


Switch_1上配置keepalive检测功能后,Switch_1上GRE隧道协议down,Switch_2上GRE隧道协议仍可以up。
<Switch_1>display current-configuration interface Tunnel 1
#
interface Tunnel1
ip address 192.168.230.1 255.255.255.252
tunnel-protocol gre
keepalive
source 183.203.53.12
destination 183.203.48.197
#
<Switch_2>display current-configuration interface Tunnel 1
#
interface Tunnel1
ip address 192.168.230.2 255.255.255.252
tunnel-protocol gre
source 183.203.48.197
destination 183.203.53.12
#
[Switch_2]display current-configuration interface Eth-Trunk1
#
interface Eth-Trunk1
description TO-PC/MB-eth-trunk-3*10G
port link-type access
port default vlan 1000
traffic-policy ABC inbound
mode lacp
#
[Switch_2]display traffic policy user-defined
User Defined Traffic Policy Information:
Policy: ABC
Classifier: guolv
Operator: OR
Behavior: guolv
Permit
Total policy number is 1
[Switch_2]display traffic classifier user-defined
User Defined Classifier Information:
Classifier: guolv
Precedence: 5
Operator: OR
Rule(s) : if-match acl 3001
Total classifier number is 1
[Switch_2]display acl 3001
Advanced ACL 3001, 18 rules
Acl's step is 5
rule 5 permit ip source 183.203.46.0 0.0.0.255 (match-counter 0)
rule 10 permit ip source 183.203.47.0 0.0.0.128 (match-counter 0)
rule 15 permit ip source 183.203.48.0 0.0.0.64 (match-counter 0)
rule 20 permit ip source 183.203.49.0 0.0.0.32 (match-counter 0)
rule 25 permit tcp source 183.203.52.0 0.0.0.255 (match-counter 0)
rule 30 permit tcp source 221.131.53.2 0 (match-counter 0)
rule 35 permit ip source 10.231.140.0 0.0.0.255 (match-counter 0)
rule 40 permit ip source 10.231.138.0 0.0.0.255 (match-counter 0)
rule 45 permit ip source 10.231.137.0 0.0.0.255 (match-counter 0)
rule 50 permit ip source 10.231.136.0 0.0.0.255 (match-counter 0)
rule 55 permit ip source 10.231.141.0 0.0.0.255 (match-counter 0)
rule 60 permit ip source 10.231.142.0 0.0.0.255 (match-counter 0)
rule 65 permit ip source 10.231.143.0 0.0.0.255 (match-counter 0)
rule 70 permit ip source 10.231.144.0 0.0.0.255 (match-counter 0)
rule 100 permit tcp destination-port eq www (match-counter 0)
rule 10000 permit tcp tcp-flag ack (match-counter 0)
rule 10001 permit tcp tcp-flag rst (match-counter 0)
rule 4294967294 deny ip (match-counter 0)
在Switch_2匹配ACL获取报文信息,可以看出Switch_1发送的keepalive报文如下:

报文到达Switch_2后,首先进行GRE解封装,去掉GRE头,内层的IP头的目的IP不是本机IP,于是会匹配traffic policy ABC,该报文会命中ACL3001的最后1个rule,报文被丢弃。Switch_1收不到回应的keepalive报文,GRE隧道down。
keepalive报文是不上送的,而是直接转发,因此重定向对keepalive报文是生效的。
修改重定向的ACL规则,使keepalive报文不被丢弃。
GRE隧道两端设备为SwitchA和SwitchB,SwitchA上配置keepalive后,SwitchA发送的keepalive报文在SwitchB上是不上送的,而是直接转发,到SwitchA后再上送。这点和普通的协议报文是不同的。
GRE的keepalive检测是单向的,不是双向的。
服务热线
1391-024-6332
Copyright 2015-2018 www.intsavi.com.cn All Rights Reserved
电话:010-62980070 010-62961051 手机:13910246332
版权所有北京赛维博信科技发展有限公司 备案号:京ICP备14043711号-1 京ICP备14043711号-3