I have a Cisco IR1101 router with a Network Essentials license. Previously I have setup the router with a VPN and shipped camera traffic back to our main location. However, I have since found out that across the VPN camera traffic is not supported by our vendor and I have enough public IPs to allow for each camera to have it's own IP. I want to change the way the server and camera connect. The server connects to the camera via IP and then has the camera ship the video back to it. My plan is to setup the cameras after the change using two of the public IPs of the IR1101 (2.2.2.77 & 2.2.2.78).
So, what I would like to do is for traffic inbound from a specific IPs of 1.1.1.57 & 1.1.1.218 to this site's loopback interface 2.2.2.77 and 2.2.2.78, I would like to NAT to my internal Camera IPs of 10.78.55.51 & 52 and allow that traffic.
Also, my IPs of my main site's two ISPs are currently allowed to SSH and get to the web management of the IR1101, all other internet is allowed to ping and that is all.
What's the most recommended solution for that? ACL and NAT or ??
On a sonicwall I would just create four NAT rules that said
from 1.1.1.57 to 2.2.2.77 NAT to 10.78.55.51
from 1.1.1.218 to 2.2.2.77 NAT to 10.78.55.51
from 1.1.1.57 to 2.2.2.78 NAT to 10.78.55.52
from 1.1.1.218 to 2.2.2.78 NAT to 10.78.55.52
And then I could create one firewall rule that said allow 1.1.1.57 or 1.1.1.218 to 2.2.2.77-78