UPGRADE FROM_ UBOOT to 559 & MANS FPGA to 0.41014 71
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Contents
Configuring Dual Stack Lite Instance 77
Configuring PCP Server for NAT44 Instance 81
Configuring PCP Server for DS-Lite Instance 82
Configuration Examples for Implementing the Carrier Grade NAT 84
Configuring a Different Inside VRF Map to a Different Outside VRF: Example 84
Configuring a Different Inside VRF Map to a Same Outside VRF: Example 85
Configuring ACL for a Infrastructure Service Virtual Interface: Example 86
NAT44 Configuration: Example 86
NAT64 Stateless Configuration: Example 88
Predefined NAT Configuration: Example 89
DS Lite Configuration: Example 90
IPv6 ServiceApp and Static Route Configuration 90
IPv4 ServiceApp and Static Route Configuration 90
DS Lite Configuration 90
Bulk Port Allocation and Syslog Configuration: Example 91
PPTP ALG Configuration: Example 91
NAT44 Instance 91
DBL Configuration: Example 91
NAT44 Instance 91
DS-Lite Instance 91
PCP Server Configuration: Example 91
NAT44 Instance 91
DS-Lite Instance 92
Services Redundancy Configuation (Active/Standby): Example 92
Configuration of Multiple Address Pools: Example 92
Configuration of Port Limit per VRF: Example 92
Configuration of Same Public Address Pool across Different NAT Instances: Example 93
High Availability on data Path SVI: Example 93
CHAPTER 3
External Logging 95
Bulk Port Allocation 95
Restrictions for Bulk Port Allocation 95
Session logging 96
Syslog Logging 96
Restrictions for Syslog 96
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
viOL-32659-01
Contents
Syslog Message Format 96
Header 97
Structured Data 98
MSG 98
Netflow v9 Support 100
NetFlow Record Format 100
Frequently Asked Questions (FAQs) 115
OL-32659-01vii
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Contents
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
viiiOL-32659-01
Preface
The Preface contains these sections:
Changes to This Document, page ix
•
Obtaining Documentation and Submitting a Service Request, page ix
•
Changes to This Document
This table lists the technical changes made to this document since it was first released.
Table 1: Changes to This Document
Change SummaryDateRevision
Initial release of this document.July 2014OL-32659-01
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service
request, and gathering additional information, see What's New in Cisco Product Documentation, at: http://
Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical
documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The
RSS feeds are a free service.
OL-32659-01ix
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Obtaining Documentation and Submitting a Service Request
Preface
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
xOL-32659-01
CHAPTER 1
New and Changed Carrier Grade NAT Feature
Information
This table summarizes the new and changed information for the Cisco IOS XR Carrier Grade NAT
Configuration Guide for the Cisco CRS Router, and tells you where the features are documented.
New and Changed Carrier Grade NAT Features, page 1
•
New and Changed Carrier Grade NAT Features
CGSE-PLUS 1:1
Redundancy
CGSE-PLUS
Back-to-Back
Deployment
CGSE-PLUS Intelligent
Port Management
DescriptionFeature
introduced.
introduced.
introduced.
Release
Release 5.2.0This feature was
Release 5.2.0This feature was
Release 5.2.0This feature was
Where DocumentedIntroduced/Changed in
Implementing Carrier
Grade NAT on Cisco IOS
XR Software chapter:
1:1 Redundancy, on page
18
Implementing Carrier
Grade NAT on Cisco IOS
XR Software chapter:
Back-to-Back
Deployment, on page 18
Implementing Carrier
Grade NAT on Cisco IOS
XR Software chapter:
Intelligent Port
Management, on page
18
OL-32659-011
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
New and Changed Carrier Grade NAT Features
New and Changed Carrier Grade NAT Feature Information
CGSE-PLUS High
Availability on the Data
Path Service Virtual
Interface (SVI)
CGSE-PLUS Throughput
Measurement
DescriptionFeature
introduced.
introduced.
Release
Release 5.2.0This feature was
Release 5.2.0This feature was
Where DocumentedIntroduced/Changed in
Implementing Carrier
Grade NAT on Cisco IOS
XR Software chapter:
High Availability on the
Data Path Service Virtual
Interface (SVI), on page
20
Implementing Carrier
Grade NAT on Cisco IOS
XR Software chapter:
Throughput
Measurement, on page
19
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
2OL-32659-01
CHAPTER 2
Implementing Carrier Grade NAT on Cisco IOS
XR Software
This chapter provides an overview of the implementation of Carrier Grade NAT on Cisco IOS XR Software.
Configuration Examples for Implementing the Carrier Grade NAT, page 84
•
Carrier Grade NAT Overview and Benefits
To implement the Carrier Grade NAT, you should understand the following concepts:
Carrier Grade NAT Overview
Carrier Grade Network Address Translation (CGN) is a large scale NAT that is capable of providing private
IPv4 to public IPv4 address translation in the order of millions of translations to support a large number of
subscribers, and at least 10 Gbps full-duplex bandwidth throughput.
CGN is a workable solution to the IPv4 address completion problem, and offers a way for service provider
subscribers and content providers to implement a seamless transition to IPv6. CGN employs network address
and port translation (NAPT) methods to aggregate many private IP addresses into fewer public IPv4 addresses.
For example, a single public IPv4 address with a pool of 32 K port numbers supports 320 individual private
IP subscribers assuming each subscriber requires 100 ports. For example, each TCP connection needs one
port number.
A CGN requires IPv6 to assist with the transition from IPv4 to IPv6.
OL-32659-013
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Benefits of Carrier Grade NAT
Benefits of Carrier Grade NAT
CGN offers these benefits:
Enables service providers to execute orderly transitions to IPv6 through mixed IPv4 and IPv6 networks.
•
Provides address family translation but not limited to just translation within one address family.
•
Delivers a comprehensive solution suite for IP address management and IPv6 transition.
•
IPv4 Address Shortage
A fixed-size resource such as the 32-bit public IPv4 address space will run out in a few years. Therefore, the
IPv4 address shortage presents a significant and major challenge to all service providers who depend on large
blocks of public or private IPv4 addresses for provisioning and managing their customers.
Service providers cannot easily allocate sufficient public IPv4 address space to support new customers that
need to access the public IPv4 Internet.
Implementing Carrier Grade NAT on Cisco IOS XR Software
NAT and NAPT Overview
A Network Address Translation (NAT) box is positioned between private and public IP networks that are
addressed with non-global private addresses and a public IP addresses respectively. A NAT performs the task
of mapping one or many private (or internal) IP addresses into one public IP address by employing both
network address and port translation (NAPT) techniques. The mappings, otherwise referred to as bindings,
are typically created when a private IPv4 host located behind the NAT initiates a connection (for example,
TCP SYN) with a public IPv4 host. The NAT intercepts the packet to perform these functions:
Rewrites the private IP host source address and port values with its own IP source address and port
•
values
Stores the private-to-public binding information in a table and sends the packet. When the public IP host
•
returns a packet, it is addressed to the NAT. The stored binding information is used to replace the IP
destination address and port values with the private IP host address and port values.
Traditionally, NAT boxes are deployed in the residential home gateway (HGW) to translate multiple private
IP addresses. The NAT boxes are configured on multiple devices inside the home to a single public IP address,
which are configured and provisioned on the HGW by the service provider. In enterprise scenarios, you can
use the NAT functions combined with the firewall to offer security protection for corporate resources and
allow for provider-independent IPv4 addresses. NATs have made it easier for private IP home networks to
flourish independently from service provider IP address provisioning. Enterprises can permanently employ
private IP addressing for Intranet connectivity while relying on a few NAT boxes, and public IPv4 addresses
for external public Internet connectivity. NAT boxes in conjunction with classic methods such as Classless
Inter-Domain Routing (CIDR) have slowed public IPv4 address consumption.
Network Address and Port Mapping
Network address and port mapping can be reused to map new sessions to external endpoints after establishing
a first mapping between an internal address and port to an external address. These NAT mapping definitions
are defined from RFC 4787:
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
4OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
• Endpoint-independent mapping—Reuses the port mapping for subsequent packets that are sent from
the same internal IP address and port to any external IP address and port.
• Address-dependent mapping—Reuses the port mapping for subsequent packets that are sent from the
same internal IP address and port to the same external IP address, regardless of the external port.
CGN on ISM implements Endpoint-Independent Mapping.Note
Translation Filtering
RFC 4787 provides translation filtering behaviors for NATs. These options are used by NAT to filter packets
originating from specific external endpoints:
• Endpoint-independent filtering—Filters out only packets that are not destined to the internal address
and port regardless of the external IP address and port source.
