exit: add routes for internal IPv4 addresses to outside VRF

Routed through and mostly dropped by the firewall, of course. So we
don’t necessarily have to do NAT for everything that comes from the
old / USI network.
This commit is contained in:
Timotej Lazar 2024-08-13 19:02:03 +02:00
parent fe8f9161d9
commit 7b5980f871
2 changed files with 5 additions and 2 deletions

View file

@ -358,6 +358,8 @@ route-map firewall->outside permit 1
match ip address prefix-list fabric match ip address prefix-list fabric
route-map firewall->outside permit 2 route-map firewall->outside permit 2
match ipv6 address prefix-list fabric match ipv6 address prefix-list fabric
route-map firewall->outside permit 20
match ip address prefix-list office
route-map firewall->outside permit 21 route-map firewall->outside permit 21
match ipv6 address prefix-list office match ipv6 address prefix-list office
route-map firewall->outside permit 30 route-map firewall->outside permit 30

View file

@ -136,10 +136,11 @@ route-map outside->default permit 10
route-map outside->default permit 11 route-map outside->default permit 11
match ipv6 address prefix-list default match ipv6 address prefix-list default
# Send IPv6 office addresses and IPv4 NAT addresses to outside peers # Send inside and NAT addresses to outside peers so inbound packets go through the firewall.
# so inbound packets go through the firewall.
route-map default->outside permit 1 route-map default->outside permit 1
match interface lo match interface lo
route-map default->outside permit 10
match ip address prefix-list office
route-map default->outside permit 11 route-map default->outside permit 11
match ipv6 address prefix-list office match ipv6 address prefix-list office
route-map default->outside permit 20 route-map default->outside permit 20