Lab 6‐2: PAT Configuration - AidanP017/Aidan-NET-330 GitHub Wiki
Purpose
In this lab, we configured port address translation (PAT) in a network on Cisco Packet Tracer to allow PCs with private IP addresses to use 30.0.0.120 as their shared public IP address.
Router Configurations
Similar to the processes in Lab 6-1, we configured the router CLIs to set up hostnames and IP addresses. The screenshots below shows configurations for Router 1 and Router 2, respectively.
Then on Router 1, we set the default route to Router 2.
No connectivity should be established as of yet so pinging the external server at 20.0.0.2 from one of the PCs should not return results.
PAT Configuration
Next, we configured PAT on Router 1 to be able to connect to the external server from multiple PCs.
Once again, similar to Lab 6-1, we first defined the FastEthernet0/0 port as the inside of the NAT network and the Serial0/0/0 port as the outside of the NAT network.
Then we created an address pool named "test" that would contain the public IP address to be used by 192.168 clients, with only one IP in the pool being 30.0.0.120.
From there, we created an access list to define which internal IP addresses could use the address pool.
Lastly, we assigned the address pool and access rule to the router with an NAT statement, which would allow 192.168 addresses to be translated to the PAT IP addresses from the address pool when going from the inside of the network to the outside.
If configured correctly, the PCs in the network should be able to ping the external server at 20.0.0.2 as well as access it in a web browser.
Further, we can also verify that PAT is working by going to Router 1 and using the command show ip nat translations
which will display how TCP ports are being used to track connections in the NAT table.
Using Simulation Mode
Although Packet Tracer uses Realtime mode to show the success or failure of pings between devices, using Simulation Mode will provide a more detailed illustration of these pings as traffic packets travel from device to device. The screenshot below shows PC5 pinging the server in Simulation mode.
Looking at one of these packets, users can see important information about the whereabouts of packets, layer details, and associated protocols.
Further, users can filter the protocols to only show packets associated with these protocols specifically. This can be useful for understanding what protocols are relevant for certain functions in the network such as sending pings.