我在不同安全级别的不同 DMZ 之间测试流量转发。
非军事区:
interface GigabitEthernet0/1.351
vlan 351
nameif dmz
security-level 10
ip address 10.100.20.1 255.255.255.0
DMZ810:
interface GigabitEthernet1/2.810
vlan 810
nameif dmz810
security-level 50
ip address 172.29.12.33 255.255.255.248
使用数据包跟踪器进行测试:
asa-5550-edge# packet-tracer input dmz810 tcp 172.29.12.34 587 10.100.20.50 587 detail
Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 10.100.20.0 255.255.255.0 dmz
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x2bf97148, priority=11, domain=permit, deny=true
hits=79960, user_data=0x5, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=dmz810, output_ifc=any
Result:
input-interface: dmz810
input-status: up
input-line-status: up
output-interface: dmz
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
但是接口dmz810比接口dmz更高。dmz810 ACL 中的规则没有帮助。
是什么原因?