cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
895
Views
0
Helpful
5
Replies

PROBLEMS WITH DYNAMIC NAT IN ROUTER CISCO

HELLO.

We are using nat dinamic in a router to gain access to internet.

When we use the command:

sh ip nat translation

we can see users using 3 or 4 ip nat static from the pool.

is it normal that some users use more tha 1 ip nat ip address or is probably a problem with threat, troyan, malware ?

This is appears in the screenshoot:

tcp 10.90.5.238:1449      10.2.132.24:1449      10.1.240.52:139       10.1.240.52:139

tcp 10.90.5.195:2382      10.2.132.24:2382      10.1.240.52:139       10.1.240.52:139

tcp 10.90.5.195:2384      10.2.132.24:2384      190.236.2.103:5938    190.236.2.103:5938

tcp 10.90.5.238:2394      10.2.132.24:2394      74.125.229.49:80      74.125.229.49:80

tcp 10.90.5.238:2397      10.2.132.24:2397      74.125.229.49:80      74.125.229.49:80

tcp 10.90.5.238:2399      10.2.132.24:2399      74.125.229.37:80      74.125.229.37:80

tcp 10.90.5.195:4500      10.2.132.24:4500      10.1.240.52:139       10.1.240.52:139

The configuration is as follow:

ip nat pool POOL_132 10.90.5.129 10.90.5.254 netmask 255.255.255.128

ip nat inside source route-map POOL_132 pool POOL_132 reversible

!
route-map POOL_132 permit 10
match ip address LAN_132
!

ip access-list extended LAN_132
permit ip 10.2.132.0 0.0.0.255 host 10.1.240.50
permit ip 10.2.132.0 0.0.0.255 host 10.1.240.51
permit ip 10.2.132.0 0.0.0.255 host 10.1.240.52
permit ip 10.2.132.0 0.0.0.255 host 10.1.240.53
permit ip 10.2.132.0 0.0.0.255 host 10.1.240.54
permit ip 10.2.132.0 0.0.0.255 host 10.1.240.55
deny   ip 10.2.132.0 0.0.0.255 10.1.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.16.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.23.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.17.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.61.1.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 10.61.2.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 10.246.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.203.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.213.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.207.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.234.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.100.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.110.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.111.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.144.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.120.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.130.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.150.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.152.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.160.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.184.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.163.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.183.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.242.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.3.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.4.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.49.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.5.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.52.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.60.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.60.3.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 10.7.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 10.72.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 172.16.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 172.17.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 172.18.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 172.24.111.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 172.26.101.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 172.30.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 192.168.0.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 192.168.2.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 192.168.4.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 192.168.104.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 192.168.1.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 192.168.13.0 0.0.0.255
deny   ip 10.2.132.0 0.0.0.255 host 184.50.214.54
deny   ip 10.2.132.0 0.0.0.255 host 190.12.83.141
deny   ip 10.2.132.0 0.0.0.255 host 192.168.106.133
deny   ip 10.2.132.0 0.0.0.255 host 192.168.92.20
deny   ip 10.2.132.0 0.0.0.255 host 192.168.60.6
deny   ip 10.2.132.0 0.0.0.255 host 192.168.60.8
deny   ip 10.2.132.0 0.0.0.255 host 192.168.60.22
deny   ip 10.2.132.0 0.0.0.255 host 192.168.20.23
deny   ip 10.2.132.0 0.0.0.255 host 192.168.103.10
deny   ip 10.2.132.0 0.0.0.255 host 192.168.105.12
deny   ip 10.2.132.0 0.0.0.255 host 192.168.105.10
deny   ip 10.2.132.0 0.0.0.255 host 192.168.106.21
deny   ip 10.2.132.0 0.0.0.255 host 192.168.106.16
deny   ip 10.2.132.0 0.0.0.255 10.243.0.0 0.0.255.255
deny   ip 10.2.132.0 0.0.0.255 host 192.168.2.47
deny   ip host 10.2.101.35 host 200.106.48.149
permit ip 10.2.132.0 0.0.0.255 any

If this behaviro is normal, plesea advise me.

Thanking you in advance,

Best regard.

Roger Majo

1 Accepted Solution

Accepted Solutions

Perhaps your user uses some websites with a lot of ads.  Some pages are riddled with them.  I'd consider that as a possibility as well.  May just be normal browsing, just not the best choice of sites.

View solution in original post

5 Replies 5

Roman Rodichev
Level 7
Level 7

it's very normal. On average, a typical user will have 10-20 TCP sessions open at a time

Roman,

That is rigth.

However we are monitoring this POOL every day and sometimes there are users that have more than 80 open connections and we think this is not normal.

What we do is to put this host in quarentiny using this command:

  • ip nat translation max-entries host 10.2.132.109 40

we are limiting the number of connection to only 40.

But the problem is alive and not resolved.

Do you think the problem can be threat, bot, mlaware or troyans in the pc?

Waiting your answer.

Roger Majo

are those conections going to port 80? If so, try this tool on one of the PCs

http://www.httpdebugger.com/

Close all browser sessions and watch if PC opens any port 80 sessions and where they go. If you know what application does that, close that app, and see if you can find some process on the PC doing the bad thing.

They could be running some limewire or torrents.

Roman,

Effectively those connections are going to port 80 and others to: 443, 25 and 139.

Those are the most connections port always present in ip nat connections.

I think this tool is very usefull to diagnostic http problems when the workstations are local.

But can we do if the problem is located in a remote site?

Do you have a tool which can help us to do the same things but in a remote PC from a central site?

Do you have a toll to do the same type of analisis but with port: 443, 25 and 139?

If we use this link:

http://www.speedguide.net/port.php?port=80

we can see that port: 80, 443, 25 and 139 can be exploted by TROYANS.

How can we diagnostic that this ports and free of troyans?

We are using QUALYS to find vulnerabilities but how can we diagnostic TROYANS in PC?

Thanking in advance your sooner answer.

Attentively.

Roger Majo

Perhaps your user uses some websites with a lot of ads.  Some pages are riddled with them.  I'd consider that as a possibility as well.  May just be normal browsing, just not the best choice of sites.

Review Cisco Networking for a $25 gift card