What is the difference between dynamic NAT and NAT overloading
Answers were Sorted based on User's Feedback
Answer / mohammad bannob
Dynamic NAT contains mulitple public IPs and when the user
needs to go to WAN he will get an IP. If all IPs are used,
the user must wait to get one public IP.
NAT Overloading has only one public IP and all users on the
LAN network are usig this IP but with different ports.
NAT Overloading is much better than Dynamic and static
since it is more secure and to save IPs...
Is This Answer Correct ? | 11 Yes | 1 No |
Answer / jitemdera ( cisco systems,us)
Hey man
i have marked this Answer wrong because
1) is the NAT is used only to MAP Public ip in to private Ip
2) can not we use nat concept to keeping our server In dmz
and then nat in to the local ip
it is some thing beyond of the ccna scope but you have to read
ok i am giveing you 4 point read it from google and then tell me
1) what is inside local
2) inside global
3) out side global
4) out side local
if you understand it you will be the master Of nat
Is This Answer Correct ? | 5 Yes | 0 No |
Answer / mmohite
Jitemdera,
thanks for your active participation in this forum.
your knowledge is awesome. can you give us technical
guidence by writtem documents. it will be better for us to
prepare the interview.
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitendera
Hi
i am Ready to help you guys please post topics and i will
try my best to provide the answers
Is This Answer Correct ? | 0 Yes | 0 No |
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router
What are the different types of passwords used in securing a CISCO router?
Explain the difference between arp and rarp?
Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What is the difference between named and extended acl?
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
Identify the 3 methods routers learn paths to destinations? A.) Dynamic routing B.) None of the above, configured by default C.) Default routes D.) Administrative distance E.) Static routes
Can you explain different components in PKI?
What does the meaning of interface 0/0?
Wild card mask always in odd value or even?