cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
797
Views
0
Helpful
0
Replies

DNS Configuration

Mike.Ba1ley
Level 1
Level 1

Hi

I've set up a cisco 877 on a home network. I had problems getting internet access from the network initially. After playing about with it, i managed to get it working.

However, there is one slight problem. The guy's whose house I installed it in has a CCTV system that can be viewed from the internet via the url http;//chitchens.dyndns.tv:88 . This resolves to the public internet address of the router. I have set up PAT to translate all tcp 88 traffic over to the CCTV unit that sits on the LAN. When the guy connects to his CCTV url externally it works fine. However, when he tries to connect to the URL from his own network then the connection fails.

I suspect it's routing or DNS related. I am not sure if I have the DNS settings right. How should I be setting DNS for the router and the local DHCP clients?

The guys DSL connection DNS is 213.23.3.100 and 213.23.6.100, the CCTV is connected to 192.168.1.72

Here's the config:

Building configuration...

Current configuration : 16428 bytes

!

version 12.4

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

service password-encryption

service sequence-numbers

!

hostname ch-home-rt

!

boot-start-marker

boot-end-marker

!

logging buffered 51200 warnings

enable secret 5 $1$PFSZ$V4gWvmoldeAtPDTDaaruy1

!

aaa new-model

!

!

aaa authentication login default local

aaa authentication login ciscocp_vpn_xauth_ml_1 local

aaa authentication login ciscocp_vpn_xauth_ml_2 local

aaa authentication login ciscocp_vpn_xauth_ml_3 local

aaa authentication login ciscocp_vpn_xauth_ml_4 local

aaa authentication login ciscocp_vpn_xauth_ml_5 local

aaa authorization exec default local

aaa authorization network ciscocp_vpn_group_ml_1 local

aaa authorization network ciscocp_vpn_group_ml_2 local

aaa authorization network ciscocp_vpn_group_ml_3 local

aaa authorization network ciscocp_vpn_group_ml_4 local

aaa authorization network ciscocp_vpn_group_ml_5 local

!

!

aaa session-id common

!

crypto pki trustpoint TP-self-signed-4221835501

enrollment selfsigned

subject-name cn=IOS-Self-Signed-Certificate-4221835501

revocation-check none

rsakeypair TP-self-signed-4221835501

!

!

crypto pki certificate chain TP-self-signed-4221835501

certificate self-signed 01

  30820251 308201BA A0030201 02020101 300D0609 2A864886 F70D0101 04050030

  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274

  69666963 6174652D 34323231 38333535 3031301E 170D3032 30333031 30383538

  34385A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649

  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 32323138

  33353530 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281

  8100A44F A3F502A7 22F209B2 6EF1E02A FBB59EA8 47945D0F 141B9621 7DA10016

  0A17E049 529912DC 5BC115FB 7820252C E06CB2A1 7A6C0419 650EFCB5 A08AB45D

  1BA3C0A0 FB388B49 C1ECEB8D A693157C E8952396 C5A79711 4C10958E B3E4429B

  C21A374F CD694218 8DFE483F 942152C0 C6A4FACF 077D2B71 F3D1585D 45EB8990

  4FE70203 010001A3 79307730 0F060355 1D130101 FF040530 030101FF 30240603

  551D1104 1D301B82 1963682D 686F6D65 2D72742E 796F7572 646F6D61 696E2E63

  6F6D301F 0603551D 23041830 16801490 51D25792 E93DAE59 CEEE452C A2809D27

  C5846230 1D060355 1D0E0416 04149051 D25792E9 3DAE59CE EE452CA2 809D27C5

  8462300D 06092A86 4886F70D 01010405 00038181 000377E8 961706C6 C08D2E75

  32F63A93 1596A93F DA148AAB 8CC1C8FF 7147EF64 37ABD302 EBE6826F 1B51AB60

  B3D64910 5F03B128 236B2210 B57885C2 B139F0BF 835A09FF BB5FE977 315D3649

  5E008DAC DCFF9F3C 9B4564AA A92C7F32 D9247C5D 6BD2637E 32041E63 370149AC

  06E975FA 087A6ECB 3F41F3B8 DA563401 75010A37 BD

   quit

dot11 syslog

!

dot11 ssid Langden

   vlan 1

   authentication open

   authentication key-management wpa

   mbssid guest-mode

   wpa-psk ascii 7 12310007415B5F057C73777E61

!

no ip source-route

ip cef

no ip dhcp use vrf connected

ip dhcp excluded-address 10.10.10.1

ip dhcp excluded-address 192.168.1.1 192.168.1.49

ip dhcp excluded-address 192.168.1.151 192.168.1.254

!

ip dhcp pool ccp-pool

   import all

   network 10.10.10.0 255.255.255.248

   default-router 10.10.10.1

   lease 0 2

!

ip dhcp pool chLAN

   import all

   network 192.168.1.0 255.255.255.0

   default-router 192.168.1.1

   dns-server 212.23.3.100 212.23.6.100

!

!

ip port-map user-ctcp-ezvpnsvr port tcp 10000

ip port-map user-cctudp port udp 88

ip port-map user-ezvpn-remote port udp 10000

no ip bootp server

ip domain name yourdomain.com

ip name-server 212.23.3.100

ip name-server 212.23.6.100

!

!

!

username dnstech privilege 15 secret 5 $1$J1fd$33MY4zTzQ8UljyfvCjdIj0

username chrish privilege 15 secret 5 $1$3Oui$LZhMcqX/rNUPC3RlJeiHX0

!

crypto logging ezvpn

!

crypto isakmp policy 1

encr 3des

authentication pre-share

group 2

crypto isakmp client configuration address-pool local SDM_POOL_1

!

crypto isakmp client configuration group chrisremote

key Hep303

dns 212.23.3.100 212.23.6.100

pool SDM_POOL_1

netmask 255.255.255.0

crypto isakmp profile ciscocp-ike-profile-1

   match identity group chrisremote

   client authentication list ciscocp_vpn_xauth_ml_5

   isakmp authorization list ciscocp_vpn_group_ml_5

   client configuration address initiate

   client configuration address respond

   virtual-template 5

!

!

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac

crypto ipsec transform-set ESP-3DES-SHA2 esp-3des esp-sha-hmac

!

crypto ipsec profile CiscoCP_Profile1

set transform-set ESP-3DES-SHA2

set isakmp-profile ciscocp-ike-profile-1

!

!

crypto ctcp port 10000

archive

log config

  hidekeys

!

!

!

class-map type inspect match-any SDM_SSLVPN

match access-group name SDM_SSLVPN0

class-map type inspect match-any SDM_HTTPS

match access-group name SDM_HTTPS

class-map type inspect match-any SDM_SSH

match access-group name SDM_SSH

class-map type inspect match-any SDM_SHELL

match access-group name SDM_SHELL

class-map type inspect match-any sdm-cls-access

match class-map SDM_HTTPS

match class-map SDM_SSH

match class-map SDM_SHELL

match protocol ssh

match protocol telnet

class-map type inspect match-any cctv

match protocol kerberos

match protocol user-cctudp

class-map type inspect match-any SDM_TELNET

match access-group name SDM_TELNET0

class-map type inspect match-any SDM_AH

match access-group name SDM_AH

class-map type inspect match-any ccp-skinny-inspect

match protocol skinny

class-map type inspect match-any ccp-cls-insp-traffic

match protocol cuseeme

match protocol dns

match protocol ftp

match protocol https

match protocol icmp

match protocol imap

match protocol pop3

match protocol netshow

match protocol shell

match protocol realmedia

match protocol rtsp

match protocol smtp extended

match protocol sql-net

match protocol streamworks

match protocol tftp

match protocol vdolive

match protocol tcp

match protocol udp

class-map type inspect match-all ccp-insp-traffic

match class-map ccp-cls-insp-traffic

class-map type inspect match-any SDM_EIGRP

match access-group name SDM_EIGRP0

class-map type inspect match-any remotesl

match protocol ssh

match protocol telnet

match class-map SDM_AH

match class-map SDM_EIGRP

match class-map SDM_TELNET

match class-map SDM_SSH

match class-map SDM_SSLVPN

class-map type inspect match-any SDM_IP

match access-group name SDM_IP

class-map type inspect match-any SDM_ESP

match access-group name SDM_ESP

class-map type inspect match-any SDM_EASY_VPN_REMOTE_TRAFFIC

match protocol isakmp

match protocol ipsec-msft

match class-map SDM_AH

match class-map SDM_ESP

match protocol user-ezvpn-remote

class-map type inspect match-all SDM_EASY_VPN_REMOTE_PT

match class-map SDM_EASY_VPN_REMOTE_TRAFFIC

match access-group 102

class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC

match protocol isakmp

match protocol ipsec-msft

match protocol user-ctcp-ezvpnsvr

match class-map SDM_AH

match class-map SDM_ESP

match protocol user-ezvpn-remote

match protocol ssp

match protocol gdoi

class-map type inspect match-all SDM_EASY_VPN_SERVER_PT

match class-map SDM_EASY_VPN_SERVER_TRAFFIC

class-map type inspect match-any ccp-cls-icmp-access

match protocol icmp

match protocol tcp

match protocol udp

class-map type inspect match-any ccp-h225ras-inspect

match protocol h225ras

class-map type inspect match-any cctv-both

match protocol user-cctudp

match protocol kerberos

class-map type inspect match-all sdm-access

match class-map sdm-cls-access

match access-group 101

class-map type inspect match-all ccp-cls-ccp-permit-1

match class-map remotesl

match access-group name stevelatimer

class-map type inspect match-any ccp-h323-inspect

match protocol h323

class-map type inspect match-all ccp-invalid-src

match access-group 100

class-map type inspect match-all ccp-icmp-access

match class-map ccp-cls-icmp-access

class-map type inspect match-any ccp-sip-inspect

match protocol sip

class-map type inspect match-all ccp-protocol-http

match protocol http

!

!

policy-map type inspect ccp-permit-icmpreply

class type inspect ccp-icmp-access

  inspect

class class-default

  pass

policy-map type inspect ccp-inspect

class type inspect ccp-invalid-src

  drop log

class type inspect ccp-protocol-http

  inspect

class type inspect ccp-insp-traffic

  inspect

class type inspect ccp-h323-inspect

  inspect

class type inspect ccp-h225ras-inspect

  inspect

class class-default

policy-map type inspect ccp-permit

class type inspect SDM_EASY_VPN_SERVER_PT

  pass

class type inspect cctv

  pass log

class type inspect sdm-access

  pass

class type inspect ccp-cls-ccp-permit-1

  pass

class class-default

policy-map type inspect ccp-policy-cctv-both

class type inspect cctv-both

  inspect

class class-default

policy-map type inspect sdm-permit-ip

class type inspect SDM_IP

  pass

class class-default

  drop log

!

zone security out-zone

zone security in-zone

zone security ezvpn-zone

zone-pair security ccp-zp-self-out source self destination out-zone

service-policy type inspect ccp-permit-icmpreply

zone-pair security ccp-zp-in-out source in-zone destination out-zone

service-policy type inspect ccp-inspect

zone-pair security ccp-zp-out-self source out-zone destination self

service-policy type inspect ccp-permit

zone-pair security sdm-zp-in-ezvpn1 source in-zone destination ezvpn-zone

service-policy type inspect sdm-permit-ip

zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone

service-policy type inspect sdm-permit-ip

zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone

service-policy type inspect sdm-permit-ip

zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination in-zone

service-policy type inspect sdm-permit-ip

zone-pair security sdm-zp-out-zone-in-zone source out-zone destination in-zone

service-policy type inspect ccp-policy-cctv-both

!

bridge irb

!

!

interface ATM0

no ip address

no ip redirects

no ip unreachables

no ip proxy-arp

no atm ilmi-keepalive

dsl operating-mode auto

!

interface ATM0.1 point-to-point

description $ES_WAN$

no ip redirects

no ip unreachables

no ip proxy-arp

pvc 0/38

  encapsulation aal5mux ppp dialer

  dialer pool-member 1

!

!

interface FastEthernet0

!

interface FastEthernet1

!

interface FastEthernet2

!

interface FastEthernet3

!

interface Virtual-Template5 type tunnel

ip unnumbered BVI1

ip nat inside

ip virtual-reassembly

tunnel mode ipsec ipv4

tunnel protection ipsec profile CiscoCP_Profile1

!

interface Dot11Radio0

no ip address

no ip redirects

no ip unreachables

no ip proxy-arp

!

encryption vlan 1 mode ciphers aes-ccm tkip

!

broadcast-key vlan 1 change 30

!

!

ssid Langden

!

mbssid

speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0

station-role root

!

interface Dot11Radio0.1

encapsulation dot1Q 1 native

no cdp enable

bridge-group 1

bridge-group 1 subscriber-loop-control

bridge-group 1 spanning-disabled

bridge-group 1 block-unknown-source

no bridge-group 1 source-learning

no bridge-group 1 unicast-flooding

!

interface Vlan1

no ip address

bridge-group 1

!

interface Vlan2

no ip address

bridge-group 2

!

interface Dialer0

description $FW_OUTSIDE$

ip address negotiated

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat outside

ip virtual-reassembly

zone-member security out-zone

encapsulation ppp

dialer pool 1

dialer-group 1

no cdp enable

ppp authentication chap pap callin

ppp chap hostname xxxxxxx@xxx

ppp chap password 7 1511133C0A0D332C3F

ppp pap sent-username xxxxx@xxx password 7 02051C6B052117295B

!

interface BVI1

description $FW_INSIDE$

ip address 192.168.1.1 255.255.255.0

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat inside

ip virtual-reassembly

zone-member security in-zone

!

interface BVI2

no ip address

!

ip local pool SDM_POOL_1 192.168.1.220 192.168.1.229

ip forward-protocol nd

ip route 0.0.0.0 0.0.0.0 Dialer0 2

!

ip http server

ip http access-class 23

ip http authentication local

ip http secure-server

ip http timeout-policy idle 60 life 86400 requests 10000

ip nat inside source list 1 interface Dialer0 overload

ip nat inside source static tcp 192.168.1.72 88 interface Dialer0 88

ip nat inside source static udp 192.168.1.72 88 interface Dialer0 88

!

ip access-list extended SDM_AH

remark CCP_ACL Category=1

permit ahp any any

ip access-list extended SDM_EIGRP

remark CCP_ACL Category=0

permit eigrp any any

ip access-list extended SDM_EIGRP0

remark CCP_ACL Category=0

permit eigrp any any

ip access-list extended SDM_ESP

remark CCP_ACL Category=1

permit esp any any

ip access-list extended SDM_GRE

remark CCP_ACL Category=0

permit gre any any

ip access-list extended SDM_GRE0

remark CCP_ACL Category=0

permit gre any any

ip access-list extended SDM_HTTP

remark CCP_ACL Category=0

permit tcp any any eq telnet

ip access-list extended SDM_HTTP0

remark CCP_ACL Category=0

permit tcp any any eq telnet

ip access-list extended SDM_HTTPS

remark CCP_ACL Category=1

permit tcp any any eq 443

ip access-list extended SDM_IGMP

remark CCP_ACL Category=0

permit ip any any

ip access-list extended SDM_IP

remark CCP_ACL Category=1

permit ip any any

ip access-list extended SDM_IPINIP

remark CCP_ACL Category=0

permit ipinip any any

ip access-list extended SDM_IPINIP0

remark CCP_ACL Category=0

permit ipinip any any

ip access-list extended SDM_NOS

remark CCP_ACL Category=0

permit nos any any

ip access-list extended SDM_OSPF

remark CCP_ACL Category=0

permit ospf any any

ip access-list extended SDM_PCP

remark CCP_ACL Category=0

permit pcp any any

ip access-list extended SDM_PCP0

remark CCP_ACL Category=0

permit pcp any any

ip access-list extended SDM_PIM

remark CCP_ACL Category=0

ip access-list extended SDM_PIM0

remark CCP_ACL Category=0

ip access-list extended SDM_SHELL

remark CCP_ACL Category=1

permit tcp any any eq cmd

ip access-list extended SDM_SSH

remark CCP_ACL Category=1

permit tcp any any eq 22

ip access-list extended SDM_SSLVPN

remark CCP_ACL Category=0

permit tcp any any eq 4443

ip access-list extended SDM_SSLVPN0

remark CCP_ACL Category=0

permit tcp any any eq 4443

ip access-list extended SDM_TELNET

remark CCP_ACL Category=0

permit tcp any any

ip access-list extended SDM_TELNET0

remark CCP_ACL Category=0

permit tcp any any

ip access-list extended stevelatimer

remark CCP_ACL Category=128

permit ip host 212.159.12.62 any

!

access-list 1 remark CCP_ACL Category=2

access-list 1 permit 192.168.1.0 0.0.0.255

access-list 23 permit 192.168.0.0 0.0.255.255

access-list 23 permit 10.10.10.0 0.0.0.255

access-list 100 remark CCP_ACL Category=128

access-list 100 permit ip host 255.255.255.255 any

access-list 100 permit ip 127.0.0.0 0.255.255.255 any

access-list 101 remark CCP_ACL Category=128

access-list 101 permit ip host 212.159.12.62 any

access-list 102 remark CCP_ACL Category=128

access-list 102 permit ip host 82.69.105.59 any

dialer-list 1 protocol ip permit

!

!

!

control-plane

!

bridge 1 protocol ieee

bridge 1 route ip

bridge 2 protocol ieee

bridge 2 route ip

banner exec ^C

% Password expiration warning.

-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device

and it provides the default username "cisco" for  one-time use. If you have

already used the username "cisco" to login to the router and your IOS image

supports the "one-time" user option, then this username has already expired.

You will not be able to login to the router with this username after you exit

this session.

It is strongly suggested that you create a new username with a privilege level

of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you

want to use.

-----------------------------------------------------------------------

^C

banner login ^C

-----------------------------------------------------------------------

The Device is the personal property of Chris Hitchens.

This is a private network, unauthorised access to this device

and network is strictly forbidden

-----------------------------------------------------------------------^C

!

line con 0

exec-timeout 0 0

logging synchronous

no modem enable

line aux 0

line vty 0 4

access-class 23 in

exec-timeout 0 0

logging synchronous

transport input telnet ssh

!

scheduler max-task-time 5000

end

Any help or pointers are greatly appreciated.

Thanks

Mike

0 Replies 0
Review Cisco Networking for a $25 gift card