networker050184 wrote: » Yes, you can do source NAT, but I have to ask why not re IP and get rid of this big headache?
mzinz wrote: » PS: What is the difference between "ip nat inside source list" and "ip nat outside source list"?
Monkerz wrote: » "ip nat inside" means you are nat'ing from the inside out. With your config it would be from Fa0/0 --> S0/0 "ip nat outside" means the exact opposite. From the outside in. With your config it would be S0/0 --> Fa0/0
Monkerz wrote: » The netmask on your pool wont work, needs to be atleast a /30. Also, you'll need to add a route on the head end for return traffic. "ip route 172.16.99.99 255.255.255.252 X.X.X.X" If you are only worried about traffic being able to leave this location then return, it should work. But if you are wanting the head end to be able to contact a PC within location B, without a prior connection established, you will need to use static nat for all the hosts in location B. And I believe if you want Location B to be able to contact location A you will need to use static nat on both location A and Location B routers. I could be wrong...
mzinz wrote: » I see. How do you NAT all inside IP's to a single outside IP then?
Monkerz wrote: » Router(config)# ip nat inside source static tcp 192.168.10.5 <port> 172.16.99.99 <port> But, I would suggest using a Class C subnet for the statics though, so you don't have to worry with the ports. Are you just limited with space? Only allowed to use 172.16.99.99 and not 172.16.99.0/24?
networker050184 wrote: » You can use a single IP in the pool, just use the overload keyword. If you want the main site reaching devices on the inside then you will need to add the static NATs.
jimmypizzle83 wrote: » x2. this means more work.
mzinz wrote: » I didn't mention this previously, but I'm actually using an Adtran Router, not Cisco (I know, I know). I was looking up how to configure Static NAT in a whitepaper, and noticed that they do "Static NAT Pools". It allows NAT'ing the destination, just like a 1:1 NAT, but for an entire pool. eg: Pinging 192.168.50.20 - When traffic hits the Adtran on the WAN interface, the IP is NAT'd to 192.168.0.20. To accomplish this you create a global-to-local IP pool and apply it to the NAT statement. Does Cisco offer a feature similar to this, or do you need to create several 1:1 NAT's?
chmorin wrote: » What do you want to do? NAT one IP Address to one, or NAT one IP Address to a pool of many? Either way, it is possible. If you want the ladder, you configure a pool for the NAT to pull addresses from. When an address hits, it will NAT to an address in the pool. If you want the former, you use the overload command to configure PAT.
mzinz wrote: » Essentially I want 1:1 NAT in both directions for every IP in the /24 LAN. This is possible with Adtran by creating a "local to global" NAT pool and assigning it to both the inbound NAT and outbound NAT policies. I was wondering if the same is possible with Cisco.
billyr wrote: » Why bother using the pool of addresses with your NAT statement? just link the inside addresses to your outside interface with the overload statement. (PAT) e.g conf t ip access-list standard NAT_Translation permit 192.168.10.0 0.0.0.255 ip nat inside source list NAT_Translation int s0/0 overload int fa0/0 ip address 192.168.10.1 255.255.255.0 ip nat inside int s0/0 ip add x.x.x.x x.x.x.x ip nat outside
Essentially I want 1:1 NAT in both directions for every IP in the /24 LAN. This is possible with Adtran by creating a "local to global" NAT pool and assigning it to both the inbound NAT and outbound NAT policies. I was wondering if the same is possible with Cisco.
Monkerz wrote: » Because he wants a 1:1 translation.
MississippiGuardsman wrote: » What kind of Adtran router? I'm assuming it's a NetVanta model. I work with Adran gear a good bit and may be able to point you in the right direction.