ACL Rule to Open UDP Portsnmap shows opened port but netstat doesn'tHow to open OpenVPN port (1194) on server?nmap scan only state of portAllowing incoming VPN connections through a Cisco 2921 to a DD-WRT DeviceTest port reachability from a remote host even though the port is not bound to a service?Can a port be in the listen state and be closed?Port 80 filtered nmapPort-scanning on Cisco router with NmapAllowing ports using iptables fails
How to reverse input order?
What does $!# mean in Shell scripting?
Where's this lookout in Nova Scotia?
Did this character show any indication of wanting to rule before S8E6?
I know that there is a preselected candidate for a position to be filled at my department. What should I do?
Question in discrete mathematics about group permutations
How did NASA Langley end up with the first 737?
Is it true that cut time means "play twice as fast as written"?
NIntegrate doesn't evaluate
USPS Back Room - Trespassing?
How to cut a climbing rope?
Compaq Portable vs IBM 5155 Portable PC
When the Torah was almost lost and one (or several) Rabbis saved it?
Where have Brexit voters gone?
Find the three digit Prime number P from the given unusual relationships
Could a 19.25mm revolver actually exist?
Apt - strange requests to d16r8ew072anqo.cloudfront.net:80
What is a fully qualified name?
Is it legal to meet with potential future employers in the UK, whilst visiting from the USA
Do photons bend spacetime or not?
Best material to absorb as much light as possible
Why aren't space telescopes put in GEO?
Specific alignment within beginalign environment
How to patch glass cuts in a bicycle tire?
ACL Rule to Open UDP Ports
nmap shows opened port but netstat doesn'tHow to open OpenVPN port (1194) on server?nmap scan only state of portAllowing incoming VPN connections through a Cisco 2921 to a DD-WRT DeviceTest port reachability from a remote host even though the port is not bound to a service?Can a port be in the listen state and be closed?Port 80 filtered nmapPort-scanning on Cisco router with NmapAllowing ports using iptables fails
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
I have the current rules in an attempt to open port 5060 and 10000-20000 for my VoIP provider. We are on a Cisco 1921 router. This ACL is applied to the WAN port on the router facing the ISP. Nmap port scan shows these ports as closed.
- Can anyone help verify my ACL and correct my rule if necessary?
- Do I need an outbound ACL to open up the port as well since this is for a hosted VoIP PBX?
- Is Nmap not detecting the open port because I am not the specific host for the ACL? I tried some other ports that are not specific to a public IP and Nmap also shows as closed.
- Do my L3 switches behind the router also need an ACL to open ports if they are between the PC and the router?
Router Config
interface GigabitEthernet0/0
description WAN
ip address x.x.x.x 255.255.255.240
ip access-group 101 in
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/1
description LAN
ip address 192.168.1.2 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
access-list 101 permit udp host x.x.x.x any eq 5060
access-list 101 permit udp host x.x.x.x any range 10000 20000
Nmap Port Scan
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.022s latency).
PORT STATE SERVICE
5060/udp closed sip
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.023s latency).
PORT STATE SERVICE
10000/udp closed ndmp
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for wsip-184-191-183-54.sd.sd.cox.net (184.191.183.54)
Host is up (0.026s latency).
PORT STATE SERVICE
20000/udp closed unknown
cisco router port access-control-list nmap
add a comment |
I have the current rules in an attempt to open port 5060 and 10000-20000 for my VoIP provider. We are on a Cisco 1921 router. This ACL is applied to the WAN port on the router facing the ISP. Nmap port scan shows these ports as closed.
- Can anyone help verify my ACL and correct my rule if necessary?
- Do I need an outbound ACL to open up the port as well since this is for a hosted VoIP PBX?
- Is Nmap not detecting the open port because I am not the specific host for the ACL? I tried some other ports that are not specific to a public IP and Nmap also shows as closed.
- Do my L3 switches behind the router also need an ACL to open ports if they are between the PC and the router?
Router Config
interface GigabitEthernet0/0
description WAN
ip address x.x.x.x 255.255.255.240
ip access-group 101 in
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/1
description LAN
ip address 192.168.1.2 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
access-list 101 permit udp host x.x.x.x any eq 5060
access-list 101 permit udp host x.x.x.x any range 10000 20000
Nmap Port Scan
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.022s latency).
PORT STATE SERVICE
5060/udp closed sip
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.023s latency).
PORT STATE SERVICE
10000/udp closed ndmp
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for wsip-184-191-183-54.sd.sd.cox.net (184.191.183.54)
Host is up (0.026s latency).
PORT STATE SERVICE
20000/udp closed unknown
cisco router port access-control-list nmap
add a comment |
I have the current rules in an attempt to open port 5060 and 10000-20000 for my VoIP provider. We are on a Cisco 1921 router. This ACL is applied to the WAN port on the router facing the ISP. Nmap port scan shows these ports as closed.
- Can anyone help verify my ACL and correct my rule if necessary?
- Do I need an outbound ACL to open up the port as well since this is for a hosted VoIP PBX?
- Is Nmap not detecting the open port because I am not the specific host for the ACL? I tried some other ports that are not specific to a public IP and Nmap also shows as closed.
- Do my L3 switches behind the router also need an ACL to open ports if they are between the PC and the router?
Router Config
interface GigabitEthernet0/0
description WAN
ip address x.x.x.x 255.255.255.240
ip access-group 101 in
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/1
description LAN
ip address 192.168.1.2 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
access-list 101 permit udp host x.x.x.x any eq 5060
access-list 101 permit udp host x.x.x.x any range 10000 20000
Nmap Port Scan
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.022s latency).
PORT STATE SERVICE
5060/udp closed sip
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.023s latency).
PORT STATE SERVICE
10000/udp closed ndmp
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for wsip-184-191-183-54.sd.sd.cox.net (184.191.183.54)
Host is up (0.026s latency).
PORT STATE SERVICE
20000/udp closed unknown
cisco router port access-control-list nmap
I have the current rules in an attempt to open port 5060 and 10000-20000 for my VoIP provider. We are on a Cisco 1921 router. This ACL is applied to the WAN port on the router facing the ISP. Nmap port scan shows these ports as closed.
- Can anyone help verify my ACL and correct my rule if necessary?
- Do I need an outbound ACL to open up the port as well since this is for a hosted VoIP PBX?
- Is Nmap not detecting the open port because I am not the specific host for the ACL? I tried some other ports that are not specific to a public IP and Nmap also shows as closed.
- Do my L3 switches behind the router also need an ACL to open ports if they are between the PC and the router?
Router Config
interface GigabitEthernet0/0
description WAN
ip address x.x.x.x 255.255.255.240
ip access-group 101 in
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface GigabitEthernet0/1
description LAN
ip address 192.168.1.2 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
access-list 101 permit udp host x.x.x.x any eq 5060
access-list 101 permit udp host x.x.x.x any range 10000 20000
Nmap Port Scan
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.022s latency).
PORT STATE SERVICE
5060/udp closed sip
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for
Host is up (0.023s latency).
PORT STATE SERVICE
10000/udp closed ndmp
Starting Nmap 6.47 ( http://nmap.org ) at 2015-03-04 16:24 PST
Nmap scan report for wsip-184-191-183-54.sd.sd.cox.net (184.191.183.54)
Host is up (0.026s latency).
PORT STATE SERVICE
20000/udp closed unknown
cisco router port access-control-list nmap
cisco router port access-control-list nmap
asked Mar 6 '15 at 17:29
KevKev
387
387
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
Because you are NATing from G0/0 to G0/1 you cannot use an access-list to allow traffic. NAT acts as a firewall so you need to use a Port-Address Translation rule. For the single port, that would look like this:
ip nat inside source static udp x.x.x.x 5060 interface g0/0 5060
The port range is a bit more tricky, as IOS doesn't usually deal with port ranges. However, it does have functionality built in for voice udp traffic ranges - however this is limited to port ranges which are multiples of 64. To catch your required ports:
ip nat portmap VOICE
appl udp-rtp startport 9984 size 10240
This defines a port range of 10240 ports starting at 9984. Finally you need to apply this port map to NAT:
ip nat inside source list # interface g0/0 overload portmap VOICE
Where list #
is the access list which encompasses the internal addresses you are translating to. An NMAP scan should confirm that the ports are open.
Hope this helps!
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f673553%2facl-rule-to-open-udp-ports%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
Because you are NATing from G0/0 to G0/1 you cannot use an access-list to allow traffic. NAT acts as a firewall so you need to use a Port-Address Translation rule. For the single port, that would look like this:
ip nat inside source static udp x.x.x.x 5060 interface g0/0 5060
The port range is a bit more tricky, as IOS doesn't usually deal with port ranges. However, it does have functionality built in for voice udp traffic ranges - however this is limited to port ranges which are multiples of 64. To catch your required ports:
ip nat portmap VOICE
appl udp-rtp startport 9984 size 10240
This defines a port range of 10240 ports starting at 9984. Finally you need to apply this port map to NAT:
ip nat inside source list # interface g0/0 overload portmap VOICE
Where list #
is the access list which encompasses the internal addresses you are translating to. An NMAP scan should confirm that the ports are open.
Hope this helps!
add a comment |
Because you are NATing from G0/0 to G0/1 you cannot use an access-list to allow traffic. NAT acts as a firewall so you need to use a Port-Address Translation rule. For the single port, that would look like this:
ip nat inside source static udp x.x.x.x 5060 interface g0/0 5060
The port range is a bit more tricky, as IOS doesn't usually deal with port ranges. However, it does have functionality built in for voice udp traffic ranges - however this is limited to port ranges which are multiples of 64. To catch your required ports:
ip nat portmap VOICE
appl udp-rtp startport 9984 size 10240
This defines a port range of 10240 ports starting at 9984. Finally you need to apply this port map to NAT:
ip nat inside source list # interface g0/0 overload portmap VOICE
Where list #
is the access list which encompasses the internal addresses you are translating to. An NMAP scan should confirm that the ports are open.
Hope this helps!
add a comment |
Because you are NATing from G0/0 to G0/1 you cannot use an access-list to allow traffic. NAT acts as a firewall so you need to use a Port-Address Translation rule. For the single port, that would look like this:
ip nat inside source static udp x.x.x.x 5060 interface g0/0 5060
The port range is a bit more tricky, as IOS doesn't usually deal with port ranges. However, it does have functionality built in for voice udp traffic ranges - however this is limited to port ranges which are multiples of 64. To catch your required ports:
ip nat portmap VOICE
appl udp-rtp startport 9984 size 10240
This defines a port range of 10240 ports starting at 9984. Finally you need to apply this port map to NAT:
ip nat inside source list # interface g0/0 overload portmap VOICE
Where list #
is the access list which encompasses the internal addresses you are translating to. An NMAP scan should confirm that the ports are open.
Hope this helps!
Because you are NATing from G0/0 to G0/1 you cannot use an access-list to allow traffic. NAT acts as a firewall so you need to use a Port-Address Translation rule. For the single port, that would look like this:
ip nat inside source static udp x.x.x.x 5060 interface g0/0 5060
The port range is a bit more tricky, as IOS doesn't usually deal with port ranges. However, it does have functionality built in for voice udp traffic ranges - however this is limited to port ranges which are multiples of 64. To catch your required ports:
ip nat portmap VOICE
appl udp-rtp startport 9984 size 10240
This defines a port range of 10240 ports starting at 9984. Finally you need to apply this port map to NAT:
ip nat inside source list # interface g0/0 overload portmap VOICE
Where list #
is the access list which encompasses the internal addresses you are translating to. An NMAP scan should confirm that the ports are open.
Hope this helps!
edited Apr 6 '15 at 9:31
answered Apr 3 '15 at 15:50
AlienPieAlienPie
484
484
add a comment |
add a comment |
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f673553%2facl-rule-to-open-udp-ports%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown