SRT/RTX/RT設定例集

Size: px
Start display at page:

Download "SRT/RTX/RT設定例集"

Transcription

1 Network Equipment Rev.6.03, Rev.7.00, Rev.7.01 Rev.8.01, Rev.8.02, Rev.8.03 Rev.9.00, Rev.10.00, Rev.10.01

2 2

3 3

4 4

5 5

6 6

7 RTX1000 RTX1000

8 8 help > help show command > show command console character administrator pp disable disconnect

9 9 pp enable save Password: login timer save cold start

10 10 cold start cold start cold start save

11 11 default gateway ip interface address LAN IP

12 12 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save

13 13 isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save

14 14 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# ppp mp use on pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# ppp mp use on pp1# isdn remote address call /Tokyo pp1# save

15 15 isdn local address ip lan1 address ip route pp select pp bind ppp mp use isdn remote address pp enable save

16 16 # isdn local address bri /Tokyo # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# ip pp rip send on version 2 pp1# ip pp rip hold routing on pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# ip pp rip send on version 2 pp1# ip pp rip hold routing on pp1# save pp1# connect 1 pp1# disconnect 1

17 17 isdn local address ip lan1 address rip use rip pp select pp bind isdn remote address ip pp rip send ip pp rip hold routing pp enable save isdn local address ip lan1 address rip use rip pp select pp bind isdn remote address ip pp rip send ip pp rip hold routing pp enable save connect disconnect

18 18 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# save pp1# interface reset bri1 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# save pp1# interface reset bri1

19 19 line type ip lan1 address ip route pp select pp bind pp enable save interface reset

20 20 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# ip pp address /24 pp1# ip pp remote address pp1# save pp1# interface reset bri1 # line type bri1 l128 # ip lan1 address /24 # ip route /24 gateway pp 1 # pp bind bri1 pp1# ip pp address /24 pp1# ip pp remote address pp1# save pp1# interface reset bri1

21 21 line type ip lan1 address ip route pp select pp bind ip pp address ip pp remote address pp enable save interface reset

22 22 # line type bri1 l128 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 # pp line l128 # line type bri1 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1

23 23 line type ip lan1 address rip use rip pp select pp bind ip pp rip send ip pp rip connect send ip pp rip connect interval pp enable save interface reset

24 24 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 2 # ip route /24 gateway pp 3 # pp select 2 pp2# pp bind bri1 pp2# isdn remote address call /Osaka pp2# pp enable 2 pp2# pp select 3 pp3# pp bind bri1 pp3# isdn remote address call /Nagoya pp3# pp enable 3 pp3# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 # ip route /24 gateway pp 3 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp select 3 pp3# pp bind bri1 pp3# isdn remote address call /Nagoya pp3# pp enable 3 pp3# save

25 25 # isdn local address bri /Nagoya # ip lan1 address /24 # ip route /24 gateway pp 1 # ip route /24 gateway pp 2 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp select 2 pp2# pp bind bri1 pp2# isdn remote address call /Osaka pp2# pp enable 2 pp2# save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable pp select pp bind isdn remote address pp enable save

26 26 # isdn local address bri /Osaka # ip lan1 address /24 # ip route default gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save

27 27 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address /Osaka # ip lan1 address # ip route /24 gateway pp 2 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo /Tokyo pp1# save

28 28 isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save

29 29 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn callback request on pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 pp1# pp bind bri1 pp1# isdn callback permit on pp1# isdn remote address call /Tokyo pp1# save

30 30 isdn local address ip lan1 address ip route pp select pp bind isdn callback request isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn callback permit isdn remote address pp enable save

31 31 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route gateway pp 1 # ip route gateway pp 1 # ip route gateway pp 1 # ip lan1 proxyarp on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address /Osaka # ip lan1 address /28 # ip route default gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save

32 32 isdn local address ip lan1 address ip lan1 proxyarp ip route pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save

33 33 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route gateway pp 1 # ip route gateway pp 1 # ip route gateway pp 1.. # ip route gateway pp 2 # ip lan1 proxyarp on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save

34 34 # isdn local address /Tokyo2 # ip lan1 address /24 # ip route gateway pp 1 # Ip route gateway pp 1 # ip lan1 proxyarp on pp1# isdn remote address call /Nagoya pp1# pp bind bri1 pp1# save # isdn local address bri /Nagoya # ip lan1 address /30 # ip route default gateway pp 1 # pp bind bri1 pp1# isdn remote address call /Tokyo2 pp1# save # isdn local address /Osaka # ip lan1 address /28 # ip route default gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save

35 35 isdn local address ip lan1 address ip lan1 proxyarp ip route pp select pp bind isdn remote address pp enable save

36 36 isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save

37 37 # isdn local address bri /Tokyo # ip lan1 address /24 # ip lan1 proxyarp on pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# ip pp remote address pp1# save ip pp remote address isdn local address ip lan1 address ip lan1 proxyarp pp select pp bind isdn remote address

38 38 ip pp remote address pp enable save

39 39 # isdn local address bri /Tokyo # ip lan1 address /24 # ip lan1 proxyarp on # pp select anonymous anonymous# pp bind bri1 anonymous# ip pp remote address pool anonymous# pp auth request chap anonymous# pp auth username RT105i-A himitsu anonymous# pp enable anonymous anonymous# save isdn local address ip lan1 address ip lan1 proxyarp pp select pp bind ip pp remote address pool pp auth request pp auth username

40 40 pp enable save

41 41 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route default gateway pp 1 # nat descriptor type 1 masquerade pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# pp auth accept pap chap pp1# pp auth myname RT105i-A himitsu pp1# ppp ipcp ipaddress on pp1# ip pp nat descriptor 1 pp1# save

42 42 isdn local address ip lan1 address ip route nat descriptor type pp select pp bind isdn remote address pp auth accept pp auth myname ppp ipcp ipaddress ip pp nat descriptor pp enable save

43 43 # isdn local address bri /Tokyo # isdn local address bri /Tokyo # isdn local address bri /Tokyo # isdn local address bri /Tokyo # ip lan1 address /24 # pp select anonymous anonymous# pp bind bri2.1 bri2.2 bri2.3 bri2.4 anonymous# pp auth request chap-pap anonymous# pp auth username Nagoya naisyo /Nagoya anonymous# pp auth username Osaka himitsu /Osaka anonymous# ip route /24 gateway pp anonymous name=nagoya anonymous# ip route /24 gateway pp anonymous name=osaka anonymous# pp enable anonymous anonymous# save # isdn local address bri /Osaka # ip lan1 address /24 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp auth accept pap chap pp1# pp auth myname Osaka himitsu pp1# ip route /24 gateway pp 1 pp1# save

44 44 # isdn local address bri /Nagoya # ip lan1 address /24 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# pp auth accept pap chap pp1# pp auth myname Nagoya naisyo pp1# ip route /24 gateway pp 1 pp1# save isdn local address ip lan1 address pp select pp bind pp auth request pp auth myname pp auth username ip route pp auth username pp enable save isdn local address ip lan1 address pp select pp bind isdn remote address pp auth accept

45 45 pp auth myname ip route pp enable save isdn local address bri local address ip lan1 address pp select pp bind isdn remote address pp auth accept pp auth myname ip route pp enable save

46 46 # isdn local address bri /Tokyo # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri2.1 bri3.1 pp1# ppp mp use on pp1# ppp mp maxlink 3 pp1# isdn remote address call /Osaka pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# save pp1# interface reset pp 1 # isdn local address bri /Osaka # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri2.1 bri3.1 pp1# ppp mp use on pp1# ppp mp maxlink 3 pp1# isdn remote address call /Tokyo pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# save pp1# interface reset pp 1

47 47 ppp mp load threshold isdn local address line type isdn terminator ip lan1 address pp select ppp mp use ppp mp maxlink pp bind isdn remote address ip route. pp keepalive use pp enable save restart interface reset interface interface reset pp

48 48 # isdn local address bri /Tokyo # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri3.1 pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# leased backup 2 pp1# pp select 2 pp2# pp bind bri2.1 pp2# isdn remote address call /Osaka pp2# isdn call block time 15 pp2# pp enable 2 pp2# save pp2# interface reset bri3.1 # isdn local address bri /Osaka # line type bri3.1 l128 # isdn terminator bri3.1 on # ip lan1 address /24 pp1# pp bind bri3.1 pp1# ip route /24 gateway pp 1 pp1# pp keepalive use lcp-echo pp1# leased backup 2 pp1# pp select 2 pp2# pp bind bri2.1 pp2# isdn remote address call /Tokyo pp2# isdn call block time 15 pp2# pp enable 2 pp2# save pp2# interface reset bri3.1

49 49 isdn local address line type isdn terminator ip lan1 address pp select pp bind ip route pp keepalive use leased backup pp enable pp select pp bind isdn remote address isdn call block time pp enable save interface reset restart

50 50 # isdn local address bri /Tokyo1 # isdn local address bri /Tokyo2 # isdn local address bri /Tokyo3 # ip lan1 address /24 # ip route /24 gateway pp 1 # ip route /24 gateway pp 2 # ip route /24 gateway pp 3 # ip route /24 gateway pp 4 # ip route /24 gateway pp 5 pp1# pp bind bri2.1 pp1# isdn remote address call /Osaka1 pp1# pp select 2 pp2# pp bind bri2.1 pp2# isdn remote address call /Osaka2 pp2# pp enable 2 pp2# pp select 3 pp3# pp bind bri2.2 pp3# isdn remote address call /Osaka3 pp3# pp enable 3 pp3# pp select 4 pp4# pp bind bri2.2 pp4# isdn remote address call /Osaka4 pp4# pp enable 4 pp4# pp select 5 pp5# pp bind bri2.3 pp5# isdn remote address call /Osaka5 pp5# pp enable 5 pp5# save

51 51 isdn local address ip lan1 address pp select pp bind isdn remote address isdn call permit off isdn remote address arrive ip route pp enable save

52 52 # isdn local address bri /Tokyo1 # isdn local address bri /Tokyo2 # isdn local address bri /Tokyo3 # isdn local address bri /Tokyo4 # ip lan1 address /24 pp1# pp bind bri2.1 bri2.2 bri2.3 bri2.4 pp1# ppp mp use on pp1# ppp mp maxlink 8 pp1# isdn remote address call /Osaka /Osaka /Osaka /Osaka4 pp1# ip route /24 gateway pp 1 pp1# save # isdn local address bri /Osaka1 # isdn local address bri /Osaka2 # isdn local address bri /Osaka3 # isdn local address bri /Osaka4 # ip lan1 address /24 pp1# pp bind bri2.1 bri2.2 bri2.3 bri2.4 pp1# ppp mp use on pp1# ppp mp maxlink 8 pp1# isdn remote address call /Tokyo /Tokyo /Tokyo /Tokyo4 pp1# ip route /24 gateway pp 1 pp1# save

53 53 ppp mp load threshold isdn local address ip lan1 address pp select ppp mp use ppp mp maxlink pp bind isdn remote address ip route pp enable save

54 54

55 55 # line type bri2.8 l64 # line type bri3.1 l64 # line type bri3.2 l64 # line type bri3.3 l64 # line type bri3.4 l128 # line type bri3.5 l128 # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # isdn local address bri /aaa # ip lan1 address /24 # rip use on # ip route /24 gateway pp 1 # ip route /24 gateway pp 2 # ip route /24 gateway pp 3 # ip route /24 gateway pp 4 # ip route /24 gateway pp 5 # ip route /24 gateway pp 6 # ip route /24 gateway pp 7 # ip route /24 gateway pp 8 # ip route /24 gateway pp 9 # ip route /24 gateway pp 10 # ip route /24 gateway pp 11 # ip route /24 gateway pp 12 # ip route /24 gateway pp 13 # ip route /24 gateway pp 14

56 56 # ip route /24 gateway pp 15 # ip route /24 gateway pp 16 # ip route /24 gateway pp 17 # ip route /24 gateway pp 18 # ip route /24 gateway pp 19 # ip route /24 gateway pp 20 pp1# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp1# isdn remote address call /bbb pp1# pp select 2 pp2# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp2# isdn remote address call /bbb pp2# pp enable 2 pp2# pp select 3 pp3# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp3# isdn remote address call /bbb pp3# pp enable 3 pp3# pp select 4 pp4# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp4# isdn remote address call /bbb pp4# pp enable 4 pp4# pp select 5 pp5# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp5# isdn remote address call /bbb pp5# pp enable 5 pp5# pp select 6 pp6# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp6# isdn remote address call /bbb pp6# pp enable 6 pp6# pp select 7 pp7# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp7# isdn remote address call /bbb pp7# pp enable 7 pp7# pp select 8 pp8# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp8# isdn remote address call /bbb pp8# pp enable 8 pp8# pp select 9 pp9# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp9# isdn remote address call /bbb pp9# pp enable 9 pp90 pp10# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp10# isdn remote address call /bbb pp10# pp enable 10 pp101 pp11# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp11# isdn remote address call /bbb pp11# pp enable 11 pp112 pp12# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp12# isdn remote address call /bbb pp12# pp enable 12 pp123

57 57 pp13# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp13# isdn remote address call /bbb pp13# pp enable 13 pp134 pp14# pp bind bri2.1 bri2.2 bri2.3 bri2.4 bri2.5 bri2.6 bri2.7 pp14# isdn remote address call /bbb pp14# pp enable 14 pp145 pp15# pp bind bri2.8 pp15# pp enable 15 pp156 pp16# pp bind bri3.1 pp16# pp enable 16 pp167 pp17# pp bind bri3.2 pp17# pp enable 17 pp178 pp18# pp bind bri3.3 pp18# pp enable 18 pp189 pp19# pp bind bri3.4 pp19# pp enable 19 pp19# pp select 20 pp20# pp bind bri3.5 pp20# pp enable 20 pp20# save pp20# interface reset bri2.8 pp20# interface reset bri3.1 pp20# interface reset bri3.2 pp20# interface reset bri3.3 pp20# interface reset bri3.4 pp20# interface reset bri3.5 line type isdn local address ip lan1 address rip use ip route pp select

58 58 pp bind isdn remote address pp enable save interface reset restart

59 59 # line type bri1 l128 # isdn local address bri # ip lan1 address /24 # nat descriptor type 1 nat # nat descriptor address outer # nat descriptor type 2 masquerade pp1# pp bind bri1 pp1# pp backup pp 2 pp1# pp keepalive use lcp-echo pp1# ip pp nat descriptor 1 pp1# ip route default gateway pp 1 pp1# pp select 2 pp2# pp bind bri2 pp2# isdn remote address call pp2# pp auth accept chap pp2# pp auth myname name pass pp2# ppp ipcp ipaddress on pp2# ppp ipcp msext on pp2# ip pp nat descriptor 2 pp2# pp enable 2 pp2# save # line type bri1 l128 # isdn local address bri # ip lan1 address /24

60 60 # nat descriptor type 1 nat # nat descriptor address outer # nat descriptor type 2 masquerade pp1# pp bind bri1 pp1# pp backup pp 2 pp1# pp keepalive use lcp-echo pp1# ip pp nat descriptor 1 pp1# ip route default gateway pp 1 pp1# pp select 2 pp2# pp bind bri2 pp2# isdn remote address call pp2# pp auth accept chap pp2# pp auth myname name pass pp2# ppp ipcp ipaddress on pp2# ppp ipcp msext on pp2# ip pp nat descriptor 2 pp2# pp enable 2 pp2# save

61 61

62 62 # ipx routing on # isdn local address bri /Tokyo # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Osaka pp1# ipx pp route 22:22:22:22 2 pp1# save # ipx routing on # isdn local address bri /Osaka # ipx lan1 network 22:22:22:22 # ipx sap add file SERVER aa:aa:aa:aa 00:00:00:00:00:01 ncp 3 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Tokyo pp1# ipx pp route 11:11:11:11 2 pp1# ipx pp route aa:aa:aa:aa 3 pp1# save

63 63 ipx routing isdn local address ipx lan1 network pp select pp bind ipx pp routing isdn remote address ipx pp route pp enable save ipx lan1 network SYSTEM AUTOEXEC.NCF bind net ipx routing isdn local address ipx lan1 network ipx sap pp select pp bind ipx pp routing isdn remote address ipx pp route

64 64 ipx pp route pp enable save ipx sap SYSTEM AUTOEXEC.NCF ipx internalnet 00:00:00:00:00:01 ipx lan1 network

65 65 # ipx routing on # isdn local address bri /Tokyo # ipx lan1 network 11:11:11:11 # ipx sap file SERVER-B bb:bb:bb:bb: 00:00:00:00:00:01 ncp 3 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Osaka pp1# ipx pp route 22:22:22:22 2 pp1# ipx pp route bb:bb:bb:bb 3 pp1# save # ipx routing on # isdn local address bri /Osaka # ipx lan1 network 22:22:22:22 # ipx sap file SERVER-A aa:aa:aa:aa 00:00:00:00:00:01 ncp 3 pp1# pp bind bri1 pp1# ipx pp routing on pp1# isdn remote address call /Tokyo pp1# ipx pp route 11:11:11:11 2 pp1# ipx pp route aa:aa:aa:aa 3 pp1# save

66 66 ipx routing isdn local address ipx lan1 network ipx sap pp select pp bind ipx pp routing isdn remote address ipx pp route ipx pp route pp enable save

67 67 # line type bri1 l64 # ipx routing on # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1 # line type bri1 l64 # ipx routing on # ipx lan1 network 22:22:22:22 pp1# pp bind bri1 pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1

68 68 line type ipx routing ipx lan1 network pp select pp bind ipx pp routing ipx pp ripsap connect send ipx pp ripsap connect interval pp enable save interface reset

69 69

70 70 # bridge use on # isdn local address bri /Tokyo # bridge group lan1 1 pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # bridge use on # isdn local address bri /Osaka # bridge group lan1 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save

71 71 save ip routing off bridge use isdn local address bridge group pp select pp bind isdn remote address pp enable save

72 72 # line type bri1 l64 # bridge use on # bridge group lan1 1 pp1# pp bind bri1 pp1# save pp1# interface reset bri1 save ip routing off line type bridge use bridge group pp select pp bind pp enable save interface reset

73 73

74 74 pp1# ip filter 1 pass /24 * pp1# ip pp secure filter out 1 pp1# save pp select ip filter * ip pp secure filter out save

75 75 pp1# ip filter 1 reject * /24 pp1# ip filter 2 pass * * pp1# ip pp secure filter out 1 2 pp1# save pp select ip filter * reject ip pp secure filter out save

76 76 pp1# ip filter 1 pass /24 * pp1# ip pp secure filter in 1 pp1# save pp select ip filter * ip pp secure filter in save

77 77 pp1# ip filter 1 reject * /24 pp1# ip filter 2 pass * * pp1# ip pp secure filter in 1 2 pp1# save pp select ip filter * reject ip pp secure filter in save

78 78 pp1# ip filter 1 pass * * established pp1# ip filter 2 pass * * tcp ftpdata * pp1# ip pp secure filter in 1 2 pp1# save pp select ip filter * established established ftpdata ip pp secure filter in save

79 79 pp1# ip filter 1 pass * * udp snmp * pp1# ip filter 2 pass * * udp * snmp pp1# ip pp secure filter in 1 2 pp1# ip pp secure filter out 1 2 pp1# save pp select ip filter * snmp ip pp secure filter save

80 80 pp1# ip filter 1 pass * * tcp telnet * pp1# ip filter 2 pass * * tcp * telnet pp1# ip pp secure filter in 1 2 pp1# ip pp secure filter out 1 2 pp1# save pp select ip filter * telnet ip pp secure filter save

81 81 pp1# ip filter 1 reject * * icmp pp1# ip filter 2 pass * * pp1# ip pp secure filter in 1 2 pp1# save pp select ip filter * icmp reject ip pp secure filter in save

82 82 pp1# ip filter 1 pass * * tcp * ftp pp1# ip filter 2 pass * * tcp ftp * pp1# ip pp secure filter out 1 pp1# ip pp secure filter in 2 pp1# save pp select ip filter * ftp ip pp secure filter out in save

83 83 pp1# ip filter 1 reject * * pp1# ip filter 2 pass * * pp1# ip pp rip filter out 1 2 pp1# save pp select ip filter * reject ip pp rip filter out save

84 84 # line type bri1 l64 # ip lan1 address /28 # ip route default gateway pp 1 # ip filter 10 reject /24 * * * * # ip filter 11 pass * /24 icmp * * # ip filter 12 pass * /24 established ** # ip filter 13 pass * /24 tcp * ident # ip filter 14 pass * /24 tcp ftpdata * # ip filter 15 pass * /24 udp domain * # ip filter 16 pass * /28 tcp,udp * telnet,smtp, gopher,finger,www,nntp,ntp, # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in pp1# syslog host pp1# syslog notice on pp1# save pp1# interface reset bri1

85 85 line type ip lan1 address ip route ip filter ip filter source-route ip filter directed-broadcast pp select pp bind ip pp secure filter in syslog host syslog notice save interface reset

86 86 # line type bri1 l64 # ip lan1 address /24 # ip route default gateway pp 1 # ip filter 10 reject /24 * * * * # ip filter 11 pass * /24 icmp * * # ip filter 12 pass * /24 established ** # ip filter 13 pass * /24 tcp * ident # ip filter 14 pass * /24 tcp ftpdata * # ip filter 15 pass * /24 udp domain * # ip filter 16 pass * tcp,udp * smtp,gopher,finger,www,nntp,ntp, # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in pp1# syslog host pp1# syslog notice on pp1# save pp1# interface reset bri1

87 87 line type ip lan1 address ip route ip filter ip filter source-route ip filter directed-broadcast pp select pp bind ip pp secure filter in syslog host syslog notice save interface reset

88 88 pp1# ip filter 60 reject /24 * * * * pp1# ip filter 100 pass * /24 * * * pp1# ip pp secure filter in pp1# save ip filter directed-broadcast #ip filter directed-broadcast on

89 89 ip filter 100 reject * * * * * ip pp secure filter in 100 ip pp secure filter out 1 ip pp secure filter out 1 dynamic 10 ip pp secure filter in dynamic 20 ip pp secure filter out dynamic 10

90 90 # ip filter dynamic /24 * ftp # ip filter dynamic /24 * tftp # ip filter dynamic /24 * tcp # ip filter dynamic /24 * udp # ip filter 1 pass /24 * tcp,udp # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out 1 dynamic # ip filter dynamic /24 * ftp # ip filter dynamic /24 * tftp # ip filter dynamic /24 * tcp # ip filter dynamic /24 * udp # ip filter 1 pass /24 * tcp,udp # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out 1 dynamic

91 91 # ip filter dynamic 1 * domain # ip filter 1 pass * * tcp * smtp,pop3 # ip filter 2 pass * * tcp * ident # ip filter dynamic / filter 1 in 2 # ip filter dynamic /24 * www # ip filter dynamic /24 * ftp # ip filter dynamic /24 * telnet # ip filter dynamic /24 * tcp syslog=off # ip filter dynamic /24 * udp syslog=off # ip filter 3 pass * /24 icmp * * # ip filter dynamic 20 * domain # ip filter dynamic 21 * www # ip filter 4 pass * tcp * domain # ip filter 5 pass * tcp * www # ip filter 6 pass * tcp * smtp,pop3 # ip filter 7 pass * * tcp * ident # ip filter dynamic 22 * filter 6 in 7 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic # ip filter dynamic 1 * domain # ip filter 1 pass * * tcp * smtp,pop3 # ip filter 2 pass * * tcp * ident # ip filter dynamic / filter 1 in 2 ip filter dynamic ip filter ip filter dynamic / smtp ip filter dynamic / pop3 ip filter 1 pass /24 tcp * ident ip filter dynamic /24 filter 1 pp select 1 ip pp secure filter in 1 dynamic 20 ip pp secure filter out dynamic 1 2

92 92 # ip filter dynamic /24 * www # ip filter dynamic /24 * ftp # ip filter dynamic /24 * telnet # ip filter dynamic /24 * tcp syslog=off # ip filter dynamic /24 * udp syslog=off # ip filter 3 pass * /24 icmp * * # ip filter dynamic 20 * domain # ip filter dynamic 21 * www # ip filter 4 pass * tcp * domain # ip filter 5 pass * tcp * www # ip filter 6 pass * tcp * smtp,pop3 # ip filter 7 pass * * tcp * ident # ip filter dynamic 22 * filter 6 in 7 ip filter dynamic 20 * smtp ip filter dynamic 21 * pop3 ip filter 1 pass * tcp * smtp,pop3 ip filter 2 pass * * tcp * ident ip filter dynamic * filter 2 pp select 1 ip pp secure filter in 1 dynamic ip pp secure filter out dynamic 1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic

93 93 # ip filter 1 pass * * tcp * 6000 # ip filter 2 pass * * udp * 7001 # ip filter 3 pass * * udp * 7002 # ip filter dynamic 1 * filter 1 in 3 out 2 # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out dynamic 1 # ip filter 1 pass * * tcp * 6000 # ip filter 2 pass * * udp * 7001 # ip filter 3 pass * * udp * 7002 # ip filter dynamic 1 * filter 1 in 3 out 2 # ip filter 100 reject * * * * * pp1# ip pp secure filter in 100 pp1# ip pp secure filter out dynamic 1

94 94 # line type bri1 l128 # ip lan1 address /28 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * /28 telnet # ip filter dynamic 21 * /28 smtp # ip filter dynamic 22 * /28 www # ip filter dynamic 30 * /28 tcp # ip filter dynamic 31 * /28 udp # ip filter 3 reject * /28 established * telnet,smtp,gopher,finger,www,nntp,ntp # ip filter 4 pass * /28 tcp,udp * telnet,smtp,gopher,finger,www,nntp,ntp, # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 # line type bri1 l128 # ip lan1 address /28 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * /28 telnet # ip filter dynamic 21 * /28 smtp # ip filter dynamic 22 * /28 www # ip filter dynamic 30 * /28 tcp # ip filter dynamic 31 * /28 udp # ip filter 3 reject * /28 established * telnet,smtp,gopher, finger,www,nntp,ntp # ip filter 4 pass * /28 tcp,udp * telnet,smtp,gopher, finger,www,nntp,ntp,

95 95 # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 ip filter dynamic ip filter ip filter dynamic 1 * * smtp ip filter dynamic 2 * * pop3 ip filter 1 pass * * tcp * ident ip filter dynamic 20 * * filter 1 pp select 1 ip pp secure filter in 1 dynamic 20 ip pp secure filter out dynamic 1 2 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 restart

96 96 # line type bri1 l128 # ip lan1 address /24 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * telnet # ip filter dynamic 21 * smtp # ip filter dynamic 22 * www # ip filter dynamic 30 * tcp # ip filter dynamic 31 * udp # ip filter 3 reject * established * telnet,smtp,gopher, finger,www,nntp,ntp # ip filter 4 pass * tcp,udp * telnet,smtp,gopher, finger,www,nntp,ntp, # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 # line type bri1 l128 # ip lan1 address /24 # ip filter 1 reject /24 * * * * # ip filter 2 pass * * icmp * * # ip filter dynamic 20 * telnet # ip filter dynamic 21 * smtp # ip filter dynamic 22 * www # ip filter dynamic 30 * tcp # ip filter dynamic 31 * udp # ip filter 3 reject * established * telnet,smtp,gopher,finger,www,nntp,ntp # ip filter 4 pass * tcp,udp * telnet,smtp,gopher,finger,www,nntp,ntp,

97 97 # ip filter dynamic 1 * * domain # ip filter dynamic 2 * * www # ip filter dynamic 3 * * ftp # ip filter 5 pass * * tcp * smtp,pop3 # ip filter 6 pass * * tcp * ident # ip filter dynamic 4 * * filter 5 in 6 ip filter dynamic ip filter ip filter dynamic 1 * * smtp ip filter dynamic 2 * * pop3 ip filter 1 pass * * tcp * ident ip filter dynamic 20 * * filter 1 pp select 1 ip pp secure filter in 1 dynamic 20 ip pp secure filter out dynamic 1 2 # ip filter dynamic 10 * * tcp # ip filter dynamic 11 * * udp # ip filter source-route on # ip filter directed-broadcast on pp1# pp bind bri1 pp1# ip pp secure filter in dynamic pp1# ip pp secure filter out dynamic pp1# pp select none # ip route default gateway pp 1 # syslog host # syslog notice on # save # interface reset bri1 restart

98 98

99 99 pp1# ip pp intrusion detection in on pp1# ip pp intrusion detection in on reject=on reject # ip filter dynamic 1 * * ftp # ip filter dynamic 2 * * smtp pp1# ip pp secure filter in dynamic 1 2 pp1# ip pp intrusion detection in on

100 100

101 101 #ip policy filter 10 reject-log lan2 lan1 * * telnet #ip policy filter 11 pass-nolog lan1 lan2 * * ping #ip policy interface group 1 name=private local lan1 #ip policy service group 1 name=mail smtp pop3

102 102 #ip policy filter 10 pass-log local * * * * #ip policy filter 11 static-pass-log * lan1 * * * #ip policy filter 20 reject-nolog lan1 * * * * #ip policy filter 21 static-pass-nolog * local * * * #ip policy filter 22 pass-nolog * pp /24 * tcp #ip policy filter 23 pass-nolog * pp /24 * udp #ip policy filter 30 reject-nolog * * * * * #ip policy filter set 1 10 [11] 20 [ ] 30 #ip policy filter set enable 1 #save #ip policy filter 10 pass-log local * * * * #ip policy filter 11 static-pass-log * lan1 * * * #ip policy filter 20 reject-nolog lan1 * * * * #ip policy filter 21 static-pass-nolog * local * * * #ip policy filter 22 pass-nolog * pp /24 * tcp #ip policy filter 23 pass-nolog * pp /24 * udp #ip policy filter 30 reject-nolog * * * * * #ip policy filter set 1 10 [11] 20 [ ] 30

103 103 #ip policy filter set enable 1 #save

104 104 #ip policy interface group 1 name=private local lan1 #ip policy service group 1 name=mail pop3 smtp #ip policy filter 10 pass-nolog local * * * * #ip policy filter 11 static-pass-nolog * lan1 * * * #ip policy filter 100 reject-nolog lan1 * * * * #ip policy filter 110 static-pass-nolog * 1 * * * #ip policy filter 120 reject-nolog * * /24 * * #ip policy filter 121 pass-log * * * dns #ip policy filter 122 pass-log * * * * www #ip policy filter 123 pass-log * * * #ip policy filter 200 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 10 [11] 100 [ [ ]] 200 #ip policy filter set enable 1 #save #ip policy interface group 1 name=private local lan1 #ip policy service group 1 name=mail pop3 smtp #ip policy filter 10 pass-nolog local * * * * #ip policy filter 11 static-pass-nolog * lan1 * * * #ip policy filter 100 reject-nolog lan1 * * * * #ip policy filter 110 static-pass-nolog * 1 * * * #ip policy filter 120 reject-nolog * * /24 * *

105 105 #ip policy filter 121 pass-log * * * dns #ip policy filter 122 pass-log * * * * www #ip policy filter 123 pass-log * * * #ip policy filter 200 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 10 [11] 100 [ [ ]] 200 #ip policy filter set enable 1 #save

106 106 #ip inbound filter 1 reject-nolog * * tcp,udp * 135 #ip inbound filter 2 reject-nolog * * tcp,udp 135 * #ip inbound filter 3 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn #ip inbound filter 4 reject-nolog * * tcp,udp netbios_ns-netbios_ssn * #ip inbound filter 5 reject-nolog * * tcp,udp * 445 #ip inbound filter 6 reject-nolog * * tcp,udp 445 * #ip inbound filter 7 pass-nolog * * * * * #pp select 1 pp1#ip pp inbound filter list pp1#pp select none #ip policy interface group 1 name=private local lan1 #ip policy address group 1 name=private / /24 #ip policy service group 1 name="mail" pop3 smtp #ip policy service group 2 name="http Access" www ftp #ip policy filter 100 pass-nolog local * * * * #ip policy filter 110 static-pass-nolog * lan1 * * * #ip policy filter 200 reject-nolog lan1 * * * * #ip policy filter 210 static-pass-nolog * 1 * * * #ip policy filter 211 static-pass-log * * * * http #ip policy filter 220 pass-nolog * * * * dns #ip policy filter 230 pass-nolog * * * ntp #ip policy filter 240 reject-nolog * pp1 1 * * #ip policy filter 241 pass-log * * * * 1 #ip policy filter 242 pass-log * * * * 2 #ip policy filter 300 reject-nolog pp1 * * * * #ip policy filter 310 reject-nolog * lan1 * * * #ip policy filter 311 pass-log * * * #ip policy filter 400 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 100 [110] 200 [210 [211] [ ]] 300 [310 [311]] 400 #ip policy filter set enable 1 #save

107 107 #ip inbound filter 1 reject-nolog * * tcp,udp * 135 #ip inbound filter 2 reject-nolog * * tcp,udp 135 * #ip inbound filter 3 reject-nolog * * tcp,udp * netbios_ns-netbios_ssn #ip inbound filter 4 reject-nolog * * tcp,udp netbios_ns-netbios_ssn * #ip inbound filter 5 reject-nolog * * tcp,udp * 445 #ip inbound filter 6 reject-nolog * * tcp,udp 445 * #ip inbound filter 7 pass-nolog * * * * * #pp select 1 pp1#ip pp inbound filter list pp1#pp select none #ip policy interface group 1 name=private local lan1 #ip policy address group 1 name=private / /24 #ip policy service group 1 name="mail" pop3 smtp #ip policy service group 2 name="http Access" www ftp #ip policy filter 100 pass-nolog local * * * * #ip policy filter 110 static-pass-nolog * lan1 * * * #ip policy filter 200 reject-nolog lan1 * * * * #ip policy filter 210 static-pass-nolog * 1 * * * #ip policy filter 211 static-pass-log * * * * http #ip policy filter 220 pass-nolog * * * * dns

108 108 #ip policy filter 230 pass-nolog * * * ntp #ip policy filter 240 reject-nolog * pp1 1 * * #ip policy filter 241 pass-log * * * * 1 #ip policy filter 242 pass-log * * * * 2 #ip policy filter 300 reject-nolog pp1 * * * * #ip policy filter 310 reject-nolog * lan1 * * * #ip policy filter 311 pass-log * * * #ip policy filter 400 reject-nolog * * * * * #ip policy filter set 1 name="internet Access" 100 [110] 200 [210 [211] [ ]] 300 [310 [311]] 400 #ip policy filter set enable 1 #save

109 109 PAP CHAP

110 110 pp1# pp auth request pap pp1# pp auth username RT105i-A himitsu pp1# save pp1# pp auth accept pap pp1# pp auth myname RT105i-A himitsu pp1# save

111 111 pp1# pp auth request pap pp1# pp auth accept pap pp1# pp auth myname RT105i-A himitsu pp1# pp auth username RT105i-A himitsu pp1# save pp1# pp auth request chap pp1# pp auth username RT105i-A himitsu pp1# save pp1# pp auth accept chap pp1# pp auth myname RT105i-A himitsu pp1# save

112 112 pp1# pp auth request chap pp1# pp auth accept chap pp1# pp auth myname RT105i-A himitsu pp1# pp auth username RT105i-A himitsu pp1# save

113 113 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1

114 114 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 fr line type ip lan1 address rip use pp select pp encapsulation ip pp rip send ip pp rip connect send ip pp rip connect interval pp enable save interface reset

115 115 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway pp 1 dlci=16 # ip route /24 gateway pp 1 dlci=18 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway pp 1 dlci=17 # ip route /24 gateway pp 1 dlci=20 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1

116 116 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway pp 1 dlci=19 # ip route /24 gateway pp 1 dlci=21 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1 ip route line type ip lan1 address ip route pp select pp bind pp encapsulation pp enable save interface reset

117 117 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1

118 118 # line type bri1 l64 # ip lan1 address /24 # rip use on pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# ip pp rip send on version 2 pp1# ip pp rip connect send interval pp1# save pp1# interface reset bri1 fr line type ip lan1 address rip use pp select pp bind pp encapsulation ip pp address ip pp rip send ip pp rip connect send ip pp rip connect interval pp enable save interface reset

119 119 # line type bri1 l64 # ip lan1 address /24 # ip route /24 gateway # ip route /24 gateway pp1# pp bind bri 1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# save pp1# interface reset bri1 # line type bri1 l64 # ip lan1 address /24 # ip route gateway # ip route gateway pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# save pp1# interface reset bri1

120 120 # line type bri1 l64 # ip lan1 address /24 # ip route /24. gateway # ip route /24. gateway pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ip pp address /24 pp1# save pp1# interface reset bri1 ip route fr inarp fr inarp line type ip lan1 address ip route pp select pp bind pp encapsulation ip pp address pp enable save interface reset

121 121 # ipx routing on # line type bri1 l64 # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1 # ipx routing on # line type bri1 l64 # ipx lan1 network 22:22:22:22 # pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1

122 122 # ipx routing on # line type bri1 l64 # ipx lan1 network 33:33:33:33 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp ripsap connect send interval pp1# save pp1# interface reset bri1 fr ipx routing line type ipx lan1 network pp select pp bind pp encapsulation ipx pp routing ipx pp ripsap connect send ipx pp ripsap connect interval pp enable save interface reset

123 123 # ipx routing on # line type bri1 l64 # ipx lan1 network 11:11:11:11 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp route 22:22:22:22 dlci=16 1 pp1# ipx pp route 33:33:33:33 dlci=18 1 pp1# save pp1# interface reset bri1 # ipx routing on # line type bri1 l64 # ipx lan1 network 22:22:22:22 # ipx sap file SERVER aa:aa:aa:aa 00:00:00:00:00:01 ncp 2 # pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp route 11:11:11:11 dlci=17 1 pp1# ipx pp route aa:aa:aa:aa dlci=17 2 pp1# ipx pp route 33:33:33:33 dlci=20 1 pp1# save pp1# interface reset bri1

124 124 # ipx routing on # line type bri1 l64 # ipx lan1 network 33:33:33:33 # ipx sap file SERVER aa:aa:aa:aa 00:00:00:00:00:01 ncp 2 # pp bind bri1 pp1# pp encapsulation fr pp1# ipx pp routing on pp1# ipx pp route 11:11:11:11 dlci=19 1 pp1# ipx pp route aa:aa:aa:aa dlci=19 2 pp1# ipx pp route 22:22:22:22 dlci=21 1 pp1# save pp1# interface reset bri1 fr ipx routing line type ipx lan1 network pp select pp bind pp encapsulation ipx pp routing ipx pp route pp enable save interface reset

