Carrier Grade NAT (CGNAT)
Configuration
Simple Example
Required Configuration
Address-group to match subscriber (source) addresses
set resources group address-group AG_MATCH1
set resources group address-group AG_MATCH1 address 10.10.1.0/28
set resources group address-group AG_MATCH1 address-range 10.10.1.20 to 10.10.1.30
set resources group address-group AG_MATCH1 address 10.10.1.10 |
NAT Pool to specify Public Addresses and how they are Allocated
set service nat pool NAT_POOL1 entry RANGE1 ip-address range start 10.10.3.1
set service nat pool NAT_POOL1 entry RANGE1 ip-address range end 10.10.3.63
set service nat pool NAT_POOL1 entry RANGE2 ip-address prefix 10.10.3.64/28
set service nat pool NAT_POOL1 type CGNAT
set service nat pool NAT_POOL1 address-allocation round-robin
set service nat pool NAT_POOL1 address-pooling paired
set service nat pool NAT_POOL1 port dynamic-block-allocation block-size 128
set service nat pool NAT_POOL1 port dynamic-block-allocation max-blocks-per-subscriber 8
set service nat pool NAT_POOL1 port allocation sequential
set service nat pool NAT_POOL1 port range start 1024
set service nat pool NAT_POOL1 port range end 65535 |
CGNAT Policy pulls together the 'match' address-group and the NAT pool
set service nat cgnat policy POLICY1 match source address-group AG_MATCH1
set service nat cgnat policy POLICY1 priority 10
set service nat cgnat policy POLICY1 translation pool NAT_POOL1 |
Assign the CGNAT Policy to the interface which routes to the external network
Optional Configuration
Session Timeouts
Per-port established-state timeouts are available per port
Logging
Note that enabling session logging will switch CGNAT to record destination address and port in sub-sessions (2-tuple sessions in tables within 3-tuple sessions). This will affect performance.
set resources group address-group <name>
CGNAT uses an address-group to match inside subscriber source addresses.
Parameter | Format | Description | Details |
---|---|---|---|
address | <h:h:h:h:h:h:h:h/x> | IPv6 subnet to match | not applicable for CGNAT |
<h:h:h:h:h:h:h:h> | IPv6 address to match | not applicable for CGNAT | |
<x.x.x.x/x> | IP subnet to match | The first and last addresses in the prefix will be matched. For example, 10.10.1.0/28 will match address range 10.10.1.0 to 10.10.1.15. | |
<x.x.x.x> | IP address to match | ||
address-range | <h:h:h:h:h:h:h:h> to <h:h:h:h:h:h:h:h> | IPv6 address | not applicable for CGNAT |
<x.x.x.x> to <x.x.x.x> | IPv4 address | ||
description | <text> | Address-group description |
set service nat pool <name>
A NAT pool is used to specify the public addresses that CGNAT will use to translate inside source addresses to.
Command | Format | Details |
---|---|---|
entry <range-name> ip-address range start | <x.x.x.x> | IPv4 Address |
entry <range-name> ip-address range end | <x.x.x.x> | IPv4 Address |
entry <range-name> ip-address prefix | <x.x.x.x/x> | IPv4 address and mask. First and last addresses are used provided they are not '.0' or '.255'. For example, 10.10.3.0/28 would give range 10.10.3.1-10.10.3.15. |
entry <range-name> ip-address subnet | <x.x.x.x/x> | IPv4 subnet and mask. First and last addresses are never used. For example, 10.10.3.0/28 would give range 10.10.3.1-10.10.3.14. |
type | CGNAT | Only option. Required for future compatibility. |
address-allocation | round-robin | Addresses are allocated from the NAT pool in a round-robin fashion. Only option. Required for future compatibility. |
address-pooling | paired | Internal IP addresses are paired with external IP addresses. An internal IP address will never use more than one external IP address at any given time. Only option. Required for future compatibility. |
port dynamic-block-allocation block-size | <64..4096> | The number of ports in a block (multiple of 64 only). |
port dynamic-block-allocation max-blocks-per-subscriber | <1..32> | Maximum number of port-blocks per subscriber |
port allocation | random | Allocate ports randomly from within the current 'active' port-block. |
sequential | Allocate ports sequentially from within the current 'active' port-block. | |
port range start | <0..65535> | Start of port rang. It is recommended that this is set no lower than 1024. |
range end | <0..65535> | End of port range. |
blacklist address-group | <addr-grp-name> | The address-group identifying the pool addresses being blacklisted. Adding external IP addresses or prefixes to a blacklist address group will cause sessions creating using that external address to be cleared, and for that address to no longer be used to create new sessions. It is useful on a live system where the administrator wants to prevent an address in the NAT pool form being used for CGNAT mappings. This has an advantage over reconfiguring the NAT pool range to exclude that address in that reconfiguring the NAT pool range will cause all sessions using that NAT pool to be torn down. |
set service nat cgnat policy <name>
A CGNAT policy ties together an address-group for matching inside source addresses with a NAT pool for specifying the set of external public addresses to use. A CGNAT policy is the thing that is attached to an interface,
Command | Format | Description |
---|---|---|
match source address-group | <addr-grp-name> | Address group name |
translation pool | <nat-pool-name> | NAT pool name |
priority | <1..9999> | The priority of CGNAT policy. Multiple CGNAT policies on an interface are evaluated in order of priority, with the lowest numerical priority first. |
set service cgnat session-timeout
Established-state timeout values may be configured per port (a destination port in outbound traffic).
other | partially-open | <10..240> | Non-TCP/UDP 'partially-open' timeout in seconds |
established | <30..1800> | Non-TCP/UDP 'established' timeout in seconds | |
udp | partially-open | <10..240> | UDP 'partially-open' timeout in seconds |
established | <30..1800> | UDP 'established' timeout in seconds | |
tcp | partially-open | <10..240> | TCP 'partially-open' timeout in seconds |
partially-closed | <10..240> | TCP 'partially-closed' timeout in seconds | |
established | <30..14400> | TCP 'established' timeout in seconds |
Other configuration commands
set service cgnat ...
cpu-affinity event session | <0..65535> | Number of the core to process session events on |
disable-hairpinning | Disable hairpinning in CGNAT device | |
export event ... | Used to control logging | |
max-dest-per-session | <1..64> | Max number of destination records that can be associated with a session |
max-sessions | <1..33554432> | System-wide maximum number of sessions |
select warning event resource-constraint ... | ||
snat-alg-bypass | Enable SNAT ALG traffic to bypass CGNAT |
Operational Commands
show cgnat summary
The error and summary statistics will count every packet that matches either of the following two criteria:
outbound packet whose source address matches a CGNAT policy, or
inbound packet who's destination address is a CGNAT public address
Counts marked with a tilde (~) are approximate. These are collated from each CGNAT policy every time the "show cgnat summary" command is run. The policy counts are only updated approximately every 20 secs from similar counts in the subscriber data structures.
Sessions | |
---|---|
Active sessions | Active sessions. An original global atomic counter. This is not simply 'sessions created less sessions destroyed'. |
Sessions created | Sum of 'sessions created' counts on all CGNAT policies. |
Sessions destroyed | Sum of 'sessions destroyed' counts on all CGNAT policies. |
Active sub-sessions | Count of current sub-sessions. An original global atomic counter. This is not simply 'sub-sessions created less sub-sessions destroyed'. |
Sub-sessions created | Sum of 'sub-sessions created' counts on all CGNAT policies. |
Sub-sessions destroyed | Sum of 'sub-sessions destroyed' counts on all CGNAT policies. |
Maximum table size | Configurable maximum session table size. (This value applies to sessions, not sessions plus sub-sessions) |
Table full | Set when the 'active sessions' count exceeds 'Maximum table size'. |
Public address mapping table | |
Used | Active public addresses in use by CGNAT. An original global atomic counter. There is no maximum value for this table. Its size is constrained by the number of addresses in the NAT pool used by CGNAT. |
Subscriber address table | |
Used | Active CGNAT subscribers. An original global atomic counter. |
Max | Maximum CGNAT subscribers allowed in the subscriber address table. Configurable. Default 64k. |
Out | |
Translated packets | Count of outbound packets translated. Sum of 'Out packets' counts on all CGNAT policies. |
Translated bytes | Total byte count of the outbound translated packets. (IP header and payload). Sum of 'Out bytes' counts on all CGNAT policies. |
Did not match CGNAT policy | Subscriber address did not match any CGNAT policy on the outbound interface. |
Untranslatable packets | Untranslatable packets. Sum of error counts 'Untranslatable IP protocol' and 'Untranslatable ICMP message' |
Hairpinned packets | Count of hairpinned packets. |
In | |
Translated packets | Count of inbound packets translated. Sum of 'In packets' counts on all CGNAT policies. |
Translated bytes | Total byte count of the inbound translated packets. (IP header and payload). Sum of 'In bytes' counts on all CGNAT policies. |
Unknown source addr or port | Sum of 'In, unknown source' counts on all CGNAT policies. Counts inbound packets whose dest address and port have matched a session, but whose source address and port have failed to match a sub-session. Only applies when sub-sessions are being recorded for this session. |
Did not match CGNAT session | Destination address, port and protocol did not match a CGNAT session and the destination address does not match a CGNAT public address. |
Did not match CGNAT pool | Destination address does not match a CGNAT public address. |
Session Hash Tables | |
Created | A hash table may be created for each main session in order to store sub-sessions if:
Creation and maintenance of these tables is an expensive operation. If many hash tables are being created and destroyed then performance may degrade somewhat. These counters are designed to provide some indication that this may be occurring. Typically multiple sub-sessions per main session will occur with peer-to-peer gaming. |
Destroyed | |
PCP sessions created | Sessions created by the Port Control Protocol |
PCP errors | Failures when trying to create a PCP session. |
Memory allocation failures | Sum of all memory allocation failures. Use "show cgnat error" to see details. |
Resource limitation failures | Sum of all resource limitation failures. Use "show cgnat error" to see details. |
Thread contention errors | Sum of all thread contention errors. Use "show cgnat error" to see details. |
Packet buffer errors | Sum of all packet buffer errors. Use "show cgnat error" to see details. |
show cgnat error
N/A = Means that count is not applicable in this direction
OK = Means that count is applicable in this direction
Unable to translate packet: | In | Out | Comment |
---|---|---|---|
Subscriber address did not match a CGNAT policy | N/A | OK | Subscriber address did not match a CGNAT policy |
Packet did not match a CGNAT session | OK | N/A | Inbound pkts that do not match a CGNAT session and whose dest addr does match a CGNAT policy. These are dropped. |
Destination address did not match CGNAT pool | <