GeneralDzur
Technical User
I could really use you guys' help...
We've been trying to get a static mapping (Port Forwarding) to allow requests hitting our Router's Public IP (xx.xx.197.134) on five certain ports to be forwarded to an internal server 192.168.25.6.
For some reason, the router does NAT fine, but when these ACL's are applied (below), it breaks the traffic. I'm at my wits end...I've been poring over these for 5 days. If anyone see's a flaw in these lists, please tell me.
\\\\\\\\\\\\\\\BEGIN////////////////
service timestamps debug uptime
service timestamps log uptime
service password-encryption
no service udp-small-servers
no service tcp-small-servers
!
hostname 818NAT
!
logging buffered
no logging console
enable secret XXXXX
!
!
!
!
ip subnet-zero
ip source-route
ip flow-cache entries 4029
ip flow-cache timeout active 5
ip cef
no ip domain-lookup
!
!
!
!
!
!
interface Ethernet0/0
description INTERNET
ip address xx.xx.197.134 255.255.255.252
ip access-group Web-FTP-in in
no ip unreachables
no ip accounting access-violations
ip nat outside
no ip route-cache flow
no ip mroute-cache
no cdp enable
!
interface Ethernet0/1
description Internal LAN
ip address 192.168.25.1 255.255.255.0
ip access-group Web-FTP-out in
ip nat inside
no ip route-cache flow
no ip mroute-cache
speed 100
full-duplex
!
ip nat inside source list 1 interface Ethernet0/0 overload
ip nat outside source static xx.xx.197.134 192.168.25.6
ip classless
ip route 0.0.0.0 0.0.0.0 xx.xx.197.133
no ip http server
!
ip access-list extended Web-FTP-in
remark ### COUNTRY BLOCKS ###
remark - Korea Networks TLH 3 Dec 01
deny ip 128.134.0.0 0.0.255.255 any log
deny ip 147.46.0.0 0.0.255.255 any log
deny ip 134.75.0.0 0.0.255.255 any log
! -- CONTENT REMOVED FOR BREVITY
! -- NOT ESSENTIAL TO CONFIG
! -- JUST AN IP BLOCK-LIST
deny ip host 206.67.134.135 any log
deny ip host 65.54.252.230 any log
deny ip host 160.130.13.106 any log
deny ip host 128.190.218.198 any log
deny ip 10.0.0.0 0.255.255.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 172.0.0.0 0.240.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any unreachable
! -- ***This is the attempted NAT port forward***
! --
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 range 4350 4351
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 eq 5052
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 eq 5601
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 eq 9998
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 range 4350 4351
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 eq 5052
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 eq 5601
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 eq 9998
permit tcp any gt 1023 host xx.xx.197.134 eq 443
permit tcp any gt 1023 host xx.xx.197.134 eq 80
permit tcp any gt 1023 host xx.xx.197.134 eq 110
permit tcp any gt 1023 host xx.xx.197.134 eq 995
permit tcp any gt 1023 host xx.xx.197.134 eq 25
permit tcp any gt 20 host xx.xx.197.134 eq 21
permit tcp xx.xx.150.100 host xx.xx.197.134 eq 23
permit tcp xx.xx.197.162 host xx.xx.197.134 eq 23
deny ip any any log
!
ip access-list extended Web-FTP-out
permit icmp host 192.168.25.6 140.175.248.0 0.0.0.255 echo-reply
permit icmp host 192.168.25.6 140.175.248.0 0.0.0.255 time-exceeded
permit icmp host 192.168.25.6 140.175.248.0 0.0.0.255 unreachable
permit icmp host 192.168.25.6 134.135.1.128 0.0.0.127 echo-reply
permit icmp host 192.168.25.6 134.135.1.128 0.0.0.127 time-exceeded
permit icmp host 192.168.25.6 134.135.1.128 0.0.0.127 unreachable
permit icmp host 192.168.25.6 host xx.xx.197.133 echo-reply
permit icmp host 192.168.25.6 host xx.xx.197.133 time-exceeded
permit icmp host 192.168.25.6 host xx.xx.197.133 unreachable
deny icmp 192.168.25.6 any log
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any unreachable
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 4100
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 4300
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 4351
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 5051
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 5600
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 9999
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 4100
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 4300
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 4351
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 5051
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 5600
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 9999
permit tcp 192.168.25.0 0.0.0.255 any eq 80
permit tcp 192.168.25.0 0.0.0.255 any eq 25
permit tcp 192.168.25.0 0.0.0.255 any eq 110
permit tcp 192.168.25.0 0.0.0.255 any eq 995
permit tcp 192.168.25.0 0.0.0.255 any eq 443
permit tcp host 192.168.25.2 any eq 21
deny ip any any log
!
access-list 1 remark ***Internal NAT pool***
access-list 1 permit 192.168.25.0 0.0.0.255
access-list 10 remark ***Allowed Telnet Hosts***
access-list 10 permit xx.xx.150.100
access-list 10 permit xx.xx.197.162
!
line con 0
exec-timeout 0 0
line aux 0
line vty 0 4
access-class 10 in
password XXXXXXX
login
!
no scheduler allocate
end
We've been trying to get a static mapping (Port Forwarding) to allow requests hitting our Router's Public IP (xx.xx.197.134) on five certain ports to be forwarded to an internal server 192.168.25.6.
For some reason, the router does NAT fine, but when these ACL's are applied (below), it breaks the traffic. I'm at my wits end...I've been poring over these for 5 days. If anyone see's a flaw in these lists, please tell me.
\\\\\\\\\\\\\\\BEGIN////////////////
service timestamps debug uptime
service timestamps log uptime
service password-encryption
no service udp-small-servers
no service tcp-small-servers
!
hostname 818NAT
!
logging buffered
no logging console
enable secret XXXXX
!
!
!
!
ip subnet-zero
ip source-route
ip flow-cache entries 4029
ip flow-cache timeout active 5
ip cef
no ip domain-lookup
!
!
!
!
!
!
interface Ethernet0/0
description INTERNET
ip address xx.xx.197.134 255.255.255.252
ip access-group Web-FTP-in in
no ip unreachables
no ip accounting access-violations
ip nat outside
no ip route-cache flow
no ip mroute-cache
no cdp enable
!
interface Ethernet0/1
description Internal LAN
ip address 192.168.25.1 255.255.255.0
ip access-group Web-FTP-out in
ip nat inside
no ip route-cache flow
no ip mroute-cache
speed 100
full-duplex
!
ip nat inside source list 1 interface Ethernet0/0 overload
ip nat outside source static xx.xx.197.134 192.168.25.6
ip classless
ip route 0.0.0.0 0.0.0.0 xx.xx.197.133
no ip http server
!
ip access-list extended Web-FTP-in
remark ### COUNTRY BLOCKS ###
remark - Korea Networks TLH 3 Dec 01
deny ip 128.134.0.0 0.0.255.255 any log
deny ip 147.46.0.0 0.0.255.255 any log
deny ip 134.75.0.0 0.0.255.255 any log
! -- CONTENT REMOVED FOR BREVITY
! -- NOT ESSENTIAL TO CONFIG
! -- JUST AN IP BLOCK-LIST
deny ip host 206.67.134.135 any log
deny ip host 65.54.252.230 any log
deny ip host 160.130.13.106 any log
deny ip host 128.190.218.198 any log
deny ip 10.0.0.0 0.255.255.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 172.0.0.0 0.240.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any unreachable
! -- ***This is the attempted NAT port forward***
! --
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 range 4350 4351
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 eq 5052
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 eq 5601
permit tcp 140.175.248.0 0.0.0.255 gt 1023 host xx.xx.197.134 eq 9998
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 range 4350 4351
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 eq 5052
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 eq 5601
permit tcp 134.135.1.128 0.0.0.127 gt 1023 host xx.xx.197.134 eq 9998
permit tcp any gt 1023 host xx.xx.197.134 eq 443
permit tcp any gt 1023 host xx.xx.197.134 eq 80
permit tcp any gt 1023 host xx.xx.197.134 eq 110
permit tcp any gt 1023 host xx.xx.197.134 eq 995
permit tcp any gt 1023 host xx.xx.197.134 eq 25
permit tcp any gt 20 host xx.xx.197.134 eq 21
permit tcp xx.xx.150.100 host xx.xx.197.134 eq 23
permit tcp xx.xx.197.162 host xx.xx.197.134 eq 23
deny ip any any log
!
ip access-list extended Web-FTP-out
permit icmp host 192.168.25.6 140.175.248.0 0.0.0.255 echo-reply
permit icmp host 192.168.25.6 140.175.248.0 0.0.0.255 time-exceeded
permit icmp host 192.168.25.6 140.175.248.0 0.0.0.255 unreachable
permit icmp host 192.168.25.6 134.135.1.128 0.0.0.127 echo-reply
permit icmp host 192.168.25.6 134.135.1.128 0.0.0.127 time-exceeded
permit icmp host 192.168.25.6 134.135.1.128 0.0.0.127 unreachable
permit icmp host 192.168.25.6 host xx.xx.197.133 echo-reply
permit icmp host 192.168.25.6 host xx.xx.197.133 time-exceeded
permit icmp host 192.168.25.6 host xx.xx.197.133 unreachable
deny icmp 192.168.25.6 any log
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any unreachable
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 4100
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 4300
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 4351
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 5051
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 5600
permit tcp host 192.168.25.6 140.175.248.0 0.0.0.255 eq 9999
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 4100
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 4300
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 4351
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 5051
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 5600
permit tcp host 192.168.25.6 134.135.1.128 0.0.0.127 eq 9999
permit tcp 192.168.25.0 0.0.0.255 any eq 80
permit tcp 192.168.25.0 0.0.0.255 any eq 25
permit tcp 192.168.25.0 0.0.0.255 any eq 110
permit tcp 192.168.25.0 0.0.0.255 any eq 995
permit tcp 192.168.25.0 0.0.0.255 any eq 443
permit tcp host 192.168.25.2 any eq 21
deny ip any any log
!
access-list 1 remark ***Internal NAT pool***
access-list 1 permit 192.168.25.0 0.0.0.255
access-list 10 remark ***Allowed Telnet Hosts***
access-list 10 permit xx.xx.150.100
access-list 10 permit xx.xx.197.162
!
line con 0
exec-timeout 0 0
line aux 0
line vty 0 4
access-class 10 in
password XXXXXXX
login
!
no scheduler allocate
end