Overload means that the inside users will use the same outside (source) address, while using the source ports to differentiate the different data streams. It is always the source address that is manipulated, and it is always from inside->outside (ie private to legal address).
For packets initiated in the other direction (legal to private), the source device will be sending a legal destination address and port, and there would be no way to differentiate the data streams based on this source port or address (since multiple legal devices could be using this same destination address and port). At the same time, there would be no way to differentiate the data streams based on the source information, since that is out of the control of the NAT receiver (it can't enforce the overload of the source info for an inbound packet).
I'm not sure that I explained this well, but hopefully it makes sense. I don't have any other suggestions for what you are trying to accomplish.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...