ENCOR Chapter 15
ENCOR Chapter 15
https://www.facebook.com/HocvienIPNET/
https://www.facebook.com/groups/tuhocquantrimang/
Time Synchronization - This section describes the need for synchronizing time
in an environment and covers Network Time Protocol and its operations to keep
time consistent across devices.
Network Address Translation (NAT) - This section explains how a router can
translate IP addresses from one network realm to another.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Time Synchronization
• A device’s system time is used to measure periods of idle state or computation. It is
important that time is consistent on a system because applications often use the
system time to tune internal processes.
• The rate a device can maintain its time can deviate from device to device. Time
intervals can vary from one device to another and the times would eventually begin to
drift away from each other.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Time Synchronization
Time Synchronization
It is important that a device’s system time is consistent, and from the perspective of managing a
network, that the time be synchronized between network devices for the several reasons:
• Managing passwords that change at specific time intervals
• Encryption key exchanges
• Checking validity of certificates based on expiration date and time
• Correlation of security-based events across multiple devices (routers, switches, firewalls,
network access control systems, and so on)
• Troubleshooting network devices and correlating events to identify the root cause of an event
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Time Synchronization
Network Time Protocol and Stratums
• Network Time Protocol (NTP) is used to synchronize a set of network clocks in a distributed
client/server architecture.
• NTP is a UDP-based protocol that connects with servers on port 123. The client source port
is dynamic.
• NTP is based on a hierarchical concept of communication. At the top of the hierarchy are
authoritative devices that operate as an NTP server with an atomic clock. The NTP client
queries the NTP server for its time and then updates its time based on the response.
• The NTP synchronization process is not fast, gaining an accuracy of tens of milliseconds
requires hours or days of comparisons.
• Stratums are used to identify the accuracy of the time clock source. NTP servers directly
attached to an authoritative time source are stratum 1 servers.
• An NTP client that queries a stratum 1 server is considered a stratum 2 client.
• The higher the stratum, the greater the chance of deviation in time from the authoritative
time source due to the number of time drifts between the NTP stratums.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Time Synchronization
NTP Configuration
To configure an NTP client use the global command ntp ip-address [prefer] [source
interface-id]. The keywork prefer indicates which NTP server to use for time
synchronization. The command ntp master stratum-number to statically set the stratum
for a device when it acts as an NTP server.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Time Synchronization
NTP Status and Associations
The command show ntp status displays the
status of the NTP service. It shows the following:
• Whether the hardware clock is synchronized to
the software clock, the stratum reference of the
local device, and the reference clock identifier
(local or IP address)
• The frequency and precision of the clock
• The NTP uptime and granularity
• The reference time
• The clock offset and delay between the client
and the lower-level stratum server
• Root dispersion and peer dispersion
• NTP loopfilter A streamlined version of the NTP server
• Polling interval and time since last update status and delay can be viewed using the
command show ntp associations.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Time Synchronization
Stratum Preference
An NTP client configured with multiple NTP servers will only use the NTP server with
the lowest stratum.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Time Synchronization
NTP Peers
An NTP client will change it’s time to that of the NTP server. However, an NTP server
does not change its time to reflect an NTP client. NTP peers act as clients and servers
to each other. They can query and synchronize their time to each other. NTP peers are
configured with the command ntp peer ip-address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
First-Hop Redundancy
Protocol
• Network resiliency is a key component of network design.
• Network resiliency can be accomplished by adding redundant devices such as Layer 2
switches or Layer 3 routers into a topology.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
First-Hop Redundancy Protocol
Network Resiliency/First Hop Redundancy Protocols
The figure shows the concept of adding resiliency
to the network. In both scenarios:
• Two devices (172.16.1.2 and 172.16.1.3) can
be the PC’s gateway.
• There are two resilient Layer 2 links that
connect SW6 to a switch that can connect the
PC to either gateway.
First-hop redundancy protocols (FHRPs) solve the
problem of end devices configuring multiple
gateways. They do this by creating a virtual IP (VIP)
gateway that is shared between the Layer 3 devices.
The following are FHRPs:
• Hot Standby Router Protocol (HSRP)
• Virtual Router Redundancy Protocol (VRRP)
• Gateway Load Balancing Protocol (GLBP)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
First-Hop Redundancy Protocol
Object Tracking
Object tracking offers a flexible and
customizable mechanism for linking with
FHRPs and other routing components.
Users can track specific objects in the
network and take necessary action when
any object’s state change affects the
network traffic.
To track routes in the routing table use
the command track object-number ip
route route/prefix-length reachability.
The status of object tracking can be
viewed with the command show track
[object-number].
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
First-Hop Redundancy Protocol
Tracking an Interface
To track an interface’s line protocol state
use the command track object-number
interface interface-id line-protocol.
The example shows R2 being configured
for tracking the Gi0/1 interface toward
R3.
Shutting down R2’s Gi0/1 interface
changed the tracked object state on R1
and R2 to a down state.
Object tracking works with protocols such as
Hot Standby Router Protocol (HSRP), Virtual
Router Redundancy Protocol (VRRP), and
Gateway Load Balancing Protocol (GLBP).
They take action when the state of an object
changes.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
First-Hop Redundancy Protocol
Hot Standby Router Protocol
Hot Standby Routing Protocol (HSRP) is a Cisco proprietary protocol. It provides routing
redundancy for hosts configured with a default gateway IP address.
• A minimum of two devices are required to enable HSRP:
• One device acts as the active device and takes care of forwarding the packets.
• The other acts as a standby that is ready to take over the role of active device in the event of a
failure.
• A virtual IP address is configured on each HSRP-enabled interface that belongs to the
same HSRP group. A virtual MAC address is also assigned for the group.
• The active router receives and routes the packets destined for the virtual MAC address of
the group.
• HSRP-enabled interfaces send and receive multicast UDP-based hello messages to
detect any failure and designate active and standby routers.
• When the HSRP active router fails, the HSRP standby router assumes control of the
virtual IP address and virtual MAC address of the group.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
First-Hop Redundancy Protocol
HSRP Elections & Versions
• A HSRP election selects the router with the highest priority (default is 100).
• In the event of a tie in priority, the router with the highest IP address for the network
segment is preferred.
• HSRP does not support preemption by default. If a router with a lower priority becomes
active, it stays active regardless if the superior router comes back online.
• The transition of the HSRP active to the standby is transparent to all hosts on the
segment because the MAC address moves with the virtual IP address.
• HSRP has two versions, HSRPv1 and HSRPv2.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
First-Hop Redundancy Protocol
Configuring HSRP Virtual IP Address
The following steps show how to configure an HSRP virtual IP (VIP) gateway instance:
Step 1. Define the HSRP instance by using the command standby instance-id ip vip-
address.
Step 2. (Optional) Configure HSRP router preemption with the command standby instance-
id preempt.
Step 3. (Optional) Configure the HSRP priority by using the command standby instance-id
priority priority. The priority is a value between 0 and 255.
Step 4. (Optional) Configure the HSRP MAC address with the command standby instance-
id mac-address mac-address.
Step 5. (Optional) Define the HSRP timers by using the command standby instance-id
timers {seconds | msec milliseconds}. HSRP can poll in intervals of 1 to 254 seconds or 15
to 999 milliseconds
Step 6. (Optional) Establish HSRP authentication by using the command standby instance-
id authentication {text-password | text text-password | md5 {key-chain key-chain | key-
string key-string}}.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
First-Hop Redundancy Protocol
HSRP Configuration and State
Example 15-9 shows a basic HSRP
configuration for VLAN 10 on SW1 and SW2,
using the HSRP instance 10 and the VIP
gateway instance 172.16.10.1.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
First-Hop Redundancy Protocol
Virtual Router Redundancy Protocol
Virtual Router Redundancy Protocol (VRRP) is an industry standard protocol that operates
similarly to HSRP. However, the differences are as follows:
• The preferred active router controlling the VIP gateway is called the master router. All
other VRRP routers are known as backup routers.
• VRRP enables preemption by default.
• The MAC address of the VIP gateway uses the structure 0000.5e00.01xx, where xx
reflects the group ID in hex.
• VRRP uses the multicast address 224.0.0.18 for communication.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
First-Hop Redundancy Protocol
Legacy VRRP Configuration
Early VRRP configurations supported only VRRPv2 and
was non-hierarchical in its configuration. The following are
steps used to configure older software versions with
VRRP:
Step 1. Define the VRRP instance by using the
command vrrp instance-id ip vip-address.
Step 2. (Optional) Define the VRRP priority by using the
command vrrp instance-id priority priority. The priority is
a value between 0 and 255.
Step 3. (Optional) Enable object tracking so that the
priority is decremented when the object is false by using
the command vrrp instance-id track object-id decrement
decrement-value.
Step 4. (Optional) Establish VRRP authentication by
using the command vrrp instance-id authentication {text-
password | text text-password | md5 {key-chain key-
chain | key-string key-string}}
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
First-Hop Redundancy Protocol
VRRP State
The command show vrrp [brief] provides an update on the VRRP group, along with
other relevant information for troubleshooting. Example 15-16 shows the brief iteration of
the command and 15-17 shows the detailed state of VRRP.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
First-Hop Redundancy Protocol
Hierarchical VRRP Configuration
The newer version of IOS XE software provides configuration of VRRP in a multi-address format that
is hierarchical. The following are steps to configure hierarchical VRRP:
Step 1. Enable VRRPv3 on the router by using the
command fhrp version vrrp v3.
Step 2. Define the VRRP instance by using the command
vrrp instance-id address-family {ipv4 | ipv6}.
Step 3. (Optional) Change VRRP to Version 2 by using the
command vrrpv2. VRRPv2 and VRRPv3 are not compatible.
Step 4. Define the gateway VIP by using the command
address ip-address.
Step 5. (Optional) Define the VRRP priority by using the
command priority priority.
Step 6. (Optional) Enable object tracking so that the priority
is decremented when the object is false using the command
track object-id decrement decrement-value.
The status of the VRRP routers can be viewed with the command show vrrp [brief]. The output is identical to that
of the legacy VRRP configuration.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
First-Hop Redundancy Protocol
Global Load Balancing Protocol
Global Load Balancing Protocol (GLBP) provides gateway redundancy and load-balancing
capability to a network segment. It does this with an active/standby gateway and ensures that
each member of the GLBP group forwards traffic to the appropriate gateway.
The GLBP has two roles:
• Active virtual gateway (AVG): The participating routers elect one AVG per GLBP group to
respond to initial ARP requests for the VIP.
• Active virtual forwarder (AVF): The AVF routes traffic received from assigned hosts. A unique
virtual MAC address is created and assigned by the AVG to the AVFs. The AVF is assigned to a
host when the AVG replies to the ARP request with the assigned AVF’s virtual MAC address.
The AVFs are also recognized as Fwd instances on the routers.
GLBP supports four active AVFs and one AVG per GLBP group. A router can be an AVG and an
AVF at the same time. In the event of a failure of the AVG, the AVG role is transferred to a standby
AVG device. In the event of a failure of an AVF, another router takes over the forwarding
responsibilities for that AVF, which includes the virtual MAC address for that instance.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
First-Hop Redundancy Protocol
GLBP Configuration
The following steps detail how to configure a GLBP:
Step 1. Define the GLBP instance by using the
command glbp instance-id ip vip-address.
Step 2. (Optional) Configure GLBP preemption with
the command glbp instance-id preempt.
Step 3. (Optional) Define the GLBP priority by using
the command glbp instance-id priority priority. The
priority is a value between 0 and 255.
Step 4. (Optional) Define the GLBP timers by using
the command glbp instance-id timers {hello-seconds
| msec hello-milliseconds} {hold-seconds | msec
hold-milliseconds}.
Step 5. (Optional) Establish GLBP authentication by
using the command glbp instance-id authentication
{text text-password | md5 {key-chain key-chain |
key-string key-string}}.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
First-Hop Redundancy Protocol
GLBP Status
The command show glbp brief shows high-level
details of the GLBP group, including the interface,
group, active AVG, standby AVG, and statuses of the
AVFs.
The command show glbp displays additional
information, including the timers, preemption settings,
and statuses for the AVG and AVFs for the GLBP
group.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
First-Hop Redundancy Protocol
GLBP Load Balancing
GLBP supports three methods of load balancing traffic:
• Round robin - Uses each virtual forwarder MAC address to sequentially reply for the virtual
IP address. GLBP uses round robin as the default load-balancing method.
• Weighted - Defines weights to each device in the GLBP group to define the ratio of load
balancing between the devices. This allows for a larger weight to be assigned to bigger
routers that can handle more traffic.
• Host dependent - Uses the host MAC address to decide to which virtual forwarder MAC to
redirect the packet. This method ensures that the host uses the same virtual MAC address
as long as the number of virtual forwarders does not change within the group.
The load-balancing method can be changed with the command glbp instance-id load-
balancing {host-dependent | round-robin | weighted}. The weighted load-balancing
method has the AVG direct traffic to the AVFs based on the percentage of weight a router has
over the total weight of all GLBP routers. The weight can be set for a router with the
command glbp instance-id weighting weight.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
First-Hop Redundancy Protocol
Verifying GLBP Weighted Load Balancing
The example shows that the load-balancing
method has been changed to weighted and that
the appropriate weight has been set for each
AVF.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Network Address Translation
• In the early stages of the internet, large network blocks were assigned to
organizations.
• Network engineers started to realize that as more people connected to the internet, the
IP address space would become exhausted.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Network Address Translation
Private Network Addressing
RFC 1918 established common network blocks that are non-globally routed networks. These
address blocks provide large private network blocks for companies to connect their devices
together, but private IP addressing doesn’t exist on the internet. The private address blocks
are as follows:
10.0.0.0/8 accommodates 16,777,216 hosts.
172.16.0.0/24 accommodates 1,048,576 hosts.
192.168.0.0/16 accommodates 65,536 hosts.
NAT enables the internal IP network to appear as a publicly routed external network. A NAT
device (typically a router or firewall) modifies the source or destination IP addresses in a
packet’s header as the packet is received on the outside or inside interface. NAT can be used
in use cases other than just providing internet connectivity to private networks such as
providing connectivity when a company buys another company, and the two companies have
overlapping networks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Network Address Translation
Network Address Translation
NAT enables the internal IP network to appear as a publicly routed external network.
A NAT device (typically a router or firewall) modifies the source or destination IP addresses
in a packet’s header as the packet is received on the outside or inside interface.
NAT can be used in use cases other than just providing internet connectivity to private
networks, such as providing connectivity when a company buys another company, and the
two companies have overlapping networks.
Most routers and switches perform NAT translation only with the IP header addressing and
do not translate IP addresses within the payload (for example, DNS requests). Some
firewalls can perform NAT within the payload for certain types of traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Address Translation
Inside/Outside Local and Global
Here are four important terms related to NAT:
• Inside local - The actual private IP address assigned to a device on the inside
network(s).
• Inside global - The public IP address that represents one or more inside local IP
addresses to the outside.
• Outside local - The IP address of an outside host as it appears to the inside network.
The IP address does not have to be reachable by the outside but is considered private
and must be reachable by the inside network.
• Outside global - The public IP address assigned to a host on the outside network. This
IP address must be reachable by the outside network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Address Translation
Types of NAT
Three types of NAT commonly used today are as follows:
• Static NAT - Provides a static one-to-one mapping of a local IP address to a global IP
address.
• Pooled NAT - Provides a dynamic one-to-one mapping of a local IP address to a global
IP address. The global IP address is temporarily assigned to a local IP address. After a
certain amount of idle NAT time, the global IP address is returned to the pool.
• Port Address Translation (PAT) - Provides a dynamic many-to-one mapping of many
local IP addresses to one global IP address. The NAT device translates the private IP
address and port to a different global IP address and port. The port is unique from any
other ports, which enables the NAT device to track the global IP address to local IP
addresses based on the unique port mapping.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Address Translation
NAT Example
Figure 15-7 is used throughout this
section to illustrate NAT.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Network Address Translation
NAT Example (Cont.)
Example 15-25 shows the routing tables
of R1, R5 and R7.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Address Translation
NAT Example (Cont.)
• Example 15-26 shows a traceroute
from R1 to R7. The topology provides
full connectivity between the outside
hosts (R1, R2, and R3) and the
inside hosts (R7, R8, and R9).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Network Address Translation
Static NAT
Static NAT involves the translation of a global IP address to a local IP address, based on
a static mapping of the global IP address to the local IP address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Network Address Translation
Inside Static NAT
The steps for configuring inside static NAT are as follows:
Step 1. Configure the outside interfaces by using the command ip nat outside.
Step 2. Configure the inside interface with the command ip nat inside.
Step 3. Configure the inside static NAT by using the command ip nat inside source
static inside-local-ip inside-global-ip.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Network Address Translation
Identifying the Source with Inside Static NAT/NAT
Translation Table
With NAT configured, a telnet session
with R1 is initiated. Viewing the TCP
session on R1, the local address
remains 10.123.4.1 but the remote
address now reflects 10.45.1.7.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Network Address Translation
NAT Translation Steps (Cont.)
Step 3. R5 translates (that is, changes) the
packet’s source IP address from 10.78.9.7 to
10.45.1.7.
Step 4. R1 registers the session as coming
from 10.45.1.7 and then transmits a return
packet. The packet is forwarded to R4 using
the static default route, and R4 forwards the
packet using the static default route.
Step 5. As the packet enters on the Gi0/0
interface of R5, R5 is aware that the Gi0/0
interface is an outside NAT interface and
checks the NAT table for an entry.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Network Address Translation
NAT Translation Steps (Cont.)
Step 6. R5 correlates the packet’s source and
destination ports with the first NAT entry, as
shown in Example 15-30, and knows to
modify the packet’s destination IP address
from 10.45.1.7 to 10.78.9.7.
Step 7. R5 routes the packet out the Gi0/1
interface toward R6.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Network Address Translation
Connectivity from External Devices to the Inside Global IP
Address
In Example 15-31:
• R2 establishes a Telnet session
with R7, using the inside global
IP address 10.45.1.7.
• R5 simply creates a second
dynamic entry for this new
session.
• From R7’s perspective, it has
connected with R2 (10.123.4.2).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Network Address Translation
Outside Static NAT
Outside static NAT involves the mapping of an outside global (public) IP address to an
outside local (private) IP address. The steps for configuring outside static NAT are as
follows:
Step 1. Configure the outside interfaces by using the command ip nat outside.
Step 2. Configure the inside interface with the command ip nat inside.
Step 3. Configure the outside static NAT by using the command ip nat outside source
static outside-global-ip outside-local-ip [add-route].
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Network Address Translation
Outside Static NAT Demonstration
R6, R7, R8, or R9 could initiate a Telnet session with R2’s IP address (10.123.4.2) and no NAT
translation would occur. The same routers could initiate a Telnet session with the R2’s outside
local IP address 10.123.4.222; or R2 could initiate a session with any of the inside hosts (R6,
R7, R8, or R9) to demonstrate the outside static NAT entry.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Network Address Translation
NAT Translation Table for Outside Static NAT
Figure 15-9 shows the translation table of
R5 for the outside static NAT entry of R2
for 10.123.4.222.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Network Address Translation
Pooled NAT
A downfall to static NAT is the number of configurations entries that must be created
on the NAT device. In addition, the number of global IP addresses must match the
number of local IP addresses.
The dynamic NAT translation stays in the translation table until traffic flow from the
local address to the global address has stopped and the timeout period (24 hours by
default) has expired. The unused global IP address is then returned to the pool to be
used again.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Network Address Translation
Pooled NAT Configuration Steps
The steps for configuring inside pooled NAT are as follows:
Step 1. Configure the outside interfaces by using the command ip nat outside.
Step 2. Configure the inside interface with the command ip nat inside.
Step 3. Specify which traffic to translate by using a standard or extended ACL referenced
by number or name. Using a user-friendly name may be simplest from an operational
support perspective
Step 4. Define the global pool of IP addresses by using the command ip nat pool nat-
pool-name starting-ip ending-ip prefix-length prefix-length.
Step 5. Configure the inside pooled NAT by using the command ip nat inside source list
acl pool nat-pool-name.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Network Address Translation
Configuring Inside Pooled NAT
Example 15-35 uses a NAT pool
with the IP addresses 10.45.1.10
and 10.45.1.11. A named ACL,
ACL-NAT-CAPABLE, allows only
packets sourced from the
10.78.9.0/24 network to be eligible
for pooled NAT.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Network Address Translation
Pooled NAT Table
In Example 15-37, there are a total of
four translations in the translation table
of R5. Two of them are for the full flow
and specify the protocol, inside global,
inside local, outside local, and outside
global IP addresses.
Port Address Translation (PAT) is an iteration of NAT that allows for a mapping of many local
IP addresses to one global IP address.
The NAT device maintains the state of translations by dynamically changing the source
ports as a packet leaves the outside interface.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Network Address Translation
Configuring PAT
The steps for configuring PAT are as follows:
Step 1. Configure the outside interface by
using the command ip nat outside.
Step 2. Configure the inside interface with the
command ip nat inside.
Step 3. Specify which traffic can be translated
by using a standard or extended ACL
referenced by number or name.
Step 4. Configure Port Address Translation by
using the command ip nat inside source list
acl {interface interface-id | pool nat-pool-
name} overload.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Network Address Translation
Generating Traffic for PAT
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Network Address Translation
NAT Translation Table With PAT
Figure 15-10 shows R5’s translation table
after all the various flows have established.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Prepare for the Exam
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Prepare for the Exam
Key Topics for Chapter 15
Description
Network Time Protocol
NTP stratums
Stratum preferences
NTP peers
First-hop redundancy protocol (FHRP)
Hot Standby Router Protocol (HSRP)
HSRP configuration
HSRP object tracking
Virtual Router Redundancy Protocol
Legacy VRRP configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Prepare for the Exam
Key Topics for Chapter 15 (Cont.)
Description
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Prepare for the Exam
Key Terms for Chapter 15
Terms
First-hop redundancy protocol Outside local
Inside global Outside global
Inside local Pooled NAT
Network Address Translation
Port Address Translation (PAT)
(NAT)
NTP client Static NAT
NTP peer stratum
NTP Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Prepare for the Exam
Command Reference for Chapter 15
Task Command Syntax
Configure a device as an NTP client with the IP ntp server ip-address [prefer] [source
address of the NTP server interface-id]
Configure a device so that it can respond
authoritatively to NTP requests when it does not
ntp master stratum-number
have access to an atomic clock or an upstream
NTP server
Configure the peering with another device with
ntp peer ip-address
NTP
Configure the tracking of an interface’s line track object-number interface interface-id
protocol state line-protocol
Configure a device to track the installation of a track object-number ip route route/ prefix-
route in the routing table length reachability
Configure the VIP for the HSRP instance standby instance-id ip vip-address
Enable preemption for the HSRP instance standby instance-id preempt
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Prepare for the Exam
Command Reference for Chapter 15 (Cont.)
Task Command Syntax
standby instance-id mac-address mac-
Specify the MAC address for the HSRP VIP
address
Configure the HSRP timers for neighbor health standby instance-id timers {seconds | msec
checks milliseconds}
Link object tracking to a decrease in priority standby instance-id track object-id
upon failure of the HSRP decrement decrement-value
Configure the VIP gateway for the VRRP
vrrp instance-id ip vip-address
instance
Configure the priority for the VRRP instance vrrp instance-id priority
Link object tracking to a decrease in priority vrrp instance-id track object-id decrement
upon failure with VRRP decrement-value
Configure the VIP gateway for a GLBP instance glbp instance-id ip vip-address
Enable preemption for a GLBP instance glbp instance-id preempt
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Prepare for the Exam
Command Reference for Chapter 15 (Cont.)
Task Command Syntax
Configure the priority for a GLBP instance glbp instance-id priority priority
glbp instance-id timers {hello-seconds |
Configure GLBP timers for neighbor health checks msec hello-milliseconds} {hold- seconds |
msec hold-milliseconds}
glbp instance-id load-balancing {host-
Configure the GLBP load-balancing algorithm
dependent | round-robin | weighted}.
Configure the devices GLBP weight for traffic load
glbp instance-id weighting weight
balancing
Configure an interface as an outside interface for
ip nat outside
NAT
Configure an interface as an inside interface for NAT ip nat inside
ip nat inside source static inside- local-ip
Configure static inside NAT
inside-global-ip
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Prepare for the Exam
Command Reference for Chapter 15 (Cont.)
Task Command Syntax
ip nat outside source static outside- global-
Configure static outside NAT
ip outside-local-ip [add-route]
ip nat pool nat-pool-name starting-ip ending-
Configure pooled NAT
ip prefix-length prefix-length
Define the NAT pool for global IP ip nat inside source list acl pool nat-pool-
addresses name
ip nat inside source list acl {interface
Configure a device for PAT
interface-id | pool nat-pool-name} overload
Modify the NAT timeout period ip nat translation timeout seconds
Clear a dynamic NAT entry clear ip nat translation {ip-address | *}
Display the status of the NTP service,
hardware clock synchronization status,
show ntp status
reference time, and time since last polling
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
cycle
Prepare for the Exam
Command Reference for Chapter 15 (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64