Lab Configure Troubleshoot - Natoverload Pat
Lab Configure Troubleshoot - Natoverload Pat
Topology
Addressing Table
Default Gateway Subnet Mask IP Address Interface Device
Objectives
Part 1: Build the Network and Verify Connectivity
Part 2: Configure and Verify NAT Pool Overload
Part 3: Configure and Verify PAT
Background / Scenario
In the first part of the lab, your company is allocated the public IP address range of 209.165.200.224/29 by the ISP.
This provides the company with six public IP addresses. Dynamic NAT pool overload uses a pool of IP addresses in a
many-to-many relationship. The router uses the first IP address in the pool and assigns connections using the IP
address plus a unique port number. After the maximum number of translations for a
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 12
Lab – Configuring Dynamic and Static NAT
single IP address have been reached on the router (platform and hardware specific), it uses the next IP
address in the pool.
In Part 2, the ISP has allocated a single IP address, 209.165.201.18, to your company for use on the
Internet connection from the company Gateway router to the ISP. You will use the Port Address Translation
(PAT) to convert multiple internal addresses into the one usable public address. You will test, view, and
verify that the translations are taking place, and you will interpret the NAT/PAT statistics to monitor the
process.
Required Resources
2 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet and serial cables as shown in the topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 12
Lab – Configuring Dynamic and Static NAT
Step 1: Define an access control list that matches the LAN private IP addresses.
ACL 1 is used to allow the 192.168.1.0/24 network to be translated.
Gateway(config)# access-list 1 permit 192.168.1.0 0.0.0.255
Step 3: Define the NAT from the inside source list to the outside pool.
Gateway(config)# ip nat inside source list 1 pool public_access overload
Expired translations: 0
Dynamic mappings:
-- Inside Source
[Id: 1] access-list 1 pool public_access refcount 3 pool
public_access: netmask 255.255.255.248
start 209.165.200.225 end 209.165.200.230
type generic, total addresses 6, allocated 1 (16%), misses 0
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
c. Display NATs on the Gateway router.
Gateway# show ip nat translations
Outside global Outside local Pro Inside global Inside local
192.31.7.1:0 192.31.7.1:1 icmp 209.165.200.225:0 192.168.1.20:1
192.31.7.1:1 192.31.7.1:1 icmp 209.165.200.225:1 192.168.1.21:1
192.31.7.1:2 192.31.7.1:1 icmp 209.165.200.225:2 192.168.1.22:1
Note: Depending on how much time has elapsed since you performed the pings from each PC, you may not see all
three translations. ICMP translations have a short timeout value.
How many Inside local IP addresses are listed in the sample output above? 3
How many Inside global IP addresses are listed? 1
How many port numbers are used paired with the Inside global addresses 3
What would be the result of pinging the Inside local address of PC-A from the ISP router? Why?
The ping would fail because the router knows the location of the Inside global address in its routing table but the
Inside local address is not advertised.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 12
Lab – Configuring Dynamic and Static NAT
Step 4: Remove the NAT translation from inside source list to outside pool.
Gateway(config)# no ip nat inside source list 1 pool public_access
overload
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
c. Display NAT translations on Gateway.
Gateway# show ip nat translations
Pro Inside global Inside local Outside local Outside
global
192.31.7.1:3 192.31.7.1:1 icmp 209.165.201.18:3 192.168.1.20:1
192.31.7.1:1 192.31.7.1:1 icmp 209.165.201.18:1 192.168.1.21:1
192.31.7.1:4 192.31.7.1:1 icmp 209.165.201.18:4 192.168.1.22:1
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 12