Lab-17----- task=17.14
In this task I put route-map, access-list and NAT configuration on R9. I was able to see NAT translation for route map for fa0/0. It worked from Cat -3 for IP address 150.100.221.7 with natted address of s0/2/0 and I was able to ping 150.100.221.7, but other NAT configuration and route map did not worked as per DSG. Not sure what could be problem but I was never able to ping R1’s loop back interface or Vlan 150.100.12.1. Here is config details for R9 and other debug out put…. ---------------------------------------------------------------------------------------------------------------------------------------------- R9=== R9#sh run Building configuration... Current configuration : 2644 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname R9 ! boot-start-marker warm-reboot boot-end-marker ! logging message-counter syslog enable secret 5 $1$z5mW$66Jkln/9qUS4XwVkuEPON/ ! no aaa new-model memory-size iomem 10 ! dot11 syslog ip source-route ! ! ip cef ! ! no ip domain lookup ip domain name ipexpert.com no ipv6 cef ! multilink bundle-name authenticated ! voice-card 0 ! archive log config hidekeys ! ! interface Loopback0 ip address 200.0.0.9 255.255.255.255 ! interface FastEthernet0/0 ip address 100.100.250.9 255.255.255.0 ip nat inside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 ip address 150.100.91.9 255.255.255.0 ip nat inside ip virtual-reassembly duplex auto speed auto ! interface Serial0/2/0 bandwidth 128 ip address 150.100.69.9 255.255.255.0 ip verify unicast source reachable-via rx ip nat outside ip virtual-reassembly no fair-queue ! interface Serial0/2/1 bandwidth 128 ip address 150.100.96.9 255.255.255.0 ip verify unicast source reachable-via rx ! router ospf 1 log-adjacency-changes network 0.0.0.0 255.255.255.255 area 0 ! ip forward-protocol nd ip http server no ip http secure-server ! ! ip nat inside source route-map r2 interface Loopback0 overload ip nat inside source route-map r5 interface Serial0/2/0 overload ! access-list 101 permit ip 100.100.250.0 0.0.0.255 150.100.220.0 0.0.1.255 access-list 101 permit ip 150.100.91.0 0.0.0.255 150.100.220.0 0.0.1.255 access-list 101 permit ip 150.100.91.0 0.0.0.255 100.100.200.0 0.0.0.255 access-list 101 permit ip 150.100.91.0 0.0.0.255 150.100.81.0 0.0.0.255 access-list 101 permit ip 100.100.250.0 0.0.0.255 150.100.81.0 0.0.0.255 access-list 101 permit ip 100.100.250.0 0.0.0.255 100.100.200.0 0.0.0.255 access-list 102 permit ip 150.100.91.0 0.0.0.255 150.100.40.0 0.0.1.255 access-list 102 permit ip 100.100.250.0 0.0.0.255 150.100.40.0 0.0.1.255 access-list 102 permit ip 150.100.91.0 0.0.0.255 150.100.12.0 0.0.0.255 access-list 102 permit ip 100.100.250.0 0.0.0.255 150.100.12.0 0.0.0.255 access-list 102 permit ip 100.100.250.0 0.0.0.255 100.100.100.0 0.0.0.255 access-list 102 permit ip 150.100.91.0 0.0.0.255 100.100.100.0 0.0.0.255 ! ! ! ! route-map r2 permit 10 match ip address 102 ! route-map r5 permit 10 match ip address 101 ! ! ! control-plane! ! line con 0 exec-timeout 0 0 logging synchronous line aux 0 line vty 0 4 password 7 070C285F4D06 login transport input telnet ssh ! scheduler allocate 20000 1000 end R9# R9#ping 150.100.12.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 150.100.12.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 28/29/32 ms *When we try to ping from Cat-3 and Cat-4 ---debug output * * * >From cat -3 Cat3560-3(config)#do ping 150.100.221.7 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 150.100.221.7, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 16/16/17 ms Cat3560-3(config)# ================================================================ R9(config)# *Mar 16 22:34:15.639: NAT: map match r5 *Mar 16 22:34:15.639: mapping pointer available mapping:0 *Mar 16 22:34:15.639: NAT: [0] Allocated Port for 150.100.91.13 -> 150.100.69.9: wanted 13 got 13 *Mar 16 22:34:15.639: NAT*: i: icmp (150.100.91.13, 13) -> (150.100.221.7, 13) [65] *Mar 16 22:34:15.639: NAT*: i: icmp (150.100.91.13, 13) -> (150.100.221.7, 13) [65] *Mar 16 22:34:15.639: NAT*: s=150.100.91.13->150.100.69.9, d=150.100.221.7 [65] *Mar 16 22:34:15.655: NAT*: o: icmp (150.100.221.7, 13) -> (150.100.69.9, 13) [65] *Mar 16 22:34:15.655: NAT*: s=150.100.221.7, d=150.100.69.9->150.100.91.13 [65] *Mar 16 22:34:15.659: NAT*: i: icmp (150.100.91.13, 13) -> (150.100.221.7, 13) [66] *Mar 16 22:34:15.659: NAT*: s=150.100.91.13->150.100.69.9, d=150.100.221.7 [66] *Mar 16 22:34:15.671: NAT*: o: icmp (150.100.221.7, 13) -> (150.100.69.9, 13) [66] *Mar 16 22:34:15.671: NAT*: s=150.100.221.7, d=150.100.69.9->150.100.91.13 [66] *Mar 16 22:34:15.675: NAT*: i: icmp (150.100.91.13 R9(config)#, 13) -> (150.100.221.7, 13) [67] *Mar 16 22:34:15.675: NAT*: s=150.100.91.13->150.100.69.9, d=150.100.221.7 [67] *Mar 16 22:34:15.687: NAT*: o: icmp (150.100.221.7, 13) -> (150.100.69.9, 13) [67] *Mar 16 22:34:15.687: NAT*: s=150.100.221.7, d=150.100.69.9->150.100.91.13 [67] *Mar 16 22:34:15.691: NAT*: i: icmp (150.100.91.13, 13) -> (150.100.221.7, 13) [68] *Mar 16 22:34:15.695: NAT*: s=150.100.91.13->150.100.69.9, d=150.100.221.7 [68] *Mar 16 22:34:15.707: NAT*: o: icmp (150.100.221.7, 13) -> (150.100.69.9, 13) [68] *Mar 16 22:34:15.707: NAT*: s=150.100.221.7, d=150.100.69.9->150.100.91.13 [68] *Mar 16 22:34:15.711: NAT*: i: icmp (150.100.91.13, 13) -> (150.100.221.7, 13) [69] *Mar 16 22:34:15.711: NAT*: s=150.100.91.13->150.100.69.9, d=150.100.221.7 [69] *Mar 16 22:34:15.727: NAT*: o: icmp (150.100.221.7, 13) -> (150.100.69.9, 13) [69] *Mar 16 22:34:15.727: NAT*: s=150.100.221.7, d=150.100.69.9->150.100.91.13 [69] R9(config)# R9(config)#do sh ip nat tran Pro Inside global Inside local Outside local Outside global icmp 150.100.69.9:13 150.100.91.13:13 150.100.221.7:13 150.100.221.7:13 ========================================================================================== *from Cat ==4* * * *Cat3560-4#ping 100.100.250.9* * * *Type escape sequence to abort.* *Sending 5, 100-byte ICMP Echos to 100.100.250.9, timeout is 2 seconds:* *!!!!!* *Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/8 ms* *Cat3560-4#ping 150.100.12.1* * * *Type escape sequence to abort.* *Sending 5, 100-byte ICMP Echos to 150.100.12.1, timeout is 2 seconds:* *.....* *Success rate is 0 percent (0/5)* Cat3560-4#ping 200.0.0.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 200.0.0.1, timeout is 2 seconds: ..... Success rate is 0 percent (0/5) ================================== *R9#debug ip nat detailed* *IP NAT detailed debugging is on* *R9#* ================= Config for Cat3560-4# Cat3560-4# ! interface FastEthernet0/9 description R9 Fa0/1 switchport access vlan 2300 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 switchport mode dynamic desirable ! interface FastEthernet0/20 switchport mode dynamic desirable ! interface FastEthernet0/21 switchport mode dynamic desirable ! interface FastEthernet0/22 switchport mode dynamic desirable ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address ! interface Vlan300 ip address 100.100.250.14 255.255.255.0 ! ip default-gateway 100.100.250.9 ip classless ip http server ip http secure-server
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
