"Asbjorn Hojmark" <Asbjorn@Hojmark.ORG> wrote in message
news:08i79ug0c3pg097e6i4qrgb7klgbqg075e@news.worldonline.dk...
> Som jeg skrev, er det muligt, det kan fixes. Men den opførsel du
> oplever på et standard-setup er altså normal.
OK, min hjerne har nu accepteret at det den ser på skærmen er routerens
nuværende config der virker efter hensigten
. Men hvordan finder jeg ud
af om det (overhovedet) er muligt at ændre den config så den opfører sig keg
egentligt ønsker, uden at opbygge et expert-kendskab til IOS først?
Dét jeg tror jeg har brug for har jeg nu set omtalt som "NAT on a stick" og
"one-arm routing", men uden konkrete eksempler, de mindst luftige har jeg
pastet til slut.
Men hvis det skulle trigge et eller andet i en IOS-mands hoved, så sig meget
gerne til
// Steffen
1 ******************************************'
Below is a sample config we used for testing. Basically, we have an inside
address translating to multiple pool of addresses. The inside interface is
at
e0. E1 is connected to the outside, but ip nat outside command is
not applied at e1. It is applied at the loopback 4
For Internet access - translate to one pool
For Intranet access - don't translate
For traffic to SRC-1 - translate to 90.4.4.10 pool
For traffic to SRC-2 - translate to 90.2.2.10 pool
HTH
Eng Wee
CCIE #5335
interface Loopback4
ip address 7.7.7.7 255.255.255.255
ip nat outside
ip policy route-map TRANSLATE-SRC-IP
!
interface Ethernet0
ip address 10.1.1.1 255.255.255.0
ip nat inside
no keepalive
!
interface Ethernet1
ip address 172.24.6.174 255.255.255.252
!
ip nat pool SRC-2-NAT 90.2.2.10 90.2.2.50 netmask 255.255.255.0
ip nat pool SRC-1-NAT 90.4.4.10 90.4.4.50 netmask 255.255.255.0
ip nat pool INTERNET-NAT 61.8.245.125 61.8.245.126 netmask 255.255.255.248
ip nat inside source route-map INTERNET pool INTERNET-NAT overload
ip nat inside source route-map SRC-1 pool SRC-1-NAT
ip nat inside source route-map SRC-2 pool SRC-2-NAT
ip classless
ip route 0.0.0.0 0.0.0.0 Loopback4
ip route 10.2.2.0 255.255.255.0 Ethernet1
ip route 10.205.2.0 255.255.255.0 172.24.6.173
ip route 90.2.2.0 255.255.255.0 Loopback4 ### force return traffic
back to lo4
ip route 172.24.0.0 255.255.0.0 Ethernet1
ip access-list extended INTERNET-ACL
deny ip any 94.1.1.0 0.0.0.255
deny ip any 95.1.1.0 0.0.0.255
permit ip any any
ip access-list extended SRC-1-ACL
permit ip any 95.1.1.0 0.0.0.255
ip access-list extended SRC-2-ACL
permit ip any 94.1.1.0 0.0.0.255
route-map INTERNET permit 10
match ip address INTERNET-ACL
!
route-map TRANSLATE-SRC-IP permit 10
set ip default next-hop 172.24.6.173
!
route-map CONTROL-MAP permit 10
match ip address CONTROL-ACL
set interface Loopback4
!
route-map SRC-2 permit 10
match ip address SRC-2-ACL
!
route-map SRC-1 permit 10
match ip address SRC-1-ACL
!
2 ***************************************
interface Loopback1
ip address 172.16.2.10 255.255.255.0
no ip directed-broadcast
ip nat inside
ip policy route-map nat
!
interface Ethernet0
mac-address 0040.1c60.9337
ip address 172.16.1.10 255.255.255.0 secondary
ip address 66.200.150.4 255.255.255.0
no ip directed-broadcast
ip nat outside
!
ip nat inside source list 1 interface Ethernet0 overload
ip classless
ip route 0.0.0.0 0.0.0.0 Loopback1
!
access-list 1 permit 172.16.0.0 0.0.255.255
route-map nat permit 10
set ip next-hop 66.200.150.1
!