Apresia X24-PSRRADIUSfullflex EG fullflex EG VLAN Login Web MAC Web/MAC 802.1X EAP-TLS, PEAP

Size: px
Start display at page:

Download "Apresia X24-PSRRADIUSfullflex EG fullflex EG VLAN Login Web MAC Web/MAC 802.1X EAP-TLS, PEAP"

Transcription

1 Apresia GX-PSR Contents: Apresia GX-PSR MANAGE RADIUS VLAN fullflex EG fullflex RADIUS Web MAC Web/MAC IEEE 802.1x EAP-TLS PEAP

2 Apresia X24-PSRRADIUSfullflex EG fullflex EG VLAN Login Web MAC Web/MAC 802.1X EAP-TLS, PEAP

3 Apresia GX-PSR AEOS: Ver MANAGE MANAGE telnet IP: > enable # configure terminal (config)# interface manage (config-if-mng)# ip address /24 (config-if-mng)# exit (config)# exit # write memory RADIUS RADIUS IEEE802.1X Web MAC Web/MAC RADIUS RADIUS host: port: VLAN VLAN v10 - VLAN v20 - VLAN server(192) - RADIUSDHCP temp(4094) - VLAN interface ports

4 21-23 : (temp) 24 : RADIUS(server) UTP : (config)# interface port (config-if-port)# media utp (config-if-port)# exit DHCP : (config)# packet-filter2 (config-filter)# 2 assign port (config-filter)# 2 1 condition ipv4 dst tcp/udp 67 udp (config-filter)# 2 1 action authentication-bypass (config-filter)# exit VLAN : (config)# vlan database (config-vlan)# vlan 10 name v10 (config-vlan)# vlan 20 name v20 (config-vlan)# vlan 100 name mgmt (config-vlan)# vlan 192 name server (config-vlan)# vlan 4094 name temp (config-vlan)# exit VLAN access: (config)# interface port (config-if-port)# switchport access vlan 4094 (config-if-port)# exit 24 port serverradius : (config)# interface port 24 (config-if-port)# switchport access vlan 192 (config-if-port)# exit VLAN(mgmt) VLAN(temp)VLAN(server) : (config)# interface vlan 4094 (config-if)# ip address /16 (config-if)# exit (config)# interface vlan 100 (config-if)# ip address /24 (config-if)# exit (config)# interface vlan 192 (config-if)# ip address /24 (config-if)# exit VLAN

5 (config)# interface vlan 10 (config-if)# ip address /24 (config-if)# exit (config)# interface vlan 20 (config-if)# ip address /24 (config-if)# exit : (config)# ip route / DHCP: (config)# dhcp policy temp (config-dhcp)# network /16 (config-dhcp)# range (config-dhcp)# router (config-dhcp)# lease 10 (config-dhcp)# exit (config)# dhcp policy enable temp (config)# dhcp policy v10 (config-dhcp)# network /24 (config-dhcp)# range (config-dhcp)# router (config-dhcp)# exit (config)# dhcp policy enable v10 (config)# dhcp policy v20 (config-dhcp)# network /24 (config-dhcp)# range (config-dhcp)# router (config-dhcp)# exit (config)# dhcp policy enable v20 (config)# dhcp server address-check arp (config)# dhcp server enable (config)# exit # write memory show running-config # show running-config username adpro adpro username user user packet-filter2 2 assign port condition ipv4 dst tcp/udp 67 udp 2 1 action authentication-bypass no ip multicast-routing

6 vlan database vlan 10 name v10 vlan 20 name v20 vlan 100 name mgmt vlan 192 name server vlan 4094 name temp interface loopback interface manage ip address /24 interface port 1 interface port 2 interface port 3 interface port 4 interface port 5 interface port 6 interface port 7 interface port 8 interface port 9 interface port 10 interface port 11 interface port 12 interface port 13 interface port 14 interface port 15 interface port 16 interface port 17 interface port 18 interface port 19 interface port 20 interface port 21 media utp switchport access vlan 4094 interface port 22 media utp switchport access vlan 4094 interface port 23 media utp switchport access vlan 4094 interface port 24

7 media utp switchport access vlan 192 interface port 25 interface port 26 interface port 27 interface port 28 interface vlan 1 interface vlan 10 ip address /24 interface vlan 20 ip address /24 interface vlan 100 ip address /24 interface vlan 192 ip address /24 interface vlan 4094 ip address /16 ip route / dhcp policy temp network /16 range router lease 10 dhcp policy v10 network /24 range router dhcp policy v20 network /24 range router dhcp policy enable temp dhcp policy enable v10 dhcp policy enable v20 dhcp server address-check arp dhcp server enable end # show vlan: # show vlan --- vlan port information --- a = access-port t = trunk-port Port

8 Port Mode aaaaaaaa aaaaaaaa aaaaaaaa aaaa --- vlan mapping information --- St = Status En = Enable Dis = Disable u = untag t = tag p = protocol vlan d = dynamic port vlan Port Name VID St default 1 En uuuuuuuu uuuuuuuu uuuu... uuuu v10 10 En v20 20 En mgmt 100 En server 192 En u... temp 4094 En uuu protocol vlan information --- VID protocol type SNAP nonzero OUI: Disable #

9 fullflex EG fullflex : fullflex EG7 : : 191 RADIUS VSAfullflex dictionary.hcl dictionary dictionary.hcl: # fullflex RADIUS # Copyright (c) Accense, Technology, Inc. # All rights reserved. # # Vendor Specific Attributes # VENDOR Hitachi-Cable 278 ATTRIBUTE Hitachi-Cable:NA-Vlan-Id 192 integer dictionary: # Vendor Specific Attributes # 4 VENDOR ACC 5 VENDOR Cisco 9 VENDOR Xylogics 15 VENDOR Wellfleet 18 VENDOR Digital-Equipment 36 VENDOR 3Com 43 VENDOR Merit 61 VENDOR Shiva 166 VENDOR Hitachi-Cable 278 dictionary.hcl VENDOR Livingston 307 VENDOR Microsoft 311 VENDOR U.S.Robotics 429 VENDOR Infinite-Networks 541 VENDOR Ascend 529 dictionary.ascend VENDOR Alcatel 800 VENDOR Scorpion 905 VENDOR Bay-Networks 1584 VENDOR Lucent 1751 VENDOR RedBack 2352 VENDOR Aptis 2634 VENDOR MasterSoft 5401

10 VENDOR 3GPP VENDOR Quintum 6618 VENDOR 3GPP VENDOR Accense dictionary.accense dictionary dictionary.hcl : VENDOR Hitachi-Cable 278 dictionary.hcl fullflex EG-7 RADIUS : [fullflex ]/conf/ - dictionary - dictionary.hcl fullflex Hitach-Cable:NA-Vlan-Id = 20 RADIUS RADIUS : apresia13000 IP: : apresia : < > : MACApresia X24-PSR MAC rduser : rduser : rdpassword : : Login Administrator :

11 Service-Type = 6 v10 : v10 : password : : Web Web/MAC : Hitach-Cable:NA-Vlan-Id = 10 v20 : v20 : password : : Web : Hitach-Cable:NA-Vlan-Id = 20 dot1x20 : dot1x20 : password : : 802.1x : Tunnel-Type = 13 Tunnel-Medium-Type = 6 Tunnel-Private-Group-Id = a9902fea : 0013a9902fea : 1q2w3e : : MACv10MAC OS: Windows 7 Ultimate (32bit) MAC: 00:13:A9:90:2F:EA

12 : Hitach-Cable:NA-Vlan-Id = 10 : <> : support : Accense Technology, Inc. : Osaka : Osaka : JP : 365

13 P.359 RADIUS : (config)# radius login enable RADIUS : (config)# radius login primary ip port RADIUS secret key : (config)# radius login primary secret-key apresia show radius login configuration: # show radius login configuration RADIUS Login Authentication Configuration: Authentication Status : enable Local Authentication Status : enable Server Request Interval : 3 Server Max Request : 3 Primary Radius Server Configuration: IP Address : Port Number : Secret Key (Encrypted) : NVPYrO9vB1d+QigidzZmwA$$ Secondary Radius Server Configuration: IP Address : Port Number : 1812 Secret Key (Encrypted) : # fullflex EG rduser adpro # configure terminal

14 fullflex EG rduser telnet >enagle # configure terminal APRESIA telnet login: [~]$ telnet Trying Connected to Escape character is '^]'. login: rduser Password: > enable # configure terminal Enter configuration commands, one per line. End with CNTL/Z. (config)# show logging reverse: Jan 18 14:06:08 <cli:info> enable Jan 18 14:06:04 <cli:notice> Login rduser from Jan 18 14:06:04 <cli:info> RADIUS( ) Authentication succeeded. fullflex EG : [18121] :65521 >> Access-Request id(209) : len(78) : authenticator(d0459f2d232311ee326a08a73becf64e) User-Name = "rduser" User-Password = <f 7c c8 91 ff e6 b0 86 7b 3a d1 d8 y b6 ^ L> NAS-IP-Address = NAS-Port = 1 NAS-Port-Type = Virtual Calling-Station-Id = " " [18121] :65521 << Access-Accept id(209) : len(26) : authenticator(bb985fdef5f0f8e0500e8e1ed90488d8) Service-Type = Administrative

15 Web 6.1 WebP.67 - VLAN fullflex WebLAN Web 22 Web RADIUS: (config)# aaa radius 1 host auth-port key apresia (config)# aaa authentication web radius 1 : (config)# access-defender (4 ): (config-a-def)# packet-filter2 max-rule 4 Web : (config-a-def)# web-authentication port 22 URL( (config-a-def)# web-authentication ip (config-a-def)# web-authentication http-port 80 :300: (config-a-def)# logout aging-time 300 Web: (config-a-def)# exit (config)# web-authentication enable (config)# exit # write memory show access-defender port-configuration: # show access-defender port-configuration AccessDefender Port Configuration: web = web-authentication, gateway = web-authentication gateway mac = mac-authentication, 802.1X = IEEE802.1X, DHCPSNP = DHCP snooping,

16 LD LO = Linkdown Logout, o = enable, x = disable Port : : : web : o..... gateway: mac : o X : o.... DHCPSNP: roaming: LD LO : show running-config: # show running-config username adpro adpro username user user radius login enable radius login primary ip port radius login primary encrypted-secret-key NVPYrO9vB1d+QigidzZmwA$$ packet-filter2 2 assign port condition ipv4 dst tcp/udp 67 udp 2 1 action authentication-bypass no ip multicast-routing vlan database vlan 10 name v10 vlan 20 name v20 vlan 100 name mgmt vlan 192 name server vlan 4094 name temp interface loopback interface manage ip address /24 interface port 1 interface port 2 interface port 3 interface port 4 interface port 5 interface port 6 interface port 7 interface port 8 interface port 9 interface port 10 interface port 11 interface port 12 interface port 13 interface port 14 interface port 15 interface port 16 interface port 17

17 interface port 18 interface port 19 interface port 20 interface port 21 media utp switchport access vlan 4094 interface port 22 media utp switchport access vlan 4094 interface port 23 media utp switchport access vlan 4094 interface port 24 media utp switchport access vlan 192 interface port 25 interface port 26 interface port 27 interface port 28 interface vlan 1 interface vlan 10 ip address /24 interface vlan 20 ip address /24 interface vlan 100 ip address /24 interface vlan 192 ip address /24 interface vlan 4094 ip address /16 ip route / dhcp policy temp network /16 range router lease 10 dhcp policy v10 network /24 range router dhcp policy v20 network /24 range router dhcp policy enable temp dhcp policy enable v10 dhcp policy enable v20 dhcp server address-check arp dhcp server enable aaa radius 1 host auth-port encrypted-key NVPYrO9vB1d+Qigidz ZmwA$$ aaa authentication web radius 1 aaa authentication mac radius 1 aaa authentication dot1x radius 1 access-defender packet-filter2 max-rule 4

18 web-authentication port 22 web-authentication ip web-authentication http-port 80 mac-authentication port 21 mac-authentication encrypted-password DQ0XYTu4/Jl+QigidzZmwA$$ dot1x port 23 dot1x port 23 reauthentication logout aging-time web-authentication enable end 22Web fullflex v10 fullflex VLANDHCP IP v10/password login 3. fullflex 4. APRESIA fullflex VLAN DHCP IP fullflex fullflex Access- Request APRESIAfullflex VLAN DHCP IP IPAPRESIA DHCP

19

20 APRESIA show logging reverse: # show logging reverse Date Log messages Jan 18 17:10:28 <cli:info> show logging reverse Jan 18 17:10:27 <process:notice> A-Def : web : logout(link down) : uid=v10 mac =00:13:a9:90:2f:ea ip= port=22 vid=4094 new vid=10 Jan 18 17:10:23 <port:err> Port 22 link down. Jan 18 17:10:16 <cli:info> show logging reverse Jan 18 17:10:01 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (ki tahama7) via vlan10 Jan 18 17:10:01 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9:90:2f:ea (kitahama7) via vlan10 Jan 18 17:10:01 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea ( kitahama7) via vlan10 Jan 18 17:10:00 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan10 Jan 18 17:09:54 <cli:info> show logging reverse Jan 18 17:09:52 <process:notice> A-Def : web : login succeeded : uid=v10 mac=0 0:13:a9:90:2f:ea ip= port=22 vid=4094 new vid=10 Jan 18 17:09:51 <process:notice> A-Def : radius authentication succeeded : uid =v10 Jan 18 17:09:43 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (kitaham a7) via vlan4094 Jan 18 17:09:43 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9 :90:2f:ea (kitahama7) via vlan4094 Jan 18 17:09:43 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea (kitah ama7) via vlan4094 Jan 18 17:09:43 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan4094 Jan 18 17:09:20 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (kitaham a7) via vlan4094 Jan 18 17:09:20 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9 :90:2f:ea (kitahama7) via vlan4094 Jan 18 17:09:20 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea (kitah ama7) via vlan4094 Jan 18 17:09:20 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan4094 Jan 18 17:08:55 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (kitaham a7) via vlan4094 Jan 18 17:08:55 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9 :90:2f:ea (kitahama7) via vlan4094 Jan 18 17:08:55 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea (kitah

21 ama7) via vlan4094 Jan 18 17:08:55 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan4094 Jan 18 17:08:43 <cli:info> show logging reverse Jan 18 17:08:32 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (kitaham a7) via vlan4094 Jan 18 17:08:32 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9 :90:2f:ea (kitahama7) via vlan4094 Jan 18 17:08:32 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea (kitah ama7) via vlan4094 Jan 18 17:08:31 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan4094 Jan 18 17:08:30 <cli:info> show logging reverse Jan 18 17:08:24 <cli:info> show logging reverse Jan 18 17:08:11 <cli:info> show logging reverse Jan 18 17:08:02 <cli:info> show logging reverse Jan 18 17:07:54 <cli:info> show logging reverse Jan 18 17:07:31 <port:warning> Port 22 link up 100BASE-TX, full-duplex, MDI-X. fullflex EG : [18121] :65470 >> Access-Request id(3) : len(75) : authenticator(c238fc214a1ea f7a00821be) User-Name = "v10" User-Password = <x a5 r b1 c0 Y h B 0f Z E k 0b b2 U 2a> NAS-Port = 22 Calling-Station-Id = "0013a9902fea" NAS-Identifier = "4094" NAS-IP-Address = [18121] :65470 << Access-Accept id(3) : len(32) : authenticator(9d404c8d1188c2bd5e932df080db2c0e) Vendor-Specific = Hitachi-Cable(278) Hitachi-Cable:NA-Vlan-Id = 10 IPv

22 MAC 6.2 MACP.70 - VLAN fullflex MACfullflex MAC MAC 21 RADIUS: (config)# aaa radius 1 host auth-port key apresia (config)# aaa authentication mac radius 1 : (config)# access-defender 4 : (config-a-def)# packet-filter2 max-rule 4 MAC 21: (config-a-def)# mac-authentication port 21 MAC : (config-a-def)# mac-authentication password 1q2w3e MAC: (config-a-def)# exit (config)# mac-authentication enable (config)# exit # write memory

23 show access-defender port-configuration: # show access-defender port-configuration AccessDefender Port Configuration: web = web-authentication, gateway = web-authentication gateway mac = mac-authentication, 802.1X = IEEE802.1X, DHCPSNP = DHCP snooping, LD LO = Linkdown Logout, o = enable, x = disable Port : : : web : gateway: mac : o X : DHCPSNP: roaming: LD LO : show running-config: # show running-config username adpro adpro username user user radius login enable radius login primary ip port radius login primary encrypted-secret-key NVPYrO9vB1d+QigidzZmwA$$ packet-filter2 2 assign port condition ipv4 dst tcp/udp 67 udp 2 1 action authentication-bypass no ip multicast-routing vlan database vlan 10 name v10 vlan 20 name v20 vlan 100 name mgmt vlan 192 name server vlan 4094 name temp interface loopback interface manage ip address /24 interface port 1 interface port 2 interface port 3 interface port 4 interface port 5 interface port 6 interface port 7

24 interface port 8 interface port 9 interface port 10 interface port 11 interface port 12 interface port 13 interface port 14 interface port 15 interface port 16 interface port 17 interface port 18 interface port 19 interface port 20 interface port 21 media utp switchport access vlan 4094 interface port 22 media utp switchport access vlan 4094 interface port 23 media utp switchport access vlan 4094 interface port 24 media utp switchport access vlan 192 interface port 25 interface port 26 interface port 27 interface port 28 interface vlan 1 interface vlan 10 ip address /24 interface vlan 20 ip address /24 interface vlan 100 ip address /24 interface vlan 192 ip address /24 interface vlan 4094

25 ip address /16 ip route / dhcp policy temp network /16 range router lease 10 dhcp policy v10 network /24 range router dhcp policy v20 network /24 range router dhcp policy enable temp dhcp policy enable v10 dhcp policy enable v20 dhcp server address-check arp dhcp server enable aaa radius 1 host auth-port encrypted-key NVPYrO9vB1d+Qigidz ZmwA$$ aaa authentication mac radius 1 access-defender packet-filter2 max-rule 4 mac-authentication port 21 mac-authentication encrypted-password DQ0XYTu4/Jl+QigidzZmwA$$ mac-authentication enable end MACRADIUS RADIUS VLANDHCP IP fullflex MAC 3. APRESIA fullflex VLAN DHCP IP fullflex MACAccess-Request APRESIAfullflex VLAN DHCP IP

26 APRESIA IPAPRESIA DHCP show logging reverse: Jan 18 14:43:11 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (ki tahama7) via vlan10 Jan 18 14:43:11 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9:90:2f:ea (kitahama7) via vlan10 Jan 18 14:43:11 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea ( kitahama7) via vlan10 Jan 18 14:43:10 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan10 Jan 18 14:42:08 <process:notice> A-Def : mac : login succeeded : uid=0013a9902 fea mac=00:13:a9:90:2f:ea ip= port=21 vid=4094 new vid=10 Jan 18 14:42:08 <process:notice> A-Def : radius authentication succeeded : uid =0013a9902fea Jan 18 14:42:06 <port:warning> Port 21 link up 100BASE-TX, full-duplex, MDI-X. fullflex EG : [18121] :65507 >> Access-Request id(1) : len(84) : authenticator(bdc102a19b50be9f7f d0b6e) User-Name = "0013a9902fea" User-Password = <v A b7 R d9 2 t fa af O 88 be U 28> NAS-Port = 21 Calling-Station-Id = "0013a9902fea" NAS-Identifier = "4094" NAS-IP-Address = [18121] :65507 << Access-Accept id(1) : len(32) : authenticator(8af01e3bd2cbdc780bdc88cdc7127e97) Vendor-Specific = Hitachi-Cable(278) Hitachi-Cable:NA-Vlan-Id = 10 IPv

27

28 Web/MAC 6.3 Web/MAC P.72 VLAN fullflex Web MACLAN MAC MAC Web fullflex MAC fullflex MAC 21 RADIUS: (config)# aaa radius 1 host auth-port key apresia (config)# aaa authentication web radius 1 (config)# aaa authentication mac radius 1 (4 ): (config)# access-defender (config-a-def)# packet-filter2 max-rule 4 Web : (config-a-def)# web-authentication port 21 URL: (config-a-def)# web-authentication ip (config-a-def)# web-authentication http-port 80 MAC : (config-a-def)# mac-authentication port 21 (config-a-def)# mac-authentication password 1q2w3e :300:

29 (config-a-def)# logout aging-time 300 Web/MAC: (config)# web-authentication enable (config)# mac-authentication enable show access-defender port-configuration: # show access-defender port-configuration AccessDefender Port Configuration: web = web-authentication, gateway = web-authentication gateway mac = mac-authentication, 802.1X = IEEE802.1X, DHCPSNP = DHCP snooping, LD LO = Linkdown Logout, o = enable, x = disable Port : : : web : oo..... gateway: mac : o X : o.... DHCPSNP: roaming: LD LO : # show running-config username adpro adpro username user user radius login enable radius login primary ip port radius login primary encrypted-secret-key NVPYrO9vB1d+QigidzZmwA$$ packet-filter2 2 assign port condition ipv4 dst tcp/udp 67 udp 2 1 action authentication-bypass no ip multicast-routing vlan database vlan 10 name v10 vlan 20 name v20 vlan 100 name mgmt vlan 192 name server vlan 4094 name temp interface loopback interface manage ip address /24 interface port 1

30 interface port 2 interface port 3 interface port 4 interface port 5 interface port 6 interface port 7 interface port 8 interface port 9 interface port 10 interface port 11 interface port 12 interface port 13 interface port 14 interface port 15 interface port 16 interface port 17 interface port 18 interface port 19 interface port 20 interface port 21 media utp switchport access vlan 4094 interface port 22 media utp switchport access vlan 4094 interface port 23 media utp switchport access vlan 4094 interface port 24 media utp switchport access vlan 192 interface port 25 interface port 26 interface port 27 interface port 28 interface vlan 1 interface vlan 10

31 ip address /24 interface vlan 20 ip address /24 interface vlan 100 ip address /24 interface vlan 192 ip address /24 interface vlan 4094 ip address /16 ip route / dhcp policy temp network /16 range router lease 10 dhcp policy v10 network /24 range router dhcp policy v20 network /24 range router dhcp policy enable temp dhcp policy enable v10 dhcp policy enable v20 dhcp server address-check arp dhcp server enable aaa radius 1 host auth-port encrypted-key NVPYrO9vB1d+Qigidz ZmwA$$ aaa authentication web radius 1 aaa authentication mac radius 1 aaa authentication dot1x radius 1 access-defender packet-filter2 max-rule 4 web-authentication port web-authentication ip web-authentication http-port 80 mac-authentication port 21 mac-authentication encrypted-password DQ0XYTu4/Jl+QigidzZmwA$$ dot1x port 23 dot1x port 23 reauthentication logout aging-time web-authentication enable mac-authentication enable end 1. 21MAC RADIUS

32 2. 21MAC RADIUS 3. Web 4. fullflex v10 fullflex VLAN DHCP IP 5. MAC RADIUS fullflexmac 7. APRESIA fullflex VLAN DHCP IP MAC RADIUS APRESIAMAC v10/password login 13. fullflex 14. APRESIA fullflex VLAN DHCP IP APRESIA MAC RADIUS fullflex MAC Access-Request APRESIA MACfullflex VLAN DHCP IP MACIPAPRESIA DHCP MAC RADIUSAPRESIA MAC MAC fullflex fullflex Access- Request APRESIAfullflex VLAN DHCP IP IPAPRESIA DHCP

33 MAC show logging reverse: # show logging reverse Date Log messages Jan 18 18:58:48 <cli:info> show logging reverse Jan 18 18:58:22 <process:notice> A-Def : mac : logout(link down) : uid=0013a99 02fea mac=00:13:a9:90:2f:ea ip= port=21 vid=4094 new vid=10 Jan 18 18:58:20 <port:err> Port 21 link down. Jan 18 18:58:00 <cli:info> show logging reverse Jan 18 18:57:50 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (ki tahama7) via vlan10 Jan 18 18:57:50 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9:90:2f:ea (kitahama7) via vlan10 Jan 18 18:57:50 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea ( kitahama7) via vlan10 Jan 18 18:57:49 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan10 Jan 18 18:57:42 <cli:info> show logging reverse Jan 18 18:57:28 <process:notice> A-Def : mac : login succeeded : uid=0013a9902 fea mac=00:13:a9:90:2f:ea ip= port=21 vid=4094 new vid=10 Jan 18 18:57:27 <process:notice> A-Def : radius authentication succeeded : uid =0013a9902fea Jan 18 18:57:25 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (kitaham a7) via vlan4094 Jan 18 18:57:25 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9 :90:2f:ea (kitahama7) via vlan4094 Jan 18 18:57:25 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea (kitah ama7) via vlan4094 Jan 18 18:57:25 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan4094 Jan 18 18:57:24 <port:warning> Port 21 link up 100BASE-TX, full-duplex, MDI-X. MAC show logging reverse: # show logging reverse Date Log messages Jan 18 19:18:27 <cli:info> show logging reverse Jan 18 19:18:22 <process:notice> A-Def : web : logout(link down) : uid=v10 mac =00:0b:5d:7c:6e:2e ip= port=21 vid=4094 new vid=10 Jan 18 19:18:20 <port:err> Port 21 link down. Jan 18 19:18:14 <dhcp:info> DHCPACK on to 00:0b:5d:7c:6e:2e (XP 100-OSAKA) via vlan10 Jan 18 19:18:14 <dhcp:info> DHCPREQUEST for ( ) from 00:0b:5d:7c:6e:2e (XP100-OSAKA) via vlan10 Jan 18 19:18:14 <dhcp:info> DHCPOFFER on to 00:0b:5d:7c:6e:2e ( XP100-OSAKA) via vlan10 Jan 18 19:18:13 <dhcp:info> DHCPDISCOVER from 00:0b:5d:7c:6e:2e via vlan10 Jan 18 19:18:12 <dhcp:info> DHCPACK on to 00:0b:5d:7c:6e:2e (XP100-O SAKA) via vlan10 Jan 18 19:18:12 <dhcp:info> DHCPREQUEST for from 00:0b:5d:7c:6e:2e v ia vlan10 Jan 18 19:18:10 <cli:info> show logging reverse Jan 18 19:18:02 <dhcp:info> DHCPACK on to 00:0b:5d:7c:6e:2e (XP100-O SAKA) via vlan10 Jan 18 19:18:02 <dhcp:info> DHCPREQUEST for from 00:0b:5d:7c:6e:2e ( XP100-OSAKA) via vlan10 Jan 18 19:18:01 <cli:info> show logging reverse Jan 18 19:17:59 <process:notice> A-Def : web : login succeeded : uid=v10 mac=0

34 0:0b:5d:7c:6e:2e ip= port=21 vid=4094 new vid=10 Jan 18 19:17:58 <process:notice> A-Def : radius authentication succeeded : uid =v10 Jan 18 19:17:56 <dhcp:info> DHCPACK on to 00:0b:5d:7c:6e:2e (XP100-O SAKA) via vlan4094 Jan 18 19:17:56 <dhcp:info> DHCPREQUEST for from 00:0b:5d:7c:6e:2e ( XP100-OSAKA) via vlan4094 Jan 18 19:17:52 <dhcp:info> DHCPACK on to 00:0b:5d:7c:6e:2e (XP100-O SAKA) via vlan4094 Jan 18 19:17:52 <dhcp:info> DHCPREQUEST for ( ) from 00:0b:5d :7c:6e:2e (XP100-OSAKA) via vlan4094 Jan 18 19:17:52 <dhcp:info> DHCPOFFER on to 00:0b:5d:7c:6e:2e (XP100 -OSAKA) via vlan4094 Jan 18 19:17:51 <dhcp:info> DHCPDISCOVER from 00:0b:5d:7c:6e:2e via vlan4094 Jan 18 19:17:45 <cli:info> show logging reverse Jan 18 19:17:39 <cli:info> show logging reverse Jan 18 19:17:24 <cli:info> show logging reverse Jan 18 19:17:15 <process:notice> A-Def : mac : login failed : uid=000b5d7c6e2e mac=00:0b:5d:7c:6e:2e ip= port=21 vid=4094 Jan 18 19:17:15 <process:notice> A-Def : radius authentication failed : uid=00 0b5d7c6e2e Jan 18 19:17:12 <cli:info> show logging reverse Jan 18 19:17:09 <port:warning> Port 21 link up 100BASE-TX, full-duplex, MDI-X. fullflex EG MAC : [18121] :65449 >> Access-Request id(5) : len(84) : authenticator(c7aff6a2f9eb8a31cb4c6fabaa83370e) User-Name = "0013a9902fea" User-Password = <c5 x 3a l ed 8e 2d bc 19 bf 04 v w e6 86 3c> NAS-Port = 21 Calling-Station-Id = "0013a9902fea" NAS-Identifier = "4094" NAS-IP-Address = [18121] :65449 << Access-Accept id(5) : len(32) : authenticator(782b323d51422e85b1100fb054c9828d) Vendor-Specific = Hitachi-Cable(278) Hitachi-Cable:NA-Vlan-Id = 10 MAC : [18121] :65393 >> Access-Request id(11) : len(84) : authenticator(d614e c8cbd5d9cc7c8f479fe) User-Name = "000b5d7c6e2e" User-Password = <c fe y p 1e d8 ee bb ce w 0a 8 c9 e1 e8 f7> NAS-Port = 21 Calling-Station-Id = "000b5d7c6e2e" NAS-Identifier = "4094" NAS-IP-Address = [18121] :65393 << Access-Reject id(11) : len(20) : authenticator(875b3b18d31f9a389bc ) [18121] :65384 >> Access-Request

35 id(12) : len(75) : authenticator(59d061e6de3baff09060a3214db284a6) User-Name = "v10" User-Password = <aa b8 q v c7 ff z d6 ab b5 3 f2 dd /> NAS-Port = 21 Calling-Station-Id = "000b5d7c6e2e" NAS-Identifier = "4094" NAS-IP-Address = [18121] :65384 << Access-Accept id(12) : len(32) : authenticator(073fb0d82508aa6e856d60e77a6502d9) Vendor-Specific = Hitachi-Cable(278) Hitachi-Cable:NA-Vlan-Id = 10 MAC IPv MAC MAC IP

36 MAC Web IP

37 IEEE 802.1x XP.81 - VLAN fullflex Windows 7 Ultimate dot1x20eap-tls PEAP 802.1x 23 RADIUS: (config)# aaa radius 1 host auth-port key apresia (config)# aaa authentication dot1x radius 1 : (config)# access-defender 4 : (config-a-def)# packet-filter2 max-rule 4 : (config-a-def)# dot1x port 23 : (config-a-def)# dot1x port 23 reauthentication 802.1X: (config-a-def)# exit (config)# dot1x enable (config)# exit # write memory show running-config: # show running-config username adpro adpro username user user radius login enable radius login primary ip port radius login primary encrypted-secret-key NVPYrO9vB1d+QigidzZmwA$$

38 packet-filter2 2 assign port condition ipv4 dst tcp/udp 67 udp 2 1 action authentication-bypass no ip multicast-routing vlan database vlan 10 name v10 vlan 20 name v20 vlan 100 name mgmt vlan 192 name server vlan 4094 name temp interface loopback interface manage ip address /24 interface port 1 interface port 2 interface port 3 interface port 4 interface port 5 interface port 6 interface port 7 interface port 8 interface port 9 interface port 10 interface port 11 interface port 12 interface port 13 interface port 14 interface port 15 interface port 16 interface port 17 interface port 18 interface port 19 interface port 20 interface port 21 media utp switchport access vlan 4094 interface port 22 media utp switchport access vlan 4094 interface port 23 media utp switchport access vlan 4094 interface port 24 media utp switchport access vlan 192 interface port 25

39 interface port 26 interface port 27 interface port 28 interface vlan 1 interface vlan 10 ip address /24 interface vlan 20 ip address /24 interface vlan 100 ip address /24 interface vlan 192 ip address /24 interface vlan 4094 ip address /16 ip route / dhcp policy temp network /16 range router lease 10 dhcp policy v10 network /24 range router dhcp policy v20 network /24 range router dhcp policy enable temp dhcp policy enable v10 dhcp policy enable v20 dhcp server address-check arp dhcp server enable aaa radius 1 host auth-port encrypted-key NVPYrO9vB1d+Qigidz ZmwA$$ aaa authentication mac radius 1 aaa authentication dot1x radius 1 access-defender packet-filter2 max-rule 4 mac-authentication port 21 mac-authentication encrypted-password DQ0XYTu4/Jl+QigidzZmwA$$ dot1x port 23 dot1x port 23 reauthentication dot1x enable end EAP-TLS 802.1xRADIUS VLANDHCP IP x TLS 1. fullflex EG 2. MMC Wired AutoConfig

40 IEEE 802.1X 8. Microsoft fullflex 802.1x 3. APRESIAfullflex VLAN DHCP IP EAP-TLS APRESIA fullflex TLS802.1x APRESIAfullflex VLAN DHCP IP IPAPRESIA DHCP show logging reverse: Jan 18 20:06:06 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (ki tahama7) via vlan20 Jan 18 20:06:06 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9:90:2f:ea (kitahama7) via vlan20 Jan 18 20:06:06 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea ( kitahama7) via vlan20 Jan 18 20:06:05 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea (kitahama7) vi a vlan20 Jan 18 20:05:01 <process:notice> A-Def : dot1x : login succeeded : uid=dot1x20 mac=00:13:a9:90:2f:ea ip= port=23 vid=4094 new vid=20 Jan 18 20:05:01 <process:notice> A-Def : radius authentication succeeded : uid =dot1x20 Jan 18 20:04:52 <port:warning> Port 23 link up 100BASE-TX, full-duplex, MDI-X. fullflex EG : [18121] :65255 >> Access-Request id(25) : len(105) : authenticator(f955baaccff4860a478505b40e52132f) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <s i 97 b5 fc b f8 b2 0 ae 8e b3 c8 bd> EAP-Message = Response/1/Identity/"dot1x20" NAS-IP-Address = [18121] :65255 << Access-Challenge id(25) : len(77) : authenticator(03ce1ef e20c86c95a87d58b) State = <K 3d d4 0d f2 bd dd cc b8 a p e a p 3a 1 20> Session-Timeout = 20 EAP-Message = Request/2/PEAP/" " Message-Authenticator = <y 03 O a9 9b 2b a3 ab 83 db bd 96 cf 1 e4 9d> [18121] :65246 >> Access-Request id(26) : len(124) : authenticator(7c11376da7dbf96e1a880c0e930f1ed7) User-Name = "dot1x20" NAS-Port = 23

41 Service-Type = Framed Framed-MTU = 1452 State = <K 3d d4 0d f2 bd dd cc b8 a p e a p 3a 1 20> Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <e6 d2 a5 96 9f e [ \ s \ 0a k e0 da> EAP-Message = Response/2/NAK/<0d> NAS-IP-Address = [18121] :65246 << Access-Challenge id(26) : len(85) : authenticator(f9244d1e2fecc97b78e4874a7c9bc4eb) State = <00 09 e a p 2d t l s / K 3d fd ed b3 Session-Timeout = 60 EAP-Message = Request/3/TLS/" " Message-Authenticator = <ec d5 05 da d8 9d ae q 25 7f r 27 9b da z bf> [18121] :65237 >> Access-Request id(27) : len(242) : authenticator(feccb42d7ec26cd3ed8a146818cd297f) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <00 09 e a p 2d t l s / K 3d fd ed b3 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <94 96 b e9 9f a d7 c7 X e3 c7 9d 9d L> EAP-Message = Response/3/TLS/< j e a K T NAS-IP-Address = [18121] :65237 << Access-Challenge id(27) : len(1541) : authenticator(ede51956ed887d e ) State = <00 09 e a p 2d t l s / K 3d fd ed b3 Session-Timeout = 60 EAP-Message = < ac 0d c da J F K EAP-Message = < J P 0 1e 17 0d Z 17 0d 1 9 EAP-Message = <5 f6 cb 18 K dc o u f3 93 f ce B 89 A 02 U 06 c i 1a EAP-Message = <95 1c d9 f5 e1 a f 1b fb S O 7f 95 af X ac 7c p EAP-Message = <s a k a 1 0e 0 0c U O s a k a 1 0b EAP-Message = <8e 3a 1e d 2c ce 9e M q d2 7c 26 t 89 ] 8f R 02 W f6 Y fc a 17 Message-Authenticator = <C fc ac 96 e1 a2 S 2a dc 81 e8 21 B d a9 17> [18121] :65228 >> Access-Request id(28) : len(132) : authenticator(818831ee56a9df37c08d1bc29d8a3427) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <00 09 e a p 2d t l s / K 3d fd ed b3 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = e9 09 ff 0e fc 13 bd fa 9f de ca fd k m> EAP-Message = Response/4/TLS/<00> NAS-IP-Address = [18121] :65228 << Access-Challenge id(28) : len(657) : authenticator(5902ee97b2b5869da041c36a57a801e6) State = <00 09 e a p 2d t l s / K 3d fd ed b3 Session-Timeout = 60 EAP-Message = < e 0d 00 1d e7 B " s Y m ^ e3 16 f3 e4 l 99 9f e8 c9 2 EAP-Message = <0 0c U 1d ff 0 0b U 1d 0f EAP-Message = <14 3b a9 b4 f4 b1 cb 7b 17 A 8c 82 f1 7c 3a 12 9c 85 a6 7d r a5 Message-Authenticator = <4 af 08 ea / b6 b8 93 da 3c 9e cf c8 08 f4 2a> [18121] :65219 >> Access-Request id(29) : len(1263) : authenticator(0344aeae2d90529c c22483fcf) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <00 09 e a p 2d t l s / K 3d fd ed b3 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <V b2 fc 98 9b y e3 f2 1f 9c 8c c \ 19 B H> EAP-Message = < i 0d _ f 0b f c EAP-Message = <05 O s a k a 1 0c 0 0a U 04 0a A T I 1 0c 0 0a 06 0 EAP-Message = <U 1d 0f a U 1d d 06 EAP-Message = <ce 23 8b fc b f5 cf ac b9 99 dc bf fa aa ed bd e1 fd 92 d EAP-Message = <c8 1a df 9f 91 ed 8b 0e w ed Z 9b 7c db be 25 ae fe NAS-IP-Address = [18121] :65219 << Access-Challenge id(29) : len(148) : authenticator(1236edfbfa9fca508052a67a7ec4885e) State = <00 09 e a p 2d t l s / K 3d fd ed b3 Session-Timeout = 60 EAP-Message = Request/6/TLS/< b d

42 Message-Authenticator = <ec cd 9d b0 C b 8b a6 13 7f I af b3 a6. "> [18121] :65210 >> Access-Request id(30) : len(132) : authenticator(86ff2b6f0577c a76a7054a77) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <00 09 e a p 2d t l s / K 3d fd ed b3 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <0c da be ed \ A d7 C a2 7f 3c C 2b 24> EAP-Message = Response/6/TLS/<00> NAS-IP-Address = [18121] :65210 << Access-Accept id(30) : len(188) : authenticator(ef5a7d4977f41bd5d2f40bd b) Termination-Action = RADIUS-Request Session-Timeout = 3600 Vendor-Specific = Microsoft(311) Microsoft:17 = <d4 d0 cd N 1f ec r e de f7 e7 e dd 10 d9 cd h Vendor-Specific = Microsoft(311) Microsoft:16 = <9c e5 28 / f8 a6 c9 S d5 e2 cd " f1 16 c1 c3 Tunnel-Type = VLAN Tunnel-Medium-Type = IEEE-802 Tunnel-Private-Group-ID = "20" EAP-Message = Success/7 Message-Authenticator = <7b 81 Y 1 d0 3f e4 c5 K L R e9 09 V 8d f4> IPv PEAP 802.1xRADIUS VLANDHCP IP x PEAP 1. fullflex EG

43 2. MMC Wired AutoConfig IEEE 802.1X 8. Microsoft EAP PEAP EAP- MSCHAP v2 11. Windows 2. fullflex 802.1x 3. APRESIAfullflex VLAN DHCP IP PEAP APRESIA fullflex PEAP802.1x APRESIAfullflex VLAN DHCP IP IPAPRESIA DHCP show logging reverse: Jan 18 20:20:57 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (ki tahama7) via vlan20 Jan 18 20:20:57 <dhcp:info> DHCPREQUEST for ( ) from 00:13:a9:90:2f:ea (kitahama7) via vlan20 Jan 18 20:20:57 <dhcp:info> DHCPOFFER on to 00:13:a9:90:2f:ea ( kitahama7) via vlan20 Jan 18 20:20:56 <process:notice> A-Def : dot1x : login succeeded : uid=dot1x20 mac=00:13:a9:90:2f:ea ip= port=23 vid=4094 new vid=20 Jan 18 20:20:56 <dhcp:info> DHCPDISCOVER from 00:13:a9:90:2f:ea via vlan20 Jan 18 20:20:55 <process:notice> A-Def : radius authentication succeeded : uid =dot1x20 Jan 18 20:20:38 <dhcp:info> DHCPACK on to 00:13:a9:90:2f:ea (kitaham a7) via vlan4094 Jan 18 20:20:38 <dhcp:info> DHCPREQUEST for from 00:13:a9:90:2f:ea ( kitahama7) via vlan4094 fullflex EG : [18121] :65021 >> Access-Request id(51) : len(105) : authenticator(3a616c39b266343eb5cec8d ) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <bd 16 d 9a N E be 9f 81 f0 R df e2 9e 86 Z> EAP-Message = Response/11/Identity/"dot1x20" NAS-IP-Address =

44 [18121] :65021 << Access-Challenge id(51) : len(85) : authenticator(bd6e90ab0625eb563325bc6e73e0df17) State = <00 09 e a p 2d t l s / K T C f ef O 06 ce I c Session-Timeout = 60 EAP-Message = Request/12/TLS/" " Message-Authenticator = <b4 T 1d \ f 90 a7 b1 n a0 6 7e _ a5> [18121] :65012 >> Access-Request id(52) : len(132) : authenticator(bd1ce9f98a4da7a288d1cf32154f3ce8) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <00 09 e a p 2d t l s / K T C f ef O 06 ce I c Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <f2 dd b4 " W da aa 2b 99 db B 7e 7e b5> EAP-Message = Response/12/NAK/<19> NAS-IP-Address = [18121] :65012 << Access-Challenge id(52) : len(77) : authenticator(507d41eda236dd00298eae3f5e730865) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 1 20> Session-Timeout = 20 EAP-Message = Request/13/PEAP/" " Message-Authenticator = <97 14 c 89 A b3 de b8 6 d1 fd 26 b7 00 d5 29> [18121] :65003 >> Access-Request id(53) : len(234) : authenticator(3fd866ba61341a075bd4d78c9a0c4790) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 1 20> Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <ba c9 20 b7 / b2 9d z 06 p p d e4 60 ef m> EAP-Message = Response/13/PEAP/< j e a K NAS-IP-Address = [18121] :65003 << Access-Challenge id(53) : len(1533) : authenticator(d25afcecc5837e6c3ba842ae1b373814) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 2 20> Session-Timeout = 20 EAP-Message = <01 0e 05 ac 19 c d J F K EAP-Message = < J P 0 1e 17 0d Z 17 0d 1 9 EAP-Message = <5 f6 cb 18 K dc o u f3 93 f ce B 89 A 02 U 06 c i 1a EAP-Message = <95 1c d9 f5 e1 a f 1b fb S O 7f 95 af X ac 7c p EAP-Message = <s a k a 1 0e 0 0c U O s a k a 1 0b EAP-Message = <8e 3a 1e d 2c ce 9e M q d2 7c 26 t 89 ] 8f R 02 W f6 Y fc a 17 Message-Authenticator = <86 af f6 7b db / 6 ae / 3c e8 28 / 2 ab S> [18121] :64994 >> Access-Request id(54) : len(124) : authenticator(c293e37a391b8d6b2ed7dee61fca5238) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 2 20> Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <b1 r 93 e0 80 d ab c6 1c 85 f > EAP-Message = Response/14/PEAP/<00> NAS-IP-Address = [18121] :64994 << Access-Challenge id(54) : len(640) : authenticator(921aea4bf24010fa92b8b4bb95c35380) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 1 20> Session-Timeout = 20 EAP-Message = <01 0f d e7 B " s Y m ^ e3 16 f3 e4 l 99 9f e8 c9 2 EAP-Message = <0 0c U 1d ff 0 0b U 1d 0f EAP-Message = <14 3b a9 b4 f4 b1 cb 7b 17 A 8c 82 f1 7c 3a 12 9c 85 a6 7d r a5 Message-Authenticator = <f a e0 1c c w J a w 18 p J> [18121] :64985 >> Access-Request id(55) : len(326) : authenticator(444f603b100200d001dae640a4875de0) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 1 20> Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <[ a 1a 99 u X d0 b0 04 a9 11 a7 e7 y ac 0e> EAP-Message = Response/15/PEAP/< c

45 NAS-IP-Address = [18121] :64985 << Access-Challenge id(55) : len(140) : authenticator(538e4e6e61c7119ba92e27b97224b2c2) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 3 20> Session-Timeout = 20 EAP-Message = Request/16/PEAP/< b Message-Authenticator = <f0 1c n 3c 3b 1a cc d0 a8 b4 fd 9c bb 3f af 2> [18121] :64976 >> Access-Request id(56) : len(124) : authenticator(c70addfbe8e87334d4dced9a ) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 p e a p 3a 3 20> Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <08 N 16 db 3 f3 N ae fe c4 L \ 94 eb 1a 98> EAP-Message = Response/16/PEAP/<00> NAS-IP-Address = [18121] :64976 << Access-Challenge id(56) : len(127) : authenticator(7b9009a3da0730a52c1125cca2d3b912) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ p e a p _ v 0 3a 1 Session-Timeout = 20 EAP-Message = Request/17/PEAP/< f8 2b b k j N a7 97 dc Message-Authenticator = <fc 83 d8 s \ a U 89 3b y ca b6 17 I Y s> [18121] :64967 >> Access-Request id(57) : len(174) : authenticator(49c65abcbfcfe698a7dff5f4ae027330) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ p e a p _ v 0 3a 1 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <c6 80 L 7b 8b c0 ee f9 d3 ff e6 A 0a S 20 95> EAP-Message = Response/17/PEAP/< c c fd 5 b7 95 1e NAS-IP-Address = [18121] :64967 << Access-Challenge id(57) : len(172) : authenticator(032c36ede2b2b1a c8490d) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ c h a p _ v 2 3a 1 Session-Timeout = 20 EAP-Message = Request/18/PEAP/< b 0d x d1 7b ca 0 12 _ z 1d 9 Message-Authenticator = <e6 3c f1 60 7f 90 S f5 7c ea 7d 8 26 cc 11 fe> [18121] :64958 >> Access-Request id(58) : len(251) : authenticator(cc81d77c97b659fd7ae2fc4e33c07ed8) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ c h a p _ v 2 3a 1 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <] 9f ea c v e6 09 S G> EAP-Message = Response/18/PEAP/< E cc 1c 26 cc 89 cc d7 3e NAS-IP-Address = [18121] :64958 << Access-Challenge id(58) : len(188) : authenticator(ed9f8feca850afaf d94c1b97b) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ c h a p _ v 2 3a 2 Session-Timeout = 20 EAP-Message = Request/19/PEAP/< P v 8b e0 c9 7f c4 d5 03 c 84 d9 Message-Authenticator = <7c e2 7b 16 fb 8a d f9 a5 ab a4 f3 ac 06> [18121] :64949 >> Access-Request id(59) : len(187) : authenticator(4e3d543d6e9dcc614de504a9b87d8980) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ c h a p _ v 2 3a 2 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <aa e7 V 3f f0 c1 93 b9 q Z I e5 " d9 j A> EAP-Message = Response/19/PEAP/< fa 12 M b 7b V 24 1a c d2 C NAS-IP-Address = [18121] :64949 << Access-Challenge id(59) : len(140) : authenticator(d5446b db4b6c8c7f65e5795) State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ c h a p _ v 2 3a 2 Session-Timeout = 20 EAP-Message = Request/20/PEAP/< f6 d5 ae ^ 27 1d aa d5 be /

46 Message-Authenticator = <a4 f dc c5 23 fa t 7d 7f D c 12 a8 fa V da> [18121] :64940 >> Access-Request id(60) : len(187) : authenticator(d1f8d1fd46843fc620e80b033d3b9428) User-Name = "dot1x20" NAS-Port = 23 Service-Type = Framed Framed-MTU = 1452 State = <K T C f d b6 e3 b0 2b 24 d8 fe 06 m s _ c h a p _ v 2 3a 2 Calling-Station-Id = "0013a9902fea" NAS-Port-Type = Ethernet Message-Authenticator = <bf f7. 0f 9d ec cf a fb p K 5 f3 fc 3b O> EAP-Message = Response/20/PEAP/< eb h 1a a8 j [ 2a ^ d7 s fc NAS-IP-Address = [18121] :64940 << Access-Accept id(60) : len(188) : authenticator(a6ba5c30d3f96eb8b483009fc97d4eb9) Termination-Action = RADIUS-Request Session-Timeout = 3600 Vendor-Specific = Microsoft(311) Microsoft:17 = <a8 X ca 94 b6 03 c8 27 s 08 n ea 28 Q d e0 c1 92 be Vendor-Specific = Microsoft(311) Microsoft:16 = <dc O y 9c x c5 f6 u C j d a c2 7f df 97 9e Tunnel-Type = VLAN Tunnel-Medium-Type = IEEE-802 Tunnel-Private-Group-ID = "20" EAP-Message = Success/21 Message-Authenticator = <h 87 a5 m 91 cf 1 cc 0c m 3d bf a > IPv

取扱説明書 -詳細版- 液晶プロジェクター CP-AW3019WNJ

取扱説明書 -詳細版- 液晶プロジェクター CP-AW3019WNJ B A C D E F K I M L J H G N O Q P Y CB/PB CR/PR COMPONENT VIDEO OUT RS-232C LAN RS-232C LAN LAN BE EF 03 06 00 2A D3 01 00 00 60 00 00 BE EF 03 06 00 BA D2 01 00 00 60 01 00 BE EF 03 06 00 19 D3 02 00

More information

HITACHI 液晶プロジェクター CP-AX3505J/CP-AW3005J 取扱説明書 -詳細版- 【技術情報編】

HITACHI 液晶プロジェクター CP-AX3505J/CP-AW3005J 取扱説明書 -詳細版- 【技術情報編】 B A C E D 1 3 5 7 9 11 13 15 17 19 2 4 6 8 10 12 14 16 18 H G I F J M N L K Y CB/PB CR/PR COMPONENT VIDEO OUT RS-232C LAN RS-232C LAN LAN BE EF 03 06 00 2A D3 01 00 00 60 00 00 BE EF 03 06 00 BA D2 01

More information

HITACHI 液晶プロジェクター CP-EX301NJ/CP-EW301NJ 取扱説明書 -詳細版- 【技術情報編】 日本語

HITACHI 液晶プロジェクター CP-EX301NJ/CP-EW301NJ 取扱説明書 -詳細版- 【技術情報編】 日本語 A B C D E F G H I 1 3 5 7 9 11 13 15 17 19 2 4 6 8 10 12 14 16 18 K L J Y CB/PB CR/PR COMPONENT VIDEO OUT RS-232C RS-232C RS-232C Cable (cross) LAN cable (CAT-5 or greater) LAN LAN LAN LAN RS-232C BE

More information

Microsoft PowerPoint - 検証レポート_ARUBA.ppt

Microsoft PowerPoint - 検証レポート_ARUBA.ppt ARUBA/APRESIA 相互接続検証 2009/3/24-25 目次 検証概要 検証構成 物理構成図 論理構成図 ( パターン 1) 論理構成図 ( パターン 2) 検証結果 検証結果一覧 PoE 給電試験 認証ポートでの無線 AP 接続試験 障害切り替え試験 検証機器一覧 機器設定 APRESIA ARUBA 2 検証概要 3 検証概要 検証概要 ARUBA 製無線アクセスポイント AP-125(802.11a/b/g/n

More information

日立液晶プロジェクター CP-AW2519NJ 取扱説明書- 詳細版-

日立液晶プロジェクター CP-AW2519NJ 取扱説明書- 詳細版- PAGE UP DOWN D- ESC ENTER 1 1 2 2 3 COMPUTER IN1 USB TYPE A DC5V 0.5A USB TYPE B HDMI COMPUTER IN2 LAN CONTROL MONITOR OUT MIC AUDIO IN1 AUDIO IN3 AUDIO OUT R R L L S-VIDEO AUDIO IN2 VIDEO PAGE UP DOWN

More information

00.目次_ope

00.目次_ope 816XL ii iii iv iv User Entry 1 3 v vi vii viii 1 1 C: >VTTERM 1- 1 1-3 1 1-4 1 1-5 1 1-6 1 1-7 1 1-8 1 1-9 1 1-10 C: >VTN 1 Host Name: 1-11 1 01 1-1 0.0.0.0 1 1-13 1 1-14 - -3 Port status and configuration

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

認証連携設定例 連携機器 パナソニック ES ネットワークス Switch-M24eG Case IEEE802.1X EAP-PEAP(MS-CHAP V2)/ EAP-TLS/EAP-TLS+ ダイナミック VLAN Rev2.0 株式会社ソリトンシステムズ

認証連携設定例 連携機器 パナソニック ES ネットワークス Switch-M24eG Case IEEE802.1X EAP-PEAP(MS-CHAP V2)/ EAP-TLS/EAP-TLS+ ダイナミック VLAN Rev2.0 株式会社ソリトンシステムズ 認証連携設定例 連携機器 パナソニック ES ネットワークス Switch-M24eG Case IEEE802.1X EAP-PEAP(MS-CHAP V2)/ EAP-TLS/EAP-TLS+ ダイナミック VLAN Rev2.0 株式会社ソリトンシステムズ はじめに はじめに 本書について本書はオールインワン認証アプライアンス NetAttest EPS と パナソニック ES ネットワークス社製

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

untitled

untitled FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...

More information

制御メッセージ

制御メッセージ APPENDIX C この付録では のパケットキャプチャおよびセッション状態のサンプルを示します この項では次のトピックについて説明します セッションアップ状態 (P.C-62) ポリシーディレクティブ (P.C-63) Service Activate (P.C-65) Service Deactivate (P.C-67) セッション切断 (P.C-69) C-61 セッションアップ状態 付録

More information

NetAttest EPS設定例

NetAttest EPS設定例 認証連携設定例 連携機器 FXC FXC5200 シリーズ Case IEEE802.1X EAP-TLS 認証 /EAP-TLS 認証 + ダイナミック VLAN Rev1.0 株式会社ソリトンシステムズ はじめに はじめに 本書について本書はオールインワン認証アプライアンス NetAttest EPS と FXC 社製 L2 スイッチ FXC5200 シリーズの IEEE802.1X EAP-TLS

More information

Web 認証拡張機能簡易ドキュメント

Web 認証拡張機能簡易ドキュメント Web 認証拡張機能簡易ドキュメント センチュリー システムズ ( 株 ) 1. Web 認証機能 ( キャプティブポータル機能 ) について Web 認証はパケットフィルタの一種で 認証を通ったユーザの IPv4 アドレスを送信元 / 宛先に持つ転送のみを通過させる機能です Web 認証機能によるパケットの判定は ユーザが設定した forward(in/out) フィルタ通過後に評価されます 2.

More information

アライドテレシス ディストリビューション・スイッチ AT-x600シリーズで実現するMicrosoft® NAP

アライドテレシス ディストリビューション・スイッチ AT-x600シリーズで実現するMicrosoft® NAP Microsoft NAP 主な目的 検疫ネットワークを構築したい 802.1X ユーザー認証をシングルサインオンで行ないたい 概要 Microsoft NAP はActive Directory 環境下での利用を前提としています しかし Active Directory のドメイン認証と IEEE 802.1X 認証 ( および NAP の検疫 ) は同期していません したがって 802.1X 認証の前にドメイン認証が行なわれた場合

More information

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応 Network Equipment 設定例集 Rev.8.03, Rev.9.00, Rev.10.01 対応 2 3 4 5 6 7 8 help > help show command > show command console character administrator pp disable disconnect 9 pp enable save Password: login timer

More information

IP.dvi

IP.dvi ... 3... 3... 3... 4... 6 VLAN... 6... 6 DHCP... 7... 7... 9... 9... 10... 12 R... 15... 15... 15 ARP... 18... 18 ARP... 18 DNS... 20... 20 DHCP/BOOTP... 21... 21 DHCP... 22 UDP... 23... 23... 23... 26...

More information

SRT/RTX/RT設定例集

SRT/RTX/RT設定例集 Network Equipment Rev.6.03, Rev.7.00, Rev.7.01 Rev.8.01, Rev.8.02, Rev.8.03 Rev.9.00, Rev.10.00, Rev.10.01 2 3 4 5 6 1 2 3 1 2 3 7 RTX1000 RTX1000 8 help > help show command > show command console character

More information

MLDS.dvi

MLDS.dvi ... 2... 5... 5 ADD MLDSNOOPING VLAN.... 6 CREATE MLDSNOOPING VLAN... 8 DELETE MLDSNOOPING VLAN... 9 DISABLE MLDSNOOPING...... 11 ENABLE MLDSNOOPING...... 12 SET MLDSNOOPING TIMEOUT... 13 SET MLDSNOOPING

More information

FUJITSU Network SR-M コマンド設定事例集

FUJITSU Network SR-M コマンド設定事例集 SR-M P3NK-4192-03Z0 FUJITSU Network SR-M V02 LAN 2010 4 2013 7 2 2014 8 3 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2014 2 ...2...5...5...6...7 1 LAN SR-M20AP1 / 20AP2...8 1.1 LAN...8 1.2 LAN

More information

WEB.dvi

WEB.dvi ... 5... 5... 5... 7... 8... 8... 10... 11... 11... 12... 13 HTTP... 13... 14... 15... 15... 15 IP... 15... 16... 17... 18 NTP... 18 SNMP.... 19 SNMP... 19 SNMP... 20 SNMP... 22 SNMP... 22... 22... 23...

More information

設定手順

設定手順 IP Cluster & Check Point NGX (IPSO 4.0 & Check Point NGX (R60)) 2007 7 IP Cluster & Check Point NGX...2 1 Gateway Cluster...6 1-1 cpconfig...6 1-2 Gateway Cluster...6 1-3 3rd Party Configuration...8 1-4

More information

RADIUS設定ガイド

RADIUS設定ガイド RADIUS サーバ設定ガイド Net Attest EPS 編 第 2 版 Copyright 2007,2008, ALAXALA Networks Corporation. All rights reserved. はじめに RADIUSサーバ設定ガイドNet Attest EPS 編は AXシリーズでサポートしている認証機能を用いたシステム構築において RADIUSサーバに株式会社ソリトンシステムズ

More information

LSM-L3-24設定ガイド(初版)

LSM-L3-24設定ガイド(初版) 6 DB-9 Figure 6-1. DB-9 6-1 DB-9 EIA CCIT T DB9 DTE # PC DB9 DTE # DB9 DCE # 9 COM DTE-DCE CF 109 DCD 1 1 8 AB 102

More information

SR-X526R1 サーバ収容スイッチ ご利用にあたって

SR-X526R1 サーバ収容スイッチ ご利用にあたって SR-X526R1 P3NK-3432-05Z0 526R1 V01 SR-X526R1 V01 2009 10 2010 4 2 2011 5 3 2012 3 4 2012 11 5 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2012 2 SR-X526R1 V01...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...13...13...13

More information

RouteMagic Controller RMC-MP200 / MP Version

RouteMagic Controller RMC-MP200 / MP Version RouteMagic Controller RMC-MP200 / MP1200 - Version 3.7.1 - RouteMagic Controller( RMC ) 3.7 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.7 RouteMagic Controller Version

More information

CPE9V1.0&AP615V2.0-C01说明书-电子档

CPE9V1.0&AP615V2.0-C01说明书-电子档 2018 i IP-COM CPE9V1.0 CPE9V1.0 AP615V2.0 + > > 注意 提示 AP ARP AES CPE CCQ DHCP DNS DDNS GMT IP Access Point Address Resolution Protocol Advanced Encryption Standard Customer Premises Equipment Client Connection

More information

GA-1190J

GA-1190J GA-1190J 1 1. 2. 3. 4. 2 5. 3 PDF 4 PDF PDF PDF PDF PDF PDF PDF PDF 5 6 ...1...2...4 1...12 2...16...18 3...22 PCL/PS...23 4...26 5...30 ETHERNET...31 TCP/IP...33 IPX/SPX...38 AppleTalk...40 HTTP...42

More information

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information

Cisco Aironet 1130AG アクセス ポイント クイック スタート ガイド

Cisco Aironet 1130AG アクセス ポイント クイック スタート ガイド CONTENTS 1 IP 2 3 6 7 9 12 15 17 18 IP 20 CLI IP 21 Telnet CLI 23 24 28 802.11G 802.11A 34 38 Express Security 40 Express Security 41 SSID 42 47 LED 48 50 SSID50 WEP 50 51 52 MODE 52 Web 53 55 1 56 IP

More information

N A/006A インテリジェントスイッチ

N A/006A インテリジェントスイッチ 5 (Conf-global)# upgrade softare ftp-server 192.168.1.20 -A.B.C-r.des username nec passord nec (Conf-global)# upgrade softare tftp-server 192.168.1.20 -A.B.C-r.des (Conf-global)# upgrade softare restart

More information

Si-R180 ご利用にあたって

Si-R180 ご利用にあたって P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14

More information

NetAttest EPS設定例

NetAttest EPS設定例 認証連携設定例 連携機器 NEC QX-S3109TP/QX-S4009P/QX-S5224GT-4X-PW Case IEEE802.1x EAP-TLS 認証 Rev1.0 株式会社ソリトンシステムズ - 1-2016/03/11 はじめに 本書について本書は CA 内蔵 RADIUS サーバーアプライアンス NetAttest EPS と NEC 社製有線 LAN スイッチ QX-S3109TP/QX-S4009P/QX-S5224GT-4X-PW

More information

RT107eセミナー用資料

RT107eセミナー用資料 2 AV&IT Business Group, YAMAHA RT107e RT107e RT107e RT107e RT107e RT107e RT107e RT107e 4 AV&IT Business Group, YAMAHA 2002~2003 RTX1000 200210 RTX1000 RT57i 20037 RT57i IP-VPN (FGA/FG/FO) VPN 5 AV&IT Business

More information

アドレス プールの設定

アドレス プールの設定 CHAPTER 9 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 ESR IP ODAP p.9-5 IP p.9-17 IP Cisco 10000 ESR Virtual Private Network VPN; IP ODAP IP Cisco 10000 ESR 9-1 9

More information

HP ProCurveSwitchはじめて.ppt

HP ProCurveSwitchはじめて.ppt HP ProCurveSwitch 2008.11.21(2011.06.01 Updated) Akira Tsumura@ILO,Inc : HP HP ProCurveSwitch 2848 cisco Catalyst (IOS12.x) HP ProCurveSwitch2848 USB- LAN VLAN(PortVLAN TaggedVLAN) (STP) config OSI Layer2(

More information

CP-X4021NJ,WX4021NJ_.indd

CP-X4021NJ,WX4021NJ_.indd ESC 1 2 ENTER PAGE UP DOWN ESC 1 2 ENTER PAGE UP DOWN PAGE UP 1 2 ENTER DOWN ESC ESC 1 2 ENTER PAGE UP DOWN 1 2 ESC ENTER PAGE UP DOWN 1 2 ESC ENTER PAGE UP DOWN ESC 1 2 ENTER PAGE UP DOWN

More information

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou

SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Grou NAT NETWORK ADDRESS TRANSLATION SCREENOS NAT ScreenOS J-Series(JUNOS9.5 ) NAT ScreenOS J-Series(JUNOS9.5 ) NAT : Destination NAT Zone NAT Pool DIP IF NAT Pool Egress IF Loopback Group (ScreenOS ) 2 Copyright

More information

untitled

untitled CHAPTER 10 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 IP ODAP p.10-5 IP p.10-18 IP Cisco 10000 Virtual Private Network VPN; IP On-demand Address Pool [ODAP] IP p.10-2

More information

アライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減

アライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減したい 概要 ネットワーク管理 運用にかかるコストを削減するために 新たなシステムを導入することで一元管理や共有化を図る場面が多くあります しかし場合により そのシステムを導入のために 対応機器へのリプレースや機器追加を行わなければならず 大きな追加コストや高いリスクが発生してしまいます

More information

SRT100 コマンド設定運用説明書

SRT100 コマンド設定運用説明書 8 9 46 2 ...2 SRT100...4...6...8...9...9...10...11...12...14...15...19 CONSOLE...20 1....20 2.CONSOLE...21 3.CONSOLE...22...24 1....24 2....25 3....25 4....26 5....26 6.syslog...27 7.LAN...28 8.WAN...28

More information

IGMPS.dvi

IGMPS.dvi ... 2... 5... 5 ADD IGMPSNOOPING... 6 DELETE IGMPSNOOPING...... 8 DISABLE IGMPSNOOPING...... 9 ENABLE IGMPSNOOPING...... 10 SET IGMPSNOOPING TIMEOUT... 11 SHOW IGMPSNOOPING... 12 CentreCOM FS900M 1.6.0

More information

untitled

untitled NTT TOP A WAN WAN VRRP NIC OSPF VRRP STP 1. IPv6 IPv6 2. 3. IPv6 1. IPv4 NAT IPv6 1. 2. (IPv4 ) NAT? Unique Local IPv6 Unicast Address /8 /48 /64 /128 7 1 40 16 64 ULA Global ID Interface ID Type Subnet

More information

MS-1J/MS-1WJ(形名:MS-1/MS-1W)取扱説明書 - 詳細- 技術情報編

MS-1J/MS-1WJ(形名:MS-1/MS-1W)取扱説明書 - 詳細- 技術情報編 720 x 400 37.9 85.0 VESA TEXT 640 x 480 31.5 59.9 VESA VGA (60Hz) 640 x 480 37.9 72.8 VESA VGA (72Hz) 640 x 480 37.5 75.0 VESA VGA (75Hz) 640 x 480 43.3 85.0 VESA VGA (85Hz) 800 x 600 35.2 56.3 VESA SVGA

More information

EtherChannelの設定

EtherChannelの設定 CHAPTER 30 EtherChannel Catalyst 3750 2 3 EtherChannel EtherChannel EtherChannel EtherChannel EtherChannel EtherChannel EtherChannel p.30-2 EtherChannel p.30-11 EtherChannel PAgP LACP p.30-23 Catalyst

More information

ApresiaNPシリーズ ユーザーズガイド

ApresiaNPシリーズ ユーザーズガイド 3 1. 2. SFP/SFP+/QSFP+ 3. 3 1. 1. REF: 1.1 2 ApresiaNP7000-48X6L ApresiaNP7000-48X6L SFP/SFP+ 1000BASE-X/10GBASE-R QSFP+ 40GBASE-R 1-1 ApresiaNP7000-48X6L ApresiaNP7000-48X6L 1-1 ApresiaNP7000-48X6L SFP/SFP+

More information

SR-S224PS1 セキュアスイッチ ご利用にあたって

SR-S224PS1 セキュアスイッチ ご利用にあたって SR-S224PS1 P3NK-3712-05Z0 224PS1 V13 SR-S224PS1 V13 2009 11 2010 7 2 2010 11 3 2011 6 4 2012 7 5 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2012 2 SR-S224PS1 V13...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...13...13...13

More information

設定例集

設定例集 REMOTE ROUTER 1999. 2. 2 YAMAHA NetWare Novell,Inc. INS 64 YAMAHA! M E M O 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 : : : : : : : : : : : : : : : : : : : : :

More information

コア・スイッチSBx8100 シリーズで実現するスター型冗長コアソリューション

コア・スイッチSBx8100 シリーズで実現するスター型冗長コアソリューション 主な目的 コアスイッチを冗長化し 信頼性を高めたい 可用性が高いスター型ネットワークを構築したい スパニングツリーを用いずに冗長を実現したい 概要 現在 ネットワークは その利便性の高さから公共機関 金融機関 医療機関等の様々なところで利用されております ネットワーク上で扱う情報も非常に重要なものが多く ネットワークが停止した場合には大きな機会損失となることから ネットワークの信頼性を高めることは非常に重要です

More information

SR-X324T1/316T1 サーバ収容スイッチ ご利用にあたって

SR-X324T1/316T1 サーバ収容スイッチ ご利用にあたって SR-X324T1/316T1 P3NK-4092-04Z0 324T1/316T1 V01 SR-X324T1/316T1 V01 2010 4 2011 5 2 2012 3 3 2012 11 4 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2012 2 SR-X324T1/316T1 V01...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...12...13...13

More information

アライドテレシス ディストリビューションスイッチ x610シリーズで実現するVRF-Lite + Tagging + EPSR for x610

アライドテレシス ディストリビューションスイッチ x610シリーズで実現するVRF-Lite + Tagging + EPSR for x610 主な目的 IP アドレスが重複した環境を統合したい 各ネットワークのセキュリティを確保したい 運用効率化を図りたい 概要 自治体合併など 個別に稼動していたネットワークを統合する際の課題の一つに IP アドレス体系やネットワークポリシーの見直しがあります しかし IP アドレスを変更することは統合作業の煩雑化やシステムの見直しなど容易ではありません そこで 暫定的にも恒久的にも利用できる VRF-Lite

More information

ES1018V2_24V2_MG.book

ES1018V2_24V2_MG.book 2009 6 Management Ver.2.0 Guide ES1018V2 ES1024V2 ES1018V2 ES1024V2 1.05.06 1....1 1.1... 2 1.2 CLI... 3 1.2.1?... 3 1.2.2 Default... 3 1.2.3 Help... 3 1.2.4 Logout... 3 1.2.5 Ping... 3 1.2.6 Reset...

More information

SR-X340TR1 サーバ収容スイッチ ご利用にあたって

SR-X340TR1 サーバ収容スイッチ ご利用にあたって SR-X340TR1 P3NK-4102-01Z0 340TR1 V01 SR-X340TR1 V01 2010 4 Microsoft Corporation Copyright FUJITSU LIMITED 2010 2 SR-X340TR1 V01...2...5...5...5...5...6...6...7...7...10...10...10...10...10...10...11...11...11...11...12...12

More information

LAN

LAN LAN 2003 6 4 LAN Hotel LAN LAN IEEE802.11a IEEE802.11b 802.11b 11Mbps Copyright (c) 2003 NPO Page 3 FREESPOT FREESPOT HOTSPOT NTT ( ) MZONE ( )NTT Mobile ( ) Yahoo! BB ( ) MapFanWeb http://www.mapfan.com/musen/

More information

リング型IPカメラ監視ソリューション(マルチキャスト編)

リング型IPカメラ監視ソリューション(マルチキャスト編) CentreCOM x900 IP IP ( ) IP surveillance Solution 01 SNMP Manager Syslog Server NTP Server x900-24xt_2 Link Aggregation x900-24xt_1 FS926M-PS_1 FS926M-PS_2 x600-24ts EPSR (Ethernet Protected Switched Ring)

More information

RouteMagic Controller RMC-MP200 / MP Version

RouteMagic Controller RMC-MP200 / MP Version RouteMagic Controller RMC-MP200 / MP1200 - Version 3.5.2 - RouteMagic Controller( RMC ) 3.5.2 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.5 RouteMagic Controller

More information

RT300/140/105シリーズ 取扱説明書

RT300/140/105シリーズ 取扱説明書 REMOTE & BROADBAND ROUTER RT300i/RT140p/RT140f/RT140i RT140e/RT105p/RT105i/RT105e 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Console RT105i RT300i RT140p RT140f RT140i RT140e RT105p RT105i RT105e

More information

untitled

untitled MLD Snooping... 2... 5... 5 DISABLE MLDSNOOPING...... 6 ENABLE MLDSNOOPING...... 7 SET IPV6 MLDSNOOPING...... 8 SHOW IPV6 MLDSNOOPING.... 9 SHOW MLDSNOOPING... 11 CentreCOM 9424T 2.11 1 MLD Snooping MLD

More information

p_network-management_old-access_ras_faq_radius2.xlsx

p_network-management_old-access_ras_faq_radius2.xlsx (1)RADIUS 認証サーバから受信可能な attribute 弊社 RAS が RADIUS 認証サーバから受信する認証成功パケットの attribute 解釈方法を 表 1 に示します なお 表 1 に示す attribute 以外の attribute を受信した場合は RAS 内で廃棄されます 表 1 RADIUS 認証サーバから受信する AccessAccept の解釈方法 attribute

More information

RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3

RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3 RouteMagic Controller RMC-MP200 / MP1200 - Version 3.6 - RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version

More information

AMFマルチテナントソリューション

AMFマルチテナントソリューション 主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー / マスターを仮想マシン上に集約したい AMF 機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 複数テナントがそれぞれ独立して動作し かつ上位のコントローラーから複数テナントを集中管理可能なAMFネットワークを構築したい 概要 AMF を使用することで ネットワークデバイスの一元管理や自動復旧

More information

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici

More information

untitled

untitled IGMP Snooping... 2... 5... 5 ADD IGMPSNOOPING MCGROUP... 6 DELETE IGMPSNOOPING...... 8 DISABLE IGMPSNOOPING...... 9 ENABLE IGMPSNOOPING...... 10 SET IGMPSNOOPING... 11 SET IGMPSNOOPING MCGROUP... 13 SHOW

More information

SR-X324T2/316T2 サーバ収容スイッチ ご利用にあたって

SR-X324T2/316T2 サーバ収容スイッチ ご利用にあたって SR-X324T2/316T2 P3NK-4612-01Z0 324T2/316T2 V01 2012 11 Microsoft Corporation Copyright FUJITSU LIMITED 2012 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...11...12...12...12...12...12...13...13...13

More information

6.1号4c-03

6.1号4c-03 6.1 0 1 1 1 1 BF 1 C DB C 1* F E C 1 F 1 E C 1 E D 1 D 1 BF C G 1 DF 1 E 1 BF 1 BF 1 BF 1 BG 1 BG 1 BG 1 BF 1 BG 1 E 1 D F BF 1 BF 1 F 1 BF 1 F C 1 d 0 1 A 0 1 14 A G 0 1 A 1 G 0 1 1 1 E A 01 B 1 1 1 1

More information

アライドテレシス コア・スイッチ SBx8100 シリーズで実現するクアッドコア・リダンダンシーシステム

アライドテレシス コア・スイッチ SBx8100 シリーズで実現するクアッドコア・リダンダンシーシステム ヘッダ情報主な目的 SBx8100 の VCS plus を用いてネットワークの信頼性 可用性を高めたい VCS plus/vcs を組み合わせ制御プロトコルを排したシンプルネットワークを構築したい 3.84Tbps の大容量システムを背景にスケーラブルなネットワークを実現したい 概要 この構成では F/W 5.4.4 より新規サポートした SBx8100 シリーズ用コントロールファブリックカード

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

RT300i/RT140x/RT105i 取扱説明書

RT300i/RT140x/RT105i 取扱説明書 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Typewriter face RT105i RT300i RT140p RT140f RT140i RT140e RT105i RT300i 11 RARP 9600 bit/s 8 http://www.rtpro.yamaha.co.jp/ ftp.rtpro.yamaha.co.jp 12

More information

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 MAP Tutorial @ 1 Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 IPv4 over IPv6 IPv6 network IPv4 service Internet Service ProviderISP IPv4 service

More information

IP通信網サービスのインタフェース -フレッツシリーズ-

IP通信網サービスのインタフェース -フレッツシリーズ- - 1 - - 2 - - 3 - - 4 - FLET S.NET EX FLET S.NET FdN - 5 - - 6 - - 7 - - 8 - - 9 - ONU IP RJ45 Ethernet ONU IP UNI - 10 - Ethernet ONU IP Ethernet ONU IP - 11 - 7 6 5 4 3 2 1 IPv6 PPPoE DHCPv6: RFC3315

More information

GA-1200J

GA-1200J GA-1200J 1 1. 2. 3. 4. 2 5. 3 PDF 4 PDF PDF PDF PDF PDF PDF PDF PDF 5 6 ...1...2...4 1...12 2...16...18 3...22 4...24 5 TopAccess TopAccess...28 6 TopAccess...32...34 7 ...43...55 7 TopAccess...68 8 TopAccess

More information

untitled

untitled FLASHWAVE 2040 M1 2005 FLASHWAVE 2040 M1 AC AC AC FG () AC AC AC AC - i - FLASHWAVE 2040 M1 AC AC AC AC AC AC100V(50Hz/60Hz) AC - ii - FLASHWAVE 2040 M1 AC AC - iii - FLASHWAVE 2040 M1 VCCI This equipment

More information

rzakg.ps

rzakg.ps IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 65 IBM i5/os ( 5722-SS1) 5 4 0 RISC CISC URL http://www.ibm.com/jp/manuals/main/mail.html

More information

RTX830 取扱説明書

RTX830 取扱説明書 RTX830 JA 1 2 3 4 5 6 7 8 9 10 11 external-memory performance-test go 12 13 show config 14 15 16 17 18 19 20 save 21 22 23 24 25 26 27 save RTX830 BootROM Ver. 1.00 Copyright (c) 2017 Yamaha Corporation.

