ACL's step is 5 rule 0 permit ip source 192.168.197.222 0 destination 192.168.203.0 0.0.0.255 rule 10 permit ip source 192.168.197.0 0.0.0.255 destination 3.0.0.0 0.255.255.255 rule 15 permit ip source 192.168.197.0 0.0.0.255 destination 172.16.0.0 0.0.31.255 rule 20 permit ip source 192.168.197.0 0.0.0.255 destination 47.107.26.237 0 rule 25 permit ip source 192.168.197.0 0.0.0.255 destination 47.107.20.230 0 rule 30 permit ip source 192.168.248.0 0.0.1.255 destination 192.168.0.0 0.0.255.255 rule 35 permit ip source 192.168.248.0 0.0.1.255 destination 10.0.0.0 0.255.255.255 rule 40 permit ip source 192.168.248.0 0.0.1.255 destination 3.0.0.0 0.255.255.255 rule 45 permit ip source 192.168.248.0 0.0.1.255 destination 172.16.0.0 0.0.31.255 rule 50 permit ip source 192.168.248.0 0.0.1.255 destination 47.107.26.237 0 rule 55 permit ip source 192.168.248.0 0.0.1.255 destination 47.107.20.230 0 rule 60 permit ip source 192.168.103.14 0 destination 192.168.0.0 0.0.255.255 rule 65 permit ip source 192.168.103.14 0 destination 10.0.0.0 0.255.255.255 rule 70 permit ip source 192.168.103.14 0 destination 3.0.0.0 0.255.255.255 rule 75 permit ip source 192.168.103.14 0 destination 172.16.0.0 0.0.31.255 rule 80 permit ip source 192.168.103.14 0 destination 47.107.26.237 0 rule 85 permit ip source 192.168.103.14 0 destination 47.107.20.230 0 rule 90 permit ip source 192.168.103.13 0 destination 192.168.0.0 0.0.255.255 rule 95 permit ip source 192.168.103.13 0 destination 10.0.0.0 0.255.255.255 rule 100 permit ip source 192.168.103.13 0 destination 3.0.0.0 0.255.255.255 rule 105 permit ip source 192.168.103.13 0 destination 172.16.0.0 0.0.31.255 rule 110 permit ip source 192.168.103.13 0 destination 47.107.26.237 0 rule 115 permit ip source 192.168.103.13 0 destination 47.107.20.230 0 rule 120 permit ip source 192.168.103.30 0 destination 192.168.0.0 0.0.255.255 rule 125 permit ip source 192.168.103.30 0 destination 10.0.0.0 0.255.255.255 rule 130 permit ip source 192.168.103.30 0 destination 3.0.0.0 0.255.255.255 rule 135 permit ip source 192.168.103.30 0 destination 172.16.0.0 0.0.31.255 rule 140 permit ip source 192.168.103.30 0 destination 47.107.26.237 0 rule 145 permit ip source 192.168.103.30 0 destination 47.107.20.230 0 rule 150 permit ip source 192.168.103.243 0 destination 192.168.0.0 0.0.255.255 rule 155 permit ip source 192.168.103.243 0 destination 10.0.0.0 0.255.255.255 rule 160 permit ip source 192.168.103.243 0 destination 3.0.0.0 0.255.255.255 rule 165 permit ip source 192.168.103.243 0 destination 172.16.0.0 0.0.31.255 rule 170 permit ip source 192.168.103.243 0 destination 47.107.26.237 0 rule 175 permit ip source 192.168.103.243 0 destination 47.107.20.230 0 rule 180 permit ip source 192.168.103.20 0 destination 192.168.0.0 0.0.255.255 rule 185 permit ip source 192.168.103.20 0 destination 10.0.0.0 0.255.255.255 rule 190 permit ip source 192.168.103.20 0 destination 3.0.0.0 0.255.255.255 rule 195 permit ip source 192.168.103.20 0 destination 172.16.0.0 0.0.31.255 rule 200 permit ip source 192.168.103.20 0 destination 47.107.26.237 0 rule 205 permit ip source 192.168.103.20 0 destination 47.107.20.230 0 rule 210 permit ip source 192.168.103.159 0 destination 192.168.0.0 0.0.255.255 rule 215 permit ip source 192.168.103.159 0 destination 10.0.0.0 0.255.255.255 rule 220 permit ip source 192.168.103.159 0 destination 3.0.0.0 0.255.255.255 rule 225 permit ip source 192.168.103.159 0 destination 172.16.0.0 0.0.31.255 rule 230 permit ip source 192.168.103.159 0 destination 47.107.26.237 0 rule 235 permit ip source 192.168.103.159 0 destination 47.107.20.230 0 rule 240 permit ip source 192.168.103.90 0 destination 192.168.0.0 0.0.255.255 rule 245 permit ip source 192.168.103.90 0 destination 10.0.0.0 0.255.255.255 rule 250 permit ip source 192.168.103.90 0 destination 3.0.0.0 0.255.255.255 rule 255 permit ip source 192.168.103.90 0 destination 172.16.0.0 0.0.31.255 rule 260 permit ip source 192.168.103.90 0 destination 47.107.26.237 0 rule 265 permit ip source 192.168.103.90 0 destination 47.107.20.230 0 rule 270 permit ip source 192.168.103.236 0 destination 192.168.0.0 0.0.255.255 rule 275 permit ip source 192.168.103.236 0 destination 10.0.0.0 0.255.255.255 rule 280 permit ip source 192.168.103.236 0 destination 3.0.0.0 0.255.255.255 rule 285 permit ip source 192.168.103.236 0 destination 172.16.0.0 0.0.31.255 rule 290 permit ip source 192.168.103.236 0 destination 47.107.26.237 0 rule 295 permit ip source 192.168.103.236 0 destination 47.107.20.230 0 rule 300 permit ip source 192.168.103.7 0 destination 192.168.0.0 0.0.255.255 rule 305 permit ip source 192.168.103.7 0 destination 10.0.0.0 0.255.255.255 rule 310 permit ip source 192.168.103.7 0 destination 3.0.0.0 0.255.255.255 rule 315 permit ip source 192.168.103.7 0 destination 172.16.0.0 0.0.31.255 rule 320 permit ip source 192.168.103.7 0 destination 47.107.26.237 0 rule 325 permit ip source 192.168.103.7 0 destination 47.107.20.230 0 rule 330 permit ip source 192.168.103.57 0 destination 192.168.0.0 0.0.255.255 rule 335 permit ip source 192.168.103.57 0 destination 10.0.0.0 0.255.255.255 rule 340 permit ip source 192.168.103.57 0 destination 3.0.0.0 0.255.255.255 rule 345 permit ip source 192.168.103.57 0 destination 172.16.0.0 0.0.31.255 rule 350 permit ip source 192.168.103.57 0 destination 47.107.26.237 0 rule 355 permit ip source 192.168.103.57 0 destination 47.107.20.230 0 rule 360 permit ip source 192.168.103.157 0 destination 192.168.0.0 0.0.255.255 rule 365 permit ip source 192.168.103.157 0 destination 10.0.0.0 0.255.255.255 rule 370 permit ip source 192.168.103.157 0 destination 3.0.0.0 0.255.255.255 rule 375 permit ip source 192.168.103.157 0 destination 172.16.0.0 0.0.31.255 rule 380 permit ip source 192.168.103.157 0 destination 47.107.26.237 0 rule 385 permit ip source 192.168.103.157 0 destination 47.107.20.230 0 rule 390 permit ip source 192.168.103.112 0 destination 192.168.0.0 0.0.255.255 rule 395 permit ip source 192.168.103.112 0 destination 10.0.0.0 0.255.255.255 rule 400 permit ip source 192.168.103.112 0 destination 3.0.0.0 0.255.255.255 rule 405 permit ip source 192.168.103.112 0 destination 172.16.0.0 0.0.31.255 rule 410 permit ip source 192.168.103.112 0 destination 47.107.26.237 0 rule 415 permit ip source 192.168.103.112 0 destination 47.107.20.230 0 rule 420 permit ip source 192.168.103.218 0 destination 192.168.0.0 0.0.255.255 rule 425 permit ip source 192.168.103.218 0 destination 10.0.0.0 0.255.255.255 rule 430 permit ip source 192.168.103.218 0 destination 3.0.0.0 0.255.255.255 rule 435 permit ip source 192.168.103.218 0 destination 172.16.0.0 0.0.31.255 rule 440 permit ip source 192.168.103.218 0 destination 47.107.26.237 0 rule 445 permit ip source 192.168.103.218 0 destination 47.107.20.230 0 rule 450 permit ip source 192.168.103.110 0 destination 192.168.0.0 0.0.255.255
Advanced ACL 3003, named fqs, 21 rules, ACL's step is 5 rule 0 permit ip source 192.168.197.222 0 rule 1 permit ip source 192.168.197.0 0.0.0.255 rule 5 permit ip source 192.168.248.0 0.0.1.255 rule 10 permit ip source 192.168.103.13 0 rule 15 permit ip source 192.168.103.14 0 rule 20 permit ip source 192.168.103.30 0 rule 25 permit ip source 192.168.103.243 0 rule 30 permit ip source 192.168.103.20 0 rule 35 permit ip source 192.168.103.159 0 rule 40 permit ip source 192.168.103.236 0 rule 45 permit ip source 192.168.103.7 0 rule 50 permit ip source 192.168.103.57 0 rule 55 permit ip source 192.168.103.157 0 rule 60 permit ip source 192.168.103.112 0 rule 65 permit ip source 192.168.103.218 0 rule 75 permit ip source 192.168.149.100 0 rule 80 permit ip source 192.168.149.6 0 rule 85 permit ip source 192.168.149.50 0 rule 90 permit ip source 192.168.149.11 0 rule 95 permit ip source 192.168.111.111 0 rule 100 permit ip source 192.168.105.90 0
以上是策略路由的acl
policy-based-route fqs permit node 5 if-match acl 3002 # policy-based-route fqs permit node 10 if-match acl 3003 apply next-hop 192.168.105.111
策略路由
策略路由有的生效,有的不生效
(0)
最佳答案
策略路由不生效问题定位故障的思路是:先查看ACL规则是否匹配了流量,查看策略路由下一跳是否可达,最后查看是否配置packet-filter/QOS策略等功能,与策略路由冲突。
查看ACL规则是否匹配流量
查看ACL规则的配置,确认ACL规则匹配了流量。
命令: display acl
例如:通过命令确认ACL规则是否匹配了需要做策略路由的流量。
若通过display acl命令,查看规则中所写的rule规格错误,则需要重新下发rule命令,修改rule规则,确保rule规则匹配到流量。如果ACL中rule规则没有匹配所需做策略路由的流量,则需新增rule规则匹配该流量。
命令:rule
例如:ACL规则中将需要做策略路由的源IP为20.0.0.0/24、目的IP为200.0.0.0/24的流量错误写为源IP为20.0.0.0/24、目的IP为100.0.0.0/24,同时漏写源IP为30.0.0.0/24的流量,则需下发命令更正和增加ACL规则。
检查策略路由下一跳是否可达
检查策略路由配置中下一跳是否可达,如查看接口状态、ARP表项、路由表或PING测试。
命令:display interface
display arp X.X.X.X
display ip routing-table X.X.X.X
ping X.X.X.X
例如:策略路由下一跳配置为100.0.0.2,通过查看接口状态、ARP表项、路由表或ping测试确定策略路由下一跳是否可达。
排查路由
策略路由下一跳不通,需要排查路由问题。
检查设备是否配置了packet-filter/QOS策略等功能
当设备在相关视图下配置了packet-filter或QOS策略功能,由于packet-filter和QOS策略的优先级比策略路由高,因而策略路由下发不生效。需要结合所需做策略路由的流量ACL规则,对配置进行排查。
命令: display qos policy
display packet-filter
例如:acl number 3000匹配了所需做策略路由的流量,同时在设备上下发了packet-filter/QOS策略功能。packet-filter可以在二/三层物理接口及三层虚接口上下发,设备上可以配置基于接口/vlan/全局/控制平面应用的QOS策略,均需要排查。需注意,如下示例中,acl number 3000同时作为策略路由、packet-filter、QOS策略的感兴趣流量匹配条件,并且实际现网中可能存在不同ACL,但是规则匹配相同的流量做packet-filter/QOS策略,也会造成策略路由不生效,因此需要排查不同的ACL中是否有相同的rule规则。
备注:设备的软件版本为S12500-CMW520-R1335/S9500E-CMW520-R1335之前的版本,策略路由的优先级低于QOS策略,涉及QOS策略功能部分的排查。而设备的软件版本为S12500-CMW520-R1335/S9500E-CMW520-R1335及之后的版本,策略路由的优先级高于QOS策略,不涉及QOS策略功能部分的排查。
修改配置
通过上一步的排查发现策略路由与packet-filter/QOS策略同时下发,导致策略路由不生效,需修改配置。
策略路由与packet-filter同时下发的情况:
包过滤下发在inbound方向时,将导致策略路由感兴趣的流量在执行策略路由动作之前被过滤掉。包过滤下发在outbound方向时,将导致策略路由动作执行完后,报文被过滤掉,流量仍无法按策略路由需求转发出去。在上述两种情况下,均需要在packet-filter的ACL规则中,将需要正常转发的流量rule规则去掉。
策略路由与QOS策略同时下发的情况
策略路由感兴趣的流量先由QOS策略匹配后处理了。该种情况下,需重新了解和细化需求,是否可以通过细化QOS策略ACL规则和策略路由ACL规则,使两个ACL规则不冲突,流量能区分出来按不同的功能执行动作。
备注:设备的软件版本为S12500-CMW520-R1335/S9500E-CMW520-R1335之前的版本,策略路由的优先级低于QOS策略,涉及QOS策略功能部分的排查。而设备的软件版本为S12500-CMW520-R1335/S9500E-CMW520-R1335及之后的版本,策略路由的优先级高于QOS策略,不涉及QOS策略功能部分的排查。
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论