NAT ACL With Multiple Port Range

Hi Experts!

Hope everyone is well?

Currently we have the following setup on our Gateway Router:-

interface FastEthernet0/0
 ip address 98.152.29.154 255.255.255.252
 ip access-group NAT-ACL in
 ip nat outside
 ip inspect tgefw out

interface FastEthernet0/1.101
 encapsulation dot1Q 101 native
 ip address 10.2.1.1 255.255.255.0
 ip helper-address 10.2.1.101
 ip helper-address 10.2.1.102
 ip nat inside
 ip virtual-reassembly
!
interface FastEthernet0/1.102
 encapsulation dot1Q 102
 ip address 10.2.2.1 255.255.255.0
 ip helper-address 10.2.2.20
 ip helper-address 10.2.2.21
 ip nat inside
 ip virtual-reassembly
!
ip nat inside source list NAT-ACL interface FastEthernet0/0 overload
ip nat inside source static tcp 10.2.1.101 80 98.152.29.154 80 extendable
!
ip access-list extended IPFW-ACL
 permit tcp any host 10.2.1.101 eq www
 permit tcp any any gt 1023 established
 permit tcp any any eq domain
 permit udp any any eq domain
 permit icmp any any administratively-prohibited
 permit icmp any any echo-reply
 permit icmp any any packet-too-big
 permit icmp any any time-exceeded
 permit icmp any any traceroute
 permit gre any any
 deny   ip any any log
!
ip access-list extended NAT-ACL
 permit ip 10.2.1.0 0.0.0.255 any
 permit ip 10.2.2.0 0.0.0.255 any
 permit ip 10.2.4.0 0.0.0.255 any
 permit ip 10.2.110.0 0.0.0.255 any
 permit ip 10.2.190.0 0.0.0.255 any
 permit ip 10.2.200.0 0.0.0.255 any

What i now need to do is open up a range of Ports - something like:-

ip nat inside source static tcp 10.2.1.101 ** Port 7060 - 8010 ** 98.152.29.154 ** Port 7060 - 8010 ** extendable.

How would i go about this as i cant seem to find anything that will allow it - other than typing out each port on its own?

Cheers
TME
LVL 1
TrustGroup-UAEAsked:
Who is Participating?
 
max_the_kingCommented:
Hi,
you may want to try something as suggested in the following link: it seems reasonable although you'll have to work a bit on it.

http://networkengineering.stackexchange.com/questions/2238/open-a-range-of-tcp-ports-in-cisco-ios-nat

let me know if it works for you
hope this helps
max
0
 
max_the_kingCommented:
Hi,

have you tried something like:

ip access-list extended yourACL
permit tcp any any range 7060 8010

hope this helps
max
0
 
TrustGroup-UAEAuthor Commented:
Hi Max The King,

Many Thanks for your reply. Its not the ACL that is the rpoblem its this bit:-

ip nat inside source static tcp 10.2.1.101 ** Port 7060 - 8010 ** 98.152.29.154 ** Port 7060 - 8010 ** extendable.

you just cant seem to do Ranges?

Cheers
Si
0
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

 
max_the_kingCommented:
Hi, i am afraid there is no way to do that with nat statements
Max
0
 
TrustGroup-UAEAuthor Commented:
Hi Max The King,

Ah. Thats why i cant find anything then.

It there any work arounds to get around this then?

Cheers
TME
0
 
TrustGroup-UAEAuthor Commented:
Hi Max!

Excellent. Just what i was after.

Cheers
TME
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.