$Date: 2025/07/18 15:32:42 $
これまでの IPsec の実装は、拠点間を常時接続する使い方に最適化されており、例えば出張先や自宅からインターネット経由で会社の VPN に接続するような、IPsec クライアントからのリモートアクセスには向いていませんでした。
具体的には、
これらの問題を解決するために、IPsec の実装を拡張することで、以下の4つの機能を追加します。
ヤマハ RT シリーズでは、以下の機種およびファームウェアで、IPsec XAUTH 認証機能をサポートしています。
| 機種 | ファームウェア |
|---|---|
vRXシリーズ |
すべてのリビジョン |
RTX840 |
|
RTX3510 |
|
RTX1300 |
|
RTX1220 |
|
RTX830 |
|
NVR700W |
|
RTX1210 |
|
RTX5000 |
|
RTX3500 |
|
FWX120 |
|
RTX810 |
|
RTX1200 |
|
SRT100 |
|
RTX3000 |
Rev.9.00.15 以降 |
RTX1500 |
Rev.8.03.46 以降 |
RTX1100 |
|
RT107e |
VPN クライアントソフトウェア YMS-VPN1 および YMS-VPN1-LP10 では、Ver.2.2.1.03 以降でIPsec XAUTH 認証機能をサポートしています。
-------------------+--------------- 10.1.1.0/24
| .1
+---+-----+
| RTX1500 |
+---+-----+
| .150
----+-------+--------------- 192.168.0.0/24
| .253
+---+----+
| RT300i |
+---+----+
| .254
-------+------+----+----------- 192.168.20.0/24
| |
pc pc2
|
ip route 192.168.20.0/24 gateway 192.168.0.253 ip lan1 address 10.1.1.1/24 ip lan1 proxyarp on ip lan2 address 192.168.0.150/24 tunnel select 1 ipsec tunnel 1 ipsec sa policy 1 1 esp aes-cbc sha-hmac ipsec ike encryption 1 aes-cbc ipsec ike group 1 modp1024 ipsec ike local address 1 192.168.0.150 ipsec ike pre-shared-key 1 text PSKEY1 ipsec ike remote address 1 any ipsec ike remote name 1 pc ipsec ike xauth request 1 on 11 ipsec ike mode-cfg address 1 1 tunnel enable 1 tunnel select 2 ipsec tunnel 2 ipsec sa policy 2 2 esp aes-cbc sha-hmac ipsec ike encryption 2 aes-cbc ipsec ike group 2 modp1024 ipsec ike local address 2 192.168.0.150 ipsec ike pre-shared-key 2 text PSKEY2 ipsec ike remote address 2 any ipsec ike remote name 2 pc2 ipsec ike xauth request 2 on 12 ipsec ike mode-cfg address 2 1 tunnel enable 2 ipsec ike mode-cfg address pool 1 10.1.1.100-10.1.1.101/32 auth user 1 USERNAME1 PASSWORD1 auth user 2 USERNAME2 PASSWORD2 auth user 3 USERNAME3 PASSWORD3 auth user 4 USERNAME4 PASSWORD4 auth user group 11 1 2 auth user group attribute 11 xauth=on auth user group 12 3 4 auth user group attribute 12 xauth=on |
事前共有鍵: PSKEY1 このクライアントの名前: pc 接続先ゲートウェイ: 192.168.0.150 認証アルゴリズム: HMAC-SHA 暗号アルゴリズム: AES-CBC 接続先ネットワーク: 10.1.1.0/24 このクライアントの内部 IP アドレス: IKE 設定モードで指定 |
事前共有鍵: PSKEY2 このクライアントの名前: pc2 |
ip route 192.168.20.0/24 gateway 192.168.0.253 ip lan1 address 10.1.1.1/24 ip lan1 proxyarp on ip lan2 address 192.168.0.150/24 tunnel select 1 tunnel template 2 ipsec tunnel 1 ipsec sa policy 1 1 esp aes-cbc sha-hmac ipsec ike encryption 1 aes-cbc ipsec ike group 1 modp1024 ipsec ike local address 1 192.168.0.150 ipsec ike pre-shared-key 1 text PSKEY1 ipsec ike remote address 1 any ipsec ike remote name 1 pc ipsec ike xauth request 1 on 11 ipsec ike mode-cfg address 1 1 tunnel enable 1 tunnel select 2 ipsec ike pre-shared-key 2 text PSKEY2 ipsec ike xauth request 2 on 12 ipsec ike mode-cfg address pool 1 10.1.1.100-10.1.1.101/32 auth user 1 USERNAME1 PASSWORD1 auth user 2 USERNAME2 PASSWORD2 auth user 3 USERNAME3 PASSWORD3 auth user 4 USERNAME4 PASSWORD4 auth user group 11 1 2 auth user group attribute 11 xauth=on auth user group 12 3 4 auth user group attribute 12 xauth=on |
+---------------+
| RADIUS サーバ |
+-------+-------+
| .2
------------+------+--------------- 10.1.1.0/24
| .1
+---+-----+
| RTX1500 |
+---+-----+
| .150
----+-------+--------------- 192.168.0.0/24
| .253
+---+----+
| RT300i |
+---+----+
| .254
-------+------+---+---+------+- 192.168.20.0/24
| | | |
pc pc2 pc3 .. pc100
|
ip route 192.168.20.0/24 gateway 192.168.0.253 ip lan1 address 10.1.1.1/24 ip lan1 proxyarp on ip lan2 address 192.168.0.150/24 radius auth on radius auth server 10.1.1.2 radius auth port 1812 radius secret SECRET tunnel select 1 tunnel template 2-100 ipsec tunnel 1 ipsec sa policy 1 1 esp aes-cbc sha-hmac ipsec ike encryption 1 aes-cbc ipsec ike group 1 modp1024 ipsec ike local address 1 192.168.0.150 ipsec ike remote address 1 any ipsec ike remote name 1 pc ipsec ike xauth request 1 on tunnel enable 1 tunnel select 3 ipsec sa policy 3 3 esp 3des-cbc md5-hmac |
"pc" Auth-Type := Local, User-Password == "yamaha"
Tunnel-Password = "PSKEY1"
"pc2" Auth-Type := Local, User-Password == "yamaha"
Tunnel-Password = "PSKEY2"
"pc3" Auth-Type := Local, User-Password == "yamaha"
Tunnel-Password = "PSKEY3"
:
"pc100" Auth-Type := Local, User-Password == "yamaha"
Tunnel-Password = "PSKEY100"
|
"USERNAME1" Auth-Type := Local, User-Password == "PASSWORD1"
Reply-Message = "Hello, %u",
Service-Type = Framed-User,
Framed-Protocol = PPP,
Tunnel-Client-Endpoint = "10.1.1.100"
"USERNAME2" Auth-Type := Local, User-Password == "PASSWORD2"
Reply-Message = "Hello, %u",
Service-Type = Framed-User,
Framed-Protocol = PPP,
Tunnel-Client-Endpoint = "10.1.1.101"
:
"USERNAME100" Auth-Type := Local, User-Password == "PASSWORD100"
Reply-Message = "Hello, %u",
Service-Type = Framed-User,
Framed-Protocol = PPP,
Tunnel-Client-Endpoint = "10.1.1.199"
|