MSR 两个wan口分别接20M(G0/0)企业带宽和家庭百兆(G0/1)带宽,内网两个vlan,vlan1:192.168.1.0/24 ,vlan2:172.16.0.0/16。默认路由为家庭百兆(G0/1)。现在做了策略路由后两个vlan之间不通了 请大神指点迷津 配置如下:
#
version 5.20, Release 2516P11
#
clock timezone Taipei add 08:00:00
l2tp enable
#
domain default enable system
#
telnet server enable
#
dar p2p signature-file flash:/p2p_default.mtd
#
ndp enable
#
ntdp enable
#
qos carl 1 source-ip-address range 172.16.1.2 to 172.16.1.254 per-address
#
cluster enable
#
port-security enable
#
ip http acl 2222
ip http port 6080
#
web idle-timeout 30
#
password-recovery enable
#
acl number 2001
rule 0 permit source 192.168.1.0 0.0.0.255
acl number 2002
rule 0 permit source 172.16.0.0 0.0.255.255
acl number 2004
acl number 2222
rule 0 permit source 172.16.0.0 0.0.255.255
#
vlan 1
#
vlan 2 to 3
#
vlan 10
#
vlan 20
description test
#
domain system
authentication ppp local
access-limit disable
state active
idle-cut disable
self-service-url disable
ip pool 1 192.168.0.2 192.168.0.100
#
dhcp server ip-pool vlan1 extended
network ip range 192.168.1.2 192.168.1.254
network mask 255.255.255.0
gateway-list 192.168.1.1
dns-list 192.168.1.1
#
dhcp server ip-pool vlan2 extended
network ip range 172.16.1.100 172.16.1.200
network mask 255.255.255.0
gateway-list 172.16.1.1
dns-list 172.16.1.1
#
policy-based-route ccc permit node 0
if-match acl 2002
apply ip-address next-hop 117.71.57.1
#
policy-based-route bbb deny node 0
if-match acl 2002
#
user-group system
group-attribute allow-guest
#
local-user admin
password cipher authorization-attribute level 3
service-type telnet
service-type web
#
cwmp
undo cwmp enable
#
l2tp-group 1
undo tunnel authentication
allow l2tp virtual-template 0
#
interface Aux0
async mode flow
link-protocol ppp
#
interface Cellular0/0
async mode protocol
link-protocol ppp
tcp mss 1024
#
interface Dialer10
nat outbound
link-protocol ppp
ppp chap user 055194150777
ppp chap password cipher $c$3$z9GJ/MWoYcLURbr4V05TvOlxMFarKGoC3A==
ppp pap local-user 055194150777 password cipher $c$3$ObRKJoZ30lYe10G6QeZq9KgcxG6NyYpG5g==
ppp ipcp dns admit-any
ppp ipcp dns request
mtu 1492
ip address ppp-negotiate
tcp mss 1024
dialer user username
dialer-group 10
dialer bundle 10
#
interface Virtual-Template0
ppp authentication-mode chap domain system
remote address pool 1
ip address 192.168.0.1 255.255.255.0
#
interface NULL0
#
interface Vlan-interface1
ip address 192.168.1.1 255.255.255.0
tcp mss 1024
dhcp server apply ip-pool vlan1
#
interface Vlan-interface2
ip address 172.16.1.1 255.255.0.0
dhcp server apply ip-pool vlan2
ip policy-based-route ccc
ip flow-ordering internal
#
interface Vlan-interface3
ip address 192.168.199.5 255.255.255.0
ip flow-ordering internal
#
interface Vlan-interface10
ip address 192.168.58.1 255.255.255.0
#
interface Vlan-interface20
ip address 10.1.1.1 255.255.0.0
#
interface GigabitEthernet0/0
port link-mode route
nat outbound
nat server 45 protocol tcp global current-interface 2208 inside 172.16.1.8 22
ip address 117.71.57.156 255.255.255.0
tcp mss 1024
qos car outbound carl 1 cir 8000 cbs 62500 ebs 0 green pass red discard
dns server 61.132.163.68
dns server 202.102.192.68
#
interface GigabitEthernet0/1
port link-mode route
nat outbound
pppoe-client dial-bundle-number 10
#
interface GigabitEthernet0/2
port link-mode bridge
#
interface GigabitEthernet0/3
port link-mode bridge
#
interface GigabitEthernet0/4
port link-mode bridge
port access vlan 2
#
interface GigabitEthernet0/5
port link-mode bridge
#
interface GigabitEthernet0/6
port link-mode bridge
port access vlan 10
#
interface GigabitEthernet0/7
port link-mode bridge
port access vlan 3
#
interface GigabitEthernet0/8
port link-mode bridge
port access vlan 2
#
interface GigabitEthernet0/9
port link-mode bridge
port access vlan 2
#
interface WLAN-Ethernet0
shutdown
#
interface WLAN-Ethernet1
shutdown
#
interface WLAN-Ethernet2
shutdown
#
interface WLAN-Ethernet3
shutdown
#
ip route-static 0.0.0.0 0.0.0.0 Dialer10
ip route-static 0.0.0.0 0.0.0.0 GigabitEthernet0/0 117.71.57.1 preference 70
#
dhcp enable
#
ntp-service unicast-server 172.16.1.35
#
dialer-rule 10 ip permit
#
nms primary monitor-interface GigabitEthernet0/0
#
ip flow-ordering stat-interval 10
#
load xml-configuration
#
load tr069-configuration
#
user-interface tty 12
user-interface aux 0
user-interface vty 0 4
acl 2222 inbound
authentication-mode scheme
#
return
(0)
最佳答案
策略路由匹配的acl里面要把两个vlan互访的流量deny掉,不然互访的流量也会命中ACL,被策略丢到公网接口去。或者如下,把节点0换成节点一,保留节点0,并把节点0设置成空节点,不匹配动作,这样互访流量走默认转发,就不会走策略路由被丢到外网去了
acl number 3000
rule 0 permit ip source x.x.x.x 0.0.0.255 destination x.x.x.x 0.0.0.0255
#
policy-based-route ccc permit node 0
if-match acl 3002
#
policy-based-route bbb deny node 1
if-match acl 2002
apply ip-address next-hop 117.71.57.1
(0)
acl number 3000
rule 0 permit ip source x.x.x.x 0.0.0.255 destination x.x.x.x 0.0.0.0255
这条配置 我路由器没有destinaltion 这个选项 还望大神指点详细 谢谢
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论