SRT/RTX/RT設定例集
|
|
- せいごろう こやぎ
- 5 years ago
- Views:
Transcription
1 Network Equipment Rev.6.03, Rev.7.00, Rev.7.01 Rev.8.01, Rev.8.02, Rev.8.03 Rev.9.00, Rev.10.00, Rev.10.01
2 2
3 3
4 4
5 5
6 6
7 RTX1000 RTX1000
8 8 help > help show command > show command console character administrator pp disable disconnect
9 9 pp enable save Password: login timer save cold start
10 10 cold start cold start cold start save
11 11 default gateway ip interface address LAN IP
12 12 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save
13 13 isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save
14 14 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# ppp mp use on pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# ppp mp use on pp1# isdn remote address call /Tokyo pp1# save
15 15 isdn local address ip lan1 address ip route pp select pp bind ppp mp use isdn remote address pp enable save
16 16 # isdn local address bri /Tokyo # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# ip pp rip send on version 2 pp1# ip pp rip hold routing on pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# ip pp rip send on version 2 pp1# ip pp rip hold routing on pp1# save pp1# connect 1 pp1# disconnect 1
17 17 isdn local address ip lan1 address rip use rip pp select pp bind isdn remote address ip pp rip send ip pp rip hold routing pp enable save isdn local address ip lan1 address rip use rip pp select pp bind isdn remote address ip pp rip send ip pp rip hold routing pp enable save connect disconnect
18 18 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# save pp1# interface reset bri1 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# save pp1# interface reset bri1
19 19 line type ip lan1 address ip route pp select pp bind pp enable save interface reset
20 20 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# ip pp address /24 pp1# ip pp remote address pp1# save pp1# interface reset bri1 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 # pp bind bri1 pp1# ip pp address /24 pp1# ip pp remote address pp1# save pp1# interface reset bri1
21 21 line type ip lan1 address ip route pp select pp bind ip pp address ip pp remote address pp enable save interface reset
22 22 # line type bri1 l128 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 # pp line l128 # line type bri1 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1
23 23 line type ip lan1 address rip use rip pp select pp bind ip pp rip send ip pp rip connect send ip pp rip connect interval pp enable save interface reset
24 24 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 2 # ip route /24 gateway pp 3 # pp select 2 pp2# pp bind bri1 pp2# isdn remote address call /Osaka pp2# pp enable 2 pp2# pp select 3 pp3# pp bind bri1 pp3# isdn remote address call /Nagoya pp3# pp enable 3 pp3# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 # ip route /24 gateway pp 3 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp select 3 pp3# pp bind bri1 pp3# isdn remote address call /Nagoya pp3# pp enable 3 pp3# save
25 25 # isdn local address bri /Nagoya # ip lan1 address /24 # ip route /24 gateway pp 1 # ip route /24 gateway pp 2 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp select 2 pp2# pp bind bri1 pp2# isdn remote address call /Osaka pp2# pp enable 2 pp2# save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable pp select pp bind isdn remote address pp enable save
26 26 # isdn local address bri /Osaka # ip lan1 address /24 # ip route default gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save
27 27 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address /Osaka # ip lan1 address # ip route /24 gateway pp 2 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo /Tokyo pp1# save
28 28 isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save
29 29 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn callback request on pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn callback permit on pp1# isdn remote address call /Tokyo pp1# save
30 30 isdn local address ip lan1 address ip route pp select pp bind isdn callback request isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn callback permit isdn remote address pp enable save
31 31 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route gateway pp 1 # ip route gateway pp 1 # ip route gateway pp 1 # ip lan1 proxyarp on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address /Osaka # ip lan1 address /28 # ip route default gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save
32 32 isdn local address ip lan1 address ip lan1 proxyarp ip route pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save
33 33 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route gateway pp 1 # ip route gateway pp 1 # ip route gateway pp 1.. # ip route gateway pp 2 # ip lan1 proxyarp on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save
34 34 # isdn local address /Tokyo2 # ip lan1 address /24 # ip route gateway pp 1 # Ip route gateway pp 1 # ip lan1 proxyarp on pp1# isdn remote address call /Nagoya pp1# pp bind bri1 pp1# save # isdn local address bri /Nagoya # ip lan1 address /30 # ip route default gateway pp 1 # pp bind bri1 pp1# isdn remote address call /Tokyo2 pp1# save # isdn local address /Osaka # ip lan1 address /28 # ip route default gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save
35 35 isdn local address ip lan1 address ip lan1 proxyarp ip route pp select pp bind isdn remote address pp enable save
36 36 isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save
37 37 # isdn local address bri /Tokyo # ip lan1 address /24 # ip lan1 proxyarp on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# ip pp remote address pp1# save ip pp remote address isdn local address ip lan1 address ip lan1 proxyarp pp select pp bind isdn remote address
38 38 ip pp remote address pp enable save
39 39 # isdn local address bri /Tokyo # ip lan1 address /24 # ip lan1 proxyarp on # pp select anonymous anonymous# pp bind bri1 anonymous# ip pp remote address pool anonymous# pp auth request chap anonymous# pp auth username RT105i-A himitsu anonymous# pp enable anonymous anonymous# save isdn local address ip lan1 address ip lan1 proxyarp pp select pp bind ip pp remote address pool pp auth request pp auth username
40 40 pp enable save
41 41 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route default gateway pp 1 # nat descriptor type 1 masquerade pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# pp auth accept pap chap pp1# pp auth myname RT105i-A himitsu pp1# ppp ipcp ipaddress on pp1# ip pp nat descriptor 1 pp1# save
42 42 isdn local address ip lan1 address ip route nat descriptor type pp select pp bind isdn remote address pp auth accept pp auth myname ppp ipcp ipaddress ip pp nat descriptor pp enable save
43 43 # isdn local address bri /Tokyo # isdn local address bri /Tokyo # isdn local address bri /Tokyo # isdn local address bri /Tokyo # ip lan1 address /24 # pp select anonymous anonymous# pp bind bri2.1 bri2.2 bri2.3 bri2.4 anonymous# pp auth request chap-pap anonymous# pp auth username Nagoya naisyo /Nagoya anonymous# pp auth username Osaka himitsu /Osaka anonymous# ip route /24 gateway pp anonymous name=nagoya anonymous# ip route /24 gateway pp anonymous name=osaka anonymous# pp enable anonymous anonymous# save # isdn local address bri /Osaka # ip lan1 address /24 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp auth accept pap chap pp1# pp auth myname Osaka himitsu pp1# ip route /24 gateway pp 1 pp1# save
44 44 # isdn local address bri /Nagoya # ip lan1 address /24 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp auth accept pap chap pp1# pp auth myname Nagoya naisyo pp1# ip route /24 gateway pp 1 pp1# save isdn local address ip lan1 address pp select pp bind pp auth request pp auth myname pp auth username ip route pp auth username pp enable save isdn local address ip lan1 address pp select pp bind isdn remote address pp auth accept
45 45 pp auth myname ip route pp enable save isdn local address bri local address ip lan1 address pp select pp bind isdn remote address pp auth accept pp auth myname ip route pp enable save
46 46 # isdn local address bri /Tokyo # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri2.1 bri3.1 pp1# ppp mp use on pp1# ppp mp maxlink 3 pp1# isdn remote address call /Osaka pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# save pp1# interface reset pp 1 # isdn local address bri /Osaka # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri2.1 bri3.1 pp1# ppp mp use on pp1# ppp mp maxlink 3 pp1# isdn remote address call /Tokyo pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# save pp1# interface reset pp 1
47 47 ppp mp load threshold isdn local address line type isdn terminator ip lan1 address pp select ppp mp use ppp mp maxlink pp bind isdn remote address ip route. pp keepalive use pp enable save restart interface reset interface interface reset pp
48 48 # isdn local address bri /Tokyo # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri3.1 pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# leased backup 2 pp1# pp select 2 pp2# pp bind bri2.1 pp2# isdn remote address call /Osaka pp2# isdn call block time 15 pp2# pp enable 2 pp2# save pp2# interface reset bri3.1 # isdn local address bri /Osaka # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri3.1 pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# leased backup 2 pp1# pp select 2 pp2# pp bind bri2.1 pp2# isdn remote address call /Tokyo pp2# isdn call block time 15 pp2# pp enable 2 pp2# save pp2# interface reset bri3.1
49 49 isdn local address line type isdn terminator ip lan1 address pp select pp bind ip route pp keepalive use leased backup pp enable pp select pp bind isdn remote address isdn call block time pp enable save interface reset restart
50 50 # isdn local address bri /Tokyo1 # isdn local address bri /Tokyo2 # isdn local address bri /Tokyo3 # ip lan1 address /24 # ip route /24 gateway pp 1 # ip route /24 gateway pp 2 # ip route /24 gateway pp 3 # ip route /24 gateway pp 4 # ip route /24 gateway pp 5 pp1# pp bind bri2.1 pp1# isdn remote address call /Osaka1 pp1# pp select 2 pp2# pp bind bri2.1 pp2# isdn remote address call /Osaka2 pp2# pp enable 2 pp2# pp select 3 pp3# pp bind bri2.2 pp3# isdn remote address call /Osaka3 pp3# pp enable 3 pp3# pp select 4 pp4# pp bind bri2.2 pp4# isdn remote address call /Osaka4 pp4# pp enable 4 pp4# pp select 5 pp5# pp bind bri2.3 pp5# isdn remote address call /Osaka5 pp5# pp enable 5 pp5# save
51 51 isdn local address ip lan1 address pp select pp bind isdn remote address isdn call permit off isdn remote address arrive ip route pp enable save
52 52 # isdn local address bri /Tokyo1 # isdn local address bri /Tokyo2 # isdn local address bri /Tokyo3 # isdn local address bri /Tokyo4 # ip lan1 address /24 pp1# pp bind bri2.1 bri2.2 bri2.3 bri2.4 pp1# ppp mp use on pp1# ppp mp maxlink 8 pp1# isdn remote address call /Osaka /Osaka /Osaka /Osaka4 pp1# ip route /24 gateway pp 1 pp1# save # isdn local address bri /Osaka1 # isdn local address bri /Osaka2 # isdn local address bri /Osaka3 # isdn local address bri /Osaka4 # ip lan1 address /24 pp1# pp bind bri2.1 bri2.2 bri2.3 bri2.4 pp1# ppp mp use on pp1# ppp mp maxlink 8 pp1# isdn remote address call /Tokyo /Tokyo /Tokyo /Tokyo4 pp1# ip route /24 gateway pp 1 pp1# save
53 53 ppp mp load threshold isdn local address ip lan1 address pp select ppp mp use ppp mp maxlink pp bind isdn remote address ip route pp enable save
54 54
55 55 # line type bri2.8 l64 # line type bri3.1 l64 # line type bri3.2 l64 # line type bri3.3 l64 # line type bri3.4 l128 # line type bri3.5 l128 # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # ip lan1 address /24 # rip use on # ip route /24 gateway pp 1 # ip route /24 gateway pp 2 # ip route /24 gateway pp 3 # ip route /24 gateway pp 4 # ip route /24 gateway pp 5 # ip route /24 gateway pp 6 # ip route /24 gateway pp 7 # ip route /24 gateway pp 8 # ip route /24 gateway pp 9 # ip route /24 gateway pp 10 # ip route /24 gateway pp 11 # ip route /24 gateway pp 12 # ip route /24 gateway pp 13 # ip route /24 gateway pp 14
56 56 # ip route /24 gateway pp 15 # ip route /24 gateway pp 16 # ip route /24 gateway pp 17 # ip route /24 gateway pp 18 # ip route /24 gateway pp 19 # ip route /24 gateway pp 20 pp1# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp1# isdn remote address call /bbb pp1# pp select 2 pp2# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp2# isdn remote address call /bbb pp2# pp enable 2 pp2# pp select 3 pp3# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp3# isdn remote address call /bbb pp3# pp enable 3 pp3# pp select 4 pp4# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp4# isdn remote address call /bbb pp4# pp enable 4 pp4# pp select 5 pp5# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp5# isdn remote address call /bbb pp5# pp enable 5 pp5# pp select 6 pp6# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp6# isdn remote address call /bbb pp6# pp enable 6 pp6# pp select 7 pp7# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp7# isdn remote address call /bbb pp7# pp enable 7 pp7# pp select 8 pp8# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp8# isdn remote address call /bbb pp8# pp enable 8 pp8# pp select 9 pp9# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp9# isdn remote address call /bbb pp9# pp enable 9 pp90 pp10# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp10# isdn remote address call /bbb pp10# pp enable 10 pp101 pp11# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp11# isdn remote address call /bbb pp11# pp enable 11 pp112 pp12# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp12# isdn remote address call /bbb pp12# pp enable 12 pp123
57 57 pp13# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp13# isdn remote address call /bbb pp13# pp enable 13 pp134 pp14# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp14# isdn remote address call /bbb pp14# pp enable 14 pp145 pp15# pp bind bri2.8 pp15# pp enable 15 pp156 pp16# pp bind bri3.1 pp16# pp enable 16 pp167 pp17# pp bind bri3.2 pp17# pp enable 17 pp178 pp18# pp bind bri3.3 pp18# pp enable 18 pp189 pp19# pp bind bri3.4 pp19# pp enable 19 pp19# pp select 20 pp20# pp bind bri3.5 pp20# pp enable 20 pp20# save pp20# interface reset bri2.8 pp20# interface reset bri3.1 pp20# interface reset bri3.2 pp20# interface reset bri3.3 pp20# interface reset bri3.4 pp20# interface reset bri3.5 line type isdn local address ip lan1 address rip use ip route pp select
58 58 pp bind isdn remote address pp enable save interface reset restart
59 59 # line type bri1 l128 # isdn local address bri # ip lan1 address /24 # nat descriptor type 1 nat # nat descriptor address outer # nat descriptor type 2 masquerade pp1# pp bind bri1 pp1# pp backup pp 2 pp1# pp keepalive use lcp-echo pp1# ip pp nat descriptor 1 pp1# ip route default gateway pp 1 pp1# pp select 2 pp2# pp bind bri2 pp2# isdn remote address call pp2# pp auth accept chap pp2# pp auth myname name pass pp2# ppp ipcp ipaddress on pp2# ppp ipcp msext on pp2# ip pp nat descriptor 2 pp2# pp enable 2 pp2# save # line type bri1 l128 # isdn local address bri # ip lan1 address /24
60 60 # nat descriptor type 1 nat # nat descriptor address outer # nat descriptor type 2 masquerade pp1# pp bind bri1 pp1# pp backup pp 2 pp1# pp keepalive use lcp-echo pp1# ip pp nat descriptor 1 pp1# ip route default gateway pp 1 pp1# pp select 2 pp2# pp bind bri2 pp2# isdn remote address call pp2# pp auth accept chap pp2# pp auth myname name pass pp2# ppp ipcp ipaddress on pp2# ppp ipcp msext on pp2# ip pp nat descriptor 2 pp2# pp enable 2 pp2# save
61 61
62 62 # ipx routing on # isdn local address bri /Tokyo # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Osaka pp1# ipx pp route 22:22:22:22 2 pp1# save # ipx routing on # isdn local address bri /Osaka # ipx lan1 network 22:22:22:22 # ipx sap add file SERVER aa:aa:aa:aa 00:00:00:00:00:01 ncp 3 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Tokyo pp1# ipx pp route 11:11:11:11 2 pp1# ipx pp route aa:aa:aa:aa 3 pp1# save
63 63 ipx routing isdn local address ipx lan1 network pp select pp bind ipx pp routing isdn remote address ipx pp route pp enable save ipx lan1 network SYSTEM AUTOEXEC.NCF bind net ipx routing isdn local address ipx lan1 network ipx sap pp select pp bind ipx pp routing isdn remote address ipx pp route
64 64 ipx pp route pp enable save ipx sap SYSTEM AUTOEXEC.NCF ipx internalnet 00:00:00:00:00:01 ipx lan1 network
65 65 # ipx routing on # isdn local address bri /Tokyo # ipx lan1 network 11:11:11:11 # ipx sap file SERVER-B bb:bb:bb:bb: 00:00:00:00:00:01 ncp 3 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Osaka pp1# ipx pp route 22:22:22:22 2 pp1# ipx pp route bb:bb:bb:bb 3 pp1# save # ipx routing on # isdn local address bri /Osaka # ipx lan1 network 22:22:22:22 # ipx sap file SERVER-A aa:aa:aa:aa 00:00:00:00:00:01 ncp 3 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Tokyo pp1# ipx pp route 11:11:11:11 2 pp1# ipx pp route aa:aa:aa:aa 3 pp1# save
66 66 ipx routing isdn local address ipx lan1 network ipx sap pp select pp bind ipx pp routing isdn remote address ipx pp route ipx pp route pp enable save
67 67 # line type bri1 l64 # ipx routing on # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1 # line type bri1 l64 # ipx routing on # ipx lan1 network 22:22:22:22 pp1# pp bind bri1 pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1
68 68 line type ipx routing ipx lan1 network pp select pp bind ipx pp routing ipx pp ripsap connect send ipx pp ripsap connect interval pp enable save interface reset
69 69
70 70 # bridge use on # isdn local address bri /Tokyo # bridge group lan1 1 pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # bridge use on # isdn local address bri /Osaka # bridge group lan1 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save
71 71 save ip routing off bridge use isdn local address bridge group pp select pp bind isdn remote address pp enable save
72 72 # line type bri1 l64 # bridge use on # bridge group lan1 1 pp1# pp bind bri1 pp1# save pp1# interface reset bri1 save ip routing off line type bridge use bridge group pp select pp bind pp enable save interface reset
73 73
74 74 pp1# ip filter 1 pass /24 * pp1# ip pp secure filter out 1 pp1# save pp select ip filter * ip pp secure filter out save
75 75 pp1# ip filter 1 reject * /24 pp1# ip filter 2 pass * * pp1# ip pp secure filter out 1 2 pp1# save pp select ip filter * reject ip pp secure filter out save
76 76 pp1# ip filter 1 pass /24 * pp1# ip pp secure filter in 1 pp1# save pp select ip filter * ip pp secure filter in save
77 77 pp1# ip filter 1 reject * /24 pp1# ip filter 2 pass * * pp1# ip pp secure filter in 1 2 pp1# save pp select ip filter * reject ip pp secure filter in save
78 78 pp1# ip filter 1 pass * * established pp1# ip filter 2 pass * * tcp ftpdata * pp1# ip pp secure filter in 1 2 pp1# save pp select ip filter * established established ftpdata ip pp secure filter in save
79 79 pp1# ip filter 1 pass * * udp snmp * pp1# ip filter 2 pass * * udp * snmp pp1# ip pp secure filter in 1 2 pp1# ip pp secure filter out 1 2 pp1# save pp select ip filter * snmp ip pp secure filter save
80 80 pp1# ip filter 1 pass * * tcp telnet * pp1# ip filter 2 pass * * tcp * telnet pp1# ip pp secure filter in 1 2 pp1# ip pp secure filter out 1 2 pp1# save pp select ip filter * telnet ip pp secure filter save
81 81 pp1# ip filter 1 reject * * icmp pp1# ip filter 2 pass * * pp1# ip pp secure filter in 1 2 pp1# save pp select ip filter * icmp reject ip pp secure filter in save
82 82 pp1# ip filter 1 pass * * tcp * ftp pp1# ip filter 2 pass * * tcp ftp * pp1# ip pp secure filter out 1 pp1# ip pp secure filter in 2 pp1# save pp select ip filter * ftp ip pp secure filter out in save
83 83 pp1# ip filter 1 reject * * pp1# ip filter 2 pass * * pp1# ip pp rip filter out 1 2 pp1# save pp select ip filter * reject ip pp rip filter out save
84 84 # line type bri1 l64 # ip lan1 address /28 # ip route default gateway pp 1 # ip filter 10 reject /24 * * * * # ip filter 11 pass * /24 icmp * * # ip filter 12 pass * /24 established ** # ip filter 13 pass * /24 tcp * ident # ip filter 14 pass * /24 tcp ftpdata * # ip filter 15 pass * /24 udp domain * # ip filter 16 pass * /28 tcp,udp * telnet,smtp, gopher,finger,www,nntp,ntp, # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in pp1# syslog host pp1# syslog notice on pp1# save pp1# interface reset bri1
85 85 line type ip lan1 address ip route ip filter ip filter source-route ip filter directed-broadcast pp select pp bind ip pp secure filter in syslog host syslog notice save interface reset
86 86 # line type bri1 l64 # ip lan1 address /24 # ip route default gateway pp 1 # ip filter 10 reject /24 * * * * # ip filter 11 pass * /24 icmp * * # ip filter 12 pass * /24 established ** # ip filter 13 pass * /24 tcp * ident # ip filter 14 pass * /24 tcp ftpdata * # ip filter 15 pass * /24 udp domain * # ip filter 16 pass * tcp,udp * smtp,gopher,finger,www,nntp,ntp, # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in pp1# syslog host pp1# syslog notice on pp1# save pp1# interface reset bri1
87 87 line type ip lan1 address ip route ip filter ip filter source-route ip filter directed-broadcast pp select pp bind ip pp secure filter in syslog host syslog notice save interface reset
88 88 pp1# ip filter 60 reject /24 * * * * pp1# ip filter 100 pass * /24 * * * pp1# ip pp secure filter in pp1# save ip filter directed-broadcast #ip filter directed-broadcast on
89 89 ip filter 100 reject * * * * * ip pp secure filter in 100 ip pp secure filter out 1 ip pp secure filter out 1 dynamic 10 ip pp secure filter in dynamic 20 ip pp secure filter out dynamic 10
90 90 # ip filter dynamic /24 * ftp # ip filter dynamic /24 * tftp # ip filter dynamic /24 * tcp # ip filter dynamic /24 * udp # ip filter 1 pass /24 * tcp,udp # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out 1 dynamic # ip filter dynamic /24 * ftp # ip filter dynamic /24 * tftp # ip filter dynamic /24 * tcp # ip filter dynamic /24 * udp # ip filter 1 pass /24 * tcp,udp # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out 1 dynamic
91 91 # ip filter dynamic 1 * domain # ip filter 1 pass * * tcp * smtp,pop3 # ip filter 2 pass * * tcp * ident # ip filter dynamic / filter 1 in 2 # ip filter dynamic /24 * www # ip filter dynamic /24 * ftp # ip filter dynamic /24 * telnet # ip filter dynamic /24 * tcp syslog=off # ip filter dynamic /24 * udp syslog=off # ip filter 3 pass * /24 icmp * * # ip filter dynamic 20 * domain # ip filter dynamic 21 * www # ip filter 4 pass * tcp * domain # ip filter 5 pass * tcp * www # ip filter 6 pass * tcp * smtp,pop3 # ip filter 7 pass * * tcp * ident # ip filter dynamic 22 * filter 6 in 7 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic # ip filter dynamic 1 * domain # ip filter 1 pass * * tcp * smtp,pop3 # ip filter 2 pass * * tcp * ident # ip filter dynamic / filter 1 in 2 ip filter dynamic ip filter ip filter dynamic / smtp ip filter dynamic / pop3 ip filter 1 pass /24 tcp * ident ip filter dynamic /24 filter 1 pp select 1 ip pp secure filter in 1 dynamic 20 ip pp secure filter out dynamic 1 2
92 92 # ip filter dynamic /24 * www # ip filter dynamic /24 * ftp # ip filter dynamic /24 * telnet # ip filter dynamic /24 * tcp syslog=off # ip filter dynamic /24 * udp syslog=off # ip filter 3 pass * /24 icmp * * # ip filter dynamic 20 * domain # ip filter dynamic 21 * www # ip filter 4 pass * tcp * domain # ip filter 5 pass * tcp * www # ip filter 6 pass * tcp * smtp,pop3 # ip filter 7 pass * * tcp * ident # ip filter dynamic 22 * filter 6 in 7 ip filter dynamic 20 * smtp ip filter dynamic 21 * pop3 ip filter 1 pass * tcp * smtp,pop3 ip filter 2 pass * * tcp * ident ip filter dynamic * filter 2 pp select 1 ip pp secure filter in 1 dynamic ip pp secure filter out dynamic 1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic
93 93 # ip filter 1 pass * * tcp * 6000 # ip filter 2 pass * * udp * 7001 # ip filter 3 pass * * udp * 7002 # ip filter dynamic 1 * filter 1 in 3 out 2 # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out dynamic 1 # ip filter 1 pass * * tcp * 6000 # ip filter 2 pass * * udp * 7001 # ip filter 3 pass * * udp * 7002 # ip filter dynamic 1 * filter 1 in 3 out 2 # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out dynamic 1
94 94 # line type bri1 l128 # ip lan1 address /28 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * /28 telnet # ip filter dynamic 21 * /28 smtp # ip filter dynamic 22 * /28 www # ip filter dynamic 30 * /28 tcp # ip filter dynamic 31 * /28 udp # ip filter 3 reject * /28 established * telnet,smtp,gopher,finger,www,nntp,ntp # ip filter 4 pass * /28 tcp,udp * telnet,smtp,gopher,finger,www,nntp,ntp, # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 # line type bri1 l128 # ip lan1 address /28 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * /28 telnet # ip filter dynamic 21 * /28 smtp # ip filter dynamic 22 * /28 www # ip filter dynamic 30 * /28 tcp # ip filter dynamic 31 * /28 udp # ip filter 3 reject * /28 established * telnet,smtp,gopher, finger,www,nntp,ntp # ip filter 4 pass * /28 tcp,udp * telnet,smtp,gopher, finger,www,nntp,ntp,
95 95 # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 ip filter dynamic ip filter ip filter dynamic 1 * * smtp ip filter dynamic 2 * * pop3 ip filter 1 pass * * tcp * ident ip filter dynamic 20 * * filter 1 pp select 1 ip pp secure filter in 1 dynamic 20 ip pp secure filter out dynamic 1 2 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 restart
96 96 # line type bri1 l128 # ip lan1 address /24 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * telnet # ip filter dynamic 21 * smtp # ip filter dynamic 22 * www # ip filter dynamic 30 * tcp # ip filter dynamic 31 * udp # ip filter 3 reject * established * telnet,smtp,gopher, finger,www,nntp,ntp # ip filter 4 pass * tcp,udp * telnet,smtp,gopher, finger,www,nntp,ntp, # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 # line type bri1 l128 # ip lan1 address /24 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * telnet # ip filter dynamic 21 * smtp # ip filter dynamic 22 * www # ip filter dynamic 30 * tcp # ip filter dynamic 31 * udp # ip filter 3 reject * established * telnet,smtp,gopher,finger,www,nntp,ntp # ip filter 4 pass * tcp,udp * telnet,smtp,gopher,finger,www,nntp,ntp,
97 97 # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 ip filter dynamic ip filter ip filter dynamic 1 * * smtp ip filter dynamic 2 * * pop3 ip filter 1 pass * * tcp * ident ip filter dynamic 20 * * filter 1 pp select 1 ip pp secure filter in 1 dynamic 20 ip pp secure filter out dynamic 1 2 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 restart
98 98
99 99 pp1# ip pp intrusion detection in on pp1# ip pp intrusion detection in on reject=on reject # ip filter dynamic 1 * * ftp # ip filter dynamic 2 * * smtp pp1# ip pp secure filter in dynamic 1 2 pp1# ip pp intrusion detection in on
100 100
101 101 #ip policy filter 10 reject-log lan2 lan1 * * telnet #ip policy filter 11 pass-nolog lan1 lan2 * * ping #ip policy interface group 1 name=private local lan1 #ip policy service group 1 name=mail smtp pop3
102 102 #ip policy filter 10 pass-log local * * * * #ip policy filter 11 static-pass-log * lan1 * * * #ip policy filter 20 reject-nolog lan1 * * * * #ip policy filter 21 static-pass-nolog * local * * * #ip policy filter 22 pass-nolog * pp /24 * tcp #ip policy filter 23 pass-nolog * pp /24 * udp #ip policy filter 30 reject-nolog * * * * * #ip policy filter set 1 10 [11] 20 [ ] 30 #ip policy filter set enable 1 #save #ip policy filter 10 pass-log local * * * * #ip policy filter 11 static-pass-log * lan1 * * * #ip policy filter 20 reject-nolog lan1 * * * * #ip policy filter 21 static-pass-nolog * local * * * #ip policy filter 22 pass-nolog * pp /24 * tcp #ip policy filter 23 pass-nolog * pp /24 * udp #ip policy filter 30 reject-nolog * * * * * #ip policy filter set 1 10 [11] 20 [ ] 30
103 103 #ip policy filter set enable 1 #save
104 104 #ip policy interface group 1 name=private local lan1 #ip policy service group 1 name=mail pop3 smtp #ip policy filter 10 pass-nolog local * * * * #ip policy filter 11 static-pass-nolog * lan1 * * * #ip policy filter 100 reject-nolog lan1 * * * * #ip policy filter 110 static-pass-nolog * 1 * * * #ip policy filter 120 reject-nolog * * /24 * * #ip policy filter 121 pass-log * * * dns #ip policy filter 122 pass-log * * * * www #ip policy filter 123 pass-log * * * #ip policy filter 200 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 10 [11] 100 [ [ ]] 200 #ip policy filter set enable 1 #save #ip policy interface group 1 name=private local lan1 #ip policy service group 1 name=mail pop3 smtp #ip policy filter 10 pass-nolog local * * * * #ip policy filter 11 static-pass-nolog * lan1 * * * #ip policy filter 100 reject-nolog lan1 * * * * #ip policy filter 110 static-pass-nolog * 1 * * * #ip policy filter 120 reject-nolog * * /24 * *
105 105 #ip policy filter 121 pass-log * * * dns #ip policy filter 122 pass-log * * * * www #ip policy filter 123 pass-log * * * #ip policy filter 200 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 10 [11] 100 [ [ ]] 200 #ip policy filter set enable 1 #save
106 106 #ip inbound filter 1 reject-nolog * * tcp,udp * 135 #ip inbound filter 2 reject-nolog * * tcp,udp 135 * #ip inbound filter 3 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn #ip inbound filter 4 reject-nolog * * tcp,udp netbios_ns-netbios_ssn * #ip inbound filter 5 reject-nolog * * tcp,udp * 445 #ip inbound filter 6 reject-nolog * * tcp,udp 445 * #ip inbound filter 7 pass-nolog * * * * * #pp select 1 pp1#ip pp inbound filter list pp1#pp select none #ip policy interface group 1 name=private local lan1 #ip policy address group 1 name=private / /24 #ip policy service group 1 name="mail" pop3 smtp #ip policy service group 2 name="http Access" www ftp #ip policy filter 100 pass-nolog local * * * * #ip policy filter 110 static-pass-nolog * lan1 * * * #ip policy filter 200 reject-nolog lan1 * * * * #ip policy filter 210 static-pass-nolog * 1 * * * #ip policy filter 211 static-pass-log * * * * http #ip policy filter 220 pass-nolog * * * * dns #ip policy filter 230 pass-nolog * * * ntp #ip policy filter 240 reject-nolog * pp1 1 * * #ip policy filter 241 pass-log * * * * 1 #ip policy filter 242 pass-log * * * * 2 #ip policy filter 300 reject-nolog pp1 * * * * #ip policy filter 310 reject-nolog * lan1 * * * #ip policy filter 311 pass-log * * * #ip policy filter 400 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 100 [110] 200 [210 [211] [ ]] 300 [310 [311]] 400 #ip policy filter set enable 1 #save
107 107 #ip inbound filter 1 reject-nolog * * tcp,udp * 135 #ip inbound filter 2 reject-nolog * * tcp,udp 135 * #ip inbound filter 3 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn #ip inbound filter 4 reject-nolog * * tcp,udp netbios_ns-netbios_ssn * #ip inbound filter 5 reject-nolog * * tcp,udp * 445 #ip inbound filter 6 reject-nolog * * tcp,udp 445 * #ip inbound filter 7 pass-nolog * * * * * #pp select 1 pp1#ip pp inbound filter list pp1#pp select none #ip policy interface group 1 name=private local lan1 #ip policy address group 1 name=private / /24 #ip policy service group 1 name="mail" pop3 smtp #ip policy service group 2 name="http Access" www ftp #ip policy filter 100 pass-nolog local * * * * #ip policy filter 110 static-pass-nolog * lan1 * * * #ip policy filter 200 reject-nolog lan1 * * * * #ip policy filter 210 static-pass-nolog * 1 * * * #ip policy filter 211 static-pass-log * * * * http #ip policy filter 220 pass-nolog * * * * dns
108 108 #ip policy filter 230 pass-nolog * * * ntp #ip policy filter 240 reject-nolog * pp1 1 * * #ip policy filter 241 pass-log * * * * 1 #ip policy filter 242 pass-log * * * * 2 #ip policy filter 300 reject-nolog pp1 * * * * #ip policy filter 310 reject-nolog * lan1 * * * #ip policy filter 311 pass-log * * * #ip policy filter 400 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 100 [110] 200 [210 [211] [ ]] 300 [310 [311]] 400 #ip policy filter set enable 1 #save
109 109 PAP CHAP
110 110 pp1# pp auth request pap pp1# pp auth username RT105i-A himitsu pp1# save pp1# pp auth accept pap pp1# pp auth myname RT105i-A himitsu pp1# save
111 111 pp1# pp auth request pap pp1# pp auth accept pap pp1# pp auth myname RT105i-A himitsu pp1# pp auth username RT105i-A himitsu pp1# save pp1# pp auth request chap pp1# pp auth username RT105i-A himitsu pp1# save pp1# pp auth accept chap pp1# pp auth myname RT105i-A himitsu pp1# save
112 112 pp1# pp auth request chap pp1# pp auth accept chap pp1# pp auth myname RT105i-A himitsu pp1# pp auth username RT105i-A himitsu pp1# save
113 113 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1
114 114 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 fr line type ip lan1 address rip use pp select pp encapsulation ip pp rip send ip pp rip connect send ip pp rip connect interval pp enable save interface reset
115 115 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway pp 1 dlci=16 # ip route /24 gateway pp 1 dlci=18 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway pp 1 dlci=17 # ip route /24 gateway pp 1 dlci=20 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1
116 116 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway pp 1 dlci=19 # ip route /24 gateway pp 1 dlci=21 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1 ip route line type ip lan1 address ip route pp select pp bind pp encapsulation pp enable save interface reset
117 117 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1
118 118 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 fr line type ip lan1 address rip use pp select pp bind pp encapsulation ip pp address ip pp rip send ip pp rip connect send ip pp rip connect interval pp enable save interface reset
119 119 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway # ip route /24 gateway pp1# pp bind bri 1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # ip route gateway # ip route gateway pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# save pp1# interface reset bri1
120 120 # line type bri1 l64 # ip lan1 address /24 # ip route /24. gateway # ip route /24. gateway pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# save pp1# interface reset bri1 ip route fr inarp fr inarp line type ip lan1 address ip route pp select pp bind pp encapsulation ip pp address pp enable save interface reset
121 121 # ipx routing on # line type bri1 l64 # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1 # ipx routing on # line type bri1 l64 # ipx lan1 network 22:22:22:22 # pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1
122 122 # ipx routing on # line type bri1 l64 # ipx lan1 network 33:33:33:33 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1 fr ipx routing line type ipx lan1 network pp select pp bind pp encapsulation ipx pp routing ipx pp ripsap connect send ipx pp ripsap connect interval pp enable save interface reset
123 123 # ipx routing on # line type bri1 l64 # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp route 22:22:22:22 dlci=16 1 pp1# ipx pp route 33:33:33:33 dlci=18 1 pp1# save pp1# interface reset bri1 # ipx routing on # line type bri1 l64 # ipx lan1 network 22:22:22:22 # ipx sap file SERVER aa:aa:aa:aa 00:00:00:00:00:01 ncp 2 # pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp route 11:11:11:11 dlci=17 1 pp1# ipx pp route aa:aa:aa:aa dlci=17 2 pp1# ipx pp route 33:33:33:33 dlci=20 1 pp1# save pp1# interface reset bri1
124 124 # ipx routing on # line type bri1 l64 # ipx lan1 network 33:33:33:33 # ipx sap file SERVER aa:aa:aa:aa 00:00:00:00:00:01 ncp 2 # pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp route 11:11:11:11 dlci=19 1 pp1# ipx pp route aa:aa:aa:aa dlci=19 2 pp1# ipx pp route 22:22:22:22 dlci=21 1 pp1# save pp1# interface reset bri1 fr ipx routing line type ipx lan1 network pp select pp bind pp encapsulation ipx pp routing ipx pp route pp enable save interface reset
125 125 # line type bri1 l64 # bridge use on # bridge group lan1 1 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1 save ip routing off fr line type bridge use bridge group pp select pp bind pp encapsulation pp enable save interface reset
126 126
127 127
128 128 # isdn local address bri /Tokyo # ip lan1 address /28 # ip route /28 gateway pp 1 # dhcp scope /28 except # dhcp service server pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /28 # ip route /28 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save
129 129 isdn local address ip lan1 address ip route dhcp scope gateway expire, maxexpire dhcp service pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save
130 130 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 # dhcp scope /24 except # dhcp scope /24 except gateway # dhcp scope bind aa:aa:aa:aa:aa:aa # dhcp scope bind ethernet bb:bb:bb:bb:bb:bb # dhcp scope bind ethernet cc:cc:cc:cc:cc:cc # dns server # dhcp service server pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save
131 131 # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 # dhcp relay server # dhcp service relay pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save
132 132 isdn local address ip lan1 address ip route dhcp scope gateway expire, maxexpire dhcp scope bind dns server dhcp service pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route dhcp relay server dhcp service pp select isdn remote address pp enable save
133 133 # ip lan1 address /24 # ip lan2 address dhcp # nat descriptor type 1 masquerade # nat descriptor address outer 1 primary # ip lan2 nat descriptor 1 # ip route default gateway dhcp lan2 # save # ip lan1 address /24 # ip lan2 address dhcp # nat descriptor type 1 masquerade # nat descriptor address outer 1 primary # ip lan2 nat descriptor 1 # ip route default gateway dhcp lan2 # save
設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応
Network Equipment 設定例集 Rev.8.03, Rev.9.00, Rev.10.01 対応 2 3 4 5 6 7 8 help > help show command > show command console character administrator pp disable disconnect 9 pp enable save Password: login timer
More information設定例集
REMOTE ROUTER 1999. 2. 2 YAMAHA NetWare Novell,Inc. INS 64 YAMAHA! M E M O 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 : : : : : : : : : : : : : : : : : : : : :
More informationSRT100 コマンド設定運用説明書
8 9 46 2 ...2 SRT100...4...6...8...9...9...10...11...12...14...15...19 CONSOLE...20 1....20 2.CONSOLE...21 3.CONSOLE...22...24 1....24 2....25 3....25 4....26 5....26 6.syslog...27 7.LAN...28 8.WAN...28
More informationRT300i/RT140x/RT105i 取扱説明書
2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Typewriter face RT105i RT300i RT140p RT140f RT140i RT140e RT105i RT300i 11 RARP 9600 bit/s 8 http://www.rtpro.yamaha.co.jp/ ftp.rtpro.yamaha.co.jp 12
More informationRT300/140/105シリーズ 取扱説明書
REMOTE & BROADBAND ROUTER RT300i/RT140p/RT140f/RT140i RT140e/RT105p/RT105i/RT105e 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Console RT105i RT300i RT140p RT140f RT140i RT140e RT105p RT105i RT105e
More informationヤマハルーターのCLI:Command Line Interface
(Command Line Interface) cf. http://www.rtpro.yamaha.co.jp/rt/docs/console/ Command Line Interface Graphical User Interface 2 (CLI) WWW(GUI) (CLI) WWW(GUI) character display graphic display keyboard pointer
More information帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能)
RTX1100 client server network service ( ) RTX3000 ( ) RTX1500 2 Sound Network Division, YAMAHA 3 Sound Network Division, YAMAHA 172.16.1.100/24 172.16.2.100/24 LAN2 LAN3 RTX1500 RTX1100 client 172.16.1.1/24
More informationREMOTE ROUTERS RTA52i PDF
REMOTE ROUTERS RTA52i PDF 1999 12 20 Cisco Cisco Systems,Inc. NetWare Novell,Inc. Microsoft, Windows Microsoft Corporation Stac LZS Hi/fn 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : :
More informationRTX/RTシリーズ コマンドリファレンス
Broadband & Remote ROUTER Rev.6.03.11 Rev.7.00.01 2 3 4 5 6 7 8 9 10 11 12 13 A account threshold..........................32 account threshold pp.......................32 administrator.............................183
More informationRTX830 取扱説明書
RTX830 JA 1 2 3 4 5 6 7 8 9 10 11 external-memory performance-test go 12 13 show config 14 15 16 17 18 19 20 save 21 22 23 24 25 26 27 save RTX830 BootROM Ver. 1.00 Copyright (c) 2017 Yamaha Corporation.
More informationRTX/RTシリーズ コマンドリファレンス
Network Equipment Rev.6.03.33, Rev.7.00.30, Rev.7.01.48 Rev.8.01.19, Rev.8.02.40, Rev.8.03.21 Rev.9.00.01 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 A account threshold..........................61 account
More informationowners.book
Network Equipment RTX1200 RTX800 2 3 4 5 6 7 8 9 10 bold face Enter Ctrl Tab BS Del Ctrl X Ctrl X Regular face 11 12 13 14 RTX1200 RTX1200 RTX1200 15 16 ), -. / 1 4 5 6 17 18 19 20 21 console character
More informationRTX1210 取扱説明書
1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 6 1 2 3 4 5 6 7 8 9 0 A B 6 7 8 9 10 11 show config 12 13 14 15 16 1 2 LAN1 3 4 LAN2 LINK/ DATA SPEED CONSOLE L1/B1 B2 microsd USB DOWN LOAD POWER ALARM STATUS 5 6 7 8 LAN3
More informationRT300/140/105 シリーズ コマンドリファレンス
REMOTE & BROADBAND ROUTER Rev.6.02.14 2 3 4 5 6 7 8 9 10 11 12 13 A account threshold..........................28 account threshold pp.......................28 administrator.............................137
More informationIP ICMP Redirec
Z990002-D06-08 RGW Ver1. 2 1....6 1.1....6 1.2....7 1.3....7 1.4....7 1.5....8 1.6....9 1.7.... 12 1.7.1...12 1.7.2...12 1.7.3 IP...12 1.7.4...13 1.7.5...13 1.7.6 ICMP Redirect...13 1.7.7...14 1.7.8...15
More informationIP.dvi
... 3... 3... 3... 4... 6 VLAN... 6... 6 DHCP... 7... 7... 9... 9... 10... 12 R... 15... 15... 15 ARP... 18... 18 ARP... 18 DNS... 20... 20 DHCP/BOOTP... 21... 21 DHCP... 22 UDP... 23... 23... 23... 26...
More informationヤマハ ルーター ファイアウォール機能~説明資料~
1 RT140i #1(PPP) RT105i RTA52i R (PP#) (LAN#) [NAT] R LAN LAN 2 #2() RT300i RTW65b RT140e RT105e (LAN2) R (LAN1) RTA55i R LAN LAN 3 #3(PPPoE) R (LAN#) (PP#) (PP#) LAN ISDN/ LAN 4 RT300i RT105 #4(VPN) R
More informationSGX808 IPsec機能
SGX808 IPsec 機能 ヤマハ株式会社 2016 年 1 月第 2.01 版 Copyright 2014-2016 Yamaha Corporation 1 更新履歴更新日付 バージョン 内容 2014.05.29 1.00 初版発行 2015.02.04 2.00 2つのセッションを張れるようにしました 相手先情報としてホストネームも指定できるようにしました デフォルト経路として IPsec
More informationMR1000 コマンド設定事例集
V21 LAN 2005 1 2005 3 2 Microsoft Corporation OMRON Corporation 2004-2005 All Rights Reserved. 2 V21... 2... 6... 6... 6... 6 1... 7 1.1 LAN... 8 1.2 CATV... 10 1.3 LAN... 12 1.4 IPv4 IPv6... 14 1.5...
More informationコマンドリファレンス
ii iii iv v vi vii viii ix A account threshold...21 administrator...99 administrator password...16 alarm click...104 alarm connection analog...103 alarm connection data...103 alarm entire...104 alarm mp...104
More informationRT57i・RTV700 コマンドリファレンス
Rev.8.00.56 Rev.8.00.57 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A account threshold... 53 account threshold pp... 53 administrator...26, 219 administrator password... 36 alarm connection analog... 44 alarm
More informationSi-R30コマンドリファレンス
4 LAN 4.1 IP 4.1.1 lan ip address IP lan [] ip address / 0 / IP / ( ) LAN IP 1 IP / ( : 192.168.1.1/24) IP / ( : 192.168.1.1/255.255.255.0) IP 0.0.0.0
More informationSi-R30コマンドリファレンス
8 8.1 SNMP ( ) 8.1.1 snmp service ( ) SNMP SNMP snmp service on SNMP SNMP off SNMP SNMP SNMP SNMP Si-R30 SNMP snmp service off 171 8.1.2 snmp agent contact ( ) SNMP snmp agent contact []
More informationNATディスクリプタ機能
NAT 1 NAT #1,#2 IP incoming/unconvertible/range IP ping/traceroute/ftp/cu-seeme NetMeeting 3.0 VPN PPTP 2 NAT (NAT NAT ) 3 (NAT) Revision 4 NAT (Rev.1 Rev.3 ) LAN LAN primary secondary TUNNEL VPN 3 NAT
More informationTCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2
Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service
More informationヤマハ ルーター ファイアウォール機能~説明資料~
1 2 3 4 LAN ISDN/ NAT (LAN#) (PP#) (TUNNEL#) + R 5 ----------< >---------- ----------< >---------- 6 IPv6 VPN ping IPsec PPTP ICMP (1) TCP (6) UDP (17) IPv6 (41) AH (51) ESP (50) GRE (47) IPv4
More informationRouteMagic Controller RMC-MP200 / MP Version
RouteMagic Controller RMC-MP200 / MP1200 - Version 3.7.1 - RouteMagic Controller( RMC ) 3.7 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.7 RouteMagic Controller Version
More informationアライドテレシス ディストリビューション・スイッチ AT-x600シリーズで実現するMicrosoft® NAP
Microsoft NAP 主な目的 検疫ネットワークを構築したい 802.1X ユーザー認証をシングルサインオンで行ないたい 概要 Microsoft NAP はActive Directory 環境下での利用を前提としています しかし Active Directory のドメイン認証と IEEE 802.1X 認証 ( および NAP の検疫 ) は同期していません したがって 802.1X 認証の前にドメイン認証が行なわれた場合
More informationFutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版
FutureNet CS-SEIL Series CS-SEIL-510/C CS-SEIL/Turbo Firmware Version 1.82 FutureNet CS-SEIL.............................................. 1 1............................................. 11 1.1.........................................
More informationBiz Box ルータ 「N1200」 コマンドリファレンス
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A account threshold.......................... 59 account threshold pp....................... 59 administrator.........................26, 232 administrator password.....................
More informationRT58i Cmdref
Rev.9.01.03 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A account threshold... 62 account threshold pp... 62 administrator... 27, 213 administrator password... 40 administrator password encrypted... 40 alarm
More informationCS-SEIL-510/C コマンドリファレンス
FutureNet CS-SEIL-510/C 1.75 1 CS-SEIL-510/C 10 1.1................................................ 10 1.2............................................. 10 1.3..................................................
More informationSi-R30取扱説明書
IP 317 318 IP 319 322 327 332 335 337 339 339 340 342 DNS ProxyDNS 344 DNS 344 DNS 348 DNS 349 DNS 350 DHCP 352 DHCP 353 DHCP 355 NAT 35 NAT 359 30 34 ID 38 371 374 CBCP 375 CBCP 377 379 380 TA 382 URL
More informationRTX/RTシリーズ コマンドリファレンス
Network Equipment Rev.8.03.30, Rev.9.00.08 2 本書の記載内容の一部または全部を無断で転載することを禁じます 本書の記載内容は将来予告なく変更されることがあります 本製品を使用した結果発生した情報の消失等の損失については 当社では責任を負いかねます 保証は本製品物損の範囲に限ります 予めご了承ください 本書の内容については万全を期して作成致しておりますが 記載漏れやご不審な点がございましたらご一報くださいますようお願い致します
More informationWin XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /
SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices
More informationRouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3
RouteMagic Controller RMC-MP200 / MP1200 - Version 3.6 - RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version
More informationRT107eセミナー用資料
2 AV&IT Business Group, YAMAHA RT107e RT107e RT107e RT107e RT107e RT107e RT107e RT107e 4 AV&IT Business Group, YAMAHA 2002~2003 RTX1000 200210 RTX1000 RT57i 20037 RT57i IP-VPN (FGA/FG/FO) VPN 5 AV&IT Business
More informationAMF Cloud ソリューション
アライドテレシス バーチャルAMFアプライアンスで実現する 主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー/マスターを仮想マシン上に集約したい AMF機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 概要 これまで AMF機能を用いることで ネットワークの一元管理が可能となり 機器故障時 には代替機と差し替えるだけで自動的に復旧させるAuto
More informationSoliton Net’Attest EPS + AR router series L2TP+IPsec RADIUS 設定例
Soliton Net Attest EPS + AR router series L2TP+IPsec RADIUS 設定例 2011/June アライドテレシス株式会社 Revision 1.1 1. Net Attest EPS AR VPN 2 1. 1. 1. AR AR (RADIUS ) 2. 2. Net Attest EPS 3-1. 3-1. iphone/ipad 3-2. 3-2.
More information2/ PPPoE AC(Access Concentrator) PPPoE PPPoE Ping FTP PP
PPPoE HATS LAN 2/31... 4... 4... 5... 6... 6... 7... 8... 8... 9... 10 PPPoE... 10 AC(Access Concentrator)... 10...11 PPPoE... 11 PPPoE... 13 Ping... 13 FTP... 14 PPPoE... 14... 15... 15 3/31... 17 PPPoE...
More informationrzakg.ps
IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 65 IBM i5/os ( 5722-SS1) 5 4 0 RISC CISC URL http://www.ibm.com/jp/manuals/main/mail.html
More informationAMFマルチテナントソリューション
主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー / マスターを仮想マシン上に集約したい AMF 機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 複数テナントがそれぞれ独立して動作し かつ上位のコントローラーから複数テナントを集中管理可能なAMFネットワークを構築したい 概要 AMF を使用することで ネットワークデバイスの一元管理や自動復旧
More informationリング型IPカメラ監視ソリューション(マルチキャスト編)
CentreCOM x900 IP IP ( ) IP surveillance Solution 01 SNMP Manager Syslog Server NTP Server x900-24xt_2 Link Aggregation x900-24xt_1 FS926M-PS_1 FS926M-PS_2 x600-24ts EPSR (Ethernet Protected Switched Ring)
More information1.26 1 9 1.1................................................ 9 1.2............................................. 9 1.3.................................................. 11 1.4..............................................
More informationSi-R30取扱説明書
6 6 WWW 6 65 67 67 68 ISDN 69 ISDN 75 80 ISDN 84 89 93 94 94 IP 95 96 98 TEL 99 99 100 100 101 1 1.. CHECK/B1/B/LAN HUB CHECK 3. Windows 95/98/Me IP MAC IP 1. -. winipcfg.exe Windows NT Windows 000 ipconfig.exe
More information橡sirahasi.PDF
Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,
More informationPowerPoint プレゼンテーション
VoIP IP IP http://www.rtpro.yamaha.co.jp/rt/faq/voip/example-internal-ip-phone.html IP ( ) ( ) IP IP RT57i RTX1000 IP RT57i 2 AV&IT Marketing Division, YAMAHA IP RTX1000 10 RT57i(A) IP RT57i(B) 20 [] RTX1000
More informationWEB.dvi
... 5... 5... 5... 7... 8... 8... 10... 11... 11... 12... 13 HTTP... 13... 14... 15... 15... 15 IP... 15... 16... 17... 18 NTP... 18 SNMP.... 19 SNMP... 19 SNMP... 20 SNMP... 22 SNMP... 22... 22... 23...
More informationScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gat
ScreenOS 5.0 1 2 ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gateway NAT Destination NetScreen-Security
More informationRouteMagic Controller RMC-MP200 / MP Version
RouteMagic Controller RMC-MP200 / MP1200 - Version 3.5.2 - RouteMagic Controller( RMC ) 3.5.2 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.5 RouteMagic Controller
More informationuntitled
CHAPTER 10 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 IP ODAP p.10-5 IP p.10-18 IP Cisco 10000 Virtual Private Network VPN; IP On-demand Address Pool [ODAP] IP p.10-2
More informationRTA55i コマンドリファレンス
1. 1.1 1.2 Bold face italic face Normal face 2. 2.1 help 2.2 show command 3. 3.1 login password 3.2 administrator password 3.3 security class level forget telnet level 1 2 3 forget on w,lxlma off telnet
More informationアドレス プールの設定
CHAPTER 9 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 ESR IP ODAP p.9-5 IP p.9-17 IP Cisco 10000 ESR Virtual Private Network VPN; IP ODAP IP Cisco 10000 ESR 9-1 9
More informationアライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減
主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減したい 概要 ネットワーク管理 運用にかかるコストを削減するために 新たなシステムを導入することで一元管理や共有化を図る場面が多くあります しかし場合により そのシステムを導入のために 対応機器へのリプレースや機器追加を行わなければならず 大きな追加コストや高いリスクが発生してしまいます
More informationN A/006A インテリジェントスイッチ
5 (Conf-global)# upgrade softare ftp-server 192.168.1.20 -A.B.C-r.des username nec passord nec (Conf-global)# upgrade softare tftp-server 192.168.1.20 -A.B.C-r.des (Conf-global)# upgrade softare restart
More information2/ PPPoE... 9 AC(Access Concentrator) PPPoE PPPoE Ping FTP PPPoE
PPPoE HATS LAN 2/27... 4... 5... 5... 6... 7... 7... 8... 9 PPPoE... 9 AC(Access Concentrator)... 9... 10 PPPoE... 10 PPPoE... 11 Ping... 12 FTP... 12 PPPoE... 12... 14... 14... 16 PPPoE... 17 3/27 PPPoE...
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More information2008, 2009 TOSHIBA TEC CORPORATION All rights reserved
2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 1 2 3 1 2 ... 1 1... 8... 9... 18... 24... 25... 30... 31... 34... 37 E... 67 Bluetooth BIP... 68 2... 71... 73... 100 3 ... 132... 134... 136 E...
More informationリング型IPカメラ監視ソリューション
TELESYN IP IP surveillance Solution 04 SNMP Manager Syslog Server NTP Server TELESYN9100_2 Link Aggregation VCS_1 TELESYN9100_4 FS926M-PS_1 TELESYN9100_3 FS926M-PS_2 FS926M-PS_3 TELESYN : TELESYN9400 :
More informationIOS ゾーン ベースのポリシー ファイアウォールを使用した IOS ルータでの AnyConnect VPN クライアントの設定例
IOS ゾーンベースのポリシーファイアウォールを使用した IOS ルータでの AnyConnect VPN クライアントの設定例 目次 はじめに前提条件要件使用するコンポーネント表記法設定ネットワーク図 Cisco IOS AnyConnect サーバの設定確認トラブルシューティングトラブルシューティングのためのコマンド関連情報 はじめに Cisco IOS ソフトウェアリリース 12.4(20)T
More informationPBXマニュアル
http://www.rtpro.yamaha.co.jp/ http://www.rtpro.yamaha.co.jp/ http://192.168.100.1/ RTV700 RTV700 RTV700 no isdn dial prefix sip server=1 prefix="22" no isdn dial prefix sip server=2 prefix="33" isdn
More informationSRX License
SRX ライセンスキー投入手順 株式会社日立ソリューションズネットワークビジネス部セキュリティグループ リビジョン 4.0 初版 2010/05/30 最新版 2012/12/27 Hitachi Solutions, Ltd. 2010-2012. All rights reserved. SRX ライセンスキー投入手順 Contents 1. ライセンスキーの自動インポート ( インターネット接続必須
More informationFUJITSU Network SR-M コマンド設定事例集
SR-M P3NK-4192-03Z0 FUJITSU Network SR-M V02 LAN 2010 4 2013 7 2 2014 8 3 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2014 2 ...2...5...5...6...7 1 LAN SR-M20AP1 / 20AP2...8 1.1 LAN...8 1.2 LAN
More informationLAN
LAN 2003 6 4 LAN Hotel LAN LAN IEEE802.11a IEEE802.11b 802.11b 11Mbps Copyright (c) 2003 NPO Page 3 FREESPOT FREESPOT HOTSPOT NTT ( ) MZONE ( )NTT Mobile ( ) Yahoo! BB ( ) MapFanWeb http://www.mapfan.com/musen/
More informationISDN を経由した PPP コールバックの設定
ISDN を経由した PPP コールバックの設定 目次 はじめに前提条件要件使用するコンポーネント表記法背景説明設定ネットワーク図設定確認トラブルシューティングトラブルシューティングのためのコマンドデバッグの出力例関連情報 はじめに このドキュメントでは サービス総合デジタルネットワーク (ISDN) 経由のポイントツーポイントプロトコル (PPP) コールバックの設定例を紹介します コールバックを使用する目的には
More informationuntitled
NTT TOP A WAN WAN VRRP NIC OSPF VRRP STP 1. IPv6 IPv6 2. 3. IPv6 1. IPv4 NAT IPv6 1. 2. (IPv4 ) NAT? Unique Local IPv6 Unicast Address /8 /48 /64 /128 7 1 40 16 64 ULA Global ID Interface ID Type Subnet
More informationPPPoE HATS LAN
PPPoE HATS LAN 2/26... 4... 5... 7... 9... 10... 13 3/26... 20... 22... 25... 26 4/26 PPPoE ADSL PPPoE ( )AC(Access Concentrator ) NAT 5/26 ( )AC( ) PPPoE AC : AC: Service-Name TAGAC-Name TAG NAT PPP PAP
More informationuntitled
FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...
More information対応するospf configure refreshコマンドまたはbgp configure refreshコマンドが実行されるようにした - 置き換え先のコマンド群にshow status ospfコマンドまたはshow status bgpコマンドが含まれていても ospf configure
Rev.14.01.32 リリースノート RTX1210 Rev.14.01.29 からの変更点 機能追加 [1] YNO エージェント機能でゼロコンフィグに対応した http://www.rtpro.yamaha.co.jp/rt/docs/yno/agent/index.html 外部仕様書をよくご確認のうえ ご利用ください [2] DHCPv6-PDのIRで取得したDNSサーバーのIPv6アドレスに対して
More information1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student
LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN
More informationSolution No アライドテレシスコア スイッチ SBx8100 シリーズで実現実現する WAN 型 u-vcf ソリューション 主な目的 複数ロケーションのネットワークを一極集中管理したい ネットワーク管理 / 運用機構の集約によりランニングコストを抑制したい 各ロケーシ
主な目的 複数ロケーションのネットワークを一極集中管理したい ネットワーク管理 / 運用機構の集約によりランニングコストを抑制したい 各ロケーションにおける現場メンテナンス / リカバリー作業を最小限に抑えたい 概要 AMF(Allied-Telesis Management Framework) とは センターサイトによる複数リモートサイトの一極集中管理によるネットワーク管理 / 運用コスト削減や
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More informationRT57i 困ったときは
? q ISDN / FAX / q q q VoIP q ISDN / FAX / 1 POWER? q 2 ISDN? q 3 q q q FAX q q q q q ISDN q INS q INS q INS 1 POWER? q 2 LAN q 3 q q q q Web q 1 POWER? q 2 LAN? q 3 ISDN ISDN WAN? q ISDN q WAN 4 q q ISDN
More informationアライドテレシス ディストリビューションスイッチ x610シリーズで実現するVRF-Lite + Tagging + EPSR for x610
主な目的 IP アドレスが重複した環境を統合したい 各ネットワークのセキュリティを確保したい 運用効率化を図りたい 概要 自治体合併など 個別に稼動していたネットワークを統合する際の課題の一つに IP アドレス体系やネットワークポリシーの見直しがあります しかし IP アドレスを変更することは統合作業の煩雑化やシステムの見直しなど容易ではありません そこで 暫定的にも恒久的にも利用できる VRF-Lite
More informationRT107e 取扱説明書
6 7 113 2 VPN LAN 1 CD-ROM 1 1 1 18 3 IPsec IPIP 36 38 88 99 113 66 76 n CD-ROM q4 3 ...2...3...6...7...7...8...9 DOWNLOAD...10...12 RT107e...14...15...18 1:...20 2:...22 3:...24 4:...28 5:LAN IP...30
More information2001年12月VPN&ブロードバンドソリューションフォーラム
/SOHO /SOHO Made in Japan. #1 RT100i 1BRI RT200i 4BRI/8BRI(opt.) RT102i RT140i 2BRI,1LAN RT80i DSU, 1BRI,2TEL 1BRI,2LAN RT140e RT140p 2BRI,1PRI,1LAN RT103i RTA50i 2BRI,2LAN RT140f DSU, 1BRI,3TEL,4HUB
More information使用説明書
第 6 章 本章では Print Manager Web ブラウザ TELNET を利用して 詳細な設定を行う方法について説明します Print Manager で設定する 総合ユーティリティー Print Manager は 本製品の詳細な設定及び設定内容の変更を行うことができます また リモートでの再起動やプリンターステータスモニターなどの便利な機能をご利用いただくことができます Print Manager
More informationFUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって
P3NK-3892-04Z0 FUJITSU Network Si-R FUJITSU Network Si-R Si-R brin Si-R240B LAN 2009 11 2010 7 2 2010 10 3 2015 1 4 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2015 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...12...12...12...12...12...13...13...13...14
More informationUsersGuide_INR-HG5497c_.doc
UPS / Web/SNMP VCCI A Web/SNMP... 1.. WEB...1.. SNMP...1.. NETSHUT...1.. 100BASE-TX...1... 2 Web... 4.....5.....7......7......8......9.. UPS...10... UPS...10...13......14......14...15......17......17..
More informationNorthern Lights Server
FirstStep Guide Northern Lights Server Intel Management Module (Advanced Module / ISM 8.4) 2 www.nlcomputer.com 1 FirstStep Guide 1.1. INTEL MANAGEMENT MODULE 2... 5 1.2.... 9 1.3.... 10 2.1. BMC...11
More informationMicrosoft PowerPoint - Amazon VPCとのVPN接続.pptx
Amazon VPC との VPN 接続マニュアル 2016 年 7 12 NECプラットフォームズ株式会社 Amazon VPC との VPN 接続 UNIVERGE WA シリーズ を使 して Amazon VPC(Amazon Virtual Private Cloud) と IPsec-VPN で接続する際の設定例を紹介します Amazon VPC を利 することにより Amazon AWS(Amazon
More informationiPhone/iPad/Android(TM) とベリサイン アイデンティティプロテクション(VIP)エンタープライズゲートウェイとの組み合わせによるL2TP+IPsecのワンタイムパスワード設定例
VeriSign VIP VIP + AR VIP VIP AR VPN iphone ipad Apple Inc. iphone Android Google Inc. Copyright 2011 Allied Telesis K.K. All Rights Reserved. VIP AR User Copyright 2011 Allied Telesis K.K. All Rights
More informationScreenOS Copyright (C) 2005 NOX Co., Ltd. All Rights Reserved. Version1.00
ScreenOS5.1 17 2 Version1.00 Web Filtering Anti Virus Deep Inspection VoIP H.323 SIP ALG NAT ALG(Application Layer Gateway Multicast QOS DNS PPPoE VPN NetScreen ScreenOS 5.1 ScreenOS 5.1 Web Filtering
More informationDynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.
SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX
More informationI j
I j06062 19.5.22 19.5.25 19.5.25 1 1 1 ping 3 2 2 ping 4 3 3 traceroute 5 4 4 netstat 5 4.1 netstat -i............................................. 5 4.2 netstat -r.............................................
More informationJlspec
1OFF 通常 OFF 通常 2 ON 設定内容の初期化を行う ( 工場出荷状態 ) OFF 通常 3 ON 自己診断 / 設定内容の印字を行う 4OFF 通常 %!PS-Adobe-2.0 /Courier findfont 10 scalefont setfont /LEFT 36 def /TOP 792 def /PITCH 12 def /LF {show /x LEFT def /y
More informationFutureNet NXR,WXR シリーズ設定例集
FutureNet NXR,WXR シリーズ 設定例集 IPv6 編 Ver 1.0.0 センチュリー システムズ株式会社 目次 目次... 2 はじめに... 3 改版履歴... 4 1. IPv6 ブリッジ設定... 5 1-1. IPv4 PPPoE+IPv6 ブリッジ設定... 6 2. IPv6 PPPoE 設定... 10 2-1. IPv6 PPPoE 接続設定... 11 2-2.
More informationuntitled
ICMP 0466-XX-1395 t04000aa@sfc.keio.ac.jp 133.113.215.10 (ipv4) 2001:200:0:8803::53 (ipv6) (FQDN: Fully Qualified Domain Name) ( www.keio.ac.jp 131.113.215.10 /MAC ID 00:11:24:79:8e:82 Port Port = = Port
More informationGA-1190J
GA-1190J 1 1. 2. 3. 4. 2 5. 3 PDF 4 PDF PDF PDF PDF PDF PDF PDF PDF 5 6 ...1...2...4 1...12 2...16...18 3...22 PCL/PS...23 4...26 5...30 ETHERNET...31 TCP/IP...33 IPX/SPX...38 AppleTalk...40 HTTP...42
More informationUsers Manual SX Users Manual SX Users Manual SX Users Manual SX Users Manual SX Users Manual SX PC-PB20501 Version 2.X.X Copyright 2005 Ricoh Printing Systems,Ltd. *** Configuration report
More informationIP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2
IP 2010 10 1 1 IP (IP ) 2 IP IP 2.1 IP (IP ) 1 IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 4 1,2 4.1 (Protocol) IP:Internet Protocol) 4.2 internet The Internet (internet)
More informationコア・スイッチSBx8100 シリーズで実現するスター型冗長コアソリューション
主な目的 コアスイッチを冗長化し 信頼性を高めたい 可用性が高いスター型ネットワークを構築したい スパニングツリーを用いずに冗長を実現したい 概要 現在 ネットワークは その利便性の高さから公共機関 金融機関 医療機関等の様々なところで利用されております ネットワーク上で扱う情報も非常に重要なものが多く ネットワークが停止した場合には大きな機会損失となることから ネットワークの信頼性を高めることは非常に重要です
More informationTeradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi
PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici
More informationヤマハルーター Web GUI 操作マニュアル
RTX1210 Rev.14.01.11 20163 2.0 JA 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
More information2011 I/ 2 1
2011 I/ 2 1 ISO 7 layer reference model TCP/IP ISO 7 layer reference model 5 7 2011 I/ 2 2 2011 I/ 2 3 OSI 7 Layer Reference Model 2011 I/ 2 4 Harry Nyquist (1924) Maximum data rate = 2H log 2 V (bits/s)
More informationuntitled
osamu@sfc.keio.ac.jp CNS 18 Web http://www.sfc.wide.ad.jp/~three/itbasic05/ 6/6 7/11 1 ls -la t04xxx student -rwxr-xrx three student - rwx r-x r-x Windows GUI UNIX Windows chmod CNS (755) (ug+x) % chmod
More informationperimeter gateway
Internet Week 2005 T9 CISSP Proxy VPN perimeter gateway OK?? F/+VPN Web MAIL/DNS PC PC PC PC PC NW NW F/W+VPN DMZ F/W NW NW RAS NW DMZ DMZ De-Militarized Zone = DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ
More informationクラウド接続 「Windows Azure」との接続
クラウド接続 Windows Azure との接続 2013 年 10 月 目次はじめに...3 ネットワーク構成...3 オンプレミス側ネットワーク...3 Windows Azure 側ネットワーク...4 Windows Azure での設定...4 仮想ネットワークの作成...4 ゲートウェイの作成...9 オンプレミス (Si-R) での設定... 11 IPsec 設定項目... 11
More informationIP... 2 IP... 2 IP... 2 IP... 2 VLAN... 3 IP ADD IP IPADDRESS... 5 DELETE IP... 7 PING SETIP SHOW IP IP CentreCOM FS9
... 2... 2... 2... 2 VLAN... 3... 3... 4... 4 ADD ADDRESS... 5 DELETE... 7 PING.... 8 SET... 10 SHOW... 11 CentreCOM FS900S 1.0.0 1 Internet Protocol 2 Telnet 1. 2. VLAN VLAN default ADD ADDRESS=192.168.10.5
More informationSi-R30Bコマンドリファレンス
Si-R P3NK-3252-01Z0 30B Si-R30B() [] {} [] [] s() m()h()d() 1m = 1 60s60m24h 1m1h1d 3 3 13 save enable reset save reset save enable reset password delete delete [] show show LAN IP # show lan 0 ip
More information