SlideShare uma empresa Scribd logo
1 de 48
Baixar para ler offline
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 5: Network
Address Translation for
IPv4
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5
5.1 NAT Operation
5.2 Configuring NAT
5.3 Troubleshooting NAT
5.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Objectives
 Describe NAT characteristics.
 Describe the benefits and drawbacks of NAT.
 Configure static NAT using the CLI.
 Configure dynamic NAT using the CLI.
 Configure PAT using the CLI.
 Configure port forwarding using the CLI.
 Configure NAT64.
 Use show commands to verify NAT operation.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
5.1 NAT Operation
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
IPv4 Private Address Space
 IPv4 address space is not big enough to uniquely address all the
devices that must be connected to the Internet.
 Network private addresses are described in RFC 1918 and are to
designed to be used within an organization or site only.
 Private addresses are not routed by Internet routers while public
addresses are.
 Private addresses can alleviate IPv4 scarcity, but because they aren’t
routed by Internet devices, they first need to be translated.
 NAT is process used to perform such translation.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
IPv4 Private Address Space
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
What is NAT?
 NAT is a process used to translate network addresses.
 NAT’s primary use is to conserve public IPv4 addresses.
 NAT is usually implemented at border network devices, such as
firewalls or routers.
 NAT allows the networks to use private addresses internally, only
translating to public addresses when needed.
 Devices within the organization can be assigned private addresses
and operate with locally unique addresses.
 When traffic must be sent or received to or from other organizations
or the Internet, the border router translates the addresses to a public
and globally unique address.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
What is NAT? (cont.)
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
NAT Terminology
 Inside network is the set of
devices using private
addresses
 Outside network refers to all
other networks
 NAT includes four types of
addresses:
• Inside local address
• Inside global address
• Outside local address
• Outside global address
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NAT Characteristics
NAT Terminology (cont.)
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Static NAT
 Static NAT uses a one-to-one mapping of local and global addresses.
 These mappings are configured by the network administrator and
remain constant.
 Static NAT is particularly useful when servers hosted in the inside
network must be accessible from the outside network.
 A network administrator can SSH to a server in the inside network by
pointing the SSH client to the proper inside global address.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Static NAT (cont.)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Dynamic NAT
 Dynamic NAT uses a pool of public addresses and assigns them on a
first-come, first-served basis.
 When an inside device requests access to an outside network,
dynamic NAT assigns an available public IPv4 address from the pool.
 Dynamic NAT requires that enough public addresses are available to
satisfy the total number of simultaneous user sessions.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Dynamic NAT (cont.)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Port Address Translation
 Port Address Translation (PAT) maps multiple private IPv4
addresses to a single public IPv4 address or a few addresses.
 PAT uses the pair source port and source IP address to keep track
of what traffic belongs to what internal client.
 PAT is also known as NAT overload.
 By also using the port number, PAT forwards the response packets
to the correct internal device.
 The PAT process also validates that the incoming packets were
requested, thus adding a degree of security to the session.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of NAT
Comparing NAT and PAT
 NAT translates IPv4 addresses on a 1:1 basis between private IPv4
addresses and public IPv4 addresses.
 PAT modifies both the address and the port number.
 NAT forwards incoming packets to their inside destination by referring
to the incoming source IPv4 address provided by the host on the
public network.
 With PAT, there is generally only one or a very few publicly exposed
IPv4 addresses.
 PAT is able to translate protocols that do not use port numbers, such
as ICMP; each one of these protocols is supported differently by
PAT.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of NAT
Benefits of NAT
 Conserves the legally registered addressing scheme
 Increases the flexibility of connections to the public network
 Provides consistency for internal network addressing schemes
 Provides network security
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of NAT
Disadvantages of NAT
 Performance is degraded
 End-to-end functionality is degraded
 End-to-end IP traceability is lost
 Tunneling is more complicated
 Initiating TCP connections can be disrupted
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
5.2 Configuring NAT
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Configuring Static NAT
There are two basic tasks to perform when configuring
static NAT translations:
 Create the mapping between the inside local and
outside local addresses.
 Define which interfaces belong to the inside network
and which belong to the outside network.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Configuring Static NAT
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Analyzing Static NAT
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Verifying Static NAT
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Static NAT
Verifying Static NAT (cont.)
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Dynamic NAT Operation
 The pool of public IPv4 addresses (inside global address pool) is
available to any device on the inside network on a first-come, first-
served basis.
 With dynamic NAT, a single inside address is translated to a single
outside address.
 The pool must be large enough to accommodate all inside devices.
 A device is unable to communicate to any external networks if no
addresses are available in the pool.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Configuring Dynamic NAT
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Analyzing Dynamic NAT
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Analyzing Dynamic NAT
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Verifying Dynamic NAT
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Dynamic NAT
Verifying Dynamic NAT
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Configuring PAT: Address Pool
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Configuring PAT: Single Address
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Analyzing PAT
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Analyzing PAT
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring PAT
Verifying PAT Translations
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Port Forwarding
Port Forwarding
 Port forwarding is the act of forwarding a network port from one
network node to another.
 A packet sent to the public IP address and port of a router can be
forwarded to a private IP address and port in inside network.
 Port forwarding is helpful in situations where servers have private
addresses, not reachable from the outside networks.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Port Forwarding
SOHO Example
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Port Forwarding
Configuring Port Forwarding with IOS
In IOS, Port forwarding is essentially a static NAT translation with a
specified TCP or UDP port number.
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
NAT for IPv6?
 NAT is a workaround for IPv4 address scarcity.
 IPv6 with a 128-bit address provides 340 undecillion addresses.
 Address space is not an issue for IPv6.
 IPv6 makes IPv4 public-private NAT unnecessary by design;
however, IPv6 does implement a form of private addresses, and it
is implemented differently than they are for IPv4.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
IPv6 Unique Local Addresses
 IPv6 unique local addresses (ULAs) are designed to allow IPv6
communications within a local site.
 ULAs are not meant to provide additional IPv6 address space.
 ULAs have the prefix FC00::/7, which results in a first hextet range
of FC00 to FDFF.
 ULAs are also known as local IPv6 addresses (not to be confused
with IPv6 link-local addresses).
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
NAT for IPv6
 IPv6 also uses NAT, but in a much different context.
 In IPv6, NAT is used to provide transparent communication
between IPv6 and IPv4.
 NAT64 is not intended to be a permanent solution; it is meant to be
a transition mechanism.
 Network Address Translation-Protocol Translation (NAT-PT) was
another NAT-based transition mechanism for IPv6, but is now
deprecated by IETF.
 NAT64 is now recommended.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
NAT for IPv6
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 43
5.3 Troubleshooting NAT
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
Troubleshooting NAT: show commands
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NAT and IPv6
Troubleshooting NAT: debug command
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary
This chapter has outlined:
 How NAT is used to help alleviate the depletion of the IPv4 address
space.
 NAT conserves public address space and saves considerable
administrative overhead in managing adds, moves, and changes.
 NAT for IPv4, including:
• NAT characteristics, terminology, and general operations
• Different types of NAT, including static NAT, dynamic NAT, and
NAT with overloading
• Benefits and disadvantages of NAT
 The configuration, verification, and analysis of static NAT, dynamic
NAT, and NAT with overloading.
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5: Summary (cont.)
 How port forwarding can be used to access an internal devices from
the Internet.
 Troubleshooting NAT using show and debug commands.
 How NAT for IPv6 is used to translate between IPv6 addresses and
IPv4 addresses.
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mais conteúdo relacionado

Mais procurados

CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing conceptsteknetir
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerVuz Dở Hơi
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerVuz Dở Hơi
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1Irsandi Hasan
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6Chaing Ravuth
 

Mais procurados (20)

CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 

Semelhante a CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4

Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4teknetir
 
Rs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_finalRs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_finallet's go to study
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4Vuz Dở Hơi
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Yaser Rahmati
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9Chaing Ravuth
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingVuz Dở Hơi
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressingteknetir
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19eyad alaa
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4newbie2019
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4Irsandi Hasan
 

Semelhante a CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4 (20)

Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4
 
Rs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_finalRs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_final
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip AddressingCCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
 
Chapter 8 : IP addressing
Chapter 8 : IP addressingChapter 8 : IP addressing
Chapter 8 : IP addressing
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4CCNA Discovery 2 - Chapter 4
CCNA Discovery 2 - Chapter 4
 

Mais de Vuz Dở Hơi

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Vuz Dở Hơi
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Vuz Dở Hơi
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionVuz Dở Hơi
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Vuz Dở Hơi
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Vuz Dở Hơi
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Vuz Dở Hơi
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Vuz Dở Hơi
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Vuz Dở Hơi
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Vuz Dở Hơi
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Vuz Dở Hơi
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Vuz Dở Hơi
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Vuz Dở Hơi
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationVuz Dở Hơi
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Vuz Dở Hơi
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceVuz Dở Hơi
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Vuz Dở Hơi
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Vuz Dở Hơi
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingVuz Dở Hơi
 

