I'm performing a NAT translation on a Linksys router that is attached to fa1/0 on my 7206. I want to only allow HTTP,SSL and DNS traffic out of fa1/0 from the Linksys. I have put in place an ACL to allow this traffic flow but it seems to skip over the acls I put in place and only hits the permit ip any any. If I try to use the address of the Linksys router in my ACL's it doesn't work. If I try: any any eq www that doesn't work either. So I assume Cisco ACLs are not liking how the address is translated by the Linksys router. Any thoughts?? Below is the acl in question:
Perhaps the ACL needs to be applied inbound, or else reverse the source and destination ports. Your ACL statements will match packets from the client to the server. If you want to match from the server to the client they need to look like this:
I figured it out. Out vs In....its all a matter of perspective. I was assigning it outbound and it needed to be assigned inbound. I assumed data flowing from my internal network to the port was outbound but apparently not (according to Cisco's ACL rules). Perspective, perspective!!!! Thanks for the help!
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...