Hi All,
I have just been tasked with connecting our small branch office to our main office via a VPN. We have a Cisco 831 router at each end. The maon office has a leasd line and the branch office has a cable broadband connection.
I have set both routers up and got a VPN tunnel working fine. I can ping all the machines at the branch office and the branch office can ping all the machines at the main office.
At the branch office, they have a device that needs to be accessed externally from the internet on port 7000.
I have set a static NAT up on the branch office router but it cannot be accessed from the internet. I can access it across the VPN but not externally if I try from home or somewhere like that.
This was all done using SDM.
Any help would be much appreciated as I am going up the wall trying to resolve this.
In summary, the device on port 7000 can be accessed over the VPN from the main office over the Easy VPN Tunnel. It can be accessed by any interna; machine but cannot be accessed from anywhere on the internet using the router ethernet1 address with port 7000.
The Branch Office Config is :-
Current configuration : 2476 bytes
!
version 12.3
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Branch
!
enable password *********
!
username ********* privilege 15 password 0 ********
no aaa new-model
ip subnet-zero
no ip domain lookup
ip domain name sme.int
ip name-server **.**.**.**
ip name-server **.**.**.**
ip dhcp excluded-address 172.16.25.254
ip dhcp excluded-address 172.16.25.25
ip dhcp excluded-address 172.16.25.253
!
ip dhcp pool CLIENT
import all
network 172.16.25.0 255.255.255.0
default-router 172.16.25.254
netbios-name-server 10.110.131.1 10.110.131.2
dns-server **.**.**.** **.**.**.**
!
!
ip audit notify log
ip audit po max-events 100
no ftp-server write-enable
!
crypto ipsec client ezvpn Smartest
connect auto
group ***** key 0 *******
mode network-extension
peer **.**.**.**
!
class-map match-any test_class_map_for_sdm
match dscp default
match protocol ip
!
interface Ethernet0
description connected to BRANCH
ip address 172.16.25.254 255.255.255.0
no cdp enable
crypto ipsec client ezvpn Smartest inside
!
interface Ethernet1
description connected to INTERNET
ip address dhcp
duplex auto
no cdp enable
crypto ipsec client ezvpn Smartest
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
duplex auto
speed auto
!
interface FastEthernet3
no ip address
duplex auto
speed auto
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
ip nat inside source static udp 172.16.25.25 7000 interface Ethernet1 7000
ip classless
ip route 0.0.0.0 0.0.0.0 Ethernet1
ip route 10.110.131.0 255.255.255.0 Ethernet1
ip route 192.168.252.0 255.255.255.0 Ethernet1
ip route 194.129.160.0 255.255.255.0 Ethernet1
ip route 194.129.161.102 255.255.255.255 Ethernet1
ip http server
ip http authentication local
ip http secure-server
!
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 172.16.25.0 0.0.0.255
no cdp run
!
line con 0
exec-timeout 120 0
no modem enable
line aux 0
line vty 0 4
exec-timeout 120 0
privilege level 15
password *****
login local
length 0
transport input telnet ssh
!
scheduler max-task-time 5000
!
end
I have just been tasked with connecting our small branch office to our main office via a VPN. We have a Cisco 831 router at each end. The maon office has a leasd line and the branch office has a cable broadband connection.
I have set both routers up and got a VPN tunnel working fine. I can ping all the machines at the branch office and the branch office can ping all the machines at the main office.
At the branch office, they have a device that needs to be accessed externally from the internet on port 7000.
I have set a static NAT up on the branch office router but it cannot be accessed from the internet. I can access it across the VPN but not externally if I try from home or somewhere like that.
This was all done using SDM.
Any help would be much appreciated as I am going up the wall trying to resolve this.
In summary, the device on port 7000 can be accessed over the VPN from the main office over the Easy VPN Tunnel. It can be accessed by any interna; machine but cannot be accessed from anywhere on the internet using the router ethernet1 address with port 7000.
The Branch Office Config is :-
Current configuration : 2476 bytes
!
version 12.3
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Branch
!
enable password *********
!
username ********* privilege 15 password 0 ********
no aaa new-model
ip subnet-zero
no ip domain lookup
ip domain name sme.int
ip name-server **.**.**.**
ip name-server **.**.**.**
ip dhcp excluded-address 172.16.25.254
ip dhcp excluded-address 172.16.25.25
ip dhcp excluded-address 172.16.25.253
!
ip dhcp pool CLIENT
import all
network 172.16.25.0 255.255.255.0
default-router 172.16.25.254
netbios-name-server 10.110.131.1 10.110.131.2
dns-server **.**.**.** **.**.**.**
!
!
ip audit notify log
ip audit po max-events 100
no ftp-server write-enable
!
crypto ipsec client ezvpn Smartest
connect auto
group ***** key 0 *******
mode network-extension
peer **.**.**.**
!
class-map match-any test_class_map_for_sdm
match dscp default
match protocol ip
!
interface Ethernet0
description connected to BRANCH
ip address 172.16.25.254 255.255.255.0
no cdp enable
crypto ipsec client ezvpn Smartest inside
!
interface Ethernet1
description connected to INTERNET
ip address dhcp
duplex auto
no cdp enable
crypto ipsec client ezvpn Smartest
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
duplex auto
speed auto
!
interface FastEthernet3
no ip address
duplex auto
speed auto
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
ip nat inside source static udp 172.16.25.25 7000 interface Ethernet1 7000
ip classless
ip route 0.0.0.0 0.0.0.0 Ethernet1
ip route 10.110.131.0 255.255.255.0 Ethernet1
ip route 192.168.252.0 255.255.255.0 Ethernet1
ip route 194.129.160.0 255.255.255.0 Ethernet1
ip route 194.129.161.102 255.255.255.255 Ethernet1
ip http server
ip http authentication local
ip http secure-server
!
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 172.16.25.0 0.0.0.255
no cdp run
!
line con 0
exec-timeout 120 0
no modem enable
line aux 0
line vty 0 4
exec-timeout 120 0
privilege level 15
password *****
login local
length 0
transport input telnet ssh
!
scheduler max-task-time 5000
!
end