cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3889
Views
9
Helpful
7
Replies

Cisco 1921 port forward not working

wordenmartinit
Level 1
Level 1

I am trying to forward a selection of ports to two internal IP addresses.  The main port is 8080 to internal IP 10.20.16.245.

I've stripped down the router config to as basic as possible for testing this out.

Open port scanner reports that the port is filtered, and I can't bring up the http interface in a browser.

Here is my result for sh ip nat translation:

tcp WANIP:8080 10.20.16.245:8080 OUTSIDEIP:49468 OUTSIDEIP:49468

tcp WANIP:8080 10.20.16.245:8080 OUTSIDEIP:49469 OUTSIDEIP:49469

tcp WANIP:8080 10.20.16.245:8080 OUTSIDEIP:49470 OUTSIDEIP:49470

And here is my running config (minus private areas):


object-group network inside
10.20.16.0 255.255.255.0
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description UC2B Fiber$ETH-WAN$
ip address WANIP 255.255.255.248
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map SDM_CMAP_1
!
interface GigabitEthernet0/1
description LAN$ETH-LAN$
ip address 10.20.16.242 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
no mop enabled
!
interface GigabitEthernet0/1/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/0/0
switchport access vlan 25
switchport mode trunk
no ip address
no mop enabled
!
interface GigabitEthernet0/0/1
switchport mode trunk
no ip address
!
interface GigabitEthernet0/0/2
switchport access vlan 5
switchport mode trunk
no ip address
!
interface GigabitEthernet0/0/3
switchport access vlan 5
switchport mode trunk
no ip address
!
interface Vlan1
no ip address
!
interface Vlan5
no ip address
!
interface Vlan15
ip address 10.10.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface Vlan25
ip address 192.168.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface Vlan100
no ip address
ip nat inside
ip virtual-reassembly in
!
ip forward-protocol nd
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source static tcp 10.20.16.245 8080 interface GigabitEthernet0/0 8080
ip nat inside source static udp 10.20.16.245 8080 interface GigabitEthernet0/0 8080
ip nat inside source static tcp 10.20.16.246 8081 interface GigabitEthernet0/0 8081
ip nat inside source static tcp 10.20.16.246 5551 interface GigabitEthernet0/0 5551
ip nat inside source static udp 10.20.16.246 8081 interface GigabitEthernet0/0 8081
ip nat inside source static udp 10.20.16.246 5551 interface GigabitEthernet0/0 5551
ip nat inside source static tcp 10.20.16.245 5550 interface GigabitEthernet0/0 5550
ip nat inside source static udp 10.20.16.245 5550 interface GigabitEthernet0/0 5550
ip nat inside source static udp 10.20.16.245 9998 interface GigabitEthernet0/0 9998
ip nat inside source static tcp 10.20.16.245 9998 interface GigabitEthernet0/0 9998
ip nat inside source static tcp 10.20.16.245 5555 interface GigabitEthernet0/0 5555
ip nat inside source static udp 10.20.16.245 5555 interface GigabitEthernet0/0 5555
ip nat inside source static tcp 10.20.16.246 5556 interface GigabitEthernet0/0 5556
ip nat inside source static udp 10.20.16.246 5556 interface GigabitEthernet0/0 5556
ip nat inside source route-map SDM_RMAP_1 interface GigabitEthernet0/0 overload
ip default-network 10.20.16.0

!
ip access-list extended vlan15
remark vlan15 to outside
remark CCP_ACL Category=2
permit ip 10.10.10.0 0.0.0.255 any
!
ip sla auto discovery
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 23 permit 10.20.16.0 0.0.0.255
access-list 100 remark CCP_ACL Category=4
access-list 100 remark IPSec Rule
access-list 100 permit ip 10.20.16.0 0.0.0.255 10.225.103.0 0.0.0.255
access-list 101 remark CCP_ACL Category=3
access-list 101 remark IPSec Rule
access-list 101 deny   ip 10.20.16.0 0.0.0.255 10.26.116.0 0.0.0.255
access-list 101 remark IPSec Rule
access-list 101 deny   ip 10.20.16.0 0.0.0.255 10.225.103.0 0.0.0.255
access-list 101 remark IPSec Rule
access-list 101 deny   ip 10.20.16.0 0.0.0.255 10.10.209.0 0.0.0.255
access-list 101 permit ip 10.20.16.0 0.0.0.255 any
access-list 101 permit ip 10.10.10.0 0.0.0.255 any
access-list 101 permit ip 192.168.10.0 0.0.0.255 any
access-list 102 remark CCP_ACL Category=4
access-list 102 remark IPSec Rule
access-list 102 permit ip 10.20.16.0 0.0.0.255 10.10.209.0 0.0.0.255
access-list 103 remark CCP_ACL Category=4
access-list 103 remark IPSec Rule
access-list 103 permit ip 10.20.16.0 0.0.0.255 10.26.116.0 0.0.0.255
access-list 104 remark CCP_ACL Category=4
access-list 104 remark IPSec Rule
access-list 104 permit ip 10.20.16.0 0.0.0.255 10.225.103.0 0.0.0.255
!
route-map SDM_RMAP_1 permit 1
match ip address 101
!

end

I've tried adding an ACL and attaching it to the WAN interface but this doesn't seem to affect it.

I must be missing something really simple here.                  

1 Accepted Solution

Accepted Solutions

Is your default gateway configured on the DVR?

View solution in original post

7 Replies 7

Elton Babcock
Level 1
Level 1

I think you have it backwards in your NAT statement. Your outside interface comes first with the port and then you finish it with your internal IP and port.

Sent from Cisco Technical Support iPhone App

cadet alain
VIP Alumni
VIP Alumni

Hi,

Your NAT statements are correct and you've got translations in the NAT table.

Can you communicate on TCP 8080 with the host from inside (with its private IP)?

How do you try to communicate with it with the browser? do you specify the port 8080 like this: http://:8080

Regards

Alain

Don't forget to rate helpful posts.

Don't forget to rate helpful posts.

Alain,

Thanks for the response.  I am able to communicate from the inside to its private IP with http://10.20.16.245:8080.

Externally, from the browser, I am using http://WANPIP:8080 as you also specified.

I can run wireshark later today and see if I am seeing any traffic going to the 10.20.16.245 IP address, it is a DVR device and maybe something is being blocked there.

Ran wireshark and I see no traffic on the network to or from the internal (10.20.16.245) IP address.  I'm stumped as to why this isn't going through the router.

Is your default gateway configured on the DVR?

You nailed it Daniel.  They had the incorrect default gateway on the DVR.  We have multiple default gateways on the network and they assumed the incorrect one when they configured it.  Thanks!

Alain I do appreciate the assistance as well.

Hi,

Can you do this:

ip access-list extended VERIFY-NAT-ACL

permit tcp any host 10.20.16.45 eq 8080

class-map VERIFY-NAT-CLASS

match access-group name VERIFY-NAT-ACL

policy-map VERIFY-NAT-POLICY

class VERIFY-NAT-CLASS

int g0/1

service-policy output VERIFY-NAT-POLICY

Try to communicate from WAN and post following output: show policy-map interface g0/1

Regards

Alain

Don't forget to rate helpful posts.

Don't forget to rate helpful posts.
Review Cisco Networking for a $25 gift card