Hi, Li

There is no such goal. It would’t be good idea to put rate limiting
directly into NAT. For many good reasons.

Much better solution would be to implement a new rate limiting plugin.

If you need such a functionality feel free to contribute.

Best regards

On Fri, 28 Oct 2022 at 18:35, lihuawei <lihuawei_...@163.com> wrote:

> Hi Filip,
>
> Yes, it’s "session rate limiting" what I mean.
>
> Does community have any plan about "session rate limiting" in the
> classical flavours of nat?
>
>
> Thanks & Regards,
> Huawei LI
>
> 2022年10月28日 21:20,filvarga <filipvarg...@gmail.com> 写道:
>
> Hi Li,
>
> What exactly do you mean by "new nat session rate limit" ? There is no
> session rate limiting in the classical flavours of nat
> (nat44-ed,nat44-ei,det44,nat64,nat66)
>
> Best regards,
> Filip Varga
>
>
> pi 28. 10. 2022 o 3:09 lihuawei <lihuawei_...@163.com> napísal(a):
>
>> Hi Filip,
>>
>> Thanks very much for your detailed instructions and configuration
>> examples. I will try this method later on.
>>
>> Another question about nat, is there any support for new nat session
>> rate limit in vpp?
>>
>>
>> Thanks & Regards,
>> Huawei LI
>>
>> 2022年10月28日 01:22,filvarga <filipvarg...@gmail.com> 写道:
>>
>> Hi Li,
>>
>> NAT44-ED doesn't support ACL. There are other NAT plugins in VPP. For
>> example PNAT uses ACL rules. You should go through all of the options there
>> are and pick the correct NAT flavor that will suffice.
>>
>> Well your option is to do following:
>>
>> 1)
>>
>> # lan1 interface belongs to vrf1
>> # lan2 interface belongs to vrf2
>> # wan0 interface belongs to default fib 0
>>
>> set interface nat44 in lan1
>> set interface nat44 in lan2
>> set interface nat44 out wan0
>>
>> nat44 add address <...address..> tenant-vrf 1
>> nat44 add address <...address..> tenant-vrf 2
>>
>> 2)
>>
>> # lan1 and wan0 interfaces belong to default fib 0
>> # lan2 interface belongs to vrf1
>>
>> --||--
>>
>> nat44 add address <...address...>
>> nat44 add address <...address..> tenant-vrf 1
>>
>> This is how you simply force the inside interface to use a specific NAT
>> pool address.
>>
>> Best regards,
>> Filip Varga
>>
>>
>> št 27. 10. 2022 o 18:58 lihuawei <lihuawei_...@163.com> napísal(a):
>>
>>> Hi Filip,
>>>
>>> I have searched your mail accounts, and didn’t find any acl
>>> configuration used with nat44. Do you mean use acl with nat44 address to
>>> achive to my target creating nat sessions based packet’s source ip's
>>> network?
>>>
>>> How about multi nat addresses respectively used for multi-subnets in a
>>> vrf?
>>>
>>> Thanks & Regards,
>>> Huawei LI
>>>
>>> 2022年10月27日 22:06,filvarga <filipvarg...@gmail.com> 写道:
>>>
>>> Hi Li,
>>>
>>> Yes, try to search one of my mail accounts (current/previous) for example
>>>  fiva...@cisco.com, filipvarg...@gmail.com or my name.
>>> If you are looking for a feature that does ACL matching based on source
>>> address you should try to look in different implementations of nat44, there
>>> are more then one in vpp (one even supports acl matching).
>>>
>>> Yes, the support for matching based on source subnet is not part of
>>> nat44-ed and It would greatly change the current state for it. I wouldn't
>>> suggest doing such a radical change. You can ofc. use as I mentioned
>>> previously VRF logic. The only thing you need is 1 extra vrf to put one of
>>> the inside interfaces into in conjunction with nat44 add address ...
>>> tenant-vrf <inside-vrf>.
>>>
>>> Regarding your problem with the bridge in VPP. You can go about using a
>>> bridge in linux and connecting both interfaces in VPP to it. You would even
>>> be able to have both VPP interfaces in the same subnet.
>>>
>>> Best regards,
>>> Filip Varga
>>>
>>>
>>> št 27. 10. 2022 o 15:04 lihuawei <lihuawei_...@163.com> napísal(a):
>>>
>>>> Hi Filip,
>>>>
>>>> Sorry, I didn’t state the demands clearly. My demand is to let a nat ip
>>>> address just only work for specific src network prefix in a vpc, the nat
>>>> sessions using the nat ip address will be created only when the i2o
>>>> packets’s src ip matches the specific network prefix in the vpc.
>>>> 1) I saw the snat_address_t’s member net is used only for matching the
>>>> packets’s dst ip in nat_ed_alloc_addr_and_port.
>>>> 2) using multiple vrfs to isolate the network is a method, but will use
>>>> more other configures, and makes the traffic model more complex.
>>>>
>>>> By view the codes about nat44-ed, I don’t think there is any
>>>> configuration examples about the demand I mentioned above. Do you have any
>>>> keywords about the configuration examples? I want to try a search in
>>>> mailing list with them.
>>>>
>>>> Do I understand this right? Looking forward to hearing any further
>>>> ideas or suggestions from you.
>>>>
>>>> Thanks & Regards,
>>>> Huawei LI
>>>>
>>>> 2022年10月27日 16:52,filvarga <filipvarg...@gmail.com> 写道:
>>>>
>>>> Hi Li,
>>>>
>>>> There are few errors in your statement.
>>>>
>>>> 1) SNAT - is an obsolete name for the old nat plugin.
>>>> 2) NAT is split among multiple plugins
>>>> 3) one of the plugins - nat44-ed (the most used and preferred) does
>>>> support all of the things you have mentioned
>>>>
>>>> Please feel free to search in the community mailing list for
>>>> configuration examples. There is also .rst file in the nat44-ed plugin
>>>> directory (may not contain all of the supported configuration). Also check
>>>> the api.c and cli.c for all available configuration options.
>>>>
>>>> After you have done above mentioned feel free to ask regarding specific
>>>> configuration issue.
>>>>
>>>> Best regards,
>>>> Filip Varga
>>>>
>>>>
>>>> pi 21. 10. 2022 o 4:01 lihuawei <lihuawei_...@163.com> napísal(a):
>>>>
>>>>> Hi John & Everyone & Community,
>>>>>
>>>>> In my scene, it is the demand to put multiple subnets in one BD. A few
>>>>> days ago, I have found the other proper idea to implement the demand 
>>>>> mentioned
>>>>> in the mail subject and original mail.
>>>>>
>>>>> This problem and mail can be close now.
>>>>>
>>>>> Have a nice day, everybody!
>>>>>
>>>>>
>>>>> Thanks & Regards,
>>>>> Huawei LI
>>>>>
>>>>> 2022年10月21日 00:45,John Lo <lojultra2...@outlook.com> 写道:
>>>>>
>>>>> Hi Huawei,
>>>>>
>>>>> Some comments on supporting multiple BVIs in a BD:
>>>>>
>>>>> 1. There are assumptions in the bridging code including only 1 BVI per
>>>>> BD and it will be the last interface of a BD's flood list.  To support
>>>>> multiple BVIs per BD will make the code more complicated and less 
>>>>> efficient
>>>>> from performance point of view.
>>>>>
>>>>> 2. All interfaces, including BVI, in a BD can talk to each other via
>>>>> MAC address learning.  There is no concept of L3 IP address nor awareness
>>>>> of IPs in separate VRFs. Thus, the concept of multiple BVIs in a BD each 
>>>>> in
>>>>> different VRFs does not match the L2 bridging concept. While it may be
>>>>> possible to enhance BD support to understand IP and VRF at L3, it will
>>>>> again make the code more complicated and affect performance.
>>>>>
>>>>> My question would be, isn't it more natural to put each subnet in a
>>>>> separate BD with its BVI in the desired VRF?
>>>>>
>>>>> Regards,
>>>>> John
>>>>>
>>>>> -----Original Message-----
>>>>> From: lihuawei <lihuawei_...@163.com>
>>>>> Sent: Sunday, October 16, 2022 11:30 PM
>>>>> To: o...@cisco.com; fiva...@cisco.com; klement.sek...@gmail.com; Neale
>>>>> Ranns <ne...@graphiant.com>; lojultra2...@outlook.com;
>>>>> slu...@cisco.com; vpp-dev@lists.fd.io
>>>>> Subject: snat support bind to specific subnets
>>>>>
>>>>> Hi Ole, Filip, Klement, Neale, John, Steven, &Community,
>>>>>
>>>>> I have a demand about snat. With in a vpc, different subnets  need use
>>>>> different snat ip to the internet, but the vpp snat feature now do not
>>>>> support snat ip bind to specific subnets. I have two ideas to resolve 
>>>>> this:
>>>>> 1. modify and develop snat feature to support snat ip bind to specific
>>>>> subnets.
>>>>> 2. use multiple vrfs to isolate subnets, one vrf’s subnets use one
>>>>> snat ip, but the bd bvi now only support one in one bd, the non-bvi loop
>>>>> does not forward L3. So modify and develop bd bvi to support multiple bvi
>>>>> interfaces in one bd may be one better idea.
>>>>>
>>>>> Do I understand right and the idea 2 is the better? Anybody who has
>>>>> better idea, please help.
>>>>>
>>>>> Thanks and Regards,
>>>>> Huawei LI
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>
>>>
>>>
>>>
>>>
>>
>>
>>
>>
>>
>
>
> 
>
> --
Best regards,
Filip Varga
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#22094): https://lists.fd.io/g/vpp-dev/message/22094
Mute This Topic: https://lists.fd.io/mt/94377538/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/leave/1480452/21656/631435203/xyzzy 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to