The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how the Network Address Translation (NAT) router process works and provides answers to some of common questions.
A. Network Address Translation (NAT) is designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually when you connect two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.
As part of this capability, NAT can be configured to advertise only one address for the entire network to the outside world. This effectively hides the entire internal network behind that address which provides additional security. NAT offers the dual functions of security and address conservation and is typically implemented in remote-access environments.
A.Basically, NAT allows a single device, such as a router, to act as an agent between the Internet (or public network) and a local network (or private network), which means that only a single unique IP address is required to represent an entire group of computers to anything outside their network.
A.In order to configure traditional NAT, you need to make at least one interface on a router (NAT outside) and another interface on the router (NAT inside) and a set of translation rules for the IP addresses in the packet headers (and payloads if desired) and they need to be configured. In order to configure Nat Virtual Interface (NVI), you need at least one interface configured with NAT enable along with the same set of rules as mentioned above.
For more information, refer toCisco IOS IP Addressing Services Configuration Guide or its section onConfiguring the NAT Virtual Interface.
A.Cisco IOS software-based NAT is not fundamentally different from the NAT function in the Cisco ASA. The main differences include the different traffic types supported in the implementations and design requirements. Refer toNAT Configuration Examplesfor more information on the configuration of NAT on Cisco ASA devices (includes the traffic types supported).
A.The Cisco Feature Navigator tool allows customers to identify a feature (NAT) and find on which release and hardware version this Cisco IOS Software feature is available. Refer toCisco Feature Navigatorin order to use this tool.
A.The order in which the transactions are processed by NAT is based on whether a packet travels from the inside network to the outside network or from the outside network to the inside network. Inside to outside translation occurs after routing, and outside to inside translation occurs before routing. Refer toNAT Order of Operationfor more information.
A.Yes. The NAT - Static IP Support feature provides support for users with static IP addresses and enables those users to establish an IP session in a public wireless LAN environment.
A.Yes. with NAT, you can establish a virtual host on the inside network that coordinates load balances between real hosts.
A.Yes. The Rate-Limiting NAT Translation feature provides the ability to limit the maximum number of concurrent NAT operations on a router. This gives users more control over how NAT addresses are used, the Rate-Limiting NAT Translation feature can be used to limit the effects of viruses, worms, and denial-of-service attacks.
A.Routing for IP addresses created by NAT is learned if:
The inside global address pool is derived from the subnet of a next-hop router.
Static route entry is configured in the next-hop router and redistributed within the routing network.
When the inside global address is matched with the local interface, NAT installs an IP alias and an ARP entry, in which case the router canproxy-arpfor these addresses. If this behavior is not wanted, use theno-aliaskeyword.
When a NAT pool is configured, the add-route option can be used for automatic route injection.
A.The NAT session limit is bounded by the amount of available DRAM in the router. Each NAT translation consumes about 312 bytes in DRAM. As a result, 10,000 translations (more than would generally be handled on a single router) consume about 3 MB. Therefore, typical routing hardware has more than enough memory to support thousands of NAT translations. However, it is also recommended to verify the platform specifications.
A.Cisco IOS NAT supports Cisco Express Forwarding (CEF) switching, fast switching, and process switching. For 12.4T release and later, fast-switching path is no longer supported. For Cat6k platform, the switching order is Netflow (HW switching path), CEF, process path.
Performance depends on several factors:
The type of application and its type of traffic
Whether IP addresses are embedded
Exchange and inspection of multiple messages
Source port required
The number of translations
Other applications that run at the time
The type of hardware and processor
A.Yes. Source and/or destination NAT translations can be applied to any interface or sub-interfaces that have an IP address (includes dialer interfaces). NAT cannot be configured with Wireless Virtual Interface. Wireless Virtual Interface does not exist at the time it writes to NVRAM. Thus, after reboot, the router loses NAT configuration on the Wireless Virtual Interface.
A.Yes. NAT does provide HSRP redundant. However, it is different from SNAT (Stateful NAT). NAT with HSRP is a stateless system. The current session is not maintained when failure takes place. During static NAT configuration (when a packet does not match any STATIC rule configuration), the packet is sent through without any translation.
A.Yes. Encapsulation does not matter for NAT. NAT can be done where there is an IP address on an interface and the interface is NAT inside or NAT outside. There must be an inside and an outside for NAT to function. If you use NVI, there must be at least one NAT enabled interface. See the previous question,How do I configure NAT?for more details.
A.Yes. This can be accomplished through the use of an access list that describes the set of hosts or networks that require NAT. All sessions on the same host can be either translated or can pass through the router and not be translated.
Access lists, extended access lists, and route maps can be used to definerulesby which IP devices get translated. The network address and appropriate subnet mask must always be specified. The keywordanymust not be used in place of the network address or subnet mask. With Static NAT configuration, when packet does not match with any STATIC rule configuration, packet can be sent through without any translation.
A.PAT (overloading) divides the available ports per global IP address into three ranges: 0-511, 512-1023, and 1024-65535. PAT assigns a unique source port for each UDP or TCP session. It attempts to assign the same port value of the original request, but if the original source port has already been used, it starts to scan from the beginning of the particular port range to find the first available port and assigns it to the conversation.
A.PAT works with either one global IP address or multiple addresses.
PAT with One IP Address Table
Condition Description 1 NAT/PAT inspects traffic and matches it to a translation rule. 2 Rule matches to a PAT configuration. 3 If PAT knows about the traffic type and if that traffic type has "a set of specific ports or ports it negotiates" that it can use, PAT sets them aside and does not allocate them as unique identifiers. 4 If a session with no special port requirements attempts to connect out, PAT translates the IP source address and checks availability of the originated source port (433, for example). See the Note. 5 If the requested source port is available, PAT assigns the source port, and the session continues. 6 If the requested source port is not available, PAT starts to search from the beginning of the relevant group (starts at 1 for TCP or UDP applications, and from 0 for ICMP). 7 If a port is available it is assigned, and the session continues. 8 If no ports are available, the packet is dropped. Note: For Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), the ranges are: 1-511, 512-1023, 1024-65535. For Internet Control Message Protocol (ICMP), the first group starts at 0.
PAT with Multiple IP Addresses
Condition Description 1-7 The first seven conditions are the same as with a single IP address. 8 If no ports are available in the relevant group on the first IP address, NAT moves on to the next IP address in the pool and tries to allocate the original source port requested. 9 If the requested source port is available, NAT assigns the source port, and the session continues. 10 If the requested source port is not available, NAT starts to search from the beginning of the relevant group (starts at 1 for TCP or UDP applications, and from 0 for ICMP). 11 If a port is available, it is assigned, and the session continues. 12 If no ports are available, the packet is dropped, unless another IP address is available in the pool.
A.NAT IP pools are a range of IP addresses that are allocated for NAT translation as needed. To define a pool, the configuration command is used:
ip nat pool <name> <start-ip> <end-ip> {netmask <netmask> | prefix-length <prefix-length>} [type {rotary}]Example 1
The next example translates between inside hosts addressed from either the 192.168.1.0 or 192.168.2.0 network to the globally unique 10.69.233.208/28 network:
ip nat pool net-208 10.69.233.208 10.69.233.223 prefix-length 28 ip nat inside source list 1 pool net-208 ! interface ethernet 0 ip address 10.69.232.182 255.255.255.240 ip nat outside ! interface ethernet 1 ip address 192.168.1.94 255.255.255.0 ip nat inside ! access-list 1 permit 192.168.1.0 0.0.0.255 access-list 1 permit 192.168.2.0 0.0.0.255Example 2
In the next example, the goal is to define a virtual address, connections to which are distributed among a set of real hosts. The pool defines the addresses of the real hosts. The access list defines the virtual address. If a translation does not already exist, TCP packets from serial interface 0 (the outside interface) whose destination matches the access list are translated to an address from the pool.
ip nat pool real-hosts 192.168.15.2 192.168.15.15 prefix-length 28 type rotary ip nat inside destination list 2 pool real-hosts ! interface serial 0 ip address 192.168.15.129 255.255.255.240 ip nat outside ! interface ethernet 0 ip address 192.168.15.17 255.255.255.240 ip nat inside ! access-list 2 permit 192.168.15.1
A.In practical use, the maximum number of configurable IP pools is limited by the amount of available DRAM in the particular router. (Cisco recommends that you configure a pool size of 255.) Each pool must be no more than 16 bits. In 12.4(11)T and later, Cisco IOS introduced CCE (Common Classification Engine). This has limited NAT to only have a maximum of 255 pools.
A.A route-map protects unwanted outside users to reach to the inside users/servers. It also has the capability to map a single inside IP address to different Inside Global addresses based on the rule. Refer toNAT Support for Multiple Pools Using Route Mapsfor more information.
A.IP address overlapping refers to a situation where two locations that want to interconnect both use the same IP address scheme. This is not an unusual occurrence; it often happens when companies merge or are acquired. Without special support, the two locations cannot connect and establish sessions. The overlapped IP address can be a public address assigned to another company, a private address assigned to another company, or can come from the range of private addresses as defined inRFC 1918.
Private IP addresses are unrouteable and require NAT translations to allow connections to the outside world. The solution involves the interception of Domain Name System (DNS) name-query responses from the outside to the inside, a translation setup for the outside address, and the DNS response needs to be fixed before it is forwarded to the inside host. A DNS server is required to be involved on both sides of the NAT device to resolve users that want to have connection between both networks.
NAT is able to inspect and perform address translation on the contents of DNSAandPTRrecords, as shown inUsing NAT in Overlapping Networks.
A.Static NAT translations have one-to-one mapping between local and global addresses. Users can also configure static address translations to the port level and use the remainder of the IP address for other translations. This typically occurs where you perform Port Address Translation (PAT).
The next example shows how to configure route-map to allow outside-to-inside translation for static NAT:
ip nat inside source static 10.1.1.1 10.2.2.2 route-map R1 reversible ! ip access-list extended ACL-A permit ip any 10.1.10.1 0.0.0.127 route-map R1 permit 10 match ip address ACL-A
A.Yes. NAT overloading is PAT, which involves the use of a pool with a range of one or more addresses or the use of an interface IP address in combination with the port. When you overload, you create a fully extended translation. This is a translation table entry that contains IP address and source/destination port information, which is commonly called PAT or overloading.
PAT (or overloading) is a feature of Cisco IOS NAT that is used to translateinternal(inside local) private addresses to one or moreoutside(inside global, usually registered) IP addresses. Unique source port numbers on each translation are used to distinguish between the conversations.
A. In dynamic NAT translations, the users can establish dynamic mapping between local and global addresses. Dynamic mapping is accomplished when you define the local addresses to be translated and the pool of addresses or interface IP address from which to allocate global addresses and when you associate the two.
A.ALG is an Application Layer Gateway (ALG). NAT performs translation service on any Transmission Control Protocol/User Datagram Protocol (TCP/UDP) traffic that does not carry source and/or destination IP addresses in the application data stream.
These protocols include FTP, HTTP, SKINNY, H232, DNS, RAS, SIP ,TFTP, telnet, archie, finger, NTP, NFS, rlogin, rsh, rcp. Specific protocols that embed IP address information within the payload require support of an Application Level Gateway (ALG).
Refer toUsing Application Level Gateways with NATfor more information.
A.Yes. However, the same IP address cannot be used for the NAT static configuration or in the pool for NAT dynamic configuration. All the public IP addresses need to be unique. Notice that the global addresses used in static translations are not automatically excluded with dynamic pools that contain those same global addresses. Dynamic pools must be created to exclude addresses assigned by static entries. For more information, refer toConfiguring Static and Dynamic NAT Simultaneously.
A.Traceroute from outside must always return the global address.
A.NAT introduces additional port features: full-range and port-map.
Full-range allows NAT to use all ports regardless of its default port range.
Port-map allows NAT to reserve a user define port range for specific application.
Refer toUser Defined Source Port Ranges for PATfor more information.
In 12.4(20)T2 onward, NAT introduces port randomization for L3/L4 and symmetric-port.
Port randomization allows NAT to randomly select any global port for the source port request.
Symmetric-port allows NAT to supportendpoint independent.
A.IP fragmentation occurs at Layer 3 (IP); TCP segmentation occurs at Layer 4 (TCP). IP fragmentation takes place when packets that are larger than the Maximum Transmission Unit (MTU) of an interface are sent out of this interface. These packets have to be either fragmented or discarded when they are sent out the interface. If the
Don't Fragment (DF)
bit is not set in the IP header of the packet, the packet can be fragmented. If the DF bit is set in the IP header of the packet, the packet is dropped and an ICMP error message indicates the next-hop MTU value which is returned to the sender. All the fragments of an IP packet carry the same Ident in the IP header, which allows the final receiver to reassemble the fragments into the original IP packet. Refer toResolve IP Fragmentation, MTU, MSS, and PMTUD Issues with GRE and IPsecfor more information.TCP segmentation takes place when an application on an end station sends data. The application data is broken into what TCP considers the best-sized chunks to send. This unit of data passed from TCP to IP is called a segment. TCP segments are sent in IP datagrams. These IP datagrams can then become IP fragments as they pass through the network and encounter lower MTU links than they can fit through.
TCP can first segment this data into TCP segments (based on TCP MSS value) and can add the TCP header and pass this TCP segment to IP. Then IP can add an IP header to send the packet to the remote end host. If the IP packet with the TCP segment is larger than the IP MTU on an outgoing interface on the path between the TCP hosts then IP can fragment the IP/TCP packet in order to fit. These IP packet fragments can be reassembled on the remote host by the IP layer and the complete TCP segment (that was originally sent) can be handed to the TCP layer. The TCP layer has no idea that IP had fragmented the packet during transit.
NAT supports IP fragments, but it does not support TCP segments.
A.NAT supports only out-of-order IP fragments because ofip virtual-reassembly.
A.NAT uses the same debug CLI for both IP fragmentation and TCP segmentation:debug ip nat frag.
A.No. There is no supported NAT MIB nor is CISCO-IETF-NAT-MIB supported.
A.If the three-way handshake is not completed and NAT sees a TCP packet, then NAT can start a 60-second timer. When the three-way handshake is completed, NAT uses a 24-hour timer for a NAT entry by default. If an end host sends a RESET, NAT changes the default timer from 24 hours to 60 seconds. In the case of FIN, NAT changes the default timer from 24 hours to 60 seconds when it receives FIN and FIN-ACK.
A.Yes. You can change the NAT timeout values for all entries or for different types of NAT translations (such as udp-timeout, dns-timeout, tcp-timeout, finrst-timeout, icmp-timeout, pptp-timeout, syn-timeout, port-timeout, and arp-ping-timeout).
A.The LDAP is set to add the extra bytes (LDAP search results) while it processes messages of type Search-Res-Entry. LDAP attaches 10 bytes of search results to each of the LDAP reply packet. In the event that this 10 extra bytes of data result in the packet and exceeds the Maximum Transmission Unit (MTU) in a network, the packet is dropped. In this case, Cisco recommends that you turn off this LDAP behavior with the CLIno ip nat service append-ldap-search-rescommand in order for the packets to be sent and received.
A.A route has to be specified on the NAT configured box for the inside global IP address for features such as NAT-NVI. Similarly, a route must also be specified on the NAT box for the outside local IP address. In this case, any packet from an in-to-out direction with the outside static rule requires this kind of route. In such scenarios, while it provides the route for IG/OL, the next hop IP address must also be configured. If the next hop configuration is unfound, this is considered a configuration error and results in undefined behavior.
NVI-NAT is present in the output feature path only. If you have directly connected subnet with NAT-NVI or the outside NAT translation rule configured on the box, then in those scenarios, you need to provide a dummy Next Hop IP address and also an associated ARP for the Next Hop. This is needed for the underlying infrastructure to hand the packet to NAT for the translation.
A.When you configure Cisco IOS NAT for dynamic NAT translation, an ACL is used to identify packets that can be translated. The current NAT architecture does not support ACLs with a log keyword.
A.CUCM 7 and all of the default phone loads for CUCM 7 support SCCPv17. The SCCP version used is determined by the highest common version between CUCM and the phone when the phone registers.
NAT does not yet support SCCP v17. Until NAT support for SCCP v17 is implemented, the firmware must be downgraded to version 8-3-5 or lower so that SCCP v16 is negotiated. CUCM6 cannot encounter the NAT problem with any phone load as long as it uses SCCP v16. Cisco IOS does not currently support SCCP version 17.
A.NAT supports CUCM version 6.x and earlier releases. These CUCM versions are released with the default 8.3.x (or earlier) phone firmware load that support SCCP v15 (or earlier).
NAT does not support CUCM versions 7.x or later releases. These CUCM version are released with the default 8.4.x phone firmware load that supports SCCP v17 (or later).
If CUCM 7.x or later is used, an older firmware load must be installed on the CUCM TFTP server so that the phones use a firmware load with SCCP v15 or earlier in order to be supported by NAT.
A.The Service Provider PAT Port Allocation Enhancement for RTP and RTCP feature ensures that for SIP, H.323, and Skinny voice calls. The port numbers used for RTP streams are even port numbers, and the RTCP streams are the next subsequent odd port number. The port number is translated to a number within the range specified and that conforms to RFC-1889. A call with a port number within the range can result in a PAT translation to another port number within this range. Likewise, a PAT translation for a port number outside this range cannot result in a translation to a number within the given range.
A.Session Initiation Protocol (SIP) is an ASCII-based, application-layer control protocol that can be used to establish, maintain, and terminate calls between two or more endpoints. SIP is an alternative protocol developed by the Internet Engineering Task Force (IETF) for multimedia conferencing over IP. The Cisco SIP implementation enables supported Cisco platforms to signal the setup of voice and multimedia calls over IP networks. SIP packets can be NATted.
A.The Cisco IOS Hosted NAT Traversal for SBC feature enables a Cisco IOS NAT SIP Application-Level Gateway (ALG) router to act as a SBC on a Cisco Multiservice IP-to-IP Gateway, which helps to ensure smooth delivery of voice over IP (VoIP) services.
Refer toConfiguring Cisco IOS Hosted NAT Traversal for Session Border Controllerfor more information.
A.The number of calls handled by a NAT router is contingent on the amount of memory available on the box and the processing power of the CPU.
A.Cisco IOS-NAT support TCP segmentation for H323 and TCP segmentation support for SKINNY.
A.Yes. When you have NAT overload configs and a voice deployment, you need the registration message to go through NAT and create an association for out->in to reach this inside device. The inside device sends this registration in a periodic fashion and NAT updates this pin-hole/association from the information as in the signaling message.
A.In voice deployments when you issue aclear ip nat trans *command or aclear ip nat trans forcedcommand and have dynamic NAT, you wipe out the pin-hole/association and must wait for the next registration cycle from the inside device to establish this again. Cisco recommends that you do not use these clear commands in a voice deployment.
A.No. The co-located solution is currently not supported. The next deployment with NAT (on the same box) is considered a co-located solution: CME/DSP-Farm/SCCP/H323.
A.No. Notice that UDP SIP ALG (used by most deployments) is not impacted.
Router(config)#ip nat inside source static 10.1.1.1 10.2.2.2
Router(config)#ip nat inside source static 10.1.1.1 10.2.2.2 vrf RED
A.Legacy NAT supports overlapping address config over different VRFs. You would have to configure overlapping at rule with thematch-in-vrfoption and set upip nat inside/outsidein the same VRF for traffic over that specific VRF. The overlapping support does not include the global routing table.
You must add thematch-in-vrfkeyword for the overlapping VRF static NAT entries for different VRFs. However, it is not possible to overlap global and vrf NAT addresses.
Router(config)#ip nat inside source static 10.1.1.1 10.2.2.2 vrf RED match-in-vrf Router(config)#ip nat inside source static 10.1.1.1 10.2.2.2 vrf BLUE match-in-vrf
A.No. You must use NVI to NAT between different VRFs. You can use legacy NAT to do NAT from VRF to global or NAT within the same VRF.
A.NVI stands for NAT Virtual Interface. It allows NAT to translate between two different VRFs. This solution must be used in lieu of Network Address Translation on a Stick.
A.Cisco recommends that you use legacy NAT for VRF to global NAT (ip nat inside/out) and between interfaces in the same VRF. NVI is used for NAT between different VRFs.
A.There is no support for TCP segmentation for NAT-NVI.
A.No. Notice that UDP SIP ALG (used by most deployments) is not impacted.
A.SNAT does not support any TCP ALGs (such as, SIP, SKINNY, H323, or DNS). Therefore, TCP segmentation is not supported. However, UDP SIP and DNS are supported.
A.SNAT allows two or more network address translators to function as a translation group. One member of the translation group handles traffic that requires translation of IP address information. Additionally, it informs the backup translator of active flows as they occur. The backup translator can then use information from the active translator to prepare duplicate translation table entries. Therefore, if the active translator is hindered by a critical failure, the traffic can rapidly be switched to the backup. The traffic flow continues since the same network address translations are used and the state of those translations has been previously defined.
A.SNAT does not support any TCP ALGs (such as, SIP, SKINNY, H323, or DNS). Therefore, TCP segmentation is not supported. However, UDP SIP and DNS are supported.
A. Asymmetric routing supports NAT when it enables
as-queuing
. By default, as-queueing is enable. However, from 12.4(24)T onward,as-queuing
is no longer supported. Customers must make sure packets are routed properly and proper delay is added in order for asymmetric routing to work correctly.
A.NAT-PT is v4 to v6 translation for NAT. Protocol Translation (NAT-PT) is an IPv6-IPv4 translation mechanism, as defined inRFC 2765andRFC 2766, and allows IPv6-only devices to communicate with IPv4-only devices and vice versa.
A.NAT-PT is not supported in the CEF path.
A.NAT-PT supports TFTP/FTP and DNS. There is no support for voice and SNAT in NAT-PT.
A.Aggregation Services Routers (ASR) uses NAT64.
A.SNAT is not available on Catalyst 6500 on the SX train.
A.VRF-aware NAT is not supported in hardware on this platform.
A.On the 65xx/76xx platform, VRF-aware NAT is not supported, and the CLIs are blocked.
Note: You can implement a design if you leverage a FWSM that runs in virtual context transparent mode.
A.No. There is no support for Skinny NAT ALG in 12.4T on the 850 series.
A.NAT enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT translates the private (RFC1918) address in the internal network into legal routable addresses before packets are forwarded onto another network.
A.The NAT support for voice feature allows SIP embedded messages that passes through a router configured with Network Address Translation (NAT) to be translated back to the packet. An application layer gateway (ALG) is used with NAT to translate the voice packets.
A.The NAT integration with MPLS VPNs feature allows multiple MPLS VPNs to be configured on a single device to work together. NAT can differentiate from which MPLS VPN it receives IP traffic even if the MPLS VPNs all use the same IP addressing scheme. This enhancement enables multiple MPLS VPN customers to share services while it ensures that each MPLS VPN is completely separate from the other.
A.When an Address Resolution Protocol (ARP) query is triggered for an address that is configured with Network Address Translation (NAT) static mapping and owned by the router, NAT responds with the BIA MAC address on the interface to which the ARP points. Two routers act as HSRP active and standby. Their NAT inside interfaces must be enabled and configured to belong to a group.
A.The NAT virtual interface (NVI) feature removes the requirement to configure an interface as either NAT inside or NAT outside.
A.There are two kinds of load balancing that can be done with NAT: you can load balance inbound to a set of servers to distribute the load on the servers, and you can load balance your user traffic to the Internet over two or more ISPs.
For more information about outbound load balancing, refer toCisco IOS NAT Load-Balancing for Two ISP Connections.
A.There is support for
IP Security (IPSec) Encapsulating Security Payload (ESP) through NAT
and IPSec NAT Transparency.The IPSec ESP through NAT feature provides the ability to support multiple concurrent IPSec ESP tunnels or connections through a Cisco IOS NAT device configured in overload or Port Address Translation (PAT) mode. The IPSec NAT transparency feature introduces support for IPSec traffic to travel through NAT or PAT points in the network when it addresses many known incompatibilities between NAT and IPSec.
A.NAT-PT (Network Address Translation—Protocol Translation) is an IPv6-IPv4 translation mechanism, as defined inRFC 2765andRFC 2766, that allows IPv6-only devices to communicate with IPv4-only devices and vice versa.
