Recommended Posts

ok, so I am stumped as to why I cannot access my NAS/Webserver from the outside world through my Cisco router.

Current setup:

Fiber Modem > Cisco 2621 > Dlink Router (Configured as a switch and wireless AP) > NAS/Webs Server

Port the Cisco router is plugged into on the modem is the port I have assigned as the DMZ. I can telnet into the router from outside no problem.

FA0/0 (ISP): DHCP address

FA0/1 (INTRANET): 10.10.10.1 255.255.255.0

D-Link Router: 10.10.10.3

NAS/Web Server: 10.10.10.4

See router config below:

Building configuration...

Current configuration : 1263 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Realm2621
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$0Y2h$lJNPzsUmDlagkmRn1t0Rd1
enable password *******
!
no aaa new-model
ip subnet-zero
ip cef
!
!
ip dhcp excluded-address 10.10.10.1 10.10.10.10
ip dhcp excluded-address 10.10.10.20 10.10.10.254
!
ip dhcp pool INTRANET
 network 10.10.10.0 255.255.255.0
 dns-server 8.8.8.8 8.8.4.4
 default-router 10.10.10.1
!
ip audit po max-events 100
!
!
interface FastEthernet0/0
 ip address dhcp
 ip nat outside
 duplex auto
 speed auto
!
interface FastEthernet0/1
 ip address 10.10.10.1 255.255.255.0
 ip nat inside
 duplex auto
 speed auto
!
ip nat inside source list 1 interface FastEthernet0/0 overload
ip nat inside source static tcp 10.10.10.4 80 interface FastEthernet0/0 80
no ip http server
no ip http secure-server
ip classless
!
!
access-list 1 permit 10.10.10.0 0.0.0.255
!
!
line con 0
line aux 0
line vty 0 4
 password ********
 login
!
!
end

Any help would be appreciated.

Link to comment
https://www.neowin.net/forum/topic/902772-resolved-cisco-router-help/
Share on other sites

congrats, you have a cisco router without any route commands. how do you expect it to route from one interface to another?

do this at an enable prompt

sh ip route

post its results.

try this

ip route 0.0.0.0 0.0.0.0 FastEthernet0/0 dhcp

and see if it helps

That ip route command did nothing.

Gateway of last resort is <INSERT_ISP_IP> to network 0.0.0.0

 	ISP.ISP.0.0/30 is subnetted, 1 subnets
C 	<INSERT_ISP_IP> is directly connected, FastEthernet0/0
 	10.0.0.0/24 is subnetted, 1 subnets
C 	10.10.10.0 is directly connected, FastEthernet0/1
 	192.168.2.0/32 is subnetted, 1 subnets
S 	192.168.2.1 [254/0] via <INSERT_ISP_IP>, FastEthernet0/0
S* 0.0.0.0/0 [254/0] via <INSERT_ISP_IP>

I am assuming it's doing NAT as well. There are no settings in the modem to disable it or check its status. I can hook the web server directly to the modem and forward port 80 and access it no problem though.

I am going to venture to guess that the static route is causing problems?

  On 19/05/2010 at 18:58, SaucE said:

I am assuming it's doing NAT as well. There are no settings in the modem to disable it or check its status. I can hook the web server directly to the modem and forward port 80 and access it no problem though.

I am going to venture to guess that the static route is causing problems?

no....If you are doing nat on the modem side, and you can forward port 80 within your modem to the server (can't forward without nat being enabled) then the issue is that the modem is doing nat as well and cockblocking you at that point. you will need to disable nat at that modem and pass all traffic to your cisco.

your S* statement (S* 0.0.0.0/0 [254/0] via <INSERT_ISP_IP>) is your static route. which is why I asked you to run that sh ip route command.

you can technically take the cisco router out as it is doing nothing constructive for you.

Well crap. I have the router in the DMZ on the modem so its firewall isn't touching it. I can telnet to the router so I know port 23 is getting through no problem. I don't understand why I cannot get port 80 through.

I don't use nat on my routers, so this may be wrong advise

ip nat inside source static tcp 10.10.10.4 80 interface FastEthernet0/1

with this it would have to be plugged directly into the #1 port on the router. if you do search on ip nat inside source static you will come up with many hits and examples, but none that have a dhcp'd outside address. I use an asa for all of this and it is a bit different.

  On 19/05/2010 at 19:57, sc302 said:

I don't use nat on my routers, so this may be wrong advise

ip nat inside source static tcp 10.10.10.4 80 interface FastEthernet0/1

with this it would have to be plugged directly into the #1 port on the router. if you do search on ip nat inside source static you will come up with many hits and examples, but none that have a dhcp'd outside address. I use an asa for all of this and it is a bit different.

His NAT is just fine.

Try and apply an access-list to your interface, and enable logging;

!

logging buffered

ip access-list extended log-traffic log

10 permit tcp any any eq 80 log

99 permit ip any any

!

interface fa0/0

ip access-gr log-traffic in

!

Then try again, but expect no change at all, and then do a show log :)

Edit:

The modem is not doing NAT, as the router is assigned an address from the ISP directly.

Also, the static route with the * just means that it was allocated through DHCP.

  On 19/05/2010 at 20:11, SAMeAiM said:

Wrong.

What the command does, is PAT between port TCP/1 on the outside interface and port TCP/80 on the NAS server.

His NAT is just fine.

Try and apply an access-list to your interface, and enable logging;

!

logging buffered

ip access-list extended log-traffic log

10 permit tcp any any eq 80 log

99 permit ip any any

!

interface fa0/0

ip access-gr log-traffic in

!

Then try again, but expect no change at all, and then do a show log :)

Edit:

The modem is not doing NAT, as the router is assigned an address from the ISP directly.

Also, the static route with the * just means that it was allocated through DHCP.

like i said i don't do this on the router and it could be wrong....thanks for enforcing the wrong.

  On 19/05/2010 at 20:18, sc302 said:

like i said i don't do this on the router and it could be wrong....thanks for enforcing the wrong.

Sorry, you were not all wrong... i somehow managed to read the line "ip nat inside source static tcp 10.10.10.4 80 interface FastEthernet0/1" as "ip nat inside source static tcp 10.10.10.4 80 interface FastEthernet0/0 1".

Again sorry :)

Syslog logging: enabled (0 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled)
	Console logging: level debugging, 23 messages logged, xml disabled
	Monitor logging: level debugging, 0 messages logged, xml disabled
	Buffer logging: level debugging, 1 messages logged, xml disabled
	Logging Exception size (4096 bytes)
	Count and timestamp logging messages: disabled
	Trap logging: level informational, 29 message lines logged

Log Buffer (4096 bytes):

I tried the commands you mentioned.

ip access-list extended log-traffic log <-Wouldn't allow 'log' at the end

  On 19/05/2010 at 20:35, SaucE said:

Syslog logging: enabled (0 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled)
	Console logging: level debugging, 23 messages logged, xml disabled
	Monitor logging: level debugging, 0 messages logged, xml disabled
	Buffer logging: level debugging, 1 messages logged, xml disabled
	Logging Exception size (4096 bytes)
	Count and timestamp logging messages: disabled
	Trap logging: level informational, 29 message lines logged

Log Buffer (4096 bytes):

I tried the commands you mentioned.

ip access-list extended log-traffic log <-Wouldn't allow 'log' at the end

Sorry... just skip that log*

!

logging buffered

ip access-list extended log-traffic

10 permit tcp any any eq 80 log

99 permit ip any any

!

interface fa0/0

ip access-gr log-traffic in

!

/me bangs his head into the wall ;)

Should be going to bed...

Let it sit for a bit and no change. I would like to bang my head two. Have been trying to get this to work for 4-5 days now.

Syslog logging: enabled (0 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled)
	Console logging: level debugging, 22 messages logged, xml disabled
	Monitor logging: level debugging, 0 messages logged, xml disabled
	Buffer logging: level debugging, 4 messages logged, xml disabled
	Logging Exception size (4096 bytes)
	Count and timestamp logging messages: disabled
	Trap logging: level informational, 28 message lines logged

Log Buffer (4096 bytes):

  On 20/05/2010 at 16:05, Sn00pY said:

I'm failing to see why you are even using this router. It's a legacl model and it's offering nothing to you - espeically in it's current setup.

Because sometimes it's fun to use overcomplicated setups for no real reason! Gives ya something to do. :p

Your commands were correct from the get go, I even tested them with packet tracer -- if you want I can send it to you.. It should work as you had it setup before.

post-14624-12743738494473.jpg

Only thing in PT you can not use interface command on the

ip nat inside source static tcp 10.10.10.4 80 interface

You have to use the current outside IP -- and it works you can access the http server on 10.10.10.4 from outside

So unless your doing what SAMeAiM mentions and trying to hit your public IP from a box on the 10 network, it should be working ---> UNLESS you got something else blocking it?? Ie you mention that fiber "modem" and putting your cisco in the DMZ??

You sure its passing 80 to the cisco? You sure your ISP is not blocking 80? Many of them do - since its quite common to be against the TOS to run servers.

If you want to use the cisco -- then put your fiber modem into BRIDGE mode so it puts a PUBLIC on the cisco wan inteface, vs putting it in the dmz of your fiber (modem/router) -- since you state have the cisco in a dmz it must be doing NAT, so its not simple modem - its a gateway device (modem/router combo)

So as snoopy points out -- what is the point of the cisco router? You already have a NAT device for your network, you don't need more than one -- they cause ISSUES.

As for ISP blocking port 80, I had the port opened on the modem/router from the ISP and it worked no problem. Having it in the DMZ should not be blocking any ports at all. They IP it gets assigned not is the public IP the modem/router typically gets assigned.

Reason for the Cisco, as David said, its fun to play with stuff you don't need just because you can.

What I may have to end up doing it making a 3 port VLAN on my 2900 series switch to split the original connection from the ODU and setup a PPPoE connection on the Cisco. Really don't want to do this if I don't have too so I will try the suggestions you guys mentioned above.

"Having it in the DMZ should not be blocking any ports at all. They IP it gets assigned not is the public IP the modem/router typically gets assigned."

So your saying when you put the cisco into the isp router dmz - it places a PUBLIC on the cisco wan interface?? That is not how most soho routers dmz work.. They just forward all the ports to the private ip you have in the dmz.. But if you have other forwards setup, or UPnP or say a remote UI setup on 80, this could cause it not to work.

What is the IP of the cisco dhcp interface you have connected to the fiber device -- it not a private one? ie does not start with 192.168.x.x or 10.x.x.x or 172.16-31.x.x?

If it a private -- the double nat could be causing you issues? Sure I agree its FUN to play, but then its also pointless to double nat and have a complex setup just because you can.. What is FUN is having things work the way they are suppose to -- not seeing how much of a cluster F___ setup you an create ;)

edit: BTW what worked when you had its setup on the isp router?? You could hit the public IP from the private side and it forwarded inbound, ie a nat reflection, or loopback forward.. Not all devices allow that -- and your current cisco config would not.

Or were you actually testing from outside your network to see if the forward was working.. Loopback forwarding is not a valid test of forward - unless you sure the nat device your using supports it.. I can tell you right now with your current config on the cisco if you try and hit the public IP from a box on the 10, its not going to work. But maybe your isp router supported that??

The private range from the modem/router is 192.168.2.0 0.0.0.255. The public IP's from the ISP are 142.166.x.x. When I had the MAC of the Cisco interface to the DMZ, the IP on FA0/0 on the Cisco is a 142.166.x.x.

Before I started playing with Cisco I had the same web server/nas plugged into a port on the modem/router and had port 80 unblocked for the IP setup on the web server/nas and had no issues accessing it from anywhere. I am testing the connection on my phone, it fails to load the page and gets a timeout error.

Router/Modem is a 2 Wire 3800HGV-B Gateway.

Well its should be working then, you could try changing your ip nat statement from

ip nat inside source static tcp 10.10.10.4 80 interface FastEthernet0/0 80

To

ip nat inside source static tcp 10.10.10.4 80 <PUBLIC IP ON FA0/0> 80

Also you could also remove your IP CEF statement.. I don't believe it should cause a problem - but the one thing that from a guess might cause some kind of issue.

Well I tried that and it didn't work but I think I may have found the potential issue.

Realm2621#show arp
Protocol Address 	Age (min) Hardware Addr Type Interface
Internet 10.10.10.1 	- 0001.42f8.be41 ARPA FastEthernet0/1
Internet 10.10.10.4 	8 0040.f426.bbe1 ARPA FastEthernet0/1
Internet 142.166.x.x 	0 0025.3cce.6329 ARPA FastEthernet0/0
Internet 142.166.x.x 	- 0001.42f8.be40 ARPA FastEthernet0/0

Realm2621#show int fa0/0
FastEthernet0/0 is up, line protocol is up
 Hardware is AmdFE, address is 0001.42f8.be40 (bia 0001.42f8.be40)
 Internet address is 142.166.x.x/30
 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
 	reliability 255/255, txload 1/255, rxload 1/255
 Encapsulation ARPA, loopback not set
 Keepalive set (10 sec)
 Full-duplex, 100Mb/s, 100BaseTX/FX
 ARP type: ARPA, ARP Timeout 04:00:00
 Last input 00:00:00, output 00:00:00, output hang never
 Last clearing of "show interface" counters never
 Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
 Queueing strategy: fifo
 Output queue: 0/40 (size/max)
 5 minute input rate 2000 bits/sec, 2 packets/sec
 5 minute output rate 1000 bits/sec, 1 packets/sec
 	102043 packets input, 13176403 bytes
 	Received 67561 broadcasts, 0 runts, 0 giants, 0 throttles
 	0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
 	0 watchdog
 	0 input packets with dribble condition detected
 	45750 packets output, 4245831 bytes, 0 underruns
 	0 output errors, 0 collisions, 0 interface resets
 	0 babbles, 0 late collision, 0 deferred
 	0 lost carrier, 0 no carrier
 	0 output buffer failures, 0 output buffers swapped out

Gateway of last resort is 142.166.x.x to network 0.0.0.0

 	142.166.0.0/30 is subnetted, 1 subnets
C 	142.166.x.x is directly connected, FastEthernet0/0
 	10.0.0.0/24 is subnetted, 1 subnets
C 	10.10.10.0 is directly connected, FastEthernet0/1
 	192.168.2.0/32 is subnetted, 1 subnets
S 	192.168.2.1 [254/0] via 142.166.x.x, FastEthernet0/0
S* 0.0.0.0/0 [254/0] via 142.166.x.x

Building configuration...

Current configuration : 1299 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Realm2621
!
boot-start-marker
boot-end-marker
!
logging buffered 4096 debugging
enable secret 5 $1$ubRd$gkH2UZQj6XVVpAoxNStjk1
enable password ********
!
no aaa new-model
ip subnet-zero
no ip cef
!
!
ip name-server 8.8.8.8
ip name-server 8.8.4.4
ip dhcp excluded-address 10.10.10.1 10.10.10.10
ip dhcp excluded-address 10.10.10.20 10.10.10.254
!
ip dhcp pool INTRANET
 network 10.10.10.0 255.255.255.0
 default-router 10.10.10.1
 dns-server 8.8.8.8 8.8.4.4
!
ip audit po max-events 100
!
!
!
interface FastEthernet0/0
 ip address dhcp
 ip access-group log-traffic in
 ip nat outside
 duplex auto
 speed auto
!
interface FastEthernet0/1
 ip address 10.10.10.1 255.255.255.0
 ip nat inside
 duplex auto
 speed auto
!
ip nat inside source list 1 interface FastEthernet0/0 overload
ip nat inside source static tcp 10.10.10.4 80 142.166.x.x 80 extendable
ip http server
no ip http secure-server
ip classless
!
!
!
ip access-list extended log-traffic
 permit tcp any any eq www log
 permit ip any any
access-list 1 permit 10.10.10.0 0.0.0.255
!
!
line con 0
line aux 0
line vty 0 4
 password ********
 login
!
!
end

I tried removing ip cef and it made no difference and also added the public IP to the nat line.

Just wondering. Your WAN interface (fa0/0) on your cisco router has an IP of 142.166.187.161 ?

but your default route is using 142.166.187.162 ? What IP is that suposed to be? Your Modem? I cant stand Router/modem configurations like this, heh. No Offense.

Actually I doubt my question has anything related to your issue, heh.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • They probably mean File Pilot, which this colorful rainbow program can never compete with, because this WinUI crap isn’t made for apps like that. My advice? You should just switch the framework already
    • Scientists uncover bizarre new material that's breaking one of the laws of this Universe by Sayan Sen Image by Ron Lach via Pexels Scientists from the University of Chicago and UC San Diego have discovered a group of materials that behave in surprising ways when put under heat, pressure or electricity. Instead of responding like most materials, these can shrink when heated, expand when compressed, and even bounce back to their original state with the right electric charge. The work focuses on oxygen-redox (OR) materials—types that can help batteries store more energy but typically suffer from stability problems due to structural disorder. In their normal state, the materials follow the usual rules of thermodynamics. But in what's called a “metastable” state, a kind of temporary balance, they behave in reverse. “When heated, the material shrinks instead of expanding,” said Prof. Shirley Meng, senior author of the study published in Nature. This is linked to what’s known as a disorder–order transition inside the material’s structure. The team recorded a negative thermal expansion rate of −14.4(2) × 10⁻⁶ °C⁻¹, which means the material actually contracts when warmed up. This goes against a common theory called the Grüneisen relationship, which usually explains why materials expand with heat. And pressure? Even stranger. When they pushed the material on all sides at levels seen in Earth's tectonic plates, it expanded instead of getting smaller. “Negative compressibility is just like negative thermal expansion,” explained Prof. Minghao Zhang. “If you compress a particle of the material in every direction… it will expand.” They also found that electricity can reset the material’s structure. By tweaking the voltage limits, they recovered almost 100% of the original structure and performance. This has big potential for battery tech, especially electric vehicles (EVs). “When we use the voltage, we drive the material back to its pristine state. We recover the battery,” said Zhang. He added: “You just do this voltage activation… your car will be a new car. Your battery will be a new battery.” The research may lead to materials with zero thermal expansion, helpful in everything from buildings to aircraft. Zhang noted, “Take every single building, for example. You don't want the materials making up different components to change volume that often.” As they move forward, the team wants to understand how redox chemistry can further control these effects and expand practical uses. “One of the goals is bringing these materials from research to industry,” said co-first author Bao Qiu. Their work opens up a new way of thinking about material design, where energy doesn’t just power devices, but reshapes the building blocks themselves. Source: University of Chicago, Nature This article was generated with some help from AI and reviewed by an editor. Under Section 107 of the Copyright Act 1976, this material is used for the purpose of news reporting. Fair use is a use permitted by copyright statute that might otherwise be infringing.
    • "Elon Musk says a kid-friendly 'Baby Grok' is on the way" No kid wants to be a baby anymore. "Kid friendly" I would have named it "Kid Grok"
    • TP-Link Tri-Band AXE5400 Wi-Fi 6E Gaming Router Archer GXE75 is just $135 by Sayan Sen If you’re juggling gaming consoles, 4K streams and a growing roster of smart devices, the TP-Link Archer GXE75 Tri-Band AXE5400 Wi-Fi 6E Gaming Router is a good option to look at right now, considering the device is currently on sale at just $135 (purchase link under the specs table below). The Archer GXE75 promises up to 5.4 Gbps of throughput across three bands: 574 Mbps on 2.4 GHz, 2402 Mbps on 5 GHz and 2402 Mbps on 6 GHz (HE160 channels enabled). A 2.5 Gbps WAN/LAN port pairs with three 1 Gbps LAN ports and a USB 3.0 port for fast file sharing or printer access (purchase link down below). The quad-core CPU and 512 MB of RAM should help to handle multiple streams without bogging down, while MU-MIMO, OFDMA and 1024-QAM improve efficiency when several devices connect simultaneously. The router’s built-in Game Accelerator engine is said to automatically prioritize gaming packets (both wired and wireless), and TP-Link’s GPN (Gamers Private Network) acceleration can reduce packet loss for supported titles. HomeShield security brings firewall protection, device quarantining and parental controls. The technical specifications of the router are given below: Specification Details Wireless Standards IEEE 802.11ax 6 GHz; IEEE 802.11ax/ac/n/a 5 GHz; IEEE 802.11ax/n/g/b 2.4 GHz Wi-Fi Speeds 6 GHz: 2402 Mbps (802.11ax); 5 GHz: 2402 Mbps (802.11ax); 2.4 GHz: 574 Mbps (802.11ax) Spatial Streams 6 streams (tri-band OFDMA/MU-MIMO) Processor 1.7 GHz 64-bit Quad-Core CPU Memory 512 MB high-speed RAM Ethernet Ports 1× 2.5 Gbps WAN/LAN; 1× 1 Gbps WAN/LAN; 3× 1 Gbps LAN USB 1× USB 3.0 SuperSpeed port (up to 10× faster than USB 2.0) Antennas 4× high-performance external antennas with Beamforming Buttons Power On/Off; Reset; WPS/Wi-Fi; LED On/Off Working Modes Router Mode; Access Point Mode Security WPA, WPA2, WPA3, WPA/WPA2-Enterprise; SPI firewall; Access Control; IP/MAC binding; Application-layer gateway; HomeShield security suite VPN OpenVPN, PPTP, L2TP (server & client); WireGuard (server & client) Software & Services IPv4/IPv6; TP-Link HomeShield; EasyMesh; Parental controls; QoS by device; WAN types (Dynamic IP, Static IP, PPPoE, PPTP, L2TP); DDNS (TP-Link, NO-IP, DynDNS); auto firmware updates Gaming Features Game QoS boost; gaming-port priority; Gamers Private Network acceleration; game-port forwarding; real-time game panel with stats & RGB control Operating Environment 0 °C – 40 °C; 10 %– 90 % non-condensing humidity Get the TP-Link Tri-Band AXE5400 Wi-Fi 6E Gaming Router Archer GXE75 at the link below: TP-Link Tri-Band AXE5400 Wi-Fi 6E Gaming Router Archer GXE75 | EasyMesh, HomeShield: $159.99 + $25 off with coupon => $134.99 (Sold and Shipped by Amazon US This Amazon deal is US-specific and not available in other regions unless specified. If you don't like it or want to look at more options, check out the Amazon US deals page here. Get Prime (SNAP), Prime Video, Audible Plus or Kindle / Music Unlimited. Free for 30 days. As an Amazon Associate, we earn from qualifying purchases.
  • Recent Achievements

    • Rookie
      Snake Doc went up a rank
      Rookie
    • First Post
      nobody9 earned a badge
      First Post
    • One Month Later
      Ricky Chan earned a badge
      One Month Later
    • First Post
      leoniDAM earned a badge
      First Post
    • Reacting Well
      Ian_ earned a badge
      Reacting Well
  • Popular Contributors

    1. 1
      +primortal
      495
    2. 2
      Michael Scrip
      203
    3. 3
      ATLien_0
      197
    4. 4
      Xenon
      137
    5. 5
      +FloatingFatMan
      116
  • Tell a friend

    Love Neowin? Tell a friend!