全文検索:
- Vyatta Openvpn @05_network:04_vyatta
- me|eth0|eth1|vtun0| |vyatta-A|10.10.10.246/24|192.168.10.246/24|172.16.100.246| |vyatta-B|10.10.20.75/24|192.168.20.75/24|172.16.100.75| <code> +----------+ +----------+
- Vyatta - IPSec Brige / L2TP(IPSec)+Nat @05_network:04_vyatta
- |eth0|eth1|localPC| |vyatta-A|10.10.10.246/24|192.168.10.246/24|192.168.10.5/24| |vyatta-B|10.10.20.75/24|192.168.20.75/24|192.168.20.250/24| <code> +----------+ +----------+ +---
- Vyatta OpenVPN Server/Client @05_network:04_vyatta
- ===== |Global側|eth0|10.10.100.1| |Local側|eth1|192.168.1.1| |仮想LAN|vtun0|172.16.100.1| +----------+ +----------+ ... t interfaces openvpn vtun0 server push-route '192.168.1.0/24' # set interfaces openvpn vtun0 server subnet '172.16.100.0/24' # set interfaces openvpn vtun0 server t
- Vyatta - Nat @05_network:04_vyatta
- る設定。 vyattaのeth0側が上位のネットワークに接続しているinterface 192.168.0.0/16からの接続はNatさせる場合 <code console> $ configure # set nat source rule 10 # set nat source rule 10 o... eth0 # set nat source rule 10 source address '192.168.0.0/16' # set nat source rule 10 translation address masquerade </code> ===== Description Nat =====
- Vyatta - L2TP(IPSec) @05_network:04_vyatta
- ===== |Global側|eth0|10.10.100.1| |Local側|eth1|192.168.1.1| +----------+ ... nat-networks { allowed-network 192.168.1.0/24 { } } nat-tra... client-ip-pool { start 192.168.1.200 stop 192.168.1.220 } dns-servers { ser
- Vyatta PPTP @05_network:04_vyatta
- ===== |Global側|eth0|10.10.100.1| |Local側|eth1|192.168.1.1| +----------+ ... t vpn pptp remote-access client-ip-pool start 192.168.1.201 # set vpn pptp remote-access client-ip-pool stop 192.168.1.220 # set vpn pptp remote-access dns-servers server-1 192.168.1.1 # set vpn pptp remote-access authentication
- Vyatta VRRP @05_network:04_vyatta
- rk:04_vyatta:vrrp2.png?600|}} HOST1のGatewayを 192.168.5.1 にしておけば、\\ switch1(vyatta-A)が落ちても問題無く通信できる。 =... interfaces ethernet eth1 vrrp virtual-address 192.168.5.1 # set interfaces ethernet eth1 vrrp preempt ... interfaces ethernet eth1 vrrp virtual-address 192.168.5.1 # set interfaces ethernet eth1 vrrp preempt ... ----- eth1 99 vip 192.168.5.1 up no master </code>
- summit syslog設定 @05_network:02_summit
- ===== config削除 ====== configure syslog delete 192.168.89.186 local1 ====== config追加、開始 ====== <box 70% round left orange> configure syslog add 192.168.89.253 local1 \\ enable log target syslog 192.168.89.253 local1 </box>
- Summit Command @05_network:02_summit
- : Up 3 time(s), Down 2 times(s) VLAN cfg: n192.168.50 [Internal Tag=0050,Mac-Limit:Cfg=No-limit,LRN... Load sharing is not enabled Protocol: VLAN=n192.168.50 Vpri=0 Protocol=ANY [EtherType:ffff] EDP:
- Vyatta Backup/Reestore @05_network:04_vyatta
- auto' set interfaces ethernet eth1 address '192.168.1.1/24' set interfaces ethernet eth1 duplex 'auto' set interfaces ethernet eth1 hw-id '00:16:3e:65:3d:ae' set interfaces ethernet eth1 smp_a
- summit ACL @05_network:02_summit
- = ACL追加 ===== # create access-list test2 ip destination any source 192.168.56.121/32 deny ports any
- Vyatta - インストール @05_network:04_vyatta
- 0.1/24 # set interfaces ethernet eth1 address 192.168.100.246/24 </code> ====== システム設定 ====== <code c