6.2.7 Packet Tracer - Investigate NAT Operation

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to world in this video we are going to solve this packet tracer activity investigate net operations before coming to this activity friends if you like to get any ccna online classes or any technical support you can contact our team using our website link you will get from the description below and also if you like to get this type of technical videos in future consider subscribing and don't forget to enable that bell icon so that you will get notification message whenever we upload a new video coming back to this activity here we can see addressing table the following table provides addressing for networking device interfaces only okay here we can see the objectives part one investigate net operation across the intranet in party to investigate net operation across the internet then in part 3 contact further investigations also we will go through the scenario as a frame travels across a network the mac addresses may change ip addresses can also change when a packet is forwarded by a device configured with nat in this activity we will investigate what happens to ip addresses during the net process yes in this activity we are not going to configure any net we are going to investigate net operation okay we will do it one by one part one investigate net operation across the intranet step one wait for the network to converge it might take a few minutes for everything in the network to converge you can speed the process up by clicking fast for forward time so here we can see that option here you can click and you can fast forward time coming to step 2 generate an http request from any pc in the central domain switch it to simulation mode and edit the filters to show only http request now coming to our cisco packet tracer here we can see simulation option click here and here uh we can see visible events only icmp if you have a more number of events then you can click on this show all none so it comes to none we'll go to edit filters and we will choose only this http so we can go to ip misc and we can choose this http here here we can see visible events only http then open the web browser of any pc in the central domain and type the url just i will copy this url and click go minimize the browser window okay just i will close this simulation panel and here we can see central domain we can choose any one of this pc we'll go to pc1 then we'll go to desktop and here we have a web browser and paste that url we copied then click go then we will minimize this pc one window then click capture or forward until the video is over d1 or d2 click on the most recent video in the even list record the source and destination ip actions so here we can see our multi-layer switches d1 and d2 we will click on this capture bar forward so here we can see the packet http packet click again it goes to s1 click again and it goes to d1 to what devices do those addresses belong here we will go to even list and we will choose this packet and here we can see source ip address 10.2.0.4 ip address of this pc pc one then destination ip64.100.200.1 we can verify that from our addressing table and here we can see that address belongs to the interface serial 0 0 1 devices r4 then click capture or forward until the pdu is over r2 record the source and destination ip addresses in the outbound packet so just i will close the simulation panel and we will click on this capture or forward and we can see this packet is in r2 to what devices do those addresses belong okay we will verify that coming to this packet here we will check this out layers or outbound packet and here we can see that's source ip64.100.100.3 and the destination iep 64.100.200.1 so coming to our trusting table uh we will search for this ip address but here we cannot see this source ip address in this addressing table that means which is not assigned to any interface then a destination ip address 64 dot two 100. dot one it's a serial zero slash zero slash one dot one so device is r4 login to r2 from the cli using the password class to enter privileged exec and to issue the following command show running include pool so we will click on r2 cli enable so here the password is class and we will give this a show command and here we can see the output here we can say in this router r2 uh they configured net the attract came from a nat pool that is r2 pool here we can see that range they given so this address we have seen here in this packet a source ip click capture bar forward until the video is over r4 record the source and the destination ip addresses in the outbound packet so here we will click again capture or forward and we can see it goes to this intranet then to this router r4 to what devices do those addresses belong we will click on this packet and we will go to this outliers here we can see that source ip address 64.100.100.3 and this address is from r2 pool which is created in this router r2 okay then we can see this destination ip address 172.16.0.3 the ip address of this branch server we can verify its ip address here we can see 172.16.0.3 it's matching click capture or forward until the video is over branch server.pka record the source and the destination tcp port addresses in the outbound segment again we will click capture or forward it goes to a switch then it goes to branch server now we will go to this packet in outlayers we can see it's a source port it is 80 and a destination port it's a 1026 on both r2 and r4 run the following command and match the ip addresses and the ports are recorded above to the correct line of output so we have to give this command show ipnet translations on router r2 and r4 we will go to r2 and we will give that command show ipnet translations also we will give this command in r4 enable password is class show ipnet translations what do the inside local ip addresses have in common so coming to r2 uh here we can see inside local and here they use a private ip address again coming to r4 and here we can see in cd local 172 16 0.3 so actually we can see they are private ip address and they are reserved for private use did any private addresses cross the internet obviously not here this private address is translated into public iphones click the reset simulation button and remain in simulation model ok here we will go to even list and click on this reset simulation now we will go to part two investigate net operation across the internet step one generate an http request from any computer in the home office open the web browser of any pc in the home office domain and type the url just i will copy this url and click go here just we will close this simulation panel and we will go to that home office here we can see home office we will click on any pc okay we will go to home desktop desktop then web browser then paste that url here then click go click capture bar forward until the pdu is over wrs record the inbound source and destination iep addresses and the outbound source and destination addresses so here we will click on capture or forward so here we can see that packet which goes to wrs to what devices do those addresses belong we will verify that click on this packet and here we can see uh in layers source ip address is 192.168.0.101 the ip address of this home desktop then destination ip address is 64.100.100.2 so we will go to our addressing table and we will check this ip address 64.100.102 here we can see that ip address interface serial 0 0 0 in this device r2 now we will check in out layers here we can see source ip address 64.104.223.2 coming to our addressing table here we can see that address belongs to this device wrs and we can see its destination ip 64.100.102 belongs to this device r2 next click capture or forward until the pdu is over r2 record the source and destination ip addresses in the outbound packet so we will click capture or forward it goes to this modem then to the internet then we can see it goes to r2 to what device do those addresses belong okay we will analyze this packet your outliers we can see this source ip 64.104.223.2 so we will verify this ip address coming to our trusting table here we can see 6410423 that means the source ip belongs to wrs then we can see a destination ip address 10.10.10.2 the ip address of this server central server.pka here we can see that iphs on r2 run the following command and match the ip addresses and the ports recorded above to the correct line of output we have to give this command show ip net translations so we will go to this router r2 and we will give this command again show ipnet translations so we can see a protocol inside global and here we can see inside local the private ip address then outside local also we can see outside global now return to real-time mode did all of the web pages appear in the browsers okay we will go to real time then here we will see pc1 and here we get the webpage branch server then we'll go to home desktop and here we can see we get the webpage central server we will go to part 3 contact further investigations experiment with more packets both http and https and answer the following questions do the net translation tables grow yes obviously it will grow if you try to access the web page or if you do the thing we will have a test we'll go to home laptop web browser and here i will go to this webpage again we'll go to home desktop we will browse that web page then we'll go to r2 and we'll verify our translations and here we can see more entries does wrs have a nat pool of addresses here we can see our wrs and it's obviously not it uses the same ip address for all devices is this how the computers in the classroom connect to the internet we can say mostly and it depends on the organization and we can check that using this method we can access any web page then we have to give this a show command show ipnet translations why does the net use four columns of addresses and the ports so we can see those different addresses inside global inside local then we have outside local and outside global where are the networks are inside global and inside a local so we have seen this inside local the private ipa trust given to uh the intermediate devices as well as these scienti devices so here we can see that inside local the private ip address then we have inside global so this address we set for the van inside here we can see that for the interface serial 0 0 in r2 on which devices are nat services operating what do they have in common we can see they implemented in r2 then this router r4 then here in this home office they implemented in wrs here we can see these devices are connecting these internal devices to the internet or to this intranet here these private iep addresses are not routed in the internet or in the internet so these devices are two r4 and a wrs they will translate this private ip address into public iphones okay that's all in this video investigate net operations next video we will see how to configure static net now dear friends if you have any doubt any suggestions regarding this package or activity please comment below or you can contact our team using our website link you will get from the description below and if you like your video give a thumb and share with all your friends stay tuned and we will meet again with the next video thank you
Info
Channel: Tech Acad
Views: 5,379
Rating: undefined out of 5
Keywords: CISCO, CCNA, Packet Tracer, NAT Operation, Network Address Translation, CCNAv7, Routing and Switching, ENSA
Id: FhZTzcuLMs0
Channel Id: undefined
Length: 19min 7sec (1147 seconds)
Published: Mon Sep 28 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.