On Mon, Feb 3, 2025 at 12:15 PM Amos Rosenboim via NANOG <nanog@nanog.org>
wrote:

> Roland,
>
> Thanks for your comments.
>
> As much as I love to be a network purist who hates state maintenance in
> the core of the network, the sad reality is that these devices are there
> and will remain there for the foreseeable future.
>
> Mobile operators need IPv4 address sharing and many of them choose to do
> it with CGNAT.
>
> Even with IPv6, many of the operators I know of do not allow internet
> initiated traffic towards their subscribers.
> Some of their reasons are even surprisingly valid, such as avoiding
> unnecessary paging in the network.
>
> Regardless of this, my original message as looking to get some deployment
> feedback on NPTv6 in service provider networks.
> Any such feedback is appreciated.
>


I do not think any service providers have deployed NPTv6 at any scale.

That’s my feedback. You are building something quite bespoke , not best
practice, and should anticipate novel problems.



> Cheers,
>
> Amos
> Sent from my iPhone
>
> On 3 Feb 2025, at 14:41, Dobbins, Roland <roland.dobb...@netscout.com>
> wrote:
>
>  *External sender - pay attention*
>
> On Feb 3, 2025, at 17:03, Amos Rosenboim via NANOG <nanog@nanog.org>
> wrote:
>
> The requirement for state full traffic flow is given by the customer.
>
>
> Organizations sometimes state that they’ve requirements in specializesd
> contexts which are in fact counterproductive; in such cases, they can often
> benefit from education in order to make contextually optimal decisions.
>
> The logic behind it is to avoid unnecessary paging procedures for idle
> mobile devices.
>
>
> ‘Paging procedures’?
>
> It protects both signaling resources of the network and also battery life
> of devices.
>
>
> There are other ways to accomplish this.
>
> This was very relevant in the early 2000s, not sure if it’s relevant for
> today.
>
>
> It was a huge mistake in the late 1990s and early 2000s, as the early GPRS
> and EDGE wireless broadband networks which were implemented in the same
> fashion as poorly-designed, state-ridden enterprise networks constantly
> experienced severe operational problems until they were remediated, one way
> or another.
>
> However it remains a customer requirement.
>
>
> See above.
>
> As for clients recovery from flow interruption - from incidents we had in
> the last few years and observing how fast connection ramp up on the
> alternate devices it seems that clients are recovering very quickly.
>
>
> Introducing stateful firewalls in front of a population of Internet
> broadband clients is a Very Bad Idea.  DDoS attacks are attacks agains
> capacity and/or state; and outbound/crossbound attacks can be just as
> disruptive as inbound attacks.
>
> This precise scenario has played out many times, over the years.  Networks
> which were suboptimally designed in this fashion were either completely
> re-designed in order to be scalable and resilient, removing unnecessary and
> harmful state; were acquired and their brittle, fragile, non-scalable
> state-ridden infrastructure was decommissioned; or went out of business.
>
> The few holdouts in the present day inevitably experience the problems
> described above, and then proceed through the same evolution as other
> network operators with similar architectures.
>
> My main concern is that this customer has pretty traditional mind set and
> never like being the first deployment of any technology.
>
>
> NAT64/DNS64 with 464XLAT  or something along these lines isn’t new
> technology; on the contrary, it’s quite mature, and deployed around the
> world.   It isn’t stateless, but it’s much more scalable than sticking
> stateful firewalls everywhere, heh.
>
> Designing and implementing a broadband access network with this sort of
> architecture isn’t going to end well.  It isn’t beyond the realm of
> possibility that these ‘requirements’ are largely driven by a supplier of
> stateful firewalls, or an internal advocate for same.
>
>
> If you have received this e-mail in error, please notify the system
> manager. This message contains confidential information and is intended
> only for the individual named. If you are not the named addressee you
> should not disseminate, distribute or copy this e-mail. Please notify the
> sender immediately by e-mail if you have received this e-mail by mistake
> and delete this e-mail from your system. If you are not the intended
> recipient you are notified that disclosing, copying, distributing or taking
> any action in reliance on the content of this information is strictly
> prohibited.
>

Reply via email to