{"id":6596,"date":"2018-08-19T22:22:34","date_gmt":"2018-08-19T13:22:34","guid":{"rendered":"https:\/\/y2tech.net\/blog\/?p=6596"},"modified":"2018-08-26T21:51:03","modified_gmt":"2018-08-26T12:51:03","slug":"upnp-openhome-music-server-vol-6","status":"publish","type":"post","link":"https:\/\/y2tech.net\/blog\/audio\/digital-audio\/upnp-openhome-music-server-vol-6-6596\/","title":{"rendered":"UPnP\/OpenHome Music Server \u306e\u81ea\u4f5c\uff08\u305d\u306e\uff16\uff09"},"content":{"rendered":"<h3>APU2C4\u3092\u30eb\u30fc\u30bf\u3068\u3057\u3066\u6a5f\u80fd\u3055\u305b\u308b\uff08\u5fdc\u7528\u7de8\uff1aNAT\uff09<\/h3>\r\n<br>\r\n<p>\u524d\u56de\u306f\u3001APU2C4\u306e\u30aa\u30fc\u30c7\u30a3\u30aa\u5c02\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5074(&#8220;eth1&#8221;)\u3068LAN\u5074(&#8220;eth0&#8221;)\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3068\u306e\u9593\u3067\u3001IP\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u3088\u308b\u76f8\u4e92\u901a\u4fe1\u3092\u884c\u3046\u8a2d\u5b9a\u3092\u884c\u3044\u3001\u5b9f\u969b\u306b\u30c6\u30b9\u30c8\u74b0\u5883\u3067\u691c\u8a3c\u3057\u305f\u7d50\u679c\u3092\u7167\u4f1a\u3057\u305f\u304c\u3001\u5982\u4f55\u3060\u3063\u305f\u3060\u308d\u3046\u304b\uff0e<\/p>\r\n<br>\r\n<p>IP\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u3092\u884c\u3046\u306b\u306f\u3001DHCP\u306a\u3069\u3067IP\u30a2\u30c9\u30ec\u30b9\u304c\u30b3\u30ed\u30b3\u30ed\u5909\u308f\u308b\u3088\u3046\u306a\u74b0\u5883\u3067\u306f\u975e\u73fe\u5b9f\u7684\u3067\u3042\u308b\u3053\u3068\u304c\u7406\u89e3\u3067\u304d\u305f\u3067\u3042\u308d\u3046\u304b\uff0e\u56fa\u5b9aIP\u30a2\u30c9\u30ec\u30b9\u3067\u904b\u7528\u3059\u308b\u5834\u5408\u306b\u306f\u3053\u308c\u3067\u5341\u5206\u306a\u306e\u3060\u304c\u3001\u3084\u306f\u308a\u3082\u3046\u5c11\u3057\u67d4\u8edf\u306a\u904b\u7528\u3092\u3057\u305f\u3044\u3068\u3053\u308d\u3060\uff0e<\/p>\r\n<br>\r\n<p>&#8230;\u3068\u8a00\u3046\u8a33\u3067DHCP\u306b\u3088\u308b\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u306aIP\u30a2\u30c9\u30ec\u30b9\u3092\u4f7f\u3044\u3064\u3064\u3001\u30aa\u30fc\u30c7\u30a3\u30aa\u5c02\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3068\u306e\u9593\u3067\u76f8\u4e92\u901a\u4fe1\u3059\u308b\u65b9\u6cd5\u3092\u691c\u8a0e\u3057\u3066\u307f\u308b\u3053\u3068\u306b\u3057\u3088\u3046\uff0e\u524d\u3005\u56de\u7d39\u4ecb\u3057\u305f\u3001NAT(Network Address Translation)\u3068\u3044\u3046\u624b\u6cd5\u3092\u601d\u3044\u51fa\u3057\u3066\u6b32\u3057\u3044\uff0e\u3053\u306eNAT\u306f2\u3064\u306e\u7570\u306a\u308b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u9593\u3067\u3001IP\u30d8\u30c3\u30c0\u306e\u4e2d\u306eIP\u30a2\u30c9\u30ec\u30b9\u60c5\u5831\u3092\u66f8\u304d\u63db\u3048\u3066\u76f8\u4e92\u306b\u901a\u4fe1\u3055\u305b\u308b\u65b9\u6cd5\u3060\uff0e<\/p>\r\n<br>\r\n<p>\u3053\u306e\u5834\u5408\u3001\u304a\u4e92\u3044\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u5883\u754c\u3092\u98db\u3073\u8d8a\u3048\u3089\u308c\u308b\u306e\u306fNAT\u3092\u8a2d\u5b9a\u3057\u305f\u7279\u5b9a\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u6a5f\u5668\u306e\u307f\u3067\u3001\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u306a\u3044\u305d\u306e\u4ed6\u306e\u6a5f\u5668\u304b\u3089\u9001\u51fa\u3055\u308c\u308b\u30d1\u30b1\u30c3\u30c8\u306f\u4e00\u5207\u8d85\u3048\u3089\u308c\u306a\u3044\u306e\u3067\u3001LAN\u5074\u306e\u30ce\u30a4\u30b8\u30fc\u306a\u30d1\u30b1\u30c3\u30c8\u30c7\u30fc\u30bf\u304cNAT\u30eb\u30fc\u30bf\u3092\u98db\u3073\u8d8a\u3048\u3066\u3001\u30aa\u30fc\u30c7\u30a3\u30aa\u5c02\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5074\u306b\u6d41\u308c\u51fa\u308b\u3053\u3068\u306f\u306a\u3044\uff0e\u52ff\u8ad6\u3001\u30aa\u30fc\u30c7\u30a3\u30aa\u5c02\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5074\u304b\u3089\u306e\u7121\u95a2\u4fc2\u306a\u30d1\u30b1\u30c3\u30c8\u3082LAN\u5074\u306b\u306f\u6d41\u308c\u51fa\u306a\u3044\uff0e<\/p>\r\n<br>\r\n<div style=\"width: 100%; margin: 0 auto; text-align: center;\">\r\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/APU2C4-Audio-Router-NAT.png\" alt=\"APU2C4-Audio-Router-NAT\" width=\"604\" height=\"444\" class=\"size-full wp-image-6600\" srcset=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/APU2C4-Audio-Router-NAT.png 604w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/APU2C4-Audio-Router-NAT-320x235.png 320w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/>\r\n<br>\r\n<span>\u4eca\u56de\u60f3\u5b9a\u3059\u308bNAT\u5b9f\u9a13\u74b0\u5883<\/span>\r\n<br>\r\n<\/div>\r\n<br>\r\n<p>\u4eca\u56de\u306eNAT\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306f\u3001\u30c6\u30b9\u30c8\u7528\u306ePC1(192.168.10.101\uff09\u3092LAN\u5074\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304b\u3089 IP\u30a2\u30c9\u30ec\u30b9(192.168.100.51) \u3092\u4f7f\u3063\u3066\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\uff0eLAN\u5074\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u6a5f\u5668\u304b\u3089\u30c6\u30b9\u30c8\u7528\u306ePC1\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u969b\u306f\u3001\u3053\u306eNAT\u5909\u63db\u7528\u306e\u30a2\u30c9\u30ec\u30b9\u3092\u4f7f\u3063\u3066\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u306b\u306a\u308b\uff0e\u540c\u3058\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u4e00\u54e1\u3067\u3042\u308b\u306e\u3067\u3001LAN\u5074\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u6a5f\u5668\u306fPC1\u3078\u306e\u9762\u5012\u306a\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u8a2d\u5b9a\u3092\u884c\u3046\u5fc5\u8981\u304c\u306a\u3044\u306e\u3067\u3042\u308b\uff0e<\/p>\r\n<br>\r\n<h4>\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u306e\u6709\u52b9\u5316<\/h4>\r\n<br>\r\n<p>\u6700\u521d\u306bCentOS7\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u305f\u969b\u306b\u3001\u6a19\u6e96\u3067\u7d44\u307f\u8fbc\u307e\u308c\u3066\u3044\u308b\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u3092\u5916\u3057\u3066\u69cb\u7bc9\u3057\u3066\u304d\u305f\uff0e\u3053\u308c\u306f\u3001Linux\u30b5\u30fc\u30d0\u521d\u5fc3\u8005\u306b\u3068\u3063\u3066\u306f\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u3092\u6b63\u3057\u304f\u5b9f\u88c5\u3059\u308b\u306e\u306f\u81f3\u96e3\u306e\u6280\u3060\u304b\u3089\u3060\uff0eLinux\u30b5\u30fc\u30d0\u3092\u304d\u3061\u3093\u3068\u904b\u7528\u3059\u308b\u306b\u306f\u3053\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u304c\u5fc5\u9808\u306e\u8a2d\u5b9a\u306a\u306e\u3060\u304c\u3001\u4eca\u56de\u306e\u69d8\u306a\u5bb6\u5ead\u5185\u306e\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u306a\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u74b0\u5883\u3067\u306f\u6b86\u3069\u5fc5\u8981\u306e\u306a\u3044\u6a5f\u80fd\u3060\uff0e<\/p>\r\n<br>\r\n<p>\u5fc5\u8981\u306e\u306a\u3044\u6a5f\u80fd\u3068\u306f\u8a00\u3046\u7269\u306e\u3001\u5b9f\u306fNAT\u3084NAPT\u74b0\u5883\u3092\u5b9f\u88c5\u3059\u308b\u306b\u306f\u3053\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\uff08\u6b63\u78ba\u306b\u306fnetfilter\u3068\u3044\u3046\u30ab\u30fc\u30cd\u30eb\u5185\u306e\u8ee2\u9001\u6a5f\u80fd\uff09\u3092\u50cd\u304b\u305b\u3066\u3001\u304d\u3061\u3093\u3068\u8a2d\u5b9a\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\uff0eLinux\u30b5\u30fc\u30d0\u521d\u5fc3\u8005\u306b\u3068\u3063\u3066\u306f\u9b3c\u9580\u7684\u306a\u5b58\u5728\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u306a\u306e\u3060\u304c\u3001\u3068\u308a\u3042\u3048\u305a\u5185\u5bb9\u3092\u5b8c\u5168\u306b\u7406\u89e3\u3067\u304d\u306a\u304f\u3068\u3082\u3001\u898b\u3088\u3046\u898b\u307e\u306d\u3067\u6311\u6226\u3057\u3066\u307f\u3066\u6b32\u3057\u3044\uff0e<\/p>\r\n<br>\r\n<p>CentOS 7\uff08RedHat Enterprise Linux 7\uff09\u7cfb\u5217\u304b\u3089OS\u306e\u7ba1\u7406\u30b3\u30de\u30f3\u30c9\u4f53\u7cfb\u304c\u5927\u304d\u304f\u5909\u308f\u3063\u3066\u3057\u307e\u3063\u305f\u3053\u3068\u306f\u524d\u306e\u8a18\u4e8b\u3067\u8ff0\u3079\u305f\u304c\u3001\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u95a2\u4fc2\u306e\u8a2d\u5b9a\u65b9\u6cd5\u3082\u5927\u304d\u304f\u5909\u308f\u3063\u3066\u3057\u307e\u3063\u3066\u3044\u308b\uff0e\u4ee5\u524d\u306f\u3001iptables\u3068\u3044\u3046\u6a5f\u80fd\u306b\u3088\u3063\u3066\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u3092\u5b9f\u88c5\u3057\u3066\u304a\u308a\u3001\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u306e\u7ba1\u7406\u65b9\u6cd5\u3082iptables\u306e\u8a2d\u5b9a\u30d5\u30a1\u30a4\u30eb\u3092\u76f4\u63a5\u5f04\u308b\u3068\u3044\u3046\u65b9\u6cd5\u3060\u3063\u305f\uff0e<\/p>\r\n<br>\r\n<p>CentOS 7\u7cfb\u5217\u304b\u3089\u306f\u3001iptables\u306f\u5b8c\u5168\u306b\u88cf\u65b9\u306b\u5efb\u308a\u3001firewalld\u3068\u3044\u3046\u5225\u306a\u6a5f\u80fd\u3067\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u3092\u7ba1\u7406\u3059\u308b\u3088\u3046\u306b\u306a\u308a\u3001\u7ba1\u7406\u306e\u4ed5\u65b9\u304c\u6839\u672c\u304b\u3089\u5909\u308f\u3063\u3066\u3057\u307e\u3063\u305f\uff0e\u65b0\u3057\u3044\u7ba1\u7406\u65b9\u6cd5\u306b\u5909\u308f\u3063\u3066\u304b\u3089\u6570\u5e74\u7d4c\u3063\u305f\u306e\u3067\u3001\u3053\u306e\u65b0\u3057\u3044\u7ba1\u7406\u65b9\u6cd5\u3082\u5927\u90e8\u666e\u53ca\u3057\u3066\u304d\u305f\u3088\u3046\u3060\uff0e\u30cd\u30c3\u30c8\u3092\u6f01\u308c\u3070firewalld\u95a2\u9023\u306e\u8a18\u4e8b\u304c\u6ca2\u5c71\u898b\u3064\u304b\u308b\u306e\u3067\u3001\u307e\u3060\u4e0d\u610f\u6163\u308c\u3060\u3068\u3044\u3046\u65b9\u3005\u306f\u3053\u306e\u969b\u306b\u65b0\u3057\u3044\u7ba1\u7406\u65b9\u6cd5\u306b\u79fb\u884c\u3057\u3066\u307f\u308b\u3053\u3068\u3092\u304a\u85a6\u3081\u3059\u308b\uff0e<\/p>\r\n<br>\r\n<h5>\u7121\u52b9\u5316\u3057\u3066\u3044\u305ffirewalld\u3092\u5fa9\u6d3b\u3055\u305b\u308b<\/h5>\r\n<p>\u5148\u305a\u306fCentOS 7 \u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u76f4\u5f8c\u306b\u7121\u52b9\u304b\u3057\u3066\u3044\u305f &#8220;firewalld&#8221; \u30b5\u30fc\u30d3\u30b9\u3092\u5fa9\u6d3b\u3055\u305b\u308b\u5fc5\u8981\u304c\u3042\u308b\uff0e\u7121\u52b9\u5316\u3059\u308b\u3068\u304d\u306e\u30b3\u30de\u30f3\u30c9\u306f &#8220;systemctl disabled firewalld&#8221; \u3060\u3063\u305f\u304c\u3001\u6709\u52b9\u5316\u306f &#8220;systemctl enabled firewalld&#8221; \u3067\u3042\u308b\uff0e<\/p>\r\n<br>\r\n<p>&#8220;firewalld&#8221; \u30b5\u30fc\u30d3\u30b9\u3092\u81ea\u52d5\u8d77\u52d5\u3059\u308b\u3088\u3046\u306b\u8a2d\u5b9a\u3057\u305f\u3068\u3053\u308d\u3067\u3001&#8221;firewalld&#8221; \u30b5\u30fc\u30d3\u30b9\u3092\u624b\u52d5\u3067\u8d77\u52d5\u3057\u3066\u304a\u304f\uff0e\u3053\u306e\u6642\u70b9\u3067\u3001\u30c7\u30d5\u30a9\u30eb\u30c8\u306e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u8a2d\u5b9a\u304c\u6709\u52b9\u306b\u306a\u308b\u306e\u3067\u3001ssh(TCP\/22)\u4ee5\u5916\u306e\u30b5\u30fc\u30d3\u30b9\u304c\u53d7\u3051\u4ed8\u3051\u3089\u308c\u306a\u304f\u306a\u308b\u306e\u3067\u3001NFS\u3084MinimServer\u306a\u3069\u306f\u4e8b\u524d\u306b\u6b62\u3081\u3066\u304a\u304f\u3053\u3068\u3092\u63a8\u5968\u3059\u308b\uff0e<\/p>\r\n<br>\r\n<p> &#8220;firewalld&#8221; \u3067\u306f\u5bfe\u8c61\u3068\u3059\u308b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u7bc4\u7587\u3092\u30be\u30fc\u30f3(zone)\u3068\u3044\u3046\u6982\u5ff5\u3067\u30ab\u30c6\u30b4\u30e9\u30a4\u30ba\u3057\u3066\u3044\u308b\uff0e\u3053\u306e\u30be\u30fc\u30f3\u306f\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u4e0b\u8a18\u306b\u793a\u30599\u3064\u304c\u5b9a\u7fa9\u3055\u308c\u3066\u304a\u308a\u3001\u521d\u671f\u306e\u72b6\u614b\u3067\u306f\u3001&#8221;public&#8221; \u3068\u3044\u3046\u30be\u30fc\u30f3\u306b\u5168\u3066\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u304c\u5c5e\u3057\u3066\u3044\u308b\uff0e<\/p>\r\n<br>\r\n<p><br>\r\n \u30fb&#8221;block&#8221; : \u5916\u90e8\u304b\u3089\u5165\u3063\u3066\u304d\u305f\u5168\u3066\u306e(inbound)\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u7834\u68c4\u3059\u308b<br>\r\n\u3000\u3000\u3000\u3000\u3000\u3000\u3000outbound\u30d1\u30b1\u30c3\u30c8\u306b\u5bfe\u3059\u308b\u5fdc\u7b54\u306f\u8a31\u53ef\u3059\u308b<br>\r\n<br>\r\n \u30fb&#8221;drop&#8221; : \u5916\u90e8\u304b\u3089\u5165\u3063\u3066\u304d\u305f\u5168\u3066\u306e(inbound)\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u7834\u68c4\u3059\u308b<br>\r\n\u3000\u3000\u3000\u3000\u3000\u3000\u3000outbound\u30d1\u30b1\u30c3\u30c8\u306b\u5bfe\u3059\u308b\u5fdc\u7b54\u3082\u7834\u68c4\u3059\u308b<br>\r\n<br>\r\n \u30fb&#8221;public&#8221; : ssh(TCP\/22)\u3068dhcpv6-client \u306e\u307f\u901a\u4fe1\u304c\u8a31\u53ef\u3055\u308c\u3066\u3044\u308b<br>\r\n<br>\r\n \u30fb&#8221;external&#8221; : ssh(TCP\/22)\u306e\u307f\u901a\u4fe1\u304c\u8a31\u53ef\u3055\u308c\u3066\u3044\u308b.<br>\r\n\u3000\u3000\u3000\u3000\u3000\u3000\u3000\u3000\u3000NAPT(IP Masquerade\uff09\u6a5f\u80fd\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\uff0e<br>\r\n<br>\r\n \u30fb&#8221;internal&#8221; : ssh(TCP\/22)\u3001dhcpv6-client\u3001samba-client\u3001mdns\u3001ipp-client\u304c<br>\r\n\u3000\u3000\u3000\u3000\u3000\u3000\u3000\u3000\u3000\u8a31\u53ef\u3055\u308c\u3066\u3044\u308b.<br>\r\n<br>\r\n \u30fb&#8221;home&#8221; :  &#8220;internal&#8221; \u3068\u540c\u3058\u5185\u5bb9<br>\r\n<br>\r\n \u30fb&#8221;work&#8221; : ssh(TCP\/22)\u3001dhcpv6-client\u3001ipp-client\u304c\u8a31\u53ef\u3055\u308c\u3066\u3044\u308b.<br>\r\n<br>\r\n \u30fb&#8221;dmz&#8221; : ssh(TCP\/22)\u306e\u307f\u304c\u8a31\u53ef\u3055\u308c\u3066\u3044\u308b.<br>\r\n<br>\r\n \u30fb&#8221;trusted&#8221; : \u5168\u3066\u306e\u30d1\u30b1\u30c3\u30c8\u304c\u8a31\u53ef\u3055\u308c\u3066\u3044\u308b.<br>\r\n<\/p>\r\n<br>\r\n<pre><code class=\"language-Markup\">\r\n[root@jukebox ~]# systemctl status firewalld\r\n\u25cf firewalld.service - firewalld - dynamic firewall daemon\r\n   Loaded: loaded (\/usr\/lib\/systemd\/system\/firewalld.service; disabled; vendor preset: enabled)\r\n   Active: inactive (dead)\r\n     Docs: man:firewalld(1)\r\n[root@jukebox ~]# systemctl enable firewalld\r\nCreated symlink from \/etc\/systemd\/system\/dbus-org.fedoraproject.FirewallD1.service to \/usr\/lib\/systemd\/system\/firewalld.service.\r\nCreated symlink from \/etc\/systemd\/system\/multi-user.target.wants\/firewalld.service to \/usr\/lib\/systemd\/system\/firewalld.service.\r\n[root@jukebox ~]# systemctl start firewalld\r\n[root@jukebox ~]# systemctl status firewalld\r\n\u25cf firewalld.service - firewalld - dynamic firewall daemon\r\n   Loaded: loaded (\/usr\/lib\/systemd\/system\/firewalld.service; enabled; vendor preset: enabled)\r\n   Active: active (running) since Sun 2018-08-19 17:29:00 JST; 1min 25s ago\r\n     Docs: man:firewalld(1)\r\n Main PID: 1635 (firewalld)\r\n   CGroup: \/system.slice\/firewalld.service\r\n           \u2514\u25001635 \/usr\/bin\/python -Es \/usr\/sbin\/firewalld --nofork --nopid\r\n\r\nAug 19 17:28:58 jukebox systemd[1]: Starting firewalld - dynamic firewall daemon...\r\nAug 19 17:29:00 jukebox systemd[1]: Started firewalld - dynamic firewall daemon.\r\n[root@jukebox ~]# \r\n<\/code><\/pre>\r\n<br>\r\n<p> &#8220;firewalld&#8221;\u30b5\u30fc\u30d3\u30b9\u3092\u8d77\u52d5\u3057\u305f\u72b6\u614b\u3067\u3001\u30c7\u30d5\u30a9\u30eb\u30c8\u306e\u30be\u30fc\u30f3\u8a2d\u5b9a\u72b6\u614b\u30689\u7a2e\u985e\u306e\u30be\u30fc\u30f3\u306e\u8a2d\u5b9a\u5185\u5bb9\u3092\u78ba\u8a8d\u3057\u3066\u304a\u304f\uff0e<\/p>\r\n<br>\r\n<pre><code class=\"language-Markup\">\r\n[root@jukebox ~]# firewall-cmd --list-all\r\npublic (active)\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: eth0 eth1 eth2\u3000\u3000\uff1c\uff1d\uff1d 3\u3064\u306e\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u304c\u5168\u3066 \"public\" \u30be\u30fc\u30f3\u306b\u8a2d\u5b9a\r\n  sources: \r\n  services: ssh dhcpv6-client\r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \r\n\t\r\n[root@jukebox ~]# firewall-cmd --list-all-zones\u3000\uff1c\uff1d\uff1d \u5404\u30be\u30fc\u30f3\u306e\u5185\u5bb9\u3092\u8868\u793a\r\nblock\r\n  target: %%REJECT%%\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: \r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\ndmz\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: ssh\r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\ndrop\r\n  target: DROP\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: \r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\nexternal\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: ssh\r\n  ports: \r\n  protocols: \r\n  masquerade: yes\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \r\nhome\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: ssh mdns samba-client dhcpv6-client\r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\ninternal\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: ssh mdns samba-client dhcpv6-client\r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\npublic (active)\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: eth0 eth1 eth2\r\n  sources: \r\n  services: ssh dhcpv6-client\r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\ntrusted\r\n  target: ACCEPT\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: \r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\nwork\r\n  target: default\r\n  icmp-block-inversion: no\r\n  interfaces: \r\n  sources: \r\n  services: ssh dhcpv6-client\r\n  ports: \r\n  protocols: \r\n  masquerade: no\r\n  forward-ports: \r\n  source-ports: \r\n  icmp-blocks: \r\n  rich rules: \t\r\n[root@jukebox ~]# \r\n[root@jukebox ~]# firewall-cmd --set-default-zone=trusted \uff1c\uff1d\uff1d \u30c7\u30d5\u30a9\u30eb\u30c8\u30be\u30fc\u30f3\u306e\u5909\u66f4\r\nsuccess\r\n[root@jukebox ~]# firewall-cmd --get-default-zone\r\ntrusted\r\n[root@jukebox ~]# firewall-cmd --get-active-zones\r\ntrusted\r\n  interfaces: eth0 eth1 eth2\r\n[root@jukebox ~]# \r\n<\/code><\/pre>\r\n<br>\r\n<p>\u3053\u306e\u72b6\u614b\u3067\u306f\u30013\u3064\u306eNIC\u3068\u3082\u5168\u3066 &#8220;public&#8221; \u30be\u30fc\u30f3\u306b\u7d44\u307f\u5165\u308c\u3089\u308c\u3066\u3044\u308b\u306e\u3067\u3001ssh(TCP\/22)\u3068dhcpv6-client\u3057\u304b\u901a\u4fe1\u304c\u8a31\u53ef\u3055\u308c\u3066\u3044\u306a\u3044\uff0e\u3053\u306e\u72b6\u614b\u3067\u306f