0% found this document useful (0 votes)
53 views

Configure Static Nat Statements

The document discusses configuring static and dynamic NAT and PAT on routers. It describes configuring static NAT statements to map an internal address to an external address. It also describes configuring dynamic NAT with PAT by defining an ACL for permitted internal addresses, creating an address pool for NAT, and associating the ACL with the pool to enable PAT. The document provides instructions for configuring interfaces, verifying access with NAT, and viewing NAT translations using show commands.

Uploaded by

api-224615605
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Configure Static Nat Statements

The document discusses configuring static and dynamic NAT and PAT on routers. It describes configuring static NAT statements to map an internal address to an external address. It also describes configuring dynamic NAT with PAT by defining an ACL for permitted internal addresses, creating an address pool for NAT, and associating the ACL with the pool to enable PAT. The document provides instructions for configuring interfaces, verifying access with NAT, and viewing NAT translations using show commands.

Uploaded by

api-224615605
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Configuring, Implementing, Translating and Verifying Static and

Dynamic NAT and PAT


Configure static NAT statements.
R1(config)# ip nat inside source static
172.16.16.1 64.100.50.1
Configure interfaces.
R1(config)# interface g0/0
R1(config-if)# ip nat inside
R1(config)# interface s0/0/0
R1(config-if)# ip nat outside

Configure Dynamic NAT with PAT


R2(config-std-nacl)# permit
192.168.10.0 0.0.0.255
R2(config-std-nacl)# permit
192.168.20.0 0.0.0.255
R2(config-std-nacl)# permit
192.168.30.0 0.0.0.255
Configure a pool of addresses for NAT.

Test Access with NAT


ping the public address for Servers. Pings
should succeed.

R2(config)# ip nat pool R2POOL


209.165.202.128 209.165.202.130
netmask 255.255.255.252

View NAT translations (Show


Commands)

Associate the named ACL with the


NAT pool and enable PAT.

show running-config
show ip nat translations
show ip nat statistics

R2(config)# ip nat inside source list


R2NAT pool R2POOL overload
Implementing Static and Dynamic
NAT

Configure traffic that will be


permitted.
R2(config)# access-list 1 permit
172.16.0.0 0.0.255.255
Configure a pool of address for NAT.
R2(config)# ip nat pool any-name-here
209.165.76.196 209.165.76.199
netmask 255.255.255.252
Associate ACL1 with the NAT pool.
R2(config)# ip nat inside source list 1
pool any-name-here
Configure the NAT interfaces.
R2(config)# interface s0/0/0
R2(config-if)# ip nat outside
R2(config-if)# interface s0/0/1
R2(config-if)# ip nat inside
Verify NAT Implementation

Configure the NAT interfaces.


R2(config)# inte fa0/0
R2(config-if)# ip nat inside
R2(config-if)# inte s0/0/0
R2(config-if)# ip nat inside
R2(config-if)# inte s0/0/1
R2(config-if)# ip nat inside
R2(config-if)# inte s0/1/0
R2(config-if)# ip nat outside
Configure Static NAT
R2(config)# ip nat inside source static
192.168.20.254 209.165.202.131
Verify NAT Implementation
Access services across the Internet.
access the web page for cisco.pka. and
local.pka.
View NAT translations.
View the NAT translations on R2.
R2# show ip nat translations

R2# show ip nat translations

Mehl 1
5/4/2015

Chap 11: NAT for IPV4

You might also like