Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
falz
Jan 29, 2005

01100110 01100001 01101100 01111010

para posted:

I had a WRT54G linksys a while back, and I have a DNS entry for my global IP called, say, para.com. On one of the computers on my LAN I'm running a web server on port 80, but I noticed a lot of buffer overflow attempts coming from the outside so I set my router to statically NAT from para.com:85 to 192.168.1.108:80.

With the linksys, while inside the LAN, I was still able to access 192.168.1.108:80 by opening a browser and going to para.com:85, which was great in case a web application I was running required the address to be hardcoded to the global address.

Now I have a cisco 871, which is a great router, but this particular feature is no longer functioning. It appears that if I try to go to para.com:85, it routes to the fa4 (WAN) port and stops there rather than being looped back around and NAT'ed out.

Is there a way to configure my cisco to be able to perform this type of action?
The only way that you can really fix this up is to do so at the DNS level. I would recommend making your router your LAN's DNS server and creating host (A) entries there. You of course must then point your local machines to your router's internal IP for dns. It will do caching lookups for you and should work fine.

code:
router(config)# ip domain lookup
router(config)# ip name-server 4.2.2.2
router(config)# ip name-server 4.2.2.3

router(config)# ip dns server
router(config)# ip host para.com 192.168.1.108
router(config)# ip host www.para.com 192.168.1.108
Replace 4.2.2.x above with your ISPs dns servers if you'd prefer to use them. This likely also makes your WAN ip a dns server. You may want to filter incoming DNS requests here or at least test it out. Cisco docs on this.

A simpler way would be to just edit your local hosts file for the IP, but I never recommend doing this as it's easily forgotten.

Adbot
ADBOT LOVES YOU

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

hybr1d posted:

Can you tell me how? The UI seems to require a 3rd party Web Filter server/appliance to handle URL filtering. I need to block certain URLs and for a couple IPs, only allow a handful of URLs.

Is NBAR on ASA? If so that should do the trick (use regexp rules to block certain URLs).

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

jwh posted:

Have you seen similar behavior outside the T train? T train is the pain train.

12.4(15)T8 is allegedly decent, at least compared to other 12.4T's- It's 12.5. I'm surprized a 3600 can run that at all. 3620 ended at 12.3, 3640 at 12.4, and looks like 3660 at 12.5.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Powercrazy posted:

Basically I want to connect to my switch and shutdown or bring up an interface, by just running a simple command.
If you have an SNMP RW community set up, you can shut down interfaces via snmp. For the life of me I can't find a sample, but I know it can be done. With this, you could issue one command to shut or no shut an interface, as well as many other things. See the SNMP Object Navigator to find the correct OID for your device.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Martytoof posted:

Guys. I'm still kind of scratching my head here. This is basically a continuation on my last help for router recommendations.

I'm still building my CCNA lab but I've got an eye on CCNP in future so I want a few routers that will handle 12.4.

The economical options are basically a Maxed out 3640 or a 2600XM. Is there any advantage to going with a 2600XM over a 3640? The prices certainly heavily favour going with a 3640 64/16 and upgrading the memory. I mean, for the price of one 2600XM I can buy two or even three baseline 3640s each loaded with a NM1E2W, judging by a quick ebay scan.

Ciscokits seems to mix and match the 2600XM and 3640 in their Advanced CCNA/Starter CCNP kit.

I've been trying to do as much research as I can, but for the life of me I can't find a good reason why I'd go with a single 2600XM over two or three 3640s + a little cash to upgrade at this point.

The 3640's software end at 12.4, and 2600XM's can run newer images with more features, (such as 12.4T).

Other than that, a 3640 is more powerful:

http://www.cisco.com/web/partners/downloads/765/tools/quickreference/routerperformance.pdf

I probably would go with the 3640. It supports more NM's, is more powerful, and I really doubt anything in the CCNA refers to anything beyond 12.4. You'll also have lots of fun with the 3640 when you hose an IOS upgrade and have to do it over serial.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Your backup route won't actually kick in unless the ethernet interface facing that direction actually goes down. You can use IP SLA to track some service (ping 4.2.2.2 for example). If the response fails (cable modem down), it will change your route.

This was the first hit that google turned up for it and has a decent example:

http://www.inacom-sby.net/Shawn/post/2007/11/Cisco-IP-SLA-for-failover.aspx

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

jwh posted:

I should point out that that is different than the way Juniper does RDP on their IVE boxes, in that IVE based RDP simply calls the machines native mstsc.exe and directs it towards a local socket that is proxied through the SSL tunnel.

Although that process isn't entirely perfect either.
I was about to chime in and say that the Juniper SSLVPN boxes also supported some type of Java client for remote desktop as well, but I just tested from a non-windows workstation and it just says "This terminal session is not supported on your computer." Seems like a huge oversight on what is otherwise a stellar device. There are obviously workarounds as well, but that just seems odd to me.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

nex posted:

What is your routine when upgrading remote critical routers?

Personally I triple check the IOS image checksum, verify bootvar and all that. I also dump out BGP and multicast summaries so that I can verify that the routers come up in the same state that they went down in.

Any other neat tricks and quirks that might come in handy?
Modem connected to it and test the new image/config in Dynamips are the only two things that come to mind.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Sojourner posted:

"FreeBSD 4.10 (STABLE)
Kernel 2.6.27 on an i686
login:"
That's a linux kernel version, which has nothing to do with FreeBSD. You sure someone didn't just modify the banner to confuse people or be funny?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Sojourner posted:

It'd be more then a login banner change because the login prompt is different then IOS. Before I left work I checked the mac address that was associated with the IP and it was coming up as a cisco one, and did a quick nmap/zenmap scan and it said the telnet daemon was the cisco version.
Aye, Cisco does say "Username:" or "Password:". For what it's worth I enabled telnet for a moment on a FreeBSD box and it does say "login:". Really this doesn't mean much though. Hopefully someone didn't plant some sniffer on your network that just went haywire.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Weissbier posted:

Has anyone had success with the cisco anyconnect client? I don't know what I'm missing. We have an ASA 5540 running ASA 8.2(1)/ASDM 6.2(1)

The 5.0 client works fine; when I installed and ran the newer client I receive.

"Connection attempt has failed (timeout)."

I've read the installation guide at Cisco; I've googled and failed.

I've edited the .xml file, but there's a part where it asks for a hostname. Is it wanting a DNS resolvable record? Thanks for any help.
Isn't the XML file just for web bookmarks when you have it set to the "web portal" mode, instead of "always launch client only" mode? what does the "webvpn" section of your config look like?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Weissbier posted:

It is in production. I opened up the xml but I don't see a webvpn section. I'm really lost here - The only part I see that needs to be changed from the sample xml is:
The 'webvpn' section I was talking about is in the actual ASA's config, nothing related to XML at all.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Mierdaan posted:

Anyone want to give me a high-level overview of best practices for setting up a site-to-site VPN link between a PIX 515E and a 871 Integrated Services Router? The PIX is running 6.3(5), not sure about the 871 since it's at a remote site I haven't been to yet.
Should work just fine, be sure that the PIX has a 3des supported image. Fortunately Cisco gives away the licenses for it.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

huzzah posted:

This causes routes learned via iBGP to have a higher admin distance.

Default AD's for platforms are listed here:

http://www.inetdaemon.com/tutorials/internet/ip/routing/administrative_distance.shtml

OSPF defaults to 110, IBGP defaults to 200. If you want your point to point links to be advertised I would normally add another 'network' statement in your router ospf section for the /30's such as:

code:
router ospf 100
 network 192.168.1.206 0.0.0.0 area 0
Also you should use loopback addresses of your routers as BGP neighbors so they can neighbor up should one of the interfaces goes down, they can neighbor up in the other using the other links.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Mackieman posted:

Yeah, I figured that was part of the issue. Any ideas on how to resolve that little gem?
The subnet must be in wildcard format, for a /24, it must be 0.0.0.255:

code:
access-list 100 permit ip 10.0.0.0 0.0.0.255 any

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
That access list is sorely in need of some udp/53 for DNS to work.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

wolrah posted:

Wonderfully comforting when Cisco.com goes down and the entire Cisco-owned /24 it's in disappears from BGP. I know they're hosted by Akamai, but it kinda feels like if I called AT&T and got "The number you have dialed has been disconnected."
Yea I noticed that as well. The prefix for ns1.cisco.com as well as for https://www.cisco.com disappeared from bgp for at least an hour this morning. Funny you should mention AT&T since apparently Cisco is blaming it on some massive ATT bay area outage.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Tony Montana posted:

Ok I've been doing some reading.

The question is this, Cisco VPN vs MS VPN.

It doesn't look like it's just a question of L2TP vs IPSec anymore, as MS servers also support IPSec. Also IPSec itself apparently doesn't support user authentication in earlier implementations but now that's been addressed.

I know the Cisco VPN (using the Cisco VPN Client) seems to be more stable and more resilient to drop outs. It supports QoS (for data/voice) and you can do a ton of other with it like the RSA security tokens.

