A10 5.2.1-P3 Trsol
A10 5.2.1-P3 Trsol
1-P3
IPv4-to-IPv6 Transition Solutions
Guide
September, 2021
© 2021 A10 Networks, IncCONFIDENTIAL AND PROPRIETARY- ALL RIGHTS RESERVED.
Information in this document is subject to change without notice.
PATENT PROTECTION
A10 Networks, Inc products are protected by patents in the U.S. and elsewhere. The following website is provided
to satisfy the virtual patent marking provisions of various jurisdictions including the virtual patent marking pro-
visions of the America Invents Act. A10 Networks, Inc products, including all Thunder Series products, are pro-
tected by one or more of U.S. patents and patents pending listed at:
a10-virtual-patent-marking.
TRADEMARKS
A10 Networks, Inc trademarks are listed at: a10-trademarks
CONFIDENTIALITY
This document contains confidential materials proprietary to A10 Networks, Inc. This document and information
and ideas herein may not be disclosed, copied, reproduced or distributed to anyone outside A10 Networks, Inc
without prior written consent of A10 Networks, Inc.
DISCLAIMER
This document does not create any express or implied warranty about A10 Networks, Inc or about its products or
services, including but not limited to fitness for a particular use and non-infringement. A10 Networks, Inc has
made reasonable efforts to verify that the information contained herein is accurate, but A10 Networks, Inc
assumes no responsibility for its use. All information is provided "as-is." The product specifications and features
described in this publication are based on the latest information available; however, specifications are subject to
change without notice, and certain features may not be available upon initial product release. Contact A10 Net-
works, Inc for current information regarding its products or services. A10 Networks, Inc products and services are
subject to A10 Networks, Inc standard terms and conditions.
ENVIRONMENTAL CONSIDERATIONS
Some electronic components may possibly contain dangerous substances. For information on specific com-
ponent types, please contact the manufacturer of that component. Always consult local authorities for regulations
regarding proper disposal of electronic components in your area.
FURTHER INFORMATION
For additional information about A10 products, terms and conditions of delivery, and pricing, contact your nearest
A10 Networks, Inc location, which can be found by visiting www.a10networks.com.
Table of Contents
Chapter 1: Large Scale Network Address Translation 19
Overview 20
Comparing LSN and Traditional NAT 23
Sticky NAT 25
Destination Based NAT IP Address 26
Full-Cone NAT 26
Hairpinning 27
Hairpinning Filtering 28
Hairpinning Support for Chassis 30
User Quotas 31
Static Port Reservation 35
Exclude Ports from LSN NAT Pools 36
Configuring Exclude Ports Using CLI 36
Configuring Exclude Ports Using GUI 37
LSN Traffic Inbound Refresh 37
Configuring Inbound Refresh Using CLI 38
Configuring Inbound Refresh Using GUI 38
NAT Data Session Aging 39
NAT Mapping Removal and Full-Cone Behavior 39
One-to-One NAT Based on the Destination IP 40
Radius Support 42
NAT Profile Assignment Based on RADIUS Attribute 42
Custom RADIUS Attributes 44
Default LSN LID Selection 45
Configuring Platform-based LSN RADIUS Table Size 46
Configuring RADIUS Accounting-On Requests 47
Ping Replies from NAT Pool Addresses 48
Application Level Gateway 48
SIP ALG 49
IPsec ESP 50
Source NAT for ICMP Error Messages 50
3
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
4
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
5
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
6
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
7
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
8
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
9
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
10
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
11
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
12
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
13
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Enabling MAC-based Nexthop Routing for Fixed-NAT Using the CLI 322
Configuring L3V Inter-partition Routing for Fixed-NAT 323
Configuring Fixed-NAT in a L3V Deployment Using CLI 323
Enhanced Fixed-NAT Table Accessibility 325
Configuring Exported Fixed-NAT Table Information 326
SNMP for Fixed-NAT Table Information 327
Exporting Fixed-NAT Table Information Using aXAPI 328
Displaying Fixed-NAT Information 331
Displaying Fixed-NAT Port Mappings 331
Displaying Current Port and Session Use for a Fixed-NAT Client 331
Displaying the Full-cone Sessions for a Fixed-NAT NAT Address 332
Displaying Fixed-NAT Statistics 332
Removing Fixed-NAT Configuration 332
Disabling a Fixed-NAT Configuration 333
Deleting a Fixed-NAT Configuration 334
Reconfiguring a Fixed-NAT Configuration and Reusing NAT IP Address 336
14
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
15
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
16
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
17
Contents
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
18
Chapter 1: Large Scale Network Address
Translation
This chapter describes how Large Scale Network Address Translation (LSN) works and how to
configure it.
Overview 20
Sticky NAT 25
Full-Cone NAT 26
Hairpinning 27
User Quotas 31
Radius Support 42
Optional Configurations 61
19
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Overview
LSN provides robust NAT support for network carriers, also known as Internet Service Pro-
viders. Carriers can use LSN to provide NAT service for multiple enterprises and residential cli-
ents. FIGURE 1-1 illustrates an example of a carrier that uses LSN to provide NAT to
residential clients.
The carrier’s clients are on an internal subnet, 192.168.1.x/24, in the carrier’s network. When a
client sends a request, ACOS creates a mapping of the client’s internal address and protocol
port to a public address and protocol port. In this example, LSN creates the following map-
ping:
20
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
After LSN creates an IP address mapping for a client, it uses the same mapping for all traffic
between the client and an external IP address by default. In this example, the client
192.160.1.1:1000 assigns the same NAT IP and port to the following destinations:
However, the default sticky NAT behavior can be overridden using the LSN rule-list con-
figuration. An LSN rule-list lets you allocate a NAT pool for the configured destination IP
address. If a destination IP address is configured in the LSN rule-list, then the NAT IP is
assigned from the NAT pool allocated in the rule-list.
In this example, the client 192.160.1.1:1000 opens multiple sessions. Assume that the des-
tination IP 203.0.220.1:80 is configured in the LSN rule-list. LSN assigns the NAT IP
203.0.116.1:10000 from the NAT pool allocated in the rule-list. In such a scenario, LSN would
create the following mapping (see FIGURE 1-4):
21
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
22
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
For information about Port Control Protocol (PCP), see Port Control Protocol for LSN. For
information about logging, see the Traffic Logging Guide for IPv6 Migration.
Traditional NAT works for client-to-server applications, where a client opens a connection to
a server and requests data, and the server responds back to the client. However, traditional
NAT is often inadequate for contemporary applications such as peer-to-peer (P2P) file-shar-
ing, instant messengers (IM), and Voice-over-IP (VoIP).
FIGURE 1-5 shows an example of P2P file sharing among LSN clients and other devices.
23
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
In this example, multiple clients are registered with a P2P file-sharing tracker as sharers of
the example.torrent file. All clients are registered on the file-sharing tracker by their public
IP addresses. LSN allows each of the internal clients to use the same public IP address, with
different Layer 4 source port numbers. LSN also allows the clients in the internal subnet to
share the file between clients and with other clients that are outside the internal network.
NOTE: When possible, LSN uses the internal client’s source protocol port
number in the external mapping for the client. However, if the
protocol port is already used by another client on the same
external IP address, LSN selects another protocol port for the new
mapping.
24
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Sticky NAT
Sticky NAT enables a client to use the same NAT IP address in a NAT pool for all destinations,
and that is the default behavior. When all user sessions are cleared, then a different NAT IP
may be assigned.
For example, the client 192.168.1.1:10000 opens multiple HTTP sessions to connect to the fol-
lowing servers:
l 203.0.210.0
l 203.0.220.0
l 203.0.230.0
When the client 192.168.1.1 sends a request, ACOS creates a mapping of the client’s internal
address and protocol port to a public address and protocol port. After LSN establishes an IP
address mapping for a client, it uses the same mapping for all traffic between the client and
the destination IP addresses.
Some applications that open multiple sessions to the same or multiple servers often work bet-
ter with sticky NAT.
LSN can override the sticky NAT behavior by using the LSN rule-list. For more information,
refer to Destination Based NAT IP Address.
25
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
By allocating NAT pool based on the destination IP addresses, ACOS provides more efficient,
scalable, and flexible NAT pool management.
When a client IP is associated with more than one NAT IP addresses, multiple user-quota ses-
sions are created. Each session can be associated with different NAT IP addresses.
For performing source NAT using an allocated pool for a destination IP address, refer to Con-
figuring the Rule-list.
Full-Cone NAT
To overcome the shortcomings of traditional NAT, LSN implements full-cone NAT, also known
as one-to-one NAT, has the following behaviors:
l If a client is mapped to multiple NAT IPs due to LSN rule-list configuration, then
For pings, the ICMP query identifier is treated the same way as a UDP or TCP port:
o Internal-IP-and-L4-Port = External-IP-and-L4-Port for all destinations
o Internal-IP-and-ICMP-query-ID = External-IP-and-ICMP-query-ID for all des-
tinations
26
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
l Endpoint-Independent Filtering (EIF) – For traffic from any source to a mapped client,
LSN always allows the traffic to be forwarded to the internal client regardless of the
endpoint. For an example of this behavior, see FIGURE 1-5.
These techniques provide consistent NAT mapping behavior, which enables client-to-client
applications such as P2P, client-to-server applications, and NAT traversal techniques such as
STUN, to work correctly.
l EIF is different from security filtering that is provided by ACLs, black/white lists, and
so on.
With EIF, LSN does not cause an internal client to be unreachable by certain sources
and by using different mappings that are based on destination. The ACOS device’s
security features can still be used to control access to clients.
l EIM must be enabled in order to enable EIF.
Hairpinning
Hairpinning allows inside clients to communicate by using the clients’ outside addresses and
is useful for applications that require global addresses.
27
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
LSN filters traffic to prevent self hairpinning, which occurs when the traffic that is initiated
by an inside client is routed back to itself.
Hairpinning Filtering
l Self-IP—Self-IP hairpin filtering drops hairpin traffic from a client to its own NAT
address, regardless of the source protocol port. For example, inside client
10.10.10.10:10000 is mapped to public address 203.0.113.1:10000. The traffic that client
10.10.10.10 sends to destination address 203.0.113.1:10000 is dropped.
The traffic is dropped even if the source protocol port is different from the port number used
in the client’s mapping. For example, traffic from 10.10.10.10.8000 and from 10.10.10.10:10000
is dropped.
28
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
NOTE: When enabled, self-IP hairpin filtering applies to both TCP and
UDP traffic.
o The source IP address and protocol port are the address and port that are used in
the client’s NAT mapping.
The option is useful where double NAT is used, because more than one client might
be behind a single NAT IP address. For example, clients 10.10.10.x:3000 and
10.10.10.x:4000 are both behind 192.168.1.1:10 and 192.168.1.1:20, respectively. From
LSN’s perspective, 192.168.1.1 is one inside client. LSN creates a single mapping for
the first traffic from 192.168.1.1, and uses that mapping for subsequent traffic from
any client behind 192.168.1.1. If the first traffic comes from 192.168.1.1:3000, LSN
creates a mapping to 203.0.113.1:3000. Subsequent traffic from 192.168.1.1:3000 or
192.168.1.1:4000 uses mapping 203.0.113.1:3000.
l None—This option is the default option and filters differently depending on the traffic
type:
o UDP traffic – When this hairpin filtering option is enabled, UDP hairpin traffic is not
dropped, even if the UDP traffic addressed to a client’s public IP address is from
the client’s own private IP address. The traffic is allowed even if the source UDP
29
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
port is the same as the source UDP port used in the mapping for the client.
NOTE: When enabled, this hairpin filtering option does not filter UDP
hairpin traffic. This option still uses self-IP-port filtering for TCP
hairpin traffic.
This section describes the steps required to configure hairpinning support for A10 Thunder™
Series with dual-processing modules.
Prerequisites:
l Configure a route for the NAT IP address network pointing to the Nexthop Router, and
l Configure the Nexthop Router to loop back traffic destined to the NAT IP address back
to the chassis.
In this scenario, two clients reside on two blades. The following summarizes the flow of the
traffic:
1. Upon receiving the packet from Client 1, the Master blade performs source NAT-ing and
forwards the packet to the Nexthop Router.
2. The Nexthop Router loops back the traffic to the chassis.
30
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
3. The Nexthop Router sends the packet back to the chassis which directs it to the other
blade.
4. This blade performs destination NAT on the packet.
5. The packet is sent to Client 2.
User Quotas
User quotas limit the number of NAT port mappings that are allowed for individual internal IP
addresses. For example, you can limit each inside IP address to a maximum of 100 TCP NAT
ports. Once a client reaches the quota, the client is not allowed to open additional TCP ses-
sions.
When a client has more than one NAT IP assigned, ACOS assigns a user quota for each NAT IP.
For example, if a client 192.168.1.1 has two NAT IPs—203.0.113.1 and 203.0.116.1, then each
NAT IP can be limited to a maximum of 100 TCP NAT ports.
Before choosing a NAT IP for an internal user, LSN ensures that there are enough ports free
on that NAT IP for the user. This guarantees that internal users can use as many ports as pos-
sible.
You can configure separate quotas for the following protocols on a global, per-prefix, or indi-
vidual LSN Limit-ID (LID) basis:
l TCP
l UDP
l ICMP
Each NAT IP has 64,000 TCP ports, 64,000 UDP ports, and 64,000 ICMP ports that can be
used for user sessions on the address.
31
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The per-user quota for a protocol specifies the maximum number of ports a given internal
user can use at the same time on a NAT IP. For example, if you set the TCP per -user quota to
100 ports, each internal user can have a maximum of 100 TCP sessions on a NAT IP.
In FIGURE 1-10, 320 internal users are mapped to a NAT IP. Each of the users consumes 100
TCP ports, leaving 32,000 ports free for new users. In this example, there is room for an addi-
tional 320 internal users on the NAT IP.
In the FIGURE 1-10, when the user is mapped to the NAT IP, each internal user immediately
consumes 100 of the NAT IP’s TCP ports. If the typical port consumption per user is expected
to be lower than the per-user quota, you can also specify a reserve value. When you specify a
reserve value, this value allows more internal users to be mapped to the NAT IP.
32
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
When you specify a reserve value, each new internal user immediately consumes the number
of reserved ports. However, the remaining ports in the user’s quota are not consumed unless
the user actually needs them. The remaining unconsumed ports are available to new users.
In FIGURE 1-11, none of the 320 internal users currently mapped to the NAT IP is using more
than their reserve value of 50 TCP ports each. This leaves the remaining ports in each user’s
quota available for new users.
When new users are mapped to the NAT IP, those users receive ports from the free ports.
After all free ports are assigned to users, the available ports in the existing users’ quotas are
assigned to new users. In FIGURE 1-12, the external IP address does not have any more free
ports. However, none of the users are actually using all of the ports in their 100-port quota. In
this example, none of the users are using more than the 50 reserved ports in the quota.
Although there are no more free ports, 32,000 ports are still unused and are available for
mapping to new internal users.
33
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
If the inside client is not assigned to a NAT IP address, LSN selects an available NAT IP
address. This address must meet the following requirements to be used for the client:
l The address must have enough free or available TCP ports to fulfill the configured per-
user TCP reserve.
l The configured per-user TCP reserve must not exceed the number of free or available
ports on the NAT IP address.
l The address must have enough free or available UDP ports to fulfill the configured per-
user UDP reserve.
l The configured per-user UDP reserve must not exceed the number of free or available
ports on the NAT IP address.
NOTE: There is a difference between available ports and free ports. You
can allocate more than the reserve value, but you cannot allocate
more than the user-quota value.
These requirements must be met for TCP, UDP, or ICMP. If the NAT IP address can not meet
the requirements, another available address is selected and evaluated for the same require-
ments. The process continues until there is an available NAT IP address that meets all require-
ments.
By default, when a client reaches its quota for a protocol, no new translations for that pro-
tocol are allowed. To ensure that ports are available for essential services, you can configure
an extended quota for the protocol ports that are used by those essential services. For
example, to ensure that email service remains available, you can configure an extended
quota for TCP port 25, the standard port used by Simple Mail Transfer Protocol (SMTP).
Extended quotas can be configured on individual LSN LIDs, for individual destination ports.
For user quotas in all applications, the regular quota is used first. The extended quota is used
only if all regular quota ports are in use, and only for the specified application. The extended
quota is always released before the regular quota.
Example:
TABLE 1-13 is an example of how ports are used and released with these quotas.
34
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
No connections No connections 10 5
No additional port 25
connections allowed.
You can specify between 1 and 65535 internal addresses that can be simultaneously mapped
to a public address.
35
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
shared, only one user per NAT IP can have port 80.
You can allow an inside user to reserve a specific NAT port. In this example, the NAT port 80
would be statically assigned to the user.
Some ports are susceptible to malicious attacks. The remote firewalls or Intrusion Prevention
Systems (IPS) with strict security policies on some source ports block such application pro-
tocol in order to prevent malicious attacks. When such ports are excluded from LSN NAT pool,
they cannot be used by a new session or port reservation.
You can exclude both TCP and UDP ports from LSN NAT pools. The ports can be excluded
from non-batch, port batching v1, and port batching v2 LSN NAT pools. The exclude ports
must be configured on the same partition in which the NAT pool is configured.
While configuring exclude ports, if the port is being used by a session, the port continues to
be in use until the session is closed. After the session is closed, the port is excluded from the
NAT pool.
Similarly, if the port is reserved while configuring exclude ports, it continues to be reserved
until the port reservation is cleared. After the port reservation is cleared, the port is excluded
from the NAT pool.
Use the cgnv6 nat exclude-port command to exclude ports from the NAT pool.
36
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
To exclude a TCP port from the NAT pool, use the following command:
ACOS(Config)#cgnv6 nat exclude-port tcp
To exclude a UDP port from the NAT pool, use the following command:
ACOS(Config)#cgnv6 nat exclude-port udp
The following example excludes a specific TCP port from the NAT pool:
ACOS(Config)#cgnv6 nat exclude-port tcp
ACOS(config-exclude-tcp-port)#port 1080
The following example excludes a range of UDP ports from the NAT pool:
ACOS(Config)#cgnv6 nat exclude-port udp
AX5100(config-exclude-tcp-port)#port 1080 to 1090
To exclude ports using GUI, navigate to CGN > LSN > Global.
By default the session age is refreshed to prevent session age out, at Outbound (client to
server), and Inbound (server to client) traffic.
37
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Inbound refresh is useful for applications with no outgoing UDP traffic. However, allowing
inbound refresh allows an external attacker or misbehaving application to keep mapping
alive indefinitely. This could be a security risk.
Some data ports are susceptible to malicious attacks. Remote firewalls with strict security
policies on the source ports block some applications to prevent malicious attacks. Inbound
refresh can be
disabled on these ports.
When NAT inbound refresh is disabled, the session age refresh is disabled on inbound traffic
for the session. Age refresh happens only on outbound traffic.
Use the cgnv6 lsn inbound-refresh disable command to disable NAT inbound refresh on
LSN ports. By default, inbound refresh is enabled.
ACOS(config)# cgnv6 lsn inbound-refresh disable
To configure inbound refresh using GUI, navigate to CGN > LSN > Global.
38
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
l For a TCP session, the data session is removed when ACOS observes the FIN or RST mes-
sages exchanged by the two end points of the session. If ACOS does not observe the
FIN exchange but the session is idle, the mapping is removed when the session ages
out.
l For a UDP session, the data session is removed when the session ages out.
l For an ICMP session, the data session ends when the ICMP reply is received, or when
the session ages out.
To configure TCP, UDP, AND ICMP, enter the ip nat translation command and one of the
following options:
l icmp-timeout – Configurable to 60-1500 seconds, or fast. The fast option uses the
SLB
maximum session life (MSL), which is 2 seconds by default. The default is fast.
39
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
For example, if a client uses source port 50000 to connect to two different destinations, the
same NAT mapping is used for both data sessions. (This is endpoint-independent mapping.)
The NAT mapping is not removed until the data sessions with both destinations have been
removed.
LSN maintains the NAT mapping for a full-cone session until the STUN timeout after the final
data session ends. By default, the STUN timeout is 2 minutes and is configurable. For inform-
ation about STUN Timeout, see Changing the STUN Timeout.
By default, full-cone behavior for well-known destination ports (1-1023) is disabled. Full-
cone behavior does not apply to ICMP sessions.
One-to-One NAT allows the ACOS device (responsible for the NAT conversion of the client’s
private IP to the public IP address) to provide access to the service or application on the Inter-
net using the assigned public IP. The dynamically-assigned, public IP will be exclusively
reserved for the client's use.
When the internal client has a unique public IP address, all traffic destined to the same des-
tination IP can reach the client by using any of the client's protocol ports. After all the ses-
sions that use this NAT IP address expire, the NAT IP address is released to the pool based on
a configured timeout period.
For example, when Client A with an IP address of 10.10.10.10, and with a NAT address of
65.95.196.986 connects to a Warcraft server, it creates a game room with local port 8343. If
one-to-one NAT based on destination criteria is enabled, when the internal client (Client A)
connects to a specific server, the client creates a one-to-one NAT address mapping with bi-
directional NAT for the inside client. Once this one-to-one mapping is configured, the outside
client (Client B) can access any port of the internal client by using the public IP for Client A,
as shown in the following graphic.
40
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
NOTE: For all other services, applications, or destinations, the inside cli-
ent will continue to use traditional dynamic NAT.
The maximum supported One-to-One NAT IPs vary based on the platform memory.
The following table summarizes the platform memory and the maximum number of One-to-
One NAT IPs supported for each platform:
2 20480
4 128K
41
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
8 256k
12 512k
16 512k
32 1 Million
64 2 Million
128 2 Million
For information about configuring one-to-one NAT, see Configuring One-to-One NAT.
Limitation
l The maximum number of NAT IP addresses in a single NAT pool is 4096 IPs.
l The logging is not supported for One-to-One NAT44 sessions. It is supported only for
One-to-One NAT64 sessions.
Radius Support
You can map an inside client to CGN parameters in an LSN LID that is based on RADIUS. For
example, you can use this feature to map clients of a given user type, defined by RADIUS
attribute, to a specific CGN pool.
l If the RADIUS attributes that are received for a client do not include an attribute that is
assigned to an LSN LID, ACOS can use the default LSN LID to handle the client.
42
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
ACOS can act as a RADIUS server and as a RADIUS client, depending on the CGN feature you
are using and how it is configured. In most cases, ACOS acts as a RADIUS server. TABLE 1-16
lists the features for which ACOS acts as a RADIUS server or client.
43
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Server NAT profile (LSN LID) selection based on Continue reading this sec-
RADIUS tion.
When you assign a NAT profile to a client based on RADIUS, and if this profile matches the
custom attribute that is returned for a client to its name in ACOS, then select the LSN LID
mapped to the custom attribute.
For example, ACOS receives a RADIUS Accounting Start record for a client, which contains
the following client information:
Acct-Status-Type = Start
44
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Acct-Session-Id = 1
Framed-IP-Address = 0x33010133
A10-CGN-Inside-IPv6-Addr = 2001:99:3301:133::1
A10-CGN-Radius-Custom-1 = "cc1"
3GPP-IMSI = 0000000001111111111
3GPP-IMEISV = 00000000022222222222222
Calling-Station-Id = 12345678901234567890
You can assign up to 6 custom attributes to the RADIUS attributes. The RADIUS attribute
uses the name that you assign to the custom attribute, not the actual value of that attribute.
For example, all clients with A10-CGN-Radius-Custom-1 (custom1) are assigned to the same
LSN LID. The value of A10-CGN-Radius-Custom-1 (custom1) is not used.
You can specify a default LSN LID to use for clients whose RADIUS Accounting Start records
do not include one of the custom RADIUS attributes.
45
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Class-list changes do not affect LSN sessions that are already in effect when the class
list changes occur.
For example:
Some data sessions, user-quota sessions, or full-cone sessions are created for inside
user X. Then, the class list is changed in a way that affects X.
The sessions for X will stay alive as long as there is traffic matching them.
l LSN IP Selection
The method used for selection of an IP address in an LSN pool does not apply to pool
selection in a pool group.
Selection of a pool from in a pool group is always random. After a pool is randomly selec-
ted, the configured IP selection method is used to select an IP address from the pool.
For example:
The least-used-strict method is enabled for LSN IP address selection. For a new NAT ses-
sion:
The least-used IP address in that pool is chosen for the new NAT session.
The LSN RADIUS table’s maximum number of entries varies depending on the memory size of
the particular ACOS platform. TABLE 1-17 lists the memory size and RADIUS table size for
each platform.
The LSN RADIUS table size only limits the maximum number of entries supported for each
platform. You can choose to configure a custom size for your LSN RADIUS table, not to
exceed the maximum.
46
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
vThunder 4 512000
TH 3030S 16 4000000
TH 3230 14 4000000
TH 4430 32 8000000
AX 3530 64 16000000
TH 5430 64 16000000
TH 5430-11 64 16000000
TH 5435-SPE 64 16000000
To configure the RADIUS table size, use the cgnv6 resource-usage radius-table-size com-
mand. This command configures the total configurable CGNV6 RADIUS table entries.
Upon receiving a RADIUS accounting-on request, the ACOS device can delete RADIUS table
entries associated with the attributes specified in the accounting-on request. After deleting
all entries associated with the specified attribute, ACOS will send a RADIUS accounting-
response. This allows for users to send accounting-on requests as a status in cases when the
user’s server may be unable to send accounting-off requests. By default, ACOS will ignore
RADIUS accounting-on requests. Use the accounting on delete-entries-using-attribute
option at the RADIUS server configuration level to delete the entries associated with the
47
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
specified attribute. For details, see the CLI configuration in Configuring RADIUS Accounting
Requests.
If ACOS is in the process of deleting RADIUS table entries, then it will ignore any other
accounting-on requests related to that attribute that are received. If a RADIUS accounting-
start request is received, and its filter attribute data matches the attribute data being
deleted, then the accounting-start request will be dropped. The statistics for ignored RADIUS
request messages can be viewed using the show system radius server statistics com-
mand. For more information about show system radius server statistics command, see
Command Line Interface Reference
You can enable ping replies from NAT addresses on a global basis for IPv4 or IPv6. The setting
applies to all IP address pools of the applicable IP version that is configured on the ACOS
device.
This feature applies to LSN NAT pool addresses and to address in NAT pools that are used for
standard NAT.
48
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
By default, ALG support for FTP is enabled, but ALG support for the other protocols is dis-
abled.
NOTE:
l If you are upgrading from AX Release 2.4.3, ALG support
for protocols other than FTP must be enabled explicitly
in the configuration.
l When a full- cone support is enabled for well- known
ports, ALG support for TFTP works even if TFTP ALG sup-
port is disabled.
l Session synchronization is not supported for ESP.
This section describes the supported application level gateway (ALG) options.
SIP ALG
SIP ALG is disabled by default., and you can enable it separately for LSN, NAT64, and DS-Lite.
When SIP ALG support is enabled, ACOS creates full-cone sessions to establish NAT mappings
for SIP clients, and performs the necessary IP address translations in the SIP packet headers.
The full-cone sessions are created for the SIP Contact port and the Real-time Transport Pro-
tocol (RTP)/Real-time Control Protocol (RTCP) port.
Previously, when a connection is made to an IPv4 resource with the SIP protocol, address:port
information is transferred within the payload. The client-XLAT performs partial stateless
translation since it uses different IPv6 prefixes for CLAT-side and PLAT-side IPv4 addresses.
As an IPv6 packet comes to the provider, it's consumed by the NAT64 service. Since NAT64
ALG checks the packet and its payload, instead of identifying the expected IPv6 address, the
private IPv4 address in the protocol payload is recognized.
49
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
This causes the ALG process to fail. Though the transport header is translated by NAT64, the
sent packet becomes unusable since the payload contains wrong information.
By leveraging 464XLAT SIP ALG support, it combines stateless IPv4-IPv6 translation on the
end device (CPE) with stateful IPv6-IPv4 translation on the provider side (usual NAT64), allow-
ing limited IPv4 access services being deployed to IPv6-only edge networks without the need
of encapsulation.
This is achieved by NAT64 SIP ALG support in modifying the SIP payload in 464XLAT. On the
outbound traffic, the private IPv4 address in the payload is translated to a NAT IP address. On
the inbound traffic, the NAT IP address in the payload is translated to the private IPv4
address instead of IPv6 address.
IPsec ESP
LSN supports passthrough of Encapsulating Security Payload (ESP) packets. ESP is a protocol
that is used by IP security (IPsec) to secure IP packets. When you use this protocol, the source
IP address is changed and the NATted IP address becomes the same as that of the IPSec con-
trol session.
When you can enable source NAT for ICMP messages from inside routers, ACOS uses the
inside client’s NAT address as the source address for ICMP messages that are related to the
client’s session. FIGURE 1-18 and FIGURE 1-19 illustrate the behavior of the ACOS device
when this option is disabled or enabled.
50
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
NOTE: You can use source NAT for ICMP Error Messages only for IPv4
NAT client and NAT addresses (NAT444/LSN).
FIGURE 1-18 illustrates the default behavior when a router in the inside network sends an
ICMP error message to a server on the outside network.
From the perspective of the outside server, 10.2.2.100, the client has an IP address of
10.1.1.100.
3. During the session, an inside router, through which the client is communicating with
the outside server, sends an ICMP error message to the server.
The source IP address of the ICMP message, 192.168.2.100, is in the inside network.
4. On the ACOS device, the source NAT for ICMP error messages is disabled.
5. The ACOS device sends the inside router’s ICMP message to the outside server, without
translating the source IP address into a NAT address.
From the perspective of the outside server, 10.2.2.100, the ICMP message comes from
an IP address that might not be routable or might overlap with a local address.
51
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
FIGURE 1-19 illustrates the behavior when you enable source NAT for ICMP error messages.
From the perspective of the outside server, 10.2.2.100, the client has IP address
10.1.1.100.
3. During the session, an inside router, through which the client is communicating with
the outside server, sends an ICMP error message to the server.
The source IP address of the ICMP message, 192.168.2.100, is in the inside network.
4. ACOS maps the inside router’s IP address to the client’s NAT address.
5. ACOS forwards the ICMP message by using the client’s NAT address as the source IP
address.
From the outside server’s perspective, the ICMP message appears to come from client
10.1.1.100.
6. If applicable, the server sends a reply to the ICMP message to the client’s NAT address.
52
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
7. ACOS translates destination IP address of the reply back into the inside router’s IP
address and forwards the reply to the router.
Either the inside or the outside is able to initialize an SCTP connection, also known as an
SCTP association, via a 4-way handshake. First an INIT packet is sent, creating a half-open
session. The INIT packet can contain multiple IPv4 addresses to support multi-homing. A
response is received in the form of an INIT-ACK packet that contains a State Cookie para-
meter. After receiving the INIT-ACK packet, the initiator sends a COOKIE-ECHO packet. A
response of a COOKIE-ACK packet fully establishes the SCTP connection. This 4-way hand-
shake may contain embedded information about IP or port details in order to create another
SCTP connection for incoming traffic.
SCTP packets consist of a common header and control/data chunks which support multiple
streams in a single connection. Following the chunks are optional parameters which are used
to specify additional IP addresses for multi-homing. These IPv4 addresses can be included in
the INIT or INIT-ACK packets. They are NATed based on the Static NAT configuration, and
then they are added to the session.
Once an SCTP connection is established, either the inside or the outside can send additional
chunks to modify the connection. An ASCONF chunk is set to either add an IPv4 address to
the connection, remove an IPv4 address from the connection, or change the primary address.
If payload protocol restriction is enabled, DATA chunks are forwarded only if they belong to
the permitted protocol. To avoid a flood of SCTP packets during an open session, packet rate
limiting can be configured. Abort and Shutdown chunks terminate the SCTP session.
NOTE:
l Currently SCTP over LSN does not support IPv6
53
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
To enable support for SCTP, configure an IP NAT inside and an IP NAT outside on the desired
interfaces. Once the IP NAT inside and outside are configured, configure Static NAT.
Remember the following requirements when you use CGN, DS-Lite, or NAT64 with L3V inter-
partition routing:
l All the inside (private) users must be on private, not shared, partitions.
l You can use only shared NAT pools.
Shared NAT are marked as shared resources and can be shared with all partitions, a single
partition, or a partition group. This allows you to specify which private partitions can use
which NAT pools.
54
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
This example has two private partitions with L3V enabled, each with its own CGN clients.
Each private partition is configured with the same IP address space.
Client traffic is received by the private partitions on their VLAN Virtual Ethernet (VE) inter-
faces. A CGN pool in the shared partition is used by each of the private partitions for client
NAT mappings. Each private partition has a default route whose next hop is the shared par-
tition.
VRRP-A is used for redundancy, but the second ACOS device is not shown. The CGN pool
addresses are backed up by VRRP-A, and each private partition is configured to base its
VRRP-A Active/Standby state on the state of the shared partition’s VRID.
The port-list contains the mapping between original ports and translated ports. To enable
port translation, bind the port-list to an lsn-rule-list, which is then bound to an lsn-lid.
55
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Destination NAT occurs when the following two conditions are met:
ACOS(config-lsn-rule-list)# default
To view the information of configured port-lists, use the show running-config command.
2. To configure LSN Limit IDs (LIDs), navigate to CGN > LSN > LSN-LID.
56
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
For each LID, specify the NAT pool to use. You can also set user quotas for the LID.
3. To import or configure class lists for the user subnets that require LSN, navigate to
CGN > LSN > Class Lists.
A class list is a list of internal subnets or hosts. In a class list, you can bind each internal
subnet to an individual LSN LID.
4. Navigate to CGN > LSN > Interfaces to complete one of the following tasks:
l Enable the inside NAT on the interface that is connected to the internal clients.
l Enable the outside NAT on the interface that is connected to the Internet.
5. To bind a class list to the configuration for use with LSN, navigate to CGN > LSN >
Global.
The class list will apply to packets from the inside NAT interface to the outside NAT
interface. Only a single class list can be used for this purpose.
The following list provides information about some additional options for LSN:
l To configure traffic logging, see the Traffic Logging Guide for IPv6 Migration.
l To configure matching and traffic handling based on destination, see Destination Based
NAT.
l To configure Port Control Protocol (PCP), see Port Control Protocol for LSN.
l To configure static mappings, use the following page: CGN > Static Mapping
l For other optional settings, use the following page: CGN > LSN > Global
l For other LSN options, see the CLI instructions later in this chapter.
192.168.1.1 is the beginning public IP address and 192.168.1.10 is the ending public IP
addresses in a range to be mapped to internal addresses. The netmask option specifies
57
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
the subnet mask or mask length for the addresses. For additional options, see the CLI
Reference for CGN.
2. To configure NAT Pool exhaustion logging severity, enter the following commands:
or
ACOS(config)# cgnv6 logging nat-resource-exhausted level warning
When a NAT pool is exhausted, either because the quota is exceeded or else there are
no resources left, an error message is logged. The error message’s logging level can be
configured so that NAT pool exhaustion is flagged as “Critical,” “Warning,” or “Notice.”
3. To clear the sessions that use a pool, follow these steps:
a. If you need to modify a pool used for LSN, all sessions using that pool must be
cleared first.
b. To remove the sessions that use a pool, remove the pool from any pool groups and
LIDs that use the pool.
NOTE: You can remove a NAT pool that is associated with a stuck session
only by forcing the clear operation. This command clears this ses-
sion without having to reload your ACOS device.
You must wait until the NAT pool sessions clearing command completes before configuring
another command.
For each LID, specify the NAT pool to use. You can also set user quotas for the LID.
1. Enter the following commands at the global configuration level of the CLI:
ACOS(config)# cgnv6 lsn-lid 22
58
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
2. Enter the following command to binds an LSN NAT pool to the LID:
ACOS(config-lsn lid)# source-nat-pool LSN_Pool1
3. Enter the following command to configures the per-user mapping quota for each type
of protocol supported for LSN (TCP, UDP, or ICMP):
The user-quota option specifies the maximum number of sessions allowed per client.
There is no default user quota.
For tcp or udp, the reserve option allows you to specify how many ports to reserve on
a NAT IP for each user. If unspecified, the reserve value is the same as the user-quota
value.
The service-port option specifies the Layer 4 protocol port of the service.
The sessions option specifies how many extended sessions are allowed for the protocol
port. There is no default extended user quota.
4. To apply the user quotas to all clients in the specified network prefix, enter the fol-
lowing command:
5. Enter the following command to override NAT for traffic that matches the class list:
Instead of performing NAT for matching traffic, LSN performs one of the following
actions:
l drop – Drops the traffic.
59
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
A class list is a list of internal subnets or hosts. In a class list, you can bind each internal sub-
net to an individual LSN LID.
1. Enter the following command at the global configuration level of the CLI:
This command changes the CLI to the configuration level for the class list. The list-
name option adds the list to the running-config. If the list is large, you use the file
option to save the list to a file. In this case, the list entries are not displayed in the run-
ning-config.
5.5.5.0 /24 specifies the internal host or subnet address and network mask length.
lsn-lid 5 is the LID number.
The class list applies to packets from the inside NAT interface to the outside NAT interface.
There can be a maximum of one class list for this purpose.
Enter the following command to bind the class list to the LSN feature:
ACOS(config)# cgnv6 lsn inside source class-list list1
Enter one of the following commands to enable inside NAT on the interface that is connected
to internal clients:
ACOS(config)# interface ethernet 4
ACOS(config-if:ethernet:4)# ip nat inside
ACOS(config-if:ethernet:4)# exit
60
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Enter one of the following commands to enable outside NAT on the interface that is con-
nected to the Internet:
ACOS(config)# interface ethernet 4
ACOS(config-if:ethernet:4)# ip nat outside
ACOS(config-if:ethernet:4)# exit
Optional Configurations
The following sections describe additional configuration options.
61
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Enter the following command to optionally configure static mappings for a range of protocol
ports for an internal address:
ACOS(config)# cgnv6 lsn port-reservation inside 1.1.1.1 22 33 nat 11.1.1.1 22
33
You can specify the internal IP address, the range of internal protocol port numbers, the pub-
lic IP address to map to the internal IP address, and the range of public protocol port num-
bers to map to the range of internal protocol port numbers.
By default, full-cone support (EIM Mapping and EIF) is disabled. You can enable EIM and EIF
individually for any port range.
l Disabling full-cone NAT for all destination ports, including the well-known ones, is equi-
valent to enabling Symmetric NAT.
l For a destination port or range, do not combine an enabled EIF with a disabled EIM,
because EIM filtering always fails when packets are dropped.
62
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
l The following combinations of EIM and EIF are not supported for the same destination
port or port range:
o For a given destination port or range, you cannot enable EIF where EIM is disabled.
The following commands illustrate that EIF for TCP ports 2000 to 3000 is now
enabled:
ACOS(config)# cgnv6 lsn endpoint-independent-filtering tcp
NOTE: By default EIM and EIF are disabled for all ports.
63
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
ACOS(config)# exit
You cannot directly configure full-cone support. To configure full-cone, you must configure
EIM and EIF separately.
After the session sends, LSN maintains the NAT mapping for a full-cone session for the dur-
ation of the STUN timeout. If the client requests a new session for the same port before the
mapping times out, the mapping is used again for the new session. If the mapping is not used
again before the STUN timeout expires, the mapping is removed.
For more information about configuring the STUN timeout for SIP, see SIP ALG.
The method used by LSN to select an IP address from an LSN NAT pool is configurable on a
global basis.
Enter the following command to specify the method for LSN IP address selection in a pool:
ACOS(config)# cgnv6 lsn ip-selection round-robin
You can replace the method option with any of the options in the list in Configuring the IP
Selection Method. The method you specify applies to all LSN pools.
64
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The IP address selection method applies only to the IP addresses in individual pools. The
method does not apply to selection of pools in a pool group. LSN randomly selects a pool from
in a pool group, then uses the configured IP address selection method to select an address
from in the pool.
1. Define a NAT pool called pool_ 1 and specify the IP address of the server to be used by
one-to-one NAT:
You must specify the one-to-one keyword if you plan to use the pool for one-to-one
NAT. Once specified, the one-to-one NAT pool can only be used for one-to-one NAT
purposes.
2. Enter the following commands to configure a NAT pool group for one-to-one NAT:
3. In the LSN rule-list called myrules, define the destination criteria for one-to-one NAT:
In the above configuration, when TCP traffic is sent to server 61.1.1.100, it will trig-
ger the one-to-one NAT process by using the one-to-one NAT pool called pool_1.
65
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
a. You can specify a NAT pool-group called group_1to1 to use for one-to-one
NAT:
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# exit
b. You must bind your LSN rule-list called myrules to the LSN LID:
ACOS(config-lsn-lid)# exit
4. To configure a timeout value of 10 minutes for your one-to-one NAT mapping, enter the
following command. When no active one-to-one NAT sessions exist, the mapping will
expire at the end of the time period:
ACOS(config)# cgnv6 one-to-one mapping-timeout 10
5. To display your configured mappings of one-to-one NAT, enter the following show com-
mand (with or without filters):
>Inside IPv4 Address Inside IPv6 Address NAT Address Sessions Age Pool
----------------------------------------------------------------------------
-----------
NOTE: A hyphen (‘-’) in the Age column means that the associated
mapping is currently being used by some data sessions and
will not expire. When all relevant data sessions complete,
the hyphen will be replaced by a timeout value in seconds
66
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The options related to ADP partitions are valid only if the command is entered in the
shared partition. The options are not displayed in private partitions.
6. To display your one-to-one NAT pool statistics of total, used, and free address numbers
for a one-to-one NAT pool, enter the following command:
7. To display one-to-one NAT statistics related to your allocated, freed, or failed map-
pings, enter the following command:
When using the clear command, you might see the following behavior:
67
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
data sessions are cleared, before attempting the clear command a second time.
l If live traffic is being processed, your one-to-one NAT mapping may not be cleared.
1. Configure the resources that you want to assign to clients based on RADIUS by con-
figuring CGN pools to which the inside clients will be assigned:
2. Configure a separate LSN LID for each set of resources (for example, for each pool).
68
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
Each LID should contain the unique set of resources to allocate to a given set of clients.
4. Configure an IP list that specifies the RADIUS server addresses or subnets from which
to receive the mobile number information.
The following commands configure the IP list that specifies the external RADIUS server
addresses:
ACOS(config)# ip-list RADIUS_IP_LIST
5. Configure the ACOS device to act as a RADIUS server, so that it can receive RADIUS
Accounting requests that include the client RADIUS attributes.
69
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
ACOS(config-radius-server)# exit
6. Configure a RADIUS profile that assigns clients to the LSN LIDs based on the attribute
values from the external RADIUS server. The following commands configure a CGN
RADIUS profile:
ACOS(config-lsn-radius-rule)# exit
When you configure the class list of client IP addresses, you can map the client network
to this profile.
The radius command matches on the attribute values from the external RADIUS server,
and specifies the LSN LID to use for handling clients that have the matching attribute
value.
The commands in the following example assign clients to CGN NAT pools based on the
RADIUS attribute mappings listed in TABLE 1-21
70
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
TABLE 1-21 : NAT Pool Assignments Based on RADIUS Attribute (values used in example
below)
71
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
To match only on an exact attribute value, use theexact-value option followed by the
portion of the attribute name on which to match. Similarly, to match based on only the
beginning portion of an attribute value, use the starts-with option followed by only
the portion of the attribute name on which to match. (See the “CLI Example” below.)
7. Map each attribute value expected from the external RADIUS server to a LSN LID.
NOTE: Based on the class list, clients with private addresses in the
10.x.x.x/8 subnet are handled based on CGN RADIUS profile
1. Clients with private addresses in the 11.x.x.x/8 subnet are
handled based on LSN LID 1.
9. Set the class list as the list of client (inside) addresses for CGN.
ACOS(config)# cgnv6 lsn inside source class-list CLASS_LIST
10. To view the table of RADIUS attributes stored on the ACOS device, enter the following
72
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
command:
The attribute names are listed, followed by the values received by the ACOS RADIUS
server for these attributes for individual clients. NAT profile selection is based on the
custom attribute names. In this example, the ACOS CGN configuration maps the
RADIUS custom attributes to the following names:
l customl – Mapped to attribute name “l3v-cl”
l custom2 – Mapped to attribute name “l3v-c2”
l custom3 – Mapped to attribute name “cus3”
l custom4 – Mapped to attribute name “cus4”
l custom5 – Mapped to attribute name “cus5”
l custom6 – Mapped to attribute name “cus6”
Following the list of attribute names, the attribute values for individual clients are lis-
ted. This example shows information for a client. The information is from the sample
Accounting Start record in Custom RADIUS Attributes. The client’s RADIUS information
includes the custom attribute mapped LSN LID 1, so ACOS assigns the CGN NAT settings
in that LSN LID to the client.
73
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
For users with multiple RADIUS systems, all of which use different secret keys, ACOS
provides the ability to configure different secret keys in order to act with separate RADIUSM
systems. Up to 8 RADIUS systems can be configured in an IP List within the RADIUS server
configuration level. Each system can be configured with a separate secret key. Otherwise, a
default secret key can be configured with the RADIUS server configuration level. All
RADIUSM systems sharing that secret key must be specified in a single IP list.
To configure a default secret string, enter the following command at the RADIUS server con-
figuration level:
ACOS(config)# system radius server
For more information about system radius server command, see Command Line Interface
Reference.
To configure a custom LSN RADIUS table size, a new option has been added to the cgnv6
resource-usage command. The minimum and maximum configurable sizes will vary depend-
ing on the platform.
ACOS(config)# cgnv6 resource-usage radius-table-size 3000000
74
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
To view the current LSN RADIUS table size, as well as the default, maximum, and minimum
values allowed for your platform, a new radius-table-size entry has been added to the show
cgnv6 resource-usage command.
In order to process RADIUS accounting-on messages, the RADIUS server must first be con-
figured on the ACOS device. To configure table entry deletion upon receiving a RADIUS
accounting-on request, you can configure an attribute to be used for deleting entries when
accounting-on request is received or to ignore other incoming accounting-on requests.
1. To configure ACOS to delete entries matching a default attribute in the RADIUS table,
enter the following command at the IP NAT LSN RADIUS server configuration level:
ACOS(config)# system radius server
2. To configure ACOS to delete entries matching a custom attribute, enter the following
command at the RADIUS server configuration level:
ACOS(config)# system radius server
Whenever ACOS receives and successfully processes a RADIUS accounting request message,
it sends a RADIUS accounting response in reply. If a confirmation is not needed, or if the user
wants to limit the flood of response messages, then this option can be disabled so that no
RADIUS accounting response is sent.
To disable RADIUS accounting responses from being sent in reply to RADIUS accounting
requests, enter the following command at the config-radius-server configuration level:
ACOS(config)# system radius server
ACOS(config-radius-server)# disable-reply
By default, if a RADIUS server is configured on the ACOS device, then RADIUS accounting
responses are sent when a RADIUS accounting request is processed successfully.
75
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
While sending CGN logs, RADIUS attributes for a client can be added to the log messages. To
achieve this, ACOS is configured to act as a RADIUS server so that it can receive RADIUS
accounting requests that include the client RADIUS attributes.
When client’s AAA server sends out RADIUS accounting packet that has the Framed IP and
(/or) Framed IPv6 Prefix to ACOS, ACOS intercepts the packet, creates a RADIUS table entry
based on the IP and IPv6 Prefix. When the inside user creates a data connection either from
the IP or from IPv6 address (from the prefix), ACOS then includes the RADIUS attributes
while sending the log messages.
ACOS acts as a RADIUS server intercepting RADIUS accounting request messages sent to the
Interface / Floating IPs configured on ACOS. To create a RADIUS server configuration for
CGNv6 deployment, use the system radius server command. For more information about
system radius server command, see Command Line Interface Reference.
When configuring the CGNV6 RADIUS server, use the framed-ipv6-prefix command to spe-
cify the Framed IPv6 Prefix as a RADIUS attribute for RADIUS accounting requests. The fol-
lowing combination are possible in a RADIUS packet:
l Framed IPv4 address and Framed IPv6 prefix — ACOS accepts the packet and creates
the RADIUS entries based on the IPv4 address and the IPv6 prefix.
l Framed IPv4 address and Framed IPv6 address — ACOS accepts the packet and create
the RADIUS entries based on the IPv4 address and the IPv6 address.
l Framed IPv4 address — ACOS accepts the packet and creates the record with Ipv4
address.
l Framed IPv6 address — ACOS accepts the packet and creates the record with Ipv6
address.
l Framed IPv6 prefix — ACOS accepts the packet and creates the record with Ipv6 prefix.
The Framed IPv6 prefix attribute in the RADIUS packet contains the prefix with the con-
figured prefix length. When the configured prefix length on the RADIUS server does not
match with the incoming prefix length, then the packet will be dropped.
When the prefix length is changed in the RADIUS server, the existing RADIUS table must be
explicitly cleared.
76
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
NOTE: The value of the Framed IPv6 Prefix is configurable. If the con-
figured prefix is changed, the RADIUS table must be explicitly
cleared to remove the previously learned RADIUS table entries.
NOTE: ACOS accepts the RADIUS accounting packets only when the
packet is destined to the ACOS Interface IP or Floating IP.
Configuration Example
The following configuration configures Framed IPv6 Prefix support for RADIUS table in CGN
partition.
1. Enter the following command to create an IP list for client RADIUS servers:
77
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
78
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
ACOS(config-logging:log)# batched-logging-disable
l For DS-Lite traffic, matching is based on the IPv6 source address and the tunneled IPv4
address.
l For NAT64, matching is based on the source IPv6 address.
You can enable one of the hairpin filtering options. The enabled option applies to LSN, DS-
Lite, and NAT64 traffic.
Enter the following command to configure the filtering granularity for LSN hairpinning:
ACOS(config)# cgnv6 lsn hairpinning filter-none
LSN has its own SYN timeout, separate from the IP NAT translation timeout. The LSN timeout
can be 2-7 seconds, and is 4 seconds by default.
The following example enables ALG support for the ESP protocol in LSN:
ACOS(config)# cgnv6 lsn alg esp enable
The following example disables ALG support for the ESP protocol in LSN:
79
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
l Enter the following command to display the state of LSN ALG support for ESP protocol:
ACOS# show cgnv6 lsn alg esp config
l Enter the following command to display ALG statistics for a protocol in LSN:
ACOS# show cgnv6 lsn alg esp statistics
Inside Address NAT Address ICMP UDP TCP Session Pool LID Flag
---------------------------------------------------------------------------------
--
Enter the following command to change the RTP/RTCP STUN timeout for full-cone sessions
used for SIP NAT mappings:
ACOS(config)# cgnv6 lsn alg sip rtp-stun-timeout 5
You can use NAT64 passive mode (PASV) FTP to work with XLAT. You can also configure this
option with the cgnv6 nat64 alg ftp xlat-no-trans-pasv enable command.
80
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
If you configure the option, and the client sends a PASV request, the PASV response from the
server is not translated to an EPSV response. However, if an IPv6 client sends an EPSV
request, FTP ALG translates the request to PASV. When the server responds, the message is
translated from PASV to EPSV.
By default, LSN attempts to use the same source protocol port for a client’s public address
(NAT address) that is used in the client’s inside address. For example, if the client sends a
request with the source port TCP 5000, LSN uses TCP 5000, if available, as the source port in
the NATted request that is sent to the server.
This feature is called port preservation. If you disable port preservation, ACOS will not
attempt to use the same protocol port in the client’s inside address as the source protocol
port in the client’s public address.
If you disable port preservation after traffic has run through the ACOS device for some time,
save the configuration by entering the write memory command and reload the device by
entering the reload command.
The TCP maximum segment size (MSS) specifies the maximum length, in bytes, of data that
one SYN or SYN-ACK packet in a TCP connection can have.
81
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
By default, the subtract method of MSS clamping is used with the following values:
S = 40 bytes
N = 416 bytes
Using these values, the default MSS clamping calculations are as follows:
o If MSS minus 40 is greater than 416, subtract 40 from the MSS.
o If MSS minus 40 is less than or equal to 416, set the MSS to 416.
Enter following command to disable TCP resets in response to invalid TCP packet from the
inside network:
ACOS(config)# cgnv6 lsn tcp reset-on-error outbound disable
You can configure the following ICMP/ICMPv6 options for IPv6 migration:
82
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
ACOS can send ICMP Unreachable messages when one of the following conditions have been
met:
By default, ACOS sends code type 3, code 13, administratively filtered, when a configured
user quota is exceeded. ICMP Unreachable messages when no NAT ports are available for map-
pings is disabled by default.
Configuring Source NAT for ICMP Error Messages by Using the GUI
You cannot configure this option by using the GUI.
Configuring Source NAT for ICMP Error Messages by Using the CLI
Enter the following command to enable NAT for ICMP messages from inside routers:
ACOS(config)# cgnv6 nat icmp always-source-nat-errors
83
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
To enable support for SCTP, configure an IP NAT inside and an IP NAT outside on the desired
interfaces. Once the IP NAT inside and outside are configured, configure Static NAT.
For hair-pinning, inside user and outside user can be used interchangeably. Typically, the
user initiating the connection is considered the inside user.
The idle timeout for SCTP traffic is configured in minutes. To configure an idle timeout for
SCTP traffic, enter the following command in the CLI:
ACOS(config)# cgnv6 sctp idle-timeout 4
To configure packet rate-limiting for SCTP sessions, enter the following command in the CLI:
ACOS(config)# cgnv6 sctp rate-limit source 1.1.1.1
The commands to configure payload protocols and SCTP packet rate-limiting are only avail-
able on CFW platforms.
84
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
When sessions are running, you can edit or modify the NAT pool without the need to clear the
sessions first. When the NAT pool has been modified, the current session is kept active on the
old pool in the background until the sessions end. New sessions are mapped to the new NAT
pool using new NAT addresses. When all sessions using old NAT addresses end, ACOS releases
the old NAT addresses from the system.
If the public NAT IP is distributed using a routing protocol (for example, BGP), ACOS stops
redistributing the old public IP address until all the sessions using this public IP has been
cleared first in the background. New public IP addresses are redistributed immediately when
the NAT pool has been modified.
To view the status of old NAT address, enter the following command:
(obsoleted) 80.1.1.5 2 2 0
(obsoleted) 80.1.1.4 2 2 0
(obsoleted) 80.1.1.3 2 2 0
(obsoleted) 80.1.1.2 2 2 0
(obsoleted) 80.1.1.1 2 2 0
Once the old addresses are in the obsoleted status, they will be kept in the system until all
sessions using them end.
85
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
NOTE: You can modify the NAT address range repeatedly only when all
obsoleted address from the last change have been completely
removed from the system.
L3V Statistics
CGN statistics for L3V displays information on counters for each partition by using the sup-
ported show commands. NAT pool usage statistics are displayed in the partition that owns
the NAT pool.
The axdebug debug and monitoring command displays session-specific information for each
partition.
For inter-partition traffic, the following types of IPv6 Migration technology statistics are col-
lected in the partition to which the private client belongs:
86
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The aggregate packet level statistics are collected in the partition that receives the packet.
You can display the output of, for example, the show slb switch and show {ip | ipv6} frag-
mentation statistics commands.
The commands in this example configure the L3V CGN deployment shown in this figure.
The following commands configure the interface to internal clients, and enable inside NAT on
the interface:
ACOS-Active[p0]# configure
ACOS-Active[p0](config)# vlan 100
ACOS-Active[p0](config-vlan:100)# tagged ethernet 1
87
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The following command configures a static IP route from the private partition to the shared
partition. The partition shared option specifies that the next hop for the route is the shared
partition.
ACOS-Active[p0](config)# ip route 0.0.0.0 /0 partition shared
The following command enables VRRP-A for the partition. VRID 1 is configured to base its Act-
ive/Standby state on the state of VRID lead “leader”, configured in the shared partition:
ACOS-Active[p0](config)# vrrp-a vrid 1
ACOS-Active[p0](cofngi-vrid:1)# follow vrid-lead vrid1-leader
The source-nat-pool option configures the private partition to use pool “pool0” in the
shared partition to obtain NAT addresses for client mappings.
Configuring Partition p1
The following commands configure partition “p1”. The configuration is similar to the one for
partition “p0”, except for the VLAN and accompanying VE ID. VLAN and VE IDs are required
to be unique across all partitions of the device. A VLAN’s VE ID must be the same as that
VLAN’s VE ID.
IP addresses must be unique in a partition but the same IP addresses can be used in more
than one partition. In this example, both private partitions use the same address space for
inside clients.
ACOS-Active# active-partition p1
Currently active partition: p1
ACOS-Active[p1]# configure
88
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The vrrp-a vrid-lead option configures a VRRP-A lead. Later in the configuration, the par-
titions are configured to follow the shared partition’s VRID state. When the shared partition’s
VRID is active, the VRID of each of the private partitions that follows the shared partition’s
VRID state also become active. If the shared partition’s VRID state changes to Standby, the
VRID state of each of the private partition VRIDs also change Standby.
89
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
The following commands configure a partition group containing the L3V partitions:
ACOS-Active(config)# partition-group pg0
ACOS-Active(config-config-partition-group:pg0)# member p0
ACOS-Active(config-config-partition-group:pg0)# member p1
ACOS-Active(config-config-partition-group:pg0)# exit
ACOS-Active(config)#
The following command configures an LSN NAT pool to be shared by the private partitions:
ACOS-Active(config)# cgnv6 nat pool pool0 1.1.1.1 1.1.1.100 netmask /24 vrid 1
shared group pg0
The vrid 1 shared option adds the pool addresses to the shared partition’s VRID for backup.
The group option shares the pool with the CGN configurations in the private partitions in
group “pg0”.
ACOS(config-lsn-rule-list)# default
90
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
To view the information of configured port-lists, use the show running-config command.
Total IP subnet: 1
Content:
l Enter the following command to display the currently active full-cone sessions:
----------------------------------------------------------------------
l Enter the following command to display the currently active user quota sessions:
ACOS# show cgnv6 lsn user-quota-sessions
Inside Address NAT Address ICMP UDP TCP Session Pool LID
---------------------------------------------------------------------------
l Enter the following command to display the configured LSN static port reservations:
91
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
----------------------------------------------------------------------------
----------
l Enter the following command to display the system-level information for LSN:
ACOS(config)# show cgnv6 lsn system-status
CPU Usage:
----------
Control CPU 1 : 6%
Data CPU 1 : 0%
Data CPU 2 : 0%
Data CPU 3 : 0%
Data CPU 4 : 0%
Data CPU 5 : 0%
Data CPU 6 : 0%
Data CPU 7 : 0%
Memory Status:
--------------
Sessions Status:
----------------
92
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
LSN CPS : 0
---------------
-------------------
l Enter the following command to display the global statistics related to LSN:
ACOS(config)# show cgnv6 lsn statistics
l Enter the following command to display the current and configurable values for system
resources:
ACOS# show system resource-usage
--------------------------------------------------------------------------
93
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
auth-portal-html-file-size 20 20 4 120
auth-portal-image-file-size 6 6 1 80
The Current column shows the maximum number of LSN pool addresses that are cur-
rently allowed on the system. The Default column displays the allowable maximum
value. In this example, the administrator increased the maximum value to 10000.
The maximum value can be any value in the range between the values in the Minimum
and Maximum columns in the output.
-------------------------------------------------------------
----------------------------
Pool Name Total IPs Total Users Free IPs Used IPs UDP-port-over-
loaded TCP-port-overloaded
-------------------------------------------------------------------
-----------------------
pool1 3 4 0 3 5 0
94
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
pool1 Address Users ICMP Freed Total UDP Freed Total Rsvd oLoaded
TCP Freed Total Rsvd oLoaded
-------------------------------------------------------------------
-----------------------------
203.0.113.1 1 0 0 0 0 0 0 0 0 0 0 0 0 0
203.0.113.2 2 0 0 0 5 0 0 0 5 0 0 0 0 0
203.0.113.3 1 0 0 0 0 0 0 0 0 0 0 0 0 0
l Enter the following command to display the NAT pool group statistics:
ACOS(config)# show cgnv6 nat pool-group statistics
-------------------------
--------------------------------------------------
--------------------------------------------------
l Enter the following command to display the counters for the NAT pool:
ACOS(config)# show counters cgnv6 nat pool
/cgnv6/nat/pool/pool1
**************************************
Users 1
ICMP 0
ICMP Freed 0
ICMP Total 0
ICMP Reserved 0
ICMP Peak 0
UDP 0
95
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
UDP Freed 0
UDP Total 0
UDP Peak 0
TCP 0
TCP Freed 0
TCP total 0
TCP Peak 0
IP Used 1
IP Free 0
IP Total 1
96
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 1: Large Scale Network Address Translation Feedback
NOTE: Enter the final line of text before you remove a pool from a pool
group.
The rtsp option clears all ALG statistic counters, except the Current ALG sessions and
Current Port mappings counters.
For detailed information about the show commands and the counters, see Command
Line Reference for CGN.
97
Chapter 2: NAT64 / DNS64
This chapter provides information about how to configure NAT64 and DNS64. It also provides
information about additional configuration options.
Overview 99
98
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Overview
l NAT64/DNS64 is based on the following RFCs:
o RFC 6146, Stateful NAT64: Network Address and Protocol Translation from IPv6 Cli-
ents to IPv4 Servers
o RFC 6147, DNS64: DNS Extensions for Network Address Translation from IPv6 Cli-
ents to IPv4 Servers
l Using LSN and NAT64/DNS64 on the same ACOS device is supported.
For information about matching and traffic handling based on destination, see Destin-
ation Based NAT.
For information about configuring user quotas by prefix, see User Quotas Based on IPv6
Prefix.
l For information about logging, see the Traffic Logging Guide for IPv6 Migration.
l Fixed-NAT is a log optimization feature that allocates NAT ports for each client from a
predetermined (“fixed”) set of ports on the NAT address, without the need for logging.
DNS64 and NAT64 work together to help IPv6 clients communicate with IPv4 servers. FIGURE
2-1 shows how DNS64 and NAT64 on an ACOS device help an IPv6 client establish a TCP ses-
sion with an IPv4 server.
99
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
DNS64 on the ACOS device intercepts the client’s IPv6 DNS request on the DNS VIP, and
DNS64 forwards the AAAA request on behalf of the client. If the request results in a reply
with an empty ANSWER section, or an error, or no reply, DNS64 sends an IPv4 DNS request
instead.
The ACOS device retrieves the IPv4 addresses from the ANSWER section in the A reply and
synthesizes an AAAA reply by changing the IPv4 addresses in the ANSWER section into IPv6
addresses.
The IPv6 addresses in the synthesized reply are constructed as follows (assuming a /96 pre-
fix):
NAT64-prefix::hex-version-of-IPv4-addr
The following complementary features enable IPv6 clients to access IPv4 servers:
l DNS64 – Performs IPv4 and IPv6 DNS queries on behalf of IPv6 clients, and synthesizes
IPv6 replies based on the IPv4 replies as required.
100
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
l NAT64 – Translates IPv6 packets from clients into IPv4 packets for communication with
IPv4 servers. Likewise, NAT64 translates the IPv4 packets in server replies into IPv6
packets to send to the client.
For information about how the NAT64 prefix is used by DNS64, see NAT64 Prefix.
One-to-One NAT supports both NAT44 and NAT64. ACOS provides support for the One-to-
One NAT mappings based on the destination IP address. When an inside client connects to a
server, ACOS creates a One-to-One NAT mapping with a bidirectional NAT, which allows the
outside clients to connect to any port on the inside client.
For traffic from the inside client to a destination other than the server, ACOS will continue to
use the normal, dynamic NAT.
The maximum supported One-to-One NAT IPs vary based on the platform memory. For more
information about One-to-One NAT support and the maximum supported NAT IPs for the dif-
ferent platform memories, see One-to-One NAT Based on the Destination IP.
You can enable logging for one-to-one NAT64 using the following commands:
ACOS(config)#cgnv6 template logging log_template_name
The logging can be enabled for One-to-One NAT64 sessions only. The log format supported
are CEF and ASCII.
For enabling One-to-One NAT64 logging and viewing the log samples, see Traffic Logging
Guide.
NOTE: This example assumes that the default DNS64 settings in ACOS
are used.
101
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
1. The IPv6 client 2001:6b8::33 sends a DNS request for the IPv6 address for www.ex-
ample.com.
6. DNS64 synthesizes an AAAA reply, which lists the IPv4 server’s IP address,
64:ff9b::c0a8:10a.
This is the server’s IPv4 address converted into hexadecimal, and appended to the
NAT64 prefix (64:ff9b::/96).
7. The client sends an IPv6 TCP SYN to 64:ff9b::c0a8:10a.
8. NAT64 creates a NAT session for the client, which replaces the client’s IPv6 address
with an IPv4 address from the NAT pool.
NAT64 also replaces the IPv6 destination address with the corresponding IPv4 address
of the server.
9. The ACOS device forwards the NAT IPv4 TCP SYN to the server.
The TCP SYN has source IP address 10.1.1.1 and destination address 192.168.1.10.
The SYN-ACK has the source IP address 192.168.1.10 and destination address 10.1.1.1.
11. The ACOS device translates the SYN-ACK into an IPv6 SYN-ACK and forwards it to the
client.
The SYN-ACK has the source IP address 64:ff9b::c0a8:10a and the destination address
2001:6b8::33.
102
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Here is an example of a DNS reply from an IPv4 DNS server for an IPv4 query. The ANSWER
section is highlighted.
; <<>> DiG 9.5.0b2 <<>> @3142::200 www.l.example.com
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52089
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 4, ADDITIONAL: 4
;; QUESTION SECTION:
;www.l.example.com. IN A
;; ANSWER SECTION:
www.l.example.com. 173 IN A 192.168.1.10
www.l.example.com. 173 IN A 192.168.1.11
www.l.example.com. 173 IN A 192.168.1.12
www.l.example.com. 173 IN A 192.168.1.13
www.l.example.com. 173 IN A 192.168.1.14
;; AUTHORITY SECTION:
example.com. 68814 IN NS ns3.example.com.
example.com. 68814 IN NS ns1.example.com.
example.com. 68814 IN NS ns2.example.com.
example.com. 68814 IN NS ns4.example.com.
;; ADDITIONAL SECTION:
ns1.example.com. 168132 IN A 172.16.1.10
ns2.example.com. 168132 IN A 172.16.2.10
ns3.example.com. 168132 IN A 172.16.3.10
ns4.example.com. 168132 IN A 172.16.4.10
Here is an example of a AAAA reply that is synthesized by DNS64. DNS64 replaces the IPv4
addresses in the ANSWER section with IPv6 addresses. Each synthesized IPv6 address is a
combination of the NAT64 prefix and the hexadecimal version of the IPv4 address.
;; global options: printcmd
103
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3314
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 4, ADDITIONAL: 4
;; QUESTION SECTION:
;www.l.example.com. IN AAAA
;; ANSWER SECTION:
www.l.example.com. 147 IN AAAA 64:ff9b::c0a8:10a
www.l.example.com. 147 IN AAAA 64:ff9b::c0a8:10b
www.l.example.com. 147 IN AAAA 64:ff9b::c0a8:10c
www.l.example.com. 147 IN AAAA 64:ff9b::c0a8:10d
www.l.example.com. 147 IN AAAA 64:ff9b::c0a8:10e
;; AUTHORITY SECTION:
example.com. 74649 IN NS ns2.example.com.
example.com. 74649 IN NS ns4.example.com.
example.com. 74649 IN NS ns1.example.com.
example.com. 74649 IN NS ns3.example.com.
;; ADDITIONAL SECTION:
ns1.example.com. 168132 IN A 172.16.1.10
ns2.example.com. 168132 IN A 172.16.2.10
ns3.example.com. 168132 IN A 172.16.3.10
ns4.example.com. 168132 IN A 172.16.4.10
NAT64 Prefix
The NAT64 prefix portion of the IPv6 address in the ANSWER section and the routes along the
network path between the client and the ACOS device ensures that the client’s IPv6 request
for the site is handled by NAT64 on the ACOS device. NAT64 knows the server’s IPv4 address
from the portion of the synthesized IPv6 address that contains the IPv4 server’s address
In this example, the NAT64 prefix is 64:ff9b::/96, the well-known prefix for NAT64 and
DNS64. On the ACOS device, the prefix is a configurable NAT64 option. The prefix setting
applies to NAT64 and DNS64. For syntax information, see Configuring NAT64.
104
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
You can set up to 64 NAT64 prefixes on an ACOS device, and configure prefix binding to a
specific class-list. This is useful when you partition IPv6 users into different networks and
manage these users separately.
This feature extends the functionality of NAT64 prefixes. The syntax to configure a NAT64
prefix is similar to previous releases and no configuration changes are required to enable
enhancement.
NOTE: You can configure only one default NAT64 prefix in a class-list.
l Answer-only – DNS64 synthesizes only the resource records in the ANSWER section.
For more information, see Synthesis of AAAA Replies. This option is enabled by default.
If you disable this option, the IPv4 addresses in all other sections are synthesized to
IPv6 too.
l Auth-data – When ACOS receives an A-query-response from the DNS server, it sets the
authenticated-data bit in the synthesized AAAA response.
The auth-bit is set only if DNS64 synthesis is performed in the reply. Otherwise, the bit
is not changed. By default, this option is disabled.
l Cache – The ACOS device uses a cached A-query response to provide AAAA query
responses for the same hostname without consulting the DNS server.
For example, an A query has been cached for hostname example.com. If the client
sends an AAAA query for example.com, ACOS does not consult the DNS server. Instead,
ACOS uses the cached type A answer to synthesize an AAAA response and sends the
synthesized response to the client. By default, this option is disabled.
l DNS64 state – Enabled or disabled.
l Change-query – When ACOS receives an AAAA request from a client, ACOS forwards
only an A request on behalf of the client.
105
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
This option saves time if the DNS database only contains A records, because ACOS does
not need to wait for an error, an empty response, or for the response to time out. By
default, the change-query option is disabled.
l Compress – To save network costs, in the DNS protocol, the DNS packet can be com-
pressed.
For example, www.example.com may occur many times in the DNS packet. For the first
occurrence, ACOS uses the fully-qualified domain name (FQDN), which is 16 bytes long.
The remaining occurrences can be displayed as an offset from the DNS header (2
bytes), which saves 14 bytes for each subsequent occurrence of the name. By default,
ACOS compresses each packet.
If you disable this option, ACOS will not compresses the packets. Even after disabling
compression, if the name is the same as the FQDN in the QUESTION record, the packet
is compressed without any performance cost.
l Deep-check-RR – Certain DNS64 requirements may need DNS64 to step through the
resource records in the ANSWER section and apply certain rules.
For example, the drop-CNAME option requires ACOS to evaluate the resource records
individually. In this case, it is required to enable deep-check-RR along with drop-
CNAME.
l Drop-CNAME – Sometimes the DNS server might send only CNAMEs in the ANSWER sec-
tion in response to an AAAA query.
This option drops these responses, considers the responses to be empty, and initiates
an A query towards the hostname. By default, this option is enabled. This option is valid
only when the deep-check-RR option is enabled.
l Ignore-rcode3 – The ACOS device ignores a DNS response with rcode 3 in response to a
AAAA query.
The ACOS device treats the response as empty, and sends an A query to the same host-
name. This option is useful for circumventing DNS servers that are configured incor-
rectly to return rcode=3 when they do not have any AAAA records for the hostname,
even though the hostname exists. By default, this option is enabled.
106
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
l Max-qr-length – If the question-record length is greater than this value, the response
from the DNS server is forwarded to the client without any modification to the
response.
l Parallel-query – The ACOS device sends an IPv6 AAAA request and an IPv4 A request
in parallel on behalf of the client.
By default, this option is disabled. When this option is enabled, ACOS performs DNS64
synthesis and forwards the first valid response that is received to the client. Empty
responses and errors are invalid.
If both responses are invalid, ACOS forwards the last invalid response to the client.
Both queries could come back with valid responses. With this option enabled, the first
valid response is forwarded to the client. If two invalid responses are received, the last
one is forwarded to the client. By default, this option is enabled. When this option is dis-
abled, if both responses are valid, ACOS forwards the responses to the server.
l Timeout – This option specifies the maximum number of seconds that ACOS waits for
an AAAA response before sending an A query. You can specify 1-15 seconds, and the
default is 1 second.
l Trans-ptr – This option helps you to run PTR queries for synthesized IPv6 addresses
with the client.
107
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
The PTR queries are intercepted by DNS64, converted into PTR queries for their cor-
responding IPv4 addresses, before being sent. When the response is received by ACOS,
the response is synthesized and sent back to the client as if it were a response for the
synthesized IPv6 address. By default, this option is disabled.
l TTL – This option specifies the maximum TTL to use in synthesized AAAA replies,
instead of the TTL value in the original IPv4 DNS reply.
o If the TTL value in the template is lower than the TTL value in the IPv4 reply, the
template’s TTL value is used in the synthesized IPv6 reply.
o If the TTL value in the template is equal to or higher than the TTL value in the IPv4
reply, the TTL value in the IPv4 reply is used in the synthesized IPv6 reply.
NAT64 has Application Level Gateway (ALG) support for the following protocols:
ALG support for FTP is enabled by default. ALG support for the other protocols is disabled by
default. However, Carrier Grade NAT (CGN) and Fixed NAT support these ALGs.
Fragmentation
Fragmentation is supported for packets that are larger than the Maximum Transmission Unit
(MTU) of the inbound or outbound ACOS interface.
108
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
By default, NAT64 honors the Don’t Fragment bit in inbound IPv4 packets. Optionally, you
can configure NAT64 to override the Don’t Fragment bit, and to fragment the packet anyway.
The maximum interval allowed between fragments is configurable. The maximum number of
simultaneous fragmentation sessions ACOS will allow also is configurable.
NAT64 and DNS64 support allows 6rd IPv6 clients to reach IPv4 servers.
No new configuration is required for the support. When ACOS receives a packet from a 6rd
IPv6 client, ACOS checks whether the inner destination IPv6 address matches the VIP for
DNS64, and the destination UDP port matches the virtual port on the DNS64 VIP.
l Hairpinning
l User quotas
109
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
NAT64 shares configuration of these features with Large Scale NAT (LSN).
Configuring DNS64
1. To configure an IP Source NAT IPv4 pool, navigate to ADC > IP Source NAT > IPv4
Pools.
2. To configure an IP Source NAT IPv6 pool, navigate to ADC > IP Source NAT > IPv6
Pools.
3. To configure an IP Source NAT pool group, navigate to ADC > IP Source NAT > Pool
Groups.
4. To configure a DNS template with DNS64 settings, navigate to CGN > DNS64 > Tem-
plates, select DNS.
5. To add the configuration for the local DNS servers, navigate to CGN > DNS64 > Virtual
Servers, click Create.
110
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
2. To configure an IPv6 NAT pool, if DNS64 will be a proxy for a local IPv6 DNS server:
ACOS(config)# ipv6 nat pool v6p 2010:db8::1 2010:db8::4a netmask 64
3. To configure an IPv6 ACL, (if both IPv4 and IPv6 local DNS servers will be proxied) enter
the following commands. In this case, the ACL directs IPv6 traffic to the IPv6 pool
instead of the IPv4 pool.
For simplicity, the syntax for matching on all traffic is shown. You can use more restrict-
ive matching if needed.
Scenario 1 - ACOS Device Provides DNS64 for IPv4 Local DNS Server
The following commands configure an IPv4 NAT pool, to enable the DNS VIP to reach the local
IPv4 DNS server:
ACOS(config)# ip nat pool ipv4-pool1 10.1.1.100 10.1.1.100 netmask /24
Scenario 2 - ACOS Device Provides DNS64 for IPv6 Local DNS Server
The following command configures an IPv6 NAT pool and enable the DNS VIP to reach the
local IPv6 DNS server:
ACOS(config)# ipv6 nat pool ipv6-pool1 4629::50 4629::50 netmask 64
Scenario 3 - ACOS Device Provides DNS64 for IPv6 and IPv4 Local DNS Servers
The following commands configure the DNS64 and NAT64 deployment shown in this figure.
111
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
NAT Configuration:
The following commands configure an IPv6 ACL that matches on all IPv6 traffic.
ACOS(config)# ipv6 access-list dnslist
ACOS(config-access-list:dnslist)# exit
The following commands configure an IPv6 NAT pool and an IPv4 NAT pool.
NOTE: The IPv6 NAT pool enables the DNS VIP to reach the local IPv6
DNS server. The IPv4 NAT pool enables the DNS VIP to reach the
local IPv4 DNS server.
This command creates the template and changes the CLI to the configuration level for the
template.
The dns64 command enables the DNS64 feature. For more information about the options, see
DNS Template Options for DNS64.
Scenario 1 - ACOS Device Provides DNS64 for IPv4 Local DNS Server
1. The following commands add a real server configuration for the IPv4 local DNS server:
ACOS(config)# cgnv6 server localdns-rs 10.20.32.10
112
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
2. The following commands add the real server to a UDP service group.
ACOS(config)# cgnv6 service-group dns53 udp
3. The following commands add the VIP that will receive DNS requests from IPv6 clients.
ACOS(config)# cgnv6 dns64-virtualserver vs1 3142::200
Scenario 2 - ACOS Device Provides DNS64 for IPv6 Local DNS Server
1. The following commands add a real server configuration for the IPv6 local DNS server:
ACOS(config)# cgnv6 server localdns-rs 4629::1000
2. The following commands add the real server to a UDP service group:
ACOS(config)# cgnv6 service-group dns53 udp
3. The following commands add the VIP that will receive DNS requests from IPv6 clients:
ACOS(config)# cgnv6 dns64-virtualserver vs1 3142::200
113
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Scenario3 - ACOS Device Provides DNS64 for IPv6 and IPv4 Local DNS Servers
The following commands configure the DNS64 and NAT64 deployment shown in this figure.
1. The following commands configure an IPv6 ACL that matches on all IPv6 traffic.
ACOS(config)# ipv6 access-list dnslist
ACOS(config-access-list:dnslist)# exit
2. The following commands configure an IPv6 NAT pool and an IPv4 NAT pool.
NOTE: The IPv6 NAT pool enables the DNS VIP to reach the local
IPv6 DNS server. The IPv4 NAT pool enables the DNS VIP to
reach the local IPv4 DNS server.
3. The following commands add a real server configuration for each local DNS server.
ACOS(config)# cgnv6 server localdns-rs1 4629::1000
4. The following commands add the real servers to a UDP service group.
ACOS(config)# cgnv6 server localdns-rs2 10.20.32.10
5. The following commands add the real servers to a UDP service group.
114
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
6. The following commands add the VIP that will receive DNS requests from IPv6 clients.
ACOS(config)# cgnv6 dns64-virtualserver vs1 3142::200
Optionally, you also can configure DNS64 override policies for specific clients. (See Override
DNS64 Settings for Specific Clients.)
Configuring NAT64
1. Configure a NAT pool (or group of pools) that contains the IPv4 address(es) to use for
NATting traffic from IPv6 clients to IPv4 servers by completing the following tasks:
l To create a LSN pool, navigate to CGN > LSN > LSN Pools.
l To create a LSN pool group, navigate to CGN > LSN > LSN Pool Groups.
2. To configure a Limit ID (LID) and add the pool or pool group to the LID, navigate to CGN
> LSN > LSN-LID.
3. To import or configure a class list that matches on IPv6 client addresses and map the
addresses to the LID, navigate to CGN > LSN > Class List.
4. To configure the NAT64 prefix, navigate to CGN > NAT64.
115
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
5. To bind the class-list to the NAT64 feature, navigate to CGN >> NAT64.
6. Navigate to CGN >>LSN >> Interfaces to enable one of the following options:
l Inside NAT on the interface that is connected to the internal clients.
l Outside NAT on the interface connected to the Internet.
Repeat this command for the NAT64 prefixes to be applied to the same class-list.
Multiple Prefixes
Example 1
This example shows multiple NAT64 prefixes associated with a single class list.
ACOS(config)# cgnv6 nat64 inside source class-list list1
ACOS(config)# cgnv6 nat64 prefix 2012:1::/96
ACOS(config)# cgnv6 nat64 prefix 2012:2::/96
ACOS(config)# cgnv6 nat64 prefix 2012:3::/96
Example 2
This example shows multiple NAT64 prefixes associated with different class lists.
ACOS(config)# cgnv6 nat64 prefix 2012:1::/96 class-list 1
ACOS(config)# cgnv6 nat64 prefix 2012:2::/96 class-list 2
ACOS(config)# cgnv6 nat64 prefix 2012:3::/96 class-list 3
Example 3
Example 3 is a mixed case: some NAT64 prefixes are bound to a single class list, and other
prefixes are individually bound to different class lists.
116
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Enter the following command to configure the IPv4 source NAT pool:
ACOS(config)# cgnv6 nat pool pool1 10.1.1.1 10.1.1.1 netmask /24
The maximum number of NAT IPs that can be configured in a single NAT pool is 4096 IPs.
Configuring a class-list
This step configures a class list that matches on IPv6 client addresses and maps them to the
LID.
If you enter a list name, ACOS will add the list to the running-config. If the list is large,
you can enter a filename with the file option to save the list to a file. In this case, the
list entires are not displayed in the running-config.
117
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Enter the following command to bind the class list to the NAT64 feature:
ACOS(config-class-list)# cgnv6 nat64 inside source class-list NAT64_CLIENTS
Enabling IPv6 Inside NAT on the Interface Connected to the IPv6 Clients
The following commands configure the IPv6 interface connected to the IPv6 clients:
ACOS(config)# interface ve 2
Enabling IPv4 Outside NAT on the Interface Connected to the IPv4 Internet
The following commands configure the IPv4 interface connected to the IPv4 Internet:
ACOS(config-if:ve2)# interface ve 3
ACOS NAT64 translation is enhanced to prevent translated IPv4 packets from being blocked
during IPv4 identification checking on security devices. The following command is added to
the CLI:
ACOS(config)# cgnv6 nat64 force-non-zero-ipv4-id all
This command enables a non-zero Identification field in the IPv4 packet header to be set if
there is no IPv6 fragment header.
This applies for packet sizes greater than 88 bytes and less than or equal to 1280 bytes. The
all option enables this behavior for packets of all sizes. This is disabled by default.
118
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
119
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
CLI Output
ACOS(config-lsn-rule-list)# ip 6.6.6.100/32
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# default
ACOS(config-lsn-lid)# exit
2. To change the one-to-one NAT mappings timeout value, enter the following commands:
ACOS(config)# cgnv6 one-to-one mapping-timeout20
Logging
You can enable logging for one-to-one NAT64 using the following command:
120
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
The logging can be enabled for one-to-one NAT64 only. The log format supported are CEF,
ASCII, Compact, and RFC5424.
For enabling one-to-one NAT64 logging and viewing the log samples, see Traffic Logging
Guide.
To configure them using the CLI, see the syntax information in these sections.
l Enter the following command to enable NAT64 ALG support for the ESP protocol:
ACOS(config)# cgnv6 nat64 alg esp enable
l Enter the following command to enable NAT64 ALG support for ESP protocol and only
these ESP traffic which have IKE traffic can pass through ACOS
121
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
l Enter the following command to disable NAT 64 ALG support for the FTP protocol:
ACOS (config) # cgnv6 nat64 alg ftp disable
NAT64 ALG support for FTP protocol is enabled by default, and it supports the following addi-
tional options:
NOTE: NAT64 ALG support for FTP and TFTP is enabled by default.
l Enter the following command to enable NAT64 ALG support for H.323 protocol:
ACOS(config)# cgnv6 nat64 alg h323 enable
l Enter the following command to enable NAT64 ALG support for mgcp protocol:
l Enter the following command to enable NAT64 ALG support for PPTP protocol:
ACOS(config)# cgnv6 nat64 alg pptp enable
l Enter the following command to enable NAT64 ALG support for RTSP protocol:
ACOS(config)# cgnv6 nat64 alg rtsp enable
l Enter the following command to enable NAT64 ALG support for SIP protocol:
ACOS(config)# cgnv6 nat64 alg sip enable
l Enter the following command to enable NAT64 ALG support for TFTP protocol:
ACOS(config)# cgnv6 nat64 alg tftp enable
SIP Support
SIP ALG is disabled by default. You can enable it separately for LSN, NAT64, and DS-Lite.
When SIP ALG support is enabled, ACOS creates full-cone sessions to establish NAT mappings
for SIP clients, and performs the necessary IP address translations in the SIP packet headers.
122
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
The full-cone sessions are created for the SIP Contact port and the Real-time Transport Pro-
tocol (RTP)/Real-time Control Protocol (RTCP) port.
STUN Timeout
For SIP Contact NAT mappings, the corresponding full-cone session’s Session Traversal Util-
ities for NAT (STUN) timeout is set to the “Expires” value in the SIP Registration packet’s pay-
load.
For SIP RTP/RTCP NAT mappings, the corresponding full-cone session’s STUN timeout is con-
figurable. The RTP/RTSP STUN timeout can be 2-10 minutes. The default is 5 minutes.
Enter the following command to change the RTP/RTCP STUN timeout for full-cone sessions
used for SIP NAT mappings:
ACOS(config)# cgnv6 lsn alg sip rtp-stun-timeout 5
To change NAT64 fragmentation settings, enter the commands described in this section.
l The df-set send-icmp option enables sending of ICMP unreachable messages for
inbound fragmented packets, and disallows overriding the Don’t Fragment bit.
l The drop option drops inbound fragmented packets.
l The ipv6 option enables fragmentation support for inbound IPv6 packets.
l The df-set option disallows override of the Don’t Fragment bit.
123
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Enter the following command to change the fragment timeout for IPv4:
ACOS(config)# ip frag timeout 100
Enter the following command to change the fragment timeout for IPv6:
ACOS(config)# ipv6 frag timeout 100
You can specify the maximum number of simultaneous fragmentation sessions ACOS will
allow. The specified maximum applies to both IPv4 and IPv6.
l ACOS supports IPv6 packets that contain special fragment headers, and that have the
more-fragments bit set to zero and the fragmentation-offset set to zero.
124
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
l In the IPv4-to-IPv6 direction, insertion of headers that have the more-fragments bit set
to zero and the fragmentation-offset set to zero is disabled by default. You enable inser-
tion of these headers for NAT64. In this case, the headers are inserted when the IPv4
Don’t Fragment bit is not set.
l Enter the following command to enable insertion of headers that have the more-frag-
ments bit set to zero and the fragmentation-offset set to zero:
You can set TCP MSS clamping for NAT64 to be performed using one of the following meth-
ods:
l Subtract – ACOS reduces the MSS if it is longer than the specified number of bytes.
The subtract method of MSS clamping is used by default, with the following values:
o S = 20 bytes
o N = 476 bytes
Using these values, the default MSS clamping calculations are as follows:
125
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Enter the following command to change the MSS clamping method for NAT64 to a fixed max-
imum value of 22:
ACOS(config)# cgnv6 nat64 tcp mss-clamp fixed 22
By default, if ACOS receives an invalid TCP packet from the inside network, ACOS sends a
TCP reset for the host session. Optionally, you can disable TCP resets from being sent in this
situation.
Enter the following command to disable TCP resets in response to invalid TCP packet from
the inside network:
ACOS(config)# cgnv6 nat64 tcp reset-on-error outbound disable
ACOS can send ICMP Unreachable messages in one of the following cases:
By default, ACOS sends code type 3, code 13, administratively filtered, when a configured
user quota is exceeded. Sending of ICMP Unreachable messages when no NAT ports are avail-
able for mappings is disabled by default.
Enter the following command to send ICMP on port unavailable with code type 3 and code 13,
administratively filtered:
ACOS(config)# cgnv6 lsn icmp send-on-port-unavailable admin-filtered
Enter the following command to send ICMP on quota exceeded with code type 3 and code 13,
administratively filtered:
ACOS(config)# cgnv6 lsn icmp send-on-user-quota-exceeded admin-filtered
126
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
You can override the DNS64 settings for specific clients, with the following override actions:
l Disable – Does not perform DNS64 processing on the client’s DNS request. The client’s
request is forwarded to the DNS server, and the reply is sent to client without modi-
fication.
l Different prefix – Uses a different NAT64 prefix to synthesize IPv6 addresses in the
reply to the client. You can use this option to load balance NAT64 service across mul-
tiple ACOS devices.
l Exclude answer – Drops AAAA replies that contain specific IPv6 addresses or prefixes.
In this case, ACOS sends an A query on behalf of the client, then uses DNS64 to add syn-
thesized IPv6 addresses in the reply before sending the reply to the client.
1. Configure a class list that specifies the IPv6 addresses or prefixes on which to perform
the override action.
l For the disable or different prefix actions, the class list specifies IPv6 clients.
l For the exclude answer action, the class list specifies the invalid server IPv6
addresses to disallow.
In the class-list entry, specify the GLID or LID that specifies the override action to
apply to the matching addresses. (See the next step.)
2. Configure a policy template that refers to the class list.
127
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
3. Configure either a GLID, or a LID in a policy template, to specify the override action.
4. Bind the policy template to the DNS virtual port on the DNS server VIP.
The following sections describe the syntax for each step. For configuration examples, see
Override of DNS64 Setting Examples.
Enter the following command to configure a class list that specifies IPv6 addresses or pre-
fixes on which to perform an override action:
ACOS(config)# class-list list1
Enter the following command to add an entry that maps matching IPv6 addresses to a LID:
ACOS(config-class list)# 2001:db8::/64 lsn-lid 2
This command changes the CLI to the configuration level for the policy template.
At this level, enter the following command to specify the class list in the policy template:
ACOS(config-policy)# class-list list1
Enter the following command to use a LID at this configuration level to specify the override
action:
ACOS(config-policy-class-list:list1))# lid 1
ACOS(config-policy-class-list:list1-lid:1)# dns64 exclusive-answer
NOTE: If you plan to use a GLID to specify the override action, use this
section.
128
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
At this level, enter the following command to specify the override action to drop AAAA
replies that contain specific IPv6 addresses or prefixes:
ACOS(config-glid:22)# dns64 exclusive-answer
Enter the following command to bind the policy template to the DNS VIP’s virtual port:
ACOS(config-cgnv6 dnsvserver-vport)# template policy p1
This command is entered at the configuration level for the virtual port.
129
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
FIGURE 2-2: NAT64 Load Balancing Using the Prefix Override Option
NOTE: This solution requires routes on the client gateway to direct client
requests to one ACOS device or the other, based on the syn-
thesized IPv6 server address to which the client sends the
requests.
In this example, each ACOS device provides NAT64 for different NAT64 prefixes:
l ACOS-1 provides NAT64 for client requests to synthesized IPv6 server addresses with
NAT64 prefix 64:aaaa::/96.
l ACOS-2 provides NAT64 for client requests to synthesized IPv6 server addresses with
NAT64 prefix 64:bbbb::/96.
130
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
The client’s initial DNS request can go to either ACOS device. The ACOS device that receives
the initial client request checks the class list in the policy template bound to the DNS virtual
port to see whether the client’s IP address matches the class list.
l If the client does not match the class list, the configured DNS64 prefix is used.
l If the client matches the class list, the override DNS64 prefix in the GLID is used
instead.
When the client sends a request to the synthesized IPv6 server address, the route table on
the client’s gateway routes the request to a specific ACOS device, either ACOS-1 or ACOS-2,
based on the synthesized IPv6 address. The ACOS device to which the client gateway routes
this request is the ACOS device that will provide NAT64 for the client, enabling it to reach the
IPv4 server.
The following procedure describes how NAT64 load balancing is performed for a specific cli-
ent request (FIGURE 2-2):
1. IPv6 client 2001:6b8::55 sends a DNS request for the IPv6 address of site www.ex-
ample.edu.
2. Request arrives at the carrier network, and is sent to one of the ACOS devices.
The initial request can be routed to either ACOS device. In this case, the request is sent
to ACOS-2.
3. Client’s IP address matches the class list that is bound to the DNS virtual port.
Therefore, ACOS-2 uses the prefix in the GLID that is mapped to the client’s IP address
in the class list, to synthesize IPv6 addresses to replace the IPv4 addresses in the reply
to the client’s DNS request. The synthesized address is 64:aaaa::c0a8:10a.
4. ACOS-2 sends the modified reply to the client.
5. Client sends request to 64:aaaa::c0a8:10a.
6. Client’s gateway routes the request to ACOS-1, based on the destination IPv6 prefix.
7. ACOS-1 provides NAT64 service for the client, which enables the client to communicate
with the IPv4 server.
131
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
Commands on ACOS-1
NOTE: The NAT64 prefix is different on each ACOS device. For brevity,
the rest of the standard NAT64 / DNS64 configuration is not
shown.
The following commands bind the policy template to the DNS virtual port on the DNS server
VIP:
ACOS(config)# cgnv6 dns64-virtualserver dns1 3142::cafe:6
ACOS(config-cgnv6 dnsvserver)# port 53 dns-udp
ACOS(config-cgnv6 dnsvserver-vport)# template policy prefix
Commands on ACOS-2
132
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
This section shows configuration examples for the following DNS64 override actions:
(For information about DNS64 override actions, see Override DNS64 Settings for Specific Cli-
ents.)
NOTE: For simplicity, these examples focus only on the configuration for
the override options and do not include the DNS64 or NAT64 con-
figuration.
Likewise, these examples use GLIDs to specify the override actions. If you prefer, you can spe-
cify the override actions in LIDs in the policy template instead.
The commands in this section disable DNS64 for IPv6 clients with prefix 3142::/64.
The following commands bind the policy template to the DNS virtual port on the DNS server
VIP:
133
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
The commands in this section reject AAAA replies that have any IPv6 address in the ANSWER
section with prefix 2001:470::/32.
The following commands bind the policy template to the DNS virtual port on the DNS server
VIP:
ACOS(config)# cgnv6 dns64-virtualserver local1 3142::cafe:5
ACOS(config-cgnv6 vserver)# port 53 dns-udp
ACOS(config-cgnv6 vserver-vport)# template policy exclusive
>Inside IPv4 Address Inside IPv6 Address NAT Address Sessions Age Pool
134
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
----------------------------------------------------------------------------
------------------------
l To display one-to-one NAT mappings for a specific IPv6 inside address, enter the fol-
lowing commands:
ACOS(config)# show cgnv6 one-to-one mappings inside-address-ipv62001:300::40
This option filters the mappings that match the specified inside ipv6 address that will
be cleared.
135
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 2: NAT64 / DNS64 Feedback
l To display one-to-one NAT mappings for a specific IPv6 inside address, enter the fol-
lowing commands:
ACOS# show cgnv6 one-to-one mappings inside-address-ipv62001:300::40
l Enter the following command to display configuration information for NAT64 ALG:
ACOS# show cgnv6 nat64 alg espconfig
Statistics are shown for ALG sessions for LSN, NAT64, and DS-Lite, as applicable.
For a detailed list of the sub-options available to each of these commands, see the Command
Line Interface Reference for CGN.
136
Chapter 3: Dual-Stack Lite
This chapter describes Dual-Stack Lite (DS-Lite) and how to configure it.
l DS-Lite is based on RFC 6333, Dual-Stack Lite Broadband Deployments Following IPv4
Exhaustion.
DS-Lite also uses CGN standards for the NAT component. (See Large Scale Network
Address Translation.)
l For information about matching and traffic handling based on destination, see Destin-
ation Based NAT.
l For information about logging, see the Traffic Logging Guide for IPv6 Migration.
Also described in the Logging Guide is Fixed-NAT. Fixed-NAT is a log optimization fea-
ture that allocates NAT ports for each client from a predetermined (“fixed”) set of ports
on the NAT address. For information, see the Traffic Logging Guide for IPv6 Migration.
Overview 138
137
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
Overview
Dual-Stack Lite (DS-Lite) is a Network Address Translation (NAT) feature that enables the
ACOS device to act as an end-point for IPv4 traffic tunneled through an IPv6 link.
Dual-Stack refers to the IP stacks for both IP versions, IPv4 and IPv6. Lite refers to the fact
that this IPv4-IPv6 solution, which encapsulates IPv4 traffic in an IPv6 tunnel, is less complex
than solutions that translate traffic between IPv4 and IPv6. DS-Lite can be used with Large
Scale NAT (LSN) to provide NAT for large numbers of IPv4 clients that need NAT to reach IPv4
servers. FIGURE 3-1 shows an example of a DS-Lite deployment.
In this deployment, an Internet carrier has an IPv6 network but uses DS-Lite to extend IPv4
as a service to its clients. Each client has a router that supports DS-Lite functionalities. Each
client’s DS-Lite router provides one end-point of the IPv6 tunnel through the carrier’s
138
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
network. The DS-Lite router encapsulates IPv4 traffic from the client in IPv6 packets and
sends the IPv6 packets over the tunnel. The DS-Lite router decapsulates IPv4 traffic received
over the tunnel before sending it to the client.
The ACOS device provides Address Family Transition Router (AFTR) functions for DS-Lite. The
ACOS device decapsulates traffic exposing the client IPv4 address and translates the source
IPv4 address using similar techniques as NAT44. The ACOS device encapsulates IPv4 traffic
in IPv6 packets before sending the traffic over the tunnel to the client.
The tunnel endpoint on the ACOS device can be an Ethernet data interface loop-back
address or a VRRP-A floating IP address.
Fragmentation Support
Fragmentation is allowed for packets that are larger than the Maximum Transmission Unit
(MTU) of the inbound or outbound ACOS interface.
By default, DS-Lite disregards the Don’t Fragment bit in IPv4 packets that are destined for
the IPv4 network, and in IPv6 tunnel packets. In either case, DS-Lite fragments the packet
and does not send an ICMP unreachable message. You can also configure DS-Lite to send an
ICMP unreachable message instead and to not fragment the packet.
The maximum interval allowed between fragments is configurable. The maximum number of
simultaneous fragmentation sessions the ACOS device will allow also is configurable. (See
Configuring Fragmentation Options.)
139
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
DS-Lite provides Application Level Gateway (ALG) support for the following protocols:
ALG support for FTP is enabled by default, and ALG support for the other protocols is dis-
abled by default.
l If you are upgrading from legacy releases, ALG support for protocols other than FTP
needs to be enabled explicitly in the configuration.
l When full-cone support is enabled for well-known ports, ALG support for TFTP still
works even if TFTP ALG support is disabled.
l Session synchronization is not supported for ESP.
Configuring DS-Lite
You can configure DS-Lite by using the GUI or the CLI.
1. To configure NAT pools, navigate to CGN > LSN > LSN Pools
2. Optionally, to configure NAT pool groups, navigate to CGN > LSN > LSN Pool Groups
3. To configure Limit IDs (LIDs), navigate to CGN > LSN > LSN LID.
For each LID, specify the NAT pool to use. Optionally, you can set user quotas for the
LID.
140
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
4. To import or configure class lists for the user subnets that require DS-Lite, navigate to
CGN > LSN > Class Lists.
A class list is a list of internal subnets or hosts. In a class list, you can bind each internal
subnet to an individual LID.
5. To bind a class-list to the DS-Lite feature, navigate to CGN > LSN > Global and select
the Class List from the Class List Binding drop-down list.
The class lists will apply to packets from the inside NAT interface to the outside NAT
interface. There can be at most 1 class list used for this purpose.
6. To enable inside NAT on the interface connected (through the carrier’s IPv6 network) to
IPv4 clients, navigate to CGN > LSN >Interface.
You can use the same menu path to enable outside NAT on the interface connected to
the IPv4 Internet.
141
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
2. Enter the following command to binds a DS-Lite (or LSN) NAT pool to the LID:
ACOS(config-lsn-lid)# source-nat-pool dslite0
3. Enter the following command to configure the IPv6 per-user mapping quota for each
type of protocol supported for LSN (TCP, UDP, or ICMP):
ACOS(config-lsn-lid)# user-quota tco 100
Use the reserve option to specify how many ports to reserve on a NAT IP for each user,
if desired. If no value is specified, the reserve value is the same as the user-quota value.
NOTE: The user quote applies only to client IPv6 source addresses.
Configure the Class List for User Subnets that Require DS-Lite
A class list is a list of internal subnets or hosts. In a class list, you can bind each internal sub-
net to an individual LID.
Enter the following commands configure a class list to bind the client IPv6 addresses (the
IPv6 addresses of the client DS-Lite routers) to the LID:
ACOS(config)# class-list dslite
Enter the following command to bind the class list so that the list can be used with DS-List:
ACOS(config)# cgnv6 ds-lite inside source class-list dslite
142
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
ACOS(config-if:ethernet:1)# exit
ACOS(config-if:ethernet:2)# exit
Configure a class list that contains the inside client IPv4 subnets or hosts that will be per-
mitted to be NATed. Each entry must consist only of an IPv4 address and the mask length. In
this example, the first entry permits any client in the 10.10.20.x /24 subnet. The second entry
permits host 10.10.10.101. The following commands configure a class list to specify the inside
IPv4 client addresses to allow to be NATed.
ACOS(config)# class-list client-permit
The following commands access the configuration level for the LSN LID used by DS-Lite, and
enable client IPv4 filtering using the class list:
ACOS(config)# cgnv6 lsn-lid 1
Optional Configurations
This following topics are covered:
143
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
ACOS allows you to adjust the system capacities for various resources, including the fol-
lowing resources that are critical to DS-Lite operation:
l Layer 4 sessions
l IP NAT pool addresses
The default maximum number allowed for these resources varies depending on your Thunder
Series model (your ACOS device). To display the maximum for your ACOS device, use the show
system resource-usage command.
Here is an example:
ACOS# show system resource-usage
Resource Current Default Minimum Maximum
--------------------------------------------------------------------------
l4-session-count 33554432 33554432 8388608 134217728
...
The Current column shows the maximum number currently allowed on the system. The
default column shows the default maximum allowed.
144
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
Enter the following command to change the maximum number of Layer 4 sessions that are
allowed on the system:
ACOS(config)# system resource-usage l4-session-count 134217728
The maximum value can be any value in the range between the values in the Minimum and
Maximum columns in the show system resource-usage output.
NOTE: To place a system resource change into effect, reboot the ACOS
device.
Enter the following command to configure static mappings for a range of protocol ports for
an IPv4 address:
The following command maps ports 80-100 on inside IP address 10.10.10.100 behind
2001:10::100 to 80-100 on NAT IP address 172.7.7.30. In this example, 2001:10::1 is the tunnel
destination, which is the floating IP address on the ACOS device.
ACOS(config)# cgnv6 ds-lite port-reservation inside 2001:10::100 2001:db9::2:10
10.10.10.10 80 100 nat 192.168.210.45 80 100
The following command maps port 80 on the inside client to port 8080 on the NAT IP address:
ACOS(config)# cgnv6 ds-lite port-reservation inside 2001:10::8080 2001:db9::2:10
10.10.10.10 80 100 nat 192.168.210.45 80 100
By default, full-cone support is disabled for all ports. To enable full-cone support for these
sessions, see Configuring Endpoint-Independent Filtering and Mapping.
145
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
Enter the following command to enable or disable ALG support for a protocol in DS-Lite:
ACOS(config)# cgnv6 ds-lite alg ftp disable
SIP ALG is disabled by default. You can enable it separately for LSN, NAT64, and DS-Lite.
When SIP ALG support is enabled, the ACOS device creates full-cone sessions to establish
NAT mappings for SIP clients, and performs the necessary IP address translations in the SIP
packet headers. The full-cone sessions are created for the SIP Contact port and the Real-time
Transport Protocol (RTP)/Real-time Control Protocol (RTCP) port.
Session lifetime and full-cone session lifetime are also snooped from registration packets to
ensure sessions are not dropped while valid registration exists.
STUN Timeout
For SIP Contact NAT mappings, the corresponding full-cone session’s Session Traversal Util-
ities for NAT (STUN) timeout is set to the “Expires” value in the SIP Registration packet’s pay-
load.
For SIP RTP/RTCP NAT mappings, the corresponding full-cone session’s STUN timeout is con-
figurable. The RTP/RTSP STUN timeout can be 2-10 minutes. The default is 5 minutes.
To change the RTP/RTCP STUN timeout for full-cone sessions used for SIP NAT mappings, use
the following command at the global configuration level of the CLI:
ACOS(config)# cgnv6 lsn alg sip rtp-stun-timeout 5
To change DS-Lite fragmentation settings, use the commands described in this section.
146
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
The inbound | outbound option specifies the traffic direction. The inbound option applies to
packets received on an ACOS interface. The outbound option applies to packets to be for-
warded on an ACOS interface.
The ipv4 option overrides the Don’t Fragment bit for IPv4 packets destined for the IPv4 net-
work. Likewise, the ipv6 option overrides the Don’t Fragment bit for IPv6 tunnel packets.
With either option, DS-Lite does not send ICMP unreachable messages. Both the ipv4 and
ipv6 options are enabled by default.
You can specify the maximum number of simultaneous fragmentation sessions the ACOS
device will allow. The specified maximum applies to both IPv4 and IPv6.
The TCP maximum segment size (MSS) specifies the maximum length, in bytes, of data that
one SYN or SYN-ACK packet in a TCP connection can have. The MSS does not include the TCP
or IP header.
147
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
Initially, the MSS is set by the IPv4 client in the SYN packet that the client sends to its DS-
Lite router as part of the 3-way handshake to establish the TCP connection to a server. The
MSS value that is set by the client allows room for IPv4 and TCP headers. However, the IPv4
client typically does not also allow room for an IPv6 header.
On the ACOS device, DS-Lite must ensure that the server replies that are sent by the ACOS
device onto the IPv6 tunnel to the client will have enough room for the data placed in the
packet by the server. To verify the amount of room, DS-Lite checks the MSS value and, if
necessary, changes it before sending the NATted request to the server. This process is called
MSS clamping.
The subtract method of MSS clamping is used by default, with the following values:
o S = 40 bytes
o N = 416 bytes
Using these values, the default MSS clamping calculations are as follows:
o If MSS minus 40 is greater than 416, subtract 40 from the MSS.
o If MSS minus 40 is less than or equal to 416, set the MSS to 416.
148
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
Enter the following command to disable TCP resets in response to invalid TCP packet from
the inside network:
ACOS(config)# cgnv6 ds-lite tcp reset-on-error outbound disable
By default, the ACOS device sends code type 3, code 13, administratively filtered when a con-
figured user quota is exceeded. Sending of ICMP Unreachable messages when no NAT ports
are available for mappings is disabled by default.
Enter the following command to change the behavior for either condition:
ACOS(config)# cgnv6 lsn icmp send-on-port-unavailable disable
As part of handling DS-Lite traffic, the ACOS device verifies the IP and Layer 4 checksums
for IP packets encapsulated in the DS-Lite tunnel. You can specify the ACOS behavior when it
detects an invalid IP or Layer 4 checksum in DS-Lite tunneled IP traffic.
For each type of checksum, you can specify one of the following behaviors:
149
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
Layer 4 checksum handling applies to TCP, UDP, and ICMP packets encapsulated in a DS-Lite
tunnel. Likewise, IP checksum handling applies to IPv4 packets encapsulated in a DS-Lite tun-
nel.
The default handling for IP checksum errors is to drop the packets. For Layer checksum
errors, the default action is to propagate the packet.
l Enter the following command to configure ACOS handling of tunneled IPv4 traffic that
has an invalid IPv4 checksum:
l Enter the following command to configure ACOS handling of tunneled IPv4 traffic that
has an invalid TCP, UDP, or ICMP Layer 4 checksum:
ACOS(config)# cgnv6 ds-lite l4-checksum-error propagate
ACOS allows the ACOS device to ping a client that is located behind Customer Premises
Equipment (CPE) over a DS-Lite Tunnel. FIGURE 3-2 shows an example.
150
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
The blue arrow in FIGURE 3-2 shows the ACOS device sending a ping packet over a DS-Lite
tunnel, through the CPE equipment at the end-user’s home, to the client at the other end.
This example relates to FIGURE 3-2. The following command is used to send 10 ping packets
over a DS-Lite tunnel. The packets will have an IPv6 source address of 3001::1 and an IPv4
source address of 5.5.5.1. The remote client has an IP of 4.4.4.50.
You can also specify the IPv4 or IPv6 source address from which the ping packet(s) are gen-
erated. By default, the source IP will be the Ethernet interface from which the ping is sent.
NOTE: Additional ping options, such as flood, data, and repeat are sup-
ported, but they must be specified in the CLI syntax before the
ds-lite keyword.
l Enter the following command to display currently active user quota sessions:
ACOS# show cgnv6 ds-lite user-quota-sessions
151
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 3: Dual-Stack Lite Feedback
l Enter the following command to display global statistics that are related to DS-Lite:
ACOS# show cgnv6 ds-lite statistics
152
Chapter 4: Port Batching
This chapter describes port batching and explains how to configure port batching v1 and v2.
Overview 154
153
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
Overview
Port Batching is an option to reduce the volume of external traffic logs for IPv6 migration fea-
tures. By allocating a set of multiple ports to the client during session initiation, Port Batch-
ing reduces the amount of data created by the ACOS device's logging features. Only a single
log message is generated for the batch of ports.
Each time LSN allocates a port mapping for a client, a log message is generated. Port batch-
ing reduces logging by allocating a set of multiple ports to the client at the same time, and
generating one log message for the batch of ports. When a port batch is assigned, a log mes-
sage is generated. Similarly, when a port batch is freed, another log message is generated.
l If a subscriber’s connections are fewer than the number of ports in a batch, then only
one port batch is assigned.
l A new port batch is assigned only if all ports in the allocated port batches are depleted.
l A port batch can be freed only if all ports in a batch are freed.
This section describes the differences between Port Batching v1 and v2.
In Port Batching v1, the ports in a batch are separated by a constant interval, for
example, 1024, 1029, 1034, 1039. Depending on the data CPU size, the interval is dif-
ferent on different platforms.
In Port Batching v2, contiguous port batch assignment is supported, for example,
1024,1025,1026,1027.
154
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
Prerequisites
l After upgrading to the current release, users currently using Port Batching v1 can con-
tinue to use v1. port-batch-v1 is enabled automatically from startup-config if port-
batch-v1 configurations are detected.
However, it is strongly recommended that users plan on migrating to v2 for better per-
formance.
New users must explicitly use the cgnv6 enable-port-batch-v1 command to enable
Port Batching v1 manually, prior to configuring any of the following:
l Port-batching size,
l Port-overloading, and
l NAT Pool configurations.
Port Batching v1
Port batching v1 is disabled by default. When you enable Port Batching v1, you can specify
the number of ports to allocate in each batch.
l 1
l 8
l 16
155
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
l 32
l 64
l 128
l 256
l 512
NOTE: Port Batching requires CPU resources and can increase CPU util-
ization; for example, you may experience significant delays if you
allocate 1 port for very large NAT pools. Be sure to plan accord-
ingly when you configure port batching.
The Port Batching option sets the wait time for TCP port reuse. The wait time specifies how
many minutes the ACOS device waits after a TCP port allocated as part of Port Batching
becomes free, before re-allocating that port to another user in a new port batch. You can set
the wait time to 0-10 minutes. The default is 2. If you set the wait time to 0, ports can imme-
diately be reused.
Prerequisite
Use the cgnv6 enable-port-batch-v1 command to explicitly enable Port Batching v1 if there
is no pre-exisitng port-batch-v1 configuration in your deployment.
156
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
To configure Port Batching v1, enter the following commands at the global configuration
level:
ACOS(config)# cgnv6 enable-port-batch-v1
Port Batching V2
Port batches can be created in NAT pools using Large Scale Nat (LSN). This allows ACOS to
assign port batches contiguously and increases the maximum configurable port batch size.
The port range can be configured for the NAT pool and then configure up to 4096 ports per
port batch. If a subscriber’s connections are fewer than the number of ports in a batch, then
only one port batch will be assigned. The only exception is when ALG connections need two
consecutive ports in a batch, but the subscriber does not have two consecutive ports in any
given batch. In that case, a new port batch will be assigned to the subscriber.
NOTE: To change the port batch size, all of the current configuration
must be deleted, and all existing sessions need to be cleared first.
To support contiguous port batch assignments, NAT port ranges will be configurable within a
NAT pool. In both the cases of a port batch and of a NAT pool, a warning log will be generated
when a configurable usage threshold is reached. A log is generated when a port batch is alloc-
ated, and another log is generated when the port batch is freed. In the case that a session cre-
ation fails, the port batch allocation message will be immediately followed by a port batch
freed log.
To configure Port Batching v2 in a NAT pool in the CLI, enter the following commands at the
global configuration level:
ACOS(config)# cgnv6 nat pool lsn 198.51.100.1 198.51.100.254 netmask /24 port-
batch-v2-size 64 usable-nat-ports 1024 2000
157
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
ACOS(config-lsn-lid)# exit
To display logging information for IP NAT pool port batching, enter one of the following show
commands:
ACOS# show cgnv6 logging keywords lsn port-batch-v2-allocated
NOTE:
l This feature is only supported in Port Batch version 2,
added in release 2.8.2-P1. The original Port Batching fea-
ture only assigns one protocol port batch at a time.
l Only a single log message will be generated when both
the TCP and the UDP port batch are allocated together.
This feature is configured at the IP NAT Pool configuration level. Port Batch version 2 must
also be enabled for this feature to take effect. A new option, following in the configuration of
Port Batch version 2, is added in the CLI. When configuring Port Batch version 2, enter the
“simultaneous-tcp-udp-batch-allocation” option at the end of the command before committing the
configuration to enable TCP and UDP port batches, like below:
158
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
ACOS(config)# cgnv6 nat pool lsn 198.51.100.1 198.51.100.254 netmask /24 port-batch-v2-
size 64 simultaneous-batch-allocation
Configuration Example
The following configuration example configures an IP NAT pool named “portbatch2” and
enables Port Batch v2, as well as simultaneous TCP and UDP port batch allocation. The IP NAT
pool is added to an LSN LID 1. The LSN LID is then added to a class list called “portbatchlist”,
which is then applied to the IP NAT inside.
ACOS(config)# cgnv6 nat pool portbatch2 198.51.100.1 198.51.100.254 netmask /24
port-batch-v2-size 64 simultaneous-batch-allocation
ACOS(config-lsn-lid)# exit
The interim log messages follow the same log format as the “port batch allocated” log. The
only fields that change between interim logs are the uploaded and downloaded bytes field,
and the duration for which the port batch is allocated to the subscriber. The uploaded and
downloaded bytes display the aggregate amount of traffic that is served by the port batch
since the port batch was first allocated. Since these numbers are aggregated, they do not dis-
play traffic information for each individual session within a port batch.
NOTE: If interim updates are enabled after a port batch has been cre-
ated, then there will not be interim logs for that port batch.
Interim logs will only be generated for port batches created after
interim updates are enabled.
159
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
By default, the bytes and the duration of port allocation are not included in the logging mes-
sages. To include the port batch upload bytes, download bytes, and the duration in the log-
ging messages, you must configure include-port-block-accountin the logging template.
The port batch upload and download bytes are displayed in the Port Batch v2 Allocated and
Freed messages. The duration of port batch allocated is displayed in the Port Batch v2
Interim-Update and Port Batch Freed messages.
For more information about including the upload and download bytes, and the duration of
port allocation in the log messages, see Traffic Logging Guide.
160
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
Field Description
TCP Port Batch Alloc- Number of TCP-port batches that have been allocated.
ated
Each allocation increments the counter by 1. For example, if
the TCP batch size is 8, each batch of 8 that is allocated is
counted as 1.
TCP Port Batch Freed Number of TCP-port batches that have been freed.
UDP Port Batch Alloc- Number of UDP-port batches that have been allocated.
ated
Each allocation increments the counter by 1. For example, if
the UDP batch size is 8, each batch of 8 that is allocated is
counted as 1.
UDP Port Batch Freed Number of UDP-port batches that have been freed.
2. In the output of the show cgnv6 lsn user-quota-sessions command, each allocated
port is counted individually. For example, if a single batch of 8 TCP ports is allocated to
the user, the count in the TCP column is 8. If a second batch of 8 ports is allocated to a
user, the number of ports listed is 16.
ACOS# show cgnv6 lsn user-quota-sessions
LSN User-Quota Sessions:
Inside Address NAT Address ICMP UDP TCP Session Pool LID Flag
--------------------------------------------------------------------------
----------------
8.8.8.8 15.15.15.15 0 0 1 1 p1 2 -
Total User-Quota Sessions Shown: 1
3. The connection count (Conns column) in show cgnv6 lsn full-cone-sessions output
shows the actual number of connections. For example, user 203.0.113.1:20001 has only
one active TCP connection, even though the user w as allocated a batch of 8 ports. If
the user quota is unusable, "U" is displayed under Flag.
ACOS#show cgnv6 lsn full-cone-sessions
LSN Full Cone Sessions:
Prot Inside Address NAT Address Outbnd Inbnd Pool CPU Age Flags
--------------------------------------------------------------------------
------
TCP 8.8.8.8:50190 15.15.15.15:50190 1 0 p1 1 - -
161
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 4: Port Batching Feedback
162
Chapter 5: Protocol Port Overloading
Overview 164
163
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
Overview
Port overloading allows one NAT mapping resource to be used by more than one flow when
going to different destinations. The same NAT resource can be re-used as long as the con-
figured destination is unique.
Port overloading is useful in cases where NAT resources are limited and the majority of the
traffic is client-server traffic. The same NAT resources can be re-used for different sessions.
When an outbound flow destination port is in the configured range of port overloading ports,
ACOS allocates a NAT port from the NAT pool and marks this NAT port as capable of being
overloaded by other flows. Port overloading starts when all ports are exhausted. Flow to ports
which are not in the range of port overloading-enabled ports will be dropped if all ports are
exhausted.
164
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
In this example, the granularity for port overloading is the IP address and the protocol port. A
flow can use the same NAT IP address and NAT port when going to the same or a different
destination IP address as long as the protocol port is unique. The client can use the same NAT
IP address and NAT port for different flows that are being sent to the same server.
When the destination address and port 2-tuple are unique, CGN port overloading is in effect
by default.
165
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
The following is an example of two sessions overloading to the same NAT resource,
60.1.12.12.1024 is re-used for different sessions:
Udp 61.1.1.107:20000 60.1.1.108:50000 60.1.1.108:50000 60.1.12.12:1024 300 1
NFe0f0r0 LSN
Udp 61.1.1.107:20000 60.1.1.108:50003 60.1.1.108:50003 60.1.12.12:1024 300 4
NFe0f0r0 LSN
166
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
In this example, the granularity for port overloading is the IP address only. The ACOS device
can create more than one mapping for the client and use the same NAT IP address and pro-
tocol port for each mapping.
167
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
The following is an example of two sessions overloading the same NAT resource,
60.1.12.12:1024 is reused for different sessions because 60.1.1.108 is different from 60.1.1.109.
f the second session destination IP is 60.1.1.108, then port overloading is not allowed.
Udp 61.1.1.107:20000 60.1.1.108:50000 60.1.1.108:50000 60.1.12.12:1024 300 1
NFe0f0r0 LSN
Udp 61.1.1.107:20000 60.1.1.109:50003 60.1.1.109:50003 60.1.12.12:1024 300 4
NFe0f0r0 LSN
By default, a port can be overloaded to create multiple mappings only for the same client.
You can also enable ACOS to use the same overloaded port for more than one client.
In case of LSN, when all NAT resources are allocated to the existing users, a new user cannot
access Internet as no NAT resource can be assigned to that user. Configuring allow-dif-
ferent-user enables the new user to use a NAT resource that is allocated to another user.
By default, a port can be overloaded to create multiple mappings only for the same client.
You can also enable ACOS to use the same overloaded port for more than one client. Use the
allow-different-user command to allow a new user the access to NAT resource assigned to
another user.
The following is an example of two sessions overloading the same NAT resource. 61.1.1.107 and
61.1.1.106 are different users, but they share the same NAT resource (60.1.12.12:1024):
Udp 61.1.1.107:20000 60.1.1.108:50000 60.1.1.108:50000 60.1.12.12:1024 300 1
NFe0f0r0 LSN
Udp 61.1.1.106:20000 60.1.1.109:50003 60.1.1.109:50003 60.1.12.12:1024 300 4
NFe0f0r0 LSN
168
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
EIM/EIF Considerations
Since full-cone sessions are created with the outside endpoints being unknown or change-
able over time, the following considerations are important:
l A NAT port used for full-cone sessions cannot be used for port overloading.
l When a destination port resides within the range of ports enabled with port over-
loading, if this NAT port is used in ALGs (SIP/MGCP/h323) to create a full-cone session,
then this port still cannot be used for port overloading.
l Since both port overloading and EIM/EIF are configured based on the destination port,
the range used for port overloading cannot overlap with the range designated for
EIM/EIF.
Limitations
169
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
In this example, Fixed NAT is enabled with port overloading on the UDP destination port 1024
to 1200 and the full-cone configuration is enabled on destination port 1021 to 1300.
Since NAT resources are pre-assigned to inside users, the allow-different-user option is
not applicable to Fixed NAT. However, if a dynamic pool is configured for Fixed NAT, the NAT
resources in the dynamic pool can be used and overloaded by other users.
Dynamic Pool:
170
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
1. Dynamic port range 64512 to 65535 can be used and overloaded by both users, 1.1.1.1
and 1.1.1.2.
2. Port range 1024 to 32767 can only be used and overloaded by user 1.1.1.1.
3. Port range 32768 to 64511 can only be used and overloaded by user 1.1.1.2.
If all NAT ports assigned to an inside user is exhausted, the following occurs:
1. ACOS tries to allocate a NAT port from the dynamic pool, if one is configured.
2. If step 1 fails, port overloading is pushed to NAT ports assigned to that inside user.
3. If step 2 fails, port overloading is pushed to the dynamic pool, if one is configured.
See the Traffic Logging Guide for IPv6 Migration for details.
171
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
172
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
The commands in this example implement the port overloading deployment in this fig-
ure.
2. Enter the following command to change the granularity to IP address and Protocol Port:
The commands in this example implement the port overloading deployment shown in
this figure.
Enter the following command to allow an overloaded port to be used by more than one client:
ACOS(config)# cgnv6 lsn port-overloading allow-different-user
NOTE: If you enable this option, port batching cannot be enabled. If Port
Batching is enabled, you must disable it before you can enable
the port overloading allow-different-user option.
You must set the user-quota reserve value in the LSN LID to 0. For example:
ACOS(config)# cgnv6 lsn-lid 1
173
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
2. Enter the following commands to save the configuration changes to the startup-config,
and reload the software to place the port overloading configuration changes into
effect:
ACOS(config)# end
Building configuration...
[OK]
ACOS# reload
3. After the software reload is completed, enter the following command to verify that the
port overloading configuration is now in effect:
174
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 5: Protocol Port Overloading Feedback
NOTE: The configured settings do not take effect until the ACOS device
is reloaded or rebooted.
NOTE:
l For Thunder 14045 devices, the output is displayed only
for Master.
l For Thunder 7650 devices, the output is displayed only
for one instance of the processing unit.
175
Chapter 6: Port Control Protocol for LSN
This chapter describes how to configure Port Control Protocol (PCP) for LSN and on an ACOS
device.
Overview 177
176
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
Overview
When PCP is enabled, ACOS acts as a PCP server for LSN and PCP clients. The ACOS device
parses incoming UDP packets that arrive on PCP port 5351, extracts the relevant information,
and creates or refreshes the IPv4-IPv4 mapping as requested by the PCP client. The ACOS
device sends a PCP response message to the PCP client.
NOTE: The mapping that is created for the client is an implicit dynamic
mapping.
To support PCP requests for IPv6 packets from CPE, ACOS checks whether an IPv6 packet is
sent from an NAT64 client or a DS-Lite Tunnel. ACOS tries to match the IPv6 source address
with the DS-Lite inside class-list. If there is a match, ACOS then processes the request as a
DS-Lite PCP request and extracts the IPv4 address from the PCP third-party option. If the
third-party option exists and an IPv4 address is provided, ACOS assumes the PCP request is
sent from CPE on behalf of the DS-Lite client.
ACOS then allocates the NAT IP/port and sends back the PCP response.
Configuration Options
l Third-party
You can enable this option by configuring an LSN PCP template, enabling the option in
the template, and activating the template as the default PCP template.
l Prefer_failure
l Filter
ACOS supports RFC 6887- compliant Port Control Protocol (draft 29). For more information,
see RFC 6887.
177
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
l Enable or disable the process for MAP/PEER/ANNOUNCE Opcode. By default, the con-
figuration is enabled.
l Set a minimum or maximum lifetime of mapping
l Allow a THIRD_PARTY request. By default, the configuration is disabled.
l Allow a THIRD_PARTY request coming from WAN interfaces. By default, the con-
figuration is disabled.
l Enable or disable the validation of PCP MAP NONCE. By default, the configuration is dis-
abled.
l Enable or disable the process to FILTER in PCP MAP. By default, the filter is enabled.
l Set the server listening UDP port. The default port is 5351.
l Allow the ACOS device to send an unsolicited announce packet when the ACOS device
reboots or reloads or following VRRP-A failover. By default, the configuration is dis-
abled.
PCP Requests
PCP packets are transported by using User Datagram Protocol (UDP). The port 5351 is nor-
mally used as PCP server listening port, while 5350 used as client listening port.
1. ACOS accepts a PCP request from a LAN interface or, when ACOS is configured to per-
mit a third-party PCP request that comes from a WAN, a WAN interface.
178
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
If the request is successfully processed, for example a mapping for the MAP request is
created, the server returns a success response. If an error occurs during the process,
the server returns an error response.
These are the PCP result codes that might be displayed by ACOS:
l 0 SUCCESS: Success.
l 1 UNSUPP_VERSION: The version number at the start of the PCP Request header is not
recognized by this PCP server. This document describes PCP version 2.
l 2 NOT_AUTHORIZED: The requested operation is disabled for this PCP client, or the PCP
client requested an operation that cannot be fulfilled by the PCP server's security
policy, e.g., the client IP is not in LSN Class-List.
l 3 MALFORMED_REQUEST: The request could not be successfully parsed.
l 4 UNSUPP_OPCODE: Unsupported Opcode.
l 5 UNSUPP_OPTION: Unsupported option. This error only occurs if the option is in the
mandatory-to-process range.
l 6 MALFORMED_OPTION: Malformed option.
l 7 NETWORK_FAILURE: The PCP server or the device it controls is experiencing a net-
work failure of some sort
l 8 NO_RESOURCES: Request is well-formed and valid, but the server has insufficient
resources to complete the requested operation at this time.
179
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
l 10 USER_EX_QUOTA: This attempt to create a new mapping would exceed this sub-
scriber's port quota.
l For example, lsn user-quota is exceeded.
l 13 EXCESSIVE_REMOTE_PEERS: The PCP server was not able to create the filters in
this request. This result code MUST only be returned if the MAP request contained the
FILTER option.
The MAP Opcode is used to create an explicit mapping between the following:
1. The ACOS device checks whether the client is authorized based on configuration.
180
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
l Static NAT
2. Depending on the requested mapping’s lifetime value, one of the following actions is
taken:
l If the requested mapping’s lifetime is not zero, this is a request to create or
update a mapping.
l If the requested lifetime is zero, this is a request to delete an existing mapping.
3. If a mapping exists for the requested internal address + protocol + port, ACOS com-
pletes the following tasks:
l When “check-client-nonce” is enabled, ACOS first check the “nonce” value in
request, if it does not match the nonce value of existed mapping, ACOS return
NOT_AUTHORIZED.
l If the MAP request contains PREFER_FAILURE option, but the suggested external
address and port do not match those of existed mapping, ACOS returns CANNOT_
PROVIDE_EXTERNAL.
If it is a PEER request, but the suggested external address and port does not
match those of an existed mapping, ACOS returns CANNOT_PROVIDE_
EXTERNAL.
l If the MAP request does not contain PERFER_FAILURE, the ACOS device returns
success, an external address, and the port of existed mapping in its response.
l If the existing mapping is static, for example, static NAT, ACOS returns success,
an external address, the port of the static NAT in its response, and indicate a life-
time of 2^32-1 seconds.
l ACOS updates the existing mapping’s lifetime based on new request.
4. If no mapping exists for the internal address, protocol, and port, and ACOS creates a
mapping by using the suggested external address and port.
l When it is a PEER request, if the requested external IP address and port number
181
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
are valid for this client, ACOS creates a mapping by using the suggested external
address and port. If the requested external IP address and port number are not
valid for this client, ACOS returns CANNOT_PROVIDE_EXTERNAL.
ACOS might not be able to create a new mapping by using the suggested external
address and port in the following situations:
o The suggested external address does not belong to ACOS device.
o The suggested external address, protocol, and port are in use.
5. If the PCP server cannot assign the suggested external address, protocol, and port, the
following actions occur:
l If the request contains the PREFER_FAILURE option, ACOS returns CANNOT_
PROVIDE_EXTERNAL.
l If the request does not contain the PREFER_FAILURE option, one of the following
occurs:
o For MAP requests, ACOS assigns another external address and port for that
protocol and returns the newly assigned external address and port in the
response.
o For PEER requests, ACOS returns CANNOT_PROVIDE_EXTERNAL, because
the PREFER_FAILURE option is automatically implied by PEER requests.
l THIRD_PARTY
This option is used when a PCP client wants to control a mapping to an internal host
other than itself. This is used with both MAP and PEER Opcodes.
182
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
l PREFER_FAILURE
This option indicates that if the PCP server is unable to map both the suggested
external port and suggested external address, the PCP server should not create a map-
ping.
l FILTER
After processing this MAP request containing the FILTER option and generating a suc-
cessful response, the PCP-controlled device will drop packets received on its public-
facing interface that don't match the filter fields. After dropping the packet, if its secur-
ity policy allows, the PCP-controlled device MAY also generate an ICMP error in
response to the dropped packet.
Rapid Recovery
PCP clients can to repair failed mappings in seconds. Mapping failures might occur in one of
the following scenarios:
l ANNOUNCE Opcode
When the PCP server loses its state (for example, when it rebooted), it resets its Epoch
time to its initial starting value (usually zero) and sends an ANNOUNCE response to the
link-scoped multicast address through the LAN interface by using the configured
source-ip/ipv6 address.
After the PCP server receives the ANNOUNCE Opcode request from the client and suc-
cessfully parses and processes it, the server generates a SUCCESS response. This pro-
cess allows the PCP client to determine the server’s running state.
183
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
This rapid recovery method is used when the PCP server determines its existing map-
ping are invalid.
This method are useful for servers that are routinely reconfigured by an Administrator
or have their WAN address changed frequently will implement this feature (e.g., res-
idential CPE routers).
When the PCP client requests a certain mapping lifetime, the PCP server grant a lifetime
which may be smaller of larger than the requested lifetime. You can configure the minimum
and maximum lifetime values on the PCP server. The minimum value is 120 seconds, and the
maximum value is 24 hours.
184
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
At the configuration level for the template, use the following commands to configure
options.
l To apply options to set the listening UDP port for PCP packets:
ACOS(config-pcp:11)# pcp-server-port5351
ACOS(config-pcp:11)# disable-opcodeannounce
ACOS(config-pcp:11)# mapping-lifetimeminimum 5
ACOS(config-pcp:11)# mapping-lifetimemaximum 10
ACOS(config-pcp:11)# allow-third-party-from-lan
ACOS(config-pcp:11)# allow-third-party-from-wan
l To allow the ACOS device to send an unsolicited PCP ANNOUNCE message when the
185
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
l To enable the ACOS device to validate the client nonce in a PCP request.
ACOS(config-pcp:11)# check-client-nonce
By default, this option is disabled. If this option is enabled, when the PCP request that
matches an existing mapping but the nonce value does not match existing value, the
ACOS device returns the NOT_AUTHORIZED option.
ACOS(config-pcp:11)# disable-map-filter
By default, this option is disabled, which means that ACOS can handle PCP filter option.
When the filter option is set in a PCP MAP, the ACOS device checks the inbound ses-
sion’s source address against the filter. If the disable-map-filter option is enabled,
the ACOS device will not process filter options in the map request.
l After finishing configuration of the template, use the following command at the global
configuration level to set the template as the default PCP template:
186
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
l When displaying full-cone sessions, a "PCP" flag indicates that the full-cone session is
created by PCP request:
ACOS# show cgnv6 lsn full-cone-sessions
Prot Inside Address NAT Address Outbnd Inbnd Pool CPU Age Flags
-------------------------------------------------------------------
187
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 6: Port Control Protocol for LSN Feedback
Prot Inside Address NAT Address Outbnd Inbnd Pool CPU Age Flags
---------------------------------------------------------------------
188
Chapter 7: Destination Based NAT
This chapter provides information about how you can match client traffic based on the des-
tination information and override the NAT settings for the matching traffic.
Overview 190
189
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
Overview
You can match client traffic based on the destination and complete the following actions:
190
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
l CGN/LSN
l NAT64
l DS-Lite
l Fixed-NAT
NOTE:
l The option to redirect traffic to a different pool or pool
group applies only if the client does not have a NAT ses-
sion. If the client already has a NAT session, the sticky
NAT feature keeps the client on the same NAT address,
regardless of the LSN rule-list configuration.
l The one-to-one-snat option is not applicable to NAT64 or
DS-Lite. For these features, the option is ignored and the
traffic is processed based only on source IP address. (No
rule-list is applied.)
l The snat option is not applicable to Fixed-NAT (Fixed-
NAT44, Fixed- NAT64 or Fixed- NAT for DS- Lite). For
these features, the option is ignored and the traffic is
dropped. (For drop statistics, see the "Fixed NAT Dest
Rules List Source NAT Drop" counter in the output of the
show cgnv6 fixed-nat statistics command.
1. ACOS determines whether the traffic is eligible for processing using the rule-list. This
process depends on the configuration.
191
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
c. Default list
FIGURE 7-2 illustrates the matching process for traffic that is eligible for pro-
cessing by using the rule-list. ACOS checks all applicable entry lists.
192
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
193
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
l snat pool
l template http-alg
4. The following actions supersede any other actions:
l Drop? If traffic matches a drop rule, the traffic is dropped, and rule-list matching
stops.
l Pass-through? If traffic matches a pass-though rule, the traffic is passed through,
and rule-list matching stops.
In either case, no other actions are performed, even if other matching rules have other
actions.
l No-action? If a rule has this action, matching stops, but all previous matching actions
are performed.
If more than one matching rule has the same action, the rule with the most specific match is
used. If there are no matches to an action in the rule-list, the traffic is passed. FIGURE 7-
3 illustrates the processing of the actions. For a complete list of actions, see Command Line
Interface Reference for CGN.
194
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
1. Configure an LSN rule-list that specifies the destination information on which to match
and the action to perform on matching traffic.
195
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
This feature complements the support of domain name ACL matching for LSN/NAT64/DS-
lite/6rd-NAT64/Fixed NAT/One-to-One NAT. The domain name is used to classify traffic if
destination IP address matching fails when the ACOS device does not have the same DNS
server configurations as the client does.
This feature supports HTTP traffic that contains a domain name in the HTTP request. A new
CLI http-match-domain-name is provided to allow user to enable/disable matching domain
name in HTTP requests.
Limitations:
l In the case of multiple domain names for one IP, the actions for these domain names
under the same ACL must be configured the same.
l This feature is manly for http-alg traffic, other actions might not work.
l Queue HTTP packets for HTTP host parsing is not supported. This feature only supports
HTTP requests with the Host header in the first TCP segment.
196
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
1. Enter this following command to change the CLI to the configuration level for the spe-
cified LSN rule set.
ACOS(config)# cgnv6 lsn-rule-list55
2. Enter this command to change the CLI to the configuration level for the specified LSN
rule set:
ACOS(config-lsn-rule-list)# default
This command enters the configuration level for the default set of rules. The default set
of rules is used for traffic that does not exactly match an IP host or subnet rule. (See
below.)
3. Enter the following command to enter the configuration level for the set of rules to
apply to the specified domain name:
ACOS(config-lsn-rule-list)# domain-name www.abc.com
4. Enter the following command to enable matching of domain name in the HTTP request:
ACOS(config-lsn-rule-list)# http-match-domain-name
5. Enter the following command to enter the configuration level for the set of rules to
apply to the specified IP host address or subnet:
ACOS(config-lsn-rule-list)# ip 1.1.1.1/22
This command completes matches that are based on the DSCP classification in traffic,
and marks the DSCP value before forwarding the traffic. For more information, see Qual-
ity of Service with DSCP.)
7. Enter the following command to perform the specified action on matching ICMP traffic:
197
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
8. Enter the following command to perform the specified action on matching traffic of
types other than ICMP, TCP, or UDP:
ACOS(config-lsn-rule-list-domain-name)# others no-action
9. Enter the following commands to perform the specified action on matching traffic with
the specified TCP or UDP port(s):
ACOS(config-lsn-rule-list-domain-name)# tcp port 1 no-action
(For information about the actions you can specify, see the CLI Reference for CGN.)
NOTE: The no-action option excludes the matching traffic from the
actions in the rule-list but still performs NAT for the traffic.
Destination NAT
Destination NAT replaces the destination IP address of matching client-to-server traffic with
an IP address from an IP list.
This option is useful in cases where you want to allow the client traffic, but send it to a dif-
ferent destination IP address. For example, if some client traffic initially is addressed to an
incorrect gateway, you can correct the gateway address using this feature.
198
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
ADP Support
Destination NAT using rule-lists is supported in private partitions, with the rule-list and IP list
in the same partition.
NOTE: ACOS does not perform destination NAT if the original destination
IP address is not reachable from the ACOS device.
Configuring an IP List
1. Enter the following command to create the IP list and access the configuration level for
this list:
ACOS(config)# ip-list55
2. Enter the following command to specify the NAT IP addresses or address range:
ACOS(config-ip-list)# 1.1.1.1 to 2.2.2.2
Configuring a Rule-list
To configure a rule-list:
This command is entered at the global configuration level to create the rule-list and
access the configuration level for it.
2. Enter the following commands to access the configuration level for rule sets in the list:
199
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
ACOS(config-lsn-rule-list)# default
ACOS(config-lsn-rule-list)# domain-name 2
ACOS(config-lsn-rule-list)# ip 1.1.1.1/11
3. At the configuration level for each rule set, enter the following commands to configure
the destination NAT for CGN:
The tcp and udp commands match the traffic based on the destination TCP or UDP port. The
icmp command matches on the ICMP traffic. The other command matches on all other traffic.
l Layer 3 classification, which reads the value in the Diffserv Control Point (DSCP) field in
the IP headers of matching CGN traffic.
This option provides QoS per-hop behavior (PHB) for CGN traffic.
You can set the DSCP value for inbound or outbound traffic to one of the values in TABLE 7-
4.
200
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
l Rule matching is performed on the first packet for each session. The DSCP action is
taken for each packet in the same session.
l ACOS performs marking but does not perform QoS actions based on DSCP values.
l For tunneled traffic (IPv4-in-IPv6 or IPv6-in-IPv4), ACOS performs marking on both
packets, the outer packet and the encapsulated packet.
1. Configure a rule-list that specifies the destination (server) addresses and protocols or
ports.
2. Configure an LID that binds to the rule-list.
3. Configure a class list that specifies the source (client) IP addresses, and associates
them with the LID bound to the rule-list.
1 For a list of the binary values for each of these options, see the online help. The CLI does not
accept the binary values, but they are listed for reference.
201
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
Rule Matching
Matching occurs in the following order, from most granular match to least granular match:
l Host rule set – Rule set for a specific IPv4 destination address
l Subnet rule set – Rule set for all hosts in a specific IPv4 destination subnet that do not
match a host rule set
l Default rule set – Rule set for all destination hosts that do not match a host or subnet
rule set
In each type of rule set, you can configure individual rules to match on and remark the fol-
lowing types of traffic:
You also can configure rules to match on the initial DSCP value (the value observed during
classification), and to remark matching traffic.
ADP Support
You can configure CGN Rule-list and DSCP marking separately in different partitions.
Enter the following command to create the rule-list and access the configuration level for
the list:
ACOS(config)# cgnv6 lsn-rule-list rule1
Enter the following commands to access the configuration level for rule sets in the list:
202
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
ACOS(config-lsn-rule-list)# default
ACOS(config-lsn-rule-list)# domain-name 2
ACOS(config-lsn-rule-list)# ip 1.1.1.1/11
ACOS(config-lsn-rule-list-ip)#
Configuring Rules
l At the configuration level for each rule set, enter the following command to configure a
DSCP marking rule for a TCP port or range of ports:
l Enter the following command to configure a DSCP marking rule for a UDP port or range
of ports:
l Enter the following command to configure a DSCP marking rule for ICMP traffic:
l Enter the following command to configure a DSCP marking rule for other types of
traffic:
203
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
1. Enter the following command to create the rule-list and access the configuration level
for the list:
ACOS(config)# cgnv6 lsn-lid 11
1. Enter the following command to create the class list and access the configuration level
for the list:
ACOS(config)# class-list 33
2. Enter the following command to specify a client host or subnet address and associate
the LID with the host or address:
ACOS(config-class-list)# 1.1.1.1/22 lsn-lid 11
Overview
You can use actions in the rule-list to process client traffic before assigning a Fixed-NAT map-
ping of the outside address to the client. For example, you can use a CGN rule-list to perform
Destination NAT or DSCP marking for Fixed-NAT client traffic before forwarding the traffic.
204
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
The following commands create the IP list and configure the client or NAT IP addresses or
address range:
ACOS(config)# ip-list 33
ACOS(config-ip-list)# exit
ACOS(config)# ip-list 44
ACOS(config-ip-list)# exit
Enabling Fixed-NAT
Configuration Examples
The following information contains some examples of rule-list configurations.
Single Action
The following rule-list performs source NAT using pool “pool2”, for traffic from client 1.1.1.1 to
any destination TCP port at subnet 123.1.1.x.
205
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
ACOS(config-lsn-rule-list)# ip 123.1.1.0/24
ACOS(config-lsn-rule-list-ip)# tcp port 0 action snat pool pool2
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# exit
Multiple Actions
The following rule-list has multiple actions that can be applied to matching traffic. For
example, all the following actions are performed on traffic to destination 123.1.1.1:80:
NOTE: Only some actions can be applied together to the same traffic.
(See CGN Rule-list Processing Flow.)
206
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
Drop
The rule-list in this example applies to traffic from client 1.1.1.1. DSCP marking is performed
for outbound traffic to destination 123.1.1.x, to any TCP port except 1234.
Since no other actions can be applied along with the action, the traffic is dropped but DSCP
marking is not performed.
No-action
The rule-list in this example applies to traffic from client 1.1.1.1. If traffic matches a rule that
has the no-action action, processing stops, and none of the rule-list actions are applied. This
is true even if the traffic matches a drop rule after matching the no-action rule.
207
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
In this example, traffic to destination 123.1.1.8:1234 matches all the rules in the list, including
the drop rule. However, no-action stops further matching of the drop rule. Thus, the traffic is
marked as DSCP and not being dropped.
Destination NAT
The rule-list in this example configures destination NAT for traffic sent to any TCP port at des-
tination IP address 1.2.3.4. For TCP requests sent to that address, ACOS changes the des-
tination IP address to an address in the IP list, 158.1.1.2 or 158.1.1.3.
To begin, the following commands configure an IP list containing the NAT addresses to use:
ACOS(config)# ip-list DNAT_LIST
ACOS(config-ip list)# 158.1.1.2
ACOS(config-ip list)# 158.1.1.3
208
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
The commands in this example deploy a simple DSCP marking configuration, for sessions
between client 1.1.1.1 and server 5.5.5.5 (any TCP port). Traffic is marked as follows:
The following commands configure a rule-list to perform the following DSCP marking for
traffic from client 1.1.1.2:
l Destination 123.1.1.8:80 – Mark with DSCP value 3, for both outbound (client-to-server)
and inbound (server-to-client) traffic.
l Destination 123.1.1.x, any TCP port – Mark with DSCP value af11, for both outbound and
inbound traffic.
l Any destination, with DSCP value cs1 – Mark with DSCP value 0, for both outbound and
inbound traffic.
209
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
ACOS(config-lsn-rule-list)# ip 123.1.1.8/32
ACOS(config-lsn-rule-list-ip)# tcp port 80 action set-dscp inbound 3
ACOS(config-lsn-rule-list-ip)# tcp port 0 action set-dscp outbound 3
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# ip 123.1.1.0/24
ACOS(config-lsn-rule-list-ip)# tcp port 0 action set-dscp inbound af11
ACOS(config-lsn-rule-list-ip)# tcp port 0 action set-dscp outbound af11
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# default
ACOS(config-lsn-rule-list-default)# dscp cs1 action set-dscp inbound 0
ACOS(config-lsn-rule-list-default)# dscp cs1 action set-dscp outbound 0
ACOS(config-lsn-rule-list-default)# exit
ACOS(config-lsn-rule-list)# exit
The rule-list in this example applies different settings for the same option (in this case, DSCP
marking). When more than one rule applies the same action, but with different values, the
rule with the most specific match is used. This rule-list applies to traffic from client 1.1.1.3.
210
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
Based on these rules, here are the DSCP markings performed for some matching traffic:
Client traffic can be processed basing solely on the destination NAT matching rules. Only des-
tination NAT rule-matching can be configured. If source NAT matching is disabled for a given
destination NAT, then if client traffic matches both a source rule and the specific destination
NAT, then only the destination NAT rule action will be used.
This LSN rule-list action for destination NAT only supports outbound traffic. The intended use
is for when the configured destination NAT sessions only are for outbound traffic on the
ACOS device. Once the traffic is routed to the server, after the destination NAT action is
taken, then the server should send the return traffic to bypass the ACOS device.
Disabling source NAT rule matching is only supported for NAT44 and not for ALGs. It is not
possible to disable source NAT rule matching for Fixed-NAT, as Fixed-NAT requires the
211
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 7: Destination Based NAT Feedback
source NAT. Additionally, disabling the source NAT means that CGN logging will not be
triggered for the given traffic as there is no port mapping.
Below is a configuration example disabling source NAT action for ICMP traffic for the rule-set
of destination IP addresses 10.1.2.0 /24. Source NAT action is also disable for TCP traffic for
the rule-set of destination IP addresses 10.1.3.0 /24.
ACOS(config)# ip-list dst-list
ACOS(config-ip-list)# 10.2.3.4 to 102.2.3.5
ACOS(config-ip-list)# exit
ACOS(config)# cgnv6 lsn-rule-list
ACOS(config-lsn-rule-list)# ip 10.1.2.0/24
ACOS(config-lsn-rule-list-ip)# icmp action dnat ipv4-list dst-list
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# ip 10.1.3.0/24
ACOS(config-lsn-rule-list-ip)# tcp port 80 action dnat ipv4-list dst-list
212
Chapter 8: Attack Detection and Mitigation
This chapter provides an overview of DDoS mitigation for IPv6 Migration and illustrates how
to configure IP blacklisting, IP anomaly filtering, connection rate limiting, and so on for lim-
iting protocol attacks and volumetric attacks that consumer server resources.
Overview 214
213
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
Overview
ACOS provides security protection to help mitigate against some forms of Distributed Denial
of Service (DDoS) attacks on servers. Some of the features such as IP blacklisting, IP anomaly
filtering, connection rate limiting, and more aim to limit protocol attacks and volumetric
attacks that consumer server resources.
Protocol attacks consist of packets that invalidly formed or contain protocol abnormalities.
These attacks are meant to exploit a protocol feature or bug in order to consume server
resources. Typically, a resource attack is conducted by directing a high rate of invalid traffic
toward the target system, to overwhelm the system’s resources.
Volumetric attacks are brute-force assaults, often launched using botnets, that attempt to
consume as many network resources as possible on the target system. This type of attack can
be used not only to disrupt service, but also to provide a diversion for more nefarious and tar-
geted network intrusion, such as identity theft.
When a DDoS attack targeted towards a specific IP address within a NAT IP pool is detected,
then the ACOS device will add that IP address to the blacklist. The ACOS blacklist can contain
up to 1024 IP addresses at any given moment.
ACOS determines a DDoS attack when a large number of out-of-sequence packets are sent to
a NAT IP within a short time. The packets-per-second (PPS) limit configures the maximum
214
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
When the ACOS device detects a DDoS attack and the PPS threshold is exceeded, then one of
the following actions can be configured:
By default, DDoS NAT IP logging is enabled and the event is logged for all three actions. The
logged event can be viewed using a show command.
A black hole timer can be configured to determine the duration the black hole route must be
disabled once a DDoS attack is determined. When the black hole timer expires, ACOS removes
the black hole route remotely without enabling the black holed NAT IP, and applies a remove-
wait period of 5 minutes or 300 seconds. During the remove-wait period, if ACOS detects
attack again, it will re-initiate the black hole entry and extend the black hole timer by mul-
tiplying 2 or 3 times the expiration time. If ACOS does not detect attacks in the remove-wait
period, it removes the black hole entry completely and enables the NAT IP.
When a NAT IP address is marked as unusable, ACOS clears off all the sessions using that NAT
IP address. While the sessions are being cleared, the internal client mapped to the NAT IP will
experience a short service interruption. Afterwards, the internal client will be assigned to a
different NAT IP address, allowing traffic to resume normal flow. The NAT IP address remains
unusable for all internal clients until it is removed from the blacklist.
If ACOS is configured to notify an upstream router via BGP, then a route-map must be spe-
cified in the configuration. In that case, the ACOS device will also mark the NAT IP as unus-
able and clear current sessions using that NAT IP.
215
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
When a NAT IP is removed from the blacklist and ACOS restores the NAT IP to the NAT pool,
then the NAT IP is free to be used by any internal client. The original internal client mapped
to that NAT IP is not necessarily restored back to that given NAT IP.
l Log—In this example, when the packets-per-second rate is over 10000, an event
is logged. The NAT IP continues to send traffic as normal.
ACOS(config)# cgnv6 ddos-protection packets-per-second ip 10000 action
log
l Drop—In this example, when the packets-per-second rate is over 25000, an event
is logged and ACOS drops the incoming packets. The NAT IP is marked as unus-
able and the existing sessions are cleared.
ACOS(config)# cgnv6 ddos-protection packets-per-second ip 25000 action
drop
In this example, map-1 is configured as the route-map and then inserted into the
existing route-map sequence at 100.
216
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
ACOS(config-route-map:100)# exit
After configuring map-1 as the route map, configure the upstream router as
shown in the following example:
upstream-router(config)# ip community-list standard COM-1 permit 33:44
upstream-router(config-route-map)# exit
Notice that the route-map community number matches the number configured
on the ACOS device. When the community number matches, then the configured
next-hop action is taken. The last two lines of the router configuration create the
filter for route advertisements received from the ACOS device.
3. Configure the expiration time for ACOS to revert the action after pps is decreased
below the threshold level. The default expiration value is 3600 seconds. In this example,
the expiration is set to 100 seconds.
ACOS(config)# cgnv6 ddos-protection packets-per-second ip 100000 action
redistribute-route map-1 expiration 100
4. For Redistribute Route Map only, configure the maximum value of the timer multiplier
for DDoS attacks that last longer. The timer multiplier can be configured to a value
between 1 to 100. Default value is 6. In this example, the maximum value of the time
multiplier is 7.
ACOS(config)# cgnv6 ddos-protection packets-per-second ip 100000 action
redistribute-route map-1 expiration 100 timer-multiply-max 7
Use the show cgnv6 ddos-protection ip-entries command to view the blacklisted NAT IP
addresses as well as their current packet rate and expiration time.
217
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
------------------------------------------------------------
When the out-of-sequence packets are lower than pps limit and the time expires, ACOS
moves to the Remove-Wait state as shown in this example.
ACOS(config)# show cgnv6 ddos-protection ip-entries
------------------------------------------------------------
The following example displays output for the command show ddos-protection ip-entries all,
which displays the status of all NAT IP addresses, their configured packets-per-second
threshold, and their expiration time.
ACOS# show cgnv6 ddos-protection ip-entries all
-----------------------------------------------------------
11.1.1.2(*) 19400 - 1
11.1.1.1(**) 844000 60 3
11.1.1.7 0 - 0
The last column, “L4-Entries”, is the count of Layer 4 ports detected to be under DDoS attack
for the given NAT IP. This is the number of ports which have exceeded the configured Layer 4
packets-per-second threshold for the given NAT IP.
The single asterisk (*) indicates that one or more Layer 4 port for the respective NAT IP has
exceeded the Layer 4 packets-per-second. Double asterisks (**) indicate that the Layer 3
packets-per-second threshold for the respective NAT IP has been exceeded.
218
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
ACOS device will disable a specific NAT IP from the NAT pool. When a NAT IP is disabled, all
existing sessions using this NAT IP will be cleared; new sessions will stop using this NAT IP.
Conversely, upon receiving a BGP route withdrawal, ACOS device will resume the specific
NAT IP previously disabled.
NOTE: The BGP neighbor may only be configured in the shared partition.
However, the black holed NAT IPs may belong to the shared or
L3V partitions.
When an IP is black-listed, upon receiving a BGP route update, ACOS device can disable a spe-
cific NAT IP fallen into the configured BGP DDoS zone.
NOTE: Only BGP route updates having the netmask of /32 can be added
to Blackhole lists.
To disable a NAT IP based on BGP advertisement from an upstream router, enter the cgnv6
ddos-protection disable-nat-by bgp zone command at the configuration level.
After configuring a neighboring BGP router, route updates from this neighboring router is
treated specially using the acos-application-only command. This configuration must be con-
figured on the ACOS device to disable or re-enable black-listed NAT IPs. To direct BGP update
messages to ACOS applications, enter the command at the BGP neighbor level.
The following command configures CGN to disable specific NAT IPs fallen into the configured
BGP DDoS zone “ddos_zone”:
219
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
NOTE:
l
1 The acos- application- only option must be con-
figured. “neighbor 10.1.1.123 acos-application-only” must
be configured on ACOS to treat the route update sent
from 10.1.1.123 to be sent to ACOS applications. These
routes are not installed in the routing table.
l
2 An in-bound route-map must be configured.
l
3 The route- map set_ zone command associates the
route to the “ddos zone ddos_zone”.
4
l The set ddos zone ddos_zone command defines the
zone name “ddos_ zone”. This zone name must be
identical to the zone name configured in the cgnv6
ddos-protection disable-nat-ip-by-bgp zone ddos_
zone command.
To display the list of NAT IPs disabled on BGP advertisement, use the show ddos-protection
disabled-ip-by-bgp command:
ACOS# show cgnv6 ddos-protection disabled-ip-by-bgp
IP Address NAT Pool Name
==================================
1.1.1.1 2
1.1.1.2 2
To clear the currently disabled NAT IP on BGP advertisement, use the following command:
clear cgnv6 ddos-protection disabled-ip-by-bgp {all | ip-address ip-addr}
220
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
NOTE: If ACOS receives BGP advertisement for this NAT IP later, it will
be disabled again.
Use the clear commands to delete L3 and L4 DDoS entries. The clear command provides
options to selectively remove some entries or all DDoS statistics can be cleared entirely.
L3 DDoS entries can be cleared based on a NAT IP netmask or NAT Pool. L4 DDoS entries can
be cleared based on a NAT IP netmask, port, protocol, or based on NAT pool.
CLI Configuration
To clear NAT IP disabled by BGP advertisement, enter the following command at the global
configuration level:
ACOS(config)# clear cgnv6 ddos-protection disabled-ip-by-bgp {all | ip-address
ipaddr netmask netmask}
To clear L3 DDoS entries, enter the following command at the global configuration level:
ACOS(config)# clear cgnv6 ddos-protection ip-entries {all | ip-address ipaddr
netmask netmask | nat-pool name}
To clear L4 DDoS entries, enter the following command at the global configuration level:
ACOS(config)# clear cgnv6 ddos-protection l4-entries {all | address ipaddr net-
mask netmask | l4-proto num | nat-pool name | port num}
For clearing L4 entries, a combination of NAT address, port, and protocol can be specified
together, in any order. If one filter is already specified, the others are optional. Clearing L4
port entries will only clear TCP and UDP traffic for those ports.
To clear all DDoS statistics, enter the following command at the global configuration level:
ACOS(config)# clear cgnv6 ddos-protection statistics
IP Anomaly Filtering
ACOS provides configurable protection against a range of IP packet anomalies. When IP anom-
aly filtering is enabled, ACOS checks inbound traffic for the specified anomalies and drops
any packets that have the anomaly.
TABLE 8-1 lists the types of IP anomalies ACOS can detect and drop.
221
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
Layer 3 Layer 4
222
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
Layer 3 Layer 4
You can enable each of the groups of anomalies separately. For example, you can enable fil-
tering and dropping of Layer 3 attacks independently of filtering and dropping of Layer 4
attacks.
To enable filtering for IP packets that exhibit predictable, well-defined anomalies, use the fol-
lowing command for different types of IP anomalies:
ACOS(config)# ip anomaly-drop packet-deformity layer-3
ACOS(config)# ip anomaly-drop packet-deformity layer-4
ACOS(config)# ip anomaly-drop security-attack layer-3
ACOS(config)# ip anomaly-drop security-attack layer-4
IP Anomaly Statistics:
---------------------------
223
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
IP Fragment Drop 0
No IP Payload drop 0
224
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
NOTE: The counter for an anomaly increments only if filtering and drop-
ping for that anomaly type is enabled.
A common form of DDoS attacks are volumetric attacks, such as TCP SYN flooding. These
attacks flood servers with a large number of packets, thereby consuming resources with
open or half-open sessions. To mitigate these types of volumetric attacks, ACOS allows you to
configure a connection limit. The connection rate limit allows you to set a maximum number
of sessions allowed per source IP, thus preventing one user from consuming all of the server
sessions and blocking legitimate traffic from other clients.
While volumetric DDoS attacks may slowly consume server resources over time, they may also
happen within a short time frame. In the case where there is a connection limit per source IP,
attacks may still attempt to bring down the server by using up the connection quota all at
once. These attacks can be mitigated by configuring a connection rate limit.
For connection rate limiting, you configure a maximum number of connections a user can
attempt to initiate per second. These limits are configurable on a per source IP basis. If the
per second connection limit is exceeded, no new connections will be made, even if the num-
ber of total sessions per IP has not been exceeded.
225
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
To configure connection rate limiting, an LSN limit ID (LID) is created and the connection rate
limit is configured. Then, the LSN LID is applied to a class list or a NAT pool as desired.
1. First, an LSN NAT pool, which will be bound to the LSN LID, is configured.
ACOS(config)#cgnv6 nat pool LSN_POOL1 198.51.100.1 198.51.100.254 netmask
/24
2. Create the LSN LID and configure the connection rate limit before binding the NAT pool.
ACOS(config)# cgnv6 lsn-lid 10
To view the statistics for traffic exceeding the configured connection rate limit, use the fol-
lowing command:
ACOS# show cgnv6 lsn statistics
226
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
---------------------------
...
...
The “Conn Rate User-Quota Exceeded” statistic reflects how many connections, past the
quota limit, have been attempted from all source-IPs for which connection rate limiting is
configured. It is a comprehensive statistic for the ACOS device.
To further protect servers and CPUs against reflection and spoofing types of volumetric
attacks, ACOS supports selective filtering. On selected platforms, selective filtering can
identify when packets are coming in at an abnormally fast rate. ACOS creates a destination IP
and destination IP port entry in a logging table and drops the packets. On supported plat-
forms, ACOS implements selective filtering in hardware to avoid impacting the CPUs.
For selective filtering, ACOS tracks a protocol packets per second rate limit. These limits are
matched on a destination 2-tuple basis (NAT IP and NAT port). The thresholds are not con-
figured for a specific destination 2-tuple. Rather, ACOS tracks the destination 2-tuple of all
227
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
incoming packets and drops packets when the threshold is exceeded for any given des-
tination 2-tuple.
When the traffic going to a specific destination IP and destination IP port exceed the con-
figured thresholds, entries are created in software and hardware tables, where applicable.
Future traffic matching those entries are dropped. These entries remain on the tables for 10
seconds and age out if their packets per second rates drop below the threshold. If the incom-
ing traffic rate remains high, then the table timeout refreshes.
For more effective filtering to protect CPUs, destination 2-tuples (NAT IP and NAT port) are
programmed into the hardware on supported FTA platforms. The hardware tables support
rate limiting only for TCP and UDP traffic. The Security and Policy Engine (SPE) stores the 2-
tuple entries, and packets matching the destination IP and destination IP port are dropped by
the hardware. For non-FTA platforms, and when the SPE tables are full, the software emu-
lates the behavior of an SPE. Like RAM, the SPE entries will be deleted if the ACOS device is
reloaded or rebooted
NOTE: Entries are programmed into the hardware level only on the fol-
lowing supported platforms: Thunder 5435 SPE and Thunder
6435 SPE. For all other platforms, the entries are programmed
into the software level.
On software, selective filtering thresholds are configurable for TCP or UDP traffic indi-
vidually, other Layer 4 traffic as a group, or per source-IP address regardless of the packet
protocol. While TCP and UDP can have separate rate limits, all other Layer 4 traffic are sub-
ject to the same limit on a per-protocol basis. However, one Layer 4 protocol being rate lim-
ited does not affect the other Layer 4 protocols. For example, the following line of code limits
non-TCP and non-UDP Layer 4 traffic to 4000 packets per second:
ACOS(config)# cgnv6 ddos-protection packets-per-second other 4000
If over 4000 GRE packets match a given destination IP and destination IP port pair, then an
entry to drop GRE packets for that 2-tuple is added. Other Layer 4 protocols, such as MOBILE
or AH, matching the same 2-tuple are still accepted, as long as they are under the 4000 pack-
ets per second rate limit. They cannot be configured individually so that the GRE limit is
higher than the MOBILE or AH limit, for example.
228
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
1. Stage 1: If the “bad” packets-per-second to a single NAT IP is greater than the con-
figured DDoS protection packets-per-second IP threshold, then processing moves to
stage 2.
2. Stage 2: Processing depends on the Layer 4 protocol:
l TCP/UDP – If the "bad" packets-per-second to a single (NAT IP:port) pair exceeds the
configured threshold, then that pair gets the selective filtering entry. For example, if
UDP packets that hit a NAT IP on port 5000 exceed the threshold, then only UDP pack-
ets to port 5000 will be blocked. Other UDP packets to that NAT IP will not be affected.
l Other Layer 4 protocols – If the "bad" packets-per-second to a single (NAT IP: Layer 4
protocol) pair exceeds the configured threshold, that pair gets an entry. For example, if
GRE (ip protocol 47) packets to one NAT IP exceeds the threshold for Other protocols,
then only GRE packets to that NAT IP will be blocked.
1. Configure a packets per second rate limit for the desired protocol(s).
2. Enable DDoS protection if it is disabled. The default behavior is that DDoS protection is
enabled.
229
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
On the hardware, only TCP and UDP rate limiting are supported. The default value for per IP is
3000000, TCP is 3000, and UDP is 3000. The default value of all other Layer 4 protocols is
10000. The configurable rate limit for any protocol or per IP can range from 0 packets per
second up to 30000000 packets per second.
To view logging statistics for selective filtering, enter the following “show” command:
ACOS# show cgnv6 ddos-protection statistics
L3 Entry Added 0
L3 Entry Deleted 0
L3 Entry Added to HW 0
L4 Entry Added 0
L4 Entry Deleted 0
L4 Entry Added to HW 0
HW out of L4 Entries 0
230
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
Field Description
Entry Added The number of destination NAT IP and destination NAT IP port
pairs for a given protocol that were added as entries to the soft-
ware table. Entries for TCP, UDP, per source IP, and separate
Layer 4 protocols are counted separately
Entry Deleted The number of destination NATP IP and destination NAT IP port
pairs for a given protocol that were removed from the software
table because their packets-per-second rates were under the
threshold for 10+ seconds. Entries for TCP, UDP, per source IP,
and separate Layer 4 protocols are counted separately.
Entry Added to HW Software entries that were also added as a hardware entry on
FTA supported platforms.
Entry Removed from Entries deleted from the hardware on FTA supported platforms.
HW
HW out of Entries How many entries are not logged in the hardware due to limited
space for programmed entries.
Entry Match Drop How many packets are dropped at the software level because
they matched an entry.
HW Entry Match Drop How many packets are dropped by the FTA because they
matched a hardware entry
Selective filtering is enhanced to count traffic associated with existing session into the pack-
ets-per-second. Traffic coming from data sessions that originated from the outside of a full-
cone or ALG session can be counted towards the configured packets-per-second rate limit.
Traffic from data sessions that originated from the inside are considered legitimate traffic
and are not subject to the rate limit.
To configure selective filtering for existing CGN sessions, enter the cgnv6 ddos-protection
packets-per-second include-existing-session command at the global configuration
level.
231
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
By default, this option is disabled, and selective filtering only applies to CGN sessions ini-
tiated after selective filtering is configured.
Selective filtering, when configured, can block some IPs in the software and drop all packets
destined for those addresses. Up to 1024 L3 entries can be blocked. There is no limit to the
number of L4 entries that can be blocked, provided that there is enough memory to add the
entries to block. On some platforms, selective filtering is implemented at the hardware level
as well in order to limit the impact on CPU performance. In such cases, up to 256K (that is,
262144) entries could be black-listed at the hardware level. If all of the hardware entries are
used, then entries can still be added at the software level.
If a provider has 256K NAT IP addresses or fewer, and all of those are attacked and dropped
at the hardware level, then the provider can no longer provide CGN service. In order to pre-
vent this, a lower limit for entries can be configured. If a lower limit is configured, then no
more entries can be added at the hardware or software level until the old entries are either
cleared out or else age out. Removing a configured limit resets the limit to the default of
256K entries.
To configure a lower limit for Selective Filtering entries in the hardware, enter cgnv6 ddos-pro-
tection max-hw-entries num the command at the global configuration level.
232
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
On the targeted CPU, incoming SYN packets are checked whether or not they are IPv4 pack-
ets, and if so, whether or not the destination IP is a NAT IP address. If those conditions are not
met, the packets are dropped. If those conditions are met, then ACOS checks if the packet is
valid for establishing a session. Invalid packets are dropped, while valid packets create a new
session.
If LSN is enabled, then ACOS checks for an existing full cone session, port reservation, or ALG
session. If Fixed NAT is enabled, then ACOS checks for an existing full cone session or ALG
session. If none of those conditions are met, then the packet is dropped.
CPU round robin for CGN is enabled by default. All dropped packets increment the “L4 Out-
of-State packets” in the show cgnv6 l4 debug command.
Use the show cgnv6 ddos-protection ip-entries command to view all IP entries, including
normal entries.
SYN Cookie
This chapter describes the SYN cookie feature and how it helps protect ACOS devices against
disruptive SYN-based flood attacks.
SYN cookie protects against TCP SYN flood attacks. When SYN cookie is enabled, the ACOS
device can continue to serve legitimate clients during these attacks, while preventing ille-
gitimate traffic from consuming system resources.
The SYN cookie is required for detecting SYN flooding from inside client. The existing DDoS
detects the SYN flooding from outside client. Hairpin is not supported, so the existing DDoS
can be used.
SYN Cookie works for LSN/DS-lite/NAT64/6rd-NAT64/Fixed-NAT, one-to-one NAT, and for all
ALGs.
233
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
The session sync happens only after the connection is fully established. The SYN Cookie con-
nection setup cannot be done across devices.
Under large-scale attacks, excessive half-open connections cause a network device’s TCP con-
nection queue to become full. This over-subscription prevents the device from establishing
new connections with legitimate clients.
FIGURE 8-3 depicts a typical 3-way TCP handshake, which includes a SYN request from the
client, the SYN-ACK reply from the ACOS device, and finally, an ACK from the client to the
ACOS device.
234
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
However, SYN flood attacks (FIGURE 8-4) can cripple a network by sending multiple SYN
requests to a network device. The device responds to these SYN requests with SYN-ACKs and
waits for responses from the client that never arrive. These bogus requests create many
“half-open” sessions, which wastes system memory and other system resources. The state of
being oversubscribed reduces the device’s free resources, which prevents it from accepting
requests from legitimate clients.
Enabling SYN cookie mitigates the damage caused by such DoS attacks by preventing the
attacks from consuming system resources.
TCP connections for which the ACOS device did not receive an ACK from the client is iden-
tified as belonging to a SYN flood attack, and this information is displayed with the counter
in the output of the show command.
235
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
SYN cookie prevents hackers from consuming excessive system resources by encoding the
necessary state information for the client connection in a TCP sequence number. Rather than
storing state information for each TCP session, the sequence number in the SYN cookie acts
as a shorthand, which allows the ACOS device to compress much of the session information
into a smaller amount of data.
This sequence number is sent to the client as a SYN-ACK packet. When a legitimate client
receives this information, it replies with an ACK that contains the sequence number plus 1.
When the SYN ACK that contains the sequence number from the client is received, the ACOS
device reconstructs the connection information and establishes a connection with that cli-
ent.
If the SYN Request is part of an attack, the attacker does not send an ACK to the ACOS
device. The ACOS device sends a SYN cookie, but the attacker does not receive it (or may
choose to ignore it), and the ACOS device does not establish a connection.
Example
Configure tcp syn cookie which is triggered by tcp-half-open and disable after two minutes.
cgnv6 ddos-protection syn-cookie enable tcp-half-open on-threshold 1000 on-
timeout 120
236
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
The following sections describe how to enable SYN cookie support and configure advanced
features.
To enable software-based SYN cookie, use the syn-cookie command. For example:
AX(config)#cgnv6 ddos-protection syn-cookie enable [tcp-half-open on-threshold
on-limit [on-time timeout-value]]
To modify the threshold for TCP handshake completion, use the ip tcp syn-cookie
threshold global configuration command.
This section describes how to view SYN cookie statistics by using the CLI.
237
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
L3 Entry Added 0
L3 Entry Deleted 0
L3 Entry Added to BGP 0
L3 Entry Removed From BGP 0
L3 Entry Added to HW 0
L3 Entry Removed From HW 0
Too Many L3 entries 0
L3 Entry Match Drop 0
HW L3 Entry Match Drop 0
L3 Entry Drop due to HW Limit Exceeded 0
L4 Entry Added 0
L4 Entry Deleted 0
L4 Entry Added to HW 0
L4 Entry Removed From HW 0
HW out of L4 Entries 0
L4 Entry Match Drop 0
HW L4 Entry Match Drop 0
L4 Entry Drop due to HW Limit Exceeded 0
TCP SYN cookie SYN ACK Sent 7
TCP SYN cookie verification passed 7
TCP SYN cookie verification failed 0
TABLE 8-5 displays the fields that appear in the CLI output of the show cgnv6 ddos-pro-
tection statistics command.
Field Description
TCP SYN cookie The number of TCP SYN cookie for which the responding ACK passed
verification the SYN cookie check.
passed
TCP SYN cookie The number of TCP SYN cookie for which the responding ACK failed
verification the SYN cookie check.
failed
238
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 8: Attack Detection and Mitigation Feedback
When enabling the DDoS protection logging, you can choose to send the logs to the logging
servers as follows:
l Local—Logs are sent to the local buffer and can be viewed using the show log com-
mand.
l Remote—Logs are sent to the remote syslog server and IPFIX collectors.
l Both—Logs are sent to both local buffer and remote servers.
The log protocols supported are Syslog and NetFlow. For Syslog, both CEF and ASCII formats
are supported.
To enable event logging for DDoS protection, enter the following command at the global con-
figuration level and configure one of the options:
ACOS(config)# cgnv6 ddos-protection logging enable
ACOS(config)# cgnv6 ddos-protection logging enable [local | remote | both]
To disable event logging for DDoS protection, enter the following command at the global con-
figuration level:
ACOS(config)# cgnv6 ddos-protection logging disable
To display the CGNAT logging show counters, see Command Line Reference for CGN.
239
Chapter 9: Enhanced User Visibility
This chapter describes the enhanced user visibility feature that can be configured on LSN
and NAT64.
Overview 241
240
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 9: Enhanced User Visibility Feedback
Overview
The enhanced user visibility feature lets you track the peak session utilization, NAT port util-
ization, and aggregated upstream and downstream byte and packet count per subscriber.
The subscriber information gathered from enhanced user visibility helps to detect anomaly in
the subscriber behavior. The information can be used for allocating user-quota values for ses-
sions and ports and for provisioning NAT IPs appropriately based on the subscriber usage.
By default, the enhanced user tracking is not enabled. It can be configured using the cgnv6
lsn enhanced-user-tracking command in the configuration mode.
The enhanced user visibility feature is supported for LSN and NAT64.
Use the following command to enable the log using the CLI:
ACOS(config)# cgnv6 lsn enhanced-user-tracking
To enable the enhanced user tracking log for LSN and NAT64 using the GUI:
241
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 9: Enhanced User Visibility Feedback
3. To view the subscriber information for LSN, go to CGN > LSN > Stats > Subscriber
Information.
4. To view the subscriber information for NAT64, go to CGN > NAT64 > Stats > Sub-
scriber Information.
Inside Addr NAT Addr TCP Current UDP Current ICMP Current Session Current TCP
Peak UDP Peak ICMP Peak Session Peak Lifetime Sessions Upload Packets Upload load
Packets Download Bytes NAT Pool Name
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
-----------------------------------------
Field Description
NAT Address The public IP address that is mapped to the internal IP address.
Session Current The current number of connections per session per user.
242
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 9: Enhanced User Visibility Feedback
Field Description
Session Peak The peak number of connections per session per user.
Upload Packets The total number of upstream packet count per session.
Upload Bytes The total number of upstream byte count per session.
Download Pack- The total number of downstream packet count per session.
ets
Download Bytes The total number of downstream byte count per session.
NAT Pool Name The NAT pool to which the IP address belongs.
To display the enhanced user tracking information for NAT64, use the following CLI com-
mand:
AX5100(config)#show cgnv6 nat64 enhanced-user-tracking
Inside IPv6 Prefix NAT Address TCP Current UDP Current ICMP Current Session Cur-
rent TCP Peak UDP Peak ICMP Peak Session Peak Lifetime Sessions Upload Packets
Upload Bytes Download Packets Download Bytes NAT Pool Name
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
----------------------------------------------------------------------
3001 64 - 0 0 1 1 1 0 0 0 0 0 0 0 0 nat64
243
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 9: Enhanced User Visibility Feedback
Field Description
NAT Address The public IP address that is mapped to the internal IP address.
Session Current The current number of connections per session per user.
Session Peak The peak number of connections per session per user.
Upload Packets The total number of upstream packet count per session.
Upload Bytes The total number of upstream byte count per session.
Download Pack- The total number of downstream packet count per session.
ets
Download Bytes The total number of downstream byte count per session.
NAT Pool Name The NAT pool to which the IP address belongs.
244
Chapter 10: User Quotas Based on IPv6 Prefix
This chapter provides information about how to base user quota configuration on an IPv6 pre-
fix for simplifying deployment.
Overview 246
245
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 10: User Quotas Based on IPv6 Prefix Feedback
Overview
This capability enables you apply a user quota prefix length over an entire subnet, extending
NAT64 and DS-Lite user quota control over a collection of addresses, instead of a single
source IP address.
l You can apply a user quota prefix length on a global level or per LSN LID basis. The user
quota prefix length set for an LSN LID overrides the global configuration value. If the
user quota prefix is not configured at the LSN LID level, the global configuration will be
used.
l When the user-quota-prefix-length is configured, the user-quota udp/tcp/icm-
p/session configured in lsn-lid will be applied to each prefix-based user.
l The udp/tcp/icmp/session count of a prefix-based user is the sum of udp/tcp/icm-
p/session count of all clients using this prefix.
l This feature applies to all 64-bit platforms.
l For the command show cgnv6 nat64 user-quota-sessions, if a user quota prefix
length is configured, only the prefix quota is displayed. If the prefix quota is not set,
only the user quota session is displayed.
You can configure the user quota prefix length by using the GUI.
246
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 10: User Quotas Based on IPv6 Prefix Feedback
You can configure the user quota prefix length by using the CLI.
Enter the following command to configure a global prefix length for DS-Lite:
You can select a value between 1-128. By default, the global user quota prefix length for is
128.
You can select a value between 1-128. By default, the LSN LID user quota prefix length is set
to the global value.
CLI Example 1
The following example applies a user quota prefix to multiple LSN LIDs.
ACOS(config)# cgnv6 lsn-lid 1
ACOS(config-lsn lid)# user-quota-prefix-length 96
ACOS(config-lsn lid)# cgnv6 lsn-lid 2
ACOS(config-lsn lid)# user-quota-prefix-length 73
247
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 10: User Quotas Based on IPv6 Prefix Feedback
CLI Example 2
This example configures user quota with multiple NAT64 prefix lengths.
ACOS(config)# class-list 2
ACOS(config-class list)# 2001:55:1:1::/64 lsn-lid 1
ACOS(config-class list)# 2001:55:2:2::/64 lsn-lid 2
ACOS(config-class list)# 2001:55:3:3::/96 lsn-lid 3
ACOS(config-class list)# exit
ACOS(config)# cgnv6 nat64 prefix 2003::/96
ACOS(config)# cgnv6 nat64 prefix 2008:88::/96 class-list 2
ACOS(config)# cgnv6 nat64 user-quota-prefix-length 96
ACOS(config)# cgnv6 nat64 inside source class-list 2
CLI Example 3
The following example uses the class list acts as the classifier:
ACOS(config)# class-list ipv6
ACOS(config-lsn-lid)# user-quota-prefix-length 64
ACOS(config-lsn-lid))# exit
NOTE: The following is a list of configuration notes for this CLI example:
248
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 10: User Quotas Based on IPv6 Prefix Feedback
In the following show command output, the prefix length is set to 96 and a connection is made
with the address 2001::100.
ACOS# show cgnv6 nat64 user-quota-sessions
NAT64 User-Quota Sessions:
Inside IPv6 Prefix NAT Address ICMP UDP TCP Session Pool LID Flag
-------------------------------------------------------------------------------
--------
2001:: 96 8.8.8.143 0 0 1 1 test2 2 -
In this display, the prefix length is changed to 64. The new user quota is applied to a con-
nection made through the address 2001::101, while the first user continues to use the 96 user
quota. If the previous user disconnects and then returns, the 64 user quota will point to this
user.
ACOS# show cgnv6 nat64 user-quota-sessions
NAT64 User-Quota Sessions:
Inside IPv6 Prefix NAT Address ICMP UDP TCP Session Pool LID Flag
-------------------------------------------------------------------------------
--------
2001:: 64 8.8.8.102 0 0 1 1 test2 2 -
2001:: 96 8.8.8.143 0 0 2 2 test2 2 -
Total User-Quota Sessions Shown: 2
This example shows when connections from 2001::100 are complete and the previous user quota
pointed to this address is removed.
ACOS# show cgnv6 nat64 user-quota-sessions
NAT64 User-Quota Sessions:
Inside IPv6 Prefix NAT Address ICMP UDP TCP Session Pool LID Flag
-------------------------------------------------------------------------------
---------
2001:: 64 8.8.8.102 0 0 1 1 test2 2 -
Total User-Quota Sessions Shown: 1
249
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 10: User Quotas Based on IPv6 Prefix Feedback
When a user with address 2001::100 reconnects, the new user quota is applied.
NAT64 User-Quota Sessions:
Inside IPv6 Prefix NAT Address ICMP UDP TCP Session Pool LID Flag
-------------------------------------------------------------------------------
---------
2001:: 64 8.8.8.102 0 0 1 1 test2 2 -
2001:: 64 8.8.8.143 0 0 2 2 test2 2 -
Total User-Quota Sessions Shown: 2
250
Chapter 11: TCP Proxy on CGN/IPv6 Platform
This chapter explains how to enable the use of a TCP-proxy virtual port using CGN pool
instead of the regular SLB NAT pool.
Overview 252
251
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 11: TCP Proxy on CGN/IPv6 Platform Feedback
Overview
l The feature takes advantage of TCP proxy in ADC/SLB using CGN pool instead of the
regular SLB NAT pool.
l The allow-slb-cfg enable command allows SLB objects to be configured on a CGN
partition This CLI command is not supported for any other SLB features. TCP-proxy vir-
tual port must be configured along with a wildcard IPv4/IPv6 virtual server. This CLI
command is used for supporting IP address insertion in HTTPS requests and for TCP-
proxy.
l While configuring the virtual server, use the use-cgnv6 sub-option as a source NAT
option to configure a TCP-proxy virtual port.
l This feature supports only NAT64, CGN/NAT44, Fixed-NAT NAT44, and Fixed-NAT
NAT64. All other CGN IPv6Migration technologies are not supported.
l The destination-based rule-list bound to Fixed-NAT configuration is supported for TCP-
proxy.
l This feature supports CGN logging using CGN pool instead of the regular SLB NAT pool.
The logging type supported is Syslog only. For more information about CGN logging, see
Traffic Logging Guide for IPv6 Migration.
252
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 11: TCP Proxy on CGN/IPv6 Platform Feedback
4. The following commands create the Ethernet interfaces connected to the firewalls:
ACOS(config)# interface ethernet 1
ACOS(config-if:ethernet:1)# enable
ACOS(config-if:ethernet:1)# exit
ACOS(config-if:ethernet:2)# enable
ACOS(config-if:ethernet:2)# exit
ACOS(config-if:ethernet:3)# enable
ACOS(config-if:ethernet:3)# exit
5. The following commands create the real servers or clients, and then enable promis-
cuous mode:
ACOS(config)# interface ve 118
ACOS(config-if:ve:118)# ip allow-promiscuous-vip
253
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 11: TCP Proxy on CGN/IPv6 Platform Feedback
ACOS(config-if:ve:118)# exit
ACOS(config-if:ve:119)# exit
6. The following command configures a pool of IP addresses for use by source NAT:
ACOS(config)# ip nat pool p2 30.30.30.78 30.30.30.78 netmask /24
254
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 11: TCP Proxy on CGN/IPv6 Platform Feedback
10. The following command binds the class list to the LSN feature:
ACOS(config)# cgnv6 lsn inside source class-list lsn
ACOS(config-lsn-rule-list)# ip 30.30.30.30/32
13. The following commands configure a LSN_LID and add the pool to it:
ACOS(config)# cgnv6 lsn-lid 1
255
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 11: TCP Proxy on CGN/IPv6 Platform Feedback
ACOS(config-lsn-lid)# source-nat-pool p1
ACOS(config)# exit
14. The following command binds the class list to the NAT64 feature:
ACOS(config)# cgnv6 nat64 inside source class-list nat64
16. The following command configure Fixed NAT inside users using IPv4/IPv6 inside user
address with a session quota of 100:
ACOS(config)# cgnv6 fixed-nat inside 25.25.25.25 25.25.25.25 netmask /32 nat
30.30.30.80 30.30.30.80 netmask /24 session-quota 100
256
Chapter 12: Client IP Address in Client HTTP
Requests
This chapter provides information on how to configure the ACOS device to insert a client’s IP
address into the header of the client’s HTTP request before the request is forwarded to the
server. This configuration is useful when the source IP address of client requests is changed
by NAT.
Overview 258
257
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 12: Client IP Address in Client HTTP Requests Feedback
Overview
The following information can help you configure the insertion of a client IP address in client
HTTP requests:
258
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 12: Client IP Address in Client HTTP Requests Feedback
When you select the check box, the client IP address is inserted in the client’s HTTP
request header.
2. Enter the following command to enable the insertion of the client IP address into the
headers of the client’s HTTP requests:
ACOS(config-http-alg:ClientIP-Insert)# request-insert-client-ip
ACOS(config-http-alg)# exit
2. Enter the following command to enter the configuration level for the default set of
rules:
ACOS(config-lsn-rule-list)# default
259
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 12: Client IP Address in Client HTTP Requests Feedback
ACOS(config-lsn-rule-list-default)# exit
ACOS(config-lsn-rule-list)# exit
NOTE: If the port range of the lsn-rule-list action template overlaps FTP
ALG port 21 (for example), then the lsn-rule-list action template
will have higher priority and FTP ALG won’t be performed for port
21.
1. Enter the following command to create or access the configuration level for the list:
ACOS(config)# cgnv6 lsn-lid 1
------------------------------------------
260
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 12: Client IP Address in Client HTTP Requests Feedback
The following entries are updated in the CLIENT IP address insertion output:
HTTP Request Processed 6
HTTP Client IP Insertion Performed 6
261
Chapter 13: Client IP Insertion in HTTPS
Requests on CGN/IPv6
This chapter provides information about how to configure the ACOS device to insert a client’s
IP address into the header of the client’s HTTPS request before the request is forwarded to
the server.
Overview 263
262
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 13: Client IP Insertion in HTTPS Requests on CGN/IPv6 Feedback
Overview
The following information can help you configure the insertion of a client IP address in client
HTTPS requests:
l This feature supports client IP insertion into HTTPS client requests similar to XFF fea-
ture already available.
l This feature supports only NAT64 and CGN/NAT44. Fixed-NAT NAT44, Fixed-NAT
NAT64 and all other CGN IPv6Migration technologies are not supported.
l The feature takes advantage of HTTPS proxy in ADC/SLB using CGN pool instead of the
regular SLB NAT pool.
l The allow-slb-cfg enable command allows SLB objects to be configured on a CGN
partition for the sole purpose of supporting IP address insertion in HTTPS requests. This
CLI command is not supported for any other SLB features. HTTPS virtual port must be
configured along with a wildcard IPv4/IPv6 virtual server.
l The same user quota will be applied to both HTTPS traffic and CGN traffic for the same
inside user.
l This feature supports CGN logging using CGN pool instead of the regular SLB NAT pool.
The logging type supported is Syslog only. For more information about CGN logging, see
Traffic Logging Guide for IPv6 Migration.
263
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 13: Client IP Insertion in HTTPS Requests on CGN/IPv6 Feedback
5. The following commands create the Ethernet interfaces connected to the firewalls and
the real servers or clients, and then enable promiscuous mode:
ACOS(config)# interface ethernet 1
ACOS(config-if:ethernet:1)# enable
ACOS(config-if:ethernet:1)# ip allow-promiscuous-vip
ACOS(config-if:ethernet:2)# enable
6. The following commands configure a server SSL template to use the certificate and
264
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 13: Client IP Insertion in HTTPS Requests on CGN/IPv6 Feedback
key:
ACOS(config)# slb template server-ssl sssl1
265
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 13: Client IP Insertion in HTTPS Requests on CGN/IPv6 Feedback
12. The following command binds the class list to the LSN feature:
ACOS(config)# cgnv6 lsn inside source class-list lsn-clients
14. The following commands configure a LSN_LID and add the pool to it:
ACOS(config)# cgnv6 lsn-lid 1
266
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 13: Client IP Insertion in HTTPS Requests on CGN/IPv6 Feedback
ACOS(config)# exit
15. The following command binds the class list to the NAT64 feature:
ACOS(config)# cgnv6 nat64 inside source class-list nat64-clients
267
Chapter 14: Client Mobile Numbers in Client
HTTP Requests
This chapter explains how to configure the ACOS device to obtain a client’s mobile number
from a RADIUS server, and how to insert this mobile number in the X-MSISDN header of a cli-
ent’s request and forward the request to the server.
Overview 269
268
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
Overview
This feature is useful for tracking clients who are paid subscribers to a mobile HTTP service.
When a mobile client sends an HTTP request, the billing server for the paid service can
retrieve the mobile number from the header of the client’s HTTP request. This enables the
billing application to correctly distinguish paid subscribers.
Most applications check for a client’s mobile number in the X-MSISDN header of the client
request. The following section describes how to configure the ACOS device to obtain client
mobile numbers from RADIUS servers insert the numbers in the X-MSISDN headers in a client
request.
l This feature supports NAT44, NAT64, 6rd-NAT64, and DS-Lite and does not support
6rd, Static NAT, or Fixed-NAT sessions.
l This feature is not available for hairpin sessions.
l For NAT44 sessions, the inside (client) IP address used for a query is always an IPv4
address. For NAT64, 6rd-NAT64, and DS-Lite sessions, the inside (client) IP address
used for a query is always an IPv6 address.
l In the current release, the ACOS device can run a maximum of 40,000 simultaneous
query sessions. Sessions which exceed this value are automatically dropped.
l This feature supports the following HTTP methods: GET, HEAD, PUT, POST, OPTIONS,
DELETE, TRACE, and CONNECT.
l This feature is independent of the feature for inserting client MSISDN values into CGN
traffic logs. (See the Traffic Logging Guide for IPv6 Migration).
l The service group containing the client RADIUS servers must use the round-robin load-
balancing method.
l The ACOS configuration can contain a maximum of 32 HTTP-ALG templates.
l If you disable an HTTP-ALG template that is currently in use by active data sessions, it
takes around 60 seconds for the template to be disassociated from the sessions.
269
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
l The maximum length supported for the mobile phone number value is 15 digits.
l You can not manually clear RADIUS query sessions.
l If the query fails, a fake MSISDN with the value “0000” is automatically inserted in the
HTTP header.
l Each inside IP address (client) must query at least once when the IP address has a ses-
sion through the ACOS device. If all client session timeout, another query automatically
occurs.
To obtain a client’s mobile number, the ACOS device acts as a RADIUS client. The ACOS
device sends a ADIUS accounting-request message to the RADIUS server used by the clients
requesting the MSISDN from the RADIUS server. The ACOS device inserts the mobile number
that is received in the accounting-reply message in the X-MSISDN header of the client’s
request before forwarding the request to the content server.
270
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
The Request Authenticator is a secure hash value that the RADIUS server and ACOS device
use to authenticate the RADIUS traffic that flows between them.
For more information, see the “Management Security Features” chapter in the System Con-
figuration and Administration Guide.
The sections below provide examples of a successful (and an unsuccessful) reply to a RADIUS
accounting-request message from the ACOS device.
If the RADIUS server finds the MSISDN for the inside IP address of the ACOS device, and the
response does not carry an A10-CGN-Response code and Calling-Station-ID, the ACOS device
will drop the response.
The ACOS device accepts the MSISDN only as a numeric string (for example, “6086227037”).
Values carried in the Calling-Station-ID that do not follow this format are automatically
dropped.
Accounting Response {
Header : {
Packet Code=ACCT_RESP (1 octet)
Id=XXX (1 octet)
Length = XXX (2 octets)
Request Authenticator = 0123456789ABCDEF (16 octets)
}
Attributes : {
Vendor-Specific: String Value= {
A10-CGN-Response: Integer Value = SUCCESS (4 octets)
}
271
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
In this example, the value of the A10-CGN-Response field is FAILURE. (See the “Management
Security Features” chapter of the System Configuration and Administration Guide.)
272
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
NOTE: Use this procedure or the one in Adding the Server Con-
figurations and Service Group for the Client RADIUS Servers to
define the RADIUS servers.
Adding the Server Configurations and Service Group for the Client RADIUS Servers
To create a server configuration for a client RADIUS server:
273
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
When you select the check box, the client mobile number is inserted in the client’s HTTP
request header.
7. In RADIUS Server Maximum Retries, enter the number of times that the ACOS device
can resend a request that times out.
8. In Maximum RADIUS Server, select whether the ACOS device is allowed to send a
timed out query to a different server in the service group.
You can enter 0 (disabled) or 1 (try up to one additional server). If you enter 1, but the
service group contains only one server, the ACOS device creates another session with
the same server.
9. In Timeout, enter the maximum number of seconds the ACOS device waits for a reply
to a RADIUS accounting-request message from the ACOS device to the client RADIUS
server. You can specify 1-3 seconds. The default is 2.
10. Click Create.
274
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
Method 1: Configure an IP list that contains the IP address of each RADIUS server
NOTE: Use this procedure or the one in Adding the Server Con-
figurations and Service Group for the Client RADIUS Servers to
define the RADIUS servers.
Using this method, ACOS acts as a RADIUS server, and receives RADIUS Accounting inform-
ation from external RADIUS servers. ACOS caches the numbers and can insert these numbers
in CGN log messages, HTTP requests (or both) based on your configuration.
This method does not require configuration of a service group for the external RADIUS serv-
ers. Service-group configuration for querying external RADIUS servers is optional. Queries
are performed only when ACOS does not have the MSISDN of the client in the cache.
NOTE: The MSISDN obtained from queries is not stored in the cache.
Commands
1. Enter the following command to create an IP list for client RADIUS servers:
ACOS(config)# ip-list RADIUS_IP_LIST
275
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
Method 2: Add a server configuration for each client RADIUS server, and add them to a service
group
The following commands configure insertion of client mobile numbers into the headers of cli-
ent requests:
To begin, the following commands create configurations for the client RADIUS servers and
add them to a service group:
1. Enter the following command to create a server configuration for a client RADIUS
server:
ACOS(config)# cgnv6 server radius1 203.0.118.2
2. Enter the following command to sspecify the UDP port on which the server listens for
RADIUS accounting traffic:
ACOS(config-real server)# port 1813 udp
3. Enter the following command to create a service-group (server pool) for the traffic log
servers:
ACOS(config)# cgnv6 service-group RADIUS_SVG udp
4. Enter the following command to add a client RADIUS server and its UDP port to the ser-
vice group:
ACOS(config-cgnv6 svc group)# member radius1 1812
The following commands configure the HTTP-ALG template for insertion of client mobile num-
bers in HTTP requests:
276
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
To configure an HTTP-ALG template for mobile number insertion, use the following com-
mands:
NOTE:
l All retry attempts are used with the first server before
the next RADIUS server is tried. The number of retry
attempts is defined as the sum of values for the retry
and retry-svr-num configuration options.
l For example, if the value retry is set to 3 and retry-
svr- num is set to 1, the ACOS device will try the first
server 4 times (1+3 retry attempts), and try a second
server 4 times (1+3 retry attempts).
l If all servers are down, the query will fail after com-
pleting the entire retry process.
277
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
2. Enter the following command to enter the configuration level for the set of rules to
apply to the specified IP host address or subnet:
ACOS(config-lsn-rule-list)# ip 10.3.3.0/24
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# ip 10.1.1.1/32
ACOS(config-lsn-rule-list-ip)# exit
ACOS(config-lsn-rule-list)# exit
1. Enter the following command to create or access the configuration level for the list:
ACOS(config)# cgnv6 lsn-lid 4
-----------------------------------------------
278
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 14: Client Mobile Numbers in Client HTTP Requests Feedback
279
Chapter 15: Fixed-NAT
This chapter provides an overview of Fixed-NAT and how to configure it.
Overview 281
280
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
Overview
Fixed-NAT allocates NAT ports for each client from a predetermined set of ports on the NAT
address. Since each client that is using Fixed-NAT gets a fixed set of ports, a client can be
identified without a log. A client can be identified based solely on the NAT IP address and the
port numbers in the client’s fixed allocation of ports.
NOTE: A NAT64 prefix with mapping to a class list is not supported for
Fixed NAT.
You can also configure a dynamic pool of ports to provide additional ports to clients who run
out of NAT ports. Since the dynamic pool of ports can be used by any client, logging still is
applicable to port allocations from the dynamic pool.
l ESP
l FTP
l TFTP
l RTSP
l PPTP
l SIP
Fixed-NAT
FIGURE 15-1 illustrates an example of a Fixed-NAT deployment for multiple client IP ranges.
281
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
282
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
All the clients are mapped to NAT addresses in the 9.9.9.100-254 range.
NOTE: For simplicity, the figure shows the mappings for only some cli-
ent addresses.
Port assignments are calculated by using the number of inside clients and the number of NAT
addresses and the following operations:
l The ACOS device divides the number of clients by the number of NAT addresses.
l The ACOS device divides the number of available ports per NAT address by the number
of clients per NAT address.
For example, in FIGURE 15-1, there are 355 inside clients and 155 NAT addresses. Rounding
up, this is 355 / 155 = 3 inside clients per NAT address. With 3 inside clients per NAT address,
only 119 NAT addresses are needed and the rest remain unused.
On each NAT address, by default, 64512 protocol ports are available for client mappings.
(Ports 1-1023 are never used for Fixed-NAT.) You can also configure a lower range of ports as
usable NAT ports.
In this example, 5000 ports are set aside on each NAT address as a dynamic pool of ports. The
pool of ports is used by inside clients who run out of reserved ports. This leaves 59512 ports
that can be reserved for individual client addresses. For more information, see Dynamic
Pools.
Three inside clients per NAT address and 59512 ports per NAT address results in 19837 ports
per inside client.
NOTE: This example assumes all the ports can be used for Fixed-NAT.
You can also explicitly specify the range of usable NAT ports.
If a NAT address has leftover ports, but not enough ports for another client, the leftover ports
are unused. In FIGURE 15-1, each NAT address has enough ports to provide 19837 port ranges
to 3 clients. As a result, 59511 ports are used with 1 port left over (60535).
283
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
By default, Fixed-NAT uses ports in the 1024-65535 range. You can change this port range
when you create the simplified Fixed-NAT configuration.
Dynamic Pools
A dynamic pool is a range of IP addresses that is set aside for clients who do not have any
available reserved ports.
For example, if client 5.5.5.1 is already using ports 1024-26839, and the client needs more
ports, the additional ports can be allocated from the dynamic pool (in this example, 60536-
65535).
NOTE: The dynamic pool ports on a NAT address are available only to cli-
ents that are mapped to that address. For example, dynamic pool
ports on NAT address 9.9.9.100 can be used by clients 5.5.5.1 and
5.5.5.2 but not by any other clients.
This range can be different if a dynamic pool is configured, or the range of usable NAT
ports is set.
284
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
l If you do not configure the number of usable NAT ports, ports 1024-65535 (U) are avail-
able on each NAT address.
l If you do not set the configured dynamic pool size (D) to 0, the number of available NAT
ports is (N) = U - D.
To calculate ports-per-user:
You can select one of the following options to map inside client IP addresses to public NAT IP
addresses:
l Use Least NAT IPs—Inside client IP addresses can be allocated to NAT addresses with
the goal of minimizing the use of available public NAT IP Addresses. This is the current
behavior. This configuration method may result in some unused NAT IP addresses. For
details, refer to Use Least NAT IPs.
l Use All NAT IPs—Inside client IP addresses can be allocated with the intent to use all of
the available NAT IP addresses. This new algorithm ensures that all NAT IP addresses
are used, with little room for any unused NAT IP addresses. For details, refer to Use All
NAT IPs with an Offset.
By default, if neither method is explicitly configured, use the Use Least NAT IPs method.
You can also configure an “offset” when you map an inside client IP address to an external
NAT IP address. By default, the first inside client IP address is automatically mapped to the
first NAT IP address. However, with the option to specify the offset, the ACOS software allows
you to indicate the first inside client IP addresses to any NAT IP address to which the offset
points.
285
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
If you do not select a Fixed-NAT address mapping method, by default, the use-least-ip
option is used.
286
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
FIGURE 15-2: Using the Least NAT IPs with an Offset (Value of 2)
287
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
l Inside IP list – Name of IP list that contains the ranges for IPv4/IPv6 inside clients. This
also can be one IPv4/IPv6 range. You can specify one contiguous address range or the
name of an IP list. To configure Fixed-NAT for multiple address ranges, you must use an
IP list.
NOTE:
l The maximum number of IP lists or IP ranges varies
depending on your Thunder Series model.
l The maximum number of IP list entries or IP ranges that
can be added to the fixed-NAT configuration in a par-
tition is 10,000 for platforms below 64GB, 20,000 for a
64GB platform, and 30,000 for a 128GB platform.
l Also, the maximum number of IPv4 or IPv6 addresses,
ranges, or prefixes supported per IP list is 1024 for plat-
forms below 64GB, 2048 for a 64GB platform, and 3072
for a 128GB platform.
l Outside IP list – Name of IP list that contains the ranges for NAT addresses. This also
can be one NAT address range.
l (Optional) Usable NAT ports – Range of protocol ports that can be allocated to clients.
You can specify a protocol port in the 1024-65535 range.
l (Optional) Ports per user – Number of protocol ports to allocate to each new client. You
can specify a port in the 1-64512 range. If you do not specify this option, the ACOS
device automatically calculates it based on the configuration. For more information, see
Port Allocation Logic.
l (Optional) Dynamic pool size – Number of addresses to set aside for clients that run out
of reserved ports. The dynamic pool is allocated from the top of the range of usable NAT
ports.
288
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
For example, if the range of usable NAT ports is 5000-60000, and the dynamic pool size
is 5000, ports 55001-60000 are allocated to the dynamic pool. Only ports 5000-55000
can be reserved for clients. By default, there is no dynamic pool.
l (Optional) Session quota – Maximum number of sessions that can be created for a cli-
ent. You can specify 1-2147483647. By default, there is no session quota.
l (Optional) VRRP-A VRID – ID of the VRRP-A virtual router to which the Fixed-NAT
addresses must be assigned. There is no default.
Here is a high-level view of the process to configure Fixed-NAT for multiple client IPv4
address ranges:
Here is a high-level view of the process to configure Fixed-NAT for multiple client IPv6
address ranges, such as for DS-Lite:
289
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
3. Configure Fixed-NAT to use the IP lists together to create the fixed IP address map-
pings. Optionally, you also can configure the following Fixed-NAT options for the IP
ranges:
You can map public IPv4 NAT addresses to the IPv6 prefixes or individual IPv6 addresses of
Customer Premises Equipment (CPE). The CPE is the DS-Lite router in the DS-Lite customer’s
home network. The CPE encapsulates the client’s IPv4 traffic into an IPv6 tunnel for trans-
port between the customer’s home network and the customer’s ISP.
The address allocation for DS-Lite Fixed-NAT clients works the same as the Fixed-NAT
address allocation for IPv4 clients, such as LSN clients. For more information, see Configuring
Fixed NAT.
The same optional parameters, such as dynamic pool size, HA group, and session quota are
supported. LSN user quotas also are supported.
NOTE: For DS-Lite Fixed-NAT, user quotas are calculated based only on
the CPE IPv6 prefix or address. All IPv4 addresses using the same
IPv6 CPE address are classed together as one inside client who is
assigned one NAT IP address and one port range.
CPE Ranges
l To apply Fixed-NAT to ranges of IPv6 CPE prefixes, instead of individual CPE addresses,
use an IP list to specify the CPE prefix range.
l To specify CPE prefixes, you must use an IP list.
l To specify individual CPE addresses, you can use an IP list or specify the addresses
when you enable Fixed-NAT.
290
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
If you configure Fixed-NAT for IPv6 CPE prefixes, instead of individual addresses, all IPv6 cli-
ents that share the same prefix receive one NAT IP address and one port range.
ALG is supported for DS-Lite Fixed-NAT traffic for the following protocols:
l FTP
l TFTP
l RTSP
l PPTP
l SIP
ACOS includes L3V support for NAT44, NAT64 and DS-Lite in the following scenarios:
291
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
This example has two private partitions with L3V enabled. Each partition is connected to its
own set of Fixed-NAT clients that share overlapping private IPv4 addresses. The shared par-
tition is connected to the IPv4 internet.
The Fixed-NAT configurations for inter-partition routing need to be made in the shared par-
tition. Client traffic is received by the private partitions on their VLAN Virtual Ethernet (VE)
interfaces. The incoming traffic is handled based on the Fixed-NAT configuration in the
shared partition. Each private partition has a default route, where the next hop is the shared
partition.
VRRP-A is used for redundancy. (The second ACOS device is not shown.) The Fixed-NAT con-
figurations are backed up by VRRP-A. Each private partition is configured to base its VRRP-A
Active/Standby state on the state of the shared partition’s VRID.
292
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
Configuring IP Lists
To configure IP lists:
293
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
c. Enter the Start Address, End Address and Netmask of the range.
To specify an IP list:
i. Select IP List.
ii. Select IPv4 or IPv6.
iii. In IP list, select the IP list.
l To specify an IP range:
a. In Inside, select IPv4 or IPv6.
To specify an IP list:
i. In the Inside section, select IPv4 or IPv6.
ii. In the IP list drop-down list, select the IP list.
5. Configure general settings, if applicable. Click General Fields to display the options.
(For more information, see Fixed-NAT Configuration Options.)
6. Click Create.
1. Enter the following command to configure the IP list for the client IP address ranges:
ACOS(config)# ip-list fixed-nat-inside-users
2. Enter the following commands to configures an IP range based on the beginning and
ending host address:
ACOS(config-ip list)# 5.5.5.1 to 5.5.5.254
294
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
3. Enter the following commands to configure the IP list for the NAT IP address range:
ACOS(config-ip list)# ip-list fixed-nat-public-address
4. Enter the following command to configure Fixed-NAT for multiple client IPv4 address
ranges:
ACOS(config)# cgnv6 fixed-nat inside ip-list fixed-nat-inside-users nat ip-
list fixed-nat-public-address dynamic-pool-size 5000
Configuring IP Lists
4. Select IPv6.
295
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
c. Enter the Start Address, End Address and Netmask of the range.
o To specify an IP list:
o Select IP List.
o Select IPv4 or IPv6.
o In IP list, select the IP list.
l To specify an IP range:
a. In the Inside section, select IPv4 or IPv6.
l To specify an IP list:
i. In the Inside section, select IPv4 or IPv6.
ii. In the IP list drop-down list, select the IP list.
296
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
5. Configure general settings, if applicable. Click General Fields to display the options.
(For more information, see Fixed-NAT Configuration Options.)
6. Click Create.
1. Enter the following command to configure the IP list for the client IP address ranges:
ACOS(config)# ip-list fixed-nat-dslite-users
CLI Examples
CLI Example 1
The following command configures Fixed-NAT for DS-Lite CPE with IPv6 addresses in the
range 2001:db8::1-100:
ACOS(config)# cgnv6 fixed-nat inside 2001:db8::1 2001:db8::100 netmask 64
nat 203.0.113.3 203.0.113.4 netmask /24
The following commands show the Fixed-NAT port mappings for the NAT addresses,
203.0.113.3 and 203.0.113.4:
ACOS(config)# show cgnv6 fixed-nat nat-address 203.0.113.3 port-mapping
NAT IP Address: 203.0.113.3
Inside User: 2001:db8::1
TCP: 1024 to 1527
UDP: 1024 to 1527
297
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
298
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
CLI Example 2
The following commands show the Fixed-NAT port mappings for the NAT addresses,
203.0.113.3 and 203.0.113.4:
ACOS(config)# show cgnv6 fixed-nat nat-address 203.0.113.3 port-mapping
NAT IP Address: 203.0.113.3
Inside User: 2001::
TCP: 1024 to 13925
UDP: 1024 to 13925
ICMP: 1024 to 13925
Inside User: 2002::
TCP: 13926 to 26827
UDP: 13926 to 26827
ICMP: 13926 to 26827
Inside User: 2003::
TCP: 26828 to 39729
UDP: 26828 to 39729
ICMP: 26828 to 39729
Inside User: 2004::
TCP: 39730 to 52631
UDP: 39730 to 52631
ICMP: 39730 to 52631
Inside User: 2005::
TCP: 52632 to 65533
UDP: 52632 to 65533
299
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
The procedures in this section help you choose the method to use for fixed mapping of inside
client IP addresses to external NAT addresses.
300
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
3. In the Inside section, if you created an IP list for your inside client IP addresses, select
IP List. Select the IP list from the drop-down list.
4. If you created an IP list for your external NAT addresses, in NAT, select IP List.
5. In IP List, select a NAT IP List.
If you do not select an option, the default option, Use Least NAT IP Addresses, is used.
Random allows the ACOS device and software to determine the offset. However, to
explicitly configure an offset value, you must enter a value.
8. Click Create.
l An offset.
NOTE: The offset that you specify should be lesser than the available
number of NAT IP addresses.
If you create an IP list for your inside client IP addresses and another for your NAT addresses,
you can use this command to specify the address mapping algorithm.
When it comes to specifying offsets, you have two ways in which to configure them:
l Configure the offset explicitly using the offset keyword. In this way, you control
which inside client IP address will be mapped to a particular NAT IP address of your
choice.
l Configure the offset dynamically using the random keyword. In this way, the ACOS
device and software will automatically assign an offset for the inside client IP address.
301
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
At the time of configuration, a random offset value will be assigned. If the ACOS device
reboots, a different value may be chosen the next time.
Configuration Examples
The following examples assume that you have an IP list for inside client IP addresses called
“inside”, as follows:
ACOS(config)# ip-list inside
ACOS(config-ip-list)# 12.10.10.160 to 12.10.10.188
The examples also assume that you have an IP list for NAT IPs called “nat”, as follows:
ACOS(config)# ip-list outside
ACOS(config-ip-list)# 9.9.9.87 to 9.9.9.91
The examples display the method that is used when mapping inside addresses to external
NAT IP addresses. When you configure the Fixed-NAT address mapping method, the show
commands display the five insider users who are mapped to each NAT IP address and their
corresponding port allocations.
The following example displays the Use Least NAT IP addresses method that is used when
mapping inside addresses to external NAT IP addresses. Note that the first inside client IP
address is mapped to the first NAT Address:
ACOS(config)# cgnv6 fixed-nat inside ip-list inside nat ip-list outside method
use-least-nat-ips
302
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
303
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
304
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
This example configures the Use Least NAT IPs method with an offset of 2. Note that the first
inside client IP address is mapped to the third NAT address based on the offset of 2 that you
specified. When all the inside clients are mapped once, the cycle continues from the first IP
address again.
ACOS(config)# cgnv6 fixed-nat inside ip-list inside nat ip-list outside method
use-least-nat-ips offset 2
ACOS(config)# show cgnv6 fixed-nat nat-address 9.9.9.89 port-mapping
NAT IP Address: 9.9.9.89
Inside User: 12.10.10.160
TCP: 1024 to 11775
UDP: 1024 to 11775
ICMP: 1024 to 11775
305
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
306
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
307
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
This example configures the Use Least NAT IPs method with a random offset assigned by
ACOS.
308
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
ACOS(config)# cgnv6 fixed-nat inside ip-list inside nat ip-list outside method
use-least-nat-ips offset random
ACOS(config)# show cgnv6 fixed-nat nat-address 9.9.9.91 port-mapping
NAT IP Address: 9.9.9.91
Inside User: 12.10.10.160
TCP: 1024 to 11775
UDP: 1024 to 11775
ICMP: 1024 to 11775
Inside User: 12.10.10.161
TCP: 11776 to 22527
UDP: 11776 to 22527
ICMP: 11776 to 22527
Inside User: 12.10.10.162
TCP: 22528 to 33279
UDP: 22528 to 33279
ICMP: 22528 to 33279
Inside User: 12.10.10.163
TCP: 33280 to 44031
UDP: 33280 to 44031
ICMP: 33280 to 44031
Inside User: 12.10.10.164
TCP: 44032 to 54783
UDP: 44032 to 54783
ICMP: 44032 to 54783
Inside User: 12.10.10.165
TCP: 54784 to 65535
UDP: 54784 to 65535
ICMP: 54784 to 65535
309
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
310
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
311
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
The following example displays the Use All NAT IPs method that is used when mapping inside
client IP addresses to external NAT IP addresses. Note that the first inside client IP address is
mapped to the first NAT address, the second client IP address to the second NAT IP address,
and so on.
When all the first five client IP addresses (from the client IP address range of 12.10.10.160-
188) are assigned to the five available NAT IP addresses (9.9.9.87-91), one per NAT IP address,
the cycle continues with the sixth client IP address (12.10.10.165) being mapped to the first
NAT IP address (9.9.9.87). This mapping continues until all client IP addresses are assigned an
external NAT IP address. This mapping model ensures that no NAT IP address is left unused:
ACOS(config)# cgnv6 fixed-nat inside ip-list inside nat ip-list outside method
use-all-nat-ips
312
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
313
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
314
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
The following example displays the Use All NAT IPs method with an offset of 2. Note that the
first inside client IP address is mapped to the third NAT address based on the offset of 2 that
you specified. When all the inside clients are mapped once, the cycle continues from the first
IP address again.
The following example displays the effect of the configured offset of 2, starting with the NAT
IP Address that contains the first inside client IP address of 12.10.10.160:
ACOS(config)# cgnv6 fixed-nat inside ip-list inside nat ip-list outside method
use-all-nat-ips offset 2
315
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
316
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
317
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
The following example displays the Use All NAT IPs method with a random offset.
ACOS(config)# cgnv6 fixed-nat inside ip-list inside nat ip-list outside method
use-all-nat-ips offset random
ACOS(config)# show cgnv6 fixed-nat nat-address 9.9.9.88 port-mapping
NAT IP Address: 9.9.9.88
Inside User: 12.10.10.160
TCP: 1024 to 11775
UDP: 1024 to 11775
318
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
319
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
320
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
321
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
MAC-based nexthop routing for Fixed-NAT enables the ACOS device to identify the route hop
based on the MAC address of the inside client’s request. The ACOS device uses the MAC
address, instead of the route table, to select the next hop for the reply. Replies that are sent
to the client use the same route hop on which the request was received.
l MAC-based nexthop routing is supported for LSN, DS-Lite, NAT64 and Fixed-NAT ses-
sions and is not supported for Stateless NAT. You can use MAC-based nexthop routing
with 6rd, only if 6rd is used with NAT64.
l This enhancement operates on a per-session basis. After the session idles out, the cli-
ent’s MAC address is no longer used to identify the route hop and the ACOS device
looks at the route table to send the reply.
2. Enter the following command to enable MAC-based nexthop routing for the specified
LSN LID:
ACOS(config-lsn-lid)# respond-to-user-mac
322
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
The following commands configure an Ethernet interface to the Internet and enable NAT out-
side on the interface:
ACOS(config)# vlan 20
ACOS(config-vlan:20)# tagged ethernet 2
ACOS(config-vlan:20)# router-interface ve 20
ACOS(config-vlan:20)# interface ve 20
ACOS(config-if:ve20)# ip address 9.9.10.200 255.255.255.0
ACOS(config-if:ve20)#ip nat outside
ACOS(config-if:ve20)# exit
The vrrp-a vrid-lead option configures a VRRP-A lead. Later in the configuration, the par-
titions are configured to follow the shared partition’s VRID state. When the shared partition’s
VRID is active, so is the VRID of each of the private partitions that follows the shared par-
tition’s VRID state. Likewise, if the shared partition’s VRID state changes to Standby, so does
the VRID state of each of the private partition VRIDs that are followers.
323
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
The following command configures Fixed-NAT mappings for partition “p2” making use of the
IP lists that were just created:
ACOS(config-ip list)# cgnv6 fixed-nat inside ip-list P2_inside_users partition
p2 nat ip-list P2_NAT_IPs vrid 1
The partition option in the Fixed-NAT configuration above binds them for use by a specific
partition alone.
The commands in this section are used to configure the private partition “p2”. To begin, the
following command changes the CLI to the partition “p2”.
ACOS-Active(config)# end
ACOS-Active# active-partition p2
Currently active partition: p2
First, configure an Ethernet interface to the inside clients and enable NAT inside on the inter-
face:
ACOS-Active[p2]# configure
ACOS-Active[p2](config)# vlan 10
ACOS-Active[p2](config-vlan:10)# tagged ethernet 1
ACOS-Active[p2](config-vlan:10)# router-interface ve 10
324
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
ACOS-Active[p2](config-if:ve10)# interface ve 10
ACOS-Active[p2](config-if:ve10)# ip address 10.10.10.200 255.255.255.0
ACOS-Active[p2](config-if:ve10)# ip nat inside
ACOS-Active[p2](config-if:ve10)# exit
The following command configures a static IP route from the private partition to the shared
partition. The partition shared option specifies that the next hop for the route is the shared
partition.
ACOS-Active[p2](config)# ip route 0.0.0.0 /0 partition shared
The following command enables VRRP-A for the partition. VRID 1 is configured to base its Act-
ive/Standby state on the state of VRID lead “leader”, configured in the shared partition:
ACOS-Active[p2](config)# vrrp-a vrid 1
ACOS-Active[p2](config-vrid:1)# follow vrid-lead vrid1-leader
The commands in this section mirror those used to configure partition “p3”.
NOTE: VLANs and VEs need to be unique across partitions but interface
addresses do not need to be unique.
ACOS-Active(config)# end
ACOS-Active# active-partition p3
Currently active partition: p3
ACOS-Active[p3]# configure
ACOS-Active[p3](config)# vlan 11
ACOS-Active[p3](config-vlan:11)# tagged ethernet 1
ACOS-Active[p3](config-vlan:11)# router-interface ve 11
ACOS-Active[p3](config-if:ve11)# interface ve 11
ACOS-Active[p3](config-if:ve11)# ip address 10.10.10.200 255.255.255.0
ACOS-Active[p3](config-if:ve11)# ip nat inside
ACOS-Active[p3](config-if:ve11)# exit
ACOS-Active[p3](config)# vrrp-a vrid 1
ACOS-Active[p3](config-vrid:1)# follow vrid-lead vrid1-leader
Up to ten port-mapping files can exist for a Fixed-NAT configuration. When the maximum
configured number of configuration files is exceeded, then the oldest file will be deleted in
order to add the new configuration file. It is also possible to manually delete a Fixed-NAT con-
325
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
figuration file, although the newest file with the current configuration cannot be deleted.
Only past configuration files can be deleted.
If file creation for port mapping is enabled, a new file is created whenever the ACOS device
reloads, and a syslog entry will be created to indicate the new file name. A notification is
issued when a new file is created via an SNMP trap. Likewise, whenever a file is deleted, an
SNMP trap and a syslog message are generated.
For the new Fixed-NAT configuration files, there will be a timestamp to indicate the time of
file creation. When the Fixed-NAT Table information is exported, an MD5 checksum is
included at the end of the file to indicate whether or not the transfer of Fixed-NAT table
information is complete.
When a Fixed-NAT configuration is deleted, then the latest file will be saved in an archive. An
appended timestamp on the file will indicate the time the configuration was deleted.
To access the archived file, use a show command or export the file.
To configure the number of port-mapping files to retain, enter the following command at the
global configuration level:
ACOS(config)# cgnv6 fixed-nat port-mapping-files-count 1
The number of stored port-mapping files can range from 1 to 10. The default value is 5 files.
To delete a port-mapping file manually, enter the following command at the global con-
figuration level:
ACOS(config)# delete cgnv6 fixed-nat file1
To display a list of active port-mapping files, reflecting the current configuration, enter the
following command:
ACOS(config)# show cgnv6 fixed-nat port-mapping-file
To display a list of all port-mapping files, including past configurations, enter the following
command:
ACOS(config)# show cgnv6 fixed-nat port-mapping-files all
326
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
To display the archived Fixed-NAT port-mapping file, enter the following command:
ACOS(config)# show cgnv6 fixed-nat port-mapping-files archive
To export the archived Fixed-NAT port-mapping file, enter the following command:
ACOS(config)# export fixed-nat-archive file1 ftp://user-
:[email protected]/a.txt
To periodically back-up Fixed-NAT files, enter the following command at the global con-
figuration level:
ACOS(config)# backup-periodic fixed-nat {hour num | day num |weeks num}
The num for periodic backup specifies the hour, day, or weekly interval in which to back-up
the Fixed-NAT files. The hourly interval can be from 1 to 65534 hours. The daily interval can
be from 1 to 199 days. The weekly interval can be from 1 to 199 hours.
NOTE: The periodic backup applies only to the active-port mapping files
that reflect the current configuration. This backup does not
export the historical files.
NOTE: The SNMP trap is generated while the file is created, and the trap
contains only the filename and the event of trigger (Creation,
Deletion).
Here is an example:
To get the list of all of the active files, as well as the timestamp information, use the following
SNMP method and OID to do a status check for configuration changes:
axFixedNatFileTable
1.3.6.1.4.1.22610.2.4.3.18.120.16.1
327
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
l axFixedNatFileName
l axFixedNatFileTimeStamp
This method retrieves a list of all port mapping files, and their names. Optionally, use the
input parameter only_active to specify whether to retrieve only active files (1), or to retrieve
all files (0). By default, only active files are retrieved.
Example
This example shows how to use the aXAPI to retrieve all fixed NAT tables.
URL:
https://[IP]:[Port]/services/rest/V2.8/?session_id=[SESSION_ID]&-
format=json&method=lsn.fixed_nat.port_mapping_file.getAll
aXAPI Response:
{
"fixed_nat_port_mapping_file_list":[
{
"name":"fixed_nat_3.3.3.3_2014_11_11_072253"
},
{
"name":"fixed_nat_3.3.3.3_2014_11_06_045122"
},
{
"name":"fixed_nat_3.3.3.3_2014_11_06_025145"
},
{
328
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
"name":"fixed_nat_69.9.9.9_2014_11_11_072253"
},
{
"name":"fixed_nat_69.9.9.9_2014_11_06_081140"
},
{
"name":"fixed_nat_69.9.9.9_2014_11_06_070759"
},
{
"name":"fixed_nat_22.2.2.2_2014_11_11_072253"
},
{
"name":"fixed_nat_22.2.2.2_2014_11_06_081140"
},
{
"name":"fixed_nat_22.2.2.2_2014_11_06_070924"
}
]
}
Example
This example shows how to use the aXAPI to retrieve all currently active fixed NAT tables.
URL:
http(s)://[IP]:[Port]/services/rest/V2.8/?session_id=[SESSION_ID]&-
format=json&method=lsn.fixed_nat.port_mapping_file.getAll
HTTP POST Body: (Optional, because 1 is the default value of the only_active parameter)
{
“only_active”: 1
}
aXAPI Response:
{
"fixed_nat_port_mapping_file_list":[
{
"name":"fixed_nat_3.3.3.3_2014_11_11_072253"
},
{
"name":"fixed_nat_69.9.9.9_2014_11_11_072253"
},
329
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
{
"name":"fixed_nat_22.2.2.2_2014_11_11_072253"
}
]
}
This method deletes the named file. Specify the file name using the input parameter name, a
string of 1-255 characters.
Example
URL:
http(s)://[IP]:[Port]/services/rest/V2.8/?session_id=[SESSION_ID]&-
format=json&method=lsn.fixed_nat.port_mapping_file.delete
lsn.fixed_nat.port_mapping_file.download
This method downloads the named file. Specify the file name using the input parameter
name, a string of 1-255 characters.
Do not download using the POST body. Use the URL for the input parameter instead.
Example
This example shows how to use CURL to download a fixed NAT file as a text file.
URL:
http(s)://[IP]:[Port]/services/rest/V2.8/?session_id=[SESSION_ID]&-
format=json&method=lsn.fixed_nat.port_mapping_file.download&name=fixed_nat_
22.2.2.2_2014_11_06_070924
CURL Command:
330
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
Enter the following commands to display Fixed-NAT port mappings for a specific inside client
IP address:
ACOS(config)# show cgnv6 fixed-nat inside-user 1.1.1.1 port-mapping
Enter the following commands to display Fixed-NAT port mappings for a NAT address:
AX3000(config)# show cgnv6 fixed-nat nat-address 2.1.1.5 port-mapping
Enter the following command to list the number of sessions a client currently has active, and
the number of TCP, UDP, and ICMP ports in use by the client:
AX3000(config)# show cgnv6 fixed-nat inside-user 1.1.1.1 quota-used
331
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
Enter the following command to display the full-cone sessions that are using a specific NAT
address:
ACOS(config)# show cgnv6 fixed-nat full-cone-sessions nat-address ipv4addr
Enter the following command to show a histogram of active TCP or UDP users using ports in
specific port ranges:
ACOS(config)# show cgnv6 fixed-nat histogram port-usage {inside-user | nat-ip}
For more information on show commands, see Command Line Interface for CGN.
If a Fixed-NAT configuration is removed when there are active sessions still using the NAT IP
addresses, there is a chance that a NAT IP address can be reused before the old session is
cleared. This can result in unknown security issues. To prevent such issues, a warning mes-
sage is displayed. It is recommended to wait for approximately 2 minutes for all the asso-
ciated sessions to be cleared before deleting the Fixed-NAT configuration.
332
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
To reconfigure a Fixed-NAT configuration and reuse the NAT IP address, see Reconfiguring a
Fixed-NAT Configuration and Reusing NAT IP Address.
To disable a Fixed-NAT configuration and clear the active sessions, perform the following:
Using GUI
3. Click Disable.
The following message is displayed, “Do you want to disable fixed-nat configuration?”.
4. Click Yes.
When the Fixed-NAT configuration is disabled, the new sessions are stopped and the
existing sessions using the configuration are cleared.
To view the disabled Fixed-NAT configuration, navigate to CGN > Disabled Fixed NAT.
TABLE 15-4describes the details about the disabled Fixed NAT configurations.
Field Description
333
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
Field Description
Using CLI
To disable the Fixed-NAT configuration and clear the active sessions, use the following
example:
Clearing active sessions is optional. It can be executed only if you want to remove the Fixed-
NAT configuration with minimal downtime. Otherwise, the configuration can be removed
after all the existing sessions end.
Before deleting a Fixed-NAT configuration, it is recommended to wait for all sessions using
the configuration to be cleared.
To check if the sessions are cleared, you can perform one of the following:
For Example,
Mar 22 2019 09:58:54 Notice [ACOS]:Fixed NAT configuration for inside
12.10.10.163 12.10.10.163 netmask /24 can be deleted now.
334
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
l Run the show cgnv6 fixed-nat nat-address [IP address] disabled-config com-
mand
For Example,
ACOS(config)#show cgnv6 fixed-nat 12.10.10.163 12.10.10.163 netmask /24 dis-
abled-config
==================================
Inside ip-list:
Inside Partition:
Active users: 0
Clear session: 0
Once you verify that the sessions are cleared and active users is 0, you can delete the Fixed-
NAT configuration.
Using GUI
3. Click Delete.
The following message is displayed, “Are you sure to delete the selected items?”.
4. Click Yes.
Using CLI
335
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
1. Identify the vrid of the standby box for which you want to change the Fixed-NAT con-
figuration.
For example,
cgnv6 fixed-nat inside 12.10.10.163 12.10.10.163 netmask /24 nat 9.9.9.91
netmask /24 vrid1
You must use the standby box to change the Fixed-NAT configuration.
2. On the standby box, disable the Fixed-NAT configuration. You can use the clear-ses-
sion command to clear the active sessions and remove the configuration with minimal
downtime.
Check if the active sessions are cleared before deleting the configuration. Perform the
following:
336
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
For Example,
Mar 22 2019 09:58:54 Notice [ACOS]:Fixed NAT configuration for inside
12.10.10.163 12.10.10.163 netmask /24 can be deleted now.
==================================
Inside ip-list:
Inside Partition:
Active users: 0
Clear session: 0
After verifying that the sessions are cleared and active users is 0, run the no cgnv6
fixed-nat command to delete the configuration.
4. Swap the active and standby box on the configured vrid to add th new Fixed-NAT con-
figuration.
Log into the active box and modify the priority to change the box to standby.
ACOS-Active(config)#vrrp-a vrid 1
ACOS-Active(config-vrid:1)#blade-parameters
ACOS-Active(config-vrid:1-blade-parameters)#priority 1
337
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 15: Fixed-NAT Feedback
At this point, the standby box is promoted to be the new active box.
ACOS-Standby(config-vrid:1-blade-parameters)#show vrrp-a
vrid 1
5. On the current standby box, disable the old Fixed-NAT configuration and clear the asso-
ciated sessions.
ACOS-Standby(config)# cgnv6 fixed-nat disable 12.10.10.163 12.10.10.163 net-
mask /24 clear-session
6. On the current active box, configure the new Fixed-NAT configuration. To minimize the
downtime, you can configure a new Fixed-NAT configuration soon after step 5. You do
not have to wait for all the sessions to be cleared.
ACOS-Active(config)# cgnv6 fixed-nat inside 12.10.10.163 12.10.10.164 net-
mask /24 nat 9.9.9.91 9.9.9.92 netmask /24 vrid 1
7. Log into the current standby box, delete the old configuration, and configure the new
Fixed-NAT. It is important to make sure the old sessions are cleared using the show log
and show cgnv6 fixed-nat nat-address [IP address] disabled-config commands.
338
Chapter 16: Lightweight 4over6
This chapter describes what Lightweight 4over6 is and how to configure it.
Overview 340
339
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Overview
Lightweight 4over6 enables the ACOS device to route traffic between an IPv4 client’s IPv6
Customer Premises Equipment (CPE) and IPv4 servers.
In a Lightweight 4over6 deployment, the IPv4 client’s CPE performs NAT to assign a public
IPv4 address to the client and encapsulates the client’s NATed IPv4 traffic in an IPv6 tunnel
that is terminated on the ACOS device. ACOS supports multiple tunnel-endpoint addresses in
the binding table. For details, see Binding Table.
NOTE: For tunneled packets, the Customer Edge (CE) router decrements
the Time to Live (TTL) for the inner packet and drops the packet if
TTL is exceeded prior to encapsulation in the tunnel. The device
acts as the Border Relay (BR) and terminates the tunnel and will
not decrement the TTL for the inner packet.
The implementation of this feature is based on the Lightweight 4over6: An Extension to the
DS-Lite Architecture, draft-cui-softwire-b5-translated-ds-lite-07 RFC.
In the RFC terminology, Lightweight 4over6 moves the IPv4 NAT function from the AFTR
device to the B4 device. The AFTR device is the ACOS device, and the B4 device is the client
CPE.
Lightweight 4over6 is supported in the shared partition and L3V private partitions.
340
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
When the IPv4 client (10.10.10.1) sends an IPv4 request, the client’s CPE completes the fol-
lowing tasks:
l Translates the source IP address of the request into a NAT address (206.190.35.47:1000
in this example)
341
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
ACOS checks the active Lightweight 4over6 binding table. For more information about the
binding table, see Binding Table. If the traffic matches a binding-table entry, the ACOS
device decapsulates the client request and sends it to the IPv4 server.
Binding Table
ACOS uses a Lightweight 4over6 binding table to recognize valid Lightweight 4over6 traffic.
Each entry in the binding table consists of the following items:
l IPv6 address of the client CPE – This is the IPv6 address of the remote end of the tun-
nel.
l IPv4 NAT address the CPE assigns to the client – This must be a host address, not a sub-
net address.
l Protocol port number or range – This is the range of ports the CPE may use as source
ports with the IPv4 NAT address assigned to the client by the CPE.
l Tunnel endpoint address.
You can configure the binding table on the ACOS device, or import a binding table con-
figured on another device such as a laptop.
A binding table can contain up to 4 million entries, and up to 10 binding-table files can be
stored on the ACOS device. Only one binding table can be active at any given time.
NOTE: DS-Lite can be used for traffic that does not match the binding
table. (See Traffic Handling on Lightweight 4over6 Interfaces.)
Each entry can be configured with its own tunnel-endpoint address. A maximum of 32 tun-
nel-endpoint addresses are supported per binding table. Using the CLI, a Lightweight 4over6
binding table entry may consist of: the IPv6 tunnel address of the CPE; the IPv4 NAT address,
assigned to the client by the CPE; the ports corresponding to the IPv4 NAT address; and the
IPv6 tunnel-endpoint address.
342
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Lightweight 4over6 binding tables use the following syntax. The syntax is the same for bind-
ing tables configured on the ACOS device and for imported binding tables.
ipv6-tunnel-addr [ipv4-nat-addr port portnum [to portnum]] tunnel-endpoint-
address
In each entry:
l The ipv6-tunnel-addr is the IPv6 address of client CPE. This is the IPv6 address of the
remote end of the tunnel.
l The ipv4-nat-addr is the IPv4 NAT address the CPE assigns to the client. This must be
a host address, not a subnet address.
l The port portnum [to portnum] is the protocol port number or range the CPE may use
the as the source port in the IPv4 NAT address assigned to the client by the CPE.
l The tunnel-endpoint-address is the LW-4over6 IPIP Tunnel Endpoint Address.
After creating the binding-table file, import it onto the ACOS device. For more information
about importing the file to the ACOS device, see Configuring Lw4o6
This example contains 2 entries. The first entry matches on CPE address 3ff7::85, NAT
address 10.1.1.2 with protocol ports in the range 1-1000, and tunnel-endpoint address
343
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
3ff7::2.The second entry matches on CPE address 3ff7::85, with NAT address 10.1.1.2 with
port range 20001-30000, and tunnel-endpoint address 2222::1.
If you make changes to the active binding table, the changes are applied to active traffic in 1
minute. If any Lightweight 4over6 traffic no longer matches a binding-table entry, the ACOS
device handles the traffic as described above.
NOTE: The maximum amount of time required for changes to take effect
is 1minute. The changes may take effect more quickly.
This section describes how the ACOS device processes traffic received on the interfaces you
configure as the inside and outside Lightweight 4over6 interfaces.
Each subsection describes processing for inbound traffic. For example, the inside interface
section describes handling of traffic that the ACOS device receives on its inside Lightweight
4over6 interface. Likewise, the outside interface section describes handling of traffic that
the ACOS device receives on its outside Lightweight 4over6 interface.
344
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Support for ICMPv6 destination unreachable messages on the inside Lightweight 4over6
interface is optional. When enabled, messages are sent only in certain cases. For more inform-
ation, see Enabling Destination Unreachable Messages for Non-matching Traffic.
345
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Support for ICMPv4 destination unreachable messages on the outside Lightweight 4over6
interface is optional. When enabled, messages are sent only in certain cases. For more inform-
ation, see Enabling Destination Unreachable Messages for Non-matching Traffic.
346
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Fragmentation
The following summarizes the default behavior of how ACOS handles fragmented packets for
inbound and outbound traffic:
l For inbound traffic, by default, ACOS fragments oversized packet at the IPv6 tunnel
level if DF bit is not set. If DF bit is set, ACOS sends an ICMP Type-3, Code 4 (Frag-
mentation Needed and DF Set) message.
l For outbound traffic, by default, ACOS fragments oversized IPv4 packets at the IPv4
layer if DF bit is not set. If the DF bit is set, ACOS sends an ICMP Type-3 Code 4 (Frag-
mentation Needed and DF Set) message.
l To change the default behavior of fragmented packets, use the cgnv6 lw-4o6 frag-
mentation command. For details on the complete usage of this command, see the Com-
mand Line Interface Reference for CGN.
Access Control List (ACL) regulates traffic going through a Lightweight 4over6 tunnel. An
ACL can be applied to Lightweight 4over6 traffic from the inside client. Both an IPv4 stand-
ard ACL and an IPv4 extended ACL can be applied to Lightweight 4over6 traffic. The beha-
vior of the ACL filtering remains the same.
If logging is enabled for ACLs, then the log will only have the IPv4 information of the Light-
weight 4over6 traffic because there is no IPv4-in-IPv6 ACL.
If an ACL is configured for Lightweight 4over6, then every packet needs to be matched to
the ACL. For enhanced performance, ACOS may create transparent sessions for the Light-
weight 4over6 traffic. If the ACL permit rule is configured after an ACL session is created,
the ACL session will be deleted upon receiving forward or reverse traffic. The transparent
Lightweight 4over6 session is recreated after the ACOS device receives another Lightweight
4over6 inside packet. This simplifies the ACL filtering and improves performance so that the
configured action can be taken immediately when a packet matching an existing session
comes in. These sessions are visible in the CLI using the show session command.
347
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
ACOS Lightweight 4over6 technology supports TCP, UDP, ICMP, and port-less protocols. In
order to allow traffic from port-less protocols to use Lightweight 4over6 tunnels, an entire
NAT IP address must be allocated to a single user in the Lightweight 4over6 binding table. To
do this, a single binding table entry needs to be configured with the full port range from port
1 up to port 65535. For entries which do not contain the full port range, only the original
ACOS Lightweight 4over6 protocols (TCP, UDP, and ICMP) are supported.
Configuring Lw4o6
The Lightweight 4over6 feature uses a binding table, as described in Binding Table. For the
ACOS device to be able to access the binding table, the table must be present on the ACOS
device as a file.
You can add a binding-list file to the ACOS device in either of the following ways:
l Configure the file on another device (for example, on a laptop PC), then import it the
file onto the ACOS device. (See Syntax Rules for a Binding Table.)
l Configure the binding list entries directly on the ACOS device, then save the con-
figuration to save the entries into a file.
348
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
The following commands configure a binding table, and save it to a file. (For simplicity, this
example shows a single entry. Binding tables can contain more than a single entry.)
ACOS(config)# cgnv6 lw-4o6 binding-table fw4o6-table
ACOS(config-lw-4o6-ipv6-nat)# exit
ACOS(config-lw-4o6-ipv6)# exit
ACOS(config-lw-4o6-ipv6-nat)# exit
ACOS(config-lw-4o6-ipv6)# exit
ACOS(config-lw-4o6)# exit
Building configuration...
[OK]
349
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
NOTE: The binding-table file must be on the ACOS device. If you con-
figured the entries directly on the ACOS device, make sure to
save the configuration. Saving the configuration creates the file.
350
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Configuring Access Control Lists for Lightweight 4over6 Inside Clients 352
To configure these options using the GUI, select CGN > LW-4over6 > LW-4over6 Global. To
configure them using the CLI, use the syntax shown in these sections or in the CLI Reference.
Binding table validation checks an imported binding table and logs all the error entries into a
file. If any error entries are found, a warning message indicates that errors are present in the
validated binding table.
ACOS(config)# cgnv6 lw-4o6 binding-table-validate file-name
To show the error files resulting from the lw-4o6 binding-table-validate command, enter
the following command:
ACOS(config)# show cgnv6 lw-4o6 binding-table-validation-log files
NOTE: The maximum number of log files that can be present at any time
is 100.
NOTE: For Thunder 14045 devices, the output is displayed only for
Master.
For Thunder 7650 devices, the output is displayed only for one
instance of the processing unit.
351
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
To configure a Lightweight 4over6 binding table entry, enter the following command at the
Lightweight 4over6 binding table configuration level:
tunnel-IPv6-address [NAT-ipv4-address port num to num ipv6-tunnel-endpoint-address]
To apply an ACL to Lightweight 4over6 traffic, enter the following command at the global
configuration level:
ACOS(config)# cgnv6 lw-4o6 inside-src-access-list acl-ID
The acl-num option specifies the ACL number for the ACL to be applied to Lightweight
4over6 traffic.
The following example configures a Lightweight 4over6 binding table, as well as the inside
and outside interfaces. It also configures an ACL for UDP traffic, and then applies the ACL to
Lightweight 4over6 traffic.
The following commands configure a Lightweight 4over6 binding table named lw4o6acl and
set it as the active Lightweight 4over6 table:
ACOS(config)# cgnv6 lw-4o6 binding-table lw4o6acl
ACOS(config-lw-4o6)# tunnel-address 3::3
ACOS(config-lw-4o6-ipv6)# nat-address 1.1.1.1
ACOS(config-lw-4o6-ipv6-nat)# port 1 to 65535 tunnel-endpoint-address 4::4
ACOS(config-lw-4o6-ipv6)# exit
352
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
ACOS(config-lw-4o6)# exit
ACOS(config)# cgnv6 lw-4o6 use-binding-table lw4o6acl
The following commands configure the inside and outside interface for Lightweight 4over6:
ACOS(config)# interface ethernet 1
ACOS(config-if:ethernet1)# ipv6 address 2001::aa/32
ACOS(config-if:ethernet1)# lw-4o6 inside
ACOS(config-if:ethernet1)# exit
ACOS(config)# interface ethernet 2
ACOS(config-if:ethernet2)# ip address 192.0.2.10 /12
ACOS(config-if:ethernet2)# lw-4o6 outside
ACOS(config-if:ethernet2)# exit
The following command configures an extended ACL to permit UDP traffic for any source on
a port greater than 128 and for any destination:
ACOS(config)# access-list 128 permit udp any gt 128 any
The following command applies the IPv4 ACL number 128 to Lightweight 4over6 clients:
ACOS(config)# cgnv6 lw-4o6 inside-src-access-list 128
In this example, any Lightweight 4over6 traffic with an IPv4 UDP packet with a port number
greater than 128 will be permitted, and all other traffic will be dropped.
To change Lw4o6 fragmentation settings, use the commands described in this section.
The inbound option applies to inbound traffic directing packets from the “outside” interface
towards the “inside” interface. The outbound option applies to outbound traffic directing
packets from the “inside” interface to the “outside” interface.
353
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
The ipv4 option overrides the DF bit and uses IPv4 fragmentation for oversize packets. Sim-
ilarly, the ipv6 option overrides the DF bit and uses IPv6 fragmentation for oversize packets.
You can specify the maximum number of simultaneous fragmentation sessions the ACOS
device will allow. The specified maximum applies to both IPv4 and IPv6.
No additional configuration changes are needed to configure Lightweight 4over6 support for
port-less protocols, outside of assigning a full NAT IP address to a single user within the bind-
ing table.
The following example configures a Lightweight 4over6 binding table with one entry. The
lone entry contains the full port range, thus allowing traffic from port-less protocols.
ACOS(config)# cgnv6 lw-4o6 binding-table portless
ACOS(config-lw-4o6)# tunnel-address 3::3
ACOS(config-lw-4o6-ipv6)# nat-address 1.1.1.1
ACOS(config-lw-4o6-ipv6-nat)# port 1 to 65535 tunnel-endpoint-address 4::4
ACOS(config)# cgnv6 lw-4o6 use-binding-table portless
354
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
By default, Lightweight 4over6 does not perform filtering to prevent self hairpinning. Self
hairpinning occurs if traffic initiated by an inside client is routed back to itself.
You can set hairpin filtering to one of the following levels of granularity:
By default, the ACOS device does not send Destination Unreachable messages to Lightweight
4over6 clients or to servers for non-matching traffic. You can also enable ICMPv6 or ICMP
Destination Unreachable messages.
l IPv6 tunnel address matches a binding-table entry, but the source IPv4 address and
source protocol port do not match
l Source IPv4 address matches a binding table entry, but the protocol port number does
not match that entry
l Source IPv4 address and protocol port number match a binding table entry, but do not
match the IPv6 tunnel address of that entry
355
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
When this option is enabled, it applies only to outbound IPv6 traffic received on the Light-
weight 4over6 inside interface. This is CPE-to-IPv4 server traffic. The inside interface is con-
nected to clients.
Enter the following command to enable ICMPv6 destination unreachable messages for Light-
weight 4over6:
ACOS(config)# cgnv6 lw-4o6 no-forward-match send-icmpv6
l If an inbound IPv4 packet’s destination IPv4 address matches a binding-table entry but
not the entry’s protocol port(s), the ACOS device sends an ICMP message to the IPv4
packet’s sender.
l If there is no binding-table match and the packet is not otherwise filtered out (for
example, by an ACL on the inbound interface), the packet is forwarded at Layer 3.
When this option is enabled, it applies only to inbound IPv4 traffic received on the Light-
weight 4over6 outside interface. The outside interface is connected to the IPv4 Internet.
Enter the following command to enable ICMPv4 destination unreachable messages for Light-
weight 4over6:
ACOS(config)# cgnv6 lw-4o6 no-reverse-match send-icmp
Enter the following command to drop inbound IPv4 ICMP traffic for Lightweight 4over6 ses-
sions:
ACOS(config)# cgnv6 lw-4o6 icmp-inbound drop
356
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
The following commands verify the presence of the binding-table file, its active state, and its
contents.
NOTE:
l To view the configured binding table, make sure that the
binding table has been activated.
l For Thunder 14045 ACOS devices, the output is displayed
only for master.
l For Thunder 7650 ACOS devices, the output is displayed
only for one processing unit.
The following command shows all the binding table log files:
ACOS# show cgnv6 lw-4o6 binding-table-validation-log files
357
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Field Description
Total Entries Configured Total number of entries in the currently active binding table.
358
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Field Description
Self-Hairpinning Drops Number of packets dropped because both the source and
destination address information matched.
All Hairpinning Drops Number of packets dropped because both the source and
destination IPv4 addresses matched entries in the binding
table.
359
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
Field Description
Inbound ICMP Drops Number of inbound IPv4 ICMP packets that were dropped.
LW-4over6 Interfaces not Number of packets dropped due to LW-4over6 interfaces not
Configured Drops being configured.
The parameter “entries” is now added to the show cgnv6 lw-4o6 binding-table command to
show the binding table entries in the order that they are added either manually or from a file.
360
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 16: Lightweight 4over6 Feedback
The first command clears the counters in the show cgnv6 lw-406 binding-table stat-
istics output. The second command clears the counters in the show cgnv6 lw-4o6 stat-
istics output.
The following command deletes a binding table log file, enter the following command:
ACOS(config)# delete cgnv6 lw-4o6-binding-table-validation-log 11
The following command exports a binding table log file, enter the following command:
ACOS(config)# export lw-4o6-binding-table-validation-log 11 ftp://user-
:[email protected]/a.txt
361
Chapter 17: Route Redistribution for Light-
weight 4over6
This chapter describes how to enable route redistribution for Lightweight 4over6.
Overview 363
362
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
Overview
You can specify a Tunnel Endpoint Address on the ACOS device, which enables ACOS to
immediately recognize all traffic from customer premise equipment (CPE) to the Tunnel End-
point Address as Lightweight 4over6 traffic. In addition, you can configure a NAT Prefix List
for Lightweight 4over6 route redistribution from the ACOS device back to multiple NAT IPv4
addresses.
Deployment Example
363
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
The Lightweight 4over6 configuration options include the ability to redistribute routes, based
on the tunnel endpoint address or prefix range of NAT IPv4 addresses.
To prevent the ACOS device from attempting to use down links for Lightweight 4over6, you
can enable a health check to periodically monitor the gateway. If ACOS detects that the gate-
way is down, ACOS stops sending packets to the gateway and drops Lightweight 4over6
traffic. The ACOS device continues to monitor the down gateway and establishes the gate-
way for Lightweight 4over6 again when the gateway passes the health check.
364
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
The following section describes the new Lightweight 4over6 options for route redistribution.
For information about general Lightweight 4over6 configurations, see Lightweight 4over6.
You can specify a unique IPv6 address as the Tunnel Endpoint Address as part of the binding
table configuration. When you configure this address, the ACOS device recognizes all traffic
that is destined to the specified tunnel endpoint as Lightweight 4over6 traffic. The Tunnel
Endpoint Address is used as the source address for all reverse IPv4 traffic that needs to be
encapsulated in an IPv6 tunnel and sent back to the CPE.
By allowing you to specify a distinct Tunnel Endpoint Address, with the Tunnel Endpoint as
the destination address, you can easily capture traffic from CPE and ensure that the ACOS
device recognizes this traffic for Lightweight 4over6.
l All Lightweight 4over6 traffic must have the tunnel endpoint address as the des-
tination address.
l The IPv6 address that is configured as the Tunnel Endpoint Address must be unique for
the entire ACOS system.
NAT prefix list is used to redistribute routes back to the IPv4 segment and it contains the pub-
lic range which is used by CPE to perform NAT translation. ACOS uses that NAT prefix list to
perform route redistribution and allows returned packets to find the route back to clients. On
the IPv4 side (from BR to Internet), ACOS advertises NAT address ranges for traffic from inter-
net to reach BR. Since LW-4o6 uses one-to-one mappings, each mapping will have a specific
NAT IP address. User can pool these NAT addresses used by CPE into a NAT prefix range and
configure it under nat-prefix-list. This ensures that aggregated routes are distributed.
When redistributing routes, you can configure gateway health monitoring before advertising
LSN NAT pool prefixes. You can configure the ACOS device to perform health checks for its
nexthop gateway. If a gateway goes down, the ACOS device discontinues route redistribution
and stops redistributing LSN NAT pool prefixes. When the gateway has returned to an up and
running state, the ACOS device will continue LSN NAT pool prefix route redistribution.
365
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
You can include a gateway health check for Lightweight 4over6 route redistribution. When
gateway health monitoring is configured, ACOS periodically health checks the gateways. If a
gateway fails a health check, ACOS marks the gateway as down, discontinues route redis-
tribution, and drops all current Lightweight 4over6 traffic. The ACOS device continues to
monitor the down gateway and enables Lightweight 4over6 route redistribution when all of
the gateways have passed the health checks. To ensure that the ACOS device does not direct
Lightweight 4over6 traffic to down links, you can enable this option.
You can configure Lightweight 4over6 Route Redistribution by using the GUI.
The Tunnel Endpoint Address must be unique for the entire ACOS system.
4. (Optional) Configure other Lightweight 4over6 options.
5. Click Create.
366
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
NOTE: You can configure a maximum of 128 entries in the NAT pre-
fix list.
7. Click Create.
367
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
Create a class-list of NAT IPv4 Prefixes and Apply to Global Lw4o6 Settings
The following procedures describe how to create a class list and apply the class list to Light-
weight 4over6 using the CLI.
1. Create a class-list of NAT IPv4 address prefixes to use for route redistribution, and
apply the class-list to Lightweight 4over6.
ACOS(config)# class-list lw-4o6-nat-prefixes
2. Enter the following command to apply a class list to Lightweight 4over6 as the NAT Pre-
fix List:
ACOS(config)# cgnv6 lw-4o6 nat-prefix-list lw-4o6-nat-prefixes
1. Enter the following command at the global configuration level to create the health mon-
itor:
ACOS(config)# health monitor hm
2. Enter the following command to specify the health monitor type to be used:
ACOS(config-health:monitor)# method icmp
3. Enter the following command to create the gateway and apply the health monitor to it:
ACOS(config)# cgnv6 server lsn-health-gw 9.9.9.234
368
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
4. Enter the following command to enforce gateway health monitoring for Lightweight
4over6.
ACOS(config)# cgnv6 lw-4o6 health-check-gateway 2001::173
5. Enable health monitoring for one or more gateways. ACOS will periodically check each
gateway and drop Lightweight 4over6 traffic if any of the gateways are marked as
down.
ACOS(config)# cgnv6 lw-4o6 health-check-gateway 9.9.9.173
After you configure this health check, the ACOS device periodically checks the health
of the gateways. If a gateway is down, the NAT pool prefix routes are withdrawn.
6. Enter the show log command to display the following log message:
Warning [ACOS]:LSN: Health Check Gateway <IPv4 address | IPv6 address> down
When the configured gateways are back online, the LSN NAT pool prefix routes are redis-
tributed. The following message is logged:
1. Enter the following command to configure routing protocols for Lightweight 4over6
traffic:
ACOS(config)# router bgp 1
2. The following commands updates the destination prefix with the Lightweight 4over6
NAT Prefix List (in this example, 15.10.10.171 /32, 12.10.10.0 /24) for the specified BGP
369
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 17: Route Redistribution for Lightweight 4over6 Feedback
neighbor (peer):
ACOS(config-bgp:1)# redistribute lw4o6
3. The following commands update the destination prefix with the Tunnel Endpoint
Address (in this example, 3201::200) for the specified BGP neighbor (peer):
ACOS(config-bgp:1)# address-family ipv6
370
Chapter 18: Mapping of Address and Port
(MAP)
The chapter describes the Mapping of Address and Port (MAP) technology.
MAP is one of the IPv6 transition mechanisms that maps an IPv4 address, prefix, or IPv4
address and port into an IPv6 address. MAP offers the capabilities in mapping between IPv6
address and IPv4 addresses and transport layer ports. MAP technology comprises two modes:
MAP Translation (MAP-T) and MAP Encapsulation (MAP-E). MAP-T is a stateless form of trans-
lating packets between IPv4 and IPv6 networks. MAP-E uses an IPv4-in-IPv6 encapsulation
mechanism to transport IPv4 packets over IPv6 networks.
Overview 372
371
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
Overview
MAP is a stateless form of translating and encapsulating packets between IPv4 and IPv6 net-
works. The MAP technique builds on the Address plus Port method of stateless NAT, where
each private IP is assigned a range of ports within the NAT address. Traffic is then routed
based on the NAT address and port, rather than tracking each TCP and UDP flow.
MAP extends Address plus Port capabilities to leverage MAP-T in IPv4-to-IPv6 translation
(and vice-versa) and MAP-E in IPv4 to IPv4-in-IPv6 encapsulation (and vice versa), across a
domain that consists of MAP CE devices and a border router.
Configuration Notes
When creating a MAP-T domain, a Default Mapping Rule (DMR) must first be configured, fol-
lowed by a Basic Mapping Rule (BMR). The DMR is used to map IPv4 addresses to IPv6
addresses beyond the MAP-T domain. Similarly, when creating a MAP-E domain, a Tunnel-
End-Point (TEP) address must first be configured, followed by a Basic Mapping Rule (BMR).
The TEP is used as the destination address for traffic from the CPE. A single TEP can be used
by multiple MAP domains.
Limitations
For each BMR, a maximum number of 1024 IPv6 IPv4 prefix rule sets is supported. Support is
also available for share-ratio and port-start options for the rule-ipv4-prefix in BMR. All
MAP-T domains require a configured DMR and a configured BMR. share-ratio refers to the
number of subscribers/CEs a public (NAT) IP is shared with. port-start refers to the begin-
ning of the port set range to be allocated to the subscribers for each public IP. For example,
in the configuration rule-ipv4-prefix 192.0.8.0 /24 shared-addr share-ratio 256
port-start 1024, there are 256 CEs sharing the NAT address. Port start defines the size of
port block chunk and the range of ports (1024-65535). In this case, the Port block chunk size
is 1024. CEs are 256. Each port block chunk is divided into 1024/256 groups for PSID assign-
ment.
372
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
1024 prefix rules are supported per domain. The IPv4 address type and port settings are con-
figurable at the domain level only. Domain-level ipv4-address-port settings must be con-
figured prior to configuring individual prefix-rule. Domain-level ipv4-address-port settings
cannot be modified if prefix-rules are present. Optionally, for MAP-E, each prefix-rule can be
configured with its own ipv4-address-port settings. If the ipv4-address-port setting is
absent in a prefix-rule, then domain-level ipv4-address-port settings are applied to that rule.
Within a MAP domain, the ACOS device sits at the edge and acts as the MAP Border Relay
(BR). The ACOS device uses the configured DMR and BMR to translate between IPv4 and IPv6
packet headers, or uses the TEP and BMR to perform IPv4-in-IPv6 encapsulation mechanism
to transport IPv4 packets over IPv6 networks. and routes the traffic accordingly onto the
respective IPv6 or IPv4 networks. Multiple ACOS devices can be supported as MAP BRs in the
same MAP domain, and all MAP BR devices within the domain share the same DMR/TEP and
BMR.
The shared DMR/TEP and BMR allow for a graceful failover when multiple ACOS devices are
acting as MAP BRs. If one MAP BR device processes a link or health-check-gateway failure on
v4, then the v6 route is withdrawn, and vice-versa. Since all other BR devices share the same
DMR/TEP and BMR, other MAP BRs will continue to advertise the IPv4 address aggregated
prefix on the IPv4 network and the default route for IPv6 addresses on the IPv6 network.
When configuring a MAP domain on the ACOS device, the domain configuration is global to all
data interfaces. Each partition supports a maximum of 32 MAP-T domains, and statistics will
be logged per domain. ACOS provides hair-pinning support for Hub & Spoke topologies when
configuring MAP. Additionally, as a part of the IPv6 Migration suite, MAP runs concurrently
with all other supported technologies, such as CGN, DS-Lite, Lightweight 4over6,
NAT64/DNS64, and NAT46.
NOTE: To use MAP, the Customer Premise Equipment (CPE) must sup-
port MAP Customer Edge (CE) functionality.
373
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
Per domain MTU is applied to packets in the following two cases, with the assumption that
the domain MTU is configured as 2000.
1. When an IPv6 packet with the size of 1800 bytes is received on the ‘map-t inside’ inter-
face, one of the following applies:
l If the packet is sent out as IPv6 (Hair-pinning), then the destination domain’s MTU
(2000) is applied.
l If the packet is be sent out as IPv4 from the ‘outside’ interface, then the outbound
interface’s MTU (1500) is applied.
2. For packets coming from the "outside" interface (i.e. the internet), after being trans-
lated into an IPv6 packet, the destination domain’s MTU (2000) is applied.
MSS
Maximum Segment Size (MSS) sets the maximum size of a TCP segment that can be pro-
cessed in a single, un-fragmented piece. The TCP MSS specifies the maximum length, in
bytes, of data a single SYN or SYN-ACK packet in a TCP connection can have. The MSS does
not include the TCP or IP header. In other words, MSS is derived from the MTU subtracting
the bytes accounted for the TCP and IP headers. TCP only processes packets small enough to
pass without being fragmented. MSS Clamping changes and lowers the MSS value in TCP
SYN, reducing the packets to a size small enough to pass.
You can set TCP MSS clamping to be performed using one of the following methods:
l Fixed value – ACOS changes the MSS to the length you specify.
A fixed MSS value must be less than or equal to the domain MTU.
374
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
l Subtract – ACOS reduces the MSS if it is longer than the specified number of bytes.
This option sets the MSS based on the following calculations:
o If MSS minus S is greater than the minimum value of N, subtract S from the MSS.
o If MSS minus S is less than or equal to the minimum value of N, set the MSS to N.
The minimum MSS value must be less than or equal to the domain MTU.
NOTE: The size of the IPv4 header and IPv6 header is 20 bytes. Since the
same MSS is set in both directions, configure the MSS value to
accommodate additional increase in IP header length due to
packet translation.
Configuring MAP
When configuring MAP, the domain is configured first, followed by the requisite DMR (for
MAP-T) and TEP (for MAP-E), and then the BMR. When configuring the BMR, there are three
possible address assignment options. A CE can be assigned either an IPv4 prefix of a NAT
address, a single IPv4 NAT address, or a single IPv4 NAT address that is shared with other
CEs. When the MAP domain configuration is complete, MAP Translation can be enabled on an
interface.
When configuring a CE address assignment, the Embedded Address (EA) bits length needs to
be specified if assigning an IPv4 NAT address prefix. The share-ratio and port-start para-
meters must be specified when assigning a shared IPv4 NAT address.
375
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
Optionally, health checks, route redistribution, and fragmentation and ICMP error noti-
fications can be configured for MAP. Health checks can be configured on up to 4 gateways
per domain. Gateway health checks allow for a route to be withdrawn from a BR if a link fail-
ure is detected. Route redistribution is configured at the router configuration level and can
be useful as the default communication between CEs goes through a BR. Fragmentation
allows for oversize packets to be fragmented or dropped.
The default behavior is to fragment oversize packages. For IPv4 packets, if the “DF” flag is
set, then an ICMP error message will be sent by default. An ICMP error message can be con-
figured optionally for IPv4 packets without a “DF” flag set. For IPv6 packets, an ICMPv6 error
message can be configured. Note that fragmentation configurations are not domain specific
and apply to all MAP domains within a partition.
Configuring MAP-T
l To configure a MAP-T domain, enter the following command at the global con-
figuration. This command changes the CLI to the Map-T domain configuration level.
ACOS(config)# cgnv6 map translation domain 11
NOTE: At the MAP domain configuration level, the DMR, BMR, and health
check gateway can be configured.
l To create a description for the MAP-T domain, enter the following command at the
MAP-T domain configuration level:
ACOS(config-map-t-domain)# description mdomain1
ACOS(config-map-t-domain-dmr)#
o To configure the IPv6 prefix used for the DMR, enter the following command at the
DMR configuration level. This command configures the IPv6 prefix used for con-
verting IPv4 addresses to IPv6.
ACOS(config-map-t-domain-dmr)# rule-ipv6-prefix 190::1:120:2/32
After configuring the DMR IPv6 prefix, exit the DMR configuration level to return to
the MAP-T domain configuration level.
376
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
ACOS(config-map-t-domain-bmr)#
l The following commands are used to configure the address assignment schemes.
Respectively, the following commands are for: assigning a CE an IPv4 prefix of a NAT
address; assigning a CE a single IPv4 NAT address; or assigning a CE a shared IPv4 NAT
address.
ACOS(config-map-t-domain-bmr)# rule-ipv4-address-port-settings single-addr
l To create a name for the prefix rule, enter the following command at the BMR con-
figuration level:
ACOS(config-map-t-domain-bmr)# prefix-rule rule1
ACOS(config-map-t-domain-bmr-prefix-rule)#
l To specify the prefix rule for the IPv6 prefix and IPv4 prefix to be used by the CE, enter
the following command:
ACOS(config-map-t-domain-bmr)# prefix-rule rule1
Exit the BMR configuration level to return to the MAP-T domain configuration level.
l From here, a gateway health check can be configured by entering the following com-
mand:
ACOS(config-map-t-domain)# health-check-gateway 192.0.8.0
l To configure the route withdraw behavior when a gateway health check detects a link
failure, enter the following command:
377
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
Exiting out of the MAP-T domain configuration level completely, enter an interface con-
figuration level to enable MAP-T. These commands are not available on the man-
agement interface.
l Enabling MAP-T on the inside is to enable MAP-T on the interface connected the CEs.
Enabling MAP-T on the outside is to enable MAP-T on the interfaces connected to the
IPv4 internet.
ACOS(config)# interface ethernet 1
l Optionally, you can configure fragmentation of oversized packets. For oversized IPv6
packets, the default is to fragment the packet. The other options are to drop the pack-
ets, or send an ICMPv6 error message that the packet is too big. Oversized IPv4 packets
can also be dropped silently. If the original packet has the DF flag set, an ICMP error
message is sent by default, although you can still choose to drop or fragment those
packets.
ACOS(config)# cgnv6map translation fragmentation outbound drop
378
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
Configuring MAP-E
l To configure a MAP-E domain, enter the following command at the global con-
figuration. This command changes the CLI to the Map-E domain configuration level.
ACOS(config)# cgnv6 map encapsulation domain 11
NOTE: At the MAP domain configuration level, the TEP, BMR, and health
check gateway can be configured.
l To create a description for the MAP-E domain, enter the following command at the
MAP-E domain configuration level:
ACOS(config-map-e-domain)# description mdomain2
l To configure the draft format for packet construction as the draft-03 format, enter the
following command:
ACOS(config-map-e-domain)# format draft-03
ACOS(config-map-e-domain-bmr)#
l The following commands are used to configure the address assignment schemes.
Respectively, the following commands are for assigning a CE an IPv4 prefix of NAT
addresses; assigning a CE a single IPv4 NAT address; or assigning a CE a shared IPv4
NAT address.
ACOS(config-map-e-domain-bmr)# rule-ipv4-address-port-settings shared-addr
share-ratio 256 port-start 1024
l To create a name for the prefix rule and to specify the prefix rule for the IPv6 prefix
379
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
and IPv4 prefix to be used by the CE, enter the following commands at the BMR con-
figuration level:
ACOS(config-map-e-domain-bmr)# prefix-rule rule1
ACOS(config-map-e-domain-bmr)# prefix-rule 2
ACOS(config-map-e-domain-bmr)# prefix-rule 3
Exit the BMR configuration level to return to the MAP domain configuration level.
l From here, a gateway health check can be configured by entering the following com-
mand:
ACOS(config-map-e-domain)# health-check-gateway 192.0.8.0
l To configure the route withdraw behavior when a gateway health check detects a link
failure, enter the following command:
ACOS(config-map-e-domain)# health-check-gateway withdraw-route all-link-fail-
ure
Exiting out of the MAP-E domain configuration level completely, enter an interface con-
figuration level to enable MAP-E. These commands are not available on the man-
agement interface.
l Enabling MAP-E on the inside is to enable MAP-E on the interface connected the CEs.
Enabling MAP-E on the outside is to enable MAP-E on the interfaces connected to the
IPv4 internet.
ACOS(config)# interface ethernet 1
l Optionally, you can configure fragmentation of oversized packets. For details, see the
380
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
Configuration Example
The following example configures a MAP-E domain with the gateway health check, and
enables the MAP-E domain on the interfaces.
!
interface ethernet 1
ipv6 address 3001::1/16
map inside
enable
!
interface ethernet 2
ip address 192.0.20.5 /24
map outside
enable
!
health monitor gateway
method icmp
!
cgnv6 server gateway1 192.0.20.100
health-check gateway
!
cgnv6 map encapsulation domain 2
format draft-03
tunnel-endpoint-address 4001:abcd::1
health-check-gateway 192.0.20.100
health-check-gateway withdraw-route all-link-failure
basic-mapping-rule
rule-ipv4-address-port-settings shared-addr share-ratio 256 port-start 1024
prefix-rule 1
rule-ipv6-prefix 2002:abcd::/32 rule-ipv4-prefix 8.8.8.8 /32 single-addr
prefix-rule 2
rule-ipv6-prefix 2003:abcd::/32 rule-ipv4-prefix 8.8.8.9 /32
prefix-rule 3
rule-ipv6-prefix 2004:abcd::/32 rule-ipv4-prefix 8.8.8.10 /32
prefix-rule 4
381
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 18: Mapping of Address and Port (MAP) Feedback
382
Chapter 19: Stateless NAT46
This chapter describes stateless NAT46 and how to configure it on the ACOS device.
Overview 384
383
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
Overview
Stateless NAT46 enables IPv4 clients to reach IPv6 servers, without maintaining per-con-
nection information on the ACOS device.
Stateless NAT46 uses statically configured IPv4-IPv6 mappings. When an IPv4 client sends a
request to a server, the destination address of the request is an IPv4 address. If the des-
tination IPv4 address is statically mapped to the server’s IPv6 address, stateless NAT46 NATs
the request and forwards it to the server.
FIGURE 19-1 illustrates an example of a stateless NAT46 deployment, the traffic flow for an
IPv4 client’s request, and the IPv6 server’s response.
384
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
In this example, the client-server traffic between client 10.0.0.1 and IPv6 server 2001::4 is
translated by stateless NAT46 as follows:
1. IPv4 client’s browser sends a DNS request for the IPv4 address of “Server4”.
2. The DNS server replies with IPv4 address 20.0.0.4.
3. The client sends an HTTP/HTTPS request to 20.0.0.4.
4. On the ACOS device, the stateless NAT46 configuration contains a static IPv4-IPv6 map-
ping of 20.0.0.4 to 2001::4.
ACOS translates the client’s IPv4 request into an IPv6 request with the following
address translations:
l The source address is translated to 2002:db8::a00:1 and consists of the following
parts:
NOTE:
l For simplicity, the DNS server is depicted as an IPv4 and
IPv6 DNS server. Separate IPv4 and IPv6 servers also can
be used. The requirement for stateless NAT46 is for IPv4
clients to get the IPv4 addresses of the servers from DNS
or some other mechanism.
l The IPv6 DNS is shown based on the assumption that
some in the network, IPv6 clients that do not use state-
less NAT46 might need to get the server’s IPv6
addresses.
385
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
Stateless NAT46 translates an IPv4 client’s address into an IPv6 address by combining the
stateless NAT46 prefix that is configured on the ACOS device with the client’s IPv4 address:
stateless_NAT46_prefix:client_IPv4_address
The stateless NAT46 prefix must be 96 bits long. This leaves 32 bits for the client’s IPv4
address.
In this figure, the stateless NAT46 prefix is 2002:db8::/96, and the IPv4 client’s address is
10.0.0.1. The ACOS device translates the client’s IPv4 address into the 2002:db8::a00:1 IPv6
address.
Mapping
Individual mappings or ranges of mappings can be configured on each partition. When con-
figuring a range, specify the first mapping in the range and how many mappings to create.
The ACOS device automatically creates the specified number of mappings. Each individual
mapping in the range counts as one of the supported mappings. Depending on the size of the
system memory, the number of indivdual mappings supported is as follows:
l If the system memory is smaller than 16GB, then 1024 individual mappings are sup-
ported per partition.
l If the system memory is greater then 16GB, then 8K (8* 1024) mappings are supported
per partition.
The IPv4 and IPv6 addresses for each additional mapping are incremented by 1 over the pre-
vious mapping. For example, if you specify the following mapping and a quantity of 10:
386
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
Inter-partition support for NAT46 mappings is available to improve scalability and per-
formance, namely support between the shared and L3V partitions.
The following summarizes how different prefixes (intrinsic and inter-partition) are used in dif-
ferent partitions:
l On each partition (shared or L3V), use the cgnv6 nat46-stateless prefix option to
define an intrinsic prefix to handle its own NAT46 traffic. To configure a prefix for pre-
fix advertisement, use the vrid sub-option.
387
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
o A mapping defined in the shared partition configured with the shared sub-option
takes effect for all L3V partitions, unless specified otherwise in a given L3V par-
tition.
l On L3V partitions:
o The inter-partition prefix defined in the shared partition is used to handle inter-par-
tition traffic received from the shared partition. This enables prefix advertisement
to upstream routers.
o Use the cgnv6 nat46-stateless static-dest-mapping option with the to-shared
sub-option to indicate any traffic matching this mapping to be sent through the
shared partition. The to-shared sub-option is only available at L3V partitions.
o A mapping defined in an L3V partition with the to-shared sub-option over-writes
the mapping defined in the shared partition if the two are in conflict.
Configuration Notes
l If vrid is configured for a prefix, then only vrid-active ACOS devices will advertise this
prefix. If there is VRID configuration configured for mapping, do not configure a vrid
which conflicts with the prefix vrid if both exist.
l For chassis platforms, there must be “ip nat inside” configured on the inside interface
in order forNAT46 traffic to be redistributed to the master and the blade.
Use the following command to configure a NAT46 prefix for L3V(p4) inter-partition NAT46
traffic:
ACOS(config)# cgnv6 nat46-stateless partition-prefix p4 46::/96
Use the following command to define the destination mapping to be shared with other par-
titions:
ACOS(config)# cgnv6 nat46-stateless static-dest-mapping 60.1.1.111 2060::108
count 1 shared
388
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
Use the following command to configure a NAT46 prefix for L3V(p4) inter-partition NAT46
traffic:
ACOS(config)# cgnv6 nat46-stateless partition-prefix p4 46::/96
Use the following command to define the destination mapping L3V partition (p4) that any
matching traffic will be sent through the shared partition using the configured partition pre-
fix:
ACOS(config)# cgnv6 nat46-stateless static-dest-mapping 60.1.1.111 2060::108
count 1 to-shared
Use the following command to configure a NAT46 prefix for L3V(p4) inter-partition NAT46
traffic:
ACOS(config)# cgnv6 nat46-stateless partition-prefix p4 46::/96
Use the following command to define the destination mapping to be shared with other par-
titions:
ACOS(config)# cgnv6 nat46-stateless static-dest-mapping 60.1.1.111 2060::109
count 1 shared
Use the following command to define the destination mapping L3V partition (p4) that any
matching traffic will be sent through the shared partition using the configured partition pre-
fix:
389
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
Use the following command to configure a NAT46 prefix for L3V(p4) inter-partition NAT46
traffic:
ACOS(config)# cgnv6 nat46-stateless partition-prefix p4 46::/96
Use the following command to configure a NAT46 prefix for its own NAT46 traffic:
Use the following command to define the destination mapping L3V partition (p4) that any
matching traffic will be sent through the shared partition using the configured partition pre-
fix:
ACOS(config)# cgnv6 nat46-stateless static-dest-mapping 60.1.1.111 2060::108
count 1 to-shared
Use the following command to define the destination mapping L3V partition p4 for its NAT46
traffic:
ACOS(config)# cgnv6 nat46-stateless static-dest-mapping 60.1.1.112 2061::108
count 1
Packet Fragmentation
By default, the ACOS device uses the following fragmentation settings for stateless NAT46:
l Inbound IPv6-to-IPv4 traffic – If the ACOS device receives an oversize IPv6 packet, the
device drops the packet and sends an ICMPv6 error message.
390
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
l Outbound IPv4-to-IPv6 traffic – Oversize IPv4 packets from the client are fragmented,
and the fragments are encapsulated into separate IPv6 packets.
l Don’t Fragment bit – If an oversize IPv4 packet from a client has the Don't Fragment bit
set, the ACOS device drops the packet and sends an ICMP error message.
The IPv4 and IPv6 addresses of each mapping are incremented by 1 over the previous
mapping. For more information, see Mapping. If you do not specify a count, only 1 map-
ping is created.
6. (Optional) To assign the mappings to VRRP-A, select the VRID.
7. Click OK.
2. Enter the prefix that will be used as the higher-order bits of the client’s IPv6 address.
391
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
The IPv6 prefix is used as the higher-order bits of the client’s IPv6 address. For more inform-
ation, see Stateless NAT46 Prefix.
Configure Static IPv4-IPv6 Mappings for IPv6 Servers Reached by IPv4 Clients
To configure static IPv4-IPv6 mappings for the IPv6 servers that will be reached by IPv4 cli-
ents, enter the following command:
ACOS(config)# cgnv6 nat46-stateless static-dest-mapping 1.1.1.1 2002:db8::
392
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
2. Enter the following command to change fragmentation support for IPv4 packets that
have the Don’t Fragment bit set:
ACOS(config)# cgnv6 nat46-stateless fragmentation outbound df-set drop
---------------------------
ICMPv6 to ICMP 1
ICMP to ICMPv6 0
393
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 19: Stateless NAT46 Feedback
HA is standby 0
394
Chapter 20: Translating IPv6 Prefixes by
Using NPTv6
This chapter provides information on how to configure NPTv6 translation with an ACOS
device to manage your network traffic.
Overview 396
395
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
Overview
You can configure NPTv6 translation with an ACOS device to manage your network traffic.
This feature supports the requirements in RFC 6296.
For example, you have an internal host with an IP address that has the FD01:0203:0405:/48
prefix. When the packet moves from an internal to an external network, the source address is
translated to an IP address with the 2001:0DB8:0001:/48 external prefix. When the traffic
moves from an external to an internal network, the prefix changes from 2001:0DB8:0001:/48
to FD01:0203:0405:/48. This example is illustrated in FIGURE 20-2.
NOTE: All the graphics in this chapter are based on the graphics in RFC
6296.
396
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
Translation is required for the source and the destination addresses of the packet.
397
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
398
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
FIGURE 20-4: Prefix Translation Between an Internal Network and Multiple External
Networks
Configuring NPTv6
You must complete the following tasks before configuring NPTv6:
399
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
You can configure the NPTv6 domain or bind the domain by using the CLI.
1. From the configuration mode, enter the following command to specify the NPTv6
domain name:
cgnv6 nptv6 domain domain-name
There is no default value, but you can specify between 1-63 characters.
2. From the domain configuration mode, enter the following command to specify the
inside prefix:
inside-prefixinside-prefix
3. From the domain configuration mode, enter the following command to specify the out-
side prefix:
outside-prefixoutside-prefix
NOTE: There is no default value to set the inside and outside prefixes.
When configuring the inside or the outside prefixes, consider the following information:
l Each NPTv6 domain consists of one inside prefix (inside-prefix) and one outside prefix
(outside-prefix).
l The maximum prefix length is 64.
l The inside prefix length must be same as the outside prefix length. If the prefixes are of
different lengths, a zero (0) is added to the shorter prefix so that both prefixes are of
the same length.
l The ACOS device allows a maximum of 8 NPTv6 domains for each virtual network par-
tition (VNP).
400
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
To bind the NPTv6 domain to the relevant interfaces, enter the following commands:
interface {ethernet portnum/ethernet ve ve-num/trunk trunk id}
Option Description
You can enable or disable the ICMPv6 error notification when the packet needs prefix trans-
lation, but the translation fails.
For more information about the types of ICMPv6 errors that might occur, see RFC 4443.
401
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
CLI Examples
The following examples show you how to configure IPv6 prefix translation in different net-
work configurations.
Prefix Translation between One Internal Network and One External Network
This example shows you how to configure IPv6 prefix translation between an internal and an
external network.
Traffic moves between the Internal Network (inside prefix FD01:0203:0405:/48) and the
External Network (external prefix 2001:0DB8:0001:/48).
inside-prefix FD01:0203:0405:/48
outside-prefix 2001:0DB8:0001:/48
interface ethernet/ve/trunk 1
interface ethernet/ve/trunk 2
402
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
Traffic moves from Internal Network A (internal prefix FD01:4444:5555:/48) to External Net-
work B (external prefix 2001:0DB8:0001:/48) and then to Internal Network C (internal prefix
FD01:0203:0405:/48). When the process is reversed, traffic moves from Internal Network C to
External Network B and then to Internal Network A.
NPTv6 Domain 1
inside-prefix FD01:0203:0405:/48
outside-prefix 2001:0DB8:0001:/48
NPTv6 Domain 2
inside-prefix FD01:4444:5555:/48
outside-prefix 2001:0DB8:6666:/48
interface ethernet/ve/trunk 1
interface ethernet/ve/trunk 2
Prefix Translation between One Internal Network and Multiple External Networks
This example shows you how to configure IPv6 prefix translation between an internal net-
work and multiple external networks. There are two ACOS devices that act as NPTv6 trans-
lators, one for each external network.
Traffic moves between the Internal Network (internal prefix FD01:0203:0405:/48) to External
Network #1 (external prefix 2001:0DB8:0001:/48) or to External Network #2 (external prefix
2001:0DB8:6666:/48).
403
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 20: Translating IPv6 Prefixes by Using NPTv6 Feedback
outside-prefix 2001:0DB8:0001:/48
NPTv6 Domain 2
inside-prefix FD01:0203:0405:/48
outside-prefix 2001:0DB8:6666:/48
interface ethernet/ve/trunk 1
interface ethernet/ve/trunk 2
interface ethernet/ve/trunk 3
404
Chapter 21: IPv6 Rapid Deployment (6rd)
This chapter describes IPv6 Rapid Deployment (6rd) and how you can configure it on an
ACOS device.
Overview 406
405
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
Overview
IPv6 Rapid Deployment (6rd) allows IPv6 clients and IPv6 servers that are separated by IPv4
networks to communicate without changing the IPv4 network.
6rd is based on RFX 5969, IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) -- Protocol
Specification.
6rd also uses CGN standards for the NAT component. For more information, see Large Scale
Network Address Translation. For information about logging, see the Traffic Logging Guide
for IPv6 Migration.
To send the IPv6 traffic over IPv4, 6rd uses an IPv4 tunnel. The tunnel origination point on
the sender’s side of the tunnel encapsulates the IPv6 traffic in IPv4 packets and sends these
packets over IPv4 to the device at the remote end of the tunnel. The device at the remote end
of the tunnel decapsulates the packets and sends them over the IPv6 network to their des-
tination.
FIGURE 21-1 illustrates an example of a 6rd deployment, the traffic flow for an IPv6 client
request to an IPv6 server, and the server reply to the client.
406
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
In this example, a service provider has operational control of 6rd domain 6rd1, and provides
6rd service to IPv6 clients in this domain.
The following procedure provides the high-level steps for this process:
1. Client 2001:db8:00:b:1::1 sends an IPv6 request to server 2001::4. For information about
how 6rd client addresses are formed, see 6rd Prefix and Delegated Prefix.
2. The customer edge (CE) router at the client site encapsulates the IPv6 request in one or
more IPv4 packets and sends the request over IPv4 to the ACOS device.
The ACOS device is configured as the 6rd Border Relay (BR) for the 6rd domain.
3. The 6rd border relay (BR), the ACOS device, decapsulates the request and sends it over
the IPv6 network to the IPv6 server.
4. The IPv6 server sends the reply over the IPv6 network.
5. The 6rd BR (ACOS device) encapsulates the reply in one or more IPv4 packets and
407
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
NOTE: For the ACOS BR address, you can use an IP address that is con-
figured on an ACOS interface or a floating-IP address. If you use
an IP address that is configured on an ACOS interface, the 6rd
domain is not synchronized to the standby ACOS device as part of
configuration synchronization.
Traffic that belongs to a 6rd domain can be identified by the 6rd prefix. The 6rd prefix con-
sists of a unique value for the high order (leftmost) bits in the IPv6 addresses of 6rd clients.
All clients that have a given 6rd prefix belong to the same 6rd domain. In FIGURE 21-1, the
6rd prefix is 2001:db8::/32.
When you configure 6rd on the ACOS device, one of the parameters you provide is the 6rd
prefix value. Each 6rd domain can have one 6rd prefix. You can configure multiple 6rd
domains on the ACOS device, but each domain must have its own unique 6rd prefix.
Delegated Prefix
The delegated prefix provides a unique 6rd identifier to each customer site and consists of
the 6rd prefix and the host portion of the CE router’s IPv4 interface to the 6rd BR.
6rd_Prefix:CE_IPv4_Address
In this figure, the 6rd delegated prefix for the client is 2001:db8:00:b::/56. The host portion
of the CE router’s IPv4 address, “.0.0.11”, becomes “00:b” in the delegated prefix.
The 6rd client’s IPv6 address consists of the 6rd prefix, the delegated prefix, a subnet ID, and
an interface ID.
408
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
6rd_Prefix:CE_IPv4_Address:Interface_ID
NOTE: The current release does not support use of anycast addresses for
6rd.
If the entire 32-bit CE IP address of the client is not included in the client’s 6rd delegated pre-
fix, you must specify the client IPv4 network and the mask length. The mask length indicates
the portion of the network address that is the same for all 6rd clients in the domain. In
FIGURE 21-1, the first 8 bits of the CE router IPv4 address are the same for all clients. There-
fore, the client CE IPv4 mask length is 8. Only the 24 lower-order bits of the CE router IPv4
address are used in a client’s 6rd delegated prefix.
Packet Fragmentation
The ACOS device uses the following fragmentation settings for 6rd by default:
l Inbound IPv6 packets from IPv6 servers to IPv6 clients – Drops oversize inbound IPv6
packets and sends an ICMPv6 error message back to the server.
l Fragmentation is not performed.
l Outbound IPv6 packets from the ACOS device, forwarded on behalf of 6rd clients to
IPv6 servers – Fragments oversize IPv6 packets.
l Don’t Fragment bit set in outbound IPv6 packets – Drops oversize outbound IPv6 pack-
ets and sends an IPv4 ICMP error message to the client’s 6rd CE.
The default maximum transmission unit (MTU) for the IPv6 tunnel is 1480 bytes, which is con-
figurable.
6rd can interact with other IPv6 migration protocols such as NAT64, DS-Lite.
409
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
l 6rd and LSN can be enabled concurrently for the same client.
Non-6rd traffic from the client will receive LSN processing and 6rd traffic will receive
6rd processing.
l DS-Lite traffic that is not terminated on the ACOS device will pass through 6rd even if
the traffic matches the DS-Lite class list.
l DS-Lite packets that originate from 6rd are processed correctly at Layer 3 after de-tun-
neling.
l DS-Lite packets that originate from native IPv6, and whose destination is behind 6rd,
will go through 6rd.
l If the source IPv6 address matches the class list and the destination IPv6 address con-
tains the configured NAT64 prefix, after de-tunneling, 6rd traffic is handled as NAT64
traffic.
l Hair-pinning is supported between a 6rd client with a NAT64 mapping and any of the
following:
o Another 6rd client with a NAT64 mapping
o A NAT64 client
o An LSN client
l IPv6 traffic whose source address matches a NAT64 class list, and whose destination is
in a 6rd domain, is handled as 6rd traffic.
l FTP, TFTP and RTSP ALG are supported for 6rd-NAT64 inter-working. SIP ALG is not
supported in the current release.
NAT64 rules are used for traffic going to the IPv4 network and 6rd rules are used for
traffic going to the 6rd domain.
Support for 6rd inter-working with other IPv6 migration protocols does not require any con-
figuration changes and can not be disabled.
410
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
b. In BR IPv4 Address, enter the 6rd IPv4 address of the ACOS device. The IPv4
address must be one of the following:
l An IP interface that is already configured on the ACOS device. The interface
must be connected to the 6rd domain’s clients.
l A floating-IP interface that is already configured on the ACOS device. In this
case, the VRRP-A state is applicable. Packets are forwarded only on the act-
ive ACOS device in the VRRP-A pair.
c. Enter the IPv6 prefix for the 6rd domain.
d. In Customer Edge IPv4 Network, enter the client IPv4 network and the portion of
the client’s 6rd CE router IPv4 address that is common to all of the 6rd domain’s cli-
ents.
e. (Optional) To change the MTU for the IPv6 tunnel, enter the value in the MTU field.
You can specify 1280-1480 bytes, and the default is 1480.
f. Under Action, click the icon to save the new row or to cancel and hide the row.
g. Repeat for each domain.
3. (Optional) To change 6rd fragmentation settings, click Add.
411
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
l Send ICMPv6 – Drops oversize packets and sends an ICMPv6 error message
back to the server. Fragmentation is not performed.
b. To specify the ACOS response to oversize outbound IPv6 packets that have the
Don’t Fragment bit set, select df-set and select one of the following actions:
l Send ICMP – Drops oversize packets and sends an IPv4 ICMP error message to
the client’s 6rd CE router.
l Drop – Drops oversize packets without sending a tunneled ICMPv6 error mes-
sage to the client.
l IPv6 – Fragments oversize IPv6 packets anyway and forwards the fragments.
l Send ICMPv6 – Drops oversize packets and sends a tunneled ICMPv6 error
message to the client.
4. Click Update.
412
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
ACOS(config-domain:6rd1)#
2. Enter the following command to specify the 6rd IPv4 address of the ACOS device and
the IPv6 prefix for the 6rd domain:
ACOS(config)# interface ethernet 1
ACOS(config-if:ethernet:1)# exit
ACOS(config-if:ethernet:2)# exit
NOTE: The IPv4 address must meet one of the following require-
ments:
l An IP interface that is already configured on the ACOS device. The interface must
be connected to the 6rd domain’s clients.
l A floating-IP interface that is already configured on the ACOS device. In this case,
the High Availability (HA) state is applicable. Packets are forwarded only on the
active ACOS device in the HA pair.
3. Enter the following command to specify the client IPv4 network, and the portion of the
client’s 6rd customer edge (CE) router IPv4 address that is common to all clients of the
6rd domains:
ACOS(config-domain:6rd1)# ce-ipv4-network 10.0.0.0 /8
413
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
For example, if your deployment uses 10.0.0.0/8 for all CE router IPv4 addresses in the
6rd domain, specify ce-ipv4-network 10.0.0.0/ 8.
4. Enter the following command to specify the Maximum transmission unit (MTU) of the
IPv6 tunnel:
ACOS(config-domain:6rd1)# mtu 1280
NOTE: For packets larger than 1500 bytes, the ipv4 option does
not work. In this case, ipv6 is recommended instead.
2. Enter the following command to change fragmentation support for oversize outbound
IPv6 packets. The following example fragments oversize IPv6 packets.
ACOS(config)# cgnv6 sixrd fragmentation outbound ipv6
3. Enter the following command to change the ACOS response to oversize outbound IPv6
packets that have the Don’t Fragment bit set. The following example drops oversize
packets and sends an IPv4 ICMP error message to the client’s 6rd CE router.
ACOS(config)# cgnv6 sixrd fragmentation outbound df-set send-icmp
-----------------------------
414
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Chapter 21: IPv6 Rapid Deployment (6rd) Feedback
Not local IP 0
Other errors 0
415
Chapter 22: CGN Compliant RFCs
This chapter provides the details about the RFCs that CGN is compliant with.
LSN draft-nishitani-cgn-02
Lw4o6 draft-cui-software-b4-translated-ds-lite-07
416
Glossary
A
cluster node
EIF
C
Endpoint-Independent Filtering. A
CGN filtering process protocol that
checks the destination IP and the
Carrier Grade NAT. An approach of destination port of an inbound
designing IPv4 network in which packet transmitted by an External
private network addresses are used Endpoint. It determines whether or
for configuring end sites and res- not to pass the packet.
idential networks. The private net-
work addresses are translated to
public IPv4 addresses through an EIM
intermediate network address Endpoint Independent Mapping. A
translator embedded in the net- mapping process protocol that
work. ensures the assignment of same
external address and port for con-
cluster nections linked to a given host,
provided that they use the same
A set of distinct or closely-con- internal port.
nected computers working in tan-
dem as a single system.
417
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Glossary Feedback
G L2
A Data Link Layer, the second
Gi
layer in the seven-layered OSI ref-
GPRS interface. A interface erence model used for designing
powered by General Packet Radio network protocols. It consists MAC
Service and located between the address, frame relay, token ring
external Public Data Network and and ethernet.
the Gateway GPRS Support Node.
L3V
H
Layer 3 Virtualization. A vir-
tualization layer that allows organ-
hashing izations to utilize the same IP
The process of encrypting a ver- address ranges for ensuring that
sion of an IP address with the the multi-tenant data center archi-
same IP hash. tecture gets the flexibility similar
to that of a independently-
deployed device.
I
418
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Glossary Feedback
419
ACOS 5.2.1-P3 IPv4-to-IPv6 Transition Solutions Guide
Glossary Feedback
SNMP
Simple Network Management Pro-
tocol. A standard Internet Protocol
420