2 * Copyright (c) 2018 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
20 #include <vnet/fib/fib_table.h>
22 #include <nat/lib/log.h>
23 #include <nat/lib/nat_inlines.h>
24 #include <nat/lib/ipfix_logging.h>
26 #include <nat/nat44-ed/nat44_ed.h>
27 #include <nat/nat44-ed/nat44_ed_inlines.h>
28 #include <nat/nat44-ed/nat44_ed_affinity.h>
30 #define NAT44_ED_EXPECTED_ARGUMENT "expected required argument(s)"
33 nat44_ed_enable_disable_command_fn (vlib_main_t *vm, unformat_input_t *input,
34 vlib_cli_command_t *cmd)
36 snat_main_t *sm = &snat_main;
37 unformat_input_t _line_input, *line_input = &_line_input;
38 clib_error_t *error = 0;
40 nat44_config_t c = { 0 };
41 u8 enable_set = 0, enable = 0, mode_set = 0;
43 if (!unformat_user (input, unformat_line_input, line_input))
44 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
46 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
48 if (!mode_set && unformat (line_input, "static-mapping-only"))
51 c.static_mapping_only = 1;
52 if (unformat (line_input, "connection-tracking"))
54 c.connection_tracking = 1;
57 else if (unformat (line_input, "inside-vrf %u", &c.inside_vrf));
58 else if (unformat (line_input, "outside-vrf %u", &c.outside_vrf));
59 else if (unformat (line_input, "sessions %u", &c.sessions));
63 if (unformat (line_input, "disable"))
65 else if (unformat (line_input, "enable"))
70 error = clib_error_return (0, "unknown input '%U'",
71 format_unformat_error, line_input);
78 error = clib_error_return (0, "expected enable | disable");
86 error = clib_error_return (0, "already enabled");
90 if (nat44_plugin_enable (c) != 0)
91 error = clib_error_return (0, "enable failed");
97 error = clib_error_return (0, "already disabled");
101 if (nat44_plugin_disable () != 0)
102 error = clib_error_return (0, "disable failed");
106 unformat_free (line_input);
110 static clib_error_t *
111 set_workers_command_fn (vlib_main_t * vm,
112 unformat_input_t * input, vlib_cli_command_t * cmd)
114 unformat_input_t _line_input, *line_input = &_line_input;
117 clib_error_t *error = 0;
119 /* Get a line of input. */
120 if (!unformat_user (input, unformat_line_input, line_input))
121 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
123 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
125 if (unformat (line_input, "%U", unformat_bitmap_list, &bitmap))
129 error = clib_error_return (0, "unknown input '%U'",
130 format_unformat_error, line_input);
137 error = clib_error_return (0, "List of workers must be specified.");
141 rv = snat_set_workers (bitmap);
143 clib_bitmap_free (bitmap);
147 case VNET_API_ERROR_INVALID_WORKER:
148 error = clib_error_return (0, "Invalid worker(s).");
150 case VNET_API_ERROR_FEATURE_DISABLED:
151 error = clib_error_return (0,
152 "Supported only if 2 or more workes available.");
159 unformat_free (line_input);
164 static clib_error_t *
165 nat_show_workers_commnad_fn (vlib_main_t * vm, unformat_input_t * input,
166 vlib_cli_command_t * cmd)
168 snat_main_t *sm = &snat_main;
171 if (sm->num_workers > 1)
173 vlib_cli_output (vm, "%d workers", vec_len (sm->workers));
174 vec_foreach (worker, sm->workers)
176 vlib_worker_thread_t *w =
177 vlib_worker_threads + *worker + sm->first_worker_index;
178 vlib_cli_output (vm, " %s", w->name);
185 static clib_error_t *
186 snat_set_log_level_command_fn (vlib_main_t * vm,
187 unformat_input_t * input,
188 vlib_cli_command_t * cmd)
190 unformat_input_t _line_input, *line_input = &_line_input;
191 snat_main_t *sm = &snat_main;
192 u8 log_level = NAT_LOG_NONE;
193 clib_error_t *error = 0;
195 /* Get a line of input. */
196 if (!unformat_user (input, unformat_line_input, line_input))
197 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
199 if (!unformat (line_input, "%d", &log_level))
201 error = clib_error_return (0, "unknown input '%U'",
202 format_unformat_error, line_input);
205 if (log_level > NAT_LOG_DEBUG)
207 error = clib_error_return (0, "unknown logging level '%d'", log_level);
210 sm->log_level = log_level;
213 unformat_free (line_input);
218 static clib_error_t *
219 snat_ipfix_logging_enable_disable_command_fn (vlib_main_t * vm,
220 unformat_input_t * input,
221 vlib_cli_command_t * cmd)
223 unformat_input_t _line_input, *line_input = &_line_input;
224 clib_error_t *error = 0;
226 u32 domain_id = 0, src_port = 0;
227 u8 enable_set = 0, enable = 0;
229 if (!unformat_user (input, unformat_line_input, line_input))
230 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
232 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
234 if (unformat (line_input, "domain %d", &domain_id))
236 else if (unformat (line_input, "src-port %d", &src_port))
238 else if (!enable_set)
241 if (unformat (line_input, "disable"))
243 else if (unformat (line_input, "enable"))
248 error = clib_error_return (0, "unknown input '%U'",
249 format_unformat_error, line_input);
256 error = clib_error_return (0, "expected enable | disable");
260 if (nat_ipfix_logging_enable_disable (enable, domain_id, (u16) src_port))
262 error = clib_error_return (0, "ipfix logging enable failed");
267 unformat_free (line_input);
272 static clib_error_t *
273 nat44_show_hash_command_fn (vlib_main_t * vm, unformat_input_t * input,
274 vlib_cli_command_t * cmd)
276 snat_main_t *sm = &snat_main;
277 nat_affinity_main_t *nam = &nat_affinity_main;
281 if (unformat (input, "detail"))
283 else if (unformat (input, "verbose"))
286 vlib_cli_output (vm, "%U", format_bihash_8_8, &sm->static_mapping_by_local,
288 vlib_cli_output (vm, "%U",
289 format_bihash_8_8, &sm->static_mapping_by_external,
291 vlib_cli_output (vm, "%U", format_bihash_16_8, &sm->flow_hash, verbose);
292 vec_foreach_index (i, sm->per_thread_data)
294 vlib_cli_output (vm, "-------- thread %d %s --------\n",
295 i, vlib_worker_threads[i].name);
296 vlib_cli_output (vm, "%U", format_bihash_16_8, &sm->flow_hash, verbose);
299 vlib_cli_output (vm, "%U", format_bihash_16_8, &nam->affinity_hash,
302 vlib_cli_output (vm, "-------- hash table parameters --------\n");
