I feel like you are conflating two things, stateful firewalls and NPTv6
or any form of NAT, they are often done at the same box together, but
they are not inherently linked.
I dislike NAT in an IPv6 environment as I've generally not found a use
for it not better served by something else, but also IPv6 things are not
used to NAT being used, I'd expect much more breakage given that most
IPv6 stacks are likely not well tested in the presence of NAT. IPv4
things have learned how to accept ans handle NAT and some of that I'm
sure carries over to IPv6, but in IPv6 it's very much an edge case,
where it's the norm in IPv4.
I do understand the desire for a stateful firewall in the IPv6 context
and see them deployed at home/business/enterprise network edge pretty
much for every IPv6 enabled network, often with a carve-out for icmp,
but otherwise blocking all inbound traffic not matching an existing
connection initiated by the device behind the firewall. You may have
some reason you can't just employ a stateful firewall without NAT, but
if so you haven't said so and seem to have linked them as if they were
inseparable, a stateful firewall will block internet initiated traffic,
which seems to be the main goal you have, and it will not have the
negative side effects of NAT, though you do have the need to force
symmetrical routing at the point of the firewall and carry state (though
as long as routing symmetry is maintained a user's traffic can freely
use multiple firewalls for different traffic, say one for traffic headed
towards a content provider cache box and a different one for traffic
heading onto the general public internet, which may help with some
scaling considerations)
On 2/3/2025 3:14 PM, Amos Rosenboim via NANOG wrote:
Roland,
Thanks for your comments.
As much as I love to be a network purist who hates state maintenance in
the core of the network, the sad reality is that these devices are there
and will remain there for the foreseeable future.
Mobile operators need IPv4 address sharing and many of them choose to do
it with CGNAT.
Even with IPv6, many of the operators I know of do not allow internet
initiated traffic towards their subscribers.
Some of their reasons are even surprisingly valid, such as avoiding
unnecessary paging in the network.
Regardless of this, my original message as looking to get some
deployment feedback on NPTv6 in service provider networks.
Any such feedback is appreciated.
Cheers,
Amos
Sent from my iPhone
On 3 Feb 2025, at 14:41, Dobbins, Roland <roland.dobb...@netscout.com>
wrote:
*External sender - pay attention*
On Feb 3, 2025, at 17:03, Amos Rosenboim via NANOG <nanog@nanog.org>
wrote:
The requirement for state full traffic flow is given by the customer.
Organizations sometimes state that they’ve requirements in
specializesd contexts which are in fact counterproductive; in such
cases, they can often benefit from education in order to make
contextually optimal decisions.
The logic behind it is to avoid unnecessary paging procedures for
idle mobile devices.
‘Paging procedures’?
It protects both signaling resources of the network and also battery
life of devices.
There are other ways to accomplish this.
This was very relevant in the early 2000s, not sure if it’s relevant
for today.
It was a huge mistake in the late 1990s and early 2000s, as the early
GPRS and EDGE wireless broadband networks which were implemented in
the same fashion as poorly-designed, state-ridden enterprise networks
constantly experienced severe operational problems until they were
remediated, one way or another.
However it remains a customer requirement.
See above.
As for clients recovery from flow interruption - from incidents we
had in the last few years and observing how fast connection ramp up
on the alternate devices it seems that clients are recovering very
quickly.
Introducing stateful firewalls in front of a population of Internet
broadband clients is a Very Bad Idea. DDoS attacks are attacks agains
capacity and/or state; and outbound/crossbound attacks can be just as
disruptive as inbound attacks.
This precise scenario has played out many times, over the years.
Networks which were suboptimally designed in this fashion were either
completely re-designed in order to be scalable and resilient, removing
unnecessary and harmful state; were acquired and their brittle,
fragile, non-scalable state-ridden infrastructure was decommissioned;
or went out of business.
The few holdouts in the present day inevitably experience the problems
described above, and then proceed through the same evolution as other
network operators with similar architectures.
My main concern is that this customer has pretty traditional mind set
and never like being the first deployment of any technology.
NAT64/DNS64 with 464XLAT or something along these lines isn’t new
technology; on the contrary, it’s quite mature, and deployed around
the world. It isn’t stateless, but it’s much more scalable than
sticking stateful firewalls everywhere, heh.
Designing and implementing a broadband access network with this sort
of architecture isn’t going to end well. It isn’t beyond the realm of
possibility that these ‘requirements’ are largely driven by a supplier
of stateful firewalls, or an internal advocate for same.
If you have received this e-mail in error, please notify the system
manager. This message contains confidential information and is intended
only for the individual named. If you are not the named addressee you
should not disseminate, distribute or copy this e-mail. Please notify
the sender immediately by e-mail if you have received this e-mail by
mistake and delete this e-mail from your system. If you are not the
intended recipient you are notified that disclosing, copying,
distributing or taking any action in reliance on the content of this
information is strictly prohibited.