{"id":1486,"date":"2009-05-20T20:52:20","date_gmt":"2009-05-20T11:52:20","guid":{"rendered":"http:\/\/www.inohome.net\/kuma\/?p=1486"},"modified":"2011-07-05T10:46:33","modified_gmt":"2011-07-05T01:46:33","slug":"rtx1000%e3%81%a7%e3%83%95%e3%83%ac%e3%83%83%e3%83%84%e3%82%b9%e3%82%af%e3%82%a8%e3%82%a2%e3%81%a8pptp%e3%81%a8ipsec%e3%80%82","status":"publish","type":"post","link":"https:\/\/www.inohome.net\/kuma\/blog\/archives\/2009\/05\/post_1486.html","title":{"rendered":"RTX1000\u3067\u30d5\u30ec\u30c3\u30c4\u30b9\u30af\u30a8\u30a2\u3068PPTP\u3068IPsec\u3002"},"content":{"rendered":"<p>\u203b\u67d0\u5927\u624bIT\u4f01\u696d\u5185\u304b\u3089\u3082\u30a2\u30af\u30bb\u30b9\u3044\u305f\u3060\u3044\u3066\u3044\u308b\u3001<br \/>\n\u5f53\u30b5\u30a4\u30c8\u306e\u4eba\u6c17\u8a18\u4e8b\u3067\u3059\uff57<br \/>\n\u3000<br \/>\nRTX1000\u3067\u306a\u3093\u3067\u3082\u3084\u308d\u3046\u3002\u3068\u3002<br \/>\n\u300c\u696d\u52d9\u7528\u6a5f\u3060\u3057\u3001\u4ed5\u4e8b\u304c\u51fa\u6765\u308c\u3070\u3088\u304f\u306d\uff1f\u300d\u3068\u3044\u3046\u3084\u308b\u6c17\u306e\u306a\u3044\u4eba\u5acc\u3044\u3067\u3059\uff57<br \/>\n\u3000<br \/>\n\u624b\u5143\u306b\u3042\u308b\u3093\u3060\u3057\uff57\u306a\u3093\u3067\u3082\u3084\u3089\u305b\u3088\u3046\uff57\u8ca7\u4e4f\u3060\u3057\uff57\uff57\uff57<br \/>\n\u305b\u3063\u304b\u304f\u8cb7\u3063\u305fRTX1000\u4f7f\u3044\u5207\u308bZE!\u3068\u8a00\u3046<br \/>\n\u71b1\u3044\u8af8\u6c0f\u306b\u4ffa\u306eConfig\u3092\u30d7\u30ec\u30bc\u30f3\u30c8\u3002<br \/>\n\u3000<br \/>\n\u3053\u308c\u3092RTX1000\u306b\u30d6\u30c1\u3053\u3093\u3067Heaven\u6c17\u5206\u306b\u3002<br \/>\nRTX1100,RTX1200\u3067\u3082\u52d5\u4f5c\u3057\u3066\u3044\u308b\u3002<br \/>\n\u6700\u4f4e\u9650\u306e\u8a2d\u5b9a\u306b\u7559\u3081\u3066\u3044\u308bconfig\u306a\u306e\u3067\u3001\u3046\u307e\u304f\u3044\u304b\u306a\u304f\u3066\u3082\u3001<br \/>\n\u5909\u306a\u30dd\u30fc\u30c8\u304c\u7a7a\u3044\u3066\u3044\u3066\u554f\u984c\u304c\u8d77\u304d\u3066\u3082\u8cac\u4efb\u3082\u3061\u307e\u305b\u3093\u3002<br \/>\n\u3000<br \/>\n\u203b\u7b46\u8005\u306f\u4ed5\u4e8b\u3067\u30e4\u30de\u30cf\u30eb\u30fc\u30bf\u30fc\u3092\u4f7f\u3063\u3066\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u69cb\u7bc9\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002<br \/>\n\u4f9d\u983c\u3092\u304a\u8003\u3048\u306e\u5834\u5408\u306f\u3001<a href=\"http:\/\/www.inohome.net\/kuma\/inquiry\/\">\u304a\u554f\u3044\u5408\u308f\u305b\u4e0b\u3055\u3044\u3002<\/a>\u3000<br \/>\n\u3000<br \/>\n\u25cf\u5984\u60f3\u8a2d\u5b9a\u306f<br \/>\n192.168.11.1\u304cLAN1(\u5b85\u5185LAN\u5074)<br \/>\nLAN2\u304cWAN\u5074(ONU\u306a\u308aCTU\u306a\u308aADSL\u30e2\u30c7\u30e0\u3078)<br \/>\nLAN3\u306f\u4f55\u3082\u4f7f\u308f\u306a\u3044\u3002<br \/>\nPPTP\u30921\u63a5\u7d9a\u3068IPsec\u30921\u63a5\u7d9a\u3002<br \/>\nVPN\u307e\u308f\u308a\u306f\u659c\u4f53\u306b\u3057\u3066\u304a\u3044\u305f\u306e\u3067\u8981\u3089\u306a\u3051\u308c\u3070\u629c\u3044\u3066\u3002<br \/>\n\u3000<br \/>\n\u25cf\u5b9f\u73fe\u3067\u304d\u308b\u6a5f\u80fd<br \/>\n\u30fb\u30d5\u30ec\u30c3\u30c4\u30b9\u30af\u30a8\u30a2 <a href=\"http:\/\/www.flets\/\">http:\/\/www.flets\/<\/a> \u3082\u5f53\u7136\u898b\u308c\u308b\u3002<br \/>\n\u30fb\u30d5\u30ec\u30c3\u30c4\u30b9\u30af\u30a8\u30a2v6 <a href=\"http:\/\/www.flets-v6.jp\/\">http:\/\/www.flets-v6.jp\/<\/a> \u3082\u898b\u308c\u308b\u3002<br \/>\n\u30fb\u3082\u3061\u308d\u3093UPnP\u3082\u30b5\u30dd\u30fc\u30c8\uff01<br \/>\n\u30fbPPTP\u30b5\u30dd\u30fc\u30c8<br \/>\n\u3000<br \/>\n\u25cf\u74b0\u5883\u5225\u8a2d\u5b9a<br \/>\nip filter 101091 pass * 192.168.11.150 tcp * www<br \/>\nip filter 101092 pass * 192.168.11.150 tcp * 21<br \/>\nip filter 101093 pass * 192.168.11.150 tcp * 22<br \/>\nip filter 101094 pass * 192.168.11.150 tcp * 5900<br \/>\nnat descriptor masquerade static 1 1 192.168.11.150 tcp 21<br \/>\nnat descriptor masquerade static 1 2 192.168.11.150 tcp www<br \/>\nnat descriptor masquerade static 1 3 192.168.11.150 tcp 22<br \/>\nnat descriptor masquerade static 1 4 192.168.11.150 tcp 5900<br \/>\n\u4e0a\u8a18\u8a2d\u5b9a\u306f\u3053\u306e192.168.11.150\u3067\u30b5\u30fc\u30d0\u30fc\u3092\u7acb\u3066\u3066\u3044\u308b\u304b\u3089\u3002<br \/>\n\u30d5\u30a3\u30eb\u30bf\u306b\u7a74\u3092\u7a7a\u3051\u3066\u9759\u7684IP\u30de\u30b9\u30ab\u30ec\u30fc\u30c9\u3057\u3066\u3044\u308b\u3002\u4e0d\u8981\u306a\u5834\u5408\u306f\u524a\u9664\u3057\u3066\u304f\u308c\u3002<br \/>\n\u3000<br \/>\n\u25cfNetvolante-DNS\u30b5\u30fc\u30d3\u30b9\u306e\u8a2d\u5b9a\u306f<a href=\"http:\/\/www.inohome.net\/kuma\/blog\/archives\/2009\/07\/post_1548.html\">\u3053\u3061\u3089<\/a><br \/>\n\u4e2d\u53e4\u3067\u30b2\u30ed\u5b89\u3067\u8cb7\u3063\u305f\u30e6\u30fc\u30b6\u30fc\u306b\u3082\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u304f\u308c\u308b\u30e4\u30de\u30cf\u306f\u795e\u3060\u3068\u601d\u3046\u3002<br \/>\n\u30cb\u30b3\u30f3\u7f8a\u7fb9\u3092\u9001\u308a\u305f\u3044\u3088\u3002<br \/>\n\u3000<br \/>\n\u25cf\u3053\u306eConfig\u3092\u5165\u308c\u305fRTX\u3092\u8d77\u52d5\u3057\u305f\u5f8c\u306e\u6d41\u308c\u3068\u3057\u3066<br \/>\n\uff11\uff0ePPPoE\u3092\u3057\u3066\u63a5\u7d9a<br \/>\n\u63a5\u7d9a\u3057\u3066\u3044\u305f\u30eb\u30fc\u30bf\u30fc\u3092disconnect\u305b\u305a\u306b\u629c\u3044\u305f\u3089\u63a5\u7d9a\u78ba\u7acb\u307e\u3067\uff11\uff10\u5206\u3050\u3089\u3044\u639b\u304b\u308b\u304b\u3082\u3002<br \/>\nONU\u3084CTU\u3084ADSL\u30e2\u30c7\u30e0\u3082\u96fb\u6e90\u5165\u308c\u76f4\u3057\u305f\u65b9\u304c\u5409\u3002<br \/>\nCATV\u3084\u885b\u661f\u30d6\u30ed\u30fc\u30c9\u30d0\u30f3\u30c9\u30b5\u30fc\u30d3\u30b9\u306f\u63a5\u7d9a\u6a5f\u5668\u306eMAC\u30a2\u30c9\u30ec\u30b9\u306b\u5bfe\u3057\u3066IP\u30a2\u30c9\u30ec\u30b9\u3092\u632f\u3063\u3066\u3044\u308b\u5834\u5408\u304c\u591a\u3044\u306e\u3067\u305d\u306e\u5834\u5408\u306f\u30b1\u30fc\u30d6\u30eb\u30e2\u30c7\u30e0\u304bIDU\/iCON\u306e\u96fb\u6e90\u3092\u5207\u308a\u5165\u308a\u3057\u3066\u518d\u8d77\u52d5\u3002<br \/>\n\uff12\uff0eNetvolante-DNS\u30b5\u30fc\u30d3\u30b9\u3067\u30c0\u30a4\u30ca\u30df\u30c3\u30afDNS\u306bIP\u30a2\u30c9\u30ec\u30b9\u3092\u7533\u544a\u3002<br \/>\n\u4ee5\u5f8c*****netvolante.jp\u30a2\u30c9\u30ec\u30b9\u3067\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308b\u3002<br \/>\n\u7121\u6599\u30b5\u30fc\u30d3\u30b9\u306a\u306e\u3067\u3082\u3057\u904b\u60aa\u304f\u843d\u3061\u3066\u3044\u3066\u3082\u6587\u53e5\u306f\u8a00\u3046\u306a\u3002<br \/>\n\u307b\u3068\u3093\u3069\u843d\u3061\u3066\u3044\u306a\u3044\u3051\u3069\u3002\u307b\u3093\u3068\u30e4\u30de\u30cf\u306f\u795e\u3060\u3002<br \/>\n\uff13\uff0ePPTP\u63a5\u7d9a\u5f85\u3061\u53d7\u3051\u958b\u59cb\u3002\u3002<br \/>\n\uff14\uff0eIPsec\u63a5\u7d9a\u3092\u76f8\u624b\u69d8\u306b\u5411\u304b\u3063\u3066\u958b\u59cb\u3002<br \/>\n\u4ee5\u4e0b\u306eConfig\u3067\u306f<br \/>\n\u76f8\u624b\u69d8\u304c192.168.1.xxx\u30a2\u30c9\u30ec\u30b9\u4f53\u7cfb\u306a\u306e\u3067\u30c7\u30d5\u30a9\u30eb\u30c8\u30eb\u30fc\u30c8\u306b<br \/>\nip route 192.168.1.0\/24 gateway tunnel 2<br \/>\n\u3092\u8ffd\u52a0\u3002192.168.1.xxx\u5b9b\u306e\u901a\u4fe1\u3092tunnel2\u7d4c\u7531\u3068\u3059\u308b\u3002<br \/>\n\u76f8\u624b\u69d8\u306eRTX\u3082\u540c\u3058\u8a2d\u5b9a\u3057\u3066\u3053\u3061\u3089\u306eDDNS\u30a2\u30c9\u30ec\u30b9\u306b\u8a2d\u5b9a\u3059\u308c\u3070IPsec\u3081\u3067\u305f\u304f\u63a5\u7d9a\u3002<br \/>\n\u5927\u4f53PPPoE\u78ba\u7acb\u5f8c\uff12\u5206\u3050\u3089\u3044\u3067\u7e4b\u304c\u308b<br \/>\n\u3000<br \/>\n\u6ce8\u3001ip route\u306e220.210\u301c\u30a2\u30c9\u30ec\u30b9\u306f\u30d5\u30ec\u30c3\u30c4\u30b9\u30af\u30a8\u30a2(\u307f\u304b\u304b\u6771\u65e5\u672c)\u7528\u3002<br \/>\n\u5f53\u8a72\u5730\u57df\u4ee5\u5916\u306f\u9069\u5b9c\u5909\u66f4\u3088\u308d\u3057\u304f\u3002<br \/>\n\u3000<br \/>\n\u25cf\u3069\u3046\u3084\u3063\u3066config\u5165\u308c\u308b\u306e\uff1f<br \/>\n\u30e1\u30e2\u5e33\u306a\u3069\u3067\u7de8\u96c6\u3057\u3066tftp\u3067rtx\u306b\u9001\u308b\u306e\u304c\u697d\u3061\u3093\u3067\u826f\u3044\u3002<br \/>\nRTX1000\u30841100\u306f\u521d\u671f\u5316\u72b6\u614b\u3067\u306fIP\u30a2\u30c9\u30ec\u30b9\u3092\u6301\u3063\u3066\u3044\u306a\u3044\u3002<br \/>\n<a href=\"http:\/\/www.inohome.net\/kuma\/blog\/archives\/2006\/12\/post_606.html\">\u62d9\u8457RTX1000\u306b\u6311\u6226\u300c\uff11\u30fb\uff12\u30fb\uff13\u300d<\/a>\u3092\u8aad\u3093\u3067IP\u30a2\u30c9\u30ec\u30b9\u3092LAN1\u306b\u8a2d\u5b9a\u3057\u3001\u30d5\u30a1\u30fc\u30e0\u30a6\u30a8\u30a2\u3092\u6700\u65b0\u306b\u3057\u3001tftp\u306e\u65b9\u6cd5\u3082\u89e3\u8aac\u3057\u3066\u3044\u308b\u306e\u3067\u305d\u3063\u3061\u3092\u307e\u305a\u8aad\u3093\u3067\u6b32\u3057\u3044\u3002<br \/>\n\u3000<br \/>\n\u3000<br \/>\n\u3000<br \/>\n#\tRTX1000 Rev.8.01.28 (Mon Aug  4 17:13:15 2008)<br \/>\n#\t\tMAC Address :<br \/>\n#\t\tMemory 16Mbytes, 3LAN, 1BRI<br \/>\n#\t\tmain:  RTX1000 ver=b0 serial=<br \/>\n#<br \/>\n\u3000<br \/>\n# If you want to clear ALL configuration to default,<br \/>\n#  remove `#&#8217; of next line.<br \/>\n\u3000<br \/>\nclear configuration\u3000<strong>\uff08\u307e\u305a\u30b3\u30f3\u30d5\u30a3\u30b0\u98db\u3070\u3055\u306a\u3044\u3068\u65e2\u5b58\u306b\u30de\u30fc\u30b8\u3055\u308c\u308b\u306e\u3067\u30a8\u30e9\u3044\u3053\u3068\u306b\u306a\u308b\uff09<\/strong><br \/>\n\u3000<br \/>\n#<br \/>\n# System configuration<br \/>\n#<br \/>\n\u3000<br \/>\nlogin password <strong>\u30ed\u30b0\u30a4\u30f3\u30d1\u30b9\u30ef\u30fc\u30c9<\/strong><br \/>\nadministrator password <strong>\u7ba1\u7406\u8005\u30d1\u30b9\u30ef\u30fc\u30c9<\/strong><br \/>\nsecurity class 2 on on<br \/>\n\u3000<br \/>\n#<br \/>\n# IP configuration<br \/>\n#<br \/>\n\u3000<br \/>\nip route default gateway pp 1<br \/>\nip route 192.168.1.0\/24 gateway tunnel 2<br \/>\nip route 220.210.194.0\/25 gateway pp 2<br \/>\nip route 220.210.195.0\/26 gateway pp 2<br \/>\nip route 220.210.195.64\/26 gateway pp 2<br \/>\nip route 220.210.196.0\/25 gateway pp 2<br \/>\nip route 220.210.196.128\/26 gateway pp 2<br \/>\nip route 220.210.197.0\/25 gateway pp 2<br \/>\nip route 220.210.198.0\/26 gateway pp 2<br \/>\nip route 220.210.199.32\/27 gateway pp 2<br \/>\nip route 220.210.199.64\/28 gateway pp 2<br \/>\nip route 220.210.199.144\/28 gateway pp 2<br \/>\nip route 220.210.199.160\/27 gateway pp 2<br \/>\nip route 220.210.199.192\/27 gateway pp 2<br \/>\nip route 220.210.199.200\/29 gateway pp 2<br \/>\n<em>ip route 192.168.1.0\/24 gateway tunnel 2<\/em>\uff08\u3053\u3053\u3067192.168.1.xxx\u306a\u8981\u6c42\u306ftunnel2\u306eIPsec\u306b\u6d41\u308c\u308b\u3088\u3046\u306b\u3057\u3066\u3044\u308b\uff09<br \/>\n\u3000<br \/>\n#<br \/>\n# IPv6 configuration<br \/>\n#<br \/>\n\u3000<br \/>\nipv6 prefix 1 ra-prefix@lan2::\/64<strong>\uff08IPv6\u3092\u53d7\u3051\u6d41\u3059\u8a2d\u5b9a\uff09<\/strong><br \/>\n\u3000<br \/>\n#<br \/>\n# LAN configuration<br \/>\n#<br \/>\n\u3000<br \/>\nip lan1 address 192.168.11.1\/24<br \/>\nip lan1 proxyarp on<br \/>\nipv6 lan1 address ra-prefix@lan2::1\/64<strong>\uff08\u3053\u3053\u304b\u3089\uff14\u884cIPv6\u3092\u53d7\u3051\u6d41\u3059\u8a2d\u5b9a\uff09<\/strong><br \/>\nipv6 lan1 rtadv send 1<br \/>\nipv6 lan1 mld router<br \/>\nipv6 lan2 mld host<br \/>\n\u3000<br \/>\n#<br \/>\n# ISDN configuration<br \/>\n#<br \/>\n\u3000<\/p>\n<p>### BRI 1 ###<br \/>\n\u3000<br \/>\n\u3000<br \/>\n#<br \/>\n# PP configuration<br \/>\n#<br \/>\n\u3000<br \/>\npp disable all<br \/>\n\u3000<br \/>\n### PP 1 ###<br \/>\n\u3000<br \/>\npp select 1<br \/>\n pp keepalive use lcp-echo<br \/>\n pp always-on on<br \/>\n pppoe use lan2<br \/>\n pppoe auto connect on<br \/>\n pppoe auto disconnect off<br \/>\n pp auth accept pap chap<br \/>\n pp auth myname <strong>PPPoE\u63a5\u7d9aID \u30d1\u30b9\u30ef\u30fc\u30c9<\/strong><br \/>\n ppp lcp mru on 1454<br \/>\n ppp ipcp ipaddress on<br \/>\n ppp ipcp msext on<br \/>\n ppp ccp type none<br \/>\n ppp ipv6cp use off<br \/>\n ip pp mtu 1454<br \/>\n  ip pp secure filter in 101000 101001 101002 101003 101020 101021 101022 101023 101024 101025 101030 101032 101080 101081 101082 101083 101091 101092 101093 101094<br \/>\n ip pp secure filter out 101010 101011 101012 101013 101020 101021 101022 101023 101024 101025 101099 101080 101081 101082 101083 dynamic 101190 101191 101192 101193 101194 101195 101196<br \/>\n ip pp intrusion detection in on reject=on\uff08\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u906e\u65ad\u3001\u5165\u308a\u65b9\u5411\u306e\u307f\uff09<br \/>\n ip pp nat descriptor 1<br \/>\n <em>netvolante-dns hostname host pp <strong>\u53d6\u5f97\u3057\u3066\u306d.aa0.netvolante.jp<\/strong><\/em><br \/>\n pp enable 1<br \/>\n\u3000<br \/>\n### PP 2 ###<br \/>\n\u3000<br \/>\npp select 2<br \/>\n pp always-on on<br \/>\n pppoe use lan2<br \/>\n pppoe auto connect on<br \/>\n pppoe auto disconnect off<br \/>\n pp auth accept pap chap<br \/>\n pp auth myname guest@flets guest<br \/>\n ppp lcp mru on 1454<br \/>\n ppp ipcp ipaddress on<br \/>\n ppp ipcp msext on<br \/>\n ppp ccp type none<br \/>\n ip pp mtu 1454<br \/>\n ip pp nat descriptor 2<br \/>\n pp enable 2<br \/>\n\u3000<br \/>\n### PP anonymous ###<br \/>\n\u3000<br \/>\npp select anonymous<br \/>\n pp bind tunnel1<br \/>\n pp auth request mschap<br \/>\n pp auth username <strong>PPTP\u63a5\u7d9a\u30e6\u30fc\u30b6\u30fc\u540d \u30d1\u30b9\u30ef\u30fc\u30c9\uff08\u4efb\u610f\uff09<\/strong><br \/>\n ppp ccp type mppe-any<br \/>\n ip pp remote address pool 192.168.11.160-192.168.11.170<br \/>\n pptp service type server<br \/>\n pp enable anonymous<br \/>\n\u3000<br \/>\n#<br \/>\n# TUNNEL configuration<br \/>\n#<br \/>\n\u3000<br \/>\ntunnel disable all<br \/>\n\u3000<br \/>\n### TUNNEL 1 ###<br \/>\n\u3000<br \/>\ntunnel select 1<br \/>\n tunnel encapsulation pptp<br \/>\n pptp tunnel disconnect time 1200<br \/>\n pptp keepalive use off<br \/>\n tunnel enable 1<br \/>\n\u3000<br \/>\n### TUNNEL 2 ###<br \/>\n\u3000<br \/>\ntunnel select 2<br \/>\n tunnel name IPsec-ydc<br \/>\n ipsec tunnel 101<br \/>\n  ipsec sa policy 101 1 esp 3des-cbc sha-hmac<br \/>\n  ipsec ike keepalive log 1 off<br \/>\n  ipsec ike keepalive use 1 on icmp-echo <strong>\u76f8\u624b\u69d8\u30eb\u30fc\u30bf\u30fc\u30ed\u30fc\u30ab\u30eb\u30a2\u30c9\u30ec\u30b9<\/strong> 5 3<br \/>\n  ipsec ike always-on 1 on<br \/>\n  ipsec ike local address 1 ipcp pp 1<br \/>\n  ipsec ike pre-shared-key 1 text <strong>\u30d1\u30b9\u30ef\u30fc\u30c9\u3001\u4e8b\u524d\u5171\u6709\u9375\u3063\u3066\u3084\u3064\u3067\u3059\u3002<\/strong><br \/>\n  ipsec ike remote address 1 <strong>\u76f8\u624b\u69d8.aa0.netvolante.jp<\/strong><br \/>\n ip tunnel tcp mss limit auto<br \/>\n tunnel enable 2<br \/>\n<\/em><br \/>\n\u3000<br \/>\n#<br \/>\n# IP filter configuration<br \/>\n#<br \/>\n\u3000<br \/>\nip filter 100000 reject * * udp,tcp 135 *<br \/>\nip filter 100001 reject * * udp,tcp * 135<br \/>\nip filter 100002 reject * * udp,tcp netbios_ns-netbios_dgm *<br \/>\nip filter 100003 reject * * udp,tcp * netbios_ns-netbios_dgm<br \/>\nip filter 100004 reject * * udp,tcp netbios_ssn *<br \/>\nip filter 100005 reject * * udp,tcp * netbios_ssn<br \/>\nip filter 100006 pass * * udp,tcp 445 *<br \/>\nip filter 100007 pass * * udp,tcp * 445<br \/>\nip filter 100099 pass * * * * *<br \/>\nip filter 101000 reject 10.0.0.0\/8 * * * *<br \/>\nip filter 101001 reject 172.16.0.0\/12 * * * *<br \/>\nip filter 101002 reject 192.168.0.0\/16 * * * *<br \/>\nip filter 101003 reject 192.168.11.0\/24 * * * *<br \/>\nip filter 101010 reject * 10.0.0.0\/8 * * *<br \/>\nip filter 101011 reject * 172.16.0.0\/12 * * *<br \/>\nip filter 101012 reject * 192.168.0.0\/16 * * *<br \/>\nip filter 101013 reject * 192.168.11.0\/24 * * *<br \/>\nip filter 101020 reject * * udp,tcp 135 *<br \/>\nip filter 101021 reject * * udp,tcp * 135<br \/>\nip filter 101022 reject * * udp,tcp netbios_ns-netbios_ssn *<br \/>\nip filter 101023 reject * * udp,tcp * netbios_ns-netbios_ssn<br \/>\nip filter 101024 reject * * udp,tcp 445 *<br \/>\nip filter 101025 reject * * udp,tcp * 445<br \/>\nip filter 101030 pass * * icmp * *<br \/>\nip filter 101032 pass * * tcp * ident<br \/>\nip filter 101034 pass * * tcp,udp * domain<br \/>\nip filter 101080 pass * * tcp * 1723<br \/>\nip filter 101081 pass * * gre * *<br \/>\nip filter 101082 pass * * udp * 500<br \/>\nip filter 101083 pass * * esp * *<br \/>\nip filter 101091 pass * 192.168.11.150 tcp * www<br \/>\nip filter 101092 pass * 192.168.11.150 tcp * 21<br \/>\nip filter 101093 pass * 192.168.11.150 tcp * 22<br \/>\nip filter 101094 pass * 192.168.11.150 tcp * 5900<br \/>\nip filter 101099 pass * * * * *<br \/>\n\u3000<br \/>\n#<br \/>\n# IP dynamic filter configuration<br \/>\n#<br \/>\n\u3000<br \/>\nip filter dynamic 101190 * * ftp<br \/>\nip filter dynamic 101191 * * domain<br \/>\nip filter dynamic 101192 * * www<br \/>\nip filter dynamic 101193 * * smtp<br \/>\nip filter dynamic 101194 * * pop3<br \/>\nip filter dynamic 101195 * * tcp<br \/>\nip filter dynamic 101196 * * udp<br \/>\n\u3000<br \/>\n#<br \/>\n# NAT Descriptor configuration<br \/>\n#<br \/>\n\u3000<br \/>\nnat descriptor type 1 masquerade<br \/>\nnat descriptor masquerade static 1 1 192.168.11.150 tcp 21<br \/>\nnat descriptor masquerade static 1 2 192.168.11.150 tcp www<br \/>\nnat descriptor masquerade static 1 3 192.168.11.150 tcp 22<br \/>\nnat descriptor masquerade static 1 4 192.168.11.150 tcp 5900<br \/>\n<em>nat descriptor masquerade static 1 6 192.168.11.1 tcp 1723<br \/>\nnat descriptor masquerade static 1 7 192.168.11.1 gre<br \/>\nnat descriptor masquerade static 1 8 192.168.11.1 esp<br \/>\nnat descriptor masquerade static 1 9 192.168.11.1 udp 500<\/em><br \/>\n\u3000<br \/>\n#<br \/>\n# IPSEC configuration<br \/>\n#<br \/>\n\u3000<br \/>\n<em>ipsec auto refresh on<\/em><br \/>\n\u3000<br \/>\n#<br \/>\n# IPv6 filter configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# IPv6 dynamic filter configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# Queueing configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# SYSLOG configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# TFTP configuration<br \/>\n#<br \/>\n\u3000<br \/>\ntftp host any<br \/>\n\u3000<br \/>\n#<br \/>\n# TELNETD configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# DHCP configuration<br \/>\n#<br \/>\n\u3000<br \/>\ndhcp service server<br \/>\ndhcp server rfc2131 compliant except remain-silent<br \/>\ndhcp scope 1 192.168.11.100-192.168.11.149\/24<br \/>\n\u3000<br \/>\n#<br \/>\n# DHCPC configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# DNS configuration<br \/>\n#<br \/>\n\u3000<br \/>\ndns service recursive<br \/>\ndns server pp 2<br \/>\ndns server select 100001 pp 2 any flets<br \/>\ndns server select 500001 pp 1 any . restrict pp 1<br \/>\ndns server select 500002 pp 2 any . restrict pp 2<br \/>\ndns private address spoof on<br \/>\n\u3000<br \/>\n#<br \/>\n# WINS configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# SNMP configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# Schedule configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# TCP configuration<br \/>\n#<br \/>\n\u3000<br \/>\n<em>pptp service on<\/em><br \/>\n\u3000<br \/>\n#<br \/>\n# HTTPD configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# Netvolante DNS configuration<br \/>\n#<br \/>\n\u3000<br \/>\n#<br \/>\n# UPnP configuration<br \/>\n#<br \/>\n\u3000<br \/>\nupnp use on<br \/>\nupnp external address refer pp 1<br \/>\n\u3000<br \/>\n#<br \/>\n# Status Notify configuration<br \/>\n#<br \/>\n\u3000<\/p>\n<p># If you want to save configuration to Nonvolatile memory,<br \/>\n#  remove `#&#8217; of next line.<br \/>\n\u3000<br \/>\nsave<strong>\uff08NVRAM\uff08\u4e0d\u63ee\u767a\u30e1\u30e2\u30ea\uff09\u306bConfig\u3092\u66f8\u304d\u8fbc\u3080\u3002save\u306e\u982d\u306b#\u5165\u3063\u3066\u3044\u308b\u3068\u96fb\u6e90\u5207\u308b\u3068config\u98db\u3076\u3088\uff09<\/strong><br \/>\n\u3000<br \/>\n\u3000<br \/>\n\u3000<br \/>\n\u306f\u3044\u3002\u3053\u3053\u307e\u3067\u3002<br \/>\n\u3000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u203b\u67d0\u5927\u624bIT\u4f01\u696d\u5185\u304b\u3089\u3082\u30a2\u30af\u30bb\u30b9\u3044\u305f\u3060\u3044\u3066\u3044\u308b\u3001 \u5f53\u30b5\u30a4\u30c8\u306e\u4eba\u6c17\u8a18\u4e8b\u3067\u3059\uff57 \u3000 RTX1000\u3067\u306a\u3093\u3067\u3082\u3084\u308d\u3046\u3002\u3068\u3002 \u300c\u696d\u52d9\u7528\u6a5f\u3060\u3057\u3001\u4ed5\u4e8b\u304c\u51fa\u6765\u308c\u3070\u3088\u304f\u306d\uff1f\u300d\u3068\u3044\u3046\u3084\u308b\u6c17\u306e\u306a\u3044\u4eba\u5acc\u3044\u3067\u3059\uff57 \u3000 \u624b\u5143\u306b\u3042\u308b\u3093\u3060\u3057\uff57\u306a\u3093\u3067\u3082 &hellip; <a href=\"https:\/\/www.inohome.net\/kuma\/blog\/archives\/2009\/05\/post_1486.html\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;RTX1000\u3067\u30d5\u30ec\u30c3\u30c4\u30b9\u30af\u30a8\u30a2\u3068PPTP\u3068IPsec\u3002&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1486","post","type-post","status-publish","format-standard","hentry","category-4"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/posts\/1486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/comments?post=1486"}],"version-history":[{"count":0,"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/posts\/1486\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/media?parent=1486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/categories?post=1486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inohome.net\/kuma\/wp-json\/wp\/v2\/tags?post=1486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}