The document discusses configuring static and dynamic NAT and PAT on routers. It describes configuring static NAT statements to map an internal address to an external address. It also describes configuring dynamic NAT with PAT by defining an ACL for permitted internal addresses, creating an address pool for NAT, and associating the ACL with the pool to enable PAT. The document provides instructions for configuring interfaces, verifying access with NAT, and viewing NAT translations using show commands.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
53 views
Configure Static Nat Statements
The document discusses configuring static and dynamic NAT and PAT on routers. It describes configuring static NAT statements to map an internal address to an external address. It also describes configuring dynamic NAT with PAT by defining an ACL for permitted internal addresses, creating an address pool for NAT, and associating the ACL with the pool to enable PAT. The document provides instructions for configuring interfaces, verifying access with NAT, and viewing NAT translations using show commands.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Configuring, Implementing, Translating and Verifying Static and
Dynamic NAT and PAT
Configure static NAT statements. R1(config)# ip nat inside source static 172.16.16.1 64.100.50.1 Configure interfaces. R1(config)# interface g0/0 R1(config-if)# ip nat inside R1(config)# interface s0/0/0 R1(config-if)# ip nat outside
Configure Dynamic NAT with PAT
R2(config-std-nacl)# permit 192.168.10.0 0.0.0.255 R2(config-std-nacl)# permit 192.168.20.0 0.0.0.255 R2(config-std-nacl)# permit 192.168.30.0 0.0.0.255 Configure a pool of addresses for NAT.
Test Access with NAT
ping the public address for Servers. Pings should succeed.
show running-config show ip nat translations show ip nat statistics
R2(config)# ip nat inside source list
R2NAT pool R2POOL overload Implementing Static and Dynamic NAT
Configure traffic that will be
permitted. R2(config)# access-list 1 permit 172.16.0.0 0.0.255.255 Configure a pool of address for NAT. R2(config)# ip nat pool any-name-here 209.165.76.196 209.165.76.199 netmask 255.255.255.252 Associate ACL1 with the NAT pool. R2(config)# ip nat inside source list 1 pool any-name-here Configure the NAT interfaces. R2(config)# interface s0/0/0 R2(config-if)# ip nat outside R2(config-if)# interface s0/0/1 R2(config-if)# ip nat inside Verify NAT Implementation
Configure the NAT interfaces.
R2(config)# inte fa0/0 R2(config-if)# ip nat inside R2(config-if)# inte s0/0/0 R2(config-if)# ip nat inside R2(config-if)# inte s0/0/1 R2(config-if)# ip nat inside R2(config-if)# inte s0/1/0 R2(config-if)# ip nat outside Configure Static NAT R2(config)# ip nat inside source static 192.168.20.254 209.165.202.131 Verify NAT Implementation Access services across the Internet. access the web page for cisco.pka. and local.pka. View NAT translations. View the NAT translations on R2. R2# show ip nat translations