NAT 강사 김성훈.

Slides:



Advertisements
Similar presentations
/30 Host Name : R1 Serial 0/0/0.1.2 Host Name : R2 Router Lab 3 : 2 - Routers Connection DTE DCE.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Basic IP Traffic Management with Access Lists
© 2002, Cisco Systems, Inc. All rights reserved..
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Scaling the Network with NAT and PAT.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
M. Dahshan - TCOM52721 TCOM 5272 Telecomm Lab Dr. Mostafa Dahshan OU-Tulsa 4W 2 nd floor
CCNA 2 v3.1 Module 11.
Sybex CCNA Chapter 11: Network Address Translation Instructor & Todd Lammle.
© 2003, Cisco Systems, Inc. All rights reserved. ICND v2.1—4-1 © 2003, Cisco Systems, Inc. All rights reserved. 1 Scaling the Network with NAT and PAT.
Lecture Week 7 Implementing IP Addressing Services.
Sybex CCENT Chapter 13: Network Address Translation Instructor & Todd Lammle.
CISCO PIX FIREWALL Configuration for DCSL Tuan Anh Nguyen CSCI 5234 University of Houston Clear Lake Fall Semester, 2005.
ICND2 – OSPF – Mark Lab Reset for lab 4 Configure 2 loopback interfaces on both routers –RTR1 – 10.X.X.2/32 and 10.X.X.3/32 (area X) –RTR2 – 10.X.X.4/32.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Scaling the Network with NAT and PAT.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Address Translation
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Day 4 Security ( ACL ) , Standard Access Lists , Extended Access Lists, Named ACLs Network Address Translation (NAT), Static NAT , Dynamic NAT , PAT (Overloading)
NAT (Network Address Translation) Natting means "Translation of private IP address into public IP address ". In order to communicate with internet we must.
CCNA Guide to Cisco Networking Chapter 8: Routing Protocols and Network Address Translation.
© 2002, Cisco Systems, Inc. All rights reserved..
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Introduction to Network Address Translation
/24 Host Name :R1 Model : 1841 WIC-1T Serial 0/0/0 Basic Configuration.
Access Control Lists (ACLs)
Network Address Translations Project no. : 12 Prof. Edmund Gean Presented by DhruvaPatel( ) Sweta Patel( ) Rushika Patel ( ) Guided.
S6C11 - NAT Network Security Translation. NAT Described Globally unique ONLY in terms of public internet –Translates private addresses into publicly usable.
1 What Are Access Lists? –Standard –Checks Source address –Generally permits or denies entire protocol suite –Extended –Checks Source and Destination address.
Ch. 5 – Access Control Lists. Part 1: ACL Fundamentals.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Instructor & Todd Lammle
Firewalls and proxies Unit objectives
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 1 Scaling IP Addresses.
CCNA 4 v3.1 Module 1 Scaling IP Addresses
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
Configuring NAT and PAT Chapter 18 powered by DJ 1.
1 © 2004, Cisco Systems, Inc. All rights reserved. Scaling IP Addresses Network Address Translation(NAT)
Scaling Networks with Network Address Translation Scaling Networks with Network Address Translation Solutions for IPv4 Security and Scalability ECPI College.
NAT & PAT Network Address Translation Port Address Translation.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
In 60 Days – ICND2 Configuring Access Lists Standard IP ACLs Source network or Source host IP Source: Destination: Port 80.
N ETWORK S ECURITY Network Address Translation. C ONTENTS What is NAT NAT Terminology How NAT works NAT translation Dynamic, static and overloading Advantages.
NAT/PAT by S K SATAPATHY
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Lab6 Configure Dynamic route.  RIP(Routing information protocol)  IGRP(interior gate way routing protocol)
1 Pertemuan 14 Scaling Networks with NAT and PAT.
Ch. 5 – Access Control Lists. Part 1: ACL Fundamentals.
1 Pertemuan 25 Access Control Lists (ACLs). Discussion Topics Standard ACLs Extended ACLs Named ACLs Placing ACLs Firewalls Restricting virtual terminal.
CCNA4-1 Chapter 7-1 IP Addressing Services Scaling Networks With Network Address Translation (NAT)
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
CCNA4-1 Chapter 7-1 NAT Chapter 11 Routing and Switching (CCNA2)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Network Address Translation (NAT)
© 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing Services Part I
Chapter 13 Network Address Translation
Instructor Materials Chapter 9: NAT for IPv4
NAT / PAT.
Routing and Switching Essentials v6.0
CIS 82 Routing Protocols and Concepts Chapter 11 NAT
Routing and Switching Essentials v6.0
NAT / PAT.
Instructor Materials Chapter 9: NAT for IPv4
Prepared by :Adeel Ahmad
Sybex CCNA Chapter 11: Network Address Translation.
Presentation transcript:

