NAT

NAT

클래스 별로 사설 IP가 있음

(주소변환이 필요)


 

IP:port - 공인 IP(여러개의 IP가 하나의 공인IP로)

공인IP:port - 공인 IP

(→ 공인 IP를 사용해도됨)


 

internic - krnic - kisa


 

Static NAT: 사설ip와 공인 ip 1대1

> 표준ACL로 먼저 정의를 해주어야함

Dynamic NAT: 다수의 사설 IP와 다수의 공인 IP 1대1

Dynamic NAT-Pat : 다수의 사설 IP 와 1개의 공인 IP(제일 많이씀)


 

Static NAT

Router(config)#ip nat inside source static <inside-local> <inside-global>


 

Dynamic NAT

Router(config)#ip nat inside source(출발지) list <list-number> pool <name>


 

Dynamic NAT-Pat

Router(config)#ip nat inside source(출발지) list <list-number> pool <name> overload


 

공유기 > NAT, DHCP 기능을 가지고 있음


 

서버1 서버2

   

PC1 PC2

 


 

라우터 1)

en

conf t

int f0/0

ip add 10.0.0.254 255.255.255.0

no sh

do wr

int f0/1

ip add 100.100.100.1 255.255.255.248

no sh

do wr

exit

rou os 10

net 10.0.0.0 0.0.0.255 area 10

net 100.100.100.0 0.0.0.7 area 10

pass f0/0

do wr


 

라우터2)

en

conf t

int f0/0

ip add 10.0.1.254

no sh

do wr

int f0/1

ip add 100.100.100.2 255.255.255.248

no sh

do wr

exit

rou os 10

net 10.0.1.0 0.0.0.255 area 10

net 100.100.100.0 0.0.0.7 area 10

pass f0/0

do wr


 

exit

clear ip ospf process

yes


int f0/1

ip os he 40

do wr

int f0/0

ip os he 40

do wr

sh ip os neighbor


 

debug ip ospf events



라우터1)

en

conf t

lin con 0

logg syn

exit

int f0/0

ip nat inside

int f0/1

ip nat outside

exit

ip nat inside source static 10.0.0.1 100.100.100.3

do wr


 

포트포워딩> 고급NAT > DMZ


 

라우터1)

access-list 1 permit 10.0.0.0 0.0.0.255

ip nat pool babo 100.100.100.3 100.100.100.6 netmask 255.255.255.248

ip nat inside source list 1 pool babo


 

라우터2)

en

sh ip nat translations




 

라우터1)

access-list 1

ip nat inside source 1 pool babo

no ip nat pool babo

ip nat pool babo 100.100.100.1 100.100.100.1 netmask 255.255.255.248

access-list 1 permit 10.0.0.0 0.0.0.255

ip nat inside source list 1 pool babo overload

no ip nat inside source list 1 pool babo overload 

int f0/0

no ip nat inside

inf f0/1

no ip nat outside

exit

no ip nat pool babo

no ip int inside source list 1 pool babo overload

no access-list 1

no ip nat pool babo



 

int f0/0

ip nat inside 

exit

int f0/1

ip nat outside

exit

access-list 1 permit 10.0.0.0 0.0.0.255

ip nat pool babo 100.100.100.3 100.100.100.6 netmask 255.255.255.248

ip nat inside source list 1 pool babo

do sh ip nat tr


 

공유기를 사용하면 다이렉트로는 공격불가



 




 



 


 

라우터1

en

conf t

host Seoul_R1

ena se babo

ser p

line con 0

exec 0 0

logg syn

pass babo1

login

line vty 0 4

exec 0 0

logg syn

pass babo2

login

int f0/0

ip add 10.0.0.254 255.255.255.0

no sh

inf f0/1

ip add 200.200.200.1 255.255.255.248

no sh 

do wr


 

rout ei 100

net 10.0.0.0 0.0.0.255

net 200.200.200.0 0.0.0.7

pass f0/0

do wr


 

라우터2

en

conf t

host Busan_R1

ena se babo

ser p

line con 0

exec 0 0

logg syn

pass babo1

login

line vty 0 4

exec 0 0

logg syn

pass babo2

login

int f0/0

ip add 172.16.0.254 255.255.255.0

no sh

int f0/1  

ip add 200.200.200.2 255.255.255.248

no sh

do wr


 

roter ei 100

net 172.16.0.0 0.0.0.255

net 200.200.200.0 0.0.0.7

pass f0/0

do wr


 


 

라우터1

access-list 1 permit 10.0.0.0 0.0.0.255

ip nat pool babo 200.200.200.1 200.200.200.1 netmask 255.255.255.248

int f0/0

ip nat inside

int f0/1

ip nat outside

exit

ip nat inside source list 1 pool babo overload











 

'네트워크' 카테고리의 다른 글

라우터 이중화  (0) 2019.10.04
ACL  (0) 2019.10.04
EIGRP  (0) 2019.10.04
OSPF  (0) 2019.10.04
RIP  (0) 2019.10.04
더보기

댓글,

白柯