Top-Rated Free Essay
Preview

Ip Configuring

Satisfactory Essays
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ip Configuring
Task #1

1. Router(config)# ip nat pool general 10.165.200.225 10.165.200.229 netmask 255.255.255.0

2. Router(config)# access-list 100 permit ip 10.165.0.0 0.0.0.255 any

3. Router(config)# ip nat inside source list 100 pool general overload

4. Router(config-if)# ip address 172.16.1.1 255.255.255.0

5. Router (config-if)# ip address 10.165.200.225 255.255.255.0 ip nat inside

6. Router (config-if)# ip address 10.165.200.226 255.255.255.0 ip nat outside

Task #2

1. Router(config-if)# ip address 10.165.200.225 255.255.255.252

2. Router(config-if)# ip address 10.165.200.226 255.255.255.252

3. Router(config)# ip route 10.165.200.226 255.255.255.252

4. Router(config)# access-list 100 permit ip 10.165.0.0 0.0.0.255 any

5. Router(config)# ip nat inside source list 100 pool general overload

6. Router (config-if)# ip address 10.165.200.225 255.255.255.0 ip nat inside

Task #3

1. access-list remark == NAT Network == - This command remarks a already made access list for permit deny access.

2. access-list 100 permit ip 172.16.1.0 0.0.0.255 any – This command allows access for the defined IP address.

3. ip nat inside – This command configures interfaces for the local environment not to be routed outside.

4. ip virtual-reassembly – Responsible for finding and dropping fragment attacks.

5. ip nat inside source static 172.16.1.1 10.165.200.230 – Sets the static IP for the router.

6. ip nat pool general 10.165.200.225 10.165.200.230 netmask 255.255.255.248 – Creates an ip address pool for the desired range.

7. ip nat inside source list 100 pool general overload – Defines the source list for the desired router.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    enable secret ciscousername local1 privilege 1 password 0 pass1username local2 privilege 1 password 0 pass2memory-size iomem 10!ip subnet-zero!interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0 ip nat inside duplex auto speed auto!interface Serial0/0 bandwidth 1544 no ip address shutdown!interface FastEthernet0/1 no ip address shutdown duplex auto speed auto!interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0 ip nat outside ip access-group 100 in!router rip version 2 passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 200.100.0.0 network 192.168.100.0!ip nat inside source static 192.168.100.10 10.100.10.10 extendableip nat inside source static 192.168.100.11 10.100.10.11 extendableip classlessip http serverno ip http secure-server!access-list 100 deny ip host 200.100.20.10 any logaccess-list 100 deny ip host 200.100.0.10 any logaccess-list 100 permit ip any any…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Since it’s a class B address. I took the first and second set of number from the IP address and added them to the first and second part of the subnet mask. Pushing the first 2 numbers of the subnet mask to the third and fourth spot.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    The most common use of private addresses is in residential networks, since most Internet service providers (ISPs) only allocate a single publicly routable IP address to each residential customer, but many homes have more than one computer or other Internet connected device, such as smartphones. In this situation, a network address translator (NAT/PAT) gateway is usually used to provide Internet connectivity to multiple hosts.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Type the starting and ending IP address for any exclusions. (Note: To exclude a single address, type the start address but leave the end address blank.) Click Add.…

    • 547 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    7) ________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.…

    • 2552 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Ip Addressing Scenario

    • 754 Words
    • 4 Pages

    IP addresses are either classful or classless networks. Classful IP addresses are divided into different classes with a field for the network ID and a field for the host ID. There is a different length for each ID for each different class. A certain number of bits are in the network ID and the remaining are in the host ID. Each network class has a different number of leading bits, bits for the network number, and number of networks, bits for host number and maximum nodes or devices that can be used on each network. There are five different classes and are as follows:…

    • 754 Words
    • 4 Pages
    Good Essays
  • Good Essays

    ACLs Notes

    • 822 Words
    • 6 Pages

    We have to Permit Data of Network 172.16.0.0 to flow out from E0 and E1 Ethernet Interfaces of the router and enter into the both sides Network 172.16.4.0 and 172.16.3.0.…

    • 822 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Basic Switch Commands

    • 419 Words
    • 2 Pages

    | This group of commands configures port security on port #6. Port security is a way to limit which systems can connect to a switch. This code example uses a "sticky" MAC address that tells the switch to configure the port for whatever MAC uses the port first. It then sets the maximum number of MACs for the port to 1 and shuts down the port if there is a violation.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cisco - Vpn Configuration

    • 9191 Words
    • 37 Pages

    If you do not need to do VPN tunneling for intranet traffic, you can use this example without the access-list or the nat 0 access-list commands. These commands disable NAT for traffic that matches the access list criteria. If you have a limited number of registered IP addresses and you cannot use PAT, you can…

    • 9191 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    • When inline VLAN pair is configured correctly , traffic can pass between the ASA outside…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    CCNP Strategy

    • 2264 Words
    • 15 Pages

    If Client 1 IP is 169.x.x.x or no IP, u have 5 TTs (ASW1 = 3TTs, DWS 1= 1TT, R4 = 1TT)…

    • 2264 Words
    • 15 Pages
    Satisfactory Essays
  • Good Essays

    Vyatta Configuration

    • 569 Words
    • 3 Pages

    In the above rule all the communication from internal network will flow through 10.105.64.205 IP to the external nework.…

    • 569 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ccna Studies

    • 1147 Words
    • 5 Pages

    D. source ip address: 192.168.15.36 destination port: 23 satisfies telnet port, in correct range of addresses to satisfy access-list…

    • 1147 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Skills integration

    • 422 Words
    • 2 Pages

    In this activity, two routers are configured to communicate with each other. You are responsible for configuring subinterfaces to communicate with the switches. You will configure VLANs, trunking, and EtherChannel with PVST. The Internet devices are all preconfigured.…

    • 422 Words
    • 2 Pages
    Satisfactory Essays