This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
icnd1:nat [2024/03/14 08:04] 114.119.149.71 old revision restored (2023/09/23 12:44) |
icnd1:nat [2024/06/02 14:09] (current) 18.218.173.117 old revision restored (2024/03/14 07:51) |
||
---|---|---|---|
Line 53: | Line 53: | ||
===== Chapter Questions ===== | ===== Chapter Questions ===== | ||
==== One ==== | ==== One ==== | ||
- | Examine the following show command output on a router configured for dynamic NAT: | + | **Examine the following show command output on a router configured for dynamic NAT:** |
< | < | ||
-- Inside Source | -- Inside Source | ||
Line 64: | Line 64: | ||
type generic, total addresses 7, allocated 7 (100%), misses 965 | type generic, total addresses 7, allocated 7 (100%), misses 965 | ||
- | Users are complaining about not being able to reach the Internet. Which of the following is the most likely cause? | ||
</ | </ | ||
+ | **Users are complaining about not being able to reach the Internet. Which of the following is the most likely cause?** | ||
- | **The NAT pool does not have enough entries to satisfy all requests.** | + | * '' |
- | + | | |
- | The problem is not related to NAT, based on the information in the command output. | + | |
- | + | | |
- | The command output does not supply enough information to identify the problem. | + | |
- | + | ||
- | Standard ACL 1 cannot be used; an extended ACL must be used. | + | |
You answered this question correctly. × | You answered this question correctly. × | ||
Line 82: | Line 79: | ||
- | 200.1.1.0 255.255.255.0 | + | * 200.1.1.0 255.255.255.0 |
+ | * '' | ||
+ | * 10.1.0.0 255.255.0.0 | ||
+ | * 10.0.0.0 255.255.255.0 | ||
+ | You answered this question correctly. × | ||
- | '' | + | **Explanation: |
+ | CIDR’s original intent was to allow the summarization of multiple Class A, B, and C networks to reduce the size of Internet routing tables. Of the answers, only 200.1.0.0 255.255.0.0 | ||
- | 10.1.0.0 255.255.0.0 | + | ==== Three ==== |
+ | **With static NAT, performing translation for inside addresses only, what causes NAT table entries to be created?** | ||
- | 10.0.0.0 255.255.255.0 | + | * '' |
+ | * The first packet from the inside network to the outside network | ||
+ | * Configuration using the ip nat outside source command | ||
+ | * The first packet from the outside network to the inside network | ||
You answered this question correctly. × | You answered this question correctly. × | ||
- | **Explanation: | + | **Explanation: |
- | CIDR’s original intent was to allow the summarization | + | **With static NAT, the entries are statically configured. Because the question mentions translation for inside addresses, the inside keyword is needed in the command. |
+ | |||
+ | ==== Four ==== | ||
+ | **Which | ||
+ | |||
+ | * '' | ||
+ | * 172.31.1.1 | ||
+ | * '' | ||
+ | * 10.255.1.1 | ||
+ | * 10.1.255.1 | ||
+ | Select 2 answers | ||
+ | |||
+ | You answered this question correctly. × | ||
+ | |||
+ | **Explanation**: | ||
+ | RFC 1918 identifies private network numbers. It includes | ||
+ | |||
+ | ==== Five ==== | ||
+ | **NAT has been configured | ||
+ | |||
+ | ip nat pool barney | ||
+ | ip nat inside 200.1.1.1 200.1.1.2 | ||
+ | ip nat inside | ||
+ | '' | ||
+ | You answered this question correctly. × | ||
+ | |||
+ | **Explanation**: | ||
+ | The list 1 parameter references an IP ACL, which matches packets, identifying the inside local addresses. |