cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
448
Views
5
Helpful
2
Replies

Im a little confused, trying to learn :)

cventicinque
Level 1
Level 1

Hello,

I have a 1605r connected to a cable modem that I use to both connect my little home lan to the internet and to learn cisco networking. I ran into a weird problem tonite. I am reading the Lammle book in preperation for my CCNA and I started fooling around with my config. Of course, I broke my config. I ended up fixing it but, I dont understand what happened:

sh ver

IOS (tm) 1600 Software (C1600-K8OSY-M), Version 12.2(23)

I removed this line from my config, assuming it was worthless because I did not apply it to any interface:

access-list 1 permit 192.168.1.0 0.0.0.255

Im not sure where that line came from. I assume I was going to play with access lists at some point but, I guess I dropped it and just left the line in there. I thought the line would not have any affect on my config if I did not apply it to an interface.

Evidently it is a big deal because I could not surf without it. Now I know I upgraded my IOS sometime back and I am taking a shot in guessing that this newer IOS with security features needs that line? I had assumed that since I did not change my config after upgrading to the security feature version of IOS that no firewall functions were working on my router, am I wrong?

Sorry if this post is confusing... now you know how I feel :)

See full sanitized config below:

Current configuration : 1806 bytes

!

version 12.2

no service pad

service timestamps debug uptime

service timestamps log uptime

no service password-encryption

!

hostname M1605r

!

enable secret

!

ip subnet-zero

no ip source-route

!

no ip bootp server

!

!

!

!

interface Ethernet0

desc to cable modem

ip address dhcp

no ip proxy-arp

ip nat outside

no cdp enable

!

interface Ethernet1

desc to Cisco WS-C2912-XL

ip address 192.168.1.1 255.255.255.0

no ip proxy-arp

ip nat inside

no cdp enable

!

ip nat inside source list 1 interface Ethernet0 overload

ip nat inside source static tcp 192.168.1.101 6881 interface Ethernet0 6881

ip nat inside source static udp 192.168.1.101 6881 interface Ethernet0 6881

ip nat inside source static tcp 192.168.1.101 6112 interface Ethernet0 6112

ip nat inside source static tcp 192.168.1.101 3724 interface Ethernet0 3724

ip nat inside source static udp 192.168.1.101 2934 interface Ethernet0 2934

ip nat inside source static udp 192.168.1.101 2935 interface Ethernet0 2935

ip classless

ip route 0.0.0.0 0.0.0.0 x.x.x.x 254

no ip http server

!

access-list 1 permit 192.168.1.0 0.0.0.255

no cdp run

banner login ^CC

WARNING!!!

This system is soley for the use of authorized users for official purposes.

You have no expectation of privacy in its use and to ensure that the system

is functioning properly, individuals using this computer system are subject

to having all of their activities monitored and recorded by system

personnel. Use of this system evidences an express consent to such

monitoring and agreement that if such monitoring reveals evidence of

possible abuse or criminal activity, system personnel may provide the

results of such monitoring to appropriate officials.

^C

!

line con 0

password

login

line vty 0 4

exec-timeout 0 1

no login

no exec

transport input none

!

end

1 Accepted Solution

Accepted Solutions

olorunloba
Level 5
Level 5

It is not a security or firewall issue. The access-list is part of your NAT configuration. It specifies the address that should be translated. These are your relevant NAT configuration.

interface Ethernet0

desc to cable modem

ip address dhcp

ip nat outside

interface Ethernet1

desc to Cisco WS-C2912-XL

ip address 192.168.1.1 255.255.255.0

ip nat inside

ip nat inside source list 1 interface Ethernet0 overload

access-list 1 permit 192.168.1.0 0.0.0.255

The 1 in the following line

ip nat inside source list 1 interface Ethernet0 overload

refers to access-list 1. And in your config, it is translated to the address of E0 which is obtained via DHCP from your provider.

View solution in original post

2 Replies 2

olorunloba
Level 5
Level 5

It is not a security or firewall issue. The access-list is part of your NAT configuration. It specifies the address that should be translated. These are your relevant NAT configuration.

interface Ethernet0

desc to cable modem

ip address dhcp

ip nat outside

interface Ethernet1

desc to Cisco WS-C2912-XL

ip address 192.168.1.1 255.255.255.0

ip nat inside

ip nat inside source list 1 interface Ethernet0 overload

access-list 1 permit 192.168.1.0 0.0.0.255

The 1 in the following line

ip nat inside source list 1 interface Ethernet0 overload

refers to access-list 1. And in your config, it is translated to the address of E0 which is obtained via DHCP from your provider.

Wow. I thought I understood my NAT config. I was not expecting that. Thank you very much for explaining that to me.

The more you think you know, the more realize you dont know :)