<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Nat or Firewall Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037777#M399782</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Karolos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, after checking the ACL's I could see the packets going out the inside interface to the server but no reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the ACL hits so you can troubleshoot that for the nex time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all of the answers, for the community that is as important as a thanks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Sep 2012 16:21:23 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-09-07T16:21:23Z</dc:date>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037771#M399776</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an issue with my 1841. I am trying to access an internal web server with the ip 192.168.0.253 from the internet but&lt;/P&gt;&lt;P&gt;connection gets refused.&lt;/P&gt;&lt;P&gt;I am not certain if its a nat issue or a firewall issue.&lt;/P&gt;&lt;P&gt;Can anyone provide me with some issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching part of the confuguration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Dialer1&lt;/P&gt;&lt;P&gt; mtu 1492&lt;/P&gt;&lt;P&gt; ip address negotiated&lt;/P&gt;&lt;P&gt; ip access-group ADSL_Firewall in&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; dialer pool 1&lt;/P&gt;&lt;P&gt; ipv6 traffic-filter ADSL_Firewall_v6 in&lt;/P&gt;&lt;P&gt; ppp authentication chap pap callin&lt;/P&gt;&lt;P&gt; ppp chap hostname kkouts&lt;/P&gt;&lt;P&gt; ppp chap password 7 000816010B095B5656&lt;/P&gt;&lt;P&gt; ppp pap sent-username kkouts password 7 10420C1E0A45425B55&lt;/P&gt;&lt;P&gt; ppp ipcp dns request accept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer11&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 192.168.0.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt; ipv6 address 2001:470:1F13:DA5::1/64&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dns server&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.253 80 interface Dialer1 80&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 192.168.0.1 60000 interface Dialer1 60000&lt;/P&gt;&lt;P&gt;ip nat inside source route-map NAT_DIALER interface Dialer1 overload&lt;/P&gt;&lt;P&gt;ip nat inside source route-map NAT_MIKROTIK interface FastEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip default-network 91.132.1.0&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer1&lt;/P&gt;&lt;P&gt;ip route 10.0.0.0 255.0.0.0 10.2.101.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended ADSL_Firewall&lt;/P&gt;&lt;P&gt; permit udp any host 91.132.216.248 eq domain&lt;/P&gt;&lt;P&gt; permit tcp any host 91.132.216.248 eq www log&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 15.255.255.255 any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; udp any any eq snmp&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.0.255.255 any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; tcp any any lt 1024&lt;/P&gt;&lt;P&gt; permit gre any any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; udp any any lt 1024&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;ip access-list extended Telnet_VTY&lt;/P&gt;&lt;P&gt; permit tcp 192.168.0.0 0.0.0.255 any eq 22&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging esm config&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.0.0 0.0.0.255&lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map NAT_MIKROTIK permit 10&lt;/P&gt;&lt;P&gt; match ip address 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map NAT_DIALER permit 10&lt;/P&gt;&lt;P&gt; match ip address 1&lt;/P&gt;&lt;P&gt; match interface Dialer1&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037771#M399776</guid>
      <dc:creator>nemiath76</dc:creator>
      <dc:date>2019-03-11T23:50:31Z</dc:date>
    </item>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037772#M399777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Karolos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would guess&amp;nbsp; 91.132.216.248 is interface dialer1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do a show access-list ADSL_Firewall &lt;/P&gt;&lt;P&gt;Do you see any hits on the ACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 19:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037772#M399777</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-05T19:09:06Z</dc:date>
    </item>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037773#M399778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is what i get ..&lt;/P&gt;&lt;P&gt;As you can see there are matches to the first rule which is the correct one.&lt;/P&gt;&lt;P&gt;I verified that the matches increment when i reload the page of an outside&amp;nbsp; internet connected device.&lt;/P&gt;&lt;P&gt;Does this mean its a routing / nat issue? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10 permit tcp any host 91.132.216.248 eq www (86 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit udp any host 91.132.216.248 eq domain&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 deny ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80 deny ip 224.0.0.0 15.255.255.255 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90 deny udp any any eq snmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100 deny ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110 deny ip 172.16.0.0 0.0.255.255 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 120 deny ip 10.0.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 130 deny tcp any any lt 1024 (17 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 140 permit gre any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 146 permit ip any any (3350 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 150 deny udp any any lt 1024 (5 matches)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 19:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037773#M399778</guid>
      <dc:creator>nemiath76</dc:creator>
      <dc:date>2012-09-06T19:27:31Z</dc:date>
    </item>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037774#M399779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Karolos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It means that the router is doing it's job so it could be a Server issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to make sure this is the case lets do a capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended to_server-in &lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.0.253 eq 80&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended server_to_out&lt;/P&gt;&lt;P&gt;permit tcp host 192.168.0.253 eq 80 any&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt;ip access-group to_server-in&amp;nbsp; out&lt;/P&gt;&lt;P&gt;ip access-group server_to_out in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then attemtp to connect and provide me the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-list to_server-in&lt;/P&gt;&lt;P&gt;show access-list server_to_out &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all the helpful posts, that is as important as a thanks&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 19:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037774#M399779</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-06T19:34:00Z</dc:date>
    </item>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037775#M399780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again for your valuable assistance... below is the output of the show access-list in and out directives after modifying the config as you requested. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aeon#show access-lists to_server_in&lt;/P&gt;&lt;P&gt;Extended IP access list to_server_in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp any host 192.168.0.253 eq www (3 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any (168 matches)&lt;/P&gt;&lt;P&gt;Aeon#show access-lists to_server_out&lt;/P&gt;&lt;P&gt;Extended IP access list to_server_out&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp host 192.168.0.253 eq www any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any (464 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also a trace from my workstation. (web server has also established and tested connectivity to the web).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translating "www.in.gr"...domain server (91.132.4.4) [OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Tracing the route to &lt;A href="https://community.cisco.com/www.in.gr" target="_blank"&gt;www.in.gr&lt;/A&gt; (212.205.159.143)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp; *&amp;nbsp; *&amp;nbsp; * &lt;/P&gt;&lt;P&gt;&amp;nbsp; 2 91.132.2.122 36 msec 32 msec 32 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp; 3 otenet.gr-ix.gr (83.212.8.4) 32 msec 32 msec 32 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp; 4 athe-crsa-athe7609k1-1.backbone.otenet.net (79.128.227.17) 32 msec 36 msec 32 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp; 5 nyma-crsa-athe-crsa-1.backbone.otenet.net (79.128.224.34) 36 msec 36 msec 36 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp; 6 maro7609b-nyma-crsa-1.backbone.otenet.net (79.128.226.38) 32 msec 32 msec 32 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp; 7 79.128.252.222 32 msec 32 msec 32 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp; 8 79.128.252.222 !A&amp;nbsp; *&amp;nbsp; * &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2012 11:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037775#M399780</guid>
      <dc:creator>nemiath76</dc:creator>
      <dc:date>2012-09-07T11:33:11Z</dc:date>
    </item>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037776#M399781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You where correct. It was a server issue. The server is a NAS device. After serching the security features i found that there was an allow only 192.168.0.0/24 option in the connection settings thus preventing any connection comming from outside the router to be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your guidance and efford again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2012 11:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037776#M399781</guid>
      <dc:creator>nemiath76</dc:creator>
      <dc:date>2012-09-07T11:40:22Z</dc:date>
    </item>
    <item>
      <title>Cisco Nat or Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037777#M399782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Karolos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, after checking the ACL's I could see the packets going out the inside interface to the server but no reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the ACL hits so you can troubleshoot that for the nex time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all of the answers, for the community that is as important as a thanks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2012 16:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-nat-or-firewall-issue/m-p/2037777#M399782</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-07T16:21:23Z</dc:date>
    </item>
  </channel>
</rss>

