On Oct 25, 2010, at 7:59 AM, Rémi Després wrote:
That's what tools.ietf.org/html/draft-despres-softwire-sam-01 sec. 3.3 is about.
Provided hosts support it:
- e2e addresses are preserved
- it works even with an independent CPE per ISP (which isn't the case with NAT66)

Could you explain what you mean here? As long as both devices support NAT66, NAT66 should work fine in this environment, AFAIK.

Where they are desired, firewalls have to do their own work (they by no means need addresses translation for this).

Per se, the stateless mechanism proposed by Margaret and Fred in their NAT66 draft, does break e2e address preservation, but doesn't do anything to prevent incoming calls. (Their NAT66 draft says: "RECOMMENDED that NAT66 devices include an IPv6 firewall function, and the firewall function SHOULD be configured by default to block all incoming connections.").

This is stated specifically to discourage vendors from shipping a product that, by default, blocks all incoming connections for IPv4 (due to the IPv4 NAT functionality) and does not block inbound connections for IPv6. The advantage to separating the NAT and firewall functionality, though, is that with NAT66, enterprise administrators _can_ enable whatever inbound connectivity they like. Every node can be made accessible on all of its available ports, using a a distinct address per node.

At the time I wrote this, the v6ops group was (I think) recommending that all sites deploy firewall functionality in IPv6. I've been told more recently that I should check what those recommendations actually were, to make sure I am aligned and/or reference them rather than stating the recommendation here, which would be fine with me.

Margaret

_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

Reply via email to