防火墙f1050命令行如下:现在问题是想让匹配acl 3080的ip192.168.0.12走策略路由node 70,但是配置后该ip还是走策略路由node 20不知道是acl配置错误还是什么情况,网络结构为三层交换机为网关接防火墙。谢谢指教
policy-based-route pbr_internet permit node 20
if-match acl 3020
apply next-hop 202.202.202.202
#
policy-based-route pbr_internet permit node 70
if-match acl 3080
apply next-hop 183.183.183.183
#
nqa entry admin test
type icmp-echo
destination ip 202.202.202.202
frequency 100
next-hop ip 202.202.202.202
reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
#
nqa schedule admin test start-time now lifetime forever
#
interface GigabitEthernet1/0/6
port link-mode route
description link to 40M special line
ip address 202.202.202.200 255.255.255.224
tcp mss 1024
nat outbound 3000
interface GigabitEthernet1/0/7
port link-mode route
description link to 10M special line
ip address 183.183.183.200 255.255.255.224
nat outbound 3080
nat server protocol tcp global 183.183.183.200 9999 inside 192.168.0.12 80
#
object-policy ip local_to_trust
rule 0 pass
#
object-policy ip local_to_untrust
rule 0 pass
#
object-policy ip trust_to_local
rule 0 pass
#
object-policy ip trust_to_untrust
rule 0 pass
#
object-policy ip untrust-trust
#
object-policy ip untrust_to_trust
rule 0 pass destination-ip add_server service service_port logging counting
#
security-zone name Local
#
#
security-zone name DMZ
#
security-zone name Untrust
import interface GigabitEthernet1/0/6
import interface GigabitEthernet1/0/7
zone-pair security source Any destination Any
#
zone-pair security source Local destination Trust
object-policy apply ip local_to_trust
#
zone-pair security source Local destination Untrust
object-policy apply ip local_to_untrust
#
zone-pair security source Trust destination Local
object-policy apply ip trust_to_local
#
zone-pair security source Trust destination Untrust
object-policy apply ip trust_to_untrust
#
zone-pair security source Untrust destination Trust
object-policy apply ip untrust_to_trust
#
scheduler logfile size 16
#
ip route-static 0.0.0.0 0 202.202.202.202 track 1
ip route-static 0.0.0.0 0 183.183.183.183
ip route-static 10.10.0.0 16 10.10.10.1
ip route-static 10.10.110.0 24 10.10.10.1
ip route-static 192.168.0.0 16 10.10.10.1
ip route-static 192.168.52.0 24 10.10.10.3
ip route-static 192.168.53.0 24 10.10.10.3
#
undo info-center enable
#
acl advanced 3000
rule 10 deny ip source 192.168.9.111 0
rule 20 permit ip
acl advanced 3030
rule 30 permit ip source 192.168.0.0 0.0.0.255
rule 40 deny ip source 192.168.0.12 0
acl advanced 3080
rule 10 permit ip source 192.168.0.12 0
#
(0)
您好,请知:
(1)
您rule 30已经放通了192.168.0.0整个地址段,且192.168.0.12就在这个地址段里面,所以就会匹配了rule 30,匹配了rule 30后,就不会匹配下面的策略
在ACL 3030中我是deny了192.168.0.12这个地址啊
您rule 30已经放通了192.168.0.0整个地址段,且192.168.0.12就在这个地址段里面,所以就会匹配了rule 30,匹配了rule 30后,就不会匹配下面的策略
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明