MR1000 コマンド設定事例集

Size: px
Start display at page:

Download "MR1000 コマンド設定事例集"

Transcription

1

2 V21 LAN Microsoft Corporation OMRON Corporation All Rights Reserved. 2

3 V LAN CATV LAN IPv4 IPv PPPoE LAN ISDN LAN LAN IPv6 LAN ISDN IPv6 LAN IPv LAN IP-VPN ADSL IP-VPN IP-VPN NAT IP VPN NAT IP VPN NAT IP VPN RIP IPv RIP IPv OSPFv2 IPv OSPF IPv OSPF LSA AS OSPF LSA

4 V BGP IPv AS IP-VPN IP-VPN MPLS MPLS LSP MPLS LSP MPLS 2VPN EoMPLS MPLS 3VPN BGP/MPLS VPN MPLS LAN MPLS PIM-DM PIM-SM VLAN IP SPI IPv ping IPsec IPv4 over IPv4 IP VPN IPv4 over IPv6 IP VPN IPv4 over IPv6 IP VPN IPv6 over IPv4 IP VPN IPv6 over IPv4 IP VPN IPv6 over IPv6 IP VPN IPv6 over IPv6 IP VPN IPv4 over IPv4 1 IKE IPsec VPN IPsec NAT LAN PPPoE LAN NAT IPsec IPsec VoIP NAT TOS/Traffic Class VLAN WFQ

5 V DHCP DHCP DHCP DHCP DHCP IPv6 DHCP DNS ProxyDNS DNS DNS DNS DNS DNS URL URL SNMP ECMP VRRP STP FNA STP IP Ethernet over IP LAN HUB ISDN PIAFS

6 V21 CD-ROM README 1 2 Microsoft Windows Windows NT Microsoft Corporation Microsoft Windows 2000 Server Network operating system Microsoft Windows 2000 Professional operating system Windows 2000 NTT NTT ADSL NTT NTT 6

7 LAN CATV LAN IPv4 IPv PPPoE LAN ISDN LAN LAN IPv6 LAN ISDN IPv6 LAN IPv LAN IP-VPN ADSL IP-VPN IP-VPN NAT IP VPN NAT IP VPN NAT IP VPN

8 V LAN LAN MR P.42 LAN LAN0 IP DHCP NAT DHCP IP 1 5 LAN LAN1 IP / /24 DHCP IP DNS LAN

9 V A Z a z < > & % MR P.18 IP LAN # delete lan 0 # lan 0 mode auto # lan 0 ip dhcp service client # lan 0 ip rip use off v1 0 off # lan 0 ip nat mode multi any 1 LAN # lan 1 mode auto # lan 1 ip address /24 3 # lan 1 ip dhcp service server # lan 1 ip dhcp info dns # lan 1 ip dhcp info address / # lan 1 ip dhcp info time 1d # lan 1 ip dhcp info gateway # lan 1 ip rip use v1 v1 0 off # enable LAN DHCP DHCP LAN IP IP IP IP DHCP P.220 IP MAC 9 LAN

10 V CATV CATV CATV CATV 2 CATV CATV CATV CATV CATV CATV LAN LAN CATV CATV CATV CATV LAN CATV LAN CATV LAN LAN IP MR P CATV

11 V21 1 CATV LAN0 IP / / DNS LAN IP / /24 DHCP CATV CATV IP CATV # delete lan # lan 0 ip address /24 3 # lan 0 ip dhcp info time 1d # lan 0 ip route 0 default # lan 0 ip rip use off v1 0 off # lan 0 ip nat mode multi any 1 5m LAN # lan 1 ip address /24 3 # lan 1 ip dhcp service server # lan 1 ip dhcp info dns # lan 1 ip dhcp info address / # lan 1 ip dhcp info time 1d # lan 1 ip dhcp info gateway # lan 1 ip rip use v1 v1 0 off ProxyDNS # proxydns domain 0 any * any static # proxydns address 0 any static # reset 11 CATV

12 V LAN LAN-B LAN-A MR P.42 LAN-A LAN1 IP / /24 DHCP NAT LAN-B LAN0 IP / /24 DHCP RIP-V IP IP LAN-C / /24 NAT 12 LAN

13 V21 1 TIME TIME SNTP TIME RFC868 SNTP Simple Network Time Protocol RFC1361 RFC1769 NTP Network Time Protocol IP LAN0 # lan 0 ip address /24 3 # lan 0 ip dhcp service off # lan 0 ip route / # lan 0 ip route 0 default # lan 0 ip rip use v1 v1 0 off LAN1 # lan 1 ip address /24 3 # lan 1 ip dhcp service server # lan 1 ip dhcp info dns # lan 1 ip dhcp info address / # lan 1 ip dhcp info time 1d # lan 1 ip dhcp info gateway # lan 1 ip rip use v1 v1 0 off # time auto server time # time auto interval start # enable 13 LAN

14 V IPv4 IPv6 IPv4 IPv6 LAN-A / 2001:db8:1111:1001::/64 LAN-B / 2001:db8:1111:1000::/64 LAN0 # lan 0 ip6 use on # lan 0 ip6 address :db8:1111:1000::/64 30d 7d c0 # lan 0 ip6 ra mode send # lan 0 ip6 rip use on on 0 # lan 0 ip6 rip site-local on LAN1 # lan 1 ip6 use on # lan 1 ip6 address :db8:1111:1001::/64 30d 7d c0 # lan 1 ip6 ra mode send # lan 1 ip6 rip use on on 0 # lan 1 ip6 rip site-local on # enable 14 IPv4 IPv6

15 V MR P.42 ISDN OCN 128Kbps LAN0 LAN OCN DNS OCN domain.ocn.ne.jp OCN IP IP / / LAN IP internet 0 9 A Z a z < > & % MR P.18 IP 15

16 V21 1 # wan 0 line hsd 128k IP # lan 0 ip address /29 3 DHCP # lan 0 ip dhcp info dns # lan 0 ip dhcp info address /29 6 # lan 0 ip dhcp info gateway # lan 0 ip dhcp info domain domain.ocn.ne.jp # lan 0 ip dhcp service server # remote 0 name internet # remote 0 ip route 0 default 1 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind wan 0 # remote 0 ap 0 ip dns # reset 16

17 V PPPoE PPPoE ADSL MR P.42 ID userid userpass LAN0 LAN IP / / A Z a z < > & % MR P.18 IP PPPoE MTU MTU 1454 PPPoE LAN lan mode lan mode lan LAN 17 PPPoE

18 V21 1 ADSL # delete lan 0 # lan 0 mode auto IP # lan 1 ip address /24 3 DHCP # lan 1 ip dhcp info dns # lan 1 ip dhcp info address / # lan 1 ip dhcp info time 1d # lan 1 ip dhcp info gateway # lan 1 ip dhcp service server # lan 1 ip nat mode off # remote 0 name internet # remote 0 mtu 1454 # remote 0 autodial enable # remote 0 ppp ipcp vjcomp disable # remote 0 ip route 0 default 1 # remote 0 ip rip use off off 0 off # remote 0 ip nat mode multi any 1 5m # remote 0 ip msschange 1414 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid userpass ProxyDNS # proxydns domain 0 any * any to 0 # proxydns address 0 any to 0 # reset 18 PPPoE

19 V LAN ISDN ISDN 2 MR P.42 ISDN ISDN 64Kbps intranet 1 IP / / ID tokyo tokyopass kawasaki kawapass IP / / ID kawasaki kawapass tokyo tokyopass IP 19 LAN ISDN

20 V21 1 # wan 0 line isdn IP # lan 0 ip address /24 3 # remote 0 name intranet # remote 0 ip route /24 1 # remote 0 ap 0 name kawasaki # remote 0 ap 0 datalink bind wan 0 # remote 0 ap 0 dial 0 number # remote 0 ap 0 dial 0 speed 64K # remote 0 ap 0 ppp auth type any # remote 0 ap 0 ppp auth send tokyo tokyopass # remote 0 ap 0 ppp auth receive kawasaki kawapass # remote 0 ap 0 idle 1m # reset # wan 0 line isdn IP # lan 0 ip address /24 3 # remote 0 name intranet # remote 0 ip route /24 1 # remote 0 ap 0 name tokyo # remote 0 ap 0 datalink bind wan 0 # remote 0 ap 0 dial 0 number # remote 0 ap 0 dial 0 speed 64K # remote 0 ap 0 ppp auth type any # remote 0 ap 0 ppp auth send kawasaki kawapass # remote 0 ap 0 ppp auth receive tokyo tokyopass # remote 0 ap 0 idle 1m # reset 20 LAN ISDN

21 V LAN 2 MR P.42 ISDN BRI 128Mbps DHCP honsya honsya-1 / /24 LAN IP DNS IP shisya1 shisya-1 / /24 LAN IP DNS IP DHCP 21 LAN

22 V A Z a z < > & % MR P.18 IP # wan 0 line hsd 128k LAN # lan 0 ip address /24 3 # lan 0 ip route 0 default # remote 0 name shisya1 # remote 0 ip route /24 1 # remote 0 ap 0 name shisya-1 # remote 0 ap 0 datalink bind wan 0 # reset 22 LAN

23 V21 1 # wan 0 line hsd 128k LAN # lan 0 ip address /24 3 # remote 0 name honsya # remote 0 ap 0 name honsya-1 # remote 0 ap 0 datalink bind wan 0 # remote 0 ip route 0 default 1 # reset 1.5 P.15 DHCP DHCP 23 LAN

24 V LAN LAN MR P.42 ISDN 128Kbps RIPv1 LAN IP / /24 1 center1 ap1 WAN IP WAN IP DLCI 16 CIR 64Kbps 2 center2 ap2 24 LAN

25 V21 1 WAN IP WAN IP DLCI 17 CIR 64Kbps IP # wan 0 line fr 128k LAN IP # lan 0 ip address /24 3 RIP # lan 0 ip rip use v1 v1 0 off 1 # remote 0 name center1 # remote 0 ip address local # remote 0 ip address remote # remote 0 ip rip use v1 v1 0 off # remote 0 ap 0 name ap1 # remote 0 ap 0 datalink bind wan 0 # remote 0 ap 0 fr dlci 16 # remote 0 ap 0 fr cir 64 2 # remote 1 name center2 # remote 1 ip address local # remote 1 ip address remote # remote 1 ip rip use v1 v1 0 off # remote 1 ap 0 name ap2 # remote 1 ap 0 datalink bind wan 0 # remote 1 ap 0 fr dlci 17 # remote 1 ap 0 fr cir 64 # reset 25 LAN

26 V IPv6 LAN ISDN ISDN 2 IPv6 MR P.42 ISDN ISDN 64Kbps IPv6 kaisya 1 / 2001:db8:1111:1000::/64 tokyo ID tokyo tokyopass kawasaki kawapass / 2001:db8:1111:1001::/64 kawasaki ID kawasaki kawapass tokyo tokyopass 26 IPv6 LAN ISDN

