6.5.6 Packet Tracer – Configure Dynamic NAT Answers
Packet Tracer – Configure Dynamic NAT (Answers Version)
Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Configure Dynamic NAT
Part 2: Verify NAT Implementation
Instructions
Part 1: Configure Dynamic NAT
Step 1: Configure traffic that will be permitted.
Open configuration window
On R2, configure one statement for ACL 1 to permit any address belonging to the 172.16.0.0/16 network.
R2(config)# access-list 1 permit 172.16.0.0 0.0.255.255
Step 2: Configure a pool of address for NAT.
Configure R2 with a NAT pool that uses two addresses in the 209.165.200.228/30 address space.
R2(config)# ip nat pool ANY_POOL_NAME 209.165.200.229 209.165.200.230 netmask 255.255.255.252
Notice in the topology there are 3 network addresses that would be translated based on the ACL created.
Question:
What will happen if more than 2 devices attempt to access the internet?
Type your answer here.
The additional devices would be denied access until one of the previous translations timed out freeing up an address to use.
Step 3: Associate ACL 1 with the NAT pool.
Enter the command that associates ACL 1 with the NAT pool that you just created.
R2(config)# ip nat inside source list 1 pool ANY_POOL_NAME
Step 4: Configure the NAT interfaces.
Configure R2 interfaces with the appropriate inside and outside NAT commands.
R2(config)# interface s0/0/0
R2(config-if)# ip nat outside
R2(config-if)# interface s0/0/1
R2(config-if)# ip nat inside
Close configuration window
Part 2: Verify NAT Implementation
Step 1: Access services across the internet.
From the web browser of L1, PC1, or PC2, access the web page for Server1.
Step 2: View NAT translations.
View the NAT translations on R2. Identify the internal source address of the PC and the translated address from the NAT pool in the command output.
Open configuration window
R2# show ip nat translations
Close configuration window
End of document
Answer script
Router R2
enable
configure terminal
access-list 1 permit 172.16.0.0 0.0.255.255
ip nat pool ANY_POOL_NAME 209.165.200.229 209.165.200.230 netmask 255.255.255.252
ip nat inside source list 1 pool ANY_POOL_NAME
interface s0/0/0
ip nat outside
interface s0/0/1
ip nat inside
end