[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 562
  • Last Modified:

Cisco 5505 NAT Question

This should be an easy one for the experts out there...  I'm a beginner on Cisco devices and looking for the right commands to run to accomplish what I need to do.  

I have port forwarding set up and it was working but now one of the internal devices has changed IP addresses and I need to change the route to reflect the change...

I had:
static (inside,outside) tcp interface 8080 192.168.10.245 www netmask 255.255.255.255

And now the internal IP is not .245,  but .246 and I need to get it changed.

I also need to set up additional ports forwarding to additional internal IPs so if you could help me with the access lists, that would be great.  Currently, they look like this:

access-list outside_in extended permit tcp any host <outside address> eq 8080

Thank you!
Don
0
dcotriss
Asked:
dcotriss
1 Solution
 
Ken BooneNetwork ConsultantCommented:
config t
no static (inside,outside) tcp interface 8080 192.168.10.245 www netmask 255.255.255.255
static (inside,outside) tcp interface 8080 192.168.10.246 www netmask 255.255.255.255
Also issue the following command to clear the translation table:
clear xlate

To add addition entries do this

static (inside,outside) tcp interface xxx 192.168.10.yyy zzz netmask 255.255.255.255

xxx = dest port that something external will use to hit
yyy = last octet of internal host that will receive the request
zzz = dest port that the internal host will respond to

note xxx can be the same as yyy

For the ACL do this:

access-list outside_in extended permit tcp any host <outside address> eq 8080

just add a line for the new entry and change 8080 to whatever was xxx in the above example.
0
 
Ernie BeekExpertCommented:
Remember that for the additional ports you don't only need an ACL entry but a static as wel:

static (inside,outside) tcp interface/outside_addres outside_port inside.address inside_port netmask 255.255.255.255

access-list outside_in extended permit tcp any host outside_address eq outside_port
0
 
dcotrissAuthor Commented:
Thank you guys...
0

Featured Post

Firewall Management 201 with Professor Wool

In this whiteboard video, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. Watch and Learn!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now