Mais de Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 5: Network Address Translation for IPv4 Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 5.1 NAT Operation 5.2 Configuring NAT 5.3 Troubleshooting NAT 5.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Objectives  Describe NAT characteristics.  Describe the benefits and drawbacks of NAT.  Configure static NAT using the CLI.  Configure dynamic NAT using the CLI.  Configure PAT using the CLI.  Configure port forwarding using the CLI.  Configure NAT64.  Use show commands to verify NAT operation.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 5.1 NAT Operation
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics IPv4 Private Address Space  IPv4 address space is not big enough to uniquely address all the devices that must be connected to the Internet.  Network private addresses are described in RFC 1918 and are to designed to be used within an organization or site only.  Private addresses are not routed by Internet routers while public addresses are.  Private addresses can alleviate IPv4 scarcity, but because they aren’t routed by Internet devices, they first need to be translated.  NAT is process used to perform such translation.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics IPv4 Private Address Space
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics What is NAT?  NAT is a process used to translate network addresses.  NAT’s primary use is to conserve public IPv4 addresses.  NAT is usually implemented at border network devices, such as firewalls or routers.  NAT allows the networks to use private addresses internally, only translating to public addresses when needed.  Devices within the organization can be assigned private addresses and operate with locally unique addresses.  When traffic must be sent or received to or from other organizations or the Internet, the border router translates the addresses to a public and globally unique address.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics What is NAT? (cont.)
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics NAT Terminology  Inside network is the set of devices using private addresses  Outside network refers to all other networks  NAT includes four types of addresses: • Inside local address • Inside global address • Outside local address • Outside global address
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NAT Characteristics NAT Terminology (cont.)
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Static NAT  Static NAT uses a one-to-one mapping of local and global addresses.  These mappings are configured by the network administrator and remain constant.  Static NAT is particularly useful when servers hosted in the inside network must be accessible from the outside network.  A network administrator can SSH to a server in the inside network by pointing the SSH client to the proper inside global address.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Static NAT (cont.)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Dynamic NAT  Dynamic NAT uses a pool of public addresses and assigns them on a first-come, first-served basis.  When an inside device requests access to an outside network, dynamic NAT assigns an available public IPv4 address from the pool.  Dynamic NAT requires that enough public addresses are available to satisfy the total number of simultaneous user sessions.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Dynamic NAT (cont.)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Port Address Translation  Port Address Translation (PAT) maps multiple private IPv4 addresses to a single public IPv4 address or a few addresses.  PAT uses the pair source port and source IP address to keep track of what traffic belongs to what internal client.  PAT is also known as NAT overload.  By also using the port number, PAT forwards the response packets to the correct internal device.  The PAT process also validates that the incoming packets were requested, thus adding a degree of security to the session.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of NAT Comparing NAT and PAT  NAT translates IPv4 addresses on a 1:1 basis between private IPv4 addresses and public IPv4 addresses.  PAT modifies both the address and the port number.  NAT forwards incoming packets to their inside destination by referring to the incoming source IPv4 address provided by the host on the public network.  With PAT, there is generally only one or a very few publicly exposed IPv4 addresses.  PAT is able to translate protocols that do not use port numbers, such as ICMP; each one of these protocols is supported differently by PAT.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of NAT Benefits of NAT  Conserves the legally registered addressing scheme  Increases the flexibility of connections to the public network  Provides consistency for internal network addressing schemes  Provides network security
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of NAT Disadvantages of NAT  Performance is degraded  End-to-end functionality is degraded  End-to-end IP traceability is lost  Tunneling is more complicated  Initiating TCP connections can be disrupted
  • 19. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19 5.2 Configuring NAT
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Configuring Static NAT There are two basic tasks to perform when configuring static NAT translations:  Create the mapping between the inside local and outside local addresses.  Define which interfaces belong to the inside network and which belong to the outside network.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Configuring Static NAT
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Analyzing Static NAT
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Verifying Static NAT
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Static NAT Verifying Static NAT (cont.)
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Dynamic NAT Operation  The pool of public IPv4 addresses (inside global address pool) is available to any device on the inside network on a first-come, first- served basis.  With dynamic NAT, a single inside address is translated to a single outside address.  The pool must be large enough to accommodate all inside devices.  A device is unable to communicate to any external networks if no addresses are available in the pool.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Configuring Dynamic NAT
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Analyzing Dynamic NAT
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Analyzing Dynamic NAT
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Verifying Dynamic NAT
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Dynamic NAT Verifying Dynamic NAT
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Configuring PAT: Address Pool
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Configuring PAT: Single Address
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Analyzing PAT
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Analyzing PAT
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring PAT Verifying PAT Translations
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Port Forwarding Port Forwarding  Port forwarding is the act of forwarding a network port from one network node to another.  A packet sent to the public IP address and port of a router can be forwarded to a private IP address and port in inside network.  Port forwarding is helpful in situations where servers have private addresses, not reachable from the outside networks.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Port Forwarding SOHO Example
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Port Forwarding Configuring Port Forwarding with IOS In IOS, Port forwarding is essentially a static NAT translation with a specified TCP or UDP port number.
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 NAT for IPv6?  NAT is a workaround for IPv4 address scarcity.  IPv6 with a 128-bit address provides 340 undecillion addresses.  Address space is not an issue for IPv6.  IPv6 makes IPv4 public-private NAT unnecessary by design; however, IPv6 does implement a form of private addresses, and it is implemented differently than they are for IPv4.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 IPv6 Unique Local Addresses  IPv6 unique local addresses (ULAs) are designed to allow IPv6 communications within a local site.  ULAs are not meant to provide additional IPv6 address space.  ULAs have the prefix FC00::/7, which results in a first hextet range of FC00 to FDFF.  ULAs are also known as local IPv6 addresses (not to be confused with IPv6 link-local addresses).
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 NAT for IPv6  IPv6 also uses NAT, but in a much different context.  In IPv6, NAT is used to provide transparent communication between IPv6 and IPv4.  NAT64 is not intended to be a permanent solution; it is meant to be a transition mechanism.  Network Address Translation-Protocol Translation (NAT-PT) was another NAT-based transition mechanism for IPv6, but is now deprecated by IETF.  NAT64 is now recommended.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 NAT for IPv6
  • 43. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 43 5.3 Troubleshooting NAT
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 Troubleshooting NAT: show commands
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NAT and IPv6 Troubleshooting NAT: debug command
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary This chapter has outlined:  How NAT is used to help alleviate the depletion of the IPv4 address space.  NAT conserves public address space and saves considerable administrative overhead in managing adds, moves, and changes.  NAT for IPv4, including: • NAT characteristics, terminology, and general operations • Different types of NAT, including static NAT, dynamic NAT, and NAT with overloading • Benefits and disadvantages of NAT  The configuration, verification, and analysis of static NAT, dynamic NAT, and NAT with overloading.
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Summary (cont.)  How port forwarding can be used to access an internal devices from the Internet.  Troubleshooting NAT using show and debug commands.  How NAT for IPv6 is used to translate between IPv6 addresses and IPv4 addresses.
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential