0% found this document useful (0 votes)
57 views

What Is NAT?

NAT (Network Address Translation) allows private IP addresses to access the public internet by translating private IP addresses to public IP addresses. There are three types of NAT: static NAT maps one private IP to a public IP; dynamic NAT maps private IPs to a pool of public IPs; and port address translation uses one public IP and unique ports for all internal private IPs. Routers and firewalls perform NAT to enable private networks to access public networks while hiding private IP addresses.

Uploaded by

manjit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

What Is NAT?

NAT (Network Address Translation) allows private IP addresses to access the public internet by translating private IP addresses to public IP addresses. There are three types of NAT: static NAT maps one private IP to a public IP; dynamic NAT maps private IPs to a pool of public IPs; and port address translation uses one public IP and unique ports for all internal private IPs. Routers and firewalls perform NAT to enable private networks to access public networks while hiding private IP addresses.

Uploaded by

manjit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

What is NAT?

NAT (Network Address Translation) is a process of changing the source and destination IP addresses and ports. Address translation
reduces the need for IPv4 public addresses and hides private network address ranges. This process is usually done by routers or firewalls.

An example will help you understand the concept:

Host A request a web page from an Internet server. Because Host A uses private IP addressing, the source address of the request has to be
changed by the router because private IP addresses are not routable on the Internet. Router R1 receives the request, changes the source IP
address to its public IP address and sends the packet to server S1. Server S1 receives the packet and replies to router R1. Router R1
receives the packet, changes the destination IP addresses to the private IP address of Host A and sends the packet to Host A.

There are three types of address translation:

1. Static NAT – translates one private IP address to a public one. The public IP address is always the same.
2. Dynamic NAT – private IP addresses are mapped to the pool of public IP addresses.
3. Port Address Translation (PAT) – one public IP address is used for all interna
Static NAT
With static NAT, routers or firewalls translate one private IP address to a single public IP address. Each private IP address is mapped to a
single public IP address. Static NAT is not often used because it requires one public IP address for each private IP address.

To configure static NAT, three steps are required:

1. configure private/public IP address mapping by using the ip nat inside source static PRIVATE_IP PUBLIC_IP command
2. configure the router’s inside interface using the ip nat inside command
3. configure the router’s outside interface using the ip nat outside command

Here is an example.

Computer A requests a web resource from S1. Computer A uses its private IP address when sending the request to router R1. Router R1
receives the request, changes the private IP address to the public one and sends the request to S1. S1 responds to R1. R1 receives the
response, looks up in its NAT  table and changes the destination IP address to the private IP address of Computer A.

In the example above, we need to configure static NAT. To do that, the following commands are required on R1:

Using the commands above, we have configured a static mapping between Computer A’s private IP address of 10.0.0.2 and router’s R1
public IP address of 59.50.50.1. To check NAT, you can use the show ip nat translations command:
Port Address Translation (PAT) configuration
With Port Address Translation (PAT), a single public IP address is used for all internal private IP addresses, but a different port is assigned
to each private IP address. This type of NAT is also known as NAT Overload and is the typical form of NAT used in today’s networks. It is
even supported by most consumer-grade routers.

PAT allows you to support many hosts with only few public IP addresses. It works by creating dynamic NAT mapping, in which a global
(public) IP address and a unique port number are selected. The router keeps a NAT table entry for every unique combination of the private
IP address and port, with translation to the global address and a unique port number.

We will use the following example network to explain the benefits of using PAT:

As you can see in the picture above, PAT uses unique source port numbers on the inside global (public) IP address to distinguish between
translations. For example, if the host with the IP address of 10.0.0.101 wants to access the server S1 on the Internet, the host’s private IP
address will be translated by R1 to 155.4.12.1:1056 and the request will be sent to S1. S1 will respond to 155.4.12.1:1056. R1 will receive
that response, look up in its NAT translation table, and forward the request to the host.

To configure PAT, the following commands are required:

 configure the router’s inside interface using the ip nat inside command.


 configure the router’s outside interface using the ip nat outside command.
 configure an access list that includes a list of the inside source addresses that should be translated.
 enable PAT with the ip nat inside source list ACL_NUMBER interface TYPE overload global configuration command.

Here is how we would configure PAT for the network picture above.
First, we will define the outside and inside interfaces on R1:
R1(config)#int Gi0/0

R1(config-if)#ip nat inside

R1(config-if)#int Gi0/1

R1(config-if)#ip nat outside

Next, we will define an access list that will include all private IP addresses we would like to translate:
R1(config-if)#access-list 1 permit 10.0.0.0 0.0.0.255

The access list defined above includes all IP addresses from the 10.0.0.0 – 10.0.0.255 range.

Now we need to enable NAT and refer to the ACL created in the previous step and to the interface whose IP address will be used for
translations:
R1(config)#ip nat inside source list 1 interface Gi0/1 overload

To verify the NAT translations, we can use the show ip nat translations command after hosts request a web resource from S1:
R1#show ip nat translations

Pro Inside global Inside local Outside local Outside global

tcp 155.4.12.1:1024 10.0.0.100:1025 155.4.12.5:80 155.4.12.5:80

tcp 155.4.12.1:1025 10.0.0.101:1025 155.4.12.5:80 155.4.12.5:80

tcp 155.4.12.1:1026 10.0.0.102:1025 155.4.12.5:80 155.4.12.5:80

You might also like