SlideShare a Scribd company logo
1 of 16
Download to read offline
NAT64 Overview
NAT64 example
    n    SSH from an IPv6 client to an IPv4 server using NAT64
          n    Use Static NAT on the Untrust side
                n  SRX presents an IPv6 destination to the client
                n  Translates the IPv6 destination address to the actual IPv4 address of server
          n    Use Source NAT with Persistence
                n  SRX translates the client's IPv6 address to an IPv4 address so the server can accept the
                    connection
          n    Example NATs:
                n  Client8 from 2001:db8::8 to 10.1.1.8
                n  Server5 from 10.1.1.5 to 2001:db8:5

                                                      SSH via NAT64
    Client8                                                                                  Server5
  2001:db8::8                                                                                10.1.1.5
                             Untrust    2001:db8::1               10.1.1.1       Trust
                                         ge-0/0/0.0               ge-0/0/1.0
        Step 1
                                              Step 2                Step 3                    Step 4
 Src IP 2001:db8::8
                                       Src IP 2001:db8::8      Src IP 10.1.1.8           Src IP 10.1.1.8
   Src Port 56604
                                         Src Port 56604        Src Port 18750            Src Port 18750
 Dst IP 2001:db8::5
                                       Dst IP 2001:db8::5      Dst IP 10.1.1.5           Dst IP 10.1.1.5
     Dst Port 22
                                           Dst Port 22          Dest Port 22              Dest Port 22
NAT64 configuration example – IPv6 Flow

   n    Ensure the SRX is configured for IPv6 Flow Mode
         n    One time setting to enable flow mode for IPv6
         n    Not enabled by default
         n    Requires a reboot


   security {
       forwarding-options {
           family {
               inet6 {
                    mode flow-based;
               }
           }
       }
   }
NAT64 configuration example - Interfaces

   n    Configure the SRX Interfaces
         n    ge-0/0/0.0 = 2001:db8::164
         n    ge-0/0/1.0 = 10.1.1.1/24


   interfaces {
       ge-0/0/0 {
           unit 0 {
                family inet6 {
                    address 2001:db8::1/64;
                }
           }
       }
       ge-0/0/1 {
           unit 0 {
                family inet {
                    address 10.1.1.1/24;
                }
           }
       }
   }
NAT64 configuration example - zones
  n    Configure the SRX Security Zones
  security {
          security-zone untrust {
              address-book {
                  address client8 2001:db8::8/128;
              }
              interfaces {
                  ge-0/0/0.0 {
                      host-inbound-traffic {
                           system-services {
                               all;
                           }
                           protocols {
                               all;
                           }
                      }
                  }
              }
          }
          security-zone trust {
              address-book {
                  address server5 10.1.1.5/32;
              }
              interfaces {
                  ge-0/0/1.0 {
                      host-inbound-traffic {
                           system-services {
                               all;
                           }
                           protocols {
                               all;
                           }
                      }
                  }
              }
          }
      }
  }
NAT64 configuration example – static nat
   n    Configure Static NAT for Server5
         n    Traffic is coming from the client on the untrust zone
         n    NAT Server5's 10.1.1.5 IPv4 address to the IPv6 2001:db8::5 address

   security {
       nat {
           static {
               rule-set static64 {
                    from zone untrust;
                    rule server5 {
                        match {
                            destination-address 2001:db8::5/128;
                        }
                        then {
                            static-nat prefix 10.1.1.5/32;
                        }
                    }
               }
           }
       }
   }
NAT64 configuration example – source nat
   n    Configure Source NAT for Client8
         n    Traffic is coming from the client on the untrust zone going to the server on the
               trust zone
         n    NAT Client8's 2001:db8::8 IPv6 address to the IPv4 10.1.1.8 address
  security {
      nat {
            source {
               pool client8-ipv4-pool {
                   address {
                        10.1.1.8/32;
                   }
               }
               rule-set client8-rs {
                   from zone untrust;
                   to zone trust;
                   rule client8-rule {
                        match {
                            source-address 2001:db8::8/128;
                            destination-address 10.1.1.5/32;
                        }
                        then {
                            source-nat {
                                pool {
                                     client8-ipv4-pool;
                                     persistent-nat {
                                         permit any-remote-host;
                                     }
                                }
                            }
                      }
               }
        }
  }
NAT64 configuration example – proxy arp
   n    Enable the SRX to respond to requests on behalf of the NATs
         n    Both the static and source NAT IP addresses are on the same subnets as the
               interface IP addresses on the SRX.
               n    For the IPv4 address configure Proxy ARP
               n    Fort the IPv6 address configure Proxy NDP
   security {
       nat {
             proxy-arp {
                interface ge-0/0/1.0 {
                    address {
                         10.1.1.8/32;
                    }
                }
           }
           proxy-ndp {
                interface ge-0/0/0.0 {
                    address {
                         2001:db8::5/128;
                    }
                }
           }
       }
   }
NAT64 configuration example – policies
   n    Configure a Security Policy from zone untrust to zone trust
         n    Can use the key word "any"
         n    Example is explicit using
               n    IPv6 address 2001:db8::8 for client8
               n    IPv4 address 10.1.1.5 for server5
  security {
       policies {
          from-zone untrust to-zone trust {
              policy client8-to-server5 {
                  match {
                      source-address client8;
                      destination-address server5;
                      application any;
                  }
                  then {
                      permit;
                      log {
                          session-init;
                          session-close;
                      }
                      count;
                  }
              }
        }
  }
NAT64 validation – session table (brief)
n    Once Client8 initiates an SSH session to Server5 you can view the
      session entry in the flow table
admin@srx210> show security flow session

Session ID: 1612, Policy name: client8-to-server5/6, Timeout: 1794, Valid
  In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp, If: ge-0/0/0.0, Pkts: 24, Bytes: 3601
  Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp, If: ge-0/0/1.0, Pkts: 17, Bytes: 3205
NAT64 validation – session table
(detailed)
   n    Detailed view of the session table
  admin@srx210-1> show security flow session session-identifier 1612
  Session ID: 1612, Status: Normal
  Flag: 0x0
  Policy name: client8-to-server5/6
  Source NAT pool: client8-ipv4-pool
  Dynamic application: junos:UNKNOWN,
  Maximum timeout: 1800, Current timeout: 1746
  Session State: Valid
  Start time: 3476, Duration: 63
     In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp,
      Interface: ge-0/0/0.0,
      Session token: 0x7, Flag: 0x0x623
      Route: 0xc0010, Gateway: 2001:db8::8, Tunnel: 0
      Port sequence: 0, FIN sequence: 0,
      FIN state: 0,
      Pkts: 24, Bytes: 3601
     Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp,
      Interface: ge-0/0/1.0,
      Session token: 0x8, Flag: 0x0x620
      Route: 0xa0010, Gateway: 10.1.1.5, Tunnel: 0
      Port sequence: 0, FIN sequence: 0,
      FIN state: 0,
      Pkts: 17, Bytes: 3205
  Total sessions: 1
NAT64 validation – static nat
   n    View statistics for the Static NAT

  admin@srx210-1> show security nat static rule all
  Total static-nat rules: 1
  Total referenced IPv4/IPv6 ip-prefixes: 1/1

  Static NAT rule: server5                 Rule-set: static64
    Rule-Id                    :   1
    Rule position              :   1
    From zone                  :   untrust
    Destination addresses      :   2001:db8::5
    Host addresses             :   10.1.1.5
    Netmask                    :   128
    Host routing-instance      :   N/A
    Translation hits           :   16
NAT64 validation – source nat
   n    View statistics for the Source NAT
  admin@srx210-1> show security nat source rule all
  Total rules: 1
  Total referenced IPv4/IPv6 ip-prefixes: 1/1

  source NAT rule: client8-rule           Rule-set: client8-rs
    Rule-Id                     : 1
    Rule position               : 1
    From zone                   : untrust
    To zone                     : trust
    Match
      Source addresses          : 2001:db8::8      - 2001:db8::8
      Destination addresses     : 10.1.1.5         - 10.1.1.5
      Destination port          : 0                - 0
    Action                          : client8-ipv4-pool
      Persistent NAT type           : any-remote-host
      Persistent NAT mapping type : address-port-mapping
      Inactivity timeout            : 300
      Max session number            : 30
    Translation hits            : 13
NAT64 validation – source nat
       n    View statistics for the Source NAT

