02-02-2017 10:44 PM - edited 03-12-2019 04:28 AM
hi, i just bought a new cisco router4321, when i try to port forward vpn ports by using following command:
ip nat inside source static tcp 1723 public_ip LanVPNSvr_IP 1723
got a message "port 1723 is being used by the system", and i need to forward all following vpn ports, please help me with the right commands, thank you in advance:)
L2TP
IKE
GRE
PPTP
IKE-NAT
Solved! Go to Solution.
02-06-2017 12:04 PM
i tried pasting the two lines in at the same time, but it's still not cleared :(
i double checked with "sh run" didn't find any VPDN or PPTP, i can't shut down the outside interface now as i'm doing it remotely, have to try it till i attend it onsite, it was weird that it worked once ..
02-06-2017 12:06 PM
You may find that rebooting it will be enough.
02-06-2017 12:09 PM
reloading it now, hope got good luck ..
02-06-2017 12:16 PM
still the same:(
alternatively, how can i create an vpn username & password on the router instead?
02-06-2017 12:25 PM
PPTP is not a supported technology these days, so usually does not work on most router software.
If you like a like of pain, try this old Configuration Wizard I wrote, which can generate the code to enable PPTP on the router itself.
02-06-2017 12:33 PM
i think i will Remove all nat statments and configure static nat before nat overload.
02-07-2017 12:29 AM
i'm onsite now, how can i shut down the outside interface please?
02-07-2017 12:34 AM
currently:
interface GigabitEthernet0/0/0
description ##internet##
ip address wan_ip 255.255.255.252
ip nat outside
negotiation auto
02-07-2017 02:15 AM
"shutting down the outside interface" works, saved thank you :)
but still can't connect vpn from ouside, internal VPN works, when i show ip nat translation, couldn't find any gre connections, guess have to setup gre port forwarding, but "ip nat inside source static gre LanVPNSvr_IP public_ip returns error " invalid input detected at > mark" :(
02-06-2017 11:53 AM
cisco4321data(config)#do clear ip nat translation *
cisco4321data(config)#ip nat inside source static tcp LanVPNSvr_ip 1723 WAN_IP 1723 extendable
%Port 1723 is being used by system
02-06-2017 11:24 AM
"$port udp 4500 is being used by the system" error happens too :(
02-06-2017 11:42 AM
Have you got any "crypto" lines in your config, that might be enabling IPSec?
02-07-2017 05:41 AM
no "crypto" lines
02-07-2017 03:07 AM
shut down wan interface doesn't work on port forward config udp4500, still says being used by the system, how can :(?
command went ok with "access-list 101 permit gre host wan_ip host lan_ip" and " access-list 101 permit ip any any", but still can't port forward GRE
02-07-2017 05:52 AM
cisco4321data#sh run
Building configuration...
Current configuration : 2356 bytes
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
no platform punt-keepalive disable-kernel-core
!
hostname cisco4321data
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 5 xxx
enable password xxx
!
no aaa new-model
!
!
!
!
!
!
!
!
!
ip name-server 8.8.8.8
ip name-server 8.8.4.4
!
!
!
!
!
!
!
!
!
!
subscriber templating
multilink bundle-name authenticated
!
!
!
!
license udi pid XXX sn XXX
!
!
redundancy
mode none
!
!
!
ip tftp source-interface GigabitEthernet0
!
!
!
!
interface GigabitEthernet0/0/0
description ##internet##
ip address WAN_IP 255.255.255.252
ip nat outside
negotiation auto
!
interface GigabitEthernet0/0/1
description ##local network##
ip address 192.168.16.254 255.255.255.0
ip nat inside
negotiation auto
!
interface GigabitEthernet0
vrf forwarding Mgmt-intf
ip address 192.168.0.200 255.255.255.0
ip access-group 101 in
negotiation auto
!
ip default-gateway Gateway_Public_IP
ip nat inside source list 1 interface GigabitEthernet0/0/0 overload
ip nat inside source static tcp VPN_SVR_IP 47 WAN_IP 47 extendable
ip nat inside source static tcp VPN_SVR_IP 80 WAN_IP 80 extendable
ip nat inside source static tcp VPN_SVR_IP 443 WAN_IP extendable
ip nat inside source static udp VPN_SVR_IP 500 WAN_IP 500 extendable
ip nat inside source static tcp VPN_SVR_IP 1723 WAN_IP 1723 extendable
ip nat inside source static tcp 192.168.16.203 8888 WAN_IP 8888 extendable
ip nat inside source static tcp 192.168.16.203 46908 WAN_IP 46908 extendable
ip nat inside source static tcp 192.168.16.210 48394 WAN_IP 48394 extendable
ip nat outside source static tcp 192.168.16.250 9996 WAN_IP 9996 extendable
ip forward-protocol nd
no ip http server
no ip http secure-server
ip route 0.0.0.0 0.0.0.0 Gateway_Public_IP
!
!
access-list 1 permit 192.168.16.0 0.0.0.255
access-list 101 permit gre host WAN_IP host VPN_SVR_IP
access-list 101 permit ip any any
!
snmp-server community public RO
!
!
control-plane
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password 1300term
login
!
!
end
cisco4321data#
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide