We are setting up source NAT and the idea was to use the ve IP addresses for the associated vlan as the source NAT address in the pool.
I swear we had it setup like this in version 2.7.2P6. but since the upgrade it says we can not use the ve interface IP address as the source nat address in a pool.
Is there anyway of using the interface address as the source NAT now? Just trying to keep the number of IP addresses used down.
Hello -
This should be possible with “Smart NAT” which will use the interface IP or VRRP Floating IP. Per admin guide:
Smart NAT provides source NAT for virtual ports. The IP addresses that Smart NAT uses to create the mappings depend on whether VRRP-A high availability is enabled and floating-IP addresses are configured:
• With VRRP-A high availability – If VRRP-A high availability is configured, Smart NAT uses configured floating IP addresses as NAT addresses.
• Without VRRP-A high availability – If VRRP-A high availability is not configured, then Smart NAT uses IP address(es) on the ACOS interface connected to the real server.
The configuration is applied to the VPORT with “source nat auto” command.
my configuration is as below, kindly let me know what i am missing.
!
access-list 111 permit ip 10.0.0.0 0.255.255.255 any
!
access-list 111 permit ip 192.168.0.0 0.0.255.255 any
!
interface ethernet 2
name “ISP 1”
enable
ip address 100.100.101.1 255.255.255.224
ip nat outside
exit-module
!
interface ethernet 3
name “ISP 2”
enable
ip address 100.100.102.1 255.255.255.224
ip nat outside
exit-module
!
interface ethernet 4
name “ISP 3”
enable
ip address 100.100.103.1 255.255.255.224
ip nat outside
exit-module
!
!
ip nat pool SNAT_ISP1 100.100.101.2 100.100.101.2 netmask /29 gateway 100.100.100.254
!
ip nat pool SNAT_ISP2 100.100.102.2 100.100.102.2 netmask /29 gateway 100.100.100.253
!
ip nat pool SNAT_ISP3 100.100.103.2 100.100.103.2 netmask /29 gateway 100.100.100.252
!
ip nat pool-group LLB2
member SNAT_ISP1 SNAT_ISP2 SNAT_ISP3
exit-module
!
slb virtual-server INTERNET 0.0.0.0 acl 111
extended-stats
port 0 tcp
clientip-sticky-nat
source-nat pool LLB2
service-group IPV4_0
use-rcv-hop-for-resp
template persist destination-ip dstpersist
no-dest-nat
exit-module
port 0 udp
clientip-sticky-nat
source-nat pool LLB2
service-group IPV4_1
use-rcv-hop-for-resp
template persist destination-ip dstpersist
no-dest-nat
exit-module
port 0 others
clientip-sticky-nat
source-nat pool LLB2
service-group IPV4_0
use-rcv-hop-for-resp
template persist destination-ip dstpersist
no-dest-nat
exit-module
exit-module
in the CLI when i ping 8.8.8.8 using source interface ethernet 2,3 and 4 i can ping 8.8.8.8
but when i use source snap ip
ping source 100.100.101.2 8.8.8.8 (no response)
ping source 100.100.102.2 8.8.8.8 (no response)
ping source 100.100.103.2 8.8.8.8 (no response)
I don’t believe testing with a ping source IP of a NAT pool is a valid option. You may wish to execute that command while running axdebug to see what’s being sent / received.
Overall, your config looks correct. I don’t see an “inside” interface configured, but I assume that’s planned. However, you need not configure inside / outside NAT interfaces unless you’re using “snat-on-vip”.
So it appears you’re looking to run NHLD. A few thoughts:
Do you have “ip allow-promiscuous-vip” configured on your inside interface?
Do your slb servers, service-groups, and VIP show UP status?
Also, in my configs and also the admin guide, the NAT pools do not have a gateway defined. You may wish to try removing that.
Here’s a lab config I’ve used. In this instance, 192.168.1.x was inside, 10.x.x.x was outside.
I do see in your config the following, which is incorrect syntax (at least in version 4.x). Pool group members should be one per line. What version are you running?
ip nat pool-group LLB2
member SNAT_ISP1 SNAT_ISP2 SNAT_ISP3
exit-module
At this point I would suggest packet captures to validate the behavior of the A10 and/or contacting A10 Support for assistance. Seems that there is some other environment specific issue at play here.
Reviewing the captures, it appears that all of your TCP SYN packets have the same 2 destination IP’s, and we never receive a SYN ACK from either of them. Also, I see no traffic with a destination port of 80 or 443.
The IP’s do not align with the config you initially posted, so some of the context is lost.
There are many possibilities for why the SYN ACK would not return. However, I think the bigger issue is that the A10 is not receiving any packets from either 10.0.0.0/8 or 192.168.0.0/16 networks. Do you have any hits on the ACLs?
Is there a NAT before the A10 or some strange routing?
SRC-PRI-A10-Active#sh access-list
access-list 111 4 permit ip 10.0.0.0 0.255.255.255 any Data plane hits: 0
access-list 111 8 permit ip 192.168.0.0 0.0.255.255 any Data plane hits: 0