 admin@srx210-1> show security nat source persistent-nat-table all
     Internal                        Reflective                   Source     Type             Left_time/ Curr_Sess_Num/   Source
 In_IP          In_Port I_Proto Ref_IP           Ref_Port R_Proto NAT Pool                    Conf_time   Max_Sess_Num    NAT Rule
2001:db8::8     56604   tcp    10.1.1.8         18750     tcp      client8-ipv4-pool any-remote-host    -/300   1/30       client8-rule
NAT64 validation – traffic logs
   n    Traffic logs are generated by the security policy (if enabled)

  admin@srx210-1> show log traffic-log
  Oct 11 22:03:22 srx210-1 RT_FLOW: RT_FLOW_SESSION_CREATE: session created
  2001:db8:0:0:0:0:0:8/56604->2001:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22 client8-rule
  server5 6 client8-to-server5 untrust trust 1612 N/A(N/A) ge-0/0/0.0

  Oct 11 22:07:09 srx210-1 RT_FLOW: RT_FLOW_SESSION_CLOSE: session closed TCP FIN:
  2001:db8:0:0:0:0:0:8/56604->2001:db8:0:0:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22
  client8-rule server5 6 client8-to-server5 untrust trust 1612 76(8337) 48(9057) 228
  UNKNOWN UNKNOWN N/A(N/A) ge-0/0/0.0:db8:0:0
NAT64 validation – NAT logs
  n    Below is an example of the logs generated by the persistent NATs:

 admin@srx210-1> show log nat64-log
 Oct 11 21:25:58 srx210-1 RT_NAT: RT_PST_NAT_BINDING_CREATE: Pst NAT (Active    ) binding
 created, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive
 ip/port/protocol: 10.1.1.8/12689/6

 Oct 11 21:29:10 srx210-1 RT_NAT: RT_PST_NAT_BINDING_MATCH: Pst NAT (Active    ) binding
 matched, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive
 ip/port/protocol: 10.1.1.8/12689/6

 Oct 11 21:34:20 srx210-1 RT_NAT: RT_PST_NAT_BINDING_DELETE: Pst NAT (Invalid_1) binding
 deleted, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive
 ip/port/protocol: 10.1.1.8/12689/6

More Related Content

What's hot

[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdfOpen Source Consulting
 
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/NeutronOverview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/Neutronvivekkonnect
 
IPv6って何?(拡張ヘッダ編)
IPv6って何?(拡張ヘッダ編)IPv6って何?(拡張ヘッダ編)
IPv6って何?(拡張ヘッダ編)nemumu
 
Deploying CloudStack with Ceph
Deploying CloudStack with CephDeploying CloudStack with Ceph
Deploying CloudStack with CephShapeBlue
 
[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험NHN FORWARD
 
Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築
Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築
Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築gree_tech
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking ExplainedThomas Graf
 
Ceph Block Devices: A Deep Dive
Ceph Block Devices:  A Deep DiveCeph Block Devices:  A Deep Dive
Ceph Block Devices: A Deep DiveRed_Hat_Storage
 
[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개
[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개
[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개OpenStack Korea Community
 
DNSキャッシュサーバ チューニングの勘所
DNSキャッシュサーバ チューニングの勘所DNSキャッシュサーバ チューニングの勘所
DNSキャッシュサーバ チューニングの勘所hdais
 
Wireshark だけに頼らない! パケット解析ツールの紹介
Wireshark だけに頼らない! パケット解析ツールの紹介Wireshark だけに頼らない! パケット解析ツールの紹介
Wireshark だけに頼らない! パケット解析ツールの紹介morihisa
 
Container Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyondContainer Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyondKubeAcademy
 
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)NTT DATA Technology & Innovation
 
KubernetesバックアップツールVeleroとちょっとした苦労話
KubernetesバックアップツールVeleroとちょっとした苦労話KubernetesバックアップツールVeleroとちょっとした苦労話
KubernetesバックアップツールVeleroとちょっとした苦労話imurata8203
 
BPF Internals (eBPF)
BPF Internals (eBPF)BPF Internals (eBPF)
BPF Internals (eBPF)Brendan Gregg
 
[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교 및 구축 방법
[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교  및 구축 방법[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교  및 구축 방법
[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교 및 구축 방법Open Source Consulting
 
DIY Netflow Data Analytic with ELK Stack by CL Lee
DIY Netflow Data Analytic with ELK Stack by CL LeeDIY Netflow Data Analytic with ELK Stack by CL Lee
DIY Netflow Data Analytic with ELK Stack by CL LeeMyNOG
 
FD.io VPP事始め
FD.io VPP事始めFD.io VPP事始め
FD.io VPP事始めtetsusat
 

What's hot (20)

[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
 
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/NeutronOverview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
 
EditShare システムの紹介
EditShare システムの紹介EditShare システムの紹介
EditShare システムの紹介
 
IPv6って何?(拡張ヘッダ編)
IPv6って何?(拡張ヘッダ編)IPv6って何?(拡張ヘッダ編)
IPv6って何?(拡張ヘッダ編)
 
Deploying CloudStack with Ceph
Deploying CloudStack with CephDeploying CloudStack with Ceph
Deploying CloudStack with Ceph
 
[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험
 
Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築
Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築
Docker と ECS と WebSocket で最強のマルチプレイ・ゲームサーバを構築
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Ceph Block Devices: A Deep Dive
Ceph Block Devices:  A Deep DiveCeph Block Devices:  A Deep Dive
Ceph Block Devices: A Deep Dive
 
[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개
[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개
[OpenInfra Days Korea 2018] (Track 2) Neutron LBaaS 어디까지 왔니? - Octavia 소개
 
Java11へのマイグレーションガイド ~Apache Hadoopの事例~
Java11へのマイグレーションガイド ~Apache Hadoopの事例~Java11へのマイグレーションガイド ~Apache Hadoopの事例~
Java11へのマイグレーションガイド ~Apache Hadoopの事例~
 
DNSキャッシュサーバ チューニングの勘所
DNSキャッシュサーバ チューニングの勘所DNSキャッシュサーバ チューニングの勘所
DNSキャッシュサーバ チューニングの勘所
 
Wireshark だけに頼らない! パケット解析ツールの紹介
Wireshark だけに頼らない! パケット解析ツールの紹介Wireshark だけに頼らない! パケット解析ツールの紹介
Wireshark だけに頼らない! パケット解析ツールの紹介
 
Container Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyondContainer Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyond
 
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
Apache Bigtopによるオープンなビッグデータ処理基盤の構築(オープンデベロッパーズカンファレンス 2021 Online 発表資料)
 
KubernetesバックアップツールVeleroとちょっとした苦労話
KubernetesバックアップツールVeleroとちょっとした苦労話KubernetesバックアップツールVeleroとちょっとした苦労話
KubernetesバックアップツールVeleroとちょっとした苦労話
 
BPF Internals (eBPF)
BPF Internals (eBPF)BPF Internals (eBPF)
BPF Internals (eBPF)
 
[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교 및 구축 방법
[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교  및 구축 방법[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교  및 구축 방법
[오픈소스컨설팅] 쿠버네티스와 쿠버네티스 on 오픈스택 비교 및 구축 방법
 
DIY Netflow Data Analytic with ELK Stack by CL Lee
DIY Netflow Data Analytic with ELK Stack by CL LeeDIY Netflow Data Analytic with ELK Stack by CL Lee
DIY Netflow Data Analytic with ELK Stack by CL Lee
 
FD.io VPP事始め
FD.io VPP事始めFD.io VPP事始め
FD.io VPP事始め
 

Viewers also liked

NAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutesNAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutesIvan Pepelnjak
 
Router and NAT Server 2012 R2
Router and NAT Server 2012 R2Router and NAT Server 2012 R2
Router and NAT Server 2012 R2Ratan Mohapatra
 
Juniper Ssg Policy Based Nat (Server Publish)
Juniper Ssg Policy Based  Nat (Server Publish)Juniper Ssg Policy Based  Nat (Server Publish)
Juniper Ssg Policy Based Nat (Server Publish)yifeng lee
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration StepsPasala Jayaraju
 
Cấu hình nat – pt
Cấu hình nat – ptCấu hình nat – pt
Cấu hình nat – ptHate To Love
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Linh Lê
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challengesIvan Pepelnjak
 
IPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPNIPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPNMaksim Melnikau
 

Viewers also liked (10)

NAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutesNAT64 and DNS64 in 30 minutes
NAT64 and DNS64 in 30 minutes
 
Router and NAT Server 2012 R2
Router and NAT Server 2012 R2Router and NAT Server 2012 R2
Router and NAT Server 2012 R2
 
Juniper Ssg Policy Based Nat (Server Publish)
Juniper Ssg Policy Based  Nat (Server Publish)Juniper Ssg Policy Based  Nat (Server Publish)
Juniper Ssg Policy Based Nat (Server Publish)
 
Bao Cao Mang
Bao Cao MangBao Cao Mang
Bao Cao Mang
 
Nat Server Configuration Steps
Nat Server Configuration StepsNat Server Configuration Steps
Nat Server Configuration Steps
 
Dhcp and nat
Dhcp and natDhcp and nat
Dhcp and nat
 
Cấu hình nat – pt
Cấu hình nat – ptCấu hình nat – pt
Cấu hình nat – pt
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challenges
 
IPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPNIPv6 at Home: NAT64, DNS64, OpenVPN
IPv6 at Home: NAT64, DNS64, OpenVPN
 

Similar to NAT64 Overview

PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PROIDEA
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsAkihiro Motoki
 
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728jieun kim
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPAPNIC
 
Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015Hiroshi Ota
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistancePROIDEA
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Yongyoon Shin
 
Scaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane PaekScaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane PaekRedis Labs
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallCassiano Campes
 
What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?NGINX, Inc.
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatDigicomp Academy AG
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network TroubleshootingOpen Source Consulting
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
Building an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent ConnectionsBuilding an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent Connections Renaun Erickson
 

Similar to NAT64 Overview (20)

PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
PLNOG 8: Nicolai van der Smagt - IPv6: Transition mechanisms
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 Lessons
 
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
OpenStack Korea 2015 상반기스터디(devops) 스크립트로 오픈스택 설치하기 20150728
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
 
Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015Network Test Automation - Net Ops Coding 2015
Network Test Automation - Net Ops Coding 2015
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Stun turn poc_pilot
Stun turn poc_pilotStun turn poc_pilot
Stun turn poc_pilot
 
Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1Harmonia open iris_basic_v0.1
Harmonia open iris_basic_v0.1
 
Scaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane PaekScaling Redis To 1M Ops/Sec: Jane Paek
Scaling Redis To 1M Ops/Sec: Jane Paek
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?What’s New in NGINX Plus R16?
What’s New in NGINX Plus R16?
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
Building an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent ConnectionsBuilding an ActionScript Game Server with over 15,000 Concurrent Connections
Building an ActionScript Game Server with over 15,000 Concurrent Connections
 
Client server
Client serverClient server
Client server
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

NAT64 Overview

  • 2. NAT64 example n  SSH from an IPv6 client to an IPv4 server using NAT64 n  Use Static NAT on the Untrust side n  SRX presents an IPv6 destination to the client n  Translates the IPv6 destination address to the actual IPv4 address of server n  Use Source NAT with Persistence n  SRX translates the client's IPv6 address to an IPv4 address so the server can accept the connection n  Example NATs: n  Client8 from 2001:db8::8 to 10.1.1.8 n  Server5 from 10.1.1.5 to 2001:db8:5 SSH via NAT64 Client8 Server5 2001:db8::8 10.1.1.5 Untrust 2001:db8::1 10.1.1.1 Trust ge-0/0/0.0 ge-0/0/1.0 Step 1 Step 2 Step 3 Step 4 Src IP 2001:db8::8 Src IP 2001:db8::8 Src IP 10.1.1.8 Src IP 10.1.1.8 Src Port 56604 Src Port 56604 Src Port 18750 Src Port 18750 Dst IP 2001:db8::5 Dst IP 2001:db8::5 Dst IP 10.1.1.5 Dst IP 10.1.1.5 Dst Port 22 Dst Port 22 Dest Port 22 Dest Port 22
  • 3. NAT64 configuration example – IPv6 Flow n  Ensure the SRX is configured for IPv6 Flow Mode n  One time setting to enable flow mode for IPv6 n  Not enabled by default n  Requires a reboot security { forwarding-options { family { inet6 { mode flow-based; } } } }
  • 4. NAT64 configuration example - Interfaces n  Configure the SRX Interfaces n  ge-0/0/0.0 = 2001:db8::164 n  ge-0/0/1.0 = 10.1.1.1/24 interfaces { ge-0/0/0 { unit 0 { family inet6 { address 2001:db8::1/64; } } } ge-0/0/1 { unit 0 { family inet { address 10.1.1.1/24; } } } }
  • 5. NAT64 configuration example - zones n  Configure the SRX Security Zones security { security-zone untrust { address-book { address client8 2001:db8::8/128; } interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { all; } protocols { all; } } } } } security-zone trust { address-book { address server5 10.1.1.5/32; } interfaces { ge-0/0/1.0 { host-inbound-traffic { system-services { all; } protocols { all; } } } } } } }
  • 6. NAT64 configuration example – static nat n  Configure Static NAT for Server5 n  Traffic is coming from the client on the untrust zone n  NAT Server5's 10.1.1.5 IPv4 address to the IPv6 2001:db8::5 address security { nat { static { rule-set static64 { from zone untrust; rule server5 { match { destination-address 2001:db8::5/128; } then { static-nat prefix 10.1.1.5/32; } } } } } }
  • 7. NAT64 configuration example – source nat n  Configure Source NAT for Client8 n  Traffic is coming from the client on the untrust zone going to the server on the trust zone n  NAT Client8's 2001:db8::8 IPv6 address to the IPv4 10.1.1.8 address security { nat { source { pool client8-ipv4-pool { address { 10.1.1.8/32; } } rule-set client8-rs { from zone untrust; to zone trust; rule client8-rule { match { source-address 2001:db8::8/128; destination-address 10.1.1.5/32; } then { source-nat { pool { client8-ipv4-pool; persistent-nat { permit any-remote-host; } } } } } } }
  • 8. NAT64 configuration example – proxy arp n  Enable the SRX to respond to requests on behalf of the NATs n  Both the static and source NAT IP addresses are on the same subnets as the interface IP addresses on the SRX. n  For the IPv4 address configure Proxy ARP n  Fort the IPv6 address configure Proxy NDP security { nat { proxy-arp { interface ge-0/0/1.0 { address { 10.1.1.8/32; } } } proxy-ndp { interface ge-0/0/0.0 { address { 2001:db8::5/128; } } } } }
  • 9. NAT64 configuration example – policies n  Configure a Security Policy from zone untrust to zone trust n  Can use the key word "any" n  Example is explicit using n  IPv6 address 2001:db8::8 for client8 n  IPv4 address 10.1.1.5 for server5 security { policies { from-zone untrust to-zone trust { policy client8-to-server5 { match { source-address client8; destination-address server5; application any; } then { permit; log { session-init; session-close; } count; } } } }
  • 10. NAT64 validation – session table (brief) n  Once Client8 initiates an SSH session to Server5 you can view the session entry in the flow table admin@srx210> show security flow session Session ID: 1612, Policy name: client8-to-server5/6, Timeout: 1794, Valid In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp, If: ge-0/0/0.0, Pkts: 24, Bytes: 3601 Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp, If: ge-0/0/1.0, Pkts: 17, Bytes: 3205
  • 11. NAT64 validation – session table (detailed) n  Detailed view of the session table admin@srx210-1> show security flow session session-identifier 1612 Session ID: 1612, Status: Normal Flag: 0x0 Policy name: client8-to-server5/6 Source NAT pool: client8-ipv4-pool Dynamic application: junos:UNKNOWN, Maximum timeout: 1800, Current timeout: 1746 Session State: Valid Start time: 3476, Duration: 63 In: 2001:db8::8/56604 --> 2001:db8::5/22;tcp, Interface: ge-0/0/0.0, Session token: 0x7, Flag: 0x0x623 Route: 0xc0010, Gateway: 2001:db8::8, Tunnel: 0 Port sequence: 0, FIN sequence: 0, FIN state: 0, Pkts: 24, Bytes: 3601 Out: 10.1.1.5/22 --> 10.1.1.8/18750;tcp, Interface: ge-0/0/1.0, Session token: 0x8, Flag: 0x0x620 Route: 0xa0010, Gateway: 10.1.1.5, Tunnel: 0 Port sequence: 0, FIN sequence: 0, FIN state: 0, Pkts: 17, Bytes: 3205 Total sessions: 1
  • 12. NAT64 validation – static nat n  View statistics for the Static NAT admin@srx210-1> show security nat static rule all Total static-nat rules: 1 Total referenced IPv4/IPv6 ip-prefixes: 1/1 Static NAT rule: server5 Rule-set: static64 Rule-Id : 1 Rule position : 1 From zone : untrust Destination addresses : 2001:db8::5 Host addresses : 10.1.1.5 Netmask : 128 Host routing-instance : N/A Translation hits : 16
  • 13. NAT64 validation – source nat n  View statistics for the Source NAT admin@srx210-1> show security nat source rule all Total rules: 1 Total referenced IPv4/IPv6 ip-prefixes: 1/1 source NAT rule: client8-rule Rule-set: client8-rs Rule-Id : 1 Rule position : 1 From zone : untrust To zone : trust Match Source addresses : 2001:db8::8 - 2001:db8::8 Destination addresses : 10.1.1.5 - 10.1.1.5 Destination port : 0 - 0 Action : client8-ipv4-pool Persistent NAT type : any-remote-host Persistent NAT mapping type : address-port-mapping Inactivity timeout : 300 Max session number : 30 Translation hits : 13
  • 14. NAT64 validation – source nat n  View statistics for the Source NAT admin@srx210-1> show security nat source persistent-nat-table all Internal Reflective Source Type Left_time/ Curr_Sess_Num/ Source In_IP In_Port I_Proto Ref_IP Ref_Port R_Proto NAT Pool Conf_time Max_Sess_Num NAT Rule 2001:db8::8 56604 tcp 10.1.1.8 18750 tcp client8-ipv4-pool any-remote-host -/300 1/30 client8-rule
  • 15. NAT64 validation – traffic logs n  Traffic logs are generated by the security policy (if enabled) admin@srx210-1> show log traffic-log Oct 11 22:03:22 srx210-1 RT_FLOW: RT_FLOW_SESSION_CREATE: session created 2001:db8:0:0:0:0:0:8/56604->2001:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22 client8-rule server5 6 client8-to-server5 untrust trust 1612 N/A(N/A) ge-0/0/0.0 Oct 11 22:07:09 srx210-1 RT_FLOW: RT_FLOW_SESSION_CLOSE: session closed TCP FIN: 2001:db8:0:0:0:0:0:8/56604->2001:db8:0:0:0:0:0:5/22 None 10.1.1.8/18750->10.1.1.5/22 client8-rule server5 6 client8-to-server5 untrust trust 1612 76(8337) 48(9057) 228 UNKNOWN UNKNOWN N/A(N/A) ge-0/0/0.0:db8:0:0
  • 16. NAT64 validation – NAT logs n  Below is an example of the logs generated by the persistent NATs: admin@srx210-1> show log nat64-log Oct 11 21:25:58 srx210-1 RT_NAT: RT_PST_NAT_BINDING_CREATE: Pst NAT (Active ) binding created, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive ip/port/protocol: 10.1.1.8/12689/6 Oct 11 21:29:10 srx210-1 RT_NAT: RT_PST_NAT_BINDING_MATCH: Pst NAT (Active ) binding matched, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive ip/port/protocol: 10.1.1.8/12689/6 Oct 11 21:34:20 srx210-1 RT_NAT: RT_PST_NAT_BINDING_DELETE: Pst NAT (Invalid_1) binding deleted, lsys_id: 0, internal ip/port/protocol: 2001:db8:0:0:0:0:0:8/56599/6, reflexive ip/port/protocol: 10.1.1.8/12689/6