I always say that eliminating a single point of failure depends on how big the point is :)
-mel beckman > On Jul 5, 2015, at 12:10 PM, Owen DeLong <o...@delong.com> wrote: > > A NAT box is a central point of failure for which the only cure is to not do > NAT. > > You can get clustered NAT boxes (Juniper, for example), but that just makes a > bigger central point of failure. > > Owen > >> On Jul 5, 2015, at 11:49 , Josh Moore <jmo...@atcnetworks.net> wrote: >> >> The point I am concerned about is a central point of failure. >> >> >> >> >> Thanks, >> >> Joshua Moore >> Network Engineer >> ATC Broadband >> 912.632.3161 >> >>> On Jul 5, 2015, at 2:46 PM, Owen DeLong <o...@delong.com> wrote: >>> >>> Not necessarily. But what I am telling you is that whatever goes out NAT >>> gateway A has to come back in through NAT gateway A. >>> >>> You can build whatever topology you want on either side of that and nothing >>> says B has to be any where near A. >>> >>> Owen >>> >>>> On Jul 5, 2015, at 11:25 , Josh Moore <jmo...@atcnetworks.net> wrote: >>>> >>>> So basically what you are telling me is that the NAT gateway needs to be >>>> centrally aggregated. >>>> >>>> >>>> >>>> >>>> Thanks, >>>> >>>> Joshua Moore >>>> Network Engineer >>>> ATC Broadband >>>> 912.632.3161 >>>> >>>>> On Jul 5, 2015, at 1:29 PM, Owen DeLong <o...@delong.com> wrote: >>>>> >>>>> If you want to keep that, then you’ll need a public backbone network that >>>>> joins all of your NATs and you’ll need to have your NATs use unique >>>>> exterior address pools. >>>>> >>>>> Load balancing a single session across multiple NATs isn’t really >>>>> possible. >>>>> >>>>> Owne >>>>> >>>>>> On Jul 5, 2015, at 08:11 , Josh Moore <jmo...@atcnetworks.net> wrote: >>>>>> >>>>>> Performing the NAT on the border routers is not a problem. The problem >>>>>> comes into play where the connectivity is not symmetric. Multiple >>>>>> entry/exit points to the Internet and some are load balanced. We'd like >>>>>> to keep that architecture too as it allows for very good protection in >>>>>> an internet link failure scenario and provides BGP best path >>>>>> connectivity. >>>>>> >>>>>> So traffic cones in ISP A might leave ISP B or traffic coming in ISP A >>>>>> may come in ISP B simultaneously. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Thanks, >>>>>> >>>>>> Joshua Moore >>>>>> Network Engineer >>>>>> ATC Broadband >>>>>> 912.632.3161 >>>>>> >>>>>>> On Jul 5, 2015, at 10:43 AM, Mel Beckman <m...@beckman.org> wrote: >>>>>>> >>>>>>> WISPs have been good at solving this, as they are often deploying >>>>>>> greenfield networks. They use private IPv4 internally and NAT IPv4 at >>>>>>> multiple exit points. IPv6 is seamlessly redundant, since customers all >>>>>>> receive global /64s; BGP handles failover. If you home multiple >>>>>>> upstream providers on a single NAT gateway hardware stack, redundancy >>>>>>> is also seamless, since your NAT tables are synced across redundant >>>>>>> stack members. If you have separate stacks, or even sites, IPv4 can >>>>>>> fail over to an alternate NAT Border gateway but will lose session >>>>>>> contexts, unless you go to the trouble of syncing the gateways. Most >>>>>>> WISPs don't. >>>>>>> >>>>>>> -mel beckman >>>>>>> >>>>>>>> On Jul 5, 2015, at 7:25 AM, Josh Moore <jmo...@atcnetworks.net> wrote: >>>>>>>> >>>>>>>> So the question is: where do you perform the NAT and how can it be >>>>>>>> redundant? >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> Thanks, >>>>>>>> >>>>>>>> Joshua Moore >>>>>>>> Network Engineer >>>>>>>> ATC Broadband >>>>>>>> 912.632.3161 >>>>>>>> >>>>>>>>> On Jul 5, 2015, at 10:12 AM, Mel Beckman <m...@beckman.org> wrote: >>>>>>>>> >>>>>>>>> Josh, >>>>>>>>> >>>>>>>>> Your job is simple, then. Deliver dual-stack to your customers and if >>>>>>>>> they want IPv6 they need only get an IPv6-enabled firewall. Unless >>>>>>>>> you're also an IT consultant to your customers, your job is done. If >>>>>>>>> you already supply the CPE firewall, then you need only turn on IPv6 >>>>>>>>> for customers who request it. With the right kind of CPE, you can run >>>>>>>>> MPLS or EoIP and deliver public IPv4 /32s to customers willing to pay >>>>>>>>> for them. Otherwise it's private IPv4 and NAT as usual for IPv4 >>>>>>>>> traffic. >>>>>>>>> >>>>>>>>> -mel via cell >>>>>>>>> >>>>>>>>>> On Jul 5, 2015, at 6:57 AM, Josh Moore <jmo...@atcnetworks.net> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>> We are the ISP and I have a /32 :) >>>>>>>>>> >>>>>>>>>> I'm simply looking at the best strategy for migrating my subscribers >>>>>>>>>> off v4 from the perspective of solving the address utilization >>>>>>>>>> crisis while still providing compatibility for those one-off sites >>>>>>>>>> and services that are still on v4. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Thanks, >>>>>>>>>> >>>>>>>>>> Joshua Moore >>>>>>>>>> Network Engineer >>>>>>>>>> ATC Broadband >>>>>>>>>> 912.632.3161 >>>>>>>>>> >>>>>>>>>> On Jul 5, 2015, at 9:55 AM, Mel Beckman <m...@beckman.org> wrote: >>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Josh Moore wrote: >>>>>>>>>>>> >>>>>>>>>>>> Tunnels behind a CPE and 4to6 NAT seem like bandaid fixes as they >>>>>>>>>>>> do not give the benefit of true end to end IPv6 connectivity in >>>>>>>>>>>> the sense of every device has a one to one global address mapping. >>>>>>>>>>> >>>>>>>>>>> No, tunnels do give you one to one global IPv6 address mapping for >>>>>>>>>>> every device. From a testing perspective, a tunnelbroker works >>>>>>>>>>> just as if you had a second IPv6-only ISP. If you're fortunate >>>>>>>>>>> enough to have a dual-stack ISP already, you can forgo tunneling >>>>>>>>>>> altogether and just use an IPv6-capable border firewall. >>>>>>>>>>> >>>>>>>>>>> William Waites wrote: >>>>>>>>>>>> I was helping my >>>>>>>>>>>> friend who likes Apple things connect to the local community >>>>>>>>>>>> network. He wanted to use an Airport as his home gateway rather >>>>>>>>>>>> than >>>>>>>>>>>> the router that we normally use. Turns out these things can *only* >>>>>>>>>>>> do >>>>>>>>>>>> IPv6 with tunnels and cannot do IPv6 on PPPoE. Go figure. So there >>>>>>>>>>>> is >>>>>>>>>>>> not exactly a clear path to native IPv6 for your lab this way. >>>>>>>>>>> >>>>>>>>>>> Nobody is recommending the Apple router as a border firewall. It's >>>>>>>>>>> terrible for that. But it's a ready-to-go tunnelbroker gateway. If >>>>>>>>>>> your ISP can't deliver IPv6, tunneling is the clear path to >>>>>>>>>>> building a lab. If you have a dual-stack ISP already, the clear >>>>>>>>>>> path is to use an IPv6-capable border firewall. >>>>>>>>>>> >>>>>>>>>>> So you are in a maze of non-twisty paths, all alike :) >>>>> >>> >