I am trying to connect a couple of clients to the internet but the problem is that they can ping the vlan of the ehwic card of the router but not the actual wan port and beyond that thus not getting a internet connection.
Below is the config you can paste into your devices that should make it work.
==Router no ip route 0.0.0.0 0.0.0.0 Vlan1 no ip route 0.0.0.0 0.0.0.0 Vlan2 ! ip route 0.0.0.0 0.0.0.0 184.108.40.206 ! interface g0/0 ip nat outside ! interface vlan 1 ip nat inside ! interface vlan 2 ip nat inside ! ip access-list standard NAT permit 192.168.10.0 0.0.0.255 permit 10.1.10.0 0.0.0.255 ! ip nat inside source list NAT interface g0/0 overload ! ==Switch no ip default-gateway 220.127.116.11 ip default-gateway 192.168.10.1 !If VLAN2 is needed on switch for example: !vlan 2 !interface fa0/2 !switchport access vlan 2
My mistake. I meant to put after the ip route change this to whatever your ISP default gateway is. The interface in your config is set to 255.0.0.0 which could be anything. Typically you would get a /30 from a provider unless they are handing out single IP addresses from a larger block. On the ACL part it takes wildcard masks which is why I used 0.0.0.255. If you can figure out your ISP gateway and enter that in as the ip route statement then it should work no problem.
Thanks for the help so far! The switch can now ping outside the router but there is still one problem. The clients can't even ping to the router atm, they can to the switch though. The router is able to ping everything on our network and the switch too, but it seems if the clients can't get through the switch, any ideas?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...