Hi there,
Could someone please explain why my email/web server can't connect to the outside world? This is proving a bit inconvenient for a box that's supposed to collect my POP3 mail!
Setup:
Cisco 837 ADSL Router
Dialer0 - ADSL I/F to ISP
Ethernet0 - internal LAN (192.168.4.0)
Ethernet2 - DMZ Interface (10.0.0.0)
Internal LAN (192.168.4.0) all works fine.
DMZ inbound http to 2 different ports on the server (10.0.0.2), 1 for IIS one for webmail, works fine.
But, the server (10.0.0.2) in the DMZ cannot connect to the outside at all. Hell, it can't even ping it's own router interface (10.0.0.1) - "destination net unreachable"
I'm kind of new to all this and have got where I am now by mostly trawling the net, but I just can't seem to crack this last bit.
Ideally, I want the server (10.0.0.2) to be able to access the outside world and be accessible FROM the internal (192.168.4.0) LAN, but not be able to connect TO it itself (is that even possible just using the Cisco kit? If not I can put a software firewall on, to enable 1 way traffic only).
As a relative newby, I would welcome all (constructive!) criticism of the following config
Thanks in advance,
Q.
=============================================
version 12.3
no service pad
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
service password-encryption
!
hostname router
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret 5 xxxxxxxxxxxxxxxxxxxxxx
enable password 7 xxxxxxxxxxxxxxxxxx
!
username xxxxxxxxxxx password 7 xxxxxxxxxxxxxxxxxxxxxx
username xxxxxxxxxxx privilege 15 password 7 xxxxxxxxxxxxxxxxxx
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local
aaa session-id common
ip subnet-zero
ip dhcp excluded-address 192.168.4.1 192.168.4.20
!
ip dhcp pool CLIENT
import all
network 192.168.4.0 255.255.255.0
default-router 192.168.4.1
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
lease infinite
!
!
no ip domain lookup
ip domain name myisp.net
ip name-server xxx.xxx.xxx.xxx
ip name-server xxx.xxx.xxx.xxx
ip name-server xxx.xxx.xxx.xxx
ip inspect name ethernetin cuseeme timeout 3600
ip inspect name ethernetin ftp timeout 3600
ip inspect name ethernetin h323 timeout 3600
ip inspect name ethernetin http timeout 3600
ip inspect name ethernetin rcmd timeout 3600
ip inspect name ethernetin realaudio timeout 3600
ip inspect name ethernetin smtp timeout 3600
ip inspect name ethernetin sqlnet timeout 3600
ip inspect name ethernetin streamworks timeout 3600
ip inspect name ethernetin tcp timeout 3600
ip inspect name ethernetin tftp timeout 30
ip inspect name ethernetin udp timeout 15
ip inspect name ethernetin vdolive timeout 3600
ip inspect name dmzinspect tcp
ip inspect name dmzinspect udp
ip ids po max-events 100
ftp-server enable
no ftp-server write-enable
!
!
!
!
!
!
!
interface Loopback0
no ip address
!
interface Ethernet0
description $FW_INSIDE$$ETH-LAN$
ip address 192.168.4.1 255.255.255.0
ip access-group 100 in
ip nat inside
ip virtual-reassembly
hold-queue 100 out
!
interface Ethernet2
description $FW_DMZ$
ip address 10.0.0.1 255.255.255.0
ip access-group 101 in
ip nat inside
ip inspect dmzinspect out
ip virtual-reassembly
hold-queue 100 out
!
interface ATM0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
dsl power-cutback 30
pvc 0/38
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
duplex auto
speed auto
!
interface FastEthernet3
no ip address
duplex auto
speed auto
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
interface Dialer0
description ADSL interface for PlusNet$FW_OUTSIDE$
ip address xxx.xxx.xxx.xxx 255.255.255.0
ip access-group 102 in
ip nat outside
ip inspect ethernetin in
ip inspect ethernetin out
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap callin
ppp chap hostname me@myisp.net
ppp chap password 7 xxxxxxxxxxxxxxxx
!
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
ip http server
ip http authentication local
ip http secure-server
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 10.0.0.2 25 xxx.xxx.xxx.xxx 25 extendable
ip nat inside source static tcp 10.0.0.2 80 xxx.xxx.xxx.xxx 80 extendable
ip nat inside source static tcp 10.0.0.2 110 xxx.xxx.xxx.xxx 110 extendable
ip nat inside source static tcp 10.0.0.2 143 xxx.xxx.xxx.xxx 143 extendable
ip nat inside source static tcp 192.168.4.2 3389 xxx.xxx.xxx.xxx 3389 extendable
ip nat inside source static udp 192.168.4.2 3389 xxx.xxx.xxx.xxx 3389 extendable
ip nat inside source static tcp 10.0.0.2 8888 xxx.xxx.xxx.xxx 8888 extendable
ip nat outside source list 102 interface Dialer0
!