125 125 # line type bri1 l64 # bridge use on # bridge group lan1 1 pp1# pp bind bri1 pp1# pp encapsulation fr pp1# save pp1# interface reset bri1 save ip routing off fr line type bridge use bridge group pp select pp bind pp encapsulation pp enable save interface reset

126 126

127 127

128 128 # isdn local address bri /Tokyo # ip lan1 address /28 # ip route /28 gateway pp 1 # dhcp scope /28 except # dhcp service server pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save # isdn local address bri /Osaka # ip lan1 address /28 # ip route /28 gateway pp 1 pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save

129 129 isdn local address ip lan1 address ip route dhcp scope gateway expire, maxexpire dhcp service pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route pp select pp bind isdn remote address pp enable save

130 130 # isdn local address bri /Tokyo # ip lan1 address /24 # ip route /24 gateway pp 1 # dhcp scope /24 except # dhcp scope /24 except gateway # dhcp scope bind aa:aa:aa:aa:aa:aa # dhcp scope bind ethernet bb:bb:bb:bb:bb:bb # dhcp scope bind ethernet cc:cc:cc:cc:cc:cc # dns server # dhcp service server pp1# pp bind bri1 pp1# isdn remote address call /Osaka pp1# save

131 131 # isdn local address bri /Osaka # ip lan1 address /24 # ip route /24 gateway pp 1 # dhcp relay server # dhcp service relay pp1# pp bind bri1 pp1# isdn remote address call /Tokyo pp1# save

132 132 isdn local address ip lan1 address ip route dhcp scope gateway expire, maxexpire dhcp scope bind dns server dhcp service pp select pp bind isdn remote address pp enable save isdn local address ip lan1 address ip route dhcp relay server dhcp service pp select isdn remote address pp enable save

133 133 # ip lan1 address /24 # ip lan2 address dhcp # nat descriptor type 1 masquerade # nat descriptor address outer 1 primary # ip lan2 nat descriptor 1 # ip route default gateway dhcp lan2 # save # ip lan1 address /24 # ip lan2 address dhcp # nat descriptor type 1 masquerade # nat descriptor address outer 1 primary # ip lan2 nat descriptor 1 # ip route default gateway dhcp lan2 # save

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応

設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応 Network Equipment 設定例集 Rev.8.03, Rev.9.00, Rev.10.01 対応 2 3 4 5 6 7 8 help > help show command > show command console character administrator pp disable disconnect 9 pp enable save Password: login timer

More information

設定例集

設定例集 REMOTE ROUTER 1999. 2. 2 YAMAHA NetWare Novell,Inc. INS 64 YAMAHA! M E M O 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 : : : : : : : : : : : : : : : : : : : : :

More information

SRT100 コマンド設定運用説明書

SRT100 コマンド設定運用説明書 8 9 46 2 ...2 SRT100...4...6...8...9...9...10...11...12...14...15...19 CONSOLE...20 1....20 2.CONSOLE...21 3.CONSOLE...22...24 1....24 2....25 3....25 4....26 5....26 6.syslog...27 7.LAN...28 8.WAN...28

More information

RT300i/RT140x/RT105i 取扱説明書

RT300i/RT140x/RT105i 取扱説明書 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Typewriter face RT105i RT300i RT140p RT140f RT140i RT140e RT105i RT300i 11 RARP 9600 bit/s 8 http://www.rtpro.yamaha.co.jp/ ftp.rtpro.yamaha.co.jp 12

More information

RT300/140/105シリーズ 取扱説明書

RT300/140/105シリーズ 取扱説明書 REMOTE & BROADBAND ROUTER RT300i/RT140p/RT140f/RT140i RT140e/RT105p/RT105i/RT105e 2 3 4 5 6 7 8 9 10 Bold face Enter Ctrl Tab BS Del Console RT105i RT300i RT140p RT140f RT140i RT140e RT105p RT105i RT105e

More information

ヤマハルーターのCLI:Command Line Interface

ヤマハルーターのCLI:Command Line Interface (Command Line Interface) cf. http://www.rtpro.yamaha.co.jp/rt/docs/console/ Command Line Interface Graphical User Interface 2 (CLI) WWW(GUI) (CLI) WWW(GUI) character display graphic display keyboard pointer

More information

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能)

帯域を測ってみよう (適応型QoS/QoS連携/帯域検出機能) RTX1100 client server network service ( ) RTX3000 ( ) RTX1500 2 Sound Network Division, YAMAHA 3 Sound Network Division, YAMAHA 172.16.1.100/24 172.16.2.100/24 LAN2 LAN3 RTX1500 RTX1100 client 172.16.1.1/24

More information

REMOTE ROUTERS RTA52i PDF

REMOTE ROUTERS RTA52i PDF REMOTE ROUTERS RTA52i PDF 1999 12 20 Cisco Cisco Systems,Inc. NetWare Novell,Inc. Microsoft, Windows Microsoft Corporation Stac LZS Hi/fn 1 1 1.1 : : : : : : : : : : : : : : : : : : : : : : : : : : : :

More information

RTX/RTシリーズ コマンドリファレンス

RTX/RTシリーズ コマンドリファレンス Broadband & Remote ROUTER Rev.6.03.11 Rev.7.00.01 2 3 4 5 6 7 8 9 10 11 12 13 A account threshold..........................32 account threshold pp.......................32 administrator.............................183

More information

RTX830 取扱説明書

RTX830 取扱説明書 RTX830 JA 1 2 3 4 5 6 7 8 9 10 11 external-memory performance-test go 12 13 show config 14 15 16 17 18 19 20 save 21 22 23 24 25 26 27 save RTX830 BootROM Ver. 1.00 Copyright (c) 2017 Yamaha Corporation.

More information

RTX/RTシリーズ コマンドリファレンス

RTX/RTシリーズ コマンドリファレンス Network Equipment Rev.6.03.33, Rev.7.00.30, Rev.7.01.48 Rev.8.01.19, Rev.8.02.40, Rev.8.03.21 Rev.9.00.01 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 A account threshold..........................61 account

More information

owners.book

owners.book Network Equipment RTX1200 RTX800 2 3 4 5 6 7 8 9 10 bold face Enter Ctrl Tab BS Del Ctrl X Ctrl X Regular face 11 12 13 14 RTX1200 RTX1200 RTX1200 15 16 ), -. / 1 4 5 6 17 18 19 20 21 console character

More information

RTX1210 取扱説明書

RTX1210 取扱説明書 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 6 1 2 3 4 5 6 7 8 9 0 A B 6 7 8 9 10 11 show config 12 13 14 15 16 1 2 LAN1 3 4 LAN2 LINK/ DATA SPEED CONSOLE L1/B1 B2 microsd USB DOWN LOAD POWER ALARM STATUS 5 6 7 8 LAN3

More information

RT300/140/105 シリーズ コマンドリファレンス

RT300/140/105 シリーズ コマンドリファレンス REMOTE & BROADBAND ROUTER Rev.6.02.14 2 3 4 5 6 7 8 9 10 11 12 13 A account threshold..........................28 account threshold pp.......................28 administrator.............................137

More information

IP ICMP Redirec

IP ICMP Redirec Z990002-D06-08 RGW Ver1. 2 1....6 1.1....6 1.2....7 1.3....7 1.4....7 1.5....8 1.6....9 1.7.... 12 1.7.1...12 1.7.2...12 1.7.3 IP...12 1.7.4...13 1.7.5...13 1.7.6 ICMP Redirect...13 1.7.7...14 1.7.8...15

More information

IP.dvi

IP.dvi ... 3... 3... 3... 4... 6 VLAN... 6... 6 DHCP... 7... 7... 9... 9... 10... 12 R... 15... 15... 15 ARP... 18... 18 ARP... 18 DNS... 20... 20 DHCP/BOOTP... 21... 21 DHCP... 22 UDP... 23... 23... 23... 26...

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 RT140i #1(PPP) RT105i RTA52i R (PP#) (LAN#) [NAT] R LAN LAN 2 #2() RT300i RTW65b RT140e RT105e (LAN2) R (LAN1) RTA55i R LAN LAN 3 #3(PPPoE) R (LAN#) (PP#) (PP#) LAN ISDN/ LAN 4 RT300i RT105 #4(VPN) R

More information

SGX808 IPsec機能

SGX808 IPsec機能 SGX808 IPsec 機能 ヤマハ株式会社 2016 年 1 月第 2.01 版 Copyright 2014-2016 Yamaha Corporation 1 更新履歴更新日付 バージョン 内容 2014.05.29 1.00 初版発行 2015.02.04 2.00 2つのセッションを張れるようにしました 相手先情報としてホストネームも指定できるようにしました デフォルト経路として IPsec

More information

MR1000 コマンド設定事例集

MR1000 コマンド設定事例集 V21 LAN 2005 1 2005 3 2 Microsoft Corporation OMRON Corporation 2004-2005 All Rights Reserved. 2 V21... 2... 6... 6... 6... 6 1... 7 1.1 LAN... 8 1.2 CATV... 10 1.3 LAN... 12 1.4 IPv4 IPv6... 14 1.5...

More information

コマンドリファレンス

コマンドリファレンス ii iii iv v vi vii viii ix A account threshold...21 administrator...99 administrator password...16 alarm click...104 alarm connection analog...103 alarm connection data...103 alarm entire...104 alarm mp...104

More information

RT57i・RTV700 コマンドリファレンス

RT57i・RTV700 コマンドリファレンス Rev.8.00.56 Rev.8.00.57 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A account threshold... 53 account threshold pp... 53 administrator...26, 219 administrator password... 36 alarm connection analog... 44 alarm

More information

Si-R30コマンドリファレンス

Si-R30コマンドリファレンス 4 LAN 4.1 IP 4.1.1 lan ip address IP lan [] ip address / 0 / IP / ( ) LAN IP 1 IP / ( : 192.168.1.1/24) IP / ( : 192.168.1.1/255.255.255.0) IP 0.0.0.0

More information

Si-R30コマンドリファレンス

Si-R30コマンドリファレンス 8 8.1 SNMP ( ) 8.1.1 snmp service ( ) SNMP SNMP snmp service on SNMP SNMP off SNMP SNMP SNMP SNMP Si-R30 SNMP snmp service off 171 8.1.2 snmp agent contact ( ) SNMP snmp agent contact []

More information

NATディスクリプタ機能

NATディスクリプタ機能 NAT 1 NAT #1,#2 IP incoming/unconvertible/range IP ping/traceroute/ftp/cu-seeme NetMeeting 3.0 VPN PPTP 2 NAT (NAT NAT ) 3 (NAT) Revision 4 NAT (Rev.1 Rev.3 ) LAN LAN primary secondary TUNNEL VPN 3 NAT

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

ヤマハ ルーター ファイアウォール機能~説明資料~

ヤマハ ルーター ファイアウォール機能~説明資料~ 1 2 3 4 LAN ISDN/ NAT (LAN#) (PP#) (TUNNEL#) + R 5 ----------< >---------- ----------< >---------- 6 IPv6 VPN ping IPsec PPTP ICMP (1) TCP (6) UDP (17) IPv6 (41) AH (51) ESP (50) GRE (47) IPv4

More information

RouteMagic Controller RMC-MP200 / MP Version

RouteMagic Controller RMC-MP200 / MP Version RouteMagic Controller RMC-MP200 / MP1200 - Version 3.7.1 - RouteMagic Controller( RMC ) 3.7 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.7 RouteMagic Controller Version

More information

アライドテレシス ディストリビューション・スイッチ AT-x600シリーズで実現するMicrosoft® NAP

アライドテレシス ディストリビューション・スイッチ AT-x600シリーズで実現するMicrosoft® NAP Microsoft NAP 主な目的 検疫ネットワークを構築したい 802.1X ユーザー認証をシングルサインオンで行ないたい 概要 Microsoft NAP はActive Directory 環境下での利用を前提としています しかし Active Directory のドメイン認証と IEEE 802.1X 認証 ( および NAP の検疫 ) は同期していません したがって 802.1X 認証の前にドメイン認証が行なわれた場合

More information

FutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版

FutureNet CS-SEILシリーズ コマンドリファレンス ver.1.82対応版 FutureNet CS-SEIL Series CS-SEIL-510/C CS-SEIL/Turbo Firmware Version 1.82 FutureNet CS-SEIL.............................................. 1 1............................................. 11 1.1.........................................

More information

Biz Box ルータ 「N1200」 コマンドリファレンス

Biz Box ルータ 「N1200」 コマンドリファレンス 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A account threshold.......................... 59 account threshold pp....................... 59 administrator.........................26, 232 administrator password.....................

More information

RT58i Cmdref

RT58i Cmdref Rev.9.01.03 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 A account threshold... 62 account threshold pp... 62 administrator... 27, 213 administrator password... 40 administrator password encrypted... 40 alarm

More information

CS-SEIL-510/C コマンドリファレンス

CS-SEIL-510/C コマンドリファレンス FutureNet CS-SEIL-510/C 1.75 1 CS-SEIL-510/C 10 1.1................................................ 10 1.2............................................. 10 1.3..................................................

More information

Si-R30取扱説明書

Si-R30取扱説明書 IP 317 318 IP 319 322 327 332 335 337 339 339 340 342 DNS ProxyDNS 344 DNS 344 DNS 348 DNS 349 DNS 350 DHCP 352 DHCP 353 DHCP 355 NAT 35 NAT 359 30 34 ID 38 371 374 CBCP 375 CBCP 377 379 380 TA 382 URL

More information

RTX/RTシリーズ コマンドリファレンス

RTX/RTシリーズ コマンドリファレンス Network Equipment Rev.8.03.30, Rev.9.00.08 2 本書の記載内容の一部または全部を無断で転載することを禁じます 本書の記載内容は将来予告なく変更されることがあります 本製品を使用した結果発生した情報の消失等の損失については 当社では責任を負いかねます 保証は本製品物損の範囲に限ります 予めご了承ください 本書の内容については万全を期して作成致しておりますが 記載漏れやご不審な点がございましたらご一報くださいますようお願い致します

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information

RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3

RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version 3 RouteMagic Controller RMC-MP200 / MP1200 - Version 3.6 - RouteMagic Controller( RMC ) 3.6 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.6 RouteMagic Controller Version

More information

RT107eセミナー用資料

RT107eセミナー用資料 2 AV&IT Business Group, YAMAHA RT107e RT107e RT107e RT107e RT107e RT107e RT107e RT107e 4 AV&IT Business Group, YAMAHA 2002~2003 RTX1000 200210 RTX1000 RT57i 20037 RT57i IP-VPN (FGA/FG/FO) VPN 5 AV&IT Business

More information

AMF Cloud ソリューション

AMF Cloud ソリューション アライドテレシス バーチャルAMFアプライアンスで実現する 主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー/マスターを仮想マシン上に集約したい AMF機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 概要 これまで AMF機能を用いることで ネットワークの一元管理が可能となり 機器故障時 には代替機と差し替えるだけで自動的に復旧させるAuto

More information

Soliton Net’Attest EPS + AR router series L2TP+IPsec RADIUS 設定例

Soliton Net’Attest EPS + AR router series L2TP+IPsec RADIUS 設定例 Soliton Net Attest EPS + AR router series L2TP+IPsec RADIUS 設定例 2011/June アライドテレシス株式会社 Revision 1.1 1. Net Attest EPS AR VPN 2 1. 1. 1. AR AR (RADIUS ) 2. 2. Net Attest EPS 3-1. 3-1. iphone/ipad 3-2. 3-2.

More information

2/ PPPoE AC(Access Concentrator) PPPoE PPPoE Ping FTP PP

2/ PPPoE AC(Access Concentrator) PPPoE PPPoE Ping FTP PP PPPoE HATS LAN 2/31... 4... 4... 5... 6... 6... 7... 8... 8... 9... 10 PPPoE... 10 AC(Access Concentrator)... 10...11 PPPoE... 11 PPPoE... 13 Ping... 13 FTP... 14 PPPoE... 14... 15... 15 3/31... 17 PPPoE...

More information

rzakg.ps

rzakg.ps IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 IBM Systems - iseries DHCP (Dynamic Host Configuration Protocol) 5 4 65 IBM i5/os ( 5722-SS1) 5 4 0 RISC CISC URL http://www.ibm.com/jp/manuals/main/mail.html

More information

AMFマルチテナントソリューション

AMFマルチテナントソリューション 主な目的 複数の拠点間を繋ぐ大規模なネットワークを構築したい AMFコントローラー / マスターを仮想マシン上に集約したい AMF 機能を活用したネットワーク全体の一元管理を行い 運用コストを削減したい 複数テナントがそれぞれ独立して動作し かつ上位のコントローラーから複数テナントを集中管理可能なAMFネットワークを構築したい 概要 AMF を使用することで ネットワークデバイスの一元管理や自動復旧

More information

リング型IPカメラ監視ソリューション(マルチキャスト編)

リング型IPカメラ監視ソリューション(マルチキャスト編) CentreCOM x900 IP IP ( ) IP surveillance Solution 01 SNMP Manager Syslog Server NTP Server x900-24xt_2 Link Aggregation x900-24xt_1 FS926M-PS_1 FS926M-PS_2 x600-24ts EPSR (Ethernet Protected Switched Ring)

More information

1.26 1 9 1.1................................................ 9 1.2............................................. 9 1.3.................................................. 11 1.4..............................................

More information

Si-R30取扱説明書

Si-R30取扱説明書 6 6 WWW 6 65 67 67 68 ISDN 69 ISDN 75 80 ISDN 84 89 93 94 94 IP 95 96 98 TEL 99 99 100 100 101 1 1.. CHECK/B1/B/LAN HUB CHECK 3. Windows 95/98/Me IP MAC IP 1. -. winipcfg.exe Windows NT Windows 000 ipconfig.exe

More information

橡sirahasi.PDF

橡sirahasi.PDF Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション VoIP IP IP http://www.rtpro.yamaha.co.jp/rt/faq/voip/example-internal-ip-phone.html IP ( ) ( ) IP IP RT57i RTX1000 IP RT57i 2 AV&IT Marketing Division, YAMAHA IP RTX1000 10 RT57i(A) IP RT57i(B) 20 [] RTX1000

More information

WEB.dvi

WEB.dvi ... 5... 5... 5... 7... 8... 8... 10... 11... 11... 12... 13 HTTP... 13... 14... 15... 15... 15 IP... 15... 16... 17... 18 NTP... 18 SNMP.... 19 SNMP... 19 SNMP... 20 SNMP... 22 SNMP... 22... 22... 23...

More information

ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gat

ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gat ScreenOS 5.0 1 2 ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gateway NAT Destination NetScreen-Security

More information

RouteMagic Controller RMC-MP200 / MP Version

RouteMagic Controller RMC-MP200 / MP Version RouteMagic Controller RMC-MP200 / MP1200 - Version 3.5.2 - RouteMagic Controller( RMC ) 3.5.2 RMC RouteMagic RouteMagic Controller RouteMagic Controller MP1200 / MP200 Version 3.5 RouteMagic Controller

More information

untitled

untitled CHAPTER 10 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 IP ODAP p.10-5 IP p.10-18 IP Cisco 10000 Virtual Private Network VPN; IP On-demand Address Pool [ODAP] IP p.10-2

More information

RTA55i コマンドリファレンス

RTA55i コマンドリファレンス 1. 1.1 1.2 Bold face italic face Normal face 2. 2.1 help 2.2 show command 3. 3.1 login password 3.2 administrator password 3.3 security class level forget telnet level 1 2 3 forget on w,lxlma off telnet

More information

アドレス プールの設定

アドレス プールの設定 CHAPTER 9 IP Virtual Routing and Forwarding VRF Provider Edge PE; VRF PE VRF PE Cisco 10000 ESR IP ODAP p.9-5 IP p.9-17 IP Cisco 10000 ESR Virtual Private Network VPN; IP ODAP IP Cisco 10000 ESR 9-1 9

More information

アライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減

アライドテレシスコア スイッチ AT-SBx908 シリーズで実現する AMF-SBx908 ソリューション Solution No 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減 主な目的 ネットワークの一元管理 共有化をしたい 既存ネットワークを再構築せずに 簡単に導入したい ネットワーク管理 運用にかかるコストを削減したい 概要 ネットワーク管理 運用にかかるコストを削減するために 新たなシステムを導入することで一元管理や共有化を図る場面が多くあります しかし場合により そのシステムを導入のために 対応機器へのリプレースや機器追加を行わなければならず 大きな追加コストや高いリスクが発生してしまいます

More information

N A/006A インテリジェントスイッチ

N A/006A インテリジェントスイッチ 5 (Conf-global)# upgrade softare ftp-server 192.168.1.20 -A.B.C-r.des username nec passord nec (Conf-global)# upgrade softare tftp-server 192.168.1.20 -A.B.C-r.des (Conf-global)# upgrade softare restart

More information

2/ PPPoE... 9 AC(Access Concentrator) PPPoE PPPoE Ping FTP PPPoE

2/ PPPoE... 9 AC(Access Concentrator) PPPoE PPPoE Ping FTP PPPoE PPPoE HATS LAN 2/27... 4... 5... 5... 6... 7... 7... 8... 9 PPPoE... 9 AC(Access Concentrator)... 9... 10 PPPoE... 10 PPPoE... 11 Ping... 12 FTP... 12 PPPoE... 12... 14... 14... 16 PPPoE... 17 3/27 PPPoE...

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved

2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 1 2 3 1 2 ... 1 1... 8... 9... 18... 24... 25... 30... 31... 34... 37 E... 67 Bluetooth BIP... 68 2... 71... 73... 100 3 ... 132... 134... 136 E...

More information

リング型IPカメラ監視ソリューション

リング型IPカメラ監視ソリューション TELESYN IP IP surveillance Solution 04 SNMP Manager Syslog Server NTP Server TELESYN9100_2 Link Aggregation VCS_1 TELESYN9100_4 FS926M-PS_1 TELESYN9100_3 FS926M-PS_2 FS926M-PS_3 TELESYN : TELESYN9400 :

More information

IOS ゾーン ベースのポリシー ファイアウォールを使用した IOS ルータでの AnyConnect VPN クライアントの設定例

IOS ゾーン ベースのポリシー ファイアウォールを使用した IOS ルータでの AnyConnect VPN クライアントの設定例 IOS ゾーンベースのポリシーファイアウォールを使用した IOS ルータでの AnyConnect VPN クライアントの設定例 目次 はじめに前提条件要件使用するコンポーネント表記法設定ネットワーク図 Cisco IOS AnyConnect サーバの設定確認トラブルシューティングトラブルシューティングのためのコマンド関連情報 はじめに Cisco IOS ソフトウェアリリース 12.4(20)T

More information

PBXマニュアル

PBXマニュアル http://www.rtpro.yamaha.co.jp/ http://www.rtpro.yamaha.co.jp/ http://192.168.100.1/ RTV700 RTV700 RTV700 no isdn dial prefix sip server=1 prefix="22" no isdn dial prefix sip server=2 prefix="33" isdn

More information

SRX License

SRX License SRX ライセンスキー投入手順 株式会社日立ソリューションズネットワークビジネス部セキュリティグループ リビジョン 4.0 初版 2010/05/30 最新版 2012/12/27 Hitachi Solutions, Ltd. 2010-2012. All rights reserved. SRX ライセンスキー投入手順 Contents 1. ライセンスキーの自動インポート ( インターネット接続必須

More information

FUJITSU Network SR-M コマンド設定事例集

FUJITSU Network SR-M コマンド設定事例集 SR-M P3NK-4192-03Z0 FUJITSU Network SR-M V02 LAN 2010 4 2013 7 2 2014 8 3 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2014 2 ...2...5...5...6...7 1 LAN SR-M20AP1 / 20AP2...8 1.1 LAN...8 1.2 LAN

More information

LAN

LAN LAN 2003 6 4 LAN Hotel LAN LAN IEEE802.11a IEEE802.11b 802.11b 11Mbps Copyright (c) 2003 NPO Page 3 FREESPOT FREESPOT HOTSPOT NTT ( ) MZONE ( )NTT Mobile ( ) Yahoo! BB ( ) MapFanWeb http://www.mapfan.com/musen/

More information

ISDN を経由した PPP コールバックの設定

ISDN を経由した PPP コールバックの設定 ISDN を経由した PPP コールバックの設定 目次 はじめに前提条件要件使用するコンポーネント表記法背景説明設定ネットワーク図設定確認トラブルシューティングトラブルシューティングのためのコマンドデバッグの出力例関連情報 はじめに このドキュメントでは サービス総合デジタルネットワーク (ISDN) 経由のポイントツーポイントプロトコル (PPP) コールバックの設定例を紹介します コールバックを使用する目的には

More information

untitled

untitled NTT TOP A WAN WAN VRRP NIC OSPF VRRP STP 1. IPv6 IPv6 2. 3. IPv6 1. IPv4 NAT IPv6 1. 2. (IPv4 ) NAT? Unique Local IPv6 Unicast Address /8 /48 /64 /128 7 1 40 16 64 ULA Global ID Interface ID Type Subnet

More information

PPPoE HATS LAN

PPPoE HATS LAN PPPoE HATS LAN 2/26... 4... 5... 7... 9... 10... 13 3/26... 20... 22... 25... 26 4/26 PPPoE ADSL PPPoE ( )AC(Access Concentrator ) NAT 5/26 ( )AC( ) PPPoE AC : AC: Service-Name TAGAC-Name TAG NAT PPP PAP

More information

untitled

untitled FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...

More information

対応するospf configure refreshコマンドまたはbgp configure refreshコマンドが実行されるようにした - 置き換え先のコマンド群にshow status ospfコマンドまたはshow status bgpコマンドが含まれていても ospf configure

対応するospf configure refreshコマンドまたはbgp configure refreshコマンドが実行されるようにした - 置き換え先のコマンド群にshow status ospfコマンドまたはshow status bgpコマンドが含まれていても ospf configure Rev.14.01.32 リリースノート RTX1210 Rev.14.01.29 からの変更点 機能追加 [1] YNO エージェント機能でゼロコンフィグに対応した http://www.rtpro.yamaha.co.jp/rt/docs/yno/agent/index.html 外部仕様書をよくご確認のうえ ご利用ください [2] DHCPv6-PDのIRで取得したDNSサーバーのIPv6アドレスに対して

More information

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN

More information

Solution No アライドテレシスコア スイッチ SBx8100 シリーズで実現実現する WAN 型 u-vcf ソリューション 主な目的 複数ロケーションのネットワークを一極集中管理したい ネットワーク管理 / 運用機構の集約によりランニングコストを抑制したい 各ロケーシ

Solution No アライドテレシスコア スイッチ SBx8100 シリーズで実現実現する WAN 型 u-vcf ソリューション 主な目的 複数ロケーションのネットワークを一極集中管理したい ネットワーク管理 / 運用機構の集約によりランニングコストを抑制したい 各ロケーシ 主な目的 複数ロケーションのネットワークを一極集中管理したい ネットワーク管理 / 運用機構の集約によりランニングコストを抑制したい 各ロケーションにおける現場メンテナンス / リカバリー作業を最小限に抑えたい 概要 AMF(Allied-Telesis Management Framework) とは センターサイトによる複数リモートサイトの一極集中管理によるネットワーク管理 / 運用コスト削減や

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

RT57i 困ったときは

RT57i 困ったときは ? q ISDN / FAX / q q q VoIP q ISDN / FAX / 1 POWER? q 2 ISDN? q 3 q q q FAX q q q q q ISDN q INS q INS q INS 1 POWER? q 2 LAN q 3 q q q q Web q 1 POWER? q 2 LAN? q 3 ISDN ISDN WAN? q ISDN q WAN 4 q q ISDN

More information

アライドテレシス ディストリビューションスイッチ x610シリーズで実現するVRF-Lite + Tagging + EPSR for x610

アライドテレシス ディストリビューションスイッチ x610シリーズで実現するVRF-Lite + Tagging + EPSR for x610 主な目的 IP アドレスが重複した環境を統合したい 各ネットワークのセキュリティを確保したい 運用効率化を図りたい 概要 自治体合併など 個別に稼動していたネットワークを統合する際の課題の一つに IP アドレス体系やネットワークポリシーの見直しがあります しかし IP アドレスを変更することは統合作業の煩雑化やシステムの見直しなど容易ではありません そこで 暫定的にも恒久的にも利用できる VRF-Lite

More information

RT107e 取扱説明書

RT107e 取扱説明書 6 7 113 2 VPN LAN 1 CD-ROM 1 1 1 18 3 IPsec IPIP 36 38 88 99 113 66 76 n CD-ROM q4 3 ...2...3...6...7...7...8...9 DOWNLOAD...10...12 RT107e...14...15...18 1:...20 2:...22 3:...24 4:...28 5:LAN IP...30

More information

2001年12月VPN&ブロードバンドソリューションフォーラム

2001年12月VPN&ブロードバンドソリューションフォーラム /SOHO /SOHO Made in Japan. #1 RT100i 1BRI RT200i 4BRI/8BRI(opt.) RT102i RT140i 2BRI,1LAN RT80i DSU, 1BRI,2TEL 1BRI,2LAN RT140e RT140p 2BRI,1PRI,1LAN RT103i RTA50i 2BRI,2LAN RT140f DSU, 1BRI,3TEL,4HUB

More information

使用説明書

使用説明書 第 6 章 本章では Print Manager Web ブラウザ TELNET を利用して 詳細な設定を行う方法について説明します Print Manager で設定する 総合ユーティリティー Print Manager は 本製品の詳細な設定及び設定内容の変更を行うことができます また リモートでの再起動やプリンターステータスモニターなどの便利な機能をご利用いただくことができます Print Manager

More information

FUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって

FUJITSU Network Si-R Si-Rシリーズ Si-R240B ご利用にあたって P3NK-3892-04Z0 FUJITSU Network Si-R FUJITSU Network Si-R Si-R brin Si-R240B LAN 2009 11 2010 7 2 2010 10 3 2015 1 4 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2015 2 ...2...5...5...5...5...6...7...8...8...11...11...11...11...12...12...12...12...12...13...13...13...14

More information

UsersGuide_INR-HG5497c_.doc

UsersGuide_INR-HG5497c_.doc UPS / Web/SNMP VCCI A Web/SNMP... 1.. WEB...1.. SNMP...1.. NETSHUT...1.. 100BASE-TX...1... 2 Web... 4.....5.....7......7......8......9.. UPS...10... UPS...10...13......14......14...15......17......17..

More information

Northern Lights Server

Northern Lights Server FirstStep Guide Northern Lights Server Intel Management Module (Advanced Module / ISM 8.4) 2 www.nlcomputer.com 1 FirstStep Guide 1.1. INTEL MANAGEMENT MODULE 2... 5 1.2.... 9 1.3.... 10 2.1. BMC...11

More information

Microsoft PowerPoint - Amazon VPCとのVPN接続.pptx

Microsoft PowerPoint - Amazon VPCとのVPN接続.pptx Amazon VPC との VPN 接続マニュアル 2016 年 7 12 NECプラットフォームズ株式会社 Amazon VPC との VPN 接続 UNIVERGE WA シリーズ を使 して Amazon VPC(Amazon Virtual Private Cloud) と IPsec-VPN で接続する際の設定例を紹介します Amazon VPC を利 することにより Amazon AWS(Amazon

More information

iPhone/iPad/Android(TM) とベリサイン アイデンティティプロテクション(VIP)エンタープライズゲートウェイとの組み合わせによるL2TP+IPsecのワンタイムパスワード設定例

iPhone/iPad/Android(TM) とベリサイン  アイデンティティプロテクション(VIP)エンタープライズゲートウェイとの組み合わせによるL2TP+IPsecのワンタイムパスワード設定例 VeriSign VIP VIP + AR VIP VIP AR VPN iphone ipad Apple Inc. iphone Android Google Inc. Copyright 2011 Allied Telesis K.K. All Rights Reserved. VIP AR User Copyright 2011 Allied Telesis K.K. All Rights

More information

ScreenOS Copyright (C) 2005 NOX Co., Ltd. All Rights Reserved. Version1.00

ScreenOS Copyright (C) 2005 NOX Co., Ltd. All Rights Reserved. Version1.00 ScreenOS5.1 17 2 Version1.00 Web Filtering Anti Virus Deep Inspection VoIP H.323 SIP ALG NAT ALG(Application Layer Gateway Multicast QOS DNS PPPoE VPN NetScreen ScreenOS 5.1 ScreenOS 5.1 Web Filtering

More information

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX

More information

I j

I j I j06062 19.5.22 19.5.25 19.5.25 1 1 1 ping 3 2 2 ping 4 3 3 traceroute 5 4 4 netstat 5 4.1 netstat -i............................................. 5 4.2 netstat -r.............................................

More information

Jlspec

Jlspec 1OFF 通常 OFF 通常 2 ON 設定内容の初期化を行う ( 工場出荷状態 ) OFF 通常 3 ON 自己診断 / 設定内容の印字を行う 4OFF 通常 %!PS-Adobe-2.0 /Courier findfont 10 scalefont setfont /LEFT 36 def /TOP 792 def /PITCH 12 def /LF {show /x LEFT def /y

More information

FutureNet NXR,WXR シリーズ設定例集

FutureNet NXR,WXR シリーズ設定例集 FutureNet NXR,WXR シリーズ 設定例集 IPv6 編 Ver 1.0.0 センチュリー システムズ株式会社 目次 目次... 2 はじめに... 3 改版履歴... 4 1. IPv6 ブリッジ設定... 5 1-1. IPv4 PPPoE+IPv6 ブリッジ設定... 6 2. IPv6 PPPoE 設定... 10 2-1. IPv6 PPPoE 接続設定... 11 2-2.

More information

untitled

untitled ICMP 0466-XX-1395 t04000aa@sfc.keio.ac.jp 133.113.215.10 (ipv4) 2001:200:0:8803::53 (ipv6) (FQDN: Fully Qualified Domain Name) ( www.keio.ac.jp 131.113.215.10 /MAC ID 00:11:24:79:8e:82 Port Port = = Port

More information

GA-1190J

GA-1190J GA-1190J 1 1. 2. 3. 4. 2 5. 3 PDF 4 PDF PDF PDF PDF PDF PDF PDF PDF 5 6 ...1...2...4 1...12 2...16...18 3...22 PCL/PS...23 4...26 5...30 ETHERNET...31 TCP/IP...33 IPX/SPX...38 AppleTalk...40 HTTP...42

More information

Users Manual SX Users Manual SX Users Manual SX Users Manual SX Users Manual SX Users Manual SX PC-PB20501 Version 2.X.X Copyright 2005 Ricoh Printing Systems,Ltd. *** Configuration report

More information

IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2

IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 IP 2010 10 1 1 IP (IP ) 2 IP IP 2.1 IP (IP ) 1 IP 2.2 (IP ) IP 2.3 DNS IP IP DNS DNS 3 (PC) PC PC PC Linux(ubuntu) PC TA 2 4 1,2 4.1 (Protocol) IP:Internet Protocol) 4.2 internet The Internet (internet)

More information

コア・スイッチSBx8100 シリーズで実現するスター型冗長コアソリューション

コア・スイッチSBx8100 シリーズで実現するスター型冗長コアソリューション 主な目的 コアスイッチを冗長化し 信頼性を高めたい 可用性が高いスター型ネットワークを構築したい スパニングツリーを用いずに冗長を実現したい 概要 現在 ネットワークは その利便性の高さから公共機関 金融機関 医療機関等の様々なところで利用されております ネットワーク上で扱う情報も非常に重要なものが多く ネットワークが停止した場合には大きな機会損失となることから ネットワークの信頼性を高めることは非常に重要です

More information

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici

More information

ヤマハルーター Web GUI 操作マニュアル

ヤマハルーター Web GUI 操作マニュアル RTX1210 Rev.14.01.11 20163 2.0 JA 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59

More information

2011 I/ 2 1

2011 I/ 2 1 2011 I/ 2 1 ISO 7 layer reference model TCP/IP ISO 7 layer reference model 5 7 2011 I/ 2 2 2011 I/ 2 3 OSI 7 Layer Reference Model 2011 I/ 2 4 Harry Nyquist (1924) Maximum data rate = 2H log 2 V (bits/s)

More information

untitled

untitled osamu@sfc.keio.ac.jp CNS 18 Web http://www.sfc.wide.ad.jp/~three/itbasic05/ 6/6 7/11 1 ls -la t04xxx student -rwxr-xrx three student - rwx r-x r-x Windows GUI UNIX Windows chmod CNS (755) (ug+x) % chmod

More information

perimeter gateway

perimeter gateway Internet Week 2005 T9 CISSP Proxy VPN perimeter gateway OK?? F/+VPN Web MAIL/DNS PC PC PC PC PC NW NW F/W+VPN DMZ F/W NW NW RAS NW DMZ DMZ De-Militarized Zone = DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ

More information

クラウド接続 「Windows Azure」との接続

クラウド接続 「Windows Azure」との接続 クラウド接続 Windows Azure との接続 2013 年 10 月 目次はじめに...3 ネットワーク構成...3 オンプレミス側ネットワーク...3 Windows Azure 側ネットワーク...4 Windows Azure での設定...4 仮想ネットワークの作成...4 ゲートウェイの作成...9 オンプレミス (Si-R) での設定... 11 IPsec 設定項目... 11

More information

IP... 2 IP... 2 IP... 2 IP... 2 VLAN... 3 IP ADD IP IPADDRESS... 5 DELETE IP... 7 PING SETIP SHOW IP IP CentreCOM FS9

IP... 2 IP... 2 IP... 2 IP... 2 VLAN... 3 IP ADD IP IPADDRESS... 5 DELETE IP... 7 PING SETIP SHOW IP IP CentreCOM FS9 ... 2... 2... 2... 2 VLAN... 3... 3... 4... 4 ADD ADDRESS... 5 DELETE... 7 PING.... 8 SET... 10 SHOW... 11 CentreCOM FS900S 1.0.0 1 Internet Protocol 2 Telnet 1. 2. VLAN VLAN default ADD ADDRESS=192.168.10.5

More information

Si-R30Bコマンドリファレンス

Si-R30Bコマンドリファレンス Si-R P3NK-3252-01Z0 30B Si-R30B() [] {} [] [] s() m()h()d() 1m = 1 60s60m24h 1m1h1d 3 3 13 save enable reset save reset save enable reset password delete delete [] show show LAN IP # show lan 0 ip

More information