{"id":14044,"date":"2017-04-29T19:52:25","date_gmt":"2017-04-29T10:52:25","guid":{"rendered":"https:\/\/sys-guard.com\/?p=14044"},"modified":"2017-06-22T11:30:55","modified_gmt":"2017-06-22T02:30:55","slug":"rtx1100-%e3%81%a7aws-vpc%e3%81%abvpn%e6%8e%a5%e7%b6%9a-%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%81%ab%e9%96%8b%e7%99%ba%e7%92%b0%e5%a2%83%e3%82%92%e4%bd%9c%e3%82%8d%e3%81%86","status":"publish","type":"post","link":"https:\/\/sys-guard.com\/post-14044\/","title":{"rendered":"RTX1100 \u3067AWS VPC\u306bVPN\u63a5\u7d9a \u30af\u30e9\u30a6\u30c9\u306b\u958b\u767a\u74b0\u5883\u3092\u4f5c\u308d\u3046"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14047\" src=\"https:\/\/sys-guard.com\/contents\/wp-content\/uploads\/2017\/04\/VPN_Basic_Diagram.png\" alt=\"\" width=\"688\" height=\"391\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>\u82e5\u8005\u306eRTX1200\u96e2\u308c\u3002<\/p>\n<p>\u305d\u306e\u5bfe\u7b56\u3068\u3057\u3066\u767a\u58f2\u3055\u308c\u305f\uff1fRTX1210\u304c\u4e2d\u5c0f\u30aa\u30d5\u30a3\u30b9\u306e\u8907\u6570\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u6848\u4ef6\u3067\u5927\u6d3b\u8e8d\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u305d\u3093\u306a\u4eca\u56de\u306fAWS\u306b\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u3059\u308bRTX1100\u30eb\u30fc\u30bf\u306e\u8a2d\u5b9a\u3092\u3054\u7d39\u4ecb\u3002RTX1210\u306f<span style=\"text-decoration: underline;\"><span style=\"color: #3366ff;\"><a style=\"color: #3366ff; text-decoration: underline;\" href=\"http:\/\/kakaku.com\/item\/K0000692058\/\" target=\"_blank\">70,000\u5186<\/a><\/span><\/span>\u3067\u3059\u304c\u3001\u4e2d\u53e4\u306eRTX1100\u306a\u30893,000\u5186\u7a0b\u3067\u8cfc\u5165\u53ef\u80fd\uff01CUI\u3067\u8a2d\u5b9a\u3057\u3066\u3044\u304f\u4e2d\u5c0f\u4f01\u696d\u5411\u3051\u30eb\u30fc\u30bf\u3067\u3059\u304c\u3001\u305d\u306e\u5206\u697d\u3057\u3081\u308b\u306f\u305a\u3002<span style=\"font-size: 70%;\">(\u203b\u57f7\u7b46\u65e5:2017\u5e7404\u670829\u65e5)<\/span><\/p>\n<p>\u307e\u305fAWS\u3060\u3051\u3067\u306a\u304f\u3001VyOS\u3092\u5229\u7528\u3059\u308b\u3053\u3068\u3067IDCF\u306a\u3069\u4ed6\u30af\u30e9\u30a6\u30c9\u3067\u3082\u5229\u7528\u3059\u308b\u3053\u3068\u3082\u51fa\u6765\u307e\u3059\u3002<\/p>\n<h2>\u793e\u5185\u306b\u30b5\u30fc\u30d0\u304c\u3044\u3089\u306a\u304f\u306a\u308b\uff01\uff1f\u00a0\u793e\u5185LAN\u306e\u30af\u30e9\u30a6\u30c9\u5316<\/h2>\n<p>\u30aa\u30d5\u30a3\u30b9\u306e\u30eb\u30fc\u30bf\u3068\u30af\u30e9\u30a6\u30c9\u3092\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u3067\u7e4b\u3050\u3068\u4f55\u304c\u3067\u304d\u308b\u306e\u3067\u3057\u3087\u3046\u304b\u3002<\/p>\n<ul>\n<li><strong>\u30aa\u30d5\u30a3\u30b9\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u62e1\u5f35<br \/>\n<\/strong>Active Directory BDC\u3084\u30d5\u30a1\u30a4\u30eb\u30b5\u30fc\u30d0\u306e\u8a2d\u7f6e\u306a\u3069\u3001\u30af\u30e9\u30a6\u30c9\u3068\u793e\u5185\u306e\u57a3\u6839\u304c\u306a\u304f\u306a\u308a\u307e\u3059\u3002<\/li>\n<li><strong>\u958b\u767a\u30d9\u30f3\u30c0\u30fc\u3068\u5171\u6709\u3059\u308b\u958b\u767a\u74b0\u5883<\/strong><\/li>\n<li><strong>\u30ea\u30e2\u30fc\u30c8\u30ef\u30fc\u30ab\u30fc\u3078\u306e\u30ef\u30fc\u30af\u30b9\u30da\u30fc\u30b9\u63d0\u4f9b<\/strong><\/li>\n<li><strong>\u30af\u30e9\u30a6\u30c9\u3068\u7269\u7406\u306e\u9023\u643a<\/strong><br \/>\n\u30af\u30e9\u30a6\u30c9\u306eWEB\u30b5\u30fc\u30d0\u306e\u793e\u5185\u306e\u7269\u7406DB\u30b5\u30fc\u30d0\u3068\u306e\u9023\u643a\u306a\u3069\u3002\u5916\u306b\u6652\u3059\u5fc5\u8981\u306e\u306a\u3044DB\u30b5\u30fc\u30d0\u3092\u76f4\u63a5\u5916\u90e8\u306b\u6652\u3055\u306a\u3044\u306e\u3067\u30bb\u30ad\u30e5\u30a2\u306a\u8a2d\u8a08\u306b\u306a\u308a\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>\u4e0a\u8a18\u306e\u3088\u3046\u306a\u4f7f\u3044\u65b9\u306f\u4e00\u822c\u7684\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u306b\u3088\u308b\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u3092\u884c\u3048\u3070\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u304b\u3089\u6bce\u56de\u30af\u30e9\u30a6\u30c9\u306bVPN\u63a5\u7d9a\u3059\u308b\u3068\u3044\u3046\u624b\u9593\u304c\u306a\u304f\u306a\u308a\u3001\u30aa\u30d5\u30a3\u30b9\u3068\u30af\u30e9\u30a6\u30c9\u306e\u57a3\u6839\u304c\u306a\u304f\u306a\u308a\u4fbf\u5229\u3067\u3059\u3002\u793e\u5185\u306e\u30b5\u30fc\u30d0\u3092\u306a\u304f\u3059\u3053\u3068\u3082\u3001\u793e\u5185\u306e\u57fa\u5e79\u30b7\u30b9\u30c6\u30e0\u30fbDB\u30b5\u30fc\u30d0\u3068\u30af\u30e9\u30a6\u30c9\u306e\u30b5\u30fc\u30d0\u3092\u9023\u643a\u3055\u305b\u308b\u3068\u3044\u3063\u305f\u4f7f\u3044\u65b9\u3082\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 80%;\">\/\/\u3044\u304f\u3064\u304b\u306e\u7406\u7531\u3067\u79c1\u306f\u793e\u5185\u306e\u30aa\u30f3\u30d7\u30ec\u30b5\u30fc\u30d0\u3068\u30af\u30e9\u30a6\u30c9\u3092\u4e0a\u624b\u304f\u4f7f\u3046\u5f8c\u8005\u304c\u597d\u307f\u3001\u4e92\u3044\u306e\u30e1\u30ea\u30c3\u30c8\u3092\u751f\u304b\u3057\u3069\u3063\u3061\u3082\u3042\u3063\u305f\u65b9\u304c\u826f\u3044\u3068\u3044\u3046\u8003\u3048\u3092\u6301\u3063\u3066\u3044\u307e\u3059\u3002\u30b1\u30fc\u30b9\u30d0\u30a4\u30b1\u30fc\u30b9\u3067\u7528\u9014\u306b\u5408\u308f\u305b\u3066\u3001A\u30af\u30e9\u30a6\u30c9+B\u30af\u30e9\u30a6\u30c9+\u5c02\u7528\u306e\u7269\u7406\u30b5\u30fc\u30d0\u3068\u3044\u3063\u305f\u30df\u30c3\u30af\u30b9\u30af\u30e9\u30a6\u30c9\u6226\u7565\u3092\u884c\u3046\u306e\u3082\u826f\u3044\u3067\u3059\u306d\uff01<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3>AWS VPC \u4fbf\u5229\u3067\u30bb\u30ad\u30e5\u30a2\u306a\u30cd\u30c3\u30c8\u30ef\u30fc\u30af<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14050\" src=\"https:\/\/sys-guard.com\/contents\/wp-content\/uploads\/2017\/04\/Branch_Offices_diagram.png\" alt=\"\" width=\"867\" height=\"569\" \/><\/p>\n<p>\u30ab\u30b9\u30bf\u30de\u30fc\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4\u306b\u6307\u5b9a\u3057\u305f\u30eb\u30fc\u30bf\u306e\u56fa\u5b9aIP\u304b\u3089\u3057\u304bVPN\u3092\u53d7\u3051\u4ed8\u3051\u306a\u3044\u306e\u3067\u30bb\u30ad\u30e5\u30a2\u306a\u4ed5\u69d8\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u307e\u305f\u3001VPC\u306e\u8a2d\u5b9a\u3092\u4e0a\u624b\u306b\u4f7f\u3063\u3066\u5354\u529b\u4f1a\u793e\u306e\u958b\u767a\u30d9\u30f3\u30c0\u30fc\u306a\u3069<strong>\u7279\u5b9a\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u307f\u5916\u90e8\u63a5\u7d9a\u8a31\u53ef<\/strong>\u3055\u305b\u308b\u3068\u3044\u3063\u305f\u5236\u5fa1\u3082\u53ef\u80fd\u3067\u3059\u3002<\/p>\n<p>\u3064\u307e\u308a\u3001\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\u3068\u540c\u69d8\u306e\u6a5f\u5bc6\u6027\u306b\u3088\u308b<strong>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/strong>\u3001<strong>\u7279\u5b9a\u516c\u958b\u5236\u5fa1\u306b\u3088\u308b\u53ef\u7528\u6027<\/strong>\u3001<strong>\u4f38\u7e2e\u81ea\u5728\u306a\u30cd\u30c3\u30c8\u30ef\u30fc\u30af<\/strong>\u3001\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2VPN\u306b\u3088\u308b<strong>\u30b7\u30fc\u30e0\u30ec\u30b9\u306a\u5229\u7528<\/strong>\u304c\u53ef\u80fd\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3>\u3088\u304f\u3042\u308b\u30d1\u30bf\u30fc\u30f3<\/h3>\n<p>\u307e\u305f\u3001\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d0\u306b\u30b0\u30ed\u30fc\u30d0\u30ebIP\u3092\u6301\u305f\u305b\u305f\u304f\u306a\u3044\u3051\u308c\u3069\u3001\u30b5\u30fc\u30d0\u304b\u3089\u5916\u90e8\u306b\u30a2\u30af\u30bb\u30b9\u3057\u305f\u3044\u6642\u304c\u3042\u308a\u307e\u3059\u3002\u7686\u3055\u3093\u306e\u4f1a\u793e\u306ePC\u306e\u3088\u3046\u306b\u3001PC\u304b\u3089\u5916\u90e8\u306e\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u306f\u53c2\u7167\u3067\u304d\u308b\u3051\u308c\u3069\u3001\u5916\u90e8\u304b\u3089\u306f\u30a2\u30af\u30bb\u30b9\u3055\u305b\u306a\u3044\u3068\u3044\u3063\u305f\u904b\u7528\u3067\u3059\u306d\u3002\u305d\u306e\u5834\u5408\u306fAWS NAT\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4\u3092\u5229\u7528\u3059\u308b\u306e\u304c\u7c21\u5358\u3067\u3059\u3002<\/p>\n<h3><strong>\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u8cc7\u7523\u7ba1\u7406\u304b\u3089\u306e\u89e3\u653e<\/strong><\/h3>\n<p>\u793e\u5185\u306e\u30aa\u30f3\u30d7\u30ec\u30b5\u30fc\u30d0\u3092\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d0\u306b\u5909\u66f4\u3059\u308b\u3053\u3068\u3067\u3001\u6a5f\u5668\u8001\u673d\u5316\u3084\u30b5\u30dd\u30fc\u30c8\u5207\u308c\u306e\u5fc3\u914d\u304c\u306a\u304f\u306a\u308a\u3001\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5909\u66f4\u306b\u3088\u308b\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u304c\u306a\u304f\u306a\u308b\u3053\u3068\u3067\u3001\u4eba\u54e1\u8ca0\u62c5\u3084\u6a5f\u5668\u8cfc\u5165\u8cbb\u7528\u304c\u306a\u304f\u306a\u3063\u305f\u308a\u3001\u30b5\u30fc\u30d0\u53f0\u6570\u306e\u6e1b\u5c11\u306b\u3088\u308a\u30b7\u30b9\u30c6\u30e0\u7ba1\u7406\u306e\u8ca0\u62c5\u304c\u8efd\u6e1b\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<h2>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u8a2d\u8a08<\/h2>\n<p>\u30aa\u30d5\u30a3\u30b9\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30a2\u30c9\u30ec\u30b9\u3068AWS VPC\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u91cd\u8907\u3059\u308b\u3053\u3068\u304c\u3042\u3063\u3066\u306f\u3044\u3051\u307e\u305b\u3093\u3002<\/p>\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u7ba1\u7406\u8005\u3068\u76f8\u8ac7\u3057\u4e8b\u524d\u306b\u304d\u3061\u3093\u3068\u30aa\u30d5\u30a3\u30b9\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u628a\u63e1\u3057\u3001\u4eca\u5f8c\u91cd\u8907\u3057\u306a\u3044\u3088\u3046\u306bCIDR\u3067\u8a2d\u8a08\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u30af\u30e9\u30b9\u3067\u308f\u3051\u3066\u3057\u307e\u3046\u306e\u304c\u7c21\u5358\u3067\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<h2>\u6ce8\u610f<\/h2>\n<p>\u901a\u5e38\u3067\u306fVPC\u306e\u5229\u7528\u306b\u3064\u3044\u3066\u7121\u6599\u3067\u3059\u304c\u3001VPC\u306eVPN\u6a5f\u80fd\u3092\u4f7f\u3046\u5834\u5408\u306f\u6599\u91d1\u304c\u767a\u751f\u3057\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3>\u74b0\u5883<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14049\" src=\"https:\/\/sys-guard.com\/contents\/wp-content\/uploads\/2017\/04\/aws_40.png\" alt=\"AWS VPN VPC RTX1100\" width=\"680\" height=\"269\" \/><\/p>\n<ul>\n<li>\u30eb\u30fc\u30bf\uff1aRTX1100<\/li>\n<li>\u63a5\u7d9a\u5148\u30af\u30e9\u30a6\u30c9\uff1aAWS VPC<\/li>\n<li>\u56de\u7dda\uff1aNURO<\/li>\n<li>\u6280\u8853\u8981\u7d20\uff1aYAMAHA RTX1100, AWS VPC, VPC Subnet\u3001\u30eb\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb, AWS VPN Connection , \u4eee\u60f3\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4 VPN Connection, \u30ab\u30b9\u30bf\u30de\u30fc\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4<\/li>\n<\/ul>\n<pre class=\"lang:default decode:true\"># show environment\r\nRTX1100 BootROM Rev.6.02\r\nRTX1100 Rev.8.03.94 (Thu Dec  5 19:06:16 2013)\r\n  main:  RTX1100 ver=e0 serial=N1A088475 MAC-Address=00:ho:ge:34:a9:2d MAC-Addr\r\ness=00:a0:de:34:a5:1e MAC-Address=00:a0:de:34:a5:1f\r\nCPU:   3%(5sec)   4%(1min)   3%(5min)    Memory: 34% used\r\nFirmware: exec0  Config. file: config0\r\nDefault firmware: exec0  Default config. file: config0\r\nBoot time: 1980\/01\/03 13:23:42 +09:00\r\nCurrent time: 1980\/01\/03 14:56:06 +09:00\r\nElapsed time from boot: 0days 01:32:24\r\nSecurity Class: 1, FORGET: ON, TELNET: OFF<\/pre>\n<p>\u5de5\u5834\u51fa\u8377\u72b6\u614b\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af<\/h3>\n<ul>\n<li>\u30eb\u30fc\u30bf\u5074 \u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u30a2\u30c9\u30ec\u30b9\uff1a192.168.10.1<\/li>\n<li>\u30eb\u30fc\u30bf\u5074 LAN\uff1a192.168.10.0\/24<\/li>\n<li>\u30eb\u30fc\u30bf\u5074 \u30b0\u30ed\u30fc\u30d0\u30ebIP:xxx.yyy.zzz.aaa<\/li>\n<li>AWS VPC\u5074 LAN\uff1a10.0.0.0\/16<\/li>\n<li>AWS VPC\u5074 \u30b5\u30d6\u30cd\u30c3\u30c8\uff1a10.0.0.0\/24<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4>\u521d\u671f\u8a2d\u5b9a<\/h4>\n<p>&nbsp;<\/p>\n<p>\u4eca\u56de\u306e\u74b0\u5883\u306f\u56de\u7dda\u304cNURO\u3067PPPoE\u306b\u3088\u308b\u30e6\u30fc\u30b6\u8a8d\u8a3c\u306f\u3057\u307e\u305b\u3093\u3002<\/p>\n<pre class=\"lang:default decode:true\">&gt; administrator\r\nPassword:\r\n\r\nconsole character ascii\r\nlogin timer 3600\r\nip route default gateway dhcp lan2\r\nip lan1 address 192.168.10.1\/24\r\ndescription lan2 PRV\/DHCP\/225:NURO\r\nip lan2 address dhcp\r\nip lan2 nat descriptor 200\r\nnat descriptor type 200 masquerade\r\nnat descriptor address outer 200 primary\r\ndhcp service server\r\ndhcp server rfc2131 compliant except remain-silent\r\ndhcp scope 1 192.168.10.2-192.168.10.190\/24\r\ndns server dhcp lan2\r\ndns server select 500226 dhcp lan2 any .\r\ndns private address spoof on\r\nsnmp sysname yamaha-rtx1100\r\nntpdate ntp.nict.jp\r\nschedule at 1 *\/* 5:00 * ntpdate ntp.nict.jp syslog\r\nhttpd host lan1<\/pre>\n<p>&nbsp;<\/p>\n<h3>PPPoE\u306b\u3088\u308b\u63a5\u7d9a\u304c\u5fc5\u8981\u306a\u74b0\u5883\u306e\u65b9<\/h3>\n<p>\u30d7\u30ed\u30d0\u30a4\u30c0\u3068\u306e\u63a5\u7d9a\u306bPPPoE\u304c\u5fc5\u8981\u306a\u5834\u5408\u306f\u4e0b\u8a18\u306epp select 1\u3088\u308a\u8a2d\u5b9a\u304c\u5fc5\u8981\u3067\u3059\u3002<\/p>\n<pre class=\"lang:default decode:true\">pp select 1\r\npp always-on on\r\npppoe use lan2\r\npppoe auto disconnect off\r\npp auth accept pap chap\r\npp auth myname (ISP\u3078\u63a5\u7d9a\u3059\u308bID) (ISP\u3078\u63a5\u7d9a\u3059\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\uff09\r\nppp lcp mru on 1454\r\nppp ipcp msext on\r\nppp ccp type none\r\nip pp address (\u30eb\u30fc\u30bf\u30fc\u306e\u30b0\u30ed\u30fc\u30d0\u30ebIP\u30a2\u30c9\u30ec\u30b9)\r\nip pp nat descriptor 1000\r\npp enable 1<\/pre>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>AWS\u3068\u306eVPN\u63a5\u7d9a\u8a2d\u5b9a\u30b5\u30f3\u30d7\u30eb<\/p>\n<pre class=\"lang:default decode:true \">tunnel select 1 \r\nipsec ike encryption 1 aes-cbc\r\nipsec ike group 1 modp1024\r\nipsec ike hash 1 sha\r\nipsec ike pre-shared-key 1 text hogemogehohoho\u203bAWS VPN\u79d8\u5bc6\u9375\u30d1\u30b9\u30d5\u30ec\u30fc\u30ba\r\nipsec tunnel 201\r\nipsec sa policy 201 1 esp aes-cbc  sha-hmac\r\nipsec ike duration ipsec-sa 1 3600\r\nipsec ike pfs 1 on\r\nipsec tunnel outer df-bit clear\r\nipsec ike keepalive use 1 on dpd 10 3\r\nipsec ike local address 1 xxx.yyy.zzz.aaa\u203b\u30eb\u30fc\u30bf\u5074\u56fa\u5b9aIP\r\nipsec ike remote address 1 13.112.141.58\r\nip tunnel address 169.254.24.230\/30\r\nip tunnel remote address 169.254.24.229\r\nip tunnel tcp mss limit 1379\r\ntunnel enable 1\r\ntunnel select none\r\nipsec auto refresh on\r\nbgp use on\r\nbgp autonomous-system 65000\r\nbgp neighbor 1 10124 169.254.24.229 hold-time=30 local-address=169.254.24.230\r\nbgp import filter 1 equal 0.0.0.0\/0\r\nbgp import 10124 static filter 1\r\ntunnel select 2 \r\nipsec ike encryption 2 aes-cbc\r\nipsec ike group 2 modp1024\r\nipsec ike hash 2 sha\r\nipsec ike pre-shared-key 2 text hogemogehohoho\u203bAWS VPN\u79d8\u5bc6\u9375\u30d1\u30b9\u30d5\u30ec\u30fc\u30ba\r\nipsec tunnel 202\r\nipsec sa policy 202 2 esp aes-cbc  sha-hmac\r\nipsec ike duration ipsec-sa 2 3600\r\nipsec ike pfs 2 on\r\nipsec tunnel outer df-bit clear\r\nipsec ike keepalive use 2 on dpd 10 3\r\nipsec ike local address 2 xxx.yyy.zzz.aaa \u203b\u30eb\u30fc\u30bf\u5074\u56fa\u5b9aIP\r\nipsec ike remote address 2 52.197.214.91\r\nip tunnel address 169.254.24.210\/30\r\nip tunnel remote address 169.254.24.209\r\nip tunnel tcp mss limit 1379\r\ntunnel enable 2\r\ntunnel select none\r\nipsec auto refresh on\r\nbgp use on\r\nbgp autonomous-system 65000\r\nbgp neighbor 2 10124 169.254.24.209 hold-time=30 local-address=169.254.24.210\r\nbgp import 10124 static filter 1\r\nbgp import filter 1 equal 192.168.10.0\/24\r\nbgp configure refresh\r\nnat descriptor type 1000 masquerade\r\nnat descriptor address outer 1000 ipcp\r\nnat descriptor address inner 1000 auto\r\nnat descriptor masquerade static 1 1 192.168.10.1 udp 500\r\nnat descriptor masquerade static 1 2 192.168.10.1 esp\r\nipsec auto refresh on\r\ndns server 8.8.8.8 8.8.4.4\r\ndns private address spoof on<\/pre>\n<p>\u30c8\u30f3\u30cd\u30eb\u304c\uff12\u3064\u3042\u308b\u3051\u308c\u3069\u3001AWS VPN\u3068\u306e\u63a5\u7d9a\u306e\u5197\u9577\u5316\u306e\u70ba\u306e\u3082\u306e\u306a\u306e\u3067\u3001\u305f\u3060\u7e4b\u3052\u308b\u3060\u3051\u306a\u3089\uff11\u3064\u3067\u3082\u5927\u4e08\u592b\u3067\u3059\u3002<\/p>\n<p>RTX1100\uff5eRTX1210\u306f\u4e0a\u8a18\u3067\u52d5\u304f\u306f\u305a\u3001RTX1000\u3060\u3068\u5c11\u3057\u66f8\u304d\u63db\u3048\u304c\u5fc5\u8981\u304b\u306a\u3002<\/p>\n<pre class=\"lang:default decode:true\">bgp neighbor 1 10124 169.254.24.229 hold-time=30 local-address=169.254.24.230\r\n\u2193\r\nbgp neighbor 1 10124 169.254.24.229 hold-time=30\r\n<\/pre>\n<p>&nbsp;<\/p>\n<h4>AWS\u3068\u306eVPN\u63a5\u7d9a\u306e\u78ba\u8a8d<\/h4>\n<p>\u30c8\u30f3\u30cd\u30eb\u72b6\u614b\u306e\u78ba\u8a8d\u3092\u884c\u3044\u307e\u3059\u3002<\/p>\n<pre class=\"lang:default decode:true \"># show status tunnel 1\r\nTUNNEL[1]:\r\nDescription:\r\n  Interface type: IPsec\r\n  Current status is Online.\r\n  from 1980\/01\/04 14:49:15.\r\n  13630 days 3 hours 27 minutes 29 seconds  connection.\r\n  Received:    (IPv4) 75 packets [4852 octets]\r\n               (IPv6) 0 packet [0 octet]\r\n  Transmitted: (IPv4) 89 packets [5449 octets]\r\n               (IPv6) 0 packet [0 octet]\r\n               \r\n               \r\n# show status tunnel 2\r\nTUNNEL[2]:\r\nDescription:\r\n  Interface type: IPsec\r\n  Current status is Online.\r\n  from 1980\/01\/04 14:49:16.\r\n  13630 days 3 hours 27 minutes 33 seconds  connection.\r\n  Received:    (IPv4) 76 packets [4904 octets]\r\n               (IPv6) 0 packet [0 octet]\r\n  Transmitted: (IPv4) 86 packets [5293 octets]\r\n               (IPv6) 0 packet [0 octet]<\/pre>\n<p>&nbsp;<\/p>\n<p>\u9375\u4ea4\u63db\u304c\u51fa\u6765\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d<\/p>\n<pre class=\"lang:default decode:true \"># show ipsec sa\r\n\r\nsa   sgw connection   dir  life[s] remote-id\r\n--------------------------------------------------------------------------\r\n1    1   isakmp       -    28390   13.112.141.58\r\n2    2   isakmp       -    28390   52.197.214.91\r\n3    1   tun[001]esp  send 3192    13.112.141.58\r\n4    1   tun[001]esp  recv 3192    13.112.141.58\r\n5    2   tun[002]esp  send 3193    52.197.214.91\r\n6    2   tun[002]esp  recv 3193    52.197.214.91<\/pre>\n<p>&nbsp;<\/p>\n<p>BGP\u306e\u78ba\u8a8d<\/p>\n<pre class=\"lang:default decode:true \"># show status bgp neighbor\r\n\r\nBGP neighbor is 169.254.24.229, remote AS 10124, local AS 65000, external link\r\n  BGP version 4, remote router ID 169.254.24.229\r\n  BGP state = Established, up for 00:06:33\r\n  Last read 00:00:03, hold time is 30, keepalive interval is 10 seconds\r\n  Received 41 messages, 0 notifications, 0 in queue\r\n  Sent 45 messages, 1 notifications, 0 in queue\r\n  Connection established 1; dropped 0\r\n  Last reset never\r\nLocal host: 169.254.24.230, Local port: 1026\r\nForeign host: 169.254.24.229, Foreign port: 179\r\n\r\nBGP neighbor is 169.254.24.209, remote AS 10124, local AS 65000, external link\r\n  BGP version 4, remote router ID 169.254.24.209\r\n  BGP state = Established, up for 00:06:33\r\n  Last read 00:00:03, hold time is 30, keepalive interval is 10 seconds\r\n  Received 41 messages, 0 notifications, 0 in queue\r\n  Sent 45 messages, 1 notifications, 0 in queue\r\n  Connection established 1; dropped 0\r\n  Last reset never\r\nLocal host: 169.254.24.210, Local port: 1027\r\nForeign host: 169.254.24.209, Foreign port: 179<\/pre>\n<p>BGP State\u304cEstablished\u306b\u306a\u3063\u3066\u3044\u308c\u3070\u63a5\u7d9a\u3067\u304d\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>BGP\u30cd\u30a4\u30d0\u30fc\u306e\u30eb\u30fc\u30c8\u78ba\u8a8d<\/p>\n<pre class=\"lang:default decode:true \"># show status bgp neighbor 169.254.24.229 received-routes\r\nTotal routes: 1\r\n*: valid route\r\n  Network            Next Hop        Metric LocPrf Path\r\n* 10.0.0.0\/16        169.254.24.229     100        10124 IGP\r\n\r\n\r\n# show status bgp neighbor 169.254.24.209 received-routes\r\nTotal routes: 1\r\n*: valid route\r\n  Network            Next Hop        Metric LocPrf Path\r\n  10.0.0.0\/16        169.254.24.209     200        10124 IGP\r\n<\/pre>\n<pre class=\"lang:default decode:true\"># show status bgp neighbor 169.254.24.209 advertised-routes\r\nTotal routes: 1\r\n*: valid route\r\n  Network            Next Hop        Metric LocPrf Path\r\n* 192.168.10.0\/24   192.168.10.1        0        IGP\r\n\r\n\r\n# show status bgp neighbor 169.254.24.229 advertised-routes\r\nTotal routes: 1\r\n*: valid route\r\n  Network            Next Hop        Metric LocPrf Path\r\n* 192.168.10.0\/24   192.168.10.1        0        IGP<\/pre>\n<p>\u78ba\u7acb\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u30eb\u30fc\u30c8\u78ba\u8a8d<\/p>\n<pre class=\"lang:default decode:true \"># show ip route\r\n\r\nDestination Gateway Interface Kind Additional Info.\r\ndefault 118.240.212.129 LAN2(DHCP) static\r\n10.0.0.0\/16 169.254.24.229 TUNNEL[1] BGP path=10124\r\n118.240.212.128\/25 xxx.yyy.zzz.aaa LAN2 implicit\r\n169.254.24.208\/30 - TUNNEL[2] implicit\r\n169.254.24.228\/30 - TUNNEL[1] implicit\r\n192.168.10.0\/24 192.168.10.1 LAN1 implicit<\/pre>\n<p>&nbsp;<\/p>\n<h3>AWS VPC VPN\u63a5\u7d9a\u304b\u3089\u306e\u78ba\u8a8d<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14054\" src=\"https:\/\/sys-guard.com\/contents\/wp-content\/uploads\/2017\/04\/aws_20170429_81.png\" alt=\"\" width=\"680\" height=\"442\" \/><\/p>\n<p>\u3010\u30b5\u30fc\u30d3\u30b9\u3011&gt;&gt; \u3010VPC\u3011&gt;&gt; \u3010VPN\u63a5\u7d9a\u3011&gt;&gt; \u3010\u30c8\u30f3\u30cd\u30eb\u8a73\u7d30\u3011\u3092\u9078\u629e\u3057\u307e\u3059\u3002<\/p>\n<p>\u30b9\u30c6\u30fc\u30bf\u30b9\u304cUP\u306b\u306a\u3063\u3066\u3044\u308c\u3070\u826f\u3044\u3067\u3059\uff01<\/p>\n<p>&nbsp;<\/p>\n<h4>AWS\u4e0a\u306eEC2\u306b\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u63a5\u7d9a\u3057\u3088\u3046<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14045\" src=\"https:\/\/sys-guard.com\/contents\/wp-content\/uploads\/2017\/04\/aws_11.png\" alt=\"AWS VPN YAMAHA RTX\" width=\"680\" height=\"495\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14052\" src=\"https:\/\/sys-guard.com\/contents\/wp-content\/uploads\/2017\/04\/aws_12_2.png\" alt=\"\" width=\"680\" height=\"366\" \/><\/p>\n<p>EC2\u30b5\u30fc\u30d0\u306b\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u30a2\u30c9\u30ec\u30b9\u3067\u63a5\u7d9a\u3059\u308b\u3053\u3068\u3067\u3001\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u304c\u3067\u304d\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3059\u306d\uff5e\u3002<\/p>\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u7e4b\u304c\u308b\u611f\u899a\u306f\u3068\u3066\u3082\u6c17\u6301\u3061\u304c\u826f\u3044\uff01\u62f3\u3092\u3050\u3063\u3068\u3059\u308b\u9054\u6210\u611f\u3092\u5473\u308f\u3048\u307e\u3059\u3002<\/p>\n<p>\u4eca\u56de\u306fIPsec\u306b\u3088\u308b\u4eee\u60f3\u9589\u57df\u7db2\u69cb\u6210\u3067\u306e\u3054\u7d39\u4ecb\u3067\u3057\u305f\u304c\u3001\u5c02\u7528\u7dda\u74b0\u5883\u306e\u5834\u5408\u306f\u3001AWS Direct Connect\u3067\u3088\u308a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u9ad8\u3044\u9589\u57df\u7db2\u69cb\u6210\u304c\u4f5c\u308c\u307e\u3059\u3002\u307e\u305f\u3001\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u306f\u74b0\u5883\u306b\u5408\u308f\u305b\u3066\u8a2d\u5b9a\u3057\u307e\u3057\u3087\u3046\u3002<\/p>\n<p>\u304a\u75b2\u308c\u69d8\u3067\u3059\u3002<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u82e5\u8005\u306eRTX1200\u96e2\u308c\u3002 \u305d\u306e\u5bfe\u7b56\u3068\u3057\u3066\u767a\u58f2\u3055\u308c\u305f\uff1fRTX1210\u304c\u4e2d\u5c0f\u30aa\u30d5\u30a3\u30b9\u306e\u8907\u6570\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u6848\u4ef6\u3067\u5927\u6d3b\u8e8d\u3057\u3066\u3044\u307e\u3059\u3002 \u305d\u3093\u306a\u4eca\u56de\u306fAWS\u306b\u62e0\u70b9\u9593VPN\u63a5\u7d9a\u3059\u308bRTX1100\u30eb\u30fc\u30bf\u306e\u8a2d\u5b9a\u3092\u3054\u7d39\u4ecb\u3002RTX1210\u306f70,000\u5186 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":14048,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,66],"tags":[168],"_links":{"self":[{"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/posts\/14044"}],"collection":[{"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/comments?post=14044"}],"version-history":[{"count":0,"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/posts\/14044\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/media\/14048"}],"wp:attachment":[{"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/media?parent=14044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/categories?post=14044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sys-guard.com\/wp-json\/wp\/v2\/tags?post=14044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}