SlideShare ist ein Scribd-Unternehmen logo
1 von 62
Instructor Materials
Chapter 9: NAT for IPv4
CCNA Routing and Switching
Routing and Switching Essentials v6.0
3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 9: NAT for IPv4
Routing and Switching Essentials 6.0
Planning Guide
Chapter 9: NAT for IPv4
CCNA Routing and Switching
Routing and Switching
Essentials v6.0
22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 9.1 NAT Operation
• Explain how NAT provides IPv4 address scalability in a small to medium-sized business
network
• Explain the purpose and function of NAT.
• Explain the operation of different types of NAT.
• Describe the advantages and disadvantages of NAT.
 9.2 Configure NAT
• Configure NAT services on the edge router to provide IPv4 address scalability in a small
to medium-sized business network.
• Configure static NAT using the CLI.
• Configure dynamic NAT using the CLI.
Chapter 9 - Sections & Objectives
23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 9.2 Configure NAT (Cont.)
• Configure PAT using the CLI.
• Configure port forwarding using the CLI.
 9.3 Troubleshoot NAT
• Troubleshoot NAT issues in a small to medium-sized business network.
• Troubleshoot NAT
Chapter 9 - Sections & Objectives (Cont.)
24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9.1 NAT Operation
25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Private IP addresses are used within an organization and home
networks.
NAT Characteristics
IPv4 Private Address Space Did you ever notice
how all your labs were
based on these
addresses?
These are the IP addresses you will see
assigned to company devices.
26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Private IP addresses cannot be routed over the Internet.
 NAT is used to translate private IP addresses to public addresses that can be routed over the
Internet.
 One public IPv4 address can be used for thousands of devices that have private IP addresses.
NAT Characteristics
IPv4 Private Address Space (Cont.)
27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Private IP addresses cannot be routed over the Internet.
 NAT is used to translate private IP addresses used
inside a company to public addresses that can be
routed over the Internet.
 NAT hides internal IPv4 addresses from outside
networks.
• Companies use the same private IPv4 addresses so
outside devices cannot tell one company’s 10.x.x.x
network from another company’s 10.x.x.x network.
 A NAT-enabled router can be configured with a public
IPv4 address.
 A NAT-enabled router can be configured with multiple
public IPv4 addresses to be used in a pool or NAT pool
for internal devices configured with private addresses.
NAT Characteristics
What is NAT? Important Concept—NAT is enabled on one
device (normally the border or edge router)
28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Four types of addresses: inside, outside, local,
and global
• Always consider the device that is having its
private address translated to understand this
concept.
• Inside address – address of the company
network device that is being translated by NAT
• Outside address – IP address of the
destination device
• Local address – any address that appears on
the inside portion of the network
• Global address – any address that appears on
the outside portion of the network
NAT Characteristics
NAT Terminology
29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Characteristics
NAT Terminology (Cont.)
30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Characteristics
How NAT Works
1. The private (internal) IP address gets translated to a
public IP address used to reach the external server.
31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Characteristics
How NAT Works (Cont.)
2. The translated public address is used by the server
to send the requested information to the device that
actually has a private IP address assigned to it.
3. The NAT-enabled router consults the routing
table to see what private address requested the
data.
32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of NAT
Static NAT
 Static address translation (static NAT) assigns one public IP address to one private IP address
 Commonly used for servers that need to be accessed by external devices or for devices that must
be accessible by authorized personnel when offsite
 One-to-one address mapping between local and global addresses
33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of NAT
Dynamic NAT
 Dynamic NAT assigns a public IP address
from a pool of addresses to each packet that
originates from a device that has a private IP
address assigned when that packet is
destined to a network outside the company.
• Addresses are assigned on a first-come, first
serve basis
• The number of internal devices that can
transmit outside the company is limited to the
number of public IP addresses in the pool.
34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of NAT
Port Address Translation (PAT)
 PAT (otherwise known as NAT overload) can use one public IPv4 address to allow thousand of
private IPv4 addresses to communicate with outside network devices.
 Uses port numbers to track the session
35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of NAT
Next Available Port
 PAT tries to preserve the original source port
number.
• If that port number is already use, PAT will
assign the first available port number for the
appropriate port group
• 0 - 511
• 512 - 1023
• 1024 - 65,535
• When there are no more port numbers
available, PAT moves to the next public IP
address in the pool if there is one.
1. Notice how traffic is
from two different internal
devices using the same
port number.
2. Notice how PAT uses
the same public address,
but two different port
numbers.
36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of NAT
Comparing NAT and PAT
 Static NAT translates address on a 1:1 basis
 PAT uses port numbers so that one public address
can be used for multiple privately addressed
devices
• PAT can still function with a protocol such as ICMP
that does not use TCP or UDP
37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Types of NAT
Packet Tracer – Investigating NAT Operation
38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Advantages
Advantages of NAT
 Conserves the legally registered addressing scheme
• Every company can use the private IP addresses
 Increases the flexibility of connections to the public network
• Multiple NAT pools, backup pools, and load-balancing across NAT pools
 Provides consistency for internal network addressing schemes
• Do not have to readdress the network if a new ISP or public IP address is
assigned
 Provides network security
• Hides user private IPv4 addresses
39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Advantages
Disadvantages of NAT
 Performance is degraded.
• The NAT-enabled border device must track and process each session destined for an
external network.
 End-to-end functionality is degraded.
• Translation of each IPv4 address within the packet headers takes time.
 End-to-end IP traceability is lost.
• Some applications require end-to-end addressing and cannot be used with NAT.
• Static NAT mappings can sometimes be used.
• Troubleshooting can be more challenging.
 Tunneling becomes more complicated.
 Initiating TCP connections can be disrupted.
40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9.2 Configure NAT
41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring Static NAT
Configure Static NAT
42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring Static NAT
Configure Static NAT (Cont.)
Remember that any interface
on the border router that is on
the inside network must be
configured with the ip nat
inside command. This is a
common mistake for those new
to NAT.
43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring Static NAT
Analyzing Static NAT
1. Client opens a web browser for a connection to a
web server.
2. R2 receives the packet on the outside interface and
checks the NAT table.
3. R2 replaces the inside global address with inside
local address of 192.168.10.254 (the server’s
address).
4. Web server responds to the client.
5. (a) R2 receives the packet from the server on the
inside address.
(b) R2 checks NAT table and translates the source
address to the inside global address of 209165.201.5
and forwards the packet.
6. The client receives the packet.
44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring Static NAT
Verifying Static NAT
A best practice is to clear
statistics when verifying
that NAT is working.
Important commands:
• show ip nat translations
• show ip nat statistics
45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configuring Static NAT
Packet Tracer – Configuring Static NAT
46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Dynamic NAT Operation
 Remember that dynamic NAT uses a pool of public IPv4 addresses.
 Use the same concepts of inside and outside NAT interfaces as static NAT.
47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Configuring Dynamic NAT
48© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Configuring Dynamic NAT (Cont.)
49© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Analyzing Dynamic NAT
1. PC1 and PC2 open a web browser for a connection to a web server.
2. R2 receives the packets on the inside interface and checks if translation should be performed
(via an ACL). R2 assigns a global address from the NAT pool and creates a NAT table entry for
both packets.
3. R2 replaces the inside local source address on each packet with the translated inside global
address from the pool.
50© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Analyzing Dynamic NAT (Cont.)
4. The server responds to PC1 using the destination address of 209.165.200.226 (the NAT-
assigned address) and to PC2 using the destination address of 209.165.200.227.
5. (a and b) R2 looks up each received packet and forwards based on the private IP address found
in the NAT table for each of the destination addresses.
51© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Verifying Dynamic NAT
52© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Verifying Dynamic NAT (Cont.)
53© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Packet Tracer – Configuring Dynamic NAT
54© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Dynamic NAT
Configuring Dynamic and Static NAT
55© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Configuring PAT: Address Pool
The pool contains the public
addresses.
The ACL defines which private IP
addresses gets translated.
The ip nat inside source list
acl# pool name overload
command ties Step 1 with Step 2.
The overload
command is what
allows the router to
track port numbers
(and do PAT instead of
dynamic NAT).
56© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Configuring PAT: Address Pool (Cont.)
57© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Configuring PAT: Single Address
 When a public address is assigned to the external interface on the border router, that public
address can be used for PAT and translate internal private IP addresses to the public IP address.
Still need an ACL to define which
private IP addresses gets translated.
Instead of associating an ACL with a
pool, the ACL is associated with an
interface that has a public IP address
assigned. The overload
command is
always needed
for PAT.
58© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Analyzing PAT
1. PC1 and PC2 open a web browser for a connection to a web server.
2. R2 receives the packets on the inside interface and checks if translation should be performed
(via an ACL). R2 assigns the IP address of the outside interface, adds a port number, and
creates a NAT table entry for both packets.
3. R2 replaces the inside local source address on each packet with the translated inside global
address.
59© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Analyzing PAT (Cont.)
4. Each server responds to PC1 and PC2 using the destination address of the public address
assigned to the external interface on the border router.
5. R2 looks up the received packet and forwards to PC1 because that is the private IP address
found in the NAT table for the destination address and port number.
6. R2 looks up the received packet and forwards to PC2 because that is the private IP address
found in the NAT table for the destination address and port number.
60© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Verifying PAT
61© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Packet Tracer – Implementing Static and Dynamic NAT
62© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure PAT
Configuring Port Address Translation (PAT)
63© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Port Forwarding
Port Forwarding
 Port forwarding allows an external device to reach a device on a specific port number and
the device is located on an internal (private) network.
• Required for some peer-to-peer file-sharing programs and operations such as web serving and
outgoing FTP
• Solves the problem of NAT only allowing translations for traffic destined for external networks at
the request of internal devices.
64© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Port Forwarding
Wireless Router Example
 Port forwarding can be enabled for specific applications
• Must specify the inside local address that requests should be forwarded to
65© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Port Forwarding
Configuring Port Forwarding with IOS
66© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Port Forwarding
Configuring Port Forwarding with IOS (Cont.)
67© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Port Forwarding
Packet Tracer – Configuring Port Forwarding on a Wireless
Router
68© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT and IPv6
NAT for IPv6?
 IPv6 was developed with the intention of making NAT for IPv4 unnecessary
 IPv6 does have its own form of NAT
• IPv6 has its own private address space
69© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT and IPv6
IPv6 Unique Local Addresses
 IPv6 unique local addresses (ULAs) are similar to IPv4 private addresses
• ULAs are to provide IPv6 address space for communications within a local site.
• First 64 bits of a ULA
• Prefix of FC00::/7 (FC00 to FDFF)
• Next bit is a 1 if the prefix is locally assigned
• Next 40 bits define a global ID
• Next 16 bits is a subnet ID
• Last 64 bits of a ULA is the interface ID
or host portion of the address
 Allows sites to be combined without
address conflicts
 Allows internal connectivity
 Not routable on the Internet
70© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT and IPv6
NAT for IPv6
 Provide access between IPv6-only and IPv4-only networks (not translating private address to
public addresses as NAT for IPv4 was)
 Techniques available
• Dual-stack – both devices run protocols for both IPv4 and IPv6
• Tunneling – Encapsulate the IPv6 packet inside an IPv4 packet for transmission over an IPv4-
only network
• NAT for IPv6 (translation)
• Should not be used as a long term strategy
• The older Network Address Translation-Protocol
Translation (NAT-PT)
• NAT64
71© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9.3 Troubleshoot NAT
72© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Troubleshooting Commands
The show ip nat Commands
1. Determine what NAT is supposed
to achieve and compare with
configuration. This may reveal a
problem with the configuration.
2. Verify translations using the show
ip nat translations command.
3. Use the clear and debug
commands to verify NAT.
4. Review what is happening to the
packet and verify routing.
73© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Troubleshooting Commands
The debug ip nat Commands
 Common commands
• debug ip nat
• debug ip nat detailed
 Output symbols and values
• * - The translation is occurring in the
fast-switched path
• s= - Source IPv4 address
• a.b.c.d--->w.x.y.z – Source a.b.c.d is
translated to w.x.y.z.
• d= - Destination IPv4 address
• [xxxx] - IPv4 identification number
 Check the ACL to ensure the
correct private addresses are
designated.
74© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Troubleshooting Commands
NAT Troubleshooting Scenario
 Internal hosts cannot contact external servers.
1. No translations in NAT table
2. Outside and inside
interfaces are reversed
3. Incorrect ACL
Translations
working!
75© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Troubleshooting Commands
Packet Tracer – Verifying and Troubleshooting NAT Configurations
76© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NAT Troubleshooting Commands
Troubleshooting NAT Configurations
77© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9.4 Chapter Summary
78© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Skills Integration Challenge
79© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Explain how NAT provides IPv4 address scalability in a small to medium-sized business network.
 Configure NAT services on the edge router to provide IPv4 address scalability in a small to
medium-sized business network.
 Troubleshoot NAT issues in a small to medium-sized business network.
Conclusion
Chapter 9: NAT for IPv4
Ccna rse chp9 nat fo i_pv4

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4CCNA3 Verson6 Chapter4
CCNA3 Verson6 Chapter4
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
 
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8
 
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 
CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3CCNP ROUTE V7 CH3
CCNP ROUTE V7 CH3
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8
 
CCNA3 Verson6 Chapter10
CCNA3 Verson6 Chapter10CCNA3 Verson6 Chapter10
CCNA3 Verson6 Chapter10
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 

Ähnlich wie Ccna rse chp9 nat fo i_pv4

Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
 

Ähnlich wie Ccna rse chp9 nat fo i_pv4 (20)

Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
07_IP_Addressing ayudaok.pdf
07_IP_Addressing ayudaok.pdf07_IP_Addressing ayudaok.pdf
07_IP_Addressing ayudaok.pdf
 
07_IP_Addressing.pdf
07_IP_Addressing.pdf07_IP_Addressing.pdf
07_IP_Addressing.pdf
 
Rs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_finalRs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_final
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNP.ppt
CCNP.pptCCNP.ppt
CCNP.ppt
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 

Mehr von newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

Mehr von newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Ccna rse chp9 nat fo i_pv4

  • 1. Instructor Materials Chapter 9: NAT for IPv4 CCNA Routing and Switching Routing and Switching Essentials v6.0
  • 2. 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 9: NAT for IPv4 Routing and Switching Essentials 6.0 Planning Guide
  • 3. Chapter 9: NAT for IPv4 CCNA Routing and Switching Routing and Switching Essentials v6.0
  • 4. 22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  9.1 NAT Operation • Explain how NAT provides IPv4 address scalability in a small to medium-sized business network • Explain the purpose and function of NAT. • Explain the operation of different types of NAT. • Describe the advantages and disadvantages of NAT.  9.2 Configure NAT • Configure NAT services on the edge router to provide IPv4 address scalability in a small to medium-sized business network. • Configure static NAT using the CLI. • Configure dynamic NAT using the CLI. Chapter 9 - Sections & Objectives
  • 5. 23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  9.2 Configure NAT (Cont.) • Configure PAT using the CLI. • Configure port forwarding using the CLI.  9.3 Troubleshoot NAT • Troubleshoot NAT issues in a small to medium-sized business network. • Troubleshoot NAT Chapter 9 - Sections & Objectives (Cont.)
  • 6. 24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9.1 NAT Operation
  • 7. 25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Private IP addresses are used within an organization and home networks. NAT Characteristics IPv4 Private Address Space Did you ever notice how all your labs were based on these addresses? These are the IP addresses you will see assigned to company devices.
  • 8. 26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Private IP addresses cannot be routed over the Internet.  NAT is used to translate private IP addresses to public addresses that can be routed over the Internet.  One public IPv4 address can be used for thousands of devices that have private IP addresses. NAT Characteristics IPv4 Private Address Space (Cont.)
  • 9. 27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Private IP addresses cannot be routed over the Internet.  NAT is used to translate private IP addresses used inside a company to public addresses that can be routed over the Internet.  NAT hides internal IPv4 addresses from outside networks. • Companies use the same private IPv4 addresses so outside devices cannot tell one company’s 10.x.x.x network from another company’s 10.x.x.x network.  A NAT-enabled router can be configured with a public IPv4 address.  A NAT-enabled router can be configured with multiple public IPv4 addresses to be used in a pool or NAT pool for internal devices configured with private addresses. NAT Characteristics What is NAT? Important Concept—NAT is enabled on one device (normally the border or edge router)
  • 10. 28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Four types of addresses: inside, outside, local, and global • Always consider the device that is having its private address translated to understand this concept. • Inside address – address of the company network device that is being translated by NAT • Outside address – IP address of the destination device • Local address – any address that appears on the inside portion of the network • Global address – any address that appears on the outside portion of the network NAT Characteristics NAT Terminology
  • 11. 29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Characteristics NAT Terminology (Cont.)
  • 12. 30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Characteristics How NAT Works 1. The private (internal) IP address gets translated to a public IP address used to reach the external server.
  • 13. 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Characteristics How NAT Works (Cont.) 2. The translated public address is used by the server to send the requested information to the device that actually has a private IP address assigned to it. 3. The NAT-enabled router consults the routing table to see what private address requested the data.
  • 14. 32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of NAT Static NAT  Static address translation (static NAT) assigns one public IP address to one private IP address  Commonly used for servers that need to be accessed by external devices or for devices that must be accessible by authorized personnel when offsite  One-to-one address mapping between local and global addresses
  • 15. 33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of NAT Dynamic NAT  Dynamic NAT assigns a public IP address from a pool of addresses to each packet that originates from a device that has a private IP address assigned when that packet is destined to a network outside the company. • Addresses are assigned on a first-come, first serve basis • The number of internal devices that can transmit outside the company is limited to the number of public IP addresses in the pool.
  • 16. 34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of NAT Port Address Translation (PAT)  PAT (otherwise known as NAT overload) can use one public IPv4 address to allow thousand of private IPv4 addresses to communicate with outside network devices.  Uses port numbers to track the session
  • 17. 35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of NAT Next Available Port  PAT tries to preserve the original source port number. • If that port number is already use, PAT will assign the first available port number for the appropriate port group • 0 - 511 • 512 - 1023 • 1024 - 65,535 • When there are no more port numbers available, PAT moves to the next public IP address in the pool if there is one. 1. Notice how traffic is from two different internal devices using the same port number. 2. Notice how PAT uses the same public address, but two different port numbers.
  • 18. 36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of NAT Comparing NAT and PAT  Static NAT translates address on a 1:1 basis  PAT uses port numbers so that one public address can be used for multiple privately addressed devices • PAT can still function with a protocol such as ICMP that does not use TCP or UDP
  • 19. 37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Types of NAT Packet Tracer – Investigating NAT Operation
  • 20. 38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Advantages Advantages of NAT  Conserves the legally registered addressing scheme • Every company can use the private IP addresses  Increases the flexibility of connections to the public network • Multiple NAT pools, backup pools, and load-balancing across NAT pools  Provides consistency for internal network addressing schemes • Do not have to readdress the network if a new ISP or public IP address is assigned  Provides network security • Hides user private IPv4 addresses
  • 21. 39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Advantages Disadvantages of NAT  Performance is degraded. • The NAT-enabled border device must track and process each session destined for an external network.  End-to-end functionality is degraded. • Translation of each IPv4 address within the packet headers takes time.  End-to-end IP traceability is lost. • Some applications require end-to-end addressing and cannot be used with NAT. • Static NAT mappings can sometimes be used. • Troubleshooting can be more challenging.  Tunneling becomes more complicated.  Initiating TCP connections can be disrupted.
  • 22. 40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9.2 Configure NAT
  • 23. 41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring Static NAT Configure Static NAT
  • 24. 42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring Static NAT Configure Static NAT (Cont.) Remember that any interface on the border router that is on the inside network must be configured with the ip nat inside command. This is a common mistake for those new to NAT.
  • 25. 43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring Static NAT Analyzing Static NAT 1. Client opens a web browser for a connection to a web server. 2. R2 receives the packet on the outside interface and checks the NAT table. 3. R2 replaces the inside global address with inside local address of 192.168.10.254 (the server’s address). 4. Web server responds to the client. 5. (a) R2 receives the packet from the server on the inside address. (b) R2 checks NAT table and translates the source address to the inside global address of 209165.201.5 and forwards the packet. 6. The client receives the packet.
  • 26. 44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring Static NAT Verifying Static NAT A best practice is to clear statistics when verifying that NAT is working. Important commands: • show ip nat translations • show ip nat statistics
  • 27. 45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configuring Static NAT Packet Tracer – Configuring Static NAT
  • 28. 46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Dynamic NAT Operation  Remember that dynamic NAT uses a pool of public IPv4 addresses.  Use the same concepts of inside and outside NAT interfaces as static NAT.
  • 29. 47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Configuring Dynamic NAT
  • 30. 48© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Configuring Dynamic NAT (Cont.)
  • 31. 49© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Analyzing Dynamic NAT 1. PC1 and PC2 open a web browser for a connection to a web server. 2. R2 receives the packets on the inside interface and checks if translation should be performed (via an ACL). R2 assigns a global address from the NAT pool and creates a NAT table entry for both packets. 3. R2 replaces the inside local source address on each packet with the translated inside global address from the pool.
  • 32. 50© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Analyzing Dynamic NAT (Cont.) 4. The server responds to PC1 using the destination address of 209.165.200.226 (the NAT- assigned address) and to PC2 using the destination address of 209.165.200.227. 5. (a and b) R2 looks up each received packet and forwards based on the private IP address found in the NAT table for each of the destination addresses.
  • 33. 51© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Verifying Dynamic NAT
  • 34. 52© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Verifying Dynamic NAT (Cont.)
  • 35. 53© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Packet Tracer – Configuring Dynamic NAT
  • 36. 54© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Dynamic NAT Configuring Dynamic and Static NAT
  • 37. 55© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Configuring PAT: Address Pool The pool contains the public addresses. The ACL defines which private IP addresses gets translated. The ip nat inside source list acl# pool name overload command ties Step 1 with Step 2. The overload command is what allows the router to track port numbers (and do PAT instead of dynamic NAT).
  • 38. 56© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Configuring PAT: Address Pool (Cont.)
  • 39. 57© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Configuring PAT: Single Address  When a public address is assigned to the external interface on the border router, that public address can be used for PAT and translate internal private IP addresses to the public IP address. Still need an ACL to define which private IP addresses gets translated. Instead of associating an ACL with a pool, the ACL is associated with an interface that has a public IP address assigned. The overload command is always needed for PAT.
  • 40. 58© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Analyzing PAT 1. PC1 and PC2 open a web browser for a connection to a web server. 2. R2 receives the packets on the inside interface and checks if translation should be performed (via an ACL). R2 assigns the IP address of the outside interface, adds a port number, and creates a NAT table entry for both packets. 3. R2 replaces the inside local source address on each packet with the translated inside global address.
  • 41. 59© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Analyzing PAT (Cont.) 4. Each server responds to PC1 and PC2 using the destination address of the public address assigned to the external interface on the border router. 5. R2 looks up the received packet and forwards to PC1 because that is the private IP address found in the NAT table for the destination address and port number. 6. R2 looks up the received packet and forwards to PC2 because that is the private IP address found in the NAT table for the destination address and port number.
  • 42. 60© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Verifying PAT
  • 43. 61© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Packet Tracer – Implementing Static and Dynamic NAT
  • 44. 62© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure PAT Configuring Port Address Translation (PAT)
  • 45. 63© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Port Forwarding Port Forwarding  Port forwarding allows an external device to reach a device on a specific port number and the device is located on an internal (private) network. • Required for some peer-to-peer file-sharing programs and operations such as web serving and outgoing FTP • Solves the problem of NAT only allowing translations for traffic destined for external networks at the request of internal devices.
  • 46. 64© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Port Forwarding Wireless Router Example  Port forwarding can be enabled for specific applications • Must specify the inside local address that requests should be forwarded to
  • 47. 65© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Port Forwarding Configuring Port Forwarding with IOS
  • 48. 66© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Port Forwarding Configuring Port Forwarding with IOS (Cont.)
  • 49. 67© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Port Forwarding Packet Tracer – Configuring Port Forwarding on a Wireless Router
  • 50. 68© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT and IPv6 NAT for IPv6?  IPv6 was developed with the intention of making NAT for IPv4 unnecessary  IPv6 does have its own form of NAT • IPv6 has its own private address space
  • 51. 69© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT and IPv6 IPv6 Unique Local Addresses  IPv6 unique local addresses (ULAs) are similar to IPv4 private addresses • ULAs are to provide IPv6 address space for communications within a local site. • First 64 bits of a ULA • Prefix of FC00::/7 (FC00 to FDFF) • Next bit is a 1 if the prefix is locally assigned • Next 40 bits define a global ID • Next 16 bits is a subnet ID • Last 64 bits of a ULA is the interface ID or host portion of the address  Allows sites to be combined without address conflicts  Allows internal connectivity  Not routable on the Internet
  • 52. 70© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT and IPv6 NAT for IPv6  Provide access between IPv6-only and IPv4-only networks (not translating private address to public addresses as NAT for IPv4 was)  Techniques available • Dual-stack – both devices run protocols for both IPv4 and IPv6 • Tunneling – Encapsulate the IPv6 packet inside an IPv4 packet for transmission over an IPv4- only network • NAT for IPv6 (translation) • Should not be used as a long term strategy • The older Network Address Translation-Protocol Translation (NAT-PT) • NAT64
  • 53. 71© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9.3 Troubleshoot NAT
  • 54. 72© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Troubleshooting Commands The show ip nat Commands 1. Determine what NAT is supposed to achieve and compare with configuration. This may reveal a problem with the configuration. 2. Verify translations using the show ip nat translations command. 3. Use the clear and debug commands to verify NAT. 4. Review what is happening to the packet and verify routing.
  • 55. 73© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Troubleshooting Commands The debug ip nat Commands  Common commands • debug ip nat • debug ip nat detailed  Output symbols and values • * - The translation is occurring in the fast-switched path • s= - Source IPv4 address • a.b.c.d--->w.x.y.z – Source a.b.c.d is translated to w.x.y.z. • d= - Destination IPv4 address • [xxxx] - IPv4 identification number  Check the ACL to ensure the correct private addresses are designated.
  • 56. 74© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Troubleshooting Commands NAT Troubleshooting Scenario  Internal hosts cannot contact external servers. 1. No translations in NAT table 2. Outside and inside interfaces are reversed 3. Incorrect ACL Translations working!
  • 57. 75© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Troubleshooting Commands Packet Tracer – Verifying and Troubleshooting NAT Configurations
  • 58. 76© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NAT Troubleshooting Commands Troubleshooting NAT Configurations
  • 59. 77© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9.4 Chapter Summary
  • 60. 78© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Skills Integration Challenge
  • 61. 79© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Explain how NAT provides IPv4 address scalability in a small to medium-sized business network.  Configure NAT services on the edge router to provide IPv4 address scalability in a small to medium-sized business network.  Troubleshoot NAT issues in a small to medium-sized business network. Conclusion Chapter 9: NAT for IPv4