cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
689
Views
0
Helpful
4
Replies

INTERNET DOWN (CAN PING DEFAULT GATEWAY BUT CANT ACCESS INTERNET)

pmwita2017
Level 1
Level 1

Hi I have trouble accessing internet can ping the default gateway but can't access internet

Below is my config

Safetrac#show run
Building configuration...

Current configuration : 7363 bytes
!
! Last configuration change at 13:09:15 UTC Fri Nov 6 2020 by admin
version 15.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Safetrac
!
boot-start-marker
boot-end-marker
!
aqm-register-fnf
!
enable secret 5 $1$AHze$udjlzCPmdj9Scfe2cQSJT0
enable password cisco
!
no aaa new-model
!
!
!
!
!
!


!
ip dhcp excluded-address 10.10.10.1
ip dhcp excluded-address 192.168.0.1 192.168.0.99
ip dhcp excluded-address 192.168.0.3
ip dhcp excluded-address 192.168.0.4
!
ip dhcp pool safetrac
import all
network 192.168.0.0 255.255.255.0
default-router 192.168.0.1
dns-server 41.203.208.18 41.203.208.19 41.203.208.88
!
!
!
no ip domain lookup
ip domain name yourdomain.com
ip name-server 41.203.208.18
ip name-server 41.203.208.19
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
license udi pid C881-K9 sn FGL210120JF
!
!
vtp mode transparent
username admin password 0 @safetrac2018
!
!
!
!
!
vlan 1651
!
ip ssh version 1
!
class-map match-any P2P
match protocol bittorrent
!
policy-map P2P
class P2P
drop
!
!
!
!
!
!
!
!
!
!
!
interface Tunnel0
description TESTP2P_MSA
ip address 192.168.20.1 255.255.255.252
tunnel source 41.90.109.178
tunnel destination 197.231.179.110
!
interface FastEthernet0
description INTERNET_WAN_PORT
switchport access vlan 1651
no ip address
service-policy input P2P
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
no ip address
!
interface FastEthernet4
description SFC_INTERNET
ip address 41.215.19.226 255.255.255.252
ip nat outside
ip virtual-reassembly in
duplex full
speed 100
service-policy input P2P
!
interface Vlan1
description Deliverance LAN
ip address 192.168.0.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface Vlan1651
ip address 41.90.109.178 255.255.255.252
ip nat outside
ip virtual-reassembly in
service-policy input P2P
!
interface Dialer0
no ip address
!
interface Dialer1
no ip address
ip nat outside
ip virtual-reassembly in
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
no ip nat service sip tcp port 5060
no ip nat service sip udp port 5060
ip nat pool PORTFWD 192.168.0.6 192.168.0.6 netmask 255.255.255.0 type rotary
ip nat source static udp 192.168.0.166 15080 41.90.109.178 80 extendable
ip nat source static udp 192.168.0.6 15080 41.90.109.178 7336 extendable
ip nat inside source static udp 192.168.0.6 10000 interface Dialer0 10000
ip nat inside source static udp 192.168.0.6 12000 interface Dialer0 12000
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 192.168.1.77 20 interface FastEthernet4 20
ip nat inside source static tcp 192.168.0.202 443 interface Dialer1 443
ip nat inside source static tcp 192.168.0.202 443 interface Dialer0 443
ip nat inside source route-map AK interface FastEthernet4 overload
ip nat inside source route-map SAF interface Vlan1651 overload
ip nat inside source static tcp 192.168.0.166 80 41.90.109.178 80 extendable
ip nat inside source static tcp 192.168.0.201 443 41.90.109.178 443 extendable
ip nat inside source static tcp 192.168.0.201 2121 41.90.109.178 2121 extendable
ip nat inside source static tcp 192.168.0.201 2122 41.90.109.178 2122 extendable
ip nat inside source static tcp 192.168.0.201 2123 41.90.109.178 2123 extendable
ip nat inside source static tcp 192.168.0.201 2124 41.90.109.178 2124 extendable
ip nat inside source static tcp 192.168.0.201 2125 41.90.109.178 2125 extendable
ip nat inside source static tcp 192.168.0.201 9966 41.90.109.178 9966 extendable
ip nat inside source static tcp 192.168.0.201 9987 41.90.109.178 9987 extendable
ip nat inside source static tcp 192.168.0.201 9988 41.90.109.178 9988 extendable
ip nat inside source static udp 192.168.0.6 10000 41.90.109.178 10000 extendable
ip nat inside source static tcp 192.168.0.200 11000 41.90.109.178 11000 extendable
ip nat inside source static tcp 192.168.0.201 12000 41.90.109.178 12000 extendable
ip nat inside source static udp 192.168.0.6 12000 41.90.109.178 12000 extendable
ip nat inside source static tcp 192.168.0.6 7336 41.90.109.178 15080 extendable
ip nat inside source static udp 192.168.0.6 15080 41.90.109.178 15080 extendable
ip nat inside source static tcp 192.168.0.166 80 41.90.109.178 20163 extendable
ip nat inside source static tcp 192.168.0.201 33000 41.90.109.178 33000 extendable
ip nat inside source static tcp 192.168.0.201 33111 41.90.109.178 33111 extendable
ip nat inside source static tcp 192.168.0.201 33122 41.90.109.178 33122 extendable
ip nat inside source static tcp 192.168.0.201 33133 41.90.109.178 33133 extendable
ip nat inside source static tcp 192.168.0.201 33144 41.90.109.178 33144 extendable
ip nat inside source static tcp 192.168.0.201 33166 41.90.109.178 33166 extendable
ip nat inside source static tcp 192.168.0.201 33188 41.90.109.178 33188 extendable
ip nat inside source static tcp 192.168.0.201 36300 41.90.109.178 36300 extendable
ip nat inside source static tcp 192.168.0.201 36301 41.90.109.178 36301 extendable
ip nat inside source static 192.168.0.201 41.90.109.178
ip nat inside source static tcp 192.168.0.200 1100 41.215.19.216 80 extendable
ip nat inside source static tcp 192.168.0.200 11000 41.215.19.216 11000 extendable
ip nat inside source static tcp 192.168.1.166 80 41.215.19.226 80 extendable
ip nat inside source static tcp 192.168.0.6 7336 41.215.19.226 15080 extendable
ip nat inside source static udp 192.168.0.6 15080 41.215.19.226 15080 extendable
ip nat inside source static tcp 192.168.0.166 80 41.215.19.226 20163 extendable
ip nat inside source static 41.215.19.216 192.168.0.16
ip nat inside source static 41.90.109.178 192.168.0.200
ip nat inside destination list 100 pool PORTFWD
ip route 0.0.0.0 0.0.0.0 41.215.19.225
ip route 0.0.0.0 0.0.0.0 41.90.109.177 10
ip route 192.168.2.0 255.255.255.0 Tunnel0
!
ip access-list standard R&D
permit any
!
ip access-list extended PORTFWD
permit tcp any range 9101 9119 any
ip access-list extended netbios
deny tcp any any eq 135
deny tcp any any eq 137
deny udp any any eq netbios-ss
deny tcp any any eq 139
deny tcp any any eq 445
deny udp any any eq 445
deny udp any any eq 135
deny tcp any any eq 136
deny udp any any eq 136
deny udp any any eq netbios-ns
deny tcp any any eq 138
deny udp any any eq netbios-dgm
permit ip any any
!
!
route-map AK permit 10
match ip address 102
match interface FastEthernet4
!
route-map SAF permit 10
match ip address 103
match interface Vlan1651
!
route-map NAT permit 10
match ip address PORTFWD
!
snmp-server community S@far!com2 RW
snmp-server community safar!com RO
snmp-server enable traps tty
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 100 permit udp any any range 10000 20000
access-list 101 permit ip 192.168.0.0 0.0.0.255 any
access-list 102 permit ip 192.168.0.0 0.0.0.255 any
access-list 103 permit ip 192.168.0.0 0.0.0.255 any
!
control-plane
!
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
line con 0
no modem enable
line aux 0
line vty 0 4
password cisco
login local
transport input all
!
scheduler allocate 20000 1000
!
end

4 Replies 4

Hello,

 

what router is this on ? What model ? 

Cisco 800 series

There is a lot of redundant stuff in your configuration. What is the purpose of the extended Vlan 1651 ?

That is the config for portfowarding to outside I don't that is the issue
since I could access internet with the extended part
Review Cisco Networking products for a $25 gift card