[c-nsp] Weird ACL Translation - show run
Larry Smith
lesmith at ecsis.net
Wed Aug 31 16:16:10 EDT 2005
On Wednesday 31 August 2005 15:06, noc ops wrote:
> Hi,
>
> Not sure if I'm missing something or what. But when I configured my 3640
> which is running c3640-jk9s-mz.122-4.T1.bin (not under warranty), I see
> below ACL output when I show run.
>
> Routing/NAT is taking place fine w/o any problems but the below ACL
> output is bothering me.
>
>
> Any insight will be appreciated.
>
>
> regards,
> /virendra
>
>
> config output:
> -------------------------------
> interface Ethernet0/1
> description Uplink to RFC1918 network, facing towards inside
> ip address 192.168.0.1 255.255.255.248
> ip nat inside
> half-duplex
>
> ip nat inside source list pat-addresses interface Ethernet0/0 overload
>
> ip access-list standard pat-addresses
> permit 192.0.0.0 0.255.255.255 <------ ??
>
> --------------------------------
>
> I even tried doing and undoing the above ACL w/ no avail.
>
> deepspace(config)#ip access-list standard pat-addresses
> deepspace(config-std-nacl)#no permit 192.0.0.0 0.255.255.255
> deepspace(config-std-nacl)#permit 192.168.0.0 0.255.255.255
> deepspace(config-std-nacl)#^Z
>
> I even tried using permit 192.168.0.0 7.255.255.255
>
> I still see the same output, and yes, I'm using ip classless,
>
> ip access-list standard pat-addresses
> permit 192.0.0.0 0.255.255.255
>
>
> Here's some basic NAT stats:
>
> deepspace#show ip nat statistics
> Total active translations: 34 (0 static, 34 dynamic; 34 extended)
> Outside interfaces:
> Ethernet0/0
> Inside interfaces:
> Ethernet0/1
> Hits: 663 Misses: 52
> Expired translations: 18
> Dynamic mappings:
> -- Inside Source
> access-list pat-addresses interface Ethernet0/0 refcount 34
>
>
> deepspace#show ip nat translations
> Pro Inside global Inside local Outside local
> Outside global
> tcp Ethernet0/0:44708 192.168.0.2:44708 207.126.111.226:80
> 207.126.111.226:80
> tcp Ethernet0/0:44709 192.168.0.2:44709 207.126.111.226:80
> 207.126.111.226:80
> tcp Ethernet0/0:44710 192.168.0.2:44710 207.126.111.226:80
> 207.126.111.226:80
> tcp Ethernet0/0:44711 192.168.0.2:44711 207.126.111.226:80
> 207.126.111.226:80
> tcp Ethernet0/0:44712 192.168.0.2:44712 207.126.111.226:80
> 207.126.111.226:80
> tcp Ethernet0/0:44713 192.168.0.2:44713 207.126.111.226:80
> 207.126.111.226:80
The netmask you are using is forcing it to "class-a" type (0.255.255.255)
which is why it is chopping to the 192.0.0.0.
try:
no ip access-list standard pat-addresses
permit 192.168.0.0 0.0.255.255
^Z
and see if that works...
--
Larry Smith
SysAd ECSIS.NET
sysad at ecsis.net
More information about the cisco-nsp
mailing list