Solved

Cisco 5505 NAT Question

Posted on 2013-01-22
3
552 Views
Last Modified: 2013-01-22
This should be an easy one for the experts out there...  I'm a beginner on Cisco devices and looking for the right commands to run to accomplish what I need to do.  

I have port forwarding set up and it was working but now one of the internal devices has changed IP addresses and I need to change the route to reflect the change...

I had:
static (inside,outside) tcp interface 8080 192.168.10.245 www netmask 255.255.255.255

And now the internal IP is not .245,  but .246 and I need to get it changed.

I also need to set up additional ports forwarding to additional internal IPs so if you could help me with the access lists, that would be great.  Currently, they look like this:

access-list outside_in extended permit tcp any host <outside address> eq 8080

Thank you!
Don
0
Comment
Question by:dcotriss
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 25

Accepted Solution

by:
Ken Boone earned 500 total points
ID: 38807114
config t
no static (inside,outside) tcp interface 8080 192.168.10.245 www netmask 255.255.255.255
static (inside,outside) tcp interface 8080 192.168.10.246 www netmask 255.255.255.255
Also issue the following command to clear the translation table:
clear xlate

To add addition entries do this

static (inside,outside) tcp interface xxx 192.168.10.yyy zzz netmask 255.255.255.255

xxx = dest port that something external will use to hit
yyy = last octet of internal host that will receive the request
zzz = dest port that the internal host will respond to

note xxx can be the same as yyy

For the ACL do this:

access-list outside_in extended permit tcp any host <outside address> eq 8080

just add a line for the new entry and change 8080 to whatever was xxx in the above example.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 38807159
Remember that for the additional ports you don't only need an ACL entry but a static as wel:

static (inside,outside) tcp interface/outside_addres outside_port inside.address inside_port netmask 255.255.255.255

access-list outside_in extended permit tcp any host outside_address eq outside_port
0
 

Author Comment

by:dcotriss
ID: 38807466
Thank you guys...
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
This past year has been one of great growth and performance for OnPage. We have added many features and integrations to the product, making 2016 an awesome year. We see these steps forward as the basis for future growth.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question