new(ish) ipv6 transition tech status on CPE
aaron1 at gvtc.com
Fri Oct 12 12:44:11 UTC 2018
In my CGNat environment (~11,000 subs (5,000 dsl & 6,000 cable modem)) I had to solve issues with site-to-site vpn, console gaming and some webmail and banking web sites that seem to hand off authentication to another site and try to carry over the ip address … also had to try to accomplish load sharing amongst (3) cgnat nodes on my vrf-to-vrf boundary where I do natting… here’s some things we did…
APP - consistent mapping for priv to pub ip's
EIM – stabilizes ports outbound
EIF - stabilizes ports inbound and allows for some hold-over (actual pinhole openings) for further comms from outside---to---->inside
AMS LB - ams load balancing to occur on src-ip for removing the chance for more ip change*
AMS Member Failure options - more of adding resilience if/when underlying npu's fail
IGP (OSPF/LDP) routing - not cgnat related at all, and i recall more for load sharing amongst my mx960....but was a big win for us when we found the (set protocols ldp track-igp-metric) trick or causing my PE's that would then use the real igp metric to route to the *igp closest* cgnat node (mx960/ms-mpc-128g) thus causing that cgnat node to always be used for that pe's set of priv ip subs... you must know that i had a triple cgnat node boundary ((3) mx960's w/ms-mpc's) and here again had an issue with all traffic going to the lowest bgp loopback ip tiebreaker since apparently inet.3 has metric 1 for every prefix... that trick ldp command copies inet.0 metric into inet.3 thus giving some real igp metric consideration to the bgp best path calculation
* pub ip pool is divided up over the number for npu/vpic's that are aggregated together in an ams... so there is a chance that your priv ip's will be hashed over any and all npu's thus causing greater change of pub ip differences
Btw, there are keepalives for eif and sessions limits for resource issues to be considered
From: NANOG [mailto:nanog-bounces at nanog.org] On Behalf Of Philip Loenneker
Sent: Thursday, October 11, 2018 10:58 PM
Subject: RE: new(ish) ipv6 transition tech status on CPE
CGNAT is the most supported by the technology available in pretty much every device. Even keeping an audit trail of IP/port mappings is relatively easy (look into deterministic NAT – it will save you a lot of headache). You can likely lab it up with gear you already have, unlike the newer transition technologies that we’ve been discussing.
However, from my experience, the customer impact of going through 2 layers of NAT (NAT44) causes a lot of unhappy customers. I enabled it on my home connection for a few weeks to see how it went, and I was surprised that a lot of things just worked… Youtube, Netflix, etc had no issues. But there were key things such as Facebook Messenger voice and video calls that broke, which caused my family to get rather upset with me. Console gaming is also a common area of problems. For these types of Internet services, the profit margin can get eaten up quickly by the helpdesk calls.
As a side note, from internal discussions here (ie speculation, no real evidence to back it up), home users are likely to be impacted far more than business users, due to the difference in usage.
From: NANOG <nanog-bounces at nanog.org> On Behalf Of Tom Ammon
Sent: Friday, 12 October 2018 2:39 PM
To: NANOG <nanog at nanog.org>
Subject: Re: new(ish) ipv6 transition tech status on CPE
On Wed, Oct 10, 2018 at 3:08 PM Brock Tice <brock at bmwl.co> wrote:
On 10/09/2018 06:24 PM, Philip Loenneker wrote:
> I have asked several vendors we deal with about the newer technologies
> such as 464XLAT, and have had some responses indicating they will
> investigate internally, however we have not made much progress yet. One
> vendor suggested their device supports NAT46 and NAT64 so may support
> 464XLAT, but since it is incidental rather than an official feature, it
> may not support the full CLAT requirements. I have been meaning to do
> some tests but haven’t had a chance yet. It is also a higher price point
> than our current CPEs.
> I have spoken to people who have looked into options such as OpenWRT
> (which supports several of these technolgoies), however the R&D and
> ongoing support is a significant roadblock to overcome.
We looked into this somewhat intently ~6 months ago and had not much
luck from vendors. Barely on their radar if at all.
We used our own custom OpenWRT build on a few select, tested consumer
routers to do 464XLAT. In the end we went to dual-stack with CGN on
IPv4. I wrote up some documentation on how we did it on my blog, but in
the end I can't recommend the setup we used.
I would love RouterOS and (various mfgr) CPE support for 464XLAT, then I
would be ready to give it another shot.
It sounds like I am where you were 6 months ago. We've been looking at NAT64, MAP-T, potentially 464XLAT, and then dual stack with CGN on the v4 side. What did you experience with the dual-stack/CGN approach that keeps you from recommending it? Academically, that setup seems the least fraught with problems among all of the options.
M: (801) 784-2628
thomasammon at gmail.com
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the NANOG