I am struggling to get our 887VA setup for our config.
We have a public IP range from our ISP and we have multiple servers behind our router. One of the servers need large ranges of ports open so I have ended up trying to use a ‘rotary’ nat pool which works fine but I cannot get the other servers to NAT correctly on their ports. It seems the rotary takes over.
Any help or guidance would be gratefully recived!
Here is a snip of my config.
interface Ethernet0 no ip address shutdown ! interface ATM0 no ip address no atm ilmi-keepalive ! interface ATM0.1 point-to-point pvc 0/38 encapsulation aal5mux ppp dialer dialer pool-member 1 ! ! interface FastEthernet0 description Private LAN no ip address no cdp enable ! interface FastEthernet1 no ip address no cdp enable ! interface FastEthernet2 no ip address no cdp enable ! interface FastEthernet3 no ip address no cdp enable ! interface Vlan1 ip address 192.168.22.1 255.255.255.0 ip flow ingress ip nat inside ip virtual-reassembly in ! interface Dialer0 ip address negotiated ip nat outside ip virtual-reassembly in encapsulation ppp dialer pool 1 dialer-group 1 ppp chap hostname xxxxxxx ppp chap password 0 xxxxxxxxx ppp ipcp dns request no cdp enable ! ip forward-protocol nd no ip http server ip http authentication local ip http secure-server ! ip dns server ip nat pool TServer 192.168.22.8 192.168.22.8 netmask 255.255.255.0 type rotary
ip nat inside source list 1 interface Dialer0 overload ip nat inside source static tcp 192.168.22.4 80 22.214.171.124 80 extendable ip nat inside source static tcp 192.168.22.4 5050 126.96.36.199 5050 extendable ip nat inside source static tcp 192.168.22.4 6050 188.8.131.52 6050 extendable ip nat inside source static tcp 192.168.22.4 7050 184.108.40.206 7050 extendable ip nat inside destination list TServer pool TServer ip route 0.0.0.0 0.0.0.0 Dialer0 ! ip access-list extended TServer permit tcp any any eq ftp permit tcp any any eq gopher permit tcp any any eq www permit tcp any any eq 443 permit tcp any any range 1023 1100 permit tcp any any eq 2222 permit udp any any range 70 75 permit tcp any any range 40000 40075 permit udp any any range 40000 41000 ! access-list 1 permit 192.168.22.0 0.0.0.255 no cdp run
In the last year, we’ve seen substantial changes in how enterprises conduct business. When the pandemic hit, it exposed gaps in business continuity plans, and it showcased the need to quickly deploy and remotely manage secure connections.
On 18th December 2020, Cisco announced the latest IOS XE release - Cisco IOS XE Bengaluru 17.4.1a
The first one in the Cisco IOS XE Bengaluru release series, IOS XE 17.4.1a unlocks various routing features and enhancements comprehensively c...
Exploring business options for a SD-WAN managed serviceLogicalis UK offers a rapid, cost effective deployment with ngenaAdvantages that make a differenceSummary of benefits:Looking forwardResources
This event had place on Tuesday 19th, January 2021 at 10...
(view in My Videos)
Community Live- May the SD-WAN Force Be With You
This event took place on Tuesday 19th, January 2021 at 10:00hrs PDT
In this session attendees received an introduction to Software Defined-WAN (SD-WAN) and the importance of ...
Cisco Champion Radio · S8|E3 The Cisco DNA Center Machine Reasoning Engine
Machine Reasoning is a new category of AI/ML that you will soon hear a lot about. It saves your IT team time by automating complex and tedious networking tasks. It can also...