05-04-2022 06:57 AM - edited 10-19-2023 12:17 PM
Hi! So after trying to implement VLANs and ACLs on our 9300 catalysts it seems they may be limited or have issues with NAT.
We have our MOBILE SSID and it only needs to access DHCP. Otherwise it needs to get outside to the internet via VLANxxx on 207.xx.xxx.xx Sub .248.... I was advised I could create a VRF for this case, but I have not done one yet and need help on an ideal config.
Essentially I need to:
A) Create a VRF for VLANs 1xx (internal) and VLAN1xx (ISP) so they can inter-communicate.
B) Allow access to DHCP through a route leak.
05-04-2022 11:04 AM - edited 05-04-2022 11:05 AM
Hello
VRF lite or RACL the main stumbling block looks like its the NAT with HSRP redundancy, Do you have NAT Already active and working for the other vlans at present?
I am aware older router IOS incorporated stateful nat with hsrp but newer ios utilize box to box nat (B2B) which I doubt will be applicable for 9000 switches.
So just to summarise, you have a HSRP vlan that you want isolated from the rest of the network, be able to receive dhcp allocation and append NAT redundancy to froma 9300 series switch?
05-04-2022 11:10 AM - edited 10-19-2023 12:22 PM
That would be a correct summarization. VLANxxx is for mobile traffic to be isolated from other VLANs, minus the possible DHCP, and reach out to ISP via VLAN or interface. Given the non-severity we can make the VLAN non HSRP. I have already disabled the standby. Currently it is just published to Core 1 9300 switch where the WLC is connected.
05-04-2022 11:23 AM
Hello
Then without HRSP redundancy this would make it a lot easier to accomplish and not so reliant on ios feature set.
As VRF lite is going to be used I would also suggest to try and use NVI NAT (domainless NAT - no inside/outside domains) however im not sure and not able to check at this time if the 9300 supports it
try the following
int x/x/
ip nat enable
05-04-2022 11:33 AM - edited 10-19-2023 12:22 PM
ip nat enable is allowed it seems.
So apply the VRF configuration as shown above (is it correct to you? ) and add the nat enable to both interfaces for xxx, xxx? Should I shed the Vlanxxx and just configure the interface directly?
Using statement: ip nat inside source list 100 interface Vlanxxx overload? Still?
Sorry, my knowledge of VRF is increasing...
05-04-2022 12:06 PM - edited 05-04-2022 12:11 PM
I may have jumped to conclusion. The command is available...but I noticed this...is this prohibitive of NVI?
The NAT Segmentation with Layer 4 Forwarding feature does not work when:
Firewalls are configured using the ip inspect name command. (Context-Based Access Control (CBAC) firewalls are not supported. Zone-based firewalls are supported.)
H.323, SCCP, or TCP DNS messages are larger than 18 KB.
Multiprotocol Label Switching (MPLS) is configured.
NAT and the Cisco Unified CallManager are configured on the same device. In this case, a colocated solution in Call Manager Express is used.
NAT Virtual Interface (NVI) is configured.
Stateful Network Address Translation (SNAT) is enabled.
It does however show it supports VRF-Aware Dynamic NAT Mapping with HSRP: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-16-12/nat-xe-16-12-book/iadnat-dynamc-hsrp.html
05-04-2022 01:21 PM
Hello
Can you try without NVI nat first.
example:
ip vrf mobile
int vlan 126
ip vrf forwarding mobile
ip nat inside
access-list 10 permit 10.74.126.0 0.0.0.255
ip nat inside source list 10 interface <wan svi > vrf mobile overload
ip route vrf mobile 0.0.0.0 0.0.0.0 <wan svi > x.x.x.x global
Can you also confirm what device is servicing your dhcp?
05-04-2022 01:41 PM - edited 10-19-2023 12:23 PM
Seems that I do not have the vrf option under the ip nat inside statement?
05-04-2022 02:38 PM - edited 05-04-2022 02:39 PM
Hello
Outch! that make things a bit more difficult, is that the same for --
ip nat source list 10 interface <wan svi > vrf mobile ?
05-04-2022 02:42 PM
Correct. Only options are "oer" and "overload".... we at least know that ip nat enable works...so maybe have to look at the NVI route.
I don't know if its a bug, I have another thread going for this. We know that with the network advantage lic - shows VRF supported.
05-04-2022 02:44 PM
Hello
If your switch doesn't support nat vrf then i would say we can use routed access-list to negate the inter-vlan routing to/from the mobile vlan and then utilize nat on the global route table.
05-04-2022 03:08 PM
05-04-2022 03:50 PM
Hello
example
vlan 10 = 10.1.10.0/24
vlan 20 = 10.1.20.0/24
vlan 126 = 10.74.126.0/24
no ip nat inside source list 10 interface <wan svi > vrf mobile overload
no ip route vrf mobile 0.0.0.0 0.0.0.0 <wan svi > x.x.x.x global
ip access-list extended no-intervlan-routing
remark negate inter-vlan routing to vlan 126
deny ip any 10.1.10.0 0.0.0.255
deny ip any 10.1.20.0 0.0.0.255
permit ip any any
int vlan 126
no ip vrf forwarding mobile
ip nat inside
ip access-group no-intervlan-routing IN
access-list 10 permit 10.74.126.0 0.0.0.255
ip nat inside source list 10 interface <wan svi > overload
05-05-2022 03:25 PM - edited 10-19-2023 12:24 PM
Ah thanks for this, I may try this as well. I am a stalwart and trying to resolve this another way. I found that the WLC 9800 controller allows VRF-lite and the commands I could not use on the 9300 switch, so I am setting up as you may have seen from the other post.
I can ping out to 8.8.8.8 from a command: ping vrf MOBBILE-SSID 8.8.8.8 with 100%, oddly when the core 1 has VLANxxx enabled. Perhaps it has to do with the trunked interface? But still not from the actual MOBILE clients on 10.74.x.x directly. A traceroute has them coming back through the core 1 and trying to get out to internet through MPLS oddly enough.
If I turn off Vlan xxx on the core completely to allow just the layer 2 VLAN xxx to be hosted by the WLC itself, I can still ping internal to VRF and out to the net through the vrf interface, but cannot reach DHCP or 8.8.8.8 with the mobile (static assignment is no better). So perhaps there is something configuration wise that needs to be changed or a routing statement to allow clients to get out...
05-06-2022 12:43 AM - edited 05-06-2022 12:44 AM
Hello
Okay so you have relocated the L3 vlan 126 onto the wlc and put it in vrf now you wish to receive dhcp allocated from global route table?
Have your tried using a relay vrf (if supported)
int vlan 126
ip hepler-addressx.x.x. vrf xxxxx
05-06-2022 06:49 AM - edited 10-19-2023 12:25 PM
I used ip helper-address vrf MOBILE-SSID 10.74.xx.x - still no DHCP. I did a shut interface on vlan xxx on the core, and when I do this I can no longer ping the DHCP server on 10.74.xx.x. There seems to a link or something for the vlanxxx, as it cannot segregate itself from the core...Now in testing if I add the vlan xx in the WLC using "ip vrf forwarding MOBILE-SSID" I can reach everything despite the VLAN 126 interface being shut on core 1...
we are using transparent VTP, so in theory the routing to core 1 should not be a concern?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide