03-12-2020 11:50 AM
Hi,
I tried this on a cisco 1941 and got not joy, one work around i did get to work not entirely correctly was the below:
ip nat inside source static [Local IP Address] [Wan IP Address] route-map PORTFWD
route-map PORTFWD permit 100
match ip address 100
access-list 100 permit udp any any range 10000 20000
The problem with this configuration is that all udp ports are being forwarded to [Local IP Address] instead of the specified range, any thoughts ?
03-12-2020 12:28 PM - edited 03-12-2020 12:29 PM
Hello,
check if your IOS supports port maps. Below is a generic example:
access-list 1 permit local_ip_address
!
ip nat portmap UDP_RANGE
appl udp-rtp startport 9600 size 10880
!
ip nat inside source list 1 interface GigabitEthernet 0/0 overload portmap UDP_RANGE
03-13-2020 01:38 AM
Hi
Just tried this but no joy, no ports are being forwarded to the local IP address.
03-13-2020 12:21 PM
Hi,
The route-map i used for policy NAT, and although in the ACL you use TCP/UDP, these are ignored, you should use IP based statements in the route-map. As the IOS NAT configuration does not allow you to configure range of ports for your NAT statement, your bet option is to leave it as static NAT (without the route-map) and have an inbound ACL configured which actually restart access to the port range of 10000-20000.
Regards,
Cristian Matei.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide