Scaling IP Addresses
From Mycomputer Notes
Contents |
Configuring NAT & PAT
Static Translations
Stattic Trasnlation are entered direclty into the configuration and are always entered in the translation table. To configured static inside source address translation perform the task below:
- - Establish static translation between an inside local address and an insie global address in Global Configuration Mode.
Router(Config)#ip nat inside source static <LOCAL-IP> <GLOBAL-IP>
- - Enter the interface mode and specify the inside interface & Mark the interface as connected to the inside
Router(config)#interface <TYPE> <NUMBER> Router(config)#ip nat inside
- - Specify the outside inteface & Mark the interface as connected to the outised
Router(config)#interface <TYPE> <NUMBER> Router(config)#ip nat outside
Dynamic Translations
Access lists are used by NAT to select addresses for dynamic translation, dynamic translation used the addresses permitted by the access list to be translated; only those addresses are to be translated. Cisco advises againtst configuring access list referenced by NAT command with permit any command. Using permit any can result in NAT consuming too many router resources, which can cause network problems. To configure dynamic inside source address translation, perform the tasks below
Router(config)#access-list 1 permit 10.0.0.0 0.0.255.255 Router(config)#ip nat inside source list 1 pool <POOL-NAME>
- - Enter global configuration mode and define a pool of global addresses to be allocated as needed.
Router(config)#ip nat pool <POOL-NAME><START-IP><END-IP> netmask <NETMASK>
- - Define a standard access list permitting those addresses that are to be translated
Router(config)#access-list <ACL-NUMBER> permit <IP-SOURCE> <WILDCARD>
- - Establish dynamic source translating specifying the access list defined in prior step.
Router(config)#ip nat inside source list <ACL-NUMBER> pool <POOL-NAME>
- - Enter the interface mode and specify the inside interface & Mark the interface as connected to the inside
Router(config)#interface <TYPE> <NUMBER> Router(config)#ip nat inside
- - Specify the outside inteface & Mark the interface as connected to the outised
Router(config)#interface <TYPE> <NUMBER> Router(config)#ip nat outside
Configuring PAT
Overloading is configured when an IPS has allocated one public ip address to an entire private network.
Define a standard IP access list permitting those inside local addresses that are to be translated.
Router (config)#access-list 1 permit 10.0.0.0 0.0.255.255
Establish overload translation by specifying the IP address to be overloaded as that assigned to an outside interface.
Router (config)#ip nat inside source list 1 interface serial0/0 overload.
Follow the steps below to configured overloading: The first step os tje same as when configuring a dynamic translation.
- - Define a standard access list permitting those addresses that are to be translated.
Router(config)#access-list <ACL-NUMBER> permit <IP-SOURCE> <WILDCARD>
- - Establish dynamic source translating specifying the access list defined in prior step.
Router(config)#ip nat inside source list <ACL-NUMBER> interface <TYPE> <NUMBER> overload
- - Specify the Global address, as a pool to be used for overloading & overload translation. This is used when the ISP has provided a pool of public ip addresses to the private network.
Router(config)#ip nat pool <POOL-NAME><START-IP><END-IP> netmask <NETMASK> Router(config)#ip nat inside source list <ACL-NUMBER> pool <POOL-NAME> overload
- - Enter the interface mode and specify the inside interface & Mark the interface as connected to the inside
Router(config)#interface <TYPE> <NUMBER> Router(config)#ip nat inside
- - Specify the outside inteface & Mark the interface as connected to the outised
Router(config)#interface <TYPE> <NUMBER> Router(config)#ip nat outside
NAT Advantages
- Conserves the public addressing scheme by allowing the privatization of intranets.
- Increased flexibility of connections to the public network.
- Consistent Internal Networking scheme. The Internal scheme does not need to be changed when there is a communication stablished to the outside.
NAT Disavantages
- NAT Increased delay due to the translation of each IP addess within the packet headers.
- Performance is decrease because because the CPU must look at every packet to decide whether it must be translated.
- Major disavantage is the lost of end-to-end IP traceability. It is dificult to trace a packet from source to destination since the packet can be translate several times as it undergoes several NAT traslations. Applications that used that used the physical address instead of domain name will not reached destination that are translated accross the NAT rotuer.
Cisco IOS NAT Supports the followings:
- ICMP
- FTP (PORT & PASV)
- NetBIOS over TCP/IP (datagrame, name & session services)
Cisco IOS NAT DOES NOT Supports the followings:
- Routing Table Updates
- DNS zone transfers
- BOOTP
- Talk & NTalk protocols
- SNMP
Introduction to HDCP
Configuring DHCP
Configuring DHCP on a router requires an adminsitrator to define a pool of addresses, ip_dhcp_pool commands defines the pool of addresses assigned to hosts. The ip_dhcp_excluded-address command configures the router to exclude an individual or a range of addresses when assigning addresses to clients. This command can be used to reserve addresses that are statically assigned to tkey hosts, interface on a router & enterpriser or workgroup server. The DHCP sever is also configured to assign much more then IP addresses. Other IP values such as default-gateway, address of DNS, WINS servers. The IOS DHCP sever can configure clients with virtually any TCP/IP information.
On a Cisco IOS the DHCP is enable by default, to disabled the service we used the no_service_dhcp in global configuration mode. If the administrator wants it back service_dhcp
List of key commands to used when configuring DHCP in a Cisco IOS:
- ip_dhcp_pool
- ip_dhcp_excluded-address
- default+router
- dns_server
- netbios-name-server