Size: px
Start display at page:

Download ""

Transcription

1

2

3 iii I TCP UDP ICMP II IPFilter private address spoofing IP ICMP Mail Web DNS query

4 iv 4 RIP RIP Quagga Quagga zebra ripd Quagga VTY RIP OSPF OSPF (LSA) OSPF ospfd ospf router ospf rip interface OSPF BGP BGP BGP bgpd bgpd BGP

5 NAT N.0/24 IP NAT DNS (/etc/rc.conf named_enab="no" ) Ethernet PCMCIA # ifconfig ue0 ue0: flags=108843<up,broadcast,running,simplex,multicast> mtu 1500 options=8<vlan_mtu> ether 00:09:5b:bc:01:8f media: Ethernet autoselect (none) status: no carrer ifconfig ue0 1.2 le0 IP N.M/24 N M ue0 IP N.1 kterm ping ( ping ) arp -a ue0 IP N.0/ N.1/30 IP N.2/30 N 1 4 N 1 IP ping ifconfig ue0 PC IP IP 1.5 NAT /etc/rc.conf ( N.0/24 )

6

7 3 2 I ( ) ( ) ( ) IP,, (TCP,UDP,ICMP) IPFilter, IPFW(FreeBSD), PF, screend, IPCHAIN(Linux) IPFilter OS (Solaris ) IPFilter FreeBSD IPFW(IPFirewall),IPFilter,PF IPFW IPFW IPFilter IPFW OS PF OpenBSD OpenBSD IPFilter OpenBSD IPFilter IPFilter IPFilter NAT OS 2.1 TCP/IP

8 4 2 I TCP/IP 2 TCP 2 IP,Port, IP,Port 2 IP,Port mail MTA mail-server,25 2 IP,Port, IP,Port TCP ( UDP TCP UDP ) 1023 Unix root ( ) Unix Unix OS FreeBSD Linux NIS TCP TCP TCP TCP TCP TCP TCP 2byte 10 15

9 bit 10 URG 11 ACK 12 PSH 13 RST 14 SYN 15 FIN TCP (RFC793) 1. (a) SYN SENT (3 ) (b) ESTABLISHED (c) FIN WAIT 1, FIN WAIT 2 (half-closed) (d) TIME WAIT (e) CLOSED 2. (a) LISTEN (b) SYN RECVD (c) ESTABLISHED (d) CLOSE WAIT (e) LAST ACK (f) CLOSED SYN ACK ACK(,PSH,URG) FIN,ACK SYN,ACK ACK(,PSH,URG) ACK FIN,ACK ACK 3 setup established ( ) SYN ACK

10 6 2 I SYN ( ) SYN ACK IPFilter ( UDP,ICMP IPFW ) (stateful) (stateless) (Sequence Number) (ACK Number) (Sequence Number ACK Number Sequence Number ) UDP UDP TCP UDP DNS DNS ( ) UDP TCP DNS DNS TCP DNS TCP ( DoS DNS DNS ) UDP IP,Port, IP,Port IP,Port UDP ICMP ICMP (Internet Control Message Protocol) TCP,UDP ( ) IP ping ICMP ICMP 1byte

11 type message ipf 0 Echo Reply echorep 3 Host Unreacheable unreach 4 Source Quench squench 5 Redirect redir 8 Echo echo 9 Router Advertisement routerad 10 Router Solicitation routersol 11 Time Exceeded timex 12 Parameter Problem paramprob 13 Time Stamp timest 14 Time Stamp Reply timestrep 15 Information Request inforeq 16 Information Reply inforep 17 Address Mask Request maskreq 18 Address Mask Reply maskrep Echo, Echo Reply Echo Reply Host Unreacheable Source Quench Redirect Router Solicitation, Router Advertisement Time Exceeded TTL(Time To Live) 0 Fragmentation Parameter Problem Time Stamp, Time Stamp Reply

12 8 2 I Information Request, Information Reply IP Information Reply Address Mask Request, Address Mask Reply ICMP ( ) 2. IP 3. IP 4. (NAT ) 5. IP 1. Mail Server SMTP 2. SMTP 3. DNS(, ) UDP 4. DNS 5. WWW 6. WWW 7. NTP NTP Network Time Protocol NTP Cisco FreeBSD IPFilter FTP

13 9 3 II 3.1 IPFilter IPFilter make (Solaris solaris) make install FreeBSD OS make ( Solaris SunOS5/ make package pkg pkgadd ) FreeBSD NAT IPFilter IPFilter OS FreeBSD 1. /usr/src/sys/i386/conf (GENERIC LINT) ( ) 2. config MYKERNEL # config MYKERNEL 3. make config../compile/mykernel

14 10 3 II # make depend # make 4. # make install # shutdown -r now /boot/kernel/ /boot/kernel.old/ /boot/kernel.old/ mv /boot/kernel.old /boot/kernel.org /kernel.org make 5. 9 ok /boot/kernel.org/ ( /boot/kernel.old/ ) ok unload ok load /boot/kernel.old/kernel ok boot /boot/kernel.old/ ( kernel.org ) loader prompt 6

15 3.1. IPFilter NAT /sys/i386/conf/ ( /usr/src/sys /usr/src/sys/i386/conf/ ) /sys/i386/conf/generic LINT LINT LINT (LINT make LINT ) GENERIC ( MYKERNEL) options IPFILTER #ipfilter support options IPFILTER_LOG #ipfilter logging options IPFILTER_DEFAULT_BLOCK #block all packets by default options IPSTEALTH #support for stealth forwarding MYKERNEL GENERIC ( /var/log/messages GENERIC ) ident MYFIREWALL (/etc/rc.conf)

16 12 3 II /etc/ipf.rules pass in all pass out all /etc/rc.conf ipfilter_enable="yes" ipnat_enable="no" ipmon_enable="yes" tcp_drop_synfin="yes" # Set to YES to enable ipfilter functionality # Set to YES for ipnat; needs ipfilter, too! # Set to YES for ipmon; needs ipfilter, too! # Set to YES to drop TCP packets with SYN+FIN icmp_drop_redirect="yes" # Set to YES to ignore ICMP REDIRECT packets icmp_log_redirect="yes" # Set to YES to log ICMP REDIRECT packets /etc/default/rc.conf /etc/defaults/rc.conf # /etc/defaults/rc.conf ipfilter_program="/sbin/ipf" # where the ipfilter program lives ipfilter_rules="/etc/ipf.rules" # rules definition file for ipfilter, see ipfilter_flags="" # /usr/src/contrib/ipfilter/rules for examples # additional flags for ipfilter /etc/rc.conf FreeBSD /etc/rc.conf # /etc/rc.d/ipfilter start ipfilter # /etc/rc.d/ipfilter reload OS # ipf -Fa -f /etc/ipf.rules ( telnet ) tcpdump wireshark

17 3.1. IPFilter IPFilter ipf ipfstat ipftest ipnat NAT ipmon ipresend IP FreeBSD ipf,ipnat,ipfstat,ipmon,ipresend /sbin ipf, ipfstat, ipftest ipf ipf # ipf -Fa -Z -f /etc/ipf.rules (-Fa) /etc/opt/ipf/ipf.conf (-Z) ipfstat

18 14 3 II bad packets: in 0 out 0 IPv6 packets: in 0 out 0 input packets: blocked 0 passed 113 nomatch 0 counted 0 short 0 output packets: blocked 0 passed 78 nomatch 0 counted 0 short 0 input packets logged: blocked 0 passed 0 output packets logged: blocked 0 passed 0 packets logged: input 0 output 0 log failures: input 0 output 0 fragment state(in): kept 0 lost 0 not fragmented 0 fragment state(out): kept 0 lost 0 not fragmented 0 packet state(in): kept 0 lost 0 packet state(out): kept 0 lost 0 ICMP replies: 0 TCP RSTs sent: 0 Invalid source(in): 0 Result cache hits(in): 19 (out): 45 IN Pullups succeeded: 0 failed: 0 OUT Pullups succeeded: 0 failed: 0 Fastroute successes: 0 failures: 0 TCP cksum fails(in): 0 (out): 0 IPF Ticks: 2216 Packet log flags set: (0) none -s -i -o ( input -o output ) IP -s -i -o # /sbin/ipfstat -io pass out quick on OUTIF proto tcp/udp from /24 to any keep state pass out quick on OUTIF proto icmp from /24 to any keep state block in on OUTIF from any to any block in quick on OUTIF from /12 to any block in quick on OUTIF from /8 to any block in quick on OUTIF from /8 to any block in quick on OUTIF from /3 to any pass in quick on OUTIF proto tcp/udp from /24 to any keep state -io IPFilter -i -i, -o -n

19 ipftest IPFilter IPFilter ipftest # ipftest -r ipf.rules -i data ipf.rules data data in on OUTIF tcp , ,80 TCP OUTIF IP Port Port 80 (pass) # ipftest -r ipf.rules -i data pass ip #0 40(20) ,20000 > , IPFilter [block pass] [in out] [quick,log,on IF] [proto {tcp/udp tcp udp icmp}] [IP-set] quick block pass (block,pass count,skip,auth,call ) in out on IF ifconfig lnc0 on lnc0 log ( ) quick ( head

20 16 3 II ) IPFilter quick proto 4 tcp/udp tcp udp icmp TCP UDP TCP UDP ICMP proto /etc/services OSPF pass in quick proto 89 all pass out quick proto 89 all (OSPF 89 ) proto IP-set from to any any 10/ /16 from /8 to /16 mask from mask to mask from any to any all WWW from any to port = 80 >< Port from any to port 5999 >< 6064

21 > <!= >= <= log ipmon IPFILTER_LOG ( ) ipmon /etc/rc.conf ipmon_enable="yes" ( ) ipmon_flags="-ds" # typically "-Ds" or "-D /var/log/ipflog" syslog local0.* /etc/syslog.conf ipmon_flags="-d /var/log/iplog" /var/log/iplog ( touch /var/log/iplog ) # /etc/rc.d/ipmon restart syslog /etc/syslog.conf *.emerg local0.* syslogd *.emerg * local0.* /var/log/iplog

22 18 3 II private address spoofing Internet private address private address OUTIF INIF # Deny reserved addresses from outside block in log quick on OUTIF from /8 to any block in log quick on OUTIF from /16 to any block in log quick on OUTIF from /12 to any /29 block in log quick on OUTIF from /29 to any block out log quick on OUTIF from any to /29 block in log quick on OUTIF from /8 to any block in log quick on OUTIF from any to /8 pass in quick on lo0 all pass out quick on lo0 all DHCP D,E block in quick on OUTIF from any to /8 block in quick on OUTIF from any to /16 block in quick on OUTIF from any to /24 block in quick on OUTIF from any to /4 block in quick on OUTIF from any to /4 draft-manning-dsua-03.txt /4

23 IP IP DoS IP rr ts ssrr lsrr block in log quick on OUTIF from any to any with opt rr block in log quick on OUTIF from any to any with opt ts block in log quick on OUTIF from any to any with opt ssrr block in log quick on OUTIF from any to any with opt lsrr in, out in, out Outside In Out FireWall out0 in0 Inside Out In 4 IPFilter head OUTIF pass in on OUTIF all head 100 pass block block

24 20 3 II block in on OUTIF all head 100 OUTIF 100 OUTIF 100 ( quick head quick head head quick ) block in on OUTIF all head 100 block out on OUTIF all head 200 pass in on INIF all head 300 pass out on INIF all head 400 # pass loop back on lo0 pass in quick on lo0 all head 500 pass out quick on lo0 all head 600 # Deny reserved addresses block in log quick from /8 to any group 100 block in log quick from /16 to any group 100 #block in log quick from /12 to any group 100 # Deny ip spoofing block in log quick on OUTIF from /29 to any group 100 block out log quick on OUTIF from any to /29 group 200 # loop back block in log quick from /8 to any group 100 block in log quick from any to /8 group 100 block in log quick from /8 to any group 300 block in log quick from any to /8 group 300 # other reserved address block in quick on OUTIF from any to /8 group 100 block in quick on OUTIF from any to /16 group 100 block in quick on OUTIF from any to /24 group 100 # block in quick on OUTIF from any to /4 group 100 # multicast block in quick on OUTIF from any to /4 group 100 # IP options block in log quick on OUTIF from any to any with opt rr group 100 block in log quick on OUTIF from any to any with opt ts group 100 block in log quick on OUTIF from any to any with opt ssrr group 100 block in log quick on OUTIF from any to any with opt lsrr group 100 group [number] lo0

25 /12 NAT NAT ( NAT ) NAT IP NAT 1 1 NAT ICMP ICMP ICMP ICMP ICMP type message in out 0 Echo Reply pass block 3 Host Unreachable pass pass 4 Source Quench pass pass 5 Redirect block block 8 Echo block pass 9 Router Advertisement block block 10 Router Solicitation block block 11 TTL Exceeded pass pass 12 Parameter Problem pass pass 13 Time Stamp block block 14 Time Stamp Reply block block 15 Information Request block block 16 Information Request Reply block block 17 Address Mask Request block block 18 Address Mask Request Reply block block

26 22 3 II 3 out 4 source quench Echo Reply ( IPFilter ) pass in quick proto icmp all icmp-type 0 group 100 pass in quick proto icmp all icmp-type 3 group 100 pass in quick proto icmp all icmp-type 4 group 100 #pass in quick proto icmp all icmp-type 8 group 100 # for test pass in quick proto icmp all icmp-type 11 group 100 pass in quick proto icmp all icmp-type 12 group 100 #pass out quick proto icmp all icmp-type 0 group 200 # for test pass out quick proto icmp all icmp-type 3 group 200 pass out quick proto icmp all icmp-type 4 group 200 pass out quick proto icmp all icmp-type 8 group 200 pass out quick proto icmp all icmp-type 11 group 200 pass out quick proto icmp all icmp-type 12 group 200 Echo ( ) Mail Web Web Web TCP 3 setup SYN SYN+ACK ACK ACK established setup IPFilter keep state keep state stateful TCP keep state TCP flags S SYN

27 (MAIL) pass in quick proto tcp from any to MAIL port = 25 flags S keep state group 100 pass out quick proto tcp from MAIL to any port = 25 flags S keep state group 200 Web server(www) pass in quick proto tcp from any to WWW port = 80 flags S keep state group 100 pass out quick proto tcp from any to any port = 80 flags S keep state group 200 Web 80 from any IP 1. flags S flags S flags SYN U(RG),A(CK),P(SH),R(ST),S(YN),F(IN) ( U,A,P,R,F ) SA (SYN+ACK) flags S/SA SA SYN S/SA S U,P,R,F SF SA S UAPRSF SF SA SF & SA S SAF SAF(010011) SA(010010) (010010) S(000010) SAF flags S/SA flags /S flags S/SA SF RFC1322 TCP/IP Web SF SR,SU,SP

28 24 3 II flags S SF flags S/SUAPR 2. keep frags SYN keep state keep frags ( ) pass in quick proto tcp from any to WWW port = 80 flags S keep state keep frags group 100 pass out quick proto tcp from any to any port = 80 flags S keep state keep frags group 200 ( ) Mail NTP (Network Time Protocol port=123) NNTP(Network News Transfer Protocol port=119) mail DNS query DNS query DNS 53 DNS query UDP (TCP DNS ) stateless UDP DNS 53 IPFilter keep state pass in quick proto udp from any to MYDNS port = 53 group 100 pass in quick proto udp from any port = 53 to any group 100 pass out quick proto udp from MYDNS port = 53 to any group 200 pass out quick proto udp from any to any port = 53 group 200 MYDNS DNS to any from any stateless stateful

29 pass in quick proto udp from any to MYDNS port = 53 keep state group 100 pass out quick proto udp from any to any port = 53 keep state group 200 DNS port 53 pass in quick proto udp from any to MYDNS port = 53 keep state group 100 pass out quick proto udp from MYDNS port = 53 to any port = 53 keep state group 200 nslookup DNS query response DNS UDP 53 (DNS 53 ) pass out quick proto tcp from INSIDE port >= 1024 to any flags S keep state keep frags group 200 ( ) INSIDE IPFilter keep state TCP UDP ICMP 60 ICMP ICMP traceroute block ICMP pass out proto udp from any to any port >< keep state group 200 ICMP Echo ICMP EchoReply pass out proto icmp from INSIDE to any icmp-type echo keep state group SSH(Secure SHell)

30 26 3 II SSH 22 SSH pass in quick proto tcp from any port >= 1024 to SSH port = 22 flags S keep state keep frags gorup 200 ( ) quick block in from any to INSIDE port < 1024 group 100 ICMP unreachable IP IP IP ( ) # block with port unreachable block return-icmp-as-dest(port-unr) in from any to INSIDE port < 1024 group lister 1433 SQLSPIDA 1434 Slammer for MS SQL 1524 ingreslock 2000 openwin 2049 NFS 2766 listner(systemv) X IRC 7100 Sun Font server(tcp)

31 # block in on OUTIF all head 100 block out on OUTIF all head 200 pass in on INIF all head 300 pass out on INIF all head 400 # pass loop back on lo0 pass in quick on lo0 all head 500 pass out quich on lo0 all head 600 # block in log quick from any to any with ipopts group 100 block in log quick proto tcp from any to any with short group 100 # # Deny reserved addresses block in log quick from /8 to any group 100 block in log quick from /16 to any group 100 #block in log quick from /12 to any group 100 # # Deny ip spoofing block in log quick from /29 to any group 100 block out log quick from any to /29 group 200 # # block from loop back address block in log quick from /8 to any group 100 block in log quick from any to /8 group 100 block in log quick from /8 to any group 300 block in log quick from any to /8 group 300 # # /* */

32 28 3 II # block other reserved address block in quick from any to /8 group 100 block in quick from any to /16 group 100 block in quick from any to /24 group 100 # block in quick on OUTIF from any to /4 group 100 # multicast #block in quick from any to /4 group 100 # block irregular IP options block in log quick from any to any with opt rr group 100 block in log quick from any to any with opt ts group 100 block in log quick from any to any with opt ssrr group 100 block in log quick from any to any with opt lsrr group 100 # # ICMP pass in quick proto icmp all icmp-type 0 group 100 # for test pass in quick proto icmp all icmp-type 3 group 100 pass in quick proto icmp all icmp-type 4 group 100 pass in quick proto icmp all icmp-type 8 group 100 # for test pass in quick proto icmp all icmp-type 11 group 100 pass in quick proto icmp all icmp-type 12 group 100 pass out quick proto icmp all icmp-type 0 group 200 # for test pass out quick proto icmp all icmp-type 3 group 200 pass out quick proto icmp all icmp-type 4 group 200 #pass out quick proto icmp all icmp-type 8 keep state group 200 pass out quick proto icmp all icmp-type 8 group 200 # for test pass out quick proto icmp all icmp-type 11 group 200 pass out quick proto icmp all icmp-type 12 group 200 # pass in quick proto icmp all icmp-type 0 group 300 pass in quick proto icmp all icmp-type 3 group 300 pass in quick proto icmp all icmp-type 4 group 300 pass in quick proto icmp all icmp-type 8 group 300 pass in quick proto icmp all icmp-type 11 group 300 pass in quick proto icmp all icmp-type 12 group 300 pass out quick proto icmp all icmp-type 0 group 400 pass out quick proto icmp all icmp-type 3 group 400 pass out quick proto icmp all icmp-type 4 group 400 pass out quick proto icmp all icmp-type 8 group 400 pass out quick proto icmp all icmp-type 11 group 400 pass out quick proto icmp all icmp-type 12 group 400 # # default block access to FIREWALL from outside block return-icmp-as-dest(port-unr) in from any to FIREWALL group 100 # # ssh to FIREALL from inside pass in quick proto tcp from any to FIREWALL port = 22 # # /* */ flags S keep state keep frags group 300

33 # traceroute to outside pass out proto udp from any to any port >< keep state group 200 # DNS pass in quick proto udp from any to MYDNS port = 53 keep state group 100 pass out quick proto udp from any to any port = 53 keep state group 200 # mail pass in quick proto tcp from any to MAIL port = 25 flags S keep state group 100 pass out quick proto tcp from MAIL to any port = 25 flags S keep state group 200 # WWW pass in quick proto tcp from any to WWW port = 80 flags S keep state group 100 pass out quick proto tcp from any to any port = 80 flags S keep state group 200 # # # write any services to pass WWW,MAIL,FIREWALL IP mail gateway DNS rule ipftest SYN ICMP tcp in on OUTIF tcp , ,80 out on OUTIF tcp , ,20000 SA in on OUTIF tcp , ,80 out on OUTIF tcp , ,20000 A in on OUTIF tcp , ,80 out on OUTIF tcp , ,20000 FA in on OUTIF tcp , ,80 in on OUTIF tcp , ,80 out on OUTIF tcp , ,20000 A , ,80 TCP S A A A FA

34 30 3 II in on OUTIF tcp , ,80 in on OUTIF tcp , ,80 in on OUTIF tcp , ,80 in on OUTIF tcp , ,80 ICMP in on OUTIF icmp echo in on OUTIF icmp echorep in on OUTIF icmp unreach ICMP IPFilter ICMP type unreach, echo, echorep, squench, redir, timex, paramprob, timest, timestrep, inforeq, inforep, maskreq, maskrep, routerad, routersol UDP keep state keep state IP TCP man IPFilter S SA SFP SPU

35 /etc/ipf.rules pass in all pass out all /etc/rc.conf ipfilter_enable="yes" 3.2 ICMP ipftest ( ) 3.3 ICMP ping quick log ( ) ping ipfstat -io 3.4 ICMP ping ( ) log

36 32 3 II (TCP port 25) DNS(UDP port 53) ipftest (port 25 tcp port53 UDP ) 3.6 ( ) ipftest TCP,UDP 3.7 spoofing, loopback 10/8, /24, /24 head, group 4

37 33 4 RIP RIP 4.1 ( ) ( forwarding) A B x y w z A B ( A,B,x,y,z,w ) A B A ( ) x z A x,z y w A x A,z,y A B 1 A->x->y->B 3 A->z->x->y->B 4 A->z->w->B RIP RIP ( )

38 34 4 RIP (Poison reverse) RIP A B B z ( ) OSPF Internet Exterior Gateway Protocol (EGP) Interior Gateway Protocol (IGP) EGP IGP ( IGP ) IGP EGP IGP EGP BGP4 (Border Gateway Protocol version 4) IGP IS-IS, OSPF, RIP OSPF( Open Shortest Path First) (IETF: Internet Engineering Task Force) RIP (Routing Informationn Protocol) RIP,OSPF BGP ( Distance Vector Type) (Link State Type) RIP BGP IS-IS OSPF

39 4.2. RIP RIP ( ) A,B B /24 A /24 B B A B A /24 A,B C,D C A D B,C B D B /24 2 D B,D B /24 3

40 36 4 RIP 1 D B /24 3 C D C /24 3 D C /24 2 D C /24 4 D D 1 B / C / /24 B D A B,C D B,C B B 1 A / D / ( ) A /24 RIP A ( Poison reverse (16) ) B

41 4.2. RIP 37 B 1 D /24 4 B D /24 D ( C ) D 1 B /24 5 B 6 B 1 D /24 6 ( ) RIP 16 RIP RIP ( ) 16 ( 15 ) 15 RIP ( RIP 30 ) BGP ( ) BGP RIP (1 2 ) RIP ( ) OSPF OSPF RIP OSPF RIP

42 38 4 RIP 4.3 Quagga Quagga Unix zebra bgpd, ripd, ospfd Quagga Zebra (ZebOS ) Zebra Quagga Zebra Quagga 0.99 Quagga Zebra zebra Quagga Quagga Quagga /usr/local/share/examples/quagga/ bgpd.conf.sample ospfd.conf.sample vtysh.conf.sample bgpd.conf.sample2 ripd.conf.sample zebra.conf.sample ospf6d.conf.sample ripngd.conf.sample Cisco CUI (CLI) (Quagga VTY ) Quagga FreeBSD /etc/services Quagga

43 4.3. Quagga 39 zebrasrv 2600/tcp #zebra service zebra 2601/tcp #zebra vty ripd 2602/tcp #RIPd vty ripngd 2603/tcp #RIPngd vty ospfd 2604/tcp #OSPFd vty bgpd 2605/tcp #BGPd vty ospf6d 2606/tcp #OSPF6d vty zebra zebra zebra zebra.conf! zebra configuration! hostname pcss001 password zebra enable password zebra service password-encryption log file /var/log/zebra.log! interface le0! multicast interface ue0 multicast! shutdown!!ip route / ! hostname zebra password view enable password

44 40 4 RIP service password-encryption write ( ) log file interface write shutdown ip route static ripd, ospfd static (redistribute) /etc/rc.conf static routing zebra RIP ip route zebra.conf Quagga ripd RIP ripd.conf ripd.conf RIP zebra

45 4.3. Quagga 41!! $Id: ripd.conf, 2008/04/01 $! hostname pcss001 password zebra!! debug rip events! debug rip packet! router rip! network ue0 network le0! network /0! network eth0! distribute-list private-only!! access-list private-only permit /8! access-list private-only deny any!! log file /var/log/ripd.log! log stdout router rip RIP network <interface name> RIP IP network /24 log stdout log file /var/log/ripd.log

46 42 4 RIP 1. passive-interface <interface name> RIP 2. deault-information originate RIP default RIP 3. redistribute connected RIP 4. redistribute ospf OSPF RIP 5. redistribute bgp BGP RIP 6. redistribute static Quagga RIP 7. redistribute kernel RIP Quagga zebra, ospfd, bgpd, ospf6d,ripd,ripngd -d /usr/local/etc/rc.d/quagga start, stop, restart (Zebra zebractl Quagga ) # zebra -d # ripd -d /etc/rc.conf quagga_enable="yes" /usr/local/etc/rc.d/quagga # /usr/local/etc/rc.d/quagga start stop, restart /etc/rc.conf watchquagga_enable="yes" /usr/local/etc/rc.d/watchquagga (watchquagga Quagga ) # /usr/local/etc/rc.d/watchquagga start stop, restart

47 4.3. Quagga VTY RIP zebra ripd ( zebra Quagga ) zebra VTY zebra (zebra.conf.sample zebra.conf copy ) # telnet localhost zebra (VTY ) # telnet localhost zebra Connected to localhost. Escape character is ^]. Hello, this is zebra (version 0.93b). Copyright Kunihiro Ishiguro. User Access Verification Password: Router> view privileged ( ) config ( ) help? VTY >? enable exit help list quit show who Turn on privileged mode command Exit current mode and down to previous mode Description of the interactive help system Print command list Exit current mode and down to previous mode Show running system information terminal Set terminal line parameters Display who is on vty show

48 44 4 RIP > show? debugging Zebra configuration history Display the session command history interface Interface status and configuration ip ipv6 memory version > show IP information IPv6 information Memory statistics Displays zebra version? help TAB > show ip? forwarding IP forwarding status route IP routing table zebra K C S zebra R,O,B RIP,OSPF,BGP > show ip route Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF, B - BGP, > - selected route, * - FIB route S>* /0 [1/0] via , le0 C>* /24 is directly connected, le0 K>* /32 via , lo0 C>* /8 is directly connected, lo0 privileged( ) enable (en) pc2f001-zebra> en Password: pc2f001-zebra# Quagga VTY write # write Configuration saved to /usr/local/etc/quagga/zebra.conf write terminal write terminal show running-config (

49 4.3. Quagga 45 ) show startup-config VTY ^P tcsh ripd VTY ripd VTY zebra ripd VTY > telnet localhost ripd zebra view mode enable ÁŒ mode configure terminal rip Ý è mode Ý è mode router rip interface <if-name> interface Ý è mode? quit( exit) end exit VTY write vtysh vty vtysh -c [ ]

50 46 4 RIP # vtysh -c sh ip rip 4.4 RIP RIP RIP VTY show ip rip / /24 RIP Metric 3 Metric /24 RIP show ip rip /24 Metric /24 ( Poison reverse (cost 16) ) Quagga Metric 16 (Poison reverse )

51 4.4. RIP /24 ( /24 )

52 48 4 RIP Quagga pkg_add -r quagga 4.2 RIP OSPF # out0, in0 pass in on out0 all head 100 pass out on out0 all head 200 pass in on in0 all head 300 pass out on in0 all head 400 # pass in quick on lo0 all pass out quick on lo0 all # # ICMP pass in quick proto icmp all icmp-type 0 group 100 pass in quick proto icmp all icmp-type 3 group 100 pass in quick proto icmp all icmp-type 4 group 100 pass in quick proto icmp all icmp-type 8 group 100 pass in quick proto icmp all icmp-type 11 group 100 pass out quick proto icmp all icmp-type 0 group 200 pass out quick proto icmp all icmp-type 3 group 200 pass out quick proto icmp all icmp-type 4 group 200 pass out quick proto icmp all icmp-type 8 group 200 pass out quick proto icmp all icmp-type 11 group 200 # block in quick proto icmp all group 100 block out quick proto icmp all group zebra.conf static default default # route delete default zebra default

53 RIP ripd.conf ( ) router rip... passive-interface ue0! RIP default-information originate! defaultrouting zebra rip 4.5 zebra rip zebra ( ) # route delete default zebra rip 4.6 zebra, rip telnet localhost ripd RIP show rip

54

55 51 5 OSPF RIP ( ) OSPF(Open Shortest Path First) IS-IS(Intermediate System-to-Intermediate System) OSPF 5.1 OSPF (Link State) OSPF OSPF ( LSA: Link State Advertisement) LSA LSA (LSDB: Link State Database) Shortest Path First(SPF) OSPF (IGP IS-IS ) RIP OSPF (2byte) A B A OSPF LSA OSPF

56 52 5 OSPF (LSA) (LSA) LSA LSA LSA (flooding: ) LSA (flood) LSA LSDB LSA OSPF LSA 3 LSA 3 LSA 2 LSA 3 9 LSA LSA 12 LSA ( 5.1) 5.1: LSA OSPF (Designated Router:DR) LSA LSA 3 ( 5.2) DR DR OSPF DR (Backup Designated Router:BDR) BDR DR

57 5.1. OSPF : LSA LSA LSA LSDB ( LSA LSDB ) LSA LSA OSPF LSA Router LSA ( Router LSA ) hello hello LSA hello ( RIP RIP ) Network LSA Network LSA OSPF LSA ( ) OSPF (AllSPFRouters: AllDRouters: ) ( OSPF ) OSPF (Zebra )

58 54 5 OSPF 5.2 TCP/IP IGMP(Internet Group Management Protocol) IGMP L2 L3 L2 L3 IP ( L3 ) OSPF IP /4 AllSPFRouters( ) IGMP OSPF LSA LSA 5.3 OSPF OSPF OSPF CPU OSPF OSPF LSA (Router LSA Network LSA) Summary LSA LSA 32bit ID (IP 1byte x.x.x.x IP ) ( 5.3)

59 5.3. OSPF : OSPF Network (ABR: Area Border Router) Summary LSA ABR OSPF IGP BGP OSPF AS (ASBR: AS Border Router) AS OSPF (AS external LSA) LSA ( AS external LSA ) 1. AS (Autonomous System) AS AS AS OSPF 0 1,2 1 1 ABR SummaryLSA 2 ABR 2 3

60 56 5 OSPF 5.4: 3 3 R3 SummaryLSA R1 2 3 ( ) LSDB OSPF 2 R2 1 3 Network LSA Router LSA Summary LSA OSPF OSPF ( RIP ) OSPF ( ) OSPF Summary OSPFv3 OSPF

61 5.4. ospfd ospfd ospfd OSPF zebra! OSPFDd config! hostname pcs001-ospfd password zebra enable password zebra service password-encryption log file /var/log/ospfd.log! router ospf! ospf router-id network /29 area 0 network /24 area 0 line vty router ospf OSPF 1. router ospf OSPF 2. ospf router-id <32bit > Router ID Router IP 32bit ( ) ( IP x.x.x.x ) RouterID designated router( ) ip ospf priority 3. network <network/mask> area <area ID> OSPF network OSPF ( ) 0 32bit ( ) ospfd ( Quagga ) VTY VTY config router interface line (VTY write )

62 58 5 OSPF! ospf config!! [ ] interface fxp0...! [ fxp0 ] interface rl0...! [ rl0 ] router ospf! [ ospf ] line vty [ VTY ] (IP up ) VTY ( zebra ) Quagga no ospf router ospf router ( ) 1. passive-interface <interface name> 2. auto-cost reference-bandwidth < > OSPF ( ) N = (M bps) N M 10 10M 100

63 5.4. ospfd OSPF N N 100 1Gbps N 1000 ( N 10 ) 10G N 10 N 3. area <area ID> virtual-link <router ID> area ID IP (x.x.x.x) 32bit( ) router ID ABR(Area Border Router) ID ID IP IP ID ABR 4. default-information originate ASBR(AS ) external LSA default ASBR ospf rip OSPF RIP RIP RIP OSPF Quagga rip ospf zebra 1. redistribute rip ospf rip zebra ospf OSPF zebra rip 2. redistribute connected ospf rip ospf rip ospf rip rip zebra ospf OSPF

64 60 5 OSPF 1. rip rip ospf ( rip ospf ) rip ospf redistribute ripd.conf (a) redistribute ospf (b) redistribute connected interface OSPF 1. ip ospf priority <0-255> ( ) 0 2. ip ospf cost < > OSPF 9 11 ( ) 5.5 OSPF OSPF traceroute traceroute UDP TTL ICMP unreachable (OSPF ) OSPF OSPF ICMP redirect ICMP redirect

65 5.5. OSPF 61 ( OSPF default ) # route flush OSPF ospf ( LSA ) ospf ospfd VTY (view ) 1. show ip ospf OSPF ospfd# show ip ospf OSPF Routing Process, Router ID: Supports only single TOS (TOS0) routes This implementation conforms to RFC2328 RFC1583Compatibility flag is disabled SPF schedule delay 5 secs, Hold time between two SPFs 10 secs Refresh timer 10 secs Number of external LSA 1 Number of areas attached to this router: 1 Area ID: (Backbone) Number of interfaces in this area: Total: 2, Active: 4 Number of fully adjacent neighbors in this area: 3 Area has no authentication SPF algorithm executed 40 times Number of LSA 9 RouterID AS external LSA areaid:0 ( Number of fully adjacent neighbors in this area:) LSA 2. show ip ospf interface

66 62 5 OSPF ospfd# show ip ospf interface rl0 is up, line protocol is up Internet Address /29, Area Router ID , Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1 Designated Router (ID) , Interface Address Backup Designated Router (ID) , Interface Address Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:01 Neighbor Count is 2, Adjacent neighbor count is 2 rl0 rl /29 IP area 0 RouterID State DR (DR) Backup DR Timer intervals Hello 10 Dead 40 (Dead WaitTimer ) LSA 5 (adjacent neighbor) (adjacent neighbor ) fxp0 fxp0 is up, line protocol is up Internet Address /24, Area Router ID , Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State Backup, Priority 1 Designated Router (ID) , Interface Address Backup Designated Router (ID) , Interface Address Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 Hello due in 00:00:02 Neighbor Count is 1, Adjacent neighbor count is 1 rl0 DR (ID ) Backup DR ( IP Backup Desinated Router IP ) (lo0)

67 5.5. OSPF 63 faith0 is down, line protocol is down OSPF not enabled on this interface lo0 is up, line protocol is up OSPF not enabled on this interface ppp0 is down, line protocol is down OSPF not enabled on this interface sl0 is down, line protocol is down OSPF not enabled on this interface 3. show ip ospf neighbor ospfd# show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface RXmtL RqstL DBsmL Full/DROther 00:00: rl0: Full/DR 00:00: fxp0: Full/Backup 00:00: fxp0: State Full twoway Full twoway(dr ) DR Bakcup 4. show ip ospf route ospf LSA DR AS external LSA

68 64 5 OSPF ospfd# show ip ospf route ============ OSPF network routing table ============ N /29 [10] area: directly attached to rl0 N /24 [10] area: directly attached to fxp0 N /24 [10] area: directly attached to fxp0 N /24 [10] area: directly attached to fxp0 ============ OSPF router routing table ============= R [10] area: , ASBR via , fxp0 ============ OSPF external routing table =========== N E /0 [10/10] tag: 0 via , fxp0 5. show ip ospf database LSDB(LinkStatus Database) LSA Age LSA Age LSA ( ) OSPF LSA 3600sec(1 ) 30 (1800sec) LSA OSPF 1800sec 1

69 5.5. OSPF 65 ospfd# sh ip ospf database OSPF Router with ID ( ) Router Link States (Area ) Link ID ADV Router Age Seq# CkSum Link count x x193f x x6a x xaf6b x x0d x xfb x a 0xea04 2 Net Link States (Area ) Link ID ADV Router Age Seq# CkSum x xed x x x x1d23 AS External Link States Link ID ADV Router Age Seq# CkSum Route x x8fbc E /0 [0x0]

70 66 5 OSPF Quagga /usr/local/etc/quagga/ripd.conf RIP ospf 5.2 default-information originate passive-interface ue0 OSPF Router-ID ( N.M ) IP OSPF OSPF 5.3 OSPF show ip ospf neighbor 5.4 (OSPF ) OSPF ( X.Y ) OSPF sh ip ospf route

71 67 6 BGP RIP,OSPF BGP EGP IGP 6.1 BGP BGP BGP RFC1771 RFC2545,2283 (IPv6 ) BGP BGP (AS: Autonomous System) AS AS AS (BR: Border Router) BGP AS AS AS AS (transit) BGP TCP (port179 ) BGP BGP TCP BGP (KeepAlive) (Notification) BGP BGP BGP ( ) BGP BGP BGP BGP AS (2byte) ( ) BGP RIB(Routing Information Base) BGP ASN AS ( ) BGP BGP ( ) AS ( /16 )

72 68 6 BGP 6.2 BGP BGP TCP (ASN,RouterID) BGP BGP AS BGP AS BGP Open ASN,BGP ID BGP ID(4byte) IP IP BGP ID ( ) Update BGP BGP Notification Notification( ) KeepAlive 6.3 BGP well-known( ) optional( ) BGP ORIGIN (Origin AS: AS)AS IGP IGP AS EGP EGP AS INCOMPLETE AS-PATH ASN

73 AS SET(AS ) AS ASN 10 AX/24 ASN 11 AY/24 A/ AS ( ) {10,11} A/16 AS SEQUENCE AS AS-PATH {10,11}-78 ( ) NEXT HOP BGP AS AS ( AS ) MULTI EXIT DISCRIMINATOR AS AS AS AS AS ( ) LOCAL PREF AS BGP AS X AS P,Q P,Q ATOMIC AGGREGATE BGP AS BGP BGP AS PATH AS AGGREGATOR AS AS 6.4 BGP BGP IX(Internet exchange) BGP BGP BGP

74 70 6 BGP RFC 6.5 bgpd 1 BGP bgpd.conf BGP IP {9,10,11} BGP , / BGP ASN , AS /29 AS AS / AS /

75 6.5. bgpd 1 71! BGPd config! hostname pc2f001-bgpd password zebra enable password zebra log file /var/log/bgpd.log! router bgp 65001! bgp router-id network /29! I-BGP router neighbor remote-as neighbor remote-as 65001! prefer this route neighbor remote-as neighbor!!redistribute static route-map LOCAL-PREF1 permit 10! match as-path R65010 set local-preference route-map LOCAL-PREF1 in ip as-path access-list R65010 permit ^65010_! --- end of config router bgp ASN BGP AS IP APNIC IGP ASN private AS number: ASN router AS BGP ibgp AS BGP ebgp 2. bgp router-id BGP-ID BGP-ID IP zebra bgpd

76 72 6 BGP zebra 3. network IPaddress/prefix 4. neighbor IPaddress remote-as ASN neighbor IP address ASN ibgp ebgp ASN 5. neighbor IPaddress route-map NAME [in out] (in) (out) route-map (NAME) route-map 6. neighbor IPaddress ebgp-multihop hop-count ebgp TTL(TimeToLive) ebgp TTL 1 hop-count neighbor ebgp-multihop 3 TTL 3 7. redistribute other-proto RIP OSPF other-proto IGP other-proto static,kernel, connected, rip, ospf 8. route-map NAME [permit deny] seq-num (NAME (seq-num) set (permit) (deny) 9. match cond ac-list-name route-map cond ip as-path

77 6.5. bgpd 1 73 as-path community extcommunity ip ipv6 metric origin AS BGP BGP/VPN IPv4 ll IPv6 BGP ac-list-name 10. set attribute-command attribute-command ( local-preference) set local-preference < > local-preference ebgp ( 100 ) (a) AS ( local-preference) (RFC1771) 11. ip as-path access-list ac-list-name [permit deny] reg AS (permit) deny ac-list-name route-map match reg ASN AS (_) AS ASN ( ASN ) ^65000_ _ $ BGP AS65002

78 74 6 BGP! BGPd config! hostname pc2f002-bgpd password zebra enable password zebra log file /var/log/bgpd.log! router bgp bgp router-id network /29! I-BGP router neighbor remote-as neighbor remote-as 65001! neighbor remote-as neighbor! route-map LOCAL-PREF2 permit 20! match as-path R65002 set local-preference route-map LOCAL-PREF2 in ip as-path access-list R65002 permit ^65002_ BGP AS ibgp NEXT-HOP (ebgp NEXT-HOP BGP ) BGP ibgp /24 ( RIB(Routing Information Base) BGP ibgp NEXT-HOP IGP(RIP OSPF) # route add -net / ( 172 ) Quagga RIP OSPF redistribute connected ( ) ripd.conf ospfd.conf BGP NEXT-HOP router bgp ( ibgp )

