Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,040 --> 00:00:07,520
Welcome to Jeremy’s IT Lab. This is a free,\xa0\n
2
00:00:07,519 --> 00:00:12,800
videos, please subscribe to follow along with the\xa0\n
3
00:00:12,800 --> 00:00:16,640
and share the video to help spread this\xa0\n
4
00:00:17,920 --> 00:00:24,000
In this video we will cover NAT, Network Address\xa0\n
5
00:00:24,000 --> 00:00:30,480
CCNA exam and for real-world network engineering.\xa0\n
6
00:00:31,120 --> 00:00:38,719
destination IP address of a packet to a different\xa0\n
7
00:00:38,719 --> 00:00:44,879
which says you must be able to configure and\xa0\n
8
00:00:46,560 --> 00:00:51,679
Here’s what we’ll cover in this video. First,\xa0\n
9
00:00:52,479 --> 00:00:56,239
These are IP addresses which you are\xa0\n
10
00:00:56,240 --> 00:01:02,880
and which don’t have to be globally unique. Then\xa0\n
11
00:01:02,880 --> 00:01:08,079
I’ll cover one type of NAT you need to know for\xa0\n
12
00:01:09,200 --> 00:01:14,480
This video will be part 1 of NAT. I’ve\xa0\n
13
00:01:14,480 --> 00:01:18,560
instead of one long video, because it’s an\xa0\n
14
00:01:19,920 --> 00:01:24,480
So, in Day 45 I will cover some additional\xa0\n
15
00:01:25,359 --> 00:01:28,959
As always, watch until the end of the\xa0\n
16
00:01:28,959 --> 00:01:33,280
from Boson Software’s ExSim, the\xa0\n
17
00:01:34,480 --> 00:01:37,280
First let me introduce private IPv4 addresses.\xa0\xa0
18
00:01:38,319 --> 00:01:43,199
This is review from the IPv6 videos in\xa0\n
19
00:01:43,200 --> 00:01:46,960
enough addresses for all devices that\xa0\n
20
00:01:48,159 --> 00:01:53,679
The long-term solution to this problem is to\xa0\n
21
00:01:53,680 --> 00:02:01,440
the world from IPv4 to IPv6 is no simple task. So,\xa0\n
22
00:02:01,439 --> 00:02:06,560
are some short-term solutions to this problem,\xa0\n
23
00:02:06,560 --> 00:02:12,159
quite a lot. The first one, which you already\xa0\n
24
00:02:13,120 --> 00:02:18,640
With CIDR we can forget about the rigid IPv4\xa0\n
25
00:02:18,639 --> 00:02:24,639
length with any address, no need to think about\xa0\n
26
00:02:24,639 --> 00:02:33,119
solutions which I will cover in this video.\xa0\n
27
00:02:33,120 --> 00:02:39,840
the following IPv4 address ranges as private.\xa0\n
28
00:02:39,840 --> 00:02:45,200
Request For Comments. These are the documents\xa0\n
29
00:02:46,000 --> 00:02:51,520
I’ve mentioned that once or twice before I think,\xa0\n
30
00:02:51,520 --> 00:03:01,680
private IPv4 address range is 10.0.0.0/8,\xa0\n
31
00:03:02,639 --> 00:03:12,719
The second one is 172.16.0.0/12, which\xa0\n
32
00:03:13,840 --> 00:03:23,199
Finally there is 192.168.0.0/16, which\xa0\n
33
00:03:23,840 --> 00:03:28,560
You probably recognize these address ranges,\xa0\n
34
00:03:28,560 --> 00:03:33,520
networks and labs. So, they specified\xa0\n
35
00:03:34,319 --> 00:03:40,639
one range of addresses from class B, and one range\xa0\n
36
00:03:40,639 --> 00:03:48,159
you will be thinking ‘why is the class B range\xa0\n
37
00:03:48,159 --> 00:03:55,919
range /16? Isn’t class C /24’? The answer to those\xa0\n
38
00:03:56,479 --> 00:04:07,039
172.16.0.0/12 just specifies a range of\xa0\n
39
00:04:07,599 --> 00:04:11,840
and you’re free to divide up those addresses\xa0\n
40
00:04:13,439 --> 00:04:23,920
Likewise, 192.168.0.0/16 just specifies a range\xa0\n
41
00:04:24,480 --> 00:04:27,840
and once again you are free to divide\xa0\n
42
00:04:28,959 --> 00:04:35,039
In any case, don’t be too attached to the concept\xa0\n
43
00:04:35,040 --> 00:04:41,920
uses CIDR, Classless Inter-Domain Routing,\xa0\n
44
00:04:41,920 --> 00:04:47,600
So, those are the private IPv4 address ranges. You\xa0\n
45
00:04:47,600 --> 00:04:54,000
they don’t have to be globally unique. In fact, if\xa0\n
46
00:04:54,000 --> 00:04:58,639
it’s almost certainly using a\xa0\n
47
00:04:58,639 --> 00:05:07,519
my PC has the IP address 192.168.0.167, and\xa0\n
48
00:05:08,639 --> 00:05:13,680
Your PC might have the exact same IP address as\xa0\n
49
00:05:13,680 --> 00:05:21,680
192.168.0.0/24. Now, here’s an important point.\xa0\n
50
00:05:21,680 --> 00:05:28,879
Internet. Your ISP, Internet Service Provider,\xa0\n
51
00:05:29,839 --> 00:05:34,000
You may be wondering, if the private IP\xa0\n
52
00:05:34,000 --> 00:05:40,000
how can I access the Internet from my PC?\xa0\n
53
00:05:40,879 --> 00:05:50,319
On the left is my PC, 192.168.0.167, connected\xa0\n
54
00:05:50,319 --> 00:05:55,040
Internet there is another PC connected to a\xa0\n
55
00:05:55,759 --> 00:06:01,360
Without NAT, there are two big problems here.\xa0\n
56
00:06:02,240 --> 00:06:07,920
If there is a packet traveling over the Internet\xa0\n
57
00:06:08,560 --> 00:06:13,439
which PC will it go to? My PC? Or the\xa0\n
58
00:06:14,240 --> 00:06:19,920
So, that’s a problem. Another problem is that\xa0\n
59
00:06:19,920 --> 00:06:26,000
Internet, so the PCs can’t access the Internet.\xa0\n
60
00:06:27,279 --> 00:06:31,919
Although the PCs and the routers’ internal\xa0\n
61
00:06:32,560 --> 00:06:39,439
perhaps my router’s external interface has the\xa0\n
62
00:06:39,439 --> 00:06:47,199
router has the public IP address 203.0.113.5. This\xa0\n
63
00:06:47,199 --> 00:06:53,519
aren’t unique, the public IP addresses must be\xa0\n
64
00:06:53,519 --> 00:06:59,680
over the Internet, NAT will allow it to borrow the\xa0\n
65
00:06:59,680 --> 00:07:06,560
public IP address I have configured for NAT. In\xa0\n
66
00:07:06,560 --> 00:07:11,839
home can use that same single public IP address\xa0\n
67
00:07:12,959 --> 00:07:19,519
So my PC can borrow my router’s IP address and\xa0\n
68
00:07:20,399 --> 00:07:27,120
and the other PC can communicate over\xa0\n
69
00:07:27,120 --> 00:07:35,199
I’ll explain NAT next. Regarding private IP\xa0\n
70
00:07:35,199 --> 00:07:40,479
the three private IP address ranges, and remember\xa0\n
71
00:07:42,319 --> 00:07:48,800
So let’s talk about NAT. NAT is used to modify the\xa0\n
72
00:07:49,680 --> 00:07:55,040
And why would you want to do that? Well there are\xa0\n
73
00:07:55,040 --> 00:08:00,720
reason is to allow hosts with private IP addresses\xa0\n
74
00:08:00,720 --> 00:08:06,240
as I introduced in the previous That is in\xa0\n
75
00:08:06,240 --> 00:08:11,840
to share a single public IP address, but\xa0\n
76
00:08:12,480 --> 00:08:17,920
There are also various types of NAT, but for the\xa0\n
77
00:08:17,920 --> 00:08:23,439
to configure it on Cisco routers. Let me give\xa0\n
78
00:08:24,399 --> 00:08:31,919
PC1’s IP address is 192.168.0.167, and it wants\xa0\n
79
00:08:33,039 --> 00:08:40,559
So, it creates a packet with source IP\xa0\n
80
00:08:41,600 --> 00:08:48,320
It sends the packet to its default gateway, R1.\xa0\n
81
00:08:48,320 --> 00:08:57,040
the source IP address from 192.168.0.167 to\xa0\n
82
00:08:57,039 --> 00:09:02,719
interface. That’s why it’s called ‘source’ NAT,\xa0\n
83
00:09:03,919 --> 00:09:10,159
Note that, in this case R1 translated PC1’s\xa0\n
84
00:09:10,159 --> 00:09:17,839
203.0.113.1, but that’s only one option. There are\xa0\n
85
00:09:17,840 --> 00:09:23,040
this type of NAT, where the router’s interface\xa0\n
86
00:09:23,919 --> 00:09:28,399
Static NAT, which I’ll cover in this\xa0\n
87
00:09:28,399 --> 00:09:34,959
it uses a separate address, which you’ll see in\xa0\n
88
00:09:34,960 --> 00:09:42,000
the Internet and it arrives at its destination,\xa0\n
89
00:09:42,879 --> 00:09:51,519
The source is 8.8.8.8, and the destination\xa0\n
90
00:09:51,519 --> 00:09:59,759
which then reverses the translation.\xa0\n
91
00:10:00,879 --> 00:10:07,120
Although in this case the destination IP is\xa0\n
92
00:10:07,120 --> 00:10:12,080
is just reverting the previously translated\xa0\n
93
00:10:13,600 --> 00:10:19,440
And then finally the server’s response reaches\xa0\n
94
00:10:19,440 --> 00:10:23,520
specifically source NAT, translating\xa0\n
95
00:10:24,480 --> 00:10:29,039
Now let’s look deeper into one specific\xa0\n
96
00:10:30,639 --> 00:10:36,480
So, here’s static NAT. Static NAT involves\xa0\n
97
00:10:36,480 --> 00:10:43,440
private IP addresses to public IP addresses. Now,\xa0\n
98
00:10:43,440 --> 00:10:48,960
NAT any address to any other address, but to keep\xa0\n
99
00:10:48,960 --> 00:10:57,120
private IP to one public IP. An inside local IP\xa0\n
100
00:10:58,080 --> 00:11:03,440
These are two important terms to understand, not\xa0\n
101
00:11:03,440 --> 00:11:09,920
introduce. First, what does ‘inside’ mean?\xa0\n
102
00:11:09,919 --> 00:11:16,000
as opposed to outside networks such as the\xa0\n
103
00:11:16,960 --> 00:11:23,440
It is the IP address of the inside host, from the\xa0\n
104
00:11:23,440 --> 00:11:28,640
IP address actually configured on the inside\xa0\n
105
00:11:30,080 --> 00:11:34,560
That ‘inside local’ address is\xa0\n
106
00:11:34,559 --> 00:11:40,239
which is the IP address of the inside host from\xa0\n
107
00:11:40,240 --> 00:11:46,879
of the local network. So, that’s the IP address of\xa0\n
108
00:11:46,879 --> 00:11:54,240
IP address. Let me demonstrate. PC1 wants\xa0\n
109
00:11:54,960 --> 00:12:02,879
So it makes a packet with destination IP address\xa0\n
110
00:12:03,919 --> 00:12:10,000
This is the inside local address, it’s the IP\xa0\n
111
