LAB Configuring NAT. Objective. Background/Preparation



Similar documents
Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Lab: Basic Router Configuration

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Lab Load Balancing Across Multiple Paths

Lab Configuring PAT with SDM and Static NAT using Cisco IOS Commands

Lab Diagramming External Traffic Flows

Skills Assessment Student Training Exam

Lab Advanced Telnet Operations

Lab Load Balancing Across Multiple Paths Instructor Version 2500

3.1 Connecting to a Router and Basic Configuration

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Lab Configuring DHCP with SDM and the Cisco IOS CLI

Device Interface IP Address Subnet Mask Default Gateway

Sample Configuration Using the ip nat outside source list C

Sample Configuration Using the ip nat outside source static

Lab Configuring OSPF with Loopback Addresses

Lab Developing ACLs to Implement Firewall Rule Sets

Lab 8.4.3a Managing Cisco IOS Images with TFTP

Lab 5.3.9b Managing Router Configuration Files Using TFTP

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

NAT (Network Address Translation) & PAT (Port Address Translation)

RIPv2 with Variable Length Subnet Masks (VLSMs)

Lab Characterizing Network Applications

LAB THREE STATIC ROUTING

Objectives. Background. Required Resources. CCNA Security

Lab Diagramming Intranet Traffic Flows

Applicazioni Telematiche

Configuring a Cisco 2509-RJ Terminal Router

ENetwork Basic Configuration PT Practice SBA

Lab Creating a Logical Network Diagram

Lab 8.4.3b Managing Cisco IOS images with ROMMON and TFTP

Lab Creating a Network Map using CDP Instructor Version 2500

Connecting to the Firewall Services Module and Managing the Configuration

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

CCNA Discovery Working at a Small to Medium Business or ISP Student Packet Tracer Lab Manual

Chapter 3: IP Addressing and VLSM

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Lab Configuring Access Policies and DMZ Settings

Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440

Configure ISDN Backup and VPN Connection

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

IOS NAT Load Balancing for Two ISP Connections

Lab Managing the MAC Address Table

Lab 2 - Basic Router Configuration

LAB MANUAL for Computer Network

Lab Diagramming Traffic Flows to and from Remote Sites

LAN TCP/IP and DHCP Setup

During this lab time you will configure the routing protocol OSPF with IPv4 addresses.

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Using VDOMs to host two FortiOS instances on a single FortiGate unit

Document ID: Introduction

1 PC to WX64 direction connection with crossover cable or hub/switch

Lab - Using IOS CLI with Switch MAC Address Tables

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

Lab Configure Basic AP Security through IOS CLI

Lab PC Network TCP/IP Configuration

Lab Configuring the PIX Firewall as a DHCP Server

How To Configure A Cisco Router With A Cio Router

Lab Analyzing Network Traffic

Part A:Background/Preparation

Lab Exercise Configure the PIX Firewall and a Cisco Router

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

CISCO CATALYST 3550 Series Switches

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Configuring a Router

Lab Introductory Lab 1 Getting Started and Building Start.txt

Configuring a Leased Line

Basic Software Configuration Using the Cisco IOS Command-Line Interface

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

Network Simulator Lab Study Plan

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Configuring Static and Dynamic NAT Simultaneously

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

VLSM Static routing. Computer networks. Seminar 5

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram

How to Configure Cisco 2600 Routers

Configuring IP Load Sharing in AOS Quick Configuration Guide

Lab Configuring Syslog and NTP (Instructor Version)

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Chapter 4 Customizing Your Network Settings

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Lab Use Network Inspector to Observe STP Behavior

Configuring the Cisco Secure PIX Firewall with a Single Intern

Cisco Router Configuration Basics. Scalable Infrastructure Workshop

ICS 351: Today's plan

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

- The PIX OS Command-Line Interface -

Welcome to Todd Lammle s CCNA Bootcamp

Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)

Configuring the Switch with the CLI-Based Setup Program

Lab assignment #1 Firewall operation and Access Control Lists

Lab 7-1 Configuring Switches for IP Telephony Support

Router Lab Reference Guide

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

Transcription:

LAB Configuring NAT Objective Configure a router to use network address translation (NAT) to convert internal IP addresses, typically private addresses, into outside public addresses. Configure static IP mapping to allow outside access to an internal PC. Background/Preparation An ISP has allocated a company the public classless interdomain routing (CIDR) IP address 199.99.9.32/27. This is equivalent to 30 public IP addresses. Since the company has an internal requirement for more than 30 addresses, the IT manager has decided to implement NAT. The addresses 199.99.9.33 199.99.9.39 for static allocation and 199.99.9.40 199.99.9.62 for dynamic allocation. Routing will be done between the ISP and the gateway router used by the company. A static route will be used between the ISP and gateway routers and a default route will be used between the gateway router and the ISP. The ISP connection to the Internet will be represented by a loopback address on the ISP router. Cable a network similar to the one in the diagram above. Any router that meets the interface requirements displayed on the above diagram may be used. 1

Step 1 Configure the routers Configure all of the following according to the chart: The hostname The console password The virtual terminal password The enable secret password The interfaces Step 2 Save the configuration Save the running configuration to the start-up configuration. Step 3 Configure the hosts with the proper IP address, subnet mask, and default gateway Each workstation should be able to ping the attached router. If the ping was not successful, troubleshoot as necessary. Check and verify that the workstation has been assigned a specific IP address and default gateway. Step 4 Verify that the network is functioning a. From the attached hosts, ping the FastEthernet interface of the default gateway router. b. Was the ping from the first host successful? c. Was the ping from the second host successful? d. If the answer is no for either question, troubleshoot the router and host configurations to find the error. Ping again until they are both successful. Step 5 Create a static route a. Create a static route from the ISP to the Gateway router. Addresses 199.99.9.32/27 have been allocated for Internet access outside of the company. Use the ip route command to create the static route. ISP(config)#ip route 199.99.9.32 255.255.255.224 200.2.2.18 b. Is the static route in the routing table? c. What command checks the routing table contents? d. If the route was not in the routing table, give one reason why this might be so? 2

Step 6 Create a default route a. From the Gateway router to the ISP router, create a static route to network 0.0.0.0 0.0.0.0, using the ip route command. This will forward any unknown destination address traffic to the ISP by setting a Gateway of Last Resort on the Gateway router. Gateway(config)#ip route 0.0.0.0 0.0.0.0 200.2.2.17 b. Is the static route in the routing table? c. Try to ping from one of the workstations to the ISP serial interface IP address. d. Was the ping successful? e. Why? Step 7 Define the pool of usable public IP addresses To define the pool of public addresses, use the ip nat pool command: Gateway(config)#ip nat pool public-access 199.99.9.40 199.99.9.62 netmask 255.255.255.224 Which public addresses are you allowed to use for dynamic allocation? Step 8 Define an access list that will match the inside private IP addresses To define the access list to match the inside private addresses, use the access list command: Gateway(config)#access-list 1 permit 10.10.10.0 0.0.0.255 Which private addresses are you allowed to use inside your private network? 3

Step 9 Define the NAT translation from inside list to outside pool To define the NAT translation, use the ip nat inside source command: Gateway(config)#ip nat inside source list 1 pool public-access Step 10 Specify the interfaces The active interfaces on the router need to be specified as either inside or outside interfaces with respect to NAT. To do this, use the ip nat inside or ip nat outside command: Gateway(config)#interface fastethernet 0 Gateway(config-if)#ip nat inside Gateway(config-if)#interface serial 0 Gateway(config-if)#ip nat outside Which interface did you choose to be inside, and why? Step 11 Testing the configuration Configure one of the PCs on the LAN with the IP address 10.10.10.10/24 and a default gateway address of 10.10.10.1. From the PC, ping 172.16.1.1. If successful, look at the NAT translation on the Gateway router, using the command show ip nat translations. a. What is the translation of the inside local host addresses? b. The inside global address is assigned by? c. The inside local address is assigned by? Step 12 Configuring Static Mapping Workstation #1, 10.10.10.10/24, will be designated as the public WWW server. Thus, it needs a permanent public IP address. This mapping is defined using a static NAT mapping. Configure one of the PCs on the LAN with the IP address 10.10.10.10/24 and a default gateway address of 10.10.10.1. To configure a static IP NAT mapping, use the ip nat inside source static command at the privileged EXEC mode prompt: Gateway(config)#ip nat inside source static 10.10.10.10 199.99.9.33 4

This permanently maps 199.99.9.33 to the inside address 10.10.10.10. Look at the translation table: Gateway#show ip nat translations Does the mapping appear in the output of the show command? tep 12 Testing the configuration a. From the 10.10.10.10 workstation, verify it can ping 172.16.1.1 b. Is the ping successful? c. Why? d. From the ISP router, ping the host with the static NAT translation by typing ping 10.10.10.10. e. What were the results of the ping, was it successful? f. Why? g. From the ISP router, ping 199.99.9.33. If successful, look at the NAT translation on the Gateway router, using the command show ip nat translations. h. What is the translation of the inside local host addresses? Note: Erase the start-up configurarion on all routers in this lab assignment before you log off and turn the routers off. Configuration reference sheet 5

This sheet contains the basic configuration commands for the ISP and Gateway routers: ISP Router#configure terminal Router(config)#hostname ISP ISP(config)#enable password cisco ISP(config)#enable secret class ISP(config)#line console 0 ISP(config-line)#password cisco ISP(config-line)#login ISP(config-line)#exit ISP(config)#line vty 0 4 ISP(config-line)#password cisco ISP(config-line)#login ISP(config-line)#exit ISP(config)#interface loopback 0 ISP(config-if)#ip add 172.16.1.1 255.255.255.255 ISP(config-if)#no shutdown ISP(config-if)#exit ISP(config)#interface serial 0 ISP(config-if)#ip add 200.2.2.17 255.255.255.252 ISP(config-if)#clock rate 64000 ISP(config)#ip route 199.99.9.32 255.255.255.224 200.2.2.18 ISP(config)#end ISP#copy running-config startup-config Destination filename [startup-config]?[enter] Gateway Router#configure terminal Router(config)#hostname Gateway Gateway(config)#enable password cisco Gateway(config)#enable secret class Gateway(config)#line console 0 Gateway(config-line)#password cisco Gateway(config-line)#login Gateway(config-line)#exit Gateway(config)#line vty 0 4 Gateway(config-line)#password cisco Gateway(config-line)#login Gateway(config-line)#exit Gateway(config)#fastethernet 0 Gateway(config-if)#ip add 10.10.10.1 255.255.255.0 Gateway(config-if)#no shutdown Gateway(config-if)#exit Gateway(config)#interface serial 0 Gateway(config-if)#ip add 200.2.2.18 255.255.255.252 Gateway(config-if)#no shutdown Gateway(config)#ip route 0.0.0.0 0.0.0.0 200.2.2.17 6