Forum Discussion
George_33482
Nimbostratus
Dec 14, 2011Snat on the egress interface + vpn connection
Hi all,
I have a LTM + LC and i am load balancing 2 ISP, and i have ASA (behind LC) which terminate a VPN. I want to perform Snat on the egres interface on the F5. Using automap do not help since i have to do natting of the ASA internal ip address to the public ip address (peer address that the remote vpn device use).
I created a wildcard VS with wildcard port and do automap on the internal vlan (for browsing).
I created a wildcard VS with port 500 and another with 4500 mapped to internal vlan (for vpn), here i want to do snating to an ip address if the packet leave external vlan 1 and snatting to another ip address if the it leave external vlan 2. (This the same concept as automap but i want to put the address i want).
If the VPN is initiated from outside i created a vs with an ip address (peer address of vpn) port 500 and 4500 on the external vlan 1 and external vlan 2, which is the same ip address(es) i did snatted before.
I hope this concept is ok.
Anyway, kindly can anyone have an irule that do snating on a specific ip address based on the egress interface.
Thank you in advance
Regards,
George
- hoolio
Cirrostratus
Hi George, - HW_36020
Nimbostratus
George - George_33482
Nimbostratus
Hello Guys, - nitass
Employee
is it similar to this? if yes, please make sure you add route for nated address back to f5 at cisco asa.[root@ve1023:Active] config b self list self 172.28.19.80 { netmask 255.255.255.0 vlan external allow default } self 200.200.200.10 { netmask 255.255.255.0 vlan internal allow default } [root@ve1023:Active] config b virtual bar list virtual bar { snat automap pool foo destination any:any mask 0.0.0.0 ip protocol 6 rules myrule } [root@ve1023:Active] config b pool foo list pool foo { members { 172.28.19.253:any {} 172.28.19.254:any {} } } [root@ve1023:Active] config b rule myrule list rule myrule { when LB_SELECTED { if {[LB::server addr] equals "172.28.19.254"} { snat 1.1.1.1 } else { snat 2.2.2.2 } } } 1.1.1.1 is used when 172.28.19.254 is selected. [root@ve1023:Active] config tcpdump -e -nni 0.0 port 80 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on 0.0, link-type EN10MB (Ethernet), capture size 108 bytes 13:19:20.719522 00:50:56:b3:01:0b > 00:50:56:b3:01:0a, ethertype 802.1Q (0x8100), length 78: vlan 4093, p 0, ethertype IPv4, 200.200.200.101.49654 > 8.8.8.8.80: S 1754565966:1754565966(0) win 5840 13:19:20.719571 00:50:56:b3:01:0a > 00:50:56:b3:01:0b, ethertype 802.1Q (0x8100), length 82: vlan 4093, p 0, ethertype IPv4, 8.8.8.8.80 > 200.200.200.101.49654: S 1646625070:1646625070(0) ack 1754565967 win 4380 13:19:20.720493 00:50:56:b3:01:0b > 00:50:56:b3:01:0a, ethertype 802.1Q (0x8100), length 70: vlan 4093, p 0, ethertype IPv4, 200.200.200.101.49654 > 8.8.8.8.80: . ack 1 win 46 13:19:20.720561 00:50:56:b3:00:b5 > 00:01:e8:d5:d4:47, ethertype 802.1Q (0x8100), length 82: vlan 4094, p 0, ethertype IPv4, 1.1.1.1.49654 > 8.8.8.8.80: S 1628743767:1628743767(0) win 4380 13:19:20.720567 00:50:56:b3:01:0b > 00:50:56:b3:01:0a, ethertype 802.1Q (0x8100), length 219: vlan 4093, p 0, ethertype IPv4, 200.200.200.101.49654 > 8.8.8.8.80: P 1:150(149) ack 1 win 46 13:19:20.820337 00:50:56:b3:01:0a > 00:50:56:b3:01:0b, ethertype 802.1Q (0x8100), length 70: vlan 4093, p 0, ethertype IPv4, 8.8.8.8.80 > 200.200.200.101.49654: . ack 150 win 4529 13:19:23.720497 00:50:56:b3:00:b5 > 00:01:e8:d5:d4:47, ethertype 802.1Q (0x8100), length 82: vlan 4094, p 0, ethertype IPv4, 1.1.1.1.49654 > 8.8.8.8.80: S 1628743767:1628743767(0) win 4380 2.2.2.2 is used when 172.28.19.253 is selected. [root@ve1023:Active] config tcpdump -e -nni 0.0 port 80 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on 0.0, link-type EN10MB (Ethernet), capture size 108 bytes 13:19:33.969451 00:50:56:b3:01:0b > 00:50:56:b3:01:0a, ethertype 802.1Q (0x8100), length 78: vlan 4093, p 0, ethertype IPv4, 200.200.200.101.49655 > 8.8.8.8.80: S 616950208:616950208(0) win 5840 13:19:33.969477 00:50:56:b3:01:0a > 00:50:56:b3:01:0b, ethertype 802.1Q (0x8100), length 82: vlan 4093, p 0, ethertype IPv4, 8.8.8.8.80 > 200.200.200.101.49655: S 720591584:720591584(0) ack 616950209 win 4380 13:19:33.970379 00:50:56:b3:01:0b > 00:50:56:b3:01:0a, ethertype 802.1Q (0x8100), length 70: vlan 4093, p 0, ethertype IPv4, 200.200.200.101.49655 > 8.8.8.8.80: . ack 1 win 46 13:19:33.970424 00:50:56:b3:00:b5 > 00:50:56:b3:03:7f, ethertype 802.1Q (0x8100), length 82: vlan 4094, p 0, ethertype IPv4, 2.2.2.2.49655 > 8.8.8.8.80: S 3355095084:3355095084(0) win 4380 13:19:33.970427 00:50:56:b3:01:0b > 00:50:56:b3:01:0a, ethertype 802.1Q (0x8100), length 219: vlan 4093, p 0, ethertype IPv4, 200.200.200.101.49655 > 8.8.8.8.80: P 1:150(149) ack 1 win 46 13:19:34.070257 00:50:56:b3:01:0a > 00:50:56:b3:01:0b, ethertype 802.1Q (0x8100), length 70: vlan 4093, p 0, ethertype IPv4, 8.8.8.8.80 > 200.200.200.101.49655: . ack 150 win 4529 13:19:36.970404 00:50:56:b3:00:b5 > 00:50:56:b3:03:7f, ethertype 802.1Q (0x8100), length 82: vlan 4094, p 0, ethertype IPv4, 2.2.2.2.49655 > 8.8.8.8.80: S 3355095084:3355095084(0) win 4380 [root@ve1023:Active] config b arp ARP 172.28.19.253 - 00:50:56:B3:03:7F VLAN external expire 54s resolved ARP 172.28.19.254 - 00:01:E8:D5:D4:47 VLAN external expire 274s resolved ARP 200.200.200.101 - 00:50:56:B3:01:0B VLAN internal expire 284s resolved
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects