S6C11 - NAT Network Security Translation. NAT Described Globally unique ONLY in terms of public internet –Translates private addresses into publicly usable.

Slides:



Advertisements
Similar presentations
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Network Address Translation for IPv4  Connecting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture15: Network Address Translation for IPv4 Connecting Networks.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
© 2002, Cisco Systems, Inc. All rights reserved..
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CCNA 4 version 3.0.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CCNA 4 version 3.0 Rick Graziani Cabrillo College.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Scaling the Network with NAT and PAT.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CMPSC-358 (CCNA 4 ) Spring 2007.
M. Dahshan - TCOM52721 TCOM 5272 Telecomm Lab Dr. Mostafa Dahshan OU-Tulsa 4W 2 nd floor
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Sybex CCNA Chapter 11: Network Address Translation Instructor & Todd Lammle.
© 2003, Cisco Systems, Inc. All rights reserved. ICND v2.1—4-1 © 2003, Cisco Systems, Inc. All rights reserved. 1 Scaling the Network with NAT and PAT.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Sybex CCENT Chapter 13: Network Address Translation Instructor & Todd Lammle.
Andrew Smith 1 NAT and DHCP ( Network Address Translation and Dynamic Host Configuration Protocol )
4: Addressing Working At A Small-to-Medium Business or ISP.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Scaling the Network with NAT and PAT.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Address Translation
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
NAT (Network Address Translation) Natting means "Translation of private IP address into public IP address ". In order to communicate with internet we must.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Introduction to Network Address Translation
© Synergon Informatika Rt., 1999 Chapter 16 Configuring Bandwidth on Demand.
CS 540 Computer Networks II Sandy Wang
Mr. Mark Welton.  Firewalls are devices that prevent traffic from entering or leaving a network  Firewalls are often used between networks, or when.
Network Address Translations Project no. : 12 Prof. Edmund Gean Presented by DhruvaPatel( ) Sweta Patel( ) Rushika Patel ( ) Guided.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning the Addressing Structure Working at a Small-to-Medium Business.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 1 Scaling IP Addresses.
CCNA 4 v3.1 Module 1 Scaling IP Addresses
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
Configuring NAT and PAT Chapter 18 powered by DJ 1.
1 © 2004, Cisco Systems, Inc. All rights reserved. Scaling IP Addresses Network Address Translation(NAT)
Scaling Networks with Network Address Translation Scaling Networks with Network Address Translation Solutions for IPv4 Security and Scalability ECPI College.
NAT & PAT Network Address Translation Port Address Translation.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—6-1 Lesson 6 Translations and Connections.
N ETWORK S ECURITY Network Address Translation. C ONTENTS What is NAT NAT Terminology How NAT works NAT translation Dynamic, static and overloading Advantages.
NAT/PAT by S K SATAPATHY
1 Pertemuan 14 Scaling Networks with NAT and PAT.
CCNA4-1 Chapter 7-1 IP Addressing Services Scaling Networks With Network Address Translation (NAT)
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
CCNA4-1 Chapter 7-1 NAT Chapter 11 Routing and Switching (CCNA2)
Planning the Addressing Structure
© 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing Services Part I
Chapter 13 Network Address Translation
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
Network Address Translation
Instructor Materials Chapter 9: NAT for IPv4
NAT / PAT.
Routing and Switching Essentials v6.0
NAT , Device Discovery Chapter 9 , chapter 10.
CIS 82 Routing Protocols and Concepts Chapter 11 NAT
Routing and Switching Essentials v6.0
NAT / PAT.
Cabrillo College Building Cisco Remote Access Network
Instructor Materials Chapter 9: NAT for IPv4
Planning the Addressing Structure
Planning the Addressing Structure
Planning the Addressing Structure
Chapter 11: Network Address Translation for IPv4
Prepared by :Adeel Ahmad
Sybex CCNA Chapter 11: Network Address Translation.
Presentation transcript:

S6C11 - NAT Network Security Translation

NAT Described Globally unique ONLY in terms of public internet –Translates private addresses into publicly usable addresses to be used on public Internet Saves usable IP addresses –Effective means for hiding actual device addressing within a private network Aka Network Address Translator –defined in RFC 1631

NAT and PAT NAT Translation –NAT box can be a Cisco router, a UNIX system, a Windows XP server, or several other kinds of systems. router looks inside the IP header and, if appropriate, replaces the local IP address with a globally unique IP address When an outside host sends a response the NAT router receives it, checks the current table of network address translations, and replaces the destination address with the original inside source address Port Address Translation – allows the user to conserve addresses in the global address pool by allowing source ports in TCP connections or UDP conversations to be translated. Different local addresses then map to the same global address

PAT Limitations As long as the inside global port numbers are unique for each inside local host, NAT overload will work. NAT overload can go a long way to alleviate address depletion, but its capabilities are limited A realistic number is approximately 4,000 local addresses per global address. Each Nat translation consumes about 160 bytes of router DRAM.

Static Translation Translates inside local addresses Establishes a mapping between inside local and global addresses –Configured statically, one entry at a time – for every inside local address, static NAT requires an inside global address – typically used in conjunction with dynamic NAT, in cases where you have overlapping networks RTA(config)#ip nat inside source static Specify an inside and outside interface –RTA(config)#interface bri0 –RTA(config-if)#ip nat outside –RTA(config-if)#interface e0 –RTA(config-if)#ip nat inside

Dynamic Translation Translates inside local addresses –Establishes a mapping between inside local and global addresses Mappings configured dynamically by the router as needed – translations don't exist in the NAT translation table until the router receives traffic that requires translation (such traffic is defined by an administrator). Dynamic translations are temporary, and will eventually time out.

Configuration for Dynamic Create a pool of IP addresses to be allocated as needed –Router(config)#ip nat pool name start-ip end-ip netmask netmask | prefix-length prefix-length} Specify which addresses to translate –router(config)#access-list access-list-number permit source [source-wildcard] establish a dynamic translation based on source –Router(config)#ip nat inside source list access-list- number pool name Configure at least one inside interface & 1 outside –Router(config-if)#ip nat inside –Router(config-if)#ip nat outside

Why Dynamic? Although NAT is not a security firewall, it can prevent outsiders from initiating connections with inside hosts, unless a permanent global address mapping exists in the NAT table (static NAT). Because outside hosts never see the "pre-translated" inside addresses, NAT has the effect of hiding the inside network structure.

Address Definitions Inside local – IP address assigned to a host on inside network Inside global – A legitimate IP address (assigned by NIC or service provider) that represents local IP address to outside world Outside local – IP address of outside host as it appears to inside network; allocated from inside addressable routable space Outside global – IP address assigned to a host on outside network by owners; allocated from globally routable address space

NAT and Address Overlapping NAT can resolve address issues when inside addresses overlap with addresses in outside network –When two companies with similar address structures merge –When ISPs are swapped & another client has same address structure

Overload Configuration Configure NAT overload by using the keyword overload : –Router(config)#ip nat inside source list access-list-number pool name overload RTA is configured – RTA(config)#ip nat pool mypatpool netmask –RTA(config)#access-list 24 permit –RTA(config)#ip nat inside source list 24 pool mypatpool overload –RTA(config)#interface bri 0 RTA(config-if)#ip nat outside –RTA(config-if)#interface ethernet 0 RTA(config-if)#ip nat inside

Overload Alternative You can overload the address of an outside interface –Router(config)#ip nat inside source list access- list-number interface interface-name overload Config# ip nat inside MyPool access-list-2 int s0 overload

Information Needed ISDN –Switch type, Spids, directory number (local seven digit ISDN phone number of router) ISP –PPP Client Name (ISP assigns as login name –PPP Authentication type and password –IP address information – (includes subnet mask) used in router’s public address pool –ISP phone number

Atlanta Configuration Default/Generic IP subnet-zero No IP domain-look Enable secret cisco IP NAT translation timeout 1800 Isdn switch-type basic-ni1 IP classless IP http server Line con 0line vty 0 4 Password ciscopassword telnet Loginlogin

Atlanta Configuration Hostname Atlanta IP net inside source list 1 int d0 overload Ip nat inside source statis Int e0 Ip address Ip nat inside

Atlanta Continued - Bri Int bri 0 No ip address Encap ppp Dialer rotary-group 0 Isdn spid Isdn spid

Atlanta Continued - dialer Int d0 IP address IP nat outside Encap ppp Dialer in-band Dialer idle-timeout 200 Dialer string class 56K Dialer hold queue 10 Dialer load-threshold 200 either Dialer-group 1

Atlanta Dialer Cont’d PPP authentication chap callin PPP chap hostname Atlanta PPP chap password gocisco1 PPP multilink

Atlanta Continued – Map Class and Routes IP route Dialer0 IP route Map-class dialer 56K Access-list 1 permit Access-list 1 permit Dialer-list 1 protocol IP permit

Boston Configuration Hostname Boston Int e0 Ip address Int e1 IP address IP route IP http server Line con0line vty 0 Password ciscopassword telnet Loginlogin

TCP Load Distribution Define a pool of addresses containing the addresses of the real hosts: – Router(config)#ip nat pool name start-ip end-ip {netmask netmask | prefix-length prefix-length} type rotary Define an access list permitting the address of the virtual host: – Router(config)#access-list access-list-number permit source [source-wildcard] Establish dynamic inside destination translation, identifying the access list defined in Step 2: –Router(config)#ip nat inside destination list access-list- number pool name

TCP Continued Specify the inside interface: –Router(config)#interface type number Mark the interface as connected to the inside: – Router(config-if)#ip nat inside Specify the outside interface: –Router(config-if)#interface type number Mark the interface as connected to the outside: –Router(config-if)#ip nat outside

NAT Advantages Conserves the legally registered addressing scheme by allowing the privatization of intranets reduces the instances in which addressing schemes overlap Increases the flexibility of connection to the public network. –Multiple pools, backup pools, and load sharing/ balancing pools can be implemented to help ensure reliable public network connections De-privatization of a network –NAT allows the existing scheme to remain, and it still supports the new assigned addressing scheme outside the private network.

NAT Disadvantages NAT increases delay. –Switching path delays, of course, are introduced because of the translation of each IP address within the packet headers Loss of end-to-end IP traceability Forces some applications that use IP addressing to stop functioning because it hides end-to-end IP addresses –Solution -- implement static NAT mappings.

Supported Traffic Types Any TCP/UDP traffic that does not carry source or destination IP addresses in the application data stream Hypertext Transfer Protocol (HTTP) Trivial File Transfer Protocol (TFTP) Telnet Archie Finger Network Timing Protocol (NTP) Network File System (NFS) rlogin, rsh, rcp

More Supported Types Even those that do carry address data in data stream -File Transfer Protocol (FTP) (including PORT and PASV commands) – NetBIOS over TCP/IP (datagram, name, and session services) – Progressive Networks' RealAudio White Pines' CuSeeMe –Xing Technologies' Streamworks –DNS "A" and "PTR" queries –H.323/NetMeeting [12.0(1)/12.0(1)T and later] –VDOLive [11.3(4)11.3(4)T and later] –Vxtreme [11.3(4)11.3(4)T and later] –IP multicast [12.0(1)T] (source address translation only)