27 V A Z a z < > & % MR P.18 # wan 0 line isdn LAN # lan 0 ip6 use on # lan 0 ip6 address :db8:1111:1000::/64 30d 7d # lan 0 ip6 ra mode send # remote 0 name kaisya # remote 0 ap 0 name kawasaki # remote 0 ap 0 datalink bind wan 0 # remote 0 ap 0 dial 0 number # remote 0 ap 0 dial 0 speed 64K # remote 0 ap 0 ppp auth type any # remote 0 ap 0 ppp auth send tokyo tokyopass # remote 0 ap 0 ppp auth receive kawasaki kawapass # remote 0 ap 0 idle 1m # remote 0 ip6 use on # remote 0 ip6 route :db8:1111:1001::/64 1 # reset ISDN RIP IPv6 RIP IPv6 27 IPv6 LAN ISDN

28 V21 1 # wan 0 line isdn LAN # lan 0 ip6 use on # lan 0 ip6 address :db8:1111:1001::/64 30d 7d # lan 0 ip6 ra mode send # remote 0 name kaisya # remote 0 ap 0 name tokyo # remote 0 ap 0 datalink bind wan 0 # remote 0 ap 0 dial 0 number # remote 0 ap 0 dial 0 speed 64K # remote 0 ap 0 ppp auth type any # remote 0 ap 0 ppp auth send kawasaki kawapass # remote 0 ap 0 ppp auth receive tokyo tokyopass # remote 0 ap 0 idle 1m # remote 0 ip6 use on # remote 0 ip6 route :db8:1111:1000::/64 1 # reset 28 IPv6 LAN ISDN

29 V IPv6 LAN IPv6 IPv4 2 IPv6 LAN0 IPv LAN1 IPv LAN1 IPv6 / 2001:db8:1111:10b9::/64 LAN0 IPv LAN1 IPv LAN1 IPv6 / 2001:db8:1111:1016::/64 IPv4 IPv6 0 9 A Z a z < > & % MR P.18 IPv6 over IPv4 IPv4 MTU 1280 IP 29 IPv6 LAN IPv6

30 V21 1 IPv4 # lan 0 ip address /24 3 # lan 0 ip rip use v1 v1 0 # lan 0 ip dhcp service off # lan 0 ip nat mode off # lan 1 ip address /24 3 # lan 1 ip rip use v1 v1 0 # lan 1 ip dhcp service off # lan 1 ip nat mode off IPv6 # lan 1 ip6 use on # lan 1 ip6 ifid auto # lan 1 ip6 address :db8:1111:10b9::/64 30d 7d c0 # lan 1 ip6 ra mode send IP # remote 0 name v6kawasa # remote 0 mtu 1280 # remote 0 ap 0 name tun-kawa # remote 0 ap 0 datalink type ip # remote 0 ap 0 tunnel local # remote 0 ap 0 tunnel remote # remote 0 ip6 use on # remote 0 ip6 route :db8:1111:1016::/64 1 # reset 30 IPv6 LAN IPv6

31 V21 1 IPv4 # lan 0 ip address /24 3 # lan 0 ip rip use v1 v1 0 # lan 0 ip dhcp service off # lan 0 ip nat mode off # lan 1 ip address /24 3 # lan 1 ip rip use v1 v1 0 # lan 1 ip dhcp service off # lan 1 ip nat mode off IPv6 # lan 1 ip6 use on # lan 1 ip6 ifid auto # lan 1 ip6 address :db8:1111:1016::/64 30d 7d c0 # lan 1 ip6 ra mode send IP # remote 0 name v6tokyo # remote 0 mtu 1280 # remote 0 ap 0 name tun-tkyo # remote 0 ap 0 datalink type ip # remote 0 ap 0 tunnel local # remote 0 ap 0 tunnel remote # remote 0 ip6 use on # remote 0 ip 6 route :db8:1111:10b9::/64 1 # reset 31 IPv6 LAN IPv6

32 V21 1 NAT IPv6 over IPv4 IPv4 NAT IPv6 over IPv4 IPv6 IPv4 NAT IPv4 IPv6 over IPv4 NAT IP LAN IP IP remote ip address local IP PPP IP NAT GW IP IPv6 over IPv4 GW NAT IP IP IP IP GW IPv6 over IPv4 NAT LAN GW IP IPv6 over IPv remote 0 ap 0 tunnel local remote 0 ap 0 tunnel remote NAT lan 0 ip nat static any any 41 GW GW NAT remote 0 ap 0 tunnel local remote 0 ap 0 tunnel remote IPv6 LAN IPv6

33 V LAN IP-VPN BGP4 IP-VPN MR P A Z a z < > & % MR P.18 NAT 4 BGP BGP MR P.19 BGP BGP BGP BGP enable IP 33 LAN IP-VPN

34 V ADSL IP-VPN LAN0 ADSL IP-VPN IP IP IP AS 1 IP-VPN LAN0 LAN0 IP LAN0 / /24 LAN1 IP LAN1 / /24 AS RIPv2 IP-VPN LAN0 LAN0 IP LAN0 / /24 LAN1 IP LAN1 / /24 AS LAN IP-VPN

35 V21 1 IP-VPN LAN0 LAN0 IP LAN0 / /24 LAN1 IP LAN1 / /24 AS LAN # lan 0 ip address /24 3 # lan 0 ip nat mode off # lan 0 ip dhcp service off # lan 0 ip route / # lan 1 ip address /24 3 # lan 1 ip rip use v2m v2 0 off # routemanage ip redist rip bgp on # routemanage ip redist bgp rip on # bgp as # bgp network route /24 # bgp neighbor 0 address # bgp neighbor 0 as 1 # bgp neighbor 0 ebgp-multihop 2 # reset 35 LAN IP-VPN

36 V21 1 LAN # lan 0 ip address /24 3 # lan 0 ip nat mode off # lan 0 ip dhcp service off # lan 0 ip route / # lan 1 ip address /24 3 # bgp as # bgp network route /24 # bgp neighbor 0 address # bgp neighbor 0 as 1 # bgp neighbor 0 ebgp-multihop 2 # reset LAN # lan 0 ip address /24 3 # lan 0 ip nat mode off # lan 0 ip dhcp service off # lan 0 ip route / # lan 1 ip address /24 3 # bgp as # bgp network route /24 # bgp neighbor 0 address # bgp neighbor 0 as 1 # bgp neighbor 0 ebgp-multihop 2 # reset 36 LAN IP-VPN

37 V IP-VPN ISDN IP-VPN IP IP IP AS 1 LAN IP LAN / /24 LAN / /24 LAN RIPv2 WAN IP AS LAN IP LAN / /24 WAN IP AS LAN IP LAN / /24 WAN IP AS LAN IP-VPN

38 V21 1 # wan 0 line hsd 128k LAN # lan 0 ip address /24 3 # lan 0 ip rip use v2m v2 0 off # remote 0 name IP-VPN # remote 0 ap 0 name ip-vpn # remote 0 ap 0 datalink bind wan 0 # remote 0 ip address local # remote 0 ip address remote # routemanage ip redist rip bgp on # routemanage ip redist bgp rip on # bgp as # bgp network route /24 # bgp neighbor 0 address # bgp neighbor 0 as 1 # reset 38 LAN IP-VPN

39 V21 1 # wan 0 line hsd 128k LAN # lan 0 ip address /24 3 # remote 0 name IP-VPN # remote 0 ap 0 name ip-vpn # remote 0 ap 0 datalink bind wan 0 # remote 0 ip address local # remote 0 ip address remote # bgp as # bgp network route /24 # bgp neighbor 0 address # bgp neighbor 0 as 1 # reset # wan 0 line hsd 128k LAN # lan 0 ip address /24 3 # remote 0 name IP-VPN # remote 0 ap 0 name ip-vpn # remote 0 ap 0 datalink bind wan 0 # remote 0 ip address local # remote 0 ip address remote # bgp as # bgp network route /24 # bgp neighbor 0 address # bgp neighbor 0 as 1 # reset 39 LAN IP-VPN

40 V21 1 BGP4 BGP4 BGP WAN BGP BGP BGP BGP - BGP BGP - BGP BGP 40 LAN IP-VPN

41 V NAT IP VPN IPsec VPN A B PPPoE VPN A PPPoE IP /24 IP /24 PPPoE ID userid1 PPPoE userpass1 PPPoE LAN LAN0 B PPPoE IP /24 IP /24 PPPoE ID userid3 PPPoE userpass3 PPPoE LAN LAN0 IP /24 IP /24 IP A PPPoE # delete lan 0 # lan 0 mode auto # lan 1 ip address /24 3 # remote 0 name internet # remote 0 mtu 1454 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid1 userpass1 # remote 0 ap 0 keep connect # remote 0 ip address local # remote 0 ip route 0 default 1 0 # remote 0 ip msschange NAT IP VPN

42 V21 1 B PPPoE # delete lan 0 # lan 0 mode auto # lan 1 ip address /24 3 # remote 0 name internet # remote 0 mtu 1454 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid3 userpass3 # remote 0 ap 0 keep connect # remote 0 ip address local # remote 0 ip route 0 default 1 0 # remote 0 ip msschange 1414 # lan 0 ip address /24 3 # lan 0 ip route 0 default # lan 1 ip address / NAT IP VPN

43 V21 1 A vpn-hon honsya IPsec/IKE IPsec /24-any4 B vpn-hon honsya IPsec/IKE IPsec /24-any4 vpn-shia shisyaa IPsec/IKE IPsec any4-i /24 vpn-shib shisyab IPsec/IKE IPsec any4-i /24 A Main Mode IPsec esp IPsec des-cbc IPsec hmac-md5 IPsec DH IKE abcdefghijklmnopqrstuvwxyz IKE shared IKE des-cbc IKE hmac-md5 IKE DH modp768 B Main Mode IPsec esp IPsec 3des-cbc IPsec hmac-sha1 IPsec DH IKE ABCDEFGHIJKLMNOPQRSTUVWXYZ IKE shared IKE 3des-cbc IKE hmac-sha1 IKE DH modp NAT IP VPN

44 V21 1 DH IKE A VPN # remote 1 name vpn-hon # remote 1 ip route / # remote 1 ap 0 name honsya # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range /24 any4 # remote 1 ap 0 ipsec ike encrypt des-cbc # remote 1 ap 0 ipsec ike auth hmac-md5 # remote 1 ap 0 ike mode main # remote 1 ap 0 ike shared key text abcdefghijklmnopqrstuvwxyz # remote 1 ap 0 ike proposal encrypt des-cbc # enable 44 NAT IP VPN

45 V21 1 B VPN # remote 1 name vpn-hon # remote 1 ip route / # remote 1 ap 0 name honsya # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range /24 any4 # remote 1 ap 0 ipsec ike encrypt 3des-cbc # remote 1 ap 0 ipsec ike auth hmac-sha1 # remote 1 ap 0 ike mode main # remote 1 ap 0 ike shared key text ABCDEFGHIJKLMNOPQRSTUVWXYZ # remote 1 ap 0 ike proposal encrypt 3des-cbc # remote 1 ap 0 ike proposal hash hmac-sha1 # remote 1 ap 0 ike proposal pfs modp1024 # enable 45 NAT IP VPN

46 V21 1 VPN # remote 0 name vpn-shia # remote 0 ip route / # remote 0 ap 0 name shisyaa # remote 0 ap 0 datalink type ipsec # remote 0 ap 0 tunnel local # remote 0 ap 0 tunnel remote # remote 0 ap 0 ipsec type ike # remote 0 ap 0 ipsec ike protocol esp # remote 0 ap 0 ipsec ike range any /24 # remote 0 ap 0 ipsec ike encrypt des-cbc # remote 0 ap 0 ipsec ike auth hmac-md5 # remote 0 ap 0 ike mode main # remote 0 ap 0 ike shared key text abcdefghijklmnopqrstuvwxyz # remote 0 ap 0 ike proposal encrypt des-cbc # remote 1 name vpn-shib # remote 1 ip route / # remote 1 ap 0 name shisyab # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range any /24 # remote 1 ap 0 ipsec ike encrypt 3des-cbc # remote 1 ap 0 ipsec ike auth hmac-sha1 # remote 1 ap 0 ike mode main # remote 1 ap 0 ike shared key text ABCDEFGHIJKLMNOPQRSTUVWXYZ # remote 1 ap 0 ike proposal encrypt 3des-cbc # remote 1 ap 0 ike proposal hash hmac-sha1 # remote 1 ap 0 ike proposal pfs modp1024 # enable 46 NAT IP VPN

47 V NAT IP VPN IPsec VPN A B PPPoE VPN A PPPoE IP /24 IP /24 IP /24 PPPoE ID userid1 PPPoE userpass1 PPPoE LAN LAN0 B PPPoE IP /24 IP /24 IP /24 PPPoE ID userid3 PPPoE userpass3 PPPoE LAN LAN0 IP /24 IP /24 IP A PPPoE # delete lan 0 # lan 0 mode auto # lan 1 ip address /24 3 # remote 0 name internet # remote 0 mtu 1454 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid1 userpass1 # remote 0 ap 0 keep connect # remote 0 ip address local # remote 0 ip route 0 default 1 0 # remote 0 ip msschange NAT IP VPN

48 V21 1 B PPPoE # delete lan 0 # lan 0 mode auto # lan 1 ip address /24 3 # remote 0 name internet # remote 0 mtu 1454 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid3 userpass3 # remote 0 ap 0 keep connect # remote 0 ip address local # remote 0 ip route 0 default 1 0 # remote 0 ip msschange 1414 # lan 0 ip address /24 3 # lan 0 ip route 0 default # lan 1 ip address / NAT IP VPN

49 V21 1 A vpn-hon honsya IPsec/IKE IPsec /24-any4 B vpn-hon honsya IPsec/IKE IPsec /24-any4 vpn-shia shisyaa IPsec/IKE IPsec any4-i /24 vpn-shib shisyab IPsec/IKE IPsec any4-i /24 A Main Mode IPsec esp IPsec des-cbc IPsec hmac-md5 IPsec DH IKE abcdefghijklmnopqrstuvwxyz IKE shared IKE des-cbc IKE hmac-md5 IKE DH modp768 B Main Mode IPsec esp IPsec 3des-cbc IPsec hmac-sha1 IPsec DH IKE ABCDEFGHIJKLMNOPQRSTUVWXYZ IKE shared IKE 3des-cbc IKE hmac-sha1 IKE DH modp NAT IP VPN

50 V21 1 DH IKE A IPsec/IKE # remote 0 ip nat static # remote 0 ip nat static any any any 50 VPN # remote 1 name vpn-hon # remote 1 ip route / # remote 1 ap 0 name honsya # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range /24 any4 # remote 1 ap 0 ipsec ike encrypt des-cbc # remote 1 ap 0 ipsec ike auth hmac-md5 # remote 1 ap 0 ike mode main # remote 1 ap 0 ike shared key text abcdefghijklmnopqrstuvwxyz # remote 1 ap 0 ike proposal encrypt des-cbc # enable 50 NAT IP VPN

51 V21 1 B IPsec/IKE # remote 0 ip nat static # remote 0 ip nat static any any any 50 VPN # remote 1 name vpn-hon # remote 1 ip route / # remote 1 ap 0 name honsya # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range /24 any4 # remote 1 ap 0 ipsec ike encrypt 3des-cbc # remote 1 ap 0 ipsec ike auth hmac-sha1 # remote 1 ap 0 ike mode main # remote 1 ap 0 ike shared key text ABCDEFGHIJKLMNOPQRSTUVWXYZ # remote 1 ap 0 ike proposal encrypt 3des-cbc # remote 1 ap 0 ike proposal hash hmac-sha1 # remote 1 ap 0 ike proposal pfs modp1024 # enable 51 NAT IP VPN

52 V21 1 VPN # remote 0 name vpn-shia # remote 0 ip route / # remote 0 ap 0 name shisyaa # remote 0 ap 0 datalink type ipsec # remote 0 ap 0 tunnel local # remote 0 ap 0 tunnel remote # remote 0 ap 0 ipsec type ike # remote 0 ap 0 ipsec ike protocol esp # remote 0 ap 0 ipsec ike range any /24 # remote 0 ap 0 ipsec ike encrypt des-cbc # remote 0 ap 0 ipsec ike auth hmac-md5 # remote 0 ap 0 ike mode main # remote 0 ap 0 ike shared key text abcdefghijklmnopqrstuvwxyz # remote 0 ap 0 ike proposal encrypt des-cbc # remote 1 name vpn-shib # remote 1 ip route / # remote 1 ap 0 name shisyab # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range any /24 # remote 1 ap 0 ipsec ike encrypt 3des-cbc # remote 1 ap 0 ipsec ike auth hmac-sha1 # remote 1 ap 0 ike mode main # remote 1 ap 0 ike shared key text ABCDEFGHIJKLMNOPQRSTUVWXYZ # remote 1 ap 0 ike proposal encrypt 3des-cbc # remote 1 ap 0 ike proposal hash hmac-sha1 # remote 1 ap 0 ike proposal pfs modp1024 # enable 52 NAT IP VPN

53 V NAT IP VPN IP VPN A B PPPoE VPN A PPPoE IP /24 PPPoE ID userid1 PPPoE userpass1 PPPoE LAN LAN0 B PPPoE IP /24 PPPoE ID userid3 PPPoE userpass3 PPPoE LAN LAN0 IP /24 IP /24 IP A PPPoE # delete lan 0 # lan 0 mode auto # lan 1 ip address /24 3 # remote 0 name internet # remote 0 mtu 1454 # remote 0 ip route 0 default 1 0 # remote 0 ip nat mode multi any 1 5m # remote 0 ip msschange 1414 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid1 userpass1 B PPPoE # delete lan 0 # lan 0 mode auto # lan 1 ip address /24 3 # remote 0 name internet # remote 0 mtu 1454 # remote 0 ip route 0 default 1 0 # remote 0 ip nat mode multi any 1 5m # remote 0 ip msschange 1414 # remote 0 ap 0 name ISP-1 # remote 0 ap 0 datalink bind lan 0 # remote 0 ap 0 ppp auth send userid3 userpass3 53 NAT IP VPN

54 V21 1 # lan 0 ip address /24 3 # lan 0 ip route 0 default # lan 1 ip address /24 3 A Initiator vpn-hon honsya IPsec/IKE A IPsec /24-any4 IKE UDP ESP B Initiator vpn-hon honsya IPsec/IKE B IPsec /24-any4 IKE UDP NAT IP VPN

55 V21 1 ESP vpn-shia shisyaa IPsec/IKE A IPsec any /24 vpn-shib shisyab IPsec/IKE B IPsec any /24 A Aggressive Mode IPsec esp IPsec des-cbc IPsec hmac-md5 IPsec DH IKE A ID ID shisyaa FQDN IKE abcdefghijklmnopqrstuvwxyz IKE shared IKE des-cbc IKE hmac-md5 IKE DH modp768 B Aggressive Mode IPsec esp IPsec 3des-cbc IPsec hmac-sha1 IPsec DH IKE B ID ID shisyab FQDN IKE ABCDEFGHIJKLMNOPQRSTUVWXYZ IKE shared IKE 3des-cbc IKE hmac-sha1 IKE DH modp NAT IP VPN

56 V21 1 DH IKE ID Aggressive Mode ID VPN IP VPN IP IP IKE NAT A Initiator IPsec/IKE # remote 0 ip nat static any # remote 0 ip nat static any any any 50 VPN # remote 1 name vpn-hon # remote 1 ip route / # remote 1 ap 0 name honsya # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range /24 any4 # remote 1 ap 0 ipsec ike encrypt des-cbc # remote 1 ap 0 ipsec ike auth hmac-md5 # remote 1 ap 0 ike mode aggressive # remote 1 ap 0 ike name local shisyaa # remote 1 ap 0 ike shared key text abcdefghijklmnopqrstuvwxyz # remote 1 ap 0 ike proposal encrypt des-cbc # enable 56 NAT IP VPN

57 V21 1 B Initiator IPsec/IKE # remote 0 ip nat static any # remote 0 ip nat static any any any 50 VPN # remote 1 name vpn-hon # remote 1 ip route / # remote 1 ap 0 name honsya # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel remote # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range /24 any4 # remote 1 ap 0 ipsec ike encrypt 3des-cbc # remote 1 ap 0 ipsec ike auth hmac-sha1 # remote 1 ap 0 ike mode aggressive # remote 1 ap 0 ike name local shisyab # remote 1 ap 0 ike shared key text ABCDEFGHIJKLMNOPQRSTUVWXYZ # remote 1 ap 0 ike proposal encrypt 3des-cbc # remote 1 ap 0 ike proposal hash hmac-sha1 # remote 1 ap 0 ike proposal pfs modp1024 # enable 57 NAT IP VPN

58 V21 1 Responder VPN # remote 0 name vpn-shia # remote 0 ip route / # remote 0 ap 0 name shisyaa # remote 0 ap 0 datalink type ipsec # remote 0 ap 0 tunnel local # remote 0 ap 0 ipsec type ike # remote 0 ap 0 ipsec ike protocol esp # remote 0 ap 0 ipsec ike range any /24 # remote 0 ap 0 ipsec ike encrypt des-cbc # remote 0 ap 0 ipsec ike auth hmac-md5 # remote 0 ap 0 ike mode aggressive # remote 0 ap 0 ike name remote shisyaa # remote 0 ap 0 ike shared key text abcdefghijklmnopqrstuvwxyz # remote 0 ap 0 ike proposal encrypt des-cbc # remote 1 name vpn-shib # remote 1 ip route / # remote 1 ap 0 name shisyab # remote 1 ap 0 datalink type ipsec # remote 1 ap 0 tunnel local # remote 1 ap 0 ipsec type ike # remote 1 ap 0 ipsec ike protocol esp # remote 1 ap 0 ipsec ike range any /24 # remote 1 ap 0 ipsec ike encrypt 3des-cbc # remote 1 ap 0 ipsec ike auth hmac-sha1 # remote 1 ap 0 ike mode aggressive # remote 1 ap 0 ike name remote shisyab # remote 1 ap 0 ike shared key text ABCDEFGHIJKLMNOPQRSTUVWXYZ # remote 1 ap 0 ike proposal encrypt 3des-cbc # remote 1 ap 0 ike proposal hash hmac-sha1 # remote 1 ap 0 ike proposal pfs modp1024 # enable 58 NAT IP VPN

59 RIP IPv RIP IPv OSPFv2 IPv OSPF IPv OSPF LSA AS OSPF LSA BGP IPv AS IP-VPN IP-VPN MPLS MPLS LSP MPLS LSP MPLS 2VPN EoMPLS MPLS 3VPN BGP/MPLS VPN

60 2.8.1 MPLS LAN MPLS PIM-DM PIM-SM VLAN IP SPI IPv ping IPsec IPv4 over IPv4 IP VPN IPv4 over IPv6 IP VPN IPv4 over IPv6 IP VPN IPv6 over IPv4 IP VPN IPv6 over IPv4 IP VPN IPv6 over IPv6 IP VPN IPv6 over IPv6 IP VPN IPv4 over IPv4 1 IKE IPsec VPN IPsec NAT LAN PPPoE LAN NAT IPsec IPsec VoIP NAT TOS/Traffic Class VLAN WFQ DHCP DHCP DHCP DHCP DHCP

61 IPv6 DHCP DNS ProxyDNS DNS DNS DNS DNS DNS URL URL SNMP ECMP VRRP STP FNA STP IP Ethernet over IP LAN HUB ISDN PIAFS

62 V RIP IPv4 IP RIP IP 0 any 1 16 RIP IP IP IP IP / / /24 IP IP / / /24 RIPv1 lan 0 ip address / /8 62 RIP IPv4

63 V A. B. A B RIP RIP RIP RIP 63 RIP IPv4

64 V # lan 0 ip rip filter 0 act pass out # lan 0 ip rip filter 0 route default # lan 0 ip rip filter 1 act reject out # lan 0 ip rip filter 1 route any # enable 64 RIP IPv4

65 V / / / / / /24 1 # lan 1 ip rip filter 0 act pass out # lan 1 ip rip filter 0 route /24 # lan 1 ip rip filter 0 set metric 1 # lan 1 ip rip filter 1 act pass out # lan 1 ip rip filter 1 route any # enable RIP RIP IPv4

66 V # lan 0 ip rip filter 0 act pass in # lan 0 ip rip filter 0 route default # lan 0 ip rip filter 1 act reject in # lan 0 ip rip filter 1 route any # enable 66 RIP IPv4

67 V / / /24 5 LAN /24 1 # lan 0 ip rip filter 0 act pass in # lan 0 ip rip filter 0 route /24 # lan 0 ip rip filter 0 set metric 1 LAN0 # lan 0 ip rip filter 1 act pass in # lan 0 ip rip filter 1 route any lan /24 5 # lan 1 ip rip filter 0 act pass in # lan 1 ip rip filter 0 route /24 # lan 1 ip rip filter 0 set metric 5 lan1 # lan 1 ip rip filter 1 act pass in # lan 1 ip rip filter 1 route any # enable RIP IPv4

68 V / / /24 # lan 0 ip rip filter 0 act reject out # lan 0 ip rip filter 0 route /24 # lan 0 ip rip filter 1 act pass out # lan 0 ip rip filter 1 route any # enable 68 RIP IPv4

69 V / / /24 # lan 0 ip rip filter 0 act reject in # lan 0 ip rip filter 0 route /24 # lan 0 ip rip filter 1 act pass in # lan 0 ip rip filter 1 route any # enable 69 RIP IPv4

70 V RIP IPv6 RIP IPv6 0 any 1 16 RIP 2001:db8:1111::/ :db8:1111::/ :db8:1111::/ :db8::/ :db8::/ :db8:1111::/32 70 RIP IPv6

71 V A. B. A B RIP RIP RIP RIP 71 RIP IPv6

72 V # lan 0 ip6 rip filter 0 act pass out # lan 0 ip6 rip filter 0 route default # lan 0 ip6 rip filter 1 act reject out # lan 0 ip6 rip filter 1 route any # enable 72 RIP IPv6

73 V :db8:1111::/ :db8:1111::/ :db8:2222::/ :db8:1111::/ :db8:1111::/ :db8:1111::/64 1 # lan 1 ip6 rip filter 0 act pass out # lan 1 ip6 rip filter 0 route 2001:db8:1111::/64 # lan 1 ip6 rip filter 0 set metric 1 # lan 1 ip6 rip filter 1 act pass out # lan 1 ip6 rip filter 1 route any # enable RIP RIP IPv6

74 V # lan 0 ip6 rip filter 0 act pass in # lan 0 ip6 rip filter 0 route default # lan 0 ip6 rip filter 1 act reject in # lan 0 ip6 rip filter 1 route any # enable 74 RIP IPv6

75 V :db8:1111::/ :db8:1111::/ :db8:1111::/64 5 LAN0 2001:db8:1111::/64 1 # lan 0 ip6 rip filter 0 act pass in # lan 0 ip6 rip filter 0 route 2001:db8:1111::/64 # lan 0 ip6 rip filter 0 set metric 1 LAN0 # lan 0 ip6 rip filter 1 act pass in # lan 0 ip6 rip filter 1 route any lan1 2001:db8:1111::/64 5 # lan 1 ip6 rip filter 0 act pass in # lan 1 ip6 rip filter 0 route 2001:db8:1111::/64 # lan 1 ip6 rip filter 0 set metric 5 lan1 # lan 1 ip6 rip filter 1 act pass in # lan 1 ip6 rip filter 1 route any # enable RIP IPv6

76 V :db8:1111::/ :db8:1111::/ :db8:1111::/64 # lan 0 ip6 rip filter 0 act reject out # lan 0 ip6 rip filter 0 route 2001:db8:1111::/64 # lan 0 ip6 rip filter 1 act pass out # lan 0 ip6 rip filter 1 route any # enable 76 RIP IPv6

77 V :db8:1111::/ :db8:1111::/ :db8:1111::/64 # lan 0 ip6 rip filter 0 act reject in # lan 0 ip6 rip filter 0 route 2001:db8:1111::/64 # lan 0 ip6 rip filter 1 act pass in # lan 0 ip6 rip filter 1 route any # enable 77 RIP IPv6

78 V OSPFv2 IPv4 OSPFv2 OSPF ID ID ID MR OSPF P.33 NAT OSPF IP IP OSPF 50 2 Designated Router OSPF MTU OSPF OSPF LSA LSDB LSA LSA enable/reset 60 OSPF enable LSA MaxAge OSPF OSPF LSA 15Kbps 5 6 remote 78 OSPFv2 IPv4

79 V IP 1 6 NAT DHCP 5 6 ISDN 1 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID LAN /16 2 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID LAN0 1 LAN1 passive-interface 3 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID LAN0 255 LAN1 passive-interface 4 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID LAN1 passive-interface LAN0 1 5 LAN0 OSPF remote0 OSPF LAN0 OSPF ID remote0 OSPF ID /16 6 LAN0 OSPF 79 OSPFv2 IPv4

80 V21 2 remote0 OSPF LAN0 OSPF ID remote0 OSPF ID LAN0 passive-interface 1 LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 1 # lan 1 ip ospf priority 0 OSPF # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 range /16 # reset 2 LAN # lan 0 ip ospf use on 0 # lan 0 ip ospf priority 1 # lan 1 ip ospf use on 0 # lan 1 ip ospf passive on OSPF # ospf ip area 0 id # reset 80 OSPFv2 IPv4

81 V LAN # lan 0 ip ospf use on 0 # lan 0 ip ospf priority 255 # lan 1 ip ospf use on 0 # lan 1 ip ospf passive on OSPF # ospf ip area 0 id # reset 4 LAN # lan 0 ip ospf use on 0 # lan 0 ip ospf priority 1 # lan 1 ip ospf use on 0 # lan 1 ip ospf passive on OSPF # ospf ip area 0 id # reset 5 LAN # lan 0 ip ospf use on 0 # remote 0 ip ospf use on 1 OSPF # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 range /16 # reset 81 OSPFv2 IPv4

82 V LAN # lan 0 ip ospf use on 0 # lan 0 ip ospf passive on # remote 0 ip ospf use on 0 OSPF # ospf ip area 0 id # reset WAN WAN IP OSPF OSPF 82 OSPFv2 IPv4

83 V OSPF ID OSPF ID 4 5 remote 1 5 IP 1 5 NAT DHCP 4 5 ISDN 1 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID LAN0 OSPF LAN1 OSPF LAN0 OSPF ID OSPFv2 IPv4

84 V21 2 LAN1 OSPF ID LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID OSPF ID OSPF ID LAN0 OSPF remote0 OSPF LAN0 OSPF ID remote0 OSPF ID OSPF ID OSPF ID LAN0 OSPF remote0 OSPF LAN0 OSPF ID remote0 OSPF ID LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 1 OSPF # ospf ip area 0 id # ospf ip area 1 id # reset 84 OSPFv2 IPv4

85 V LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 0 OSPF # ospf ip area 0 id # reset 3 LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 1 OSPF # ospf ip id # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 vlink 0 id # reset 4 LAN # lan 0 ip ospf use on 0 5 # remote 0 ip ospf use on 1 OSPF # ospf ip id # ospf ip area 0 id # ospf ip area 0 vlink 0 id # ospf ip area 1 id # reset 85 OSPFv2 IPv4

86 V LAN # lan 0 ip ospf use on 0 4 # remote 0 ip ospf use on 0 OSPF # ospf ip area 0 id # reset 86 OSPFv2 IPv4

87 V OSPF OSPF RIP BGP OSPF OSPF RIP BGP OSPF OSPF OSPF NSSA OSPF OSPF OSPF 5 6 remote IP-VPN 1 6 IP 1 6 NAT DHCP 5 6 ISDN 87 OSPFv2 IPv4

88 V LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID ID stub 2 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID ID stub 3 LAN0 OSPF LAN1 OSPF LAN0 OSPF ID LAN1 OSPF ID ID nssa 4 LAN0 OSPF LAN1 RIP V2,OSPF LAN0 OSPF ID LAN1 passive-interface ID nssa OSPF RIP RIP OSPF 5 LAN0 OSPF remote0 BGP LAN0 OSPF ID BGP OSPF BGP AS BGP IGP BGP /24 BGP /8 AS /16 6 BGP AS BGP IGP 88 OSPFv2 IPv4

89 V21 2 BGP / /24 1 LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 1 OSPF # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 type stub # reset 2 LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 0 OSPF # ospf ip area 0 id # ospf ip area 0 type stub # reset 89 OSPFv2 IPv4

90 V LAN # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 1 OSPF # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 type nssa # reset 4 LAN # lan 0 ip ospf use on 0 # lan 1 ip rip use v2m v2 0 off # lan 1 ip ospf use on 0 # lan 1 ip ospf passive on # routemanage ip redist ospf rip on # routemanage ip redist rip ospf on OSPF # ospf ip area 0 id # ospf ip area 0 type nssa # reset 90 OSPFv2 IPv4

91 V LAN # lan 0 ip ospf use on 0 # routemanage ip redist ospf bgp on BGP # bgp as # bgp neighbor 0 address # bgp neighbor 0 as 1 # bgp network igp on # bgp network route /24 # bgp aggregate /8 summary-only OSPF # ospf ip area 0 id # ospf ip summary /16 # reset 6 BGP # bgp as # bgp neighbor 0 address # bgp neighbor 0 as 1 # bgp network igp on # bgp network route /24 # bgp network route /24 # reset 91 OSPFv2 IPv4

92 V OSPF IPv4 LSA OSPF LSA LSA LSA LAN0 OSPF LAN1 OSPF LAN0 ID LAN1 ID /16 OSPF # lan 0 ip ospf use on 0 # lan 1 ip ospf use on 1 # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 range /16 # enable 92 OSPF IPv4

93 V AS OSPF AS OSPF AS AS AS OSPF AS LAN0 OSPF remote0 BGP LAN0 ID /16 OSPF # lan 0 ip ospf use on 0 # ospf ip area 0 id OSPF AS # routemanage ip redist ospf bgp on # ospf ip summary /16 AS # ospf ip redist 0 pass /16 inexact # ospf ip redist 1 reject any # enable 93 OSPF IPv4

94 V LSA TYPE3 LSA / /8 LAN0 OSPF remote0 OSPF LAN0 ID remote0 ID /8 LSA OSPF # lan 0 ip ospf use on 0 # remote 0 ip ospf use on 1 # ospf ip area 0 id # ospf ip area 1 id # ospf ip area 1 type3-lsa 0 reject /8 in exact # ospf ip area 1 type3-lsa 1 pass any in # enable 94 OSPF IPv4

95 V BGP IPv4 MR BGP4 P / /8 # bgp neighbor 0 filter 0 act pass in # bgp neighbor 0 filter 0 route /8 # bgp neighbor 0 filter 1 act pass in # bgp neighbor 0 filter 1 route /8 # bgp neighbor 0 filter 2 act reject in # bgp neighbor 0 filter 2 route any # enable 95 BGP IPv4

96 V AS AS4 # bgp neighbor 0 filter 0 act reject in # bgp neighbor 0 filter 0 as 4 # bgp neighbor 0 filter 1 act pass in # bgp neighbor 0 filter 1 route any # enable 96 BGP IPv4

97 V IP-VPN IP-VPN IP-VPN IP-VPN 1 IP-VPN 2 IP-VPN 2 IP-VPN 1 AS2 AS3 AS3 AS2 IP-VPN 1 # bgp neighbor 0 filter 0 act reject out # bgp neighbor 0 filter 0 as 3 # bgp neighbor 0 filter 1 act pass out # bgp neighbor 0 filter 1 route any IP-VPN 2 # bgp neighbor 1 filter 0 act reject out # bgp neighbor 1 filter 0 as 2 # bgp neighbor 1 filter 1 act pass out # bgp neighbor 1 filter 1 route any # enable 97 BGP IPv4

98 V IP-VPN 2 OSPF AS1 IP-VPN AS2 10/8 1 11/8 2 MED AS1 OSPF BGP AS2 1 MED # bgp neighbor 0 filter 0 act pass out # bgp neighbor 0 filter 0 route /8 # bgp neighbor 0 filter 0 set medmetric 0 # bgp neighbor 0 filter 1 act pass out # bgp neighbor 0 filter 1 route /8 # bgp neighbor 0 filter 1 set medmetric 10 # bgp neighbor 0 filter 2 act pass out # bgp neighbor 0 filter 2 route any BGP OSPF # routemanage ip redist bgp ospf on # enable 98 BGP IPv4

99 V MED # bgp neighbor 0 filter 0 act pass out # bgp neighbor 0 filter 0 route /8 # bgp neighbor 0 filter 0 set medmetric 10 # bgp neighbor 0 filter 1 act pass out # bgp neighbor 0 filter 1 route /8 # bgp neighbor 0 filter 1 set medmetric 0 # bgp neighbor 0 filter 2 act pass out # bgp neighbor 0 filter 2 route any BGP OSPF # routemanage ip redist bgp ospf on # enable BGP/MPLS VPN BGP MED AS MED AS BGP enable 99 BGP IPv4

100 V MPLS MPLS LSP label Switching Path LSP MPLS LSP MPLS MPLS MPLS LSP LSR MPLS LSP MPLS LSP MPLS LSP IPv4 IPv6 MPLS LSP BGP/MPLS VPN LDP over LDP MPLS LSP MPLS MPLS LSP IPv6 2 IPv6 Explicit NULL MPLS TTL TTL MPLS LSP LSP LSP IP TOS NAT RIP OSPF MPLS LSP MPLS LSP MPLS LSP MPLS EXP MPLS LSP 100 MPLS

101 V MPLS LSP 1 LAN0 MPLS LAN1 LAN MPLS LSR MPLS 1 2 EBGP 2 LAN0 MPLS LAN1 LAN MPLS LSR MPLS 2 1 EBGP 1 LAN0 MPLS IP MPLS LSR IP LAN1 IP IP AS AS LAN0 MPLS IP MPLS LSR IP LAN1 IP IP AS AS MPLS

Si-R30取扱説明書

Si-R30取扱説明書 6 6 WWW 6 65 67 67 68 ISDN 69 ISDN 75 80 ISDN 84 89 93 94 94 IP 95 96 98 TEL 99 99 100 100 101 1 1.. CHECK/B1/B/LAN HUB CHECK 3. Windows 95/98/Me IP MAC IP 1. -. winipcfg.exe Windows NT Windows 000 ipconfig.exe

More information

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応 Network Equipment 設定例集 Rev.8.03, Rev.9.00, Rev.10.01 対応 2 3 4 5 6 7 8 help > help show command > show command console character administrator pp disable disconnect 9 pp enable save Password: login timer

More information

MR1000 Webリファレンス

MR1000 Webリファレンス Web V21 LAN 2005 1 Microsoft Corporation OMRON Corporation 2004 All Rights Reserved. 2 Web V21... 2... 5... 5... 5 1... 6 2 ISDN... 7 2.1... 7 2.2... 8 3... 10 3.1... 10 3.2... 10 4 PPPoE... 12 4.1...

More information

インターネットVPN_IPoE_IPv6_fqdn

インターネットVPN_IPoE_IPv6_fqdn 技術情報 :Si-R/Si-R brin シリーズ設定例 (NTT 東日本 / NTT 西日本フレッツ光ネクスト ) IPv6 IPoE 方式 ( ひかり電話契約なし ) で拠点間を接続する設定例です フレッツ光ネクストのフレッツ v6 オプションを利用して 拠点間を VPN( ) 接続します IPv6 IPoE 方式 ( ひかり電話契約なし ) の場合 /64 のプレフィックスをひとつ配布されますが

More information

クラウド接続 「Windows Azure」との接続

クラウド接続 「Windows Azure」との接続 クラウド接続 Windows Azure との接続 2013 年 10 月 目次はじめに...3 ネットワーク構成...3 オンプレミス側ネットワーク...3 Windows Azure 側ネットワーク...4 Windows Azure での設定...4 仮想ネットワークの作成...4 ゲートウェイの作成...9 オンプレミス (Si-R) での設定... 11 IPsec 設定項目... 11

More information

Si-R/Si-R brin シリーズ設定例

Si-R/Si-R brin シリーズ設定例 技術情報 :Si-R/Si-R brin シリーズ設定例 Windows Azure との接続 ( ルートベース IPsec) Si-R G シリーズで Windows Azure ルートベース IPsec 接続する場合の設定例です [ 対象機種と版数 ] Si-R G100/G200 V2.16 以降 Si-R G110 V3.02 以降 [ 設定内容 ] Si-R G の ether 1 1 を

More information

SR-Sシリーズ セキュアスイッチ コマンド設定事例集

SR-Sシリーズ セキュアスイッチ コマンド設定事例集 SR-S P3NK-3822-06Z0 V13 SR-S V13 2009 11 2010 7 2 2010 10 3 2012 7 4 2012 9 5 2013 1 6 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2013 2 SR-S V13...2...6...6...7...8 1 VLAN...9 1.1 VLAN...9 1.2

More information

FUJITSU Network SR-S コマンド設定事例集

FUJITSU Network SR-S コマンド設定事例集 SR-S P3NK-4682-01Z0 FUJITSU Network SR-S V14 V14 2014 2 Microsoft Corporation Copyright FUJITSU LIMITED 2014 2 V14...2...6...6...7...8 1 VLAN...9 1.1 VLAN...9 1.2 VLAN...10 1.3 VLAN...11 2...12 2.1 LACP...13

More information

Si-R30コマンドリファレンス

Si-R30コマンドリファレンス 4 LAN 4.1 IP 4.1.1 lan ip address IP lan [] ip address / 0 / IP / ( ) LAN IP 1 IP / ( : 192.168.1.1/24) IP / ( : 192.168.1.1/255.255.255.0) IP 0.0.0.0

More information

技術情報:Si-R/Si-R brinシリーズ設定例 「Oracle Cloud Infrastructure Classic」との接続

技術情報:Si-R/Si-R brinシリーズ設定例 「Oracle Cloud Infrastructure Classic」との接続 技術情報 :Si-R/Si-R brin シリーズ設定例 Oracle Cloud Infrastructure Classic との接続 Si-R G シリーズで Oracle Cloud Infrastructure Classic に IPsec 接続する場合の設定例です 本設定例は 弊社で独自に接続試験 (2018 年 7 月 ) を行った結果を元に作成しております 今後 仕様変更などの可能性もありますので

More information

Si-R30取扱説明書

Si-R30取扱説明書 IP 317 318 IP 319 322 327 332 335 337 339 339 340 342 DNS ProxyDNS 344 DNS 344 DNS 348 DNS 349 DNS 350 DHCP 352 DHCP 353 DHCP 355 NAT 35 NAT 359 30 34 ID 38 371 374 CBCP 375 CBCP 377 379 380 TA 382 URL