Prerequisites for Implementing the Carrier Grade NAT
• Address-dependent filtering—Filters out packets that are not destined to the internal address. In
addition, NAT filters out packets that are destined for the internal endpoint.
• Address and port-dependent filtering—Filters out packets that are not destined to the internal address.
In addition, NAT filets out packets that are destined for the internal endpoint if the packets were not
sent previously.
Prerequisites for Implementing the Carrier Grade NAT
The following prerequisites are required to implement Carrier Grade NAT:
You must be running Cisco IOS XR software Release 3.9.1 or above.
•
You must have installed the CGN service package or the pie hfr-services-p.pie-x.x.x or
•
hfr-services-px.pie-x.x.x (where x.x.x specifies the release number of Cisco IOS XR software)
Note
You must be in a user group associated with a task group that includes the proper task IDs. The command
•
reference guides include the task IDs required for each command.
The CGN service package was termed as hfr-cgn-p.pie or hfr-cgn-px.pie for releases
prior to Cisco IOS XR Software Release 4.2.0. The CGN service package is referred as
hfr-services-p.pie or hfr-services-px.pie in Cisco IOS XR Software Release 4.2.0 and
later.
In case of Intra chassis redundancy, enable CGSE data and control path monitoring in configuration
•
mode, where R/S/CPU0 is the CGSE Location -
service-plim-ha location is R/S/CPU0 datapath-test
•
service-plim-ha location is R/S/CPU0 core-to-core-test
•
service-plim-ha location is R/S/CPU0 pci-test
•
OL-32659-015
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
CGSE PLIM
Implementing Carrier Grade NAT on Cisco IOS XR Software
service-plim-ha location is R/S/CPU0 coredump-extraction
All the error conditions result in card reload that triggers switchover to standby CGSE.
The option of revertive switchover (that is disabled by default) and forced switchover
is also available and can be used if required. Contact Cisco Technical Support with
show tech-support cgn information.
In case of standalone CGSE (without intra chassis redundancy), enable CGSE data and control path
•
monitoring in configuration mode, where R/S/CPU0 is the CGSE Location with auto reload disabled
and
(admin-config) hw-module reset auto disable location R/S/CPU0
•
Note
All the error conditions result in a syslog message. On observation of Heartbeat failures
or any HA test failure messages, contact Cisco Technical Support with showtech-support cgn information.
Note
If you suspect user group assignment is preventing you from using a command, contact
your AAA administrator for assistance.
CGSE PLIM
A Carrier-Grade Services Engine (CGSE) is a physical line interface module (PLIM) for the Cisco CRS-1
Router. When the CGSE is attached to a single CRS modular service card (forwarding engine), it provides
the hardware system running applications such as NAT44, XLAT, Stateful NAT64 and DS-Lite. An individual
application module consumes one CRS linecard slot. Multiple modules can be placed inside a single CRS
chassis to add capacity, scale, and redundancy.
There can be only one ServiceInfra SVI per CGSE Slot. This is used for the Management Plane and is required
to bring up CGSE. This is of local significance within the chassis.
ServiceApp SVI is used to forward the data traffic to the CGSE applications. You can scale up to 256
ServiceApp interfaces for each CGSE. These interfaces can be advertised in IGP/EGP.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
6OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
CGSE Multi-Chassis Support
The CGSE line card is supported in a multi-chassis configuration. 16 CGSE line cards are supported on each
Cisco CRS Router chassis. A maximum of 32 CGN instances are supported.
For CGN applications, such as NAT44, NAT64, XLAT, DS-Lite and 6RD, a maximum of 20 million sessions
are supported by each CGSE line card.
CGSE Plus PLIM
CGSE Plus is a mutli-service PLIM for the Cisco CRS-3 Router. The module has a maximum packet processing
speed of 40 Gbps full-duplex with a reduced boot time and latency.
CGSE Plus PLIM
Note
The actual throughput of the application depends on the software logic and the CPU cycles consumed by
the software.
It also supports services redundancy and QoS for service applications.
CGSE Plus is brought up in two modes:
• CGN mode — The Cisco IOS XR and Linux software are tuned to host CGN applications such as NAT44
and 6RD.
• SESH mode — The Cisco IOS XR and Linux software are tuned to host future applications such as
Arbor DDoS services.
For more information on CGSE Plus PLIM, see Cisco CRS Carrier Grade Services Engine Physical Layer
Interface Module Installation Note.
Information About Carrier Grade NAT
These sections provide the information about implementation of NAT using ICMP and TCP:
Implementing NAT with ICMP
This section explains how the Network Address Translation (NAT) devices work in conjunction with Internet
Control Message Protocol (ICMP).
The implementations of NAT varies in terms of how they handle different traffic.
ICMP Query Session Timeout
RFC 5508 provides ICMP Query Session timeouts. A mapping timeout is maintained by NATs for ICMP
queries that traverse them. The ICMP Query Session timeout is the period during which a mapping will stay
active without packets traversing the NATs. The timeouts can be set as either Maximum Round Trip Time
(Maximum RTT) or Maximum Segment Lifetime (MSL). For the purpose of constraining the maximum RTT,
the Maximum Segment Lifetime (MSL) is considered a guideline to set packet lifetime.
OL-32659-017
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Implementing NAT with TCP
If the ICMP NAT session timeout is set to a very large duration (240 seconds) it can tie up precious NAT
resources such as Query mappings and NAT Sessions for the whole duration. Also, if the timeout is set to
very low it can result in premature freeing of NAT resources and applications failing to complete gracefully.
The ICMP Query session timeout needs to be a balance between the two extremes. A 60-second timeout is a
balance between the two extremes.
Implementing NAT with TCP
This section explains the various NAT behaviors that are applicable to TCP connection initiation. The detailed
NAT with TCP functionality is defined in RFC 5382.
Address and Port Mapping Behavior
A NAT translates packets for each TCP connection using the mapping. A mapping is dynamically allocated
for connections initiated from the internal side, and potentially reused for certain connections later.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Internally Initiated Connections
A TCP connection is initiated by internal endpoints through a NAT by sending SYN packet. All the external
IP address and port used for translation for that connection are defined in the mapping.
Generally for the client-server applications where an internal client initiates the connection to an external
server, to translate the outbound SYN, the resulting inbound SYN-ACK response mapping is used, the
subsequent outbound ACK, and other packets for the connection.
The 3-way handshake corresponds to method of connection initiation.
Externally Initiated Connections
For the first connection that is initiated by an internal endpoint NAT allocates the mapping. For some situations,
the NAT policy may allow reusing of this mapping for connection initiated from the external side to the
internal endpoint.
Implementing NAT 44 over ISM
These sections provide the information about implementation of NAT.
The following figure illustrates the implementation of NAT 44 over ISM
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
8OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
The components of this illustration are as follows:
Private IP4 subscribers: It denotes a private network.
•
Interface/VLAN: It denotes a designated interface or VLAN which is associated with the VRF.
•
Inside VRF: It denotes the VRF that handles packets coming from the subscriber network. It is known
•
as inside VRF as it forwards packets from the private network.
App SVI: It denotes an application interface that forwards the data packet to and from the ISM. The data
•
packet may be sent from another line card through a backplane. Because the ISM card does not have a
physical interface, the APP SVI acts as a logical entry into it.
The inside VRF is bound to an App SVI. There are 2 App SVIs required; one for the inside VRF and
the other one for the outside VRF. Each App SVI pair will be associated with a unique "inside VRF"
and a unique public IP address pool. The VRF consists of a static route for forwarding packets to App
SVI1.
Outside VRF: It denotes the VRF that handles packets going out to the public network. It is known as
•
outside VRF as it forwards packets from the public network.
Public IPV4: It denotes a public network.
•
Implementing NAT 44 over ISM
The following figure illustrates the path of the data packet from a private network to a public network in a
NAT implementation.
The packet goes through the following steps when it travels from the private network to the public network:
OL-32659-019
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Implementing NAT 44 over ISM
1
In the network shown in this figure, the packet travels from the host A (having the IP address 10.222.5.55)
in the private network to host B (having the IP address 5.5.5.2) in the public network. The private address
has to be mapped to the public address by NAT44 that is implemented in ISM.
2
The packet enters through the ingress port on the Gigabit Ethernet (GigE) interface at Slot 0. While using
NAT44, it is mandatory that the packet enters through VRF.
3
Once the packet reaches the designated interface or VLAN on ASR9K, it is forwarded to the inside VRF
either through static routing or ACL-based forwarding (ABL). After the inside VRF determines that the
packet needs address translation, it is forwarded to the App SVI that is bound to the VRF.
4
The packet is forwarded by AppSVI1 through a default static route (ivrf1). The destination address and
the port get translated because of the CGN configuration applied on ISM.
5
The ISM applies NAT44 to the packet and a translation entry is created. The CGN determines the destination
address from the FIB Look Up. It pushes the packet to the egress port.
6
The packet is then forwarded to the egress port on the interface through App SVI2. An inside VRF is
mapped to an outside VRF. The outside VRF is associated with this interface. The packet is forwarded by
App SVI2 through the default static route (ovrf1). Then the packet is sent to the public network.
7
The packets that do not need the address translation can bypass the App SVI and can be forwarded to the
destination through a different static route and a different egress port.
Implementing Carrier Grade NAT on Cisco IOS XR Software
The following figure illustrates the path of the packet coming from the public network to the private network.
The packet goes through the following steps when it travels from the public network to the private network:
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
10OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
1
In the network shown in this figure, the packet travels from the host A (having the IP address 10.222.5.55)
in the public network to host B (having the IP address 5.5.5.2) in the private network. The public address
has to be mapped to the private address by NAT44 that is implemented in ISM.
2
The packet enters through the ingress port on the Gigabit Ethernet (GigE) interface at Slot 0.
3
Once the packet reaches the designated interface or VLAN on ASR9K, it is forwarded to the outside VRF
either through static routing or ACL-based forwarding (ABL).
4
The packet is forwarded by App SVI2 through a default static route. The destination address and the port
are mapped to the translated address.
5
The ISM applies NAT44 to the packet. The CGN determines the destination address from the FIB Look
Up. It pushes the packet to the egress port.
6
The packet is then forwarded to the egress port on the interface through App SVI2. Then the packet is sent
to the private network through the inside VRF.
7
The packets that do not need the address translation can bypass the App SVI and can be forwarded to the
destination through a different static route and a different egress port.
Implementing NAT 64 over ISM
Implementing NAT 64 over ISM
This section explains how NAT64 is implemented over ISM. The figure illustrates the implementation of
NAT64 over ISM.
The components of this implementation are as follows:
OL-32659-0111
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Implementing NAT 64 over ISM
• Private IP6 subscribers – It denotes a private network.
Interface/VLAN- It denotes a designated interface or VLAN which is associated with the VRF.
•
• Inside VRF – It denotes the VRF that handles packets coming from the subscriber network. It is known
as inside VRF as it forwards packets from the private network.
App SVI- It denotes an application interface that forwards the data packet to and from the ISM. The
•
data packet may be sent from another line card through a backplane. Because the ISM card does not
have a physical interface, the APP SVI acts as a logical entry into it.
The inside VRF is bound to an App SVI. There are 2 App SVIs required; one for the inside VRF and
the other one for the outside VRF. Each App SVI pair will be associated with a unique "inside VRF"
and a unique public IP address pool. The VRF consists of a static route for forwarding packets to App
SVI1.
Outside VRF- It denotes the VRF that handles packets going out to the public network. It is known as
•
outside VRF as it forwards packets from the public network.
Public IPV4- It denotes a public network.
•
The following figure illustrates the path of the data packet from a private network to a public network in a
NAT64 implementation.
Implementing Carrier Grade NAT on Cisco IOS XR Software
The packet goes through the following steps when it travels from the private network to the public network:
1
In the network shown in this figure, the packet travels from the host A (having the IP address
3001:DB8:E0E:E03::/40) in the private network to host B (having the IP address 11.11.11.2) in the public
network. The private address has to be mapped to the public address by NAT64 that is implemented in
ISM.
2
The packet enters through the ingress port on the Gigabit Ethernet (GigE) interface at Slot 3.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
12OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
3
Once the packet reaches the designated interface or VLAN on ASR9K, it is forwarded to the inside VRF
either through static routing or ACL-based forwarding (ABL). Based on this routing decision, the packet
that needs address translation is determined and is forwarded to the App SVI that is bound to the VRF.
4
The packet is forwarded by AppSVI1 through a default static route. The destination address and the port
get translated because of the CGN configuration applied on ISM.
5
The ISM applies NAT64 to the packet and a translation entry is created. The CGN determines the destination
address from the FIB Look Up. It pushes the packet to the egress port.
6
The packet is then forwarded to the egress port on the interface through App SVI2. The packet is forwarded
by App SVI2 through the default static route. Then the packet is sent to the public network.
7
The packets that do not need the address translation can bypass the App SVI and can be forwarded to the
destination through a different static route and a different egress port.
The following figure illustrates the path of the packet coming from the public network to the private network.
Implementing NAT 64 over ISM
The packet goes through the following steps when it travels from the public network to the private network:
1
In the network shown in this figure, the packet travels from the host A (having the IP address 11.11.11.2)
in the public network to host B (having the IP address 3001:DB8:E0E:E03::) in the private network. The
public address has to be mapped to the private address by NAT64 that is implemented in ISM.
2
The packet enters through the ingress port on the Gigabit Ethernet (GigE) interface at Slot 3.
OL-32659-0113
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Double NAT 444
3
4
5
6
7
Double NAT 444
The Double NAT 444 solution offers the fastest and simplest way to address the IPv4 depletion problem
without requiring an upgrade to IPv6 anywhere in the network. Service providers can continue offering new
IPv4 customers access to the public IPv4 Internet by using private IPv4 address blocks, if the service provider
is large enough; However, they need to have an overlapping RFC 1918 address space, which forces the service
provider to partition their network management systems and creates complexity with access control lists
(ACL).
Double NAT 444 uses the edge NAT and CGN to hold the translation state for each session. For example,
both NATs must hold 100 entries in their respective translation tables if all the hosts in the residence of a
subscriber have 100 connections to hosts on the Internet). There is no easy way for a private IPv4 host to
communicate with the CGN to learn its public IP address and port information or to configure a static incoming
port forwarding.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Once the packet reaches the designated interface or VLAN on ASR9K, it is forwarded to the outside VRF
either through static routing or ACL-based forwarding (ABL). Based on this routing decision, the packet
is forwarded to the App SVI that is bound to the VRF.
The packet is forwarded by App SVI2 through a default static route. The destination address and the port
are mapped to the translated address.
The ISM applies NAT64 to the packet. The CGN determines the destination address from the FIB Look
Up. It pushes the packet to the egress port.
The packet is then forwarded to the egress port on the interface through App SVI2. Then the packet is sent
to the private network through the inside VRF.
The packets that do not need the address translation can bypass the App SVI and can be forwarded to the
destination through a different static route and a different egress port.
Address Family Translation
The IPv6-only to IPv4-only protocol is referred to as address family translation (AFT). The AFT translates
the IP address from one address family into another address family. For example, IPv6 to IPv4 translation is
called NAT 64 or IPv4 to IPv6 translation is called NAT 46.
Cisco Carrier NAT Applications
These applications are deployed on the CGSE line card.
IPv4/IPv6 Stateless Translator
IPv4/IPv6 Stateless Translator (XLAT), which runs on the CRS Carrier Grade Services Engine (CGSE),
enables an IPv4-only endpoint that is situated in an IPv4-only network, to communicate with an IPv6-only
end-point that is situated in an IPv6-only network. This like-to-unlike address family connectivity paradigm
provides backwards compatibility between IPv6 and IPv4.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
14OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
A Stateless XLAT (SL-XLAT) does not create or maintain any per-session or per-flow data structures. It is
an algorithmic operation performed on the IP packet headers that results in the translation of an IPv4 packet
to an IPv6 packet, and vice-versa. SL-XLAT requires Cisco IOS XR Software Release 3.9.3 or 4.0.1 or 4.1.0
or later.
IPv6 Rapid Deployment
IPv6 Rapid Deployment (6RD) is a mechanism that allows service providers to provide a unicast IPv6 service
to customers over their IPv4 network.
Stateful NAT64
The Stateful NAT64 (Network Address Translation 64) feature provides a translation mechanism that translates
IPv6 packets into IPv4 packets and vice versa. NAT64 allows IPv6-only clients to contact IPv4 servers using
unicast UDP, TCP, or ICMP. The public IPv4 address can be shared with several IPv6-only clients. NAT64
supports communication between:
IPv6 Rapid Deployment
NAT64 is implemented on the Cisco CRS router CGSE platform. CGSE (Carrier Grade Service Engine) has
four octeons and supports 20 Gbps full duplex traffic. It works on Linux operating system and traffic into
CGSE is forwarded using serviceApp interfaces. SVIs (Service Virtual Interfaces) are configured to enable
traffic to flow in and out of CGSE.
Each NAT64 instance configured is associated with two serviceApps for the following purposes:
NAT64 instance parameters are configured using the CGN CLI. The NAT64 application in the octeons updates
its NAT64 instance and serviceApp databases, which are used to perform the translation between IPv6 and
IPv4 and vice versa.
Active CGN instance configuration is replicated in the standby CGN instance through the XR control plane.
Translations that are established on the Active CGN instance are exported to the Standby CGN instance as
the failure of the Active CGN affects the service until translations are re-established through normal packet
flow. Service interruption is moderate for the given fault detection time and translation learning rate in terms
of seconds or tens of seconds for a large translation database.
Dual Stack Lite
IPv6 Network and Public IPv4 Internet
•
Public IPv6 Internet and IPv4 Network
•
One serviceApp is used to carry traffic from IPv6 side
•
Another serviceApp is used to carry traffic from IPv4 side of the NAT64.
•
The Dual Stack Lite (DS-Lite) feature enables legacy IPv4 hosts and server communication over both IPv4
and IPv6 networks. Also, IPv4 hosts may need to access IPv4 internet over an IPv6 access network. The IPv4
hosts will have private addresses which need to have network address translation (NAT) completed before
reaching the IPv4 internet. The Dual Stack Lite application has these components:
OL-32659-0115
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Port Control Protocol
Implementing Carrier Grade NAT on Cisco IOS XR Software
Basic Bridging BroadBand Element (B4): This is a Customer Premises Equipment (CPE) router that
•
is attached to the end hosts. The IPv4 packets entering B4 are encapsulated using a IPv6 tunnel and sent
to the Address Family Transition Router (AFTR).
Address Family Transition Router(AFTR): This is the router that terminates the tunnel from the B4.
•
It decapsulates the tunneled IPv4 packet, translates the network address and routes to the IPv4 network.
In the reverse direction, IPv4 packets coming from the internet are reverse network address translated
and the resultant IPv4 packets are sent the B4 using a IPv6 tunnel.
The Dual Stack Lite feature helps in these functions:
1
Tunnelling IPv4 packets from CE devices over IPv6 tunnels to the CGSE blade.
2
Decapsulating the IPv4 packet and sending the decapsulated content to the IPv4 internet after completing
network address translation.
3
In the reverse direction completing reverse-network address translation and then tunnelling them over
IPv6 tunnels to the CPE device.
IPv6 traffic from the CPE device is natively forwarded.
Port Control Protocol
Port Control Protocol (PCP) allows an IPv6 or IPv4 host to control how incoming IPv6 or IPv4 packets are
translated and forwarded by a network address translator.
PCP version 1 as documented in http://tools.ietf.org/html/draft-ietf-pcp-base-19 is supported.
It also allows packets to be received from the Internet to a host and allows a host to reduce keepalive traffic
of connections to a server.
Policy Functions
Application Level Gateway
The Application Level Gateway (ALG) deals with the applications that are embedded in the IP address payload.
Active File Transfer Protocol (FTP), Point-to-Point Tunneling Protocol (PPTP), and Real Time Streaming
Protocol (RTSP) are supported.
FTP-ALG
CGN supports both passive and active FTP. FTP clients are supported with inside (private) address and servers
with outside (public) addresses. Passive FTP is provided by the basic NAT function. Active FTP is used with
the ALG.
RTSP-ALG
CGN supports the Real Time Streaming Protocol (RTSP), an application-level protocol for control over the
delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled,
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
16OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
on-demand delivery of real-time data, such as audio and video. Sources of data can include both live data
feeds and stored clips.
PPTP-ALG
PPTP is a network protocol that enables secure transfer of data from a remote client to a private enterprise
server by creating a Virtual Private Network (VPN). It is used to provide IP security at the network layer.
PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
PPTP-ALG is a CGN solution that allows traffic from all clients through a single PPTP tunnel.
A PPTP tunnel is instantiated on the TCP port. This TCP connection is then used to initiate and manage a
second GRE tunnel to the same peer.
PPTP uses an access controller and network server to establish a connection.
PPTP Access Controller (PAC)
A device attached to one or more PSTN or ISDN lines capable of PPP operation and handling the PPTP
protocol. It terminates the PPTP tunnel and provides VPN connectivity to a remote client.
PPTP Network Server (PNS)
A device which provides the interface between the Point-to-Point Protocol (encapsulated in the PPTP protocol)
and a LAN or WAN. The PNS uses the PPTP protocol to support tunneling between a PPTP PAC and the
PNS. It requests to establish a VPN connectivity using PPTP tunnel.
Control Connection
A control connection is established between a PAC and a PNS for TCP.
Tunnel
A tunnel carries GRE encapsulated PPP datagrams between a PAC and a PNS
TCP Maximum Segment Size Adjustment
Note
Active FTP, PPTP ALG, and RTSP ALG are supported on NAT44 applications. Active FTP and RTSP
ALG are supported on DS-Lite applications.
TCP Maximum Segment Size Adjustment
When a host initiates a TCP session with a server, the host negotiates the IP segment size by using the maximum
segment size (MSS) option. The value of the MSS option is determined by the maximum transmission unit
(MTU) that is configured on the host.
Static Port Forwarding
Static port forwarding helps in associating a private IP address and port with a statically allocated public IP
and port. After you have configured static port forwarding, this association remains intact and does not get
removed due to timeouts until the CGSE is rebooted. In case of redundant CGSE cards, it remains intact until
both of the CGSEs are reloaded together or the router is reloaded. There are remote chances that after a reboot,
this association might change. This feature helps in cases where server applications running on the private
network needs access from public internet.
OL-32659-0117
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
1:1 Redundancy
1:1 Redundancy
CGSE and CGSE Plus support 1:1 redundancy. Two CGSE or CGSE Plus cards can be placed in the
active-standby configuration. The card that comes up first gets into the active mode first. If the first card that
is in the active mode fails, the second card that is in the standby mode becomes active and processes the traffic.
When the failure occurs, the switchover occurs within a second. This redundancy model is in the warm standby
mode as the second card is already booted and preconfigured. Once it becomes active, it only has to re-establish
the sessions.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Note
The 1:1 redundancy feature does not support the mixing of CGSE and CGSE Plus cards. So ensure that
you use either two CGSE cards or two CGSE Plus cards.
You can check the status of the redundancy of the CGSE or CGSE Plus cards by using the show servicesredundancy command.
The failover and failback operations can be forced by using the service redundancy command.
Back-to-Back Deployment
The CGSE and CGSE-PLUS cards can be used in Back-to-Back CRS chasis configuration. In this configuration,
the active card and the standby card are in different chasis, thereby supporting inter-chasis redundancy. The
performance of the cards on different chasis would be the same as it would be if they were co-allocated on
the same chasis.
Note
The two CGSE or CGSE-PLUS cards that are used in redundancy configuration can be in the same chassis
or different chassis.
Intelligent Port Management
Intelligent Port Management is an efficient and flexible way of managing the public ports. This management
process consists of the following features:
Configuration of multiple public address pools
•
Reduction of the minimum size of bulk allocation
•
Configuration of port limit per VRF
•
Configuration of same public pool across different NAT instances
•
Configuration of Multiple Public Address Pools
From this release onwards, you can create multiple pools of address for each inside VRF. This configuration
currently supports 8 address pools that do not overlap with each other.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
18OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
Throughput Measurement
Note
Ensure that you do not add more than 8 address pools as it might result in verification errors, thereby
leading to the rejection of the configuration.
Some of the considerations regarding the configuration of multiple public address pools are as follows:
The outside VRF and outside ServiceApp remain the same for different pools of addresses for a given
•
inside VRF.
Note
If the outside VRF and the outside ServiceApp are changed, then there are chances that
a subscriber packet is routed onto different outside VRFs and different ServiceApps at
various times. Hence if you try to configure different address pools with different outside
VRF and different ServiceApps, the configuration is rejected.
The maximum size of the public address pool is 65536 addresses per CGN instance.
•
The minimum size of the public address pool is 64 addresses.
•
When a particular address pool is deleted, the associated translations are also deleted.
•
Reduction of the Minimum Size of Bulk Allocation
The minimum size of bulk allocation has been reduced to 8. This size can be specified by using the
bulk-port-alloc size command.
Configuration of Port Limit per VRF
For NAT44, you can configure different port limits for different inside-VRF instances. The port limit specified
per VRF overrides the port limit value specified globally. But if the port limit per VRF is not specified, then
the global port limit is applied. This configuration is supported for CGSE as well as CGSE-PLUS.
If the port limit is reduced, CGSE or CGSE-PLUS card will not terminate any translation. But no new
translations are created until the usage by the subscribers for that VRF falls below the port limit.
Configuration of Same Public Address Pool across Different NAT instances
A public address pool can be reused by different instances of NAT. But the address pool can be reused only
by different CGN instances on different service cards. The syslog gives details on the CGN instances and the
address pool that is being reused.
Two or more different instances of CGN can act as active-standby in an N:1 redundancy. In such configurations,
two CGSE cards can be in active mode with different address pools. A third CGSE card can act a common
standby for both of them. In this case, it makes easy if the third CGSE card is allowed to reuse the address
pools used on the other 2 CGSE cards.
Throughput Measurement
The service card, like CGSE, has smaller throughput compared to the other cards in the platform. Therefore
it drops packets at the service application interface if the traffic diverted to it is more than it can handle. Hence
it becomes very important to measure the throughput for a service card. From this release onwards, the
OL-32659-0119
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Implementing Carrier Grade NAT on Cisco IOS XR Software
High Availability on the Data Path Service Virtual Interface (SVI)
throughput of the CGSE card for the last 1 second and the last 5 minutes can be seen by using the show cgn
utilization throughput command.
Considerations
Some of the considerations of the throughput measurement feature are as follows:
The traffic processed by CGSE is measured in terms of bits per second and packets per second for the
•
last 1 second as well as the last 5 minutes.
The throughput measurement is done of rthe traffic coming into CGSE, either from Inside-to-Outside
•
direction or from Outside-to-Inside direction.
High Availability on the Data Path Service Virtual Interface (SVI)
The CGSE already supports high availability tests to detect failures within specific CPU cores (the
service-plim-ha core-to-core test) so that an alert is generated if one or more CPU cores of a CGSE card should
fail. If configured, the CGSE card goes for a reload and traffic is diverted to standby (or other active cards
depending on the configuration) upon detecting any core failures. The CGSE already supports similar test to
confirm the integrity of the packet path by sending test packets via ServiceInfra interface (the service-plim-ha
data-path test). The card can configured to reload upon failure of this test as well.
However, till now, there were no test mechanism to confirm the integrity of path via ServiceApp interfaces
(which bring in and send out subscriber traffic). With this release, a test mechanism has been added for
ServiceApp interfaces configured for 6RD application (for both V4 and V6 ServiceApps). The test can be
enabled via configuration. The test packets are generated from CGSE and made to traverse through the fabric
and come back in to CGSE via ServiceApp interfaces. Should there be a failure in receiving the packets, a
syslog message is generated to alert the administrator. Optionally, the ServiceApp interfaces can be configured
to be shut down upon detecting failure of this test. Shutting down the failed ServiceApp interfaces is useful
in case of active-active configuration where traffic is automatically diverted to other CGSE blades and hence
traffic loss can be prevented without manual intervention.
After the high availability feature is configured, the CGSE can detect the conditions where the data path SVI
(ServiceApp interface) is not able to forward traffic. If such a condition is detected, then the following actions
are taken:
A syslog message is logged by default.
•
The SVI can be shut down. But you need to ensure that the packets are diverted to the SVIs of the other
•
available CGSEs.
Considerations
Some of the considerations regarding the high availability on the data path SVIs are as follows:
In the current release, the high availability configuration is supported only for V4 and V6 ServiceApps
•
of 6rd application.
In case of a failure, the syslog message is generated irrespective of the shutdown of the SVI instance.
•
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
20OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
External Logging
External logging configures the export and logging of the NAT table entries, private bindings that are associated
with a particular global IP port address, and to use Netflow to export the NAT table entries.
Netflow v9 Support
The NAT44 and DS Lite features support Netflow for logging of the translation records. Logging of the
translation records can be mandated by for Lawful Intercept. The Netflow uses binary format and hence
requires software to parse and present the translation records.
Syslog Support
The NAT44, Stateful NAT64, and DS Lite features support Netflow for logging of the translation records.
Logging of the translation records can be mandated by for Lawful Intercept. The Netflow uses binary format
and hence requires software to parse and present the translation records.
In Cisco IOS XR Software Release 4.2.1 and later, the DS Lite and NAT44 features support Syslog as an
alternative to Netflow. Syslog uses ASCII format and hence can be read by users. However, the log data
volume is higher in Syslog than Netflow.
External Logging
Bulk Port Allocation
The creation and deletion of NAT sessions need to be logged and these create huge amount of data. These
are stored on Syslog collector which is supported over UDP. In order to reduce the volume of data generated
by the NAT device, bulk port allocation can be enabled. When bulk port allocation is enabled and when a
subscriber creates the first session, a number of contiguous outside ports are pre-allocated. A bulk allocation
message is logged indicating this allocation. Subsequent session creations will use one of the pre-allocated
port and hence does not require logging.
Session-logging and bulk port allocation are mutually exclusive.Note
Destination-Based Logging
Destination-Based Logging (DBL) includes destination IPv4 address and port number in the Netflow create
and delete records used by NAT44, Stateful NAT64, and DS-Lite applications. It is also known as
Session-Logging.
Session-Logging and Bulk Port Allocation are mutually exclusive.Note
OL-32659-0121
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Implementing Carrier Grade NAT on Cisco IOS XR Software
Implementing Carrier Grade NAT on Cisco IOS XR Software
Implementing Carrier Grade NAT on Cisco IOS XR Software
This chapter provides an overview of the implementation of Carrier Grade NAT on Cisco IOS XR Software.
Getting Started with the Carrier Grade NAT
Perform these tasks to get started with the CGN configuration tasks.
Configuring the Service Role
Perform this task to configure the service role on the specified location to start the CGN service.
Note
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
RP/0/RP0/CPU0:router# configure
Step 2
Example:
RP/0/RP0/CPU0:router(config)#
hw-module service cgn location
0/1/CPU0
Step 3
Removal of service role is strictly not recommended while the card is active. This puts the card into
FAILED state, which is service impacting.
configure
1.
hw-module service cgn location node-id
2.
end or commit
3.
PurposeCommand or Action
Enters global configuration mode.configure
Configures a CGN service role on location 0/1/CPU0.hw-module service cgn location node-id
Saves configuration changes.end or commit
Example:
RP/0/RP0/CPU0:router(config)# end
or
RP/0/RP0/CPU0:router(config)# commit
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
22OL-32659-01
When you issue the end command, the system prompts you to commit
•
changes:
Uncommitted changes found, commit them before exiting
(yes/no/cancel)?
[cancel]:
Implementing Carrier Grade NAT on Cisco IOS XR Software
Getting Started with the Carrier Grade NAT
PurposeCommand or Action
Entering yes saves configuration changes to the running
◦
configuration file, exits the configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session and returns the router
◦
to EXEC mode without committing the configuration changes.
Entering cancel leaves the router in the current configuration
◦
session without exiting or committing the configuration changes.
Use the commit command to save the configuration changes to the
•
running configuration file and remain within the configuration session.
Configuring the Service Instance and Location for the Carrier Grade NAT
Perform this task to configure the service instance and location for the CGN application.
RP/0/RP0/CPU0:router(config-cgn)# end
or
RP/0/RP0/CPU0:router(config-cgn)# commit
Implementing Carrier Grade NAT on Cisco IOS XR Software
PurposeCommand or Action
Saves configuration changes.end or commit
When you issue the end command, the system prompts you to
•
commit changes:
Uncommitted changes found, commit them before exiting
(yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to the running
◦
configuration file, exits the configuration session, and returns
the router to EXEC mode.
Configuring the Service Virtual Interfaces
Configuring the Infrastructure Service Virtual Interface
Perform this task to configure the infrastructure service virtual interface (SVI) to forward the control traffic.
The subnet mask length must be at least 30 (denoted as /30). CGSE uses SVI and it is therefore recommended
that access control list (ACL) be configured to protect it from any form of denial of service attacks. For a
sample ACL configuration, see Configuring ACL for a Infrastructure Service Virtual Interface: Example,
page 80.
Entering no exits the configuration session and returns the
◦
router to EXEC mode without committing the configuration
changes.
Entering cancel leaves the router in the current configuration
◦
session without exiting or committing the configuration
changes.
Use the commit command to save the configuration changes to
•
the running configuration file and remain within the configuration
session.
Note
Do not remove or modify service infra interface configuration when the card is in Active state. The
configuration is service affecting and the line card must be reloaded for the changes to take effect.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
24OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
RP/0/RP0/CPU0:router(config-cgn)# end
or
RP/0/RP0/CPU0:router(config-cgn)# commit
Enters global configuration mode.configure
Configures the instance named cgn1 for the CGN application and enters
CGN configuration mode.
Configures the service type keyword definition for NAT44 application.service-type nat44 nat1
Configures the FTP ALG on the NAT44 instance.alg activeFTP
Saves configuration changes.end or commit
When you issue the end command, the system prompts you to
•
commit changes:
Uncommitted changes found, commit them before exiting
(yes/no/cancel)?
OL-32659-0137
[cancel]:
Entering yes saves configuration changes to the running
◦
configuration file, exits the configuration session, and returns
the router to EXEC mode.
Entering no exits the configuration session and returns the
◦
router to EXEC mode without committing the configuration
changes.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring the Policy Functions for the Carrier Grade NAT
PurposeCommand or Action
Use the commit command to save the configuration changes to
•
the running configuration file and remain within the configuration
session.
Configuring the RTSP ALG for NAT44 Instance
Perform this task to configure the ALG for the rtsp for the specified NAT44 instance. RTSP packets are
usually destined to port 554. But this is not always true because RTSP port value is configurable.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Entering cancel leaves the router in the current configuration
◦
session without exiting or committing the configuration
changes.
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
RP/0/RP0/CPU0:router# configure
Step 2
service cgn instance-name
Example:
RP/0/RP0/CPU0:router(config)# service
cgn cgn1
RP/0/RP0/CPU0:router(config-cgn)#
Step 3
configure
1.
service cgn instance-name
2.
service-type nat44 nat1
3.
alg rtsp [server-port] value
4.
end or commit
5.
PurposeCommand or Action
Enters global configuration mode.configure
Configures the instance named cgn1 for the CGN application and enters
CGN configuration mode.
Configures the service type keyword definition for NAT44application.service-type nat44 nat1
RP/0/RP0/CPU0:router(config-cgn)# end
or
RP/0/RP0/CPU0:router(config-cgn)# commit
Enters global configuration mode.configure
Configures the instance named cgn1 for the CGN application and enters
CGN configuration mode.
Configures the service type keyword definition for NAT44 or DS-Lite
application.
Configures the pptp ALG on the CGN instance.alg pptpAlg
Saves configuration changes.end or commit
When you issue the end command, the system prompts you to
•
commit changes:
Uncommitted changes found, commit them before exiting
(yes/no/cancel)?
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
40OL-32659-01
[cancel]:
Entering yes saves configuration changes to the running
◦
configuration file, exits the configuration session, and returns
the router to EXEC mode.
Entering no exits the configuration session and returns the
◦
router to EXEC mode without committing the configuration
changes.
Entering cancel leaves the router in the current configuration
◦
session without exiting or committing the configuration
changes.
Use the commit command to save the configuration changes to
•
the running configuration file and remain within the configuration
session.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Configuring the Policy Functions for the Carrier Grade NAT
Configuring the TCP Adjustment Value for the Maximum Segment Size
Perform this task to configure the adjustment value for the maximum segment size (MSS) for the VRF. You
can configure the TCP MSS adjustment value on each VRF.
SUMMARY STEPS
configure
1.
service cgn instance-name
2.
service-type nat44 nat1
3.
inside-vrf vrf-name
4.
protocol tcp
5.
mss size
6.
end or commit
7.
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
Example:
RP/0/RP0/CPU0:router# configure
service cgn instance-name
Example:
RP/0/RP0/CPU0:router(config)# service cgn cgn1
RP/0/RP0/CPU0:router(config-cgn)#
or
RP/0/RP0/CPU0:router(config-cgn-ivrf-sport-inside)#
commit
Configures the TCP protocol session and enters CGN inside
VRF AFI protocol configuration mode.
Configures the CGN static port forwarding entries on
reserved or nonreserved ports and enters CGN inside static
port inside configuration mode.
Configures the CGN static port forwarding entries for the
inside VRF.
Saves configuration changes.end or commit
When you issue the end command, the system
•
prompts you to commit changes:
Uncommitted changes found, commit them before
exiting (yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to the
◦
running configuration file, exits the
configuration session, and returns the router to
EXEC mode.
Entering no exits the configuration session and
◦
returns the router to EXEC mode without
committing the configuration changes.
Entering cancel leaves the router in the current
◦
configuration session without exiting or
committing the configuration changes.
Use the commit command to save the configuration
•
changes to the running configuration file and remain
within the configuration session.
OL-32659-0145
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring the Policy Functions for the Carrier Grade NAT
Configuring the Dynamic Port Ranges for NAT44
Perform this task to configure dynamic port ranges for TCP, UDP, and ICMP ports. The default value range
of 0 to 1023 is preserved and not used for dynamic translations. Therefore, if the value of dynamic port rangestart is not configured explicitly, the dynamic port range value starts at 1024.
SUMMARY STEPS
configure
1.
service cgn instance-name
2.
service-type nat44 nat1
3.
dynamic port range start value
4.
end or commit
5.
6.
DETAILED STEPS
Implementing Carrier Grade NAT on Cisco IOS XR Software
Step 1
Step 2
Step 3
Step 4
Step 5
Example:
RP/0/RP0/CPU0:router# configure
service cgn instance-name
Example:
RP/0/RP0/CPU0:router(config)# service cgn cgn1
RP/0/RP0/CPU0:router(config-cgn)#
Configures the instance named cgn1 for the CGN application and enters
CGN configuration mode.
Configures the service type keyword definition for CGN NAT44
application.
Limits the number of entries per address for each subscriber of the
system
Configures an inside VRF named insidevrf1 and enters CGN inside
VRF configuration mode.
Sets the port limit per VRF. The port limit value per VRF (300)
overrides the port limit value specified globally (100) . The port limit
value per VRF (300) is applied to all the subscribers in the insidevrf1.
Saves configuration changes.end or commit
Example:
RP/0/RP0/CPU0:router(config-cgn)# end
or
RP/0/RP0/CPU0:router(config-cgn)# commit
OL-32659-0151
When you issue the end command, the system prompts you to
•
commit changes:
Uncommitted changes found, commit them before exiting
(yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to the running
◦
configuration file, exits the configuration session, and
returns the router to EXEC mode.
Entering no exits the configuration session and returns the
◦
router to EXEC mode without committing the configuration
changes.
Entering cancel leaves the router in the current configuration
◦
session without exiting or committing the configuration
changes.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring the Policy Functions for the Carrier Grade NAT
PurposeCommand or Action
Use the commit command to save the configuration changes to
•
the running configuration file and remain within the configuration
session.
Configuring Same Address Pool for Different NAT Instances
Perform the following steps to configure same address pool for different NAT instances. Note that in the
following sample configuration, there are 2 NAT instances, cgn1 and cgn2.
SUMMARY STEPS
configure
1.
service cgn cgn1
2.
service-type nat44nat1
3.
inside-vrf insidevrf1
4.
map address-pool address/prefix
5.
end or commit
6.
configure
7.
service cgn cgn2
8.
service-type nat44 nat2
9.
inside-vrf insidevrf2
10.
map address-pool address/prefix
11.
end or commit
12.
Implementing Carrier Grade NAT on Cisco IOS XR Software
DETAILED STEPS
Step 1
Example:
RP/0/RP0/CPU0:router# configure
Step 2
52OL-32659-01
service cgn cgn1
Example:
RP/0/RP0/CPU0:router(config)# service cgn
cgn1
RP/0/RP0/CPU0:router(config-cgn)#
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
PurposeCommand or Action
Enters global configuration mode.configure
Configures the instance named cgn1 for the CGN application and
enters CGN configuration mode.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Configuring the Policy Functions for the Carrier Grade NAT
RP/0/RP0/CPU0:router(config-cgn)# end
or
RP/0/RP0/CPU0:router(config-cgn)# commit
Configures another NAT instance cgn2 for the CGN application
and enters CGN configuration mode. The NAT instance, cgn2, can
access the same address pool created in the first NAT instance, cgn1.
Hence you do not have to specify a different address pool here.
Configures the service type for CGN NAT44 application.service-type nat44 nat2
Configures an inside VRF named insidevrf2 and enters CGN inside
VRF configuration mode.
Configures an inside VRF to an outside VRF and address pool
mapping.
Saves configuration changes.end or commit
When you issue the end command, the system prompts you
•
to commit changes:
Uncommitted changes found, commit them before exiting
(yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to the running
◦
configuration file, exits the configuration session, and
returns the router to EXEC mode.
Entering no exits the configuration session and returns
◦
the router to EXEC mode without committing the
configuration changes.
Entering cancel leaves the router in the current
◦
configuration session without exiting or committing the
configuration changes.
Use the commit command to save the configuration changes
•
to the running configuration file and remain within the
configuration session.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
54OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
Configuring the Policy Functions for the Carrier Grade NAT
Configuring High Availability of Data Path Service Virtual Interface (SVI)
RP/0/RP0/CPU0:router(config-cgn-invrf-af-extlog)# server
RP/0/RP0/CPU0:router(config-cgn-invrf-af-extlog-server)#
Enters global configuration mode.configure
Configures the instance named cgn1 for the CGN
application and enters CGN configuration mode.
Configures the service type keyword definition for
NAT44 application.
Configures the inside VRF for the CGN instance
named cgn1 and enters CGN inside VRF configuration
mode.
Configures the external-logging facility for the CGN
instance named cgn1 and enters CGN inside VRF
address family external logging configuration mode.
Configures the logging server information for the IPv4
address and port for the server that is used for the
netflowv9-based external-logging facility and enters
CGN inside VRF address family external logging
server configuration mode.
RP/0/RP0/CPU0:router(config-cgn-invrf-af-extlog)# server
RP/0/RP0/CPU0:router(config-cgn-invrf-af-extlog-server)#
Configures the instance named cgn1 for the CGN
application and enters CGN configuration mode.
Configures the service type keyword definition for
NAT44 application.
Configures the inside VRF for the CGN instance
named cgn1 and enters CGN inside VRF configuration
mode.
Configures the external-logging facility for the CGN
instance named cgn1 and enters CGN inside VRF
address family external logging configuration mode.
Configures the logging server information for the IPv4
address and port for the server that is used for the
netflowv9-based external-logging facility and enters
CGN inside VRF address family external logging
server configuration mode.
Configures the service type keyword definition for
NAT44 application.
Configures the inside VRF for the CGN instance
named cgn1 and enters CGN inside VRF configuration
mode.
Configures the external-logging facility for the CGN
instance named cgn1 and enters CGN inside VRF
address family external logging configuration mode.
Configures the logging server information for the IPv4
address and port for the server that is used for the
netflowv9-based external-logging facility and enters
CGN inside VRF address family external logging
server configuration mode.
Configures the refresh rate value of 50 to log
Netflow-based external logging information for an
inside VRF.
end
or
RP/0/RP0/CPU0:router(config-cgn-invrf-af-extlog-server)#
commit
When you issue the end command, the system
•
prompts you to commit changes:
Uncommitted changes found, commit them before
exiting (yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes
◦
to the running configuration file, exits the
configuration session, and returns the router
to EXEC mode.
Entering no exits the configuration session
◦
and returns the router to EXEC mode
without committing the configuration
changes.
Entering cancel leaves the router in the
◦
current configuration session without
exiting or committing the configuration
changes.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
62OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
Configuring Session-Logging for a NAT44 or DS-Lite Instance
Perform this task to enable session-logging if destination IP and Port information needs to logged in the
Netflow records for each NAT44 or DS-Lite instance.
SUMMARY STEPS
configure
1.
service cgn instance-name
2.
service-type nat44 nat1 or service-type ds-lite ds-lite1
3.
inside-vrf vrf-name
4.
external-logging netflowv9 or external-loging netflow9
5.
server
6.
session-logging
7.
end or commit
8.
Configuring the Policy Functions for the Carrier Grade NAT
PurposeCommand or Action
Use the commit command to save the
•
configuration changes to the running
configuration file and remain within the
configuration session.
DETAILED STEPS
Step 1
Example:
RP/0/RP0/CPU0:router# configure
Step 2
Step 3
service cgn instance-name
Example:
RP/0/RP0/CPU0:router(config)# service cgn cgn1
RP/0/RP0/CPU0:router(config-cgn)#
service-type nat44 nat1 or service-type ds-lite ds-lite1
Example:
RP/0/RP0/CPU0:router(config-cgn)# service-type nat44 nat1
or
RP/0/RP0/CPU0:router(config-cgn)# service-type ds-lite
ds-lite1
PurposeCommand or Action
Enters global configuration mode.configure
Configures the instance named cgn1 for the CGN
application and enters CGN configuration mode.
Configures the service type keyword definition for
NAT44 or DS-Lite application.
OL-32659-0163
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring the Policy Functions for the Carrier Grade NAT
Implementing Carrier Grade NAT on Cisco IOS XR Software
session-logging
or
RP/0/RP0/CPU0:router(config-cgn-ds-lite-extlog-server)#
session-logging
Configures the inside VRF for the CGN instance
named cgn1 and enters CGN inside VRF configuration
mode.
Configures the external-logging facility for the NAT44
or DS-Lite instance.
Configures the logging server information for the IPv4
address and port for the server that is used for the
netflow-v9 based external-logging facility.
Configures the session logging for a NAT44 or
DS-Lite instance.
end
or
RP/0/RP0/CPU0:router(config-cgn-invrf-af-extlog-server)#
commit
Configures the inside VRF for the CGN instance
named cgn1 and enters CGN inside VRF configuration
mode.
Configures the external-logging facility for the CGN
instance named cgn1 and enters CGN inside VRF
address family external logging configuration mode.
Configures the logging server information for the IPv4
address and port for the server that is used for the
netflowv9-based external-logging facility and enters
CGN inside VRF address family external logging
server configuration mode.
Configures the timeout value of 50 for Netflow logging
of NAT table entries for an inside VRF.
Saves configuration changes.end or commit
When you issue the end command, the system
•
prompts you to commit changes:
Uncommitted changes found, commit them before
exiting (yes/no/cancel)?
[cancel]:
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
66OL-32659-01
Entering yes saves configuration changes
◦
to the running configuration file, exits the
configuration session, and returns the router
to EXEC mode.
Entering no exits the configuration session
◦
and returns the router to EXEC mode
without committing the configuration
changes.
Entering cancel leaves the router in the
◦
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
•
configuration changes to the running
configuration file and remain within the
configuration session.
Implementing Carrier Grade NAT on Cisco IOS XR Software
Configuring the Carrier Grade Service Engine
Hardware:
CGSE hardware in chassis
•
Latest uboot and mans images in CGSE
•
Software:
Load hfr-mini-px.vm and activate it
•
Load hfr-services-px.pie and activate it
•
Configuring the Carrier Grade Service Engine
PurposeCommand or Action
Load hfr-fpd-px.pie and activate it
•
Before You Begin
These are the prerequisite components for configuring the carrier grade service engine.
Bringing Up the CGSE Board
After installing the cgn service pie (the pie installation is similar to any other CRS pie), ensure that the
•
uboot version (fpga2, fpga3, fpga4, fpga5) is 0.559 & MANS FPGA version is 0.41014 as depicted
below.
Existing Field Programmable Devices
==========================================
HWCurrent SW Upg/
lcfpga300.559No
lcfpga400.559No
lcfpga500.559No
lcfpga100.41014 No
lcrommonA 01.52No
lcrommon 01.52Yes
Latest uboot version is 559 & MANS is 0.41Note
OL-32659-0167
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring the Carrier Grade Service Engine
Implementing Carrier Grade NAT on Cisco IOS XR Software
Note
If one or more FPD needs an upgrade, then this can be accomplished using the following
steps. Make sure that the fpd pie is loaded and activated. If found different, follow the
upgrade procedure in Line Card Upgrade.
After insertion, the card remains in "IOS XR RUN" state until you install the appropriate cgn service
•
pie.
After installing the cgn service pie, the card goes to "FAILED" state until you complete the configuration
•
mentioned in next step. These log messages appear on the console.
Control connection to CGSE, One ServiceInfra Interface per CGSE & IPv4 address of local significance.
•
Minimum of two valid IPv4 unicast addresses are required for each ServiceInfra SVI. The Serviceinfra
interface removal/modification needs CGSE LC reload.
Unicast address specifies a unique IPv6 address for a particular CGSE. This is used as
a source IPv6 address while replying to IPv6 ICMP queries destined for BR IPv6 anycast
address.
The Unicast address also provides the source IPv6 address during IPv4 ICMP translation
to IPv6 ICMP.
2
You can configure routes to the CGSE using these steps.
To divert the traffic towards CGSE which is destined for BR
•
router(config)#
router static
address-family ipv4 unicast
100.1.1.1/32 1.1.1.2 (Serviceapp4 NextHop)
Packets destined to 6rd prefix are routed to CGSE
•
Router#show route ipv6
S2001:b000::/28 is directly connected,00:13:44, ServiceApp6
S2001:b006:4010:1010::/60 is directly connected,00:19:24, Null0
S2001:b006:4010:1010::/128 is directly connected,00:13:44, ServiceApp6
S2001:b006:4010:1010::1/128 is directly connected,00:13:44, ServiceApp6
C5000::/64 is directly connected,00:13:44, ServiceApp6
L5000::1/128 is directly connected,00:13:44, ServiceApp6
C2001:db8::/64 is directly connected,01:23:55, GigE0/1/1/4
L2001:db8::2/128 is directly connected,01:23:55, GigE0/1/1/4
3
This step shows the output of show cgn tunnel v6rd 6rd1 statistics command.
non Protocol 41)
Decapsulated packets : 0
ICMP translation count : 0 (ICMPv4 TO ICMPv6 translated count)
Insufficient IPv4 payload drop count : 0 (Payload should carry IPv6 header)
Security check failure drops : 0
No DB entry drop count : 0 (6rd config is incomplete/missing)
Unsupported protocol drop count : 0 (IPv4 protocol type is not 41 (IPv6))
Invalid IPv6 source prefix drop count : 0 (IPv6 Source from RG doesn’t have 6rd
prefix)
IPv6 to IPv4
=============
Incoming packet count : 0
Encapsulated packets count : 0
No DB drop count : 0 (6rd config is not complete/missing)
Unsupported protocol drop count : 0 (Non ICMP pkts destined to IPv6 BR
72 bytes)
Unsupported icmp type drop count : 0 (As per
http://tools.ieft.org/html/draft-ieft-behave-v6v4-xlate-22 )
IPv6 ICMP
==========
Incoming packets count: 0
Reply packets count: 0
Packet Too Big generated packets count: 0
Packet Too Big not generated packets count: 0
NA generated packets count: 0
TTL expiry generated packets count: 0
Unsupported icmp type drop count: 0 (As per
http://tools.ieft.org/html/draft-ieft-behave-v6v4-xlate-22)
Throttled packet count: 0 (ICMP throttling in CSGE 64
pkts/core)
IPv4 to IPv6 Fragments
=======================
Incoming fragments count: 0 (No. of IPv4 Fragments Came in)
Reassembled packet count: 0 (No. of Pkts Reassembled from
Fragments )
Reassembled fragments count: 0 (No. of Fragments Reassembled)
ICMP incoming fragments count: 0 (No. of ICMP Fragments Came in)
Total fragment drop count: 0
Fragments dropped due to timeout: 0 (Fragment dropped due to
reassembly timeout)
Reassembly throttled drop count: 0 (Fragments throttled)
Duplicate fragments drop count: 0
Reassembly disabled drop count: 0 (Number of fragments dropped
while re-assembly is disabled.)
No DB entry fragments drop count: 0 (6rd Config is incomplete
/missing)
Fragments dropped due to security check failure : 0
Insufficient IPv4 payload fragment drop count: 0 (1st Fragment should have IPv6
header)
Unsupported protocol fragment drops: 0 (IPv4 protocol type is not 41
(IPv6) & non ICMP)
Invalid IPv6 prefix fragment drop count: 0 (IPv6 Source from RG doesn’t have
6rd prefix)
=====================================================================
IPv6 to IPv4 Fragments
=======================
Implementing Carrier Grade NAT on Cisco IOS XR Software
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
74OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
etc/init.d/service_wan_ipv6 # ping 2001:B006:4010:1010::
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:B006:4010:1010::, timeout is 2 seconds:
PING 2001:B006:4010:1010::(2001:B006:4010:1010::)56 data bytes
64 bytes from 2001:B006:4010:1010::1 : seq=1 ttl=62 time=1.122 ms
64 bytes from 2001:B006:4010:1010::1 : seq=2 ttl=62 time=0.914 ms
IPv4 Prefix Length : This common prefix can be provisioned on the router and therefore need
◦
not be carried in the IPv6 destination to identify a tunnel endpoint.
IPv4 Suffix Length : All the 6RD CEs and the BR can agree on a common tail portion of the V4
◦
address to identify a tunnel endpoint.
All the BR parameters have to be given in Single Commit.Note
p
•
6rd Tunnel TTL and TOS
•
By default the IPv6 Traffic class and Hoplimit field will be copied to the IPv4 TTL and TOS fields
◦
respectively. This default behavior MAY be overridden by above configuration.
tos value is in decimal
◦
service cgn demo
service-type tunnel v6rd 6rd1
tos 160
ttl 100
commit
OL-32659-0175
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring IPv6 Rapid Development
Setting 6rd Tunnel Path MTU
•
By default the 6rd Tunnel MTU value is 1280.
◦
service cgn demo
Enabling reassembly of Fragmented Tunnel Packets.
•
Fragmented Tunneled IPv4 packets are reassembled by BR before decapsulation.
•
service cgn demo
service-type tunnel v6rd 6rd1
reassembly-enable
commit
RP/0/RP0/CPU0:BR1#show cgn tunnel v6rd 6rd1 statistics
Incoming fragments count: 2
Reassembled packet count: 1
Reassembled fragments count: 2
ICMP incoming fragments count: 0
Total fragment drop count: 0
Fragments dropped due to timeout: 0
Duplicate fragments drop count: 0
No DB entry fragments drop count: 0
Fragments dropped due to security check failure : 0
Insufficient IPv4 payload fragment drop count: 0
Unsupported protocol fragment drops: 0
Invalid IPv6 prefix fragment drop count: 0
Incoming ICMP fragment count: 0
Implementing Carrier Grade NAT on Cisco IOS XR Software
service-type tunnel v6rd 6rd1
path-mtu 1480
commit
ICMP Throttling
•
By default CGSE throttles 1 per core ( we have 64 cores in CGSE)
Configures the instance named cgn1 for the CGN
application and enters CGN configuration mode.
Specifies the global command applied per cgn
instance. It initiates the particular instance of the cgn
application on the active and standby locations.
Configures the service type keyword definition for
the DS LITE application.
Configures the service type keyword definition for
the DS LITE application.
Enables bulk port allocation and sets bulk size that is
used to reduce logging data volume.
Specifies the address pool for the DS LITE instance.map address-pool address
Note
52.52.52.0/24 is the IPv4 public address pool
assigned to the DS Lite instance.
Specifies the IPv6 address of the tunnel end point.
The IPv4 elements must address their IPV6 packets
to this address.
Enters the address family IPv4 configuration mode.address-family ipv4
Enters the address family IPv6 configuration mode.address-family ipv6
Specifies the ServiceApp on which IPv6 traffic enters
and leaves.
Configures the TCP protocol session.protocol tcp
This command configures the timeout value in
seconds for ICMP,TCP or UDP sessions for a service
instance. For TCP and UDP, you can configure the
initial and active session timeout values. For ICMP,
there are no such options. This configuration is
applicable to all the IPv4 addresses that belong to a
particular service instance. This example configures
the initial session timeout value as 90 for the TCP
session.
Configures the external-logging facility for the DS
LITE instance named dsl1 and enters the external
logging configuration mode.
Configures the logging server information for the IPv4
address and port for the server that is used for the
netflow-v9 based external-logging facility and enters
external logging server configuration mode.
Configures the netflow server address and port number
to use for netflow version 9 based external logging
facility for DS LITE instance.
OL-32659-0179
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
Configuring Dual Stack Lite Instance
Implementing Carrier Grade NAT on Cisco IOS XR Software
end
or
RP/0/RP0/CPU0:router(config-cgn-ds-lite-extlog-server)#
commit
Configures the external-logging facility for the DS
LITE translation entries that can be logged in syslog
servers to analyze and debug the information.
Configures the logging server information for the IPv4
address and port for the server that is used for the
syslog based external-logging facility.
Configures the syslog server address and port number
to use for syslog based external logging facility for
DS LITE instance.
Saves configuration changes.end or commit
When you issue the end command, the system
•
prompts you to commit changes:
Uncommitted changes found, commit them
before exiting (yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes
◦
to the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration
◦
session and returns the router to EXEC
mode without committing the
configuration changes.
Entering cancel leaves the router in the
◦
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
•
configuration changes to the running
configuration file and remain within the
configuration session.
Cisco IOS XR Carrier Grade NAT Configuration Guide for the Cisco CRS Router, Release 5.2.x
80OL-32659-01
Implementing Carrier Grade NAT on Cisco IOS XR Software
Configuring PCP Server for NAT44 Instance
Perform this task to configure PCP server for a NAT44 instance:
SUMMARY STEPS
configure
1.
service cgn instance-name
2.
service-type nat44 nat1
3.
inside-vrf vrf-name
4.
pcp-server
5.
address ipv4-address
6.
port port-number
7.
end or commit
8.
Configuring PCP Server for NAT44 Instance
DETAILED STEPS
Step 1
Example:
RP/0/RP0/CPU0:router# configure
Step 2
Step 3
Step 4
service cgn instance-name
Example:
RP/0/RP0/CPU0:router(config)# service cgn cgn1
RP/0/RP0/CPU0:router(config-cgn)#
Use the show controllers services boot-params command to verify the IP addresses of SVI and
the CGSE PLIM.
RP/0/RP0/CPU0:router# show controllers services boot-params location 0/1/CPU0