[CCNAv6 S2] 9.2.2.5 Packet Tracer - Configuring Dynamic NAT



Packet Tracer – Configuring Dynamic NAT
Objectives

Part 1: Configure Dynamic NAT

Part 2: Verify NAT Implementation

Part 1:     Configure Dynamic NAT
Step 1:     Configure traffic that will be permitted.

On R2, configure one statement for ACL 1 to permit any address belonging to 172.16.0.0/16.

Step 2:     Configure a pool of address for NAT.

Configure R2 with a NAT pool that uses all four addresses in the 209.165.76.196/30 address space.

Notice in the topology there are 3 network ranges that would be translated based on the ACL created. What will happen if more than 2 devices attempt to access the Internet?

Step 3:     Associate ACL1 with the NAT pool.

Step 4:     Configure the NAT interfaces.

Configure R2 interfaces with the appropriate inside and outside NAT commands.

Part 2:     Verify NAT Implementation
Step 1:     Access services across the Internet.

From the web browser of L1, PC1, or PC2, access the web page for Server1.

Step 2:     View NAT translations.

View the NAT translations on R2.

R2# show ip nat translations



Configuration R2:

enable
configure terminal
access-list 1 permit 172.16.0.0 0.0.255.255
ip nat pool NAT 209.165.76.196 209.165.76.199 netmask 255.255.255.252
ip nat inside source list 1 pool NAT
interface Serial0/0/1
 ip nat inside
interface Serial0/0/0
 ip nat outside
 end
write memory
!

Nhận xét

Bài đăng phổ biến từ blog này

[CCNAv6 S4] 8.2.4.14 Packet Tracer - Troubleshooting Enterprise Networks 3

[CCNAv6 S2] 2.2.2.4 Packet Tracer - Configuring IPv4 Static and Default Routes

[CCNAv6 S2] 7.3.2.4 Packet Tracer - Troubleshooting Standard IPv4 ACLs