12-01-2017 02:59 PM - edited 03-05-2019 09:34 AM
hy,
I have a Cisco 1800 with two wan :
wan1, powered by my fiber Box in FE0
and wan 2 powered by 4g Box in FE1.
In the LAN of my Fiber Box,
i have a Set top box and some computers.
In my Cisco,
i have 8 VLANS which communicate between them.
I would like that my set top box and one computeur plugged in my fiber box
can communicate with the cisco's VLANS.
Network of fiber Box : 192.168.1.0
@ip set top box : 192.168.1.11
@ip computeur : 192.168.1.100
@ ip wan1 : 192.168.1.254
@ip vlan1,2,3,4,5,6,7,8 : 192.168.2.254, 192.168.3.254 etc..... except vlan 6 : 10.1.1.254
Here my Cisco configuration
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname routeur-cisco1811
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
enable secret XXXXXXX/
!
aaa new-model
!
!
aaa authentication login default local
!
!
aaa session-id common
!
!
dot11 syslog
ip source-route
!
!
ip dhcp excluded-address 192.168.3.1
ip dhcp excluded-address 192.168.3.2 192.168.3.99
ip dhcp excluded-address 192.168.3.200 192.168.3.252
ip dhcp excluded-address 192.168.3.254
ip dhcp excluded-address 192.168.3.253
!
ip dhcp pool CASA_LAN
network 192.168.3.0 255.255.255.0
dns-server 8.8.8.8
default-router 192.168.3.254
!
!
ip cef
no ip domain lookup
ip domain name domoticity.com
ip name-server 8.8.8.8
ip name-server 8.8.4.4
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
username domoticity privilege 15 secret 5 XXXXXXXXX
!
!
!
archive
log config
hidekeys
!
!
crypto key generate rsa modulus 1024
!
ip ssh time-out 60
ip ssh logging events
ip ssh version 2
!
track 1 ip sla 1 reachability
!
track 2 ip sla 2 reachability
!
track 3 list boolean and
object 1
object 2
!
!
!
interface FastEthernet0
description Acces principal FTTH
ip address 192.168.1.254 255.255.255.0
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
no shutdown
!
interface FastEthernet1
description Acces secour 3/4G
ip address 10.0.0.254 255.255.255.0
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
no shutdown
!
interface FastEthernet2
switchport access vlan 2
no shutdown
!
interface FastEthernet3
switchport access vlan 3
no shutdown
!
interface FastEthernet4
switchport access vlan 4
no shutdown
!
interface FastEthernet5
switchport access vlan 5
no shutdown
!
interface FastEthernet6
switchport access vlan 6
no shutdown
!
interface FastEthernet7
switchport access vlan 7
no shutdown
!
interface FastEthernet8
switchport access vlan 8
no shutdown
!
interface Vlan1
no ip address
!
interface Vlan2
description domoticity
ip address 192.168.2.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
interface Vlan3
description casa and multimedia
ip address 192.168.3.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
interface Vlan4
description stock and print
ip address 192.168.4.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
interface Vlan5
description domotique and camera
ip address 192.168.5.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
interface Vlan6
description tower control
ip address 10.1.1.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
interface Vlan7
description Orange travail
ip address 192.168.7.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
interface Vlan8
description Phone
ip address 192.168.8.254 255.255.255.0
ip nat inside
ip virtual-reassembly
no shutdown
!
!
interface Async1
no ip address
encapsulation slip
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 3
ip route 0.0.0.0 0.0.0.0 10.0.0.1 10
no ip http server
no ip http secure-server
!
!
ip nat inside source route-map BACKUP_ISP interface FastEthernet1 overload
ip nat inside source route-map MAIN_ISP interface FastEthernet0 overload
!
ip sla 1
icmp-echo 192.168.1.1 source-ip 192.168.1.254
ip sla schedule 1 life forever start-time now
access-list 100 permit ip 192.168.2.0 0.0.0.255 any
access-list 100 permit ip 192.168.3.0 0.0.0.255 any
access-list 100 permit ip 192.168.4.0 0.0.0.255 any
access-list 100 permit ip 192.168.5.0 0.0.0.255 any
access-list 100 permit ip 192.168.8.0 0.0.0.255 any
access-list 100 permit ip 192.168.7.0 0.0.0.255 any
access-list 100 permit ip 10.1.1.0 0.0.0.255 any!
!
!
!
route-map BACKUP_ISP permit 10
match ip address 100
match interface FastEthernet1
!
route-map MAIN_ISP permit 10
match ip address 100
match interface FastEthernet0
!
!
!
control-plane
!
banner login ^C Acces restreint, avec identification !!!!^C
banner motd ^C
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@ @@
@@ @@
@@ ROUTEUR CISCO @@
@@ @@
@@ @@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@ @@
@@ @@
@@ Casa @@
@@ @@
@@ & @@
@@ @@
@@ Domoticity @@
@@ @@
@@ @@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@: domoticity@gmail.com
^C
!
line con 0
line 1
modem InOut
stopbits 1
speed 115200
flowcontrol hardware
line aux 0
line vty 0 4
transport input ssh
line vty 5 15
transport input ssh
!
event manager applet CLEAR_NAT_DOWN
event track 3 state down
action 1.0 cli command "enable"
action 2.0 cli command "clear ip nat translations forced"
event manager applet CLEAR_NAT_UP
event track 3 state up
action 1.0 cli command "enable"
action 2.0 cli command "clear ip nat translations forced"
!
!
!
!
event manager applet get-my-ip
event track 2 state down
action 1.0 cli command "enable"
action 2.0 cli command "ping ip domoticity.ddns.net repeat 1"
action 3.0 regexp "Echoes to ([0-9.]+)" $_cli_result match ip
action 4.0 puts "My IP is $ip"
action 5.0 cli command "config t"
action 6.0 cli command "ip route $ip 255.255.255.255 192.168.1.1"
action 6.1 cli command "no ip sla 2"
action 7.0 cli command "ip sla 2"
action 8.0 cli command "icmp-echo $ip source-ip 192.168.1.254"
action 9.0 cli command "ip sla schedule 2 life forever start-time now"
!
!
!
end
I have tried to put :
access-list 100 permit ip 192.168.1.0 0.0.0.255 any
but i can't ping my vlans.
Solved! Go to Solution.
12-02-2017 12:14 PM
Hello
Your trying to add a nat outside subnet to be NATted, It wont work.
res
Paul
12-02-2017 11:16 AM
Hello,
do the devices with IP addresses 192.168.1.11 and 192.168.1.100 have 192.168.1.254 configured as their default gateway ? Can they ping that address ?
12-02-2017 12:14 PM
Hello
Your trying to add a nat outside subnet to be NATted, It wont work.
res
Paul
12-03-2017 01:20 AM
Hello,
I have (sort of, since I don't know what exactly the Fiber Box does), but it seems to me that basically the 192.168.1.0/24 network is simply a connected network ?
Try and change your access list to the one below. This basically excludes all traffic to the Fiber Box network to be NATted:
access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 192.168.8.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 deny ip 10.1.1.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 permit ip 192.168.2.0 0.0.0.255 any
access-list 100 permit ip 192.168.3.0 0.0.0.255 any
access-list 100 permit ip 192.168.4.0 0.0.0.255 any
access-list 100 permit ip 192.168.5.0 0.0.0.255 any
access-list 100 permit ip 192.168.8.0 0.0.0.255 any
access-list 100 permit ip 192.168.7.0 0.0.0.255 any
access-list 100 permit ip 10.1.1.0 0.0.0.255 any
12-04-2017 01:14 PM
12-04-2017 02:19 PM
Hello,
the idea was actually to exclude the network from being NATted at all. What exactly does this fiber box do ? What type/brand is it ? Is the IP address of the router the default gateway for the clients connected to the fiber box ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide