Sniffer2112
IS-IT--Management
I thought I understood ACLs but when I tried to implement an ACL for port forwarding, I'd loose internet connection and could not reach the website from the outside. Could someone take a look at my config and see if I set it up right?
I thought the "permit tcp any host 10.1.1.200 eq www" would be the right command.
interface FastEthernet0/0 (to outside internet)
ip address dhcp
ip access-group 100 in
ip nat outside
duplex auto
speed auto
!
interface FastEthernet0/1 (to inside LAN)
ip address 10.1.1.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
!
router eigrp 123
network 10.1.1.0 0.0.0.255
auto-summary
!
no ip http server
ip http authentication local
ip http secure-server
ip nat inside source list 10 interface FastEthernet0/0 overload
!
ip access-list extended PREVENT_IP_SPOOFING (I know this is not yet set on any interface)
deny ip 10.0.0.0 0.255.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
!
access-list 10 permit 10.1.1.0 0.0.0.255
access-list 100 permit tcp any any eq www
access-list 100 permit tcp any host 10.1.1.200 eq www (10.1.1.200 is the web server IP)
access-list 100 permit ip any any
Any help would be greatly appreciated. Just when you think you understand something... leave it to real life to tell you differently. But that's how we learn best.
-Todd-
CCNA
MCTS: Sever 2008 AD Configuration
CompTIA: A+, Security+
**There are 10 types of people. Those that understand binary, and those that don't**
I thought the "permit tcp any host 10.1.1.200 eq www" would be the right command.
interface FastEthernet0/0 (to outside internet)
ip address dhcp
ip access-group 100 in
ip nat outside
duplex auto
speed auto
!
interface FastEthernet0/1 (to inside LAN)
ip address 10.1.1.1 255.255.255.0
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
!
router eigrp 123
network 10.1.1.0 0.0.0.255
auto-summary
!
no ip http server
ip http authentication local
ip http secure-server
ip nat inside source list 10 interface FastEthernet0/0 overload
!
ip access-list extended PREVENT_IP_SPOOFING (I know this is not yet set on any interface)
deny ip 10.0.0.0 0.255.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
!
access-list 10 permit 10.1.1.0 0.0.0.255
access-list 100 permit tcp any any eq www
access-list 100 permit tcp any host 10.1.1.200 eq www (10.1.1.200 is the web server IP)
access-list 100 permit ip any any
Any help would be greatly appreciated. Just when you think you understand something... leave it to real life to tell you differently. But that's how we learn best.
-Todd-
CCNA
MCTS: Sever 2008 AD Configuration
CompTIA: A+, Security+
**There are 10 types of people. Those that understand binary, and those that don't**