请教Juniper ISG1000做MIP后为什么Ping不通内网地址??

发布于 2022-09-05 21:31:14 字数 9573 浏览 12 评论 1

  1. set vrouter trust-vr sharable
  2. set vrouter "untrust-vr"
  3. exit
  4. set vrouter "trust-vr"
  5. unset auto-route-export
  6. exit
  7. set auth-server "Local" id 0
  8. set auth-server "Local" server-name "Local"
  9. set auth default auth server "Local"
  10. set auth radius accounting port 1646
  11. set admin name "netscreen"
  12. set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn"
  13. set admin auth timeout 10
  14. set admin auth server "Local"
  15. set admin privilege read-write
  16. set admin format dos
  17. set zone "Trust" vrouter "trust-vr"
  18. set zone "Untrust" vrouter "trust-vr"
  19. set zone "DMZ" vrouter "trust-vr"
  20. set zone "VLAN" vrouter "trust-vr"
  21. set zone id 1000 "internet"
  22. set zone "Untrust-Tun" vrouter "trust-vr"
  23. set zone "Trust" tcp-rst
  24. set zone "Untrust" block
  25. unset zone "Untrust" tcp-rst
  26. set zone "DMZ" tcp-rst
  27. set zone "VLAN" block
  28. unset zone "VLAN" tcp-rst
  29. unset zone "internet" tcp-rst
  30. set zone "Untrust" screen tear-drop
  31. set zone "Untrust" screen syn-flood
  32. set zone "Untrust" screen ping-death
  33. set zone "Untrust" screen ip-filter-src
  34. set zone "Untrust" screen land
  35. set zone "V1-Untrust" screen tear-drop
  36. set zone "V1-Untrust" screen syn-flood
  37. set zone "V1-Untrust" screen ping-death
  38. set zone "V1-Untrust" screen ip-filter-src
  39. set zone "V1-Untrust" screen land
  40. set interface "ethernet1/1" zone "Untrust"
  41. set interface "ethernet1/1.1" tag 111 zone "Trust"
  42. set interface "ethernet1/2" zone "Trust"
  43. set interface "tunnel.1" zone "Trust"
  44. unset interface vlan1 ip
  45. set interface mgt ip 192.168.1.1/24
  46. set interface ethernet1/1 ip 61.1.1.1/30
  47. set interface ethernet1/1 route
  48. set interface ethernet1/2 ip 10.20.29.1/30
  49. set interface ethernet1/2 nat
  50. set interface tunnel.1 ip unnumbered interface ethernet1/1
  51. unset interface vlan1 bypass-others-ipsec
  52. unset interface vlan1 bypass-non-ip
  53. set interface ethernet1/1 ip manageable
  54. set interface ethernet1/2 ip manageable
  55. set interface ethernet1/1 manage ping
  56. set interface ethernet1/1 manage telnet
  57. set interface ethernet1/1 manage snmp
  58. set interface ethernet1/1 manage web
  59. set interface "ethernet1/1" mip 71.1.1.1 host 10.20.36.8 netmask 255.255.255.255 vr "trust-vr"
  60. unset flow no-tcp-seq-check
  61. set flow tcp-syn-check
  62. set pki authority default scep mode "auto"
  63. set pki x509 default cert-path partial
  64. set address "Trust" "10.20.0.0/16" 10.20.0.0 255.255.0.0
  65. set address "Trust" "10.20.0.0/24" 10.20.0.0 255.255.255.0
  66. set address "Trust" "10.20.40.0/21" 10.20.40.0 255.255.248.0
  67. set address "Trust" "AAA-Self-Portal" 10.20.36.8 255.255.255.255
  68. set address "Trust" "FOR AAA" 71.1.1.1 255.255.255.255
  69. set ike respond-bad-spi 1
  70. unset ike ikeid-enumeration
  71. unset ike dos-protection
  72. unset ipsec access-session enable
  73. set ipsec access-session maximum 5000
  74. set ipsec access-session upper-threshold 0
  75. set ipsec access-session lower-threshold 0
  76. set ipsec access-session dead-p2-sa-timeout 0
  77. unset ipsec access-session log-error
  78. unset ipsec access-session info-exch-connected
  79. unset ipsec access-session use-error-log
  80. set icap av-vendor-id symantec-5
  81. set url protocol websense
  82. exit
  83. set policy id 10 from "Untrust" to "Trust"  "Any" "MIP(71.1.1.1)" "PING" permit log
  84. set policy id 10
  85. exit
  86. set policy id 4 from "Untrust" to "Trust"  "Any" "Any" "ANY" permit log
  87. exit
  88. set policy id 6 from "Trust" to "Untrust"  "10.20.40.0/21" "Any" "ANY" permit log
  89. set policy id 6
  90. exit
  91. set policy id 8 from "Untrust" to "Trust"  "Any" "MIP(71.1.1.1)" "ANY" permit log
  92. set policy id 8
  93. exit
  94. set policy id 7 from "Untrust" to "Trust"  "Any" "FOR AAA" "ANY" nat dst ip 10.20.36.8 permit log
  95. set policy id 7
  96. exit
  97. set policy id 9 from "Trust" to "Untrust"  "AAA-Self-Portal" "Any" "ANY" permit log
  98. set policy id 9
  99. exit
  100. set nsmgmt bulkcli reboot-timeout 60
  101. set ssh version v2
  102. set config lock timeout 5
  103. set snmp port listen 161
  104. set snmp port trap 162
  105. set vrouter "untrust-vr"
  106. set route 71.1.1.1/32 vrouter "trust-vr" preference 20
  107. exit
  108. set vrouter "trust-vr"
  109. unset add-default-route
  110. set route 0.0.0.0/0 interface ethernet1/1 gateway 61.1.1.2 preference 20
  111. exit
  112. set vrouter "untrust-vr"
  113. exit
  114. set vrouter "trust-vr"
  115. exit

复制代码PC1(10.20.36.-------(10.20.36.1)路由器(10.20.29.2)--------(10.20.29.1)ISG1000(61.1.1.2 )-----(61.1.1.1)CISCO路由器
                       (10.20.40.1)_|
PC2(10.20.40.10)________|

内网的默认路由指向ISG1000,现要求外网能够访问PC1提供的MIP(71.1.1.1)的公网服务
现象一C2可以上网,转换出去的地址是61.1.1.2
现象二C1可以上网,转换出去的地址是71.1.1.1,但是外网的地址Ping不通71.1.1.1
现象三:内网的所有机器只能ping通内网的路由器,Ping不通ISG1000
现象四:get log traffic policy 9 可以看到 PC1 Ping外网的时候的日志:
nsisg1000-> get log traffic policy 9
PID 9, from Trust to Untrust, src AAA-Self-Portal, dst Any, service ANY, action Permit
Total traffic entries matched under this policy = 2229
==================================================================================
Date       Time       Duration Source IP        Port Destination IP   Port Service
Reason                         Xlated Src IP    Port Xlated Dst IP    Port ID
==================================================================================
2002-07-05 07:13:15    0:00:04 10.20.36.8      25581 212.187.171.245   768 ICMP     
Close - RESP                   41.72.96.162    25581 212.187.171.245   768
2002-07-05 07:13:15    0:00:05 10.20.36.8      25325 212.187.171.245   768 ICMP     
Close - RESP                   41.72.96.162    25325 212.187.171.245   768

现象四:get log traffic policy 6 可以看到 PC1 Ping外网的时候的日志:
nsisg1000-> get log traffic policy 6
PID 6, from Trust to Untrust, src 10.20.40.0/21, dst Any, service ANY, action Permit
Total traffic entries matched under this policy = 30529
==================================================================================
Date       Time       Duration Source IP        Port Destination IP   Port Service
Reason                         Xlated Src IP    Port Xlated Dst IP    Port ID
==================================================================================
2002-07-05 07:13:49    0:01:06 10.20.40.120    58937 95.84.162.74    30459 UDP PORT 30459
Close - AGE OUT                61.1.1.2  23944 95.84.162.74    30459
2002-07-05 07:13:49    0:00:20 10.20.40.167    49263 74.53.106.178      80 HTTP

现象五:get log traffic policy 其他策略的时候就没有任何log

请问各位高手,我问题在哪里?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

挥剑断情 2022-09-08 13:54:12

在ISG1000G上缺少回指路由

set route 10.20.36.0/24 interface ethernet1/2 gateway  10.20.29.2
set route 10.20.40.0/24 interface ethernet1/2 gateway  10.20.29.2

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文