SlideShare a Scribd company logo
1 of 16
Download to read offline
NAT64 Overview
NAT64 example
    n    SSH from an IPv6 client to an IPv4 server using NAT64
          n    Use Static NAT on the Untrust side
                n  SRX presents an IPv6 destination to the client
                n  Translates the IPv6 destination address to the actual IPv4 address of server
          n    Use Source NAT with Persistence
                n  SRX translates the client's IPv6 address to an IPv4 address so the server can accept the
                    connection
          n    Example NATs:
                n  Client8 from 2001:db8::8 to 10.1.1.8
                n  Server5 from 10.1.1.5 to 2001:db8:5

                                                      SSH via NAT64
    Client8                                                                                  Server5
  2001:db8::8                                                                                10.1.1.5
                             Untrust    2001:db8::1               10.1.1.1       Trust
                                         ge-0/0/0.0               ge-0/0/1.0
        Step 1
                                              Step 2                Step 3                    Step 4
 Src IP 2001:db8::8
                                       Src IP 2001:db8::8      Src IP 10.1.1.8           Src IP 10.1.1.8
   Src Port 56604
                                         Src Port 56604        Src Port 18750            Src Port 18750
 Dst IP 2001:db8::5
                                       Dst IP 2001:db8::5      Dst IP 10.1.1.5           Dst IP 10.1.1.5
     Dst Port 22
                                           Dst Port 22          Dest Port 22              Dest Port 22
NAT64 configuration example – IPv6 Flow

   n    Ensure the SRX is configured for IPv6 Flow Mode
         n    One time setting to enable flow mode for IPv6
         n    Not enabled by default
         n    Requires a reboot


   security {
       forwarding-options {
           family {
               inet6 {
                    mode flow-based;
               }
           }
       }
   }
NAT64 configuration example - Interfaces

   n    Configure the SRX Interfaces
         n    ge-0/0/0.0 = 2001:db8::164
         n    ge-0/0/1.0 = 10.1.1.1/24


   interfaces {
       ge-0/0/0 {
           unit 0 {
                family inet6 {
                    address 2001:db8::1/64;
                }
           }
       }
       ge-0/0/1 {
           unit 0 {
                family inet {
                    address 10.1.1.1/24;
                }
           }
       }
   }
NAT64 configuration example - zones
  n    Configure the SRX Security Zones
  security {
          security-zone untrust {
              address-book {
                  address client8 2001:db8::8/128;
              }
              interfaces {
                  ge-0/0/0.0 {
                      host-inbound-traffic {
                           system-services {
                               all;
                           }
                           protocols {
                               all;
                           }
                      }
                  }
              }
          }
          security-zone trust {
              address-book {
                  address server5 10.1.1.5/32;
              }
              interfaces {
                  ge-0/0/1.0 {
                      host-inbound-traffic {
                           system-services {
                               all;
                           }
                           protocols {
                               all;
                           }
                      }
                  }
              }
          }
      }
  }
NAT64 configuration example – static nat
   n    Configure Static NAT for Server5
         n    Traffic is coming from the client on the untrust zone
         n    NAT Server5's 10.1.1.5 IPv4 address to the IPv6 2001:db8::5 address

   security {
       nat {
           static {
               rule-set static64 {
                    from zone untrust;
                    rule server5 {
                        match {
                            destination-address 2001:db8::5/128;
                        }
                        then {
                            static-nat prefix 10.1.1.5/32;
                        }
                    }
               }
           }
       }
   }
NAT64 configuration example – source nat
   n    Configure Source NAT for Client8
         n    Traffic is coming from the client on the untrust zone going to the server on the
               trust zone
         n    NAT Client8's 2001:db8::8 IPv6 address to the IPv4 10.1.1.8 address
  security {
      nat {
            source {
               pool client8-ipv4-pool {
                   address {
                        10.1.1.8/32;
                   }
               }
               rule-set client8-rs {
                   from zone untrust;
                   to zone trust;
                   rule client8-rule {
                        match {
                            source-address 2001:db8::8/128;
                            destination-address 10.1.1.5/32;
                        }
                        then {
                            source-nat {
                                pool {
                                     client8-ipv4-pool;
                                     persistent-nat {
                                         permit any-remote-host;
                                     }
                                }
                            }
                      }
               }
        }
  }
NAT64 configuration example – proxy arp
   n    Enable the SRX to respond to requests on behalf of the NATs
         n    Both the static and source NAT IP addresses are on the same subnets as the
               interface IP addresses on the SRX.
               n    For the IPv4 address configure Proxy ARP
               n    Fort the IPv6 address configure Proxy NDP
   security {
       nat {
             proxy-arp {
                interface ge-0/0/1.0 {
                    address {
                         10.1.1.8/32;
                    }
                }
           }
           proxy-ndp {
                interface ge-0/0/0.0 {
                    address {
                         2001:db8::5/128;
                    }
                }
           }
       }
   }
NAT64 configuration example – policies
   n    Configure a Security Policy from zone untrust to zone trust
         n    Can use the key word "any"
         n    Example is explicit using
               n    IPv6 address 2001:db8::8 for client8
               n    IPv4 address 10.1.1.5 for server5
  security {
       policies {
          from-zone untrust to-zone trust {
              policy client8-to-server5 {
                  match {
                      source-address client8;
                      destination-address server5;
                      application any;
                  }
                  then {
                      permit;
                      log {
                          session-init;
                          session-close;
                      }
                      count;
                  }
              }
        }
  }
NAT64 validation – session table (brief)
n    Once Client8 initiates an SSH session to Server5 you can view the
      session entry in the flow table
admin@srx210> show security flow session

Session ID: 1612, Policy name: client8-to-server5/6, Timeout: 1794, Valid
  In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp, If: ge-0/0/0.0, Pkts: 24, Bytes: 3601
  Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp, If: ge-0/0/1.0, Pkts: 17, Bytes: 3205
NAT64 validation – session table
(detailed)
   n    Detailed view of the session table
  admin@srx210-1> show security flow session session-identifier 1612
  Session ID: 1612, Status: Normal
  Flag: 0x0
  Policy name: client8-to-server5/6
  Source NAT pool: client8-ipv4-pool
  Dynamic application: junos:UNKNOWN,
  Maximum timeout: 1800, Current timeout: 1746
  Session State: Valid
  Start time: 3476, Duration: 63
     In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp,
      Interface: ge-0/0/0.0,
      Session token: 0x7, Flag: 0x0x623
      Route: 0xc0010, Gateway: 2001:db8::8, Tunnel: 0
      Port sequence: 0, FIN sequence: 0,
      FIN state: 0,
      Pkts: 24, Bytes: 3601
     Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp,
      Interface: ge-0/0/1.0,
      Session token: 0x8, Flag: 0x0x620
      Route: 0xa0010, Gateway: 10.1.1.5, Tunnel: 0
      Port sequence: 0, FIN sequence: 0,
      FIN state: 0,
      Pkts: 17, Bytes: 3205
  Total sessions: 1
NAT64 validation – static nat
   n    View statistics for the Static NAT

  admin@srx210-1> show security nat static rule all
  Total static-nat rules: 1
  Total referenced IPv4/IPv6 ip-prefixes: 1/1

  Static NAT rule: server5                 Rule-set: static64
    Rule-Id                    :   1
    Rule position              :   1
    From zone                  :   untrust
    Destination addresses      :   2001:db8::5
    Host addresses             :   10.1.1.5
    Netmask                    :   128
    Host routing-instance      :   N/A
    Translation hits           :   16
NAT64 validation – source nat
   n    View statistics for the Source NAT
  admin@srx210-1> show security nat source rule all
  Total rules: 1
  Total referenced IPv4/IPv6 ip-prefixes: 1/1

  source NAT rule: client8-rule           Rule-set: client8-rs
    Rule-Id                     : 1
    Rule position               : 1
    From zone                   : untrust
    To zone                     : trust
    Match
      Source addresses          : 2001:db8::8      - 2001:db8::8
      Destination addresses     : 10.1.1.5         - 10.1.1.5
      Destination port          : 0                - 0
    Action                          : client8-ipv4-pool
      Persistent NAT type           : any-remote-host
      Persistent NAT mapping type : address-port-mapping
      Inactivity timeout            : 300
      Max session number            : 30
    Translation hits            : 13
NAT64 validation – source nat
       n    View statistics for the Source NAT

 admin@srx210-1> show security nat source persistent-nat-table all
     Internal                        Reflective                   Source     Type             Left_time/ Curr_Sess_Num/   Source
 In_IP          In_Port I_Proto Ref_IP           Ref_Port R_Proto NAT Pool                    Conf_time   Max_Sess_Num    NAT Rule
2001:db8::8     56604   tcp    10.1.1.8         18750     tcp      client8-ipv4-pool any-remote-host    -/300   1/30       client8-rule
NAT64 validation – traffic logs
   n    Traffic logs are generated by the security policy (if enabled)

  admin@srx210-1> show log traffic-log
  Oct 11 22:03:22 srx210-1 RT_FLOW: RT_FLOW_SESSION_CREATE: session created
  2001:db8:0:0:0:0:0:8/56604->2001:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22 client8-rule
  server5 6 client8-to-server5 untrust trust 1612 N/A(N/A) ge-0/0/0.0

  Oct 11 22:07:09 srx210-1 RT_FLOW: RT_FLOW_SESSION_CLOSE: session closed TCP FIN:
  2001:db8:0:0:0:0:0:8/56604->2001:db8:0:0:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22
  client8-rule server5 6 client8-to-server5 untrust trust 1612 76(8337) 48(9057) 228
  UNKNOWN UNKNOWN N/A(N/A) ge-0/0/0.0:db8:0:0
NAT64 validation – NAT logs
  n    Below is an example of the logs generated by the persistent NATs:

 admin@srx210-1> show log nat64-log
 Oct 11 21:25:58 srx210-1 RT_NAT: RT_PST_NAT_BINDING_CREATE: Pst NAT (Active    ) binding
 created, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive
 ip/port/protocol: 10.1.1.8/12689/6

 Oct 11 21:29:10 srx210-1 RT_NAT: RT_PST_NAT_BINDING_MATCH: Pst NAT (Active    ) binding
 matched, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive
 ip/port/protocol: 10.1.1.8/12689/6

 Oct 11 21:34:20 srx210-1 RT_NAT: RT_PST_NAT_BINDING_DELETE: Pst NAT (Invalid_1) binding
 deleted, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive
 ip/port/protocol: 10.1.1.8/12689/6

More Related Content

What's hot

Ipfs : InterPlanetary File System
Ipfs : InterPlanetary File SystemIpfs : InterPlanetary File System
Ipfs : InterPlanetary File System동현 강
 
Keycloak入門-OpenID ConnectによるAPIセキュリティ
Keycloak入門-OpenID ConnectによるAPIセキュリティKeycloak入門-OpenID ConnectによるAPIセキュリティ
Keycloak入門-OpenID ConnectによるAPIセキュリティYuichi Nakamura
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
DSpace standard Data model and DSpace-CRIS
DSpace standard Data model and DSpace-CRISDSpace standard Data model and DSpace-CRIS
DSpace standard Data model and DSpace-CRIS4Science
 
Oci file storage service deep dive 20181001 ss
Oci file storage service deep dive 20181001 ssOci file storage service deep dive 20181001 ss
Oci file storage service deep dive 20181001 ssKenichi Sonoda
 
SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例
SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例
SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例Softcamp Co., Ltd.
 
Demo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionDemo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionNeo4j
 
Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...
Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...
Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...bitnineglobal
 
CloudFront経由でのCORS利用
CloudFront経由でのCORS利用CloudFront経由でのCORS利用
CloudFront経由でのCORS利用Yuta Imai
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Social Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and SupersetSocial Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and SupersetThiago Santiago
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous BehaviorCapgemini
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSMike Felch
 
WebLogic in Practice: SSL Configuration
WebLogic in Practice: SSL ConfigurationWebLogic in Practice: SSL Configuration
WebLogic in Practice: SSL ConfigurationSimon Haslam
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
今Serverlessが面白いわけ
今Serverlessが面白いわけ今Serverlessが面白いわけ
今Serverlessが面白いわけYoichi Kawasaki
 
API Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid Rahimian
API Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid RahimianAPI Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid Rahimian
API Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid RahimianVahid Rahimian
 

What's hot (20)

Ipfs : InterPlanetary File System
Ipfs : InterPlanetary File SystemIpfs : InterPlanetary File System
Ipfs : InterPlanetary File System
 
Keycloak入門-OpenID ConnectによるAPIセキュリティ
Keycloak入門-OpenID ConnectによるAPIセキュリティKeycloak入門-OpenID ConnectによるAPIセキュリティ
Keycloak入門-OpenID ConnectによるAPIセキュリティ
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
DSpace standard Data model and DSpace-CRIS
DSpace standard Data model and DSpace-CRISDSpace standard Data model and DSpace-CRIS
DSpace standard Data model and DSpace-CRIS
 
Oci file storage service deep dive 20181001 ss
Oci file storage service deep dive 20181001 ssOci file storage service deep dive 20181001 ss
Oci file storage service deep dive 20181001 ss
 
SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例
SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例
SOFTCAMP SHIELDEX 詳細な紹介資料及び ​導入事例
 
Demo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in ActionDemo Showcase: Graphs for Cybersecurity in Action
Demo Showcase: Graphs for Cybersecurity in Action
 
Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...
Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...
Graph Database Meetup in Korea #6. Graph Database 5 Offerings_ AssetManager (...
 
CloudFront経由でのCORS利用
CloudFront経由でのCORS利用CloudFront経由でのCORS利用
CloudFront経由でのCORS利用
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Social Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and SupersetSocial Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and Superset
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWS
 
WebLogic in Practice: SSL Configuration
WebLogic in Practice: SSL ConfigurationWebLogic in Practice: SSL Configuration
WebLogic in Practice: SSL Configuration
 
State Of GPT
State Of GPTState Of GPT
State Of GPT
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
今Serverlessが面白いわけ
今Serverlessが面白いわけ今Serverlessが面白いわけ
今Serverlessが面白いわけ
 
Rego Deep Dive
Rego Deep DiveRego Deep Dive
Rego Deep Dive
 
API Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid Rahimian
API Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid RahimianAPI Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid Rahimian
API Design, A Quick Guide to REST, SOAP, gRPC, and GraphQL, By Vahid Rahimian
 

Viewers also liked

NAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutesNAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutesIvan Pepelnjak
 
Router and NAT Server 2012 R2
Router and NAT Server 2012 R2Router and NAT Server 2012 R2
Router and NAT Server 2012 R2Ratan Mohapatra
 
Juniper Ssg Policy Based Nat (Server Publish)
Juniper Ssg Policy Based  Nat (Server Publish)Juniper Ssg Policy Based  Nat (Server Publish)
Juniper Ssg Policy Based Nat (Server Publish)yifeng lee
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration StepsPasala Jayaraju
 
Cấu hình nat – pt
Cấu hình nat – ptCấu hình nat – pt
Cấu hình nat – ptHate To Love
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Linh Lê
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challengesIvan Pepelnjak
 
IPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPNIPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPNMaksim Melnikau
 

Viewers also liked (10)

NAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutesNAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutes
 
Router and NAT Server 2012 R2
Router and NAT Server 2012 R2Router and NAT Server 2012 R2
Router and NAT Server 2012 R2
 
Juniper Ssg Policy Based Nat (Server Publish)
Juniper Ssg Policy Based  Nat (Server Publish)Juniper Ssg Policy Based  Nat (Server Publish)
Juniper Ssg Policy Based Nat (Server Publish)
 
Bao Cao Mang
Bao Cao MangBao Cao Mang
Bao Cao Mang
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration Steps
 
Dhcp and nat
Dhcp and natDhcp and nat
Dhcp and nat
 
Cấu hình nat – pt
Cấu hình nat – ptCấu hình nat – pt
Cấu hình nat – pt
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challenges
 
IPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPNIPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPN
 

Similar to NAT64 Overview

PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PROIDEA
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsAkihiro Motoki
 
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728jieun kim
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPAPNIC
 
Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015Hiroshi Ota
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistancePROIDEA
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Yongyoon Shin
 
Scaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane PaekScaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane PaekRedis Labs
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallCassiano Campes
 
What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?NGINX, Inc.
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatDigicomp Academy AG
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network TroubleshootingOpen Source Consulting
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
Building an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent ConnectionsBuilding an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent Connections Renaun Erickson
 

Similar to NAT64 Overview (20)

PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 Lessons
 
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
 
Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Stun turn poc_pilot
Stun turn poc_pilotStun turn poc_pilot
Stun turn poc_pilot
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1
 
Scaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane PaekScaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane Paek
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
Building an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent ConnectionsBuilding an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent Connections
 
Client server
Client serverClient server
Client server
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

NAT64 Overview

  • 2. NAT64 example n  SSH from an IPv6 client to an IPv4 server using NAT64 n  Use Static NAT on the Untrust side n  SRX presents an IPv6 destination to the client n  Translates the IPv6 destination address to the actual IPv4 address of server n  Use Source NAT with Persistence n  SRX translates the client's IPv6 address to an IPv4 address so the server can accept the connection n  Example NATs: n  Client8 from 2001:db8::8 to 10.1.1.8 n  Server5 from 10.1.1.5 to 2001:db8:5 SSH via NAT64 Client8 Server5 2001:db8::8 10.1.1.5 Untrust 2001:db8::1 10.1.1.1 Trust ge-0/0/0.0 ge-0/0/1.0 Step 1 Step 2 Step 3 Step 4 Src IP 2001:db8::8 Src IP 2001:db8::8 Src IP 10.1.1.8 Src IP 10.1.1.8 Src Port 56604 Src Port 56604 Src Port 18750 Src Port 18750 Dst IP 2001:db8::5 Dst IP 2001:db8::5 Dst IP 10.1.1.5 Dst IP 10.1.1.5 Dst Port 22 Dst Port 22 Dest Port 22 Dest Port 22
  • 3. NAT64 configuration example – IPv6 Flow n  Ensure the SRX is configured for IPv6 Flow Mode n  One time setting to enable flow mode for IPv6 n  Not enabled by default n  Requires a reboot security { forwarding-options { family { inet6 { mode flow-based; } } } }
  • 4. NAT64 configuration example - Interfaces n  Configure the SRX Interfaces n  ge-0/0/0.0 = 2001:db8::164 n  ge-0/0/1.0 = 10.1.1.1/24 interfaces { ge-0/0/0 { unit 0 { family inet6 { address 2001:db8::1/64; } } } ge-0/0/1 { unit 0 { family inet { address 10.1.1.1/24; } } } }
  • 5. NAT64 configuration example - zones n  Configure the SRX Security Zones security { security-zone untrust { address-book { address client8 2001:db8::8/128; } interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { all; } protocols { all; } } } } } security-zone trust { address-book { address server5 10.1.1.5/32; } interfaces { ge-0/0/1.0 { host-inbound-traffic { system-services { all; } protocols { all; } } } } } } }
  • 6. NAT64 configuration example – static nat n  Configure Static NAT for Server5 n  Traffic is coming from the client on the untrust zone n  NAT Server5's 10.1.1.5 IPv4 address to the IPv6 2001:db8::5 address security { nat { static { rule-set static64 { from zone untrust; rule server5 { match { destination-address 2001:db8::5/128; } then { static-nat prefix 10.1.1.5/32; } } } } } }
  • 7. NAT64 configuration example – source nat n  Configure Source NAT for Client8 n  Traffic is coming from the client on the untrust zone going to the server on the trust zone n  NAT Client8's 2001:db8::8 IPv6 address to the IPv4 10.1.1.8 address security { nat { source { pool client8-ipv4-pool { address { 10.1.1.8/32; } } rule-set client8-rs { from zone untrust; to zone trust; rule client8-rule { match { source-address 2001:db8::8/128; destination-address 10.1.1.5/32; } then { source-nat { pool { client8-ipv4-pool; persistent-nat { permit any-remote-host; } } } } } } }
  • 8. NAT64 configuration example – proxy arp n  Enable the SRX to respond to requests on behalf of the NATs n  Both the static and source NAT IP addresses are on the same subnets as the interface IP addresses on the SRX. n  For the IPv4 address configure Proxy ARP n  Fort the IPv6 address configure Proxy NDP security { nat { proxy-arp { interface ge-0/0/1.0 { address { 10.1.1.8/32; } } } proxy-ndp { interface ge-0/0/0.0 { address { 2001:db8::5/128; } } } } }
  • 9. NAT64 configuration example – policies n  Configure a Security Policy from zone untrust to zone trust n  Can use the key word "any" n  Example is explicit using n  IPv6 address 2001:db8::8 for client8 n  IPv4 address 10.1.1.5 for server5 security { policies { from-zone untrust to-zone trust { policy client8-to-server5 { match { source-address client8; destination-address server5; application any; } then { permit; log { session-init; session-close; } count; } } } }
  • 10. NAT64 validation – session table (brief) n  Once Client8 initiates an SSH session to Server5 you can view the session entry in the flow table admin@srx210> show security flow session Session ID: 1612, Policy name: client8-to-server5/6, Timeout: 1794, Valid In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp, If: ge-0/0/0.0, Pkts: 24, Bytes: 3601 Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp, If: ge-0/0/1.0, Pkts: 17, Bytes: 3205
  • 11. NAT64 validation – session table (detailed) n  Detailed view of the session table admin@srx210-1> show security flow session session-identifier 1612 Session ID: 1612, Status: Normal Flag: 0x0 Policy name: client8-to-server5/6 Source NAT pool: client8-ipv4-pool Dynamic application: junos:UNKNOWN, Maximum timeout: 1800, Current timeout: 1746 Session State: Valid Start time: 3476, Duration: 63 In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp, Interface: ge-0/0/0.0, Session token: 0x7, Flag: 0x0x623 Route: 0xc0010, Gateway: 2001:db8::8, Tunnel: 0 Port sequence: 0, FIN sequence: 0, FIN state: 0, Pkts: 24, Bytes: 3601 Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp, Interface: ge-0/0/1.0, Session token: 0x8, Flag: 0x0x620 Route: 0xa0010, Gateway: 10.1.1.5, Tunnel: 0 Port sequence: 0, FIN sequence: 0, FIN state: 0, Pkts: 17, Bytes: 3205 Total sessions: 1
  • 12. NAT64 validation – static nat n  View statistics for the Static NAT admin@srx210-1> show security nat static rule all Total static-nat rules: 1 Total referenced IPv4/IPv6 ip-prefixes: 1/1 Static NAT rule: server5 Rule-set: static64 Rule-Id : 1 Rule position : 1 From zone : untrust Destination addresses : 2001:db8::5 Host addresses : 10.1.1.5 Netmask : 128 Host routing-instance : N/A Translation hits : 16
  • 13. NAT64 validation – source nat n  View statistics for the Source NAT admin@srx210-1> show security nat source rule all Total rules: 1 Total referenced IPv4/IPv6 ip-prefixes: 1/1 source NAT rule: client8-rule Rule-set: client8-rs Rule-Id : 1 Rule position : 1 From zone : untrust To zone : trust Match Source addresses : 2001:db8::8 - 2001:db8::8 Destination addresses : 10.1.1.5 - 10.1.1.5 Destination port : 0 - 0 Action : client8-ipv4-pool Persistent NAT type : any-remote-host Persistent NAT mapping type : address-port-mapping Inactivity timeout : 300 Max session number : 30 Translation hits : 13
  • 14. NAT64 validation – source nat n  View statistics for the Source NAT admin@srx210-1> show security nat source persistent-nat-table all Internal Reflective Source Type Left_time/ Curr_Sess_Num/ Source In_IP In_Port I_Proto Ref_IP Ref_Port R_Proto NAT Pool Conf_time Max_Sess_Num NAT Rule 2001:db8::8 56604 tcp 10.1.1.8 18750 tcp client8-ipv4-pool any-remote-host -/300 1/30 client8-rule
  • 15. NAT64 validation – traffic logs n  Traffic logs are generated by the security policy (if enabled) admin@srx210-1> show log traffic-log Oct 11 22:03:22 srx210-1 RT_FLOW: RT_FLOW_SESSION_CREATE: session created 2001:db8:0:0:0:0:0:8/56604->2001:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22 client8-rule server5 6 client8-to-server5 untrust trust 1612 N/A(N/A) ge-0/0/0.0 Oct 11 22:07:09 srx210-1 RT_FLOW: RT_FLOW_SESSION_CLOSE: session closed TCP FIN: 2001:db8:0:0:0:0:0:8/56604->2001:db8:0:0:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22 client8-rule server5 6 client8-to-server5 untrust trust 1612 76(8337) 48(9057) 228 UNKNOWN UNKNOWN N/A(N/A) ge-0/0/0.0:db8:0:0
  • 16. NAT64 validation – NAT logs n  Below is an example of the logs generated by the persistent NATs: admin@srx210-1> show log nat64-log Oct 11 21:25:58 srx210-1 RT_NAT: RT_PST_NAT_BINDING_CREATE: Pst NAT (Active ) binding created, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive ip/port/protocol: 10.1.1.8/12689/6 Oct 11 21:29:10 srx210-1 RT_NAT: RT_PST_NAT_BINDING_MATCH: Pst NAT (Active ) binding matched, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive ip/port/protocol: 10.1.1.8/12689/6 Oct 11 21:34:20 srx210-1 RT_NAT: RT_PST_NAT_BINDING_DELETE: Pst NAT (Invalid_1) binding deleted, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive ip/port/protocol: 10.1.1.8/12689/6