09-03-2018 02:34 AM
Hello everyone!
I'm completely lost here, since I'm a newbie on this networking area.
I recently had a problem with a cisco router 1841 that lost all configuration after a power outage. Long story short, i've been able to restore most of it, but i'm still having issues with the ip routing. This is the scenario:
I have 2 internal VLANS (1010 and 3040) configured in a ZyXEL switch.
1010 has an ip 192.168.170.1
3040 has an ip 192.168.160.1
I have a Sonicwall on the other end that acts as a gateway with ip 192.168.168.1
On the router I have interface 0/0 as outside with ip 192.168.168.54
I also have 2 subinterfaces for the vlans with the ips mentioned before.
Everything works fine on the internal network, which is 192.168.168.x
I want traffic from VLANS to go outside to the internet
I want traffic to go inside to those VLANS from the internet
So far, from the router, i can ping all the gateways and the internet.
PC inside the 192.168.170.x network can reach the internet, but no one can reach that computer from the outside.
Please help me, i've been trying to figure this out a week from now, but no clue what am i missing!!!
See my current configuration:
!
interface FastEthernet0/0
ip address 192.168.168.54 255.255.255.0
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
ip nat inside
ip nat enable
ip virtual-reassembly
duplex auto
speed auto
!
interface FastEthernet0/1.1
encapsulation dot1Q 1010
ip address 192.168.170.1 255.255.255.0
ip nat inside
ip nat enable
ip virtual-reassembly
!
interface FastEthernet0/1.2
encapsulation dot1Q 3040
ip address 192.168.160.1 255.255.255.0
ip nat inside
ip nat enable
ip virtual-reassembly
!
interface Serial0/0/0
no ip address
shutdown
!
interface Serial0/1/0
no ip address
shutdown
!
ip route 0.0.0.0 0.0.0.0 192.168.168.1
!
!
no ip http server
no ip http secure-server
ip nat source list 1 interface FastEthernet0/0 overload
ip nat inside source list 1 interface FastEthernet0/0 overload
!
access-list 1 permit 192.168.170.0 0.0.0.255
access-list 1 permit 192.168.160.0 0.0.0.255
!
!
!
I would really appreciate any insight on this matter, since i need to have these up and running in a couple of days.
I hope you guys can help!
09-03-2018 03:36 PM
Not sure I'm following you....all my clients are on this network.
Is there anything I'm missing here?
09-03-2018 03:44 PM - edited 09-03-2018 03:46 PM
Hello
your clients should be on vlans 1010 =192.168.170.0/24 or 3040 = 192.168.160.0/24
you even confirmed this is previous posts?
no clients should be on 192.168.168.0/24 subnet
09-03-2018 03:49 PM
09-03-2018 03:58 PM
Hello
It seems you haven’t told the fully story and as such Weber been going around in circles!
anywa that’s your problem is
192.168.168.0/24 isn’t routable from the Switch and rtr for inter- vlan communiction
So to clarify
at present not clients on any vlan be it voip - cameras or this 192.168.168.0/24 can speak to each other correct or it is just the 192.168.168.0/24?
But they all have internet connectivity?
09-03-2018 04:02 PM
09-03-2018 04:16 PM
Hello
have you applied that last configuration I posted?
09-03-2018 04:21 PM
I did apply all the changes you suggested.
Here is the full configuration:
AP-CISCO-01#sh running-config
Building configuration...
Current configuration : 1227 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname AP-CISCO-01
!
boot-start-marker
boot config flash:last-router-confg
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
ip cef
!
!
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0/0
ip address 192.168.168.54 255.255.255.0
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1.1
encapsulation dot1Q 1010
ip address 192.168.170.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface FastEthernet0/1.2
encapsulation dot1Q 3040
ip address 192.168.160.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Serial0/0/0
no ip address
shutdown
!
interface Serial0/1/0
no ip address
shutdown
!
ip route 0.0.0.0 0.0.0.0 FastEthernet0/0 192.168.168.1
!
!
no ip http server
no ip http secure-server
ip nat inside source list 1 interface FastEthernet0/0 overload
!
access-list 1 permit 192.168.170.0 0.0.0.255
access-list 1 permit 192.168.160.0 0.0.0.255
!
!
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line vty 0 4
login
!
scheduler allocate 20000 1000
end
Thanks!
09-03-2018 04:30 PM - edited 09-04-2018 03:01 AM
Hello
So as it stands - 192.168.168.0/24 users will not be able to speak to the other vlan users. But for the vlan 1010 - 3040 these users should be able to communicate with each other unless the switch is configured incorrectly
The switch needs a trunk connection on the port connecting the rtr and it needs to have ip routing disabled if it is enabled please confirm that then we can work on the 192.168.168.0/24 users
Lasty I would like to query the actual physical connections:
Does this rtr and FW directly connect to each other or its via the switch?
09-03-2018 05:43 PM
Assuming that the ports are configured correctly on the switch...what would be the next step?
Thanks!
09-03-2018 11:54 PM - edited 09-03-2018 11:55 PM
no the access-list
Standard IP access list 1
10 deny 192.168.168.0, wildcard bits 0.0.0.255
20 permit 192.168.170.0, wildcard bits 0.0.0.255 (157611 matches)
30 permit 192.168.160.0, wildcard bits 0.0.0.255 (28 matches)
is still in error
the deny is not between the two subnets!!!!
traffic from .160 to outside must be natted, and from .160 to .170 NOT
traffic from .170 to outside must be natted, and from .170 to .160 NOT
you need to switch from standard access-list to extended-access-list
an extended access-list use a number 100+ or a name
no ip access-list 1
no ip nat inside source list 1 interface FastEthernet0/0 overload
access-list 101 deny ip 192.168.160.0 0.0.0.255 192.168.167.0 0.0.0.255 any
access-list 101 deny ip 192.168.170.0 0.0.0.255 192.168.160.0 0.0.0.255 any
access-list 101 permit ip 192.168.160.0 0.0.0.255 any
access-list 101 permit ip 192.168.170.0 0.0.0.255 any
ip nat inside source list 101 interface FastEthernet0/0 overload
09-04-2018 01:51 AM
Hello
@pieterh wrote:
no the access-list
Standard IP access list 1
10 deny 192.168.168.0, wildcard bits 0.0.0.255
20 permit 192.168.170.0, wildcard bits 0.0.0.255 (157611 matches)
30 permit 192.168.160.0, wildcard bits 0.0.0.255 (28 matches)
is still in error
the deny is not between the two subnets!!!!
traffic from .160 to outside must be natted, and from .160 to .170 NOT
traffic from .170 to outside must be natted, and from .170 to .160 NOT
you need to switch from standard access-list to extended-access-list
an extended access-list use a number 100+ or a name
no ip access-list 1
no ip nat inside source list 1 interface FastEthernet0/0 overload
access-list 101 deny ip 192.168.160.0 0.0.0.255 192.168.167.0 0.0.0.255 any
access-list 101 deny ip 192.168.170.0 0.0.0.255 192.168.160.0 0.0.0.255 any
access-list 101 permit ip 192.168.160.0 0.0.0.255 any
access-list 101 permit ip 192.168.170.0 0.0.0.255 any
ip nat inside source list 101 interface FastEthernet0/0 overload
@pieterh there should be no requirement for any NAT access-list to deny or allow inter-vlan communication nat should not even be touched
09-04-2018 05:40 AM - edited 09-04-2018 05:40 AM
Hi,
I tested the ACL with the deny subnets suggestion and it didn't work. I removed the changes and it is the way it was originally, only with 2 entries.
@paul driver said:
"The switch needs a trunk connection on the port connecting the rtr and it needs to have ip routing disabled if it is enabled please confirm that then we can work on the 192.168.168.0/24 users"
what is the port that needs the trunk connection? 0/0 or 0/1?
Thanks!
09-04-2018 06:39 AM - edited 09-04-2018 08:03 AM
I have confirmed that the interface 0/1 is connected to the port in the switch and marked as VLAN trunking
Also, the rtr and the FW are connected through a switch.
Any ideas?
BTW: I really appreciate the help with this issue
09-04-2018 08:25 AM - edited 09-04-2018 08:31 AM
Hello
So the lan facing interface of the rtr is connected to the switch vIa trunk <-- good
Once we sort the inter-vlan routing out then we can concentrate on the 192.168.168.0/24 users
So staying with the switch -
1) Is the switch performing any routing , by that does it have routing enable
2) does it have vlan 1010 and 3040 created and are access ports assigned to these vlans?
3) does it have any access-list applied to it?
09-04-2018 08:43 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide