<前頁 次頁> << >> ↓ 目次 (番号順 (詳細)・ 回線別 (詳細)・ 機能別 (詳細))
CentreCOM ARX640S 設定例集 5.1.5 #21
センター側のルーターでは、PPPoEセッションを2本使い、拠点間通信にCUG(Closed Users Group)サービス(フレッツ・VPNワイド、フレッツ・グループアクセス(NTT東日本)、フレッツ・グループ(NTT西日本)など)を利用し、バックアップ回線としてインターネットVPNを利用するネットワークを構築します。拠点側では拠点間通信にCUGサービスを利用し、バックアップ回線として移動体データ通信サービスでのVPNを利用するネットワークを構築します。
| PPPユーザー名 | center@isp | user@3gnet.co.jp |
| PPPパスワード | centpass | 3gpasswd |
| アクセスポイント名 | 指定なし | 3gnet.co.jp |
| CID | - | 10 |
| IPアドレス | 200.100.10.1/32 | 動的割り当て |
| DNSサーバー | 接続時に通知される | |
| PPPユーザー名 | center | branch |
| PPPパスワード | passwdA | passwdB |
| PPPoEサービス名 | 指定なし | |
| 使用できるIPアドレス | 動的割り当て(172.16.0.1/32固定) | 動的割り当て(172.16.0.2/32固定) |
| 接続形態 | 端末型 | |
| WAN側物理インターフェース | gigabitEthernet 0 | gigabitEthernet 1 | gigabitEthernet 0 | usb 0 |
| WAN側IPアドレス | 172.16.0.1/32 | 200.100.10.1/32 | 172.16.0.2/32 | 動的割り当て |
| LAN側(vlan 1)IPアドレス | 192.168.10.1/24 | 192.168.20.1/24 | ||
| VPN接続設定 | ||||
| ローカルセキュアグループ | 0.0.0.0/0 | 192.168.20.0/24 | ||
| リモートセキュアグループ | 192.168.20.0/24 | 0.0.0.0/0 | ||
| トンネル終端アドレス | 172.16.0.2/32 | 不定 | 172.16.0.1/32 | 200.100.10.1/32 |
| IKE設定 | ||||
| 交換モード | Aggressiveモード | |||
| 認証方式 | 事前共有鍵(pre-shared key) | |||
| 事前共有鍵 | secret(文字列) | |||
| ローカルID/リモートID | なし/client | client/なし | ||
| 暗号化認証アルゴリズム | 3DES & SHA1-DH2 | |||
| 有効期限 | 21600秒(6時間)(デフォルト) | |||
| DPDによる死活監視 | 行わない | |||
| 起動時のISAKMPネゴシエーション | 行わない | 行う | 行わない | |
| IPsec設定 | ||||
| SAモード | トンネルモード | |||
| セキュリティープロトコル | ESP | |||
| 暗号化認証アルゴリズム | 3DES & SHA1 | |||
| PFSグループ | なし | |||
| 有効期限 | 3600秒(1時間)(デフォルト) | |||


| ルーターAの設定 |
ppp profile pppoe0 ↓
my-username center password passwdA ↓
interface gigabitEthernet 0 ↓
no shutdown ↓
interface gigabitEthernet 0.1 ↓
ip address ipcp ↓
ip tcp mss auto ↓
no shutdown ↓
pppoe enable ↓
ppp bind-profile pppoe0 ↓
ppp profile pppoe1 ↓
my-username center@isp password centpass ↓
interface gigabitEthernet 1 ↓
no shutdown ↓
interface gigabitEthernet 1.1 ↓
ip address 200.100.10.1/32 ↓
ip tcp mss auto ↓
no shutdown ↓
pppoe enable ↓
ppp bind-profile pppoe1 ↓
ip napt inside any ↓
ip ids in protect ↓
interface vlan 1 ↓
ip address 192.168.10.1/24 ↓
ip address-up-always ↓
ip route default gigabitEthernet 1.1 ↓
ip route 172.16.0.2/32 gigabitEthernet 0.1 ↓
ip route 172.16.0.2/32 Null 254 ↓
access-list ip extended pppoe1-in ↓
dynamic permit udp any interface gigabitEthernet 1.1 eq 500 ↓
access-list ip extended pppoe1-out ↓
dynamic permit ip any any ↓
interface gigabitEthernet 1.1 ↓
ip traffic-filter pppoe1-in in ↓
ip traffic-filter pppoe1-out out ↓
isakmp proposal isakmp encryption 3des hash sha1 group 2 ↓
isakmp policy i ↓
peer any ↓
mode aggressive ↓
auth preshared key secret ↓
remote-id client ↓
proposal isakmp ↓
access-list ip extended ipsec ↓
permit ip any any ↓
ipsec proposal ipsec esp encryption 3des hash sha1 ↓
ipsec policy vpn ↓
peer any ↓
access-list ipsec ↓
local-id 0.0.0.0/0 ↓
remote-id 192.168.20.0/24 ↓
proposal ipsec ↓
always-up-sa ↓
interface tunnel 0 ↓
tunnel mode ipsec ↓
ip unnumbered vlan 1 ↓
ip tcp mss auto ↓
no shutdown ↓
tunnel policy vpn ↓
ip route 192.168.20.0/24 tunnel 0 ↓
ip route 192.168.20.0/24 Null 254 ↓
proxydns ip enable ↓
copy running-config startup-config ↓
| ルーターBの設定 |
ppp profile pppoe0 ↓
my-username branch password passwdB ↓
interface gigabitEthernet 0 ↓
no shutdown ↓
interface gigabitEthernet 0.1 ↓
ip address ipcp ↓
ip tcp mss auto ↓
no shutdown ↓
pppoe enable ↓
ppp bind-profile pppoe0 ↓
ppp profile 3gnet ↓
my-username user@3gnet.co.jp password 3gpasswd ↓
mobile access-point-name 3gnet.co.jp cid 10 ↓
idle-timeout 300 ↓
Note - 従量アクセスポイントの場合、接続時間および送受信するデータ量に応じた料金が発生しますので、設定に間違いがないことを確認してください。
interface ppp 0 ↓
ip address ipcp ↓
ip tcp mss auto ↓
no shutdown ↓
ppp bind-device usb 0 ↓
ppp bind-profile 3gnet ↓
ip napt inside any ↓
ip ids in protect ↓
interface vlan 1 ↓
ip address 192.168.20.1/24 ↓
ip address-up-always ↓
ip route 172.16.0.1/32 gigabitEthernet 0.1 ↓
ip route 172.16.0.1/32 Null 254 ↓
access-list ip extended ppp0-in ↓
access-list ip extended ppp0-out ↓
dynamic permit ip any any ↓
interface ppp 0 ↓
ip traffic-filter ppp0-in in ↓
ip traffic-filter ppp0-out out ↓
isakmp proposal isakmp encryption 3des hash sha1 group 2 ↓
isakmp policy vpn1 ↓
peer 172.16.0.1 ↓
mode aggressive ↓
auth preshared key secret ↓
local-id client ↓
proposal isakmp ↓
isakmp policy vpn2 ↓
peer 200.100.10.1 ↓
mode aggressive ↓
auth preshared key secret ↓
local-id client ↓
proposal isakmp ↓
access-list ip extended ipsec ↓
permit ip any any ↓
ipsec proposal ipsec esp encryption 3des hash sha1 ↓
ipsec policy vpn1 ↓
peer 172.16.0.1 ↓
access-list ipsec ↓
local-id 192.168.20.0/24 ↓
remote-id 0.0.0.0/0 ↓
proposal ipsec ↓
always-up-sa ↓
ipsec policy vpn2 ↓
peer 200.100.10.1 ↓
access-list ipsec ↓
local-id 192.168.20.0/24 ↓
remote-id 0.0.0.0/0 ↓
proposal ipsec ↓
interface tunnel 0 ↓
tunnel mode ipsec ↓
ip unnumbered vlan 1 ↓
ip tcp mss auto ↓
no shutdown ↓
tunnel policy vpn1 ↓
interface tunnel 1 ↓
tunnel mode ipsec ↓
ip unnumbered vlan 1 ↓
ip tcp mss auto ↓
no shutdown ↓
tunnel policy vpn2 ↓
ip route default tunnel 0 ↓
ip route default tunnel 1 10 ↓
ip route 200.100.10.1/32 Null 254 ↓
event-group polling_down ↓
event keepalive ip 192.168.10.1 src 192.168.20.1 out-if tunnel 0 ↓
action 10 ip shutdown-route default tunnel 0 ↓
action 20 ipsec clear-sa policy vpn1 ↓
action 30 ip resume-route 200.100.10.1/32 ppp 0 ↓
action 40 event-group tunnel0_up enable ↓
action 50 event-group polling_down disable ↓
trigger enable ↓
event-group tunnel0_up ↓
event interface tunnel 0 up ↓
action 10 ipsec clear-sa policy vpn2 ↓
action 20 ip shutdown-route 200.100.10.1/32 ppp 0 ↓
action 30 ip resume-route default tunnel 0 ↓
action 40 event-group polling_up enable ↓
action 50 event-group tunnel0_up disable ↓
event-group polling_up ↓
event keepalive ip 192.168.10.1 src 192.168.20.1 mode reach out-if tunnel 0 ↓
action 10 event-group polling_down enable ↓
action 20 event-group polling_up disable ↓
copy running-config startup-config ↓
| まとめ |
ルーターAのコンフィグ
! service password-encryption ! clock timezone JST 9 ! ! ip address-up-always ppp profile pppoe0 my-username center password 8 e$Ih7p7xgv6c0kA ppp profile pppoe1 my-username center@isp password 8 e$QrAq9z74BzW1jk1bEKE2+RAAA ! interface gigabitEthernet 0 no shutdown ! interface gigabitEthernet 0.1 ip address ipcp ip tcp mss auto no shutdown pppoe enable ppp bind-profile pppoe0 ! interface gigabitEthernet 1 no shutdown ! interface gigabitEthernet 1.1 ip address 200.100.10.1/32 ip tcp mss auto no shutdown pppoe enable ppp bind-profile pppoe1 ip napt inside any ip traffic-filter pppoe1-in in ip traffic-filter pppoe1-out out ip ids in protect ! interface gigabitEthernet 2 no shutdown ! interface gigabitEthernet 3 no shutdown ! interface gigabitEthernet 4 no shutdown ! interface gigabitEthernet 5 no shutdown ! interface loop 0 shutdown ! interface loop 1 shutdown ! interface tunnel 0 tunnel mode ipsec ip unnumbered vlan 1 ip tcp mss auto no shutdown tunnel policy vpn ! interface vlan 1 ip address 192.168.10.1/24 no shutdown ! ip route default gigabitEthernet 1.1 ip route 172.16.0.2/32 gigabitEthernet 0.1 ip route 172.16.0.2/32 Null 254 ip route 192.168.20.0/24 tunnel 0 ip route 192.168.20.0/24 Null 254 ! access-list ip extended ipsec permit ip any any access-list ip extended pppoe1-in dynamic permit udp any interface gigabitEthernet 1.1 eq 500 access-list ip extended pppoe1-out dynamic permit ip any any ! isakmp proposal isakmp encryption 3des hash sha1 group 2 ! isakmp policy i peer any mode aggressive auth preshared key 8 e$I3eQu7yNuLxQA remote-id client proposal isakmp ! ipsec proposal ipsec esp encryption 3des hash sha1 ! ipsec policy vpn peer any access-list ipsec local-id 0.0.0.0/0 remote-id 192.168.20.0/24 proposal ipsec always-up-sa ! proxydns ip enable ! ! ! end |
ルーターBのコンフィグ
! service password-encryption ! clock timezone JST 9 ! ! ip address-up-always ppp profile pppoe0 my-username branch password 8 e$I6rT3jJQw6oIA ppp profile 3gnet my-username user@3gnet.co.jp password 8 e$QcmDz+RpjEh7KH7j9YuTf4wAA idle-timeout 300 mobile access-point-name 3gnet.co.jp cid 10 ! interface gigabitEthernet 0 no shutdown ! interface gigabitEthernet 0.1 ip address ipcp ip tcp mss auto no shutdown pppoe enable ppp bind-profile pppoe0 ! interface gigabitEthernet 1 shutdown ! interface gigabitEthernet 2 no shutdown ! interface gigabitEthernet 3 no shutdown ! interface gigabitEthernet 4 no shutdown ! interface gigabitEthernet 5 no shutdown ! interface loop 0 shutdown ! interface loop 1 shutdown ! interface ppp 0 ip address ipcp ip tcp mss auto no shutdown ppp bind-device usb 0 ppp bind-profile 3gnet ip napt inside any ip traffic-filter ppp0-in in ip traffic-filter ppp0-out out ip ids in protect ! interface tunnel 0 tunnel mode ipsec ip unnumbered vlan 1 ip tcp mss auto no shutdown tunnel policy vpn1 ! interface tunnel 1 tunnel mode ipsec ip unnumbered vlan 1 ip tcp mss auto no shutdown tunnel policy vpn2 ! interface vlan 1 ip address 192.168.20.1/24 no shutdown ! ip route default tunnel 0 ip route default tunnel 1 10 ip route 172.16.0.1/32 gigabitEthernet 0.1 ip route 172.16.0.1/32 Null 254 ip route 200.100.10.1/32 Null 254 ! access-list ip extended ipsec permit ip any any access-list ip extended ppp0-in access-list ip extended ppp0-out dynamic permit ip any any ! isakmp proposal isakmp encryption 3des hash sha1 group 2 ! isakmp policy vpn1 peer 172.16.0.1 mode aggressive auth preshared key 8 e$I3eQu7yNuLxQA local-id client proposal isakmp ! isakmp policy vpn2 peer 200.100.10.1 mode aggressive auth preshared key 8 e$I3eQu7yNuLxQA local-id client proposal isakmp ! ipsec proposal ipsec esp encryption 3des hash sha1 ! ipsec policy vpn1 peer 172.16.0.1 access-list ipsec local-id 192.168.20.0/24 remote-id 0.0.0.0/0 proposal ipsec always-up-sa ! ipsec policy vpn2 peer 200.100.10.1 access-list ipsec local-id 192.168.20.0/24 remote-id 0.0.0.0/0 proposal ipsec ! ! ! ! event-group polling_down event keepalive ip 192.168.10.1 src 192.168.20.1 out-if tunnel 0 action 10 ip shutdown-route default tunnel 0 action 20 ipsec clear-sa policy vpn1 action 30 ip resume-route 200.100.10.1/32 ppp 0 action 40 event-group tunnel0_up enable action 50 event-group polling_down disable trigger enable event-group polling_up event keepalive ip 192.168.10.1 src 192.168.20.1 mode reach out-if tunnel 0 action 10 event-group polling_down enable action 20 event-group polling_up disable event-group tunnel0_up event interface tunnel 0 up action 10 ipsec clear-sa policy vpn2 action 20 ip shutdown-route 200.100.10.1/32 ppp 0 action 30 ip resume-route default tunnel 0 action 40 event-group polling_up enable action 50 event-group tunnel0_up disable ! end |
(C) 2011-2014 アライドテレシスホールディングス株式会社
PN: 613-001568 Rev.E