EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

Types of NAT 

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Network Security Tutorial » Types of NAT 

Types of NAT 

Introduction to Types of NAT

The story behind the existence of NAT is that using IPV4, i.e. 32 bit, which will give around 4.2 billion unique IP’s, In which it is impossible to accommodate 7 billion* No of devices used by an individual in the world, Solution to keep using IPV4 yet, get more devices on the internet is NAT. NAT processes in which one or more Local IP address is translated into one or Global IP addresses and vice versa in order to provide internet access to the local hosts. Generally, a border router or firewall will be configured for NAT. In this article, we will learn about the different types of NAT in detail.

NAT Terminologies

Before jumping into how NAT works and Types of NAT, let us understand a few terminologies to avoid confusion.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

  • Inside local address: Private IP address, assigned to a host on the inside (local) network, it is inside host as seen from the inside network. This IP address is assigned by the router connected to a group of devices; it is not accessible from the internet. All addresses starting from 192.168.x.x and 10.x.x.x are reserved for private IP addresses. We can use any IP within range without being worried about it; some other device is using the same.
  • Inside global address: It is one or more IP addresses, which represents the local network, seen as inside host from outside network. When we register with ISP, we get an IP, which accessible throughout the internet. It is assigned to the router connected to a group of devices. Ex:12.13.14.15
  • Outside local address: Actual IP of the remote host, after NAT translation.
  • Outside Global address: It is the IP address of the remote host before

usually, local IP addresses are referred to as ‘private IP’ and Global as ‘public or registered IP’.

Types of NAT

Based on how the IP addresses’ mapping is done from local IP to Global IP, there are 3 types of NAT.

1. Static NAT

In this case, there will be one to one mapping between private IP and Public IP. i.e. a private IP 192.162.19.2 is permanently mapped to a global IP 13.14.56.07; it is commonly used for web hosting.

2. Dynamic NAT

In this case, the router is provided with a set of public IP addresses, any device that wants to connect to the internet will be provided with immediately available public IP at the router end; there will be one to one mapping based on a first-come, first-served technique but not permanent, the public IP address used by the private IP can change over time.

Popular Course in this category
Cyber Security Training (12 Courses, 3 Projects)12 Online Courses | 3 Hands-on Projects | 77+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (5,945 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)

3. PAT( Port Address Translation)

In this case, many private IP addresses are mapped to a single public IP; port numbers of devices distinguish traffic, i.e. which packets belong to which private This is cost-effective; many users can connect to the Internet using single public IP at a time. It is also known as NAT overloading.

How Does NAT Work?

To understand how NAT works in a real scenario, Let’s consider a small topology; it has 3 devices connected to a router, let devices be a laptop, a mac, and a smartphone, they are all connected to a router, the router in its turn is connected to the internet, public IP assigned to the router is 12.13.14.15, the router has assigned 10.11.12.01 to a laptop, 10.11.12.01 to MAC and 10.11.12.03 to a smartphone.

How Does NAT Work

Assume that laptop wants to connect to a remote server which hosts ‘weather forecasting website’ with global IP 60.70.80.90 and smartphone wants to access Facebook hosted at global IP 60.70.80.80 when both requests arrive at the router, router maps the IP and entry in NAT table as shown below:

Device Private IP(Source IP: Port) Public IP(Public IP: Port)
Label 10.11.12.01 : 42301 12.13.14.15:6666
Smartphone 10.11.12.03 : 42302 12.13.14.15:5555

The request with Public IP and Host IP with a message is sent to respective host servers via internet, on port 80 commonly used for HTTP requests, remoter servers respond to Public IP with added message, at router interface, router refers NAT table and sends back the response message to respective private IP and to their respective ports. To the laptop or smartphone, it appears the response has been sent directly to them by remote hosts.

Advantages of Using NAT

  • It prevents the depletion of ipv4 addresses, i.e. more devices can connect to the internet using ipv4.
  • It provides an additional layer of security by making the original and destination addresses hidden from each other.
  • NAT provides increased flexibility while connecting to the Internet.
  • If we are changing the device IPs used for a service accessed over the internet, it will not affect the NAT system’s service IP.

Conclusion

IPV4 is an age-old idea that is implemented after the 1970s to overcome the drawback of its NAT was introduced. It has a few disadvantages like it is time and resource consuming, it loses the traceability between source and destination and delays communication.

A slow migration is happening between IPV4 to IPV6, which will give 32 followed by 37 zeroes unique IP addresses, yet delayed because many devices that are already on the Internet support only IPV4, and it takes time to break and build the new IPV6 supporting architecture.

Recommended Articles

This is a guide to Types of NAT. Here we discuss the introduction, working, terminologies, and top 3 types of NAT and its advantages. You may also look at the following articles to learn more-

  1. React Native vs React
  2. QlikView Alternatives
  3. Hive Alternatives
  4. Asana Alternatives
  5. Creating Style Buttons in React Native

Cyber Security Training (12 Courses, 3 Projects)

12 Online Courses

3 Hands-on Projects

77+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More