<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Open Port range on secondary IPs on Router interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154339#M356646</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can either configure access-list and apply that on the WAN interface, and you would also need "ip inspect" on the outbound direction on the WAN interface. Plus of course the static NAT above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, alternatively, you can configure static PAT for each of the ports:&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 80 50.200.2.3 80&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 81 50.200.2.3 81&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 82 50.200.2.3 82&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 90 50.200.2.3 90&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Feb 2013 00:31:39 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2013-02-15T00:31:39Z</dc:date>
    <item>
      <title>Open Port range on secondary IPs on Router interface</title>
      <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154336#M356641</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have 4 public IPs on Router 3845 interface FastEthernet 0/0/1. IP as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;50.200.2.2&lt;/P&gt;&lt;P&gt;50.200.2.3 secondary&lt;/P&gt;&lt;P&gt;50.200.2.4 &lt;SPAN style="font-size: 10pt;"&gt;secondary&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;50.200.2.5 &lt;SPAN style="font-size: 10pt;"&gt;secondary&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wan to allow ports 80 to 90 on 50.200.2.3 for my webserver (192.168.10.50) please help in this regards.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154336#M356641</guid>
      <dc:creator>qasimkhans</dc:creator>
      <dc:date>2019-03-12T01:00:33Z</dc:date>
    </item>
    <item>
      <title>Open Port range on secondary IPs on Router interface</title>
      <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154337#M356643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Instead of configuring the spare public ip address as a secondary IP on the interface, you should be using that as a spare IP for your NATing purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case, please remove them as the secondary IP, and configure NAT as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.10.50 50.200.2.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would then need to configure "ip nat inside" on your lan interface, and "ip nat outside" on fa0/0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can use the other 2 spare public IP for NATing to other servers if required.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 14:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154337#M356643</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-02-14T14:19:11Z</dc:date>
    </item>
    <item>
      <title>Open Port range on secondary IPs on Router interface</title>
      <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154338#M356645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only want to open 80 to 90 ports for incoming traffic on &lt;SPAN style="font-size: 10pt;"&gt;50.200.2.3. can you tell me how i can do this.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 14:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154338#M356645</guid>
      <dc:creator>qasimkhans</dc:creator>
      <dc:date>2013-02-14T14:36:05Z</dc:date>
    </item>
    <item>
      <title>Open Port range on secondary IPs on Router interface</title>
      <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154339#M356646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can either configure access-list and apply that on the WAN interface, and you would also need "ip inspect" on the outbound direction on the WAN interface. Plus of course the static NAT above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, alternatively, you can configure static PAT for each of the ports:&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 80 50.200.2.3 80&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 81 50.200.2.3 81&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 82 50.200.2.3 82&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.50 90 50.200.2.3 90&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2013 00:31:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154339#M356646</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-02-15T00:31:39Z</dc:date>
    </item>
    <item>
      <title>Open Port range on secondary IPs on Router interface</title>
      <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154340#M356647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will following ACL work? if yes, then how i will use&lt;SPAN style="font-size: 10pt;"&gt; 50.200.2.3 for incoming traffic?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)#&lt;SPAN style="font-size: 10pt;"&gt;ip access-list extended acl_inbound&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;(config)#&lt;SPAN style="font-size: 10pt;"&gt; permit tcp any host 192.168.10.50 range 80 90&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;(config-if)#ip access-group acl_inbound in&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2013 01:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154340#M356647</guid>
      <dc:creator>qasimkhans</dc:creator>
      <dc:date>2013-02-15T01:27:01Z</dc:date>
    </item>
    <item>
      <title>Open Port range on secondary IPs on Router interface</title>
      <link>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154341#M356648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACL should be as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended acl_inbound&lt;/P&gt;&lt;P&gt; permit tcp any host 50.200.2.3 range 80 90&lt;/P&gt;&lt;P&gt;int fa0/0/1&lt;/P&gt;&lt;P&gt; ip access-group acl_inbound in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the static NAT as follows:&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.10.50 50.200.2.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, you would need "ip inspect":&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect tcp&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect udp&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect icmp&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect bootpc&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect bootps&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect ftp&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect dns&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect http&lt;/P&gt;&lt;P&gt;ip inspect name fw-inspect https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fa0/0/1&lt;/P&gt;&lt;P&gt; ip inspect fw-inspect out&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2013 01:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port-range-on-secondary-ips-on-router-interface/m-p/2154341#M356648</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-02-15T01:31:03Z</dc:date>
    </item>
  </channel>
</rss>

