Solved

NAT Cisco 2500 Series

Posted on 2006-06-13
4
1,818 Views
Last Modified: 2012-06-27
Trying to  learn cisco, working with a 2514 router, trying to setup NAT. What is wrong with my config listed below.

from 10.10.10.2 I can ping 10.10.10.1 and 192.168.11.107 (DHCP Assigned) , but not beyond on the 192.168.11.0/24 network and vice/versa.

The router is running 12.2(3) Software.

interface Ethernet0
 ip address dhcp
 ip nat outside
!
interface Ethernet1
 ip address 10.10.10.1 255.255.255.0
 ip nat inside
!
interface Serial0
 no ip address
 shutdown
!
interface Serial1
 no ip address
 shutdown
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.11.1
no ip http server
!
access-list 1 permit 192.168.11.0 0.0.0.255
0
Comment
Question by:jcs5003
  • 2
4 Comments
 
LVL 9

Expert Comment

by:robinluo
ID: 16901615
you are missing the IP NAT command, which could be like this:

ip nat inside source list 1 interface e0 overload

The command can be varied depend on your preference.
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 16902415
ip nat inside source list 2 interface e0 overload

access-list 2 permit 10.10.10.0 0.0.0.255

Cheers,
Rajesh
0
 
LVL 2

Author Comment

by:jcs5003
ID: 16903013
rsivanandan

your answer worked, thanks alot....can you explain these commands? how does the source list reference the different interfaces? ( source list 2 = e0 ??)

0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 250 total points
ID: 16903557
I'll try to explain it simple;

You have 'ip nat inside' on the e1 interface and 'ip nat outside' on the e0 interface which tells the traffic coming from e1 and going out through e0 should be natted.

Now;

ip nat inside source list 2 int e0 overload

What this tells the router is that, any traffic that matches the access-list 2 should be patted using inteface e0's ip address.

The access-list 2 makes sure that all the hosts inside your network or in other words, all machines in 10.10.10.x network will match it.

Hope that is clear enough.

Cheers,
Rajesh
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

New Server 172.16.200.2  was moved from behind Router R2 f0/1 to behind router R1 int f/01 and has now address 172.16.100.2. But we want users still to be able to connected to it by old IP. How to do it ? We can used destination NAT (DNAT).  In DNAT…
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now