[nsp] what does cisco NAT do with errant packets?

Mark Kent mark at noc.mainstreet.net
Wed Jan 22 10:34:40 EST 2003


I'm seeing some weird behavior with a NAT'ed customer 
on the far end of a T1 (cisco both ends).  Here is my conclusion:

It looks like traffic destined for the NAT ip address that does not
correspond to an entry in the NAT translation table gets routed back out
(likely following the default route).

That is, suppose A.B.C.D is in the NAT pool and a packet comes in 
destined for A.B.C.D tcp port X, but there is no translation entry
for A.B.C.D tcp port X and no map, etc.   Then, that packet is routed
out the default route on the router.

Can anyone verify that this is what cisco NAT does in this scenario?
And, if so, does this seem like a reasonable strategy?
I think this could lead to an unimaginative denial of service attack 
since each packet would zip around the T1 end-points until the TTL expires. 

Comments?

Thanks,
-mark

P.S.  This is how I arrived at my conclusion:

On my side, I have an access list like this:

 access-list 2011 permit ip customer.IP.range any

and, just to see if this customer was spewing anything other
than packets sourced from his net, I added

 access-list 2011 deny   ip any any log

applied like this

 in serialWhatEver
    ip access-group 2011 in

Then I started to see log entries like this:

%SEC-6-IPACCESSLOGP: list 2011 denied udp srcIP1(2561) -> A.B.C.D(53), 2 packets
%SEC-6-IPACCESSLOGDP: list 2011 denied icmp srcIP2 -> A.B.C.D (8/0), 3 packets
%SEC-6-IPACCESSLOGP: list 2011 denied tcp srcIP3(80) -> A.B.C.D(10510), 1 packet

where A.B.C.D is an IP address used by the customer and
srcIP* are IP addresses out on the global Internet.

That is, I saw packets coming from the customer with a destination
IP address on the customer net.  

Seemed pretty weird to me, so I added this at the top of the access-list:

access-list 2011 permit tcp any rang 0 65535 host A.B.C.D rang 0 65535 log
access-list 2011 permit udp any rang 0 65535 host A.B.C.D rang 0 65535 log
access-list 2011 permit icmp any host A.B.C.D log
access-list 2011 permit ip any host A.B.C.D log

and I see all sorts of traffic:

%SEC-6-IPACCESSLOGP: list 2011 permitted tcp srcIP4(54328) -> A.B.C.D(113), 1 packet
%SEC-6-IPACCESSLOGP: list 2011 permitted tcp srcIP5(80) -> A.B.C.D(4729), 1 packet
%SEC-6-IPACCESSLOGP: list 2011 permitted udp srcIP6(53) -> A.B.C.D(1728), 1 packet

Now the port 113 (auth) told me that this might be explained by
"uninvited" traffic to a NAT'ed IP address (A.B.C.D).  So, I do a
little test with "telnet A.B.C.D" and it gets logged:

%SEC-6-IPACCESSLOGP: list 2011 permitted tcp myIPaddr(51425) -> A.B.C.D(23), 1 packet

Hence, my above conclusion.


More information about the cisco-nsp mailing list