防火墙f1050命令行如下:现在问题是想让匹配acl 3080的ip192.168.0.12走策略路由node 70,但是配置后该ip还是走策略路由node 20不知道是acl配置错误还是什么情况,网络结构为三层交换机为网关接防火墙。谢谢指教 
policy-based-route pbr_internet permit node 20
 if-match acl 3020
 apply next-hop 202.202.202.202
#
policy-based-route pbr_internet permit node 70
 if-match acl 3080
 apply next-hop 183.183.183.183
#
nqa entry admin test
 type icmp-echo
  destination ip 202.202.202.202
  frequency 100
  next-hop ip 202.202.202.202
  reaction 1 checked-element probe-fail threshold-type consecutive 5 action-type trigger-only
#
 nqa schedule admin test start-time now lifetime forever
#
interface GigabitEthernet1/0/6
 port link-mode route
 description link to 40M special line
 ip address 202.202.202.200 255.255.255.224
 tcp mss 1024
 nat outbound 3000
 interface GigabitEthernet1/0/7
 port link-mode route
 description link to 10M special line
 ip address 183.183.183.200 255.255.255.224
 nat outbound 3080
 nat server protocol tcp global 183.183.183.200 9999 inside 192.168.0.12 80
#
object-policy ip local_to_trust
 rule 0 pass
#
object-policy ip local_to_untrust
 rule 0 pass
#
object-policy ip trust_to_local
 rule 0 pass
#
object-policy ip trust_to_untrust
 rule 0 pass
#
object-policy ip untrust-trust
#
object-policy ip untrust_to_trust
 rule 0 pass destination-ip add_server service service_port logging counting
#
security-zone name Local
#
#
security-zone name DMZ
#
security-zone name Untrust
 import interface GigabitEthernet1/0/6
 import interface GigabitEthernet1/0/7
zone-pair security source Any destination Any
#
zone-pair security source Local destination Trust
 object-policy apply ip local_to_trust
#
zone-pair security source Local destination Untrust
 object-policy apply ip local_to_untrust
#
zone-pair security source Trust destination Local
 object-policy apply ip trust_to_local
#
zone-pair security source Trust destination Untrust
 object-policy apply ip trust_to_untrust
#
zone-pair security source Untrust destination Trust
 object-policy apply ip untrust_to_trust
#
 scheduler logfile size 16
#
 ip route-static 0.0.0.0 0 202.202.202.202 track 1
 ip route-static 0.0.0.0 0 183.183.183.183
 ip route-static 10.10.0.0 16 10.10.10.1
 ip route-static 10.10.110.0 24 10.10.10.1
 ip route-static 192.168.0.0 16 10.10.10.1
 ip route-static 192.168.52.0 24 10.10.10.3
 ip route-static 192.168.53.0 24 10.10.10.3
#
 undo info-center enable
#
 
acl advanced 3000
 rule 10 deny ip source 192.168.9.111 0
 rule 20 permit ip
acl advanced 3030
 rule 30 permit ip source 192.168.0.0 0.0.0.255
 rule 40 deny ip source 192.168.0.12 0
acl advanced 3080
 rule 10 permit ip source 192.168.0.12 0
#
(0)
您好,请知:
(1)
您rule 30已经放通了192.168.0.0整个地址段,且192.168.0.12就在这个地址段里面,所以就会匹配了rule 30,匹配了rule 30后,就不会匹配下面的策略
在ACL 3030中我是deny了192.168.0.12这个地址啊
您rule 30已经放通了192.168.0.0整个地址段,且192.168.0.12就在这个地址段里面,所以就会匹配了rule 30,匹配了rule 30后,就不会匹配下面的策略
 
									
									 
	 
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明