00:04
The next topic of discussion
00:06
is network address translation
00:10
network address. Translation is the process of
00:14
translating or converting
00:16
a private i P address to a public I P address.
00:21
Which brings us to what is a private I P address.
00:25
the International Engineering Task Force has described in the article RFC 1918 and R. C actually stands for request for comments and these air the original
00:41
Ah, that defined protocols and standards in, uh
00:45
in our networking community.
00:47
So oh, SPF has an artist. See, Rip has an RC,
00:51
so our C 1918 describes the ranges of addresses that are not allowed on the Internet.
01:00
So if you hit a service for lighter outer with a source address from the private address range, you'll either get a warning or because the service for a writer is going to think
01:12
that you are trying to do something. Militias. So these addresses are simply just not allowed on the Internet, and they're not globally row doble
01:22
companies. Private companies are allowed to use this address space within their environment. But if they tried to send traffic out to the public Internet, they need to translate to a public address.
01:36
Now these addresses are
01:38
the 10 range 10.0 through 10 to 55255255
01:45
or the 10 slash eight prefix.
01:48
Now, if you ever see address is written like this, do not get confused.
01:53
a lazier way off expressing the 10 Network.
01:57
So, for example, I have Let's see if I have a class less network 1 50
02:09
10 slash 21. I can detect defense this as 1 51 01
02:24
or so This being the I P address this being the network address, I can even shorten it further to 1 51 01 slash 21 leaving out the last two octaves because they're zeroes anyways. So if you ever see
02:42
and address depicted like that, just assumed the rest of the fields are zeros.
02:46
Now that's that. That's the Class A range. In the class B, you have the 1 70 to 16 0021 72 16 31.255255
02:59
with a slash 12 mask or the 1 72 got 16 slash 12 prefix
03:05
prefix just means the length of the mask or the network address, so the network address over here is 1 72 16
03:15
and then they have a Class C range, which goes from 1 90 to 1 68 00 through 1 90 to 1 68 to 55255 Last 16.
03:27
If I were you, I would memorize these addresses because on the test you might be asked to pick between private and public addresses.
03:34
And they usually get people by giving addresses close to the back end of the Class B range.
03:44
to do not we're going to do a lap soon.
03:47
But the easiest way I personally have seen or I personally memorized these issues. Just break it down
03:54
or the configuration. You break it down into four steps. Four simple steps.
04:01
let's say you work at a company and they're using private addresses, and now you need to go to the public Internet to do business,
04:12
and somebody gets assigned to go by public addresses. So the point I'm trying to make here is that you have to row purchase Ah, pool
04:20
off public address is now The pool could be 254 addresses, 50 addresses or maybe just one address
04:30
now the corner case of the pool being one address we'll explore
04:35
But the bottom line being initially when you want to go on the Internet and your your private firm needs to do business on the Internet or go through the Internet to another private company on the other side of the Internet. In another country,
04:51
you need to create a pool of public addresses on your outer.
04:56
You purchase these addresses
04:58
and let's say our pool when we do our lab,
05:01
let's make our pool.
05:03
Let's say we went and got the 1 90
05:13
That's a pretty big pool. It doesn't really work out like that in the real world, and we'll explore a really world scenario in a bit. But let's first understand how networks before we get into more complicated scenarios.
05:27
So this command is that I should stay on this side of the board, the commands in taxes.
05:32
I'd be not pool from CONFIG mode
05:35
and the pool name. Simply name the pool. We can call it C CNN.
05:41
Then you're assigned the first address. So from the 1 90 10 10 0 slash 24 range, the first address will simply be
05:49
Then the key word net mask
05:51
and then the summit.
05:55
And our subject mask in this case is
05:57
Well, now the first address. Sorry. 1 90 10 10 1 That goes here. Then the last address, which is 1 90 10 10 dot
06:08
254 dot to 55 being my broadcast.
06:15
So the last address goes here
06:19
Then the key word in that mask
06:21
and then the sub net mass, which will be 2552552550
06:29
After that, Step two is to permit your private address translation using an access control list.
06:36
So I actually have to allow Tell the router. Hey, allow these private addresses into translation. Allow them to get translated.
06:46
So for that, I simply use a standard access list
06:49
and I created using the I P access list standard and then give it a name command. We can call it Cisco.
06:59
you will always permit You're not going to deny, but the commands in text four Access control, this is comm permit or deny.
07:05
Forgot this little bracket here.
07:08
So you will permit, in this case, always
07:14
So let's say our private network is the 10 10 10 0 network.
07:19
So the network address will go here and then the wild card, which, if it's the last 24
07:30
then the next step Step three stewards simply tie step one and step here together
07:34
with the I've bean at inside source list. So it's basically asking if you read the command sent Texas asking, I mean, that I'm gonna do not using the inside source access list
07:46
inside source list. And our list was called.
07:50
I believe I called it. See CNN or no Cisco.
07:54
So the name, whatever name I put here in my access list goes here
08:00
And then the pooling,
08:01
which I believe we chose SEC. And
08:05
so our pool C CNN access list is
08:09
and then the keyword overload. We're gonna ignore this for now. As I said when we explore,
08:15
uh, Maur, um, real world scenario, we will look at this key word.
08:20
So for now, you'll just hit Enter,
08:24
then you have to go apply. You're not.
08:31
Let's just say you have a rounder
08:39
and you have f zero slash one on this side and F zero slash zero. Understand?
08:46
And let's say this and faces your domain. So this is
08:54
And let's say F 00 faces the Internet
09:00
or your service provider router,
09:01
so this would be your inside interface and this guy as your zero would be your outside interface.
09:13
by basically going inside each of these interface by saying interface in the face I D. So, for example, if I was going under
09:20
the inside into face, I would say I nt f zero slash one, in this case above.
09:26
And then I would simply say, I mean that inside on f zero slash one, and then I would go into ab zero slash zero and say I be not outside
09:37
now to check my work. Once traffic has passed through my translating router,
09:43
I would do the command or execute the command show I p Nat translations
09:48
and if for some reason I wanted to clear those translations out. My command would be clear. I mean act translations. Actually, there's a star after that. Clear I p Nat Translations star.
10:01
This concludes the lecture part, but let's go see how this works in the lab.