NAT
一,实验要求:
1,PC2使用无地址池的PAT能上网
2,PC1与PC3使用有地址池的PAT能上网
3,PC4使用静态NAT能上网
4,,R2能远程R1,并通过跳板远程SW1
二,实验拓扑图:
SW1配置:
SW1#conf t
SW1(config)#no ip routing
SW1(config)#vlan 10
SW1(config-vlan)#vlan 20
SW1(config-vlan)#int f1/1
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 10
SW1(config-if)#int f1/2
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 20
SW1(config-if)#int f1/0
SW1(config-if)#switchport mode trunk
SW1(config-if)#switchport trunk encapsulation dot1q
SW1(config-if)#int vlan 1
SW1(config-if)#ip add 192.168.1.10 255.255.255.0
SW1(config-if)#no shut
SW2配置:
SW2#conf t
SW2(config)#no ip routing
SW2(config)#vlan 10
SW2(config-vlan)#vlan 30
SW2(config-vlan)#int f1/3
SW2(config-if)#switchport mode access
SW2(config-if)#switchport access vlan 10
SW2(config-if)#int f1/4
SW2(config-if)#switchport access vlan 30
SW2(config-if)#int f1/1
SW2(config-if)#switchport mode trunk
SW2(config-if)#switchport trunk encapsulation dot1q
M1配置:
M1#conf t
M1(config)#vlan 10
M1(config-vlan)#vlan 20
M1(config-vlan)#vlan 30
M1(config)#int range f1/0 -1
M1(config-if-range)#switchport mode trunk
M1(config)#int vlan 10
M1(config-if)#ip add 192.168.10.1 255.255.255.0
M1(config-if)#no shut
M1(config-if)#int vlan 20
M1(config-if)#ip add 192.168.20.1 255.255.255.0
M1(config-if)#no shut
M1(config-if)#int vlan 30
M1(config-if)#ip add 192.168.30.1 255.255.255.0
M1(config-if)#no shut
M1(config-if)#int vlan 1
M1(config-if)#ip add 192.168.1.1 255.255.255.0
M1(config-if)#no shut
M1(config-if)#ex
M1(config)#int f0/1
M1(config-if)#ip add 1.1.1.1 255.255.255.0
M1(config-if)#no shut
M1(config)#ip route 0.0.0.0 0.0.0.0 1.1.1.2
R1配置:
R1(config)#int f0/0
R1(config-if)#ip add 1.1.1.2 255.255.255.0
R1(config-if)#no shut
R1(config-if)#int f0/1
R1(config-if)#ip add 202.106.1.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#ex
R1(config)#ip route 192.168.0.0 255.255.0.0 1.1.1.1
R1(config)#ip route 0.0.0.0 0.0.0.0 202.106.1.2
做了R1(config)#ip route 192.168.0.0 255.255.0.0 1.1.1.1的配置,就可以ping通202.106.1.1
R2配置
R2#conf t
R2(config)#int f0/0
R2(config-if)#ip add 202.106.1.2 255.255.255.0
R2(config-if)#no shut
R2(config-if)#ex
R2(config)#int loopback 0
R2(config-if)#ip add 10.0.0.1 255.255.255.0
R2(config-if)#no shut
R2(config-if)#ex
以下配置是实验要求以及验证:
R1(config)#int f0/0
R1(config-if)#ip nat inside
R1(config-if)#int f0/1
R1(config-if)#ip nat outside
R1(config)#access-list 10 permit host 192.168.20.10//
R1(config)#ip nat inside source list 10 int f0/1 overload
以上无地址的PAT验证结果
或
R1(config)#access-list 10 permit 192.168.20.0 0.0.0.255
R1(config)#ip nat inside source list 10 int f0/1 overload
无地址的PAT验证结果
R1(config)#do show run | s nat//查看NAT的配置信息
ip nat inside
ip nat outside
ip nat inside source list 10 interface FastEthernet0/1 overload
R1(config)#do show access-list //查看控制列表
Standard IP access list 10
10 permit 192.168.20.0, wildcard bits 0.0.0.255 (7 matches)
R2#debug ip icmp //开启icmp的信息
R2#
*Mar 1 01:39:39.051: ICMP: echo reply sent, src 10.0.0.1, dst 202.106.1.1
R2#
*Mar 1 01:39:40.183: ICMP: echo reply sent, src 10.0.0.1, dst 202.106.1.1
R1(config)#ip nat pool test 202.106.1.1 202.106.1.10 netmask 255.255.255.0
R1(config)#access-list 20 permit 192.168.10.0 0.0.0.255
R1(config)#ip nat inside source list 20 pool test overload
以下有地址的PAT验证结果:
R2#
*Mar 1 00:54:10.775: ICMP: echo reply sent, src 10.0.0.1, dst 202.106.1.3
R2#
*Mar 1 00:54:11.931: ICMP: echo reply sent, src 10.0.0.1, dst 202.106.1.3
R1(config)#ip nat inside source static 192.168.30.10 202.106.1.1
以下静态NAT验证结果:
R2#
*Mar 1 01:04:31.383: ICMP: echo reply sent, src 10.0.0.1, dst 202.106.1.1
R2#
*Mar 1 01:04:32.543: ICMP: echo reply sent, src 10.0.0.1, dst 202.106.1.1
新增技术(实验无此要求)
R1(config)#ip nat inside source static tcp 192.168.30.10 23 202.106.1.2 23
以下端来映射验证结果
R2#
*Mar 1 01:42:20.599: ICMP: echo reply sent, src 202.106.1.2, dst 192.168.30.10
R2#
*Mar 1 01:42:22.567: ICMP: echo reply sent, src 202.106.1.2, dst 192.168.30.10
SW1(config)#line vty 0 4
SW1(config-line)#password abc
SW1(config-line)#login
SW1(config-line)#exit
SW1(config)#enable secret abc123
R1(config)#line vty 0 4
R1(config-line)#password abc
R1(config-line)#login
R1(config-line)#exit
R1(config)#enable secret abc123
以下远程管理验证结果
R2#telnet 202.106.1.1
Trying 202.106.1.1 ... Open
User Access Verification
Password:
R1>en
R1>enable
Password:
Password:
R1#tel
R1#telnet 192.168.1.10
Trying 192.168.1.10 ... Open
User Access Verification
Password:
SW1>
原文:http://1314520zk.blog.51cto.com/8021277/1364638