再看网络

<span class="portrait"></span><p class="slideShine">xiaofang.bk</p> / 2024-10-15 / 原文

NAT     

三种方式:

  • 静态转换Static Nat

  • 动态转换Dynamic Nat

  • 端口多路复用OverLoad

eNSP或者cisco实验(这里使用cisco):

  • 静态转换Static Nat

 

R-1(config)#ip nat pool fpc 180.101.50.100 180.101.50.200 netmask 255.255.255.0   #声明一个nat地址池
R-1(config)#ip nat inside source static 192.168.31.2 180.101.50.100   #在地址池选一个ip,对终端做ip映射:内侧192.168.31.2的终端ip映射成180.101.50.100
R-1(config)#ip nat outside source static 180.101.50.100 192.168.31.2  #对外侧180.101.50.100的路由器接口ip映射成191.168.31.2
R-1(config)#int g0/0/0  #路由器接口g/0/0是内侧
R-1(config-if)#ip nat inside
R-1(config-if)#exit
R-1(config)#int g0/0/1 #路由器接口g0/0/1是外侧
R-1(config-if)#ip nat outside

R-1# show ip nat statistics  #查看接口配置

Total translations: 2 (1 static, 1 dynamic, 0 extended)

Outside Interfaces: GigabitEthernet0/0/1

Inside Interfaces: GigabitEthernet0/0/0

 

R-1# show ip nat translations  #查看nat配置,inside global 内部公网ip,inside local 内部私网ip ,outside local 外部私网ip, outside global 外部公网ip

Pro Inside global Inside local Outside local Outside global

--- 180.101.50.100 192.168.31.2 --- ---

--- --- --- 192.168.31.2 180.101.50.100

 

 

  • 动态转换Dynamic Nat

 

Router(config)#ip nat pool fpc 180.101.50.100 180.101.50.200 netmask 255.255.255.0   #声明一个nat地址池
Router#access-list 1 permit 192.168.31.0 0.0.31.255
ip nat inside source list 1 pool fpc
int g0/0
ip nat inside
exit
int g0/1
ip nat outside

 


Router#show ip nat statistics


Total translations: 8 (0 static, 8 dynamic, 8 extended)


Outside Interfaces: GigabitEthernet0/0/1


Inside Interfaces: GigabitEthernet0/0/0


Hits: 8 Misses: 10


Expired translations: 2


Dynamic mappings:



-- Inside Source


access-list 1 pool fpc refCount 8


pool fpc: netmask 255.255.255.0


start 180.101.50.100 end 180.101.50.200


type generic, total addresses 101 , allocated 1 (0%), misses 0


Router#


Router#show ip nat translations


Pro Inside global Inside local Outside local Outside global  # 每次ping都不一样,随机从池中获取ip映射


icmp 180.101.50.100:10 192.168.31.2:10 180.101.51.2:10 180.101.51.2:10


icmp 180.101.50.100:3 192.168.31.2:3 180.101.51.2:3 180.101.51.2:3


icmp 180.101.50.100:4 192.168.31.2:4 180.101.51.2:4 180.101.51.2:4


icmp 180.101.50.100:5 192.168.31.2:5 180.101.51.2:5 180.101.51.2:5


icmp 180.101.50.100:6 192.168.31.2:6 180.101.51.2:6 180.101.51.2:6


icmp 180.101.50.100:7 192.168.31.2:7 180.101.51.2:7 180.101.51.2:7


icmp 180.101.50.100:8 192.168.31.2:8 180.101.51.2:8 180.101.51.2:8


icmp 180.101.50.100:9 192.168.31.2:9 180.101.51.2:9 180.101.51.2:9

 

 

总而言之,去SNAT,回DNAT   PAT(端口映射):去DNAT,回SNAT


 

vlan与交换 trunck技术(路由器成本昂贵,vlan是很好的替代品)

vlan:虚拟局域网技术,可以从逻辑上将将一个大的网络划分若干小的局域网,从而达到控制广播流量的效果。

 交换机的泛洪流量在虚拟局域网内进行  --->  默认是VLAN1

 拆分广播域,切割局域网方式:

1、路由(路由器价格昂贵)

2、子网掩码,划分不同的子网,不同子网间不能通信,但是还可以发送广播  

3、vlan,主要是控制广播泛洪,2、安全性 虚拟局域网(vlan)之间由二层上升到三层通信,间接通信

  • 在局域网,网络规模不断的扩大,接入的主机以及设备会越来越多,在这种情况下,网络中的广播流量越来越大,于是会加重交换机的负担,消耗交换机的cpu,内存等,甚至造成交换机的死机。

 

 

在vlan技术中,只有同一vlan内的端口内的主机才可以进行通信,不同vlan端口之间不能直接通信访问。因此vlan可以限制个别主机访问服务器资源,这样可以提高局域网络的安全性。

 

 

 

 

 


VPN技术