[c-nsp] NAT-ON-A-STICK for VRF Traffic

Andy Saykao andy.saykao at staff.netspace.net.au
Sun Aug 23 20:56:15 EDT 2009


Worked it out...had the wrong NAT statement.

Change from: ip nat inside source list NSTEST-NAT-ACL pool
NSTEST-NAT-POOL vrf NSTEST overload

Change to: ip nat source list NSTEST-NAT-ACL pool NSTEST-NAT-POOL vrf
NSTEST overload

Thanks.

Andy


 

-----Original Message-----
From: Andy Saykao 
Sent: Monday, 24 August 2009 10:00 AM
To: 'Ivan Pepelnjak'; 'cisco-nsp at puck.nether.net'
Subject: RE: NAT-ON-A-STICK for VRF Traffic

Hi Ivan,

Thank you for your suggestion of using "ip nat enable". I've given this
a go but can't get it to work. Does this work in a MPLS L3 VPN
environment because I can't get the NAT-PE to nat any traffic coming
from the CE/PE? 

Eg: CE -> PE -> P -> NAT-PE -> Internet

The Cisco examples on using "ip nat enable" with VRF only discuss
physically connected VRF's that are nat enabled. This is different to
what I want to do because I have no physical/virtual VRF interfaces
hanging off the NAT-PE router.

http://www.cisco.com/en/US/docs/ios/12_3t/12_3t14/feature/guide/gtnatvi.
pdf

On the NAT-PE I have configured this:

interface GigabitEthernet0/0.11
 description Interface into MPLS Network  encapsulation dot1Q 11  ip
address 203.10.110.x 255.255.255.224  ip nat enable  mpls ip !
interface GigabitEthernet0/0.904
 description Internet GW for VPN
 encapsulation dot1Q 904
 ip address 202.45.118.x 255.255.255.252  ip nat enable  ip
virtual-reassembly !
! Advertise default route to PE's via MP-BGP.
ip route vrf NSTEST 0.0.0.0 0.0.0.0 GigabitEthernet0/0.904 202.45.118.y
global !
ip nat pool NSTEST-NAT-POOL 210.15.230.a 210.15.230.b netmask
255.255.255.252 add-route ip nat inside source list NSTEST-NAT-ACL pool
NSTEST-NAT-POOL vrf NSTEST overload !
ip access-list standard NSTEST-NAT-ACL
 permit 192.168.0.0 0.0.255.255
 permit 10.15.0.0 0.0.255.255
 permit 172.16.0.0 0.0.255.255

When I test from the PE to the Internet, it just times out. 

PE#ping vrf NSTEST
Protocol [ip]:
Target IP address: www.google.com
Translating "www.google.com"...domain server (210.15.254.240) [OK]
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 66.102.11.104, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)

The trace is hitting the NAT-PE (202.45.118.x) but no natting occurs.

PE#traceroute vrf NSTEST 210.15.254.x

Type escape sequence to abort.
Tracing the route to dns1-1-virtual.netspace.net.au (210.15.254.x)

  1 core1-hs-TenGigE-4-1.Sydney.netspace.net.au (203.12.53.x) [MPLS:
Labels 3043/8653 Exp 0] 16 msec 16 msec 12 msec
  2 core1-ks-gigether-4-0-0.Melbourne.netspace.net.au (203.17.96.x)
[MPLS: Labels 8060/8653 Exp 0] 16 msec 12 msec 16 msec
  3 202-45-118-134-static.spacecentre.com.au (202.45.118.x) [MPLS: Label
8653 Exp 0] 12 msec 12 msec 16 msec
  4  *  *  *
  5  *  *  *

NOTE: IT LOCKS UP MY NAT-PE ROUTER EVERY TIME I DO TESTING FROM THE PE
AND I HAVE TO REBOOT THE NAT-PE.

The NAT-PE is a Cisco 7301 running 12.4(24)T1.

Yeah..so I was just wondering if "ip nat enabled" can be used in a MPLS
L3 VPN enviroment and whether I've set up the NAT-PE correctly???

Thanks.

Andy
 

-----Original Message-----
From: Ivan Pepelnjak [mailto:ip at ioshints.info]
Sent: Monday, 17 August 2009 11:42 PM
To: Andy Saykao; cisco-nsp at puck.nether.net
Subject: RE: [c-nsp] NAT-ON-A-STICK for VRF Traffic

It's probably easier to use the NAT Virtual Interface ("ip nat enable"
instead of "ip nat inside|outside") in a VRF environment. You also don't
need NAT-on-a-stick with NVI.

Ivan
 
http://www.ioshints.info/about
http://blog.ioshints.info/

This email and any files transmitted with it are confidential and intended
 solely for the use of the individual or entity to whom they are addressed. 
Please notify the sender immediately by email if you have received this 
email by mistake and delete this email from your system. Please note that
 any views or opinions presented in this email are solely those of the
 author and do not necessarily represent those of the organisation. 
Finally, the recipient should check this email and any attachments for 
the presence of viruses. The organisation accepts no liability for any 
damage caused by any virus transmitted by this email.



More information about the cisco-nsp mailing list