Hi Li, What exactly do you mean by "new nat session rate limit" ? There is no session rate limiting in the classical flavours of nat (nat44-ed,nat44-ei,det44,nat64,nat66)
Best regards, Filip Varga pi 28. 10. 2022 o 3:09 lihuawei <lihuawei_...@163.com> napísal(a): > Hi Filip, > > Thanks very much for your detailed instructions and configuration > examples. I will try this method later on. > > Another question about nat, is there any support for new nat session rate > limit in vpp? > > > Thanks & Regards, > Huawei LI > > 2022年10月28日 01:22,filvarga <filipvarg...@gmail.com> 写道: > > Hi Li, > > NAT44-ED doesn't support ACL. There are other NAT plugins in VPP. For > example PNAT uses ACL rules. You should go through all of the options there > are and pick the correct NAT flavor that will suffice. > > Well your option is to do following: > > 1) > > # lan1 interface belongs to vrf1 > # lan2 interface belongs to vrf2 > # wan0 interface belongs to default fib 0 > > set interface nat44 in lan1 > set interface nat44 in lan2 > set interface nat44 out wan0 > > nat44 add address <...address..> tenant-vrf 1 > nat44 add address <...address..> tenant-vrf 2 > > 2) > > # lan1 and wan0 interfaces belong to default fib 0 > # lan2 interface belongs to vrf1 > > --||-- > > nat44 add address <...address...> > nat44 add address <...address..> tenant-vrf 1 > > This is how you simply force the inside interface to use a specific NAT > pool address. > > Best regards, > Filip Varga > > > št 27. 10. 2022 o 18:58 lihuawei <lihuawei_...@163.com> napísal(a): > >> Hi Filip, >> >> I have searched your mail accounts, and didn’t find any acl configuration >> used with nat44. Do you mean use acl with nat44 address to achive to my >> target creating nat sessions based packet’s source ip's network? >> >> How about multi nat addresses respectively used for multi-subnets in a >> vrf? >> >> Thanks & Regards, >> Huawei LI >> >> 2022年10月27日 22:06,filvarga <filipvarg...@gmail.com> 写道: >> >> Hi Li, >> >> Yes, try to search one of my mail accounts (current/previous) for example >> fiva...@cisco.com, filipvarg...@gmail.com or my name. >> If you are looking for a feature that does ACL matching based on source >> address you should try to look in different implementations of nat44, there >> are more then one in vpp (one even supports acl matching). >> >> Yes, the support for matching based on source subnet is not part of >> nat44-ed and It would greatly change the current state for it. I wouldn't >> suggest doing such a radical change. You can ofc. use as I mentioned >> previously VRF logic. The only thing you need is 1 extra vrf to put one of >> the inside interfaces into in conjunction with nat44 add address ... >> tenant-vrf <inside-vrf>. >> >> Regarding your problem with the bridge in VPP. You can go about using a >> bridge in linux and connecting both interfaces in VPP to it. You would even >> be able to have both VPP interfaces in the same subnet. >> >> Best regards, >> Filip Varga >> >> >> št 27. 10. 2022 o 15:04 lihuawei <lihuawei_...@163.com> napísal(a): >> >>> Hi Filip, >>> >>> Sorry, I didn’t state the demands clearly. My demand is to let a nat ip >>> address just only work for specific src network prefix in a vpc, the nat >>> sessions using the nat ip address will be created only when the i2o >>> packets’s src ip matches the specific network prefix in the vpc. >>> 1) I saw the snat_address_t’s member net is used only for matching the >>> packets’s dst ip in nat_ed_alloc_addr_and_port. >>> 2) using multiple vrfs to isolate the network is a method, but will use >>> more other configures, and makes the traffic model more complex. >>> >>> By view the codes about nat44-ed, I don’t think there is any >>> configuration examples about the demand I mentioned above. Do you have any >>> keywords about the configuration examples? I want to try a search in >>> mailing list with them. >>> >>> Do I understand this right? Looking forward to hearing any further >>> ideas or suggestions from you. >>> >>> Thanks & Regards, >>> Huawei LI >>> >>> 2022年10月27日 16:52,filvarga <filipvarg...@gmail.com> 写道: >>> >>> Hi Li, >>> >>> There are few errors in your statement. >>> >>> 1) SNAT - is an obsolete name for the old nat plugin. >>> 2) NAT is split among multiple plugins >>> 3) one of the plugins - nat44-ed (the most used and preferred) does >>> support all of the things you have mentioned >>> >>> Please feel free to search in the community mailing list for >>> configuration examples. There is also .rst file in the nat44-ed plugin >>> directory (may not contain all of the supported configuration). Also check >>> the api.c and cli.c for all available configuration options. >>> >>> After you have done above mentioned feel free to ask regarding specific >>> configuration issue. >>> >>> Best regards, >>> Filip Varga >>> >>> >>> pi 21. 10. 2022 o 4:01 lihuawei <lihuawei_...@163.com> napísal(a): >>> >>>> Hi John & Everyone & Community, >>>> >>>> In my scene, it is the demand to put multiple subnets in one BD. A few >>>> days ago, I have found the other proper idea to implement the demand >>>> mentioned >>>> in the mail subject and original mail. >>>> >>>> This problem and mail can be close now. >>>> >>>> Have a nice day, everybody! >>>> >>>> >>>> Thanks & Regards, >>>> Huawei LI >>>> >>>> 2022年10月21日 00:45,John Lo <lojultra2...@outlook.com> 写道: >>>> >>>> Hi Huawei, >>>> >>>> Some comments on supporting multiple BVIs in a BD: >>>> >>>> 1. There are assumptions in the bridging code including only 1 BVI per >>>> BD and it will be the last interface of a BD's flood list. To support >>>> multiple BVIs per BD will make the code more complicated and less efficient >>>> from performance point of view. >>>> >>>> 2. All interfaces, including BVI, in a BD can talk to each other via >>>> MAC address learning. There is no concept of L3 IP address nor awareness >>>> of IPs in separate VRFs. Thus, the concept of multiple BVIs in a BD each in >>>> different VRFs does not match the L2 bridging concept. While it may be >>>> possible to enhance BD support to understand IP and VRF at L3, it will >>>> again make the code more complicated and affect performance. >>>> >>>> My question would be, isn't it more natural to put each subnet in a >>>> separate BD with its BVI in the desired VRF? >>>> >>>> Regards, >>>> John >>>> >>>> -----Original Message----- >>>> From: lihuawei <lihuawei_...@163.com> >>>> Sent: Sunday, October 16, 2022 11:30 PM >>>> To: o...@cisco.com; fiva...@cisco.com; klement.sek...@gmail.com; Neale >>>> Ranns <ne...@graphiant.com>; lojultra2...@outlook.com; slu...@cisco.com >>>> ; vpp-dev@lists.fd.io >>>> Subject: snat support bind to specific subnets >>>> >>>> Hi Ole, Filip, Klement, Neale, John, Steven, &Community, >>>> >>>> I have a demand about snat. With in a vpc, different subnets need use >>>> different snat ip to the internet, but the vpp snat feature now do not >>>> support snat ip bind to specific subnets. I have two ideas to resolve this: >>>> 1. modify and develop snat feature to support snat ip bind to specific >>>> subnets. >>>> 2. use multiple vrfs to isolate subnets, one vrf’s subnets use one snat >>>> ip, but the bd bvi now only support one in one bd, the non-bvi loop does >>>> not forward L3. So modify and develop bd bvi to support multiple bvi >>>> interfaces in one bd may be one better idea. >>>> >>>> Do I understand right and the idea 2 is the better? Anybody who has >>>> better idea, please help. >>>> >>>> Thanks and Regards, >>>> Huawei LI >>>> >>>> >>>> >>>> >>>> >>>> >>> >>> >>> >>> >>> >>> >>> >> >> >> >> >> > > > > >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#22090): https://lists.fd.io/g/vpp-dev/message/22090 Mute This Topic: https://lists.fd.io/mt/94377538/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/leave/1480452/21656/631435203/xyzzy [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-