exit: add routes for internal IPv4 addresses to outside VRF
Routed through and mostly dropped by the firewall, of course. So we don’t necessarily have to do NAT for everything that comes from the old / USI network.
This commit is contained in:
parent
fe8f9161d9
commit
7b5980f871
|
@ -358,6 +358,8 @@ route-map firewall->outside permit 1
|
||||||
match ip address prefix-list fabric
|
match ip address prefix-list fabric
|
||||||
route-map firewall->outside permit 2
|
route-map firewall->outside permit 2
|
||||||
match ipv6 address prefix-list fabric
|
match ipv6 address prefix-list fabric
|
||||||
|
route-map firewall->outside permit 20
|
||||||
|
match ip address prefix-list office
|
||||||
route-map firewall->outside permit 21
|
route-map firewall->outside permit 21
|
||||||
match ipv6 address prefix-list office
|
match ipv6 address prefix-list office
|
||||||
route-map firewall->outside permit 30
|
route-map firewall->outside permit 30
|
||||||
|
|
|
@ -136,10 +136,11 @@ route-map outside->default permit 10
|
||||||
route-map outside->default permit 11
|
route-map outside->default permit 11
|
||||||
match ipv6 address prefix-list default
|
match ipv6 address prefix-list default
|
||||||
|
|
||||||
# Send IPv6 office addresses and IPv4 NAT addresses to outside peers
|
# Send inside and NAT addresses to outside peers so inbound packets go through the firewall.
|
||||||
# so inbound packets go through the firewall.
|
|
||||||
route-map default->outside permit 1
|
route-map default->outside permit 1
|
||||||
match interface lo
|
match interface lo
|
||||||
|
route-map default->outside permit 10
|
||||||
|
match ip address prefix-list office
|
||||||
route-map default->outside permit 11
|
route-map default->outside permit 11
|
||||||
match ipv6 address prefix-list office
|
match ipv6 address prefix-list office
|
||||||
route-map default->outside permit 20
|
route-map default->outside permit 20
|
||||||
|
|
Loading…
Reference in a new issue