Здравствуйте!На днях пришлось конфигурировать cisco ASA 5550 (8.3), и возникла следующая проблема:
имеются две подсети:
1. 192.168.0.0/24
2. 172.16.0.0/19Пинг проходит только в одну сторону, т.е. от 192.168.0.0/24 к 172.16.0.0/19 - пингуется, а вот от 172.16.0.0/19 к 192.168.0.0/24 - не пингуется.
Рисунок, чтобы понятнее было:
http://imageshack.us/photo/my-images/809/microsoftvisio2.png/Просьба помочь!
Заранее спасибо!
КонфигASA Version 8.3(1)
!
hostname LOCAL-Back
!
interface GigabitEthernet0/1
description con-to-xxx
nameif outside
security-level 0
ip address 172.16.0.1 255.255.224.0
!
interface GigabitEthernet1/1
nameif inside
security-level 0
ip address 192.168.0.1 255.255.255.0
!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list icmp extended permit icmp any any echo
access-list icmp extended permit icmp any any echo-reply
access-list icmp extended permit icmp any any traceroute
access-list icmp extended permit icmp any any time-exceeded
mtu outside 1500
mtu management 1500
mtu local-to-inet 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any local-to-inet
icmp permit any inside
access-group icmp global
!
dynamic-access-policy-record DfltAccessPolicy
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:933dc2de63d7965d08f4cd4003dd69c2
: end
sh ver
Hardware: ASA5550, 4096 MB RAM, CPU Pentium 4 3000 MHz
Internal ATA Compact Flash, 256MB
BIOS Flash M50FW016 @ 0xfff00000, 2048KBEncryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)
Boot microcode : CN1000-MC-BOOT-2.00
SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03
IPSec microcode : CNlite-MC-IPSECm-MAIN-2.06
0: Ext: GigabitEthernet0/0 : address is c84c.7576.cb50, irq 9
1: Ext: GigabitEthernet0/1 : address is c84c.7576.cb51, irq 9
2: Ext: GigabitEthernet0/2 : address is c84c.7576.cb52, irq 9
3: Ext: GigabitEthernet0/3 : address is c84c.7576.cb53, irq 9
4: Ext: Management0/0 : address is c84c.7576.cb54, irq 11
5: Int: Internal-Data0/0 : address is 0000.0001.0002, irq 11
6: Int: Not used : irq 5
7: Ext: GigabitEthernet1/0 : address is c84c.7576.d6f8, irq 255
8: Ext: GigabitEthernet1/1 : address is c84c.7576.d6f9, irq 255
9: Ext: GigabitEthernet1/2 : address is c84c.7576.d6fa, irq 255
10: Ext: GigabitEthernet1/3 : address is c84c.7576.d6fb, irq 255
11: Int: Internal-Data1/0 : address is 0000.0003.0002, irq 255Licensed features for this platform:
Maximum Physical Interfaces : Unlimited perpetual
Maximum VLANs : 250 perpetual
Inside Hosts : Unlimited perpetual
Failover : Active/Active perpetual
VPN-DES : Enabled perpetual
VPN-3DES-AES : Disabled perpetual
Security Contexts : 2 perpetual
GTP/GPRS : Disabled perpetual
SSL VPN Peers : 2 perpetual
Total VPN Peers : 5000 perpetual
Shared License : Disabled perpetual
AnyConnect for Mobile : Disabled perpetual
AnyConnect for Cisco VPN Phone : Disabled perpetual
AnyConnect Essentials : Disabled perpetual
Advanced Endpoint Assessment : Disabled perpetual
UC Phone Proxy Sessions : 2 perpetual
Total UC Proxy Sessions : 2 perpetual
Botnet Traffic Filter : Disabled perpetual
Intercompany Media Engine : Disabled perpetualThis platform has an ASA 5550 VPN Premium license.
Serial Number: JMX1433L28Z
Running Permanent Activation Key: 0x9208cb49 0x18e0e564 0x78122d30 0x9570cc24 0x
8d2a3196
Configuration register is 0x1
Configuration last modified by enable_15 at 06:12:28.419 UTC Mon Jun 27 2011
а чё хотите то?? чтобы пинговалось или чё ?
Да, необходимо чтобы пинг ходил в обе стороны
Тема неактуальна, проблема решена.
Для начала:
в class inspection_default добавить:
inspect icmpЗатем по необходимости:
same-security-traffic permit inter-interface
После этого трафик между интерфейсами с одинаковым секьюрити левел - пойдет в обе стороны.
Без инстпекции вообще.PS
А главное конечно разобраться, что хотите. И почитать мануал - что бы понять базовые принципы работы.