RT57iのVPN接続でLAN内につながらない
PC1 -> RTX1100 -> Internet -> RT57i -> PC2
RT57iでpptp設定を行いPC1から接続はできましたが
PC1からPC2へpingが通りません。
1:PC1からRT57iのVPN接続は完了している
2:PC1からRT57iへのpingは通る
3:RT57iからPC2へpingは通る
4:PC1からPC2へのpingは通らない
RTX1100 : 192.168.12.0/24
PC1 : 192.168.12.4
(pptpで割り振られたIP:192.168.0.14)
RT57i : 192.168.0.0/24
PC2 : 192.168.0.101
問題点はどこにありますでしょうか?
ip route default gateway pp 1 filter 500000 gateway pp 1
ip lan1 address 192.168.0.1/24
ip lan1 proxyarp on
ip lan1 secure filter in 100000 100001 100002 100003 100004 100005 100006 100007 100099
pp disable all
pp select 1
pppoe use lan2
pppoe auto disconnect off
pppoe call prohibit auth-error count off
pp auth accept pap chap
pp auth myname xxxxxxxx xxxxxxxx
ppp lcp mru on 1454
ppp ipcp ipaddress on
ppp ipcp msext on
ppp ccp type none
ip pp secure filter in 200003 200020 200021 200022 200023 200024 200025 200030 200031 200032 200033 200035 200080 200081 200082 200083
ip pp secure filter out 200013 200020 200021 200022 200023 200024 200025 200026 200027 200099
ip pp nat descriptor 1000
netvolante-dns hostname host pp xxxxxxxxxxxx
pp enable 1
pp select anonymous
pp name RAS/VPN:
pp bind tunnel1
pp auth request mschap-v2
pp auth username xxxxxxxxxxxx xxxxxxxxxxxx
ppp ipcp ipaddress on
ppp ccp type mppe-any
ppp ipv6cp use off
ip pp remote address pool dhcp
pptp service type server
pp enable anonymous
tunnel disable all
tunnel select 1
tunnel encapsulation pptp
pptp tunnel disconnect time off
tunnel enable 1
ip filter 100000 reject * * udp,tcp 135 *
ip filter 100001 reject * * udp,tcp * 135
ip filter 100002 reject * * udp,tcp netbios_ns-netbios_dgm *
ip filter 100003 reject * * udp,tcp * netbios_ns-netbios_dgm
ip filter 100004 reject * * udp,tcp netbios_ssn *
ip filter 100005 reject * * udp,tcp * netbios_ssn
ip filter 100006 reject * * udp,tcp 445 *
ip filter 100007 reject * * udp,tcp * 445
ip filter 100099 pass * * * * *
ip filter 200000 reject 10.0.0.0/8 * * * *
ip filter 200001 reject 172.16.0.0/12 * * * *
ip filter 200002 reject 192.168.0.0/16 * * * *
ip filter 200003 reject 192.168.0.0/24 * * * *
ip filter 200010 reject * 10.0.0.0/8 * * *
ip filter 200011 reject * 172.16.0.0/12 * * *
ip filter 200012 reject * 192.168.0.0/16 * * *
ip filter 200013 reject * 192.168.0.0/24 * * *
ip filter 200020 reject * * udp,tcp 135 *
ip filter 200021 reject * * udp,tcp * 135
ip filter 200022 reject * * udp,tcp netbios_ns-netbios_ssn *
ip filter 200023 reject * * udp,tcp * netbios_ns-netbios_ssn
ip filter 200024 reject * * udp,tcp 445 *
ip filter 200025 reject * * udp,tcp * 445
ip filter 200026 restrict * * tcpfin * www,21,nntp
ip filter 200027 restrict * * tcprst * www,21,nntp
ip filter 200030 pass * 192.168.0.0/24 icmp * *
ip filter 200031 pass * 192.168.0.0/24 established * *
ip filter 200032 pass * 192.168.0.0/24 tcp * ident
ip filter 200033 pass * 192.168.0.0/24 tcp ftpdata *
ip filter 200034 pass * 192.168.0.0/24 tcp,udp * domain
ip filter 200035 pass * 192.168.0.0/24 udp domain *
ip filter 200036 pass * 192.168.0.0/24 udp * ntp
ip filter 200037 pass * 192.168.0.0/24 udp ntp *
ip filter 200080 pass * 192.168.0.1 tcp * 5060
ip filter 200081 pass * 192.168.0.1 udp * 5004-5060
ip filter 200082 pass * 192.168.0.1 tcp * 1723
ip filter 200083 pass * 192.168.0.1 gre * *
ip filter 200099 pass * * * * *
ip filter 500000 restrict * * * * *
nat descriptor type 1000 masquerade
nat descriptor masquerade static 1000 1 192.168.0.1 tcp 5060
nat descriptor masquerade static 1000 2 192.168.0.1 udp 5004-5060
nat descriptor masquerade static 1000 3 192.168.0.1 tcp 1723
nat descriptor masquerade static 1000 4 192.168.0.1 gre
dhcp service server
dhcp server rfc2131 compliant except remain-silent
dhcp scope 1 192.168.0.2-192.168.0.99/24
dns server pp 1
dns server select 500001 pp 1 any . restrict pp 1
dns private address spoof on
dns private name xxxxxxxxxxxx
pptp service on
お礼
ご回答いただきありがとうございます! なるほど。TCP/UDP以外のプロトコルではそれぞれTCP/UDPのポート番号と似たようなもので“NAT越え”を実現しているんですね。 これですっきりしました。ありがとうございました。