Create a static NAT translation to map the Server1 inside address to its outside address.
Solution :
interface s0/0/0
ip nat outside
interface g0/0
ip nat inside
ip nat inside source static 172.16.16.1 64.100.50.1
do show ip nat translation
configure one statement for ACL 1 to permit any address belonging to the 172.16.0.0/16 network
Configure R2 with a NAT pool that uses two addresses in the 209.165.200.228/30 address space
Enter the command that associates ACL 1 with the NAT pool that you just created
Configure R2 interfaces with the appropriate inside and outside NAT commands
solution :
#access-list 1 permit 172.16.0.0 0.0.255.255
#ip nat pool R2POOL 209.165.200.229 209.165.200.230 netmask 255.255.255.252
#ip nat inside source list 1 pool R2POOL overload
#interface s0/0/0
ip nat outside
interface s0/0/1
ip nat inside
R1
configure one statement for ACL 1 to permit any address belonging to 172.16.0.0/16
Configure R1 with a NAT pool that uses the two useable addresses in the 209.165.200.232/30 address space
Associate ACL 1 with the NAT pool and allow addresses to be reused
Configure R1 interfaces with the appropriate inside and outside NAT commands
R2
On R2, configure one statement for ACL 2 to permit any address belonging to 172.17.0.0/16
Associate ACL 2 with the NAT interface and allow addresses to be reused
Configure R2 interfaces with the appropriate inside and outside NAT commands
Verify PAT Interface Implementation
Solution :
R1
access-list 1 permit 172.16.0.0 0.0.255.255
ip nat pool R1POOL 209.165.200.233 209.165.200.234 netmask 255.255.255.252
ip nat inside source list 1 pool R1POOL overload
interface s0/1/0
ip nat outside
interface g0/0/0
ip nat inside
interface g0/0/1
ip nat inside
R2
#access-list 2 permit 172.17.0.0 0.0.255.255
#ip nat inside source list 2 interface s0/1/1 overload
#interface s0/1/1
ip nat outside
interface g0/0/0
ip nat inside
interface g0/0/1
ip nat inside
DO show ip nat translation
Do show ip nat statistics