Operations 4 min read

Router NAT and ACL Configuration Guide for Campus Network

This article explains how to configure ACLs and NAT on a campus router, including static global NAT, outbound NAT with Easy‑IP, loopback interface setup, and verification steps to ensure internal users can reach the server via the public IP address.

Practical DevOps Architecture
Practical DevOps Architecture
Practical DevOps Architecture
Router NAT and ACL Configuration Guide for Campus Network

This guide provides step‑by‑step instructions for configuring a router to enable internal hosts to access a campus server using the public IP address 211.1.1.6 through NAT and ACL rules.

1. Router configuration

Define an ACL to permit traffic from the internal subnet to the server:

acl number 3000
rule 5 permit ip source 192.168.1.0 0.0.0.255 destination 211.1.1.6 0

Configure the internal interface:

interface GigabitEthernet1/0/0
ip address 192.168.1.1 255.255.255.0

Set up a static global NAT entry so that internal users can reach the server using the public address:

nat static global 211.1.1.6 inside 192.168.1.2 netmask 255.255.255.255

Enable outbound NAT with Easy‑IP to translate the source address of traffic destined for 211.1.1.6 to the router’s external interface address, ensuring all internal‑to‑external traffic passes through the router: nat outbound 3000 Configure the external interface:

interface GigabitEthernet1/0/1
ip address 202.1.1.1 255.0.0.0

Add another static global NAT entry to allow external users to reach the server:

nat static global 211.1.1.6 inside 192.168.1.2 netmask 255.255.255.255

2. Verify configuration results

After applying the configuration, internal users should be able to access the campus server via the public IP 211.1.1.6. Key verification points include:

Correct ACL definition for the NAT conversion.

Proper Easy‑IP outbound NAT direction.

If only a single public IP is allocated, you can configure a loopback interface as the gateway exit and use the following command to create a protocol‑specific static NAT entry:

nat static protocol { tcp | udp } global interface loopback interface-number global-port inside host-address [netmask mask]

This ensures that specific TCP/UDP services are correctly translated while preserving the public IP address.

Finally, confirm that the internal network can reach the server and that external users can access the server using the public IP address.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

OperationsConfigurationRouterNetworkingNATACL
Practical DevOps Architecture
Written by

Practical DevOps Architecture

Hands‑on DevOps operations using Docker, K8s, Jenkins, and Ansible—empowering ops professionals to grow together through sharing, discussion, knowledge consolidation, and continuous improvement.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.