Remote-access Guide

lab 3 assessment implementing nat and allowing remote access

by Prof. Kenyon Green MD Published 2 years ago Updated 1 year ago

How does nat work on the HQ and branch routers?

Specifically, the HQ and Branch routers will be configured to provide inside LAN users with outside public addresses using NAT. The HQ router will also provide static NAT to access the email server from the outside network.

What is pooled Nat and how does it work?

Pooled NAT uses a pool of available outside addresses to dynamically translate inside addresses on a one-to-one basis.

What routers and switches are used in the hands-on labs?

Note: This lab is an exercise in configuring and verifying various methods of NAT and does not reflect networking best practices. Note: The routers and switches used with CCNP hands-on labs are Cisco 4221 and Cisco 3650, both with Cisco IOS XE Release 16.9.4 (universalk9 image).

Required Resources

3 Routers (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)

Instructions

In Part 1, you will set up the network topology and configure basic settings.

Device Configs – Final

R1# show run Building configuration...

Why not configure NAT IPs as VRRP backup IPs in Firewall-1 4.1 SP2?

Do not configure the NAT IPs as VRRP backup IPs in FireWall-1 4.1 SP2, because there are some bugs with the anti-spoofing code.

What IP address do Segment A and Segment B use?

For the browsing that Segment A and Segment B hosts will need, use the firewall's external IP address of 192.168.0.2.

Where are routes stored in Windows 2000?

Note that on Windows NT/2000, if you use the -p flag, the routes are persistent; that is, they are stored in the Registry and will stay there until they are deleted, even after a reboot.

Does Windows NT have ARP?

Windows NT does not have a proxy-ARP facility , so Check Point has included it as part of the software. Create the file %FWDIR%statelocal.arp, and enter the following information:

Is it wise to allow traffic from the Internet all the way into the internal network without some sort of encryption?

Generally speaking, it is not wise to permit traffic from the Internet all the way into the internal network without some sort of encryption . Let's take the following steps to set this up:

Do you have to create network objects for both translated and untranslated objects?

You must create network objects for both translated and untranslated objects as well per Table 9-2.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9