SlideShare a Scribd company logo
2
Most read
3
Most read
How to Configure Static NAT on Cisco Routers?
Network Address Translation (NAT) is an operation by which source and/or
destination IP addresses within a packet are replaced with different IP addresses.
NAT conserves available IP address space by allowing many private IP addresses to be
represented by some smaller number of public IP addresses. Private IP addresses are
defined in RFC 1918 and are addresses that cannot be used on the Internet. NAT is
most commonly performed by routers or firewalls; however this tutorial focuses on
NAT within Cisco routers. NAT can be performed both statically and dynamically.
Static NAT simply maps one private IP address to a single public IP address, and this is
the flavor of NAT we are discussing in this tutorial.
A Cisco router performing NAT divides its universe into the inside and the outside.
Typically the inside is a private enterprise, and the outside is the public Internet. In
addition to the notion of inside and outside, a Cisco NAT router classifies addresses
as either local or global. A local address is an address that is seen by devices on the
inside, and a global address is an address that is seen by devices on the outside.
Given these four terms, an address may be one of four types:
1. Inside local addresses are assigned to inside devices. These addresses are not
advertised to the outside.
2. Inside global are addresses by which inside devices are known to the outside.
3. Outside local are addresses by which outside devices are known to the inside.
4. Outside global addresses are assigned to outside devices. These addresses
are not advertised to the inside.
Let’s jump right into NAT configuration on a Cisco router as shown in the Figure
below:
R1 is the router performing Network Address Translation (NAT) and has two
interfaces: Fa0/0 on the inside and Fa0/1 on the outside. The specific IP addresses
involved are:
Table 1 NAT Addresses for Figure Above
NAT Address Type IP Address
Inside local 192.168.1.2
Inside global 89.203.12.47
Outside local 202.14.35.28
Outside global 202.14.35.28
You probably know very well how to configure IP addresses on router interfaces, so
we skip those configuration steps and move straight to the interesting stuff. First, we
have to assign Fa0/0 as NAT inside interface and Fa0/1 as NAT outside interface on R1.
This would tell the router that interesting traffic entering or exiting these two
interfaces will be subject to address translation.
R1#conf term
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface Fa0/0
R1(config-if)#ip nat inside
R1(config-if)#interface Fa0/1
R1(config-if)#ip nat outside
R1(config-if)#end
Now we would tell the router how to perform address translation and mention which
IP addresses (source or destination) to re-write in packets moving between the inside
and outside interfaces. Here we go:
R1(config)#ip nat inside source static 192.168.1.2 89.203.12.47
Here, we are telling the router to perform NAT on packets coming into the router on
the inside interface Fa0/0. More specifically the router would identify which of these
packets have a source IP address of 192.168.1.2 and would change it to 89.203.12.47
before forwarding the packet out the outside interface Fa0/1. Similarly, return
packets coming in at outside interface Fa0/1 would undergo translation of
destination IP address.
Let’s now verify if NAT is actually working as it is supposed to work. There are a
couple of very useful Cisco IOS commands that can be used to do just that.
Command show ip nat statisticsdisplays the number of static and dynamic NAT
translations, inside and outside interfaces, and the number of hits and misses.
R1#show ip nat statistics
Total active translations: 1 (1 static, 0 dynamic; 0 extended)
Outside interfaces:
FastEthernet0/1
Inside interfaces:
FastEthernet0/0
Hits: 0 Misses: 0
CEF Translated packets: 0, CEF Punted packets: 0
Expired translations: 0
Dynamic mappings:
Appl doors: 0
Normal doors: 0
Queued Packets: 0
Command show ip nat translations displays the IP addresses for NAT translations.
R1#show ip nat translations
Pro Inside global Inside local Outside local Outside global
— 89.203.12.47 192.168.1.2 — —
As you see in the above output, we have one NAT entry configured with Inside
global address 89.203.12.47 and Inside local address 192.168.1.2 specified. Outside
local and Outside globaladdresses are blank because our NAT configuration does not
change those addresses.
Let’s now go to the PC and ping the Server before running the command show ip nat
translations again to see if it makes any difference.
R1#show ip nat statistics
Total active translations: 2 (1 static, 1 dynamic; 1 extended)
Outside interfaces:
FastEthernet0/1
Inside interfaces:
FastEthernet0/0
Hits: 10 Misses: 0
CEF Translated packets: 10, CEF Punted packets: 0
Expired translations: 0
Dynamic mappings:
Appl doors: 0
Normal doors: 0
Queued Packets: 0
R1#show ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 89.203.12.47:1 192.168.1.2:1 202.14.35.28:1 202.14.35.28:1
— 89.203.12.47 192.168.1.2 — —
As you can see in the above output, NAT is active as manifested by the appearance of
an additional dynamic entry for ICMP protocol and some additional hits,
corresponding to our ping attempt from PC to Server.
We just configured and verified a simple NAT scenario translating only the source or
destination (not both at the same time) IP addresses of packets moving between
inside and outside interfaces. This sort of NAT configuration is called static NAT as a
single inside local IP address is statically mapped to a single outside local IP address.
Another important feature of NAT is static Port Address Translation (PAT). Static PAT is
designed to allow one-to-one mapping between local and global addresses. A
common use of static PAT is to allow Internet users from the public network to access
a Web server located in the private network.
Let’s assume we intend to host a Web server on the inside on the same PC, that has
an IP address 192.168.1.2. The following configuration line would allow us to do just
that:
R1(config)#ip nat inside source static tcp 192.168.1.2 80 89.203.12.47 80
This configuration line performs the static address translation for the Web server.
With this configuration line, users that try to reach 89.203.12.47 port 80 (www) are
automatically redirected to 192.168.1.2 port 80 (www). In our case, 192.168.1.2 is
the IP address of the PC which is also the Web server. This configuration can be
verified using the same two NAT verification commands: show ip nat
translations and show ip nat statistics.
Notice that the address 89.203.12.47 with port number 80 (HTTP) translates to
192.168.1.2 port 80, and vice versa. Therefore, Internet users can browse the Web
server even though the Web server is on a private network with a private IP address.
More Related NAT Tips:
How to Configure Basic NAT with Overloading?
How to Configure Static NAT for Inbound Connections?
How to Configure NAT in Cisco IOS?
How to Set up NAT Using the Cisco IOS?

More Related Content

What's hot (20)

PPTX
JUNOS - Monitoring and Troubleshooting
Zenith Networks
 
PPSX
Les Topologies Physiques des réseaux informatiques
ATPENSC-Group
 
DOCX
CCNA Packet Tracer 1.6.1
Rafat Khandaker
 
ODP
C I D R
colmbennett
 
PPTX
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
 
PPTX
Linux 802.11 subsystem and brcmsmac WLAN driver
Midhun Lohidakshan
 
DOCX
Valgrind debugger Tutorial
Anurag Tomar
 
PDF
netfilter and iptables
Kernel TLV
 
PPT
Loopback address
CEC Landran
 
PDF
Cisco IPv6 Tutorial by Hinwoto
Febrian ‎
 
PPTX
IPv6 Les Bases
Aymen Bouzid
 
PDF
VXLAN BGP EVPN: Technology Building Blocks
APNIC
 
PDF
VLANs in the Linux Kernel
Kernel TLV
 
PDF
Cisco Router Basic Configuration
Prof. Erwin Globio
 
PPTX
Chassis Cluster Configuration
Kashif Latif
 
PPTX
ADRESSAGE DANS LES RESEAUX INFORMATIQUE.pptx
Stephen Salama
 
PPTX
Chapitre 5 - couche réseaux
Tarik Zakaria Benmerar
 
PDF
Diaporamas-Réseaux Informatiques.pdf
EST-UMI de Meknès
 
PDF
Network commands
Dr. Mahadev Gawas
 
PDF
Inter as vpn option c
Goerge Micheal Gerges
 
JUNOS - Monitoring and Troubleshooting
Zenith Networks
 
Les Topologies Physiques des réseaux informatiques
ATPENSC-Group
 
CCNA Packet Tracer 1.6.1
Rafat Khandaker
 
C I D R
colmbennett
 
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
 
Linux 802.11 subsystem and brcmsmac WLAN driver
Midhun Lohidakshan
 
Valgrind debugger Tutorial
Anurag Tomar
 
netfilter and iptables
Kernel TLV
 
Loopback address
CEC Landran
 
Cisco IPv6 Tutorial by Hinwoto
Febrian ‎
 
IPv6 Les Bases
Aymen Bouzid
 
VXLAN BGP EVPN: Technology Building Blocks
APNIC
 
VLANs in the Linux Kernel
Kernel TLV
 
Cisco Router Basic Configuration
Prof. Erwin Globio
 
Chassis Cluster Configuration
Kashif Latif
 
ADRESSAGE DANS LES RESEAUX INFORMATIQUE.pptx
Stephen Salama
 
Chapitre 5 - couche réseaux
Tarik Zakaria Benmerar
 
Diaporamas-Réseaux Informatiques.pdf
EST-UMI de Meknès
 
Network commands
Dr. Mahadev Gawas
 
Inter as vpn option c
Goerge Micheal Gerges
 

Viewers also liked (13)

PDF
2017 Volvo S60 Brochure | Orange County Volvo
Volvo Cars Mission Viejo
 
PPTX
Custom Courseware Development
CommLab India – Rapid eLearning Solutions
 
PPT
Assessment for learning meeting april 29th 2014
Mr Bounab Samir
 
PPT
Containerization and palletization
Amar Ashish Shrivastava
 
PPTX
Global IT Consulting Market
Joyjeet Dan
 
PDF
Best practices multichannel-integration
Giuseppe Monserrato
 
DOCX
Dantes Inferno Study Guide
followthelamb
 
PDF
Finding the best Radio Network Planning and Radio Network Optimization software
Muhammad Waqas Akram
 
PPTX
Scaling with MongoDB
Rick Copeland
 
PPT
Temperature Transducer
AIT
 
PPTX
Camels approach
Vishal Parmar
 
PDF
Summary -First Break All The Rules
GMR Group
 
PPTX
Neonatal Emergencies
Leeann Sills
 
2017 Volvo S60 Brochure | Orange County Volvo
Volvo Cars Mission Viejo
 
Custom Courseware Development
CommLab India – Rapid eLearning Solutions
 
Assessment for learning meeting april 29th 2014
Mr Bounab Samir
 
Containerization and palletization
Amar Ashish Shrivastava
 
Global IT Consulting Market
Joyjeet Dan
 
Best practices multichannel-integration
Giuseppe Monserrato
 
Dantes Inferno Study Guide
followthelamb
 
Finding the best Radio Network Planning and Radio Network Optimization software
Muhammad Waqas Akram
 
Scaling with MongoDB
Rick Copeland
 
Temperature Transducer
AIT
 
Camels approach
Vishal Parmar
 
Summary -First Break All The Rules
GMR Group
 
Neonatal Emergencies
Leeann Sills
 
Ad

Similar to How to configure static nat on cisco routers (20)

PPTX
Nat
Elshan86
 
PDF
NAT_Final
Pratik Bhide
 
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
Waqas Ahmed Nawaz
 
PDF
NAT (network address translation) & PAT (port address translation)
Netwax Lab
 
PDF
NAT- Network Address Translation
Eng. Emad Al-Atoum
 
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 11
Nil Menon
 
PPTX
Network address translations
Shahzad shareef
 
PPTX
CCNA2 Verson6 Chapter9
Chaing Ravuth
 
PPT
Day 17.1 nat pat (2)
CYBERINTELLIGENTS
 
PPTX
Ccna rse chp9 nat fo i_pv4
newbie2019
 
PDF
NAT Scneario
Mansour Naslcheraghi
 
PPT
Nat pat
CYBERINTELLIGENTS
 
PDF
Chapter 5-Network Address Translation.pdf
Buntha Chhay
 
PDF
Network Address Translation (NAT)
Joud Khattab
 
PDF
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
Vuz Dở Hơi
 
PPTX
Rs instructor ppt_chapter11_final
let's go to study
 
PPTX
Chapter 22 : network address translation for IPv4
teknetir
 
PPT
Chapter11ccna
ernestlithur
 
PPT
Chapter11ccna
robertoxe
 
PPTX
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
 
NAT_Final
Pratik Bhide
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
Waqas Ahmed Nawaz
 
NAT (network address translation) & PAT (port address translation)
Netwax Lab
 
NAT- Network Address Translation
Eng. Emad Al-Atoum
 
CCNA 2 Routing and Switching v5.0 Chapter 11
Nil Menon
 
Network address translations
Shahzad shareef
 
CCNA2 Verson6 Chapter9
Chaing Ravuth
 
Day 17.1 nat pat (2)
CYBERINTELLIGENTS
 
Ccna rse chp9 nat fo i_pv4
newbie2019
 
NAT Scneario
Mansour Naslcheraghi
 
Chapter 5-Network Address Translation.pdf
Buntha Chhay
 
Network Address Translation (NAT)
Joud Khattab
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
Vuz Dở Hơi
 
Rs instructor ppt_chapter11_final
let's go to study
 
Chapter 22 : network address translation for IPv4
teknetir
 
Chapter11ccna
ernestlithur
 
Chapter11ccna
robertoxe
 
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
 
Ad

More from IT Tech (20)

DOCX
Cisco ip phone key expansion module setup
IT Tech
 
DOCX
Cisco catalyst 9200 series platform spec, licenses, transition guide
IT Tech
 
DOCX
Cisco isr 900 series highlights, platform specs, licenses, transition guide
IT Tech
 
DOCX
Hpe pro liant gen9 to gen10 server transition guide
IT Tech
 
DOCX
The new cisco isr 4461 faq
IT Tech
 
DOCX
New nexus 400 gigabit ethernet (400 g) switches
IT Tech
 
DOCX
Tested cisco isr 1100 delivers the richest set of wi-fi features
IT Tech
 
DOCX
Aruba campus and branch switching solution
IT Tech
 
DOCX
Cisco transceiver module for compatible catalyst switches
IT Tech
 
DOCX
Cisco ios on cisco catalyst switches
IT Tech
 
DOCX
Cisco's wireless solutions deployment modes
IT Tech
 
DOCX
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
IT Tech
 
DOCX
Four reasons to consider the all in-one isr 1000
IT Tech
 
DOCX
The difference between yellow and white labeled ports on a nexus 2300 series fex
IT Tech
 
DOCX
Cisco transceiver modules for compatible cisco switches series
IT Tech
 
DOCX
Guide to the new cisco firepower 2100 series
IT Tech
 
DOCX
892 f sfp configuration example
IT Tech
 
DOCX
Cisco nexus 7000 and nexus 7700
IT Tech
 
DOCX
Cisco firepower ngips series migration options
IT Tech
 
DOCX
Eol transceiver to replacement model
IT Tech
 
Cisco ip phone key expansion module setup
IT Tech
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
IT Tech
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
IT Tech
 
Hpe pro liant gen9 to gen10 server transition guide
IT Tech
 
The new cisco isr 4461 faq
IT Tech
 
New nexus 400 gigabit ethernet (400 g) switches
IT Tech
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
IT Tech
 
Aruba campus and branch switching solution
IT Tech
 
Cisco transceiver module for compatible catalyst switches
IT Tech
 
Cisco ios on cisco catalyst switches
IT Tech
 
Cisco's wireless solutions deployment modes
IT Tech
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
IT Tech
 
Four reasons to consider the all in-one isr 1000
IT Tech
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
IT Tech
 
Cisco transceiver modules for compatible cisco switches series
IT Tech
 
Guide to the new cisco firepower 2100 series
IT Tech
 
892 f sfp configuration example
IT Tech
 
Cisco nexus 7000 and nexus 7700
IT Tech
 
Cisco firepower ngips series migration options
IT Tech
 
Eol transceiver to replacement model
IT Tech
 

Recently uploaded (20)

PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
July Patch Tuesday
Ivanti
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 

How to configure static nat on cisco routers

  • 1. How to Configure Static NAT on Cisco Routers? Network Address Translation (NAT) is an operation by which source and/or destination IP addresses within a packet are replaced with different IP addresses. NAT conserves available IP address space by allowing many private IP addresses to be represented by some smaller number of public IP addresses. Private IP addresses are defined in RFC 1918 and are addresses that cannot be used on the Internet. NAT is most commonly performed by routers or firewalls; however this tutorial focuses on NAT within Cisco routers. NAT can be performed both statically and dynamically. Static NAT simply maps one private IP address to a single public IP address, and this is the flavor of NAT we are discussing in this tutorial. A Cisco router performing NAT divides its universe into the inside and the outside. Typically the inside is a private enterprise, and the outside is the public Internet. In addition to the notion of inside and outside, a Cisco NAT router classifies addresses as either local or global. A local address is an address that is seen by devices on the inside, and a global address is an address that is seen by devices on the outside. Given these four terms, an address may be one of four types: 1. Inside local addresses are assigned to inside devices. These addresses are not advertised to the outside. 2. Inside global are addresses by which inside devices are known to the outside. 3. Outside local are addresses by which outside devices are known to the inside. 4. Outside global addresses are assigned to outside devices. These addresses are not advertised to the inside. Let’s jump right into NAT configuration on a Cisco router as shown in the Figure below: R1 is the router performing Network Address Translation (NAT) and has two
  • 2. interfaces: Fa0/0 on the inside and Fa0/1 on the outside. The specific IP addresses involved are: Table 1 NAT Addresses for Figure Above NAT Address Type IP Address Inside local 192.168.1.2 Inside global 89.203.12.47 Outside local 202.14.35.28 Outside global 202.14.35.28 You probably know very well how to configure IP addresses on router interfaces, so we skip those configuration steps and move straight to the interesting stuff. First, we have to assign Fa0/0 as NAT inside interface and Fa0/1 as NAT outside interface on R1. This would tell the router that interesting traffic entering or exiting these two interfaces will be subject to address translation. R1#conf term Enter configuration commands, one per line. End with CNTL/Z. R1(config)#interface Fa0/0 R1(config-if)#ip nat inside R1(config-if)#interface Fa0/1 R1(config-if)#ip nat outside R1(config-if)#end Now we would tell the router how to perform address translation and mention which IP addresses (source or destination) to re-write in packets moving between the inside and outside interfaces. Here we go: R1(config)#ip nat inside source static 192.168.1.2 89.203.12.47 Here, we are telling the router to perform NAT on packets coming into the router on the inside interface Fa0/0. More specifically the router would identify which of these packets have a source IP address of 192.168.1.2 and would change it to 89.203.12.47 before forwarding the packet out the outside interface Fa0/1. Similarly, return packets coming in at outside interface Fa0/1 would undergo translation of destination IP address. Let’s now verify if NAT is actually working as it is supposed to work. There are a couple of very useful Cisco IOS commands that can be used to do just that. Command show ip nat statisticsdisplays the number of static and dynamic NAT translations, inside and outside interfaces, and the number of hits and misses. R1#show ip nat statistics Total active translations: 1 (1 static, 0 dynamic; 0 extended) Outside interfaces: FastEthernet0/1 Inside interfaces:
  • 3. FastEthernet0/0 Hits: 0 Misses: 0 CEF Translated packets: 0, CEF Punted packets: 0 Expired translations: 0 Dynamic mappings: Appl doors: 0 Normal doors: 0 Queued Packets: 0 Command show ip nat translations displays the IP addresses for NAT translations. R1#show ip nat translations Pro Inside global Inside local Outside local Outside global — 89.203.12.47 192.168.1.2 — — As you see in the above output, we have one NAT entry configured with Inside global address 89.203.12.47 and Inside local address 192.168.1.2 specified. Outside local and Outside globaladdresses are blank because our NAT configuration does not change those addresses. Let’s now go to the PC and ping the Server before running the command show ip nat translations again to see if it makes any difference. R1#show ip nat statistics Total active translations: 2 (1 static, 1 dynamic; 1 extended) Outside interfaces: FastEthernet0/1 Inside interfaces: FastEthernet0/0 Hits: 10 Misses: 0 CEF Translated packets: 10, CEF Punted packets: 0 Expired translations: 0 Dynamic mappings: Appl doors: 0 Normal doors: 0 Queued Packets: 0 R1#show ip nat translations Pro Inside global Inside local Outside local Outside global icmp 89.203.12.47:1 192.168.1.2:1 202.14.35.28:1 202.14.35.28:1 — 89.203.12.47 192.168.1.2 — — As you can see in the above output, NAT is active as manifested by the appearance of an additional dynamic entry for ICMP protocol and some additional hits, corresponding to our ping attempt from PC to Server.
  • 4. We just configured and verified a simple NAT scenario translating only the source or destination (not both at the same time) IP addresses of packets moving between inside and outside interfaces. This sort of NAT configuration is called static NAT as a single inside local IP address is statically mapped to a single outside local IP address. Another important feature of NAT is static Port Address Translation (PAT). Static PAT is designed to allow one-to-one mapping between local and global addresses. A common use of static PAT is to allow Internet users from the public network to access a Web server located in the private network. Let’s assume we intend to host a Web server on the inside on the same PC, that has an IP address 192.168.1.2. The following configuration line would allow us to do just that: R1(config)#ip nat inside source static tcp 192.168.1.2 80 89.203.12.47 80 This configuration line performs the static address translation for the Web server. With this configuration line, users that try to reach 89.203.12.47 port 80 (www) are automatically redirected to 192.168.1.2 port 80 (www). In our case, 192.168.1.2 is the IP address of the PC which is also the Web server. This configuration can be verified using the same two NAT verification commands: show ip nat translations and show ip nat statistics. Notice that the address 89.203.12.47 with port number 80 (HTTP) translates to 192.168.1.2 port 80, and vice versa. Therefore, Internet users can browse the Web server even though the Web server is on a private network with a private IP address. More Related NAT Tips: How to Configure Basic NAT with Overloading? How to Configure Static NAT for Inbound Connections? How to Configure NAT in Cisco IOS? How to Set up NAT Using the Cisco IOS?