Preview

Network Address Translation and Router

Powerful Essays
Open Document
Open Document
1809 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Address Translation and Router
|CCNA4: Commands |

WAN Technologies
[pic]

Cisco Networking Academy Program CCNA 4: WAN Technologies v3.1.1

1 Module 1: Scaling IP Addresses 3

1.1 NAT and PAT 3 1.1.1 Configuring static NAT 3 1.1.2 Configuring dynamic NAT 3 1.1.3 Configuring NAT Overload (PAT) 4 1.1.4 Verifying NAT and PAT configuration 4 1.1.5 Troubleshooting NAT and PAT configuration 4

1.2 DHCP 5 1.2.1 Configuring DHCP Operation 5 1.2.2 Verifying DHCP Operation 5 1.2.3 Troubleshooting DHCP Configuration 5

2 Module 3: Point-to-Point Protocol (PPP) 6

2.1 Configuring HDLC Encapsulation 6

2.2 Troubleshooting a Serial Interface 6

2.3 Configuring PPP Encapsulation 6

2.4 Configuring PPP Authentication 6

2.5 Verifying the Serial PPP Encapsulation Configuration 7

2.6 Troubleshooting the Serial PPP Encapsulation Configuration 7

3 Module 3: ISDN and DDR 7

3.1 Configuring ISDN BRI 7

3.2 Configuring ISDN PRI 8

3.3 Verifying the ISDN Configuration 8

3.4 Troubleshooting the ISDN Configuration 8

3.5 Defining Static Routes for DDR 8

3.6 Specifying Interesting Traffic for DDR 9

3.7 Configuring DDR Dialer Information 9

3.8 Configuring Dialer Profiles 9

3.9 Verifying the DDR Configuration 10

4 Module 5: Frame Relay 10

4.1 Basic Frame Relay Configuration 10

4.2 Verifying Operation and Confirming Connectivity 10

4.3 Configuring Subinterfaces 10

4.4 Configuring Optional Commands 11

Module 1: Scaling IP Addresses

1 NAT and PAT

1 Configuring static NAT

Router(config)#ip nat inside source static local-ip global-ip
Router(config)#interface type number //inside interface
Router(config-if)#ip nat inside
Router(config-if)#interface type number //outside interface
Router(config-if)#ip nat outside

Example:

Router(config)#ip

You May Also Find These Documents Helpful

  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Cisco Unified WAN Services: Services, Security, Resiliency, and Intelligence - Cisco. (n.d.). Retrieved from http://www.cisco.com/en/US/prod/collateral/routers/ps9343/solution_overview_c22-450358_ps9343_Products_White_Paper.html…

    • 681 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IP SCHEMA KAMAZON

    • 1327 Words
    • 6 Pages

    In order to properly address the Infrastructure upgrade of the Kamazon Network our group decided that an appropriate ip address schema that will take into account the idea that people will be using more than just a desktop computer. They will have tablets, laptops, departmental printers, and smart phones. This is also based upon the understanding that every Department will have at least two printers for the staff and one for the Manager/Supervisor or VP of that Department. So with that being said, we estimated that could be at least three or more accurately four ip addresses per employee. So we multiplied the number of users per department by the number of estimated devices that each employee will be using.…

    • 1327 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The scenario is I am an IT Administrator for a newly founded company and have been tasked with designing am IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth in the next 2 years.…

    • 530 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    configuration, there are 5 segments which need to be addressed: three Ethernet interfaces and two…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    It is not necessary to put a DNS server in such a small location. 5 users and slow network connectivity does not justify the expense of installing Servers in that location. Unless there is a large amount of File sharing, or other data that needs to be accessed daily by other locations on the network. If that is the case then yes put in the server but configure it as a secondary or ADI zone type. I suggest putting the servers in the other location where you have 30 Users and good connectivity. You can also store all the files from both locations in the larger office, the smaller location can remote in via “VPN”. By doing this all the information from the smaller sight is stored off site. The smaller sight can be run with a smaller cheaper router.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Half-Duplex – A system in which signals may be sent in two directions, but not at the same time. In a half-duplex system, one end of the link must finish transmitting before the other end may begin.…

    • 1273 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 4. No part of any book may be reproduced or transmitted by any means without the…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Networking 202

    • 977 Words
    • 5 Pages

    Write a paragraph (a minimum of five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and just as importantly, how you feel it will benefit you in your academic and professional career. (8 points)In this lab the router baseline configuration was erased to begin configuration on a router from scratch. In the lab we chose to enter a basic management setup on the router to place an IP address on one interface, and set an initial configuration dialog for ease of use. A secret and enabled password was created to provide security that avoids others from make configuration changes without the password. A virtual terminal password was also created for authorized users to access switches remotely. In the subnet…

    • 977 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Host Addresses

    • 246 Words
    • 2 Pages

    Given 9 bits of mask for the host portion, how many host addresses are available?…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Routing

    • 843 Words
    • 4 Pages

    The table below lists the basic router configuration tasks in the left column. Fill in the blanks in the right column with the correct command syntax for each of the tasks.…

    • 843 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Number of host bits per subnetNumber of usable hosts per subnet|664 – 2 = 62 (from 26 – 2)|…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dynamic, Static Ip

    • 251 Words
    • 2 Pages

    When connecting to a network the process of finding the IP address is what ultimately allows you to connect. Now creating a router to router connection you are going to want your IP addresses to stay the same. Basically the difference in a static IP and a dynamic IP is that one IP stays the same and the other changes based off of a time limit. A static IP will always remain the same address. A dynamic IP will constantly change. This is beneficial because it slows attempts at unauthorized access to your network. In order for somebody to connect they will need to know the IP address at that current time. For connecting routers in a company there would be no need to implement a dynamic IP. The only IP that I would make dynamic is the default gateway. Reason being, is that it is an IP that you don't really need to connect to. It is basically a defense mechanism to prevent breaches. There are a lot of things you can do with your IP. For the most part your network is safe until you start allowing ports to to be accessed from the internet. One common use for forwarding ports is to setup or host a server. I recently did just that, I set up a server for a game and went through the steps of port forwarding and creating a static IP. Now these certain programs can be accessed from people I give the information…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    No requirements has expanded into washing carpets as well(nothing like a diversified company). They now have a fleet of trucks that roam around town, downloading information between the head office and the trucks. The carpet cleaning business is very competitive, and Enterprise Mining does not want the competition to be able to intercept any information.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAT translation

    • 325 Words
    • 3 Pages

    Interim, consilio eius cognito et per mercatores perlato ad Britannos, a compluribus insulae civitatibus ad eum legati veniunt,…

    • 325 Words
    • 3 Pages
    Satisfactory Essays