OK, this has been a fun day in the lab! Truly!

To emulate a customer network so I can solve a particular customer problem,
I have to emulate a multiport PIX on one of my routers. How to do so?

That is, how to have multiple outside NAT pools, such that a translation out
one interface is different than a translation out another interface?

The problem - to simulate such that there is The Internet out one interface,
and a Business Partner Extranet out another. Obviously, internet bound
traffic has to have public ip addresses, and the extranet traffic has to
appear as a certain private subnet.

the other problem is that the inside network consists of a number of "branch
offices", each connected to the central site via frame relay point to point
subinterfaces. ( well, the customer's real network is ATM, but the principal
is the same )

Can it be done?

Start with a search of CCO. Lots of hits using the term "nat", but one hit
in particular looks promising:

http://www.cisco.com/warp/public/556/index.shtml

scroll down the page and see this link:

http://www.cisco.com/warp/public/105/nat_routemap.html

read it a while, think about it, draw up a plan, test it out. had to do a
bit of tweaking, but damn! it works exactly the way I need it to work!

Neat!!!!!

interface Ethernet0
 ip address 129.1.1.4 255.255.255.0
 ip nat outside
!
interface TokenRing0
 ip address 10.1.1.254 255.255.255.252
 ip nat outside
 ring-speed 4
!
!!!!! NOTE the two interfaces identified as NAT outside !!!!!!!
!
interface Serial0
 no ip address
 encapsulation frame-relay
 no fair-queue
!
interface Serial0.1 point-to-point
 description SOMHC
 ip address 172.31.250.29 255.255.255.252
 ip nat inside
 frame-relay interface-dlci 201
!
interface Serial0.2 point-to-point
 description NAHC
 ip address 172.31.250.1 255.255.255.252
 ip nat inside
 frame-relay interface-dlci 202
!
interface Serial0.3 point-to-point
 description SAFMC
 ip address 172.31.250.9 255.255.255.252
 ip nat inside
 frame-relay interface-dlci 203
!
interface Loopback0
 ip address 172.31.1.1 255.255.255.255
 ip nat inside
!
!
!!!!!!!!!!! Note the four interfaces identified as NAT inside !!!!!!!
!
!
interface Serial1
 no ip address
 shutdown
!
router eigrp 999
 passive-interface Ethernet0
 passive-interface Loopback0
 passive-interface TokenRing0
 network 172.31.0.0
 no auto-summary
 no eigrp log-neighbor-changes
!
ip nat pool 2internet 75.1.1.65 75.1.1.94 netmask 255.255.255.224
ip nat pool 2extranet 10.1.2.10 10.1.2.50 netmask 255.255.255.0
ip nat inside source route-map intointernet pool 2internet
ip nat inside source route-map intoextranet pool 2extranet
ip classless
ip route 0.0.0.0 0.0.0.0 Ethernet0
ip route 10.1.1.1 255.255.255.255 TokenRing0
ip route 172.31.3.0 255.255.255.0 Serial0.2
ip route 172.31.5.0 255.255.255.0 Serial0.3
ip route 172.31.10.0 255.255.255.0 Serial0.1
no ip http server
!
access-list 171 deny   ip 172.31.0.0 0.0.255.255 host 10.1.1.1
access-list 171 permit ip 172.31.0.0 0.0.255.255 any
access-list 172 permit ip 172.31.0.0 0.0.255.255 host 10.1.1.1
route-map intointernet permit 10
 match ip address 171
!
route-map intoextranet permit 10
 match ip address 172
!
check out the two different outputs of the show ip nat trans command: have
to use extended ping to get the source addresses for the various interfaces.

to the internet:

SFCCC_Central#ping
Protocol [ip]:
Target IP address: 65.20.35.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: loop 0
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 65.20.35.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 12/14/16 ms

SFCCC_Central#sh ip nat trans
Pro Inside global      Inside local       Outside local      Outside global
icmp 75.1.1.65:9704    172.31.1.1:9704    65.20.35.1:9704    65.20.35.1:9704
icmp 75.1.1.65:9705    172.31.1.1:9705    65.20.35.1:9705    65.20.35.1:9705
icmp 75.1.1.65:9706    172.31.1.1:9706    65.20.35.1:9706    65.20.35.1:9706
icmp 75.1.1.65:9707    172.31.1.1:9707    65.20.35.1:9707    65.20.35.1:9707
icmp 75.1.1.65:9708    172.31.1.1:9708    65.20.35.1:9708    65.20.35.1:9708

to the business partner extranet:

SFCCC_Central#ping
Protocol [ip]:
Target IP address: 10.1.1.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: loop 0
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 8/8/8 ms

SFCCC_Central#sh ip nat trans
Pro Inside global      Inside local       Outside local      Outside global
icmp 10.1.2.10:9102    172.31.1.1:9102    10.1.1.1:9102      10.1.1.1:9102
icmp 10.1.2.10:9103    172.31.1.1:9103    10.1.1.1:9103      10.1.1.1:9103
icmp 10.1.2.10:9104    172.31.1.1:9104    10.1.1.1:9104      10.1.1.1:9104
icmp 10.1.2.10:9105    172.31.1.1:9105    10.1.1.1:9105      10.1.1.1:9105
icmp 10.1.2.10:9106    172.31.1.1:9106    10.1.1.1:9106      10.1.1.1:9106

in the customer network I won't have the issue because 1) multiple NATs can
be set up on multiple PIX interfaces and 2) the policy routing will set the
ip next hops to the correct vlan trunk interface.

Damn it is so much fun to research, find a hint, and work through the
problem!

Chuck
183 and counting down




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=45602&t=45602
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to