SlideShare a Scribd company logo
CISCO CCNA
NAT CONFIGURATION
TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW:
WWW.ASMED.COM/C1
ASM EDUCATIONAL CENTER INC. (ASM)
WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE
PHONE: (301) 984-7400
ROCKVILLE,MD
CISCO CCNA NAT CONFIGURATION
CISCO CCNA NAT CONFIGURATION
NAT = NETWORK ADDRESS TRANSLATION
REMEMBER THE PRIVATE IP ADDRESS
10.0.0.0 — 10.255.255.255
172.16.0.0 —-172.31.255.255
192.168.0.0.—– 192.168.255.255
THE GOAL IS TO CONVERT YOUR PRIVATE IP ADDRESS TO PUBLIC ADDRESS SO
THAT YOUR INTERNAL PEOPLE CAN ACCESS THE INTERNET
CISCO CCNA NAT CONFIGURATION
I HAVE 2 KIND:
1) DYNAMIC NAT – USE IT WHEN YOU NEED YOUR PRIVATE NETWORK GO OUT
TO INTERNET – IT HAS TWO KIND
SUPPOSE I HAVE 6 PRIVATE AND THEN ISP GIVE YOU 6 PUBLIC THEN ALL SIX PEOPLE GO TO
INTERNET
SUPPOSE I HAVE 62 PRIVATE AND ISP ONLY GIVE YOU 6 PUBLIC IN THIS CASE ; YOU MUST
USE THE KEY WORD “OVERLOAD” ; THIS CONCEPT IS CALL PAT (PORT ADDRESS
TRANSLATION)
2) STATIC NAT – USE IT WHEN YOU NEED THE INTERNET PEOPLE COME TO
YOUR WEBSERVER; THAT IS LOCATED IN PRIVATE LAN =10.10.10.1; IN THIS CASE YOU
NEED TO USE STATIC NAT
CISCO CCNA NAT CONFIGURATION
HERE IS MY LAB ON NAT/PAT:
GIVEN BY ISP 6 PUBLIC ADDRESS 198.18.151.97
.98, .99,100,101,102 WITH SUBNET MASK /29
/29=255.255.255.248
.11111000
AND I HAVE 62 INTERNAL IP ADDRESS THAT NEED TO GO TO INTERNET
192.168.91.65—192.168.91.126 WITH MASK /26 255.255.255.192
.11000000
CISCO CCNA NAT CONFIGURATION
STEP 1) DEFINE THE POOL OF INSIDE GLOBAL ADDRESS (PUBLIC ADDRESS)
THAT INSIDE LOCAL ADDRESS WILL BE TRANSLATED TO:
HINT: ALWAYS ALWAYS START WITH IP NAT?
R1#
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#IP NAT ?
INSIDE INSIDE ADDRESS TRANSLATION
OUTSIDE OUTSIDE ADDRESS TRANSLATION
POOL DEFINE POOL OF ADDRESSES
R1(CONFIG)#IP NAT POO
R1(CONFIG)#IP NAT POOL ?
WORD POOL NAME
R1(CONFIG)#IP NAT POOL CCNA ?
CISCO CCNA NAT CONFIGURATION
A.B.C.D START IP ADDRESS
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 ?
A.B.C.D END IP ADDRESS
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 ?
NETMASK SPECIFY THE NETWORK MASK
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NET
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK ?
A.B.C.D NETWORK MASK
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK
255.255.255.248 ?
<CR>
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK
255.255.255.248
R1(CONFIG)#
CISCO CCNA NAT CONFIGURATION
HERE IS MY SHOW RUN:
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
HINT: ANY TIME YOU SEE THE WORD POOL IT WILL TELL YOU; THAT IS PUBLIC IP ADDRESS
STEP 2) DEFINE THE SOURCE OF THE INSIDE LOCAL ADDRESS AND BIND IT TO CCNA DEFINED IN PART 1
HINT: IP NAT?
R1#
R1#
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#IP NAT ?
INSIDE INSIDE ADDRESS TRANSLATION
OUTSIDE OUTSIDE ADDRESS TRANSLATION
POOL DEFINE POOL OF ADDRESSES
R1(CONFIG)#IP NAT
% INCOMPLETE COMMAND.
R1(CONFIG)#IP NAT INS
R1(CONFIG)#IP NAT INSIDE ?
SOURCE SOURCE ADDRESS TRANSLATION
CISCO CCNA NAT CONFIGURATION
R1(CONFIG)#IP NAT INSIDE SOU
R1(CONFIG)#IP NAT INSIDE SOURCE ?
LIST SPECIFY ACCESS LIST DESCRIBING LOCAL ADDRESSES
STATIC SPECIFY STATIC LOCAL->GLOBAL MAPPING
R1(CONFIG)#IP NAT INSIDE SOURCE LIST ?
<1-199> ACCESS LIST NUMBER FOR LOCAL ADDRESSES
WORD ACCESS LIST NAME FOR LOCAL ADDRESSES
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 ?
INTERFACE SPECIFY INTERFACE FOR GLOBAL ADDRESS
POOL NAME POOL OF GLOBAL ADDRESSES
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POO
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL ?
WORD NAME POOL OF GLOBAL ADDRESSES
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA ?
OVERLOAD OVERLOAD AN ADDRESS TRANSLATION
<CR>
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVE
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD ?
<CR>
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
CISCO CCNA NAT CONFIGURATION
HINT: IF ISP HAS GIVEN YOU A SINGLE IP ADDRESS AFTER LIST 1 ? I WILL USE INTERFACE S0/0
HINT: WHEN YOU SEE THE WORD LIST THAT SHOULD TELL YOU ; I NEED TO HAVE ACL 1 THAT WILL
DEFINE MY LOCAL ADDRESS
STEP 3) NOW DEFINE YOU ACL 1
HINT: I HAVE /26
255.255.255.255-
255.255.255.192
————–
0.0.0.63 AS WILD CARDS
R1(CONFIG )# ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
SUBNET ID WILD CARDS
CISCO CCNA NAT CONFIGURATION
R1(CONFIG)#
R1(CONFIG)#ACC
R1(CONFIG)#ACCESS-LIST ?
<1-99> IP STANDARD ACCESS LIST
<100-199> IP EXTENDED ACCESS LIST
R1(CONFIG)#ACCESS-LIST 1 ?
DENY SPECIFY PACKETS TO REJECT
PERMIT SPECIFY PACKETS TO FORWARD
REMARK ACCESS LIST ENTRY COMMENT
R1(CONFIG)#ACCESS-LIST 1 PERMI
R1(CONFIG)#ACCESS-LIST 1 PERMIT ?
A.B.C.D ADDRESS TO MATCH
ANY ANY SOURCE HOST
HOST A SINGLE HOST ADDRESS
R1(CONFIG)#ACCESS-LIST 1 PERMIT 192.168.91.69 0.0.0.63
CISCO CCNA NAT CONFIGURATION
HERE I INTENTIONALLY PUT WRONG SUBNET ID; BUT IOS WILL FIX IT FOR ME:
HERE IS MY SHOW RUN:
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
STEP 4) TELL ROUTER WHICH SIDE IS INSIDE AND WHICH SIDE IS OUTSIDE AND MAKE SURE BE UNDER
INTERFACE AND GIVE:
INT F0/0
IP NAT INSIDE
INT S0/0
IP NAT OUTSIDE
CISCO CCNA NAT CONFIGURATION
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#INT F0/0
R1(CONFIG-IF)#IP NAT
R1(CONFIG-IF)#IP NAT ?
INSIDE INSIDE INTERFACE FOR ADDRESS TRANSLATION
OUTSIDE OUTSIDE INTERFACE FOR ADDRESS TRANSLATION
R1(CONFIG-IF)#IP NAT INS
R1(CONFIG-IF)#IP NAT INSIDE
R1(CONFIG-IF)#
R1(CONFIG-IF)#
R1(CONFIG-IF)#INT S0/0
R1(CONFIG-IF)#IP NAT ?
INSIDE INSIDE INTERFACE FOR ADDRESS TRANSLATION
OUTSIDE OUTSIDE INTERFACE FOR ADDRESS TRANSLATION
R1(CONFIG-IF)#IP NAT OUT
R1(CONFIG-IF)#IP NAT OUTSIDE
CISCO CCNA NAT CONFIGURATION
NOW LET’S LOOK AT SHOW RUN:
INTERFACE FASTETHERNET0/0
IP ADDRESS 192.168.91.126 255.255.255.192
IP NAT INSIDE
DUPLEX AUTO
SPEED AUTO
!
!
INTERFACE SERIAL0/0
IP ADDRESS 192.0.1.109 255.255.255.252
IP NAT OUTSIDE
CLOCK RATE 64000
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
LAST TWO STEPS IS DONE TO CHECK AND MAKE SURE LIFE IS GOOD;
CISCO CCNA NAT CONFIGURATION
STEP 5) MAKE SURE YOUR ROUTER HAS A DEFAULT ROUTE TO ISP.
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#
R1(CONFIG)#IP ROUTE 0.0.0.0 0.0.0.0 ?
A.B.C.D FORWARDING ROUTER’S ADDRESS
ETHERNET IEEE 802.3
FASTETHERNET FASTETHERNET IEEE 802.3
GIGABITETHERNET GIGABITETHERNET IEEE 802.3Z
LOOPBACK LOOPBACK INTERFACE
NULL NULL INTERFACE
SERIAL SERIAL
R1(CONFIG)#IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
CISCO CCNA NAT CONFIGURATION
STEP 6) MAKE SURE ISP KNOWS YOUR NETWORK; SO ISP WILL NEED A STATIC ROUTE BACK TO
YOUR NETWORK
ISP#
ISP#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
ISP(CONFIG)#IP ROUTE ?
A.B.C.D DESTINATION PREFIX
ISP(CONFIG)#IP ROUTE 198.18.151.96 ?
A.B.C.D DESTINATION PREFIX MASK
ISP(CONFIG)#IP ROUTE 198.18.151.96 255.255.255.248 ?
A.B.C.D FORWARDING ROUTER’S ADDRESS
ETHERNET IEEE 802.3
FASTETHERNET FASTETHERNET IEEE 802.3
GIGABITETHERNET GIGABITETHERNET IEEE 802.3Z
LOOPBACK LOOPBACK INTERFACE
NULL NULL INTERFACE
SERIAL SERIAL
ISP(CONFIG)#IP ROUTE 198.18.151.96 255.255.255.248 S0/0
ISP(CONFIG)#
CISCO CCNA NAT CONFIGURATION
AS WE SEE FOR ISP MAKE SURE YOU USE THE PUBLIC ADDRESS NOT PRIVATE; SNICE ISP DOES NOT KNOW YOUR
PRIVATE IP ADDRESS
NOW I GO AND CHECK THE PING FROM PC TO INTERNET; THEN I GO TO R1#SHOW IP NAT TRANSLATION
!
PC>
PC>PING 192.0.1.110
PINGING 192.0.1.110 WITH 32 BYTES OF DATA:
REPLY FROM 192.0.1.110: BYTES=32 TIME=13MS TTL=254
REPLY FROM 192.0.1.110: BYTES=32 TIME=15MS TTL=254
REPLY FROM 192.0.1.110: BYTES=32 TIME=11MS TTL=254
REPLY FROM 192.0.1.110: BYTES=32 TIME=12MS TTL=254
PING STATISTICS FOR 192.0.1.110:
PACKETS: SENT = 4, RECEIVED = 4, LOST = 0 (0% LOSS),
APPROXIMATE ROUND TRIP TIMES IN MILLI-SECONDS:
MINIMUM = 11MS, MAXIMUM = 15MS, AVERAGE = 12MS
CISCO CCNA NAT CONFIGURATION
R1#SHOW IP NAT TRANSLATIONS
PRO INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
ICMP 198.18.151.97:10 192.168.91.65:10 192.0.1.110:10 192.0.1.110:10
ICMP 198.18.151.97:11 192.168.91.65:11 192.0.1.110:11 192.0.1.110:11
ICMP 198.18.151.97:12 192.168.91.65:12 192.0.1.110:12 192.0.1.110:12
ICMP 198.18.151.97:9 192.168.91.65:9 192.0.1.110:9 192.0.1.110:9
CISCO CCNA NAT CONFIGURATION
HERE IS THE SUMMARY:
INTERFACE FASTETHERNET0/0
IP ADDRESS 192.168.91.126 255.255.255.192
IP NAT INSIDE
DUPLEX AUTO
SPEED AUTO
!
INTERFACE SERIAL0/0
IP ADDRESS 192.0.1.109 255.255.255.252
IP NAT OUTSIDE
CLOCK RATE 64000
!
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
!
CISCO CCNA NAT CONFIGURATION
HINT: IF ISP HAS GIVEN YOU SINGLE IP ADDRESS THEN YOU DO NOT NEED THE POOL STATEMENT ( THE 1ST
STATEMENT) ; AND ALSO YOUR 2ND STATMENT WILL BE LIKE THIS
IP NAT INSIDE SOURCE LIST 1 INT S0/0 OVERLOAD
NOW IF I ADD ANOTHER LAN (10.10.10.0/24) USING MY INT F0/1
MAKE SURE YOU HAVE DEFINE ACL FOR NETWORK 10.10.10.0 /24 TO GO OUT AND
MAKE SURE YOUR APPLY TO INT F0/1 WITH COMMAND IP NAT INSIDE
INTERFACE FASTETHERNET0/0
IP ADDRESS 192.168.91.126 255.255.255.192
IP NAT INSIDE
DUPLEX AUTO
SPEED AUTO
!
CISCO CCNA NAT CONFIGURATION
INTERFACE FASTETHERNET0/1
IP ADDRESS 10.10.10.100 255.255.255.0
IP NAT INSIDE ( PLEASE ADD THIS)
DUPLEX AUTO
SPEED AUTO
!
INTERFACE SERIAL0/0
IP ADDRESS 192.0.1.109 255.255.255.252
IP NAT OUTSIDE
CLOCK RATE 64000
!
CISCO CCNA NAT CONFIGURATION
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
ACCESS-LIST 1 PERMIT 10.10.10.0 0.0.0.255 (PLEASE ADD THIS LINE)
!
ASM EDUCATIONAL CENTER INC. (ASM)
WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE
TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK
BELOW:
WWW.ASMED.COM/C1
PHONE: (301) 984-7400
ROCKVILLE,MD

More Related Content

What's hot (20)

PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
 
PDF
Router commands
Akshay Bhardwaj
 
PDF
CCN3Switching_lab_5_5_2
alan moreno
 
PPTX
Dynamic NAT
NetProtocol Xpert
 
PDF
Cisco vs. huawei CLI Commands
Bootcamp SCL
 
PPT
Subnetting.ppt
AkbarFernanda1
 
PDF
Lte call flows_att_best_practices_lte_pe
Hatim100
 
PPTX
Static NAT
NetProtocol Xpert
 
PDF
Ccna Commands In 10 Minutes
CCNAResources
 
PDF
Ccnp workbook network bulls
Swapnil Kapate
 
PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
 
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
PDF
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
PPTX
Cisco CCNA- How to Configure Multi-Layer Switch
Hamed Moghaddam
 
PPTX
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
 
PPT
Nat pat
CYBERINTELLIGENTS
 
PDF
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
Salem Trabelsi
 
PDF
Lan Switching[1]
sarvodaya2001
 
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
 
Router commands
Akshay Bhardwaj
 
CCN3Switching_lab_5_5_2
alan moreno
 
Dynamic NAT
NetProtocol Xpert
 
Cisco vs. huawei CLI Commands
Bootcamp SCL
 
Subnetting.ppt
AkbarFernanda1
 
Lte call flows_att_best_practices_lte_pe
Hatim100
 
Static NAT
NetProtocol Xpert
 
Ccna Commands In 10 Minutes
CCNAResources
 
Ccnp workbook network bulls
Swapnil Kapate
 
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
Cisco CCNA- How to Configure Multi-Layer Switch
Hamed Moghaddam
 
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
Salem Trabelsi
 
Lan Switching[1]
sarvodaya2001
 

Viewers also liked (12)

PPTX
Juniper JNCIA – Juniper RIP Route Configuration
Hamed Moghaddam
 
PPTX
Juniper JNCIA – Juniper Floating Static Route Configuration
Hamed Moghaddam
 
PPTX
Cisco CCNA EIGRP IPV6 Configuration
Hamed Moghaddam
 
PPTX
Juniper JNCIA – Juniper OSPF Route Configuration
Hamed Moghaddam
 
PPTX
Cisco CCNA-CCNP IP SLA Configuration
Hamed Moghaddam
 
PPTX
Microsoft MCSA - Install active directory domain services (adds) role
Hamed Moghaddam
 
PPTX
Cisco CCNA CCNP VACL Configuration
Hamed Moghaddam
 
PPTX
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Hamed Moghaddam
 
PPTX
Cisco CCNA IP SLA with tracking configuration
Hamed Moghaddam
 
PPTX
Cisco CCNA Port Security
Hamed Moghaddam
 
PPTX
Cisco CCNA IPV6 Static Configuration
Hamed Moghaddam
 
PPTX
Cisco CCNA OSPF IPV6 Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper RIP Route Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper Floating Static Route Configuration
Hamed Moghaddam
 
Cisco CCNA EIGRP IPV6 Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper OSPF Route Configuration
Hamed Moghaddam
 
Cisco CCNA-CCNP IP SLA Configuration
Hamed Moghaddam
 
Microsoft MCSA - Install active directory domain services (adds) role
Hamed Moghaddam
 
Cisco CCNA CCNP VACL Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Hamed Moghaddam
 
Cisco CCNA IP SLA with tracking configuration
Hamed Moghaddam
 
Cisco CCNA Port Security
Hamed Moghaddam
 
Cisco CCNA IPV6 Static Configuration
Hamed Moghaddam
 
Cisco CCNA OSPF IPV6 Configuration
Hamed Moghaddam
 
Ad

Similar to Cisco CCNA- NAT Configuration (20)

PPTX
Nat
Elshan86
 
PDF
NAT Scneario
Mansour Naslcheraghi
 
PPTX
ASSIGNMENT PPT.pptx
dadykatikiro
 
PPT
Day 17.1 nat pat (2)
CYBERINTELLIGENTS
 
PDF
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
 
PDF
Ccna4
sizal1986
 
PPTX
Basic ASA Configuration, NAT in ASA Firewall
NetProtocol Xpert
 
DOCX
Nat failover with dual isp on cisco router configuration explained with example
unixhowto
 
PPTX
CCNA2 Verson6 Chapter9
Chaing Ravuth
 
PDF
cisco ccna cheat_sheet
Guntaka Reddy
 
PDF
ccna cheat_sheet
Guntaka Reddy
 
PDF
Ncat ccna cheat sheet
EZREIG OMAR
 
PDF
Cisco Commands
Fredrick Hall
 
PPT
Nat 03
Davinder Chauhan
 
PPTX
Cisco CCNA-Standard Access List
Hamed Moghaddam
 
PPT
N at
Sumit Tambe
 
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
Waqas Ahmed Nawaz
 
PPT
CCNA Network Services
Dsunte Wilson
 
PPT
Day 17.1 nat pat
CYBERINTELLIGENTS
 
DOCX
Nat report2
Davinder Chauhan
 
NAT Scneario
Mansour Naslcheraghi
 
ASSIGNMENT PPT.pptx
dadykatikiro
 
Day 17.1 nat pat (2)
CYBERINTELLIGENTS
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Agnieszka Kuba
 
Ccna4
sizal1986
 
Basic ASA Configuration, NAT in ASA Firewall
NetProtocol Xpert
 
Nat failover with dual isp on cisco router configuration explained with example
unixhowto
 
CCNA2 Verson6 Chapter9
Chaing Ravuth
 
cisco ccna cheat_sheet
Guntaka Reddy
 
ccna cheat_sheet
Guntaka Reddy
 
Ncat ccna cheat sheet
EZREIG OMAR
 
Cisco Commands
Fredrick Hall
 
Cisco CCNA-Standard Access List
Hamed Moghaddam
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
Waqas Ahmed Nawaz
 
CCNA Network Services
Dsunte Wilson
 
Day 17.1 nat pat
CYBERINTELLIGENTS
 
Nat report2
Davinder Chauhan
 
Ad

More from Hamed Moghaddam (10)

PPTX
Cisco CCNA GRE Tunnel Configuration
Hamed Moghaddam
 
PPTX
Cisco CCNA- PPP Multilink Configuration
Hamed Moghaddam
 
PPTX
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
PPTX
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
PPTX
Cisco CCNA-Router on Stick
Hamed Moghaddam
 
PPTX
Cisco CCNA- DHCP Server
Hamed Moghaddam
 
PPTX
Microsoft MCSA- Joining Client Machines To The Domain!
Hamed Moghaddam
 
PPTX
CISSP Certification-Asset Security
Hamed Moghaddam
 
PPTX
Cissp- Security and Risk Management
Hamed Moghaddam
 
PPTX
Become CISSP Certified
Hamed Moghaddam
 
Cisco CCNA GRE Tunnel Configuration
Hamed Moghaddam
 
Cisco CCNA- PPP Multilink Configuration
Hamed Moghaddam
 
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
Cisco CCNA-Router on Stick
Hamed Moghaddam
 
Cisco CCNA- DHCP Server
Hamed Moghaddam
 
Microsoft MCSA- Joining Client Machines To The Domain!
Hamed Moghaddam
 
CISSP Certification-Asset Security
Hamed Moghaddam
 
Cissp- Security and Risk Management
Hamed Moghaddam
 
Become CISSP Certified
Hamed Moghaddam
 

Recently uploaded (20)

PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PDF
Characteristics, Strengths and Weaknesses of Quantitative Research.pdf
Thelma Villaflores
 
PPTX
HUMAN RESOURCE MANAGEMENT: RECRUITMENT, SELECTION, PLACEMENT, DEPLOYMENT, TRA...
PRADEEP ABOTHU
 
PDF
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
PDF
Governor Josh Stein letter to NC delegation of U.S. House
Mebane Rash
 
PPTX
infertility, types,causes, impact, and management
Ritu480198
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PPTX
Nitrogen rule, ring rule, mc lafferty.pptx
nbisen2001
 
PPTX
How to Manage Allocation Report for Manufacturing Orders in Odoo 18
Celine George
 
PPTX
DAY 1_QUARTER1 ENGLISH 5 WEEK- PRESENTATION.pptx
BanyMacalintal
 
PPTX
How to Send Email From Odoo 18 Website - Odoo Slides
Celine George
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PDF
Is Assignment Help Legal in Australia_.pdf
thomas19williams83
 
PPTX
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
PPTX
EDUCATIONAL MEDIA/ TEACHING AUDIO VISUAL AIDS
Sonali Gupta
 
PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PDF
epi editorial commitee meeting presentation
MIPLM
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
Characteristics, Strengths and Weaknesses of Quantitative Research.pdf
Thelma Villaflores
 
HUMAN RESOURCE MANAGEMENT: RECRUITMENT, SELECTION, PLACEMENT, DEPLOYMENT, TRA...
PRADEEP ABOTHU
 
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
Governor Josh Stein letter to NC delegation of U.S. House
Mebane Rash
 
infertility, types,causes, impact, and management
Ritu480198
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
Nitrogen rule, ring rule, mc lafferty.pptx
nbisen2001
 
How to Manage Allocation Report for Manufacturing Orders in Odoo 18
Celine George
 
DAY 1_QUARTER1 ENGLISH 5 WEEK- PRESENTATION.pptx
BanyMacalintal
 
How to Send Email From Odoo 18 Website - Odoo Slides
Celine George
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
Is Assignment Help Legal in Australia_.pdf
thomas19williams83
 
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
EDUCATIONAL MEDIA/ TEACHING AUDIO VISUAL AIDS
Sonali Gupta
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
epi editorial commitee meeting presentation
MIPLM
 

Cisco CCNA- NAT Configuration

  • 1. CISCO CCNA NAT CONFIGURATION TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW: WWW.ASMED.COM/C1 ASM EDUCATIONAL CENTER INC. (ASM) WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE PHONE: (301) 984-7400 ROCKVILLE,MD
  • 2. CISCO CCNA NAT CONFIGURATION
  • 3. CISCO CCNA NAT CONFIGURATION NAT = NETWORK ADDRESS TRANSLATION REMEMBER THE PRIVATE IP ADDRESS 10.0.0.0 — 10.255.255.255 172.16.0.0 —-172.31.255.255 192.168.0.0.—– 192.168.255.255 THE GOAL IS TO CONVERT YOUR PRIVATE IP ADDRESS TO PUBLIC ADDRESS SO THAT YOUR INTERNAL PEOPLE CAN ACCESS THE INTERNET
  • 4. CISCO CCNA NAT CONFIGURATION I HAVE 2 KIND: 1) DYNAMIC NAT – USE IT WHEN YOU NEED YOUR PRIVATE NETWORK GO OUT TO INTERNET – IT HAS TWO KIND SUPPOSE I HAVE 6 PRIVATE AND THEN ISP GIVE YOU 6 PUBLIC THEN ALL SIX PEOPLE GO TO INTERNET SUPPOSE I HAVE 62 PRIVATE AND ISP ONLY GIVE YOU 6 PUBLIC IN THIS CASE ; YOU MUST USE THE KEY WORD “OVERLOAD” ; THIS CONCEPT IS CALL PAT (PORT ADDRESS TRANSLATION) 2) STATIC NAT – USE IT WHEN YOU NEED THE INTERNET PEOPLE COME TO YOUR WEBSERVER; THAT IS LOCATED IN PRIVATE LAN =10.10.10.1; IN THIS CASE YOU NEED TO USE STATIC NAT
  • 5. CISCO CCNA NAT CONFIGURATION HERE IS MY LAB ON NAT/PAT: GIVEN BY ISP 6 PUBLIC ADDRESS 198.18.151.97 .98, .99,100,101,102 WITH SUBNET MASK /29 /29=255.255.255.248 .11111000 AND I HAVE 62 INTERNAL IP ADDRESS THAT NEED TO GO TO INTERNET 192.168.91.65—192.168.91.126 WITH MASK /26 255.255.255.192 .11000000
  • 6. CISCO CCNA NAT CONFIGURATION STEP 1) DEFINE THE POOL OF INSIDE GLOBAL ADDRESS (PUBLIC ADDRESS) THAT INSIDE LOCAL ADDRESS WILL BE TRANSLATED TO: HINT: ALWAYS ALWAYS START WITH IP NAT? R1# R1#CONFIG T ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z. R1(CONFIG)#IP NAT ? INSIDE INSIDE ADDRESS TRANSLATION OUTSIDE OUTSIDE ADDRESS TRANSLATION POOL DEFINE POOL OF ADDRESSES R1(CONFIG)#IP NAT POO R1(CONFIG)#IP NAT POOL ? WORD POOL NAME R1(CONFIG)#IP NAT POOL CCNA ?
  • 7. CISCO CCNA NAT CONFIGURATION A.B.C.D START IP ADDRESS R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 ? A.B.C.D END IP ADDRESS R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 ? NETMASK SPECIFY THE NETWORK MASK R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NET R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK ? A.B.C.D NETWORK MASK R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 ? <CR> R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 R1(CONFIG)#
  • 8. CISCO CCNA NAT CONFIGURATION HERE IS MY SHOW RUN: IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 HINT: ANY TIME YOU SEE THE WORD POOL IT WILL TELL YOU; THAT IS PUBLIC IP ADDRESS STEP 2) DEFINE THE SOURCE OF THE INSIDE LOCAL ADDRESS AND BIND IT TO CCNA DEFINED IN PART 1 HINT: IP NAT? R1# R1# R1#CONFIG T ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z. R1(CONFIG)#IP NAT ? INSIDE INSIDE ADDRESS TRANSLATION OUTSIDE OUTSIDE ADDRESS TRANSLATION POOL DEFINE POOL OF ADDRESSES R1(CONFIG)#IP NAT % INCOMPLETE COMMAND. R1(CONFIG)#IP NAT INS R1(CONFIG)#IP NAT INSIDE ? SOURCE SOURCE ADDRESS TRANSLATION
  • 9. CISCO CCNA NAT CONFIGURATION R1(CONFIG)#IP NAT INSIDE SOU R1(CONFIG)#IP NAT INSIDE SOURCE ? LIST SPECIFY ACCESS LIST DESCRIBING LOCAL ADDRESSES STATIC SPECIFY STATIC LOCAL->GLOBAL MAPPING R1(CONFIG)#IP NAT INSIDE SOURCE LIST ? <1-199> ACCESS LIST NUMBER FOR LOCAL ADDRESSES WORD ACCESS LIST NAME FOR LOCAL ADDRESSES R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 ? INTERFACE SPECIFY INTERFACE FOR GLOBAL ADDRESS POOL NAME POOL OF GLOBAL ADDRESSES R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POO R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL ? WORD NAME POOL OF GLOBAL ADDRESSES R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA ? OVERLOAD OVERLOAD AN ADDRESS TRANSLATION <CR> R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVE R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD ? <CR> R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
  • 10. CISCO CCNA NAT CONFIGURATION HINT: IF ISP HAS GIVEN YOU A SINGLE IP ADDRESS AFTER LIST 1 ? I WILL USE INTERFACE S0/0 HINT: WHEN YOU SEE THE WORD LIST THAT SHOULD TELL YOU ; I NEED TO HAVE ACL 1 THAT WILL DEFINE MY LOCAL ADDRESS STEP 3) NOW DEFINE YOU ACL 1 HINT: I HAVE /26 255.255.255.255- 255.255.255.192 ————– 0.0.0.63 AS WILD CARDS R1(CONFIG )# ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63 SUBNET ID WILD CARDS
  • 11. CISCO CCNA NAT CONFIGURATION R1(CONFIG)# R1(CONFIG)#ACC R1(CONFIG)#ACCESS-LIST ? <1-99> IP STANDARD ACCESS LIST <100-199> IP EXTENDED ACCESS LIST R1(CONFIG)#ACCESS-LIST 1 ? DENY SPECIFY PACKETS TO REJECT PERMIT SPECIFY PACKETS TO FORWARD REMARK ACCESS LIST ENTRY COMMENT R1(CONFIG)#ACCESS-LIST 1 PERMI R1(CONFIG)#ACCESS-LIST 1 PERMIT ? A.B.C.D ADDRESS TO MATCH ANY ANY SOURCE HOST HOST A SINGLE HOST ADDRESS R1(CONFIG)#ACCESS-LIST 1 PERMIT 192.168.91.69 0.0.0.63
  • 12. CISCO CCNA NAT CONFIGURATION HERE I INTENTIONALLY PUT WRONG SUBNET ID; BUT IOS WILL FIX IT FOR ME: HERE IS MY SHOW RUN: IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD IP CLASSLESS ! ! ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63 STEP 4) TELL ROUTER WHICH SIDE IS INSIDE AND WHICH SIDE IS OUTSIDE AND MAKE SURE BE UNDER INTERFACE AND GIVE: INT F0/0 IP NAT INSIDE INT S0/0 IP NAT OUTSIDE
  • 13. CISCO CCNA NAT CONFIGURATION R1#CONFIG T ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z. R1(CONFIG)#INT F0/0 R1(CONFIG-IF)#IP NAT R1(CONFIG-IF)#IP NAT ? INSIDE INSIDE INTERFACE FOR ADDRESS TRANSLATION OUTSIDE OUTSIDE INTERFACE FOR ADDRESS TRANSLATION R1(CONFIG-IF)#IP NAT INS R1(CONFIG-IF)#IP NAT INSIDE R1(CONFIG-IF)# R1(CONFIG-IF)# R1(CONFIG-IF)#INT S0/0 R1(CONFIG-IF)#IP NAT ? INSIDE INSIDE INTERFACE FOR ADDRESS TRANSLATION OUTSIDE OUTSIDE INTERFACE FOR ADDRESS TRANSLATION R1(CONFIG-IF)#IP NAT OUT R1(CONFIG-IF)#IP NAT OUTSIDE
  • 14. CISCO CCNA NAT CONFIGURATION NOW LET’S LOOK AT SHOW RUN: INTERFACE FASTETHERNET0/0 IP ADDRESS 192.168.91.126 255.255.255.192 IP NAT INSIDE DUPLEX AUTO SPEED AUTO ! ! INTERFACE SERIAL0/0 IP ADDRESS 192.0.1.109 255.255.255.252 IP NAT OUTSIDE CLOCK RATE 64000 IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD IP CLASSLESS ! ! ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63 LAST TWO STEPS IS DONE TO CHECK AND MAKE SURE LIFE IS GOOD;
  • 15. CISCO CCNA NAT CONFIGURATION STEP 5) MAKE SURE YOUR ROUTER HAS A DEFAULT ROUTE TO ISP. R1#CONFIG T ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z. R1(CONFIG)# R1(CONFIG)#IP ROUTE 0.0.0.0 0.0.0.0 ? A.B.C.D FORWARDING ROUTER’S ADDRESS ETHERNET IEEE 802.3 FASTETHERNET FASTETHERNET IEEE 802.3 GIGABITETHERNET GIGABITETHERNET IEEE 802.3Z LOOPBACK LOOPBACK INTERFACE NULL NULL INTERFACE SERIAL SERIAL R1(CONFIG)#IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
  • 16. CISCO CCNA NAT CONFIGURATION STEP 6) MAKE SURE ISP KNOWS YOUR NETWORK; SO ISP WILL NEED A STATIC ROUTE BACK TO YOUR NETWORK ISP# ISP#CONFIG T ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z. ISP(CONFIG)#IP ROUTE ? A.B.C.D DESTINATION PREFIX ISP(CONFIG)#IP ROUTE 198.18.151.96 ? A.B.C.D DESTINATION PREFIX MASK ISP(CONFIG)#IP ROUTE 198.18.151.96 255.255.255.248 ? A.B.C.D FORWARDING ROUTER’S ADDRESS ETHERNET IEEE 802.3 FASTETHERNET FASTETHERNET IEEE 802.3 GIGABITETHERNET GIGABITETHERNET IEEE 802.3Z LOOPBACK LOOPBACK INTERFACE NULL NULL INTERFACE SERIAL SERIAL ISP(CONFIG)#IP ROUTE 198.18.151.96 255.255.255.248 S0/0 ISP(CONFIG)#
  • 17. CISCO CCNA NAT CONFIGURATION AS WE SEE FOR ISP MAKE SURE YOU USE THE PUBLIC ADDRESS NOT PRIVATE; SNICE ISP DOES NOT KNOW YOUR PRIVATE IP ADDRESS NOW I GO AND CHECK THE PING FROM PC TO INTERNET; THEN I GO TO R1#SHOW IP NAT TRANSLATION ! PC> PC>PING 192.0.1.110 PINGING 192.0.1.110 WITH 32 BYTES OF DATA: REPLY FROM 192.0.1.110: BYTES=32 TIME=13MS TTL=254 REPLY FROM 192.0.1.110: BYTES=32 TIME=15MS TTL=254 REPLY FROM 192.0.1.110: BYTES=32 TIME=11MS TTL=254 REPLY FROM 192.0.1.110: BYTES=32 TIME=12MS TTL=254 PING STATISTICS FOR 192.0.1.110: PACKETS: SENT = 4, RECEIVED = 4, LOST = 0 (0% LOSS), APPROXIMATE ROUND TRIP TIMES IN MILLI-SECONDS: MINIMUM = 11MS, MAXIMUM = 15MS, AVERAGE = 12MS
  • 18. CISCO CCNA NAT CONFIGURATION R1#SHOW IP NAT TRANSLATIONS PRO INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL ICMP 198.18.151.97:10 192.168.91.65:10 192.0.1.110:10 192.0.1.110:10 ICMP 198.18.151.97:11 192.168.91.65:11 192.0.1.110:11 192.0.1.110:11 ICMP 198.18.151.97:12 192.168.91.65:12 192.0.1.110:12 192.0.1.110:12 ICMP 198.18.151.97:9 192.168.91.65:9 192.0.1.110:9 192.0.1.110:9
  • 19. CISCO CCNA NAT CONFIGURATION HERE IS THE SUMMARY: INTERFACE FASTETHERNET0/0 IP ADDRESS 192.168.91.126 255.255.255.192 IP NAT INSIDE DUPLEX AUTO SPEED AUTO ! INTERFACE SERIAL0/0 IP ADDRESS 192.0.1.109 255.255.255.252 IP NAT OUTSIDE CLOCK RATE 64000 ! IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD IP CLASSLESS IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110 ! ! ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63 !
  • 20. CISCO CCNA NAT CONFIGURATION HINT: IF ISP HAS GIVEN YOU SINGLE IP ADDRESS THEN YOU DO NOT NEED THE POOL STATEMENT ( THE 1ST STATEMENT) ; AND ALSO YOUR 2ND STATMENT WILL BE LIKE THIS IP NAT INSIDE SOURCE LIST 1 INT S0/0 OVERLOAD NOW IF I ADD ANOTHER LAN (10.10.10.0/24) USING MY INT F0/1 MAKE SURE YOU HAVE DEFINE ACL FOR NETWORK 10.10.10.0 /24 TO GO OUT AND MAKE SURE YOUR APPLY TO INT F0/1 WITH COMMAND IP NAT INSIDE INTERFACE FASTETHERNET0/0 IP ADDRESS 192.168.91.126 255.255.255.192 IP NAT INSIDE DUPLEX AUTO SPEED AUTO !
  • 21. CISCO CCNA NAT CONFIGURATION INTERFACE FASTETHERNET0/1 IP ADDRESS 10.10.10.100 255.255.255.0 IP NAT INSIDE ( PLEASE ADD THIS) DUPLEX AUTO SPEED AUTO ! INTERFACE SERIAL0/0 IP ADDRESS 192.0.1.109 255.255.255.252 IP NAT OUTSIDE CLOCK RATE 64000 !
  • 22. CISCO CCNA NAT CONFIGURATION IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248 IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD IP CLASSLESS IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110 ! ! ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63 ACCESS-LIST 1 PERMIT 10.10.10.0 0.0.0.255 (PLEASE ADD THIS LINE) !
  • 23. ASM EDUCATIONAL CENTER INC. (ASM) WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW: WWW.ASMED.COM/C1 PHONE: (301) 984-7400 ROCKVILLE,MD