02-20-2013 12:56 PM - edited 03-04-2019 07:05 PM
Any help with this issue would be greatly appreciated.
ip address 172.15.45.2 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 172.15.45.1 255.255.255.248
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/2
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1/0
switchport access vlan 300
no ip address
!
interface GigabitEthernet0/1/1
switchport access vlan 300
no ip address
!
!
interface Vlan1
no ip address
!
interface Vlan300
ip address 10.101.160.46 255.255.255.248
ip nat outside
ip virtual-reassembly in
!
ip forward-protocol nd
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat pool TEAR_POOL 74.217.244.52 74.217.244.52 prefix-length 27
ip nat inside source list 100 pool TEAR_POOL overload
ip route 10.0.0.0 255.0.0.0 10.100.160.41
ip route 192.168.0.0 255.255.0.0 172.15.45.2
!
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 100 permit ip 172.15.45.0 0.0.0.255 any
access-list 100 permit ip 172.15.45.0 0.0.0.255 any
access-list 100 permit ip 10.100.0.0 0.0.255.255 any
!
!
Debug ip packet output
forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:42.846: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly After IPSec De cryption(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:42.846: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, N
AT Outside(66), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:42.846: IP: s=10.100.160.42, d=224.0.0.2, pak 30ED3DA4 consumed in input feature , packet consumed, MCI Check(80), r type 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:44.058: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Stateful Inspection(5), rtype 0, forus FAL SE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:44.058: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, inpuunt feature, Virtual Fragment Reassembly(25), rtype 0 , forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:44.058: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly After IPSec De cryption(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:44.058: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, NAT Outside(66), rtype 0, forus FALSE, sen dself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:44.058: IP: s=10.100.160.43 all
All possible debugging has been turned off
d=224.0.0.2, pak 305EB45C consumed in input feature , packet consumed, MCI Check(80), rtype 0, forus FALSE, sendselFALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:45.826: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Stateful Inspection(5), rtype 0, forus FAL SE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:45.826: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly(25), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:45.826: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly After IPSec De cryption(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:45.826: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, NAT Outside(66), rtype 0, forus FALSE, sen dself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:45.826: IP: s=10.100.160.42, d=224.0.0.2, pak 305EA16C consumed in input feature , packet consumed, MCI Check(80), r type 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:46.590: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Stateful Inspection(5), rtype 0, forus FAL SE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:46.590: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly(25), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:46.590: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly After IPSec De cryption(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:46.590: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, NAT Outside(66), rtype 0, forus FALSE, sen dself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:46.590: IP: s=10.100.160.43, d=224.0.0.2, pak 31011AC4 consumed in input feature , packet consumed, MCI Check(80), r type 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:48.582: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Stateful Inspection(5), rtype 0, forus FAL SE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:48.582: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly(25), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:48.582: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly After IPSec De cryption(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:48.582: IP: s=10.100.160.42 (Vlan300), d=224.0.0.2, len 48, input feature, NAT Outside(66), rtype 0, forus FALSE, sen dself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:48.582: IP: s=10.100.160.42, d=224.0.0.2, pak 2AF06428 consumed in input feature , packet consumed, MCI Check(80), r type 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:49.486: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Stateful Inspection(5), rtype 0, forus FAL SE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:49.486: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly(25), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:49.486: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, Virtual Fragment Reassembly After IPSec De cryption(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:49.486: IP: s=10.100.160.43 (Vlan300), d=224.0.0.2, len 48, input feature, NAT Outside(66), rtype 0, forus FALSE, sen dself FALSE, mtu 0, fwdchk FALSE
Feb 20 20:32:49.486: IP: s=10.100.160.43, d=224.0.0.2, pak 305EC74C consumed in input feature , packet consumed, MCI Check(80), r type 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSEun all
02-20-2013 01:32 PM
Past show ip route input
What are u trying to do. Just want internet access.
*** Do Rate Helpful Posts ***
02-20-2013 02:08 PM
Hi
On Gi0/0 and Gi0/1 you have public IPs and also "ip nat inside"
On interface Vlan300 you have private IP and "ip nat outside"
Your NAT pool is from entire different network, does oposite router have route to this prefix?
Access list 100, which define IP addresses which should be translated, is refering to both inside IPs and to private IPs which are not even configured on router (they do not have to be, but I want to be sure that in this case it is not a mistake)
And last thing, your routing is also strange, only private IP blocks.
You need to give as a little bit more info what you want to accomplish, cause I do not know where to start
Best Regards
Please rate helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide