# # PPTPを使用したVPN拠点間接続(3拠点) + リモートアクセス : Web GUI設定 # # # 拠点1 RTX1300(1) / RTX1220(1) / RTX1210(1) / RTX830(1) # ip route default gateway pp 1 ip route 192.168.2.0/24 gateway tunnel 1 ip route 192.168.3.0/24 gateway tunnel 2 ip lan1 address 192.168.1.1/24 ip lan1 proxyarp on pp select 1 description pp provider1 pp keepalive interval 30 retry-interval=30 count=12 pp always-on on pppoe use lan2 pppoe auto disconnect off pp auth accept pap chap pp auth myname (ISP1へ接続するID) (ISP1へ接続するパスワード) ppp lcp mru on 1454 ppp ipcp ipaddress on ppp ipcp msext on ppp ccp type none ip pp secure filter in 200003 200020 200021 200022 200023 200024 200025 200030 200032 200100 200101 ip pp secure filter out 200013 200020 200021 200022 200023 200024 200025 200026 200027 200099 dynamic 200080 200081 200082 200083 200084 200085 200098 200099 ip pp nat descriptor 1000 netvolante-dns hostname host pp server=1 (ネットボランチDNSに設定したホストアドレス) pp enable 1 pp select 2 pp bind tunnel1 pp always-on on pp auth request mschap pp auth username (拠点1-2 PPTPのユーザーID) (拠点1-2 PPTPのパスワード) ppp ipcp ipaddress on ppp ccp type mppe-any pptp service type server pp enable 2 pp select 3 pp bind tunnel2 pp always-on on pp auth request mschap pp auth username (拠点1-3 PPTPのユーザーID) (拠点1-3 PPTPのパスワード) ppp ipcp ipaddress on ppp ccp type mppe-any pptp service type server pp enable 3 pp select anonymous pp bind tunnel3 pp auth request mschap-v2 pp auth username (拠点1-外出先 PPTPのユーザーID) (拠点1-外出先 PPTPのパスワード) ppp ipcp ipaddress on ppp ipcp msext on ppp ccp type mppe-any ip pp remote address pool 192.168.200.100-192.168.200.101 pp enable anonymous tunnel select 1 description tunnel kyoten1-2 tunnel encapsulation pptp tunnel endpoint name (拠点2でネットボランチDNSに設定したホストアドレス) fqdn tunnel enable 1 tunnel select 2 description tunnel kyoten1-3 tunnel encapsulation pptp tunnel endpoint name (拠点3でネットボランチDNSに設定したホストアドレス) fqdn tunnel enable 2 tunnel select 3 tunnel encapsulation pptp pptp tunnel disconnect time off tunnel enable 3 ip filter 200000 reject 10.0.0.0/8 * * * * ip filter 200001 reject 172.16.0.0/12 * * * * ip filter 200002 reject 192.168.0.0/16 * * * * ip filter 200003 reject 192.168.1.0/24 * * * * ip filter 200010 reject * 10.0.0.0/8 * * * ip filter 200011 reject * 172.16.0.0/12 * * * ip filter 200012 reject * 192.168.0.0/16 * * * ip filter 200013 reject * 192.168.1.0/24 * * * ip filter 200020 reject * * udp,tcp 135 * ip filter 200021 reject * * udp,tcp * 135 ip filter 200022 reject * * udp,tcp netbios_ns-netbios_ssn * ip filter 200023 reject * * udp,tcp * netbios_ns-netbios_ssn ip filter 200024 reject * * udp,tcp 445 * ip filter 200025 reject * * udp,tcp * 445 ip filter 200026 restrict * * tcpfin * www,21,nntp ip filter 200027 restrict * * tcprst * www,21,nntp ip filter 200030 pass * 192.168.1.0/24 icmp * * ip filter 200031 pass * 192.168.1.0/24 established * * ip filter 200032 pass * 192.168.1.0/24 tcp * ident ip filter 200033 pass * 192.168.1.0/24 tcp ftpdata * ip filter 200034 pass * 192.168.1.0/24 tcp,udp * domain ip filter 200035 pass * 192.168.1.0/24 udp domain * ip filter 200036 pass * 192.168.1.0/24 udp * ntp ip filter 200037 pass * 192.168.1.0/24 udp ntp * ip filter 200099 pass * * * * * ip filter 200100 pass * 192.168.1.1 tcp * 1723 ip filter 200101 pass * 192.168.1.1 gre * * ip filter 500000 restrict * * * * * ip filter dynamic 200080 * * ftp ip filter dynamic 200081 * * domain ip filter dynamic 200082 * * www ip filter dynamic 200083 * * smtp ip filter dynamic 200084 * * pop3 ip filter dynamic 200085 * * submission ip filter dynamic 200098 * * tcp ip filter dynamic 200099 * * udp nat descriptor type 1000 masquerade nat descriptor masquerade static 1000 1 192.168.1.1 tcp 1723 nat descriptor masquerade static 1000 2 192.168.1.1 gre dhcp service server dhcp server rfc2131 compliant except remain-silent dhcp scope 1 192.168.1.2-192.168.1.191/24 dns host lan1 dns server pp 1 dns server select 500001 pp 1 any . restrict pp 1 dns private address spoof on pptp service on dashboard accumulate traffic on