Network Address Translation Overview
▀ NAT Feature Overview
▄ Cisco ASR 5000 Series Product Overview
OL-22938-02
nat-rlm-max-cur-port-chunk-used: Maximum port chunks used by active subscribers.
nat-rlm-port-chunk-size: Size of the port chunk in the NAT realm.
nat-rlm-port-chunk-average-usage-tcp: Average TCP port usage in the allocated TCP ports, i.e. out of allocated
TCP ports how many got used. Not percentage value.
nat-rlm-port-chunk-average-usage-udp: Average UDP port usage in the allocated UDP ports, i.e. out of allocated
UDP ports how many got used. Not percentage value.
nat-rlm-port-chunk-average-usage-others: Average other (ICMP or GRE) port usage in the allocated other ports,
i.e. out of allocated ‗other‘ ports how many got used. Not percentage value.
Alarms
Alert threshold values can be specified to generate alarms for NAT IP pools. To specify realm-specific threshold limits
(pool-used, pool-free, pool-release, and pool-hold) ―alert-threshold‖ NAT IP pool parameter can be used, or it can also
be specified across context. These thresholds can be specified to any number of NAT IP pools.
In case of many-to-one NAT, it is possible to specify port-chunks usage threshold per NAT IP pool. This threshold
value is applicable to all many-to-one NAT IP pools across the system. However, note that alarms are only generated for
the first 100 many-to-one NAT IP pools from an alphabetical list of all NAT IP pools.
Session Recovery and ICSR
In session recovery, as part of the Private IP assigned to the subscriber:
The public IP address used for the subscriber is recovered. The NAT IP address being used by the subscriber can
be on-demand or not-on-demand. In case of many-to-one NAT, the port-chunks associated with the NAT IP
address for the subscriber needs to check-pointed as well.
In case Bypass NAT feature is used, then the private IP flow needs to be recovered.
To be recovered the NAT IP addresses need to be checkpointed. The checkpointing can be:
Full Checkpoint
Micro Checkpoint
To recover the bypass NAT flow, the bypass flow needs to be checkpointed. The checkpointing of Bypass NAT flow
can be:
Full Checkpoint
Micro Checkpoint
In case of not-on-demand, the NAT IP address being used by the subscriber is known after call setup. This gets
checkpointed as part of the normal full checkpoint. In case of on-demand NAT, the NAT IP address being used by the
subscriber is known only in the data-path. This will be checkpointed as part of micro checkpoint.
In case of many-to-one NAT, the port-chunks being used will always be checkpointed as part of micro checkpoint.
Summary of Contents for ASR 5000 Series
Page 1: ......
Page 26: ......
Page 48: ...New In Release 10 0 SCM Features Cisco ASR 5000 Series Product Overview OL 22938 02 ...
Page 50: ......
Page 58: ......
Page 68: ......
Page 126: ......
Page 138: ......
Page 146: ......
Page 218: ......
Page 236: ......
Page 356: ......
Page 374: ......
Page 422: ......
Page 496: ......
Page 572: ......
Page 654: ......
Page 700: ......
Page 726: ......
Page 784: ......
Page 816: ......
Page 844: ......
Page 906: ......
Page 926: ......
Page 942: ......
Page 943: ...Cisco ASR 5000 Series Product Overview OL 22938 02 Chapter 30 Technical Specifications ...
Page 966: ......
Page 972: ......