on 11-05-2013 11:19 AM
Cisco's CGv6 (Carrier Grade IPv6) solution helps customer transitioning from IPv4 to IPv6 gradually, maintaining business continuity. ISM (Integrated Services Module) on ASR9K is a Service Card which provides different CGv6 Applications. This document talks about how to deploy NAT44 (Network Address Translation - from IPv4 to IPv4), one of the applications fall under CGv6 suite of applications.
This document does NOT intend to cover details on ISM, how to install CGv6 software on ISM, how to trouble-shoot CGv6 issues, CGv6 Applications other than NAT44.
DISCLAIMER: This document contains some Public IP addresses to explain different deployment use-cases and features related to NAT44. The Public IP addresses are picked up randomly and matching of these addresses with any specific customer's or organization's public IP is purely coincidental. Please DO NOT use these public addresses in your NAT setup / deployment, unless the public IP addresses are not owned by you / your organization. Cisco is not responsible for any issues arising out of this.
This section introduces NAT44 and terminologies related to it.
IPv4 address is 32-bit long which means there can be 4,294,967,296 (i.e., 4 billions) unique addresses. However, population on earth has crossed 7 billions and is still growing. Also, nowadays, a single person can own multiple IP devices, each having its own IP address. Thus, we are running short of IPv4 addresses. In 2 of the 5 RIR (Regional Internet Registries), IPv4 address exhaustion is declared (in its last /8 stage).
Apat from moving to IPv6 (which uses 128-bit long IP address), an alternate mechanism is to use NAT44 where Private IP addresses can be re-used in different Private networks, but can be translated to a unique Public IP address when the packet enters Internet or Public network.
If you are a Service Provider and running short of Public IP addresses, NAT44 should be of great usefulness to you as an intermediate solution before you slowly convert your IPv4 network into IPv6.
NAT44 literally means translating one IPv4 address to another IPv4 address. "Typically", first IPv4 address is "Private" IPv4 Address (defined by RFC 1918) and second IPv4 address is "Public" (non-Private) IPv4 address. As defined by RFC 1918, Private IPv4 addresses fall in the following blocks.
Start IP Address | End IP Address | Comments |
---|---|---|
10.0.0.0 | 10.255.255.255 | 10.0.0.0/8 prefix - contains 16,777,216 addresses |
172.16.0.0 | 172.31.255.255 | 172.16.0.0/12 prefix - contains 1,048,576 addresses |
192.168.0.0 | 192.168.255.255 | 192.168.0.0/16 prefix - contains 65,536 address |
However, it is to be noted that not always "Private" IPv4 address is to be translated to "Public" IPv4 address. There are deployment cases where NAT44 is used to convert "Private" IPv4 address (say, 192.168.x.x range) to another "Private" IPv4 address (say, 10.x.x.x range) as well.
NOTE: In this document, however, we will refer "Private" side as the pre-NAT side of the NAT device and "Public" side as the post-NAT side of the NAT device, irrespective of the actual IP address being used.
One more important point, although NAT indicates Network Address Translation, it is actually NAPT (Network Address and Port Translation). What it means is - in addition to IPv4 address, Layer 4 (UDP/TCP) port is also translated by NAT44.
NOTE: Unless mentioned otherwise, in this document, NAT44 will indicate translation of both IPv4 address and Port.
Following Layer 4 Protocols are supported by NAT44 implementation on ISM.
Another useful property of NAT44 is multiple Private IP addresses can be mapped to one Public IP address. This is possible as all of the 65,536 ports (0 to 65,535) on any Private IP address are typically not used by Applications.
Following diagram shows how NAT44 works.
As shown above, the Private IP addresses 192.168.1.1 and 192.168.1.5 are translated to same Public IP address 20.1.1.1 (along with specific Layer 4 ports) by the NAT44 device (ISM on ASR9K). The translation entries are maintained in NAT DB at the NAT44 device.
In this section, let us get introduced with different terminologies related to NAT44 deployment on ISM.
Terminology | Definition / What it means |
---|---|
Inside / Subscriber Side / Access Side / Private Side | Private side of the NAT44 device (which usually contains Private IPv4 addresses) |
Outside / Network Side / Core Side | Public side of the NAT44 device (which usually contains Public IPv4 addresses) |
Inside-to-Outside (I2O) | Traffic flowing from Inside to Outside across NAT44 device |
Outside-to-Inside (O2I) | Traffic flowing from Outside to Inside across NAT44 device |
Stateful (SF) | Which preserves State or Database. E.g. - NAT44 is Stateful protocol. |
Endpoint Independent Mapping (EIM) / Filtering (EIF) | Any device (IP + Port) can send O2I traffic to a Public IP + Port which exists in NAT DB. ISM implements this behavior. It is also termed as "Full-Cone NAT". |
Endpoint Dependent Mapping (EDM) / Filtering (EDF) | Only the device (IP + Port) which has received I2O traffic can send O2I traffic to a public IP + Port which exists in NAT DB. Destination IP and port information is also maintained in NAT DB in this case. ISM does not implement this behavior. |
Port Parity Preservation | Odd port should be translated to Odd port and Even port should be translated to Even port. ISM supports this. |
Following are the important RFCs that the NAT44 solution on ISM complies (most of the cases, fully) to.
RFC Number / IETF Draft Name | Title of the Specification | Additional Comments |
---|---|---|
RFC 768 | User Datagram Protocol (UDP) | |
RFC 792 | Internet Control Message Protocol (ICMP) | |
RFC 793 | Transmission Control Protocol (TCP) | |
RFC 959 | File Transfer Protocol (FTP) | |
RFC 1812 | Requirements for IP Version 4 Routers | |
RFC 3954 | Cisco System Netflow Services Export Version 9 | |
RFC 4787 | Network Address Translation (NAT) Behavioral Requirements for Unicast UDP | |
RFC 5382 | NAT Behavioral Requirements for TCP | |
RFC 5424 | The Syslog Protocol | |
RFC 5508 | NAT Behavioral Requirements for ICMP | |
RFC 6888 | Common Requirements for Carrier Grade NATs (CGN) | Evolved from draft-nishitani-cgn |
This section talks about one of the basic deployment scenario for NAT44 which is called "Double NAT44" or "NAT444".
Following diagram depicts NAT444.
In the above diagram, there are 2 NAT44 instances shown (hence, it is termed as "Dual NAT44" or "NAT444").
ISM with ASR9K will be positioned as CGN in Service Provider network.
Before we start configuring NAT44 on ISM, let us understand the following concepts related to NAT44 implementation on ISM.
NOTE: ServiceInfra and ServiceApp interfaces are used within the ASR9K router only and do not need to be announced/redistributed into IGP.
NOTEs: - We cannot have multiple Inside ServiceApps within same Inside VRF. - We can, however, have multiple Outside ServiceApps within same Outside VRF or default VRF. - Inside and Outside VRF cannot be same.
Logical Partition / Group 1 | Logical Partition / Group 2 |
---|---|
ServiceApp 1, ServiceApp 2 | ServiceApp 3, ServicApp 4 |
ServiceApp 5, ServiceApp 6 | ServiceApp 7, ServiceApp 8 |
ServiceApp 9, ServicApp 10 | ServiceApp 11, ServiceApp 12 |
... | ... |
ServiceApp 241, ServiceApp 242 | ServiceApp 243, ServiceApp 244 |
NOTE: ServiceApp interafce pair needs to be selected from same Logical Partition (as per the above table). Otherwise, packets will be dropped. Using consecutive numbers for ServiceApp interface pair will be recommended (as shown above).
Following diagram provides summary / overview of NAT44 configuration for ISM.
Below are sample configurations for each of the above steps.
Step 1: Configure CGN Instance on ISM Card at Slot 1 |
---|
|
Step 2: Configure ServiceInfra interface |
---|
|
Step 3 and 4: Configure Ingress and Egress LC Interfaces |
---|
! Add it to Inside VRF
ipv4 address 10.10.11.1 255.255.255.0 ! Configure Egress interface ! --------------------------
vrf ovrf1
vrf ovrf2
|
Step 5: Configure CGN and NAT44 Service parameters (Important ones are shown) |
---|
|
Step 6 and 7: Configure Inside and Outside ServiceApp interfaces |
---|
|
Step 8 and 9: Configure Traffic Diversion Rules |
---|
vrf ivrf2
|
Following diagram shows the packet flow within ASR9K (including ISM) for Inside to Outside NAT44 traffic at a high-level.
Step 1: Packet from Inside / Private side reaches ASR9K Ingress Line Card.
Step 2: Forwarding lookup (rule added by static route, ACL-based forwarding, etc.) should forward the packet to ISM card, via Inside ServiceApp 1 interface. Inside VRF (ivrf1) will be used during the forwarding lookup.
Step 3: NAT44 Application performs necessary action for the packet. As it is Inside-to-Outside packet, it first checks if there is a NAT entry exists for the source IP (10.10.10.2) and port (5000). If it does not exists, it allocates a Public IP (from the Public IP pool configured) and port and creates a NAT entry. From the NAT entry, it finds the corresponding Public IP (100.2.0.192) and port (23156) and replaces the existing Source IP and port with the same.
Step 4: After NAT translation is done, a forwarding lookup is done in Outside VRF (ovrf1) for the destination IP address (5.5.5.2) which forwards the packet to egress LC interface.
Step 5: Egress Line Card interface sends the packet out to Outside / Public side.
Following diagram shows the packet flow within ASR9K (including ISM) for Outside to Inside NAT44 traffic at a high-level.
Step 1: Packet from Outside / Public side reaches ASR9K Ingress Line Card.
Step 2: Forwarding lookup (rule added by static route, ACL-based forwarding, etc.) should forward the packet to ISM card, via Outside ServiceApp 2 interface. Outside VRF (ovrf1), if being configured, will be used during the forwarding lookup.
Step 3: NAT44 Application performs necessary action for the packet. As it is Outside-to-Inside packet, it first checks if there is a NAT entry exists for the Destination IP (100.2.0.192) and port (23156). If it does not exists, packet is dropped. Otherwise, from the NAT entry, it finds the corresponding Private IP (10.10.10.2) and port (5000) and replaces the existing Destination IP and port with the same.
Step 4: After (reverse) NAT translation is done, a forwarding lookup is done in Inside VRF (ivrf1) for the destination IP address (10.10.10.2) which forwards the packet to egress LC interface.
Step 5: Egress Line Card interface sends the packet out to Inside / Private side.
Before deploying NAT44 solution with ISM, you need to analyze the deployment scenario/requirement and come up with the appropriate values of different configurable parameters related to NAT44. Improper selection of the parameters may not address the deployment goals accurately.
These are possibly the most important parameters to be considered during deployment. These are not configurable parameters, but these will determine how many ISM cards will be needed for the NAT44 solution.
Based on the above two, find out how many ISM cards will be needed for the solution.
Identify the following for the deployment scenario.
Based on the same, number of inside VRFs, address pools, many-to-one ratio can be configured as follows.
Address Mapping related parameter configuration |
---|
|
NOTE: Network address and Broadcast address in the subnet (as configuredby address-pool parameter) are also used as NAT'ed Public / Outside IP address.
Identify the following VRF related information from deployment requirement.
Above information will determine,
As NAT DB is shared among all users, there could be a situation where few users (Private IP owners) uses lots of NAT entries (in thousands) and because of the same, new users cannot create NAT entries. In order to keep control on creation of NAT entries by a single user, Port Limit parameter is introduced. Port limit indicates how many port numbers are allowed per Private / Inside IP address. If any flow arrives after Port Limit is reached, no NAT entry will be created for the same and the packets for the new flows will be dropped. The Port limit value will be same for all Private IP addresses.
NOTE: Port Limit is specified per Private / Inside IP address and NOT per Public / Outside IP address.
Find out the following:
Based on the above Port Limit can be configured as follows.
Configuration of Port Limit |
---|
service cgn cgn1 ! Define NAT44 Service Type and instance (one per ISM card) service-type nat44 nat1 ! Define per-user Port limit for NAT44 instance portlimit 250 |
As you have seen above, a NAT DB entry is created for each new flow (Private IP address and port) which keeps the mapping of Private / Inside IP address + Port and Public / Outside IP address + Port. The NAT DB entry is deleted when the flow terminates (because of timeout and any user intervention).
On ISM, we support millions of NAT translations with high (in thousands and millions) setup and deletion rate (Please refer to CGv6 on ISM Feature List for scale numbers). This produces huge amount of NAT translation entries / records which cannot be stored / saved on ISM or ASR9K because of limited disk space. Hence, there is a need of having external servers where these translations can be saved.
The creation and deletion of NAT transactions (also called "Logging Records") are very important to be saved to get association of different IP addresses. In almost all countries, it is mandated by the Lawful Agencies / Authorities that the Service Provide must provide these records accurately so that the agencies can find out the owner of these APIs for different reasons. Thus it becomes a very important feature for deployment of NAT44.
On ISM, we support the 2 formats of logging records - Netflow (version 9) and Syslog. Table below compares the two.
Items for Comparison | Netflow Version 9 (NFv9) | Syslog |
---|---|---|
Standard Document | RFC 3954 | RFC 5424 |
Text / Binary format | Binary | Text |
Underlying Layer 4 protocol | UDP (Server usually uses Port 2055, 2056, 4432, 4739, 9995, 9996, 6343) | UDP (Server typically uses Port 514) |
Average Logging Recod Size | 20 Bytes (with DBL and BPA disabled) | 70 Bytes (with DBL and BPA disabled) |
Usage of Template | Uses Netflow Template | Does not use any template |
Logging records are sent to Logging Server (IP address and Port for which is configurable) either when the Logging packet is complete or timeout occurs. Logging packets are sent with ServiceInfra interface's remote IP (for e.g., 100.1.1.2 is the remote IP of 100.1.1.1) as Source address.
NOTE: External Logging Server IP address should be reachable via any ASR9K LC interface (NOT via Management Ethernet interface), in default VRF.
In some countries, Lawful Agencies also require the Service Provider to provide the Destination IP address and Port (along with Source IP address and Port information) as part of Logging Record. This is termed as Destination-Based Logging (DBL).
NOTE: Including Destination information in the Logging Record will increase the size of the Record.
DBL can be supported with Netflow v9 as well as with Syslog.
In order to reduce the size of the logging record, a feature called Bulk Port Allocation (BPA) is introduced.
Without BPA, for every new flow, a Port is allocated for the Public IP and a new logging record is created with Private IP + Port and Public IP + Port. Similarly, another Logging record is created when a flow or NAT entry is deleted.
Following table captures the working of it (without BPA) with some sample IP addresses and port numbers.
Event | Inside Source IP + Port | Outside Source IP + Port | Logging Record | Additional Comments |
---|---|---|---|---|
A new flow arrives | 10.1.1.1:1000 | 170.0.0.5:8175 | 10.1.1.1:1000 <-> 170.0.0.5:8175 | New port (8175) allocation happens. New logging record is created |
Existing flow arrives | 10.1.1.1:1000 | 170.0.0.5:8175 | N/A | No new Port allocation happens. No logging record is created |
A new flow arrives (with new port, but same IP) | 10.1.1.1:2000 | 170.0.0.5:13591 | 10.1.1.1:2000 <-> 170.0.0.5:13591 | New port (13591) allocation happens. New logging record is created. |
Without BPA, for the first new flow, a bulk (group) of Ports are allocated (but only one port from the group is assigned for the new flow) for the Public IP and a logging record is created with Private IP and Public IP + Start Port + End Port. Next time, a new flow comes, a new port from the already allocated pool is taken and no logging record is created. Only when all the ports in the group are used, a new bulk is allocated and logging record is created. Similarly, when all the ports from a group is released, a (deletion) logging record is generated.
Following table captures the working of it (with BPA enabled) with sample IP addresses and port numbers.
Event | Inside Source + Port | Bulk Port Allocation (size 64) | Outside Source IP + Port | Logging Record | Additional Comments |
---|---|---|---|---|---|
A new flow arrives | 10.1.1.1:1000 | Allocates Bulk Port range (8192 - 8255) for 170.0.0.5 | 170.0.0.5:8201 | 10.1.1.1 <-> 170.0.0.5:8192-8255 | Bulk port allocation and new port (8201) assignment happens. New logging record is created. |
Existing flow arrives | 10.1.1.1:1000 | N/A | 170.0.0.5:8201 | N/A | No new Port allocation happens. No logging record is created. |
A new flow arrives (with new port, but same IP) | 10.1.1.1:2000 | N/A | 170.0.0.5:8199 | N/A | New Port (8199) allocation happens (from same port range). No logging record is created. |
A new flow arrives (with new port, but same IP) | 10.1.1.1:5000 | N/A | 170.0.0.5:8236 | N/A | New Port (8236) allocation happens (from same port range). No logging record is created. |
Following table illustrates the amount stoage space needed per second with varying translation creation + deletion rate for both Netflow and Syslog (with DBL disabled). It also shows the impact of BPA on the storage.
NAT translation creation + deletion rate per second | Netflow without BPA | Syslog without BPA | Netflow with Bulk size 256 and 50% utilization | Syslog with Bulk size 256 and 50% utilization |
---|---|---|---|---|
20,000 | 0.8 MB | 2.8 MB | 6.25 KB | 21.875 KB |
50,000 | 2 MB | 7 MB | 15.625 KB | 54.6875 KB |
100,000 | 4 MB | 14 MB | 31.25 KB | 109.375 KB |
500,000 (maximum) | 20 MB | 70 MB | 156.25 KB | 546.875 KB |
NOTE: Both DBL and BPA cannot be enabled at the same time. This is because BPA requires logging record to be generated for a set of NAT entries whereas DBL requires logging record to be generated for each NAT entry. These are conflicting requirements.
Please collect the following information and accordingly determine External Logging related parameter configuration.
Following table shows how to configure different external logging parameters.
Configuration of External Logging Parameters |
---|
service cgn cgn1 service-type nat44 nat1 inside-vrf ivrf1
|
As the new flows creates NAT entries, we need a way to delete those NAT entries as well. Protocols like UDP is connection-less and hence, there is no way to identify when a session / connection has ended by inspecting the packets. Also, in some cases, if no packet flows between the applications for a long period of time, there is no point in holding on to the NAT entries, as that will disallow creation of new NAT sessions.
Due the above reasons, NAT entries are deleted when session timeout happens.
For every protocol (TCP, UDP, ICMP), we have different types and values of session timeouts, as depicted below.
If the timeout is configured to be too less, NAT sessions will be deleted too soon, resulting in changing of Public IP addresses. This may cause issues with the Applications.
If the timeout is configured to be too high, NAT sessions will remain in the system for long time (even though there is no data is flowing using the session) and it will restrict new sessions to be created as well (resulting in dropping of those packets).
Hence, timeout value needs to be set appropriately.
NOTE: These timeouts are set for the NAT44 instance (per ISM card) and cannot be configured differently for each Inside VRF.
You need to have some knowledge about the following, to determine the timeout values.
Following table shows how to configure timeout values for different protocols.
Configuration of Session Timeout (TCP, UDP, ICMP) |
---|
service cgn cgn1 service-type nat44 nat1
|
We can use different mechanisms to divert the traffic to ISM card (to specific ServiceApp interface).
If the inside traffic is arriving on a (Inside) VRF and ALL traffic needs to undergo NAT44 operation, we can add a default route under the VRF to divert traffic to the Inside ServiceApp (as shown below).
Configuration for Traffic Diversion using Default route |
---|
|
In some cases, Outside ServiceApp interfaces reside in same / default VRF. Hence, in order to divert O2I traffic to specific Outside ServiceApp interfaces, static route can be used in the following way.
Configuration for Traffic Diversion using Static Route |
---|
! Diverting traffic for one Public IP pool to one Outside ServiceApp ! Diverting traffic for another Public IP pool to another Outside ServiceApp
|
In certain deployment cases, default route may not work.
NOTE: Typically, ABF is to be used in Private side / Subscriber side and NOT towards Public / Core / Network side.
In the above cases, ABF provides a very good solution. Below is sample configuration on how to use ABF for traffic diversion.
Configuration for Traffic Diversion using ABF |
---|
! Divert to ServiceApp 1
! Divert to ServiceApp 3 20 permit ipv4 10 .0 .200 .0 / 24 any nexthop1 vrf ivrf2 ipv4 6 .1 . 1.2 100 permit ipv4 any any ! Configure Ingress Interface
! Apply ABF on Ingress Interface ipv4 access-group nat44_abf ingress ! Define one Inside ServiceApp interfaceinterface ServiceApp1
ipv4 address 5.1 . 1.1/30
interface ServiceApp3 vrf ivrf3
|
There is a very important point about Dynamic NAT44. All the NAT translations / sessions are created by I2O traffic. If O2I traffic reaches ISM for which there is no NAT entry, the packets will be dropped. This works fine for most of the cases as the session / traffic is initiated by Applications which reside on Private side.
However, there are cases, where a server resides on the Private side of the network. In this case, there are 2 issues.
To address these problems related to Server sitting on Private side of the network, a new feature called "Static Port Forwarding" is introduced. Following diagram explains "Static Port Forwarding" feature functionality.
Using Static Port Forwarding, user can provide the Private IP address and Port (via CLI) and NAT44 Application on ISM generates (dynamically) the corresponding Public IP and Port. Also, these mapping are made permanent - i.e., they do not get timed out and get deleted. The Public IP and port generated by the Application can be added to DNS database and thus made available to all.
With this design, any device on Public side of network can now send traffic to the known Public IP and port (to reach the Server sitting inside Private network). Also, as the NAT entry is permanent, O2I traffic always finds the entry and using the same can translate the packet (without dropping it).
Staic Port Forwarding entries can be created separately for each protocol - TCP, UDP and ICMP. To know the maximum number of such entries, please check CGv6 on ISM Feature page.
NOTES:
- User cannot provide the Outside / Public IP and port while configuring Static Port Forwarding.
- Outside / Public IP is generated by the NAT44 Application and hence, can be random.
- Outside port is usually assigned same as Inside Port, unless the Outside port is already being used
As these are used for Servers located in Private network, it is desirable that the Public IP address remain constant across RP / ISM failover.
As Outside / Public IP address for a Static Port Forwarding entry is allocated by NAT44 application based on the instant situation of Public IP availability stock as well as the allocation algorithm's state, it is highly probable that if the Static Port Forwarding entry is deleted and re-added or, if the ISM card is reloaded), it may allocate a different Public IP address.
In order to keep the same Outside IP address, it is recommended to add the Static Port Forwarding configuration as a first thing after ISM card comes up and when there is no NAT traffic on the router/ISM card (could be in a "maintenance window"). That way, every time, ISM is reloaded, the Public IP addresses assigned for Static Port Forwarding entries will remain the same.
If you are using ISM 1:1 redundancy, Backup ISM will assign the same Public IP as assigned in Active ISM (irrespective when the entries are added).
Try to find out the following, before using Static Port Forwarding.
A sample configuration for Static Port Forwarding is shown below.
Configuration for Static Port Forwarding |
---|
service type nat44 nat1 inside-vrf ivrf1 map address-pool 180.0.0.0/24
|
Following table shows the NAT entries corresponding to the above Static Port Forwarding entries (for TCP protocol).
"show cgn nat44 <> inside--translation" output for Static Port Forwarding |
---|
RP/0/RSP0/CPU0:VSM-Lab#show cgn nat44 nat44-1 inside-translation protocol tcp inside-vrf vrf1 inside-address 10.0.0.50 port start 25 end 8000 |
NOTE:
- Outside IP (180.0.9.0) and Ports are assigned by the NAT44 Application when user supplies Inside IP (10.0.0.50) and Ports (80, 6025).
- "Translation Type" is shown as "static" (as opposed to "dynamic")
- Outside port is same as Inside port (usually, unless it is not available)
Application Layer Gateway (ALG) is a device which has the capability of inspecting into a packet beyond layer 4 and can change Application layer content to meet certain need.
NAT44 changes IP address and Layer 4 (UDP/TCP/ICMP etc.) port. There are certain applications which embeds IP address and/or Port information in Application content. Now, the issue is while the packet traverses across a NAT44 device, layer 3 and 4 addresses get changed. However, in the Application layer, the content still contains old layer 3 and / or layer 4 addresses. This causes an issue in the Application as this is unexpected. Hence, the need of ALG functionality within a NAT device which while changing Layer 3 and 4 packet content, also changes Application content where Layer 3 and 4 addresses were embedded. With this change, end Application will be happy as it does not need to deal with 2 sets of addresses any more.
However, there are 2 ways this problem can be solved.
The main challenges in adding ALG functionality to NAT device are:
On the contrary,
NOTE: Due to the above reasons, our solution does not encourage to support ALG within NAT44 functionality.
However, few basic ALG functionality is implemented with NAT44 Application. These are:
Following table show how to configure / enable different ALGs on ISM.
Configuration of ALGs |
---|
service-type nat44 nat1
|
Redundancy is an integral part of CGN (Carrier Grade NAT). Majority of the Service Providers want Redundancy in their network to make it more resilient. It helps in minimizing the traffic outage when one device fails.
On ISM, we support 2 types of redundancy.
In this mode, one ISM card acts as Primary and another as backup. Following are the properties of 1:1 Warm Stand-by redundancy.
Following diagram explains the working of 1:1 Redundancy for NAT44.
Please note that both Primary and Backup ISM cards share same ServiceApp interfaces and NAT44 configuration (including Public IP pool).
Following tables shows how to configure 1:1 ISM redundancy.
Configuration for 1:1 Warm Standby Redundancy |
---|
! Configure role for both Primary and Backup ISMs hw-module service cgn location 0/1/cpu0 hw-module service cgn location 0/2/cpu0 ! Configure ServiceInfra interfaces on both ISMs interface ServiceInfra 1 ipv4 address 1.1.1.1/30 service-location 0/1/cpu0 interface ServiceInfra 2 ipv4 address 2.2.2.1/30 service-location 0/2/cpu0 ! Configure preferred-active and preferred-standby ISM service cgn cgn1 service-location preferred-active 0/1/cpu0 preferred-standby 0/2/cpu0 service-type nat44 nat1 inside-vrf inside1 map address-pool 151.0.1.0/24 ! Remaining configurration ... |
To check the health of the ISM card and trigger redundancy switchover, in case any failure occurs, following HA-specific tests are executed.
If these tests are enabled and any failure is detected by these, ISM card will be reloaded.
NOTE: By default, these tests run in the back-ground however, no acton is taken in case failure is detected. Using the following CLIs, these tests are enabled.
Configuration of HA Punt-Path and Data-Path tests |
---|
! To enable Punt Path Test service-cgv6-ha location 0/1/cpu0 puntpath-test ! To enable Data Path Test service-cgv6-ha location 0/1/cpu0 datapath-test |
In this case, there needs to be N Primary ISM card and 1 Backup ISM card. Value of N can be 1 as well, but typically would be 2 or 3. Following are different characteristics of this solution.
Following table shows how the ABF Next-Hop configuration would look like for N:1 (N = 3) ABF-based Redundancy.
ServiceApp interfaces | ABF Next-Hop 1 | ABF Next-Hop 2 |
---|---|---|
ServiceApp interfaces on Primary ISM 1 | ServiceApp interfaces on Primary ISM 1 | ServiceApp interfaces on Backup ISM |
ServiceApp interfaces on Primary ISM 2 | ServiceApp interfaces on Primary ISM 2 | ServiceApp interfaces on Backup ISM |
ServiceApp interfaces on Primary ISM 3 | ServiceApp interfaces on Primary ISM 3 | ServiceApp interfaces on Backup ISM |
Following diagram depicts N:1 (N = 2) configuration with 1 set of ServiceApps.
As shown in the diagram,
Following table captures the relevant ABF configuration for this sample setup.
Sample Configuration for N:1 Redundancy using ABF |
---|
! ABF rule for Inside to Outside traffic ipv4 access-list abf_2_1 10 permit ipv4 10.2.0.0/24 any nexthop1 vrf inside1 ipv4 1.1.1.2 nexthop2 vrf ibackup ipv4 1.1.5.2 20 permit ipv4 10.2.1.0/24 any nexthop1 vrf inside2 ipv4 1.1.3.2 nexthop2 vrf ibackup ipv4 1.1.5.2 30 permit ipv4 any any ! Static route for Outside to Inside traffic router static address-family ipv4 unicast 151.0.1.0/24 ServiceApp 2 151.0.2.0/24 ServiceApp 4 151.0.3.0/24 ServiceApp 6 |
In order to use NAT44 functionality on ASR9K, Licenses needs to be purchased. Depending on the number of Stateful Translations needed by the solution, required number of NAT44 specific licenses can be purchased. This fits nicely with "Pay as you grow" model as well.
Following licenses need to be purchased for NAT44 and other CGv6 applications.
License Part Number | License Description | Additional Comments |
---|---|---|
A9K-CGN-LIC-5M | Cisco ASR 9000 CGN / NAT44 License (1 per 5 million translations) | For 20 Millions translations, 4 of these licenses will be needed. |
A9K-DSLT-LIC-5M | Cisco ASR 9000 DS-Lite License (1 per 5 million translations) | Similar logic as above. Not needed for NAT44 / CGN solution. |
A9K-NAT64-LIC-5M | Cisco ASR 9000 Stateful NAT64 License (1 per 5 million translations) | Similar logic as above. Not needed for NAT44 / CGN solution. |
Details of the Licensing (how to install, etc.) can be obtained from ASR9K S/w License Operations White Paper.
In the following table, all the useful parameters are listed along with their default and valid range of values. You can consult this table to come up with the parameter value for your deployment case.
Parameter (CLI) | Defined at what level | Default Value | Range of Values | Supported from XR Release | Additional Comments |
---|---|---|---|---|---|
alg ActiveFTP | per NAT44 instance | Disabled | Enable / Disable | 4.2.0 | Active FTP ALG |
alg pptpAlg | per NAT44 instance | Disabled | Enable / Disable | 4.3.1 | PPTP ALG |
alg rtsp | per NAT44 instance | Disabled | Enable / Disable | 4.2.1 | RTSP ALG |
bulk-port-alloc size | per Inside VRF | Disabled | 16, 32, 64, 128, 256, 512, 1024, 2048, 4096 | 4.2.1 | |
dynamic-port-range start | per NAT44 instance | 1024 | 1 - 65535 | 4.2.0 | Starting port number (for Public IP address) to be used for Dynamic NAT entries. |
external-logging netflow v9 server path-mtu | per Inside VRF | 1500 bytes | 100 - 2000 | 4.2.0 | |
external-logging netflow v9 server refresh-rate | per Inside VRF | 500 packets | 1 - 600 | 4.2.0 | For sending NFv9 template |
external-logging netflow v9 server timeout | per Inside VRF | 30 seconds | 1 - 3600 | 4.2.0 | For sending NFv9 template |
external-logging syslog server path-mtu | per Inside VRF | 1500 bytes | 100 - 2000 | 4.2.1 | |
map ip many-to-one | per Inside VRF | Disabled | Enable / Disable | 4.3.2 | |
map ip one-to-one | per Inside VRF | Disabled | 1 - 65535 | 4.2.3 | |
portlimit | per NAT44 instance | 100 | 1 - 65535 | 4.2.0 | |
protocol udp session initial timeout | per NAT44 instance | 30 sec | 1 - 65535 | 4.2.0 | |
protocol udp session active timeout | per NAT44 instance | 120 sec | 1 - 65535 | 4.2.0 | |
protocol tcp session initial timeout | per NAT44 instance | 120 sec | 1 - 65535 | 4.2.0 | |
protocol tcp session active timeout | per NAT44 instance | 1800 sec | 1 - 65535 | 4.2.0 | |
protocol tcp mss | per Inside VRF | 28 - 1500 bytes | 4.2.0 |
In this section, specific deployment scenarion / use-cases and presented which can be useful for some deployment.
Following table lists some of the important / well-known applications and their working status over NAT44 (on ISM).
NOTE:
- This list is not a complete/exhaustive list of applications that would work with NAT44.
- It also does not mean that any application not listed here will not work with NAT44.
Application | Details of Application (Protocol / Port) | Working Status with NAT44 |
---|---|---|
HTTP | Typically HTTP server runs over TCP Port 80 | Works with NAT44 |
Typically uses TCP, server ports: SMTP (25, 587), POP3 (110), IMAP (143) | Works with NAT44 | |
FTP | Typically uses TCP port 20 (data) and port 21 (control) | Works with NAT44 |
Telnet | Typically uses TCP port 23 | Works with NAT44 |
SSH | Typically uses TCP port 22 | Works with NAT44 |
VNC | Typically uses TCP port 5900, 5800, 5500 | Works with NAT44 |
VPN Client (SSL) | Typically uses TCP | Works with NAT44 |
VPN Client (PPTP+GRE) | Typically uses TCP and GRE | Works with NAT44 |
VPN Client (IPSec) | Typically uses IPSec (via NAT-T) | Works with NAT44 (as NAT-T uses UDP) |
Xbox Gaming | Works with NAT44 |
It is very common to have default VRF as Outside VRF and when there are multiple Inside VRFs mapped to the same. In the following table, a sample ServiceApp and VRF configuration is shown. Please note that in this case, multiple Outside ServiceApps share share a comon Outside VRF.
Inside VRF | Inside ServiceApp | Outside VRF | Outside ServiceApp |
---|---|---|---|
ivrf1 | ServiceApp 1 | default or ovrf | ServiceApp 2 |
ivrf2 | ServiceApp 3 | default or ovrf | ServiceApp 4 |
To handle this scenario, we need to specify "outsideServiceApp" parameter configuration to indicate what is the Outside ServiceApp to be used with the mapping. Static route rule for specific Public IP address pool should guide the traffic to specific Outside ServiceApp. Only these configurations are shown below. Rest of the configuration remain the same.
Configuration for Shared / Common Outside VRF |
---|
service cgn cgn1 service-type nat44 nat1 ! 1st Inside VRF inside-vrf ivrf1 ! MAP command using outsideServiceApp map [outside-vrf ovrf] outsideServiceApp ServiceApp2 address-pool 100.0.1.0/24 ! 2nd Inside VRF inside-vrf ivrf2 ! MAP command using outsideServiceApp map [outside-vrf ovrf] outsideServiceApp ServiceApp4 address-pool 100.0.2.0/24 router static [vrf ovrf] address-family ipv4 unicast ! Divert traffic to 1st Outside ServiceApp 100.0.1.0/24 ServiceApp 2 ! Divert traffic to 2nd Outside ServiceApp 100.0.2.0/24 ServiceApp 4 |
There is an use-case where traffic selected traffic coming onto ASR9K via a Private side interface needs to go via NAT44 application, whereas remaining traffic can bypass NAT44 and should get forwarded via regular forwarding rule. This is called NAT bypass.
To implement NAT bypass, let's consider this situation:
Please note that other than NAT bypass, there could be other deployment scenario where preserving VRF (across ISM) becomes a necessity. But, the solution would be same / very similar.
The above scenario can be achieved using ISM with some additional ABF and Static Route and appropriate VRF configuration.
Let us take a look at the following diagram as a sample scenario.
In the above diagram, traffic enters and exits out of ASR9K in RED VRF. Also, please note that Inside ServiceApp is in BLUE vrf whereas Outside ServiceApp is in RED VRF.
Following table shows the specific or additional configuration that is needed for appropriate traffic diversion.
Additional Configuration to support NAT Bypass |
---|
! Define ACL to divert traffic to ServiceApp 1 (RED to BLUE VRF) ipv4 access-list cgn_abf ! Divert traffic to ServiceApp 1 in BLUE VRF 10 permit ipv4 10.10.10.0/24 any nexthop1 vrf BLUE ipv4 1.1.1.2 20 permit ipv4 any any ! Apply ABF on Ingress LC interface interface TenGigE 0/0/0/0.1 vrf RED ipv4 address 10.10.10.1/24 ! Apply Ingress ABF ipv4 access-group cgn_abf ingress ! We need a special static route to divert O2I traffic (after reverse NAT) ! to the right interface router static ! After reverse NAT, look-up is done in BLUE (Inside) VRF vrf BLUE address-family ipv4 unicast ! Divert to TenGigE 0/0/0/0.1 interface 10.10.10.0/24 vrf RED 10.10.10.2 |
Broadband Network Gateway (BNG) is the access point for subscribers, through which they connect to the broadband network. When a connection is established between BNG and Customer Premise Equipment (CPE), the subscriber can access the broadband services provided by the Network Service Provide (NSP) or Internet Service Provider (ISP).
ASR9000 supports BNG functionality.
The goal of the BNG architecture is to enable the BNG router to interact with peripheral devices (like CPE) and servers (like AAA and DHCP), in order to provide broadband connectivity to subscribers and manage subscriber sessions.
Each subscriber (or more specifically, an application running on the CPE) connects to the network by a logical session. Based on the protocol used, subscriber sessions are classified into two types:
For details on BNG, please refer to BNG Deployment Guide on ASR9K.
On the other hand CGN (NAT44) functionality is also supported on ASR9K. Hence, BNG and CGN (NAT44) functionality can interwork to provide NAT'ed (public) IP address to the subscriber traffic (both PPPoE and IPoE).
The basic BNG + CGN (NAT44) architecture is shown in the following figure.
As shown in the above diagram, subscriber traffic reaches ASR9K router via Bundle Ether interface (in different VLANs), which is in VRF ivrf. It does not necessarily need to arrive in a VRF though. Please note that session establishment happens without the involvement of NAT44. NAT44 comes into picture when Subscriber data traffic reaches ASR9K.
After the BNG functionality (like, PPPoE or IPoE termination/de-capsulation) is performed on the Subscriber data traffic (on LC), internal IP packet (containing Private IP address as Source) is sent to ISM card where NAT44 functionality kicks in which converts the Private IP address into Public IP address. Similarly, on the reverse (O2I) path, after ISM performs NAT44 functionality (changes destination IP address to Private), paket is sent to LC where BNG functionality (like, PPPoE or IPoE encapsulation) is peformed before sending the packet to the Subscriber.
Following table shows sample snippet of BNG and CGN (NAT44) configuration (for IPoE subscriber) to achive the same. For PPPoE subscriber, corresponding BNG configuration needs to be used instead.
Please refer to ASR9000 Broadband Network Gateway Configuration Guide for detailed and release-specific BNG configuration.
Sample BNG and CGN (NAT44) Configuration for BNG+CGN Interworking |
---|
! ============================================= ! --- BNG Configuration for IPoE Subscriber --- ! ============================================= ! DHCP Configuration dhcp ipv4 profile proxyProfile proxy helper-address vrf default 13.0.0.2 giaddr 13.0.0.1 ! interface Bundle-Ether1.2 proxy profile proxyProfile ! Dynamic Template Configuration dynamic-template type ipsubscriber dhcp vrf ivrf ipv4 unnumbered Loopback1 ! Policy-Map and Class-map configuration policy-map type control subscriber pol1 event session-start match-all class type control subscriber cls1 do-all 1 activate dynamic-template dhcp 2 authorize aaa list default identifier source-address-mac password cisco end-policy-map class-map type control subscriber match-all cls1 match protocol dhcpv4 end-class-map ! Interface (Bundle-Ether and Loopback) Configuration interface Bundle-Ether1.2 vrf ivrf ipv4 point-to-point ipv4 unnumbered Loopback1 proxy-arp service-policy type control subscriber pol1 encapsulation dot1q 10 ipsubscriber ipv4 l2-connected initiator dhcp interface Loopback1 vrf ivrf ipv4 address 10.0.0.1 255.255.0.0 ! ========================== ! CGN (NAT44) Configuration ! ========================== hw-module service cgn location 0/5/CPU0 ! Interface (ServiceInfra and ServiceApp) Configuration interface ServiceApp1 vrf ivrf ipv4 address 1.1.1.1 255.255.255.0 service cgn cgn1 service-type nat44 ! interface ServiceApp2 ipv4 address 2.2.2.2 255.255.255.0 service cgn cgn1 service-type nat44 ! interface ServiceInfra1 ipv4 address 200.1.1.1 255.255.255.0 service-location 0/5/CPU0 ! Service CGN Configuration service cgn cgn1 service-location preferred-active 0/5/CPU0 service-type nat44 nat1 inside-vrf ivrf map address-pool 100.2.0.0/16 ! Static Route Configuration router static address-family ipv4 unicast 100.2.0.0/16 ServiceApp2 ! vrf ivrf address-family ipv4 unicast 0.0.0.0/0 ServiceApp1 |
An Multiprotocol Label Switching (MPLS) Layer 3 Virtual Private Network (L3VPN) consists of a set of sites that are interconnected by means of an MPLS provider core network. At each customer site, one or more customer edge (CE) routers attach to one or more provider edge (PE) routers.
MPLS VPNs are easier to manage and expand than conventional VPNs. When a new site is added to an MPLS VPN, only the edge router of the service provider that provides services to the customer site needs to be updated. The components of the MPLS VPN are described as follows:
Details on L3VPN can be obtained from ASR9K MPLS Layer 3 VPN Configuration Guide.
Service providers and enterprises that have network application services they want to offer or share with customers and partners will want to minimize any connectivity burden placed on the user of the service. It is desirable, even mandatory, to extend the offering to as many potential users as needed to achieve the desired goals or return.
By deploying NAT within the common MPLS VPN infrastructure, communications service providers can relieve some of the connectivity burden on customers and accelerate their ability to link more shared application services to more consumers of those services
There are two options for NAT deployment within the MPLS provider edge:
Following diagram shows Distrbuted NAT scenario with Ingress NAT PEs.
With this design, scalability is maintained to a large extent while performance is optimized by distributing the NAT function over many edge devices. Each NAT PE handles traffic for sites locally connected to that PE. NAT rules and access control lists or route maps control which packets require translation.
In the above case, at ingress PE router, customer private IP addresses are NAT'ed to public IP address by ISM card and then MPLS labels are added by it before the packet goes out of ASR9K. On the return path, MPLS label(s) are removed by MPLS-facing LC and IT packets are sent to ISM. ISM performs reverse NAT and sends the packet to LC which then sends it back to CE router.
Following diagram shows Distrbuted NAT scenario with Ingress NAT PEs.
With this design, scalability is reduced to some degree since the central PE must maintain routes for all customer networks that access the shared service. The application performance requirements must also be considered so that the traffic does not overburden the router that must translate the IP addresses of the packets. Because NAT occurs centrally for all customers using this path, IP address pools can be shared; thus, the total number of subnets required is reduced.
In the above case, in the egress PE router, first MPLS labels are removed by ingress LC and the IP packet is sent to ISM card. Customer private IP addresses are NAT'ed to public IP address by ISM card and the packets are forwarded to shared service network. In the reverse path, ISM translates Public destination IP to private IP addresses and then adds MPLS labels before sending it to egress LC. Egress LC swaps one label and sends the packet out of ASR9K towards MPLS network.
NOTE: MPLS labels should be removed by LC before sending the packet to ISM as IP packet. However, ISM can add the required MPLS labels before sending the packet to egress LC.
For sample MPLS VPN configuration, please refer to "Configuration Example: MPLS VPN on XR" document.
Host behind a NAT device (on Private side) communicating with another host behind the same NAT device (on Private side) is called "NAT Hairpinning". Let us consider the following deployment use-case.
We have a server behind a NAT device which has a Public IP as well, created using Static Port Forwarding configuration. Now, this server can be accessed from hosts on public side of NAT device as well as Private side of the NAT device. When a host on Private side of the NAT device tries to communicate with the Server, it uses NAT Hairpinning. Following diagram depicts how NAT hairpinning works with NAT44 on ISM.
In this case, we first add a Static Port Forwarding entry for a service offered by the Server at 10.100.1.2:2055. Let's say, the Public IP pool configured is 200.2.0.0/24. NAT44 application allocates Public IP and port as 200.2.0.210:2055 (Please note that the port is preserved here). This Public IP and port is published / made available to the hosts. Let's the packet flow now when a host with Private IP 10.10.10.2 tries to access the service.
Response from the Server will take the reverse path and it will use Dynamic NAT rule in first reverse NAT and then Static NAT rule in second NAT processing, to reach the host.
In this case, Static Port Forwarding configuration is used for Server as an use-case. But, it can be another host as well for which there is no Static Port Forwarding configuration. Only important thing is sender needs to know the Public IP and port of the receiver.
Please note that there is no specific NAT44 configuration is needed for this. Regular / basic NAT44 configuration will work here. Hence, no configuration is provided here.
ISM will provide optimal performance when I2O and O2I traffic is symmetric in nature i.e., equally balanced. However, it may not be always true. Many times, O2I traffic (download from internet) is much higher than I2O (upload to internet) traffic. To obtain optimal / maximum performance, you can divide traffic in each logical partition into 2 sub-groups (which means Public IP address pool as well needs to divided), with another pair of ServiceApps and switching the order of direction (Inside / Outside) of ServiceApps. Following table tries to summarize it with 2 pairs of ServiceApps.
Logical Group 1 | Logical Group 2 | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Please note that ServiceApp 5 and ServiceApp 7 are configured as Outside ServiceApp, instead of Inside ServiceApp. Similarly, ServiceApp 6 and ServiceApp 8 are configured as Inside ServiceApp, instead of Outside ServiceApp.
You will get a better performance provided you can distribute your traffic in nearly equal subscriber groups.
Following table captures sample configuration for the same.
Configuration for Handling Asymmetric I2O and O2I traffic for better performance |
---|
! Inside ServiceApp configuration interface ServiceApp 1 vrf ivrf1 ipv4 address 1.1.1.1/30 interface ServiceApp 3 vrf ivrf2 ipv4 address 1.1.3.1/30 interface ServiceApp 6 vrf ivrf3 ipv4 address 1.1.6.1/30 interface ServiceApp 8 vrf ivrf4 ipv4 address 1.1.8.1/30 ! Outside ServiceApp configuration interface ServiceApp 2 ipv4 address 1.1.2.1/30 interface ServiceApp 4 ipv4 address 1.1.4.1/30 interafce ServiceApp 5 ipv4 address 1.1.5.1/30 interface ServiceApp 7 ipv4 address 1.1.7.1/30 ! ABF Configuration to divert traffic to all Inside ServiceApp interfaces ipv4 access-list cgn_abf ! For traffic to ServiceApp 1 10 permit 10.0.1.0/24 any nexthop1 vrf ivrf1 1.1.1.2 ! For traffic to ServiceApp 3 30 permit 10.0.2.0/24 any nexthop1 vrf ivrf2 1.1.3.2 ! For traffic to ServiceApp 6 60 permit 10.0.3.0/24 any nexthop1 vrf ivrf3 1.1.6.2 ! For traffic to ServiceApp 8 80 permit 10.0.4.0/24 any nexthop1 vrf ivrf4 1.1.8.2 100 permit any any ! Service CGN Configuration service cgn cgn1 service-type nat44 nat1 ! Address Pool for ServiceApp 1 and 2 pair inside-vrf ivrf1 map outsideServiceApp 2 address-pool 100.0.1.0/24 ! Address Pool for ServiceApp 3 and 4 pair inside-vrf ivrf2 map outsideServiceApp 4 address-pool 100.0.2.0/24 ! Address Pool for ServiceApp 6 and 5 pair inside-vrf ivrf3 map outsideServiceApp 5 address-pool 100.0.3.0/24 ! Address Pool for ServiceApp 8 and 7 pair inside-vrf ivrf4 map outsideServiceApp 7 address-pool 100.0.4.0/24 |
Once NAT44 on ISM is configured, we need different ways (mainly, via "show" CLIs) to validate those. In this section, important NAT44 related CLIs are listed and also explained how those can be used for validation.
As a first step, different "show run" output should be verified to ensure that configuration commands are rightly applied. Following commands can be used.
'show run' commands | Usage of it |
---|---|
show running-configuration or show run | - Displays all the configuration on ASR9K. - If you have less configuration, this is better way to get all NAT44 configuration at one shot. - Otherwise (if you have lot of configuration, this may not be the best way to get all NAT44 configuration |
show run service cgn * | - Displays only CGN related information |
show run interface service* | - Displays all ServiceInfra and ServiceApp interface configuration - Also includes Service-Mgmt and Service-Engine interface configuration (which can be ignored) |
show run router static | - Displays all static route information. |
This is a very important CLI related to NAT44. A sample output of the CLI is shown below.
Sample "show cgn nat44 <> statistics" CLI Output |
---|
RP/0/RSP0/CPU0:nat-tasix#Show cgn nat44 nat statistics Fri Aug 16 23:34:40.018 TSK Statistics summary of NAT44 instance: 'nat'Number of active translations: 91407 Number of sessions: 39716 Translations create rate: 542Translations delete rate: 1206 Inside to outside forward rate: 147827 Outside to inside forward rate: 204847Inside to outside drops port limit exceeded: 10077470 Inside to outside drops system limit reached: 0Inside to outside drops resource depletion: 0 No translation entry drops: 194533431PPTP active tunnels: 3 PPTP active channels: 2PPTP ctrl message drops: 1246 Number of subscribers: 0Drops due to session db limit exceeded: 0 Pool address totally free: 498Pool address used: 1550 Pool address usage: ------------------------------------------------- External Address Ports Used------------------------------------------------- 213.230.92.0 79 213.230.92.4 176 213.230.92.8 59 213.230.92.12 36 213.230.92.16 79 213.230.92.20 52 213.230.92.24 65 ... 213.230.103.239 2 213.230.103.247 1 213.230.103.255 1------------------------------------------------- |
Following table explains the impotant fields from the above CLI and how it can be used for validation.
Please note that the values displayed by the CLI is valid at that instant for that particular ISM card. It may change at a later point of time.
Field Name | Description | Additional Comments for Validation |
---|---|---|
Number of active translations | Number of NAT DB (Static + Dynamic) Entries | Monitoring this over a period of time will provide the NAT44 translation scale used in the ISM card. |
Number of sessions | Number of Session DB (Static + Dynamic) Entries | Monitoring this over a period of time will provide the NAT44 session scale used in the ISM card. |
Translations create rate | Number of NAT44 translations created in last 1 second | Monitoring this over a period of time will provide the NAT44 session setup rate on the ISM card. |
Translations delete rate | Number of NAT44 translations deleted in last 1 second | Monitoring this over a period of time will provide the NAT44 session teardown rate on the ISM card. |
Inside to outside forward rate | Number of packets gone through NAT44 translation in I2O direction in last 1 second | Monitoring this over a period of time will provide the NAT44 packet processing rate on ISM card (PPS) in I2O direction |
Outside to inside forward rate | Number of packets gone through NAT44 translation in O2I direction in last 1 second | Monitoring this over a period of time will provide the NAT44 packet processing rate on ISM card (PPS) in O2I direction |
Inside to outside drops port limit exceeded | Number of I2O packets dropped because no NAT entries cannot be created for the specific users which has reached port limit. | If you have configured port limit value too less, you may hit this errors very often. You may need to consider to increase the port limit configuration in that case. |
Inside to outside drops system limit reached | Number of I2O packets dropped because NAT DB or User DB is full. | In case you are hitting this very often, you may need to check if you're hitting the scale limit and if so, you may need to go for another ISM card. |
Inside to outside drops resource depletion | Number of I2O packets dropped because Layer 4 port could not be allocated. | |
No translation entry drops | Number of O2I packets dropped because there was no NAT entry existing. | |
Number of subscribers | Number of NAT Users | |
Drops due to session db limit exceeded | Number of I2O packets dropped because Session DB is full. |
This command is helpful in seeing the list of all Outside / Public IP address + Port mapping for a specific Inside / Private IP address (and a Port range).
Following is a sample output of the command.
Sample "show cgn nat44 <> inside-translation" CLI Output |
---|
RP/0/RSP0/CPU0:McKinely#show cgn nat44 nat1 inside-translation protocol udp inside-vrf red inside-address 10.2.5.134 port start 1 end 4580 Wed May 15 14:25:09.713 UTC Inside-translation details --------------------------- NAT44 instance : nat1 Inside-VRF : red -------------------------------------------------------------------------------------------- Outside Protocol Inside Outside Translation Inside Outside Address Source Source Type to to Port Port Outside Inside Packets Packets -------------------------------------------------------------------------------------------- 100.200.2.75 udp 4500 65024 dynamic 9236 2213 100.200.2.75 udp 4501 65153 dynamic 2236 0 100.200.2.75 udp 4502 65152 dynamic 4232 1218 100.200.2.75 udp 4503 65155 dynamic 2236 7128 100.200.2.75 udp 4504 65154 dynamic 2235 1821 100.200.2.75 udp 4505 65157 dynamic 5236 3129 100.200.2.75 udp 4506 65156 dynamic 2238 8172 100.200.2.75 udp 4507 65159 dynamic 7238 2189 100.200.2.75 udp 4508 65158 dynamic 2236 3119 ... 100.200.2.75 udp 4576 65226 dynamic 1239 2178 100.200.2.75 udp 4577 65229 dynamic 8235 4171 100.200.2.75 udp 4578 65228 dynamic 2235 0 100.200.2.75 udp 4579 65231 dynamic 4230 4127 100.200.2.75 udp 4580 65230 dynamic 2235 0 RP/0/RSP0/CPU0:# |
Above table shows all Outside IP (100.200.2.75) and Port combination for Inside IP (10.2.5.134) and Port Range (1 through 4580).
NOTE:
- As one Inside address can only map to one Outside address, there are not multiple Outside addresses in 1st column.
- The number of entries in this table should not exceed Port Limit value.
This command is helpful in seeing the list of all Inside / Private IP address + Port mapping for a specific Outside / Public IP address (and a Port range).
Following is a sample output of the command.
Sample "show cgn nat44 <> outside-translation" CLI Output |
---|
RP/0/RSP0/CPU0:McKinely#show cgn nat44 nat1 outside-translation protocol udp outside-address 100.200.2.75 port start 1 end 65535 Wed May 15 14:17:44.640 UTC Outside-translation details --------------------------- NAT44 instance : nat1 Outside-VRF : default -------------------------------------------------------------------------------------------- Inside Protocol Outside Inside Translation Inside Outside Address Destination Destination Type to to Port Port Outside Inside Packets Packets -------------------------------------------------------------------------------------------- 10.2.5.134 udp 65024 4500 dynamic 4236 1216 10.2.5.134 udp 65025 4885 dynamic 9233 5161 10.2.5.134 udp 65026 4886 dynamic 4244 3491 10.2.5.134 udp 65027 4887 dynamic 1281 6018 10.2.5.134 udp 65028 4888 dynamic 2237 4187 ... 10.2.5.142 udp 65532 4882 dynamic 6261 3178 10.2.5.142 udp 65533 4881 dynamic 7282 0 10.2.5.142 udp 65534 4884 dynamic 1211 4178 10.2.5.143 udp 65535 4883 dynamic 1261 5189 RP/0/RSP0/CPU0:# |
Above table shows all Inside IPs (10.2.5.134, 10.2.5.142) and Port combination for Inside IP (100.200.2.75) and Port Range (1 through 65535). In this case, there are multiple Inside IP addresses are mapped to one Public IP address.
This CLI is used to see the current state of CGN Service redundancy - which ISM is active and which is Standby, as shown by the sample output below.
Same "show services redundancy" CLI Output |
---|
RP/0/RSP0/CPU0:ios#sh services redundancy Wed May 2 07:35:26.070 UTC Service type Name Pref. Active Pref. Standby -------------------------------------------------------------------------------- ServiceInfra ServiceInfra1 0/2/CPU0 Active ServiceInfra ServiceInfra2 0/0/CPU0 Active ServiceCgn cgn1 0/2/CPU0 Standby 0/0/CPU0 Active |
As shown above, Preferred Active ISM card at slot 2 is now in Standby mode whereas, Preferred Standby ISM card at slot 0 is now in Active mode. It indicates, there was atleast one failure happened on ISM card at slot 2.
- 0 -
Hi somnathr,
Is it possible to use this ISM helth check in conjuction with EEM?
What is your recomendation for redundancy in the scenario shown in the topology below where I have two ISM but in different locations. Is it better to use active/active or active/standby?
To check the health of the ISM card and trigger redundancy switchover, in case any failure occurs, following HA-specific tests are executed.
Thanks in advance !
Renato Reis
Hi Renato,
None of the two mechanism is intrinsically better. Which one to chose depends on the user requirements.
If you have a pair of CGN routers in a PoP and you want to use the same public IP address pool, Warm Stand-by Redundancy would be a suitable choice.
If you have a pair of CGN routers in a PoP and want load balance traffic across them, you would have to go for the N:1 redundancy using ABF (combined with next-hop tracking via IPSLA).
If you have more than two CGN routers in a PoP, N:1 redundancy using ABF (combined with next-hop tracking via IPSLA) would be a better choice.
Hope this helps,
Aleksandar
Hi Aleksandar, thanks for your answer.
We actually have a pair of CGN routers but they are in different locations, so I think none of the options you mentioned would address my need. So is it possible to deploy EEM + ISM helth check to detect an aplicattion issue?
Thanks,
Renato Reis
Hi Renato,
yes, you can combine the two using EEM/Tcl.
Say router B uses 10.3.3.3 as nexthop1 in ABF. IPv4 address 10.3.3.3 is owned by Loopback3 on router A and advertised through IGP towards router B. In this scenario you could use the punt/data-path failure as a trigger to invoke an EEM/Tcl script which shuts down Loopback3 interface. 10.3.3.3 won't be reachable any more from router B, so it will start using nexthop2 from ABF.
There is a good article about ABF and tracking objects (in case you don't want to have 10.3.3.3 advertised via IGP) at:
https://supportforums.cisco.com/discussion/11727191/ios-xr-abf-behavior
If you want to deploy such a solution, I'll check which syslog message would be the best trigger for the EEM/Tcl script.
EEM/Tcl in XR is well documented on cisco.com and supportforums.
Regards,
Aleksandar
Hi Aleks, Renato,
First, a quick precision: we don't support warn-standby between CGN routers but between two CGN cards in the same router.
Second, we strongly advise using two different NAT pools, one in each CGN router (for each location). It's certainly possible to use ABF and IPSLA tracking and EEM but past experience (unless I've been particularly unlucky) proved this approach to be prone to false positives and potentially damaging.
Unless you really can not do otherwise, my advise will be: keep it simple. Anycast routing for your two exit point / translation point to attract i2o traffic and one dedicated map pool range for each router to guarantee a clear path for your o2i traffic.
My 2 euro cents,
Cheers,
Nicolas.
Hi Aleksandar,
Thank you so much for your time ! I would be glad if you could provide me the syslog messages.
Thank you again.
Hi Nicolas,
Thank you for your information. I was looking for something to make it more resilient, I guess I will test both solutions and see each one is the best.
Regards,
Renato Reis
Hi Renato,
the syslog message for the datapath failure contains this string:
HB:Triggering recovery
I would, however, warmly recommend to follow Nicholas's recommendation. Simple solutions are always the best.
Regards,
Aleksandar
Thank you guys !
Regards !
Hello,
I see that 5.1.3 is out on cisco.com, but I do not see 5.1.3 for ISM module, only 5.1.2.
Until now there was always for every IOS-XR version also an ISM software with same numbering.
e.g. IOS-XR 4.3.4 and ISM 4.3.4
Question: Can I upgrade to 5.1.3 and leave ISM on 5.1.2?
Hi Smail,
thanks for bringing this to attention. I'll check why the ISM install kit for 5.1.3 wasn't posted and get back to you. I wouldn't recommend deploying 5.1.3 XR with 5.1.2 ISM image.
Regards,
Aleksandar
Hi Aleksandar,
I could not postpone the MW and I did the upgrade. CGN is working fine, but I am not sure
about fpga2 which was not upgraded in the process.
0.1 Maintenance LC6 lc fpga2 0 0.01 Yes
Probably a new version is needed for firmware upgrade.
Hi Smail,
5.1.3 ISM and VSM images will be posted later today.
Was the FPD on all other entities upgraded with success?
Regards,
Aleksandar
Hi,
upgrade was not necessary, according to the log.
This is the message I got after entered the activate command. First time that I have saw it and I already did a dozon of upgrades.
FPD upgrade in progress on some hardware, reload/configuration change
on those is not recommended as it might cause HW programming failure
and result in RMA of the hardware.
Info: FPD Upgrade: No fpd on location 0/RSP0/CPU0 need upgrade at this time.
Info: FPD Upgrade: No fpd on location 0/RSP1/CPU0 need upgrade at this time.
Warning: FPD Upgrade: Failed to parse FPD desc file
Warning: FPD Upgrade: Failed to parse FPD desc file
Info: FPD Upgrade: No fpd on location 0/0/CPU0 need upgrade at this time.
Info: FPD Upgrade: No fpd on location 0/1/CPU0 need upgrade at this time.
Info: FPD Upgrade: No fpd on location 0/2/CPU0 need upgrade at this time.
0/0/CPU0 is ISM
0/1/CPU0 and 0/2/CPU0 are A9K-MOD80-SE with one A9K-MPA-2X10GE in each.
Update:
ISM Install kit for 5.1.3 is now running on our ISM module.
Install process did not want to start until fpga2 (Maintenance LC6) was not upgraded.
I have not got any message from the ASR, but I assumed that this was mandatory.
Hi, All:
I was wondering if someone could offer advice to the following problem. I have a very similar setup to the one described here (with VSM 5.1.2) where I use ABF to divert traffic into the inside serviceapp3 interface. there are differences though:
- ABF is configured on an interface in an NV Sat.
- The nv sat interface is on the default VRF with ABF pointing to NH within inside-vrf.
- static route pointing to ServiceApp33 (vrf default)
- static route in inside-vrf pointing to NH on vrf default
My problem is that everything points to traffic going into the VSM, NAT translation being generated and I actually see I2O packets, but no return whatsoever.
RP/0/RSP0/CPU0:XXXXXX#show cgn nat44 NAT44-3 inside-translation protocol icmp inside-vrf INSIDE inside-address 192.168.136.129$
Wed Jan 28 10:14:35.544 CST
Inside-translation details
---------------------------
NAT44 instance : NAT44-3
Inside-VRF : INSIDE
--------------------------------------------------------------------------------------------
Outside Protocol Inside Outside Translation Inside Outside
Address Source Source Type to to
Port Port Outside Inside
Packets Packets
--------------------------------------------------------------------------------------------
200.x.y.1 icmp 71 61327 dynamic 5 0
RP/0/RSP0/CPU0:XXXXXX#show run router static
Wed Jan 28 10:14:49.528 CST
router static
address-family ipv4 unicast
200.x.y.0/24 ServiceApp33
!
vrf INSIDE
address-family ipv4 unicast
192.168.136.128/25 vrf default GigabitEthernet100/0/0/0 192.168.136.2
!
At least the inside portion looks fine. On the outside serviceapp I see output packets, but no input packets. As you can see, I have the return static route pointing to Sapp33, but no luck.
Any advice?
Thanks,
c.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: