<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT and PAT configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4475086#M1084023</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, assuming that K router is ISP router, we need to remove nat configs from K router and add static routes on edge routers.&amp;nbsp; there is also a duplicate IP address on serial interfaces.&amp;nbsp; To make this NAT lab to work, we need NAT static entry on BB-S similarly what you have on DC router.&amp;nbsp; Since you have same Private range on left and right sides, we need to hide those behind Nat.&amp;nbsp; you can add on S router following entry: &lt;EM&gt;ip nat inside source static 172.16.50.20 193.95.76.20.&amp;nbsp;&lt;/EM&gt; &lt;/P&gt;
&lt;P&gt;you can test it using BB-K, an ISP router by pining Public IPs like 193.95.75.3 or 193.95.75.5 or newly added entry &lt;EM&gt;193.95.76.20&lt;/EM&gt;.&amp;nbsp; You cannot reach Private range from Internet, so you cannot ping any 1&lt;EM&gt;72.16.50.x. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Normally and technically, to reach private web server from the Internet, routers will have static TCP NAT entries translating port 80 of Private IP to Public IP port 80. Example on BB-S has &lt;EM&gt;ip nat inside source static tcp 172.16.50.20 80 193.95.76.20 80&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Regards, ML&lt;BR /&gt;**Please Rate All Helpful Responses **&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Sep 2021 03:21:34 GMT</pubDate>
    <dc:creator>Martin L</dc:creator>
    <dc:date>2021-09-28T03:21:34Z</dc:date>
    <item>
      <title>NAT and PAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474496#M1084004</link>
      <description>&lt;P&gt;HELLO GUYS,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to configure &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;&lt;U&gt;NAT on the LAN1&lt;/U&gt;&lt;/FONT&gt;&lt;/STRONG&gt; and &lt;STRONG&gt;&lt;FONT color="#CC99FF"&gt;PAT on the LAN2&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;can someone tell me what to add as a config to the router &lt;STRONG&gt;BB-K&lt;/STRONG&gt; so i can ping from HTTP2 to HTTP1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;D.CENTER :&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;interface fa0/1&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;ip nat inside source static 172.16.50.1 193.95.75.3&lt;/P&gt;&lt;P&gt;ip nat inside source static 172.16.50.2 193.95.75.4&lt;/P&gt;&lt;P&gt;ip nat inside source static 172.16.50.3 193.95.75.5&lt;/P&gt;&lt;P&gt;interface serial 0/0/0&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;BB-S :&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;interface fa0/1&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;interface serial 0/1/0&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;access-list 7 permit&amp;nbsp;172.16.50.0 0.0.0.255&lt;/P&gt;&lt;P&gt;ip nat pool P1 193.95.76.3&amp;nbsp;193.95.76.6 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;ip nat inside source list 7 pool P1 overload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;BB-K :&lt;/U&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface serial 0/0/0&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;interface serial 0/1/0&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 11:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474496#M1084004</guid>
      <dc:creator>catalystextremiste</dc:creator>
      <dc:date>2021-09-27T11:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and PAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474958#M1084018</link>
      <description>&lt;P&gt;any help GUYS???&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 20:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474958#M1084018</guid>
      <dc:creator>catalystextremiste</dc:creator>
      <dc:date>2021-09-27T20:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and PAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474963#M1084019</link>
      <description>&lt;P&gt;Please attach pt file in a zip format for easier and faster answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 20:48:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474963#M1084019</guid>
      <dc:creator>Martin L</dc:creator>
      <dc:date>2021-09-27T20:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and PAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474965#M1084020</link>
      <description />
      <pubDate>Mon, 27 Sep 2021 20:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4474965#M1084020</guid>
      <dc:creator>catalystextremiste</dc:creator>
      <dc:date>2021-09-27T20:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and PAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4475086#M1084023</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, assuming that K router is ISP router, we need to remove nat configs from K router and add static routes on edge routers.&amp;nbsp; there is also a duplicate IP address on serial interfaces.&amp;nbsp; To make this NAT lab to work, we need NAT static entry on BB-S similarly what you have on DC router.&amp;nbsp; Since you have same Private range on left and right sides, we need to hide those behind Nat.&amp;nbsp; you can add on S router following entry: &lt;EM&gt;ip nat inside source static 172.16.50.20 193.95.76.20.&amp;nbsp;&lt;/EM&gt; &lt;/P&gt;
&lt;P&gt;you can test it using BB-K, an ISP router by pining Public IPs like 193.95.75.3 or 193.95.75.5 or newly added entry &lt;EM&gt;193.95.76.20&lt;/EM&gt;.&amp;nbsp; You cannot reach Private range from Internet, so you cannot ping any 1&lt;EM&gt;72.16.50.x. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Normally and technically, to reach private web server from the Internet, routers will have static TCP NAT entries translating port 80 of Private IP to Public IP port 80. Example on BB-S has &lt;EM&gt;ip nat inside source static tcp 172.16.50.20 80 193.95.76.20 80&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Regards, ML&lt;BR /&gt;**Please Rate All Helpful Responses **&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 03:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-pat-configuration/m-p/4475086#M1084023</guid>
      <dc:creator>Martin L</dc:creator>
      <dc:date>2021-09-28T03:21:34Z</dc:date>
    </item>
  </channel>
</rss>

