[c-nsp] Don't NAT a Subset of Traffic

Sridhar Ayengar ploopster at gmail.com
Sun Aug 22 06:13:21 EDT 2010


Octavio Alvarez wrote:
>> I have a Verizon FiOS connection with 5 IP addresses attached to my 7505.
>>
>> So because it's excluded from the access-list, traffic from my private
>> network 172.16.16.0 to my public IP addresses is not NATed. I still
>> can't figure out how to pass this traffic without NATing it. If I
>> remove the deny line from the access-list, the traffic is correctly
>> passed NATed. Anyone have any ideas for me?
>
> I would go for: it is passing but you don't have return routes on your
> external hosts.

That's what I thought I had, but when I just tried it, it didn't work.

My current configuration:

bridge irb
!
interface FastEthernet2/0/0
  no ip address
  no ip redirects
  no ip unreachables
  no ip proxy-arp
  ip virtual-reassembly
  no ip mroute-cache
  half-duplex
  no cdp enable
  no mop enabled
  bridge-group 1
!
interface FastEthernet2/1/0
  ip address 172.16.16.1 255.255.255.0
  no ip redirects
  no ip unreachables
  no ip proxy-arp
  ip nat inside
  ip virtual-reassembly
  full-duplex
  no cdp enable
  no mop enabled
!
interface FastEthernet3/0/0
  no ip address
  no ip redirects
  no ip unreachables
  no ip proxy-arp
  ip virtual-reassembly
  no ip mroute-cache
  half-duplex
  no cdp enable
  no mop enabled
  bridge-group 1
!
interface BVI1
  ip address 173.50.165.26 255.255.255.0
  ip nat outside
  ip virtual-reassembly
!
ip classless
ip route 0.0.0.0 0.0.0.0 173.50.165.1
!
ip nat translation max-entries 300
ip nat inside source list 101 interface BVI1 overload
!
access-list 101 deny   ip 172.16.16.0 0.0.0.255 173.50.165.24 0.0.0.7
access-list 101 deny   ip 173.50.165.24 0.0.0.7 172.16.16.0 0.0.0.255
access-list 101 permit ip 172.22.22.0 0.0.0.255 any
access-list 101 deny   ip any any

Peace...  Sridhar


More information about the cisco-nsp mailing list