Here are some "guidelines", know what you are implenting before you do it...........Good Luck
ip classless
int e0/0
ip address dhcp
ip nat outside
no cdp enable
int e0/1
ip address 192.168.1.5 255.255.255.252
ip nat inside
ip nat pool first public ISP assigned address public ISP assigned address prefix-length subnet mask bit count
ip nat inside source list 5 pool first overload
ip access-list ext 5
permit ip 192.168.1.0 0.0.0.255
***This will allow every address, every IP enabled protocol, be wary of it's use***
I would suggest that you set up access-lists for your incoming / outgoing traffic. The access-list above is just for addresses included in the NAT table for translation.
Router Rip
version 2
network 192.168.1.0
passive-interface ethernet 0
***OSPF is better, but only suggested in networks of 20 or more routers, RIP will do you just fine, grow yourself later and learn to redistribute RIPv1 and OSPF into one-another.*****
Use the dhcp option if your internet service provider is dhcp, otherwise set it up static.
As far as the ip nat pool first statment, note the following:
- the word First is a logical name, make it whatever you like
- the
public ISP assigned address, if this is configured for dhcp, then use the 'sh ip int e0' or 'sh ip int brief' command to see the ip address that will be needed.
- because you are going to use the overload statement, and you have only one public IP, the IP NAT POOL FIRST <IP> <IP>........is not a typo, this line designates which IP to use as a source address when traversing the Internet. It will start with an address and end with the same address. They both have to be there.
This is not a security class, configure your access-lists according to your needs.
Thsi should get you started. I suggest that you get some reading from cisco on each command you are about to implement. Don't just do it. ICND is a good start, but you'll have to look at a PIX book to get anything on NAT with meat on it.
Here's a Start:
===============
Regards,
"You have to know it to understand it, you have to understand it to secure it."