NFS\u3084MinimServer\u306a\u3069\u306e\u901a\u4fe1\u304c\u5b8c\u5168\u306b\u906e\u65ad\u3055\u308c\u3066\u3057\u307e\u3046\u306e\u3067\u3001\u3068\u308a\u3042\u3048\u305a\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3068\u3057\u3066\u306e\u6a5f\u80fd\u3092\u505c\u6b62\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\uff0e\u52ff\u8ad6\u3001\u901a\u5e38\u306e\u30b5\u30fc\u30d0\u7528\u9014\u3067\u306f\u304d\u3061\u3093\u3068\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u3092\u5b9f\u88c5\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u304c\u3001\u4eca\u56de\u306f\u5bb6\u5ead\u5185\u306e\u9589\u3058\u305f\u74b0\u5883\u3060\u3051\u3067\u306e\u4f7f\u7528\u306a\u306e\u3067\u3001\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3068\u3057\u3066\u306e\u6a5f\u80fd\u306f\u505c\u6b62\u3055\u305b\u3066\u304a\u304f\uff0e<\/p>\r\n<br>\r\n<p>\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3068\u3057\u3066\u306e\u6a5f\u80fd\u304c\u50cd\u304b\u306a\u3044\u3088\u3046\u306b\u3059\u308b\u306b\u306f\u3001\u73fe\u5728\u306e&#8221;public&#8221; \u30be\u30fc\u30f3\u304b\u3089&#8221;trusted&#8221; \u306b\u5909\u66f4\u3059\u308c\u3070\u3001&#8221;firewalld&#8221; \u30b5\u30fc\u30d3\u30b9\u3092\u6b62\u3081\u3066\u3044\u305f\u6642\u3068\u540c\u3058\u72b6\u614b\u306b\u306a\u308b\uff0e\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u8a2d\u5b9a\u30b3\u30de\u30f3\u30c9&#8221;firewall-cmd&#8221; \u3067\u3092\u7528\u3044\u3066\u30be\u30fc\u30f3\u3092\u5909\u66f4\u3057\u3066\u307f\u3088\u3046\uff0e\u3053\u306e\u5f8c\u306eNAPT\u30eb\u30fc\u30bf\u306e\u8a2d\u5b9a\u3067\u3001\u4e00\u90e8\u30be\u30fc\u30f3\u3092\u5909\u66f4\u3059\u308b\u304b\u3082\u3057\u308c\u306a\u3044\u304c\u3001\u3068\u308a\u3042\u3048\u305a\u4eca\u56de\u306f\u5168\u3066 &#8220;trusted&#8221; \u30be\u30fc\u30f3\u3067\u8a2d\u5b9a\u3059\u308b\u3053\u3068\u306b\u3059\u308b\uff0e<\/p>\r\n<br>\r\n<pre><code class=\"language-Markup\">\r\n[root@jukebox ~]# firewall-cmd --zone=trusted --change-interface=eth0\r\nThe interface is under control of NetworkManager, setting zone to 'trusted'.\r\nsuccess\r\n[root@jukebox ~]# firewall-cmd --zone=trusted --change-interface=eth1 \r\nThe interface is under control of NetworkManager, setting zone to 'trusted'.\r\nsuccess\r\n[root@jukebox ~]# firewall-cmd --zone=trusted --change-interface=eth2\r\nThe interface is under control of NetworkManager, setting zone to 'trusted'.\r\nsuccess\r\n[root@jukebox ~]# firewall-cmd --reload \u3000\uff1c\uff1d\uff1d \u8a2d\u5b9a\u5909\u66f4\u3092\u5373\u5ea7\u306b\u53cd\u6620\u3055\u305b\u308b\r\nsuccess\r\n<\/code><\/pre>\r\n<br>\r\n<h4>NAT\u306e\u5b9f\u88c5<\/h4>\r\n<br>\r\n<p>\u3053\u308c\u307e\u3067\u306eIP\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u65b9\u5f0f\u3092NAT\u306b\u5909\u3048\u308b\u30e1\u30ea\u30c3\u30c8\u306f\u4f55\u304b\u3068\u554f\u308f\u308c\u308b\u3068\u3001\u5b9f\u306f\u624b\u9593\u6687\u306e\u5272\u306b\u306f\u97f3\u8cea\u7684\u306a\u512a\u4f4d\u6027\u306f\u306a\u3044\u3068\u3044\u3046\u306e\u304c\u5b9f\u60c5\u3060\u308d\u3046\u304b\uff0e\u5f37\u3044\u3066\u6319\u3052\u308b\u3068\u3059\u308c\u3070\u3001LAN\u5074\u306e\u5404\u6a5f\u5668\u304b\u3089\u30aa\u30fc\u30c7\u30a3\u30aa\u5c02\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0a\u306b\u7f6e\u304b\u308c\u305f\u6a5f\u5668\u3092\u3001\u3042\u305f\u304b\u3082\u81ea\u5206\u3068\u540c\u3058\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u5c45\u308b\u3088\u3046\u306b\u898b\u305b\u639b\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3053\u3068\u3060\u308d\u3046\u304b\uff0e<\/p>\r\n<br>\r\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30aa\u30fc\u30c7\u30a3\u30aa\u6a5f\u5668\u306f\u7269\u7406\u7684\u306b\u5225\u306a\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u5b58\u5728\u3059\u308b\u306e\u3067\u3001LAN\u5074\u306e\u30ce\u30a4\u30ba\u306e\u5f71\u97ff\u3092\u53d7\u3051\u308b\u3053\u3068\u3082\u7121\u304f\u3001\u307e\u305f\u3001LAN\u5074\u306e\u5404\u6a5f\u5668\u304b\u3089\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30aa\u30fc\u30c7\u30a3\u30aa\u6a5f\u5668\u304c\u540c\u3058\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u5c5e\u3057\u3066\u3044\u308b\u3053\u3068\u306b\u306a\u308b\u306e\u3067\u3001IP\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u6642\u306e\u3088\u3046\u306b\u30aa\u30fc\u30c7\u30a3\u30aa\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u95a2\u3059\u308b\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u8a2d\u5b9a\u306a\u3069\u5168\u304f\u6c17\u306b\u3057\u306a\u304f\u3066\u826f\u3044\uff0e<\/p>\r\n<br>\r\n<p>NAT\u306f\u9001\u4fe1\u5143\u306eIP\u30a2\u30c9\u30ec\u30b9\u66f8\u304d\u63db\u3048(Source NAT) \u3068\u623b\u308a\u30d1\u30b1\u30c3\u30c8\u306e\u5b9b\u5148IP\u30a2\u30c9\u30ec\u30b9\u66f8\u304d\u63db\u3048(Destination NAT\uff09\u3068\u3044\u30462\u56de\u306eIP\u30a2\u30c9\u30ec\u30b9\u66f8\u304d\u63db\u3048\u304c\u884c\u308f\u308c\u308b\uff0e\u3053\u308c\u3092 &#8220;firewalld&#8221; \u306e\u6a5f\u80fd\u3067\u5b9f\u88c5\u3059\u308b\u306b\u306f\u3001\u6b21\u306e\u30b3\u30de\u30f3\u30c9\u3092\u8a2d\u5b9a\u3059\u308c\u3070\u826f\u3044\uff0e\u30b3\u30de\u30f3\u30c9\u306e\u500b\u3005\u306e\u30d1\u30e9\u30e1\u30fc\u30bf\u306e\u8aac\u660e\u306f\u96e3\u3057\u3044\u306e\u3067\u3001\u5185\u5bb9\u3092\u7406\u89e3\u3067\u304d\u306a\u304f\u3066\u3082\u3068\u308a\u3042\u3048\u305a\u304a\u307e\u3058\u306a\u3044\u3060\u3068\u601d\u3063\u3066\u8a2d\u5b9a\u3057\u3066\u6b32\u3057\u3044\uff0e<\/p>\r\n<br>\r\n<p>\u30c6\u30b9\u30c8\u7528\u306ePC\u306eIP\u30a2\u30c9\u30ec\u30b9\u306f192.168.10.101\u3001APU2C4\u306e &#8220;eth0&#8221; \u306b\u4ed8\u52a0\u3059\u308b\u5225\u540d IP\u30a2\u30c9\u30ec\u30b9\u306f192.168.100.51\u3068\u3059\u308b\uff0e&#8221;eth0&#8243;\u81ea\u4f53\u306b\u306fDHCP\u3067IP\u30a2\u30c9\u30ec\u30b9\u304c\u5272\u308a\u5f53\u3066\u3089\u308c\u3066\u304a\u308a\u3001\u305d\u308c\u3068\u306f\u7570\u306a\u308bNAT\u5909\u63db\u306e\u30a2\u30c9\u30ec\u30b9\uff08192.168.100.51\uff09\u3092\u30a8\u30a4\u30ea\u30a2\u30b9\uff08\u5225\u540d\uff09IP\u3068\u3057\u3066\u8a2d\u5b9a\u3059\u308b\uff0e&#8221;eth0&#8243;\u306e\u5b9f\u4f53\u30a2\u30c9\u30ec\u30b9192.168.100.xxx \u306f\u30eb\u30fc\u30bf\u81ea\u4f53\u306e\u6a5f\u80fd\u3068\u3057\u3066\u4f7f\u7528\u3057\u3066\u3044\u308b\u306e\u3067\u3001NAT\u5909\u63db\u5c02\u7528\u306e\u5225\u306aIP\u30a2\u30c9\u30ec\u30b9\u3092&#8221;eth0&#8243;\u306b\u8a2d\u5b9a\u3057\u3066\u304a\u304f\u5fc5\u8981\u304c\u3042\u308b\uff0e<\/p>\r\n<br>\r\n<p>\r\n\u3000\u30fb\u9001\u4fe1\u6642\u306e\u9001\u4fe1\u5143\u306eIP\u30a2\u30c9\u30ec\u30b9\u66f8\u304d\u63db\u3048<br>\r\n\u3000\u3000\u3000firewall-cmd &#8211;permanent &#8211;direct &#8211;add-rule ipv4 nat POSTROUTING_direct 0 -s 192.168.10.101 -j SNAT &#8211;to 192.168.100.51<br>\r\n<br>\r\n\u3000\u30fb\u623b\u308a\u6642\u306e\u5b9b\u5148IP\u30a2\u30c9\u30ec\u30b9\u66f8\u304d\u63db\u3048<br>\r\n\u3000\u3000\u3000firewall-cmd &#8211;permanent &#8211;direct &#8211;add-rule ipv4 nat PREROUTING_direct  0 -d 192.168.100.51 -j DNAT &#8211;to 192.168.10.101<br>\r\n<br>\r\n<br>\r\n\u3000\u30fb&#8221;eth0&#8243;\u306b\u5225\u540d\u3067IP\u30a2\u30c9\u30ec\u30b9\u3092\u4ed8\u52a0\u3059\u308b<br>\r\n\u3000\u3000\u3000nmcli connection modify eth0 +ipv4.addresses  &#8220;192.168.100.51\/24&#8221;<br>\r\n<br>\r\n<p>\u4e0a\u8a18\u30b3\u30de\u30f3\u30c9\u3092\u8a2d\u5b9a\u3057\u305f\u3089\u3001&#8221;eth0&#8243;\u306b\u4ed8\u3051\u305f\u5225\u540dIP\u30a2\u30c9\u30ec\u30b9\u3092\u6709\u52b9\u5316\u3059\u308b\u305f\u3081\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u518d\u8d77\u52d5\u3059\u308b\uff0e\u3053\u308c\u3067\u30c6\u30b9\u30c8PC(192.168.10.101)\u304cLAN\u5074\u306e\u5404\u6a5f\u5668\u306b\u5bfe\u3057\u3066\u3001\u81ea\u5206\u304c\u3042\u305f\u304b\u3082192.168.100.51 \u306eIP\u30a2\u30c9\u30ec\u30b9\u3092\u6301\u3063\u3066\u3044\u308b\u6a5f\u5668\u3067\u3042\u308b\u304b\u306e\u3088\u3046\u306b\u632f\u308b\u821e\u3046\u3053\u3068\u304c\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308b\uff0e<\/p>\r\n<br>\r\n<pre><code class=\"language-Markup\">\r\n[root@jukebox ~]# firewall-cmd --permanent --direct --add-rule ipv4 nat POSTROUTING_direct 0 -s 192.168.10.101 -j SNAT --to 192.168.100.51\r\nsuccess\r\n[root@jukebox ~]# firewall-cmd --permanent --direct --add-rule ipv4 nat PREROUTING_direct  0 -d 192.168.100.51 -j DNAT --to 192.168.10.101\r\nsuccess\r\n[root@jukebox ~]# nmcli connection modify eth0  +ipv4.addresses 192.168.100.51\/24\r\n[root@jukebox ~]# firewall-cmd --reload\r\n[root@jukebox ~]# systemctl restart network\r\n[root@jukebox ~]# ip addr\r\n1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n    link\/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n    inet 127.0.0.1\/8 scope host lo\r\n       valid_lft forever preferred_lft forever\r\n2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000\r\n    link\/ether 00:0d:b9:47:1c:18 brd ff:ff:ff:ff:ff:ff\r\n    inet 192.168.100.167\/24 brd 192.168.100.255 scope global noprefixroute dynamic eth0\r\n       valid_lft 86388sec preferred_lft 86388sec\r\n    inet 192.168.100.51\/24 brd 192.168.100.255 scope global secondary noprefixroute eth0\r\n       valid_lft forever preferred_lft forever\r\n3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000\r\n    link\/ether 00:0d:b9:47:1c:19 brd ff:ff:ff:ff:ff:ff\r\n    inet 192.168.10.254\/24 brd 192.168.10.255 scope global noprefixroute eth1\r\n       valid_lft forever preferred_lft forever\r\n4: eth2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN group default qlen 1000\r\n    link\/ether 00:0d:b9:47:1c:1a brd ff:ff:ff:ff:ff:ff\r\n    inet 192.168.20.254\/24 brd 192.168.20.255 scope global noprefixroute eth2\r\n       valid_lft forever preferred_lft forever\r\n\r\n[root@jukebox ~]# nmcli device show eth0 \r\nGENERAL.DEVICE:                         eth0\r\nGENERAL.TYPE:                           ethernet\r\nGENERAL.HWADDR:                         00:0D:B9:47:1C:18\r\nGENERAL.MTU:                            1500\r\nGENERAL.STATE:                          100 (connected)\r\nGENERAL.CONNECTION:                     eth0\r\nGENERAL.CON-PATH:                       \/org\/freedesktop\/NetworkManager\/ActiveConnection\/1\r\nWIRED-PROPERTIES.CARRIER:               on\r\nIP4.ADDRESS[1]:                         192.168.100.51\/24\r\nIP4.ADDRESS[2]:                         192.168.100.167\/24\r\nIP4.GATEWAY:                            192.168.100.254\r\nIP4.ROUTE[1]:                           dst = 0.0.0.0\/0, nh = 192.168.100.254, mt = 100\r\nIP4.ROUTE[2]:                           dst = 192.168.100.0\/24, nh = 0.0.0.0, mt = 100\r\nIP4.ROUTE[3]:                           dst = 192.168.100.0\/24, nh = 0.0.0.0, mt = 100\r\nIP4.DNS[1]:                             192.168.100.11\r\nIP4.DNS[2]:                             192.168.100.20\r\nIP4.DOMAIN[1]:                          home.yoko\r\nIP6.GATEWAY:                            --\r\nIP6.DNS[1]:                             2404:1a8:7f01:a::3\r\nIP6.DNS[2]:                             2404:1a8:7f01:b::3\r\n[root@jukebox ~]# \r\n<\/code><\/pre>\r\n<br>\r\n<h4>NAT\u304c\u6a5f\u80fd\u3057\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u78ba\u8a8d\u3057\u3066\u307f\u3088\u3046<\/h4>\r\n<br>\r\n<p>\u5148\u305a\u306f\u3001iMac\u304b\u3089 NAT\u5909\u63db\u7528\u306eIP\u30a2\u30c9\u30ec\u30b9(192.168.100.51) \u306bping\u3092\u6253\u3063\u3066\u307f\u308b\uff0e<\/p>\r\n<pre><code class=\"language-Markup\">\r\niMac27:~ yasuaki$ ping 192.168.100.51\r\nPING 192.168.100.51 (192.168.100.51): 56 data bytes\r\n64 bytes from 192.168.100.51: icmp_seq=0 ttl=63 time=1.014 ms\r\n64 bytes from 192.168.100.51: icmp_seq=1 ttl=63 time=0.714 ms\r\n64 bytes from 192.168.100.51: icmp_seq=2 ttl=63 time=0.798 ms\r\n^C\r\n--- 192.168.100.51 ping statistics ---\r\n3 packets transmitted, 3 packets received, 0.0% packet loss\r\nround-trip min\/avg\/max\/stddev = 0.714\/0.842\/1.014\/0.126 ms\r\niMac27:~ yasuaki$ \r\n<\/code><\/pre>\r\n<br>\r\n<p>\u3053\u308c\u3060\u3051\u3067\u306f\u3001APU2C4\u306e &#8220;eth0&#8221; \u304c\u5fdc\u7b54\u3057\u3066\u3044\u308b\u306e\u304b\u3001\u30c6\u30b9\u30c8PC\u81ea\u4f53\u304c\u5fdc\u7b54\u3057\u3066\u3044\u308b\u306e\u304b\u5224\u3089\u306a\u3044\u306e\u3067\u3001\u30c6\u30b9\u30c8PC\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b1\u30fc\u30d6\u30eb\u3092\u629c\u3044\u305f\u72b6\u614b\u3067\u518d\u5ea6ping\u3092\u6253\u3063\u3066\u307f\u308b\uff0e<\/p>\r\n<pre><code class=\"language-Markup\">\r\niMac27:~ yasuaki$ ping 192.168.100.51\r\nPING 192.168.100.51 (192.168.100.51): 56 data bytes\r\nRequest timeout for icmp_seq 0\r\nRequest timeout for icmp_seq 1\r\n^C\r\n--- 192.168.100.51 ping statistics ---\r\n3 packets transmitted, 0 packets received, 100.0% packet loss\r\niMac27:~ yasuaki$ \r\n<\/code><\/pre>\r\n<br>\r\n<p>\u78ba\u304b\u306b\u30c6\u30b9\u30c8PC\u304b\u3089\u306eping\u5fdc\u7b54\u306e\u3088\u3046\u3060\uff0e\u5ff5\u306e\u305f\u3081\u3001\u30c6\u30b9\u30c8PC\u4e0a\u3067WEB\u30b5\u30fc\u30d0\u3092\u52d5\u304b\u3057\u3066\u3001\u305d\u308c\u3092iMac\u304b\u3089&#8221;http:\/\/192.168.100.51\/index.html&#8221; \u3067\u30a2\u30af\u30bb\u30b9\u3057\u3066\u307f\u308b\uff0e\u540c\u3058\u3088\u3046\u306b\u3001LAN\u5185\u306b\u7acb\u3066\u3089\u308c\u3066\u3044\u308b&#8221;smokeping&#8221;\u30b5\u30fc\u30d0 &#8220;smokeping&#8221; \u306b\u5bfe\u3057\u3066\u3001\u30c6\u30b9\u30c8PC\u304b\u3089\u30a2\u30af\u30bb\u30b9\u3057\u3066\u3001http\u306e\u30a2\u30af\u30bb\u30b9\u30ed\u30b0\u306e\u63a5\u7d9a\u8a18\u9332\u304b\u3089\u3001\u3069\u306eIP\u30a2\u30c9\u30ec\u30b9\u304b\u3089\u30a2\u30af\u30bb\u30b9\u3055\u308c\u3066\u3044\u305f\u304b\u3092\u78ba\u8a8d\u3059\u308b\uff0e<\/p>\r\n<br>\r\n<div style=\"width: 100%; margin: 0 auto; text-align: center;\">\r\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestMB13W.png\" alt=\"NAT Access Test MB13W\" width=\"640\" height=\"400\" class=\"size-full wp-image-6616\" srcset=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestMB13W.png 640w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestMB13W-320x200.png 320w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>\r\n<br>\r\n<span>\u30c6\u30b9\u30c8PC\u4e0a\u306bWEB\u30b5\u30fc\u30d0\u3092\u7acb\u3061\u4e0a\u3052\u308b(Mac OS X\u306e &#8220;Web Sharing&#8221;\u3092ON\uff09<\/span>\r\n<br>\r\n<br>\r\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/WebAccessFrom-iMac.png\" alt=\"Web Access Test \" width=\"640\" height=\"491\" class=\"size-full wp-image-6617\" srcset=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/WebAccessFrom-iMac.png 640w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/WebAccessFrom-iMac-320x246.png 320w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/> \r\n<br>\r\n<span>iMac\u306eWEB\u30d6\u30e9\u30a6\u30b6\u304b\u3089\u30c6\u30b9\u30c8PC\u306eNAT\u5909\u63db\u30a2\u30c9\u30ec\u30b9(192.168.100.51)\u306b\u30a2\u30af\u30bb\u30b9<\/span>\r\n<br>\r\n<br>\r\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestSmokePing.png\" alt=\"NAT Access Test SmokePing\" width=\"680\" height=\"358\" class=\"size-full wp-image-6619\" srcset=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestSmokePing.png 680w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestSmokePing-320x168.png 320w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NATAccessTestSmokePing-640x337.png 640w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/> \r\n<br>\r\n<span>LAN\u5185\u306e&#8221;smokeping&#8221;\u30b5\u30fc\u30d0\u306b\u30c6\u30b9\u30c8PC\u304b\u3089\u30a2\u30af\u30bb\u30b9\u3057\u3066\u3001http\u30a2\u30af\u30bb\u30b9\u30ed\u30b0\u3092\u78ba\u8a8d<\/span>\r\n<br>\r\n<br>\r\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NFSMountTestNAT.png\" alt=\"NFS Mount Test  NAT\" width=\"660\" height=\"335\" class=\"size-full wp-image-6620\" srcset=\"https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NFSMountTestNAT.png 660w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NFSMountTestNAT-320x162.png 320w, https:\/\/y2tech.net\/blog\/wp-content\/uploads\/2018\/08\/NFSMountTestNAT-640x325.png 640w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/>\r\n<br>\r\n<span>NAT\u74b0\u5883\u4e0b\u3067\u3082Synology NAS(192.168.100.20)\u306b\u554f\u984c\u7121\u304f\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u3053\u3068\u3092\u78ba\u8a8d<\/span>\r\n<br>\r\n<\/div>\r\n<br>\r\n<p>\u4e0a\u8a18\u306e\u30c6\u30b9\u30c8\u7d50\u679c\u304b\u3089\u78ba\u304b\u306b\u304d\u3061\u3093\u3068NAT\u5909\u63db\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3067\u304d\u308b\uff0e\u52ff\u8ad6NAT\u5909\u63db\u3055\u308c\u3066\u3044\u3066\u3082\u3001\u304d\u3061\u3093\u3068NFS\u30b5\u30fc\u30d0\u306b\u30a2\u30af\u30bb\u30b9\u53ef\u80fd\u3060\uff0e<\/p>\r\n<br>\r\n<p>\u307e\u305f\u307e\u305f\u9577\u304f\u306a\u3063\u3066\u3057\u307e\u3063\u305f\u306e\u3067\u3001NAPT\u306e\u8aac\u660e\u306f\u6b21\u56de\u3068\u8a00\u3046\u3053\u3068\u3067\uff0e\uff0e\uff0e<\/p>\r\n\r\n    ","protected":false},"excerpt":{"rendered":"DHCP\u306b\u3088\u308b\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u306aIP\u30a2\u30c9\u30ec\u30b9\u3092\u4f7f\u3044\u3064\u3064\u3001\u30aa\u30fc\u30c7\u30a3\u30aa\u5c02\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3068\u306e\u9593\u3067\u76f8\u4e92\u901a\u4fe1\u3059\u308b\u65b9\u6cd5\u3092\u691c\u8a0e\u3057\u3066\u307f\u308b\u3053\u3068\u306b\u3057\u3088\u3046\uff0e","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[713],"tags":[815,819],"class_list":["post-6596","post","type-post","status-publish","format-standard","hentry","category-digital-audio","tag-nat"],"_links":{"self":[{"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/posts\/6596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/comments?post=6596"}],"version-history":[{"count":2,"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/posts\/6596\/revisions"}],"predecessor-version":[{"id":6657,"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/posts\/6596\/revisions\/6657"}],"wp:attachment":[{"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/media?parent=6596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/categories?post=6596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/y2tech.net\/blog\/wp-json\/wp\/v2\/tags?post=6596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}