In the previous lessons, you were introduced Static NAT with port restrictions for secure inbound access to internal services. After that we covered PAT (Port Address Translation) for outbound internet access from multiple inside hosts.
In this lesson, we combine these concepts into a single, branch office edge router configuration.
You will:
Configure Static NAT for two servers:
Web server: HTTP (port 80) only.
FTP server: FTP control channel (port 21) only.
Configure PAT for LAN users so they can share the router’s public IP for outbound internet access.
Secure the configuration with inbound and outbound ACLs:
Inbound ACL: Only allows HTTP to the web server and FTP to the FTP server. Blocks everything else from the internet.
Outbound ACL: Restricts LAN users to web browsing (HTTP/HTTPS) only.
By the end of this lab, you will see how NAT and ACLs work together to control both inbound and outbound traffic.
LAN Users: 192.168.1.10–192.168.1.50
Web Server: 192.168.1.100 → Public 200.1.1.100 (HTTP only)
FTP Server: 192.168.1.101 → Public 200.1.1.101 (FTP control port only)
Router Public IP (outside interface): 200.1.1.1 (used for PAT)
Topology:
We must tell the router which interface faces the inside network and which faces the outside network.
This ensures NAT translations occur in the correct direction.
We create port-specific static NAT so only required services are exposed.
This reduces attack surface while still allowing external access to those services.
Web Server (HTTP only):
Maps TCP port 80 of 200.1.1.100 to 192.168.1.100.
FTP Server (FTP control channel only):
Maps TCP port 21 of 200.1.1.101 to 192.168.1.101.
This prevents other services on the FTP server from being exposed, unlike full-IP static NAT.
LAN users share the router’s public IP when accessing the internet.
We first define the inside subnet, then configure PAT to use the outside interface IP.
This is ideal for branch offices without multiple public IPs.
NAT itself doesn’t block traffic; it only translates addresses.
We use an inbound ACL to allow only:
HTTP traffic to the web server’s public IP.
FTP control traffic to the FTP server’s public IP.
Everything else is denied.
We restrict LAN users to only HTTP and HTTPS.
This prevents other unwanted outbound connections.
NAT Translations
Shows static NAT entries for the servers and dynamic PAT entries for LAN users.
NAT Statistics
ACL Counters
Confirm the permit/deny counters increase as expected when testing.
| Public IP | Inside Host | Ports/Proto | Purpose | ACL Permit Rule |
|---|---|---|---|---|
| 200.1.1.100 | 192.168.1.100 | TCP 80 | Web server (HTTP) | permit tcp any host 200.1.1.100 eq 80 |
| 200.1.1.101 | 192.168.1.101 | TCP 21 | FTP server (FTP control channel) | permit tcp any host 200.1.1.101 eq 21 |
| 200.1.1.1 | 192.168.1.0/24 | Various | PAT for internet-bound user traffic | Outbound ACL permit tcp ... eq 80/443 only |
| Mistake | Symptom | Solution |
|---|---|---|
| Full-IP static NAT on servers | All services exposed | Use port-specific static NAT for only required services |
| Forgot overload in PAT | Only one LAN user online | Add overload to PAT config |
| Missing ACL for inbound control | Unwanted traffic reaches inside network | Apply inbound ACL on outside interface |
| ACL rules in wrong order | Valid traffic blocked | Place permit statements above deny statements |
| Incorrect NAT roles on interfaces | NAT doesn’t work | Assign ip nat inside / ip nat outside correctly |
Modify this configuration so that:
Only 192.168.1.10 can access HTTPS (TCP 443) outbound; all others can only use HTTP (TCP 80).
Add a new static NAT mapping for an SMTP server 192.168.1.102 → 200.1.1.102 (TCP 25 only) and update the inbound ACL accordingly.