A.It is possible to NAT the source IP for a multicast stream. A route-map cannot be used when a dynamic NAT for multicast is done, only an access list is supported for this.
For more information, refer toHow Does Multicast NAT Work on Cisco Routers. The destination multicast group uses NAT with a Multicast Service Reflection solution.
A.SNAT enables continuous service for dynamically mapped NAT sessions. Sessions that are statically defined receive the benefit of redundancy without the need for SNAT. In the absence of SNAT, sessions that use dynamic NAT mappings would be severed in the event of a critical failure and would have to be reestablished. Only the minimal SNAT configuration is supported. Future deployments must be performed only after you talk to your Cisco Account Team in order to validate the design relative to current restrictions.
SNAT is recommended for the next scenarios:
Primary/backup is not a recommended mode since there are some features absent compared to HSRP.
For fail-over scenarios and for 2-router setup. That is, if one router crashes, the other router takes over seamlessly. (SNAT architecture is not designed to handle Interface-flaps.)
Non-asymmetric routing scenario is supported. Asymmetric routing can be handled only if the latency in the reply packet is higher than that between 2 SNAT routers to exchange the SNAT messages.
Currently SNAT architecture is not designed to handle robustness; therefore, these tests are not expected to succeed:
When NAT entries are cleared while there is traffic.
When the interface parameters (like IP address change, shut/no-shut, and so on) are changed while there is traffic.
SNAT specificclearorshowcommands are not expected to execute properly and not recommended.
Some of the SNAT relatedclearandshowcommands are as follows:
clear ip snat sessions * clear ip snat sessions <ip address of the peer> clear ip snat translation distributed * clear ip snat translation peer < IP address of SNAT peer> sh ip snat distributed verbose sh ip snat peer < IP address of peer>If the user wants to clear entries,clear ip nat trans forcedorclear ip nat trans *commands can be used.
If the user wants to view entries,show ip nat translation,show ip nat translations verbose, andshow ip nat statscommands can be used. Ifservice internalis configured, it can show SNAT specific information as well.
The NAT translations are cleared at the back up router is not recommended. Always clear the NAT entries on the primary SNAT router.
SNAT is not HA; therefore, configurations on both routers must be the same. Both routers must run the same image. Also, ensure that the underlying platform used for both SNAT routers is the same.
A.Yes. These are the NAT best practices:
When you use both dynamic and static NAT, the ACL that sets the rule for dynamic NAT must exclude the static local hosts so there is no overlap.
If you use ACL for NAT withpermit ip any any you can get unpredictable results. After 12.4(20)T NAT can translate locally generated HSRP and routing protocol packets if they are sent out the outside interface, as well as locally encrypted packets that match the NAT rule.
When you have overlapping networks for NAT, use thematch-in-vrfkeyword.
You must add thematch-in-vrfkeyword for the overlapping VRF static NAT entries for different VRFs, but it is not possible to overlap global and vrf NAT addresses.
Router(config)#ip nat inside source static 10.1.1.1 10.2.2.2 vrf RED match-in-vrfRouter(config)#ip nat inside source static 10.1.1.1 10.2.2.2 vrf BLUE match-in-vrfNAT pools with same address range cannot be used in different VRFs unless thematch-in-vrfkeyword is used. For example:
ip nat pool poolA 172.31.1.1 172.31.1.10 prefix-length 24 ip nat pool poolB 172.31.1.1 172.31.1.10 prefix-length 24 ip nat inside source list 1 poolA vrf A match-in-vrf ip nat inside source list 2 poolB vrf B match-in-vrfNote: Even though CLI configuration is valid, without the match-in-vrf keyword the configuration is not supported.
When you deploy ISPs load balancing with NAT interface overload, the best practice is to use route-map with interface match over ACL matching.
When you use pool mapping, you must not use two different mapping (ACL or route-map) to share the same NAT pool address.
When you deploy the same NAT rules on two different routers in the failover scenario, you must use HSRP redundancy.
Do not define the same inside global address in Static NAT and a Dynamic Pool. This action can lead to undesirable results.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
01-Aug-2022 |
Initial Release |