More information

owners.book

owners.book Network Equipment RTX1200 RTX800 2 3 4 5 6 7 8 9 10 bold face Enter Ctrl Tab BS Del Ctrl X Ctrl X Regular face 11 12 13 14 RTX1200 RTX1200 RTX1200 15 16 ), -. / 1 4 5 6 17 18 19 20 21 console character

More information

IPV6MU.dvi

IPV6MU.dvi MLD Snooping... 2... 5... 5 DISABLE MLDSNOOPING...... 6 ENABLE MLDSNOOPING...... 7 SET IPV6 MLDSNOOPING...... 8 SHOW IPV6 MLDSNOOPING.... 9 SHOW MLDSNOOPING... 12 CentreCOM 9424T/SP 2.3 1 MLD Snooping

More information

DICOM UG_JPN_P book

DICOM UG_JPN_P book DICOM 1 2 FUJIFILM SonoSite, Inc. DICOM PACS MPPS DICOM Storage Commitment 3 Locations Devices イーサネットを使用して LAN に接続する方法 M-Turbo MDSm 転送モードを設定する方法 1 Connectivity (Transfer Mode DICOM 2 Yes Locations Archivers

More information

FUJITSU Network SR-M SR-M20AP1 ご利用にあたって

FUJITSU Network SR-M SR-M20AP1 ご利用にあたって SR-M20AP1 P3NK-4122-02Z0 FUJITSU Network SR-M SR-M 20AP1 V02 LAN 2010 4 2014 8 2 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2014 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...11...12...12...12...12...12...12

More information

リング型IPカメラ監視ソリューション

リング型IPカメラ監視ソリューション TELESYN IP IP surveillance Solution 04 SNMP Manager Syslog Server NTP Server TELESYN9100_2 Link Aggregation VCS_1 TELESYN9100_4 FS926M-PS_1 TELESYN9100_3 FS926M-PS_2 FS926M-PS_3 TELESYN : TELESYN9400 :

More information

007 0 ue ue 6 67 090 b 6666 D 666 0 6 6 0 0 0 4 0 6 7 6 6706 00000 00000 69 000040 000040 0040 0040 000040 000040 0040 0040 674 00000 70 00000 0 00000

007 0 ue ue 6 67 090 b 6666 D 666 0 6 6 0 0 0 4 0 6 7 6 6706 00000 00000 69 000040 000040 0040 0040 000040 000040 0040 0040 674 00000 70 00000 0 00000 EDOGAWA ITY Y @ Y 60 7 66997 00 00 00 00 600 000 000 4900 900 700 000 f 004000 00 000 7f 70g 0 0 007 0 ue ue 6 67 090 b 6666 D 666 0 6 6 0 0 0 4 0 6 7 6 6706 00000 00000 69 000040 000040 0040 0040 000040

More information

橡sirahasi.PDF

橡sirahasi.PDF Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,

More information

FUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって

FUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって P3NK-3892-04Z0 FUJITSU Network Si-R FUJITSU Network Si-R Si-R brin Si-R240B LAN 2009 11 2010 7 2 2010 10 3 2015 1 4 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2015 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...12...12...12...12...12...13...13...13...14

More information

<Documents Title Here>

<Documents Title Here> Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone

More information

補足情報

補足情報 1 危 険 警 告 注 意 2 3 4 5 6 7 8 1 2 3 4 5 9 6 7 8 9 10 10 1 2 11 1 12 1 2 13 3 4 14 1 2 15 3 4 5 16 1 2 3 17 1 2 3 4 18 19 20 21 22 23 1 2 3 4 5 24 6 7 8 9 10 25 26 27 28 6 1 2 7 8 9 3 4 5 29 1 2 警 告 3 4 5

More information

05‚å™J“LŁñfi~P01-06_12/27

05‚å™J“LŁñfi~P01-06_12/27 2005 164 FFFFFFFFF FFFFFFFFF 2 3 4 5 6 7 8 g a 9 f a 10 g e g 11 f g g 12 a g g 1 13 d d f f d 14 a 15 16 17 18 r r 19 20 21 ce eb c b c bd c bd c e c gf cb ed ed fe ed g b cd c b 22 bc ff bf f c f cg

More information

Catalyst 3560-C and 2960-C Getting Started Guide (Japanese)

Catalyst 3560-C and 2960-C Getting Started Guide (Japanese) Catalyst 3560-C/2960-C Express Setup 1 Express Setup Catalyst 3560-C 2960-C Cisco.com Catalyst 3560-C 2960-C Cisco.com Cisco.com Regulatory Compliance and Safety Information for the Catalyst 3560-C and

More information

はじめに はじめに 本書について本書はオールインワン認証アプライアンス NetAttest EPS と NEC プラットフォームズ社製無線アクセスポイント NA1500A の IEEE802.1X EAP-TLS / EAP-PEAP 環境での接続について 設定例を示したものです 設定例は管理者アカ

はじめに はじめに 本書について本書はオールインワン認証アプライアンス NetAttest EPS と NEC プラットフォームズ社製無線アクセスポイント NA1500A の IEEE802.1X EAP-TLS / EAP-PEAP 環境での接続について 設定例を示したものです 設定例は管理者アカ 認証連携設定例 連携機器 NEC プラットフォームズ NA1500A Case IEEE802.1X EAP-TLS/EAP-PEAP Rev1.0 株式会社ソリトンシステムズ はじめに はじめに 本書について本書はオールインワン認証アプライアンス NetAttest EPS と NEC プラットフォームズ社製無線アクセスポイント NA1500A の IEEE802.1X EAP-TLS / EAP-PEAP

More information

RADIUS を使用した Windows 2008 NPS サーバ(Active Directory)に対する ASA VPN ユーザ認証の設定例

RADIUS を使用した Windows 2008 NPS サーバ(Active Directory)に対する ASA VPN ユーザ認証の設定例 RADIUS を使用した Windows 2008 NPS サーバ (Active Directory) に対する ASA VPN ユーザ認証の設定例 目次 概要前提条件要件使用するコンポーネント設定ネットワーク図設定 ASDM の設定 CLI 設定 NPS 設定の Windows 2008 サーバ確認 ASA のデバッグトラブルシューティング 概要 レガシー Cisco VPN Client/AnyConnect/Clientless

More information

はじめに 注意事項 本資料に記載の内容は 弊社が特定の環境において 基本動作や接続動作を確認したものであり すべての環境で機能 性能 信頼性を保証するものではありません 商標一覧 RSA RSA ロゴ SecurID については RSA Security Inc. の米国およびその他の国における商標

はじめに 注意事項 本資料に記載の内容は 弊社が特定の環境において 基本動作や接続動作を確認したものであり すべての環境で機能 性能 信頼性を保証するものではありません 商標一覧 RSA RSA ロゴ SecurID については RSA Security Inc. の米国およびその他の国における商標 資料 NTS-08-R-022 (Rev.0 ) RSA SecurID ワンタイムパスワード認証 評価報告書 2008 年 7 月 22 日アラクサラネットワークス株式会社ネットワークテクニカルサポート Copyright 2008 ALAXALA Networks Corp. All rights reserved. 1 はじめに 注意事項 本資料に記載の内容は 弊社が特定の環境において 基本動作や接続動作を確認したものであり

More information

FUJITSU Network SR-M トラブルシューティング

FUJITSU Network SR-M トラブルシューティング SR-M P3NK-4152-03Z0 FUJITSU Network SR-M V02 SR-M V02 LAN 2010 4 2013 7 2 2014 8 3 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2014 2 SR-M V02...2...4...4...5...6 1...7 1.1...7 1.2...8 1.3...11

More information

SR-S724TC1/324TC1 セキュアスイッチ ご利用にあたって

SR-S724TC1/324TC1 セキュアスイッチ ご利用にあたって SR-S724TC1/324TC1 P3NK-3752-06Z0 724TC1/324TC1 V13 2009 11 2010 7 2 2010 11 3 2011 3 4 2011 6 5 2012 7 6 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2012 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...13...13...13

More information

LSM-L3-24設定ガイド(初版)

LSM-L3-24設定ガイド(初版) 4 2 IP 3 2 MAC VLAN 1 MAC MAC 4-1 2 4-2 VLAN classification VLAN Learning Filtering Forwarding VLAN classification learning filtering forwarding VLAN Classification 2 : - VLAN - VLAN ID Learning VLAN classification

More information

FUJITSU Network Si-R Si-RシリーズSi-R220C ご利用にあたって

FUJITSU Network Si-R Si-RシリーズSi-R220C ご利用にあたって P3NK-3882-04Z0 Si-R220C FUJITSU Network Si-R FUJITSU Network Si-R Si-R brin Si-R220C LAN 2009 11 2010 7 2 2010 10 3 2015 1 4 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2015 2 ...2...5...5...5...5...6...7...8...8...11...11...11...12...12...12...12...12...13...13...13...13...14

More information

untitled

untitled - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - ONU IP RJ45 Ethernet ONU IP UNI - 13 - Ethernet ONU IP Ethernet ONU IP - 14 - 7 6 5 4 3 2 1 IPv6 PPPoE DHCPv6: RFC3315 / RFC3513

More information

2 PC [1], [2], [3] 2.1 OS 2.1 ifconfig 2.1 lo ifconfig -a 2.1 enp1s0, enx0090cce7c734, lo 3 enp1s0 enx0090cce7c734 PC 2.1 (eth0, eth1) PC 14

2 PC [1], [2], [3] 2.1 OS 2.1 ifconfig 2.1 lo ifconfig -a 2.1 enp1s0, enx0090cce7c734, lo 3 enp1s0 enx0090cce7c734 PC 2.1 (eth0, eth1) PC 14 2 PC [1], [2], [3] 2.1 OS 2.1 ifconfig 2.1 lo ifconfig -a 2.1 enp1s0, enx0090cce7c734, lo 3 enp1s0 enx0090cce7c734 PC 2.1 (eth0, eth1) PC 14 $ ifconfig lo Link encap: inet :127.0.0.1 :255.0.0.0 inet6 :

More information

SRX License

SRX License SRX ライセンスキー投入手順 株式会社日立ソリューションズネットワークビジネス部セキュリティグループ リビジョン 4.0 初版 2010/05/30 最新版 2012/12/27 Hitachi Solutions, Ltd. 2010-2012. All rights reserved. SRX ライセンスキー投入手順 Contents 1. ライセンスキーの自動インポート ( インターネット接続必須

More information

000 001

000 001 all-round catalogue vol.2 000 001 002 003 AA0102 AA0201 AA0701 AA0801 artistic brushes AA0602 AB2701 AB2702 AB2703 AB2704 AA0301 AH3001 AH3011 AH3101 AH3201 AH3111 AB3201 AB3202 AB2601 AB2602 AB0701 artistic

More information

$ ifconfig lo Link encap: inet : : inet6 : ::1/128 : UP LOOPBACK RUNNING MTU:65536 :1 RX :8 :0 :0 :0 :0 TX :8 :0 :0 :0 :0 (Collision

$ ifconfig lo Link encap: inet : : inet6 : ::1/128 : UP LOOPBACK RUNNING MTU:65536 :1 RX :8 :0 :0 :0 :0 TX :8 :0 :0 :0 :0 (Collision 2 (1) (2)PC [1], [2], [3] 2.1 OS ifconfig OS 2.1 ifconfig ( ) ifconfig -a 2.1 PC PC enp1s0, enx0090cce7c734, lo 3 PC 2.1 13 $ ifconfig lo Link encap: inet :127.0.0.1 :255.0.0.0 inet6 : ::1/128 : UP LOOPBACK

More information

RADIUS NAS-IP-Address アトリビュート 設定可能性

RADIUS NAS-IP-Address アトリビュート 設定可能性 機能を使用すれば RADIUS パケットの IP ヘッダー内の発信元 IP アドレスを変更せずに 任意の IP アドレスを設定して RADIUS アトリビュート 4 (NAS-IP-Address) として使用できます この機能は サービスプロバイダーが スケーラビリティを向上させるために 小規模な Network Access Server(NAS; ネットワークアクセスサーバ ) のクラスタを使用して大規模な

More information

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 1 2 3 1 2 ... 1 1... 8... 9... 18... 24... 25... 30... 31... 34... 37 E... 67 Bluetooth BIP... 68 2... 71... 73... 100 3 ... 132... 134... 136 E...

More information