有一台防火牆H3C F1050,防火牆上聯一台路由器,下聯一台交換機。這3台設備,tracert外網一台設備,IP:10.0.0.1,其中在路由器和防火牆上tracert,都可以獲得完整的tracert數據;在交換機上tracert隻能獲得最後一跳(即10.0.0.1)的數據,中間的路徑全部是*號;經過排查感覺問題是在防火牆上,但防火牆已經配置以下命令:
ip unreachables enable
ip ttl-expires enable
session state-machine mode loose
#
仍然沒有作用
以下是防火牆的配置,麻煩幫忙看看是什麼原因導致
#
version 7.1.064, Release 9313P1901
#
sysname FW_F1050
#
clock timezone Beijing add 08:00:00
clock protocol ntp context 1
#
context Admin id 1
#
telnet server enable
#
irf mac-address persistent timer
irf auto-update enable
undo irf link-delay
irf member 1 priority 2
irf member 2 priority 1
#
ip unreachables enable
ip ttl-expires enable
#
lldp global enable
#
password-recovery enable
#
vlan 1
#
vlan 100
#
irf-port 1/2
port group interface GigabitEthernet1/0/15
#
irf-port 2/1
port group interface GigabitEthernet2/0/15
#
object-group service Fang
0 service tcp destination eq 69
3 service tcp destination eq 1434
5 service tcp destination eq 4444
6 service tcp destination eq 5554
7 service tcp destination eq 5444
8 service tcp destination eq 1068
9 service tcp destination eq 9996
10 service tcp destination eq 1025
11 service tcp destination eq 539
12 service tcp destination eq 7995
13 service tcp destination eq 6667
15 service udp destination eq 1434
17 service udp destination eq 4444
18 service udp destination eq 5444
19 service udp destination eq 9996
20 service udp destination eq 1025
21 service udp destination eq 539
22 service udp destination eq 7995
23 service udp destination eq 6667
40 service tcp destination eq 3389
50 service tcp source eq 445
60 service udp source eq 445
70 service udp destination eq 445
80 service tcp destination eq 445
90 service tcp source range 135 139
100 service udp source range 135 139
110 service udp destination range 135 139
120 service tcp destination range 135 139
#
interface NULL0
#
interface Vlan-interface100
ip address 10.X.X.X 255.255.255.0
#
interface GigabitEthernet1/0/0
port link-mode route
#
interface GigabitEthernet1/0/3
port link-mode route
#
interface GigabitEthernet1/0/4
port link-mode route
#
interface GigabitEthernet1/0/5
port link-mode route
#
interface GigabitEthernet1/0/6
port link-mode route
#
interface GigabitEthernet1/0/7
port link-mode route
#
interface GigabitEthernet1/0/8
port link-mode route
#
interface GigabitEthernet1/0/9
port link-mode route
#
interface GigabitEthernet1/0/11
port link-mode route
#
interface GigabitEthernet1/0/12
port link-mode route
#
interface GigabitEthernet1/0/14
port link-mode route
#
interface GigabitEthernet1/0/18
port link-mode route
#
interface GigabitEthernet1/0/19
port link-mode route
#
interface GigabitEthernet1/0/20
port link-mode route
#
interface GigabitEthernet1/0/21
port link-mode route
#
interface GigabitEthernet1/0/22
port link-mode route
#
interface GigabitEthernet1/0/23
port link-mode route
#
interface GigabitEthernet2/0/0
port link-mode route
#
interface GigabitEthernet2/0/3
port link-mode route
#
interface GigabitEthernet2/0/4
port link-mode route
#
interface GigabitEthernet2/0/5
port link-mode route
#
interface GigabitEthernet2/0/6
port link-mode route
#
interface GigabitEthernet2/0/7
port link-mode route
#
interface GigabitEthernet2/0/8
port link-mode route
#
interface GigabitEthernet2/0/9
port link-mode route
#
interface GigabitEthernet2/0/10
port link-mode route
#
interface GigabitEthernet2/0/11
port link-mode route
#
interface GigabitEthernet2/0/12
port link-mode route
#
interface GigabitEthernet2/0/13
port link-mode route
#
interface GigabitEthernet2/0/14
port link-mode route
#
interface GigabitEthernet2/0/18
port link-mode route
#
interface GigabitEthernet2/0/19
port link-mode route
#
interface GigabitEthernet2/0/20
port link-mode route
#
interface GigabitEthernet2/0/21
port link-mode route
#
interface GigabitEthernet2/0/22
port link-mode route
#
interface GigabitEthernet2/0/23
port link-mode route
#
interface GigabitEthernet1/0/1
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet1/0/2
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet1/0/10
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet1/0/13
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet1/0/16
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet1/0/17
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet2/0/1
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet2/0/2
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet2/0/16
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet2/0/17
port link-mode bridge
port access vlan 100
#
interface GigabitEthernet1/0/15
#
interface GigabitEthernet2/0/15
description IRF_LINK—_GE1/0/15
#
object-policy ip Local-Trust
rule 0 pass counting
#
object-policy ip Local-Untrust
rule 0 pass counting
#
object-policy ip Trust-Local
rule 0 pass
#
object-policy ip Trust-Trust
rule 100 pass counting
#
object-policy ip Trust-Untrust
rule 15 pass service icmp-traceroute
rule 5 drop service FangBingDu counting
rule 5 comment FangBingDU
rule 12 pass counting
#
object-policy ip Untrust-Local
rule 0 pass
#
object-policy ip Untrust-Trust
rule 56958 pass service icmp-traceroute
