Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Dynamic NAT allows routers to dynamically map private IP addresses to public IP addresses from a pool. The router chooses an available public IP address for outgoing connections and tracks the mapping in its NAT table. When responses come back, it reverses the mapping to deliver packets to the original private IP address. Configuring dynamic NAT involves defining the internal and external interfaces, an ACL for matched addresses, a global address pool, and enabling NAT with the ACL and pool.
This document discusses Network Address Translation (NAT) and Port Address Translation (PAT). It defines key NAT terms and private IP address ranges. It then describes the main features of NAT and PAT, including static and dynamic NAT mappings and how PAT uses port numbers to map multiple private IPs to a single public IP. The document provides examples for configuring static NAT, dynamic NAT, and PAT. It also discusses troubleshooting NAT and changing dynamic NAT configurations.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
STP prevents loops by electing a single root bridge and blocking redundant links. It uses BPDUs containing bridge IDs and path costs to elect the root bridge with the lowest bridge ID. The switch with bridge ID 32768.0001.964E.7EBB is elected as the root bridge based on having the lowest bridge ID of the switches shown.
Dynamic NAT allows routers to dynamically map private IP addresses to public IP addresses from a pool. The router chooses an available public IP address for outgoing connections and tracks the mapping in its NAT table. When responses come back, it reverses the mapping to deliver packets to the original private IP address. Configuring dynamic NAT involves defining the internal and external interfaces, an ACL for matched addresses, a global address pool, and enabling NAT with the ACL and pool.
This document discusses Network Address Translation (NAT) and Port Address Translation (PAT). It defines key NAT terms and private IP address ranges. It then describes the main features of NAT and PAT, including static and dynamic NAT mappings and how PAT uses port numbers to map multiple private IPs to a single public IP. The document provides examples for configuring static NAT, dynamic NAT, and PAT. It also discusses troubleshooting NAT and changing dynamic NAT configurations.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
MPLS enables packets to be forwarded based on labels rather than IP addresses. PE routers add labels to incoming packets and remove labels from outgoing packets. P routers swap or pop labels to forward packets. MPLS with L3 VPN allows private networks in different locations to communicate securely over a shared infrastructure by associating routes with virtual routing instances (VRFs) and advertising them using BGP. An example configuration shows VRF and BGP configuration, along with commands to view MPLS label bindings and packet forwarding information.
STP prevents loops by electing a single root bridge and blocking redundant links. It uses BPDUs containing bridge IDs and path costs to elect the root bridge with the lowest bridge ID. The switch with bridge ID 32768.0001.964E.7EBB is elected as the root bridge based on having the lowest bridge ID of the switches shown.
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
This document discusses dynamic routing protocols and provides an overview of how they operate. It explains that dynamic routing protocols automatically share information about remote networks to determine the best path. The document compares static and dynamic routing, and outlines the basic process by which routers using dynamic routing protocols like RIP discover networks, exchange routing information, and update their routing tables. Objectives of the chapter are also listed, such as explaining dynamic routing operation and configuring RIP and OSPF protocols.
The document provides instructions and examples for configuring various routing protocols like RIP, IGRP, EIGRP, OSPF on Cisco routers and switches. It also includes commands for configuring basic device settings like IP addresses, passwords, VLANs, trunk ports and CDP. Examples are given for initial configurations of Cisco 1900 and 2950 switches.
This document provides a cheat sheet of commands for configuring Cisco switches using both IOS and CLI switches. It lists commands for setting the hostname and system name, passwords, remote access, CDP configuration, port descriptions, port speeds, duplex settings, static VLAN configuration, trunk line configuration, VTP configuration, port channel configuration, STP settings, enabling Port Fast and UplinkFast, and recovering router passwords. It also provides contact information for a Cisco networking equipment wholesaler.
IPv4 and IPv6 are the two main versions of Internet Protocol (IP) addresses currently in use. IPv4 addresses are 32-bit numbers expressed in dotted decimal notation, while IPv6 addresses are longer 128-bit hexadecimal strings. IP addresses are assigned to identify machines on a network and allow communication and transfer of data between devices.
This document discusses OSPF packet types used for communication between routers to discover network routes, add link state entries to maintain routing information using LSA sequence numbers which can be viewed using the show IP OSPF database command, and debugged in more detail using the debug ip OSPF packets command.
This document provides an introduction to IP addressing, including:
- A brief history of IP development and the OSI and TCP/IP models.
- An overview of IP address classes (A, B, C, D, E), how they are determined, and their characteristics like address ranges and network/host portions.
- Explanations of limitations of classful addressing, subnetting, and how classless or CIDR addressing helps address those limitations by allowing flexible prefix lengths.
- An example is given of how CIDR allows efficient allocation of addresses to networks of different sizes.