303 vlib_cli_output (vm, "translation buckets: %u", sm->translation_buckets);
307 static clib_error_t *
308 nat_set_mss_clamping_command_fn (vlib_main_t * vm, unformat_input_t * input,
309 vlib_cli_command_t * cmd)
311 unformat_input_t _line_input, *line_input = &_line_input;
312 snat_main_t *sm = &snat_main;
313 clib_error_t *error = 0;
316 /* Get a line of input. */
317 if (!unformat_user (input, unformat_line_input, line_input))
318 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
320 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
322 if (unformat (line_input, "disable"))
323 sm->mss_clamping = 0;
324 else if (unformat (line_input, "%d", &mss))
325 sm->mss_clamping = (u16) mss;
328 error = clib_error_return (0, "unknown input '%U'",
329 format_unformat_error, line_input);
335 unformat_free (line_input);
340 static clib_error_t *
341 nat_show_mss_clamping_command_fn (vlib_main_t * vm, unformat_input_t * input,
342 vlib_cli_command_t * cmd)
344 snat_main_t *sm = &snat_main;
346 if (sm->mss_clamping)
347 vlib_cli_output (vm, "mss-clamping %d", sm->mss_clamping);
349 vlib_cli_output (vm, "mss-clamping disabled");
354 static clib_error_t *
355 add_address_command_fn (vlib_main_t * vm,
356 unformat_input_t * input, vlib_cli_command_t * cmd)
358 unformat_input_t _line_input, *line_input = &_line_input;
359 snat_main_t *sm = &snat_main;
360 ip4_address_t start_addr, end_addr, this_addr;
361 u32 start_host_order, end_host_order;
366 clib_error_t *error = 0;
369 /* Get a line of input. */
370 if (!unformat_user (input, unformat_line_input, line_input))
371 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
373 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
375 if (unformat (line_input, "%U - %U",
376 unformat_ip4_address, &start_addr,
377 unformat_ip4_address, &end_addr))
379 else if (unformat (line_input, "tenant-vrf %u", &vrf_id))
381 else if (unformat (line_input, "%U", unformat_ip4_address, &start_addr))
382 end_addr = start_addr;
383 else if (unformat (line_input, "twice-nat"))
385 else if (unformat (line_input, "del"))
389 error = clib_error_return (0, "unknown input '%U'",
390 format_unformat_error, line_input);
395 if (sm->static_mapping_only)
397 error = clib_error_return (0, "static mapping only mode");
401 start_host_order = clib_host_to_net_u32 (start_addr.as_u32);
402 end_host_order = clib_host_to_net_u32 (end_addr.as_u32);
404 if (end_host_order < start_host_order)
406 error = clib_error_return (0, "end address less than start address");
410 count = (end_host_order - start_host_order) + 1;
413 nat_log_info ("%U - %U, %d addresses...",
414 format_ip4_address, &start_addr,
415 format_ip4_address, &end_addr, count);
417 this_addr = start_addr;
419 for (i = 0; i < count; i++)
422 rv = snat_add_address (sm, &this_addr, vrf_id, twice_nat);
424 rv = snat_del_address (sm, this_addr, 0, twice_nat);
428 case VNET_API_ERROR_VALUE_EXIST:
429 error = clib_error_return (0, "NAT address already in use.");
431 case VNET_API_ERROR_NO_SUCH_ENTRY:
432 error = clib_error_return (0, "NAT address not exist.");
434 case VNET_API_ERROR_UNSPECIFIED:
436 clib_error_return (0, "NAT address used in static mapping.");
442 increment_v4_address (&this_addr);
446 unformat_free (line_input);
452 nat44_show_lru_summary (vlib_main_t * vm, snat_main_per_thread_data_t * tsm,
453 u64 now, u64 sess_timeout_time)
455 snat_main_t *sm = &snat_main;
456 dlist_elt_t *oldest_elt;
464 clib_dlist_remove_head (tsm->lru_pool, tsm->n##_lru_head_index); \
465 if (~0 != oldest_index) \
467 oldest_elt = pool_elt_at_index (tsm->lru_pool, oldest_index); \
468 s = pool_elt_at_index (tsm->sessions, oldest_elt->value); \
469 sess_timeout_time = \
470 s->last_heard + (f64) nat44_session_get_timeout (sm, s); \
471 vlib_cli_output (vm, d " LRU min session timeout %llu (now %llu)", \
472 sess_timeout_time, now); \
473 clib_dlist_addhead (tsm->lru_pool, tsm->n##_lru_head_index, \
476 _ (tcp_estab, "established tcp");
477 _ (tcp_trans, "transitory tcp");
479 _ (unk_proto, "unknown protocol");
485 static clib_error_t *
486 nat44_show_summary_command_fn (vlib_main_t * vm, unformat_input_t * input,
487 vlib_cli_command_t * cmd)
489 snat_main_per_thread_data_t *tsm;
490 snat_main_t *sm = &snat_main;
495 u64 now = vlib_time_now (vm);
496 u64 sess_timeout_time = 0;
498 u32 udp_sessions = 0;
499 u32 tcp_sessions = 0;
500 u32 icmp_sessions = 0;
504 u32 transitory_wait_closed = 0;
505 u32 transitory_closed = 0;
510 for (fib = 0; fib < vec_len (sm->max_translations_per_fib); fib++)
511 vlib_cli_output (vm, "max translations per thread: %u fib %u",
512 sm->max_translations_per_fib[fib], fib);
514 if (sm->num_workers > 1)
516 vec_foreach (tsm, sm->per_thread_data)
518 pool_foreach (s, tsm->sessions)
520 sess_timeout_time = s->last_heard +
521 (f64) nat44_session_get_timeout (sm, s);
522 if (now >= sess_timeout_time)
525 switch (s->nat_proto)
527 case NAT_PROTOCOL_ICMP:
530 case NAT_PROTOCOL_TCP:
534 if (s->tcp_closed_timestamp)
536 if (now >= s->tcp_closed_timestamp)
542 ++transitory_wait_closed;
550 case NAT_PROTOCOL_UDP:
556 nat44_show_lru_summary (vm, tsm, now, sess_timeout_time);
557 count += pool_elts (tsm->sessions);
562 tsm = vec_elt_at_index (sm->per_thread_data, sm->num_workers);
563 pool_foreach (s, tsm->sessions)
565 sess_timeout_time = s->last_heard +
566 (f64) nat44_session_get_timeout (sm, s);
567 if (now >= sess_timeout_time)
570 switch (s->nat_proto)
572 case NAT_PROTOCOL_ICMP:
575 case NAT_PROTOCOL_TCP:
579 if (s->tcp_closed_timestamp)
581 if (now >= s->tcp_closed_timestamp)
587 ++transitory_wait_closed;
595 case NAT_PROTOCOL_UDP:
601 nat44_show_lru_summary (vm, tsm, now, sess_timeout_time);
602 count = pool_elts (tsm->sessions);
605 vlib_cli_output (vm, "total timed out sessions: %u", timed_out);
606 vlib_cli_output (vm, "total sessions: %u", count);
607 vlib_cli_output (vm, "total tcp sessions: %u", tcp_sessions);
608 vlib_cli_output (vm, "total tcp established sessions: %u", established);
609 vlib_cli_output (vm, "total tcp transitory sessions: %u", transitory);
610 vlib_cli_output (vm, "total tcp transitory (WAIT-CLOSED) sessions: %u",
611 transitory_wait_closed);
612 vlib_cli_output (vm, "total tcp transitory (CLOSED) sessions: %u",
614 vlib_cli_output (vm, "total udp sessions: %u", udp_sessions);
615 vlib_cli_output (vm, "total icmp sessions: %u", icmp_sessions);
619 static clib_error_t *
620 nat44_show_addresses_command_fn (vlib_main_t * vm, unformat_input_t * input,
621 vlib_cli_command_t * cmd)
623 snat_main_t *sm = &snat_main;
626 vlib_cli_output (vm, "NAT44 pool addresses:");
627 vec_foreach (ap, sm->addresses)
629 vlib_cli_output (vm, "%U", format_ip4_address, &ap->addr);
630 if (ap->fib_index != ~0)
631 vlib_cli_output (vm, " tenant VRF: %u",
632 fib_table_get(ap->fib_index, FIB_PROTOCOL_IP4)->ft_table_id);
634 vlib_cli_output (vm, " tenant VRF independent");
635 #define _(N, i, n, s) \
636 vlib_cli_output (vm, " %d busy %s ports", ap->busy_##n##_ports, s);
640 vlib_cli_output (vm, "NAT44 twice-nat pool addresses:");
641 vec_foreach (ap, sm->twice_nat_addresses)
643 vlib_cli_output (vm, "%U", format_ip4_address, &ap->addr);
644 if (ap->fib_index != ~0)
645 vlib_cli_output (vm, " tenant VRF: %u",
646 fib_table_get(ap->fib_index, FIB_PROTOCOL_IP4)->ft_table_id);
648 vlib_cli_output (vm, " tenant VRF independent");
649 #define _(N, i, n, s) \
650 vlib_cli_output (vm, " %d busy %s ports", ap->busy_##n##_ports, s);
657 static clib_error_t *
658 snat_feature_command_fn (vlib_main_t * vm,
659 unformat_input_t * input, vlib_cli_command_t * cmd)
661 unformat_input_t _line_input, *line_input = &_line_input;
662 vnet_main_t *vnm = vnet_get_main ();
663 clib_error_t *error = 0;
665 u32 *inside_sw_if_indices = 0;
666 u32 *outside_sw_if_indices = 0;
667 u8 is_output_feature = 0;
668 int i, rv, is_del = 0;
672 /* Get a line of input. */
673 if (!unformat_user (input, unformat_line_input, line_input))
674 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
676 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
678 if (unformat (line_input, "in %U", unformat_vnet_sw_interface,
680 vec_add1 (inside_sw_if_indices, sw_if_index);
681 else if (unformat (line_input, "out %U", unformat_vnet_sw_interface,
683 vec_add1 (outside_sw_if_indices, sw_if_index);
684 else if (unformat (line_input, "output-feature"))
685 is_output_feature = 1;
686 else if (unformat (line_input, "del"))
690 error = clib_error_return (0, "unknown input '%U'",
691 format_unformat_error, line_input);
696 if (vec_len (inside_sw_if_indices))
698 for (i = 0; i < vec_len (inside_sw_if_indices); i++)
700 sw_if_index = inside_sw_if_indices[i];
701 if (is_output_feature)
705 rv = nat44_ed_del_output_interface (sw_if_index);
709 rv = nat44_ed_add_output_interface (sw_if_index);
713 error = clib_error_return (0, "%s %U failed",
714 is_del ? "del" : "add",
715 format_vnet_sw_if_index_name,
724 rv = nat44_ed_del_interface (sw_if_index, 1);
728 rv = nat44_ed_add_interface (sw_if_index, 1);
732 error = clib_error_return (0, "%s %U failed",
733 is_del ? "del" : "add",
734 format_vnet_sw_if_index_name,
742 if (vec_len (outside_sw_if_indices))
744 for (i = 0; i < vec_len (outside_sw_if_indices); i++)
746 sw_if_index = outside_sw_if_indices[i];
747 if (is_output_feature)
751 rv = nat44_ed_del_output_interface (sw_if_index);
755 rv = nat44_ed_add_output_interface (sw_if_index);
759 error = clib_error_return (0, "%s %U failed",
760 is_del ? "del" : "add",
761 format_vnet_sw_if_index_name,
770 rv = nat44_ed_del_interface (sw_if_index, 0);
774 rv = nat44_ed_add_interface (sw_if_index, 0);
778 error = clib_error_return (0, "%s %U failed",
779 is_del ? "del" : "add",
780 format_vnet_sw_if_index_name,
789 unformat_free (line_input);
790 vec_free (inside_sw_if_indices);
791 vec_free (outside_sw_if_indices);
796 static clib_error_t *
797 nat44_show_interfaces_command_fn (vlib_main_t * vm, unformat_input_t * input,
798 vlib_cli_command_t * cmd)
800 snat_main_t *sm = &snat_main;
802 vnet_main_t *vnm = vnet_get_main ();
804 vlib_cli_output (vm, "NAT44 interfaces:");
805 pool_foreach (i, sm->interfaces)
807 vlib_cli_output (vm, " %U %s", format_vnet_sw_if_index_name, vnm,
809 (nat_interface_is_inside(i) &&
810 nat_interface_is_outside(i)) ? "in out" :
811 (nat_interface_is_inside(i) ? "in" : "out"));
814 pool_foreach (i, sm->output_feature_interfaces)
816 vlib_cli_output (vm, " %U output-feature %s",
817 format_vnet_sw_if_index_name, vnm,
819 (nat_interface_is_inside(i) &&
820 nat_interface_is_outside(i)) ? "in out" :
821 (nat_interface_is_inside(i) ? "in" : "out"));
827 static clib_error_t *
828 add_static_mapping_command_fn (vlib_main_t * vm,
829 unformat_input_t * input,
830 vlib_cli_command_t * cmd)
832 unformat_input_t _line_input, *line_input = &_line_input;
833 clib_error_t *error = 0;
834 ip4_address_t l_addr, e_addr, exact_addr;
835 u32 l_port = 0, e_port = 0, vrf_id = ~0;
836 int is_add = 1, addr_only = 1, rv, exact = 0;
837 u32 sw_if_index = ~0;
838 vnet_main_t *vnm = vnet_get_main ();
839 nat_protocol_t proto = NAT_PROTOCOL_OTHER;
841 twice_nat_type_t twice_nat = TWICE_NAT_DISABLED;
844 /* Get a line of input. */
845 if (!unformat_user (input, unformat_line_input, line_input))
846 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
848 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
850 if (unformat (line_input, "local %U %u", unformat_ip4_address, &l_addr,
854 if (unformat (line_input, "local %U", unformat_ip4_address, &l_addr))
856 else if (unformat (line_input, "external %U %u", unformat_ip4_address,
859 else if (unformat (line_input, "external %U", unformat_ip4_address,
862 else if (unformat (line_input, "external %U %u",
863 unformat_vnet_sw_interface, vnm, &sw_if_index,
866 else if (unformat (line_input, "external %U",
867 unformat_vnet_sw_interface, vnm, &sw_if_index))
869 else if (unformat (line_input, "exact %U", unformat_ip4_address,
872 else if (unformat (line_input, "vrf %u", &vrf_id))
874 else if (unformat (line_input, "%U", unformat_nat_protocol, &proto))
876 else if (unformat (line_input, "twice-nat"))
877 twice_nat = TWICE_NAT;
878 else if (unformat (line_input, "self-twice-nat"))
879 twice_nat = TWICE_NAT_SELF;
880 else if (unformat (line_input, "out2in-only"))
882 else if (unformat (line_input, "del"))
886 error = clib_error_return (0, "unknown input: '%U'",
887 format_unformat_error, line_input);
892 if (twice_nat && addr_only)
894 error = clib_error_return (0, "twice NAT only for 1:1 NAPT");
903 clib_error_return (0,
904 "address only mapping doesn't support protocol");
910 error = clib_error_return (0, "protocol is required");
914 rv = snat_add_static_mapping (
915 l_addr, e_addr, clib_host_to_net_u16 (l_port),
916 clib_host_to_net_u16 (e_port), vrf_id, addr_only, sw_if_index, proto,
917 is_add, twice_nat, out2in_only, 0, 0, exact_addr, exact);
921 case VNET_API_ERROR_INVALID_VALUE:
922 error = clib_error_return (0, "External port already in use.");
924 case VNET_API_ERROR_NO_SUCH_ENTRY:
926 error = clib_error_return (0, "External address must be allocated.");
928 error = clib_error_return (0, "Mapping not exist.");
930 case VNET_API_ERROR_NO_SUCH_FIB:
931 error = clib_error_return (0, "No such VRF id.");
933 case VNET_API_ERROR_VALUE_EXIST:
934 error = clib_error_return (0, "Mapping already exist.");
941 unformat_free (line_input);
946 static clib_error_t *
947 add_identity_mapping_command_fn (vlib_main_t * vm,
948 unformat_input_t * input,
949 vlib_cli_command_t * cmd)
951 unformat_input_t _line_input, *line_input = &_line_input;
952 clib_error_t *error = 0;
953 ip4_address_t addr, pool_addr = { 0 };
954 u32 port = 0, vrf_id = ~0;
957 u32 sw_if_index = ~0;
958 vnet_main_t *vnm = vnet_get_main ();
960 nat_protocol_t proto;
964 /* Get a line of input. */
965 if (!unformat_user (input, unformat_line_input, line_input))
966 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
968 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
970 if (unformat (line_input, "%U", unformat_ip4_address, &addr))
972 else if (unformat (line_input, "external %U",
973 unformat_vnet_sw_interface, vnm, &sw_if_index))
975 else if (unformat (line_input, "vrf %u", &vrf_id))
977 else if (unformat (line_input, "%U %u", unformat_nat_protocol, &proto,
980 else if (unformat (line_input, "del"))
984 error = clib_error_return (0, "unknown input: '%U'",
985 format_unformat_error, line_input);
990 rv = snat_add_static_mapping (
991 addr, addr, clib_host_to_net_u16 (port), clib_host_to_net_u16 (port),
992 vrf_id, addr_only, sw_if_index, proto, is_add, 0, 0, 0, 1, pool_addr, 0);
996 case VNET_API_ERROR_INVALID_VALUE:
997 error = clib_error_return (0, "External port already in use.");
999 case VNET_API_ERROR_NO_SUCH_ENTRY:
1001 error = clib_error_return (0, "External address must be allocated.");
1003 error = clib_error_return (0, "Mapping not exist.");
1005 case VNET_API_ERROR_NO_SUCH_FIB:
1006 error = clib_error_return (0, "No such VRF id.");
1008 case VNET_API_ERROR_VALUE_EXIST:
1009 error = clib_error_return (0, "Mapping already exist.");
1016 unformat_free (line_input);
1021 static clib_error_t *
1022 add_lb_static_mapping_command_fn (vlib_main_t * vm,
1023 unformat_input_t * input,
1024 vlib_cli_command_t * cmd)
1026 unformat_input_t _line_input, *line_input = &_line_input;
1027 clib_error_t *error = 0;
1028 ip4_address_t l_addr, e_addr;
1029 u32 l_port = 0, e_port = 0, vrf_id = 0, probability = 0, affinity = 0;
1032 nat_protocol_t proto;
1034 nat44_lb_addr_port_t *locals = 0, local;
1035 twice_nat_type_t twice_nat = TWICE_NAT_DISABLED;
1038 /* Get a line of input. */
1039 if (!unformat_user (input, unformat_line_input, line_input))
1040 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1042 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1044 if (unformat (line_input, "local %U:%u probability %u",
1045 unformat_ip4_address, &l_addr, &l_port, &probability))
1047 clib_memset (&local, 0, sizeof (local));
1048 local.addr = l_addr;
1049 local.port = (u16) l_port;
1050 local.probability = (u8) probability;
1051 vec_add1 (locals, local);
1053 else if (unformat (line_input, "local %U:%u vrf %u probability %u",
1054 unformat_ip4_address, &l_addr, &l_port, &vrf_id,
1057 clib_memset (&local, 0, sizeof (local));
1058 local.addr = l_addr;
1059 local.port = (u16) l_port;
1060 local.probability = (u8) probability;
1061 local.vrf_id = vrf_id;
1062 vec_add1 (locals, local);
1064 else if (unformat (line_input, "external %U:%u", unformat_ip4_address,
1067 else if (unformat (line_input, "protocol %U", unformat_nat_protocol,
1070 else if (unformat (line_input, "twice-nat"))
1071 twice_nat = TWICE_NAT;
1072 else if (unformat (line_input, "self-twice-nat"))
1073 twice_nat = TWICE_NAT_SELF;
1074 else if (unformat (line_input, "out2in-only"))
1076 else if (unformat (line_input, "del"))
1078 else if (unformat (line_input, "affinity %u", &affinity))
1082 error = clib_error_return (0, "unknown input: '%U'",
1083 format_unformat_error, line_input);
1088 if (vec_len (locals) < 2)
1090 error = clib_error_return (0, "at least two local must be set");
1096 error = clib_error_return (0, "missing protocol");
1100 rv = nat44_add_del_lb_static_mapping (e_addr, (u16) e_port, proto, locals,
1101 is_add, twice_nat, out2in_only, 0,
1106 case VNET_API_ERROR_INVALID_VALUE:
1107 error = clib_error_return (0, "External port already in use.");
1109 case VNET_API_ERROR_NO_SUCH_ENTRY:
1111 error = clib_error_return (0, "External address must be allocated.");
1113 error = clib_error_return (0, "Mapping not exist.");
1115 case VNET_API_ERROR_VALUE_EXIST:
1116 error = clib_error_return (0, "Mapping already exist.");
1123 unformat_free (line_input);
1129 static clib_error_t *
1130 add_lb_backend_command_fn (vlib_main_t * vm,
1131 unformat_input_t * input, vlib_cli_command_t * cmd)
1133 unformat_input_t _line_input, *line_input = &_line_input;
1134 clib_error_t *error = 0;
1135 ip4_address_t l_addr, e_addr;
1136 u32 l_port = 0, e_port = 0, vrf_id = 0, probability = 0;
1139 nat_protocol_t proto;
1142 /* Get a line of input. */
1143 if (!unformat_user (input, unformat_line_input, line_input))
1144 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1146 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1148 if (unformat (line_input, "local %U:%u probability %u",
1149 unformat_ip4_address, &l_addr, &l_port, &probability))
1151 else if (unformat (line_input, "local %U:%u vrf %u probability %u",
1152 unformat_ip4_address, &l_addr, &l_port, &vrf_id,
1155 else if (unformat (line_input, "external %U:%u", unformat_ip4_address,
1158 else if (unformat (line_input, "protocol %U", unformat_nat_protocol,
1161 else if (unformat (line_input, "del"))
1165 error = clib_error_return (0, "unknown input: '%U'",
1166 format_unformat_error, line_input);
1171 if (!l_port || !e_port)
1173 error = clib_error_return (0, "local or external must be set");
1179 error = clib_error_return (0, "missing protocol");
1184 nat44_lb_static_mapping_add_del_local (e_addr, (u16) e_port, l_addr,
1185 l_port, proto, vrf_id, probability,
1190 case VNET_API_ERROR_INVALID_VALUE:
1191 error = clib_error_return (0, "External is not load-balancing static "
1194 case VNET_API_ERROR_NO_SUCH_ENTRY:
1195 error = clib_error_return (0, "Mapping or back-end not exist.");
1197 case VNET_API_ERROR_VALUE_EXIST:
1198 error = clib_error_return (0, "Back-end already exist.");
1200 case VNET_API_ERROR_UNSPECIFIED:
1201 error = clib_error_return (0, "At least two back-ends must remain");
1208 unformat_free (line_input);
1213 static clib_error_t *
1214 nat44_show_static_mappings_command_fn (vlib_main_t * vm,
1215 unformat_input_t * input,
1216 vlib_cli_command_t * cmd)
1218 snat_main_t *sm = &snat_main;
1219 snat_static_mapping_t *m;
1220 snat_static_map_resolve_t *rp;
1222 vlib_cli_output (vm, "NAT44 static mappings:");
1223 pool_foreach (m, sm->static_mappings)
1225 vlib_cli_output (vm, " %U", format_snat_static_mapping, m);
1227 vec_foreach (rp, sm->to_resolve)
1228 vlib_cli_output (vm, " %U", format_snat_static_map_to_resolve, rp);
1233 static clib_error_t *
1234 snat_add_interface_address_command_fn (vlib_main_t * vm,
1235 unformat_input_t * input,
1236 vlib_cli_command_t * cmd)
1238 snat_main_t *sm = &snat_main;
1239 unformat_input_t _line_input, *line_input = &_line_input;
1243 clib_error_t *error = 0;
1246 /* Get a line of input. */
1247 if (!unformat_user (input, unformat_line_input, line_input))
1248 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1250 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1252 if (unformat (line_input, "%U", unformat_vnet_sw_interface,
1253 sm->vnet_main, &sw_if_index))
1255 else if (unformat (line_input, "twice-nat"))
1257 else if (unformat (line_input, "del"))
1261 error = clib_error_return (0, "unknown input '%U'",
1262 format_unformat_error, line_input);
1267 rv = snat_add_interface_address (sm, sw_if_index, is_del, twice_nat);
1275 error = clib_error_return (0, "snat_add_interface_address returned %d",
1281 unformat_free (line_input);
1286 static clib_error_t *
1287 nat44_show_interface_address_command_fn (vlib_main_t * vm,
1288 unformat_input_t * input,
1289 vlib_cli_command_t * cmd)
1291 snat_main_t *sm = &snat_main;
1292 vnet_main_t *vnm = vnet_get_main ();
1295 vlib_cli_output (vm, "NAT44 pool address interfaces:");
1296 vec_foreach (sw_if_index, sm->auto_add_sw_if_indices)
1298 vlib_cli_output (vm, " %U", format_vnet_sw_if_index_name, vnm,
1301 vlib_cli_output (vm, "NAT44 twice-nat pool address interfaces:");
1302 vec_foreach (sw_if_index, sm->auto_add_sw_if_indices_twice_nat)
1304 vlib_cli_output (vm, " %U", format_vnet_sw_if_index_name, vnm,
1311 static clib_error_t *
1312 nat44_show_sessions_command_fn (vlib_main_t * vm, unformat_input_t * input,
1313 vlib_cli_command_t * cmd)
1315 unformat_input_t _line_input, *line_input = &_line_input;
1316 clib_error_t *error = 0;
1317 snat_main_per_thread_data_t *tsm;
1318 snat_main_t *sm = &snat_main;
1322 if (!unformat_user (input, unformat_line_input, line_input))
1325 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1327 error = clib_error_return (0, "unknown input '%U'",
1328 format_unformat_error, line_input);
1331 unformat_free (line_input);
1334 vlib_cli_output (vm, "NAT44 ED sessions:");
1336 vec_foreach_index (i, sm->per_thread_data)
1338 tsm = vec_elt_at_index (sm->per_thread_data, i);
1340 vlib_cli_output (vm, "-------- thread %d %s: %d sessions --------\n",
1341 i, vlib_worker_threads[i].name,
1342 pool_elts (tsm->sessions));
1345 pool_foreach (s, tsm->sessions)
1347 vlib_cli_output (vm, " %U\n", format_snat_session, tsm, s);
1353 static clib_error_t *
1354 nat44_set_session_limit_command_fn (vlib_main_t * vm,
1355 unformat_input_t * input,
1356 vlib_cli_command_t * cmd)
1358 unformat_input_t _line_input, *line_input = &_line_input;
1359 clib_error_t *error = 0;
1361 u32 session_limit = 0, vrf_id = 0;
1363 if (!unformat_user (input, unformat_line_input, line_input))
1364 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1366 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1368 if (unformat (line_input, "%u", &session_limit))
1370 else if (unformat (line_input, "vrf %u", &vrf_id))
1374 error = clib_error_return (0, "unknown input '%U'",
1375 format_unformat_error, line_input);
1381 error = clib_error_return (0, "missing value of session limit");
1382 else if (nat44_update_session_limit (session_limit, vrf_id))
1383 error = clib_error_return (0, "nat44_set_session_limit failed");
1386 unformat_free (line_input);
1391 static clib_error_t *
1392 nat44_del_session_command_fn (vlib_main_t * vm,
1393 unformat_input_t * input,
1394 vlib_cli_command_t * cmd)
1396 snat_main_t *sm = &snat_main;
1397 unformat_input_t _line_input, *line_input = &_line_input;
1398 u32 port = 0, eh_port = 0, vrf_id = sm->outside_vrf_id;
1399 clib_error_t *error = 0;
1400 ip4_address_t addr, eh_addr;
1401 nat_protocol_t proto;
1405 if (!unformat_user (input, unformat_line_input, line_input))
1406 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1408 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1411 (line_input, "%U:%u %U", unformat_ip4_address, &addr, &port,
1412 unformat_nat_protocol, &proto))
1414 else if (unformat (line_input, "in"))
1417 vrf_id = sm->inside_vrf_id;
1419 else if (unformat (line_input, "out"))
1422 vrf_id = sm->outside_vrf_id;
1424 else if (unformat (line_input, "vrf %u", &vrf_id))
1426 else if (unformat (line_input, "external-host %U:%u",
1427 unformat_ip4_address, &eh_addr, &eh_port))
1431 error = clib_error_return (0, "unknown input '%U'",
1432 format_unformat_error, line_input);
1438 nat44_del_ed_session (sm, &addr, clib_host_to_net_u16 (port), &eh_addr,
1439 clib_host_to_net_u16 (eh_port),
1440 nat_proto_to_ip_proto (proto), vrf_id, is_in);
1448 error = clib_error_return (0, "nat44_del_session returned %d", rv);
1453 unformat_free (line_input);
1458 static clib_error_t *
1459 snat_forwarding_set_command_fn (vlib_main_t * vm,
1460 unformat_input_t * input,
1461 vlib_cli_command_t * cmd)
1463 snat_main_t *sm = &snat_main;
1464 unformat_input_t _line_input, *line_input = &_line_input;
1465 clib_error_t *error = 0;
1467 u8 enable_set = 0, enable = 0;
1469 if (!unformat_user (input, unformat_line_input, line_input))
1470 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1472 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1477 if (unformat (line_input, "disable"))
1479 else if (unformat (line_input, "enable"))
1484 error = clib_error_return (0, "unknown input '%U'",
1485 format_unformat_error, line_input);
1491 error = clib_error_return (0, "expected enable | disable");
1493 sm->forwarding_enabled = enable;
1496 unformat_free (line_input);
1500 static clib_error_t *
1501 set_timeout_command_fn (vlib_main_t * vm,
1502 unformat_input_t * input, vlib_cli_command_t * cmd)
1504 snat_main_t *sm = &snat_main;
1505 unformat_input_t _line_input, *line_input = &_line_input;
1506 clib_error_t *error = 0;
1508 if (!unformat_user (input, unformat_line_input, line_input))
1509 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1511 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1513 if (unformat (line_input, "udp %u", &sm->timeouts.udp));
1514 else if (unformat (line_input, "tcp-established %u",
1515 &sm->timeouts.tcp.established));
1516 else if (unformat (line_input, "tcp-transitory %u",
1517 &sm->timeouts.tcp.transitory));
1518 else if (unformat (line_input, "icmp %u", &sm->timeouts.icmp));
1519 else if (unformat (line_input, "reset"))
1520 nat_reset_timeouts (&sm->timeouts);
1523 error = clib_error_return (0, "unknown input '%U'",
1524 format_unformat_error, line_input);
1529 unformat_free (line_input);
1533 static clib_error_t *
1534 nat_show_timeouts_command_fn (vlib_main_t * vm,
1535 unformat_input_t * input,
1536 vlib_cli_command_t * cmd)
1538 snat_main_t *sm = &snat_main;
1540 vlib_cli_output (vm, "udp timeout: %dsec", sm->timeouts.udp);
1541 vlib_cli_output (vm, "tcp-established timeout: %dsec",
1542 sm->timeouts.tcp.established);
1543 vlib_cli_output (vm, "tcp-transitory timeout: %dsec",
1544 sm->timeouts.tcp.transitory);
1545 vlib_cli_output (vm, "icmp timeout: %dsec", sm->timeouts.icmp);
1550 static clib_error_t *
1551 set_frame_queue_nelts_command_fn (vlib_main_t *vm, unformat_input_t *input,
1552 vlib_cli_command_t *cmd)
1554 unformat_input_t _line_input, *line_input = &_line_input;
1555 clib_error_t *error = 0;
1556 u32 frame_queue_nelts = 0;
1558 if (!unformat_user (input, unformat_line_input, line_input))
1559 return clib_error_return (0, NAT44_ED_EXPECTED_ARGUMENT);
1561 while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
1563 if (unformat (line_input, "%u", &frame_queue_nelts))
1567 error = clib_error_return (0, "unknown input '%U'",
1568 format_unformat_error, line_input);
1572 if (!frame_queue_nelts)
1574 error = clib_error_return (0, "frame_queue_nelts cannot be zero");
1577 if (nat44_ed_set_frame_queue_nelts (frame_queue_nelts) != 0)
1579 error = clib_error_return (0, "snat_set_frame_queue_nelts failed");
1583 unformat_free (line_input);
1589 * @cliexstart{nat44}
1590 * Enable nat44 plugin
1591 * To enable nat44-ed, use:
1593 * To disable nat44-ed, use:
1594 * vpp# nat44 disable
1595 * To enable nat44-ed static mapping with connection tracking, use:
1596 * vpp# nat44-ed enable static-mapping connection-tracking
1597 * To set inside-vrf outside-vrf, use:
1598 * vpp# nat44 enable inside-vrf <id> outside-vrf <id>
1601 VLIB_CLI_COMMAND (nat44_ed_enable_disable_command, static) = {
1603 .short_help = "nat44 <enable [sessions <max-number>] [static-mapping-only "
1604 "connection-tracking] [inside-vrf <vrf-id>] "
1605 "[outside-vrf <vrf-id>]>|disable",
1606 .function = nat44_ed_enable_disable_command_fn,
1611 * @cliexstart{set snat workers}
1612 * Set NAT workers if 2 or more workers available, use:
1613 * vpp# set snat workers 0-2,5
1616 VLIB_CLI_COMMAND (set_workers_command, static) = {
1617 .path = "set nat workers",
1618 .function = set_workers_command_fn,
1619 .short_help = "set nat workers <workers-list>",
1624 * @cliexstart{show nat workers}
1626 * vpp# show nat workers:
1632 VLIB_CLI_COMMAND (nat_show_workers_command, static) = {
1633 .path = "show nat workers",
1634 .short_help = "show nat workers",
1635 .function = nat_show_workers_commnad_fn,
1640 * @cliexstart{set nat timeout}
1641 * Set values of timeouts for NAT sessions (in seconds), use:
1642 * vpp# set nat timeout udp 120 tcp-established 7500 tcp-transitory 250 icmp 90
1643 * To reset default values use:
1644 * vpp# set nat timeout reset
1647 VLIB_CLI_COMMAND (set_timeout_command, static) = {
1648 .path = "set nat timeout",
1649 .function = set_timeout_command_fn,
1651 "set nat timeout [udp <sec> | tcp-established <sec> "
1652 "tcp-transitory <sec> | icmp <sec> | reset]",
1657 * @cliexstart{show nat timeouts}
1658 * Show values of timeouts for NAT sessions.
1659 * vpp# show nat timeouts
1660 * udp timeout: 300sec
1661 * tcp-established timeout: 7440sec
1662 * tcp-transitory timeout: 240sec
1663 * icmp timeout: 60sec
1666 VLIB_CLI_COMMAND (nat_show_timeouts_command, static) = {
1667 .path = "show nat timeouts",
1668 .short_help = "show nat timeouts",
1669 .function = nat_show_timeouts_command_fn,
1674 * @cliexstart{set nat frame-queue-nelts}
1675 * Set number of worker handoff frame queue elements.
1678 VLIB_CLI_COMMAND (set_frame_queue_nelts_command, static) = {
1679 .path = "set nat frame-queue-nelts",
1680 .function = set_frame_queue_nelts_command_fn,
1681 .short_help = "set nat frame-queue-nelts <number>",
1686 * @cliexstart{nat set logging level}
1687 * To set NAT logging level use:
1688 * Set nat logging level
1691 VLIB_CLI_COMMAND (snat_set_log_level_command, static) = {
1692 .path = "nat set logging level",
1693 .function = snat_set_log_level_command_fn,
1694 .short_help = "nat set logging level <level>",
1699 * @cliexstart{snat ipfix logging}
1700 * To enable NAT IPFIX logging use:
1701 * vpp# nat ipfix logging
1702 * To set IPFIX exporter use:
1703 * vpp# set ipfix exporter collector 10.10.10.3 src 10.10.10.1
1706 VLIB_CLI_COMMAND (snat_ipfix_logging_enable_disable_command, static) = {
1707 .path = "nat ipfix logging",
1708 .function = snat_ipfix_logging_enable_disable_command_fn,
1709 .short_help = "nat ipfix logging disable|<enable [domain <domain-id>] "
1710 "[src-port <port>]>",
1715 * @cliexstart{nat mss-clamping}
1716 * Set TCP MSS rewriting configuration
1717 * To enable TCP MSS rewriting use:
1718 * vpp# nat mss-clamping 1452
1719 * To disbale TCP MSS rewriting use:
1720 * vpp# nat mss-clamping disable
1723 VLIB_CLI_COMMAND (nat_set_mss_clamping_command, static) = {
1724 .path = "nat mss-clamping",
1725 .short_help = "nat mss-clamping <mss-value>|disable",
1726 .function = nat_set_mss_clamping_command_fn,
1731 * @cliexstart{show nat mss-clamping}
1732 * Show TCP MSS rewriting configuration
1735 VLIB_CLI_COMMAND (nat_show_mss_clamping_command, static) = {
1736 .path = "show nat mss-clamping",
1737 .short_help = "show nat mss-clamping",
1738 .function = nat_show_mss_clamping_command_fn,
1743 * @cliexstart{show nat44 hash tables}
1744 * Show NAT44 hash tables
1747 VLIB_CLI_COMMAND (nat44_show_hash, static) = {
1748 .path = "show nat44 hash tables",
1749 .short_help = "show nat44 hash tables [detail|verbose]",
1750 .function = nat44_show_hash_command_fn,
1755 * @cliexstart{nat44 add address}
1756 * Add/delete NAT44 pool address.
1757 * To add NAT44 pool address use:
1758 * vpp# nat44 add address 172.16.1.3
1759 * vpp# nat44 add address 172.16.2.2 - 172.16.2.24
1760 * To add NAT44 pool address for specific tenant (identified by VRF id) use:
1761 * vpp# nat44 add address 172.16.1.3 tenant-vrf 10
1764 VLIB_CLI_COMMAND (add_address_command, static) = {
1765 .path = "nat44 add address",
1766 .short_help = "nat44 add address <ip4-range-start> [- <ip4-range-end>] "
1767 "[tenant-vrf <vrf-id>] [twice-nat] [del]",
1768 .function = add_address_command_fn,
1773 * @cliexstart{show nat44 summary}
1774 * Show NAT44 summary
1775 * vpp# show nat44 summary
1778 VLIB_CLI_COMMAND (nat44_show_summary_command, static) = {
1779 .path = "show nat44 summary",
1780 .short_help = "show nat44 summary",
1781 .function = nat44_show_summary_command_fn,
1786 * @cliexstart{show nat44 addresses}
1787 * Show NAT44 pool addresses.
1788 * vpp# show nat44 addresses
1789 * NAT44 pool addresses:
1791 * tenant VRF independent
1800 * NAT44 twice-nat pool addresses:
1802 * tenant VRF independent
1808 VLIB_CLI_COMMAND (nat44_show_addresses_command, static) = {
1809 .path = "show nat44 addresses",
1810 .short_help = "show nat44 addresses",
1811 .function = nat44_show_addresses_command_fn,
1816 * @cliexstart{set interface nat44}
1817 * Enable/disable NAT44 feature on the interface.
1818 * To enable NAT44 feature with local network interface use:
1819 * vpp# set interface nat44 in GigabitEthernet0/8/0
1820 * To enable NAT44 feature with external network interface use:
1821 * vpp# set interface nat44 out GigabitEthernet0/a/0
1824 VLIB_CLI_COMMAND (set_interface_snat_command, static) = {
1825 .path = "set interface nat44",
1826 .function = snat_feature_command_fn,
1827 .short_help = "set interface nat44 in <intfc> out <intfc> [output-feature] "
1833 * @cliexstart{show nat44 interfaces}
1834 * Show interfaces with NAT44 feature.
1835 * vpp# show nat44 interfaces
1837 * GigabitEthernet0/8/0 in
1838 * GigabitEthernet0/a/0 out
1841 VLIB_CLI_COMMAND (nat44_show_interfaces_command, static) = {
1842 .path = "show nat44 interfaces",
1843 .short_help = "show nat44 interfaces",
1844 .function = nat44_show_interfaces_command_fn,
1849 * @cliexstart{nat44 add static mapping}
1850 * Static mapping allows hosts on the external network to initiate connection
1851 * to to the local network host.
1852 * To create static mapping between local host address 10.0.0.3 port 6303 and
1853 * external address 4.4.4.4 port 3606 for TCP protocol use:
1854 * vpp# nat44 add static mapping tcp local 10.0.0.3 6303 external 4.4.4.4 3606
1855 * If not runnig "static mapping only" NAT plugin mode use before:
1856 * vpp# nat44 add address 4.4.4.4
1857 * To create address only static mapping between local and external address use:
1858 * vpp# nat44 add static mapping local 10.0.0.3 external 4.4.4.4
1859 * To create ICMP static mapping between local and external with ICMP echo
1860 * identifier 10 use:
1861 * vpp# nat44 add static mapping icmp local 10.0.0.3 10 external 4.4.4.4 10
1862 * To force use of specific pool address, vrf independent
1863 * vpp# nat44 add static mapping local 10.0.0.2 1234 external 10.0.2.2 1234 twice-nat exact 10.0.1.2
1866 VLIB_CLI_COMMAND (add_static_mapping_command, static) = {
1867 .path = "nat44 add static mapping",
1868 .function = add_static_mapping_command_fn,
1870 "nat44 add static mapping tcp|udp|icmp local <addr> [<port|icmp-echo-id>] "
1871 "external <addr> [<port|icmp-echo-id>] [vrf <table-id>] [twice-nat|self-twice-nat] "
1872 "[out2in-only] [exact <pool-addr>] [del]",
1877 * @cliexstart{nat44 add identity mapping}
1878 * Identity mapping translate an IP address to itself.
1879 * To create identity mapping for address 10.0.0.3 port 6303 for TCP protocol
1881 * vpp# nat44 add identity mapping 10.0.0.3 tcp 6303
1882 * To create identity mapping for address 10.0.0.3 use:
1883 * vpp# nat44 add identity mapping 10.0.0.3
1884 * To create identity mapping for DHCP addressed interface use:
1885 * vpp# nat44 add identity mapping external GigabitEthernet0/a/0 tcp 3606
1888 VLIB_CLI_COMMAND (add_identity_mapping_command, static) = {
1889 .path = "nat44 add identity mapping",
1890 .function = add_identity_mapping_command_fn,
1891 .short_help = "nat44 add identity mapping <ip4-addr>|external <interface> "
1892 "[<protocol> <port>] [vrf <table-id>] [del]",
1897 * @cliexstart{nat44 add load-balancing static mapping}
1898 * Service load balancing using NAT44
1899 * To add static mapping with load balancing for service with external IP
1900 * address 1.2.3.4 and TCP port 80 and mapped to 2 local servers
1901 * 10.100.10.10:8080 and 10.100.10.20:8080 with probability 80% resp. 20% use:
1902 * vpp# nat44 add load-balancing static mapping protocol tcp external 1.2.3.4:80 local 10.100.10.10:8080 probability 80 local 10.100.10.20:8080 probability 20
1905 VLIB_CLI_COMMAND (add_lb_static_mapping_command, static) = {
1906 .path = "nat44 add load-balancing static mapping",
1907 .function = add_lb_static_mapping_command_fn,
1909 "nat44 add load-balancing static mapping protocol tcp|udp "
1910 "external <addr>:<port> local <addr>:<port> [vrf <table-id>] "
1911 "probability <n> [twice-nat|self-twice-nat] [out2in-only] "
1912 "[affinity <timeout-seconds>] [del]",
1917 * @cliexstart{nat44 add load-balancing static mapping}
1918 * Modify service load balancing using NAT44
1919 * To add new back-end server 10.100.10.30:8080 for service load balancing
1920 * static mapping with external IP address 1.2.3.4 and TCP port 80 use:
1921 * vpp# nat44 add load-balancing back-end protocol tcp external 1.2.3.4:80 local 10.100.10.30:8080 probability 25
1924 VLIB_CLI_COMMAND (add_lb_backend_command, static) = {
1925 .path = "nat44 add load-balancing back-end",
1926 .function = add_lb_backend_command_fn,
1928 "nat44 add load-balancing back-end protocol tcp|udp "
1929 "external <addr>:<port> local <addr>:<port> [vrf <table-id>] "
1930 "probability <n> [del]",
1935 * @cliexstart{show nat44 static mappings}
1936 * Show NAT44 static mappings.
1937 * vpp# show nat44 static mappings
1938 * NAT44 static mappings:
1939 * local 10.0.0.3 external 4.4.4.4 vrf 0
1940 * tcp local 192.168.0.4:6303 external 4.4.4.3:3606 vrf 0
1941 * tcp vrf 0 external 1.2.3.4:80 out2in-only
1942 * local 10.100.10.10:8080 probability 80
1943 * local 10.100.10.20:8080 probability 20
1944 * tcp local 10.100.3.8:8080 external 169.10.10.1:80 vrf 0 twice-nat
1945 * tcp local 10.0.0.10:3603 external GigabitEthernet0/a/0:6306 vrf 10
1948 VLIB_CLI_COMMAND (nat44_show_static_mappings_command, static) = {
1949 .path = "show nat44 static mappings",
1950 .short_help = "show nat44 static mappings",
1951 .function = nat44_show_static_mappings_command_fn,
1956 * @cliexstart{nat44 add interface address}
1957 * Use NAT44 pool address from specific interfce
1958 * To add NAT44 pool address from specific interface use:
1959 * vpp# nat44 add interface address GigabitEthernet0/8/0
1962 VLIB_CLI_COMMAND (snat_add_interface_address_command, static) = {
1963 .path = "nat44 add interface address",
1964 .short_help = "nat44 add interface address <interface> [twice-nat] [del]",
1965 .function = snat_add_interface_address_command_fn,
1970 * @cliexstart{show nat44 interface address}
1971 * Show NAT44 pool address interfaces
1972 * vpp# show nat44 interface address
1973 * NAT44 pool address interfaces:
1974 * GigabitEthernet0/a/0
1975 * NAT44 twice-nat pool address interfaces:
1976 * GigabitEthernet0/8/0
1979 VLIB_CLI_COMMAND (nat44_show_interface_address_command, static) = {
1980 .path = "show nat44 interface address",
1981 .short_help = "show nat44 interface address",
1982 .function = nat44_show_interface_address_command_fn,
1987 * @cliexstart{show nat44 sessions}
1988 * Show NAT44 sessions.
1991 VLIB_CLI_COMMAND (nat44_show_sessions_command, static) = {
1992 .path = "show nat44 sessions",
1993 .short_help = "show nat44 sessions",
1994 .function = nat44_show_sessions_command_fn,
1999 * @cliexstart{set nat44 session limit}
2000 * Set NAT44 session limit.
2003 VLIB_CLI_COMMAND (nat44_set_session_limit_command, static) = {
2004 .path = "set nat44 session limit",
2005 .short_help = "set nat44 session limit <limit> [vrf <table-id>]",
2006 .function = nat44_set_session_limit_command_fn,
2011 * @cliexstart{nat44 del session}
2012 * To administratively delete NAT44 session by inside address and port use:
2013 * vpp# nat44 del session in 10.0.0.3:6303 tcp
2014 * To administratively delete NAT44 session by outside address and port use:
2015 * vpp# nat44 del session out 1.0.0.3:6033 udp
2018 VLIB_CLI_COMMAND (nat44_del_session_command, static) = {
2019 .path = "nat44 del session",
2020 .short_help = "nat44 del session in|out <addr>:<port> tcp|udp|icmp [vrf <id>] [external-host <addr>:<port>]",
2021 .function = nat44_del_session_command_fn,
2026 * @cliexstart{nat44 forwarding}
2027 * Enable or disable forwarding
2028 * Forward packets which don't match existing translation
2029 * or static mapping instead of dropping them.
2030 * To enable forwarding, use:
2031 * vpp# nat44 forwarding enable
2032 * To disable forwarding, use:
2033 * vpp# nat44 forwarding disable
2036 VLIB_CLI_COMMAND (snat_forwarding_set_command, static) = {
2037 .path = "nat44 forwarding",
2038 .short_help = "nat44 forwarding enable|disable",
2039 .function = snat_forwarding_set_command_fn,
2043 * fd.io coding-style-patch-verification: ON
2046 * eval: (c-set-style "gnu")