0% found this document useful (0 votes)
102 views

How To Configure Smart NAT

The document provides configuration instructions for LinkProof NG Smart NAT in Alteon devices. It describes setting up Smart NAT entries from the web interface or CLI for static and dynamic NAT. It also covers configuring inbound LLB rules to associate local server IPs with GSLB rules and defining a DNS VIP to respond to DNS queries.

Uploaded by

Ayan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views

How To Configure Smart NAT

The document provides configuration instructions for LinkProof NG Smart NAT in Alteon devices. It describes setting up Smart NAT entries from the web interface or CLI for static and dynamic NAT. It also covers configuring inbound LLB rules to associate local server IPs with GSLB rules and defining a DNS VIP to respond to DNS queries.

Uploaded by

Ayan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Configuration

It is recommended to read the Introduction for Smart NAT feature for LinkProof NG before configuring Smart NAT.
Notes:

1. In Alteon versions 30.2.6.0, 30.5.4.0, 31.0.1.0 - ICMP protocol for inbound static NAt is not supported by
Alteon smartNAT and the traffic will be dropped.
Note that this limitation is NOT relevant started from 30.2.7.0, 30.5.5.0 and 31.0.2.
2. Alteon smartNAT doesn’t support dbind Force-Proxy. In case NAT should be performed in such scenario,
you should configure failback to PIP configuration . This is configured in the real server settings.

From WBM

. Go to Configuration > Application Delivery > LinkProof > Smart NAT.

The Smart NAT table displays:

. To create a Smart NAT entry, click the + icon.


. Define an alphanumeric value for the NAT ID, optionally enter a Description, and select the NAT
Type (values: No NAT, Static NAT, Dynamic NAT; default: No NAT).

. In the Local Network section, select the address type (Address/Subnet, or Network Class), and
enter the local address or network class.

Note: When you use Dynamic NAT, you can also set it to Any, which indicates that the NAT entry processes the
local address.

The following is the Local Network section after selecting Address Subnet:
The following is the Local Network section after selecting Network Class:

The following is the Local Network section after selecting Any (for Dynamic NAT only):

. In the Via section, select the WAN link to be associated with the NAT entry:

. In the NAT Settings section, select the address type and define the address type or network class.

The address type can be Address/Subnet, Network Class, or None (only for no NAT).

The following is the NAT Settings section after selecting Address Subnet:
The following is the NAT Settings section after selecting Network Class:

The following is the NAT Settings section after selecting No NAT as the NAT type:

The address type for the local address and NAT address can be different (for example, Address/Subnet for the
local address, and Network Class for the NAT address).

. When you are finished with the configuration, Submit the changes and Apply.
. Outbound-LLB rules have to be configured to provide outbound WAN link load balancing.

From CLI

. Go to the /cfg/slb/lp menu.


. With the smartnat command, either enable or disable Smart NAT (it is enabled by default).
. Enter the command nat x” (where x is the NAT ID)
. Define NAT entries as required.

The following is an example NAT entry:

/c/slb/lp/nat 2
ipver v4
type static
wanlink ISP1
locladd test_range
natadd 192.168.31.51 255.255.255.248

This is a static NAT entry, combining a local address of type Network Class and a NAT address of
typeAddress/Subnet.

Inbound LLB Smart NAT Configuration:


The Smart NAT configuration for inbound LLB is the same as for outbound (
(for more details read article BP21544).
In addition to the Smart NAT configuration, for inbound LLB you must define GSLB rules and associate the local
IP address to them.

From the web UI:

. Go to Configuration -> Application Delivery -> LinkProof -> Inbound LLB Rules

The inbound LLB rules page displays:

. To create an inbound LLB rule, click the + button.


. Enable the rule and give it an ID (only numbers are allowed).
. Fill in the domain name.
. Set the “Service Type” to “Server” (the default).
. Fill in the “Local Server IP”, which is the same local IP that you defined in the Smart NAT entry.
. Define if you want to use proximity.
. Choose the link selection metric.
From the CLI:

. Create a GSLB network.


. In the GSLB network, define the command servtyp server, define the local IP address with the servip
x.x.x.x command, and enable the GSLB network.
. Associate the GSLB network to the GSLB rule on metric 1 with the addnet X command and the gmetric
network command.

/c/slb/gslb/network 1
ena
servtyp server
servip 192.168.3.1
/c/slb/gslb/rule 2
ena
type inbound-llb 0
rr 1
dname "test.com"
/c/slb/gslb/rule 2/metric 1
gmetric network
addnet 1
/c/slb/gslb/rule 2/metric 2
gmetric proximity
/c/slb/gslb/rule 2/metric 3
gmetric roundrobin

. Configure the remaining parts of the GSLB rule configuration as shown in the example.
. Define a DNS VIP.
The purpose is to have an IP address that will be responding to DNS queries.

A configuration example

From the Web UI:

1. Go to Configuration -> Application Delivery -> DNS Authority -> DNS Responder.
The DNS Responder page displays.

2. To create a DNS responder, click the + button.


3. Enable the DNS VIP.
4. From the dropdown lists, choose the DNS TCP VIP and DNS UDP VIP.
5. Fill in the “VIP Address”, which is the DNS VIP IP address.

From the CLI:

/c/slb/gslb/dnsresvip DnsResp2,DnsResp3
vname "DNS_VIP_ISP1"
ipver v4
vip 192.168.31.200
ena
rtsrcmac ena

You might also like