This document discusses configuring and troubleshooting single-area OSPF routing. It covers topics like:
- Configuring static and dynamic routing on distribution and core routers
- Configuring and verifying single-area OSPF
- Designated router election process for multiaccess networks
- Propagating default static routes in OSPF
- Securing OSPF with message digest 5 authentication
- Components of troubleshooting single-area OSPF like forming adjacencies and transitioning states
The document provides instructor materials for a chapter on IP addressing in CCNA Routing and Switching. It covers IPv4 and IPv6 network addresses, including binary and decimal conversion, address structures, types of IPv4 addresses such as unicast, broadcast and multicast, and public vs private IP addresses. It also describes how to verify network connectivity using ICMP ping and traceroute utilities.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF's message encapsulation, packet types, neighbor discovery process using Hello packets, link state database and shortest path first algorithm, metric and cost calculation, and mechanisms for handling multi-access networks like designated router election. The objectives are to describe OSPF configuration and troubleshooting.
The document discusses Virtual Trunking Protocol (VTP). It describes VTP as a Cisco proprietary protocol that exchanges VLAN information across trunk links, allowing network managers to distribute VLAN configurations to all switches in the same domain. The document outlines the key components of VTP, including domains, advertisements, and pruning. It also details the different VTP modes of server, client, and transparent and how they operate. The benefits of using VTP for VLAN management are presented, along with some common VTP configuration issues.
This document provides an overview of IP security (IPsec) and its applications. It discusses:
- The origins and goals of IPsec in providing authentication and encryption in IPv6.
- How IPsec can be used to encrypt data, secure router communications, and authenticate senders.
- Examples of IPsec applications like virtual private networks and remote access.
- The benefits of IPsec like its transparency to applications and ability to secure all network traffic.
- How IPsec services like authentication, integrity, confidentiality are provided using AH and ESP protocols.
- Key concepts of IPsec including security associations, security policy databases, and the processing of outbound and inbound packets.
- Specific protocols like ESP
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
This document contains a chapter from a Cisco CCNA Routing and Switching course on VLANs. It begins with objectives for sections on VLAN segmentation, implementations, and inter-VLAN routing. It then provides explanations and examples of VLAN definitions and benefits, types of VLANs including voice VLANs, VLAN trunks, controlling broadcast domains with VLANs, tagging Ethernet frames for VLAN identification, native VLANs, and configuring VLAN assignments, trunk links, and verifying and deleting VLAN information.
Open Shortest Path First (OSPF) is an interior gateway protocol that uses link state routing and the Dijkstra algorithm to calculate the shortest path to destinations within an autonomous system. It elects a Designated Router to generate network link advertisements and assist in database synchronization between routers. Routers run the Shortest Path First algorithm on their link state databases to determine the best routes and populate their routing tables.
The document discusses the Internet Protocol (IP) which is the cornerstone of the TCP/IP architecture and allows all computers on the Internet to communicate. There are two main versions of IP - IPv4, the currently used version, and IPv6 which is intended to replace IPv4 and includes improvements like longer addresses. IP addresses are 32-bit for IPv4 and 128-bit for IPv6. Strategies like private addressing and Classless Inter-Domain Routing (CIDR) help conserve the limited number of available IP addresses.
This document discusses static and dynamic routing. It begins by defining static routing as manually configured routes that cannot automatically react to network changes. Dynamic routing protocols allow routers to share network information and automatically find alternate paths if the primary path fails. The document then covers key concepts for dynamic routing, including autonomous systems, interior routing protocols used within an autonomous system, and exterior routing protocols used between autonomous systems. Metrics and algorithms used by routing protocols to determine the best path are also discussed.
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
This document chapter discusses routing concepts and initial router configuration. It covers configuring router interfaces, enabling IP connectivity on devices, and verifying connectivity between directly connected networks. The key topics include functions of routers in routing traffic between networks, building routing tables using static and dynamic methods, and show commands to view interface settings and connectivity.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
This document discusses dynamic routing protocols and provides an overview of how they operate. It explains that dynamic routing protocols automatically share information about remote networks to determine the best path. The document compares static and dynamic routing, and outlines the basic process by which routers using dynamic routing protocols like RIP discover networks, exchange routing information, and update their routing tables. Objectives of the chapter are also listed, such as explaining dynamic routing operation and configuring RIP and OSPF protocols.
The document provides instructions and examples for configuring various routing protocols like RIP, IGRP, EIGRP, OSPF on Cisco routers and switches. It also includes commands for configuring basic device settings like IP addresses, passwords, VLANs, trunk ports and CDP. Examples are given for initial configurations of Cisco 1900 and 2950 switches.
This document provides a cheat sheet of commands for configuring Cisco switches using both IOS and CLI switches. It lists commands for setting the hostname and system name, passwords, remote access, CDP configuration, port descriptions, port speeds, duplex settings, static VLAN configuration, trunk line configuration, VTP configuration, port channel configuration, STP settings, enabling Port Fast and UplinkFast, and recovering router passwords. It also provides contact information for a Cisco networking equipment wholesaler.
IPv4 and IPv6 are the two main versions of Internet Protocol (IP) addresses currently in use. IPv4 addresses are 32-bit numbers expressed in dotted decimal notation, while IPv6 addresses are longer 128-bit hexadecimal strings. IP addresses are assigned to identify machines on a network and allow communication and transfer of data between devices.
This document discusses OSPF packet types used for communication between routers to discover network routes, add link state entries to maintain routing information using LSA sequence numbers which can be viewed using the show IP OSPF database command, and debugged in more detail using the debug ip OSPF packets command.
This document provides an introduction to IP addressing, including:
- A brief history of IP development and the OSI and TCP/IP models.
- An overview of IP address classes (A, B, C, D, E), how they are determined, and their characteristics like address ranges and network/host portions.
- Explanations of limitations of classful addressing, subnetting, and how classless or CIDR addressing helps address those limitations by allowing flexible prefix lengths.
- An example is given of how CIDR allows efficient allocation of addresses to networks of different sizes.
This document discusses configuring and troubleshooting single-area OSPF routing. It covers topics like:
- Configuring static and dynamic routing on distribution and core routers
- Configuring and verifying single-area OSPF
- Designated router election process for multiaccess networks
- Propagating default static routes in OSPF
- Securing OSPF with message digest 5 authentication
- Components of troubleshooting single-area OSPF like forming adjacencies and transitioning states
The document provides instructor materials for a chapter on IP addressing in CCNA Routing and Switching. It covers IPv4 and IPv6 network addresses, including binary and decimal conversion, address structures, types of IPv4 addresses such as unicast, broadcast and multicast, and public vs private IP addresses. It also describes how to verify network connectivity using ICMP ping and traceroute utilities.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF's message encapsulation, packet types, neighbor discovery process using Hello packets, link state database and shortest path first algorithm, metric and cost calculation, and mechanisms for handling multi-access networks like designated router election. The objectives are to describe OSPF configuration and troubleshooting.
The document discusses Virtual Trunking Protocol (VTP). It describes VTP as a Cisco proprietary protocol that exchanges VLAN information across trunk links, allowing network managers to distribute VLAN configurations to all switches in the same domain. The document outlines the key components of VTP, including domains, advertisements, and pruning. It also details the different VTP modes of server, client, and transparent and how they operate. The benefits of using VTP for VLAN management are presented, along with some common VTP configuration issues.
This document provides an overview of IP security (IPsec) and its applications. It discusses:
- The origins and goals of IPsec in providing authentication and encryption in IPv6.
- How IPsec can be used to encrypt data, secure router communications, and authenticate senders.
- Examples of IPsec applications like virtual private networks and remote access.
- The benefits of IPsec like its transparency to applications and ability to secure all network traffic.
- How IPsec services like authentication, integrity, confidentiality are provided using AH and ESP protocols.
- Key concepts of IPsec including security associations, security policy databases, and the processing of outbound and inbound packets.
- Specific protocols like ESP
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
Subnetting of IPv4 ip address that help you to solve every type of ip address with any one of the class you want to subnet,and have a basic introduction of IPv6 ,and why, Ipv5 is not used.
This document contains a chapter from a Cisco CCNA Routing and Switching course on VLANs. It begins with objectives for sections on VLAN segmentation, implementations, and inter-VLAN routing. It then provides explanations and examples of VLAN definitions and benefits, types of VLANs including voice VLANs, VLAN trunks, controlling broadcast domains with VLANs, tagging Ethernet frames for VLAN identification, native VLANs, and configuring VLAN assignments, trunk links, and verifying and deleting VLAN information.
Open Shortest Path First (OSPF) is an interior gateway protocol that uses link state routing and the Dijkstra algorithm to calculate the shortest path to destinations within an autonomous system. It elects a Designated Router to generate network link advertisements and assist in database synchronization between routers. Routers run the Shortest Path First algorithm on their link state databases to determine the best routes and populate their routing tables.
The document discusses the Internet Protocol (IP) which is the cornerstone of the TCP/IP architecture and allows all computers on the Internet to communicate. There are two main versions of IP - IPv4, the currently used version, and IPv6 which is intended to replace IPv4 and includes improvements like longer addresses. IP addresses are 32-bit for IPv4 and 128-bit for IPv6. Strategies like private addressing and Classless Inter-Domain Routing (CIDR) help conserve the limited number of available IP addresses.
This document discusses static and dynamic routing. It begins by defining static routing as manually configured routes that cannot automatically react to network changes. Dynamic routing protocols allow routers to share network information and automatically find alternate paths if the primary path fails. The document then covers key concepts for dynamic routing, including autonomous systems, interior routing protocols used within an autonomous system, and exterior routing protocols used between autonomous systems. Metrics and algorithms used by routing protocols to determine the best path are also discussed.
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
This document chapter discusses routing concepts and initial router configuration. It covers configuring router interfaces, enabling IP connectivity on devices, and verifying connectivity between directly connected networks. The key topics include functions of routers in routing traffic between networks, building routing tables using static and dynamic methods, and show commands to view interface settings and connectivity.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Microsoft MCSA - Install active directory domain services (adds) roleHamed Moghaddam
This document provides instructions for installing the Active Directory Domain Services (ADDS) role on a Windows Server to promote it to an Active Directory domain controller. It describes launching Server Manager, selecting the Add Roles and Features option, choosing the ADDS role, and completing the installation process by pressing Install and Close. The role is added through the Server Manager to enable centralized management of users, resources, and group policies through Active Directory.
