Solved

Cisco 2610XM Static Mappings.

Posted on 2004-10-04
3
249 Views
Last Modified: 2010-04-10
Here's the scenario...

ISDN Line into office into Cisco 1720
Which connects to a PIX515E
That protects the 2610XM Router

The internal network has a mainfram on it that routes to a certain ip for the software application.

What I need to do is create a static map that routes all internal traffic to a external ip via the mainframe's internal ip to be used for disaster recovery.

I know it's using the nat mappings but seem to be unable to get the 2610 to pass traffic to the external ip.

Thanks in advance for the help.
0
Comment
Question by:rpone605
  • 2
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 150 total points
ID: 12220624
If you mean that the PIX515e has static nat mapping for a public IP of the mainframe, and you are trying to send traffic from the internal 2610 router to that public IP, it won't work. You would need to use the "alias" command on the PIX
http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aee.shtml
0
 
LVL 1

Author Comment

by:rpone605
ID: 12220729
That sounds exactly what I need.  I will attempt tommorow (it's at customer site) and mark this as answered if it works tommorow.
0
 
LVL 1

Author Comment

by:rpone605
ID: 12255784
Well this would work one way but not the way I wanted per cisco..thanks for your help it is a good bit of knowledge to have.
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now