Solved

Networking/NAT rules

Posted on 2016-09-12
4
30 Views
Last Modified: 2016-09-12
I have a client that wants to set up a local dev server - and has obtained a block of 5 IP addresses from his ISP.

I'm pretty much a novice at networking stuff, although I have a somewhat basic grasp of the concepts.  So, before I go heading out there to finish configuring his stuff, do I have this right?

What I want to do is to pick an arbitrary external IP address, and create a NAT rule to map it to the internal network address of the server.  Is that correct?  So, like 216.225.x.x (external) has a NAT rule established to point it to 192.168.100.x (the internal address of the server).

?

If so, one side question.  In the documentation I see that they have "starting IP address" and "ending ip address".  So far as I know, the box only has one IP address assigned to it.  So would starting/ending be the same?

Thanks in advance!
0
Comment
Question by:erzoolander
  • 2
  • 2
4 Comments
 
LVL 35

Expert Comment

by:Kimputer
ID: 41794147
Depending on the router, mostly you bind the external IP to an internal one first. After that you set the NAT rules. Most NAT rules are one on one, thereby making the beginning/ending IP useless (if no single input is allowed, fill in the IP number in both fields)
0
 
LVL 1

Author Comment

by:erzoolander
ID: 41794153
The router is a UTT AC750GW - and in the admin/nat rules there's a screen that looks like this.

I assume this is where you'd do that?

utt.jpg
0
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
ID: 41794165
Yes, this router takes away a bit of your control, by mapping external IP's sequentially to internal ones.
Right now, it's
202.1.1.131 - 192.168.16.200
202.1.1.132 - 192.168.16.201
202.1.1.133 - 192.168.16.202
202.1.1.134 - 192.168.16.203

Other routers gives you the freedom to choose the internal IP number at random.

What you showed was just the IP bindings. The NAT rules are in another menu.
0
 
LVL 1

Author Closing Comment

by:erzoolander
ID: 41794185
Gracias!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Design of sending events/logs to SIEM/Arcsight 2 108
RIP Routing 5 59
What is the Router Login page for Comcast? 10.0.0.1? 7 78
Stack Switches in IOU  web V22 6 59
Transparency shows that a company is the kind of business that it wants people to think it is.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

3 Experts available now in Live!

Get 1:1 Help Now