rule 5 drop service FangBingDu counting
rule 5 comment FangBingDu
rule 9 pass counting
#
object-policy ip Untrust-Untrust
rule 0 pass
#
security-zone name Local
attack-defense apply policy test1
#
security-zone name Trust
import interface Vlan-interface100
import interface GigabitEthernet1/0/2 vlan 100
import interface GigabitEthernet1/0/10 vlan 100
import interface GigabitEthernet1/0/13 vlan 100
import interface GigabitEthernet1/0/16 vlan 100
import interface GigabitEthernet1/0/17 vlan 100
import interface GigabitEthernet2/0/2 vlan 100
import interface GigabitEthernet2/0/16 vlan 100
import interface GigabitEthernet2/0/17 vlan 100
attack-defense apply policy test1
#
security-zone name DMZ
attack-defense apply policy test1
#
security-zone name Untrust
import interface GigabitEthernet1/0/1 vlan 100
import interface GigabitEthernet2/0/1 vlan 100
attack-defense apply policy test1
#
security-zone name Management
import interface GigabitEthernet1/0/0
attack-defense apply policy test1
#
security-zone name tu
#
zone-pair security source Any destination Any
#
zone-pair security source Local destination Trust
object-policy apply ip Local-Trust
#
zone-pair security source Local destination Untrust
object-policy apply ip Local-Untrust
#
zone-pair security source Trust destination Local
object-policy apply ip Trust-Local
#
zone-pair security source Trust destination Trust
object-policy apply ip Trust-Trust
#
zone-pair security source Trust destination Untrust
object-policy apply ip Trust-Untrust
#
zone-pair security source Untrust destination Local
object-policy apply ip Untrust-Local
#
zone-pair security source Untrust destination Trust
object-policy apply ip Untrust-Trust
#
zone-pair security source Untrust destination Untrust
object-policy apply ip Untrust-Untrust
#
scheduler logfile size 16
#
line class aux
user-role network-operator
#
line class console
user-role network-admin
#
line class vty
user-role network-operator
#
line aux 0
user-role network-admin
#
line aux 1
user-role network-operator
#
line con 0
user-role network-admin
set authentication password hash $h$6$6ec9UUhlpMd+4bIh$Bk5o9
#
line con 1
authentication-mode scheme
user-role network-admin
#
line vty 0 63
authentication-mode scheme
user-role network-admin
#
userlog flow export version 3
#
time-range ceshi-dns from 16:30 9/8/2021 to 16:30 9/9/2021
time-range test from 16:40 9/8/2021 to 16:42 9/8/2021
#
sntp enable
#
password-control history 3
password-control login-attempt 5 exceed lock-time 5
#
domain system
#
aaa session-limit ftp 16
aaa session-limit telnet 16
aaa session-limit ssh 16
domain default enable system
#
role name level-0
description Predefined level-0 role
#
role name level-1
description Predefined level-1 role
#
role name level-2
description Predefined level-2 role
#
role name level-3
description Predefined level-3 role
#
role name level-4
description Predefined level-4 role
#
role name level-5
description Predefined level-5 role
#
role name level-6
description Predefined level-6 role
#
role name level-7
description Predefined level-7 role
#
role name level-8
description Predefined level-8 role
#
role name level-9
description Predefined level-9 role
#
role name level-10
description Predefined level-10 role
#
role name level-11
description Predefined level-11 role
#
role name level-12
description Predefined level-12 role
#
role name level-13
description Predefined level-13 role
#
role name level-14
description Predefined level-14 role
#
user-group system
#
local-user admin class manage
password hash $h$6$HNHtkSUtAiUGx7xf$sFOWXcL34WyWPR4UENUTa
service-type ssh https
authorization-attribute user-role network-admin
authorization-attribute user-role network-operator
password-control aging 90
password-control length 10
password-control composition type-number 3 type-length 1
password-control login-attempt 3 exceed lock-time 3
#
session top-statistics enable
session synchronization enable
session synchronization dns http
session state-machine mode loose
#
ip https enable
#
app-profile 5_3_56956_IPv4
ips apply policy ceshi1 mode protect
anti-virus apply policy default mode protect
#
inspect block-source parameter-profile ips_block_default_parameter
#
inspect capture parameter-profile ips_capture_default_parameter
#
inspect logging parameter-profile ips_logging_default_parameter
#
inspect redirect parameter-profile av_redirect_default_parameter
#
inspect redirect parameter-profile ips_redirect_default_parameter
#
inspect redirect parameter-profile url_redirect_default_parameter
#
ips policy default
#
anti-virus policy ceshi
inspect smtp action block
inspect pop3 action block
#
anti-virus policy default
#
return
#
(0)
zone-pair security source Any destination Any
這條沒生效 , 配置一條安全策略any到any全放通的,放在最前麵,測試是不是策略阻擋
(0)
trust-untrust和untrust-trust的路徑,都是有放通,應該不需要any-any吧
trust-untrust和untrust-trust的路徑,都是有放通,應該不需要any-any吧
應該是被策略阻止了,你輸入如下命令,允許防火牆回包icmp差錯報文,再tracert看看是不是回顯了一堆防火牆的地址。
其實昨天就跟你說過,用包過濾,不要用域間策略的traceroute服務,容易出問題。
(0)
親~登錄後才可以操作哦!
確定你的郵箱還未認證,請認證郵箱或綁定手機後進行當前操作
舉報
×
侵犯我的權益
×
侵犯了我企業的權益
×
抄襲了我的內容
×
原文鏈接或出處
誹謗我
×
對根叔社區有害的內容
×
不規範轉載
×
舉報說明