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Juniper JNCIA – Juniper RIP and OSPF Route ConfigurationHamed Moghaddam
The document describes configuring OSPF routing between routers R1, R2, and R3, and exporting OSPF routes into RIP to advertise them to router R4. R2 is configured with OSPF to neighbors R1 and R3, and with RIP to neighbor R4. The routing policy on R2 is updated to export OSPF routes into RIP. This allows R4 to now see the loopback routes of R1 and R3 in its routing table via RIP.
Cisco CCNA IP SLA with tracking configurationHamed Moghaddam
Cisco CCNA/CCNP Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
The document discusses how Network Address Translation (NAT) and Port Address Translation (PAT) can help solve the problem of limited IP addresses by allowing private IP addresses to be translated to public IP addresses, and describes how to configure various NAT and PAT functions on a Cisco router including static NAT, dynamic NAT, port overloading, and handling overlapping networks.
This document discusses configuring a Cisco router to act as a DHCP server. It describes the steps to create DHCP pools for two networks, 10.10.10.0/24 and 20.20.20.0/24, and configure the router's interfaces. It also explains the DHCP process and provides configuration snippets from the router to illustrate excluding addresses and verifying the configuration. The goal is to prepare readers for the Cisco CCNA certification exam.
Aula04 - configuração da topologia ppp - resolvidoCarlos Veiga
The document describes the configuration of routers R1, R2, R3 and the ISP router to set up a network topology. It includes configuring basic settings like hostname, passwords, and interfaces on each router. The interfaces are configured with IP addresses and protocols. Route tables are also configured to route traffic between the routers and networks. The configurations are saved.
NAT (Network Address Translation) allows private IP addresses to be translated to public IP addresses to allow access to the internet. There are three types of NAT: static NAT maps a single private IP to a single public IP; dynamic NAT maps multiple private IPs to multiple public IPs; and PAT (Port Address Translation) maps multiple private IPs to a single public IP by multiplexing client ports. The document provides configuration examples for static NAT, dynamic NAT, and PAT on Cisco routers to translate private to public IP addresses and allow internal hosts internet access.
NAT (Network Address Translation) allows private IP addresses to be translated to public IP addresses to allow access to the internet. There are three types of NAT: static NAT maps a single private IP to a single public IP; dynamic NAT maps multiple private IPs to multiple public IPs; and PAT (Port Address Translation) maps multiple private IPs to a single public IP by multiplexing ports. The document provides configuration examples for static NAT, dynamic NAT, and PAT on Cisco routers to translate private to public IP addresses and allow internal hosts to access the internet.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
The document describes the configuration of a multipoint Frame Relay network using Cisco routers and a Frame Relay switch. DLCI to port mappings are configured on the Frame Relay switch to connect the routers. Each router is configured with Frame Relay encapsulation and DLCI mappings to connect to the other routers over the Frame Relay network. The connectivity between routers is tested using ping commands.
CCNA: Connecting Networks SA Exam
Lab 13 CCNA: Connecting Networks
CSIS 430 – Weeks 1 - 4
Hands-On Skills Assessment
Topology
Complete the assessment in Packet Tracer and document and fill in the blanks. Submit this file and the pka file in Week 8 Lab 13, Points will not be given for incomplete Steps.
Assessment Objectives
Part 1: Initialize Devices (2 points, 5 minutes)
Part 2: Configure Device Basic Settings (8 points, 20 minutes)
Part 3: Configure PPP Connections (7 points, 20 minutes)
Part 4: Configure NAT (4 points, 15 minutes)
Part 5: Monitor the Network (6 points, 15 minutes)
Part 6: Configure Frame Relay (7 points, 20 minutes)
Part 7: Configure a GRE VPN Tunnel (6 points, 20 minutes)
Scenario
In this Skills Assessment (SA) you will create a small network. You must connect the network devices and configure those devices to support various WAN protocols. This will require that you reload the routers before starting your configuration of the next WAN protocol. The assessment has you save your basic device configurations to flash prior to implementing a WAN protocol to allow you to restore these basic configurations after each reload.
The first WAN protocol you will configure is Point-to-Point Protocol (PPP) with CHAP authentication. You will also configure Network Address Translation (NAT), and network monitoring protocols during this phase of the assessment. After your instructor has signed off on this phase, you will reload the routers and configure Frame Relay. After the Frame Relay part is complete, and has been signed off by your instructor, you will reload the routers and configure a GRE VPN tunnel. Network configurations and connectivity will be verified throughout the assessment by using common CLI commands.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term.
Console cable to configure the Cisco IOS devices via the console ports
Ethernet and Serial cables as shown in the topology
Initialize Devices
Total points: 2
Time: 5 minutes
Initialize and reload routers.
Erase the startup configurations and reload the devices.
Task
IOS Command
Points
Erase the startup-config file on all routers.
erase startup-config
(1 point)
Reload all routers.
reload
(1 point)
Points: __________ of 2
Configure Device Basic Settings
Total points: 8
Time: 20 minutes
Configure PCs.
Assign static IPv4 address information (IP address, subnet mask, default gateway) to the three PCs in the topology. Refer to the Topology diagram to obtain the IP address information.
Configuration Item or Task
Specification
Points
Configure static IPv4 address information on PC-A.
IP Address: 192.168.11.3
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.11.1
1
Configure static IPv4 address information on PC-B.
IP Address: 192.168.22.3
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.22.1
Configure static IPv4 address information on PC ...
This document provides instructions for renting access to a rack of Cisco routers and switches to gain hands-on experience configuring Cisco devices. It describes the rack rental service which provides remote access to a pod containing 5 Cisco routers, 2 Cisco switches, and an ISDN simulator for $10/day. The document lists the various Cisco technologies that can be configured including switching, routing protocols, and WAN protocols. It then provides step-by-step instructions for an OSPF lab to configure OSPF routing.
Detailed explanation of Basic router configurationsamreenghauri786
This document provides instructions on configuring basic settings on a Cisco router, including:
1) Configuring initial settings such as the device name, passwords, and banner.
2) Configuring two router interfaces including IP addresses, descriptions, and activating the interfaces.
3) Verifying the interface configurations using commands like show ip interface brief and show interfaces.
This document provides instructions on configuring a router on a stick topology. It describes configuring a switch port as a trunk, and then creating subinterfaces on the router's physical interface that correspond to each VLAN. It shows assigning IP addresses to the subinterfaces to act as the default gateway for each VLAN subnet. Finally, it describes configuring PCs with IP addresses in the correct subnets and default gateways, and confirms connectivity between the VLANs via ping tests through the router.
NETMAX TECHNOLOGIES provides network training, software training, and embedded systems support and consultancy. Courses include CCNA, CCNP, Red Hat Linux, Windows, C, C++, Java, .NET, and microcontroller training. It uses NAT to allow private networks to connect to the internet using a limited number of public IP addresses. Static NAT maps a private IP to a public IP in a 1:1 ratio. Dynamic NAT maps private IPs to public IPs from a pool. Overloading NAT maps multiple private IPs to one public IP using port addressing.
This document provides instructions for troubleshooting connectivity issues between various devices in a network. It describes the network setup, including IP addresses assigned to routers, PCs, and servers. Users are reporting inability to access a web server. The task is to determine the cause of connectivity issues from different PCs and servers, attempt to resolve any issues, and clearly document unresolved problems. Steps are provided to check connectivity and configurations on each device, identify any issues, and determine if the second DNS server can be used.
1. Configure VLANs to separate servers and clients in each organization.
2. Configure NAT inside and outside interfaces on routers.
3. Use static NAT to expose a server to the internet with port forwarding.
4. Use dynamic NAT with overload for internet access for internal clients, sharing a public IP.
This allows internal clients to access external servers while protecting internal servers from direct internet access. The ISP provides public IPs for NAT translations between the private and public networks.
Cisco Packet Tracer is a network simulation program that allows students to experiment with network behavior and concepts like switching and routing. The document demonstrates how to set up a virtual network in Packet Tracer with PCs, switches, routers and servers and configure IP addresses and static routing. It shows how to assign IP addresses to devices, connect the devices with cables, and use the ping command to test connectivity between PCs across the routed network.
The document describes steps to configure a network including: designing an IP addressing scheme; configuring DHCP, WAN technologies, EIGRP routing, and NAT; and implementing ACLs for security. Key steps include subnetting the 172.16.1.128/25 network and assigning addresses, configuring R3 as a DHCP server, enabling routing with EIGRP, using NAT on R2 for Internet access, and applying ACLs to restrict access between networks.
This document provides an overview of Network Address Translation (NAT) including:
- Why NAT is used to connect networks with private IP addresses to the Internet and during network mergers.
- NAT implementation considerations such as advantages of address conservation and flexibility but disadvantages of delays and incompatible applications.
- Common NAT configurations like dynamic NAT, dynamic NAT with overloading, and static NAT.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
Microsoft MCSA- Joining Client Machines To The Domain!Hamed Moghaddam
The document describes the steps to join a Windows 8 client computer to an Active Directory domain. It involves logging into the client computer with the local administrator account, accessing the system properties, selecting the domain to join and providing the domain administrator credentials, then restarting the computer. Once restarted, the user can sign in to the domain using the format domainname\username and password.
The document discusses asset security and data management. It outlines the objectives of classifying information and assets, determining and maintaining ownership, protecting privacy, and establishing handling requirements. It then provides details on determining and maintaining data ownership, including developing sound data policies, defining roles and responsibilities, and ensuring data quality. It also discusses data security controls and standards for protecting data at rest, in transit, and in various states.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
1. CISCO CCNA
NAT CONFIGURATION
TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK BELOW:
WWW.ASMED.COM/C1
ASM EDUCATIONAL CENTER INC. (ASM)
WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE
PHONE: (301) 984-7400
ROCKVILLE,MD
3. CISCO CCNA NAT CONFIGURATION
NAT = NETWORK ADDRESS TRANSLATION
REMEMBER THE PRIVATE IP ADDRESS
10.0.0.0 — 10.255.255.255
172.16.0.0 —-172.31.255.255
192.168.0.0.—– 192.168.255.255
THE GOAL IS TO CONVERT YOUR PRIVATE IP ADDRESS TO PUBLIC ADDRESS SO
THAT YOUR INTERNAL PEOPLE CAN ACCESS THE INTERNET
4. CISCO CCNA NAT CONFIGURATION
I HAVE 2 KIND:
1) DYNAMIC NAT – USE IT WHEN YOU NEED YOUR PRIVATE NETWORK GO OUT
TO INTERNET – IT HAS TWO KIND
SUPPOSE I HAVE 6 PRIVATE AND THEN ISP GIVE YOU 6 PUBLIC THEN ALL SIX PEOPLE GO TO
INTERNET
SUPPOSE I HAVE 62 PRIVATE AND ISP ONLY GIVE YOU 6 PUBLIC IN THIS CASE ; YOU MUST
USE THE KEY WORD “OVERLOAD” ; THIS CONCEPT IS CALL PAT (PORT ADDRESS
TRANSLATION)
2) STATIC NAT – USE IT WHEN YOU NEED THE INTERNET PEOPLE COME TO
YOUR WEBSERVER; THAT IS LOCATED IN PRIVATE LAN =10.10.10.1; IN THIS CASE YOU
NEED TO USE STATIC NAT
5. CISCO CCNA NAT CONFIGURATION
HERE IS MY LAB ON NAT/PAT:
GIVEN BY ISP 6 PUBLIC ADDRESS 198.18.151.97
.98, .99,100,101,102 WITH SUBNET MASK /29
/29=255.255.255.248
.11111000
AND I HAVE 62 INTERNAL IP ADDRESS THAT NEED TO GO TO INTERNET
192.168.91.65—192.168.91.126 WITH MASK /26 255.255.255.192
.11000000
6. CISCO CCNA NAT CONFIGURATION
STEP 1) DEFINE THE POOL OF INSIDE GLOBAL ADDRESS (PUBLIC ADDRESS)
THAT INSIDE LOCAL ADDRESS WILL BE TRANSLATED TO:
HINT: ALWAYS ALWAYS START WITH IP NAT?
R1#
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#IP NAT ?
INSIDE INSIDE ADDRESS TRANSLATION
OUTSIDE OUTSIDE ADDRESS TRANSLATION
POOL DEFINE POOL OF ADDRESSES
R1(CONFIG)#IP NAT POO
R1(CONFIG)#IP NAT POOL ?
WORD POOL NAME
R1(CONFIG)#IP NAT POOL CCNA ?
7. CISCO CCNA NAT CONFIGURATION
A.B.C.D START IP ADDRESS
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 ?
A.B.C.D END IP ADDRESS
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 ?
NETMASK SPECIFY THE NETWORK MASK
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NET
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK ?
A.B.C.D NETWORK MASK
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK
255.255.255.248 ?
<CR>
R1(CONFIG)#IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK
255.255.255.248
R1(CONFIG)#
8. CISCO CCNA NAT CONFIGURATION
HERE IS MY SHOW RUN:
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
HINT: ANY TIME YOU SEE THE WORD POOL IT WILL TELL YOU; THAT IS PUBLIC IP ADDRESS
STEP 2) DEFINE THE SOURCE OF THE INSIDE LOCAL ADDRESS AND BIND IT TO CCNA DEFINED IN PART 1
HINT: IP NAT?
R1#
R1#
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#IP NAT ?
INSIDE INSIDE ADDRESS TRANSLATION
OUTSIDE OUTSIDE ADDRESS TRANSLATION
POOL DEFINE POOL OF ADDRESSES
R1(CONFIG)#IP NAT
% INCOMPLETE COMMAND.
R1(CONFIG)#IP NAT INS
R1(CONFIG)#IP NAT INSIDE ?
SOURCE SOURCE ADDRESS TRANSLATION
9. CISCO CCNA NAT CONFIGURATION
R1(CONFIG)#IP NAT INSIDE SOU
R1(CONFIG)#IP NAT INSIDE SOURCE ?
LIST SPECIFY ACCESS LIST DESCRIBING LOCAL ADDRESSES
STATIC SPECIFY STATIC LOCAL->GLOBAL MAPPING
R1(CONFIG)#IP NAT INSIDE SOURCE LIST ?
<1-199> ACCESS LIST NUMBER FOR LOCAL ADDRESSES
WORD ACCESS LIST NAME FOR LOCAL ADDRESSES
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 ?
INTERFACE SPECIFY INTERFACE FOR GLOBAL ADDRESS
POOL NAME POOL OF GLOBAL ADDRESSES
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POO
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL ?
WORD NAME POOL OF GLOBAL ADDRESSES
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA ?
OVERLOAD OVERLOAD AN ADDRESS TRANSLATION
<CR>
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVE
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD ?
<CR>
R1(CONFIG)#IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
10. CISCO CCNA NAT CONFIGURATION
HINT: IF ISP HAS GIVEN YOU A SINGLE IP ADDRESS AFTER LIST 1 ? I WILL USE INTERFACE S0/0
HINT: WHEN YOU SEE THE WORD LIST THAT SHOULD TELL YOU ; I NEED TO HAVE ACL 1 THAT WILL
DEFINE MY LOCAL ADDRESS
STEP 3) NOW DEFINE YOU ACL 1
HINT: I HAVE /26
255.255.255.255-
255.255.255.192
————–
0.0.0.63 AS WILD CARDS
R1(CONFIG )# ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
SUBNET ID WILD CARDS
11. CISCO CCNA NAT CONFIGURATION
R1(CONFIG)#
R1(CONFIG)#ACC
R1(CONFIG)#ACCESS-LIST ?
<1-99> IP STANDARD ACCESS LIST
<100-199> IP EXTENDED ACCESS LIST
R1(CONFIG)#ACCESS-LIST 1 ?
DENY SPECIFY PACKETS TO REJECT
PERMIT SPECIFY PACKETS TO FORWARD
REMARK ACCESS LIST ENTRY COMMENT
R1(CONFIG)#ACCESS-LIST 1 PERMI
R1(CONFIG)#ACCESS-LIST 1 PERMIT ?
A.B.C.D ADDRESS TO MATCH
ANY ANY SOURCE HOST
HOST A SINGLE HOST ADDRESS
R1(CONFIG)#ACCESS-LIST 1 PERMIT 192.168.91.69 0.0.0.63
12. CISCO CCNA NAT CONFIGURATION
HERE I INTENTIONALLY PUT WRONG SUBNET ID; BUT IOS WILL FIX IT FOR ME:
HERE IS MY SHOW RUN:
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
STEP 4) TELL ROUTER WHICH SIDE IS INSIDE AND WHICH SIDE IS OUTSIDE AND MAKE SURE BE UNDER
INTERFACE AND GIVE:
INT F0/0
IP NAT INSIDE
INT S0/0
IP NAT OUTSIDE
13. CISCO CCNA NAT CONFIGURATION
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#INT F0/0
R1(CONFIG-IF)#IP NAT
R1(CONFIG-IF)#IP NAT ?
INSIDE INSIDE INTERFACE FOR ADDRESS TRANSLATION
OUTSIDE OUTSIDE INTERFACE FOR ADDRESS TRANSLATION
R1(CONFIG-IF)#IP NAT INS
R1(CONFIG-IF)#IP NAT INSIDE
R1(CONFIG-IF)#
R1(CONFIG-IF)#
R1(CONFIG-IF)#INT S0/0
R1(CONFIG-IF)#IP NAT ?
INSIDE INSIDE INTERFACE FOR ADDRESS TRANSLATION
OUTSIDE OUTSIDE INTERFACE FOR ADDRESS TRANSLATION
R1(CONFIG-IF)#IP NAT OUT
R1(CONFIG-IF)#IP NAT OUTSIDE
14. CISCO CCNA NAT CONFIGURATION
NOW LET’S LOOK AT SHOW RUN:
INTERFACE FASTETHERNET0/0
IP ADDRESS 192.168.91.126 255.255.255.192
IP NAT INSIDE
DUPLEX AUTO
SPEED AUTO
!
!
INTERFACE SERIAL0/0
IP ADDRESS 192.0.1.109 255.255.255.252
IP NAT OUTSIDE
CLOCK RATE 64000
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
LAST TWO STEPS IS DONE TO CHECK AND MAKE SURE LIFE IS GOOD;
15. CISCO CCNA NAT CONFIGURATION
STEP 5) MAKE SURE YOUR ROUTER HAS A DEFAULT ROUTE TO ISP.
R1#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
R1(CONFIG)#
R1(CONFIG)#IP ROUTE 0.0.0.0 0.0.0.0 ?
A.B.C.D FORWARDING ROUTER’S ADDRESS
ETHERNET IEEE 802.3
FASTETHERNET FASTETHERNET IEEE 802.3
GIGABITETHERNET GIGABITETHERNET IEEE 802.3Z
LOOPBACK LOOPBACK INTERFACE
NULL NULL INTERFACE
SERIAL SERIAL
R1(CONFIG)#IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
16. CISCO CCNA NAT CONFIGURATION
STEP 6) MAKE SURE ISP KNOWS YOUR NETWORK; SO ISP WILL NEED A STATIC ROUTE BACK TO
YOUR NETWORK
ISP#
ISP#CONFIG T
ENTER CONFIGURATION COMMANDS, ONE PER LINE. END WITH CNTL/Z.
ISP(CONFIG)#IP ROUTE ?
A.B.C.D DESTINATION PREFIX
ISP(CONFIG)#IP ROUTE 198.18.151.96 ?
A.B.C.D DESTINATION PREFIX MASK
ISP(CONFIG)#IP ROUTE 198.18.151.96 255.255.255.248 ?
A.B.C.D FORWARDING ROUTER’S ADDRESS
ETHERNET IEEE 802.3
FASTETHERNET FASTETHERNET IEEE 802.3
GIGABITETHERNET GIGABITETHERNET IEEE 802.3Z
LOOPBACK LOOPBACK INTERFACE
NULL NULL INTERFACE
SERIAL SERIAL
ISP(CONFIG)#IP ROUTE 198.18.151.96 255.255.255.248 S0/0
ISP(CONFIG)#
17. CISCO CCNA NAT CONFIGURATION
AS WE SEE FOR ISP MAKE SURE YOU USE THE PUBLIC ADDRESS NOT PRIVATE; SNICE ISP DOES NOT KNOW YOUR
PRIVATE IP ADDRESS
NOW I GO AND CHECK THE PING FROM PC TO INTERNET; THEN I GO TO R1#SHOW IP NAT TRANSLATION
!
PC>
PC>PING 192.0.1.110
PINGING 192.0.1.110 WITH 32 BYTES OF DATA:
REPLY FROM 192.0.1.110: BYTES=32 TIME=13MS TTL=254
REPLY FROM 192.0.1.110: BYTES=32 TIME=15MS TTL=254
REPLY FROM 192.0.1.110: BYTES=32 TIME=11MS TTL=254
REPLY FROM 192.0.1.110: BYTES=32 TIME=12MS TTL=254
PING STATISTICS FOR 192.0.1.110:
PACKETS: SENT = 4, RECEIVED = 4, LOST = 0 (0% LOSS),
APPROXIMATE ROUND TRIP TIMES IN MILLI-SECONDS:
MINIMUM = 11MS, MAXIMUM = 15MS, AVERAGE = 12MS
18. CISCO CCNA NAT CONFIGURATION
R1#SHOW IP NAT TRANSLATIONS
PRO INSIDE GLOBAL INSIDE LOCAL OUTSIDE LOCAL OUTSIDE GLOBAL
ICMP 198.18.151.97:10 192.168.91.65:10 192.0.1.110:10 192.0.1.110:10
ICMP 198.18.151.97:11 192.168.91.65:11 192.0.1.110:11 192.0.1.110:11
ICMP 198.18.151.97:12 192.168.91.65:12 192.0.1.110:12 192.0.1.110:12
ICMP 198.18.151.97:9 192.168.91.65:9 192.0.1.110:9 192.0.1.110:9
19. CISCO CCNA NAT CONFIGURATION
HERE IS THE SUMMARY:
INTERFACE FASTETHERNET0/0
IP ADDRESS 192.168.91.126 255.255.255.192
IP NAT INSIDE
DUPLEX AUTO
SPEED AUTO
!
INTERFACE SERIAL0/0
IP ADDRESS 192.0.1.109 255.255.255.252
IP NAT OUTSIDE
CLOCK RATE 64000
!
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
!
20. CISCO CCNA NAT CONFIGURATION
HINT: IF ISP HAS GIVEN YOU SINGLE IP ADDRESS THEN YOU DO NOT NEED THE POOL STATEMENT ( THE 1ST
STATEMENT) ; AND ALSO YOUR 2ND STATMENT WILL BE LIKE THIS
IP NAT INSIDE SOURCE LIST 1 INT S0/0 OVERLOAD
NOW IF I ADD ANOTHER LAN (10.10.10.0/24) USING MY INT F0/1
MAKE SURE YOU HAVE DEFINE ACL FOR NETWORK 10.10.10.0 /24 TO GO OUT AND
MAKE SURE YOUR APPLY TO INT F0/1 WITH COMMAND IP NAT INSIDE
INTERFACE FASTETHERNET0/0
IP ADDRESS 192.168.91.126 255.255.255.192
IP NAT INSIDE
DUPLEX AUTO
SPEED AUTO
!
21. CISCO CCNA NAT CONFIGURATION
INTERFACE FASTETHERNET0/1
IP ADDRESS 10.10.10.100 255.255.255.0
IP NAT INSIDE ( PLEASE ADD THIS)
DUPLEX AUTO
SPEED AUTO
!
INTERFACE SERIAL0/0
IP ADDRESS 192.0.1.109 255.255.255.252
IP NAT OUTSIDE
CLOCK RATE 64000
!
22. CISCO CCNA NAT CONFIGURATION
IP NAT POOL CCNA 198.18.151.97 198.18.151.102 NETMASK 255.255.255.248
IP NAT INSIDE SOURCE LIST 1 POOL CCNA OVERLOAD
IP CLASSLESS
IP ROUTE 0.0.0.0 0.0.0.0 192.0.1.110
!
!
ACCESS-LIST 1 PERMIT 192.168.91.64 0.0.0.63
ACCESS-LIST 1 PERMIT 10.10.10.0 0.0.0.255 (PLEASE ADD THIS LINE)
!
23. ASM EDUCATIONAL CENTER INC. (ASM)
WHERE TRAINING, TECHNOLOGY & SERVICE CONVERGE
TO WATCH OUR CISCO CCNA VIDEO TRAININGS PLEASE CHECK OUT THE LINK
BELOW:
WWW.ASMED.COM/C1
PHONE: (301) 984-7400
ROCKVILLE,MD