I'd like some experienced opinions on this detailing why (technically) the Cisco VPN is superior.
You could also do sort of a mix of both if you want. You could use the built in PPTP VPN client stuff in windows to authenticate to a Cisco router (maybe ASA?) without having to install 3rd party software in Windows. My only experience with an MS VPN (which I'm considering PPTP) is that it uses only windows authentication. Cisco uses a preshared key and can also authenticate to AD as well, so it may be *slightly* more secure unless a laptop is stolen.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Wyznewski posted:

I have a question about setting up a VPN to do certificate authentication on a PIX506. All the documentation I can find says you have to request a certificate from a third party, or use a Microsoft certificate authority server. Can anyone confirm that? Is there any way to self-sign a certificate on a Linux platform? Thanks.

Reference: http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080930f21.shtml
Openssl, available on almost any platform, can do this. You create your own CA then you can issue client certs, all self signed as in those documents. this page has the raw commands you need. I'm not sure where the 'CA.sh' file would be on your system, or if it would be there at all. There are also a few open projects to manage your own CA using openssl and fewer commands. If you only need a few certs, it's probably easy enough to just do from the CLI.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Casimirus posted:

Are there any good resources for EOL Cisco gear? The IOS Software Selector is useless for anything old and biased against switches, and the Feature Navigator is only a little better.

I've got a choice between a WS-C2950-24, a WS-C3548-XL-EN, and a WS-C2924M-XL-EN, any of those for free, and only one of those was in the feature navigator. Apparently the WS-C2950-24 can run 12.1(22)EA13, but to find information on the other two I had to google the model number + "show version" and dig through results, or browse IOS filesharing sites to see what images were available for download, just to figure out which versions they can run.

I'm leaning towards the WS-C2950-24, does anyone think different? I've got GNS/Dynamips for certification stuff, but I need a switch at home anyways, and if it can help for that, it's a bonus.
2950 is probably best. It has more features and still has software released. XL switches went EOL in 2003 and last date of support was April 2009. 2950's went EOL in October 2007 and the last date of support is Jan 2013.

You can browse switch software here which will give you release dates for each platform. You do of course need a CCO login. Getting a login is probably really what you nead. Just get support on the cheapest device you have, it shouldn't cost that much.

* http://tools.cisco.com/support/downloads/go/Redirect.x?mdfid=268438038

If it helps any, the latest are:

* 2900XL: "c2900xl-c3h2l9s-mz.120-5.WC17.bin Release Date: 10/Apr/2007"

* 3500XL: "c3500xl-c3h2s-mz.120-5.WC17.bin Release Date: 10/Apr/2007"

* 2950: "c2950-i6k2l2q4-mz.121-22.EA13.bin Release Date: 03/Mar/2009"

falz fucked around with this message at 18:23 on Sep 6, 2009

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Syano posted:

Just going to throw this out there. We bought several Dell switches a couple years back because the price points were so far apart we thought it made sense at the time. Since that purchase, 2 out of the three we bought have had problems of a hardware nature and required replacing. In the 4 years I have been in my current gig we have yet to lose a Cisco. I know its anecdotal but for us we wont buy anything else anymore.
The price of some 24port gigabit Dell switches was too appealing to pass up a year ago. Numerous spanning tree issues and limitations caused us to just replace them with 3750's.

We also had some older 2nd generation Dell switches that constantly died. The issue ended up being that the closet they were in was very hot and they were far less tolerant than Cisco or even HP for environmental issues. They also had some very bad bugs we had to call Dell about. They gave us some secret firmware that fixed the issue. However, this firmware isn't on Dell's website, no idea why it's not.

I would probably use a Dell switch at my house or in a small isolated single switch LAN environment, but not really anywhere else. I'm pretty sure they're just rebranded SMC's as well. Also the CLI is stupid because it groups settings for each port in different areas (vlan in one spot, description in another, duplex/speed in another).

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
The NM-1T3 is ~$2000 used? If money is an issue, get a PA-T3 or PA-2T3 (~$300 used) for a 7200. I see complete used 7206 VXR's w/ NPE-400 and PA-T3 cards for $2k on ebay, any reputable reseller will probably be in this ballpark. VXR's aren't EOL and will kick the snot out of a 2800. The only downside I see is that they're just physically larger (3u) vs 1-2u for a 2800.

Edit: I see that the NM-1A-T3 is much less than NM-1T3. Still recommending VXR.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

CrazyLittle posted:

The VXRs themselves are not EOL if you put a NPE-G1 or G2 in there. Support for the NPE400 is EOL from what we were told by our cisco rep. Also the -1A- cards are EOL too. They were replaced by A3 cards which cost significantly more. That still doesn't change the fact that 7200VXR's really are awesome little boxes for the money.
Wow, it looks like the NPE-400 went EOL/EOS 5 days ago. Still, it will have updates for 5 years. And yea a non-VXR chassis/NPE are also dirt cheap.

This is probably posted somewhere in this thread, but this page for hardware compatibility (and more) is a great reference:

* http://www.cisco.com/web/partners/tools/quickreference/

falz fucked around with this message at 19:03 on Sep 15, 2009

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

CrazyLittle posted:

How much NAT throughput can you get out of a Catalyst 3750? I've got a customer who wants to use fiber in his riser closet, and they rely on us to do their NAT'ing for them on 10mbps service.

OR, is there a better/cheaper device that would take an SX gbic and nat it out to Cat5 ethernet?
None, 3750's don't do NAT. You could get a media converter instead of a router supporting GBIC's if you wanted.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Also, GBIC's are more likely to be found on a switch. Plenty of older/cheap switches will support GBIC's. Have a VLAN on the switch that's a TX port to a router and the GBIC port and you're good.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

ragzilla posted:

We use nfsen - really depends what your goals are for netflow collection- for us it's just used for evaluating potential and existing peers. jwh's shop uses the solarwinds netflow package and seem to like it.
Seconding Nfsen. For an open source/free software it's quite good. Another open source option is to follow this tutorial which explains how to use several apps to get netflow data. I'm sure some commercial software will do a better job, but depending on your budget these options are worth testing.

We use both in our orginizataion. Nfsen will let you do tcpdump like syntax to get detail, the other tutorial will give you customizeable graphs and "top talkers" data that auto updates.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Sojourner posted:

Thanks for the recommendation! Nfsen is pretty great, while not as slick looking as solarwinds/wug etc it gets the job done and it doesn't look bad at all. I had it working all morning but managed to break the netflow on router with a command and I'm not entirely sure what it is.

That'll learn me for not keeping good config revisions, even on a testing system.
One other note on netflow. Be sure to put "ip route-cache flow" on all physical interfaces of the router. It should automatically get flows from subinterfaces if you use them. I didn't have this on all interfaces at some point so the data wasn't balanced out and was somewhat lopsided in my graphs.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Here a good comparison of x9xx routers and modules. While the aforementioned licensing issue will suck, at least they will have universal IOS images between the ISR platforms. They haven't updated their router performance pdf yet unfortunately.

Also the 1900 looks like some old 30s radio.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Ethereal/Wireshark will show CDP packets and is free.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Drumstick posted:

not enough memory

Use Cisco Feature Navigator in the future to download software. It will tell you the minimum RAM/Flash for your image as well as a bunch of other stuff.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

hermand posted:

kit
Some people use the word "kit" when it comes to Cisco gear. I see it used a lot on c-nsp as well but never felt like asking. My guess is it's region related?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Powercrazy posted:

Its probably because Cisco gear is known as expensive and whenever you have some expensive stuff (watches, labgear, a car, or mods for a car, etc) its some "expensive kit."
I have never heard of "kit" used in that way either. A "kit" to me is something that comes in pieces that you have to assemble or something that comes in many pieces, such as a "drum kit". I guess that sort of applies to some modular Cisco gear.

Anyway, on to a real question. My goal is to get MPLS working between various 6500s and 7200s w/ NPE-400's and FastEthernet interfaces, and one 2800 that has no user settable MTU. (MPLS requires > 1500 MTU).

OSPF requires MTU to match, and this is where I'm having the problem. 12.2SB on 7200s allow me to adjust MTU up to 1530 on FE's. These are connected to Gigabit interfaces on the 6500 that only allow an MTU setting of 9216 or 1500. The real IP on the 6500s lives on an SVI (vlan) interface. I also have one 2800 that's a member of area 0 that has no user settable MTU, so it's 1500. This 2800 will not partake in MPLS but since it's on the same subnet and in area 0, my goal is to get OSPF working @ MTU 1500 while the MPLS routers can operate at 1530 (max possible on 7200 FE's).

In dynamips I've been testing between 7200 & 2600 and found that:

- I can set 'ip ospf mtu-ignore' on the lower MTU side (2600) and OSPF works.

OR

- I can set 'ip mtu 1500' on the 7200 (which has mtu 1530) and OSPF works.

Clearly 'ip mtu 1500' is making the 7200's originating OSPF packets say it actually has an MTU of 1500. 'ip ospf mtu-ignore' does exactly what it sounds like. Does the 'ip mtu' command force the router to NEVER generate a packet that's larger than 1500 (generate as in OSPF neighbors, BGP peers)?

This works in an emulator but in real life I would suspect I'd have some OSPF packets that are larger than 1500 and possibly some problems due to that.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
This answers my question perfectly, and is pretty much what I suspected. Thanks.

falz posted:

mtu ospf mtu ospf..
I realized that I could shorten all of these details down to this:

Will setting "ip mtu 1500" on an interface ensure that packets created by this router (OSPF) will not be larger than 1500 or could it still create packets up to the interface's MTU setting ("mtu 1530")?

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

inignot posted:

One of the first things on Cisco's site for "ip mtu". I'm sure if you dig more some docs from a recent IOS will come up. Sounds roughly like a control plane vs data plane distinction.

http://www.cisco.com/en/US/docs/ios/12_2/ipaddr/command/reference/1rfip2.html#wp1081151
Yep, it works as I had hoped. I also asked in one other spot and got decent responses. For future reference it's just really easy to think of it this way: if you just set 'mtu' it will also adjust all other MTU values:

- ip mtu
- ipv6 mtu
- mpls mtu

From there you can feel free to set any of the above lower to keep that protocol happy. Also, 'ip mtu' shuld really be called 'ipv4 mtu'.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Powercrazy posted:

So I know this is the Cisco thread and all, but I'm looking for something (Cisco or otherwise) that can handle ~1500 dual homed servers with layer 2 adjacency with low latency multicast being the most important aspect.

The guy I'm working with came up with a non-elegant monstrosity of daisy chained 4200 juniper switches, but surely there is something better than that? Any ideas? Vendor/Price isn't particularly important, as long as they can keep up.

Force 10 (http://www.force10networks.com/products/ethernetsr.asp) is supposed to be quite good in the low latency department. I've never used them though. Edit: or why not just 6500s loaded with WS-X6748-GE-TX?

falz fucked around with this message at 03:11 on Jan 26, 2010

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

I have no expertise with Force10 gear, I just know that we have a customer that ditched some other switches (3750s? I don't remember) for some Force 10 gear. Customer claims that the F10's helped tremendously with latency issues in their database infrastructure which consists of a few racks of servers and SSD disk arrays/trays.

Having said that, those [hilarious] results were commissioned by Cisco and clearly it's worded as such. Hell there's a link to a video in it that allegedly shows the Force 10 gear overheating (I say allegedly because it doesn't play on my non-windows laptop). I'm not at all surprised that Cisco "won" that battle.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Powercrazy posted:

And now for something completely different. Anyone know of a "4-eyes" administration system. Where say any one of a group of people can make a change to any of the production devices, but the change won't be committed until one of the others approves it. Its not a trust issue, its an external auditing issue.

We only know of one application that will do it, tripwire, but we don't want to use that one. Any other suggestions?
We use BMC Configuration Automation for Networks for this. We bought it when it was called E-Netaware before BMC bought it. Also does auditing to ensure specific features are on or off in router configs, diffs configs, shows if someone made changes by hand, and a bunch of other things related to managing network equipment. It can be useful for some things but can get annoying for others. It is quite useful for things like adding a VLAN to a number of switches without using VTP, for example. It can also deploy IOS images but I've never used it for that since it seems too scary.

Another one I was evaluating is ManageEngine DeviceExpert. It's much cleaner and works better but it's missing a few features that we use from BCAN.

I'd say demo DeviceExpert first then try BCAN if it doesn't suffice.

falz fucked around with this message at 01:58 on Feb 3, 2010

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Something with a Prolific chipset, like this should work fine on anything. We use them on FreeBSD, Linux, OSX, Win32. Monoprice also has serial PCI cards if you wanted to put one in a machine.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

wang souffle posted:

Apparently some idiot is downloading public torrents on our corporate network. I assume it's easy to run a report on the amount of traffic done on each port over a certain time period?
If you are already collecting this data in some way with MRTG or Netflow, yes. If this is not already setup, no.

Adbot
ADBOT LOVES YOU

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Does it even route traffic? It looks like you're missing a NAT command. I'm guessing ACL 100 was intended for a nat command like:
code:
ip nat inside source list 100 interface FastEthernet0 overload
Then add a "deny" to ACL 100 between 10.0.0.0/24 and 192.168.2.0/24 before the "permit" line so traffic between those subnets isn't NAT'd.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply