- Your point 8 and point 13 & 14 are using the same external ip address of 22.214.171.124 which is overlapping. I would suggest that for point 8, you either use another spare ip address, or alternatively use the outside interface ip address as follows:
global (outside) 1 interface
- For point 16, 17 and 18, you would need to configure ACL to point to the public ip address instead of the private ip address as follows:
access-list INBOUND permit tcp any host 126.96.36.199 eq smtp
access-list INBOUND permit tcp any host 188.8.131.52 eq 443
access-list INBOUND permit udp any host 184.108.40.206 eq 1194
- Point 24 adn 25 are incorrect. You won't be able to route traffic towards an ip address which is not in the same subnet as your inside interface. Not too sure what you are trying to achieve. Point 22 and 23 are already correct. If you would like to further route the 192.168.21.0/24 and 192.168.20.0/24 subnet further, that needs to be configured on the downstream router (10.8.4.254 and 10.8.4.253 routers).
- Lastly the ip address on the diagram doesn't really correspond to the configuration ip address (for inside network). Hope that is only typos.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :