Having some fun setting up my new 1921 router. Currently, I've managed to get it up and running so that the dhcp server works and basic NAT for internet access works.
The configuration is as follows:
Access List is configured like so:
I'm not really experienced in the art of configuring a cisco IOS device so forgive the slightly daft questions I may ask.
The problem I've run into regards static NAT/PAT. As it stands, I understand that since my public IP is dynamic i will need to specify the interface dialer1 rather than the WAN IP as the external source. On the internal side I assume that for specific machines with fixed addresses I can simply list that ip address. i.e. if i want my server to have FTP and SSH access I'd put:
The same would apply for SSH using port 22 instead of 21 going to the same server address.
For steam or similar software that any machine may need access to, I'm not sure if it is possible to do interface to interface nat. I assume the only way to get it to allow the ports is to just open them in the ACL like so:
or more specific (not sure on wildcard):
The configuration is as follows:
Code:
Cisco-1921#show startup-config
Using 3630 out of 262136 bytes
!
! Last configuration change at 22:41:23 UTC Sat Nov 8 2014
version 15.2
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Cisco-1921
!
boot-start-marker
warm-reboot
boot-end-marker
!
!
enable secret 5 .
enable password 7
!
no aaa new-model
!
ip cef
!
!
!
ip dhcp excluded-address 192.168.0.1
ip dhcp excluded-address 192.168.0.50 192.168.0.51
!
ip dhcp pool main_dhcp_pool
network 192.168.0.0 255.255.255.0
default-router 192.168.0.1
dns-server 194.72.0.114 213.120.234.46 8.8.8.8
!
ip dhcp pool Kei-PC
host 192.168.0.2 255.255.255.0
client-identifier 01bc.ee7b.98e8.1e
client-name Kei-PC
!
ip dhcp pool Humax
host 192.168.0.4 255.255.255.0
client-identifier 01dc.d321.8169.a2
client-name Humax
!
ip dhcp pool Kei-NAS
host 192.168.0.3 255.255.255.0
hardware-address 0024.1d7d.1ef9
client-name Kei-NAS
!
!
!
ip domain name WesNet
ip name-server 8.8.8.8
ip name-server 194.72.0.114
no ipv6 cef
multilink bundle-name authenticated
!
!
!
license udi pid CISCO1921/K9 sn FCZ1810C0V2
!
!
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
ip tcp adjust-mss 1452
duplex auto
speed auto
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface GigabitEthernet0/1
ip address 192.168.0.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1350
duplex auto
speed auto
no mop enabled
!
interface Dialer1
ip address negotiated
ip access-group 101 in
no ip unreachables
ip mtu 1492
ip nat outside
ip virtual-reassembly in
encapsulation ppp
dialer pool 1
ppp chap hostname [email protected]
ppp chap password 7 1415060303092F23312A1337361115190205545856571A0D0C15
ppp pap sent-username [email protected] password 7 0111120C54060307344E6E0B0D07051D0A08062B252066303A2F
!
ip forward-protocol nd
!
ip http server
no ip http secure-server
!
ip nat inside source list 1 interface Dialer1 overload
ip route 0.0.0.0 0.0.0.0 Dialer1
ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1
!
access-list 1 remark INTERNET-ACCESS
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 255.0.0.0 0.255.255.255 any
access-list 101 deny ip 248.0.0.0 7.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny udp any any range 33400 34400
access-list 101 permit icmp any any net-unreachable
access-list 101 permit icmp any any host-unreachable
access-list 101 permit icmp any any port-unreachable
access-list 101 permit icmp any any packet-too-big
access-list 101 permit icmp any any administratively-prohibited
access-list 101 permit icmp any any source-quench
access-list 101 permit icmp any any ttl-exceeded
access-list 101 permit icmp any any echo-reply
access-list 101 permit tcp any any established
access-list 101 permit udp any any
!
!
snmp-server community WesNet RO
snmp-server enable traps entity-sensor threshold
!
control-plane
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
password 7
login
transport input all
!
scheduler allocate 20000 1000
!
end
Access List is configured like so:
Code:
Standard IP access list 1
10 permit 192.168.0.0, wildcard bits 0.0.0.255 (44947 matches)
Extended IP access list 101
10 deny ip 192.168.0.0 0.0.255.255 any
20 deny ip 172.16.0.0 0.15.255.255 any
30 deny ip 10.0.0.0 0.255.255.255 any
40 deny ip 127.0.0.0 0.255.255.255 any
50 deny ip 255.0.0.0 0.255.255.255 any
60 deny ip 248.0.0.0 7.255.255.255 any
70 deny ip host 0.0.0.0 any (766 matches)
80 deny ip host 255.255.255.255 any
90 deny udp any any range 33400 34400 (581 matches)
100 permit icmp any any net-unreachable
110 permit icmp any any host-unreachable (1 match)
120 permit icmp any any port-unreachable (40 matches)
130 permit icmp any any packet-too-big
140 permit icmp any any administratively-prohibited (1 match)
150 permit icmp any any source-quench
160 permit icmp any any ttl-exceeded (3 matches)
170 permit icmp any any echo-reply
180 permit tcp any any established (7603709 matches)
190 permit udp any any (29002 matches)
I'm not really experienced in the art of configuring a cisco IOS device so forgive the slightly daft questions I may ask.
The problem I've run into regards static NAT/PAT. As it stands, I understand that since my public IP is dynamic i will need to specify the interface dialer1 rather than the WAN IP as the external source. On the internal side I assume that for specific machines with fixed addresses I can simply list that ip address. i.e. if i want my server to have FTP and SSH access I'd put:
Code:
ip nat inside source static tcp 192.168.0.3 21 interface Dialer1 21
ip nat inside source static tcp 192.168.0.3 22 interface Dialer1 22
The same would apply for SSH using port 22 instead of 21 going to the same server address.
For steam or similar software that any machine may need access to, I'm not sure if it is possible to do interface to interface nat. I assume the only way to get it to allow the ports is to just open them in the ACL like so:
Code:
access-list 101 permit tcp any eq 21
or more specific (not sure on wildcard):
Code:
access-list 101 permit tcp any range 21 22 192.168.0.3
Last edited: