[AusNOG] Assistance needed with Cisco NAT & Route-maps

Jacob Bisby ausnog at jdmnet.com.au
Tue Dec 3 00:36:34 EST 2013


Hi All

Had a couple of people ask for problem resolution summary for archiving 
purposes. It was not a problem as such, more a situation where I hadn't 
come across this specific configuration before. I'm not comfortable with 
having the specific config example I had archived, but these examples 
should suffice.

Essentially we had lines of config like this:

ip nat inside source static tcp INSIDEIP INSIDEPORT OUTSIDEIP 
OUTSIDEPORT route-map ROUTEMAP extendable

route-map ROUTEMAP permit 10
match ip address 108
match interface Gi0/1

Access-list 108 is your choice of any entries comprised of private 
subnets as 'source' with destinations to (any)where. (either private or 
public destinations).

This is the part where I add my disclaimer and say I didn't design this:

The goal was to figure out what exactly that route-map was achieving. In 
this case, we have a bunch of segregated VLANs for separate clients, and 
it seems to have been decided that at no point are they allowed to 
communicate using the internal network. This means that if you're on one 
VLAN and need to access a resource on the other, the client must exit 
the network on their dedicated Public IP Address and then come back 
through to the other client's Public IP Address. Seems messy to me but 
at the same time, it's working and that's all it needs to do.

Typically this kind of configuration is used to force NATd traffic out a 
specific WAN interface in the case of a multi-homed router as many 
people have informed me over the past few days. The other common use 
case seems to be on ASA's where NONAT configuration on VPN's is 
required. In my case, it is technically the first use case, however the 
access-list 108 was used for multiple purposes which made interpreting 
it's function difficult (for me) in the context of that route-mapped NAT 
translation.


In my opinion, Cisco TAC didn't work on this router, and whoever has 
really did a number on this one and I can't help but feel there were far 
better ways to achieve this than with VLAN segregation and NAT 
route-maps, etc. I'm not sure if any of you share my opinion but I feel 
this would be better handled using VRF with some leaked routes as necessary?

My main concern is making this configuration scalable, which at the 
moment I do not think it will scale easily at all. Guess that's the fun 
part though!

- Jacob


On 29/11/2013 4:44 PM, Jacob Bisby wrote:
> Hi All
>
> Looking for someone to ping me off-list - just need some quick 
> assistance / QA with some Cisco NAT / route-map config, have found 
> some config which I can't find any documented examples of and I'm not 
> entirely sure what it's achieving.
>
> Thanks in advance
>
> - Jacob
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20131202/a54a0fbd/attachment.html>


More information about the AusNOG mailing list