13. インターフェース設定の検証をお願いします
FORSE
手順7
「lan2」「internal2」インターフェースの設定を検証します
参加者毎に違います
showコマンド、検索を結合してます。「|」パイプ、「-f」は階層表示
キーワードはここに「 <--- 」
192.168.10.1になっている事を確認します
手順8
WAN1、vlan10を検証します
172.16.10.1 255.255.255.252 になっている事を確認します
13
FGT60D4614079145 # show system interface | grep -f internal2
config system interface
edit "internal2" <---
set vdom "root"
set ip 192.168.10.1 255.255.255.0
set allowaccess ping https ssh http
set type physical
set snmp-index 7
next
end
FGT60D4614079145 # show system interface | grep -f "vlanid 10"
config system interface
edit "VALN10"
set vdom "root"
set ip 172.16.10.1 255.255.255.252
set allowaccess ping https ssh http fgfm
set device-identification enable
set role lan
set snmp-index 8
set interface "wan1"
set vlanid 10 <---
next
end
FGT60D4614079145 #
50Eモデルは
「lan2」
14. 疎通確認
FORSE
手順9
PC1とLAN2をLANケーブルで接続する。
SwitchとWAN1をLANケーブルで接続する。
SwitchとルーターをLANケーブルで接続する。
手順10
FortiGateからの疎通確認を実施します(表示がない場合は、admin配下)
14
FGT60D4614079145 # execute ping 172.16.10.2
PING 172.16.10.2 (172.16.10.2): 56 data bytes
64 bytes from 172.16.10.2: icmp_seq=0 ttl=255 time=14.1 ms
64 bytes from 172.16.10.2: icmp_seq=1 ttl=255 time=0.8 ms
64 bytes from 172.16.10.2: icmp_seq=2 ttl=255 time=0.8 ms
64 bytes from 172.16.10.2: icmp_seq=3 ttl=255 time=0.8 ms
64 bytes from 172.16.10.2: icmp_seq=4 ttl=255 time=0.7 ms
--- 172.16.10.2 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.7/3.4/14.1 ms
FGT60D4614079145 #
FGT60D4614079145 # execute ping 192.168.10.2
PING 192.168.10.2 (192.168.10.2): 56 data bytes
64 bytes from 192.168.10.2: icmp_seq=0 ttl=128 time=0.6 ms
64 bytes from 192.168.10.2: icmp_seq=1 ttl=128 time=0.6 ms
64 bytes from 192.168.10.2: icmp_seq=2 ttl=128 time=0.4 ms
64 bytes from 192.168.10.2: icmp_seq=3 ttl=128 time=0.5 ms
64 bytes from 192.168.10.2: icmp_seq=4 ttl=128 time=1.4 ms
--- 192.168.10.2 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.4/0.7/1.4 ms
32. Fortigateおまけ
FORSE
Fortigate初期化(工場初期出荷状態)
Teratermで以下コマンドを入力し初期化する。
ping疎通確認
FGT50E XXXXXXXXXX # execute factoryreset
This operation will reset the system to factory default!
Do you want to continue? (y/n)y
System is resetting to factory default...
The sysem is going down NOW !!
32
FGT50XXXXXXXXXXX # execute ping 192.168.1.99
PING 192.168.1.100 (192.168.1.100): 56 data bytes
64 bytes from 192.168.1.100: icmp_seq=0 ttl=128 time=1.0 ms
64 bytes from 192.168.1.100: icmp_seq=1 ttl=128 time=1.3
33. スタティックルート答え
FORSE 33
左ペイン → 「ネットワーク」 → 「スタティックルート」 → 新規作成
宛先で「サブネット」→ 192.168.100.0/24
インターフェース:VLAN10
ゲートウェイアドレス:172.16.10.2
FGT50E3U16013737 # show router static
config router static
edit 1
set dst 192.168.100.0 255.255.255.0
set gateway 172.16.10.2
set device "vlanid 10"
next
end
34. Labo環境用スイッチ設定
FORSE
VLAN作成する
ルータ側をトランクポートにする
Fortigate側をトランクにする
検証します
#1~5と9がaccessでない事
検証します
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 10,20,30,40,50
Switch(config-vlan)#exit
Switch(config)#
34
Switch(config)#interface gigabitEthernet 0/9
Switch(config-if)#switchport mode trunk
Switch(config-if)#end
Switch(config)#interface range gigabitEthernet 0/1 – 5
Switch(config-if-range)#switchport mode trunk
Switch(config)#interface gigabitEthernet 0/1
Switch(config-if)#switchport trunk allowed vlan 10
Switch(config-if)#interface gigabitEthernet 0/2
Switch(config-if)#switchport trunk allowed vlan 20
Switch(config-if)#interface gigabitEthernet 0/3
Switch(config-if)#switchport trunk allowed vlan 30
Switch(config-if)#interface gigabitEthernet 0/4
Switch(config-if)#switchport trunk allowed vlan 40
Switch(config-if)#interface gigabitEthernet 0/5
Switch(config-if)#switchport trunk allowed vlan 50
Switch(config-if)#end
Switch#show vlan brief
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Gi0/6, Gi0/7, Gi0/8,Gi0/10
10 VLAN0010 active
20 VLAN0020 active
30 VLAN0030 active
40 VLAN0040 active
50 VLAN0050 active
Switch#show interfaces gigabitEthernet 0/9 switchport | include Trunking
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Trunking Native Mode VLAN: 1 (default)
Trunking VLANs Enabled: ALL
Switch#show interfaces gigabitEthernet 0/1 switchport | include Trunking
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Trunking Native Mode VLAN: 1 (default)
Trunking VLANs Enabled: 10
35. Labo環境用スイッチ設定
FORSE
トランクポートを確認する
結線しないと表示されない
35
Switch#show interfaces trunk
Port Mode Encapsulation Status Native vlan
Gi0/1 on 802.1q trunking 1
Gi0/9 on 802.1q trunking 1
Port Vlans allowed on trunk
Gi0/1 10
Gi0/9 1-4094
Port Vlans allowed and active in management domain
Gi0/1 10
Gi0/2 20
Gi0/9 1,10,20,30,40,50
Port Vlans in spanning tree forwarding state and not pruned
Gi0/1 10
Gi0/2 20
Gi0/9 1,10,20,30,40,50
Switch#
37. Labo環境用ルータ設定
FORSE
#検証する #検証する
Router#sh ip route
172.16.0.0/16 is variably subnetted, 10 subnets, 2 masks
C 172.16.10.0/30 is directly connected, GigabitEthernet8.10
L 172.16.10.2/32 is directly connected, GigabitEthernet8.10
C 172.16.20.0/30 is directly connected, GigabitEthernet8.20
L 172.16.20.2/32 is directly connected, GigabitEthernet8.20
C 172.16.30.0/30 is directly connected, GigabitEthernet8.30
L 172.16.30.2/32 is directly connected, GigabitEthernet8.30
C 172.16.40.0/30 is directly connected, GigabitEthernet8.40
L 172.16.40.2/32 is directly connected, GigabitEthernet8.40
C 172.16.50.0/30 is directly connected, GigabitEthernet8.50
L 172.16.50.2/32 is directly connected, GigabitEthernet8.50
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, GigabitEthernet8.1
L 192.168.1.1/32 is directly connected, GigabitEthernet8.1
S 192.168.10.0/24 [1/0] via 172.16.10.1
S 192.168.20.0/24 [1/0] via 172.16.20.1
S 192.168.30.0/24 [1/0] via 172.16.30.1
S 192.168.40.0/24 [1/0] via 172.16.40.1
S 192.168.50.0/24 [1/0] via 172.16.50.1
192.168.100.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.100.0/24 is directly connected, FastEthernet0
L 192.168.100.1/32 is directly connected, FastEthernet0
Router#
37
Router#show ip int brief
Interface IP-Address OK? Method Status Protocol
Async3 unassigned YES unset down down
BRI0 unassigned YES NVRAM administratively down down
BRI0:1 unassigned YES unset administratively down down
BRI0:2 unassigned YES unset administratively down down
FastEthernet0 192.168.100.1 YES manual down down
GigabitEthernet0 unassigned YES unset down down
GigabitEthernet1 unassigned YES unset down down
GigabitEthernet2 unassigned YES unset down down
GigabitEthernet3 unassigned YES unset down down
GigabitEthernet4 unassigned YES unset down down
GigabitEthernet5 unassigned YES unset down down
GigabitEthernet6 unassigned YES unset down down
GigabitEthernet7 unassigned YES unset down down
GigabitEthernet8 unassigned YES NVRAM up up
GigabitEthernet8.1 192.168.1.1 YES NVRAM up up
GigabitEthernet8.10 172.16.10.2 YES NVRAM up up
GigabitEthernet8.20 172.16.20.2 YES NVRAM up up
GigabitEthernet8.30 172.16.30.2 YES NVRAM up up
GigabitEthernet8.40 172.16.40.2 YES NVRAM up up
GigabitEthernet8.50 172.16.50.2 YES NVRAM up up
Vlan1 unassigned YES unset down down
Router#