Mediant MSBRs  20  Document #: LTRT-31828 
  Security Setup 
Both NAT and NAPT can use a pool of addresses to contact (or to show) the outside word 
(the WAN). For NAT and NAPT, a range of IP addresses and ports can be configured using 
ACLs. This range of IP addresses is called a NAT pool. To configure the NAT pool, use the 
following commands. 
Table 5-2: NAT Pool Commands 
Command  Description 
Enter the data configuration menu. 
(config-data)# access-list 
tcp_nat permit tcp 192.168.0.0 
Mark the traffic of the inside addresses. These 
addresses will be hidden behind NAT. 
(config-data)# ip nat pool 
tcp_pool 180.1.100.50 
180.1.100.50 
Configure a NAT pool that starts with the 
address 180.1.100.50 and ends with the 
address 180.1.100.50. This means that there is 
only one address in the NAT pool. 
 
Table 5-3: NAT Rules 
Command  Description 
(config-data)# ip nat inside 
source list tcp_nat interface 
gigabitethernet 0/0 pool tcp_pool 
Configure IP NAT translation for devices behind 
NAT. For every address?? selected by the 
tcp_nat ACL, on the interface gi0/0 and use the 
tcp_pool NAT pool. 
 
Table 5-4: NAPT Rules 
Command  Description 
(config-data)# ip nat inside 
source list tcp_nat interface 
gigabitethernet 0/0 pool tcp_pool 
port 5000 5010 
Configure IP NAPT translation for IP addresses 
behind the NAT. For every address selected by 
the tcp_nat ACL, on the interface gi0/0, map 
multiple IP addresses to the tcp_pool 
addresses using ports range 5000-5010. 
 
The process of changing the LAN IP address to WAN IP address is called NAT translation. 
To verify that the NAT translation is working, use the following command: 
Table 5-5: NAT Translation 
Command  Description 
# show data ip nat translations 
Displays NAT translations.