Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

ACL's, IP route statements and NATing

Currently I have a router with 3 interfaces. One interface is connected to a firewall, one is connected to a local LAN, and the other is connected to a trusted network. Some address from the LAN are being NAT'd to the trusted network. Info:

e0/0 172.16.69.1 255.255.255.0 (goes to the firewall)

e0/1 172.16.70.1 255.255.255.0 (goes to the LAN)

ip nat inside

s0/0 172.16.210.1 255.255.255.0 (goes to a trusted network)

ip nat outside

ip nat inside source static 172.16.80.14 172.17.1.5

The problem is that ALL the traffic coming into the router is being routed to the firewall with the following IP route statement:

ip route 0.0.0.0 0.0.0.0 172.16.69.2

I want to specifically route the NAT'd addresses from their LAN to the trusted network.

Question1: Can I just add static route commands or do I have to apply extended access lists?

Question2: If I can just add route commands do I use the NAT'd address or the true source address?

Like this?

ip route 172.17.0.0 255.255.0.0 172.16.210.2

1 REPLY
New Member

Re: ACL's, IP route statements and NATing

I noticed that the "no ip classless" statement is on this router!!!! Could this be causing my problem???

93
Views
0
Helpful
1
Replies