Having some fun setting up my new 1921 router. Currently, I've managed to get it up and running so that the dhcp server works and basic NAT for internet access works.
The configuration is as follows:
	
	
	
		
Access List is configured like so:
	
	
	
		
I'm not really experienced in the art of configuring a cisco IOS device so forgive the slightly daft questions I may ask.
The problem I've run into regards static NAT/PAT. As it stands, I understand that since my public IP is dynamic i will need to specify the interface dialer1 rather than the WAN IP as the external source. On the internal side I assume that for specific machines with fixed addresses I can simply list that ip address. i.e. if i want my server to have FTP and SSH access I'd put:
	
	
	
		
The same would apply for SSH using port 22 instead of 21 going to the same server address.
For steam or similar software that any machine may need access to, I'm not sure if it is possible to do interface to interface nat. I assume the only way to get it to allow the ports is to just open them in the ACL like so:
	
	
	
		
or more specific (not sure on wildcard):
	
	
	
		
	
		
			
		
		
	
				
			The configuration is as follows:
		Code:
	
	Cisco-1921#show startup-config
Using 3630 out of 262136 bytes
!
! Last configuration change at 22:41:23 UTC Sat Nov 8 2014
version 15.2
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Cisco-1921
!
boot-start-marker
warm-reboot
boot-end-marker
!
!
enable secret 5 .
enable password 7 
!
no aaa new-model
!
ip cef
!
!
!
ip dhcp excluded-address 192.168.0.1
ip dhcp excluded-address 192.168.0.50 192.168.0.51
!
ip dhcp pool main_dhcp_pool
 network 192.168.0.0 255.255.255.0
 default-router 192.168.0.1 
 dns-server 194.72.0.114 213.120.234.46 8.8.8.8 
!
ip dhcp pool Kei-PC
 host 192.168.0.2 255.255.255.0
 client-identifier 01bc.ee7b.98e8.1e
 client-name Kei-PC
!
ip dhcp pool Humax
 host 192.168.0.4 255.255.255.0
 client-identifier 01dc.d321.8169.a2
 client-name Humax
!
ip dhcp pool Kei-NAS
 host 192.168.0.3 255.255.255.0
 hardware-address 0024.1d7d.1ef9
 client-name Kei-NAS
!
!
!
ip domain name WesNet
ip name-server 8.8.8.8
ip name-server 194.72.0.114
no ipv6 cef
multilink bundle-name authenticated
!
!
!
license udi pid CISCO1921/K9 sn FCZ1810C0V2
!
!
!
!         
!         
!         
!         
!         
interface Embedded-Service-Engine0/0
 no ip address
 shutdown 
!         
interface GigabitEthernet0/0
 no ip address
 ip tcp adjust-mss 1452
 duplex auto
 speed auto
 pppoe enable group global
 pppoe-client dial-pool-number 1
!         
interface GigabitEthernet0/1
 ip address 192.168.0.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly in
 ip tcp adjust-mss 1350
 duplex auto
 speed auto
 no mop enabled
!         
interface Dialer1
 ip address negotiated
 ip access-group 101 in
 no ip unreachables
 ip mtu 1492
 ip nat outside
 ip virtual-reassembly in
 encapsulation ppp
 dialer pool 1
 ppp chap hostname [email protected]
 ppp chap password 7 1415060303092F23312A1337361115190205545856571A0D0C15
 ppp pap sent-username [email protected] password 7 0111120C54060307344E6E0B0D07051D0A08062B252066303A2F
!         
ip forward-protocol nd
!         
ip http server
no ip http secure-server
!         
ip nat inside source list 1 interface Dialer1 overload
ip route 0.0.0.0 0.0.0.0 Dialer1
ip route 192.168.0.0 255.255.255.0 GigabitEthernet0/1
!         
access-list 1 remark INTERNET-ACCESS
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 101 deny   ip 192.168.0.0 0.0.255.255 any
access-list 101 deny   ip 172.16.0.0 0.15.255.255 any
access-list 101 deny   ip 10.0.0.0 0.255.255.255 any
access-list 101 deny   ip 127.0.0.0 0.255.255.255 any
access-list 101 deny   ip 255.0.0.0 0.255.255.255 any
access-list 101 deny   ip 248.0.0.0 7.255.255.255 any
access-list 101 deny   ip host 0.0.0.0 any
access-list 101 deny   ip host 255.255.255.255 any
access-list 101 deny   udp any any range 33400 34400
access-list 101 permit icmp any any net-unreachable
access-list 101 permit icmp any any host-unreachable
access-list 101 permit icmp any any port-unreachable
access-list 101 permit icmp any any packet-too-big
access-list 101 permit icmp any any administratively-prohibited
access-list 101 permit icmp any any source-quench
access-list 101 permit icmp any any ttl-exceeded
access-list 101 permit icmp any any echo-reply
access-list 101 permit tcp any any established
access-list 101 permit udp any any
!         
!         
snmp-server community WesNet RO
snmp-server enable traps entity-sensor threshold
!         
control-plane
!         
!         
!         
line con 0
line aux 0
line 2    
 no activation-character
 no exec  
 transport preferred none
 transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
 stopbits 1
line vty 0 4
 password 7 
 login    
 transport input all
!         
scheduler allocate 20000 1000
!         
endAccess List is configured like so:
		Code:
	
	Standard IP access list 1
    10 permit 192.168.0.0, wildcard bits 0.0.0.255 (44947 matches)
Extended IP access list 101
    10 deny ip 192.168.0.0 0.0.255.255 any
    20 deny ip 172.16.0.0 0.15.255.255 any
    30 deny ip 10.0.0.0 0.255.255.255 any
    40 deny ip 127.0.0.0 0.255.255.255 any
    50 deny ip 255.0.0.0 0.255.255.255 any
    60 deny ip 248.0.0.0 7.255.255.255 any
    70 deny ip host 0.0.0.0 any (766 matches)
    80 deny ip host 255.255.255.255 any
    90 deny udp any any range 33400 34400 (581 matches)
    100 permit icmp any any net-unreachable
    110 permit icmp any any host-unreachable (1 match)
    120 permit icmp any any port-unreachable (40 matches)
    130 permit icmp any any packet-too-big
    140 permit icmp any any administratively-prohibited (1 match)
    150 permit icmp any any source-quench
    160 permit icmp any any ttl-exceeded (3 matches)
    170 permit icmp any any echo-reply
    180 permit tcp any any established (7603709 matches)
    190 permit udp any any (29002 matches)I'm not really experienced in the art of configuring a cisco IOS device so forgive the slightly daft questions I may ask.
The problem I've run into regards static NAT/PAT. As it stands, I understand that since my public IP is dynamic i will need to specify the interface dialer1 rather than the WAN IP as the external source. On the internal side I assume that for specific machines with fixed addresses I can simply list that ip address. i.e. if i want my server to have FTP and SSH access I'd put:
		Code:
	
	ip nat inside source static tcp 192.168.0.3 21 interface Dialer1 21
ip nat inside source static tcp 192.168.0.3 22 interface Dialer1 22The same would apply for SSH using port 22 instead of 21 going to the same server address.
For steam or similar software that any machine may need access to, I'm not sure if it is possible to do interface to interface nat. I assume the only way to get it to allow the ports is to just open them in the ACL like so:
		Code:
	
	access-list 101 permit tcp any eq 21or more specific (not sure on wildcard):
		Code:
	
	access-list 101 permit tcp any range 21 22 192.168.0.3
			
				Last edited: 
			
		
	
								
								
									
	
		
			
		
		
	
	
	
		
			
		
		
	
								
							
							 
	 
  
 
		 
 
		
