SlideShare uma empresa Scribd logo
1 de 48
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 22: Network
Address Translation for
IPv4
Routing & Switching
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11
11.1 NAT Operation
11.2 Configuring NAT
11.3 Troubleshooting NAT
11.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11: Objectives
 Describe NAT characteristics.
 Describe the benefits and drawbacks of NAT.
 Configure static NAT using the CLI.
 Configure dynamic NAT using the CLI.
 Configure PAT using the CLI.
 Configure port forwarding using the CLI.
 Configure NAT64.
 Use show commands to verify NAT operation.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
11.1 NAT Operation
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
IPv4 Private Address Space
 IPv4 address space is not big enough to uniquely address all the
devices that must be connected to the Internet.
 Network private addresses are described in RFC 1918 and are to
designed to be used within an organization or site only.
 Private addresses are not routed by Internet routers while public
addresses are.
 Private addresses can alleviate IPv4 scarcity, but because they aren’t
routed by Internet devices, they first need to be translated.
 NAT is process used to perform such translation.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
IPv4 Private Address Space
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
What is NAT?
 NAT is a process used to translate network addresses.
 NAT’s primary use is to conserve public IPv4 addresses.
 NAT is usually implemented at border network devices, such as
firewalls or routers.
 NAT allows the networks to use private addresses internally, only
translating to public addresses when needed.
 Devices within the organization can be assigned private addresses
and operate with locally unique addresses.
 When traffic must be sent or received to or from other organizations
or the Internet, the border router translates the addresses to a public
and globally unique address.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
What is NAT? (cont.)
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
NAT Terminology
 Inside network is the set of
devices using private
addresses
 Outside network refers to all
other networks
 NAT includes four types of
addresses:
• Inside local address
• Inside global address
• Outside local address
• Outside global address
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
NAT Terminology (cont.)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Static NAT
 Static NAT uses a one-to-one mapping of local and global addresses.
 These mappings are configured by the network administrator and
remain constant.
 Static NAT is particularly useful when servers hosted in the inside
network must be accessible from the outside network.
 A network administrator can SSH to a server in the inside network by
pointing the SSH client to the proper inside global address.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Static NAT (cont.)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Dynamic NAT
 Dynamic NAT uses a pool of public addresses and assigns them on a
first-come, first-served basis.
 When an inside device requests access to an outside network,
dynamic NAT assigns an available public IPv4 address from the pool.
 Dynamic NAT requires that enough public addresses are available to
satisfy the total number of simultaneous user sessions.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Dynamic NAT (cont.)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Port Address Translation
 Port Address Translation (PAT) maps multiple private IPv4
addresses to a single public IPv4 address or a few addresses.
 PAT uses the pair source port and source IP address to keep track
of what traffic belongs to what internal client.
 PAT is also known as NAT overload.
 By also using the port number, PAT forwards the response packets
to the correct internal device.
 The PAT process also validates that the incoming packets were
requested, thus adding a degree of security to the session.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Comparing NAT and PAT
 NAT translates IPv4 addresses on a 1:1 basis between private IPv4
addresses and public IPv4 addresses.
 PAT modifies both the address and the port number.
 NAT forwards incoming packets to their inside destination by referring
to the incoming source IPv4 address provided by the host on the
public network.
 With PAT, there is generally only one or a very few publicly exposed
IPv4 addresses.
 PAT is able to translate protocols that do not use port numbers, such
as ICMP; each one of these protocols is supported differently by
PAT.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of NAT
Benefits of NAT
 Conserves the legally registered addressing scheme
 Increases the flexibility of connections to the public network
 Provides consistency for internal network addressing schemes
 Provides network security
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of NAT
Disadvantages of NAT
 Performance is degraded
 End-to-end functionality is degraded
 End-to-end IP traceability is lost
 Tunneling is more complicated
 Initiating TCP connections can be disrupted
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
11.2 Configuring NAT
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Configuring Static NAT
There are two basic tasks to perform when configuring
static NAT translations:
 Create the mapping between the inside local and
outside local addresses.
 Define which interfaces belong to the inside network
and which belong to the outside network.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Configuring Static NAT
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Analyzing Static NAT
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Verifying Static NAT
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Verifying Static NAT (cont.)
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Dynamic NAT Operation
 The pool of public IPv4 addresses (inside global address pool) is
available to any device on the inside network on a first-come, first-
served basis.
 With dynamic NAT, a single inside address is translated to a single
outside address.
 The pool must be large enough to accommodate all inside devices.
 A device is unable to communicate to any external networks if no
addresses are available in the pool.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Configuring Dynamic NAT
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Analyzing Dynamic NAT
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Analyzing Dynamic NAT
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Verifying Dynamic NAT
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Verifying Dynamic NAT
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Configuring PAT: Address Pool
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Configuring PAT: Single Address
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Analyzing PAT
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Analyzing PAT
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Verifying PAT Translations
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Port Forwarding
Port Forwarding
 Port forwarding is the act of forwarding a network port from one
network node to another.
 A packet sent to the public IP address and port of a router can be
forwarded to a private IP address and port in inside network.
 Port forwarding is helpful in situations where servers have private
addresses, not reachable from the outside networks.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Port Forwarding
SOHO Example
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Port Forwarding
Configuring Port Forwarding with IOS
In IOS, Port forwarding is essentially a static NAT translation with a
specified TCP or UDP port number.
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
NAT for IPv6?
 NAT is a workaround for IPv4 address scarcity.
 IPv6 with a 128-bit address provides 340 undecillion addresses.
 Address space is not an issue for IPv6.
 IPv6 makes IPv4 public-private NAT unnecessary by design;
however, IPv6 does implement a form of private addresses, and it
is implemented differently than they are for IPv4.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
IPv6 Unique Local Addresses
 IPv6 unique local addresses (ULAs) are designed to allow IPv6
communications within a local site.
 ULAs are not meant to provide additional IPv6 address space.
 ULAs have the prefix FC00::/7, which results in a first hextet range
of FC00 to FDFF.
 ULAs are also known as local IPv6 addresses (not to be confused
with IPv6 link-local addresses).
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
NAT for IPv6
 IPv6 also uses NAT, but in a much different context.
 In IPv6, NAT is used to provide transparent communication
between IPv6 and IPv4.
 NAT64 is not intended to be a permanent solution; it is meant to be
a transition mechanism.
 Network Address Translation-Protocol Translation (NAT-PT) was
another NAT-based transition mechanism for IPv6, but is now
deprecated by IETF.
 NAT64 is now recommended.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
NAT for IPv6
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 43
11.3 Troubleshooting NAT
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
Troubleshooting NAT: show commands
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
Troubleshooting NAT: debug command
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11: Summary
This chapter has outlined:
 How NAT is used to help alleviate the depletion of the IPv4 address
space.
 NAT conserves public address space and saves considerable
administrative overhead in managing adds, moves, and changes.
 NAT for IPv4, including:
• NAT characteristics, terminology, and general operations
• Different types of NAT, including static NAT, dynamic NAT, and
NAT with overloading
• Benefits and disadvantages of NAT
 The configuration, verification, and analysis of static NAT, dynamic
NAT, and NAT with overloading.
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11: Summary (cont.)
 How port forwarding can be used to access an internal devices from
the Internet.
 Troubleshooting NAT using show and debug commands.
 How NAT for IPv6 is used to translate between IPv6 addresses and
IPv4 addresses.
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mais conteúdo relacionado

Mais procurados

CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10Nil Menon
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPVuz Dở Hơi
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerVuz Dở Hơi
 

Mais procurados (18)

CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 

Semelhante a Chapter 22 : network address translation for IPv4

CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9Chaing Ravuth
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19eyad alaa
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressingteknetir
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4newbie2019
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxGeorgeThoreJr
 
RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxjagali
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 

Semelhante a Chapter 22 : network address translation for IPv4 (20)

CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressing
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
 
RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptx
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
Day 17.1 nat pat
Day 17.1 nat pat Day 17.1 nat pat
Day 17.1 nat pat
 

Mais de teknetir

آموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapآموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapteknetir
 
CEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyCEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyteknetir
 
CEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingCEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingteknetir
 
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsCEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsteknetir
 
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksCEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksteknetir
 
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsCEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsteknetir
 
CEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionCEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionteknetir
 
CEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsCEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsteknetir
 
CEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversCEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversteknetir
 
CEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingCEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingteknetir
 
CEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceCEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceteknetir
 
CEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringCEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringteknetir
 
CEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingCEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingteknetir
 
CEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsCEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsteknetir
 
CEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingCEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingteknetir
 
CEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksCEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksteknetir
 
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceCEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceteknetir
 
CEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingCEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingteknetir
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospfteknetir
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamicallyteknetir
 

Mais de teknetir (20)

آموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapآموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmap
 
CEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyCEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptography
 
CEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingCEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computing
 
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsCEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypots
 
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksCEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networks
 
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsCEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platforms
 
CEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionCEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injection
 
CEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsCEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applications
 
CEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversCEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web servers
 
CEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingCEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijacking
 
CEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceCEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of service
 
CEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringCEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineering
 
CEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingCEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffing
 
CEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsCEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threats
 
CEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingCEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hacking
 
CEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksCEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networks
 
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceCEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissance
 
CEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingCEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hacking
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospf
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
 

Último

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Último (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Chapter 22 : network address translation for IPv4

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 22: Network Address Translation for IPv4 Routing & Switching
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11 11.1 NAT Operation 11.2 Configuring NAT 11.3 Troubleshooting NAT 11.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11: Objectives  Describe NAT characteristics.  Describe the benefits and drawbacks of NAT.  Configure static NAT using the CLI.  Configure dynamic NAT using the CLI.  Configure PAT using the CLI.  Configure port forwarding using the CLI.  Configure NAT64.  Use show commands to verify NAT operation.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 11.1 NAT Operation
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics IPv4 Private Address Space  IPv4 address space is not big enough to uniquely address all the devices that must be connected to the Internet.  Network private addresses are described in RFC 1918 and are to designed to be used within an organization or site only.  Private addresses are not routed by Internet routers while public addresses are.  Private addresses can alleviate IPv4 scarcity, but because they aren’t routed by Internet devices, they first need to be translated.  NAT is process used to perform such translation.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics IPv4 Private Address Space
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics What is NAT?  NAT is a process used to translate network addresses.  NAT’s primary use is to conserve public IPv4 addresses.  NAT is usually implemented at border network devices, such as firewalls or routers.  NAT allows the networks to use private addresses internally, only translating to public addresses when needed.  Devices within the organization can be assigned private addresses and operate with locally unique addresses.  When traffic must be sent or received to or from other organizations or the Internet, the border router translates the addresses to a public and globally unique address.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics What is NAT? (cont.)
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics NAT Terminology  Inside network is the set of devices using private addresses  Outside network refers to all other networks  NAT includes four types of addresses: • Inside local address • Inside global address • Outside local address • Outside global address
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics NAT Terminology (cont.)
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Static NAT  Static NAT uses a one-to-one mapping of local and global addresses.  These mappings are configured by the network administrator and remain constant.  Static NAT is particularly useful when servers hosted in the inside network must be accessible from the outside network.  A network administrator can SSH to a server in the inside network by pointing the SSH client to the proper inside global address.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Static NAT (cont.)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Dynamic NAT  Dynamic NAT uses a pool of public addresses and assigns them on a first-come, first-served basis.  When an inside device requests access to an outside network, dynamic NAT assigns an available public IPv4 address from the pool.  Dynamic NAT requires that enough public addresses are available to satisfy the total number of simultaneous user sessions.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Dynamic NAT (cont.)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Port Address Translation  Port Address Translation (PAT) maps multiple private IPv4 addresses to a single public IPv4 address or a few addresses.  PAT uses the pair source port and source IP address to keep track of what traffic belongs to what internal client.  PAT is also known as NAT overload.  By also using the port number, PAT forwards the response packets to the correct internal device.  The PAT process also validates that the incoming packets were requested, thus adding a degree of security to the session.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Comparing NAT and PAT  NAT translates IPv4 addresses on a 1:1 basis between private IPv4 addresses and public IPv4 addresses.  PAT modifies both the address and the port number.  NAT forwards incoming packets to their inside destination by referring to the incoming source IPv4 address provided by the host on the public network.  With PAT, there is generally only one or a very few publicly exposed IPv4 addresses.  PAT is able to translate protocols that do not use port numbers, such as ICMP; each one of these protocols is supported differently by PAT.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of NAT Benefits of NAT  Conserves the legally registered addressing scheme  Increases the flexibility of connections to the public network  Provides consistency for internal network addressing schemes  Provides network security
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of NAT Disadvantages of NAT  Performance is degraded  End-to-end functionality is degraded  End-to-end IP traceability is lost  Tunneling is more complicated  Initiating TCP connections can be disrupted
  • 19. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19 11.2 Configuring NAT
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Configuring Static NAT There are two basic tasks to perform when configuring static NAT translations:  Create the mapping between the inside local and outside local addresses.  Define which interfaces belong to the inside network and which belong to the outside network.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Configuring Static NAT
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Analyzing Static NAT
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Verifying Static NAT
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Verifying Static NAT (cont.)
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Dynamic NAT Operation  The pool of public IPv4 addresses (inside global address pool) is available to any device on the inside network on a first-come, first- served basis.  With dynamic NAT, a single inside address is translated to a single outside address.  The pool must be large enough to accommodate all inside devices.  A device is unable to communicate to any external networks if no addresses are available in the pool.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Configuring Dynamic NAT
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Analyzing Dynamic NAT
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Analyzing Dynamic NAT
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Verifying Dynamic NAT
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Verifying Dynamic NAT
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Configuring PAT: Address Pool
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Configuring PAT: Single Address
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Analyzing PAT
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Analyzing PAT
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Verifying PAT Translations
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Port Forwarding Port Forwarding  Port forwarding is the act of forwarding a network port from one network node to another.  A packet sent to the public IP address and port of a router can be forwarded to a private IP address and port in inside network.  Port forwarding is helpful in situations where servers have private addresses, not reachable from the outside networks.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Port Forwarding SOHO Example
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Port Forwarding Configuring Port Forwarding with IOS In IOS, Port forwarding is essentially a static NAT translation with a specified TCP or UDP port number.
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 NAT for IPv6?  NAT is a workaround for IPv4 address scarcity.  IPv6 with a 128-bit address provides 340 undecillion addresses.  Address space is not an issue for IPv6.  IPv6 makes IPv4 public-private NAT unnecessary by design; however, IPv6 does implement a form of private addresses, and it is implemented differently than they are for IPv4.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 IPv6 Unique Local Addresses  IPv6 unique local addresses (ULAs) are designed to allow IPv6 communications within a local site.  ULAs are not meant to provide additional IPv6 address space.  ULAs have the prefix FC00::/7, which results in a first hextet range of FC00 to FDFF.  ULAs are also known as local IPv6 addresses (not to be confused with IPv6 link-local addresses).
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 NAT for IPv6  IPv6 also uses NAT, but in a much different context.  In IPv6, NAT is used to provide transparent communication between IPv6 and IPv4.  NAT64 is not intended to be a permanent solution; it is meant to be a transition mechanism.  Network Address Translation-Protocol Translation (NAT-PT) was another NAT-based transition mechanism for IPv6, but is now deprecated by IETF.  NAT64 is now recommended.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 NAT for IPv6
  • 43. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 43 11.3 Troubleshooting NAT
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 Troubleshooting NAT: show commands
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 Troubleshooting NAT: debug command
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11: Summary This chapter has outlined:  How NAT is used to help alleviate the depletion of the IPv4 address space.  NAT conserves public address space and saves considerable administrative overhead in managing adds, moves, and changes.  NAT for IPv4, including: • NAT characteristics, terminology, and general operations • Different types of NAT, including static NAT, dynamic NAT, and NAT with overloading • Benefits and disadvantages of NAT  The configuration, verification, and analysis of static NAT, dynamic NAT, and NAT with overloading.
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11: Summary (cont.)  How port forwarding can be used to access an internal devices from the Internet.  Troubleshooting NAT using show and debug commands.  How NAT for IPv6 is used to translate between IPv6 addresses and IPv4 addresses.
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential