You have a single router that connects your private network to the Internet. You have two subnets on the private network, and the Internet connection is through the Serial0/0/0 interface. Your ISP has given you 6 outside addresses that you can use for NAT configuration. You can use addresses 70. 0. 0. 64 through 70. 0. 0. 69. All hosts on your private network must be allowed Internet access using those six addresses. There should be no limit to the number of clients on the private network that can access the Internet at the same time. Complete the following tasks: Designate both FastEthernet interfaces as inside NAT interfaces. Configure the Serial0/0/0 interface as an outside NAT interface. Create a standard access list number 50 that allows both inside networks. Create a NAT pool named my_addrs identifying the 6 addresses. Use the netmask parameter to configure the addresses using a 29-bit mask. Use the ip nat inside source command to link the access list with the address pool. Be sure that all inside clients can simultaneously access the Internet. Save your changes

Answers

Answer 1

Select Fiji.

Press Enter to get started.

At the Fiji> prompt, type enable and press Enter.

At the Fiji# prompt, type config t and press Enter.

At the Fiji(config)# prompt, type interface fa0/0 and press Enter.

At the Fiji(config-if)# prompt, type ip nat inside and press Enter.

At the Fiji(config-if)# prompt, type interface fa0/1 and press Enter.

At the Fiji(config-if)# prompt, type ip nat inside and press Enter.

At the Fiji(config-if)# prompt, type interface s0/0/0 and press Enter.

At the Fiji(config-if)# prompt, type ip nat outside and press Enter.

At the Fiji(config-if)# prompt, type access-list 50 permit 192.168.1.0 0.0.0.255 and press Enter.

At the Fiji(config)# prompt, type access-list 50 permit 192.168.2.0 0.0.0.255 and press Enter.

At the Fiji(config)# prompt, type ip nat pool my_addrs 70.0.0.64 70.0.0.69 netmask 255.255.255.248 and press Enter.

At the Fiji(config)# prompt, type ip nat inside source list 50 pool my_addrs overload and press Enter.

Press Ctrl + Z.

At the Fiji# prompt, type copy run start and press Enter.

Press Enter to begin building the configuration.


Related Questions

A network packet contains two kinds of information. what are they?

geolocation data and user data

control information and user password

control information and user data

geolocation data and user password

Answers

Answer:

C) control information and user data

Hope this helped you, and have a good day!

need asap!!

one-paragraph response to "The Story of the Animated Drawing" by Walt Disney

class is Principals of AAVTC​

Answers

"The Story of the Animated Drawing" is a television episode from Walt Disney's Disneyland that was aired on November 30, 1955.

What is "The Story of the Animated Drawing" by Walt Disney?

"The Story of the Animated Drawing" is a television episode from Walt Disney's Disneyland that was aired on November 30, 1955.

Walt Disney recounts the evolution of animation through the ages, beginning with prehistoric times and progressing through some early mechanical animation devices in the nineteenth century.

To know more about paragraphs follow

https://brainly.com/question/11600913

#SPJ1

The box on a slide that has a dotted or hatch-marked border and that contains the insertion point is a text ____.

Answers

it is known as a text placeholder

Placeholder is the answer

how has technology impacted the individual and the society​

Answers

Answer:It affects the life of people and changes the way of their learning, thinking, and communication.

Explanation: mark me as the brainly-est to get the best answers

A series of drawn pictures (like a comic) of key visual shots of planned production for video is a/an
A encoding
B.call sheet
C.shot list
D. storyboard o IN​

Answers

Answer:

The correct answer is D) Storyboard

Explanation:

A storyboard is used during the initial planning stage of filmmaking. You draw pictures to demonstrate the general idea of what shots you want to get before actually going out and filming on a set/studio.

Who runs the Web? Who controls all these protocols? Who's in charge of all this?

Answers

Answer:

...Multiple people. But the person who created the internet was Vinton Cerf.

The Internet Engineering Task Force (IETF) and the internet society runs the web

What is output?
x = 2
y = 3
print (x * y + 2)
4
2
8
10

Answers

Answer:

8

Explanation:

(2*3+2)=8

Hope this helped, and have a good day!

You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue

Answers

Answer:

Network bridge

Explanation:

You are an administrator of a growing network. You notice the network you have created is broadcasting but you cannot ping systems on different segments of your network. What device should you use to fix this issue?

✓ Network bridge

Is designed to access a computer or operating system without the knowledge or permission of the user.

Answers

Answer:

Spyware

Explanation:

Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

You come across a useful and free reporting utility which can be easily downloaded from the internet to create appealing reports for your project. Will you go ahead and install it?

Answers

When I come across a free reporting utility which can be easily downloaded from the internet I will not download and install it in my computer system.

What is a reporting utility?

A reporting utility is an application that can be used to create reports for projects which can save time for a company.

The disadvantage of downloading a free reporting utility is that it can be a malware in a disguise which when downloaded can cause harm to the data of your company.

Therefore, When I come across a free reporting utility which can be easily downloaded from the internet I will not download and install it in my computer system.

Learn more about malware here:

https://brainly.com/question/23294592

#SPJ1

why computer is called versatile memory? ​

Answers

Answer:

Versatility: The capacity of the computer of performing more than one task at the same time is called the versatility of a computer. Versatility means the capacity to perform different types of work completely. Storage: The computer has a mass storage section where we can store a large volume of data for future use.

Explanation:

This is an example of what type of formula?

=(D1-D17)

Question 3 options:

ADDITION


SUBTRACTION


RANGE


AVERAGE

Answers

Answer:

Subtraction

Explanation:

That is subtracting the values of two cells.

You know because of the "-" sign

6.1.4 Guess a Number 2.0

Answers

There are different ways of coding, An example of 6.1.4 Guess a Number 2.0 is given in the space below

What is the 6.1.4 Guess a Number 2.0 about?

speed(0)

pensize(10)

def green_check():

penup()

setposition(0,0)

color("green")

backward(25)

right(45)

pendown()

forward(35)

left(90)

forward(75)

def higher():

penup()

setposition(0,0)

pendown()

left(90)

forward(100)

right(145)

forward(50)

right(180)

forward(50)

left(105)

forward(50)

def lower():

penup()

setposition(0,0)

pendown()

right(90)

forward(100)

left(145)

forward(50)

left(180)

forward(50)

right(105)

forward(50)

user_number = int(input("Guess a number 1 through 10? "))

secret_number = 6

if user_number < secret_number:

higher()

user_number = int(input("Guess a number 1 through 10? "))

elif user_number == secret_number:

green_check()

else:

lower()

user_number = int(input("Guess a number 1 through 10? "))

Learn more about code from

https://brainly.com/question/4514135

#SPJ1

The following Python statement instructs the program to open a file for input.

inFile = open("grocerydataFinalPY.txt", "w")

A. True
B. False

Answers

The python statement that instructs the program to open a file for input is a false statement.

How to open file for input ?

The code above is a python code.

The python statement to instructs a program to open a file for input can be represented as follows:

The Python function open() is a built-in function that opens a file and allows your program to use it and work with it.

The open functions accepts a file(relative path to the file) and a string or character that indicates what you want to do with the file.

inFile = open("grocerydataFinalPY.txt", "w") is use to open a file and write on it.

learn more on python here: https://brainly.com/question/13696872

#SPJ1

What is the point of comments in code? Discuss at least two possible uses of code, including specific examples of what a comment might “look like.”

Answers

Answer:

Better collabaration and helping find bugs.

Explanation:

When working with a group of people, comments help the other person understand what you are doing.

Ex. //cat sprite

Also, it helps find bugs. For example, if the cat sprite is not working that means you know it has something to do with that peice of code.

The following assignment statement instructs the computer to initialize a variable with int data type.

howMany = 0

A. True
B. False

Answers

The given assignment statement instructs the computer to initialize a variable with int data type: True.

The kinds of data type.

In Computer programming, there are five (5) common data types and these include:

Integer type (int)Floating point type (float)Boolean (bool)String (str)Integer type (int)

Basically, an integer type (int) is used for storing whole numbers such as 0, 1, 2, 3, 4, etc. Thus, the assignment statement "howMany = 0" would instruct the computer to initialize a variable with int data type.

Read more on a data types here: brainly.com/question/25619349

#SPJ1

When you program in Scratch, what are two things you can do with a sprite?
A. Drag it to the scripts area
B. Add it to another variable
C. Change the costume on it
D. Make it move
SUBM

Answers

Explanation:

You can change the costume and drag it to the script area

You can change the costume and drag it to the script area.

What is Script area?

Visual programming is used in Scratch to make your own games, tales, and animations. A script is a group of instructions used to program in Scratch. It is a group of interconnected blocks stacked on top of one another.

As users choose to engage with sprites, the blocks of instructions are thoughtfully arranged to carry out a certain purpose. It's a good idea to include script comments that explain what is happening.

A sprite in Scratch is an actor, the main character of the program, or a graphic component that carries out all the tasks specified in the script.

Therefore, You can change the costume and drag it to the script area.

To learn more about Script area, refer to the link:

https://brainly.com/question/6975460

#SPJ7


Treating others with respect, even when they're impolite, is considered
A. good netiquette
B. being a bystander
C. advocating
D. empathy

Answers

The answer for this question is A

Treating others with respect, even when they're impolite, is considered good netiquette. The correct option is A.

What is netiquette?

Netiquette refers to the standards of behavior for polite and appropriate online conversation. Etiquette for the internet is another name for netiquette. These are suggested politeness guidelines rather than laws.

A set of guidelines known as netiquette promotes polite and appropriate online conduct.

These guidelines are crucial because they encourage effective communication, guard against misunderstandings, and show you what is appropriate in social situations when working and cooperating online.

Online communication can be made more productive with the use of netiquette, which also helps people stay clear of confusion and potential confrontation. It is considered acceptable to treat people with respect, even when they are being rude.

Thus, the correct option is A.

For more details regarding good netiquette, visit:

https://brainly.com/question/29444693

#SPJ2

Why is it necessary that Computer 1 run Windows Professional or a higher edition to implement the security used in this lab

Answers

Computer 1 includes a number of defensive measures, including identity protection, threat resistance, and information protection, to ensure that if one fails, another is ready to counter an damage.

What is defensive measures?

The word "defensive measure" refers to any action, device, procedure, signature, technique, or other measure used to identify, prevent, or neutralize a known threat to an information system or information stored on, processed by, or traversing an information system.

Thus, Computer 1 includes a number of defensive measures.

For more details about defensive measures, click here

https://brainly.com/question/5961251

#SPJ1

In a PHP application using PDO, a _____ consists of the host, port, and name of the database that will be used to establish a connection to the database.

Answers

The PDO in PHP has data source name that enables the connection of the database.

What is PHP?

PHP is a scripting language and is used for the WebPages and the intersection to the relative database management system.

PDO is the PHP data object and can act as providing a data extraction layer for vendor-neutral lightweight data access.

The connection to the database is managed with the data source name consisting of the host, port, and name of the database.

Learn more about PHP, here:

https://brainly.com/question/14114506

#SPJ1

(4, a) and (2, 5) are two points from a direct variation. What is a? Use the step-by-step process you just learned to solve this problem. Step 1: Set up the correct type of variation equation. y =

Answers

The value of a for point (4,a) in the direct variation is 10.

What is a direct variation?

The direct variation in mathematics is given as the equation relationship between the two numbers, where one is a constant multiple.

In the given problem, the variation equation is given as:

[tex]y=kx[/tex]

Where k is a constant.

The value of k can be derived from point (2,5):

[tex]5=k2\\\\k=\dfrac{5}{2}\\\\ k=2.5[/tex]

Substituting the values of k for the point (4,a):

[tex]a=2.5\;\times\;4\\a=10[/tex]

The value of a for point (4,a) in the direct variation is 10.

Learn more about direct variation, here:

https://brainly.com/question/14254277

#SPJ1

Assume that it takes 0. 01 milliseconds to access a disk block if the block is in the disk cache (i. E, in main memory) and 20 milliseconds if the block is on the disk. Assume that 3 level(s) of indexing is used and the cache hit ratio is 88%. What is the effective (average) disk access time in milliseconds (rounded to zero decimal places)

Answers

GATE | GATE-CS-2015 (Set 1) | Question 65. Consider a disk pack with a seek time of 4 milliseconds and rotational speed of 10000 rotations per minute (RPM). It has 600 sectors

The do/while loop is generally used when the program loop should run at least once before testing for the stopping condition true false

Answers

Answer:

In the do-while loop, the body of a loop is always executed at least once. After the body is executed, then it checks the condition.

Explanation:

If the condition is true, then it will again execute the body of a loop otherwise control is transferred out of the loop.

____ loses data when it stops receiving electrical power.


ANSWER OPTIONS:
A graphics processing unit (GPU)

A central processing unit (CPU)

Random-access memory (RAM)

Read-only memory (ROM)

Answers

Answer:

gpu

Explanation:

the answer is gpu a graphics processing unit

PLS HURRY 43 POINTS

Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.

surveil people’s digital behavior
promote access to information
manage the internet
limit access to digital information
provide efficient internet searches

Answers

Answer:

surveil people’s digital behavior

promote access to information

provide efficient internet searches

Explanation:

i just know things

Write code to assign x and y coordinates to currCoordinate, and store currCoordinate in criticalPoints. Input first receives an x value, then a y value. Input example: 12 32 88 2 -1 -1

Answers

Using the knowledge of the python computational language, it will be possible to write a coordinate code, like this:

Writing coordinate code in python:

    def __init__(self, x, y):

        self.x = x

        self.y = y

    def getX(self):

     directly

       return self.x

   def getY(self):

     return self.y

  def __str__(self):

       return '<' + str(self.getX()) + ',' + str(self.getY()) + '>'

class Coordinate(object):

   def __init__(self,x,y):

       self.x = x

       self.y = y

   def getX(self):

      return self.x

   def getY(self):

       return self.y

   def __str__(self):

       return '<' + str(self.getX()) + ',' + str(self.getY()) + '>'

     def __eq__(self, other):            

       if other.x == self.x and other.y == self.y:

           return True

       else:

           return False

   def __repr__(self):

       return "Coordinate"+ str((self.x, self.y))

See more about python at brainly.com/question/13437928

#SPJ1

Explain why it is wise to memorize your social security number.

Answers

It is memorize your social security number as one can be able to recur it for any given purpose if one did not carry it along with them.

Why memorize your social security number?

The reason why it is important to memorize your social security number is that by doing so, one do not need to carry or use their card again.

Conclusively, Note that It is not the card but the number that is very important and as such it is vital that one knows their Social Security number that is the nine digits number off heart and in cases of emergencies when one forgot to carry their cards.

Learn more about social security number from

https://brainly.com/question/5213237

#SPJ4

help please will give brainliest!!!!!!!!!

Answers

Answer:

Take a String.

Convert it into array of characters.

Apply for loop till length of char array.

Using isDigit() method we can check the digits in string.

If isDigit() will return true then print that index value.

That digit is in char form. ...

Using sum variable, we will sum it.

Explanation:

What are the advantages to star topology?



Select All that Apply.




A. It is easy to troubleshoot problems.



B. Each node is connected to all other nodes.



C. It is less expensive than bus technology.



D. Nodes can be added without disrupting the network.



E. The malfunction of one workstation doesn't crash the network

Answers

The  advantage to star topology is that It is less expensive than bus technology.

What are advantages of star topology?

The Advantages of Star Topology is that it is a little bit expensive when compared to others.

Note that base on the fact that  each device only need one I/O port and may want to be linked with hub with one link, it is therefore easy or less expensive than bus technology.  There is also easy fault detection here.

Learn more about star topology rom

https://brainly.com/question/22872621

#SPJ1

Data files whose records are always retrieved in sequence from the beginning of the file are known as

Answers

Answer:

sequential files

Explanation:

Q:

Data files whose records are always retrieved in sequence from the beginning of the file are

A:

sequential files

Other Questions
Use fundamental identities to find the values of the trigonometric functions for the given conditions. tan = 15/8 and sin > 0 sin = cos = tan = csc = sec = cot = The solid below is made from 1 meter cubes.Find its surface area.Please help guys! PLEASE HELP!! need this test done. the solution set of |R-3|=10 is Please help Ive been stuck in this for 5 minutes Can someone help quick?I don't fully get how to do this. Find the measure of the following arcs or angles. There are two images. HELP PLEASE 5. What evidence does the author provide that propaganda played a role in the Rwandan genocide? 10 to the negative fourth power Read the quotation from "an indian's view of indian affairs." they told us to treat all men as they treated us; that we should never be the first to break a bargain; that it was a disgrace to tell a lie; that we should speak only the truth; that it was a shame for one man to take from another his wife, or [to take] his property without paying for it. what cultural view is most reflected in this quotation? importance of peace appreciation for the land value of tribal traditions respect for all other people Why is transportation the greatest challenge for some people when they are trying to get from one place to another What prevented a confederate victory on day two? a) grant's forces attacked lee from the rear. b) the confederates ran out of ammunition. c) general pickett ordered his unit to retreat behind mcmillan's woods d) general meade held his ground at cemetery ridge and little round top. Convert the following equationinto standard form.y = 2x An advance directive, such as a living will, must be signed when. Rewrite these sentences correctly to remove the error1. Music soothe me.2. Billy bake brownies every Halloween.3. The police is arguing again.C 4. Elsie never takes the bus to work.C 5. One of the people who owns that house has no insurance.6. One of these mechanics have a set of jumper cables.7. The pastor and driver are mending the wings of butterflies.8. Both of my essays is brilliant.9. The pulses emitted by a neutron star recurs at precise intervals.10. One of my uncles dances at the Rainbow Cafe. which of these is NOT an example of a lever?a. shovel b. pushup c. ramp d. seesaw According to the rational root theorem, which function has the same set of potential rational roots as the function g(x) = 3x5 2x4 9x3 x2 12? f(x) = 3x5 2x4 9x3 x2 12 f(x) = 3x6 2x5 9x4 x3 12x f(x) = 12x5 2x4 9x3 x2 3 f(x) = 12x5 8x4 36x3 4x2 48 To avoid war with Germany, what did Britain and France promise not to do ? Can someone help me with this question? Farmer Alice has a fruit stand at the farmer's market.She has a total of 80 pieces of fruit.Of the fruit, 20 pieces are apples. 1/5 are peaches.The rest are oranges.What fraction of the fruit are oranges?Give your answer in simplest form. The table displays the number and type of tickets bought for a play that was performed in both the afternoon and evening. Apply the addition rule to find a child ticket is bought for a play and the play is performed in the afternoon. A) 48/363B) 175/363C) 163/363D) 36/363 After Halloween, Kyle had 4 3/8 bags of candy. If Kyle gives 1 7/8bags of candy to his little brother, how many bags of candy willhe have left