837: accesso ad un server sulla lan interna dall'esterno
Inviato: dom 15 ott , 2006 2:18 pm
Vorrei poter accedere al mio server della mia lan con ip 192.168.0.252 dall'esterno tramite http e ftp.
Ho provato ad aggiungere queste access list:
access-list 101 permit tcp any host 192.168.0.252 eq ftp
access-list 101 permit tcp any gt 1023 host 192.168.0.252 eq www
ma purtroppo non riesco ad accedere.
ecco la mia configurazione (prevede anche l'accesso voip)
Se ci sono cose superflue fatemi sapere.
Ringrazio anticipatamente
Ho provato ad aggiungere queste access list:
access-list 101 permit tcp any host 192.168.0.252 eq ftp
access-list 101 permit tcp any gt 1023 host 192.168.0.252 eq www
ma purtroppo non riesco ad accedere.
ecco la mia configurazione (prevede anche l'accesso voip)
Se ci sono cose superflue fatemi sapere.
Codice: Seleziona tutto
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log uptime
service password-encryption
!
hostname RG-Router
!
boot-start-marker
boot-end-marker
!
enable password 7 ******
!
no aaa new-model
!
resource policy
!
!
!
!
!
ip cef
ip name-server 212.216.112.112
ip name-server 212.216.172.62
ip inspect max-incomplete high 1100
ip inspect one-minute high 1100
ip inspect name DEFAULT100 cuseeme
ip inspect name DEFAULT100 ftp
ip inspect name DEFAULT100 h323
ip inspect name DEFAULT100 netshow
ip inspect name DEFAULT100 rcmd
ip inspect name DEFAULT100 realaudio
ip inspect name DEFAULT100 rtsp
ip inspect name DEFAULT100 sqlnet
ip inspect name DEFAULT100 streamworks
ip inspect name DEFAULT100 tftp
ip inspect name DEFAULT100 tcp
ip inspect name DEFAULT100 udp
ip inspect name DEFAULT100 vdolive
ip inspect name DEFAULT100 icmp
ip inspect name DEFAULT100 esmtp
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh version 2
ip ddns update method myupdate
HTTP
add http://dynupdate.no-ip.com/dns?username=***&password=***&hostname=***
interval maximum 1 0 0 0
!
!
!
crypto pki trustpoint TP-self-signed-2627134875
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2627134875
revocation-check none
rsakeypair TP-self-signed-2627134875
!
!
crypto pki certificate chain TP-self-signed-2627134875
certificate self-signed 01
*****
quit
username *** password 7 ****
!
!
class-map match-any voice-control
match access-group name voice-control
class-map match-all voice
match ip rtp 16384 16383
!
!
policy-map VOICE
class voice
priority percent 50
class voice-control
bandwidth 60
class class-default
fair-queue
!
!
no crypto isakmp enable
!
!
!
interface Ethernet0
ip address 192.168.0.1 255.255.255.0
ip nat inside
ip virtual-reassembly
no cdp enable
hold-queue 100 out
!
interface Ethernet2
no ip address
shutdown
hold-queue 100 out
!
interface ATM0
no ip address
no ip mroute-cache
no atm ilmi-keepalive
dsl operating-mode auto
hold-queue 224 in
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet1
duplex auto
speed auto
!
interface FastEthernet2
duplex auto
speed auto
!
interface FastEthernet3
duplex auto
speed auto
!
interface FastEthernet4
duplex auto
speed auto
!
interface Dialer0
bandwidth 1280
ip ddns update hostname *****
ip ddns update myupdate
ip address negotiated
ip access-group 101 in
ip nat outside
ip inspect DEFAULT100 out
ip virtual-reassembly
encapsulation ppp
ip tcp header-compression iphc-format
dialer pool 1
dialer-group 1
no cdp enable
ppp pap sent-username aliceadsl password 7 050A0A0622494F0D0A09
service-policy output VOICE
ip rtp header-compression iphc-format
!
ip route 0.0.0.0 0.0.0.0 Dialer0
ip route 192.168.0.0 255.255.0.0 Null0 250
!
ip http server
ip http authentication local
ip http secure-server
!
ip nat inside source list nat interface Dialer0 overload
!
!
ip access-list extended nat
deny ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip 192.168.0.0 0.0.255.255 any
ip access-list extended voice-control
permit tcp any any eq 2000
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 permit esp any any
access-list 101 permit ahp any any
access-list 101 permit udp host 193.204.114.105 eq ntp any eq ntp
access-list 101 permit icmp any any echo-reply
access-list 101 permit icmp any any time-exceeded
access-list 101 permit icmp any any unreachable
access-list 101 permit tcp any host 192.168.0.252 eq ftp
access-list 101 permit tcp any gt 1023 host 192.168.0.252 eq www
access-list 101 deny ip any any log
access-list 101 permit udp any any eq 5060
no cdp run
!
!
control-plane
!
!
line con 0
no modem enable
transport output all
line aux 0
transport output all
line vty 0 4
login local
transport input all
transport output all
!
scheduler max-task-time 5000
sntp server 193.204.114.105
end