ACL无法应用到端口
[JC3600]dis cu
#
sysname JC3600
#
radius scheme system
#
domain system
#
acl number 2999
rule 1 permit source 172.16.200.2 0
rule 2 permit source 172.16.52.2 0
rule 3 permit source 172.16.50.2 0
rule 4 permit source 172.16.50.3 0
rule 5 permit source 172.16.50.4 0
rule 6 permit source 172.16.50.5 0
rule 105 deny
#
acl number 3104
rule 0 deny ip destination 172.16.0.0 0.0.255.255
rule 1 permit ip destination 172.16.0.0 0.0.255.255
rule 2 permit ip destination 172.16.104.0 0.0.0.255
rule 3 permit ip destination 172.16.108.0 0.0.0.255
rule 4 permit ip destination 172.16.200.0 0.0.0.255
#
vlan 1
#
vlan 104 to 107
#
vlan 1007
#
interface Vlan-interface104
ip address 172.16.104.254 255.255.255.0
#
interface Vlan-interface105
ip address 172.16.105.254 255.255.255.0
#
interface Vlan-interface106
ip address 172.16.106.254 255.255.255.0
#
interface Vlan-interface107
ip address 172.16.107.254 255.255.255.0
#
interface Vlan-interface1007
ip address 192.168.200.58 255.255.255.248
#
interface Aux1/0/0
#
interface Ethernet1/0/1
port access vlan 104
#
interface Ethernet1/0/2
port access vlan 104
#
interface Ethernet1/0/3
port access vlan 104
#
interface Ethernet1/0/4
port access vlan 104
#
interface Ethernet1/0/5
port access vlan 104
#
interface Ethernet1/0/6
port access vlan 104
#
interface Ethernet1/0/7
port access vlan 104
#
interface Ethernet1/0/8
port access vlan 104
#
interface Ethernet1/0/9
port access vlan 104
#
interface Ethernet1/0/10
port access vlan 104
#
interface Ethernet1/0/11
port access vlan 104
#
interface Ethernet1/0/12
port access vlan 104
#
interface Ethernet1/0/13
port access vlan 104
#
interface Ethernet1/0/14
port access vlan 104
#
interface Ethernet1/0/15
port access vlan 104
#
interface Ethernet1/0/16
port access vlan 104
#
interface Ethernet1/0/17
port access vlan 104
#
interface Ethernet1/0/18
port access vlan 104
#
interface Ethernet1/0/19
port access vlan 104
#
interface Ethernet1/0/20
port access vlan 104
#
interface Ethernet1/0/21
port access vlan 104
#
interface Ethernet1/0/22
port access vlan 104
#
interface Ethernet1/0/23
port access vlan 104
#
interface Ethernet1/0/24
port access vlan 104
#
interface GigabitEthernet1/1/1
#
interface GigabitEthernet1/1/2
#
interface GigabitEthernet1/1/3
#
interface GigabitEthernet1/1/4
#
undo irf-fabric authentication-mode
#
interface NULL0
#
user-interface aux 0 7
user-interface vty 0 4
#
return
[JC3600]
[JC3600]packet-fi vlan 104 inbound ip-group 3104
^
% Unrecognized command found at '^' position.
[JC3600]
[JC3600]vlan 104
[JC3600-vlan104]packet-filter vlan 104 inbound ip-group 3104
^
% Unrecognized command found at '^' position.
[JC3600-vlan104]
[JC3600]int e1/0/1
[JC3600-Ethernet1/0/1]packet-filter inbound ip-group 3104
Applying Acl 3104 rule 1 failed! Reason: Action conflicts!(Ethernet1/0/1)
[JC3600-Ethernet1/0/1]
[JC3600]qu
<JC3600>
<JC3600>
<JC3600>
<JC3600>
<JC3600>dis cur
#
sysname JC3600
#
arp protective-down recover enable
arp protective-down recover interval 300
#
system-guard ip enable
system-guard tcn enable
#
radius scheme system
#
domain system
#
local-user wzjyjc
password cipher V"`RD>H-13MS<-PNJS1SVA!!
service-type ssh terminal
level 3
#
stp mode rstp
stp enable
#
acl number 2999
rule 1 permit source 172.16.200.2 0
rule 2 permit source 172.16.52.2 0
rule 3 permit source 172.16.50.2 0
rule 4 permit source 172.16.50.3 0
rule 5 permit source 172.16.50.4 0
rule 6 permit source 172.16.50.5 0
rule 105 deny
#
acl number 3104
rule 0 deny IP destination 172.16.0.0 0.0.255.255
rule 1 permit IP destination 172.16.92.0 0.0.0.255
rule 2 permit IP destination 172.16.104.0 0.0.0.255
rule 3 permit IP destination 172.16.108.0 0.0.0.255
rule 4 permit IP destination 172.16.200.0 0.0.0.255
#
vlan 1
#
vlan 104 to 107
#
vlan 1007
description 互联
#
interface Vlan-interface104
ip address 172.16.104.254 255.255.255.0
#
interface Vlan-interface105
ip address 172.16.105.254 255.255.255.0
#
interface Vlan-interface106
ip address 172.16.106.254 255.255.255.0
#
interface Vlan-interface107
ip address 172.16.107.254 255.255.255.0
#
interface Vlan-interface1007
description 互联
ip address 192.168.200.58 255.255.255.248
#
interface Aux1/0/0
#
interface Ethernet1/0/1
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/2
broadcast-suppression 1
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp rate-limit enable
arp rate-limit 50
arp filter source 172.16.104.254
#
interface Ethernet1/0/3
broadcast-suppression 1
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/4
broadcast-suppression 1
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/5
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/6
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/7
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/8
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/9
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/10
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/11
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/12
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/13
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/14
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/15
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/16
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/17
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/18
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/19
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/20
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/21
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/22
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/23
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface Ethernet1/0/24
broadcast-suppression 20
port access vlan 104
packet-filter inbound ip-group 3104 rule 0
packet-filter inbound ip-group 3104 rule 1
packet-filter inbound ip-group 3104 rule 2
packet-filter inbound ip-group 3104 rule 3
packet-filter inbound ip-group 3104 rule 4
arp filter source 172.16.104.254
#
interface GigabitEthernet1/1/1
shutdown
#
interface GigabitEthernet1/1/2
shutdown
#
interface GigabitEthernet1/1/3
duplex full
speed 100
port link-type trunk
port trunk permit vlan all
broadcast-suppression 20
#
interface GigabitEthernet1/1/4
duplex full
speed 100
port link-type trunk
port trunk permit vlan all
broadcast-suppression 20
#
undo irf-fabric authentication-mode
#
interface NULL0
#
arp anti-attack valid-check enable
#
voice vlan mac-address 0001-e300-0000 mask ffff-ff00-0000
#
ip route-static 0.0.0.0 0.0.0.0 192.168.200.57 preference 60
#
snmp-agent
snmp-agent local-engineid 800063A23822D6BC747C6877
snmp-agent community write public
snmp-agent sys-info version all
#
ssh-server source-interface Vlan-interface1007
ssh user wzjyjc authentication-type all
ssh user wzjyjc service-type stelnet
#
user-interface aux 0
authentication-mode scheme
user-interface aux 1 7
user-interface vty 0 4
acl 2999 inbound
authentication-mode scheme
#
return
<JC3600>
<JC3600>
<JC3600>
(0)
最佳答案
按现场所写的ACL规则,rule1-rule4均无效,因为对应策略匹配的网段均属于rule0的明细网段,匹配是会先匹配rule0,然后执行debyg,后面的策略也就无法匹配。调整下吧,把rule0放到最后
acl number 3104
rule 0 deny IP destination 172.16.0.0 0.0.255.255
rule 1 permit IP destination 172.16.92.0 0.0.0.255
rule 2 permit IP destination 172.16.104.0 0.0.0.255
rule 3 permit IP destination 172.16.108.0 0.0.0.255
rule 4 permit IP destination 172.16.200.0 0.0.0.255
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论