Re: sanity check - NAT [7:410]

2001-04-12 Thread Kirk Bollinger

My .02 cents

I don't think you need the ip nat outside source static - just the inside
static is all that is required.

If overloading I *believe* that it will overload on one IP before using
up the pool so - why not just use a pool of one. Also, best to not let the
static be within the pool range.

If the serial is within the pool range great --  overload on the
interface's IP and the router will arp for the static IP. If not, the
outside device(s) will need a route back to the NAT block.

Hope this Helps.

-kirk






On Thu, 12 Apr 2001, David Chandler wrote:

> Seem to be missing a couple of things.
> 
> 1.  The serial interface is not running IP.
> 2.  Once you NAT the packets and send them on to the next-hop router;
> how does the next-hop router & network know to return the packets
to
> this
> router?
> 
> 
> Assuming that you are using static routes, and the portion of the config
> with the serial
> IP was left out; it should work fine.
> 
> 
> DaveC
> 
> 
> Irwin Lazar wrote:
> 
> > I need to turn on NAT in a 2500 running Firewall IOS 11.3.  It's been a
> year
> > since I touched a router, so I wanted to run the config by the group for
a
> > sanity check. (addresses have been changed to protect the innocent)
> >
> > Here's what I'm trying to do:
> > NAT pool (legal addresses) 203.181.70.65 to 203.181.70.94 (slash /27)
> >
> > Hosts will get addresses via DHCP in the 192.168.1.0 /24 range
> >
> > The Inside address 192.168.1.11 should statically translate to
> 203.181.70.91
> > (that is, hosts on the Internet that try to connect to 203.181.70.65
should
> > hit the NAT box, where they are redirected to 192.168.1.11)
> >
> > Here's my config:
> > interface e0
> > ip address 192.168.1.1 255.255.255.0
> > ip nat inside
> > ! defines e0 with IP address and inside NAT interface
> >
> > interface s0
> > ip nat outside
> >
> > ip nat pool overld 203.181.70.65 206.181.70.90 prefix 27
> > ip nat inside source list 7 pool overld overload
> > access-list 7 permit 192.168.1.0 0.0.0.255
> >
> > ip nat outside source static 192.16.1.11 203.181.70.91
> > ip nat inside source static 203.181.70.91 192.16.1.11
> >
> > Before I slap this on my router, will it work as intended?
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=461&t=410
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: sanity check - NAT [7:410]

2001-04-12 Thread David Chandler

Seem to be missing a couple of things.

1.  The serial interface is not running IP.
2.  Once you NAT the packets and send them on to the next-hop router;
how does the next-hop router & network know to return the packets to
this
router?


Assuming that you are using static routes, and the portion of the config
with the serial
IP was left out; it should work fine.


DaveC


Irwin Lazar wrote:

> I need to turn on NAT in a 2500 running Firewall IOS 11.3.  It's been a
year
> since I touched a router, so I wanted to run the config by the group for a
> sanity check. (addresses have been changed to protect the innocent)
>
> Here's what I'm trying to do:
> NAT pool (legal addresses) 203.181.70.65 to 203.181.70.94 (slash /27)
>
> Hosts will get addresses via DHCP in the 192.168.1.0 /24 range
>
> The Inside address 192.168.1.11 should statically translate to
203.181.70.91
> (that is, hosts on the Internet that try to connect to 203.181.70.65 should
> hit the NAT box, where they are redirected to 192.168.1.11)
>
> Here's my config:
> interface e0
> ip address 192.168.1.1 255.255.255.0
> ip nat inside
> ! defines e0 with IP address and inside NAT interface
>
> interface s0
> ip nat outside
>
> ip nat pool overld 203.181.70.65 206.181.70.90 prefix 27
> ip nat inside source list 7 pool overld overload
> access-list 7 permit 192.168.1.0 0.0.0.255
>
> ip nat outside source static 192.16.1.11 203.181.70.91
> ip nat inside source static 203.181.70.91 192.16.1.11
>
> Before I slap this on my router, will it work as intended?
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=425&t=410
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: sanity check - NAT [7:410]

2001-04-12 Thread Daniel Cotts

Me thinks that you have already been there.
I don't see an ip address on the S0 interface. Should it be 203.181.70.65 ?
Had to look up "ip nat outside source static". Cisco says " If you use the
ip nat inside command, these packets must originate from the inside. If you
use the ip nat outside command, these packets must originate on the
outside." Looks good.

For those new to the list, Irwin has been a past contributor to this list.
He has given presentations at Networld+Interop. His website www.itprc.com
should be one of the first places that you look if you have a networking
question.

> -Original Message-
> From: Irwin Lazar [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, April 12, 2001 5:00 PM
> To: [EMAIL PROTECTED]
> Subject: sanity check - NAT [7:410]
> 
> 
> I need to turn on NAT in a 2500 running Firewall IOS 11.3.  
> It's been a year
> since I touched a router, so I wanted to run the config by 
> the group for a
> sanity check. (addresses have been changed to protect the innocent)
> 
> Here's what I'm trying to do:
> NAT pool (legal addresses) 203.181.70.65 to 203.181.70.94 (slash /27)
> 
> Hosts will get addresses via DHCP in the 192.168.1.0 /24 range
> 
> The Inside address 192.168.1.11 should statically translate 
> to 203.181.70.91
> (that is, hosts on the Internet that try to connect to 
> 203.181.70.65 should
> hit the NAT box, where they are redirected to 192.168.1.11)
> 
> Here's my config:
> interface e0
> ip address 192.168.1.1 255.255.255.0
> ip nat inside
> ! defines e0 with IP address and inside NAT interface
> 
> interface s0
> ip nat outside
> 
> ip nat pool overld 203.181.70.65 206.181.70.90 prefix 27
> ip nat inside source list 7 pool overld overload
> access-list 7 permit 192.168.1.0 0.0.0.255
> 
> ip nat outside source static 192.16.1.11 203.181.70.91
> ip nat inside source static 203.181.70.91 192.16.1.11 
> 
> Before I slap this on my router, will it work as intended?
> FAQ, list archives, and subscription info: 
> http://www.groupstudy.com/list/cisco.html
> Report misconduct 
> and Nondisclosure violations to [EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=419&t=410
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]