NAT (Network Address Translation)

  • What is NAT?

NAT (Network Address Translation) was introduced in the IT and Networking World to reduce the shortage of IP Addresses version 4. Nowadays, most IT firms are using IP Addresses for their websites and other purposes. NAT is used to hide your servers, computers, and other IT equipment lied on your network and add a layer of security on it. 

 

  • How do the NAT works?

Computers, servers, and other IT equipment can connect to each other within the same network using IP Addresses. When I am writing this, more than 4 billion IPV4 addresses are in use. Looking at the current usage, there will be a shortage of IPV4 very soon. To overcome this issue, there is a temporary solution which is known as NAT. 

There are two types of IP Addresses. (1) Public (2) Private. There are 3 ranges of Private IP Addresses as below that can be used by anyone within the private network and not routed on the internet. 

         Class A 10.0.0.0 - 10.255.255.255

         Class B 172.16.0.0 - 172.31.255.255

         Class C 192.168.0.0 - 192.168.255.255

You can use these IP Addresses range within your internal network using NAT. This helps you to allow a unique IP Address to all the IT equipments.

 

  • Advantages of NAT :

  1. We can reuse the same private IP addresses assigned to another host previously.

  2. It keeps the local IP addresses private from the external network to increase a layer of security within your network.

  3. Save the usage of public IP Addresses as it can connect a huge number of IT equipment to the Internet using private IP Addresses.

  • Disadvantages of NAT :

  1. It might cause a communication delay for IPV4 as it will translate the public IP Address into a Private IP address.

  2. It consumes the processor and memory as it will translate the incoming and outgoing IPV4 and contain the translation details in memory.

  3. It will be hard to trace the end device with NAT enabled on the network and you will face the issue while troubleshooting from remote access.
  • 0 Users Found This Useful

Was this answer helpful?

Related Articles

How do I check current established connections and network utilization of my VPS?

Windows VPS   For current established connections and processes:   Go to Run Type cmd, hit...

How to enable "I'm Under Attack" mode in CloudFlare Panel?

Cloudflare provides additional protection called "I m under attack" for a website which is under...

Receiving unexpected T_STRING error.

If you are receiving this error, this means .html files are parsed as PHP. In case, your .html...

What are the Differences Between Forward Proxy and Reverse Proxy?

Generally, there are two types of proxy servers available which are Forward Proxy and Reverse...

How to make a strong password?

A strong password provides essential protection from financial fraud and identity theft. One of...