[index] AT-AR2050V/AT-AR3050S/AT-AR4050S コマンドリファレンス 5.4.6
ISP接続用ユーザー名 | user@isp | ISP接続はNAT機器が行うため不要 |
ISP接続用パスワード | isppasswd | |
PPPoEサービス名 | 指定なし | |
WAN側IPアドレス | 10.0.0.1/32 | |
WAN側物理インターフェース | eth1 | eth1 |
WAN側(ppp0)IPアドレス | 接続時にISPから取得 | なし |
WAN側(eth1)IPアドレス | なし | 192.168.100.254/24 |
LAN側(vlan1)IPアドレス | 192.168.10.1/24 | 192.168.20.1/24 |
デフォルトゲートウェイ | ppp0 | 192.168.100.1(NAT機器) |
IKEバージョン・交換モード | ||
アルゴリズム | ||
ローカルID | 始点アドレス(デフォルト) | Client |
アルゴリズム |
no spanning-tree rstp enable |
interface eth1 encapsulation ppp 0 |
interface ppp0 keepalive ppp username user@isp ppp password isppasswd ip address 10.0.0.1/32 ip tcp adjust-mss pmtu |
interface vlan1 ip address 192.168.10.1/24 |
zone private network lan ip subnet 192.168.2.0/30 ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 |
zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.1 |
application esp protocol 50 |
application isakmp protocol udp dport 500 |
application nat-t protocol udp dport 4500 |
firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit isakmp from public.wan to public.wan.ppp0 rule 40 permit isakmp from public.wan.ppp0 to public.wan rule 50 permit esp from public.wan to public.wan.ppp0 rule 60 permit esp from public.wan.ppp0 to public.wan rule 70 permit nat-t from public.wan to public.wan.ppp0 protect |
nat rule 10 masq any from private to public enable |
crypto ipsec profile ipsec1 transform 1 protocol esp integrity SHA256 encryption AES128 |
crypto isakmp profile isakmp1 version 1 mode aggressive transform 1 integrity SHA256 encryption AES128 group 2 |
crypto isakmp key secret hostname Client |
crypto isakmp peer dynamic profile isakmp1 |
interface tunnel1 tunnel source ppp0 tunnel destination dynamic tunnel remote name Client tunnel protection ipsec profile ipsec1 tunnel mode ipsec ipv4 ip address 192.168.2.1/30 ip tcp adjust-mss 1260 mtu 1300 |
ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 tunnel1 ip route 192.168.20.0/24 Null 254 |
end |
no spanning-tree rstp enable |
interface eth1 ip address 192.168.100.254/24 |
interface vlan1 ip address 192.168.20.1/24 |
crypto ipsec profile ipsec1 transform 1 protocol esp integrity SHA256 encryption AES128 |
crypto isakmp profile isakmp1 version 1 mode aggressive transform 1 integrity SHA256 encryption AES128 group 2 |
crypto isakmp key secret address 10.0.0.1 |
crypto isakmp peer address 10.0.0.1 profile isakmp1 |
interface tunnel1 tunnel source eth1 tunnel destination 10.0.0.1 tunnel local name Client tunnel protection ipsec profile ipsec1 tunnel mode ipsec ipv4 ip address 192.168.2.2/30 ip tcp adjust-mss 1260 mtu 1300 |
ip route 0.0.0.0/0 eth1 ip route 192.168.10.0/24 tunnel1 ip route 192.168.10.0/24 Null 254 |
end |
awplus# copy running-config startup-config ↓ Building configuration... [OK] |
awplus# write memory ↓ Building configuration... [OK] |
awplus(config)# log buffered level informational program kernel msgtext Firewall ↓ |
awplus# show log | include firewall ↓ |
! no spanning-tree rstp enable ! interface eth1 encapsulation ppp 0 ! interface ppp0 keepalive ppp username user@isp ppp password isppasswd ip address 10.0.0.1/32 ip tcp adjust-mss pmtu ! interface vlan1 ip address 192.168.10.1/24 ! zone private network lan ip subnet 192.168.2.0/30 ip subnet 192.168.10.0/24 ip subnet 192.168.20.0/24 ! zone public network wan ip subnet 0.0.0.0/0 interface ppp0 host ppp0 ip address 10.0.0.1 ! application esp protocol 50 ! application isakmp protocol udp dport 500 ! application nat-t protocol udp dport 4500 ! firewall rule 10 permit any from private to private rule 20 permit any from private to public rule 30 permit isakmp from public.wan to public.wan.ppp0 rule 40 permit isakmp from public.wan.ppp0 to public.wan rule 50 permit esp from public.wan to public.wan.ppp0 rule 60 permit esp from public.wan.ppp0 to public.wan rule 70 permit nat-t from public.wan to public.wan.ppp0 protect ! nat rule 10 masq any from private to public enable ! crypto ipsec profile ipsec1 transform 1 protocol esp integrity SHA256 encryption AES128 ! crypto isakmp profile isakmp1 version 1 mode aggressive transform 1 integrity SHA256 encryption AES128 group 2 ! crypto isakmp key secret hostname Client ! crypto isakmp peer dynamic profile isakmp1 ! interface tunnel1 tunnel source ppp0 tunnel destination dynamic tunnel remote name Client tunnel protection ipsec profile ipsec1 tunnel mode ipsec ipv4 ip address 192.168.2.1/30 ip tcp adjust-mss 1260 mtu 1300 ! ip route 0.0.0.0/0 ppp0 ip route 192.168.20.0/24 tunnel1 ip route 192.168.20.0/24 Null 254 ! end |
! no spanning-tree rstp enable ! interface eth1 ip address 192.168.100.254/24 ! interface vlan1 ip address 192.168.20.1/24 ! crypto ipsec profile ipsec1 transform 1 protocol esp integrity SHA256 encryption AES128 ! crypto isakmp profile isakmp1 version 1 mode aggressive transform 1 integrity SHA256 encryption AES128 group 2 ! crypto isakmp key secret address 10.0.0.1 ! crypto isakmp peer address 10.0.0.1 profile isakmp1 ! interface tunnel1 tunnel source eth1 tunnel destination 10.0.0.1 tunnel local name Client tunnel protection ipsec profile ipsec1 tunnel mode ipsec ipv4 ip address 192.168.2.2/30 ip tcp adjust-mss 1260 mtu 1300 ! ip route 0.0.0.0/0 eth1 ip route 192.168.10.0/24 tunnel1 ip route 192.168.10.0/24 Null 254 ! end |
(C) 2015 - 2016 アライドテレシスホールディングス株式会社
PN: 613-002107 Rev.K