為啥做了nat server 丟給fib路由黑洞,業務不通,其他地址沒問題,tcp業務沒問題,隻有udp業務有問題
*May 23 12:18:47:194 2025 F5000 IPFW/7/IPFW_PACKET: -Chassis=1-Slot=2;
Receiving, interface = Ten-GigabitEthernet1/2/2/7
version = 4, headlen = 20, tos = 20
pktlen = 425, pktid = 63915, offset = 0, ttl = 53, protocol = 17
checksum = 64119, s = 117.176.129.76, d = 119.6.226.9
channelID = 0, vpn-InstanceIn = 0, vpn-InstanceOut = 0.
VsysID = 1
prompt: Receiving IP packet from interface Ten-GigabitEthernet1/2/2/7.
Payload: UDP
source port = 5060, destination port = 5060
checksum = 0xe1ab, length = 405.
*May 23 12:18:47:195 2025 F5000 IPFW/7/IPFW_PACKET: -Chassis=1-Slot=2;
Discarding, interface = Ten-GigabitEthernet1/2/2/7
version = 4, headlen = 20, tos = 20
pktlen = 425, pktid = 63915, offset = 0, ttl = 52, protocol = 17
checksum = 64375, s = 117.176.129.76, d = 119.6.226.9
channelID = 0, vpn-InstanceIn = 0, vpn-InstanceOut = 0.
VsysID = 1
prompt: FIB BLACKHOLE.
Payload: UDP
source port = 5060, destination port = 5060
checksum = 0xe1ab, length = 405.
(0)
最佳答案
根據日誌提示FIB BLACKHOLE
,防火牆NAT Server的報文被黑洞路由丟棄,主要原因為NAT轉換後的目的地址匹配了防火牆自動下發的防環黑洞路由。以下是關鍵排查點:
display nat all
檢查接口下流表狀態是否為Inactive
,若提示Not enough resources
,需釋放流表資源或優化配置。nat server global 112.0.0.1 vpn-instance external_vpn inside 10.0.0.1
確保NAT規則中指定了正確的VPN實例。undo ip route-static 112.0.0.1 32 NULL0
注意:需評估是否可能引發環路,建議優先修正NAT配置。nat server protocol tcp global 112.0.0.1 80 inside 10.0.0.1 8080
確保轉換後的目的地址非防火牆接口地址。(0)
親~登錄後才可以操作哦!
確定你的郵箱還未認證,請認證郵箱或綁定手機後進行當前操作
舉報
×
侵犯我的權益
×
侵犯了我企業的權益
×
抄襲了我的內容
×
原文鏈接或出處
誹謗我
×
對根叔社區有害的內容
×
不規範轉載
×
舉報說明
暫無評論