!
no logging trap
access-list 1 permit 192.168.4.0 0.0.0.255
access-list 1 remark outbound rules for dialer0
access-list 100 remark inbound rules for ethernet0
access-list 100 deny ip xxx.xxx.xxx.0 0.0.0.255 any
access-list 100 deny ip 10.0.0.0 0.0.0.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 permit ip any any
access-list 101 remark inbound rules for ethernet2
access-list 101 permit ip any host 10.0.0.2
access-list 101 permit tcp any host 10.0.0.2
access-list 101 permit udp host xxx.xxx.xxx.xxx eq domain host 10.0.0.2
access-list 101 permit udp host xxx.xxx.xxx.xxx eq domain host 10.0.0.2
access-list 101 permit udp host xxx.xxx.xxx.xxx eq domain host 10.0.0.2
access-list 101 permit icmp any host 10.0.0.2 echo-reply
access-list 101 permit icmp any host 10.0.0.2 time-exceeded
access-list 101 permit icmp any host 10.0.0.2 unreachable
access-list 102 permit icmp host xxx.xxx.xxx.xxx any
access-list 102 deny ip 10.0.0.0 0.0.0.255 any
access-list 102 deny ip 127.0.0.0 0.255.255.255 any
access-list 102 deny ip 172.16.0.0 0.15.255.255 any
access-list 102 deny ip 192.168.0.0 0.0.0.255 any
access-list 102 deny ip host 255.255.255.255 any
access-list 102 deny ip host 0.0.0.0 any
access-list 102 permit icmp any host xxx.xxx.xxx.xxx echo-reply
access-list 102 permit icmp any host xxx.xxx.xxx.xxx time-exceeded
access-list 102 permit icmp any host xxx.xxx.xxx.xxx unreachable
access-list 102 permit udp host xxx.xxx.xxx.xxx eq domain host 81.174.134.163
access-list 102 permit udp host xxx.xxx.xxx.xxx eq domain host 81.174.134.163
access-list 102 permit udp host xxx.xxx.xxx.xxx eq domain host 81.174.134.163
access-list 102 permit gre host xxx.xxx.xxx.xxx any
access-list 102 permit ip host xxx.xxx.xxx.xxx any
access-list 102 permit udp host xxx.xxx.xxx.xxx any
access-list 102 permit tcp host xxx.xxx.xxx.xxx any
access-list 102 permit tcp any host xxx.xxx.xxx.xxx eq 8888
access-list 102 permit tcp any host xxx.xxx.xxx.xxx eq www
!
control-plane
!
!
line con 0
no modem enable
transport preferred all
transport output all
line aux 0
length 0
transport preferred all
transport input telnet ssh
transport output all
line vty 0 4
transport preferred all
transport input all
transport output all
!
scheduler max-task-time 5000
end
Could someone please explain why my email/web server can't connect to the outside world? This is proving a bit inconvenient for a box that's supposed to collect my POP3 mail!
Setup:
Cisco 837 ADSL Router
Dialer0 - ADSL I/F to ISP
Ethernet0 - internal LAN (192.168.4.0)
Ethernet2 - DMZ Interface (10.0.0.0)
Internal LAN (192.168.4.0) all works fine.
DMZ inbound http to 2 different ports on the server (10.0.0.2), 1 for IIS one for webmail, works fine.
But, the server (10.0.0.2) in the DMZ cannot connect to the outside at all. Hell, it can't even ping it's own router interface (10.0.0.1) - "destination net unreachable"
I'm kind of new to all this and have got where I am now by mostly trawling the net, but I just can't seem to crack this last bit.
Ideally, I want the server (10.0.0.2) to be able to access the outside world and be accessible FROM the internal (192.168.4.0) LAN, but not be able to connect TO it itself (is that even possible just using the Cisco kit? If not I can put a software firewall on, to enable 1 way traffic only).
As a relative newby, I would welcome all (constructive!) criticism of the following config
Thanks in advance,
Q.
=============================================
version 12.3
no service pad
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
service password-encryption
!
hostname router
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret 5 xxxxxxxxxxxxxxxxxxxxxx
enable password 7 xxxxxxxxxxxxxxxxxx
!
username xxxxxxxxxxx password 7 xxxxxxxxxxxxxxxxxxxxxx
username xxxxxxxxxxx privilege 15 password 7 xxxxxxxxxxxxxxxxxx
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local
aaa session-id common
ip subnet-zero
ip dhcp excluded-address 192.168.4.1 192.168.4.20
!
ip dhcp pool CLIENT
import all
network 192.168.4.0 255.255.255.0
default-router 192.168.4.1
dns-server xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx
lease infinite
!
!
no ip domain lookup
ip domain name myisp.net
ip name-server xxx.xxx.xxx.xxx
ip name-server xxx.xxx.xxx.xxx
ip name-server xxx.xxx.xxx.xxx
ip inspect name ethernetin cuseeme timeout 3600
ip inspect name ethernetin ftp timeout 3600
ip inspect name ethernetin h323 timeout 3600
ip inspect name ethernetin http timeout 3600
ip inspect name ethernetin rcmd timeout 3600
ip inspect name ethernetin realaudio timeout 3600
ip inspect name ethernetin smtp timeout 3600
ip inspect name ethernetin sqlnet timeout 3600
ip inspect name ethernetin streamworks timeout 3600
ip inspect name ethernetin tcp timeout 3600
ip inspect name ethernetin tftp timeout 30
ip inspect name ethernetin udp timeout 15
ip inspect name ethernetin vdolive timeout 3600
ip inspect name dmzinspect tcp
ip inspect name dmzinspect udp
ip ids po max-events 100
ftp-server enable
no ftp-server write-enable
!
!
!
!
!
!
!
interface Loopback0
no ip address
!
interface Ethernet0
description $FW_INSIDE$$ETH-LAN$
ip address 192.168.4.1 255.255.255.0
ip access-group 100 in
ip nat inside
ip virtual-reassembly
hold-queue 100 out
!
interface Ethernet2
description $FW_DMZ$
ip address 10.0.0.1 255.255.255.0
ip access-group 101 in
ip nat inside
ip inspect dmzinspect out
ip virtual-reassembly
hold-queue 100 out
!
interface ATM0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
dsl power-cutback 30
pvc 0/38
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
duplex auto
speed auto
!
interface FastEthernet3
no ip address
duplex auto
speed auto
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
interface Dialer0
description ADSL interface for PlusNet$FW_OUTSIDE$
ip address xxx.xxx.xxx.xxx 255.255.255.0
ip access-group 102 in
ip nat outside
ip inspect ethernetin in
ip inspect ethernetin out
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap callin
ppp chap hostname me@myisp.net
ppp chap password 7 xxxxxxxxxxxxxxxx
!
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
ip http server
ip http authentication local
ip http secure-server
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 10.0.0.2 25 xxx.xxx.xxx.xxx 25 extendable
ip nat inside source static tcp 10.0.0.2 80 xxx.xxx.xxx.xxx 80 extendable
ip nat inside source static tcp 10.0.0.2 110 xxx.xxx.xxx.xxx 110 extendable
ip nat inside source static tcp 10.0.0.2 143 xxx.xxx.xxx.xxx 143 extendable
ip nat inside source static tcp 192.168.4.2 3389 xxx.xxx.xxx.xxx 3389 extendable
ip nat inside source static udp 192.168.4.2 3389 xxx.xxx.xxx.xxx 3389 extendable
ip nat inside source static tcp 10.0.0.2 8888 xxx.xxx.xxx.xxx 8888 extendable
ip nat outside source list 102 interface Dialer0
!
!
no logging trap
access-list 1 permit 192.168.4.0 0.0.0.255
access-list 1 remark outbound rules for dialer0
access-list 100 remark inbound rules for ethernet0
access-list 100 deny ip xxx.xxx.xxx.0 0.0.0.255 any
access-list 100 deny ip 10.0.0.0 0.0.0.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 permit ip any any
access-list 101 remark inbound rules for ethernet2
access-list 101 permit ip any host 10.0.0.2
access-list 101 permit tcp any host 10.0.0.2
access-list 101 permit udp host xxx.xxx.xxx.xxx eq domain host 10.0.0.2
access-list 101 permit udp host xxx.xxx.xxx.xxx eq domain host 10.0.0.2
access-list 101 permit udp host xxx.xxx.xxx.xxx eq domain host 10.0.0.2
access-list 101 permit icmp any host 10.0.0.2 echo-reply
access-list 101 permit icmp any host 10.0.0.2 time-exceeded
access-list 101 permit icmp any host 10.0.0.2 unreachable
access-list 102 permit icmp host xxx.xxx.xxx.xxx any
access-list 102 deny ip 10.0.0.0 0.0.0.255 any
access-list 102 deny ip 127.0.0.0 0.255.255.255 any
access-list 102 deny ip 172.16.0.0 0.15.255.255 any
access-list 102 deny ip 192.168.0.0 0.0.0.255 any
access-list 102 deny ip host 255.255.255.255 any
access-list 102 deny ip host 0.0.0.0 any
access-list 102 permit icmp any host xxx.xxx.xxx.xxx echo-reply
access-list 102 permit icmp any host xxx.xxx.xxx.xxx time-exceeded
access-list 102 permit icmp any host xxx.xxx.xxx.xxx unreachable
access-list 102 permit udp host xxx.xxx.xxx.xxx eq domain host 81.174.134.163
access-list 102 permit udp host xxx.xxx.xxx.xxx eq domain host 81.174.134.163
access-list 102 permit udp host xxx.xxx.xxx.xxx eq domain host 81.174.134.163
access-list 102 permit gre host xxx.xxx.xxx.xxx any
access-list 102 permit ip host xxx.xxx.xxx.xxx any
access-list 102 permit udp host xxx.xxx.xxx.xxx any
access-list 102 permit tcp host xxx.xxx.xxx.xxx any
access-list 102 permit tcp any host xxx.xxx.xxx.xxx eq 8888
access-list 102 permit tcp any host xxx.xxx.xxx.xxx eq www
!
control-plane
!
!
line con 0
no modem enable
transport preferred all
transport output all
line aux 0
length 0
transport preferred all
transport input telnet ssh
transport output all
line vty 0 4
transport preferred all
transport input all
transport output all
!
scheduler max-task-time 5000
end