6.5.6 Packet Tracer – Configure Dynamic NAT Answers


Last Updated on February 23, 2021 by InfraExam

6.5.6 Packet Tracer – Configure Dynamic NAT Answers

Packet Tracer – Configure Dynamic NAT (Answers Version)

Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.


Part 1: Configure Dynamic NAT

Part 2: Verify NAT Implementation


Part 1:  Configure Dynamic NAT

Step 1:  Configure traffic that will be permitted.

Open configuration window

On R2, configure one statement for ACL 1 to permit any address belonging to the network.

R2(config)# access-list 1 permit

Step 2:  Configure a pool of address for NAT.

Configure R2 with a NAT pool that uses two addresses in the address space.

R2(config)# ip nat pool ANY_POOL_NAME netmask

Notice in the topology there are 3 network addresses that would be translated based on the ACL created.


What will happen if more than 2 devices attempt to access the internet?

Type your answer here.

The additional devices would be denied access until one of the previous translations timed out freeing up an address to use.

Step 3:  Associate ACL 1 with the NAT pool.

Enter the command that associates ACL 1 with the NAT pool that you just created.

R2(config)# ip nat inside source list 1 pool ANY_POOL_NAME

Step 4:  Configure the NAT interfaces.

Configure R2 interfaces with the appropriate inside and outside NAT commands.

R2(config)# interface s0/0/0

R2(config-if)# ip nat outside

R2(config-if)# interface s0/0/1

R2(config-if)# ip nat inside

Close configuration window

Part 2:  Verify NAT Implementation

Step 1:  Access services across the internet.

From the web browser of L1, PC1, or PC2, access the web page for Server1.

Step 2:  View NAT translations.

View the NAT translations on R2. Identify the internal source address of the PC and the translated address from the NAT pool in the command output.

Open configuration window

R2# show ip nat translations

Close configuration window

End of document

Answer script

Router R2


configure terminal

access-list 1 permit

ip nat pool ANY_POOL_NAME netmask

ip nat inside source list 1 pool ANY_POOL_NAME

interface s0/0/0

 ip nat outside

 interface s0/0/1

 ip nat inside


0 0 votes
Article Rating
Notify of
Inline Feedbacks
View all comments