Static NAT

What will be an ideal response?


The static address translation can be used translate between IP networks that have the same size (contain the same number of IPs). A special case is when both networks contain just one IP, i.e. the net mask is 255.255.255.255. Implementation wise, the strategy is quite easy to implement and can be achieved using the following logic transformation: new-address = new-network OR (old-address AND (NOT netmask)). In addition, no information about the state of connections that are being translated needs to be kept, looking at each IP packet individually is sufficient. Connections from outside the network to inside hosts are no problem, they just appear to have a different IP than on the inside, so static NAT is (almost) completely transparent.

Computer Science & Information Technology

You might also like to view...

By default, the table width is equal to the width of the sum of the longest lines in each row.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following query criteria would be used to produce results for Date/Time fields containing a date of December 12, 2014?

A) 12/11/2010 B) 12/12/2010 C) #12/12/2010# D) Between #12/11/2010# and #12/14/2010#

Computer Science & Information Technology

An point-of-view shot is a shot taken from behind the head and shoulders of a person, showing that person's head and shoulders in part of the frame and the subject the person is looking at in the rest of the frame.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You are a security administrator for your company. You need to develop a body of knowledge to enable heuristic- and behavior-based security event monitoring on a geographically distributed network. Instrumentation is chosen to allow for monitoring and measuring the network. What is the BEST methodology to use in establishing this baseline?

A. Schedule testing on operational systems when users are not present. Instrument the systems to log all network traffic. Monitor the network for at least eight hours. Analyze the results. Document the established baseline. B. Model the network in a series of VMs. Instrument the systems to record comprehensive metrics. Run a large volume of simulated data through the model. Record and analyze the results. Document expected future behavior. C. Instrument the operational network. Simulate extra traffic on the network. Analyze network flow information from all network devices. Document the baseline volume of traffic. D. Completely duplicate the network on VMs. Replay eight hours of captured corporate network traffic through the duplicate network. Instrument the network. Analyze the results. Document the baseline.

Computer Science & Information Technology