cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1599
Views
0
Helpful
2
Replies

Destination NAT network and source NAT on ISR

D R
Level 1
Level 1

Hello.

 

I have an ISR 1117 running IOS-XE 17.1 that has an IKEv2 tunnel to a hub site. The ISR is connected to 3 internal networks via L2 trunks and the ISR has an SVI for each network. All networks can be summarised to 10.0.0.0/24. The individual networks are 10.0.0.0/26 (VLAN 10), 10.0.0.64/26 (VLAN 11) and 10.0.0.0128/25 (VLAN 12) respectively.

 

The devices connected to these networks may not have default gateways and if they do, they will be pointing somewhere else other than this ISR, hence one requirement on the ISR is to source NAT traffic ingressing from the tunnel. As a result of this, the tunnel interface (tun0) is "nat inside" and the mentioned SVIs are all "nat outside".

 

So far, so good. But there is another requirement where the hub site has another tunnel with an overlap. Therefore the hub site has been configured with a route for to "dummy" network 10.1.0.0/24 down the tunnel to this ISR and the requirement is to destination NAT the network on the ISR, so traffic ingressing at tun0 for 10.1.0.0/24 is xlate'd to 10.0.0.0/24 (or the specific networks 10.1.0.N/x to 10.0.0.N/x), then source NAT needs to occur.

 

But I personally find IOS NAT confusing at the best of times and this has blown my mind. Is it even possible? The source NAT is all good but I can't wrap my head around the destination NAT. Because of order of operations, the ISR needs a route for the "dummy" network but this network doesn't really exist. And this is where I'm stuck.

 

Unfortunately I can't fix this at the hub site because of the order of operations at that end (a Palo Alto). If I destination NAT there, it does the route lookup on the post-NAT address which then means it's routed down the wrong tunnel due to the network overlap.

 

Snippet of the ISR config (some parts removed for brevity):

 

int tun0

 ! Tunnel to hub site

 ip address 100.64.0.2 255.255.255.255

 ip nat inside

 tunnel source gi0/0/0

 tunnel mode ipsec ipv4

int vl10

 ip address 10.0.0.62 255.255.255.192

 no ip redirects

 no ip proxy-arp

 ip nat outside

int vl11

 ip address 10.0.0.102 255.255.255.192

 no ip redirects

 no ip proxy-arp

int vl12

 ip nat outside

 ip address 10.0.0.129 255.255.255.128

 no ip redirects

 no ip proxy-arp

 ip nat outside

!

! Clients at hub site are within 192.168.0.0/24

ip route 192.168.0.0 255.255.255.0 tunnel0

!

! Also need to source NAT when the destination is the "dummy" network.

ip access-list extended NAT_TO_VL10

 10 permit ip any 10.0.0.0 0.0.0.63

 20 permit ip any 10.1.0.0 0.0.0.63
ip access-list extended NAT_TO_VL11

 10 permit ip any 10.0.0.64 0.0.0.63

 20 permit ip any 10.1.0.64 0.0.0.63
ip access-list extended NAT_TO_VL12

 10 permit ip any 10.0.0.128 0.0.0.127

 10 permit ip any 10.1.0.128 0.0.0.127

!

! Source PAT - this is working as expected.

! Remember that not all devices within these VLANs have a default gateway

! and those that do, are not using this ISR as their gateway.

ip nat inside source list NAT_TO_VL10 interface Vlan10 overload

ip nat inside source list NAT_TO_VL11 interface Vlan11 overload

ip nat inside source list NAT_TO_VL12 interface Vlan12 overload

!

! Now the troublesome part, the destination NAT network.

! Need to xlate destination 10.1.0.N/x to 10.0.0.N/x.

! But 10.1.0.A/x doesn't *really* exist here.

! The ISR needs to know it should be answering for 10.1.0.N/x, otherwise it'll send dest unreachable.

! Then xlate destination 10.1.0.N/x to 10.0.0.N/x.

! And then xlate source (see above).

1 Accepted Solution

Accepted Solutions

D R
Level 1
Level 1

I've managed to frig it.

 

The trick was to add routes for each dummy network with a bogus next hop. Obviously the next hop can't be the same router and the route won't install unless the next hop is reachable, so I created a loopback in the same network as the bogus next hop so the route got installed. I then added a static ARP entry for the bogus next hop using a locally administered MAC I made up.

 

Now when router has a static ARP entry for the next hop this allows the destination NAT to work, forcing the router to ARP for the real destination address.

 

Putting it all together, I've ended up with:

 

int tun0

 ! Tunnel to hub site.

 ip address 100.64.0.2 255.255.255.255

 ip nat inside

 tunnel source gi0/0/0

 tunnel mode ipsec ipv4

int vl10

 ip address 10.0.0.62 255.255.255.192

 no ip redirects

 no ip proxy-arp

 ip nat outside

int vl11

 ip address 10.0.0.102 255.255.255.192

 no ip redirects

 no ip proxy-arp

int vl12

 ip nat outside

 ip address 10.0.0.129 255.255.255.128

 no ip redirects

 no ip proxy-arp

 ip nat outside

! This allows the dummy routes to be installed because the bogus next hop is reachable.

int lo99

 ip address 100.64.99.253 255.255.255.252

!

! Route back to clients at hub site.

ip route 192.168.0.0 255.255.255.0 tunnel0

! Routes for dummy networks via bogus next hop

ip route 10.1.0.0 255.255.255.192 vl10 100.64.99.254

ip roue 10.1.0.64 255.255.255.192 vl11 100.64.99.254

ip route 10.1.0.128 255.255.255.128 vl12 100.64.99.254

!

arp 100.64.99.254 0210.dead.beef arpa

!

ip access-list extended NAT_TO_VL10

 10 permit ip any 10.0.0.0 0.0.0.63

 20 permit ip any 10.1.0.0 0.0.0.63
ip access-list extended NAT_TO_VL11

 10 permit ip any 10.0.0.64 0.0.0.63

 20 permit ip any 10.1.0.64 0.0.0.63
ip access-list extended NAT_TO_VL12

 10 permit ip any 10.0.0.128 0.0.0.127

 10 permit ip any 10.1.0.128 0.0.0.127

!

! Source NAT to networks.

ip nat inside source list NAT_TO_VL10 interface Vlan10 overload

ip nat inside source list NAT_TO_VL11 interface Vlan11 overload

ip nat inside source list NAT_TO_VL12 interface Vlan12 overload

!

! Destination NAT to cater for overlap at hub site.

ip nat outside source static network 10.0.0.0 10.1.0.0 /26 add-route

ip nat outside source static network 10.0.0.64 10.1.0.64 /26 add-route

ip nat outside source static network 10.0.0.128 10.1.0.128 /25 add-route

View solution in original post

2 Replies 2

D R
Level 1
Level 1

So I had a thought. I could add a secondary IP to each SVI, thus:

 

int vl10

 ip address 10.0.0.62 255.255.255.192

 ip address 10.1.0.62 255.255.255.192 secondary

 no ip redirects

 no ip proxy-arp

 ip nat outside

int vl11

 ip address 10.0.0.102 255.255.255.192

 ip address 10.1.0.102 255.255.255.192 secondary

 no ip redirects

 no ip proxy-arp

int vl12

 ip nat outside

 ip address 10.0.0.129 255.255.255.128

 ip address 10.1.0.129 255.255.255.128 secondary

 no ip redirects

 no ip proxy-arp

 ip nat outside

 

So now I have a route to the "dummy" network associated with each VLAN. Then I was hoping the following NAT statement would destination NAT from the "dummy" network to the real network (and force an ARP):

 

ip nat outside source static network 10.0.0.0 10.1.0.0 /26

ip nat outside source static network 10.0.0.64 10.1.0.64 /26

ip nat outside source static network 10.0.0.128 10.1.0.128 /25

 

But no joy unfortunately. This doesn't seem to work as expected and the destination is never translated. I've also tried adding the add-route keyword, even though there is a connected route due to the secondary addresses.

 

If I add a NAT for a specific host destination, for example:

 

ip nat outside source static 10.0.0.10 10.1.0.10 add-route

 

I can then get from the hub site to 10.1.0.10 which ends up at the ISR where both source NAT and destination NAT occur. This only works with the add-route keyword.

 

But of course I need to translate the entire networks.

 

Any and all help gratefully received

D R
Level 1
Level 1

I've managed to frig it.

 

The trick was to add routes for each dummy network with a bogus next hop. Obviously the next hop can't be the same router and the route won't install unless the next hop is reachable, so I created a loopback in the same network as the bogus next hop so the route got installed. I then added a static ARP entry for the bogus next hop using a locally administered MAC I made up.

 

Now when router has a static ARP entry for the next hop this allows the destination NAT to work, forcing the router to ARP for the real destination address.

 

Putting it all together, I've ended up with:

 

int tun0

 ! Tunnel to hub site.

 ip address 100.64.0.2 255.255.255.255

 ip nat inside

 tunnel source gi0/0/0

 tunnel mode ipsec ipv4

int vl10

 ip address 10.0.0.62 255.255.255.192

 no ip redirects

 no ip proxy-arp

 ip nat outside

int vl11

 ip address 10.0.0.102 255.255.255.192

 no ip redirects

 no ip proxy-arp

int vl12

 ip nat outside

 ip address 10.0.0.129 255.255.255.128

 no ip redirects

 no ip proxy-arp

 ip nat outside

! This allows the dummy routes to be installed because the bogus next hop is reachable.

int lo99

 ip address 100.64.99.253 255.255.255.252

!

! Route back to clients at hub site.

ip route 192.168.0.0 255.255.255.0 tunnel0

! Routes for dummy networks via bogus next hop

ip route 10.1.0.0 255.255.255.192 vl10 100.64.99.254

ip roue 10.1.0.64 255.255.255.192 vl11 100.64.99.254

ip route 10.1.0.128 255.255.255.128 vl12 100.64.99.254

!

arp 100.64.99.254 0210.dead.beef arpa

!

ip access-list extended NAT_TO_VL10

 10 permit ip any 10.0.0.0 0.0.0.63

 20 permit ip any 10.1.0.0 0.0.0.63
ip access-list extended NAT_TO_VL11

 10 permit ip any 10.0.0.64 0.0.0.63

 20 permit ip any 10.1.0.64 0.0.0.63
ip access-list extended NAT_TO_VL12

 10 permit ip any 10.0.0.128 0.0.0.127

 10 permit ip any 10.1.0.128 0.0.0.127

!

! Source NAT to networks.

ip nat inside source list NAT_TO_VL10 interface Vlan10 overload

ip nat inside source list NAT_TO_VL11 interface Vlan11 overload

ip nat inside source list NAT_TO_VL12 interface Vlan12 overload

!

! Destination NAT to cater for overlap at hub site.

ip nat outside source static network 10.0.0.0 10.1.0.0 /26 add-route

ip nat outside source static network 10.0.0.64 10.1.0.64 /26 add-route

ip nat outside source static network 10.0.0.128 10.1.0.128 /25 add-route

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card