79 6.6. bgpd 2. 75!neighbor neighbor neighbor 1. next-hop-self next-hop-self next-hop-self next-hop-self ibgp NEXT-HOP ibgp NEXT-HOP 6.6 bgpd 2. AS /28 AS MED(Multi-Exit-Descriminator) MED AS BGP DV BGP BGP ( ) ( )! BGPd config! hostname pc2f003-bgpd!! neighbor route-map LOCAL-PREF2 in! neighbor!!! route-map LONG-PATH permit 40 match ip address MYNET route-map LONG-PATH out set as-path prepend ! access-list MYNET permit /29 ( )

80 76 6 BGP 1. access-list ac-list-name [permit deny] ip-range IP (permit) ac-list-name ( ) ip-range 2. match ip address ac-list-name IP 3. set as-path prepend AS-list AS-list ( AS path ) AS 65001,65001,65001,65001,65001 (5 ASN ) ( ) BGP /29 BGP 4. AS AS AS AS 6.7 BGP BGP traceroute bgpd VTY BGP OSPF 1. show ip bgp BGP BGP BGP

81 6.7. BGP 77 bgpd# show ip bgp BGP table version is 0, local router ID is Status codes: s suppressed, d damped, h history, * valid, > best, i - internal Origin codes: i - IGP, e - EGP,? - incomplete Network Next Hop Metric LocPrf Weight Path * i / i * i i *> i *>i / i Total number of prefixes 2 ( ) > Next Hop LocPrf Path i, e,? IGP(Internal-GP) EGP(External-GP)? Incomplete( ) 2. show ip bgp IP[/prefix] IP BGP bgpd# show ip bgp /29 BGP routing table entry for /29 Paths: (2 available, best #2, table Default-IP-Routing-Table) Not advertised to any peer from ( ) Origin IGP, localpref 150, valid, internal, best Last update: Thu Jun 23 14:34: from ( ) Origin IGP, metric 0, localpref 200, valid, external Last update: Thu Jun 23 14:21: show ip bgp neighbors [peer-ip] BGP IP peer-ip

82 78 6 BGP bgpd# show ip bgp neighbors BGP neighbor is , remote AS 65010, local AS 65001, external link BGP version 4, remote router ID BGP state = Established, up for 00:18:25 Last read 00:00:25, hold time is 180, keepalive interval is 60 seconds Neighbor capabilities: Route refresh: advertised and received (old and new) Address family IPv4 Unicast: advertised and received Message statistics: Inq depth is 0 Outq depth is 0 Sent Rcvd Opens: 1 1 Notifications: 0 0 Updates: 1 1 Keepalives: Route Refresh: 0 0 Cpability: 0 0 Total: Minimum time between advertisement runs is 30 seconds For address family: IPv4 Unicast Community attribute sent to this neighbor (both) Inbound path policy cofigured Outbound path policy configured Route map for incoming advertisements is *LOCAL-PREF1 1 accepted prefixes Connections established 2; dropped 0 Last reset 00:18:36, due to Peer closed the session Local host: , Local port: Foreign host: , Foreign port: 179 Nexthop: Nexthop global: fe80::290:27ff:feba:aff5 Nexthop local: :: BGP connection: non shared network Read thread: on Write thread: off show ip bgp summary

83 6.7. BGP 79 bgpd# show ip bgp summary BGP router identifier , local AS number BGP AS-PATH entries 0 BGP community entries Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd :06: :19: :24: show ip bgp paths BGP bgpd# show ip bgp paths Address Refcnt Path [0x :0] (5) [0x :201207] (1) [0x :19968] (1) [0x82187f0:120316] (1) [0x82187b0:59903] (3) VTY bgpd Soft reconfig bgpd# clear bgp * soft

84 80 6 BGP BGP AS ( ) AS RouterID IP next-hop-self i-bgp BGP show ip bgp 6.2 show ip bgp neighbors

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 asaba@iij.ad.jp All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 2 user IX IX IX All Rights Reserved. Copyright(c)1997

More information

宛先変更のトラブルシューティ ング

宛先変更のトラブルシューティ ング APPENDIX B この付録では Guard の宛先変更元ルータ (Cisco および Juniper) に関連する宛先変更問題を解決するためのトラブルシューティング手順を示します 次の手順について説明します Guard のルーティングと宛先変更元ルータの設定確認 Guard と宛先変更元ルータ間の BGP セッションの設定確認 宛先変更元ルータのレコードの確認 B-1 Guard のルーティングと宛先変更元ルータの設定確認

More information

untitled

untitled NTT TOP A WAN WAN VRRP NIC OSPF VRRP STP 1. IPv6 IPv6 2. 3. IPv6 1. IPv4 NAT IPv6 1. 2. (IPv4 ) NAT? Unique Local IPv6 Unicast Address /8 /48 /64 /128 7 1 40 16 64 ULA Global ID Interface ID Type Subnet

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション ADD-PATH の 基本的な設定例と検討課題 インターネットマルチフィード ( 株 ) 技術部 Interop tokyo 2013 NOC 金井瑛 1 Interop Tokyo 2013 と ADD-PATH 今年度の Interop Tokyo 2013 では ADD-PATH の相互接続検証を行いました MX80, MX480, CRS-X, ASR9006

More information

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応 Network Equipment 設定例集 Rev.8.03, Rev.9.00, Rev.10.01 対応 2 3 4 5 6 7 8 help > help show command > show command console character administrator pp disable disconnect 9 pp enable save Password: login timer

More information

IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2

IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 IP 2010 10 1 1 IP (IP ) 2 IP IP 2.1 IP (IP ) 1 IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 4 1,2 4.1 (Protocol) IP:Internet Protocol) 4.2 internet The Internet (internet)

More information

tcp/ip.key

tcp/ip.key IP TCP IP ヘッダデータ部ヘッダデータ部ヘッダデータ部 Ethernet パケット Ethernet パケット Ethernet パケット IP(1) 0 8 16 24 31 () Version IHL () Time To Live () Identification () Type of Service ) Flags Protocol () Source Address IP) Destination

More information

BGP ( ) BGP4 community community community community July 3, 1998 JANOG2: What is BGP Community? 2

BGP ( ) BGP4 community community community community July 3, 1998 JANOG2: What is BGP Community? 2 BGP Community 1998/7/3 JANOG#2 in KDD (yahagi@itjit.ad.jp) July 3, 1998 JANOG2: What is BGP Community? 1 BGP ( ) BGP4 community community community community July 3, 1998 JANOG2: What is BGP Community?

More information

SRT/RTX/RT設定例集

SRT/RTX/RT設定例集 Network Equipment Rev.6.03, Rev.7.00, Rev.7.01 Rev.8.01, Rev.8.02, Rev.8.03 Rev.9.00, Rev.10.00, Rev.10.01 2 3 4 5 6 1 2 3 1 2 3 7 RTX1000 RTX1000 8 help > help show command > show command console character

More information

橡C14.PDF

橡C14.PDF BGP4 (( ) InternetWeek 98 ( ) Internet Week98 1998 Toshiya Asaba, Japan Network Information Center 1. 2. BGP 2.1. 2.2. ISP 2.3. IX - 2.4. 2.5. 3. BGP4 3.1. BGP4 3.2. EBGP IBGP 3.3. BGP AS 3.4. AS AS 3.5.

More information

ict2-.key

ict2-.key IP TCP TCP/IP 1) TCP 2) TCPIP 3) IPLAN 4) IP パケット TCP パケット Ethernet パケット 発信元 送信先 ヘッダ 列番号 ポート番号 TCP パケットのデータ IP パケットのデータ 本当に送りたいデータ データ IP ヘッダデータ部ヘッダデータ部ヘッダデータ部 Ethernet パケット Ethernet パケット Ethernet パケット

More information

JUNOSインターネットソフトウェアとIOSのコンフィグレーション変換

JUNOSインターネットソフトウェアとIOSのコンフィグレーション変換 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net 2 Copyright 2001, Juniper Networks, Inc. Copyright 2001, Juniper Networks, Inc. 3 4

More information

IP.dvi

IP.dvi ... 3... 3... 3... 4... 6 VLAN... 6... 6 DHCP... 7... 7... 9... 9... 10... 12 R... 15... 15... 15 ARP... 18... 18 ARP... 18 DNS... 20... 20 DHCP/BOOTP... 21... 21 DHCP... 22 UDP... 23... 23... 23... 26...

More information

untitled

untitled 7 Review PC+ () 1+PHS etc!! SOI!! Topics () IP () / L3 IP YMH RTX-1500 BUFFLO BHR-4RV PLNEX GW-P54SG Cisco 2600 Hitachi GR2000-1B Cisco 3700 Juniper M10 Foundry Networks NetIron 800 Cisco CRS-1 (FIB: Forwarding

More information

untitled

untitled ICMP 0466-XX-1395 t04000aa@sfc.keio.ac.jp 133.113.215.10 (ipv4) 2001:200:0:8803::53 (ipv6) (FQDN: Fully Qualified Domain Name) ( www.keio.ac.jp 131.113.215.10 /MAC ID 00:11:24:79:8e:82 Port Port = = Port

More information

ループ防止技術を使用して OSPFv3 を PE-CE プロトコルとして設定する

ループ防止技術を使用して OSPFv3 を PE-CE プロトコルとして設定する ループ防止技術を使用して OSPFv3 を PE-CE プロトコルとして設定する 目次 概要前提条件要件使用するコンポーネント背景説明設定ネットワーク図設定 DN ビット確認トラブルシューティング Cisco サポートコミュニティ - 特集対話 概要 このドキュメントでは Open Shortest Path First (1 バージョン 3 (OSPFv3) " を プロバイダーエッジ (PE )

More information

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 MAP Tutorial @ 1 Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 IPv4 over IPv6 IPv6 network IPv4 service Internet Service ProviderISP IPv4 service

More information

ネットワークのおべんきょしませんか? 究める BGP サンプル COMMUNITY アトリビュートここまで解説してきた WEIGHT LOCAL_PREFERENCE MED AS_PATH アトリビュートはベストパス決定で利用します ですが COMMUNITY アトリビュートはベストパスの決定とは

ネットワークのおべんきょしませんか? 究める BGP サンプル COMMUNITY アトリビュートここまで解説してきた WEIGHT LOCAL_PREFERENCE MED AS_PATH アトリビュートはベストパス決定で利用します ですが COMMUNITY アトリビュートはベストパスの決定とは COMMUNITY アトリビュートここまで解説してきた WEIGHT LOCAL_PREFERENCE MED AS_PATH アトリビュートはベストパス決定で利用します ですが COMMUNITY アトリビュートはベストパスの決定とは直接関係しません COMMUNITY アトリビュートを利用すると 特定の条件に基づいてルート情報をグループ化する ことができます グループ化したルート情報の識別情報

More information

I j

I j I j06062 19.5.22 19.5.25 19.5.25 1 1 1 ping 3 2 2 ping 4 3 3 traceroute 5 4 4 netstat 5 4.1 netstat -i............................................. 5 4.2 netstat -r.............................................

More information

JANOG14-コンバージェンスを重視したMPLSの美味しい使い方

JANOG14-コンバージェンスを重視したMPLSの美味しい使い方 MPLS JANOG14 BGP MPLS 2 : : 1988 2 2003 7 : 3 ( ( )100%) : 633 (2003 ) : : 1,029 (2004 7 1 ) 3 So-net 250 4 30!? 10 Non IP IP 5 IGP? ECMP ECMP?? 6 BGP MPLS 7 MPLS ATM IP ATM

More information

設定例集

設定例集 REMOTE ROUTER 1999. 2. 2 YAMAHA NetWare Novell,Inc. INS 64 YAMAHA! M E M O 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 : : : : : : : : : : : : : : : : : : : : :

More information

第1回 ネットワークとは

第1回 ネットワークとは 第 6 回 IP 計算機ネットワーク ルーティング IP パケットの宛先に応じて次の転送先インターフェースを決定 D:192.168.30.5 パケット 192.168.10.0/24 fe0 192.168.20.0/24 fe1 fe3 fe2 192.168.30.0/24 ルーティングテーブル 192.168.40.0/24 192.168.10.0 direct fe0 192.168.20.0

More information

RTX830 取扱説明書

RTX830 取扱説明書 RTX830 JA 1 2 3 4 5 6 7 8 9 10 11 external-memory performance-test go 12 13 show config 14 15 16 17 18 19 20 save 21 22 23 24 25 26 27 save RTX830 BootROM Ver. 1.00 Copyright (c) 2017 Yamaha Corporation.

More information

Inter-IX IX/-IX 10/21/2003 JAPAN2003 2

Inter-IX IX/-IX 10/21/2003 JAPAN2003 2 Inter-IX satoru@ft.solteria.net 10/21/2003 JAPAN2003 1 Inter-IX IX/-IX 10/21/2003 JAPAN2003 2 Inter-IX? Inter-IX IX IX L2 10/21/2003 JAPAN2003 3 (1) IX (-IX) IX Resiliency 10/21/2003 JAPAN2003 4 (2) IX

More information

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

リング型IPカメラ監視ソリューション(マルチキャスト編)

リング型IPカメラ監視ソリューション(マルチキャスト編) CentreCOM x900 IP IP ( ) IP surveillance Solution 01 SNMP Manager Syslog Server NTP Server x900-24xt_2 Link Aggregation x900-24xt_1 FS926M-PS_1 FS926M-PS_2 x600-24ts EPSR (Ethernet Protected Switched Ring)

More information

00.目次_ope

00.目次_ope 816XL ii iii iv iv User Entry 1 3 v vi vii viii 1 1 C: >VTTERM 1- 1 1-3 1 1-4 1 1-5 1 1-6 1 1-7 1 1-8 1 1-9 1 1-10 C: >VTN 1 Host Name: 1-11 1 01 1-1 0.0.0.0 1 1-13 1 1-14 - -3 Port status and configuration

More information

Foil 2 Agenda RIP2 RIP, OSPF OSPF

Foil 2 Agenda RIP2 RIP, OSPF OSPF OSPF RIP c 1998,AkiraKato.Allrightsreserved. kato@wide.ad.jp Foil 2 Agenda RIP2 RIP, OSPF OSPF IP (2) Foil 4 IP (1) Foil 5 hop-by-hop IP Foil 6 IP Header Foil 7 1 2 3 1234567891234567891234567891 Ver Identification

More information

Clos IP Fabrics with QFX5100 Switches

Clos IP Fabrics with QFX5100 Switches WHITE PAPER QFX5100 CLOS IP 3 Copyright 2014, Juniper Networks, Inc. 1 ...3...3...3...3 IP...4 768 x 10...6 3072 x 10 GbE IP...6...7 BGP...8...9...9 IBGP...10 EBGP...10...11 BGP...12 BGP...12...12 IP...13

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

LSM-L3-24設定ガイド(初版)

LSM-L3-24設定ガイド(初版) 4 2 IP 3 2 MAC VLAN 1 MAC MAC 4-1 2 4-2 VLAN classification VLAN Learning Filtering Forwarding VLAN classification learning filtering forwarding VLAN Classification 2 : - VLAN - VLAN ID Learning VLAN classification

More information

BGPルートがアドバタイズされない場合のトラブルシューティング

BGPルートがアドバタイズされない場合のトラブルシューティング BGP ルートがアドバタイズされない場合のトラブルシューティング 目次 概要前提条件要件使用するコンポーネント表記法基本的なネットワークステートメントを使用してアナウンスされるルートマスクとのネットワークステートメントを使用してアナウンスされるルート aggregate-address コマンドを使用してアナウンスされるルート ibgp が記憶したルートをアナウンスできない場合 redistribute

More information

1 IPv6 WG OS SWG PCOSIPv6 Windows Vista 2 3 KAMEUSAGIMacOSX IPv6 2

1 IPv6 WG OS SWG PCOSIPv6 Windows Vista 2 3 KAMEUSAGIMacOSX IPv6 2 LAN IPv6 IPv6 WG IPv6 OS SWG () 1 1 IPv6 WG OS SWG PCOSIPv6 Windows Vista 2 3 KAMEUSAGIMacOSX IPv6 2 IPv6 PCOSIPv6 Windows VISTA OSv6 MacOS X Linux *BSD Solaris etc PC RS RA DAD IPv6 DHCPv6 DNS AAAA PMTUD?

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 RT140i #1(PPP) RT105i RTA52i R (PP#) (LAN#) [NAT] R LAN LAN 2 #2() RT300i RTW65b RT140e RT105e (LAN2) R (LAN1) RTA55i R LAN LAN 3 #3(PPPoE) R (LAN#) (PP#) (PP#) LAN ISDN/ LAN 4 RT300i RT105 #4(VPN) R

More information

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能)

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能) RTX1100 client server network service ( ) RTX3000 ( ) RTX1500 2 Sound Network Division, YAMAHA 3 Sound Network Division, YAMAHA 172.16.1.100/24 172.16.2.100/24 LAN2 LAN3 RTX1500 RTX1100 client 172.16.1.1/24

More information

RT300i/RT140x/RT105i 取扱説明書

RT300i/RT140x/RT105i 取扱説明書 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Typewriter face RT105i RT300i RT140p RT140f RT140i RT140e RT105i RT300i 11 RARP 9600 bit/s 8 http://www.rtpro.yamaha.co.jp/ ftp.rtpro.yamaha.co.jp 12

More information

RT300/140/105シリーズ 取扱説明書

RT300/140/105シリーズ 取扱説明書 REMOTE & BROADBAND ROUTER RT300i/RT140p/RT140f/RT140i RT140e/RT105p/RT105i/RT105e 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Console RT105i RT300i RT140p RT140f RT140i RT140e RT105p RT105i RT105e

More information

<4D F736F F F696E74202D C F815B834E95D2836E E9197BF2E707074>

<4D F736F F F696E74202D C F815B834E95D2836E E9197BF2E707074> idc ネットワーク編ハンズオン用資料 株式会社 IDC フロンティア 井上一清 1 IPv6 ハンズオン物理構成図 講師席 MRTG sylsog SNMP DHCP DNS = Catalyst6500 = Catalyst3750 or 3560 Gi*/= Gi1/0/ or Gi0/ 受講者席 Gi*/4 Gi*/2 Gi*/2 Gi*/2 Gi*/2 Gi*/4 Gi*/4 Gi*/3

More information

untitled

untitled FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...

More information

外部ルート向け Cisco IOS と NXOS 間の OSPF ルーティング ループ/最適でないルーティングの設定例

外部ルート向け Cisco IOS と NXOS 間の OSPF ルーティング ループ/最適でないルーティングの設定例 外部ルート向け Cisco IOS と NXOS 間の OSPF ルーティングループ / 最適でないルーティングの設定例 目次 はじめに前提条件要件使用するコンポーネント背景説明重要な情報 RFC 1583 セクション 16.4.6 からの抜粋 RFC 2328 セクション 16.4.1 からの抜粋設定シナリオ 1 ネットワーク図シナリオ 2 ネットワーク図推奨事項確認トラブルシューティング関連情報

More information

2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP

2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP 1.,.. 2 OSI,,,,,,,,, TCP/IP,, IP, ICMP, ARP, TCP, UDP, FTP, TELNET, ssh,,,,,,,, IP,,, 3 OSI OSI(Open Systems Interconnection: ). 1 OSI 7. ( 1) 4 ( 4),,,,.,.,..,,... 1 2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP,

More information

IP ICMP Redirec

IP ICMP Redirec Z990002-D06-08 RGW Ver1. 2 1....6 1.1....6 1.2....7 1.3....7 1.4....7 1.5....8 1.6....9 1.7.... 12 1.7.1...12 1.7.2...12 1.7.3 IP...12 1.7.4...13 1.7.5...13 1.7.6 ICMP Redirect...13 1.7.7...14 1.7.8...15

More information

install

install SCore SCore 5.0 2001.03.19 devel@pccluster.org SCore Backbone LAN Ethernet EEPRO100 Myrinet-2000 Fibre 02/03/20 2 1 NIC (Network Interface Card) NIC 100Mbps Ethernet EEPRO100 Tulip 3C905B Network Trunking

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 2 3 4 LAN ISDN/ NAT (LAN#) (PP#) (TUNNEL#) + R 5 ----------< >---------- ----------< >---------- 6 IPv6 VPN ping IPsec PPTP ICMP (1) TCP (6) UDP (17) IPv6 (41) AH (51) ESP (50) GRE (47) IPv4

More information

owners.book

owners.book Network Equipment RTX1200 RTX800 2 3 4 5 6 7 8 9 10 bold face Enter Ctrl Tab BS Del Ctrl X Ctrl X Regular face 11 12 13 14 RTX1200 RTX1200 RTX1200 15 16 ), -. / 1 4 5 6 17 18 19 20 21 console character

More information

リング型IPカメラ監視ソリューション

リング型IPカメラ監視ソリューション TELESYN IP IP surveillance Solution 04 SNMP Manager Syslog Server NTP Server TELESYN9100_2 Link Aggregation VCS_1 TELESYN9100_4 FS926M-PS_1 TELESYN9100_3 FS926M-PS_2 FS926M-PS_3 TELESYN : TELESYN9400 :

More information

wide93.dvi

wide93.dvi 5 161 1 1.1 DDT WG DDT WG 1. \DDT" 2. DDT WG DDT WG 1.2 x ( IP) y ( X.25) x y \x overy" x y 1.1 IP X.25 IP IP IPX Appletalk OSI IP \encapsulation" \encapsulation header" \decapsulation" 163 164 1993 WIDE

More information

Microsoft PowerPoint irs14-rtbh.ppt

Microsoft PowerPoint irs14-rtbh.ppt RTBH 実装例の紹介 ~AS9370 編 ~ さくらインターネット ( 株 ) 技術部大久保修一 ohkubo@sakura.ad.jp 今日の Agenda はじめに RTBH とは? RTBH 実装の背景 構成の検討 ルータの試験 OSPF vs BGP BGP 広報経路の RTBH 化 まとめ RTBH とは? Remotely Triggered Black Hole Filtering

More information

RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3

RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3 RouteMagic Controller RMC-MP200 / MP1200 - Version 3.6 - RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version

More information

橡2-TrafficEngineering(revise).PDF

橡2-TrafficEngineering(revise).PDF Traffic Engineering AsiaGlobalCrossing GlobalCrossing Japan Traffic Engineering(TE) ( RFC2702 Requirements for Traffic Engineering over MPLS) 1 MPLS/VPN MPLS/TE MPLS VPN Prefix base (TDP

More information

worm hoihoi

worm hoihoi true@sfc.wide.ad.jp / (IDS, Honeypot), Web / : Darknet AS65531 10.0.0.0/8 Prefix longest match next hop AS Internet Customer A 10.1.0.0/16 AS 65531 10.0.0.0/8 Customer B 10.2.0.0/16 ( ) The Team Cymru

More information

untitled

untitled ()IP OSI ( ) (TCP/IP)TCP UDP ( ) IP + IP TCP / Web TCP/UDP IP / LAN IM xdsl/ () (FAX) 6bit(6556) FAX FAX ( ) UDP/TCP UDP(User Datagram Protocol) CL (Connectionless) TCP(Transmission Control Protocol) CO

More information

第1回 ネットワークとは

第1回 ネットワークとは 第 6 回 IP 計算機ネットワーク 2 前回まで Ethernet LAN 内通信 MAC アドレス (32:43:55 : BA:F5:DE) IP アドレス ベンダ (OUI) NIC IP アドレス ( 187.45.147.154 ) network host 組織端末 IP アドレス : 187.45.147.154 どこの組織? どのネットワーク? ネットワークアドレス ネットワーク部

More information

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs IPSEC VPN IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE 1 2 2 IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPsec SA IKE Initiator Responder IPsec-VPN ISAKMP

More information

ip nat outside source list コマンドを使用した設定例

ip nat outside source list コマンドを使用した設定例 ip nat outside source list コマンドを使用した設定例 目次 概要前提条件要件使用するコンポーネント表記法設定ネットワーク図設定確認トラブルシューティング要約関連情報 概要 このドキュメントでは ip nat outside source list コマンドを使用した設定例が紹介され NAT プロセス中に IP パケットがどのように処理されるかについて簡単に説明されています

More information

Microsoft PowerPoint - Amazon VPCとのVPN接続.pptx

Microsoft PowerPoint - Amazon VPCとのVPN接続.pptx Amazon VPC との VPN 接続マニュアル 2016 年 7 12 NECプラットフォームズ株式会社 Amazon VPC との VPN 接続 UNIVERGE WA シリーズ を使 して Amazon VPC(Amazon Virtual Private Cloud) と IPsec-VPN で接続する際の設定例を紹介します Amazon VPC を利 することにより Amazon AWS(Amazon

More information

FutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版

FutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版 FutureNet CS-SEIL Series CS-SEIL-510/C CS-SEIL/Turbo Firmware Version 1.82 FutureNet CS-SEIL.............................................. 1 1............................................. 11 1.1.........................................

More information

I TCP 1/2 1

I TCP 1/2 1 I TCP 1/2 1 Transport layer: a birds-eye view Hosts maintain state for each transport endpoint Routers don t maintain perhost state H R R R R H Transport IP IP IP IP IP Copyright(C)2011 Youki Kadobayashi.

More information

DocuWide 2051/2051MF 補足説明書

DocuWide 2051/2051MF 補足説明書 ëêèõ . 2 3 4 5 6 7 8 9 0 2 3 4 [PLOTTER CONFIGURATION] [DocuWide 2050/205 Version 2.2.0] [SERIAL] BAUD_RATE =9600 DATA_BIT =7 STOP_BIT = PARITY =EVEN HANDSHAKE =XON/XOFF EOP_TIMEOUT_VALUE =0 OUTPUT RESPONSE

More information

total.dvi

total.dvi VII W I D E P R O J E C T MPLS-IX MPLS-IX MPLS 1 MPLS AYAME IX IX LDP/RSVP-TE/CR- [121] 1999 Sub- LDP IP MPLS IX LSP LSP MPLS ebgp[165] LSP ( 2002 1.1 1.2) MPLS-IX MPLS IPv6 6PE IX () MPLS-IX MPLS IX

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

IPv6 トラブルシューティング ホームネットワーク/SOHO編

IPv6 トラブルシューティング ホームネットワーク/SOHO編 IPv6 SOHO NTT fujisaki@nttv6.com 2010 NTT Information Sharing Platform Laboratories IPv6 IPv6 IPv6 IPv4 IPv6 IPv4/IPv6 MTU IPv6 2 2010 NTT Information Sharing Platform Laboratories IPv6 SOHO (NTT /) SOHO

More information

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou NAT NETWORK ADDRESS TRANSLATION SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Group (ScreenOS ) 2 Copyright

More information

untitled

untitled IPv6 IPv4 I / 9 1 CIDR,, NAT IP IPv6 I / 9 2 I / 9 3 1 CIDR Classless Inter-Domain Routing RFC1519 IPv4 CIDR IPng (=IPv6) I / 9 4 Growth in BGP Route Table 90000 80000 Source: http//www.telstra.net/ ops/bgptable.html

More information

VyOSではじめるBGPルータ

VyOSではじめるBGPルータ VyOS ではじめる BGP ルータ 2015/9/4 ENOG34 ( 株 ) 創風システム外山文規 自己紹介 Linux ベースのサーバ構築 運用担当 BGP は 昨年の ENOG25 の BGP ハンズオンくらい ( だった ) 今日のおなはし VyOSの簡単なおさらい どこでVyOSを使っているか BGPをはじめる時の情報元について 基本的なBGPコマンドの紹介 BGP 以外について少し VyOS

More information

ヤマハルーターのCLI:Command Line Interface

ヤマハルーターのCLI:Command Line Interface (Command Line Interface) cf. http://www.rtpro.yamaha.co.jp/rt/docs/console/ Command Line Interface Graphical User Interface 2 (CLI) WWW(GUI) (CLI) WWW(GUI) character display graphic display keyboard pointer

More information

LSM-L3-24設定ガイド(初版)

LSM-L3-24設定ガイド(初版) 6 DB-9 Figure 6-1. DB-9 6-1 DB-9 EIA CCIT T DB9 DTE # PC DB9 DTE # DB9 DCE # 9 COM DTE-DCE CF 109 DCD 1 1 8 AB 102

More information

RouteMagic Controller RMC-MP200 / MP Version

RouteMagic Controller RMC-MP200 / MP Version RouteMagic Controller RMC-MP200 / MP1200 - Version 3.5.2 - RouteMagic Controller( RMC ) 3.5.2 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.5 RouteMagic Controller

More information

初めてのBFD

初めてのBFD 初めての - ENOG39 Meeting - 2016 年 7 月 1 日 株式会社グローバルネットコア 金子康行 最初に質問? もちろん使ってるよ! という人どれくらいいます? 2 を使うに至った経緯 コアネットワークの機器リプレイスをすることに 機器リプレイスとともに 構成変更を行うことに 3 コアネットワーク ( 変更前

More information

RouteMagic Controller RMC-MP200 / MP Version

RouteMagic Controller RMC-MP200 / MP Version RouteMagic Controller RMC-MP200 / MP1200 - Version 3.7.1 - RouteMagic Controller( RMC ) 3.7 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.7 RouteMagic Controller Version

More information

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX

More information

untitled

untitled CHAPTER 10 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 IP ODAP p.10-5 IP p.10-18 IP Cisco 10000 Virtual Private Network VPN; IP On-demand Address Pool [ODAP] IP p.10-2

More information

untitled

untitled osamu@sfc.keio.ac.jp CNS 18 Web http://www.sfc.wide.ad.jp/~three/itbasic05/ 6/6 7/11 1 ls -la t04xxx student -rwxr-xrx three student - rwx r-x r-x Windows GUI UNIX Windows chmod CNS (755) (ug+x) % chmod

More information

FS900S_B

FS900S_B FS909S FS917S FS909S FS917S 100~240V 4 5 6 7 8 9 10 11 12 1 9 9 L/A S/D FS909S 10BASE-T/100BASE-TX PORTS (AUTO MDI/MDI-X) FS917S 14 FS909SFS917S 15 16 17 18 19 20 21 22 23 24 2 26 27 28 29 30 31 32 3

More information

CS-SEIL-510/C コマンドリファレンス

CS-SEIL-510/C コマンドリファレンス FutureNet CS-SEIL-510/C 1.75 1 CS-SEIL-510/C 10 1.1................................................ 10 1.2............................................. 10 1.3..................................................

More information

アドレス プールの設定

アドレス プールの設定 CHAPTER 9 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 ESR IP ODAP p.9-5 IP p.9-17 IP Cisco 10000 ESR Virtual Private Network VPN; IP ODAP IP Cisco 10000 ESR 9-1 9

More information

橡3-MPLS-VPN.PDF

橡3-MPLS-VPN.PDF MPLS-VPN NTT () MPLS IP IP 1 MPLS-VPN MPLS IP-VPN IP (IP-Sec VPN) MPLS-VPNMPLS (IP-VPN) MPLS-VPN IF ATM HSD (FR IP ) (a)ipsec-vpn ( ) (b)mpls-vpn IP-NW MPLS-VPN VPN 2 MPLS-VPN Cisco

More information

アライドテレシス コア・スイッチ AT-x900 シリーズ とディストリビューションスイッチ AT-x600 シリーズ で実現するOSPFv3/OSPFv2 & RIP/RIPng デュアルスタック ・ ネットワーク

アライドテレシス コア・スイッチ AT-x900 シリーズ とディストリビューションスイッチ AT-x600 シリーズ で実現するOSPFv3/OSPFv2 & RIP/RIPng デュアルスタック ・ ネットワーク 主な目的 既存 IPv4 環境に IPv6 環境を追加したい 段階的に IPv6 環境に移行したい OSPF などのダイナミックルーティングで IPv6 環境を構築したい 概要 昨今 急速に発展する新興国においてインターネット等の IT ネットワークインフラの普及整備が加速し IPv4 アドレスの枯渇が現実的な問題となっております このような状況から 今後 IPv6 の普及が加速され IPv6 を使用した

More information

UsersGuide_INR-HG5497c_.doc

UsersGuide_INR-HG5497c_.doc UPS / Web/SNMP VCCI A Web/SNMP... 1.. WEB...1.. SNMP...1.. NETSHUT...1.. 100BASE-TX...1... 2 Web... 4.....5.....7......7......8......9.. UPS...10... UPS...10...13......14......14...15......17......17..

More information

SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambi

SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambi IDP (INTRUSION DETECTION AND PREVENTION) SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambiguity Track

More information

NS-3510イーサネットアクセスデバイス取扱説明書-02

NS-3510イーサネットアクセスデバイス取扱説明書-02 NS-3510 2 3 4 CONSOLE test CONSOLE test ROM BOOT... Hit [Enter] key to enter ROM-Monitor... 1st Boot : 1000000 2nd Boot : 1000200

More information

SR-X526R1 サーバ収容スイッチ ご利用にあたって

SR-X526R1 サーバ収容スイッチ ご利用にあたって SR-X526R1 P3NK-3432-05Z0 526R1 V01 SR-X526R1 V01 2009 10 2010 4 2 2011 5 3 2012 3 4 2012 11 5 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2012 2 SR-X526R1 V01...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...13...13...13

More information

IPv6 リンクローカル アドレスについて

IPv6 リンクローカル アドレスについて IPv6 リンクローカルアドレスについて 目次 概要前提条件要件使用するコンポーネント表記法設定ネットワーク図設定確認 OSPF 設定の確認リンクローカルアドレスの到達可能性の確認リモートネットワークからリンクローカルアドレスへの ping 実行直接接続されたネットワークからリンクローカルアドレスへの ping 実行関連情報 概要 このドキュメントは ネットワーク内の IPv6 リンクローカルアドレスの理解を目的としています

More information

MR1000 コマンド設定事例集

MR1000 コマンド設定事例集 V21 LAN 2005 1 2005 3 2 Microsoft Corporation OMRON Corporation 2004-2005 All Rights Reserved. 2 V21... 2... 6... 6... 6... 6 1... 7 1.1 LAN... 8 1.2 CATV... 10 1.3 LAN... 12 1.4 IPv4 IPv6... 14 1.5...

More information

今日のトピック 実験結果の共有 RPKI/Router 周りの基本的な動き 今後の課題と展望 2012/7/6 copyright (c) tomop 2

今日のトピック 実験結果の共有 RPKI/Router 周りの基本的な動き 今後の課題と展望 2012/7/6 copyright (c) tomop 2 どこまで動く? RPKI/Router 2012/7/6 Internet Multifeed Co. / JPNAP Tomoya Yoshida 今日のトピック 実験結果の共有 RPKI/Router 周りの基本的な動き 今後の課題と展望 2012/7/6 copyright (c) tomop 2 Cisco, Juniper で軽く実験してみました validation 結果が想定通りになっているか

More information

アライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減

アライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減したい 概要 ネットワーク管理 運用にかかるコストを削減するために 新たなシステムを導入することで一元管理や共有化を図る場面が多くあります しかし場合により そのシステムを導入のために 対応機器へのリプレースや機器追加を行わなければならず 大きな追加コストや高いリスクが発生してしまいます

More information

<4D F736F F F696E74202D C F815B834E95D2836E E9197BF76322E312D8CF68A4A97702E B8CDD8AB B83685D>

<4D F736F F F696E74202D C F815B834E95D2836E E9197BF76322E312D8CF68A4A97702E B8CDD8AB B83685D> 本資料は2009 年 12 月 3 4 日に開催されたIPv4アドレス枯渇対応タスクフォース主催のス主催の IPv6ハンズオンセミナー idc ネットワーク編 ( 講師 : 井上一清氏 ) を元にし 公開用に資料を編集したものである IPv4 アドレス枯渇対応タスクフォース http://www.kokatsu.jp/ 1 idc ネットワーク編ハンズオン用資料 株式会社 IDC フロンティア 井上一清

More information

SRX License

SRX License SRX ライセンスキー投入手順 株式会社日立ソリューションズネットワークビジネス部セキュリティグループ リビジョン 4.0 初版 2010/05/30 最新版 2012/12/27 Hitachi Solutions, Ltd. 2010-2012. All rights reserved. SRX ライセンスキー投入手順 Contents 1. ライセンスキーの自動インポート ( インターネット接続必須

More information

IP... 2 IP... 2 IP... 2 IP... 2 VLAN... 3 IP ADD IP IPADDRESS... 5 DELETE IP... 7 PING SETIP SHOW IP IP CentreCOM FS9

IP... 2 IP... 2 IP... 2 IP... 2 VLAN... 3 IP ADD IP IPADDRESS... 5 DELETE IP... 7 PING SETIP SHOW IP IP CentreCOM FS9 ... 2... 2... 2... 2 VLAN... 3... 3... 4... 4 ADD ADDRESS... 5 DELETE... 7 PING.... 8 SET... 10 SHOW... 11 CentreCOM FS900S 1.0.0 1 Internet Protocol 2 Telnet 1. 2. VLAN VLAN default ADD ADDRESS=192.168.10.5

More information

実習 : シングルエリアでの OSPFv3 の基本設定 トポロジ 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. 1 / 11 ページ

実習 : シングルエリアでの OSPFv3 の基本設定 トポロジ 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. 1 / 11 ページ トポロジ 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. 1 / 11 ページ アドレステーブル 学習目標 デバイスインターフェイス IPv6 アドレスデフォルトゲートウェイ R1 G0/0 S0/0/0 (DCE) S0/0/1 R2 G0/0 S0/0/0 R3 G0/0

More information

SRT100 コマンド設定運用説明書

SRT100 コマンド設定運用説明書 8 9 46 2 ...2 SRT100...4...6...8...9...9...10...11...12...14...15...19 CONSOLE...20 1....20 2.CONSOLE...21 3.CONSOLE...22...24 1....24 2....25 3....25 4....26 5....26 6.syslog...27 7.LAN...28 8.WAN...28

More information

2 PC [1], [2], [3] 2.1 OS 2.1 ifconfig 2.1 lo ifconfig -a 2.1 enp1s0, enx0090cce7c734, lo 3 enp1s0 enx0090cce7c734 PC 2.1 (eth0, eth1) PC 14

2 PC [1], [2], [3] 2.1 OS 2.1 ifconfig 2.1 lo ifconfig -a 2.1 enp1s0, enx0090cce7c734, lo 3 enp1s0 enx0090cce7c734 PC 2.1 (eth0, eth1) PC 14 2 PC [1], [2], [3] 2.1 OS 2.1 ifconfig 2.1 lo ifconfig -a 2.1 enp1s0, enx0090cce7c734, lo 3 enp1s0 enx0090cce7c734 PC 2.1 (eth0, eth1) PC 14 $ ifconfig lo Link encap: inet :127.0.0.1 :255.0.0.0 inet6 :

More information

128 64 32 16 8bit 7bit 6bit 5bit 4bit 3bit 2bit 1bit 8 4 2 1 3.6m 4.5m 5.5m 6.4m Tokyo:3.6m 3.6m 4.5m 3.6m 5.5m 6.4m JCSAT-3 AI 3 Hub WIDE Internet 2Mbps VSAT point-to-point/multicst

More information

2011 NTT Information Sharing Platform Laboratories

2011 NTT Information Sharing Platform Laboratories NGN IPv6 multi-homing uplink load balancing 2 3 4 uplink uplink prefix domain A domain A prefix prefix prefix = longest match domain A domain A DNS Server domain A domain B 5 uplink uplink prefix domain

More information

(11) - CDN 2002.07.02 E-Mail: katto@katto.comm.waseda.ac.jp n n n 1 ( ) (a) ( ) (b) IP (1) (S,G): S: G: IGMP Join/Leave D 224.0.0.0 239.255.255.255 IP (2) Shortest Path Tree Shared Tree Shortest Path

More information

$ ifconfig lo Link encap: inet : : inet6 : ::1/128 : UP LOOPBACK RUNNING MTU:65536 :1 RX :8 :0 :0 :0 :0 TX :8 :0 :0 :0 :0 (Collision

$ ifconfig lo Link encap: inet : : inet6 : ::1/128 : UP LOOPBACK RUNNING MTU:65536 :1 RX :8 :0 :0 :0 :0 TX :8 :0 :0 :0 :0 (Collision 2 (1) (2)PC [1], [2], [3] 2.1 OS ifconfig OS 2.1 ifconfig ( ) ifconfig -a 2.1 PC PC enp1s0, enx0090cce7c734, lo 3 PC 2.1 13 $ ifconfig lo Link encap: inet :127.0.0.1 :255.0.0.0 inet6 : ::1/128 : UP LOOPBACK

More information

AMFマルチテナントソリューション

AMFマルチテナントソリューション 主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー / マスターを仮想マシン上に集約したい AMF 機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 複数テナントがそれぞれ独立して動作し かつ上位のコントローラーから複数テナントを集中管理可能なAMFネットワークを構築したい 概要 AMF を使用することで ネットワークデバイスの一元管理や自動復旧

More information

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN

More information

橡c03tcp詳説(3/24修正版).PDF

橡c03tcp詳説(3/24修正版).PDF 1 1 2 TCP 1 3 TCP 9 4 TCP 15 5 21 6 TCP 25 7 27 TCP 1 TCP Windows98 Linux Solaris TCP(Transmission Control Protocol) IP TCP UDP UDP TCP UDP TCP 1 TCP RFC793 RFC2581 TCP 4-1 - DataLink header IP header

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information