NAT 강사 김성훈

Scaling the Network with NAT and PAT Cisco 라우터에서의 NAT의 특징 및 작동법을 안다. NAT를 구성할 수 있다. NAT와 PAT의 구성을 검증할 수 있다.

Inside Outside Internet Network Address Translation NAT table 10.1.1.2 * Introducing NAT and PAT Network Address Translation Inside Outside SA 10.0.0.1 SA 171.69.58.80 10.1.1.2 Internet NAT table 10.1.1.1 Inside Local IP Inside Global Address IP Address 10.1.1.2 171.69.58.80 10.1.1.1 171.69.58.81 NAT의 사용 Global Unique IP address를 쓰지 않고 호스트들을 Internet 에 연결하는 경우에 사용될 수 있다. 새로운 ISP에 연결시 기존의 IP Address를 바꾸지 않기 위해서 사용될 수 있다. 중복되는 Address를 갖는 두 intranet을 연결 시에 사용될 수 있다.

Port Address Translation My Network Internet SA 10.6.1.2:2031 PAT SA 171.69.68.10.2031 10.6.1.2 Internet/Intranet SA 10.6.1.6:1506 SA 171.69.68.10.1506 10.6.1.6 NAT table Inside Local IP Inside Global Address IP Address 10.6.1.2:2031 171.69.68.10:2031 10.6.1.6:1506 171.69.68.10:1506 PAT의 사용 Private Network상의 호스트들이 Public Network상에서 통신할 수 있게 한다. 공인 IP address를 절약한다. 10.6.1.0 네트워크의 Local Node들이 외부 네트워크에 Access하는 경우, Source Address는 라우터에서 171.69.68.10으로 Translation 된다.

Translating Inside Source Addresses Outside 5 3 4 DA 1.1.1.1 SA 2.2.2.2 DA 2.2.2.2 1.1.1.2 Internet SA 1.1.1.1 Host B 9.6.7.3 1 Inside Interface Outside Interface 1.1.1.1 2 NAT table Inside Local IP Inside Global Address IP Address 1.1.1.2 2.2.2.3 1.1.1.1 2.2.2.2

Configuring Static Translation Router(config)#ip nat inside source static local-ip global-ip inside local address를 inside global address로 Mapping한다. Router(config-if)#ip nat inside inside network에 연결된 Interface이다. Router(config-if)#ip nat outside outside에 network에 연결된 Interface이다.

Enabling Static NAT Address Mapping Example 10.1.1.2 Internet SA 5 10.1.1.1 192.1.168.1.2 s0 e0 200.168.1.2 Interface s0 Ip address 192.168.1.1 255.255.255.0 Ip nat outside ! Interface e0 Ip add 10.1.1.1 255.255.255.0 Ip nat inside Ip nat inside source static 10.1.1.2 200.168.1.2

Configuring Dynamic Translation Router(config)#ip nat pool name start-ip end-ip {netmask netmask | prefix-length prefix-length} 할당할 global address의 pool을 지정한다. Router(config)#access-list access-list-number permit source [source-wildcard} 변환할 inside local address들의 standard IP access-list를 정의 한다. Router(config)#ip nat inside source list aceess-list-number pool name 전단계에서 정의한 access-list를 이용하여 Dynamic Source Translation을 설정한다.

Dynamic Address Translation Example Ip nat pool Test_lab 188.69.233.1 188.69.233.254 netmask 255.255.255.0 Ip nat inside source list 1 pool Test_lab ! Interface serial 0 ip address 171.69.232.182 255.255.255.240 ip nat outside Interface ethernet 0 ip address 192.168.1.94 255.255.255.0 ip nat inside Access-list 1 permit 192.168.1.0 0.0.0.255 Host C 10.1.1.1 Host A 192.168.1.100 e0 s0 192.168.1.94 171.69.232.182 Host B 192.168.1.101 Host D 172.16.1.1

Overloading an Inside Global Address Host B 9.6.7.3 5 3 4 DA 1.1.1.1 SA 2.2.2.2 DA 2.2.2.2 1.1.1.2 Internet Internet SA 1.1.1.1 4 1 1.1.1.1 DA 2.2.2.2 Host B 6.5.4.7 2 NAT table Inside Local IP Inside Global IP Outside Global Protocol Address: Port Address: Port IP Address: Port TCP 1.1.1.2:1723 2.2.2.2:1723 6.5.4.7:23 TCP 1.1.1.1:1024 2.2.2.2:1024 9.6.7.3:23

Configuring Overloading Router(config)#access-list access-list-number permit source source-wildcard 변환할 inside local address들의 standard IP access-list를 정의 한다. Router(config)#ip nat inside source list access-list-number interface interface overload 전단계에서 정의한 access-list를 이용하여 Dynamic Source Translation을 설정한다.

Overloading an Inside Global Address Example 192.168.3.1 172.17.38.1 e0 s0 5 e1 192.168.3.7 192.168.4.1 hostname NAT_Router ! interface ethernet 0 ip address 192.168.3.1 255.255.255.0 ip nat inside interface ethernet 1 ip address 192.168.4.1 255.255.255.0 interface serial 0 description To ISP ip address 172.17.38.1 255.255.255.0 ip nat outside ip nat inside source list 1 interface serial 0 overload ip route 0.0.0.0 0.0.0.0 serial 0 access-list 1 permit 192.168.3.0 0.0.0.255 access-list 1 permit 192.168.4.0 0.0.0.255 192.168.4.12

Clearing the NAT Translation Table * Verifying the NAT and PAT Configuration Clearing the NAT Translation Table Router#clear ip nat translation * Clear all dynamic address translation entries Router#clear ip nat translation inside global-ip local-ip [outside local-ip global-ip] Clears a simple dynamic translation entry containing an inside translation, or both inside and outside translation Router#clear ip nat translation outside local-ip global-ip clears a simple dynamic translation entry containing an outside translation Router#clear ip nat translation protocol inside global-ip global-port local-ip local-port [outside local-ip local-port global-ip global-port] Clears an extended dynamic translation entry

Displaying Information with show Commands Router#show ip nat translations Displays active translations Router# show ip nat translations Pro Inside global Inside local outside local outside global --- 172.16.131.1 10.10.10.1 --- --- Router#show ip nat statistics Displays translation statistics Router# show ip nat statistics Total active translations: 1 (1 static, 0 dynamic, 0 extendes) Outside interfaces: Ethernet0, Serial2.7 Inside interfaces: Ethernet1 Hits: 5 Misses: 0 -

Sample Problem: Cannot Ping Remote Host int e 0 ip address 192.168.2.1 255.255.255.0 ! int s 0 ip address 10.1.1.2 255.255.255.0 router rip network 10.0.0.0 network 192.168.2.0 Host A 192.168.1.2 Host B 192.168.2.2 192.168.2.1/24 s0 e0 s0 e0 192.168.1.1/24 10.1.1.1/24 10.1.1.2/24 ip nat pool test 172.16.17.20 172.16.17.30 ip nat inside source list 1 pool test ! int s0 ip address 10.1.1.1 255.255.255.0 ip nat inside int e0 ip address 192.168.1.1 255.255.255.0 ip nat outside router rip network 10.0.0.0 network 192.168.1.0 access-list 1 permit 192.168.1.0 0.0.0.255

Solution: New Configuration int e 0 ip address 192.168.2.1 255.255.255.0 ! int s 0 ip address 10.1.1.2 255.255.255.0 router rip network 10.0.0.0 network 192.168.2.0 Host A 192.168.1.2 Host B 192.168.2.2 192.168.2.1/24 s0 e0 s0 e0 192.168.1.1/24 10.1.1.1/24 10.1.1.2/24 ip nat pool test 172.16.17.20 172.16.17.30 ip nat inside source list 1 pool test ! int s0 ip address 10.1.1.1 255.255.255.0 ip nat outside int e0 ip address 192.168.1.1 255.255.255.0 ip nat inside int loopback 0 ip address 172.16.17.1 255.255.255.0 router rip network 10.0.0.0 network 172.16.0.0 access-list 1 permit 192.168.1.0 0.0.0.255

Using the debug ip nat Command * Troubleshooting the NAT and PAT Configuration Using the debug ip nat Command Router# debug ip nat NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [0] NAT: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [0] NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [1] NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [2] NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [3] NAT*: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [1] NAT: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [1] NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [4] NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [5] NAT: s=10.1.1.1->192.168.2.1, d=172.16.2.2 [6] NAT*: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [2] inside-to-outside address translation reply packet의 NAT

Translation Not Installed in the Translation Table? Configuration이 제대로 되었는가? NAT 명령을 참조하는 엑세스 리스트가 모든 필요한 네트워크들을 허가(permit) 하였는가? NAT pool에 충분한 주소들이 있는가? 라우터 인터페이스에 정확한 NAT inside 또는 NAT outside를 지정 하였는가?

LAB Test (1) Standard IP Access List LAB 192.168.1.2 E0:10.1.1.1 E0:192.168.1.1 S0:172.16.1.2 S0:172.16.1.1 Router_A Router_B 10.1.1.2 Router_A(config)# access-list 1 deny 192.168.1.0 0.0.0.255 Router_A(config)# access-list 1 permit any Router_A(config)# interface ethernet 0 Router_A(config-if)#ip access-group 1 out Router_A(config-if)# exit Router_A# sh running-configuration Router_A# sh access-lists 1 Router_A# ping 172.16.1.2 Router_A# ping 192.168.1.2 Router_B(config)#access-list 10 deny 10.0.0.0 0.255.255.255 Router_B(config)#access-list 10 permit any Router_B(config)#interface ethernet 0 Router_B(config-if)#ip access-group 10 out Router_B(config-if)#exit Router_B#sh running-configuration Router_B#sh access-lists 10 Router_B#ping 10.1.1.2 Router_B#ping 172.16.1.1

LAB Test (2) Extended IP Access List LAB (1) 192.168.1.2 E0:10.1.1.1 E0:192.168.1.1 S0:172.16.1.2 S0:172.16.1.1 Router_A Router_B 10.1.1.2 Router_A(config)# access-list 101 deny tcp 192.168.1.0 0.0.0.255 10.1.1.0 0.0.0.255 eq 21 : FTP 10.1.1.0 0.0.0.255 eq 20 : FTP data Router_A(config)# access-list 101 permit ip any any Router_A(config)# interface ethernet 0 Router_A(config-if)# ip access-group 101 out Router_A(config-if)# exit Router_A# sh running-configuration Router_A# sh access-lists 101 Router_A#

LAB Test (2) Extended IP Access List LAB (2) 192.168.1.2 E0:10.1.1.1 E0:192.168.1.1 S0:172.16.1.2 S0:172.16.1.1 Router_A Router_B 10.1.1.2 Router_B(config)# access-list 101 deny tcp 10.1.1.0 0.0.0.255 192.168.1.0 0.0.0.255 eq 21 : FTP 192.168.1.0 0.0.0.255 eq 20 : FTP data Router_B(config)# access-list 101 permit ip any any Router_B(config)# interface ethernet 0 Router_B(config-if)# ip access-group 101 out Router_B(config-if)# exit Router_B# sh running-configuration Router_B# sh access-lists 101 Router_B#

LAB Test (3) Vty Access LAB 192.168.1.2 E0:10.1.1.1 E0:192.168.1.1 S0:172.16.1.2 S0:172.16.1.1 Router_A Router_B 10.1.1.2 Router(config)# access-list 12 deny 192.168.1.0 0.0.0.255 Router(config)# access-list 12 permit any Router(config)# line vty 0 4 Router(config-line)# access-class 12 in Router(config-line)# exit Router# sh running-configuration Router# sh access-lists 12 Router# telnet 192.168.1.1--PC에서 telnet 실행 Router# ping 192.168.1.1 Router(config)# access-list 22 deny 10.1.1.0 0.0.0.255 Router(config)# access-list 22 permit any Router(config)# line vty 0 4 Router(config-line)# access-class 22 in Router(config-line)# exit Router# sh running-configuration Router# sh access-lists 22 Router# telnet 172.16.1.1--PC에서 telnet 실행 Router# ping 172.16.1.1