Solved

Networking/NAT rules

Posted on 2016-09-12
4
26 Views
Last Modified: 2016-09-12
I have a client that wants to set up a local dev server - and has obtained a block of 5 IP addresses from his ISP.

I'm pretty much a novice at networking stuff, although I have a somewhat basic grasp of the concepts.  So, before I go heading out there to finish configuring his stuff, do I have this right?

What I want to do is to pick an arbitrary external IP address, and create a NAT rule to map it to the internal network address of the server.  Is that correct?  So, like 216.225.x.x (external) has a NAT rule established to point it to 192.168.100.x (the internal address of the server).

?

If so, one side question.  In the documentation I see that they have "starting IP address" and "ending ip address".  So far as I know, the box only has one IP address assigned to it.  So would starting/ending be the same?

Thanks in advance!
0
Comment
Question by:erzoolander
  • 2
  • 2
4 Comments
 
LVL 35

Expert Comment

by:Kimputer
ID: 41794147
Depending on the router, mostly you bind the external IP to an internal one first. After that you set the NAT rules. Most NAT rules are one on one, thereby making the beginning/ending IP useless (if no single input is allowed, fill in the IP number in both fields)
0
 
LVL 1

Author Comment

by:erzoolander
ID: 41794153
The router is a UTT AC750GW - and in the admin/nat rules there's a screen that looks like this.

I assume this is where you'd do that?

utt.jpg
0
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
ID: 41794165
Yes, this router takes away a bit of your control, by mapping external IP's sequentially to internal ones.
Right now, it's
202.1.1.131 - 192.168.16.200
202.1.1.132 - 192.168.16.201
202.1.1.133 - 192.168.16.202
202.1.1.134 - 192.168.16.203

Other routers gives you the freedom to choose the internal IP number at random.

What you showed was just the IP bindings. The NAT rules are in another menu.
0
 
LVL 1

Author Closing Comment

by:erzoolander
ID: 41794185
Gracias!
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now