My network at work is bounded on both sides by Cisco routers. One Cisco is connected to the internet via T1 lines. The Ethernet interface is a public address (192.123.60.1) On the other side, I have a 3620 with 3 interfaces that connects to cablevision and is replacing my cablemodem router. It gets a DHCP address on the interface connected to cablevision. On another interface it supplies addresses to a 10 pc network and Nats. On the 3rd interface, I have the address 192.123.60.243, to provide a bridge between the two networks.
All functionality is working except the communication between the 192 and 10 networks. The can ping their respective interfaces, but they can't talk to each other.
Here is the configuration. I tried it without an acl on the inbound fe0/0 (cable) interface, without success.
------------------------------
Current configuration : 1775 bytes
!
version 12.2
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname 10router
!
boot system flash slot0:c3620-io3-mz.122-15.T12.bin
logging queue-limit 100
ip subnet-zero
!
!
ip name-server 192.123.60.2
ip name-server 192.123.60.173
ip name-server 66.88.81.177
ip dhcp excluded-address 10.1.1.1 10.1.1.100
ip dhcp excluded-address 10.1.1.254
ip dhcp pool 10network
network 10.1.1.0 255.255.255.0
default-router 10.1.1.1
dns-server 192.123.60.2 192.123.60.173 66.88.81.177
!
ip audit notify log
ip audit po max-events 100
!
interface FastEthernet0/0
ip address dhcp
ip access-group 101 in
ip nat outside
duplex auto
speed auto
interface FastEthernet0/1
ip address 10.1.1.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet1/0
ip address 192.123.60.243 255.255.255.0
shutdown
duplex auto
speed auto
!
interface FastEthernet1/1
no ip address
shutdown
duplex auto
speed auto
ip nat inside source list 1 interface FastEthernet0/0 overload
no ip http server
ip classless
ip route 0.0.0.0 0.0.0.0 FastEthernet0/0
!
access-list 1 permit 10.1.1.0 0.0.0.255
access-list 101 deny icmp any any log
access-list 101 deny tcp any any eq telnet log
access-list 101 deny tcp any any eq ftp log
access-list 101 deny tcp any any eq ftp-data log
access-list 101 deny ip 127.0.0.0 0.255.255.255 any log
access-list 101 deny ip 224.0.0.0 31.255.255.255 any log
access-list 101 deny ip 225.0.0.0 0.255.255.255 any log
access-list 101 deny ip host 0.0.0.0 any log
access-list 101 permit ip any any
All functionality is working except the communication between the 192 and 10 networks. The can ping their respective interfaces, but they can't talk to each other.
Here is the configuration. I tried it without an acl on the inbound fe0/0 (cable) interface, without success.
------------------------------
Current configuration : 1775 bytes
!
version 12.2
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname 10router
!
boot system flash slot0:c3620-io3-mz.122-15.T12.bin
logging queue-limit 100
ip subnet-zero
!
!
ip name-server 192.123.60.2
ip name-server 192.123.60.173
ip name-server 66.88.81.177
ip dhcp excluded-address 10.1.1.1 10.1.1.100
ip dhcp excluded-address 10.1.1.254
ip dhcp pool 10network
network 10.1.1.0 255.255.255.0
default-router 10.1.1.1
dns-server 192.123.60.2 192.123.60.173 66.88.81.177
!
ip audit notify log
ip audit po max-events 100
!
interface FastEthernet0/0
ip address dhcp
ip access-group 101 in
ip nat outside
duplex auto
speed auto
interface FastEthernet0/1
ip address 10.1.1.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface FastEthernet1/0
ip address 192.123.60.243 255.255.255.0
shutdown
duplex auto
speed auto
!
interface FastEthernet1/1
no ip address
shutdown
duplex auto
speed auto
ip nat inside source list 1 interface FastEthernet0/0 overload
no ip http server
ip classless
ip route 0.0.0.0 0.0.0.0 FastEthernet0/0
!
access-list 1 permit 10.1.1.0 0.0.0.255
access-list 101 deny icmp any any log
access-list 101 deny tcp any any eq telnet log
access-list 101 deny tcp any any eq ftp log
access-list 101 deny tcp any any eq ftp-data log
access-list 101 deny ip 127.0.0.0 0.255.255.255 any log
access-list 101 deny ip 224.0.0.0 31.255.255.255 any log
access-list 101 deny ip 225.0.0.0 0.255.255.255 any log
access-list 101 deny ip host 0.0.0.0 any log
access-list 101 permit ip any any