More information

SRT/RTX/RT設定例集

SRT/RTX/RT設定例集 Network Equipment Rev.6.03, Rev.7.00, Rev.7.01 Rev.8.01, Rev.8.02, Rev.8.03 Rev.9.00, Rev.10.00, Rev.10.01 2 3 4 5 6 1 2 3 1 2 3 7 RTX1000 RTX1000 8 help > help show command > show command console character

More information

FUJITSU Network Si-R Si-Rシリーズ トラブルシューティング

FUJITSU Network Si-R Si-Rシリーズ トラブルシューティング P3NK-3942-06Z0 Si-R FUJITSU Network Si-R Si-R V35 V35 LAN 2009 11 2010 7 2 2012 11 3 2013 11 4 2014 6 5 2017 6 6 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2017 2 V35...2...4...4...5...6 1...7

More information

FUJITSU Network Si-R Si-R Gシリーズ トラブルシューティング

FUJITSU Network Si-R Si-R Gシリーズ トラブルシューティング P3NK-4472-09Z0 Si-R G FUJITSU Network Si-R FUJITSU Network Si-R Si-R G Si-R brin V2 V2 LAN 2011 11 2012 3 2 2012 8 3 2013 1 4 2013 3 5 2013 6 6 2014 1 7 2014 11 8 2016 7 9 Microsoft Corporation Copyright

More information

IPSEC(Si-RG)

IPSEC(Si-RG) 技術情報 :Si-R/Si-R brin シリーズ設定例 (NTT 東日本 / NTT 西日本フレッツ光ネクスト ) フレッツ VPN プライオで拠点間を接続する設定例です フレッツ VPN プライオを利用して 拠点間を VPN( ) 接続します IPv4 パケットを IPv4 ヘッダでカプセリング (IPv4 over IPv4 IPsec tunnel) Si-R でトンネリングすることで以下の構成が可能になります

More information

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能)

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能) RTX1100 client server network service ( ) RTX3000 ( ) RTX1500 2 Sound Network Division, YAMAHA 3 Sound Network Division, YAMAHA 172.16.1.100/24 172.16.2.100/24 LAN2 LAN3 RTX1500 RTX1100 client 172.16.1.1/24

More information

設定例集

設定例集 REMOTE ROUTER 1999. 2. 2 YAMAHA NetWare Novell,Inc. INS 64 YAMAHA! M E M O 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 : : : : : : : : : : : : : : : : : : : : :

More information

Si-R180 ご利用にあたって

Si-R180 ご利用にあたって P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14

More information

IPSEC(Si-RGX)

IPSEC(Si-RGX) 技術情報 :Si-R/Si-R brin シリーズ設定例 (NTT 東日本 / NTT 西日本フレッツ光ネクスト ) フレッツ VPN プライオで拠点間を接続する設定例です フレッツ VPN プライオを利用して 拠点間を VPN( ) 接続します IPv4 パケットを IPv4 ヘッダでカプセリング (IPv4 over IPv4 IPsec tunnel) Si-R でトンネリングすることで以下の構成が可能になります

More information

橡sirahasi.PDF

橡sirahasi.PDF Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,

More information

CS-SEIL-510/C コマンドリファレンス

CS-SEIL-510/C コマンドリファレンス FutureNet CS-SEIL-510/C 1.75 1 CS-SEIL-510/C 10 1.1................................................ 10 1.2............................................. 10 1.3..................................................

More information

JANOG14-コンバージェンスを重視したMPLSの美味しい使い方

JANOG14-コンバージェンスを重視したMPLSの美味しい使い方 MPLS JANOG14 BGP MPLS 2 : : 1988 2 2003 7 : 3 ( ( )100%) : 633 (2003 ) : : 1,029 (2004 7 1 ) 3 So-net 250 4 30!? 10 Non IP IP 5 IGP? ECMP ECMP?? 6 BGP MPLS 7 MPLS ATM IP ATM

More information

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 asaba@iij.ad.jp All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 2 user IX IX IX All Rights Reserved. Copyright(c)1997

More information

SGX808 IPsec機能

SGX808 IPsec機能 SGX808 IPsec 機能 ヤマハ株式会社 2016 年 1 月第 2.01 版 Copyright 2014-2016 Yamaha Corporation 1 更新履歴更新日付 バージョン 内容 2014.05.29 1.00 初版発行 2015.02.04 2.00 2つのセッションを張れるようにしました 相手先情報としてホストネームも指定できるようにしました デフォルト経路として IPsec

More information

FutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版

FutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版 FutureNet CS-SEIL Series CS-SEIL-510/C CS-SEIL/Turbo Firmware Version 1.82 FutureNet CS-SEIL.............................................. 1 1............................................. 11 1.1.........................................

More information

1.26 1 9 1.1................................................ 9 1.2............................................. 9 1.3.................................................. 11 1.4..............................................

More information

Microsoft PowerPoint - Amazon VPCとのVPN接続.pptx

Microsoft PowerPoint - Amazon VPCとのVPN接続.pptx Amazon VPC との VPN 接続マニュアル 2016 年 7 12 NECプラットフォームズ株式会社 Amazon VPC との VPN 接続 UNIVERGE WA シリーズ を使 して Amazon VPC(Amazon Virtual Private Cloud) と IPsec-VPN で接続する際の設定例を紹介します Amazon VPC を利 することにより Amazon AWS(Amazon

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

untitled

untitled NTT TOP A WAN WAN VRRP NIC OSPF VRRP STP 1. IPv6 IPv6 2. 3. IPv6 1. IPv4 NAT IPv6 1. 2. (IPv4 ) NAT? Unique Local IPv6 Unicast Address /8 /48 /64 /128 7 1 40 16 64 ULA Global ID Interface ID Type Subnet

More information

橡2-TrafficEngineering(revise).PDF

橡2-TrafficEngineering(revise).PDF Traffic Engineering AsiaGlobalCrossing GlobalCrossing Japan Traffic Engineering(TE) ( RFC2702 Requirements for Traffic Engineering over MPLS) 1 MPLS/VPN MPLS/TE MPLS VPN Prefix base (TDP

More information

IP.dvi

IP.dvi ... 3... 3... 3... 4... 6 VLAN... 6... 6 DHCP... 7... 7... 9... 9... 10... 12 R... 15... 15... 15 ARP... 18... 18 ARP... 18 DNS... 20... 20 DHCP/BOOTP... 21... 21 DHCP... 22 UDP... 23... 23... 23... 26...

More information

LAN

LAN LAN 2003 6 4 LAN Hotel LAN LAN IEEE802.11a IEEE802.11b 802.11b 11Mbps Copyright (c) 2003 NPO Page 3 FREESPOT FREESPOT HOTSPOT NTT ( ) MZONE ( )NTT Mobile ( ) Yahoo! BB ( ) MapFanWeb http://www.mapfan.com/musen/

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

FUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって

FUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって P3NK-3892-04Z0 FUJITSU Network Si-R FUJITSU Network Si-R Si-R brin Si-R240B LAN 2009 11 2010 7 2 2010 10 3 2015 1 4 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2015 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...12...12...12...12...12...13...13...13...14

More information

IIJ Technical WEEK SEILシリーズ開発動向:IPv6対応の現状と未来

IIJ Technical WEEK SEILシリーズ開発動向:IPv6対応の現状と未来 SEIL : IPv6 1 SEIL 2011 IPv6 SEIL IPv6 SEIL 4rd 2 SEIL 3 SEIL (1/3) SEIL IIJ SEIL 2001/6 IPv6 SEIL/X1 SEIL/X2 50,000 SEIL/x86 1998/8 SEIL SEIL/neu 128 SEIL/neu T1 SEIL/neu 2FE SEIL/neu ATM SEIL/Turbo SEIL/neu

More information

RT107e 取扱説明書

RT107e 取扱説明書 6 7 113 2 VPN LAN 1 CD-ROM 1 1 1 18 3 IPsec IPIP 36 38 88 99 113 66 76 n CD-ROM q4 3 ...2...3...6...7...7...8...9 DOWNLOAD...10...12 RT107e...14...15...18 1:...20 2:...22 3:...24 4:...28 5:LAN IP...30

More information

FUJITSU Network Si-R Si-RシリーズSi-R220C ご利用にあたって

FUJITSU Network Si-R Si-RシリーズSi-R220C ご利用にあたって P3NK-3882-04Z0 Si-R220C FUJITSU Network Si-R FUJITSU Network Si-R Si-R brin Si-R220C LAN 2009 11 2010 7 2 2010 10 3 2015 1 4 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2015 2 ...2...5...5...5...5...6...7...8...8...11...11...11...12...12...12...12...12...13...13...13...13...14

More information

IPIP(Si-RGX)

IPIP(Si-RGX) 技術情報 :Si-R/Si-R brin シリーズ設定例 (NTT 東日本 / NTT 西日本フレッツ光ネクスト ) フレッツ VPN プライオで拠点間を接続する設定例です フレッツ VPN プライオを利用して 拠点間を VPN( ) 接続します IPv4 パケットを IPv4 ヘッダでカプセリング (IPv4 over IPv4 tunnel) Si-R でトンネリングすることで以下の構成が可能になります

More information

IPIP(Si-RG)

IPIP(Si-RG) 技術情報 :Si-R/Si-R brin シリーズ設定例 (NTT 東日本 / NTT 西日本フレッツ光ネクスト ) フレッツ VPN プライオで拠点間を接続する設定例です フレッツ VPN プライオを利用して 拠点間を VPN( ) 接続します IPv4 パケットを IPv4 ヘッダでカプセリング (IPv4 over IPv4 tunnel) Si-R でトンネリングすることで以下の構成が可能になります

More information

ヤマハルーターのCLI:Command Line Interface

ヤマハルーターのCLI:Command Line Interface (Command Line Interface) cf. http://www.rtpro.yamaha.co.jp/rt/docs/console/ Command Line Interface Graphical User Interface 2 (CLI) WWW(GUI) (CLI) WWW(GUI) character display graphic display keyboard pointer

More information

FUJITSU Network SR-M コマンド設定事例集

FUJITSU Network SR-M コマンド設定事例集 SR-M P3NK-4192-03Z0 FUJITSU Network SR-M V02 LAN 2010 4 2013 7 2 2014 8 3 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2014 2 ...2...5...5...6...7 1 LAN SR-M20AP1 / 20AP2...8 1.1 LAN...8 1.2 LAN

More information

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici

More information

SRX300 Line of Services Gateways for the Branch

SRX300 Line of Services Gateways for the Branch SRX300 SRX300 WAN TCO SRX300 SRX300 UTM SRX300 4 SRX300 SRX300 WAN SRX300 1 Gbps 300 Mbps IPsec VPN 1 SRX320 SRX320 WAN SRX320 1 Gbps 300 Mbps IPsec VPN 1 SRX340 SRX340 WAN 1 U SRX340 3 Gbps 600 Mbps IPsec

More information

橡3-MPLS-VPN.PDF

橡3-MPLS-VPN.PDF MPLS-VPN NTT () MPLS IP IP 1 MPLS-VPN MPLS IP-VPN IP (IP-Sec VPN) MPLS-VPNMPLS (IP-VPN) MPLS-VPN IF ATM HSD (FR IP ) (a)ipsec-vpn ( ) (b)mpls-vpn IP-NW MPLS-VPN VPN 2 MPLS-VPN Cisco

More information

SRT100 コマンド設定運用説明書

SRT100 コマンド設定運用説明書 8 9 46 2 ...2 SRT100...4...6...8...9...9...10...11...12...14...15...19 CONSOLE...20 1....20 2.CONSOLE...21 3.CONSOLE...22...24 1....24 2....25 3....25 4....26 5....26 6.syslog...27 7.LAN...28 8.WAN...28

More information

Inter-IX IX/-IX 10/21/2003 JAPAN2003 2

Inter-IX IX/-IX 10/21/2003 JAPAN2003 2 Inter-IX satoru@ft.solteria.net 10/21/2003 JAPAN2003 1 Inter-IX IX/-IX 10/21/2003 JAPAN2003 2 Inter-IX? Inter-IX IX IX L2 10/21/2003 JAPAN2003 3 (1) IX (-IX) IX Resiliency 10/21/2003 JAPAN2003 4 (2) IX

More information

Si-R30コマンドリファレンス

Si-R30コマンドリファレンス 8 8.1 SNMP ( ) 8.1.1 snmp service ( ) SNMP SNMP snmp service on SNMP SNMP off SNMP SNMP SNMP SNMP Si-R30 SNMP snmp service off 171 8.1.2 snmp agent contact ( ) SNMP snmp agent contact []

More information

2001年12月VPN&ブロードバンドソリューションフォーラム

2001年12月VPN&ブロードバンドソリューションフォーラム /SOHO /SOHO Made in Japan. #1 RT100i 1BRI RT200i 4BRI/8BRI(opt.) RT102i RT140i 2BRI,1LAN RT80i DSU, 1BRI,2TEL 1BRI,2LAN RT140e RT140p 2BRI,1PRI,1LAN RT103i RTA50i 2BRI,2LAN RT140f DSU, 1BRI,3TEL,4HUB

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information

total.dvi

total.dvi VII W I D E P R O J E C T MPLS-IX MPLS-IX MPLS 1 MPLS AYAME IX IX LDP/RSVP-TE/CR- [121] 1999 Sub- LDP IP MPLS IX LSP LSP MPLS ebgp[165] LSP ( 2002 1.1 1.2) MPLS-IX MPLS IPv6 6PE IX () MPLS-IX MPLS IX

More information

R70_Software_Manual_JP1.3

R70_Software_Manual_JP1.3 R70 Ethernet CAN (1.3 JP) R70 Ethernet CAN Version 1.3 JP, 08/2008, DOC01816 Copyright 2008 by d&b audiotechnik GmbH; all rights reserved. d&b audiotechnik GmbH Eugen-Adolff-Strasse 134, D-71522 Backnang,

More information

ヤマハルーターでつくるブロードバンド企業ネットワーク

ヤマハルーターでつくるブロードバンド企業ネットワーク PDF http://www.rtpro.yamaha.co.jp/rt/docs/pdf www.rtpro.yamaha.co.jp/rt/docs/pdf/ OCN ADSL(1.5M) ISDN B CATV Yahoo!BB(8M) 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 RT100i IPX, Bridge RT200i

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs IPSEC VPN IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE 1 2 2 IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPsec SA IKE Initiator Responder IPsec-VPN ISAKMP

More information

NATディスクリプタ機能

NATディスクリプタ機能 NAT 1 NAT #1,#2 IP incoming/unconvertible/range IP ping/traceroute/ftp/cu-seeme NetMeeting 3.0 VPN PPTP 2 NAT (NAT NAT ) 3 (NAT) Revision 4 NAT (Rev.1 Rev.3 ) LAN LAN primary secondary TUNNEL VPN 3 NAT

More information

橡C14.PDF

橡C14.PDF BGP4 (( ) InternetWeek 98 ( ) Internet Week98 1998 Toshiya Asaba, Japan Network Information Center 1. 2. BGP 2.1. 2.2. ISP 2.3. IX - 2.4. 2.5. 3. BGP4 3.1. BGP4 3.2. EBGP IBGP 3.3. BGP AS 3.4. AS AS 3.5.

More information

RT107eセミナー用資料

RT107eセミナー用資料 2 AV&IT Business Group, YAMAHA RT107e RT107e RT107e RT107e RT107e RT107e RT107e RT107e 4 AV&IT Business Group, YAMAHA 2002~2003 RTX1000 200210 RTX1000 RT57i 20037 RT57i IP-VPN (FGA/FG/FO) VPN 5 AV&IT Business

More information

RT300i/RT140x/RT105i 取扱説明書

RT300i/RT140x/RT105i 取扱説明書 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Typewriter face RT105i RT300i RT140p RT140f RT140i RT140e RT105i RT300i 11 RARP 9600 bit/s 8 http://www.rtpro.yamaha.co.jp/ ftp.rtpro.yamaha.co.jp 12

More information

iPhone/iPad/Android(TM) とベリサイン アイデンティティプロテクション(VIP)エンタープライズゲートウェイとの組み合わせによるL2TP+IPsecのワンタイムパスワード設定例

iPhone/iPad/Android(TM) とベリサイン  アイデンティティプロテクション(VIP)エンタープライズゲートウェイとの組み合わせによるL2TP+IPsecのワンタイムパスワード設定例 VeriSign VIP VIP + AR VIP VIP AR VPN iphone ipad Apple Inc. iphone Android Google Inc. Copyright 2011 Allied Telesis K.K. All Rights Reserved. VIP AR User Copyright 2011 Allied Telesis K.K. All Rights

More information

Si-R30Bコマンドリファレンス

Si-R30Bコマンドリファレンス Si-R P3NK-3252-01Z0 30B Si-R30B() [] {} [] [] s() m()h()d() 1m = 1 60s60m24h 1m1h1d 3 3 13 save enable reset save reset save enable reset password delete delete [] show show LAN IP # show lan 0 ip

More information

RT300/140/105シリーズ 取扱説明書

RT300/140/105シリーズ 取扱説明書 REMOTE & BROADBAND ROUTER RT300i/RT140p/RT140f/RT140i RT140e/RT105p/RT105i/RT105e 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Console RT105i RT300i RT140p RT140f RT140i RT140e RT105p RT105i RT105e

More information

Si-R30取扱説明書

Si-R30取扱説明書 1 1 25 2 61 3 103 1 1 1 27 27 28 29 30 31 34 ISDN 34 35 35 36 ISDN 38 38 ISDN 39 40 ISDN 40 41 42 42 43 43 44 44 44 46 LAN 46 TCP/IP 46 WWW 52 LAN 54 54 HUB LAN 55 LAN 56 56 IP 57 58 1 1 Si-R30 CD-ROM

More information

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 1 2 3 1 2 ... 1 1... 8... 9... 18... 24... 25... 30... 31... 34... 37 E... 67 Bluetooth BIP... 68 2... 71... 73... 100 3 ... 132... 134... 136 E...

More information

ネットワーク製品 総合カタログ Vol.37 ルータ

ネットワーク製品 総合カタログ Vol.37 ルータ IP CiscoASR00 FUJITSU Network Si-R FUJITSU Network Si-R Si-R G WAN WAN ONU WAN Si-R GX00 Si-R ONU 0MWAN LTEWANWAN GINS IPGbps.0Gbps over,000 UONU BRIPRIISDN Si-R0brin Cisco ASR Si-R IP FUJITSU Network

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 RT140i #1(PPP) RT105i RTA52i R (PP#) (LAN#) [NAT] R LAN LAN 2 #2() RT300i RTW65b RT140e RT105e (LAN2) R (LAN1) RTA55i R LAN LAN 3 #3(PPPoE) R (LAN#) (PP#) (PP#) LAN ISDN/ LAN 4 RT300i RT105 #4(VPN) R

More information

RT57i 困ったときは

RT57i 困ったときは ? q ISDN / FAX / q q q VoIP q ISDN / FAX / 1 POWER? q 2 ISDN? q 3 q q q FAX q q q q q ISDN q INS q INS q INS 1 POWER? q 2 LAN q 3 q q q q Web q 1 POWER? q 2 LAN? q 3 ISDN ISDN WAN? q ISDN q WAN 4 q q ISDN

More information

宛先変更のトラブルシューティ ング

宛先変更のトラブルシューティ ング APPENDIX B この付録では Guard の宛先変更元ルータ (Cisco および Juniper) に関連する宛先変更問題を解決するためのトラブルシューティング手順を示します 次の手順について説明します Guard のルーティングと宛先変更元ルータの設定確認 Guard と宛先変更元ルータ間の BGP セッションの設定確認 宛先変更元ルータのレコードの確認 B-1 Guard のルーティングと宛先変更元ルータの設定確認

More information

RTX830 取扱説明書

RTX830 取扱説明書 RTX830 JA 1 2 3 4 5 6 7 8 9 10 11 external-memory performance-test go 12 13 show config 14 15 16 17 18 19 20 save 21 22 23 24 25 26 27 save RTX830 BootROM Ver. 1.00 Copyright (c) 2017 Yamaha Corporation.

More information

FW Migration Guide(ipsec2)

FW Migration Guide(ipsec2) IPsec( サイト間トンネル ) 機能 利用時の移行 2 第 1 版 Copyright NTT Communications Corporation. All right reserved. 更新履歴 更新日更新内容版数 2017/12/11 初版 1 Copyright NTT Communications Corporation. All right reserved. 2 前提条件 Copyright

More information

untitled

untitled FLASHWAVE 2040 M1 2005 FLASHWAVE 2040 M1 AC AC AC FG () AC AC AC AC - i - FLASHWAVE 2040 M1 AC AC AC AC AC AC100V(50Hz/60Hz) AC - ii - FLASHWAVE 2040 M1 AC AC - iii - FLASHWAVE 2040 M1 VCCI This equipment

More information

BGP ( ) BGP4 community community community community July 3, 1998 JANOG2: What is BGP Community? 2

BGP ( ) BGP4 community community community community July 3, 1998 JANOG2: What is BGP Community? 2 BGP Community 1998/7/3 JANOG#2 in KDD (yahagi@itjit.ad.jp) July 3, 1998 JANOG2: What is BGP Community? 1 BGP ( ) BGP4 community community community community July 3, 1998 JANOG2: What is BGP Community?

More information

rzakg.ps

rzakg.ps IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 65 IBM i5/os ( 5722-SS1) 5 4 0 RISC CISC URL http://www.ibm.com/jp/manuals/main/mail.html

More information

Soliton Net’Attest EPS + AR router series L2TP+IPsec RADIUS 設定例

Soliton Net’Attest EPS + AR router series L2TP+IPsec RADIUS 設定例 Soliton Net Attest EPS + AR router series L2TP+IPsec RADIUS 設定例 2011/June アライドテレシス株式会社 Revision 1.1 1. Net Attest EPS AR VPN 2 1. 1. 1. AR AR (RADIUS ) 2. 2. Net Attest EPS 3-1. 3-1. iphone/ipad 3-2. 3-2.

More information

FW Migration Guide(ipsec1)

FW Migration Guide(ipsec1) IPsec( サイト間トンネル ) 機能 利用時の移行 1 第 1 版 Copyright NTT Communications Corporation. All right reserved. 更新履歴 更新日更新内容版数 2017/12/11 初版 1 Copyright NTT Communications Corporation. All right reserved. 2 前提条件 Copyright

More information

2011 NTT Information Sharing Platform Laboratories

2011 NTT Information Sharing Platform Laboratories NGN IPv6 multi-homing uplink load balancing 2 3 4 uplink uplink prefix domain A domain A prefix prefix prefix = longest match domain A domain A DNS Server domain A domain B 5 uplink uplink prefix domain

More information

Microsoft Azure AR4050S, AR3050S, AR2050V 接続設定例

Microsoft Azure AR4050S, AR3050S, AR2050V 接続設定例 Microsoft Azure AR4050S, AR3050S, AR2050V 接続設定例 当社検証結果に基づき記載していますが 全てのお客様環境の動作を保証するものではありません 2018 年 8 月現在の仕様に基いて記載しています 今後の仕様変更によっては接続できない可能性があります アライドテレシス株式会社 目次 1. 概要 1. 概要 2. 設定例の構成 3. IPsecのパラメータ 2.

More information

untitled

untitled ... 2... 2.... 2... 3... 5... 7... 9... 9 ADD PORT... 10 CREATE..... 12 DELETE PORT... 13 DESTROY.... 14 SET PORT.... 15 SHOW...... 16 CentreCOM AR450S 2.9 1 LAN LAN 802.1Q LAN WAN Ethernet WAN Ethernet

More information

untitled

untitled 7 Review PC+ () 1+PHS etc!! SOI!! Topics () IP () / L3 IP YMH RTX-1500 BUFFLO BHR-4RV PLNEX GW-P54SG Cisco 2600 Hitachi GR2000-1B Cisco 3700 Juniper M10 Foundry Networks NetIron 800 Cisco CRS-1 (FIB: Forwarding

More information

GA-1190J

GA-1190J GA-1190J 1 1. 2. 3. 4. 2 5. 3 PDF 4 PDF PDF PDF PDF PDF PDF PDF PDF 5 6 ...1...2...4 1...12 2...16...18 3...22 PCL/PS...23 4...26 5...30 ETHERNET...31 TCP/IP...33 IPX/SPX...38 AppleTalk...40 HTTP...42

More information

Amazon Web Services (AWS) - ARX640S 接続設定例

Amazon Web Services (AWS) - ARX640S 接続設定例 Amazon Web Services (AWS) - ARX640S 接続設定例 Border Gateway Protocol(BGP) 当社検証結果に基づき記載していますが 全てのお客様環境の動作を保証するものではありません 2015 年 5 月現在の仕様に基いて記載しています 今後の仕様変更によっては接続できない可能性があります アライドテレシス株式会社 目次 1. 概要 1. 概要 2.

More information

untitled

untitled FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...

More information

Microsoft PowerPoint - 情報システム20131127.pptx

Microsoft PowerPoint - 情報システム20131127.pptx 2013 11 27 NTT ISP IP 32 8. FTTH OLT ONU( ) ADSL DSLAM ADSL (ISDN) WiMAX ISP i sp ISP LAN ISP IP PPPoE FTTH ADSL BAS ID IP PPP RAS ID IP DHCP DHCP IP PPPoE ID ID ISP @ IP IPCP ID PC PC WAN LAN PC PPPoE

More information

SRX License

SRX License SRX ライセンスキー投入手順 株式会社日立ソリューションズネットワークビジネス部セキュリティグループ リビジョン 4.0 初版 2010/05/30 最新版 2012/12/27 Hitachi Solutions, Ltd. 2010-2012. All rights reserved. SRX ライセンスキー投入手順 Contents 1. ライセンスキーの自動インポート ( インターネット接続必須

More information

WEB.dvi

WEB.dvi ... 5... 5... 5... 7... 8... 8... 10... 11... 11... 12... 13 HTTP... 13... 14... 15... 15... 15 IP... 15... 16... 17... 18 NTP... 18 SNMP.... 19 SNMP... 19 SNMP... 20 SNMP... 22 SNMP... 22... 22... 23...

More information

CS-SEIL-510/C ユーザーズガイド コマンドラインインターフェイス編

CS-SEIL-510/C ユーザーズガイド コマンドラインインターフェイス編 CS-SEIL-510/C Firmware version 1.75 ............................................ 1 1 5 1.1 CS-SEIL-510/C.................................. 6 1.2............................. 7 1.3...............................

More information

MR1000 機能説明書

MR1000 機能説明書 V21 LAN 2005 1 Microsoft Corporation OMRON Corporation 2004 All Rights Reserved. 2 V21... 2... 5... 5... 5... 5... 6 1... 11 1.1... 12 1.1.1... 12 1.1.2... 16 2... 19 2.1 IPv6... 21 2.2 IP... 23 2.2.1

More information

試験問題での表記規格 標準の名称験午前Ⅱ 問題文中で共通に使用される表記ルール 各問題文中に注記がない限り, 次の表記ルールが適用されているものとする. JIS Q 9001 JIS Q JIS Q JIS Q JIS Q JIS Q 2700

試験問題での表記規格 標準の名称験午前Ⅱ 問題文中で共通に使用される表記ルール 各問題文中に注記がない限り, 次の表記ルールが適用されているものとする. JIS Q 9001 JIS Q JIS Q JIS Q JIS Q JIS Q 2700 試験問題での表記規格 標準の名称験午前Ⅱ 問題文中で共通に使用される表記ルール 各問題文中に注記がない限り, 次の表記ルールが適用されているものとする. JIS Q 9001 JIS Q 14001 JIS Q 15001 JIS Q 20000-1 JIS Q 20000-2 JIS Q 27001 JIS Q 27002 JIS X 0160 ISO 21500 ITIL PMBOK 共通フレーム

More information

IPv6移行ガイドライン

IPv6移行ガイドライン ... 1... 1... 1 1. SOHO... 2 SOHO... 2 SOHO... 3 SOHO... 4 2.... 5... 5... 7 3. SOHO... 8 SOHO... 8... 9... 13... 20 SOHO... 24 4. SOHO... 26 SOHO... 26 SOHO... 28 VPN... 29 5.... 30... 30... 30 6....

More information

BR500S 機能説明書

BR500S 機能説明書 BR500S BR500S V21 LAN 2008 9 This equipment is designed for use in Japan only and cannnot be used in any other country. Microsoft Corporation 2008 NTTEAST NTTWEST 2 BR500S V21... 2... 5... 5... 5... 5...

More information

00.目次_ope

00.目次_ope 816XL ii iii iv iv User Entry 1 3 v vi vii viii 1 1 C: >VTTERM 1- 1 1-3 1 1-4 1 1-5 1 1-6 1 1-7 1 1-8 1 1-9 1 1-10 C: >VTN 1 Host Name: 1-11 1 01 1-1 0.0.0.0 1 1-13 1 1-14 - -3 Port status and configuration

More information

RT58i 接続ガイド

RT58i 接続ガイド VoIP 4 5 50 2 TEL DSU VoIP VoIP AC P12V0.95A 1 1 CD-ROM 1 1 RT58i ADSL/B ISDN 15 17 23 24 25 28 30 36 43 CD-ROM VoIP CD-ROM H CD-ROM PDF PDF Adobe Adobe Reader Adobe Reader Adobe Web Adobe ReaderAdobe

More information

ループ防止技術を使用して OSPFv3 を PE-CE プロトコルとして設定する

ループ防止技術を使用して OSPFv3 を PE-CE プロトコルとして設定する ループ防止技術を使用して OSPFv3 を PE-CE プロトコルとして設定する 目次 概要前提条件要件使用するコンポーネント背景説明設定ネットワーク図設定 DN ビット確認トラブルシューティング Cisco サポートコミュニティ - 特集対話 概要 このドキュメントでは Open Shortest Path First (1 バージョン 3 (OSPFv3) " を プロバイダーエッジ (PE )

More information

AMF Cloud ソリューション

AMF Cloud ソリューション アライドテレシス バーチャルAMFアプライアンスで実現する 主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー/マスターを仮想マシン上に集約したい AMF機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 概要 これまで AMF機能を用いることで ネットワークの一元管理が可能となり 機器故障時 には代替機と差し替えるだけで自動的に復旧させるAuto

More information

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,

More information

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用) Mac OS X Server QuickTime Streaming Server 5.0 Mac OS X Server 10.3 apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. QuickTime Streaming Server Apple Apple Computer, Inc. Apple

More information

ADSLモデム設定マニュアル

ADSLモデム設定マニュアル ADSL () [] 1. -- ----------------------------------------------------------------------------------------------------2 2. LAN (Windows95, 98 SE,Me)-------------------------------------------------------

More information

CS-SEIL-510/C ユーザーズガイド Webインターフェイス編

CS-SEIL-510/C ユーザーズガイド Webインターフェイス編 Web Firmware version 1.78 ............................................ 1 1 5 1.1 CS-SEIL-510/C.................................. 6 1.2 2............................ 7 1.3...............................

More information

VoIP Broadcasting System 2/2 IP Convergence Communication Solution IP paradigm Integration & Management VoIP IP VoIP VoIP IT < 02-06-12>

VoIP Broadcasting System 2/2 IP Convergence Communication Solution IP paradigm Integration & Management VoIP IP VoIP VoIP IT < 02-06-12> 2003. 5. 22 AddPac Technology Proprietary VoIP Broadcasting System 2/2 IP Convergence Communication Solution IP paradigm Integration & Management VoIP IP VoIP VoIP IT < 02-06-12> 8Khz 16Khz CDMA ADSL VoIP

More information

LSM-L3-24設定ガイド(初版)

LSM-L3-24設定ガイド(初版) 4 2 IP 3 2 MAC VLAN 1 MAC MAC 4-1 2 4-2 VLAN classification VLAN Learning Filtering Forwarding VLAN classification learning filtering forwarding VLAN Classification 2 : - VLAN - VLAN ID Learning VLAN classification

More information