Flylib.com
Command Summary
Previous page
Table of content
Next page
Table 4-4 provides a list and description of the commands discussed in this chapter
Table 4-4. Command Summary
Command
Description
clear ip nat translations
{
*
[
inside
[
tcp
{
inside
[
global-ip
[
global-port
]
local-ip
[
local-port
]}
udp
{
inside
[
global-ip
[
global-port
]
local-ip
[
local-port
]}] [
inside
global-ip local-ip
][
outside
local-ip global-ip
]
Clears dynamic entries from the NAT table.
ip nat
{
inside
outside
}
Designates the inside and outside interfaces; traffic originating from or destined for the interface is examined by the NAT.
ip nat inside destination list
{
access-list-number
name
}
pool
name
Enables translation of inside destination addresses.
ip nat inside source
{
list
{
access-list-number
name
}
pool
name
[
overload
]
static
local-ip global-ip
}
Enables translation of inside source addresses.
ip nat outside source
{
list
{
access-list-numbername
}
pool
name
static
global-ip local-ip
}
Enables translation of outside source addresses.
ip nat pool name
start-ip end-ip
{
netmask
netmask
prefix-length
prefix-length
}
type
{
rotary
match-host
}
Defines a pool of addresses to be used for address translation.
ip nat translation max-entries
entries
Sets a limit on the number of entries allowed in the NAT table.
ip nat translation
{
timeout
udp-timeout
dns-timeout
tcp-timeout
finrst-timeout
icmp-timeout
syn-timeout
port-timeout
{
tcp
udp
}}
seconds
Changes the default period after which a dynamic entry is removed from the NAT table and the address is returned to the pool.
show ip nat statistics
Displays NAT statistics.
show ip nat translations
[
verbose
]
Displays the NAT table.
Previous page
Table of content
Next page
Routing TCP[s]IP (Vol. 22001)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 182
BUY ON AMAZON
Snort Cookbook
Invisibly Tapping a Hub
Invisibly Sniffing 100 MB Ethernet
Capturing Without Putting the Interface into Promiscuous Mode
Building a Distributed IDS (Plain Text)
Writing Output Plug-ins
Network Security Architectures
References
Impact of Network Security on the Entire Design
Expected Threats
Real-World Applicability
Introduction
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Leading change
Part II - The Applications
Mergers and acquisitions
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 314 Outlet, Device, Pull, and Junction Boxes; Conduit Bodies; Fittings; and Handhole Enclosures
Article 326 Integrated Gas Spacer Cable Type IGS
Article 358 Electrical Metallic Tubing Type EMT
Article 440: Air Conditioning and Refrigerating Equipment
Article 503 Class III Locations
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Cron Expressions Cookbook
Creating the Quartz Database Structure
Using Memory to Store Scheduler Information
Implementing Quartz Listeners
Using Quartz with Workflow
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Triggers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies