Specifications
Table Of Contents
- Contents
- Preface
- Getting Started
- Basic Router Configuration
- Interface Port Labels
- Viewing the Default Configuration
- Information Needed for Configuration
- Configuring Basic Parameters
- Configuring Static Routes
- Configuring Dynamic Routes
- Configuring Enhanced IGRP
- Basic Router Configuration
- Configuring Your Router for Ethernet and DSL Access
- Sample Network Deployments
- Configuring PPP over Ethernet with NAT
- Configuring PPP over ATM with NAT
- Configuring a LAN with DHCP and VLANs
- Configuring a VPN Using Easy VPN and an IPSec Tunnel
- Configure the IKE Policy
- Configure Group Policy Information
- Apply Mode Configuration to the Crypto Map
- Enable Policy Lookup
- Configure IPSec Transforms and Protocols
- Configure the IPSec Crypto Method and Parameters
- Apply the Crypto Map to the Physical Interface
- Create an Easy VPN Remote Configuration
- Verifying Your Easy VPN Configuration
- Configuration Example
- Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation
- Configuring a Simple Firewall
- Configuring a Wireless LAN Connection
- Sample Configuration
- Configuring Additional Features and Troubleshooting
- Additional Configuration Options
- Configuring Security Features
- Configuring Dial Backup and Remote Management
- Troubleshooting
- Reference Information
- Cisco IOS Software Basic Skills
- Concepts
- ROM Monitor
- Common Port Assignments

3-7
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Chapter 3 Configuring PPP over Ethernet with NAT
Configure Network Address Translation
Configure Network Address Translation
Network Address Translation (NAT) translates packets from addresses that match a standard access list,
using global addresses allocated by the dialer interface. Packets that enter the router through the inside
interface, packets sourced from the router, or both are checked against the access list for possible address
translation. You can configure NAT for either static or dynamic address translations.
Perform these steps to configure the outside Fast Ethernet WAN interface with dynamic NAT, beginning
in global configuration mode:
Command Purpose
Step 1
ip nat pool name start-ip end-ip {netmask
netmask | prefix-length prefix-length}
Example:
Router(config)# ip nat pool pool1
192.168.1.0 192.168.2.0 netmask 0.0.0.255
Router(config)#
Creates pool of global IP addresses for NAT.
Step 2
ip nat inside source {list access-list-number}
{interface type number | pool name} [overload]
Example 1:
Router(config)# ip nat inside source list 1
interface dialer 0 overload
or
Example 2:
Router(config)# ip nat inside source list
acl1 pool pool1
Enables dynamic translation of addresses on the
inside interface.
The first example shows the addresses permitted
by the access list 1 to be translated to one of the
addresses specified in the dialer interface 0.
The second example shows the addresses
permitted by access list acl1 to be translated to one
of the addresses specified in the NAT pool pool1.
For details about this command and additional
parameters that can be set, as well as information
about enabling static translation, see the
Cisco IOS IP Command Reference, Volume 1 of 4:
Addressing and Services.
Step 3
interface type number
Example:
Router(config)# interface vlan 1
Router(config-if)#
Enters configuration mode for the VLAN (on
which the Fast Ethernet LAN interfaces reside) to
be the inside interface for NAT.
Step 4
ip nat {inside | outside}
Example:
Router(config-if)# ip nat inside
Router(config-if)#
Identifies the specified VLAN interface as the
NAT inside interface.
For details about this command and additional
parameters that can be set, as well as information
about enabling static translation, see the
Cisco IOS IP Command Reference, Volume 1 of 4:
Addressing and Services.