu ! interface ppp1 keepalive ppp username user02@ispB ppp password isppasswdB-02 ip address 10.1.0.2/32 ip tcp adjust-mss pmtu ! vlan database vlan 11,21 state enable ! interface port1.0.1 switchport access vlan 11 ! interface port1.0.2 switchport access vlan 21 ! interface vlan11 ip address 192.168.11.1/24 ! interface vlan21 ip address 192.168.21.1/24 ! zone private network peer ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 network tun ip subnet 172.16.0.0/30 interface tunnel0 ip subnet 172.16.0.4/30 interface tunnel1 network v11 ip subnet 192.168.11.0/24 network v21 ip subnet 192.168.21.0/24 ! zone public network eth1 ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.2 network eth2 ip subnet 0.0.0.0/0 interface ppp1 host ppp1 ip address 10.1.0.2 ! application esp protocol 50 ! application isakmp protocol udp dport 500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit isakmp from public.eth1.ppp0 to public.eth1 rule 40 permit isakmp from public.eth1 to public.eth1.ppp0 rule 50 permit esp from public.eth1.ppp0 to public.eth1 rule 60 permit esp from public.eth1 to public.eth1.ppp0 rule 70 permit isakmp from public.eth2.ppp1 to public.eth2 rule 80 permit isakmp from public.eth2 to public.eth2.ppp1 rule 90 permit esp from public.eth2.ppp1 to public.eth2 rule 100 permit esp from public.eth2 to public.eth2.ppp1 protect ! nat rule 10 masq any from private to public.eth1 with src public.eth1.ppp0 rule 20 masq any from private to public.eth2 with src public.eth2.ppp1 enable ! crypto isakmp key secret1 address 10.0.0.1 crypto isakmp key secret2 address 10.1.0.1 ! linkmon probe name PROBE0 destination 172.16.0.1 egress interface tunnel0 source tunnel0 enable ! linkmon probe name PROBE1 destination 172.16.0.5 egress interface tunnel1 source tunnel1 enable ! linkmon group probegroup member 10 destination tunnel0 probe PROBE0 member 20 destination tunnel1 probe PROBE1 ! linkmon profile probequality latency bad-above 100 jitter bad-above 30 pktloss bad-above 10.0 preference pktloss ! policy-based-routing ip policy-route 20 from private.v21 to private.peer linkmon-group probegroup linkmon-profile probequality policy-based-routing enable ! interface tunnel0 mtu 1300 tunnel source ppp0 tunnel destination 10.0.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.2/30 ip tcp adjust-mss 1260 ! interface tunnel1 mtu 1300 tunnel source ppp1 tunnel destination 10.1.0.1 tunnel protection ipsec tunnel mode ipsec ipv4 ip address 172.16.0.6/30 ip tcp adjust-mss 1260 ! ping-poll 1 ip 172.16.0.1 normal-interval 10 up-count 5 sample-size 10 active ! trigger 1 type ping-poll 1 down script 1 flash:/pingdown.scp trigger 2 type ping-poll 1 up script 1 flash:/pingup.scp ! ip route 10.0.0.1/32 ppp0 ip route 10.1.0.1/32 ppp1 ip route 192.168.10.0/24 Null 254 ip route 192.168.10.0/24 tunnel1 10 ip route 192.168.10.0/24 tunnel0 ip route 192.168.20.0/24 Null 254 ip route 192.168.20.0/24 tunnel1 10 ip route 192.168.20.0/24 tunnel0 ! end
enable configure terminal no ip route 192.168.11.0/24 tunnel0 no ip route 192.168.21.0/24 tunnel0 end
enable configure terminal ip route 192.168.11.0/24 tunnel0 ip route 192.168.21.0/24 tunnel0 end
enable configure terminal no ip route 192.168.10.0/24 tunnel0 no ip route 192.168.20.0/24 tunnel0 end
enable configure terminal ip route 192.168.10.0/24 tunnel0 ip route 192.168.20.0/24 tunnel0 end
(C) 2022 - 2024 アライドテレシスホールディングス株式会社
PN: 613-003066 Rev.H