All language subtitles for Free-CCNA-NAT-Part-1-Day-44-CCNA-200-301-Complete-Course_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,040 --> 00:00:07,520 Welcome to Jeremy’s IT Lab. This is a free,\xa0\n 2 00:00:07,519 --> 00:00:12,800 videos, please subscribe to follow along with the\xa0\n 3 00:00:12,800 --> 00:00:16,640 and share the video to help spread this\xa0\n 4 00:00:17,920 --> 00:00:24,000 In this video we will cover NAT, Network Address\xa0\n 5 00:00:24,000 --> 00:00:30,480 CCNA exam and for real-world network engineering.\xa0\n 6 00:00:31,120 --> 00:00:38,719 destination IP address of a packet to a different\xa0\n 7 00:00:38,719 --> 00:00:44,879 which says you must be able to configure and\xa0\n 8 00:00:46,560 --> 00:00:51,679 Here’s what we’ll cover in this video. First,\xa0\n 9 00:00:52,479 --> 00:00:56,239 These are IP addresses which you are\xa0\n 10 00:00:56,240 --> 00:01:02,880 and which don’t have to be globally unique. Then\xa0\n 11 00:01:02,880 --> 00:01:08,079 I’ll cover one type of NAT you need to know for\xa0\n 12 00:01:09,200 --> 00:01:14,480 This video will be part 1 of NAT. I’ve\xa0\n 13 00:01:14,480 --> 00:01:18,560 instead of one long video, because it’s an\xa0\n 14 00:01:19,920 --> 00:01:24,480 So, in Day 45 I will cover some additional\xa0\n 15 00:01:25,359 --> 00:01:28,959 As always, watch until the end of the\xa0\n 16 00:01:28,959 --> 00:01:33,280 from Boson Software’s ExSim, the\xa0\n 17 00:01:34,480 --> 00:01:37,280 First let me introduce private IPv4 addresses.\xa0\xa0 18 00:01:38,319 --> 00:01:43,199 This is review from the IPv6 videos in\xa0\n 19 00:01:43,200 --> 00:01:46,960 enough addresses for all devices that\xa0\n 20 00:01:48,159 --> 00:01:53,679 The long-term solution to this problem is to\xa0\n 21 00:01:53,680 --> 00:02:01,440 the world from IPv4 to IPv6 is no simple task. So,\xa0\n 22 00:02:01,439 --> 00:02:06,560 are some short-term solutions to this problem,\xa0\n 23 00:02:06,560 --> 00:02:12,159 quite a lot. The first one, which you already\xa0\n 24 00:02:13,120 --> 00:02:18,640 With CIDR we can forget about the rigid IPv4\xa0\n 25 00:02:18,639 --> 00:02:24,639 length with any address, no need to think about\xa0\n 26 00:02:24,639 --> 00:02:33,119 solutions which I will cover in this video.\xa0\n 27 00:02:33,120 --> 00:02:39,840 the following IPv4 address ranges as private.\xa0\n 28 00:02:39,840 --> 00:02:45,200 Request For Comments. These are the documents\xa0\n 29 00:02:46,000 --> 00:02:51,520 I’ve mentioned that once or twice before I think,\xa0\n 30 00:02:51,520 --> 00:03:01,680 private IPv4 address range is 10.0.0.0/8,\xa0\n 31 00:03:02,639 --> 00:03:12,719 The second one is 172.16.0.0/12, which\xa0\n 32 00:03:13,840 --> 00:03:23,199 Finally there is 192.168.0.0/16, which\xa0\n 33 00:03:23,840 --> 00:03:28,560 You probably recognize these address ranges,\xa0\n 34 00:03:28,560 --> 00:03:33,520 networks and labs. So, they specified\xa0\n 35 00:03:34,319 --> 00:03:40,639 one range of addresses from class B, and one range\xa0\n 36 00:03:40,639 --> 00:03:48,159 you will be thinking ‘why is the class B range\xa0\n 37 00:03:48,159 --> 00:03:55,919 range /16? Isn’t class C /24’? The answer to those\xa0\n 38 00:03:56,479 --> 00:04:07,039 172.16.0.0/12 just specifies a range of\xa0\n 39 00:04:07,599 --> 00:04:11,840 and you’re free to divide up those addresses\xa0\n 40 00:04:13,439 --> 00:04:23,920 Likewise, 192.168.0.0/16 just specifies a range\xa0\n 41 00:04:24,480 --> 00:04:27,840 and once again you are free to divide\xa0\n 42 00:04:28,959 --> 00:04:35,039 In any case, don’t be too attached to the concept\xa0\n 43 00:04:35,040 --> 00:04:41,920 uses CIDR, Classless Inter-Domain Routing,\xa0\n 44 00:04:41,920 --> 00:04:47,600 So, those are the private IPv4 address ranges. You\xa0\n 45 00:04:47,600 --> 00:04:54,000 they don’t have to be globally unique. In fact, if\xa0\n 46 00:04:54,000 --> 00:04:58,639 it’s almost certainly using a\xa0\n 47 00:04:58,639 --> 00:05:07,519 my PC has the IP address 192.168.0.167, and\xa0\n 48 00:05:08,639 --> 00:05:13,680 Your PC might have the exact same IP address as\xa0\n 49 00:05:13,680 --> 00:05:21,680 192.168.0.0/24. Now, here’s an important point.\xa0\n 50 00:05:21,680 --> 00:05:28,879 Internet. Your ISP, Internet Service Provider,\xa0\n 51 00:05:29,839 --> 00:05:34,000 You may be wondering, if the private IP\xa0\n 52 00:05:34,000 --> 00:05:40,000 how can I access the Internet from my PC?\xa0\n 53 00:05:40,879 --> 00:05:50,319 On the left is my PC, 192.168.0.167, connected\xa0\n 54 00:05:50,319 --> 00:05:55,040 Internet there is another PC connected to a\xa0\n 55 00:05:55,759 --> 00:06:01,360 Without NAT, there are two big problems here.\xa0\n 56 00:06:02,240 --> 00:06:07,920 If there is a packet traveling over the Internet\xa0\n 57 00:06:08,560 --> 00:06:13,439 which PC will it go to? My PC? Or the\xa0\n 58 00:06:14,240 --> 00:06:19,920 So, that’s a problem. Another problem is that\xa0\n 59 00:06:19,920 --> 00:06:26,000 Internet, so the PCs can’t access the Internet.\xa0\n 60 00:06:27,279 --> 00:06:31,919 Although the PCs and the routers’ internal\xa0\n 61 00:06:32,560 --> 00:06:39,439 perhaps my router’s external interface has the\xa0\n 62 00:06:39,439 --> 00:06:47,199 router has the public IP address 203.0.113.5. This\xa0\n 63 00:06:47,199 --> 00:06:53,519 aren’t unique, the public IP addresses must be\xa0\n 64 00:06:53,519 --> 00:06:59,680 over the Internet, NAT will allow it to borrow the\xa0\n 65 00:06:59,680 --> 00:07:06,560 public IP address I have configured for NAT. In\xa0\n 66 00:07:06,560 --> 00:07:11,839 home can use that same single public IP address\xa0\n 67 00:07:12,959 --> 00:07:19,519 So my PC can borrow my router’s IP address and\xa0\n 68 00:07:20,399 --> 00:07:27,120 and the other PC can communicate over\xa0\n 69 00:07:27,120 --> 00:07:35,199 I’ll explain NAT next. Regarding private IP\xa0\n 70 00:07:35,199 --> 00:07:40,479 the three private IP address ranges, and remember\xa0\n 71 00:07:42,319 --> 00:07:48,800 So let’s talk about NAT. NAT is used to modify the\xa0\n 72 00:07:49,680 --> 00:07:55,040 And why would you want to do that? Well there are\xa0\n 73 00:07:55,040 --> 00:08:00,720 reason is to allow hosts with private IP addresses\xa0\n 74 00:08:00,720 --> 00:08:06,240 as I introduced in the previous That is in\xa0\n 75 00:08:06,240 --> 00:08:11,840 to share a single public IP address, but\xa0\n 76 00:08:12,480 --> 00:08:17,920 There are also various types of NAT, but for the\xa0\n 77 00:08:17,920 --> 00:08:23,439 to configure it on Cisco routers. Let me give\xa0\n 78 00:08:24,399 --> 00:08:31,919 PC1’s IP address is 192.168.0.167, and it wants\xa0\n 79 00:08:33,039 --> 00:08:40,559 So, it creates a packet with source IP\xa0\n 80 00:08:41,600 --> 00:08:48,320 It sends the packet to its default gateway, R1.\xa0\n 81 00:08:48,320 --> 00:08:57,040 the source IP address from 192.168.0.167 to\xa0\n 82 00:08:57,039 --> 00:09:02,719 interface. That’s why it’s called ‘source’ NAT,\xa0\n 83 00:09:03,919 --> 00:09:10,159 Note that, in this case R1 translated PC1’s\xa0\n 84 00:09:10,159 --> 00:09:17,839 203.0.113.1, but that’s only one option. There are\xa0\n 85 00:09:17,840 --> 00:09:23,040 this type of NAT, where the router’s interface\xa0\n 86 00:09:23,919 --> 00:09:28,399 Static NAT, which I’ll cover in this\xa0\n 87 00:09:28,399 --> 00:09:34,959 it uses a separate address, which you’ll see in\xa0\n 88 00:09:34,960 --> 00:09:42,000 the Internet and it arrives at its destination,\xa0\n 89 00:09:42,879 --> 00:09:51,519 The source is 8.8.8.8, and the destination\xa0\n 90 00:09:51,519 --> 00:09:59,759 which then reverses the translation.\xa0\n 91 00:10:00,879 --> 00:10:07,120 Although in this case the destination IP is\xa0\n 92 00:10:07,120 --> 00:10:12,080 is just reverting the previously translated\xa0\n 93 00:10:13,600 --> 00:10:19,440 And then finally the server’s response reaches\xa0\n 94 00:10:19,440 --> 00:10:23,520 specifically source NAT, translating\xa0\n 95 00:10:24,480 --> 00:10:29,039 Now let’s look deeper into one specific\xa0\n 96 00:10:30,639 --> 00:10:36,480 So, here’s static NAT. Static NAT involves\xa0\n 97 00:10:36,480 --> 00:10:43,440 private IP addresses to public IP addresses. Now,\xa0\n 98 00:10:43,440 --> 00:10:48,960 NAT any address to any other address, but to keep\xa0\n 99 00:10:48,960 --> 00:10:57,120 private IP to one public IP. An inside local IP\xa0\n 100 00:10:58,080 --> 00:11:03,440 These are two important terms to understand, not\xa0\n 101 00:11:03,440 --> 00:11:09,920 introduce. First, what does ‘inside’ mean?\xa0\n 102 00:11:09,919 --> 00:11:16,000 as opposed to outside networks such as the\xa0\n 103 00:11:16,960 --> 00:11:23,440 It is the IP address of the inside host, from the\xa0\n 104 00:11:23,440 --> 00:11:28,640 IP address actually configured on the inside\xa0\n 105 00:11:30,080 --> 00:11:34,560 That ‘inside local’ address is\xa0\n 106 00:11:34,559 --> 00:11:40,239 which is the IP address of the inside host from\xa0\n 107 00:11:40,240 --> 00:11:46,879 of the local network. So, that’s the IP address of\xa0\n 108 00:11:46,879 --> 00:11:54,240 IP address. Let me demonstrate. PC1 wants\xa0\n 109 00:11:54,960 --> 00:12:02,879 So it makes a packet with destination IP address\xa0\n 110 00:12:03,919 --> 00:12:10,000 This is the inside local address, it’s the IP\xa0\n 111 00:12:10,000 --> 00:12:16,960 indeed a private IP address. It sends the packet\xa0\n 112 00:12:16,960 --> 00:12:24,800 NAT to change it to, for example, 100.0.0.1. Note\xa0\n 113 00:12:24,799 --> 00:12:32,879 IP, this is a separate public IP address reserved\xa0\n 114 00:12:33,519 --> 00:12:40,639 It’s PC1’s IP address after NAT is performed, and\xa0\n 115 00:12:40,639 --> 00:12:47,759 over the Internet to 8.8.8.8, which then sends the\xa0\n 116 00:12:47,759 --> 00:12:56,319 it’s communicating with IP address 100.0.0.1, even\xa0\n 117 00:12:57,360 --> 00:13:03,680 So, the ‘inside global’ address is the IP address\xa0\n 118 00:13:03,679 --> 00:13:09,679 outside hosts, for example the server. It’s\xa0\n 119 00:13:10,559 --> 00:13:16,559 So, R1 reverses the translation back to PC1’s\xa0\n 120 00:13:18,480 --> 00:13:23,279 Now, what if PC2 also wants to communicate\xa0\n 121 00:13:24,000 --> 00:13:26,960 Notice that I defined static\xa0\n 122 00:13:27,600 --> 00:13:36,560 On R1 I mapped PC1’s private IP address\xa0\n 123 00:13:36,559 --> 00:13:44,239 That’s a one-to-one mapping. But if PC2 also wants\xa0\n 124 00:13:44,879 --> 00:13:52,240 The router would not allow me to map both PC1 and\xa0\n 125 00:13:53,279 --> 00:14:01,839 So, in this case I configured R1 to translate\xa0\n 126 00:14:02,639 --> 00:14:10,399 What’s the name for 192.168.0.168? It’s the inside\xa0\n 127 00:14:10,399 --> 00:14:18,720 PC2. And what’s the name for 100.0.0.2? It’s the\xa0\n 128 00:14:19,759 --> 00:14:28,000 Anyway, the server sends the reply to 100.0.0.2,\xa0\n 129 00:14:28,000 --> 00:14:34,000 and sends the reply back to PC2. So, that’s\xa0\n 130 00:14:34,000 --> 00:14:39,440 to point something out about static NAT. Static\xa0\n 131 00:14:39,440 --> 00:14:45,360 communicate over the Internet. However, because\xa0\n 132 00:14:45,360 --> 00:14:50,960 it doesn’t really help preserve IP addresses.\xa0\n 133 00:14:50,960 --> 00:14:56,800 address anyway, you might as well just configure\xa0\n 134 00:14:56,799 --> 00:15:02,240 although there are reasons to use static NAT, for\xa0\n 135 00:15:04,080 --> 00:15:08,000 Now let’s look at how to configure static\xa0\n 136 00:15:09,120 --> 00:15:14,080 First, define the inside interface or\xa0\n 137 00:15:14,080 --> 00:15:20,879 command from interface configuration mode. In\xa0\n 138 00:15:20,879 --> 00:15:28,159 it’s connected to the internal network.\xa0\n 139 00:15:28,159 --> 00:15:34,799 I used the IP NAT OUTSIDE command on G0/0 to\xa0\n 140 00:15:34,799 --> 00:15:41,199 perform NAT on traffic traveling from the inside\xa0\n 141 00:15:42,399 --> 00:15:49,039 Then configure the one-to-one IP address mappings.\xa0\n 142 00:15:49,759 --> 00:15:54,159 followed by the inside local IP address\xa0\n 143 00:15:55,200 --> 00:16:06,960 So, I mapped 192.168.0.167 to 100.0.0.1,\xa0\n 144 00:16:06,960 --> 00:16:15,600 IP address will be translated to 100.0.0.1, and\xa0\n 145 00:16:15,600 --> 00:16:20,240 because these are public IP addresses, to use\xa0\n 146 00:16:20,240 --> 00:16:26,000 be registered to you or your company. You can’t\xa0\n 147 00:16:26,000 --> 00:16:33,120 like you can with private IP addresses. Finally\xa0\n 148 00:16:33,759 --> 00:16:40,159 This is a very useful SHOW command for NAT. Let\xa0\n 149 00:16:40,159 --> 00:16:45,120 when static NAT is used you will see the entries\xa0\n 150 00:16:46,159 --> 00:16:49,839 Personally I think the inside local address\xa0\n 151 00:16:50,480 --> 00:16:55,200 and then the inside global, but it’s the\xa0\n 152 00:16:56,320 --> 00:17:01,520 So, these two entries are permanent, but then\xa0\n 153 00:17:01,519 --> 00:17:06,480 when the addresses are actually translated,\xa0\n 154 00:17:06,480 --> 00:17:14,000 appear in this table. For example, I sent\xa0\n 155 00:17:14,000 --> 00:17:18,400 so you can see these two entries. Let’s\xa0\n 156 00:17:19,279 --> 00:17:24,000 On the left is the ‘Pro’, protocol\xa0\n 157 00:17:25,119 --> 00:17:31,039 Then the inside global address column. Notice that\xa0\n 158 00:17:31,039 --> 00:17:37,279 by a number. What do you think that number\xa0\n 159 00:17:37,279 --> 00:17:43,200 don’t have to pay too much attention to the port\xa0\n 160 00:17:43,200 --> 00:17:49,600 Address Translation, and you’ll see the importance\xa0\n 161 00:17:49,599 --> 00:17:54,639 inside local address column. Notice that, even\xa0\n 162 00:17:55,200 --> 00:18:01,039 R1 doesn’t translate the port numbers when using\xa0\n 163 00:18:01,039 --> 00:18:07,279 last two columns introduce two new terms, outside\xa0\n 164 00:18:09,039 --> 00:18:12,559 So, you already know about the ‘inside\xa0\n 165 00:18:13,359 --> 00:18:18,639 The ‘outside local’ address is the IP address\xa0\n 166 00:18:18,640 --> 00:18:26,480 the local network. So, for example from PC1’s\xa0\n 167 00:18:26,480 --> 00:18:32,880 so that’s the outside local IP address. And the\xa0\n 168 00:18:32,880 --> 00:18:37,200 the outside host from the perspective of\xa0\n 169 00:18:38,240 --> 00:18:44,880 In this case, the server’s actual IP address is\xa0\n 170 00:18:44,880 --> 00:18:52,000 same, the outside local address and the outside\xa0\n 171 00:18:52,000 --> 00:18:57,200 these two addresses will always be the same.\xa0\n 172 00:18:57,200 --> 00:19:02,000 CCNA exam, so for our purpose you can\xa0\n 173 00:19:03,279 --> 00:19:08,160 By the way, notice that the port number is also\xa0\n 174 00:19:09,039 --> 00:19:18,240 So, what service did PC1 and PC2 use to access\xa0\n 175 00:19:18,240 --> 00:19:26,880 and sometimes TCP port 53. So, these four terms,\xa0\n 176 00:19:26,880 --> 00:19:31,360 and outside global, can be a little confusing,\xa0\n 177 00:19:32,640 --> 00:19:38,000 ‘Inside’ and ‘outside’ indicate the location\xa0\n 178 00:19:38,000 --> 00:19:45,599 outside network. PC1 and PC2 are ‘inside’,\xa0\n 179 00:19:46,559 --> 00:19:52,480 Local and global, on the other hand, indicate the\xa0\n 180 00:19:52,480 --> 00:19:58,319 the local, inside network. ‘Global’ means from\xa0\n 181 00:19:59,279 --> 00:20:05,839 So, 192.168.0.167 is PC1’s IP address\xa0\n 182 00:20:06,720 --> 00:20:12,240 and 100.0.0.1 is PC1’s IP address from\xa0\n 183 00:20:13,200 --> 00:20:17,279 If you have any questions about these terms,\xa0\n 184 00:20:19,200 --> 00:20:24,000 Let me show a few more useful commands.\xa0\n 185 00:20:24,000 --> 00:20:29,599 translations in the NAT translation table with\xa0\n 186 00:20:30,640 --> 00:20:36,080 Even though I only configured static NAT, not\xa0\n 187 00:20:36,079 --> 00:20:42,319 actually used, dynamic entries are added to the\xa0\n 188 00:20:42,319 --> 00:20:49,279 PC1 and PC2 stop communicating with 8.8.8.8, these\xa0\n 189 00:20:49,279 --> 00:20:54,000 removed from the NAT translation table, but this\xa0\n 190 00:20:55,359 --> 00:20:58,879 Notice that, after using that command\xa0\n 191 00:20:58,880 --> 00:21:04,800 but the static entries remain. These static\xa0\n 192 00:21:04,799 --> 00:21:09,680 unless you remove the IP NAT INSIDE\xa0\n 193 00:21:10,480 --> 00:21:16,480 The last command I want to show you today is\xa0\n 194 00:21:16,480 --> 00:21:22,000 the first few lines of the output. Total active\xa0\n 195 00:21:22,720 --> 00:21:26,079 Since I just cleared the dynamic\xa0\n 196 00:21:26,880 --> 00:21:30,320 As for extended entries,\xa0\n 197 00:21:31,599 --> 00:21:35,759 Peak translations is 4, that’s the highest\xa0\n 198 00:21:35,759 --> 00:21:43,839 in R1’s NAT table. Here you can see the outside\xa0\n 199 00:21:45,200 --> 00:21:50,240 So, here are the new commands from this video.\xa0\n 200 00:21:50,240 --> 00:21:53,519 make sure to go back in the video to review. Also,\xa0\xa0 201 00:21:53,519 --> 00:21:58,319 I recommend practicing these configurations\xa0\n 202 00:21:58,319 --> 00:22:03,039 or by trying my practice labs. The\xa0\n 203 00:22:04,799 --> 00:22:09,839 Okay, before the quiz let’s review what we\xa0\n 204 00:22:09,839 --> 00:22:14,480 IPv4 addresses. Make sure you know\xa0\n 205 00:22:15,119 --> 00:22:26,559 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.\xa0\n 206 00:22:27,440 --> 00:22:32,160 NAT allows routers to modify the source\xa0\n 207 00:22:33,039 --> 00:22:38,960 But for the CCNA, you just need to learn\xa0\n 208 00:22:38,960 --> 00:22:44,400 source NAT, static source NAT, which involves\xa0\n 209 00:22:44,400 --> 00:22:50,480 private IP addresses to global IP addresses.\xa0\n 210 00:22:51,440 --> 00:22:57,120 Static NAT configuration is fairly simple.\xa0\n 211 00:22:57,119 --> 00:23:02,239 and then configure the IP address mappings. I\xa0\n 212 00:23:02,240 --> 00:23:08,240 is understanding those four terms: inside local,\xa0\n 213 00:23:08,960 --> 00:23:14,160 But we’ll cover NAT again in the next video, so\xa0\n 214 00:23:15,359 --> 00:23:20,959 Also, at the end of the quiz there will be a bonus\xa0\n 215 00:23:20,960 --> 00:23:25,600 so make sure to watch until the end.\xa0\n 216 00:23:27,920 --> 00:23:34,240 Which of the following commands will configure\xa0\n 217 00:23:34,240 --> 00:23:40,400 to 203.0.113.10? Pause the video now to\xa0\n 218 00:23:45,200 --> 00:23:51,920 Okay, the answer is D, IP NAT INSIDE SOURCE\xa0\n 219 00:23:51,920 --> 00:23:56,880 is usually a private address, and then the inside\xa0\n 220 00:23:58,000 --> 00:24:05,920 This will map 192.168.10.10 to\xa0\n 221 00:24:07,839 --> 00:24:15,039 You have configured the following command\xa0\n 222 00:24:15,039 --> 00:24:21,839 20.0.0.1. What will happen when you issue\xa0\n 223 00:24:21,839 --> 00:24:31,839 SOURCE STATIC 10.0.0.2 20.0.0.1. Pause\xa0\n 224 00:24:33,519 --> 00:24:41,279 Okay, the answer is B, only 10.0.0.1 will\xa0\n 225 00:24:42,000 --> 00:24:46,640 I briefly mentioned earlier in the video that,\xa0\n 226 00:24:46,640 --> 00:24:53,600 IP address to a public IP address, if you try to\xa0\n 227 00:24:53,599 --> 00:24:59,359 the command will be rejected. Here’s what that\xa0\n 228 00:24:59,359 --> 00:25:08,479 so only 10.0.0.1 will be translated to 20.0.0.1.\xa0\n 229 00:25:08,480 --> 00:25:13,360 you’ll need to use a different public IP\xa0\n 230 00:25:16,000 --> 00:25:19,359 Examine the following partial\xa0\n 231 00:25:20,319 --> 00:25:24,879 How many active translations will there be\xa0\n 232 00:25:24,880 --> 00:25:29,600 (asterisk) command on R1? Pause the\xa0\n 233 00:25:33,680 --> 00:25:41,120 Okay the answer is B, 3. CLEAR IP NAT TRANSLATION\xa0\n 234 00:25:41,119 --> 00:25:45,599 not the 3 static translations. So,\xa0\n 235 00:25:45,599 --> 00:25:49,439 3 translations will remain.\xa0\nOkay, let’s go to question 4. 236 00:25:51,599 --> 00:25:54,719 Which of the following are private IPv4 addresses?\xa0\xa0 237 00:25:54,720 --> 00:25:59,440 (select all that apply). Pause the video\xa0\n 238 00:26:03,759 --> 00:26:14,559 Okay, the correct answers are A, 10.254.255.0,\xa0\n 239 00:26:15,519 --> 00:26:20,319 Those are the only three addresses that fall\xa0\n 240 00:26:20,319 --> 00:26:33,039 specified in RFC 1918. 10.0.0.0/8, 172.16.0.0/12,\xa0\n 241 00:26:35,200 --> 00:26:40,799 Examine the packet flow below as PC1\xa0\n 242 00:26:41,759 --> 00:26:45,839 Identify each of the following addresses\xa0\n 243 00:26:46,720 --> 00:26:52,400 So, identify the outside global, outside local,\xa0\n 244 00:26:53,200 --> 00:26:57,120 If you were to use the command\xa0\n 245 00:26:57,680 --> 00:27:05,840 which address would appear in each column?\xa0\n 246 00:27:07,680 --> 00:27:14,960 Okay let’s check. The outside global and outside\xa0\n 247 00:27:14,960 --> 00:27:19,840 only be different if destination NAT is used,\xa0\n 248 00:27:21,200 --> 00:27:28,799 The inside local address is 172.20.0.101.\xa0\n 249 00:27:28,799 --> 00:27:34,960 from the perspective of the inside network.\xa0\n 250 00:27:35,519 --> 00:27:40,480 That’s the IP address of the inside host, PC1,\xa0\n 251 00:27:41,599 --> 00:27:44,000 Once again, make sure you know\xa0\n 252 00:27:44,720 --> 00:27:49,600 If you’re confused, go back in the video to\xa0\n 253 00:27:49,599 --> 00:27:54,240 and of course feel free to ask questions in\xa0\n 254 00:27:54,240 --> 00:28:02,240 the quiz. Next let’s take a look at a bonus\xa0\n 255 00:28:02,240 --> 00:28:04,960 Okay here's today's Boson ExSim practice question.\xa0\xa0 256 00:28:06,240 --> 00:28:11,759 You issue the SHOW IP NAT TRANSLATIONS command\xa0\n 257 00:28:11,759 --> 00:28:19,200 output. So there are 2 entries in RouterA's\xa0\n 258 00:28:19,200 --> 00:28:24,640 TFTP connection with HostB. What is the IP\xa0\n 259 00:28:25,519 --> 00:28:30,559 So, these are the six options to choose from.\xa0\n 260 00:28:35,519 --> 00:28:44,319 Okay let's check. So, I believe the correct answer\xa0\n 261 00:28:44,319 --> 00:28:51,519 it is a TFTP connection from HostA to HostB. So\xa0\n 262 00:28:51,519 --> 00:28:59,599 which of these entries? We can look at the\xa0\n 263 00:28:59,599 --> 00:29:07,039 destination port is 69, not 23. So we know it\xa0\n 264 00:29:07,039 --> 00:29:13,359 of these addresses is HostA's address? So the\xa0\n 265 00:29:13,359 --> 00:29:20,959 IP address of HostA? It doesn't say inside global\xa0\n 266 00:29:21,680 --> 00:29:27,200 Well if you get a question like this, it's safe\xa0\n 267 00:29:27,200 --> 00:29:35,039 address of HostA. Not the NAT address configured\xa0\n 268 00:29:35,839 --> 00:29:43,679 which is HostA's IP address after NAT. It's asking\xa0\n 269 00:29:43,680 --> 00:29:52,080 before NAT, the actual IP address configured on\xa0\n 270 00:29:52,079 --> 00:30:01,039 correct answer. So I will click on show answer.\xa0\n 271 00:30:01,039 --> 00:30:07,839 explanation. I highly recommend reading this\xa0\n 272 00:30:09,119 --> 00:30:13,439 And there's some more down here at the bottom,\xa0\n 273 00:30:18,079 --> 00:30:23,199 Okay, so that was a quick look at Boson Software's\xa0\n 274 00:30:23,200 --> 00:30:29,279 the best practice exams for the CCNA, and I highly\xa0\n 275 00:30:29,279 --> 00:30:31,279 please follow the link in the video description. 276 00:30:34,240 --> 00:30:36,559 There are supplementary materials for this video.\xa0\xa0 277 00:30:37,279 --> 00:30:40,160 There is a flashcard deck to\xa0\n 278 00:30:41,119 --> 00:30:45,119 There will also be a packet tracer practice\xa0\n 279 00:30:46,000 --> 00:30:51,279 That will be in the next video. Sign up for my\xa0\n 280 00:30:51,279 --> 00:30:55,039 and I’ll send you all of the flashcards\xa0\n 281 00:30:57,119 --> 00:31:02,719 Before finishing today’s video I want to\xa0\n 282 00:31:02,720 --> 00:31:08,799 please click the ‘Join’ button under the video.\xa0\n 283 00:31:08,799 --> 00:31:16,559 Roger, Raj, Kenneth, Seamus, H W, Brandon, Samil,\xa0\n 284 00:31:16,559 --> 00:31:22,559 Anthony, Junhong, Benjamin, Tshepiso, Justin,\xa0\n 285 00:31:22,559 --> 00:31:28,720 Value, John, Funnydart, Velvijaykum, Mark, Yousif,\xa0\n 286 00:31:29,680 --> 00:31:33,600 Sorry if I pronounced your name incorrectly,\xa0\n 287 00:31:34,480 --> 00:31:40,559 This is the list of JCNP-level members at the\xa0\n 288 00:31:41,440 --> 00:31:46,480 If you signed up recently and your name isn’t\xa0\n 289 00:31:48,240 --> 00:31:51,279 Thank you for watching. Please\xa0\n 290 00:31:51,279 --> 00:31:56,000 like the video, leave a comment, and share the\xa0\n 291 00:31:57,119 --> 00:32:02,719 If you want to leave a tip, check the links in the\xa0\n 292 00:32:02,720 --> 00:32:09,279 and accept BAT, or Basic Attention Token, tips\xa0\n 25206

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.