Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello All, I have a fairly simple scenario where i am performing NAT to use internet on network and below is the configuration and I would like to Permit internet traffic on a single host and I have created an Extended access list but it doesn't work...
Hello, We have acquired a new company where we have cisco 892 router with 2 vlansVLAN2 AND VLAN 1VLAN2 PORT ON THE 892 ROUTER IS ON ETHERNET 7 VLAN 2 IP 192.168.10.1 WHICH IS CONNECTED TO ANOTHER CISCO CALL MANAGER EXPRESS ROUTER 3825 ON PORT GIG0...
Hello, I am new in the security and learning about the state full and stateless firewalls. I understand that with stateful firewalls, any outbound traffic is generally whitelisted so it can return by default since the firewall is aware of the sta...
Hello I have very simple configuration on cisco 892 k9 router to run dhcp configuration, but sadly its not working i did trying restart the service but didn't worked. please check the configurations.Router#sh runBuilding configuration...Current con...
Dear All, We have Sonic Wall Device connected in out Head Office and We have a branch office where we have a cisco 881-K9 router and we are trying to establish the site to site Connection over internet. The Head Office is having a Public static...
If you see the above configuration ip route is mentioned . My Question isIf there is any possibility to debug the access list and where where the packets are getting dropped ?
So you mean to say when your run PING command from cisco 892, it will send the ARP request on VLAN2 , then 3825 ON PORT ETHER 7 will reply and ping will happen.
access-list 101 permit tcp any eq 80 192.168.1.0 0.0.0.255 gt 1023The above statement says permit port 80 from internet to lan WHAT i dont understand is you are using gt 1023 which meanswell know portWhat if i dont use 1023 WHAT WILL happen ?
Thanks now the question is If I create this configurationinterface FastEthernet0/0ip address 20.20.20.1 255.255.255.0ip nat outside!interface FastEthernet0/1ip address 192.168.1.1 255.255.255.0ip nat inside!access-list 1 permit 192.168.1.0 0.0.0.255i...