LoginSignup
10
1

More than 3 years have passed since last update.

YAMAHA NVR700W: Hawaii経由でOracle Cloud Tokyo と Phoenix RegionをIPSec VPN接続してみてみた

Last updated at Posted at 2020-03-11

今回Hawaiiに来ました。
Hawaiiへ住んでみてみたい。
ということで、YAMAHA NVR700Wを持ってきました。
07のコピー.png
ハワイはちょうど日本とアメリカの中間あたりにありますので、ハワイ経由で日本とアメリカをIPSec VPNでつなぐハワイ中継出張所を構築してみてみます。

■構成

構成図2.png
あらかじめ、Transit RoutingなどVCN Network, Instance等の設定を以前の記事を参考に構築しておきます。ここでは、YAMAHA NVR700Wの設定メインに記載していきます。
・参考: Transit Routing + IPSec VPN / FastConnectで Object Storage, Autonomous Databaseへ接続してみてみた

■ハワイでSIMカード取得

NVR700WはSIMカードでInternetにつながります。
ハワイの空港ではSIMカード売ってないので、買いに行きます。
今回は、Pokeで有名なMaguro Brothersの隣のほうにあるここで書いました。
02.png

一ヶ月 $50でUnlimited Dataなのでこれにしときます。
IPhoneへのInstall設定もしてくれて、親切なお店でした。
01.png

そしてついでに、Pokeも買っときます。
・Maguro Brothers: https://www.yelp.com/biz/maguro-brothers-hawaii-honolulu-6

購入したSIMカードは LycaMobileです。
05.png

APN設定は以下な感じです。
・参考:
 - LycaMobile APN Settings
 - AT&T APN Settings

ただ、、このSIMはNVR700wで設定すると海外SIMだからか「圏外」状態になり、AT&TのSIMでも疎通する事ができなかったため、、SIM接続は今回断念します。
Internet接続はHotelのルーターからLANケーブルを差してInternet接続することにしました。

■ハワイの電圧

ハワイの電圧は110/120V、日本は100Vなので、変圧されないアダプターのNVR700Wは電源をつけることができません。
ですので、変圧器が必要です。しかしながら、日本から持ってきてないので、、まずは買いに行きます。
ハワイには電気店がないので、ABC Store, Don Quijote, Walmartなど回りましたが売っていないので、ちょっと遠い Best Buyへ買いに行きました。
03.png

Best Buy Honolulu
Don Quijote Hawaii
Walmart Honoklulu

ついでに、変圧器の他にLANケーブルと MACに接続するためのUSB-C to Gigabit Ethernet Adapterとかも買っときます。
06.png

そして、近くにPokeで有名なNico’s Pier 38 があるので歩いて食べに行ってみてみます。
・Nico’s Pier 38: https://nicospier38.com/

■Yamaha NVR700Wセットアップ

準備も整いましたので、設定していきます。
IMG_6660.jpg

●初期化

まずは初期化します

シリアルコンソールケーブルはちゃんともってきているので、コマンドラインで設定していきます。

① cold start 実行
cold startコマンドで初期化がされます

# cold start
    Password:
    RTFS formatting... Done.
    Restarting ...


    NVR700W BootROM Ver. 1.00
    Copyright (c) 2016 Yamaha Corporation. All Rights Reserved.

    Press 'Enter' or 'Return' to select a firmware and a configuration.
    Default settings :  exec0 and config0

    Starting with default settings.
    Starting with exec0 and config0 ...

    NVR700W Rev.15.00.16 (Thu Jun 20 19:48:42 2019)
    Copyright (c) 1994-2019 Yamaha Corporation. All Rights Reserved.
    To display the software copyright statement, use 'show copyright' command.
    00:a0:cd:a2:c1, 00:a0:cd:a2:c2
    Memory 256Mbytes, 2LAN, 1ONU, 1WWAN

●初期化コンフィグ確認

①ユーザー名無し でLogin
初期状態はユーザー名無し でLoginしてユーザーをつくっていきます。

# Password:

    NVR700W Rev.15.00.16 (Thu Jun 20 19:48:42 2019)
    Copyright (c) 1994-2019 Yamaha Corporation. All Rights Reserved.
    To display the software copyright statement, use 'show copyright' command.
    00:a0:cd:a2:c1, 00:a0:cd:a2:c2
    Memory 256Mbytes, 2LAN, 1ONU, 1WWAN

    The login password is factory default setting. Please request an administrator to change the password by the 'login password' command.

② 管理ユーザーへ移行

> administrator
    Password:
    The administrator password is factory default setting. Please change the password by the 'administrator password' command.
#

③ 初期コンフィグ確認

# show config
    # NVR700W Rev.15.00.16 (Thu Jun 20 19:48:42 2019)
    # MAC Address : 00:a0:cd:a2:c1, 00:a0:cd:a2:c2
    # Memory 256Mbytes, 2LAN, 1ONU, 1WWAN
    # main:  NVR700W ver=00 serial=TESTSERIAL MAC-Address=00:a0:cd:a2:c1 MAC-Address=00:a0:cd:a2:c2
    # Reporting Date: Mar 11 14:09:42 2020
    ip lan1 address 192.168.100.1/24
    telnetd host lan
    dhcp service server
    dhcp server rfc2131 compliant except remain-silent
    dhcp scope 1 192.168.100.2-192.168.100.191/24
    dns private name setup.netvolante.jp
    analog supplementary-service pseudo call-waiting
    analog extension dial prefix sip prefix="9#"

●Internet接続

Internet接続はWebコンソールから設定してみてみます

① 簡単接続画面
デフォルトIP 192.168.100.1 へHTTPブラウザ接続して、[かんたん設定]タブから[プロバイダい接続]を選択し、[新規]をクリック
02.png

②インターフェースの選択画面
接続インターフェース: WANを選択し、[次へ]をクリック
03.png

③回線自動判別画面
[次へ]をクリック
04.png

④接続種別の選択画面
「DHCP、又は固定IPアドレスによる接続」をクリック
05.png

⑤プロバイダ情報の設定画面
ここでは、HotelのLANに接続するので、DHCPで変動されないように固定とするため「IPアドレスを選択」し以下を入力し[次へ]をクリック

WAN側IPアドレス: 任意のアドレス
ネットマスク:  任意のネットマスク
デフォルトゲートウェイ: 任意のデフォルトゲートウェイ

06.png

⑥DNSサーバーの設定画面
任意の設定を行い、[次へ]をクリック
07.png

⑦IPフィルタの設定
ここでは、IPSec通信できなくならないように、「設定しない」を選択し、[次へ]をクリック
08.png

⑧設定内容の確認画面
設定内容を確認し、[次へ]をクリック
09.png

⑨プロバイダー接続画面
[接続状態]の項目から接続が確立されていることを確認
10.png

⑩ Config確認

# show config
    # NVR700W Rev.15.00.16 (Thu Jun 20 19:48:42 2019)
    # MAC Address : 00:a0:cd:a2:c1, 00:a0:cd:a2:c2
    # Memory 256Mbytes, 2LAN, 1ONU, 1WWAN
    # main:  NVR700W ver=00 serial=TESTSERIAL MAC-Address=00:a0:cd:a2:c1 MAC-Address=00:a0:cd:a2:c2
    # Reporting Date: Mar 11 14:34:26 2020
    ip route default gateway 192.168.1.1
    ip keepalive 1 icmp-echo 10 5 192.168.1.1
    ip lan1 address 192.168.100.1/24
    description lan2 Hawaii-Hotel01
    ip lan2 address 192.168.1.254/24
    ip lan2 nat descriptor 200
    ip filter 500000 restrict * * * * *
    nat descriptor type 200 masquerade
    nat descriptor address outer 200 primary
    telnetd host lan
    dhcp service server
    dhcp server rfc2131 compliant except remain-silent
    dhcp scope 1 192.168.100.2-192.168.100.191/24
    dns host lan1
    dns server 192.168.1.1
    dns server select 500201 192.168.1.1 any .
    dns private address spoof on
    dns private name setup.netvolante.jp
    httpd host lan1
    analog supplementary-service pseudo call-waiting
    analog extension dial prefix sip prefix="9#"
    statistics traffic on

●Global IP確認

https://www.myglobalip.com/ へアクセスしてIntanetにアクセスできることと、OCIのCPEリソース作成時に必要なGlobal IPを確認しておきます

0001.png

■OCI TokyoとのIPSec接続

●OCI IPSec接続設定
以前の記事を参考にIPSec作成を行い、以下画面から、OracleからIPSec接続用に払い出された2つのVPN IP Adressをメモして、NCR700WのConfigを作成します
14.png

●IPSec接続設定

以下Configを流し込みます

tunnel select 1
 description tunnel OCI-VPN1
 ipsec tunnel 1
  ipsec sa policy 1 1 esp aes256-cbc sha-hmac
  ipsec ike duration ipsec-sa 1 3600
  ipsec ike duration isakmp-sa 1 28800
  ipsec ike encryption 1 aes256-cbc
  ipsec ike group 1 modp1536
  ipsec ike hash 1 sha256
  ipsec ike keepalive log 1 off
  ipsec ike keepalive use 1 on dpd 5 4
  ipsec ike local address 1 192.168.1.254
  ipsec ike local id 1 0.0.0.0/0
  ipsec ike nat-traversal 1 on
  ipsec ike pfs 1 on
  ipsec ike pre-shared-key 1 text IPSecSharedSecret01
  ipsec ike remote address 1 140.204.100.101
  ipsec ike remote id 1 0.0.0.0/0
 ip tunnel address 192.168.255.201/30
 ip tunnel tcp mss limit auto
 tunnel enable 1
tunnel select 2
 description tunnel OCI-VPN2
 ipsec tunnel 2
  ipsec sa policy 2 2 esp aes256-cbc sha-hmac
  ipsec ike duration ipsec-sa 2 3600
  ipsec ike duration isakmp-sa 2 28800
  ipsec ike encryption 2 aes256-cbc
  ipsec ike group 2 modp1536
  ipsec ike hash 2 sha256
  ipsec ike keepalive log 2 off
  ipsec ike keepalive use 2 on dpd 5 4
  ipsec ike local address 2 192.168.1.254
  ipsec ike local id 2 0.0.0.0/0
  ipsec ike nat-traversal 2 on
  ipsec ike pfs 2 on
  ipsec ike pre-shared-key 2 text IPSecSharedSecret02
  ipsec ike remote address 2 140.204.100.102
  ipsec ike remote id 2 0.0.0.0/0
 ip tunnel address 192.168.255.205/30
 ip tunnel tcp mss limit auto
 tunnel enable 2

●IPSec SA確立確認

# show ipsec sa
    Total: isakmp:2 send:2 recv:3

    sa    sgw isakmp connection    dir  life[s] remote-id
    ----------------------------------------------------------------------------
    1     1    -     isakmp        -    28769   140.204.100.101
    2     2    -     isakmp        -    28729   140.204.100.102
    3     1    1     tun[0001]esp  send 3571    140.204.100.101
    4     1    -     tun[0001]esp  recv 3530    140.204.100.101
    5     2    2     tun[0002]esp  send 3531    140.204.100.102
    6     2    2     tun[0002]esp  recv 3531    140.204.100.102
    7     1    1     tun[0001]esp  recv 3571    140.204.100.101

●BGP設定

以下Configを流し込みます

    tunnel select 1
     ip tunnel address 192.168.255.201/30
     ip tunnel remote address 192.168.255.202
    tunnel select 2
     ip tunnel address 192.168.255.205/30
     ip tunnel remote address 192.168.255.206
    bgp use on
     bgp autonomous-system 65000
     bgp log neighbor
     bgp neighbor 1 31898 192.168.255.202 hold-time=180 local-address=192.168.255.201
     bgp neighbor 2 31898 192.168.255.206 hold-time=180 local-address=192.168.255.205
     bgp import filter 1 equal 0.0.0.0/0
     bgp import 31898 static filter 1

●OCI IPSec接続ステータス確認

IPSec、BGP共にUPしてグリーンになっていることを確認
15.png

■OCI PhoenixとのIPSec接続

上記 OCI TokyoとのIPSec接続同様に設定します。

●OCI IPSec接続設定

Tokyo Region同様以下画面から、OracleからIPSec接続用に払い出された2つのVPN IP Adressをメモして、NCR700WのConfigを作成します
08.png

●IPSec接続設定

以下Configを流し込みます

tunnel select 11
 description tunnel OCI-VPN11
 ipsec tunnel 11
  ipsec sa policy 11 11 esp aes256-cbc sha-hmac
  ipsec ike duration ipsec-sa 11 3600
  ipsec ike duration isakmp-sa 11 28800
  ipsec ike encryption 11 aes256-cbc
  ipsec ike group 11 modp1536
  ipsec ike hash 11 sha256
  ipsec ike keepalive log 11 off
  ipsec ike keepalive use 11 on dpd 5 4
  ipsec ike local address 11 192.168.1.254
  ipsec ike local id 11 0.0.0.0/0
  ipsec ike nat-traversal 11 on
  ipsec ike pfs 11 on
  ipsec ike pre-shared-key 11 text IPSecSharedSecret01
  ipsec ike remote address 11 129.146.200.201
  ipsec ike remote id 11 0.0.0.0/0
 ip tunnel address 192.168.255.213/30
 ip tunnel tcp mss limit auto
 tunnel enable 11
tunnel select 12
 description tunnel OCI-VPN12
 ipsec tunnel 12
  ipsec sa policy 12 12 esp aes256-cbc sha-hmac
  ipsec ike duration ipsec-sa 12 3600
  ipsec ike duration isakmp-sa 12 28800
  ipsec ike encryption 12 aes256-cbc
  ipsec ike group 12 modp1536
  ipsec ike hash 12 sha256
  ipsec ike keepalive log 12 off
  ipsec ike keepalive use 12 on dpd 5 4
  ipsec ike local address 12 192.168.1.254
  ipsec ike local id 12 0.0.0.0/0
  ipsec ike nat-traversal 12 on
  ipsec ike pfs 12 on
  ipsec ike pre-shared-key 12 text IPSecSharedSecret02
  ipsec ike remote address 12 129.146.200.202
  ipsec ike remote id 12 0.0.0.0/0
 ip tunnel address 192.168.255.217/30
 ip tunnel tcp mss limit auto
 tunnel enable 12

●IPSec SA確立確認

# ipsec auto refresh on
# show ipsec sa
    Total: isakmp:4 send:6 recv:7

    sa    sgw isakmp connection    dir  life[s] remote-id
    ----------------------------------------------------------------------------
    1     1    -     isakmp        -    25300   140.204.100.101
    2     2    -     isakmp        -    25260   140.204.100.102
    3     1    1     tun[0001]esp  send 101     140.204.100.101
    4     1    -     tun[0001]esp  recv 60      140.204.100.101
    5     2    2     tun[0002]esp  send 61      140.204.100.102
    6     2    2     tun[0002]esp  recv 61      140.204.100.102
    7     1    1     tun[0001]esp  recv 101     140.204.100.101
    8     2    2     tun[0002]esp  send 2769    140.204.100.102
    9     2    2     tun[0002]esp  recv 2769    140.204.100.102
    10    1    1     tun[0001]esp  send 2809    140.204.100.101
    11    1    1     tun[0001]esp  recv 2809    140.204.100.101
    12    12   16    tun[0012]esp  send 3482    129.146.200.202
    13    11   -     isakmp        -    28605   129.146.200.201
    14    11   13    tun[0011]esp  send 3410    129.146.200.201
    15    11   13    tun[0011]esp  recv 3410    129.146.200.201
    16    12   -     isakmp        -    28677   129.146.200.202
    17    12   16    tun[0012]esp  recv 3482    129.146.200.202

●BGP設定

    tunnel select 11
     ip tunnel address 192.168.255.213/30
     ip tunnel remote address 192.168.255.214

    tunnel select 12
     ip tunnel address 192.168.255.217/30
     ip tunnel remote address 192.168.255.218

    bgp use on
     bgp autonomous-system 65000
     bgp log neighbor
     bgp neighbor 11 31898 192.168.255.214 hold-time=180 local-address=192.168.255.213
     bgp neighbor 12 31898 192.168.255.218 hold-time=180 local-address=192.168.255.217
     bgp import filter 1 equal 0.0.0.0/0
     bgp import 31898 static filter 1

●BGP伝搬確認

① BGP設定反映

# bgp configure refresh

②neighbor確認

# show status bgp neighbor
    BGP neighbor is 192.168.255.202, remote AS 31898, local AS 65000, external link
    BGP version 4, remote router ID 192.168.255.202
    BGP state = Established, up for 00:07:01
    Last read 00:00:34, hold time is 180, keepalive interval is 60 seconds
    Received 9 messages, 0 notifications, 0 in queue
    Sent 12 messages, 0 notifications, 0 in queue
    Connection established 1; dropped 0
    Last reset never
    Local host: 192.168.255.201, Local port: 179
    Foreign host: 192.168.255.202, Foreign port: 52226

    BGP neighbor is 192.168.255.206, remote AS 31898, local AS 65000, external link
    BGP version 4, remote router ID 192.168.255.206
    BGP state = Established, up for 00:06:55
    Last read 00:00:20, hold time is 180, keepalive interval is 60 seconds
    Received 8 messages, 0 notifications, 0 in queue
    Sent 10 messages, 0 notifications, 0 in queue
    Connection established 1; dropped 0
    Last reset never
    Local host: 192.168.255.205, Local port: 1024
    Foreign host: 192.168.255.206, Foreign port: 179

    BGP neighbor is 192.168.255.214, remote AS 31898, local AS 65000, external link
    BGP version 4, remote router ID 192.168.255.214
    BGP state = Established, up for 00:06:52
    Last read 00:00:16, hold time is 180, keepalive interval is 60 seconds
    Received 9 messages, 0 notifications, 0 in queue
    Sent 11 messages, 0 notifications, 0 in queue
    Connection established 1; dropped 0
    Last reset never
    Local host: 192.168.255.213, Local port: 179
    Foreign host: 192.168.255.214, Foreign port: 56551

    BGP neighbor is 192.168.255.218, remote AS 31898, local AS 65000, external link
    BGP version 4, remote router ID 192.168.255.218
    BGP state = Established, up for 00:06:48
    Last read 00:00:10, hold time is 180, keepalive interval is 60 seconds
    Received 8 messages, 0 notifications, 0 in queue
    Sent 10 messages, 0 notifications, 0 in queue
    Connection established 1; dropped 0
    Last reset never
    Local host: 192.168.255.217, Local port: 1026
    Foreign host: 192.168.255.218, Foreign port: 179

●OCI IPSec接続ステータス確認

IPSec、BGP共にUPしてグリーンになっていることを確認
15.png

■Route確認

下記のように OCI TokyoとPhoenixの VCN内Subnetと Object Storage Autonomous DBのある Oracle Services Network(OSN)のアドレスが伝搬されていれば接続完了です!

# show ip route
    Destination         Gateway          Interface       Kind  Additional Info.
    default             192.168.1.1            LAN2    static
    10.0.0.0/24         192.168.255.202   TUNNEL[1]       BGP  path=31898
    10.20.0.0/24        192.168.255.214  TUNNEL[11]       BGP  path=31898
    129.146.12.128/25   192.168.255.214  TUNNEL[11]       BGP  path=31898
    129.146.13.128/25   192.168.255.214  TUNNEL[11]       BGP  path=31898
    129.146.14.128/25   192.168.255.214  TUNNEL[11]       BGP  path=31898
    130.35.0.0/22       192.168.255.214  TUNNEL[11]       BGP  path=31898
    130.35.128.0/22     192.168.255.214  TUNNEL[11]       BGP  path=31898
    134.70.8.0/21       192.168.255.214  TUNNEL[11]       BGP  path=31898
    134.70.16.0/22      192.168.255.214  TUNNEL[11]       BGP  path=31898
    134.70.80.0/23      192.168.255.202   TUNNEL[1]       BGP  path=31898
    134.70.82.0/23      192.168.255.202   TUNNEL[1]       BGP  path=31898
    138.1.32.0/21       192.168.255.214  TUNNEL[11]       BGP  path=31898
    140.91.4.0/22       192.168.255.214  TUNNEL[11]       BGP  path=31898
    140.91.8.0/23       192.168.255.214  TUNNEL[11]       BGP  path=31898
    140.91.32.0/23      192.168.255.202   TUNNEL[1]       BGP  path=31898
    140.204.8.128/25    192.168.255.202   TUNNEL[1]       BGP  path=31898
    147.154.96.0/20     192.168.255.214  TUNNEL[11]       BGP  path=31898
    192.29.36.0/22      192.168.255.202   TUNNEL[1]       BGP  path=31898
    192.29.40.0/22      192.168.255.202   TUNNEL[1]       BGP  path=31898
    192.29.44.0/25      192.168.255.202   TUNNEL[1]       BGP  path=31898
    192.29.96.0/21      192.168.255.214  TUNNEL[11]       BGP  path=31898
    192.168.1.0/24      192.168.1.254          LAN2  implicit
    192.168.100.0/24    192.168.100.1          LAN1  implicit
    192.168.255.200/30  -                 TUNNEL[1]  implicit
    192.168.255.204/30  -                 TUNNEL[2]  implicit
    192.168.255.212/30  -                TUNNEL[11]  implicit
    192.168.255.216/30  -                TUNNEL[12]  implicit

※OCIからBGPで伝搬されるOCNのCIDRはPublic IP Address RangesのJSONに記載ある"OSN"と"OBJECT_STORAGE"項目部分のCIDRです。
・参考:VCNおよびOracle Services Network用のパブリックIPアドレス
 https://docs.cloud.oracle.com/ja-jp/iaas/Content/General/Concepts/addressranges.htm#osn-ranges

■疎通確認テスト

●Tokyo -> Phoenix

①ping確認

[opc@tokyo-inst01 ~]$ ping 10.20.0.2 -c 3
    PING 10.20.0.2 (10.20.0.2) 56(84) bytes of data.
    64 bytes from 10.20.0.2: icmp_seq=1 ttl=61 time=238 ms
    64 bytes from 10.20.0.2: icmp_seq=2 ttl=61 time=249 ms
    64 bytes from 10.20.0.2: icmp_seq=3 ttl=61 time=242 ms

    --- 10.20.0.2 ping statistics ---
    3 packets transmitted, 3 received, 0% packet loss, time 2002ms
    rtt min/a

② traceroute確認

[opc@tokyo-inst01 ~]$ traceroute 10.20.0.2
    traceroute to 10.20.0.2 (10.20.0.2), 30 hops max, 60 byte packets
    1  140.91.206.7 (140.91.206.7)  0.096 ms  0.062 ms 140.91.206.1 (140.91.206.1)  0.062 ms
    2  192.168.255.201 (192.168.255.201)  167.812 ms  173.649 ms  167.697 ms
    3  * * *
    4  10.20.0.2 (10.20.0.2)  240.176 ms !X  245.285 ms !X  239.150 ms !X

③ iperf3確認

[root@tokyo-inst01 opc]# iperf3 -c 10.20.0.2
    Connecting to host 10.20.0.2, port 5201
    [  4] local 10.0.0.2 port 50752 connected to 10.20.0.2 port 5201
    [ ID] Interval           Transfer     Bandwidth       Retr  Cwnd
    [  4]   0.00-1.00   sec   275 KBytes  2.25 Mbits/sec    0   76.8 KBytes
    [  4]   1.00-2.00   sec   583 KBytes  4.77 Mbits/sec    0    193 KBytes
    [  4]   2.00-3.00   sec   699 KBytes  5.73 Mbits/sec    0    223 KBytes
    [  4]   3.00-4.00   sec  1017 KBytes  8.33 Mbits/sec    0    258 KBytes
    [  4]   4.00-5.00   sec   826 KBytes  6.77 Mbits/sec    0    299 KBytes
    [  4]   5.00-6.00   sec   890 KBytes  7.29 Mbits/sec    0    344 KBytes
    [  4]   6.00-7.00   sec  1017 KBytes  8.33 Mbits/sec    2    241 KBytes
    [  4]   7.00-8.00   sec   445 KBytes  3.64 Mbits/sec    0    285 KBytes
    [  4]   8.00-9.00   sec  1017 KBytes  8.33 Mbits/sec    0    319 KBytes
    [  4]   9.00-10.00  sec   445 KBytes  3.64 Mbits/sec    0    332 KBytes
    - - - - - - - - - - - - - - - - - - - - - - - - -
    [ ID] Interval           Transfer     Bandwidth       Retr
    [  4]   0.00-10.00  sec  7.04 MBytes  5.91 Mbits/sec    2             sender
    [  4]   0.00-10.00  sec  6.61 MBytes  5.54 Mbits/sec                  receiver

    iperf Done.

●Phoenix -> Tokyo

① ping確認

[opc@phoeinx-inst01 ~]$ ping 10.0.0.2 -c 3
    PING 10.0.0.2 (10.0.0.2) 56(84) bytes of data.
    64 bytes from 10.0.0.2: icmp_seq=1 ttl=61 time=240 ms
    64 bytes from 10.0.0.2: icmp_seq=2 ttl=61 time=237 ms
    64 bytes from 10.0.0.2: icmp_seq=3 ttl=61 time=237 ms

    --- 10.0.0.2 ping statistics ---
    3 packets transmitted, 3 received, 0% packet loss, time 2002ms
    rtt min/avg/max/mdev = 237.468/238.691/240.616/1.488 ms

② traceroute確認

[opc@phoeinx-inst01 ~]$ traceroute 10.0.0.2
    traceroute to 10.0.0.2 (10.0.0.2), 30 hops max, 60 byte packets
    1  140.91.194.7 (140.91.194.7)  0.078 ms 140.91.194.6 (140.91.194.6)  0.058 ms 140.91.194.5 (140.91.194.5)  0.057 ms
    2  192.168.255.213 (192.168.255.213)  75.008 ms  74.983 ms *
    3  * * *
    4  10.0.0.2 (10.0.0.2)  243.052 ms !X  247.195 ms !X  239.075 ms !X

③ iperf3確認

[root@phoeinx-inst01 opc]# iperf3 -c 10.0.0.2
    Connecting to host 10.0.0.2, port 5201
    [  4] local 10.20.0.2 port 35834 connected to 10.0.0.2 port 5201
    [ ID] Interval           Transfer     Bandwidth       Retr  Cwnd
    [  4]   0.00-1.00   sec   321 KBytes  2.63 Mbits/sec    0   95.9 KBytes
    [  4]   1.00-2.00   sec  1.30 MBytes  10.9 Mbits/sec    0    433 KBytes
    [  4]   2.00-3.00   sec  1.37 MBytes  11.5 Mbits/sec    5    332 KBytes
    [  4]   3.00-4.00   sec  1.12 MBytes  9.37 Mbits/sec    0    373 KBytes
    [  4]   4.00-5.00   sec  1.18 MBytes  9.89 Mbits/sec    7    191 KBytes
    [  4]   5.00-6.00   sec  1.12 MBytes  9.37 Mbits/sec    1    142 KBytes
    [  4]   6.00-7.00   sec   636 KBytes  5.21 Mbits/sec    1    106 KBytes
    [  4]   7.00-8.00   sec  0.00 Bytes  0.00 bits/sec    0    120 KBytes
    [  4]   8.00-9.00   sec   572 KBytes  4.69 Mbits/sec    0    126 KBytes
    [  4]   9.00-10.00  sec   572 KBytes  4.69 Mbits/sec    0    127 KBytes
    - - - - - - - - - - - - - - - - - - - - - - - - -
    [ ID] Interval           Transfer     Bandwidth       Retr
    [  4]   0.00-10.00  sec  8.13 MBytes  6.82 Mbits/sec   14             sender
    [  4]   0.00-10.00  sec  7.04 MBytes  5.90 Mbits/sec                  receiver

    iperf Done.

●Hawaii-> Tokyo

①ping確認

[root@onp-inst01:~]$ ping 10.0.0.2 -c 3
    PING 10.0.0.2 (10.0.0.2): 56 data bytes
    64 bytes from 10.0.0.2: icmp_seq=0 ttl=62 time=175.013 ms
    64 bytes from 10.0.0.2: icmp_seq=1 ttl=62 time=168.506 ms
    64 bytes from 10.0.0.2: icmp_seq=2 ttl=62 time=168.111 ms

    --- 10.0.0.2 ping statistics ---
    3 packets transmitted, 3 packets received, 0.0% packet loss
    round-trip min/avg/max/stddev = 168.111/170.543/175.013/3.165 ms

②traceroute確認

[root@onp-inst01:~]$ traceroute -I 10.0.0.2
    traceroute to 10.0.0.2 (10.0.0.2), 64 hops max, 72 byte packets
    1  * * *
    2  * * *
    3  10.0.0.2 (10.0.0.2)  168.008 ms  167.699 ms  168.381 ms

●Hawaii-> Phoenix

①ping確認

[root@onp-inst01:~]$ ping 10.20.0.2 -c 3
    PING 10.20.0.2 (10.20.0.2): 56 data bytes
    64 bytes from 10.20.0.2: icmp_seq=0 ttl=62 time=68.881 ms
    64 bytes from 10.20.0.2: icmp_seq=1 ttl=62 time=71.827 ms
    64 bytes from 10.20.0.2: icmp_seq=2 ttl=62 time=72.269 ms

    --- 10.20.0.2 ping statistics ---
    3 packets transmitted, 3 packets received, 0.0% packet loss
    round-trip min/avg/max/stddev = 68.881/70.992/72.269/1.504 ms

②traceroute確認

[root@onp-inst01:~]$ traceroute -I 10.20.0.2
    traceroute to 10.20.0.2 (10.20.0.2), 64 hops max, 72 byte packets
    1  * * *
    2  * * *
    3  10.20.0.2 (10.20.0.2)  70.350 ms  70.649 ms  70.574 ms

■最終Config

# show config
    # NVR700W Rev.15.00.16 (Thu Jun 20 19:48:42 2019)
    # MAC Address : 00:a0:cd:a2:c1, 00:a0:cd:a2:c2
    # Memory 256Mbytes, 2LAN, 1ONU, 1WWAN
    # main:  NVR700W ver=00 serial=TESTSERIAL MAC-Address=00:a0:cd:a2:c1 MAC-Addr
    ess=00:a0:cd:a2:c2
    # Reporting Date: Mar 11 15:48:06 2020
    console character en.ascii
    ip route default gateway 192.168.1.1
    ip keepalive 1 icmp-echo 10 5 192.168.1.1
    ip lan1 address 192.168.100.1/24
    description lan2 Hawaii-Hotel01
    ip lan2 address 192.168.1.254/24
    ip lan2 nat descriptor 200
    tunnel select 1
    description tunnel OCI-VPN1
    ipsec tunnel 1
    ipsec sa policy 1 1 esp aes256-cbc sha-hmac
    ipsec ike duration ipsec-sa 1 3600
    ipsec ike duration isakmp-sa 1 28800
    ipsec ike encryption 1 aes256-cbc
    ipsec ike group 1 modp1536
    ipsec ike hash 1 sha256
    ipsec ike keepalive log 1 off
    ipsec ike keepalive use 1 on dpd 5 4
    ipsec ike local address 1 192.168.1.254
    ipsec ike local id 1 0.0.0.0/0
    ipsec ike nat-traversal 1 on
    ipsec ike pfs 1 on
    ipsec ike pre-shared-key 1 text IPSecSharedSecret01
    ipsec ike remote address 1 140.204.100.101
    ipsec ike remote id 1 0.0.0.0/0
    ip tunnel address 192.168.255.201/30
    ip tunnel remote address 192.168.255.202
    ip tunnel tcp mss limit auto
    tunnel enable 1
    tunnel select 2
    description tunnel OCI-VPN2
    ipsec tunnel 2
    ipsec sa policy 2 2 esp aes256-cbc sha-hmac
    ipsec ike duration ipsec-sa 2 3600
    ipsec ike duration isakmp-sa 2 28800
    ipsec ike encryption 2 aes256-cbc
    ipsec ike group 2 modp1536
    ipsec ike hash 2 sha256
    ipsec ike keepalive log 2 off
    ipsec ike keepalive use 2 on dpd 5 4
    ipsec ike local address 2 192.168.1.254
    ipsec ike local id 2 0.0.0.0/0
    ipsec ike nat-traversal 2 on
    ipsec ike pfs 2 on
    ipsec ike pre-shared-key 2 text IPSecSharedSecret02
    ipsec ike remote address 2 140.204.100.102
    ipsec ike remote id 2 0.0.0.0/0
    ip tunnel address 192.168.255.205/30
    ip tunnel remote address 192.168.255.206
    ip tunnel tcp mss limit auto
    tunnel enable 2
    tunnel select 11
    description tunnel OCI-VPN11
    ipsec tunnel 11
    ipsec sa policy 11 11 esp aes256-cbc sha-hmac
    ipsec ike duration ipsec-sa 11 3600
    ipsec ike duration isakmp-sa 11 28800
    ipsec ike encryption 11 aes256-cbc
    ipsec ike group 11 modp1536
    ipsec ike hash 11 sha256
    ipsec ike keepalive log 11 off
    ipsec ike keepalive use 11 on dpd 5 4
    ipsec ike local address 11 192.168.1.254
    ipsec ike local id 11 0.0.0.0/0
    ipsec ike nat-traversal 11 on
    ipsec ike pfs 11 on
    ipsec ike pre-shared-key 11 text IPSecSharedSecret01
    ipsec ike remote address 11 129.146.200.201
    ipsec ike remote id 11 0.0.0.0/0
    ip tunnel address 192.168.255.213/30
    ip tunnel remote address 192.168.255.214
    ip tunnel tcp mss limit auto
    tunnel enable 11
    tunnel select 12
    description tunnel OCI-VPN12
    ipsec tunnel 12
    ipsec sa policy 12 12 esp aes256-cbc sha-hmac
    ipsec ike duration ipsec-sa 12 3600
    ipsec ike duration isakmp-sa 12 28800
    ipsec ike encryption 12 aes256-cbc
    ipsec ike group 12 modp1536
    ipsec ike hash 12 sha256
    ipsec ike keepalive log 12 off
    ipsec ike keepalive use 12 on dpd 5 4
    ipsec ike local address 12 192.168.1.254
    ipsec ike local id 12 0.0.0.0/0
    ipsec ike nat-traversal 12 on
    ipsec ike pfs 12 on
    ipsec ike pre-shared-key 12 text IPSecSharedSecret02
    ipsec ike remote address 12 129.146.200.202
    ipsec ike remote id 12 0.0.0.0/0
    ip tunnel address 192.168.255.217/30
    ip tunnel remote address 192.168.255.218
    ip tunnel tcp mss limit auto
    tunnel enable 12
    ip filter 500000 restrict * * * * *
    nat descriptor type 200 masquerade
    nat descriptor address outer 200 primary
    bgp use on
    bgp autonomous-system 65000
    bgp log neighbor
    bgp neighbor 1 31898 192.168.255.202 hold-time=180 local-address=192.168.255.201
    bgp neighbor 2 31898 192.168.255.206 hold-time=180 local-address=192.168.255.205
    bgp neighbor 11 31898 192.168.255.214 hold-time=180 local-address=192.168.255.213
    bgp neighbor 12 31898 192.168.255.218 hold-time=180 local-address=192.168.255.217
    bgp import filter 1 equal 0.0.0.0/0
    bgp import 31898 static filter 1
    ipsec auto refresh on
    telnetd host lan
    dhcp service server
    dhcp server rfc2131 compliant except remain-silent
    dhcp scope 1 192.168.100.2-192.168.100.191/24
    dns host lan1
    dns server 192.168.1.1
    dns server select 500201 192.168.1.1 any .
    dns private address spoof on
    dns private name setup.netvolante.jp
    httpd host lan1
    analog supplementary-service pseudo call-waiting
    analog extension dial prefix sip prefix="9#"
    statistics traffic on

■Config保存

SAVEコマンドで保存して完了です

# save
    Saving ... CONFIG0 Done .
10
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
10
1