00:12:10,000 --> 00:12:16,960
indeed a private IP address. It sends the packet\xa0\n
112
00:12:16,960 --> 00:12:24,800
NAT to change it to, for example, 100.0.0.1. Note\xa0\n
113
00:12:24,799 --> 00:12:32,879
IP, this is a separate public IP address reserved\xa0\n
114
00:12:33,519 --> 00:12:40,639
It’s PC1’s IP address after NAT is performed, and\xa0\n
115
00:12:40,639 --> 00:12:47,759
over the Internet to 8.8.8.8, which then sends the\xa0\n
116
00:12:47,759 --> 00:12:56,319
it’s communicating with IP address 100.0.0.1, even\xa0\n
117
00:12:57,360 --> 00:13:03,680
So, the ‘inside global’ address is the IP address\xa0\n
118
00:13:03,679 --> 00:13:09,679
outside hosts, for example the server. It’s\xa0\n
119
00:13:10,559 --> 00:13:16,559
So, R1 reverses the translation back to PC1’s\xa0\n
120
00:13:18,480 --> 00:13:23,279
Now, what if PC2 also wants to communicate\xa0\n
121
00:13:24,000 --> 00:13:26,960
Notice that I defined static\xa0\n
122
00:13:27,600 --> 00:13:36,560
On R1 I mapped PC1’s private IP address\xa0\n
123
00:13:36,559 --> 00:13:44,239
That’s a one-to-one mapping. But if PC2 also wants\xa0\n
124
00:13:44,879 --> 00:13:52,240
The router would not allow me to map both PC1 and\xa0\n
125
00:13:53,279 --> 00:14:01,839
So, in this case I configured R1 to translate\xa0\n
126
00:14:02,639 --> 00:14:10,399
What’s the name for 192.168.0.168? It’s the inside\xa0\n
127
00:14:10,399 --> 00:14:18,720
PC2. And what’s the name for 100.0.0.2? It’s the\xa0\n
128
00:14:19,759 --> 00:14:28,000
Anyway, the server sends the reply to 100.0.0.2,\xa0\n
129
00:14:28,000 --> 00:14:34,000
and sends the reply back to PC2. So, that’s\xa0\n
130
00:14:34,000 --> 00:14:39,440
to point something out about static NAT. Static\xa0\n
131
00:14:39,440 --> 00:14:45,360
communicate over the Internet. However, because\xa0\n
132
00:14:45,360 --> 00:14:50,960
it doesn’t really help preserve IP addresses.\xa0\n
133
00:14:50,960 --> 00:14:56,800
address anyway, you might as well just configure\xa0\n
134
00:14:56,799 --> 00:15:02,240
although there are reasons to use static NAT, for\xa0\n
135
00:15:04,080 --> 00:15:08,000
Now let’s look at how to configure static\xa0\n
136
00:15:09,120 --> 00:15:14,080
First, define the inside interface or\xa0\n
137
00:15:14,080 --> 00:15:20,879
command from interface configuration mode. In\xa0\n
138
00:15:20,879 --> 00:15:28,159
it’s connected to the internal network.\xa0\n
139
00:15:28,159 --> 00:15:34,799
I used the IP NAT OUTSIDE command on G0/0 to\xa0\n
140
00:15:34,799 --> 00:15:41,199
perform NAT on traffic traveling from the inside\xa0\n
141
00:15:42,399 --> 00:15:49,039
Then configure the one-to-one IP address mappings.\xa0\n
142
00:15:49,759 --> 00:15:54,159
followed by the inside local IP address\xa0\n
143
00:15:55,200 --> 00:16:06,960
So, I mapped 192.168.0.167 to 100.0.0.1,\xa0\n
144
00:16:06,960 --> 00:16:15,600
IP address will be translated to 100.0.0.1, and\xa0\n
145
00:16:15,600 --> 00:16:20,240
because these are public IP addresses, to use\xa0\n
146
00:16:20,240 --> 00:16:26,000
be registered to you or your company. You can’t\xa0\n
147
00:16:26,000 --> 00:16:33,120
like you can with private IP addresses. Finally\xa0\n
148
00:16:33,759 --> 00:16:40,159
This is a very useful SHOW command for NAT. Let\xa0\n
149
00:16:40,159 --> 00:16:45,120
when static NAT is used you will see the entries\xa0\n
150
00:16:46,159 --> 00:16:49,839
Personally I think the inside local address\xa0\n
151
00:16:50,480 --> 00:16:55,200
and then the inside global, but it’s the\xa0\n
152
00:16:56,320 --> 00:17:01,520
So, these two entries are permanent, but then\xa0\n
153
00:17:01,519 --> 00:17:06,480
when the addresses are actually translated,\xa0\n
154
00:17:06,480 --> 00:17:14,000
appear in this table. For example, I sent\xa0\n
155
00:17:14,000 --> 00:17:18,400
so you can see these two entries. Let’s\xa0\n
156
00:17:19,279 --> 00:17:24,000
On the left is the ‘Pro’, protocol\xa0\n
157
00:17:25,119 --> 00:17:31,039
Then the inside global address column. Notice that\xa0\n
158
00:17:31,039 --> 00:17:37,279
by a number. What do you think that number\xa0\n
159
00:17:37,279 --> 00:17:43,200
don’t have to pay too much attention to the port\xa0\n
160
00:17:43,200 --> 00:17:49,600
Address Translation, and you’ll see the importance\xa0\n
161
00:17:49,599 --> 00:17:54,639
inside local address column. Notice that, even\xa0\n
162
00:17:55,200 --> 00:18:01,039
R1 doesn’t translate the port numbers when using\xa0\n
163
00:18:01,039 --> 00:18:07,279
last two columns introduce two new terms, outside\xa0\n
164
00:18:09,039 --> 00:18:12,559
So, you already know about the ‘inside\xa0\n
165
00:18:13,359 --> 00:18:18,639
The ‘outside local’ address is the IP address\xa0\n
166
00:18:18,640 --> 00:18:26,480
the local network. So, for example from PC1’s\xa0\n
167
00:18:26,480 --> 00:18:32,880
so that’s the outside local IP address. And the\xa0\n
168
00:18:32,880 --> 00:18:37,200
the outside host from the perspective of\xa0\n
169
00:18:38,240 --> 00:18:44,880
In this case, the server’s actual IP address is\xa0\n
170
00:18:44,880 --> 00:18:52,000
same, the outside local address and the outside\xa0\n
171
00:18:52,000 --> 00:18:57,200
these two addresses will always be the same.\xa0\n
172
00:18:57,200 --> 00:19:02,000
CCNA exam, so for our purpose you can\xa0\n
173
00:19:03,279 --> 00:19:08,160
By the way, notice that the port number is also\xa0\n
174
00:19:09,039 --> 00:19:18,240
So, what service did PC1 and PC2 use to access\xa0\n
175
00:19:18,240 --> 00:19:26,880
and sometimes TCP port 53. So, these four terms,\xa0\n
176
00:19:26,880 --> 00:19:31,360
and outside global, can be a little confusing,\xa0\n
177
00:19:32,640 --> 00:19:38,000
‘Inside’ and ‘outside’ indicate the location\xa0\n
178
00:19:38,000 --> 00:19:45,599
outside network. PC1 and PC2 are ‘inside’,\xa0\n
179
00:19:46,559 --> 00:19:52,480
Local and global, on the other hand, indicate the\xa0\n
180
00:19:52,480 --> 00:19:58,319
the local, inside network. ‘Global’ means from\xa0\n
181
00:19:59,279 --> 00:20:05,839
So, 192.168.0.167 is PC1’s IP address\xa0\n
182
00:20:06,720 --> 00:20:12,240
and 100.0.0.1 is PC1’s IP address from\xa0\n
183
00:20:13,200 --> 00:20:17,279
If you have any questions about these terms,\xa0\n
184
00:20:19,200 --> 00:20:24,000
Let me show a few more useful commands.\xa0\n
185
00:20:24,000 --> 00:20:29,599
translations in the NAT translation table with\xa0\n
186
00:20:30,640 --> 00:20:36,080
Even though I only configured static NAT, not\xa0\n
187
00:20:36,079 --> 00:20:42,319
actually used, dynamic entries are added to the\xa0\n
188
00:20:42,319 --> 00:20:49,279
PC1 and PC2 stop communicating with 8.8.8.8, these\xa0\n
189
00:20:49,279 --> 00:20:54,000
removed from the NAT translation table, but this\xa0\n
190
00:20:55,359 --> 00:20:58,879
Notice that, after using that command\xa0\n
191
00:20:58,880 --> 00:21:04,800
but the static entries remain. These static\xa0\n
192
00:21:04,799 --> 00:21:09,680
unless you remove the IP NAT INSIDE\xa0\n
193
00:21:10,480 --> 00:21:16,480
The last command I want to show you today is\xa0\n
194
00:21:16,480 --> 00:21:22,000
the first few lines of the output. Total active\xa0\n
195
00:21:22,720 --> 00:21:26,079
Since I just cleared the dynamic\xa0\n
196
00:21:26,880 --> 00:21:30,320
As for extended entries,\xa0\n
197
00:21:31,599 --> 00:21:35,759
Peak translations is 4, that’s the highest\xa0\n
198
00:21:35,759 --> 00:21:43,839
in R1’s NAT table. Here you can see the outside\xa0\n
199
00:21:45,200 --> 00:21:50,240
So, here are the new commands from this video.\xa0\n
200
00:21:50,240 --> 00:21:53,519
make sure to go back in the video to review. Also,\xa0\xa0
201
00:21:53,519 --> 00:21:58,319
I recommend practicing these configurations\xa0\n
202
00:21:58,319 --> 00:22:03,039
or by trying my practice labs. The\xa0\n
203
00:22:04,799 --> 00:22:09,839
Okay, before the quiz let’s review what we\xa0\n
204
00:22:09,839 --> 00:22:14,480
IPv4 addresses. Make sure you know\xa0\n
205
00:22:15,119 --> 00:22:26,559
10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.\xa0\n
206
00:22:27,440 --> 00:22:32,160
NAT allows routers to modify the source\xa0\n
207
00:22:33,039 --> 00:22:38,960
But for the CCNA, you just need to learn\xa0\n
208
00:22:38,960 --> 00:22:44,400
source NAT, static source NAT, which involves\xa0\n
209
00:22:44,400 --> 00:22:50,480
private IP addresses to global IP addresses.\xa0\n
210
00:22:51,440 --> 00:22:57,120
Static NAT configuration is fairly simple.\xa0\n
211
00:22:57,119 --> 00:23:02,239
and then configure the IP address mappings. I\xa0\n
212
00:23:02,240 --> 00:23:08,240
is understanding those four terms: inside local,\xa0\n
213
00:23:08,960 --> 00:23:14,160
But we’ll cover NAT again in the next video, so\xa0\n
214
00:23:15,359 --> 00:23:20,959
Also, at the end of the quiz there will be a bonus\xa0\n
215
00:23:20,960 --> 00:23:25,600
so make sure to watch until the end.\xa0\n
216
00:23:27,920 --> 00:23:34,240
Which of the following commands will configure\xa0\n
217
00:23:34,240 --> 00:23:40,400
to 203.0.113.10? Pause the video now to\xa0\n
218
00:23:45,200 --> 00:23:51,920
Okay, the answer is D, IP NAT INSIDE SOURCE\xa0\n
219
00:23:51,920 --> 00:23:56,880
is usually a private address, and then the inside\xa0\n
220
00:23:58,000 --> 00:24:05,920
This will map 192.168.10.10 to\xa0\n
221
00:24:07,839 --> 00:24:15,039
You have configured the following command\xa0\n
222
00:24:15,039 --> 00:24:21,839
20.0.0.1. What will happen when you issue\xa0\n
223
00:24:21,839 --> 00:24:31,839
SOURCE STATIC 10.0.0.2 20.0.0.1. Pause\xa0\n
224
00:24:33,519 --> 00:24:41,279
Okay, the answer is B, only 10.0.0.1 will\xa0\n
225
00:24:42,000 --> 00:24:46,640
I briefly mentioned earlier in the video that,\xa0\n
226
00:24:46,640 --> 00:24:53,600
IP address to a public IP address, if you try to\xa0\n
227
00:24:53,599 --> 00:24:59,359
the command will be rejected. Here’s what that\xa0\n
228
00:24:59,359 --> 00:25:08,479
so only 10.0.0.1 will be translated to 20.0.0.1.\xa0\n
229
00:25:08,480 --> 00:25:13,360
you’ll need to use a different public IP\xa0\n
230
00:25:16,000 --> 00:25:19,359
Examine the following partial\xa0\n
231
00:25:20,319 --> 00:25:24,879
How many active translations will there be\xa0\n
232
00:25:24,880 --> 00:25:29,600
(asterisk) command on R1? Pause the\xa0\n
233
00:25:33,680 --> 00:25:41,120
Okay the answer is B, 3. CLEAR IP NAT TRANSLATION\xa0\n
234
00:25:41,119 --> 00:25:45,599
not the 3 static translations. So,\xa0\n
235
00:25:45,599 --> 00:25:49,439
3 translations will remain.\xa0\nOkay, let’s go to question 4.
236
00:25:51,599 --> 00:25:54,719
Which of the following are private IPv4 addresses?\xa0\xa0
237
00:25:54,720 --> 00:25:59,440
(select all that apply). Pause the video\xa0\n
238
00:26:03,759 --> 00:26:14,559
Okay, the correct answers are A, 10.254.255.0,\xa0\n
239
00:26:15,519 --> 00:26:20,319
Those are the only three addresses that fall\xa0\n
240
00:26:20,319 --> 00:26:33,039
specified in RFC 1918. 10.0.0.0/8, 172.16.0.0/12,\xa0\n
241
00:26:35,200 --> 00:26:40,799
Examine the packet flow below as PC1\xa0\n
242
00:26:41,759 --> 00:26:45,839
Identify each of the following addresses\xa0\n
243
00:26:46,720 --> 00:26:52,400
So, identify the outside global, outside local,\xa0\n
244
00:26:53,200 --> 00:26:57,120
If you were to use the command\xa0\n
245
00:26:57,680 --> 00:27:05,840
which address would appear in each column?\xa0\n
246
00:27:07,680 --> 00:27:14,960
Okay let’s check. The outside global and outside\xa0\n
247
00:27:14,960 --> 00:27:19,840
only be different if destination NAT is used,\xa0\n
248
00:27:21,200 --> 00:27:28,799
The inside local address is 172.20.0.101.\xa0\n
249
00:27:28,799 --> 00:27:34,960
from the perspective of the inside network.\xa0\n
250
00:27:35,519 --> 00:27:40,480
That’s the IP address of the inside host, PC1,\xa0\n
251
00:27:41,599 --> 00:27:44,000
Once again, make sure you know\xa0\n
252
00:27:44,720 --> 00:27:49,600
If you’re confused, go back in the video to\xa0\n
253
00:27:49,599 --> 00:27:54,240
and of course feel free to ask questions in\xa0\n
254
00:27:54,240 --> 00:28:02,240
the quiz. Next let’s take a look at a bonus\xa0\n
255
00:28:02,240 --> 00:28:04,960
Okay here's today's Boson ExSim practice question.\xa0\xa0
256
00:28:06,240 --> 00:28:11,759
You issue the SHOW IP NAT TRANSLATIONS command\xa0\n
257
00:28:11,759 --> 00:28:19,200
output. So there are 2 entries in RouterA's\xa0\n
258
00:28:19,200 --> 00:28:24,640
TFTP connection with HostB. What is the IP\xa0\n
259
00:28:25,519 --> 00:28:30,559
So, these are the six options to choose from.\xa0\n
260
00:28:35,519 --> 00:28:44,319
Okay let's check. So, I believe the correct answer\xa0\n
261
00:28:44,319 --> 00:28:51,519
it is a TFTP connection from HostA to HostB. So\xa0\n
262
00:28:51,519 --> 00:28:59,599
which of these entries? We can look at the\xa0\n
263
00:28:59,599 --> 00:29:07,039
destination port is 69, not 23. So we know it\xa0\n
264
00:29:07,039 --> 00:29:13,359
of these addresses is HostA's address? So the\xa0\n
265
00:29:13,359 --> 00:29:20,959
IP address of HostA? It doesn't say inside global\xa0\n
266
00:29:21,680 --> 00:29:27,200
Well if you get a question like this, it's safe\xa0\n
267
00:29:27,200 --> 00:29:35,039
address of HostA. Not the NAT address configured\xa0\n
268
00:29:35,839 --> 00:29:43,679
which is HostA's IP address after NAT. It's asking\xa0\n
269
00:29:43,680 --> 00:29:52,080
before NAT, the actual IP address configured on\xa0\n
270
00:29:52,079 --> 00:30:01,039
correct answer. So I will click on show answer.\xa0\n
271
00:30:01,039 --> 00:30:07,839
explanation. I highly recommend reading this\xa0\n
272
00:30:09,119 --> 00:30:13,439
And there's some more down here at the bottom,\xa0\n
273
00:30:18,079 --> 00:30:23,199
Okay, so that was a quick look at Boson Software's\xa0\n
274
00:30:23,200 --> 00:30:29,279
the best practice exams for the CCNA, and I highly\xa0\n
275
00:30:29,279 --> 00:30:31,279
please follow the link in the video description.
276
00:30:34,240 --> 00:30:36,559
There are supplementary materials for this video.\xa0\xa0
277
00:30:37,279 --> 00:30:40,160
There is a flashcard deck to\xa0\n
278
00:30:41,119 --> 00:30:45,119
There will also be a packet tracer practice\xa0\n
279
00:30:46,000 --> 00:30:51,279
That will be in the next video. Sign up for my\xa0\n
280
00:30:51,279 --> 00:30:55,039
and I’ll send you all of the flashcards\xa0\n
281
00:30:57,119 --> 00:31:02,719
Before finishing today’s video I want to\xa0\n
282
00:31:02,720 --> 00:31:08,799
please click the ‘Join’ button under the video.\xa0\n
283
00:31:08,799 --> 00:31:16,559
Roger, Raj, Kenneth, Seamus, H W, Brandon, Samil,\xa0\n
284
00:31:16,559 --> 00:31:22,559
Anthony, Junhong, Benjamin, Tshepiso, Justin,\xa0\n
285
00:31:22,559 --> 00:31:28,720
Value, John, Funnydart, Velvijaykum, Mark, Yousif,\xa0\n
286
00:31:29,680 --> 00:31:33,600
Sorry if I pronounced your name incorrectly,\xa0\n
287
00:31:34,480 --> 00:31:40,559
This is the list of JCNP-level members at the\xa0\n
288
00:31:41,440 --> 00:31:46,480
If you signed up recently and your name isn’t\xa0\n
289
00:31:48,240 --> 00:31:51,279
Thank you for watching. Please\xa0\n
290
00:31:51,279 --> 00:31:56,000
like the video, leave a comment, and share the\xa0\n
291
00:31:57,119 --> 00:32:02,719
If you want to leave a tip, check the links in the\xa0\n
292
00:32:02,720 --> 00:32:09,279
and accept BAT, or Basic Attention Token, tips\xa0\n
25206
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.