Introduction
The WAN supports four features which provide
security and IP traffic forwarding when using incoming or Mobile Terminated
connections:
1. Network Address Translation (NAT)
2. Generic Routing Encapsulation (GRE) forwarding
3. TCP/UDP port forwarding
4. IP Filtering
This document describes each function, how they
are used in conjunction with each other, how they are used, and what issues can
occur with each if not used properly.
Network Address Translation
(NAT)
NAT allows the Connect WAN to have a single
public IP address on the mobile link, while allowing multiple private IP
addressed devices connected to the Ethernet interface.
Outgoing traffic (mobile initiated) from the
private network to the public mobile network assumes the IP address of the
public mobile interface. An internal table tracks which internal IP
address made the outgoing request so that responses get sent to the proper
requestor.
For example, a workstation at IP address
192.168.1.15 sends a request to www.arindamcctvaccesscontrol.blogspot.com. The source IP address is changed by the Connect WAN
address translation to the public
Incoming (mobile terminated) traffic is either designated
to the Connect WAN itself (i.e. HTTP or telnet connections for configuration or
monitoring), or is forwarded to hosts via the Ethernet interface based either
on GRE or TCP/UDP port forwarding which is covered below.
NAT provides two main benefits:
1. Security: NAT hides the Private IP addresses of
the devices on the Connect WAN''''s Ethernet network.
2. IP Address Availability: IP addresses are in
short supply and cost money. The Connect WAN need be provided only
one IP address from the wireless carrier.
NAT is enabled by default on the Connect
WAN. It should not be disabled unless there is a specific reason to
do so.
Generic Routing
Encapsulation (GRE) forwarding
GRE is a transport layer protocol, designated as
IP protocol number 47, is used by many routers, WAN switches and VPN
concentrators, to effectively tunnel traffic over a WAN between
routers. Note that GRE itself provides no encryption but protocols
such as PPTP can use GRE. IPSec can be encapsulated in GRE (and
vice-versa). GRE uses IP-in-IP and allows private IP addresses to be
tunneled through a public network.
The Connect WAN provides a simple checkbox to
turn on GRE forwarding to pass GRE traffic from the mobile interface through to
a router on the Ethernet interface. Note the Connect WAN only passes
GRE traffic and does not terminate it.
Here is an example diagram:
Figure 1 - GRE Forwarding
|
The HQ router''s peer GRE address is the mobile
IP address of the Connect WAN, which in this case is
166.213.229.218. The Connect WAN has GRE forwarding enabled and will
send to the router''s Ethernet WAN port, in this case
192.168.1.2. Typically this connection is a directly connected
Ethernet cable.
An example similar to the above is where GRE
tunneling is used to create a backup WAN connection to a primary
Frame Relay connection through the Connect WAN and wireless network.
TCP/UDP Port Forwarding
Normally, traffic initiated from a host site to
a Connect WAN is blocked by NAT, unless the traffic is destined for the Connect
WAN itself. Port forwarding provides a means to pass traffic from
the mobile interface to devices connected to the Connect WAN''''s Ethernet
port. There are two main applications where port forwarding is
required:
1. Pass application data traffic, such as polls or
requests, to Ethernet connected devices, and
2. Pass VPN traffic, such as IPSec-in-UDP, through
to routers or VPN appliances.
For example, three devices are attached to the
Connect WAN''''s Ethernet port: