Lab6a1 - Configuring Dynamic and Static NAT
Lab6a1 - Configuring Dynamic and Static NAT
Lab6a1 - Configuring Dynamic and Static NAT
Topology
Addressing Table
Objectives
Part 1: Build the Network and Verify Connectivity
Part 2: Configure and Verify Static NAT
Part 3: Configure and Verify Dynamic NAT
Background / Scenario
Network Address Translation (NAT) is the process where a network device, such as a Cisco router, assigns a
private address to host devices inside a private network. The main reason to use NAT is to reduce the number
of public IP addresses that an organization uses because the number of available IPv4 public addresses is
limited.
In this lab, an ISP has allocated the public IP address space of 209.165.200.224/27 to a company. This
provides the company with 30 public IP addresses. The addresses, 209.165.200.225 to 209.165.200.241, are
for static allocation and 209.165.200.242 to 209.165.200.254 are for dynamic allocation. A static route is used
from the ISP to the gateway router, and a default route is used from the gateway to the ISP router. The ISP
connection to the Internet is simulated by a loopback address on the ISP router.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Lab – Configuring Dynamic and Static NAT
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs.
Note: Make sure that the routers and switch have been erased and have no startup configurations. If you are
unsure, contact your instructor.
Required Resources
• 2 Routers (Cisco 2900 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
• 1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
• 2 PCs (Windows 10 with terminal emulation program, such as Tera Term)
• Console cables to configure the Cisco IOS devices via the console ports
• Ethernet cables as shown in the topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Lab – Configuring Dynamic and Static NAT
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Lab – Configuring Dynamic and Static NAT
b. From PC-A, ping the Lo0 interface (192.31.7.1) on ISP. If the ping was unsuccessful, troubleshoot and
correct the issues. On the Gateway router, display the NAT table.
Gateway# show ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 209.165.200.225:1 192.168.1.20:1 192.31.7.1:1 192.31.7.1:1
--- 209.165.200.225 192.168.1.20 --- ---
A NAT entry was added to the table with ICMP listed as the protocol when PC-A sent an ICMP request
(ping) to 192.31.7.1 on ISP.
What port number was used in this ICMP exchange?
Note: It may be necessary to disable the PC-A firewall for the ping to be successful.
c. Because static NAT was configured for PC-A, verify that pinging from ISP to PC-A at the static NAT public
address (209.165.200.225) is successful.
d. On the Gateway router, display the NAT table to verify the translation.
Gateway# show ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 209.165.200.225:12 192.168.1.20:12 209.165.201.17:12 209.165.201.17:12
--- 209.165.200.225 192.168.1.20 --- ---
Notice that the Outside local and Outside global addresses are the same. This address is the ISP remote
network source address. For the ping from the ISP to succeed, the Inside global static NAT address
209.165.200.225 was translated to the Inside local address of PC-A (192.168.1.20).
e. Verify NAT statistics by using the show ip nat statistics command on the Gateway router.
Gateway# show ip nat statistics
Total active translations: 2 (1 static, 1 dynamic; 1 extended)
Peak translations: 2, occurred 00:02:12 ago
Outside interfaces:
GigabitEthernet0/0
Inside interfaces:
GigabitEthernet0/1
Hits: 39 Misses: 0
CEF Translated packets: 39, CEF Punted packets: 0
Expired translations: 3
Dynamic mappings:
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Lab – Configuring Dynamic and Static NAT
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
Note: This is only a sample output. Your output may not match exactly.
Step 2: Define an access control list (ACL) that matches the LAN private IP address range.
ACL 1 is used to allow 192.168.1.0/24 network to be translated.
Gateway(config)# access-list 1 permit 192.168.1.0 0.0.0.255
Step 3: Verify that the NAT interface configurations are still valid.
Issue the show ip nat statistics command on the Gateway router to verify the NAT configurations.
Step 5: Define the NAT from the inside source list to the outside pool.
Note: Remember that NAT pool names are case-sensitive and the pool name entered here must match
that used in the previous step.
Gateway(config)# ip nat inside source list 1 pool public_access
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Lab – Configuring Dynamic and Static NAT
A dynamic NAT entry was added to the table with ICMP as the protocol when PC-B sent an ICMP
message to 192.31.7.1 on ISP.
What port number was used in this ICMP exchange?
b. From PC-B, open a browser and enter the IP address of the ISP-simulated web server (Lo0 interface).
When prompted, log in as webuser with a password of webpass.
c. Display the NAT table.
Pro Inside global Inside local Outside local Outside global
--- 209.165.200.225 192.168.1.20 --- ---
tcp 209.165.200.242:1038 192.168.1.21:1038 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1039 192.168.1.21:1039 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1040 192.168.1.21:1040 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1041 192.168.1.21:1041 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1042 192.168.1.21:1042 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1043 192.168.1.21:1043 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1044 192.168.1.21:1044 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1045 192.168.1.21:1045 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1046 192.168.1.21:1046 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1047 192.168.1.21:1047 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1048 192.168.1.21:1048 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1049 192.168.1.21:1049 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1050 192.168.1.21:1050 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1051 192.168.1.21:1051 192.31.7.1:80 192.31.7.1:80
tcp 209.165.200.242:1052 192.168.1.21:1052 192.31.7.1:80 192.31.7.1:80
--- 209.165.200.242 192.168.1.22 --- ---
What protocol was used in this translation?
What port numbers were used?
Inside:
outside:
What well-known port number and service was used?
d. Verify NAT statistics by using the show ip nat statistics command on the Gateway router.
Gateway# show ip nat statistics
Total active translations: 3 (1 static, 2 dynamic; 1 extended)
Peak translations: 17, occurred 00:06:40 ago
Outside interfaces:
GigabitEthernet0/0
Inside interfaces:
GigabitEthernet0/1
Hits: 345 Misses: 0
CEF Translated packets: 345, CEF Punted packets: 0
Expired translations: 20
Dynamic mappings:
-- Inside Source
[Id: 1] access-list 1 pool public_access refcount 2
pool public_access: netmask 255.255.255.224
start 209.165.200.242 end 209.165.200.254
type generic, total addresses 13, allocated 1 (7%), misses 0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Lab – Configuring Dynamic and Static NAT
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
Note: This is only a sample output. Your output may not match exactly.
Static entry in use, do you want to delete child entries? [no]: yes
b. Clear the NATs and statistics.
c. Ping the ISP (192.31.7.1) from both hosts.
d. Display the NAT table and statistics.
Gateway# show ip nat statistics
Total active translations: 4 (0 static, 4 dynamic; 2 extended)
Peak translations: 15, occurred 00:00:43 ago
Outside interfaces:
GigabitEthernet0/0
Inside interfaces:
GigabitEthernet0/1
Hits: 16 Misses: 0
CEF Translated packets: 285, CEF Punted packets: 0
Expired translations: 11
Dynamic mappings:
-- Inside Source
[Id: 1] access-list 1 pool public_access refcount 4
pool public_access: netmask 255.255.255.224
start 209.165.200.242 end 209.165.200.254
type generic, total addresses 13, allocated 2 (15%), misses 0
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Lab – Configuring Dynamic and Static NAT
Reflection
1. Why would NAT be used in a network?
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8