Anzeige
Anzeige

Más contenido relacionado

Anzeige
Anzeige

Nat pat

  1. ICND v2.0—6-1© 2002, Cisco Systems, Inc. All rights reserved. 1 Scaling the network with nat and Pat
  2. ICND v2.0—6-2© 2002, Cisco Systems, Inc. All rights reserved. 2 Intro to NAT/PAT NAT :- the NETWORK ADDRESS TRANSLATION is used to translate the local ip address on a network with the global or public ip addresses. Requirement of NAT when.. 1.you need to connect to the Internet and your hosts don’t have global unique ip addresses. We are using private addresses. 2. 2. You change your network to another ISP and that require to renumber your network. Then using the nat we didn’t need to change our ip addresses. 3. You need to merge two internets with duplicate addresses. 4.No any host from the foreign network can access our local network. Local network security.
  3. ICND v2.0—6-3© 2002, Cisco Systems, Inc. All rights reserved. 3 Advantages disadvantages 1. Conserves legally registered addresses 1.Translation introduces switching path 2. Reduces address overlap occurrence delays. 3. Increase flexibility when connecting to 2. loss of end to end IP traceability. internet 4. Eliminates address renumbering as 3. certain applications will not function network changes. With nat enabled. NAT terms:- Inside local: Name of inside source address before translation Outside local: Name of the destination host before translation Inside global: Name of inside host after translation Outside global: Name of outside destination host after translation
  4. ICND v2.0—6-4 NAT types……………………………… Static NAT:- it is the type of Nat that is designed to allow One-to-one mapping between the local ip addresses and global ip addresses. BUT keep in mind that static NAT require that YOU MUST HAVE ONE REAL INTERNET IP ADDRESS FOR EVERY HOST ON YOUR NETWORK. Dynamic NAT:- this gives the ability to map an unregistered ip address with a registered ip address from out of pool of ip addresses. you don’t have to statically configure your router to map an inside address with an outside address like in static NAT. But you must have the sufficient number of ip addresses for every user who`s going to transfer packets with internet NAT overloading{(PAT-Port Address Translation)}:- this is the most popular type of the NAT configuration it is the type of dynamic NAT. that maps multiple local ip addresses with a single registered ip addresses. __Many –to-One. But it is mostly used because of its feature of using the special port number for every translated addresses with the global ip address through which we can attach unlimited no. of users with the internet using a single ip address only NAT overloading{(PAT-Port Address Translation)}:- this is the most popular type of the NAT configuration it is the type of dynamic NAT. that maps multiple local ip addresses with a single registered ip addresses. __Many –to-One. But it is mostly used because of its feature of using the special port number for every translated addresses with the global ip address through which we can attach unlimited no. of users with the internet using a single ip address only
  5. ICND v2.0—6-5 • An IP address is either local or global. • Local IP addresses are seen in the inside network.
  6. ICND v2.0—6-6
  7. ICND v2.0—6-7
  8. ICND v2.0—6-8 • Establishes static translation between an inside local address and an inside global address Router(config)#ip nat inside source static local-ip global-ip • Marks the interface as connected to the inside Router(config-if)#ip nat inside • Marks the interface as connected to the outside Router(config-if)#ip nat outside
  9. ICND v2.0—6-9© 2002, Cisco Systems, Inc. All rights reserved. 9 NAT configuration TO CONFIGURE STATIC NAT------------ r3>en r3#conf t r3(config)#int serial 0/0 r3(config-if)#ip nat outside r3(config-if)#int fa 0/0 r3(config-if)#ip nat inside r3(config-if)#exit r3(config)#ip nat inside source static 10.0.0.2 20.0.0.3 r3(config)#exit r3#show ip nat translations r3#show ip nat statistics TO REMOVE STATIC NAT:---- r3#conf t r3(config)#no ip nat inside source static 10.0.0.2 20.0.0.3
  10. ICND v2.0—6-10
  11. ICND v2.0—6-11 • Establishes dynamic source translation, specifying the access list defined in the prior step Router(config)#ip nat inside source list access-list-number pool name • Defines a pool of global addresses to be allocated as needed Router(config)#ip nat pool name start-ip end-ip {netmask netmask | prefix-length prefix-length} • Defines a standard IP access list permitting those inside local addresses that are to be translated Router(config)#access-list access-list-number permit source [source-wildcard]
  12. ICND v2.0—6-12© 2002, Cisco Systems, Inc. All rights reserved. 12 Configuring Dynamic Translation HOW TO CONFIGURE DYNAMIC NAT--- r3>en r3#conf t r3(config)#int serial 0/0 r3(config-if)#ip nat outside r3(config-if)#int fa 0/0 r3(config-if)#ip nat inside r3(config-if)#exit r3(config)#ip nat pool abc 20.0.0.3 20.0.0.5 netmask 255.255.255.0 r3(config)#access-list 1 permit any r3(config)#ip nat inside source list 1 pool abc r3(config)#^Z r3#sh ip nat translations r3#sh ip nat statistics r3#clear ip nat translation * HOW TO REMOVE DYNAMIC NAT------------ r3>en r3#conf t r3(config)#no ip nat inside source list 1 pool abc forced r3(config)#no access-list 1 r3(config)#no ip nat pool abc
  13. ICND v2.0—6-13
  14. ICND v2.0—6-14
  15. ICND v2.0—6-15 • Establishes dynamic source translation, specifying the access list defined in the prior step Router(config)#ip nat inside source list access-list-number interface interface overload • Defines a standard IP access list permitting those inside local addresses that are to be translated Router(config)#access-list access-list-number permit source source-wildcard
  16. ICND v2.0—6-16© 2002, Cisco Systems, Inc. All rights reserved. 16 Configuring nat overloading PAT HOW TO CONFIGURE DYNAMIC NAT WITH OVERLOAD (PAT- PORT ADDRESS TRANSLATION)--- r3>en r3#conf t r3(config)#int serial 0/0 r3(config-if)#ip nat outside r3(config-if)#int fa 0/0 r3(config-if)#ip nat inside r3(config-if)#exit r3(config)#ip nat pool xyz 20.0.0.1 20.0.0.1 prefix-length 24 r3(config)#access-list 1 permit any r3(config)#ip nat inside source list 1 pool xyz overload r3(config)#^Z r3#sh ip nat translations r3#sh ip nat statistics r3#clear ip nat translation * HOW TO REMOVE DYNAMIC NAT WITH OVERLOAD (PAT- PORT ADDRESS TRANSLATION)--- r3>en r3#conf t r3(config)#no ip nat inside source list 1 pool xyz forced r3(config)#no access-list 1
  17. ICND v2.0—6-17
  18. ICND v2.0—6-18 • Clears a simple dynamic translation entry containing an inside translation, or both inside and outside translation Router#clear ip nat translation inside global-ip local-ip [outside local-ip global-ip] • Clears all dynamic address translation entries Router#clear ip nat translation * • Clears a simple dynamic translation entry containing an outside translation Router#clear ip nat translation outside local-ip global-ip • Clears an extended dynamic translation entry Router#clear ip nat translation protocol inside global-ip global-port local-ip local-port [outside local-ip local-port global-ip global-port]
  19. ICND v2.0—6-19 • Displays translation statistics Router#show ip nat statistics • Displays active translations Router#show ip nat translations Router#show ip nat translation Pro Inside global Inside local Outside local Outside global --- 172.16.131.1 10.10.10.1 --- --- Router#show ip nat statistics Total active translations: 1 (1 static, 0 dynamic; 0 extended) Outside interfaces: Ethernet0, Serial2.7 Inside interfaces: Ethernet1 Hits: 5 Misses: 0 …
  20. ICND v2.0—6-20
  21. ICND v2.0—6-21
  22. ICND v2.0—6-22 Router#debug ip nat NAT: s=192.168.1.95->172.31.233.209, d=172.31.2.132 [6825] NAT: s=172.31.2.132, d=172.31.233.209->192.168.1.95 [21852] NAT: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6826] NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23311] NAT*: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6827] NAT*: s=192.168.1.95->172.31.233.209, d=172.31.1.161 [6828] NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23313] NAT*: s=172.31.1.161, d=172.31.233.209->192.168.1.95 [23325]
  23. ICND v2.0—6-23 Translation Not Installed in the Translation Table? Verify that:  The configuration is correct.  There are not any inbound access lists denying the packets from entering the NAT router.  The access list referenced by the NAT command is permitting all necessary networks.  There are enough addresses in the NAT pool.  The router interfaces are appropriately defined as NAT inside or NAT outside.
  24. ICND v2.0—6-24 Summary Cisco IOS NAT allows an organization with unregistered private addresses to connect to the Internet by translating those addresses into globally registered IP addresses. You can translate your own IP addresses into globally unique IP addresses when communicating outside of your network. Overloading is a form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address (many-to-one) by using different ports, known also as PAT. Once you have configured NAT, verify that it is operating as expected using the clear and show commands. Sometimes NAT is blamed for IP connectivity problems when there is actually a routing problem.
  25. ICND v2.0—6-25 Workgroup Workgroup Workgroup Pod Router s0 Router e0 Switch A 10.140.1.2 10.2.2.3 10.2.2.11 B 10.140.2.2 10.3.3.3 10.3.3.11 C 10.140.3.2 10.4.4.3 10.4.4.11 D 10.140.4.2 10.5.5.3 10.5.5.11 E 10.140.5.2 10.6.6.3 10.6.6.11 F 10.140.6.2 10.7.7.3 10.7.7.11 G 10.140.7.2 10.8.8.3 10.8.8.11 H 10.140.8.2 10.9.9.3 10.9.9.11 I 10.140.9.2 10.10.10.3 10.10.10.11 J 10.140.10.2 10.11.11.3 10.11.11.11 K 10.140.11.2 10.12.12.3 10.12.12.11 L 10.140.12.2 10.13.13.3 10.13.13.11
  26. ICND v2.0—6-26 Workgroup Workgroup Workgroup Pod Router s0 Router e0 Switch A 10.140.1.2 10.2.2.3 10.2.2.11 B 10.140.2.2 10.3.3.3 10.3.3.11 C 10.140.3.2 10.4.4.3 10.4.4.11 D 10.140.4.2 10.5.5.3 10.5.5.11 E 10.140.5.2 10.6.6.3 10.6.6.11 F 10.140.6.2 10.7.7.3 10.7.7.11 G 10.140.7.2 10.8.8.3 10.8.8.11 H 10.140.8.2 10.9.9.3 10.9.9.11 I 10.140.9.2 10.10.10.3 10.10.10.11 J 10.140.10.2 10.11.11.3 10.11.11.11 K 10.140.11.2 10.12.12.3 10.12.12.11 L 10.140.12.2 10.13.13.3 10.13.13.11

Hinweis der Redaktion

  1. Purpose: This chapter introduces the Cisco IOS™ CLI on the Catalyst® 1900 switch and router. Timing: This chapter should take about 2 hours to present. Note: The Catalyst 1900 switch only has a subset of the router Cisco IOS commands available. Contents: Introduction to Cisco IOS. Explain to the student what is IOS? Cisco Device startup procedures in general. IOS configuration source. General introduction to the IOS CLI. Cat 1900 switch startup procedures. Intro to Cat 1900 CLI. This part covers the basic configuration on the switch, like setting the IP address and hostname. More details about the various Cat 1900 switch configuration commands are explained in Chapter 6 and 7. Router startup procedures. More details on the router startup process is discussed in chapter 5. Router IOS CLI.
  2. Purpose: This chapter introduces the Cisco IOS™ CLI on the Catalyst® 1900 switch and router. Timing: This chapter should take about 2 hours to present. Note: The Catalyst 1900 switch only has a subset of the router Cisco IOS commands available. Contents: Introduction to Cisco IOS. Explain to the student what is IOS? Cisco Device startup procedures in general. IOS configuration source. General introduction to the IOS CLI. Cat 1900 switch startup procedures. Intro to Cat 1900 CLI. This part covers the basic configuration on the switch, like setting the IP address and hostname. More details about the various Cat 1900 switch configuration commands are explained in Chapter 6 and 7. Router startup procedures. More details on the router startup process is discussed in chapter 5. Router IOS CLI.
  3. Purpose: This chapter introduces the Cisco IOS™ CLI on the Catalyst® 1900 switch and router. Timing: This chapter should take about 2 hours to present. Note: The Catalyst 1900 switch only has a subset of the router Cisco IOS commands available. Contents: Introduction to Cisco IOS. Explain to the student what is IOS? Cisco Device startup procedures in general. IOS configuration source. General introduction to the IOS CLI. Cat 1900 switch startup procedures. Intro to Cat 1900 CLI. This part covers the basic configuration on the switch, like setting the IP address and hostname. More details about the various Cat 1900 switch configuration commands are explained in Chapter 6 and 7. Router startup procedures. More details on the router startup process is discussed in chapter 5. Router IOS CLI.
  4. Slide 1 of 2 Purpose: This slide states the chapter objectives. Emphasize: Read or state each objective so that each student has a clear understanding of the chapter objectives. Note: Catalyst switches have different CLIs. The Catalyst 2900xl and the Catalyst 1900 has a Cisco IOS CLI. The Cisco IOS CLI commands available on the 2900xl is different from the 1900. The Catalyst 5000 family has no Cisco IOS CLI, and use the set commands instead. This class only covers the configuration on the Catalyst 1900 switch.
  5. Purpose: This chapter introduces the Cisco IOS™ CLI on the Catalyst® 1900 switch and router. Timing: This chapter should take about 2 hours to present. Note: The Catalyst 1900 switch only has a subset of the router Cisco IOS commands available. Contents: Introduction to Cisco IOS. Explain to the student what is IOS? Cisco Device startup procedures in general. IOS configuration source. General introduction to the IOS CLI. Cat 1900 switch startup procedures. Intro to Cat 1900 CLI. This part covers the basic configuration on the switch, like setting the IP address and hostname. More details about the various Cat 1900 switch configuration commands are explained in Chapter 6 and 7. Router startup procedures. More details on the router startup process is discussed in chapter 5. Router IOS CLI.
  6. Purpose: This chapter introduces the Cisco IOS™ CLI on the Catalyst® 1900 switch and router. Timing: This chapter should take about 2 hours to present. Note: The Catalyst 1900 switch only has a subset of the router Cisco IOS commands available. Contents: Introduction to Cisco IOS. Explain to the student what is IOS? Cisco Device startup procedures in general. IOS configuration source. General introduction to the IOS CLI. Cat 1900 switch startup procedures. Intro to Cat 1900 CLI. This part covers the basic configuration on the switch, like setting the IP address and hostname. More details about the various Cat 1900 switch configuration commands are explained in Chapter 6 and 7. Router startup procedures. More details on the router startup process is discussed in chapter 5. Router IOS CLI.
  7. Purpose: This chapter introduces the Cisco IOS™ CLI on the Catalyst® 1900 switch and router. Timing: This chapter should take about 2 hours to present. Note: The Catalyst 1900 switch only has a subset of the router Cisco IOS commands available. Contents: Introduction to Cisco IOS. Explain to the student what is IOS? Cisco Device startup procedures in general. IOS configuration source. General introduction to the IOS CLI. Cat 1900 switch startup procedures. Intro to Cat 1900 CLI. This part covers the basic configuration on the switch, like setting the IP address and hostname. More details about the various Cat 1900 switch configuration commands are explained in Chapter 6 and 7. Router startup procedures. More details on the router startup process is discussed in chapter 5. Router IOS CLI.
  8. Purpose: This slide discuss the initial configurations on the routers and switches. Note: There is no setup mode on the Catalyst 1900 switch.
  9. Lab 13 ACL Note: Refer to the lab setup guide for lab instructions.
  10. Lab 13 ACL Note: Refer to the lab setup guide for lab instructions.
Anzeige