Cisco ESW-520-24-K9 Software Guide - Page 53

Verify the Configuration, Con Network Address Translation, Example:, show dsl interface atm

Page 53 highlights

Chapter 4 Configuring PPP over ATM with NAT Configure Network Address Translation Verify the Configuration You can verify that the configuration is set the way you want by using the show dsl interface atm command from privileged EXEC mode. Configure Network Address Translation Network Address Translation (NAT) translates packets from addresses that match a standard access list, using global addresses allocated by the dialer interface. Packets that enter the router through the inside interface, packets sourced from the router, or both are checked against the access list for possible address translation. You can configure NAT for either static or dynamic address translations. Perform these steps to configure the outside ATM WAN interface with dynamic NAT, beginning in global configuration mode: Step 1 Command ip nat pool name start-ip end-ip {netmask netmask | prefix-length prefix-length} Purpose Creates pool of global IP addresses for NAT. Example: Router(config)# ip nat pool pool1 192.168.1.0 192.168.2.0 netmask 255.255.255.0 Router(config)# Step 2 Step 3 ip nat inside source {list access-list-number} {interface type number | pool name} [overload] Example 1: Router(config)# ip nat inside source list 1 interface dialer 0 overload or Example 2: Router(config)# ip nat inside source list acl1 pool pool1 interface type number Example: Router(config)# interface vlan 1 Router(config-if)# Enables dynamic translation of addresses on the inside interface. The first example shows the addresses permitted by the access list 1 to be translated to one of the addresses specified in the dialer interface 0. The second example shows the addresses permitted by access list acl1 to be translated to one of the addresses specified in the NAT pool pool1. For details about this command and additional parameters that can be set, as well as information about enabling static translation, see the Cisco IOS IP Command Reference, Volume 1 of 4: Addressing and Services. Enters configuration mode for the VLAN (on which the Fast Ethernet LAN interfaces [FE0-FE3] reside) to be the inside interface for NAT. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide 4-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

4-7
Cisco Secure Router 520 Series Software Configuration Guide
OL-14210-01
Chapter 4
Configuring PPP over ATM with NAT
Configure Network Address Translation
Verify the Configuration
You can verify that the configuration is set the way you want by using the
show dsl interface atm
command from privileged EXEC mode.
Configure Network Address Translation
Network Address Translation (NAT) translates packets from addresses that match a standard access list,
using global addresses allocated by the dialer interface. Packets that enter the router through the inside
interface, packets sourced from the router, or both are checked against the access list for possible address
translation. You can configure NAT for either static or dynamic address translations.
Perform these steps to configure the outside ATM WAN interface with dynamic NAT, beginning in global
configuration mode:
Command
Purpose
Step 1
ip nat pool
name start-ip end-ip
{
netmask
netmask
|
prefix-length
prefix-length
}
Example:
Router(config)#
ip nat pool pool1
192.168.1.0 192.168.2.0 netmask
255.255.255.0
Router(config)#
Creates pool of global IP addresses for NAT.
Step 2
ip nat inside source
{
list
access-list-number
}
{
interface
type number |
pool
name
} [
overload
]
Example 1:
Router(config)#
ip nat inside source list 1
interface dialer 0 overload
or
Example 2:
Router(config)#
ip nat inside source list
acl1 pool pool1
Enables dynamic translation of addresses on the
inside interface.
The first example shows the addresses permitted
by the access list
1
to be translated to one of the
addresses specified in the dialer interface
0
.
The second example shows the addresses
permitted by access list
acl1
to be translated to
one of the addresses specified in the NAT pool
pool1
.
For details about this command and additional
parameters that can be set, as well as information
about enabling static translation, see the
Cisco IOS IP Command Reference, Volume 1 of 4:
Addressing and Services
.
Step 3
interface
type number
Example:
Router(config)#
interface vlan 1
Router(config-if)#
Enters configuration mode for the VLAN (on
which the Fast Ethernet LAN interfaces
[FE0–FE3] reside) to be the inside interface for
NAT.