Compare cert salaries and plan your next career move
WonR wrote: » Router looks up the destination IP address (55.55.55.5) in the routing table, and finds it to be directly connected. Router looks up in ARP table, and it's not there. So it sends out broadcast to all ports except the port that it came in from, which is same port that 55.55.55.5 is located. Obviously, it cannot find 55.55.55.5
Priston wrote: » What's your topology? Can you ping the local address of the webserver?
WonR wrote: » Here is what I think is happening. By the way, WAN is on ethernet, not serial(no HDLC or PPP). I THINK THIS IS THE PROBLEM. I tried it with Seridal HDLC, and it works just fine. The packet will go out to WAN interface; next hop router will direct the packet back into WAN interface and NAT will translate it local address, then switch forwards frame to original host.
Forsaken_GA wrote: » post the entire config for that router. If 55.55.55.5 is an assigned address on the router, the internal hosts should be able to ping it just fine, nat or no nat. As soon as it hits the interface that holds the 192.168.0.0/24 gateway, the router should go 'hey, that's me!' and reply back. Your traffic shouldn't be NAT'd until it's actually going to transit out that interface, until that point, it's still internal traffic, so it should work fine, unless you don't have a route back to the source, or you've got something blocking icmp
Priston wrote: » 55.55.55.5 is not an assigned address on his router, 55.55.55.2 is.
WonR wrote: » Router#sho arp Protocol Address Age (min) Hardware Addr Type Interface Internet 55.55.55.5 - Incomplete ARPA FastEthernet0/1 Internet 55.55.55.1 4 00D0.58C9.8201 ARPA FastEthernet0/1 Internet 55.55.55.2 - 0060.47C4.EE02 ARPA FastEthernet0/1 Internet 192.168.0.1 - 0060.47C4.EE01 ARPA FastEthernet0/0 Internet 192.168.0.10 15 0009.7C1C.55E4 ARPA FastEthernet0/0 Internet 192.168.0.100 15 0007.ECB4.C786 ARPA FastEthernet0/0 as you can see 55.55.55.5 shows incomplete.
WonR wrote: » @Forsaken_GA Thanks for your reply, and you explained it way better than I could. I actually have this setup in SonicWall environment. I needed 2 NAT policies to accomplish this. (1) This takes care of traffic from outside (X1) 1-1 static NAT that is equivalent to what I have on this thread : ip nat inside source static 192.168.0.10 55.55.55.5 SAME AS (2) This takes care of traffic from inside to 55.55.55.5 Source Original : ANYSource Translated : X1 IP (55.55.55.2) Destination Original : 55.55.55.5 Destination Translated : 192.168.0.10 Service Original : ANY Service Translated : ORIGINAL Interface Inbound : X0 (LAN) Interface Outbound : ANY Part of above policy states, for any X0(LAN) traffic to 55.55.55.5, source address will be translated to X1(WAN). So it looks like traffic is coming in from WAN port rather than LAN port. This should take care of the ARP issue for 55.55.55.5 WHAT IS THE EQUAVALENT CISCO NAT STATEMENT??? Thanks!!! *FYI, I also needed ACL to allow traffic from WAN(X1) to LAN(X0) that have destination to 55.55.55.5 in SonicWall. This was necessary since SonicWall is a firewall*
Forsaken_GA wrote: » Ok, this is the point at which I stop, because this is looking more and more like deployment, and not study. For a more thorough understanding of Cisco NAT, I'd recommend you check Cisco's website for deployment guides, or lay hands on a copy of Routing TCP/IP, Vol. 2
WonR wrote: » You're hurting my feelings. I've put in my dues on studying and getting myself certified with papers. This thread has plenty of information regarding how ethernet switching differs from routing, and topics of NAT which you must understand in order for you work with any network equipments, not alone pass CCNA. Actually this thread goes way deeper than what you need to know to pass CCNA. Perhaps, I'm in wrong forum. Thank you for all your inputs.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.