WilliamTai wrote:這是過去對設定PortForward的一點心得,與Nat Loopback有關.
add chain...(恕刪)
相信您會需要!!
http://www.mobile01.com/topicdetail.php?f=110&t=4351800&p=1#55418869
WilliamTai wrote:這是過去對設定PortForward的一點心得,與Nat Loopback有關.
add chain...(恕刪)
AKSN74 wrote:
但自從那樣以後 只要有IP配發到192.168.12.4這組 就會無法上網
我自己將設定看了看 也沒有異狀 但就是無法上網
/ip arp
add address=192.168.12.4 interface=Bridge-Lan mac-address=C8:60:00:17:F3:78
/ip dhcp-server lease
add address=192.168.12.4 client-id=1:50:2e:5c:e7:6f:28 mac-address=50:2E:5C:E7:6F:28 server=default
#Interface
set interface st0 unit 6 family inet
#IKE Phase1
set security ike proposal ike-proposal-A6 authentication-method pre-shared-keys
set security ike proposal ike-proposal-A6 dh-group group2
set security ike proposal ike-proposal-A6 authentication-algorithm md5
set security ike proposal ike-proposal-A6 encryption-algorithm 3des-cbc
set security ike proposal ike-proposal-A6 lifetime-seconds 28800
set security ike policy ike-policy-A6 mode main
set security ike policy ike-policy-A6 proposals ike-proposal-A6
set security ike policy ike-policy-A6 pre-shared-key ascii-text "Pre-Shared-Key"
set security ike gateway ike-gate-A6 ike-policy ike-policy-A6
set security ike gateway ike-gate-A6 address [Peer WAN IP]
set security ike gateway ike-gate-A6 no-nat-traversal
set security ike gateway ike-gate-A6 local-identity inet [Local WAN IP]
set security ike gateway ike-gate-A6 external-interface ge-0/0/0
#IPSec Phase2
set security ipsec proposal ipsec-proposal-A6 protocol esp
set security ipsec proposal ipsec-proposal-A6 authentication-algorithm hmac-md5-96
set security ipsec proposal ipsec-proposal-A6 encryption-algorithm 3des-cbc
set security ipsec proposal ipsec-proposal-A6 lifetime-seconds 3600
set security ipsec policy ipsec-policy-A6 perfect-forward-secrecy keys group2
set security ipsec policy ipsec-policy-A6 proposals ipsec-proposal-A6
set security ipsec vpn ipsec-vpn-A6 bind-interface st0.6
set security ipsec vpn ipsec-vpn-A6 ike gateway ike-gate-A6
set security ipsec vpn ipsec-vpn-A6 ike proxy-identity local 172.31.32.0/19
set security ipsec vpn ipsec-vpn-A6 ike proxy-identity remote 192.168.88.0/24
set security ipsec vpn ipsec-vpn-A6 ike proxy-identity service any
set security ipsec vpn ipsec-vpn-A6 ike ipsec-policy ipsec-policy-A6
set security ipsec vpn ipsec-vpn-A6 establish-tunnels immediately
set security flow tcp-mss all-tcp mss 1400
set security flow tcp-mss ipsec-vpn mss 1350
#Routing
set routing-options static route 192.168.88.0/24 next-hop st0.6
/ip ipsec policy group
add name=HM-SRX
/ip ipsec proposal
add auth-algorithms=md5 enc-algorithms=3des lifetime=1h name=Hauman-SRX-Phase2
/ip ipsec peer
add address=[Peer WAN IP]/32 dpd-interval=disable-dpd enc-algorithm=3des \
hash-algorithm=md5 lifetime=8h local-address=[Local WAN IP] nat-traversal=no \
policy-template-group=HM-SRX secret=Pre-Shared-Key
/ip ipsec policy
add dst-address=172.31.32.0/19 priority=1 proposal=Hauman-SRX-Phase2 sa-dst-address=\
[Peer WAN IP] sa-src-address=[Local WAN IP] src-address=192.168.88.0/24 tunnel=yes
/ip firewall nat
add chain=srcnat dst-address=172.31.32.0/19 log=yes out-interface=HiNet-VDSL1 \
src-address=192.168.88.0/24 place-before=0