Cisco ASA 5505 语音/数据 VLAN 无法 ping/路由

Cisco ASA 5505 语音/数据 VLAN 无法 ping/路由

你好,我是 Cisco ASA 5000 系列的新手,有两个接口想要在其间进行路由,一个是数据网络 192.168.69.0/24,另一个是语音 192.168.70.0/24,我已添加了这两个接口,并且在同一子网上可以 ping 通相应的网关,但如果我连接到数据交换机端口,则无法 ping 通语音 VLAN,反之亦然。

我认为这与 NAT 有关,所以我添加了 nat 豁免规则,但仍然没有成功。我缺乏理解,因此希望有人能推荐一些书籍或教程网站/视频来帮助我了解 ASA 政策。

问候,

克里斯

请查看以下我的配置:

Result of the command: "show running-config"

: Saved
:
ASA Version 8.2(5) 
!
hostname ciscoasa
names
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
 switchport access vlan 70
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.69.1 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
interface Vlan70
 no forward interface Vlan2
 nameif voice
 security-level 100
 ip address 192.168.70.1 255.255.255.0 
!
ftp mode passive
same-security-traffic permit inter-interface
access-list voice_nat0_outbound extended permit ip any 192.168.69.0 255.255.255.0 
access-list inside_nat0_outbound extended permit ip any 192.168.70.0 255.255.255.0 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu voice 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
nat (voice) 0 access-list voice_nat0_outbound
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.168.69.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh 192.168.69.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.69.5-192.168.69.254 inside
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous

: 结尾

答案1

您需要全局命令。使用 nat (iface) 命令,您可以指定哪些流量要发送到 PAT(NAT,但所有 IP 都转换为一个 IP),此 IP 使用匹配 nat ID 的全局(iface)命令配置:示例

nat(inside) 1 0.0.0.0 0.0.0.0
global(voice) 1 interface

对于从内部到语音的流量,来自内部接口的任何源 IP 都将通过 PAT 转换为语音接口 IP。也可以使用全局命令指定 IP 地址

您的语音 VLAN 接口应该具有其他安全级别,因为安全级别 0 用于外部接口,而 100 用于内部接口。配置 nat 和全局后,您可以从较高安全级别的接口访问较低安全级别的接口。如果您想从较低安全级别的接口访问较高安全级别的接口,则需要静态

并且您将需要允许/拒绝流量的访问列表,例如 icmp:

access-list acl-inside permit icmp any any
access-list acl-voice permit icmp any any
access-group acl-inside in int inside
access-group acl-voice in int voice

CLI 文档:http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/conf_gd.html

asdm 文档:http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/config.htm

相关内容