现在的问题是在acl 3030对192.168.0.12做了deny在acl 3080对该地址进行放行。haipin是对整个网段192.168.0.0做的,现在这个haipin对地址192.168.0.12就不起作用了。是不是要对该地址192.168.0.12单独做haipin或者其他方案。谢谢
policy-based-route pbr_internet permit node 20
 if-match acl 3020
 apply next-hop 202.202.202.202
#
policy-based-route pbr_internet permit node 70
 if-match acl 3080
 apply next-hop 183.183.183.183
#
nqa entry admin test
 type icmp-echo
  destination ip 202.202.202.202
  frequency 100
  next-hop ip 202.202.202.202
  reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
#
 nqa schedule admin test start-time now lifetime forever
#
interface GigabitEthernet1/0/6
 port link-mode route
 description link to 40M special line
 ip address 202.202.202.200 255.255.255.224
 tcp mss 1024
 
 interface GigabitEthernet1/0/7
 port link-mode route
 description link to 10M special line
 ip address 183.183.183.200 255.255.255.224
 nat outbound 3080
 nat server protocol tcp global 183.183.183.200 9999 inside 192.168.0.12 80
#
object-policy ip local_to_trust
 rule 0 pass
#
object-policy ip local_to_untrust
 rule 0 pass
#
object-policy ip trust_to_local
 rule 0 pass
#
object-policy ip trust_to_untrust
 rule 0 pass
#
object-policy ip untrust-trust
#
object-policy ip untrust_to_trust
 rule 0 pass destination-ip add_server service service_port logging counting
#
security-zone name Local
#
#
security-zone name DMZ
#
security-zone name Untrust
 import interface GigabitEthernet1/0/6
 import interface GigabitEthernet1/0/7
zone-pair security source Any destination Any
#
zone-pair security source Local destination Trust
 object-policy apply ip local_to_trust
#
zone-pair security source Local destination Untrust
 object-policy apply ip local_to_untrust
#
zone-pair security source Trust destination Local
 object-policy apply ip trust_to_local
#
zone-pair security source Trust destination Untrust
 object-policy apply ip trust_to_untrust
#
zone-pair security source Untrust destination Trust
 object-policy apply ip untrust_to_trust
#
 scheduler logfile size 16
#
 ip route-static 0.0.0.0 0 202.202.202.202 track 1
 ip route-static 0.0.0.0 0 183.183.183.183
 ip route-static 10.10.0.0 16 10.10.10.1
 ip route-static 10.10.110.0 24 10.10.10.1
 ip route-static 192.168.0.0 16 10.10.10.1
 ip route-static 192.168.52.0 24 10.10.10.3
 ip route-static 192.168.53.0 24 10.10.10.3
#
 undo info-center enable
#
 
acl advanced 3000
 rule 10 deny ip source 192.168.9.111 0
 rule 20 permit ip
#
acl advanced 3030
 rule 20 deny ip source 192.168.0.12 0
 rule 30 permit ip source 192.168.0.0 0.0.0.255
acl advanced 3080
 rule 10 permit ip source 192.168.0.12 0
interface Vlan-interface10
 nat hairpin enable
 ip policy-based-route pbr_internet
interface Vlan-interface10 
 nat hairpin enable
 ip policy-based-route pbr_internet
(0)
最佳答案
				
				
					hairpin需要流量出方向能命中对应的接口,然后对应的接口上同时存在nat server ,nat outbound
(0)
nat server和nat outbound已经做了啊
是不是out outbound做的不对啊
	
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
你看看终端的会话,是不是acl里的deny没用,导致流量还是从另外一个口出去了,把两个策略路由子句的顺序换一下试试