当前位置:网站首页>Nat address translation
Nat address translation
2022-07-07 18:38:00 【Chen chacha__】
Technical background
- legal IP Address resources are increasingly scarce
- Effectively hide internal hosts IP, It has a certain role in network security protection
NAT principle : change IP baotou 、 Make destination address 、 The source address or two addresses are replaced by different addresses in the header
NAT classification :
static state NAT: One to one address mapping
dynamic NAT: Pick from the address pool
NAT overload (PAT): Allow internal address mapping to an external address
static state NAT

Two routers are respectively configured with default routes , The whole network is connected
1.PC0 Use the public address to access the Internet server , stay R0 The upper configuration enables static address translation between internal local and external legal addresses
ip nat inside soure static 192.168.10.1 76.12.16.139 # The former is the internal address , Followed by the external address to be mapped
Enable on internal and external ports NAT
int e0/0/0
ip nat inside
int f0/1
ip nat outside
show ip nat translations
2. Will be inside server HTTP Services are mapped to the public network IP PC Through the public network IP Internal access server
ip nat inside source static tcp 192.168.20.1 80 76.12.16.140 80
int f0/0
ip nat in
show ip nat translations
dynamic NAT

dynamic NAT Configuration steps
1. To configure ACL, Intranet range for address translation
access-list 1 permit 192.168.10.0 0.0.0.255
int f0/0
ip access-group in
2. Configure the translated address pool
ip nat pool pool-1 76.12.16.139 76.12.16.141 netmask 255.255.255.248
3. Set up ACL Mapping relationship with address pool
ip nat inside source list 1 pool pool-1
4. Enable on internal and external ports NAT
int f0/0
ip nat inside
int f0/1
ip nat outside
show ip nat translation # Check out the NAT Address translation address

边栏推荐
- Simple configuration of single arm routing and layer 3 switching
- 上市十天就下线过万台,欧尚Z6产品实力备受点赞
- AI defeated mankind and designed a better economic mechanism
- [trusted computing] Lesson 10: TPM password resource management (II)
- golang 客户端服务端登录
- What skills can you master to be a "master tester" when doing software testing?
- 现在网上期货开户安全吗?国内有多少家正规的期货公司?
- 『HarmonyOS』DevEco的下载安装与开发环境搭建
- Chapter 1 Introduction to CRM core business
- Hash, bitmap and bloom filter for mass data De duplication
猜你喜欢
![[trusted computing] Lesson 12: TPM authorization and conversation](/img/ce/619141fa0387ba42528f93b1781038.png)
[trusted computing] Lesson 12: TPM authorization and conversation

Download, installation and development environment construction of "harmonyos" deveco

socket编程之常用api介绍与socket、select、poll、epoll高并发服务器模型代码实现

Tips of the week 136: unordered containers

How to clean when win11 C disk is full? Win11 method of cleaning C disk

持续测试(CT)实战经验分享

手撕Nacos源码(先撕客户端源码)

回归测试的分类
![[tpm2.0 principle and Application guide] Chapter 5, 7 and 8](/img/38/93fd986916193803bbd90805f832fa.png)
[tpm2.0 principle and Application guide] Chapter 5, 7 and 8

2021年全国平均工资出炉,你达标了吗?
随机推荐
Redis的发布与订阅
Sports Federation: resume offline sports events in a safe and orderly manner, and strive to do everything possible for domestic events
String type, constant type and container type of go language
嵌入式C语言程序调试和宏使用的技巧
2022年推荐免费在线接收短信平台(国内、国外)
Ten thousand words nanny level long article -- offline installation guide for datahub of LinkedIn metadata management platform
[principle and technology of network attack and Defense] Chapter 7: password attack technology Chapter 8: network monitoring technology
保证接口数据安全的10种方案
同消费互联网的较为短暂的产业链不同,产业互联网的产业链是相当漫长的
回归问题的评价指标和重要知识点总结
Skills of embedded C language program debugging and macro use
Tsinghua, Cambridge and UIC jointly launched the first Chinese fact verification data set: evidence-based, covering many fields such as medical society
Tear the Nacos source code by hand (tear the client source code first)
PHP面试题 foreach($arr as &$value)与foreach($arr as $value)的用法
Tips for this week 131: special member functions and ` = Default`
[paddleseg source code reading] add boundary IOU calculation in paddleseg validation (1) -- val.py file details tips
五种网络IO模型
Backup Alibaba cloud instance OSS browser
数学分析_笔记_第11章:Fourier级数
磁盘存储链式的B树与B+树