This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
icnd1:nat [2024/03/14 07:50] 114.119.158.167 old revision restored (2023/10/07 04:41) |
icnd1:nat [2024/06/02 14:09] (current) 18.218.173.117 old revision restored (2024/03/14 07:51) |
||
---|---|---|---|
Line 53: | Line 53: | ||
===== Chapter Questions ===== | ===== Chapter Questions ===== | ||
==== One ==== | ==== One ==== | ||
- | Examine the following show command output on a router configured for dynamic NAT: | + | **Examine the following show command output on a router configured for dynamic NAT:** |
< | < | ||
-- Inside Source | -- Inside Source | ||
Line 64: | Line 64: | ||
type generic, total addresses 7, allocated 7 (100%), misses 965 | type generic, total addresses 7, allocated 7 (100%), misses 965 | ||
- | Users are complaining about not being able to reach the Internet. Which of the following is the most likely cause? | ||
</ | </ | ||
+ | **Users are complaining about not being able to reach the Internet. Which of the following is the most likely cause?** | ||
- | **The NAT pool does not have enough entries to satisfy all requests.** | + | * '' |
+ | * The problem is not related to NAT, based on the information in the command output. | ||
+ | * The command output does not supply enough information to identify the problem. | ||
+ | * Standard ACL 1 cannot be used; an extended ACL must be used. | ||
+ | You answered this question correctly. × | ||
- | The problem is not related to NAT, based on the information | + | **Explanation: |
+ | The last line mentions that the pool has seven addresses, with all seven allocated, with the misses counter close to 1000 - meaning that close to 1000 new flows were rejected because of insufficient space in the NAT pool. | ||
+ | ==== Two ==== | ||
+ | **Which of the following summarized subnets represent routes that could have been created for CIDR’s goal to reduce the size of Internet routing tables?** | ||
- | The command output does not supply enough information to identify the problem. | + | |
+ | * 200.1.1.0 255.255.255.0 | ||
+ | * '' | ||
+ | * 10.1.0.0 255.255.0.0 | ||
+ | * 10.0.0.0 255.255.255.0 | ||
+ | You answered this question correctly. × | ||
- | Standard ACL 1 cannot be used; an extended ACL must be used. | + | **Explanation: |
+ | CIDR’s original intent was to allow the summarization of multiple Class A, B, and C networks to reduce the size of Internet routing tables. Of the answers, only 200.1.0.0 255.255.0.0 summarizes multiple networks. | ||
+ | |||
+ | ==== Three ==== | ||
+ | **With static NAT, performing translation for inside addresses only, what causes NAT table entries to be created? | ||
+ | |||
+ | * '' | ||
+ | * The first packet from the inside network to the outside network | ||
+ | * Configuration using the ip nat outside source command | ||
+ | * The first packet from the outside network to the inside network | ||
You answered this question correctly. × | You answered this question correctly. × | ||
- | Explanation: | + | **Explanation: |
- | The last line mentions | + | **With static NAT, the entries are statically configured. Because the question |
+ | |||
+ | ==== Four ==== | ||
+ | **Which of the following are not private | ||
+ | |||
+ | * '' | ||
+ | * 172.31.1.1 | ||
+ | * '' | ||
+ | * 10.255.1.1 | ||
+ | * 10.1.255.1 | ||
+ | Select 2 answers | ||
+ | |||
+ | You answered this question correctly. × | ||
+ | |||
+ | **Explanation**: | ||
+ | RFC 1918 identifies private network numbers. It includes Class A network 10.0.0.0, Class B networks 172.16.0.0 through 172.31.0.0, and Class C networks 192.168.0.0 through 192.168.255.0. | ||
+ | |||
+ | ==== Five ==== | ||
+ | **NAT has been configured | ||
+ | |||
+ | ip nat pool barney 200.1.1.1 200.1.1.254 netmask 255.255.255.0 | ||
+ | ip nat inside 200.1.1.1 200.1.1.2 | ||
+ | ip nat inside | ||
+ | '' | ||
+ | You answered this question correctly. × | ||
+ | |||
+ | **Explanation**: | ||
+ | The list 1 parameter references an IP ACL, which matches packets, identifying the inside local addresses. |