Ik heb het volgende probleem. Ik heb op mijn werk een Demon DSL Business Express verbinding icm een Cisco 836 router. Internetten werkt prima. Nu wil ik voor de medewerkers die niet veel op onze lokatie aanwezig zijn webmail aan gaan aanbieden. Hiervoor heb ik de config van de router aangepast zoals hieronder is weergegeven. Het is de bedoeling dat de router (ip 192.168.1.254) een forward maakt naar de mailserver met ip 192.168.1.1 op port 80 en 443. Ik heb op google, cisco en hier op tweakers gezocht maar kom er niet uit en ben niet echt thuis in de wereld die Cisco heet. Kan iemand mij helpen?
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname cisco836
!
boot-start-marker
boot-end-marker
!
logging buffered 52000 debugging
logging console critical
enable secret 5 xxxxxxxxxxxxxxxxxxxxxx
!
clock timezone Europe/Berlin 1
clock summer-time Europe/Berlin date Mar 30 2003 2:00 Oct 26 2003 3:00
no aaa new-model
ip subnet-zero
no ip source-route
ip tcp synwait-time 10
no ip domain lookup
!
!
no ip bootp server
ip cef
ip inspect tcp synwait-time 15
ip inspect tcp max-incomplete host 50 block-time 10
ip inspect name firewall udp timeout 15
ip inspect name firewall tcp timeout 1800
ip inspect name firewall cuseeme timeout 3600
ip inspect name firewall ftp timeout 3600
ip inspect name firewall h323 timeout 3600
ip inspect name firewall icmp timeout 3600
ip inspect name firewall rcmd timeout 3600
ip inspect name firewall realaudio timeout 3600
ip inspect name firewall smtp timeout 3600
ip inspect name firewall sqlnet timeout 3600
ip inspect name firewall streamworks timeout 3600
ip inspect name firewall tftp timeout 3600
ip inspect name firewall vdolive timeout 3600
ip audit notify log
ip audit po max-events 100
ip audit attack action reset
ip ssh time-out 60
ip ssh authentication-retries 2
no ftp-server write-enable
!
!
!
no crypto isakmp enable
!
!
bridge irb
!
!
interface Null0
no ip unreachables
!
interface Ethernet0
no shutdown
ip address 192.168.1.254 255.255.255.0
ip access-group 100 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip route-cache flow
no ip mroute-cache
no cdp enable
hold-queue 100 out
!
interface ATM0
no shutdown
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
no ip mroute-cache
atm vc-per-vp 64
no atm ilmi-keepalive
pvc 0/35
encapsulation aal5snap
!
bundle-enable
dsl operating-mode auto
bridge-group 1
bridge-group 1 spanning-disabled
hold-queue 224 in
!
interface BVI1
ip address dhcp client-id Ethernet0
ip access-group 111 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
ip inspect firewall out
ip route-cache flow
!
ip nat inside source static tcp 192.168.1.1 80 interface BVI1 80
ip nat inside source static tcp 192.168.1.1 443 interface BVI1 443
ip nat inside source list 102 interface BVI1 overload
ip classless
ip route 0.0.0.0 0.0.0.0 BVI1
ip http server
ip http access-class 1
ip http authentication local
ip http secure-server
!
!
logging trap debugging
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq telnet
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq 22
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq www
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq 443
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq cmd
access-list 100 deny tcp any host 192.168.1.254 eq telnet
access-list 100 deny tcp any host 192.168.1.254 eq 22
access-list 100 deny tcp any host 192.168.1.254 eq www
access-list 100 deny tcp any host 192.168.1.254 eq 443
access-list 100 deny tcp any host 192.168.1.254 eq cmd
access-list 100 deny udp any host 192.168.1.254 eq snmp
access-list 100 permit ip any any
access-list 101 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 111 permit udp any eq bootps any eq bootpc
access-list 111 permit udp any eq bootps any eq bootps
access-list 111 permit udp any eq domain any
access-list 111 permit esp any any
access-list 111 permit udp any any eq isakmp
access-list 111 permit udp any any eq 10000
access-list 111 permit tcp any any eq 1723
access-list 111 permit tcp any any eq 139
access-list 111 permit udp any any eq netbios-ns
access-list 111 permit udp any any eq netbios-dgm
access-list 111 permit gre any any
access-list 111 permit tcp any any eq 80
access-list 111 permit tcp any any eq 443
access-list 111 deny icmp any any administratively-prohibited
access-list 111 deny icmp any any echo
access-list 111 deny icmp any any echo-reply
access-list 111 deny icmp any any packet-too-big
access-list 111 deny icmp any any time-exceeded
access-list 111 deny icmp any any traceroute
access-list 111 deny icmp any any unreachable
access-list 111 deny icmp any any redirect
access-list 111 deny ip any any log
no cdp run
!
!
control-plane
!
bridge 1 protocol ieee
bridge 1 route ip
banner login ^Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^
!
line con 0
login local
no modem enable
transport preferred all
transport output telnet
stopbits 1
line aux 0
login local
transport preferred all
transport output telnet
line vty 0 4
access-class 101 in
privilege level 15
login local
length 0
transport preferred all
transport input telnet ssh
transport output all
!
scheduler max-task-time 5000
scheduler interval 500
!
end
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname cisco836
!
boot-start-marker
boot-end-marker
!
logging buffered 52000 debugging
logging console critical
enable secret 5 xxxxxxxxxxxxxxxxxxxxxx
!
clock timezone Europe/Berlin 1
clock summer-time Europe/Berlin date Mar 30 2003 2:00 Oct 26 2003 3:00
no aaa new-model
ip subnet-zero
no ip source-route
ip tcp synwait-time 10
no ip domain lookup
!
!
no ip bootp server
ip cef
ip inspect tcp synwait-time 15
ip inspect tcp max-incomplete host 50 block-time 10
ip inspect name firewall udp timeout 15
ip inspect name firewall tcp timeout 1800
ip inspect name firewall cuseeme timeout 3600
ip inspect name firewall ftp timeout 3600
ip inspect name firewall h323 timeout 3600
ip inspect name firewall icmp timeout 3600
ip inspect name firewall rcmd timeout 3600
ip inspect name firewall realaudio timeout 3600
ip inspect name firewall smtp timeout 3600
ip inspect name firewall sqlnet timeout 3600
ip inspect name firewall streamworks timeout 3600
ip inspect name firewall tftp timeout 3600
ip inspect name firewall vdolive timeout 3600
ip audit notify log
ip audit po max-events 100
ip audit attack action reset
ip ssh time-out 60
ip ssh authentication-retries 2
no ftp-server write-enable
!
!
!
no crypto isakmp enable
!
!
bridge irb
!
!
interface Null0
no ip unreachables
!
interface Ethernet0
no shutdown
ip address 192.168.1.254 255.255.255.0
ip access-group 100 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip route-cache flow
no ip mroute-cache
no cdp enable
hold-queue 100 out
!
interface ATM0
no shutdown
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
no ip mroute-cache
atm vc-per-vp 64
no atm ilmi-keepalive
pvc 0/35
encapsulation aal5snap
!
bundle-enable
dsl operating-mode auto
bridge-group 1
bridge-group 1 spanning-disabled
hold-queue 224 in
!
interface BVI1
ip address dhcp client-id Ethernet0
ip access-group 111 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
ip inspect firewall out
ip route-cache flow
!
ip nat inside source static tcp 192.168.1.1 80 interface BVI1 80
ip nat inside source static tcp 192.168.1.1 443 interface BVI1 443
ip nat inside source list 102 interface BVI1 overload
ip classless
ip route 0.0.0.0 0.0.0.0 BVI1
ip http server
ip http access-class 1
ip http authentication local
ip http secure-server
!
!
logging trap debugging
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq telnet
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq 22
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq www
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq 443
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.254 eq cmd
access-list 100 deny tcp any host 192.168.1.254 eq telnet
access-list 100 deny tcp any host 192.168.1.254 eq 22
access-list 100 deny tcp any host 192.168.1.254 eq www
access-list 100 deny tcp any host 192.168.1.254 eq 443
access-list 100 deny tcp any host 192.168.1.254 eq cmd
access-list 100 deny udp any host 192.168.1.254 eq snmp
access-list 100 permit ip any any
access-list 101 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 111 permit udp any eq bootps any eq bootpc
access-list 111 permit udp any eq bootps any eq bootps
access-list 111 permit udp any eq domain any
access-list 111 permit esp any any
access-list 111 permit udp any any eq isakmp
access-list 111 permit udp any any eq 10000
access-list 111 permit tcp any any eq 1723
access-list 111 permit tcp any any eq 139
access-list 111 permit udp any any eq netbios-ns
access-list 111 permit udp any any eq netbios-dgm
access-list 111 permit gre any any
access-list 111 permit tcp any any eq 80
access-list 111 permit tcp any any eq 443
access-list 111 deny icmp any any administratively-prohibited
access-list 111 deny icmp any any echo
access-list 111 deny icmp any any echo-reply
access-list 111 deny icmp any any packet-too-big
access-list 111 deny icmp any any time-exceeded
access-list 111 deny icmp any any traceroute
access-list 111 deny icmp any any unreachable
access-list 111 deny icmp any any redirect
access-list 111 deny ip any any log
no cdp run
!
!
control-plane
!
bridge 1 protocol ieee
bridge 1 route ip
banner login ^Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^
!
line con 0
login local
no modem enable
transport preferred all
transport output telnet
stopbits 1
line aux 0
login local
transport preferred all
transport output telnet
line vty 0 4
access-class 101 in
privilege level 15
login local
length 0
transport preferred all
transport input telnet ssh
transport output all
!
scheduler max-task-time 5000
scheduler interval 500
!
end
[ Voor 1% gewijzigd door Bjurrun op 07-06-2004 19:10 . Reden: Typo in de config zoals MASH_MAN aangeeft ]