SlideShare ist ein Scribd-Unternehmen logo
1 von 13
NAT64 SERVER
Network Address
Translation using
vertex-5
D.P.G.S.R Fernando
I.U. Liyanage
J.R. Kodagoda
R.S.A De Silva
Overview
Why Vertex-5
 We     had three choices for FPGA boards:
    Virtex-5,Vertex-2 & Altera

 Embedded      tri-mode Ethernet MAC
    wrapper is available only for Virtex-5 and
    Vertex-6

    Because of which we used Virtex-5 board
    for our project.
Procedure
 Implemented the Tri-mode
 Ethernet MAC Wrapper

   Implemented the IPv4 to
   IPv6 conversion algorithm

      Implemented the IPv6 to
      IPv4 conversion algorithm

         Combine two algorithms
         to get the NAT64 module
Tri Mode Ethernet MAC
wrapper
IPv4 to IPv6 Conversion
IPv6 to IPv4 Conversion
Header Mapping
IPv4                          IPv6
Ether Type: 0x0800            Ether Type:0x86dd
DSCP, ECN                     Traffic class
Header Length, Total Length   Payload Length
Protocol                      Next Header
Time to Live                  Hop Limit
Ipv4 address                  Ipv6 address
Static NAT Table
                          IPv4              IPv6
 1                        200.2.2.2         2000:2000:2000:2000:2000:2000:2000:2
                                            000
 2                        200.3.3.3         3000:3000:3000:3000:3000:3000:3000:3
                                            000
 3                        200.4.4.4         4000:4000:4000:4000:4000:4000:4000:4
                                            000
 4                        200.5.5.5         5000:5000:5000:5000:5000:5000:5000:5
                                            000
 Default Source           200.6.6.6         6000:6000:6000:6000:6000:6000:6000:6
 Address                                    000
 Broadcast Address        200.255.255.255   ff02::1
 Multicast(to all host)   224.0.0.1         ff02::1
 Multicast (to all        224.0.0.2         ff02::2
 routers)
 unspecified              0.0.0.0           ::
 Loopback address         127.0.0.1         ::1
Hardware Debug Tools
 ChipScope  Pro Analyzer
We use ChipScope Pro Inserter flow, to
capture signals in ChipScope Pro
 Wireshark
packet sniffer software application
Issues
 Virtex-5 board only has one Ethernet port
  though out NAT64 server needs at least
  two ports.
 Virtex-5 device designs of Tri-mode
  Ethernet MAC require a Verilog LRM-IEEE
  1364-2005 encryption-compliant simulator
     ModelSim v6.6d
     Cadence Incisive Enterprise Simulator (IES) 10.2
     Synopsys VCS and VCS MX 2010.06)
 Butany of those simulators are not freely
  available

Weitere ähnliche Inhalte

Was ist angesagt?

Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting Netwax Lab
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiNetwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNetwax Lab
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeNetwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access listNetwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNetwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cliNetwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewallNetwax Lab
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiNetwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iiiNetwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Netwax Lab
 
Route Redistribution
Route RedistributionRoute Redistribution
Route RedistributionNetwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNetwax Lab
 
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPNLISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPNJobSnijders
 

Was ist angesagt? (20)

Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP ii
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPNLISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
 

Ähnlich wie Nat64 server

NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA ImplementationJanith Rukman
 
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...Louis Göhl
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6Private
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7Waqas Ahmed Nawaz
 
dokumen.tips_linux-networking-commands.ppt
dokumen.tips_linux-networking-commands.pptdokumen.tips_linux-networking-commands.ppt
dokumen.tips_linux-networking-commands.pptThorOdinson55
 
IPv6 Fundamentals & Securities
IPv6 Fundamentals & SecuritiesIPv6 Fundamentals & Securities
IPv6 Fundamentals & SecuritiesDon Anto
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsShannon McFarland
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_08Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_08gameaxt
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Nowjulievreeland
 
I pv6 addressing-rg-animated
I pv6 addressing-rg-animatedI pv6 addressing-rg-animated
I pv6 addressing-rg-animatedmasbangkit
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2ehsan nazer
 
IPv6 networking training sduffy v3
IPv6 networking training   sduffy v3IPv6 networking training   sduffy v3
IPv6 networking training sduffy v3Shane Duffy
 
Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05gameaxt
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network TroubleshootingOpen Source Consulting
 

Ähnlich wie Nat64 server (20)

NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
 
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
 
dokumen.tips_linux-networking-commands.ppt
dokumen.tips_linux-networking-commands.pptdokumen.tips_linux-networking-commands.ppt
dokumen.tips_linux-networking-commands.ppt
 
IPv6 Fundamentals & Securities
IPv6 Fundamentals & SecuritiesIPv6 Fundamentals & Securities
IPv6 Fundamentals & Securities
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack Environments
 
IPv6
IPv6IPv6
IPv6
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IPV6 IPv6 Routing Lab By Rob Hamm
IPV6 IPv6 Routing Lab  By Rob HammIPV6 IPv6 Routing Lab  By Rob Hamm
IPV6 IPv6 Routing Lab By Rob Hamm
 
6421 b Module-04
6421 b Module-046421 b Module-04
6421 b Module-04
 
Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_08Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_08
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Now
 
I pv6 addressing-rg-animated
I pv6 addressing-rg-animatedI pv6 addressing-rg-animated
I pv6 addressing-rg-animated
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2
 
IPv6 networking training sduffy v3
IPv6 networking training   sduffy v3IPv6 networking training   sduffy v3
IPv6 networking training sduffy v3
 
Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05Microsoft Offical Course 20410C_05
Microsoft Offical Course 20410C_05
 
Ipv6
Ipv6Ipv6
Ipv6
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 

Nat64 server

  • 1. NAT64 SERVER Network Address Translation using vertex-5 D.P.G.S.R Fernando I.U. Liyanage J.R. Kodagoda R.S.A De Silva
  • 3. Why Vertex-5  We had three choices for FPGA boards: Virtex-5,Vertex-2 & Altera  Embedded tri-mode Ethernet MAC wrapper is available only for Virtex-5 and Vertex-6  Because of which we used Virtex-5 board for our project.
  • 4. Procedure Implemented the Tri-mode Ethernet MAC Wrapper Implemented the IPv4 to IPv6 conversion algorithm Implemented the IPv6 to IPv4 conversion algorithm Combine two algorithms to get the NAT64 module
  • 5. Tri Mode Ethernet MAC wrapper
  • 6. IPv4 to IPv6 Conversion
  • 7. IPv6 to IPv4 Conversion
  • 8. Header Mapping IPv4 IPv6 Ether Type: 0x0800 Ether Type:0x86dd DSCP, ECN Traffic class Header Length, Total Length Payload Length Protocol Next Header Time to Live Hop Limit Ipv4 address Ipv6 address
  • 9. Static NAT Table IPv4 IPv6 1 200.2.2.2 2000:2000:2000:2000:2000:2000:2000:2 000 2 200.3.3.3 3000:3000:3000:3000:3000:3000:3000:3 000 3 200.4.4.4 4000:4000:4000:4000:4000:4000:4000:4 000 4 200.5.5.5 5000:5000:5000:5000:5000:5000:5000:5 000 Default Source 200.6.6.6 6000:6000:6000:6000:6000:6000:6000:6 Address 000 Broadcast Address 200.255.255.255 ff02::1 Multicast(to all host) 224.0.0.1 ff02::1 Multicast (to all 224.0.0.2 ff02::2 routers) unspecified 0.0.0.0 :: Loopback address 127.0.0.1 ::1
  • 10. Hardware Debug Tools  ChipScope Pro Analyzer We use ChipScope Pro Inserter flow, to capture signals in ChipScope Pro
  • 11.
  • 12.  Wireshark packet sniffer software application
  • 13. Issues  Virtex-5 board only has one Ethernet port though out NAT64 server needs at least two ports.  Virtex-5 device designs of Tri-mode Ethernet MAC require a Verilog LRM-IEEE 1364-2005 encryption-compliant simulator  ModelSim v6.6d  Cadence Incisive Enterprise Simulator (IES) 10.2  Synopsys VCS and VCS MX 2010.06)  Butany of those simulators are not freely available

Hinweis der Redaktion

  1. Monahriliyapaaannn
  2. According to the slides, given by Dr. Pasqual, there are 3 types of FPGAtri-mode Ethernet MAC wrapper is free
  3. We have to configure the TEMAC wrapper
  4. The generated example design for this OpenSparc board will not work if implemented and downloaded to the board as is. We must make some configuration changes in the example design so that it works on the OpenSparc board. This is the most hardest part in our project
  5. This is the timing diagramFor each ipv4 packet received, NAt64 send ipv6 packet after delaying 36 bytesData and FCS field is delayed by (76-x) bytes
  6. This is the timing diagramFor each ipv6 packet received, NAt64 send ipv4 packet after delaying 36 bytesData and FCS field is delayed by 16 bytes
  7. ‘Ether type’ in ethernet header is used to determine whether this packet is ipv4 or ipv6How ipv4 packets and ipv6 packets are mapped each other
  8. There are twomethosChipScope Pro Inserter flow (which is easy)(which we use)ChipScope Pro Core Generator flow
  9. So, the single Ethernet port has to represent IPv4 network and IPv6 networkBecause of unavailability of functional and timing simulations, we have to rely on the hardware debug tools (ChipScope Pro Analyzer and wireshark). This make the project extremely difficult and time consuming (synthesizing, implementing and generating a programming file takes lots of time )