blob: 259c445ea5bb31aa037f71e0ea77f6ddbdd921f3 [file] [log] [blame]
Filip Varga18f1e412020-12-03 15:27:40 +01001#!/usr/bin/env python3
2
3import ipaddress
4import random
5import socket
6import struct
7import unittest
8from io import BytesIO
Filip Varga18f1e412020-12-03 15:27:40 +01009
10import scapy.compat
Dave Wallace670724c2022-09-20 21:52:18 -040011from framework import tag_fixme_debian11, is_distro_debian11
Filip Varga18f1e412020-12-03 15:27:40 +010012from framework import VppTestCase, VppTestRunner
13from ipfix import IPFIX, Set, Template, Data, IPFIXDecoder
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020014from scapy.all import (
15 bind_layers,
16 Packet,
17 ByteEnumField,
18 ShortField,
19 IPField,
20 IntField,
21 LongField,
22 XByteField,
23 FlagsField,
24 FieldLenField,
25 PacketListField,
26)
Filip Varga18f1e412020-12-03 15:27:40 +010027from scapy.data import IP_PROTOS
28from scapy.layers.inet import IP, TCP, UDP, ICMP
29from scapy.layers.inet import IPerror, TCPerror, UDPerror, ICMPerror
30from scapy.layers.inet6 import IPv6, ICMPv6EchoRequest, ICMPv6EchoReply
31from scapy.layers.l2 import Ether, ARP, GRE
32from scapy.packet import Raw
33from syslog_rfc5424_parser import SyslogMessage, ParseError
34from syslog_rfc5424_parser.constants import SyslogSeverity
35from util import ppp
36from vpp_ip_route import VppIpRoute, VppRoutePath
37from vpp_neighbor import VppNeighbor
38from vpp_papi import VppEnum
39
40
41# NAT HA protocol event data
42class Event(Packet):
43 name = "Event"
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020044 fields_desc = [
45 ByteEnumField("event_type", None, {1: "add", 2: "del", 3: "refresh"}),
46 ByteEnumField("protocol", None, {0: "other", 1: "udp", 2: "tcp", 3: "icmp"}),
47 ShortField("flags", 0),
48 IPField("in_addr", None),
49 IPField("out_addr", None),
50 ShortField("in_port", None),
51 ShortField("out_port", None),
52 IPField("eh_addr", None),
53 IPField("ehn_addr", None),
54 ShortField("eh_port", None),
55 ShortField("ehn_port", None),
56 IntField("fib_index", None),
57 IntField("total_pkts", 0),
58 LongField("total_bytes", 0),
59 ]
Filip Varga18f1e412020-12-03 15:27:40 +010060
61 def extract_padding(self, s):
62 return "", s
63
64
65# NAT HA protocol header
66class HANATStateSync(Packet):
67 name = "HA NAT state sync"
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020068 fields_desc = [
69 XByteField("version", 1),
70 FlagsField("flags", 0, 8, ["ACK"]),
71 FieldLenField("count", None, count_of="events"),
72 IntField("sequence_number", 1),
73 IntField("thread_index", 0),
74 PacketListField("events", [], Event, count_from=lambda pkt: pkt.count),
75 ]
Filip Varga18f1e412020-12-03 15:27:40 +010076
77
78class MethodHolder(VppTestCase):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020079 """NAT create capture and verify method holder"""
Filip Varga18f1e412020-12-03 15:27:40 +010080
81 @property
82 def config_flags(self):
Filip Varga0eaf4e62021-02-17 14:34:54 +010083 return VppEnum.vl_api_nat44_ei_config_flags_t
Filip Varga18f1e412020-12-03 15:27:40 +010084
85 @property
86 def SYSLOG_SEVERITY(self):
87 return VppEnum.vl_api_syslog_severity_t
88
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020089 def nat44_add_static_mapping(
90 self,
91 local_ip,
92 external_ip="0.0.0.0",
93 local_port=0,
94 external_port=0,
95 vrf_id=0,
96 is_add=1,
97 external_sw_if_index=0xFFFFFFFF,
98 proto=0,
99 tag="",
100 flags=0,
101 ):
Filip Varga18f1e412020-12-03 15:27:40 +0100102 """
103 Add/delete NAT44EI static mapping
104
105 :param local_ip: Local IP address
106 :param external_ip: External IP address
107 :param local_port: Local port number (Optional)
108 :param external_port: External port number (Optional)
109 :param vrf_id: VRF ID (Default 0)
110 :param is_add: 1 if add, 0 if delete (Default add)
111 :param external_sw_if_index: External interface instead of IP address
112 :param proto: IP protocol (Mandatory if port specified)
113 :param tag: Opaque string tag
114 :param flags: NAT configuration flags
115 """
116
117 if not (local_port and external_port):
Filip Varga0eaf4e62021-02-17 14:34:54 +0100118 flags |= self.config_flags.NAT44_EI_ADDR_ONLY_MAPPING
Filip Varga18f1e412020-12-03 15:27:40 +0100119
Filip Varga0eaf4e62021-02-17 14:34:54 +0100120 self.vapi.nat44_ei_add_del_static_mapping(
Filip Varga18f1e412020-12-03 15:27:40 +0100121 is_add=is_add,
122 local_ip_address=local_ip,
123 external_ip_address=external_ip,
124 external_sw_if_index=external_sw_if_index,
125 local_port=local_port,
126 external_port=external_port,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200127 vrf_id=vrf_id,
128 protocol=proto,
Filip Varga18f1e412020-12-03 15:27:40 +0100129 flags=flags,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200130 tag=tag,
131 )
Filip Varga18f1e412020-12-03 15:27:40 +0100132
Filip Varga0eaf4e62021-02-17 14:34:54 +0100133 def nat44_add_address(self, ip, is_add=1, vrf_id=0xFFFFFFFF):
Filip Varga18f1e412020-12-03 15:27:40 +0100134 """
135 Add/delete NAT44EI address
136
137 :param ip: IP address
138 :param is_add: 1 if add, 0 if delete (Default add)
Filip Varga18f1e412020-12-03 15:27:40 +0100139 """
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200140 self.vapi.nat44_ei_add_del_address_range(
141 first_ip_address=ip, last_ip_address=ip, vrf_id=vrf_id, is_add=is_add
142 )
Filip Varga18f1e412020-12-03 15:27:40 +0100143
144 def create_routes_and_neigbors(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200145 r1 = VppIpRoute(
146 self,
147 self.pg7.remote_ip4,
148 32,
149 [VppRoutePath(self.pg7.remote_ip4, self.pg7.sw_if_index)],
150 )
151 r2 = VppIpRoute(
152 self,
153 self.pg8.remote_ip4,
154 32,
155 [VppRoutePath(self.pg8.remote_ip4, self.pg8.sw_if_index)],
156 )
Filip Varga18f1e412020-12-03 15:27:40 +0100157 r1.add_vpp_config()
158 r2.add_vpp_config()
159
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200160 n1 = VppNeighbor(
161 self,
162 self.pg7.sw_if_index,
163 self.pg7.remote_mac,
164 self.pg7.remote_ip4,
165 is_static=1,
166 )
167 n2 = VppNeighbor(
168 self,
169 self.pg8.sw_if_index,
170 self.pg8.remote_mac,
171 self.pg8.remote_ip4,
172 is_static=1,
173 )
Filip Varga18f1e412020-12-03 15:27:40 +0100174 n1.add_vpp_config()
175 n2.add_vpp_config()
176
177 def create_stream_in(self, in_if, out_if, dst_ip=None, ttl=64):
178 """
179 Create packet stream for inside network
180
181 :param in_if: Inside interface
182 :param out_if: Outside interface
183 :param dst_ip: Destination address
184 :param ttl: TTL of generated packets
185 """
186 if dst_ip is None:
187 dst_ip = out_if.remote_ip4
188
189 pkts = []
190 # TCP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200191 p = (
192 Ether(dst=in_if.local_mac, src=in_if.remote_mac)
193 / IP(src=in_if.remote_ip4, dst=dst_ip, ttl=ttl)
194 / TCP(sport=self.tcp_port_in, dport=20)
195 )
Filip Varga18f1e412020-12-03 15:27:40 +0100196 pkts.extend([p, p])
197
198 # UDP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200199 p = (
200 Ether(dst=in_if.local_mac, src=in_if.remote_mac)
201 / IP(src=in_if.remote_ip4, dst=dst_ip, ttl=ttl)
202 / UDP(sport=self.udp_port_in, dport=20)
203 )
Filip Varga18f1e412020-12-03 15:27:40 +0100204 pkts.append(p)
205
206 # ICMP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200207 p = (
208 Ether(dst=in_if.local_mac, src=in_if.remote_mac)
209 / IP(src=in_if.remote_ip4, dst=dst_ip, ttl=ttl)
210 / ICMP(id=self.icmp_id_in, type="echo-request")
211 )
Filip Varga18f1e412020-12-03 15:27:40 +0100212 pkts.append(p)
213
214 return pkts
215
216 def compose_ip6(self, ip4, pref, plen):
217 """
218 Compose IPv4-embedded IPv6 addresses
219
220 :param ip4: IPv4 address
221 :param pref: IPv6 prefix
222 :param plen: IPv6 prefix length
223 :returns: IPv4-embedded IPv6 addresses
224 """
225 pref_n = list(socket.inet_pton(socket.AF_INET6, pref))
226 ip4_n = list(socket.inet_pton(socket.AF_INET, ip4))
227 if plen == 32:
228 pref_n[4] = ip4_n[0]
229 pref_n[5] = ip4_n[1]
230 pref_n[6] = ip4_n[2]
231 pref_n[7] = ip4_n[3]
232 elif plen == 40:
233 pref_n[5] = ip4_n[0]
234 pref_n[6] = ip4_n[1]
235 pref_n[7] = ip4_n[2]
236 pref_n[9] = ip4_n[3]
237 elif plen == 48:
238 pref_n[6] = ip4_n[0]
239 pref_n[7] = ip4_n[1]
240 pref_n[9] = ip4_n[2]
241 pref_n[10] = ip4_n[3]
242 elif plen == 56:
243 pref_n[7] = ip4_n[0]
244 pref_n[9] = ip4_n[1]
245 pref_n[10] = ip4_n[2]
246 pref_n[11] = ip4_n[3]
247 elif plen == 64:
248 pref_n[9] = ip4_n[0]
249 pref_n[10] = ip4_n[1]
250 pref_n[11] = ip4_n[2]
251 pref_n[12] = ip4_n[3]
252 elif plen == 96:
253 pref_n[12] = ip4_n[0]
254 pref_n[13] = ip4_n[1]
255 pref_n[14] = ip4_n[2]
256 pref_n[15] = ip4_n[3]
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200257 packed_pref_n = b"".join([scapy.compat.chb(x) for x in pref_n])
Filip Varga18f1e412020-12-03 15:27:40 +0100258 return socket.inet_ntop(socket.AF_INET6, packed_pref_n)
259
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200260 def create_stream_out(self, out_if, dst_ip=None, ttl=64, use_inside_ports=False):
Filip Varga18f1e412020-12-03 15:27:40 +0100261 """
262 Create packet stream for outside network
263
264 :param out_if: Outside interface
265 :param dst_ip: Destination IP address (Default use global NAT address)
266 :param ttl: TTL of generated packets
267 :param use_inside_ports: Use inside NAT ports as destination ports
268 instead of outside ports
269 """
270 if dst_ip is None:
271 dst_ip = self.nat_addr
272 if not use_inside_ports:
273 tcp_port = self.tcp_port_out
274 udp_port = self.udp_port_out
275 icmp_id = self.icmp_id_out
276 else:
277 tcp_port = self.tcp_port_in
278 udp_port = self.udp_port_in
279 icmp_id = self.icmp_id_in
280 pkts = []
281 # TCP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200282 p = (
283 Ether(dst=out_if.local_mac, src=out_if.remote_mac)
284 / IP(src=out_if.remote_ip4, dst=dst_ip, ttl=ttl)
285 / TCP(dport=tcp_port, sport=20)
286 )
Filip Varga18f1e412020-12-03 15:27:40 +0100287 pkts.extend([p, p])
288
289 # UDP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200290 p = (
291 Ether(dst=out_if.local_mac, src=out_if.remote_mac)
292 / IP(src=out_if.remote_ip4, dst=dst_ip, ttl=ttl)
293 / UDP(dport=udp_port, sport=20)
294 )
Filip Varga18f1e412020-12-03 15:27:40 +0100295 pkts.append(p)
296
297 # ICMP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200298 p = (
299 Ether(dst=out_if.local_mac, src=out_if.remote_mac)
300 / IP(src=out_if.remote_ip4, dst=dst_ip, ttl=ttl)
301 / ICMP(id=icmp_id, type="echo-reply")
302 )
Filip Varga18f1e412020-12-03 15:27:40 +0100303 pkts.append(p)
304
305 return pkts
306
307 def create_stream_out_ip6(self, out_if, src_ip, dst_ip, hl=64):
308 """
309 Create packet stream for outside network
310
311 :param out_if: Outside interface
312 :param dst_ip: Destination IP address (Default use global NAT address)
313 :param hl: HL of generated packets
314 """
315 pkts = []
316 # TCP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200317 p = (
318 Ether(dst=out_if.local_mac, src=out_if.remote_mac)
319 / IPv6(src=src_ip, dst=dst_ip, hlim=hl)
320 / TCP(dport=self.tcp_port_out, sport=20)
321 )
Filip Varga18f1e412020-12-03 15:27:40 +0100322 pkts.append(p)
323
324 # UDP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200325 p = (
326 Ether(dst=out_if.local_mac, src=out_if.remote_mac)
327 / IPv6(src=src_ip, dst=dst_ip, hlim=hl)
328 / UDP(dport=self.udp_port_out, sport=20)
329 )
Filip Varga18f1e412020-12-03 15:27:40 +0100330 pkts.append(p)
331
332 # ICMP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200333 p = (
334 Ether(dst=out_if.local_mac, src=out_if.remote_mac)
335 / IPv6(src=src_ip, dst=dst_ip, hlim=hl)
336 / ICMPv6EchoReply(id=self.icmp_id_out)
337 )
Filip Varga18f1e412020-12-03 15:27:40 +0100338 pkts.append(p)
339
340 return pkts
341
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200342 def verify_capture_out(
343 self,
344 capture,
345 nat_ip=None,
346 same_port=False,
347 dst_ip=None,
348 is_ip6=False,
349 ignore_port=False,
350 ):
Filip Varga18f1e412020-12-03 15:27:40 +0100351 """
352 Verify captured packets on outside network
353
354 :param capture: Captured packets
355 :param nat_ip: Translated IP address (Default use global NAT address)
356 :param same_port: Source port number is not translated (Default False)
357 :param dst_ip: Destination IP address (Default do not verify)
358 :param is_ip6: If L3 protocol is IPv6 (Default False)
359 """
360 if is_ip6:
361 IP46 = IPv6
362 ICMP46 = ICMPv6EchoRequest
363 else:
364 IP46 = IP
365 ICMP46 = ICMP
366 if nat_ip is None:
367 nat_ip = self.nat_addr
368 for packet in capture:
369 try:
370 if not is_ip6:
371 self.assert_packet_checksums_valid(packet)
372 self.assertEqual(packet[IP46].src, nat_ip)
373 if dst_ip is not None:
374 self.assertEqual(packet[IP46].dst, dst_ip)
375 if packet.haslayer(TCP):
376 if not ignore_port:
377 if same_port:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200378 self.assertEqual(packet[TCP].sport, self.tcp_port_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100379 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200380 self.assertNotEqual(packet[TCP].sport, self.tcp_port_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100381 self.tcp_port_out = packet[TCP].sport
382 self.assert_packet_checksums_valid(packet)
383 elif packet.haslayer(UDP):
384 if not ignore_port:
385 if same_port:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200386 self.assertEqual(packet[UDP].sport, self.udp_port_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100387 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200388 self.assertNotEqual(packet[UDP].sport, self.udp_port_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100389 self.udp_port_out = packet[UDP].sport
390 else:
391 if not ignore_port:
392 if same_port:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200393 self.assertEqual(packet[ICMP46].id, self.icmp_id_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100394 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200395 self.assertNotEqual(packet[ICMP46].id, self.icmp_id_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100396 self.icmp_id_out = packet[ICMP46].id
397 self.assert_packet_checksums_valid(packet)
398 except:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200399 self.logger.error(
400 ppp("Unexpected or invalid packet (outside network):", packet)
401 )
Filip Varga18f1e412020-12-03 15:27:40 +0100402 raise
403
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200404 def verify_capture_out_ip6(self, capture, nat_ip, same_port=False, dst_ip=None):
Filip Varga18f1e412020-12-03 15:27:40 +0100405 """
406 Verify captured packets on outside network
407
408 :param capture: Captured packets
409 :param nat_ip: Translated IP address
410 :param same_port: Source port number is not translated (Default False)
411 :param dst_ip: Destination IP address (Default do not verify)
412 """
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200413 return self.verify_capture_out(capture, nat_ip, same_port, dst_ip, True)
Filip Varga18f1e412020-12-03 15:27:40 +0100414
415 def verify_capture_in(self, capture, in_if):
416 """
417 Verify captured packets on inside network
418
419 :param capture: Captured packets
420 :param in_if: Inside interface
421 """
422 for packet in capture:
423 try:
424 self.assert_packet_checksums_valid(packet)
425 self.assertEqual(packet[IP].dst, in_if.remote_ip4)
426 if packet.haslayer(TCP):
427 self.assertEqual(packet[TCP].dport, self.tcp_port_in)
428 elif packet.haslayer(UDP):
429 self.assertEqual(packet[UDP].dport, self.udp_port_in)
430 else:
431 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
432 except:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200433 self.logger.error(
434 ppp("Unexpected or invalid packet (inside network):", packet)
435 )
Filip Varga18f1e412020-12-03 15:27:40 +0100436 raise
437
438 def verify_capture_no_translation(self, capture, ingress_if, egress_if):
439 """
440 Verify captured packet that don't have to be translated
441
442 :param capture: Captured packets
443 :param ingress_if: Ingress interface
444 :param egress_if: Egress interface
445 """
446 for packet in capture:
447 try:
448 self.assertEqual(packet[IP].src, ingress_if.remote_ip4)
449 self.assertEqual(packet[IP].dst, egress_if.remote_ip4)
450 if packet.haslayer(TCP):
451 self.assertEqual(packet[TCP].sport, self.tcp_port_in)
452 elif packet.haslayer(UDP):
453 self.assertEqual(packet[UDP].sport, self.udp_port_in)
454 else:
455 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
456 except:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200457 self.logger.error(
458 ppp("Unexpected or invalid packet (inside network):", packet)
459 )
Filip Varga18f1e412020-12-03 15:27:40 +0100460 raise
461
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200462 def verify_capture_out_with_icmp_errors(self, capture, src_ip=None, icmp_type=11):
Filip Varga18f1e412020-12-03 15:27:40 +0100463 """
464 Verify captured packets with ICMP errors on outside network
465
466 :param capture: Captured packets
467 :param src_ip: Translated IP address or IP address of VPP
468 (Default use global NAT address)
469 :param icmp_type: Type of error ICMP packet
470 we are expecting (Default 11)
471 """
472 if src_ip is None:
473 src_ip = self.nat_addr
474 for packet in capture:
475 try:
476 self.assertEqual(packet[IP].src, src_ip)
477 self.assertEqual(packet.haslayer(ICMP), 1)
478 icmp = packet[ICMP]
479 self.assertEqual(icmp.type, icmp_type)
480 self.assertTrue(icmp.haslayer(IPerror))
481 inner_ip = icmp[IPerror]
482 if inner_ip.haslayer(TCPerror):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200483 self.assertEqual(inner_ip[TCPerror].dport, self.tcp_port_out)
Filip Varga18f1e412020-12-03 15:27:40 +0100484 elif inner_ip.haslayer(UDPerror):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200485 self.assertEqual(inner_ip[UDPerror].dport, self.udp_port_out)
Filip Varga18f1e412020-12-03 15:27:40 +0100486 else:
487 self.assertEqual(inner_ip[ICMPerror].id, self.icmp_id_out)
488 except:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200489 self.logger.error(
490 ppp("Unexpected or invalid packet (outside network):", packet)
491 )
Filip Varga18f1e412020-12-03 15:27:40 +0100492 raise
493
494 def verify_capture_in_with_icmp_errors(self, capture, in_if, icmp_type=11):
495 """
496 Verify captured packets with ICMP errors on inside network
497
498 :param capture: Captured packets
499 :param in_if: Inside interface
500 :param icmp_type: Type of error ICMP packet
501 we are expecting (Default 11)
502 """
503 for packet in capture:
504 try:
505 self.assertEqual(packet[IP].dst, in_if.remote_ip4)
506 self.assertEqual(packet.haslayer(ICMP), 1)
507 icmp = packet[ICMP]
508 self.assertEqual(icmp.type, icmp_type)
509 self.assertTrue(icmp.haslayer(IPerror))
510 inner_ip = icmp[IPerror]
511 if inner_ip.haslayer(TCPerror):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200512 self.assertEqual(inner_ip[TCPerror].sport, self.tcp_port_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100513 elif inner_ip.haslayer(UDPerror):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200514 self.assertEqual(inner_ip[UDPerror].sport, self.udp_port_in)
Filip Varga18f1e412020-12-03 15:27:40 +0100515 else:
516 self.assertEqual(inner_ip[ICMPerror].id, self.icmp_id_in)
517 except:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200518 self.logger.error(
519 ppp("Unexpected or invalid packet (inside network):", packet)
520 )
Filip Varga18f1e412020-12-03 15:27:40 +0100521 raise
522
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200523 def create_stream_frag(
524 self, src_if, dst, sport, dport, data, proto=IP_PROTOS.tcp, echo_reply=False
525 ):
Filip Varga18f1e412020-12-03 15:27:40 +0100526 """
527 Create fragmented packet stream
528
529 :param src_if: Source interface
530 :param dst: Destination IPv4 address
531 :param sport: Source port
532 :param dport: Destination port
533 :param data: Payload data
534 :param proto: protocol (TCP, UDP, ICMP)
535 :param echo_reply: use echo_reply if protocol is ICMP
536 :returns: Fragments
537 """
538 if proto == IP_PROTOS.tcp:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200539 p = (
540 IP(src=src_if.remote_ip4, dst=dst)
541 / TCP(sport=sport, dport=dport)
542 / Raw(data)
543 )
Filip Varga18f1e412020-12-03 15:27:40 +0100544 p = p.__class__(scapy.compat.raw(p))
545 chksum = p[TCP].chksum
546 proto_header = TCP(sport=sport, dport=dport, chksum=chksum)
547 elif proto == IP_PROTOS.udp:
548 proto_header = UDP(sport=sport, dport=dport)
549 elif proto == IP_PROTOS.icmp:
550 if not echo_reply:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200551 proto_header = ICMP(id=sport, type="echo-request")
Filip Varga18f1e412020-12-03 15:27:40 +0100552 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200553 proto_header = ICMP(id=sport, type="echo-reply")
Filip Varga18f1e412020-12-03 15:27:40 +0100554 else:
555 raise Exception("Unsupported protocol")
556 id = random.randint(0, 65535)
557 pkts = []
558 if proto == IP_PROTOS.tcp:
559 raw = Raw(data[0:4])
560 else:
561 raw = Raw(data[0:16])
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200562 p = (
563 Ether(src=src_if.remote_mac, dst=src_if.local_mac)
564 / IP(src=src_if.remote_ip4, dst=dst, flags="MF", frag=0, id=id)
565 / proto_header
566 / raw
567 )
Filip Varga18f1e412020-12-03 15:27:40 +0100568 pkts.append(p)
569 if proto == IP_PROTOS.tcp:
570 raw = Raw(data[4:20])
571 else:
572 raw = Raw(data[16:32])
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200573 p = (
574 Ether(src=src_if.remote_mac, dst=src_if.local_mac)
575 / IP(src=src_if.remote_ip4, dst=dst, flags="MF", frag=3, id=id, proto=proto)
576 / raw
577 )
Filip Varga18f1e412020-12-03 15:27:40 +0100578 pkts.append(p)
579 if proto == IP_PROTOS.tcp:
580 raw = Raw(data[20:])
581 else:
582 raw = Raw(data[32:])
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200583 p = (
584 Ether(src=src_if.remote_mac, dst=src_if.local_mac)
585 / IP(src=src_if.remote_ip4, dst=dst, frag=5, proto=proto, id=id)
586 / raw
587 )
Filip Varga18f1e412020-12-03 15:27:40 +0100588 pkts.append(p)
589 return pkts
590
591 def reass_frags_and_verify(self, frags, src, dst):
592 """
593 Reassemble and verify fragmented packet
594
595 :param frags: Captured fragments
596 :param src: Source IPv4 address to verify
597 :param dst: Destination IPv4 address to verify
598
599 :returns: Reassembled IPv4 packet
600 """
601 buffer = BytesIO()
602 for p in frags:
603 self.assertEqual(p[IP].src, src)
604 self.assertEqual(p[IP].dst, dst)
605 self.assert_ip_checksum_valid(p)
606 buffer.seek(p[IP].frag * 8)
607 buffer.write(bytes(p[IP].payload))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200608 ip = IP(src=frags[0][IP].src, dst=frags[0][IP].dst, proto=frags[0][IP].proto)
Filip Varga18f1e412020-12-03 15:27:40 +0100609 if ip.proto == IP_PROTOS.tcp:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200610 p = ip / TCP(buffer.getvalue())
Filip Varga18f1e412020-12-03 15:27:40 +0100611 self.logger.debug(ppp("Reassembled:", p))
612 self.assert_tcp_checksum_valid(p)
613 elif ip.proto == IP_PROTOS.udp:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200614 p = ip / UDP(buffer.getvalue()[:8]) / Raw(buffer.getvalue()[8:])
Filip Varga18f1e412020-12-03 15:27:40 +0100615 elif ip.proto == IP_PROTOS.icmp:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200616 p = ip / ICMP(buffer.getvalue())
Filip Varga18f1e412020-12-03 15:27:40 +0100617 return p
618
619 def verify_ipfix_nat44_ses(self, data):
620 """
621 Verify IPFIX NAT44EI session create/delete event
622
623 :param data: Decoded IPFIX data records
624 """
625 nat44_ses_create_num = 0
626 nat44_ses_delete_num = 0
627 self.assertEqual(6, len(data))
628 for record in data:
629 # natEvent
630 self.assertIn(scapy.compat.orb(record[230]), [4, 5])
631 if scapy.compat.orb(record[230]) == 4:
632 nat44_ses_create_num += 1
633 else:
634 nat44_ses_delete_num += 1
635 # sourceIPv4Address
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200636 self.assertEqual(self.pg0.remote_ip4, str(ipaddress.IPv4Address(record[8])))
Filip Varga18f1e412020-12-03 15:27:40 +0100637 # postNATSourceIPv4Address
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200638 self.assertEqual(
639 socket.inet_pton(socket.AF_INET, self.nat_addr), record[225]
640 )
Filip Varga18f1e412020-12-03 15:27:40 +0100641 # ingressVRFID
642 self.assertEqual(struct.pack("!I", 0), record[234])
643 # protocolIdentifier/sourceTransportPort
644 # /postNAPTSourceTransportPort
645 if IP_PROTOS.icmp == scapy.compat.orb(record[4]):
646 self.assertEqual(struct.pack("!H", self.icmp_id_in), record[7])
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200647 self.assertEqual(struct.pack("!H", self.icmp_id_out), record[227])
Filip Varga18f1e412020-12-03 15:27:40 +0100648 elif IP_PROTOS.tcp == scapy.compat.orb(record[4]):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200649 self.assertEqual(struct.pack("!H", self.tcp_port_in), record[7])
650 self.assertEqual(struct.pack("!H", self.tcp_port_out), record[227])
Filip Varga18f1e412020-12-03 15:27:40 +0100651 elif IP_PROTOS.udp == scapy.compat.orb(record[4]):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200652 self.assertEqual(struct.pack("!H", self.udp_port_in), record[7])
653 self.assertEqual(struct.pack("!H", self.udp_port_out), record[227])
Filip Varga18f1e412020-12-03 15:27:40 +0100654 else:
Klement Sekeraff334db2021-05-26 13:02:35 +0200655 self.fail(f"Invalid protocol {scapy.compat.orb(record[4])}")
Filip Varga18f1e412020-12-03 15:27:40 +0100656 self.assertEqual(3, nat44_ses_create_num)
657 self.assertEqual(3, nat44_ses_delete_num)
658
659 def verify_ipfix_addr_exhausted(self, data):
660 self.assertEqual(1, len(data))
661 record = data[0]
662 # natEvent
663 self.assertEqual(scapy.compat.orb(record[230]), 3)
664 # natPoolID
665 self.assertEqual(struct.pack("!I", 0), record[283])
666
667 def verify_ipfix_max_sessions(self, data, limit):
668 self.assertEqual(1, len(data))
669 record = data[0]
670 # natEvent
671 self.assertEqual(scapy.compat.orb(record[230]), 13)
672 # natQuotaExceededEvent
Matthew Smithe3f078f2020-11-04 11:18:10 -0600673 self.assertEqual(struct.pack("!I", 1), record[466])
Filip Varga18f1e412020-12-03 15:27:40 +0100674 # maxSessionEntries
Matthew Smithe3f078f2020-11-04 11:18:10 -0600675 self.assertEqual(struct.pack("!I", limit), record[471])
Filip Varga18f1e412020-12-03 15:27:40 +0100676
677 def verify_no_nat44_user(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200678 """Verify that there is no NAT44EI user"""
Filip Varga0eaf4e62021-02-17 14:34:54 +0100679 users = self.vapi.nat44_ei_user_dump()
Filip Varga18f1e412020-12-03 15:27:40 +0100680 self.assertEqual(len(users), 0)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200681 users = self.statistics["/nat44-ei/total-users"]
Filip Varga18f1e412020-12-03 15:27:40 +0100682 self.assertEqual(users[0][0], 0)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200683 sessions = self.statistics["/nat44-ei/total-sessions"]
Filip Varga18f1e412020-12-03 15:27:40 +0100684 self.assertEqual(sessions[0][0], 0)
685
686 def verify_syslog_apmap(self, data, is_add=True):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200687 message = data.decode("utf-8")
Filip Varga18f1e412020-12-03 15:27:40 +0100688 try:
689 message = SyslogMessage.parse(message)
690 except ParseError as e:
691 self.logger.error(e)
692 raise
693 else:
694 self.assertEqual(message.severity, SyslogSeverity.info)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200695 self.assertEqual(message.appname, "NAT")
696 self.assertEqual(message.msgid, "APMADD" if is_add else "APMDEL")
697 sd_params = message.sd.get("napmap")
Filip Varga18f1e412020-12-03 15:27:40 +0100698 self.assertTrue(sd_params is not None)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200699 self.assertEqual(sd_params.get("IATYP"), "IPv4")
700 self.assertEqual(sd_params.get("ISADDR"), self.pg0.remote_ip4)
701 self.assertEqual(sd_params.get("ISPORT"), "%d" % self.tcp_port_in)
702 self.assertEqual(sd_params.get("XATYP"), "IPv4")
703 self.assertEqual(sd_params.get("XSADDR"), self.nat_addr)
704 self.assertEqual(sd_params.get("XSPORT"), "%d" % self.tcp_port_out)
705 self.assertEqual(sd_params.get("PROTO"), "%d" % IP_PROTOS.tcp)
706 self.assertTrue(sd_params.get("SSUBIX") is not None)
707 self.assertEqual(sd_params.get("SVLAN"), "0")
Filip Varga18f1e412020-12-03 15:27:40 +0100708
709 def verify_mss_value(self, pkt, mss):
710 if not pkt.haslayer(IP) or not pkt.haslayer(TCP):
711 raise TypeError("Not a TCP/IP packet")
712
713 for option in pkt[TCP].options:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200714 if option[0] == "MSS":
Filip Varga18f1e412020-12-03 15:27:40 +0100715 self.assertEqual(option[1], mss)
716 self.assert_tcp_checksum_valid(pkt)
717
718 @staticmethod
719 def proto2layer(proto):
720 if proto == IP_PROTOS.tcp:
721 return TCP
722 elif proto == IP_PROTOS.udp:
723 return UDP
724 elif proto == IP_PROTOS.icmp:
725 return ICMP
726 else:
727 raise Exception("Unsupported protocol")
728
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200729 def frag_in_order(
730 self, proto=IP_PROTOS.tcp, dont_translate=False, ignore_port=False
731 ):
Filip Varga18f1e412020-12-03 15:27:40 +0100732 layer = self.proto2layer(proto)
733
734 if proto == IP_PROTOS.tcp:
735 data = b"A" * 4 + b"B" * 16 + b"C" * 3
736 else:
737 data = b"A" * 16 + b"B" * 16 + b"C" * 3
738 self.port_in = random.randint(1025, 65535)
739
740 # in2out
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200741 pkts = self.create_stream_frag(
742 self.pg0, self.pg1.remote_ip4, self.port_in, 20, data, proto
743 )
Filip Varga18f1e412020-12-03 15:27:40 +0100744 self.pg0.add_stream(pkts)
745 self.pg_enable_capture(self.pg_interfaces)
746 self.pg_start()
747 frags = self.pg1.get_capture(len(pkts))
748 if not dont_translate:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200749 p = self.reass_frags_and_verify(frags, self.nat_addr, self.pg1.remote_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +0100750 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200751 p = self.reass_frags_and_verify(
752 frags, self.pg0.remote_ip4, self.pg1.remote_ip4
753 )
Filip Varga18f1e412020-12-03 15:27:40 +0100754 if proto != IP_PROTOS.icmp:
755 if not dont_translate:
756 self.assertEqual(p[layer].dport, 20)
757 if not ignore_port:
758 self.assertNotEqual(p[layer].sport, self.port_in)
759 else:
760 self.assertEqual(p[layer].sport, self.port_in)
761 else:
762 if not ignore_port:
763 if not dont_translate:
764 self.assertNotEqual(p[layer].id, self.port_in)
765 else:
766 self.assertEqual(p[layer].id, self.port_in)
767 self.assertEqual(data, p[Raw].load)
768
769 # out2in
770 if not dont_translate:
771 dst_addr = self.nat_addr
772 else:
773 dst_addr = self.pg0.remote_ip4
774 if proto != IP_PROTOS.icmp:
775 sport = 20
776 dport = p[layer].sport
777 else:
778 sport = p[layer].id
779 dport = 0
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200780 pkts = self.create_stream_frag(
781 self.pg1, dst_addr, sport, dport, data, proto, echo_reply=True
782 )
Filip Varga18f1e412020-12-03 15:27:40 +0100783 self.pg1.add_stream(pkts)
784 self.pg_enable_capture(self.pg_interfaces)
785 self.pg_start()
786 frags = self.pg0.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200787 p = self.reass_frags_and_verify(frags, self.pg1.remote_ip4, self.pg0.remote_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +0100788 if proto != IP_PROTOS.icmp:
789 self.assertEqual(p[layer].sport, 20)
790 self.assertEqual(p[layer].dport, self.port_in)
791 else:
792 self.assertEqual(p[layer].id, self.port_in)
793 self.assertEqual(data, p[Raw].load)
794
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200795 def reass_hairpinning(
796 self,
797 server_addr,
798 server_in_port,
799 server_out_port,
800 host_in_port,
801 proto=IP_PROTOS.tcp,
802 ignore_port=False,
803 ):
Filip Varga18f1e412020-12-03 15:27:40 +0100804
805 layer = self.proto2layer(proto)
806
807 if proto == IP_PROTOS.tcp:
808 data = b"A" * 4 + b"B" * 16 + b"C" * 3
809 else:
810 data = b"A" * 16 + b"B" * 16 + b"C" * 3
811
812 # send packet from host to server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200813 pkts = self.create_stream_frag(
814 self.pg0, self.nat_addr, host_in_port, server_out_port, data, proto
815 )
Filip Varga18f1e412020-12-03 15:27:40 +0100816 self.pg0.add_stream(pkts)
817 self.pg_enable_capture(self.pg_interfaces)
818 self.pg_start()
819 frags = self.pg0.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200820 p = self.reass_frags_and_verify(frags, self.nat_addr, server_addr)
Filip Varga18f1e412020-12-03 15:27:40 +0100821 if proto != IP_PROTOS.icmp:
822 if not ignore_port:
823 self.assertNotEqual(p[layer].sport, host_in_port)
824 self.assertEqual(p[layer].dport, server_in_port)
825 else:
826 if not ignore_port:
827 self.assertNotEqual(p[layer].id, host_in_port)
828 self.assertEqual(data, p[Raw].load)
829
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200830 def frag_out_of_order(
831 self, proto=IP_PROTOS.tcp, dont_translate=False, ignore_port=False
832 ):
Filip Varga18f1e412020-12-03 15:27:40 +0100833 layer = self.proto2layer(proto)
834
835 if proto == IP_PROTOS.tcp:
836 data = b"A" * 4 + b"B" * 16 + b"C" * 3
837 else:
838 data = b"A" * 16 + b"B" * 16 + b"C" * 3
839 self.port_in = random.randint(1025, 65535)
840
841 for i in range(2):
842 # in2out
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200843 pkts = self.create_stream_frag(
844 self.pg0, self.pg1.remote_ip4, self.port_in, 20, data, proto
845 )
Filip Varga18f1e412020-12-03 15:27:40 +0100846 pkts.reverse()
847 self.pg0.add_stream(pkts)
848 self.pg_enable_capture(self.pg_interfaces)
849 self.pg_start()
850 frags = self.pg1.get_capture(len(pkts))
851 if not dont_translate:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200852 p = self.reass_frags_and_verify(
853 frags, self.nat_addr, self.pg1.remote_ip4
854 )
Filip Varga18f1e412020-12-03 15:27:40 +0100855 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200856 p = self.reass_frags_and_verify(
857 frags, self.pg0.remote_ip4, self.pg1.remote_ip4
858 )
Filip Varga18f1e412020-12-03 15:27:40 +0100859 if proto != IP_PROTOS.icmp:
860 if not dont_translate:
861 self.assertEqual(p[layer].dport, 20)
862 if not ignore_port:
863 self.assertNotEqual(p[layer].sport, self.port_in)
864 else:
865 self.assertEqual(p[layer].sport, self.port_in)
866 else:
867 if not ignore_port:
868 if not dont_translate:
869 self.assertNotEqual(p[layer].id, self.port_in)
870 else:
871 self.assertEqual(p[layer].id, self.port_in)
872 self.assertEqual(data, p[Raw].load)
873
874 # out2in
875 if not dont_translate:
876 dst_addr = self.nat_addr
877 else:
878 dst_addr = self.pg0.remote_ip4
879 if proto != IP_PROTOS.icmp:
880 sport = 20
881 dport = p[layer].sport
882 else:
883 sport = p[layer].id
884 dport = 0
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200885 pkts = self.create_stream_frag(
886 self.pg1, dst_addr, sport, dport, data, proto, echo_reply=True
887 )
Filip Varga18f1e412020-12-03 15:27:40 +0100888 pkts.reverse()
889 self.pg1.add_stream(pkts)
890 self.pg_enable_capture(self.pg_interfaces)
891 self.pg_start()
892 frags = self.pg0.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200893 p = self.reass_frags_and_verify(
894 frags, self.pg1.remote_ip4, self.pg0.remote_ip4
895 )
Filip Varga18f1e412020-12-03 15:27:40 +0100896 if proto != IP_PROTOS.icmp:
897 self.assertEqual(p[layer].sport, 20)
898 self.assertEqual(p[layer].dport, self.port_in)
899 else:
900 self.assertEqual(p[layer].id, self.port_in)
901 self.assertEqual(data, p[Raw].load)
902
903
Klement Sekeraeafb5db2021-03-15 16:34:01 +0100904def get_nat44_ei_in2out_worker_index(ip, vpp_worker_count):
905 if 0 == vpp_worker_count:
906 return 0
907 numeric = socket.inet_aton(ip)
908 numeric = struct.unpack("!L", numeric)[0]
909 numeric = socket.htonl(numeric)
910 h = numeric + (numeric >> 8) + (numeric >> 16) + (numeric >> 24)
911 return 1 + h % vpp_worker_count
912
913
Dave Wallace670724c2022-09-20 21:52:18 -0400914@tag_fixme_debian11
Filip Varga18f1e412020-12-03 15:27:40 +0100915class TestNAT44EI(MethodHolder):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200916 """NAT44EI Test Cases"""
Filip Varga18f1e412020-12-03 15:27:40 +0100917
918 max_translations = 10240
919 max_users = 10240
920
921 @classmethod
922 def setUpClass(cls):
923 super(TestNAT44EI, cls).setUpClass()
Dave Wallace670724c2022-09-20 21:52:18 -0400924 if is_distro_debian11 == True and not hasattr(cls, "vpp"):
925 return
Filip Varga0eaf4e62021-02-17 14:34:54 +0100926 cls.vapi.cli("set log class nat44-ei level debug")
Filip Varga18f1e412020-12-03 15:27:40 +0100927
928 cls.tcp_port_in = 6303
929 cls.tcp_port_out = 6303
930 cls.udp_port_in = 6304
931 cls.udp_port_out = 6304
932 cls.icmp_id_in = 6305
933 cls.icmp_id_out = 6305
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200934 cls.nat_addr = "10.0.0.3"
Filip Varga18f1e412020-12-03 15:27:40 +0100935 cls.ipfix_src_port = 4739
936 cls.ipfix_domain_id = 1
937 cls.tcp_external_port = 80
938 cls.udp_external_port = 69
939
940 cls.create_pg_interfaces(range(10))
941 cls.interfaces = list(cls.pg_interfaces[0:4])
942
943 for i in cls.interfaces:
944 i.admin_up()
945 i.config_ip4()
946 i.resolve_arp()
947
948 cls.pg0.generate_remote_hosts(3)
949 cls.pg0.configure_ipv4_neighbors()
950
951 cls.pg1.generate_remote_hosts(1)
952 cls.pg1.configure_ipv4_neighbors()
953
954 cls.overlapping_interfaces = list(list(cls.pg_interfaces[4:7]))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200955 cls.vapi.ip_table_add_del(is_add=1, table={"table_id": 10})
956 cls.vapi.ip_table_add_del(is_add=1, table={"table_id": 20})
Filip Varga18f1e412020-12-03 15:27:40 +0100957
958 cls.pg4._local_ip4 = "172.16.255.1"
959 cls.pg4._remote_hosts[0]._ip4 = "172.16.255.2"
960 cls.pg4.set_table_ip4(10)
961 cls.pg5._local_ip4 = "172.17.255.3"
962 cls.pg5._remote_hosts[0]._ip4 = "172.17.255.4"
963 cls.pg5.set_table_ip4(10)
964 cls.pg6._local_ip4 = "172.16.255.1"
965 cls.pg6._remote_hosts[0]._ip4 = "172.16.255.2"
966 cls.pg6.set_table_ip4(20)
967 for i in cls.overlapping_interfaces:
968 i.config_ip4()
969 i.admin_up()
970 i.resolve_arp()
971
972 cls.pg7.admin_up()
973 cls.pg8.admin_up()
974
975 cls.pg9.generate_remote_hosts(2)
976 cls.pg9.config_ip4()
977 cls.vapi.sw_interface_add_del_address(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200978 sw_if_index=cls.pg9.sw_if_index, prefix="10.0.0.1/24"
979 )
Filip Varga18f1e412020-12-03 15:27:40 +0100980
981 cls.pg9.admin_up()
982 cls.pg9.resolve_arp()
983 cls.pg9._remote_hosts[1]._ip4 = cls.pg9._remote_hosts[0]._ip4
984 cls.pg4._remote_ip4 = cls.pg9._remote_hosts[0]._ip4 = "10.0.0.2"
985 cls.pg9.resolve_arp()
986
Filip Varga0eaf4e62021-02-17 14:34:54 +0100987 def plugin_enable(self):
988 self.vapi.nat44_ei_plugin_enable_disable(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200989 sessions=self.max_translations, users=self.max_users, enable=1
990 )
Filip Varga18f1e412020-12-03 15:27:40 +0100991
Filip Varga0eaf4e62021-02-17 14:34:54 +0100992 def setUp(self):
993 super(TestNAT44EI, self).setUp()
994 self.plugin_enable()
995
Filip Varga18f1e412020-12-03 15:27:40 +0100996 def tearDown(self):
997 super(TestNAT44EI, self).tearDown()
998 if not self.vpp_dead:
Filip Varga0eaf4e62021-02-17 14:34:54 +0100999 self.vapi.nat44_ei_ipfix_enable_disable(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001000 domain_id=self.ipfix_domain_id, src_port=self.ipfix_src_port, enable=0
1001 )
Filip Varga18f1e412020-12-03 15:27:40 +01001002 self.ipfix_src_port = 4739
1003 self.ipfix_domain_id = 1
1004
Filip Varga0eaf4e62021-02-17 14:34:54 +01001005 self.vapi.nat44_ei_plugin_enable_disable(enable=0)
Filip Varga18f1e412020-12-03 15:27:40 +01001006 self.vapi.cli("clear logging")
1007
1008 def test_clear_sessions(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001009 """NAT44EI session clearing test"""
Filip Varga18f1e412020-12-03 15:27:40 +01001010
1011 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001012 flags = self.config_flags.NAT44_EI_IF_INSIDE
1013 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001014 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1015 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001016 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001017 sw_if_index=self.pg1.sw_if_index, is_add=1
1018 )
Filip Varga18f1e412020-12-03 15:27:40 +01001019
Filip Varga18f1e412020-12-03 15:27:40 +01001020 pkts = self.create_stream_in(self.pg0, self.pg1)
1021 self.pg0.add_stream(pkts)
1022 self.pg_enable_capture(self.pg_interfaces)
1023 self.pg_start()
1024 capture = self.pg1.get_capture(len(pkts))
1025 self.verify_capture_out(capture)
1026
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001027 sessions = self.statistics["/nat44-ei/total-sessions"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001028 self.assertGreater(sessions[:, 0].sum(), 0, "Session count invalid")
Filip Varga18f1e412020-12-03 15:27:40 +01001029 self.logger.info("sessions before clearing: %s" % sessions[0][0])
1030
Filip Varga0eaf4e62021-02-17 14:34:54 +01001031 self.vapi.cli("clear nat44 ei sessions")
Filip Varga18f1e412020-12-03 15:27:40 +01001032
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001033 sessions = self.statistics["/nat44-ei/total-sessions"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001034 self.assertEqual(sessions[:, 0].sum(), 0, "Session count invalid")
Filip Varga18f1e412020-12-03 15:27:40 +01001035 self.logger.info("sessions after clearing: %s" % sessions[0][0])
1036
1037 def test_dynamic(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001038 """NAT44EI dynamic translation test"""
Filip Varga18f1e412020-12-03 15:27:40 +01001039 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001040 flags = self.config_flags.NAT44_EI_IF_INSIDE
1041 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001042 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1043 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001044 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001045 sw_if_index=self.pg1.sw_if_index, is_add=1
1046 )
Filip Varga18f1e412020-12-03 15:27:40 +01001047
1048 # in2out
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001049 tcpn = self.statistics["/nat44-ei/in2out/slowpath/tcp"]
1050 udpn = self.statistics["/nat44-ei/in2out/slowpath/udp"]
1051 icmpn = self.statistics["/nat44-ei/in2out/slowpath/icmp"]
1052 drops = self.statistics["/nat44-ei/in2out/slowpath/drops"]
Filip Varga18f1e412020-12-03 15:27:40 +01001053
1054 pkts = self.create_stream_in(self.pg0, self.pg1)
1055 self.pg0.add_stream(pkts)
1056 self.pg_enable_capture(self.pg_interfaces)
1057 self.pg_start()
1058 capture = self.pg1.get_capture(len(pkts))
1059 self.verify_capture_out(capture)
1060
1061 if_idx = self.pg0.sw_if_index
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001062 cnt = self.statistics["/nat44-ei/in2out/slowpath/tcp"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001063 self.assertEqual(cnt[:, if_idx].sum() - tcpn[:, if_idx].sum(), 2)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001064 cnt = self.statistics["/nat44-ei/in2out/slowpath/udp"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001065 self.assertEqual(cnt[:, if_idx].sum() - udpn[:, if_idx].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001066 cnt = self.statistics["/nat44-ei/in2out/slowpath/icmp"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001067 self.assertEqual(cnt[:, if_idx].sum() - icmpn[:, if_idx].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001068 cnt = self.statistics["/nat44-ei/in2out/slowpath/drops"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001069 self.assertEqual(cnt[:, if_idx].sum() - drops[:, if_idx].sum(), 0)
Filip Varga18f1e412020-12-03 15:27:40 +01001070
1071 # out2in
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001072 tcpn = self.statistics["/nat44-ei/out2in/slowpath/tcp"]
1073 udpn = self.statistics["/nat44-ei/out2in/slowpath/udp"]
1074 icmpn = self.statistics["/nat44-ei/out2in/slowpath/icmp"]
1075 drops = self.statistics["/nat44-ei/out2in/slowpath/drops"]
Filip Varga18f1e412020-12-03 15:27:40 +01001076
1077 pkts = self.create_stream_out(self.pg1)
1078 self.pg1.add_stream(pkts)
1079 self.pg_enable_capture(self.pg_interfaces)
1080 self.pg_start()
1081 capture = self.pg0.get_capture(len(pkts))
1082 self.verify_capture_in(capture, self.pg0)
1083
1084 if_idx = self.pg1.sw_if_index
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001085 cnt = self.statistics["/nat44-ei/out2in/slowpath/tcp"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001086 self.assertEqual(cnt[:, if_idx].sum() - tcpn[:, if_idx].sum(), 2)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001087 cnt = self.statistics["/nat44-ei/out2in/slowpath/udp"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001088 self.assertEqual(cnt[:, if_idx].sum() - udpn[:, if_idx].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001089 cnt = self.statistics["/nat44-ei/out2in/slowpath/icmp"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001090 self.assertEqual(cnt[:, if_idx].sum() - icmpn[:, if_idx].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001091 cnt = self.statistics["/nat44-ei/out2in/slowpath/drops"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001092 self.assertEqual(cnt[:, if_idx].sum() - drops[:, if_idx].sum(), 0)
Filip Varga18f1e412020-12-03 15:27:40 +01001093
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001094 users = self.statistics["/nat44-ei/total-users"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001095 self.assertEqual(users[:, 0].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001096 sessions = self.statistics["/nat44-ei/total-sessions"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001097 self.assertEqual(sessions[:, 0].sum(), 3)
Filip Varga18f1e412020-12-03 15:27:40 +01001098
1099 def test_dynamic_icmp_errors_in2out_ttl_1(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001100 """NAT44EI handling of client packets with TTL=1"""
Filip Varga18f1e412020-12-03 15:27:40 +01001101
1102 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001103 flags = self.config_flags.NAT44_EI_IF_INSIDE
1104 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001105 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1106 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001107 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001108 sw_if_index=self.pg1.sw_if_index, is_add=1
1109 )
Filip Varga18f1e412020-12-03 15:27:40 +01001110
1111 # Client side - generate traffic
1112 pkts = self.create_stream_in(self.pg0, self.pg1, ttl=1)
Neale Ranns5c6dd172022-02-17 09:08:47 +00001113 capture = self.send_and_expect_some(self.pg0, pkts, self.pg0)
Filip Varga18f1e412020-12-03 15:27:40 +01001114
1115 # Client side - verify ICMP type 11 packets
Filip Varga18f1e412020-12-03 15:27:40 +01001116 self.verify_capture_in_with_icmp_errors(capture, self.pg0)
1117
1118 def test_dynamic_icmp_errors_out2in_ttl_1(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001119 """NAT44EI handling of server packets with TTL=1"""
Filip Varga18f1e412020-12-03 15:27:40 +01001120
1121 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001122 flags = self.config_flags.NAT44_EI_IF_INSIDE
1123 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001124 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1125 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001126 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001127 sw_if_index=self.pg1.sw_if_index, is_add=1
1128 )
Filip Varga18f1e412020-12-03 15:27:40 +01001129
1130 # Client side - create sessions
1131 pkts = self.create_stream_in(self.pg0, self.pg1)
1132 self.pg0.add_stream(pkts)
1133 self.pg_enable_capture(self.pg_interfaces)
1134 self.pg_start()
1135
1136 # Server side - generate traffic
1137 capture = self.pg1.get_capture(len(pkts))
1138 self.verify_capture_out(capture)
1139 pkts = self.create_stream_out(self.pg1, ttl=1)
Neale Ranns5c6dd172022-02-17 09:08:47 +00001140 capture = self.send_and_expect_some(self.pg1, pkts, self.pg1)
Filip Varga18f1e412020-12-03 15:27:40 +01001141
1142 # Server side - verify ICMP type 11 packets
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001143 self.verify_capture_out_with_icmp_errors(capture, src_ip=self.pg1.local_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +01001144
1145 def test_dynamic_icmp_errors_in2out_ttl_2(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001146 """NAT44EI handling of error responses to client packets with TTL=2"""
Filip Varga18f1e412020-12-03 15:27:40 +01001147
1148 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001149 flags = self.config_flags.NAT44_EI_IF_INSIDE
1150 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001151 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1152 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001153 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001154 sw_if_index=self.pg1.sw_if_index, is_add=1
1155 )
Filip Varga18f1e412020-12-03 15:27:40 +01001156
1157 # Client side - generate traffic
1158 pkts = self.create_stream_in(self.pg0, self.pg1, ttl=2)
1159 self.pg0.add_stream(pkts)
1160 self.pg_enable_capture(self.pg_interfaces)
1161 self.pg_start()
1162
1163 # Server side - simulate ICMP type 11 response
1164 capture = self.pg1.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001165 pkts = [
1166 Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
1167 / IP(src=self.pg1.remote_ip4, dst=self.nat_addr)
1168 / ICMP(type=11)
1169 / packet[IP]
1170 for packet in capture
1171 ]
Filip Varga18f1e412020-12-03 15:27:40 +01001172 self.pg1.add_stream(pkts)
1173 self.pg_enable_capture(self.pg_interfaces)
1174 self.pg_start()
1175
1176 # Client side - verify ICMP type 11 packets
1177 capture = self.pg0.get_capture(len(pkts))
1178 self.verify_capture_in_with_icmp_errors(capture, self.pg0)
1179
1180 def test_dynamic_icmp_errors_out2in_ttl_2(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001181 """NAT44EI handling of error responses to server packets with TTL=2"""
Filip Varga18f1e412020-12-03 15:27:40 +01001182
1183 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001184 flags = self.config_flags.NAT44_EI_IF_INSIDE
1185 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001186 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1187 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001188 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001189 sw_if_index=self.pg1.sw_if_index, is_add=1
1190 )
Filip Varga18f1e412020-12-03 15:27:40 +01001191
1192 # Client side - create sessions
1193 pkts = self.create_stream_in(self.pg0, self.pg1)
1194 self.pg0.add_stream(pkts)
1195 self.pg_enable_capture(self.pg_interfaces)
1196 self.pg_start()
1197
1198 # Server side - generate traffic
1199 capture = self.pg1.get_capture(len(pkts))
1200 self.verify_capture_out(capture)
1201 pkts = self.create_stream_out(self.pg1, ttl=2)
1202 self.pg1.add_stream(pkts)
1203 self.pg_enable_capture(self.pg_interfaces)
1204 self.pg_start()
1205
1206 # Client side - simulate ICMP type 11 response
1207 capture = self.pg0.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001208 pkts = [
1209 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
1210 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
1211 / ICMP(type=11)
1212 / packet[IP]
1213 for packet in capture
1214 ]
Filip Varga18f1e412020-12-03 15:27:40 +01001215 self.pg0.add_stream(pkts)
1216 self.pg_enable_capture(self.pg_interfaces)
1217 self.pg_start()
1218
1219 # Server side - verify ICMP type 11 packets
1220 capture = self.pg1.get_capture(len(pkts))
1221 self.verify_capture_out_with_icmp_errors(capture)
1222
1223 def test_ping_out_interface_from_outside(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001224 """NAT44EI ping out interface from outside network"""
Filip Varga18f1e412020-12-03 15:27:40 +01001225
1226 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001227 flags = self.config_flags.NAT44_EI_IF_INSIDE
1228 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001229 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1230 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001231 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001232 sw_if_index=self.pg1.sw_if_index, is_add=1
1233 )
Filip Varga18f1e412020-12-03 15:27:40 +01001234
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001235 p = (
1236 Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
1237 / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4)
1238 / ICMP(id=self.icmp_id_out, type="echo-request")
1239 )
Filip Varga18f1e412020-12-03 15:27:40 +01001240 pkts = [p]
1241 self.pg1.add_stream(pkts)
1242 self.pg_enable_capture(self.pg_interfaces)
1243 self.pg_start()
1244 capture = self.pg1.get_capture(len(pkts))
1245 packet = capture[0]
1246 try:
1247 self.assertEqual(packet[IP].src, self.pg1.local_ip4)
1248 self.assertEqual(packet[IP].dst, self.pg1.remote_ip4)
1249 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
1250 self.assertEqual(packet[ICMP].type, 0) # echo reply
1251 except:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001252 self.logger.error(
1253 ppp("Unexpected or invalid packet (outside network):", packet)
1254 )
Filip Varga18f1e412020-12-03 15:27:40 +01001255 raise
1256
1257 def test_ping_internal_host_from_outside(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001258 """NAT44EI ping internal host from outside network"""
Filip Varga18f1e412020-12-03 15:27:40 +01001259
1260 self.nat44_add_static_mapping(self.pg0.remote_ip4, self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001261 flags = self.config_flags.NAT44_EI_IF_INSIDE
1262 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001263 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1264 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001265 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001266 sw_if_index=self.pg1.sw_if_index, is_add=1
1267 )
Filip Varga18f1e412020-12-03 15:27:40 +01001268
1269 # out2in
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001270 pkt = (
1271 Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
1272 / IP(src=self.pg1.remote_ip4, dst=self.nat_addr, ttl=64)
1273 / ICMP(id=self.icmp_id_out, type="echo-request")
1274 )
Filip Varga18f1e412020-12-03 15:27:40 +01001275 self.pg1.add_stream(pkt)
1276 self.pg_enable_capture(self.pg_interfaces)
1277 self.pg_start()
1278 capture = self.pg0.get_capture(1)
1279 self.verify_capture_in(capture, self.pg0)
1280 self.assert_equal(capture[0][IP].proto, IP_PROTOS.icmp)
1281
1282 # in2out
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001283 pkt = (
1284 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
1285 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4, ttl=64)
1286 / ICMP(id=self.icmp_id_in, type="echo-reply")
1287 )
Filip Varga18f1e412020-12-03 15:27:40 +01001288 self.pg0.add_stream(pkt)
1289 self.pg_enable_capture(self.pg_interfaces)
1290 self.pg_start()
1291 capture = self.pg1.get_capture(1)
1292 self.verify_capture_out(capture, same_port=True)
1293 self.assert_equal(capture[0][IP].proto, IP_PROTOS.icmp)
1294
1295 def test_forwarding(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001296 """NAT44EI forwarding test"""
Filip Varga18f1e412020-12-03 15:27:40 +01001297
Filip Varga0eaf4e62021-02-17 14:34:54 +01001298 flags = self.config_flags.NAT44_EI_IF_INSIDE
1299 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001300 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1301 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001302 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001303 sw_if_index=self.pg1.sw_if_index, is_add=1
1304 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001305 self.vapi.nat44_ei_forwarding_enable_disable(enable=1)
Filip Varga18f1e412020-12-03 15:27:40 +01001306
1307 real_ip = self.pg0.remote_ip4
1308 alias_ip = self.nat_addr
Filip Varga0eaf4e62021-02-17 14:34:54 +01001309 flags = self.config_flags.NAT44_EI_ADDR_ONLY_MAPPING
1310 self.vapi.nat44_ei_add_del_static_mapping(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001311 is_add=1,
1312 local_ip_address=real_ip,
Filip Varga0eaf4e62021-02-17 14:34:54 +01001313 external_ip_address=alias_ip,
1314 external_sw_if_index=0xFFFFFFFF,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001315 flags=flags,
1316 )
Filip Varga18f1e412020-12-03 15:27:40 +01001317
1318 try:
1319 # static mapping match
1320
1321 pkts = self.create_stream_out(self.pg1)
1322 self.pg1.add_stream(pkts)
1323 self.pg_enable_capture(self.pg_interfaces)
1324 self.pg_start()
1325 capture = self.pg0.get_capture(len(pkts))
1326 self.verify_capture_in(capture, self.pg0)
1327
1328 pkts = self.create_stream_in(self.pg0, self.pg1)
1329 self.pg0.add_stream(pkts)
1330 self.pg_enable_capture(self.pg_interfaces)
1331 self.pg_start()
1332 capture = self.pg1.get_capture(len(pkts))
1333 self.verify_capture_out(capture, same_port=True)
1334
1335 # no static mapping match
1336
1337 host0 = self.pg0.remote_hosts[0]
1338 self.pg0.remote_hosts[0] = self.pg0.remote_hosts[1]
1339 try:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001340 pkts = self.create_stream_out(
1341 self.pg1, dst_ip=self.pg0.remote_ip4, use_inside_ports=True
1342 )
Filip Varga18f1e412020-12-03 15:27:40 +01001343 self.pg1.add_stream(pkts)
1344 self.pg_enable_capture(self.pg_interfaces)
1345 self.pg_start()
1346 capture = self.pg0.get_capture(len(pkts))
1347 self.verify_capture_in(capture, self.pg0)
1348
1349 pkts = self.create_stream_in(self.pg0, self.pg1)
1350 self.pg0.add_stream(pkts)
1351 self.pg_enable_capture(self.pg_interfaces)
1352 self.pg_start()
1353 capture = self.pg1.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001354 self.verify_capture_out(
1355 capture, nat_ip=self.pg0.remote_ip4, same_port=True
1356 )
Filip Varga18f1e412020-12-03 15:27:40 +01001357 finally:
1358 self.pg0.remote_hosts[0] = host0
1359
1360 finally:
Filip Varga0eaf4e62021-02-17 14:34:54 +01001361 self.vapi.nat44_ei_forwarding_enable_disable(enable=0)
1362 flags = self.config_flags.NAT44_EI_ADDR_ONLY_MAPPING
1363 self.vapi.nat44_ei_add_del_static_mapping(
Filip Varga18f1e412020-12-03 15:27:40 +01001364 is_add=0,
1365 local_ip_address=real_ip,
1366 external_ip_address=alias_ip,
1367 external_sw_if_index=0xFFFFFFFF,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001368 flags=flags,
1369 )
Filip Varga18f1e412020-12-03 15:27:40 +01001370
1371 def test_static_in(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001372 """NAT44EI 1:1 NAT initialized from inside network"""
Filip Varga18f1e412020-12-03 15:27:40 +01001373
1374 nat_ip = "10.0.0.10"
1375 self.tcp_port_out = 6303
1376 self.udp_port_out = 6304
1377 self.icmp_id_out = 6305
1378
1379 self.nat44_add_static_mapping(self.pg0.remote_ip4, nat_ip)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001380 flags = self.config_flags.NAT44_EI_IF_INSIDE
1381 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001382 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1383 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001384 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001385 sw_if_index=self.pg1.sw_if_index, is_add=1
1386 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001387 sm = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01001388 self.assertEqual(len(sm), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001389 self.assertEqual(sm[0].tag, "")
Filip Varga18f1e412020-12-03 15:27:40 +01001390 self.assertEqual(sm[0].protocol, 0)
1391 self.assertEqual(sm[0].local_port, 0)
1392 self.assertEqual(sm[0].external_port, 0)
1393
1394 # in2out
1395 pkts = self.create_stream_in(self.pg0, self.pg1)
1396 self.pg0.add_stream(pkts)
1397 self.pg_enable_capture(self.pg_interfaces)
1398 self.pg_start()
1399 capture = self.pg1.get_capture(len(pkts))
1400 self.verify_capture_out(capture, nat_ip, True)
1401
1402 # out2in
1403 pkts = self.create_stream_out(self.pg1, nat_ip)
1404 self.pg1.add_stream(pkts)
1405 self.pg_enable_capture(self.pg_interfaces)
1406 self.pg_start()
1407 capture = self.pg0.get_capture(len(pkts))
1408 self.verify_capture_in(capture, self.pg0)
1409
1410 def test_static_out(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001411 """NAT44EI 1:1 NAT initialized from outside network"""
Filip Varga18f1e412020-12-03 15:27:40 +01001412
1413 nat_ip = "10.0.0.20"
1414 self.tcp_port_out = 6303
1415 self.udp_port_out = 6304
1416 self.icmp_id_out = 6305
1417 tag = "testTAG"
1418
1419 self.nat44_add_static_mapping(self.pg0.remote_ip4, nat_ip, tag=tag)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001420 flags = self.config_flags.NAT44_EI_IF_INSIDE
1421 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001422 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1423 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001424 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001425 sw_if_index=self.pg1.sw_if_index, is_add=1
1426 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001427 sm = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01001428 self.assertEqual(len(sm), 1)
1429 self.assertEqual(sm[0].tag, tag)
1430
1431 # out2in
1432 pkts = self.create_stream_out(self.pg1, nat_ip)
1433 self.pg1.add_stream(pkts)
1434 self.pg_enable_capture(self.pg_interfaces)
1435 self.pg_start()
1436 capture = self.pg0.get_capture(len(pkts))
1437 self.verify_capture_in(capture, self.pg0)
1438
1439 # in2out
1440 pkts = self.create_stream_in(self.pg0, self.pg1)
1441 self.pg0.add_stream(pkts)
1442 self.pg_enable_capture(self.pg_interfaces)
1443 self.pg_start()
1444 capture = self.pg1.get_capture(len(pkts))
1445 self.verify_capture_out(capture, nat_ip, True)
1446
1447 def test_static_with_port_in(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001448 """NAT44EI 1:1 NAPT initialized from inside network"""
Filip Varga18f1e412020-12-03 15:27:40 +01001449
1450 self.tcp_port_out = 3606
1451 self.udp_port_out = 3607
1452 self.icmp_id_out = 3608
1453
1454 self.nat44_add_address(self.nat_addr)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001455 self.nat44_add_static_mapping(
1456 self.pg0.remote_ip4,
1457 self.nat_addr,
1458 self.tcp_port_in,
1459 self.tcp_port_out,
1460 proto=IP_PROTOS.tcp,
1461 )
1462 self.nat44_add_static_mapping(
1463 self.pg0.remote_ip4,
1464 self.nat_addr,
1465 self.udp_port_in,
1466 self.udp_port_out,
1467 proto=IP_PROTOS.udp,
1468 )
1469 self.nat44_add_static_mapping(
1470 self.pg0.remote_ip4,
1471 self.nat_addr,
1472 self.icmp_id_in,
1473 self.icmp_id_out,
1474 proto=IP_PROTOS.icmp,
1475 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001476 flags = self.config_flags.NAT44_EI_IF_INSIDE
1477 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001478 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1479 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001480 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001481 sw_if_index=self.pg1.sw_if_index, is_add=1
1482 )
Filip Varga18f1e412020-12-03 15:27:40 +01001483
1484 # in2out
1485 pkts = self.create_stream_in(self.pg0, self.pg1)
1486 self.pg0.add_stream(pkts)
1487 self.pg_enable_capture(self.pg_interfaces)
1488 self.pg_start()
1489 capture = self.pg1.get_capture(len(pkts))
1490 self.verify_capture_out(capture)
1491
1492 # out2in
1493 pkts = self.create_stream_out(self.pg1)
1494 self.pg1.add_stream(pkts)
1495 self.pg_enable_capture(self.pg_interfaces)
1496 self.pg_start()
1497 capture = self.pg0.get_capture(len(pkts))
1498 self.verify_capture_in(capture, self.pg0)
1499
1500 def test_static_with_port_out(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001501 """NAT44EI 1:1 NAPT initialized from outside network"""
Filip Varga18f1e412020-12-03 15:27:40 +01001502
1503 self.tcp_port_out = 30606
1504 self.udp_port_out = 30607
1505 self.icmp_id_out = 30608
1506
1507 self.nat44_add_address(self.nat_addr)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001508 self.nat44_add_static_mapping(
1509 self.pg0.remote_ip4,
1510 self.nat_addr,
1511 self.tcp_port_in,
1512 self.tcp_port_out,
1513 proto=IP_PROTOS.tcp,
1514 )
1515 self.nat44_add_static_mapping(
1516 self.pg0.remote_ip4,
1517 self.nat_addr,
1518 self.udp_port_in,
1519 self.udp_port_out,
1520 proto=IP_PROTOS.udp,
1521 )
1522 self.nat44_add_static_mapping(
1523 self.pg0.remote_ip4,
1524 self.nat_addr,
1525 self.icmp_id_in,
1526 self.icmp_id_out,
1527 proto=IP_PROTOS.icmp,
1528 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001529 flags = self.config_flags.NAT44_EI_IF_INSIDE
1530 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001531 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1532 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001533 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001534 sw_if_index=self.pg1.sw_if_index, is_add=1
1535 )
Filip Varga18f1e412020-12-03 15:27:40 +01001536
1537 # out2in
1538 pkts = self.create_stream_out(self.pg1)
1539 self.pg1.add_stream(pkts)
1540 self.pg_enable_capture(self.pg_interfaces)
1541 self.pg_start()
1542 capture = self.pg0.get_capture(len(pkts))
1543 self.verify_capture_in(capture, self.pg0)
1544
1545 # in2out
1546 pkts = self.create_stream_in(self.pg0, self.pg1)
1547 self.pg0.add_stream(pkts)
1548 self.pg_enable_capture(self.pg_interfaces)
1549 self.pg_start()
1550 capture = self.pg1.get_capture(len(pkts))
1551 self.verify_capture_out(capture)
1552
1553 def test_static_vrf_aware(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001554 """NAT44EI 1:1 NAT VRF awareness"""
Filip Varga18f1e412020-12-03 15:27:40 +01001555
1556 nat_ip1 = "10.0.0.30"
1557 nat_ip2 = "10.0.0.40"
1558 self.tcp_port_out = 6303
1559 self.udp_port_out = 6304
1560 self.icmp_id_out = 6305
1561
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001562 self.nat44_add_static_mapping(self.pg4.remote_ip4, nat_ip1, vrf_id=10)
1563 self.nat44_add_static_mapping(self.pg0.remote_ip4, nat_ip2, vrf_id=10)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001564 flags = self.config_flags.NAT44_EI_IF_INSIDE
1565 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001566 sw_if_index=self.pg3.sw_if_index, is_add=1
1567 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001568 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001569 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1570 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001571 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001572 sw_if_index=self.pg4.sw_if_index, flags=flags, is_add=1
1573 )
Filip Varga18f1e412020-12-03 15:27:40 +01001574
1575 # inside interface VRF match NAT44EI static mapping VRF
1576 pkts = self.create_stream_in(self.pg4, self.pg3)
1577 self.pg4.add_stream(pkts)
1578 self.pg_enable_capture(self.pg_interfaces)
1579 self.pg_start()
1580 capture = self.pg3.get_capture(len(pkts))
1581 self.verify_capture_out(capture, nat_ip1, True)
1582
1583 # inside interface VRF don't match NAT44EI static mapping VRF (packets
1584 # are dropped)
1585 pkts = self.create_stream_in(self.pg0, self.pg3)
1586 self.pg0.add_stream(pkts)
1587 self.pg_enable_capture(self.pg_interfaces)
1588 self.pg_start()
1589 self.pg3.assert_nothing_captured()
1590
1591 def test_dynamic_to_static(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001592 """NAT44EI Switch from dynamic translation to 1:1NAT"""
Filip Varga18f1e412020-12-03 15:27:40 +01001593 nat_ip = "10.0.0.10"
1594 self.tcp_port_out = 6303
1595 self.udp_port_out = 6304
1596 self.icmp_id_out = 6305
1597
1598 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001599 flags = self.config_flags.NAT44_EI_IF_INSIDE
1600 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001601 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1602 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001603 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001604 sw_if_index=self.pg1.sw_if_index, is_add=1
1605 )
Filip Varga18f1e412020-12-03 15:27:40 +01001606
1607 # dynamic
1608 pkts = self.create_stream_in(self.pg0, self.pg1)
1609 self.pg0.add_stream(pkts)
1610 self.pg_enable_capture(self.pg_interfaces)
1611 self.pg_start()
1612 capture = self.pg1.get_capture(len(pkts))
1613 self.verify_capture_out(capture)
1614
1615 # 1:1NAT
1616 self.nat44_add_static_mapping(self.pg0.remote_ip4, nat_ip)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001617 sessions = self.vapi.nat44_ei_user_session_dump(self.pg0.remote_ip4, 0)
Filip Varga18f1e412020-12-03 15:27:40 +01001618 self.assertEqual(len(sessions), 0)
1619 pkts = self.create_stream_in(self.pg0, self.pg1)
1620 self.pg0.add_stream(pkts)
1621 self.pg_enable_capture(self.pg_interfaces)
1622 self.pg_start()
1623 capture = self.pg1.get_capture(len(pkts))
1624 self.verify_capture_out(capture, nat_ip, True)
1625
1626 def test_identity_nat(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001627 """NAT44EI Identity NAT"""
Filip Varga0eaf4e62021-02-17 14:34:54 +01001628 flags = self.config_flags.NAT44_EI_ADDR_ONLY_MAPPING
1629 self.vapi.nat44_ei_add_del_identity_mapping(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001630 ip_address=self.pg0.remote_ip4,
1631 sw_if_index=0xFFFFFFFF,
1632 flags=flags,
1633 is_add=1,
1634 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001635 flags = self.config_flags.NAT44_EI_IF_INSIDE
1636 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001637 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1638 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001639 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001640 sw_if_index=self.pg1.sw_if_index, is_add=1
1641 )
Filip Varga18f1e412020-12-03 15:27:40 +01001642
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001643 p = (
1644 Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac)
1645 / IP(src=self.pg1.remote_ip4, dst=self.pg0.remote_ip4)
1646 / TCP(sport=12345, dport=56789)
1647 )
Filip Varga18f1e412020-12-03 15:27:40 +01001648 self.pg1.add_stream(p)
1649 self.pg_enable_capture(self.pg_interfaces)
1650 self.pg_start()
1651 capture = self.pg0.get_capture(1)
1652 p = capture[0]
1653 try:
1654 ip = p[IP]
1655 tcp = p[TCP]
1656 self.assertEqual(ip.dst, self.pg0.remote_ip4)
1657 self.assertEqual(ip.src, self.pg1.remote_ip4)
1658 self.assertEqual(tcp.dport, 56789)
1659 self.assertEqual(tcp.sport, 12345)
1660 self.assert_packet_checksums_valid(p)
1661 except:
1662 self.logger.error(ppp("Unexpected or invalid packet:", p))
1663 raise
1664
Filip Varga0eaf4e62021-02-17 14:34:54 +01001665 sessions = self.vapi.nat44_ei_user_session_dump(self.pg0.remote_ip4, 0)
Filip Varga18f1e412020-12-03 15:27:40 +01001666 self.assertEqual(len(sessions), 0)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001667 flags = self.config_flags.NAT44_EI_ADDR_ONLY_MAPPING
1668 self.vapi.nat44_ei_add_del_identity_mapping(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001669 ip_address=self.pg0.remote_ip4,
1670 sw_if_index=0xFFFFFFFF,
1671 flags=flags,
1672 vrf_id=1,
1673 is_add=1,
1674 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001675 identity_mappings = self.vapi.nat44_ei_identity_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01001676 self.assertEqual(len(identity_mappings), 2)
1677
1678 def test_multiple_inside_interfaces(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001679 """NAT44EI multiple non-overlapping address space inside interfaces"""
Filip Varga18f1e412020-12-03 15:27:40 +01001680
1681 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001682 flags = self.config_flags.NAT44_EI_IF_INSIDE
1683 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001684 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1685 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001686 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001687 sw_if_index=self.pg1.sw_if_index, flags=flags, is_add=1
1688 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001689 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001690 sw_if_index=self.pg3.sw_if_index, is_add=1
1691 )
Filip Varga18f1e412020-12-03 15:27:40 +01001692
1693 # between two NAT44EI inside interfaces (no translation)
1694 pkts = self.create_stream_in(self.pg0, self.pg1)
1695 self.pg0.add_stream(pkts)
1696 self.pg_enable_capture(self.pg_interfaces)
1697 self.pg_start()
1698 capture = self.pg1.get_capture(len(pkts))
1699 self.verify_capture_no_translation(capture, self.pg0, self.pg1)
1700
1701 # from inside to interface without translation
1702 pkts = self.create_stream_in(self.pg0, self.pg2)
1703 self.pg0.add_stream(pkts)
1704 self.pg_enable_capture(self.pg_interfaces)
1705 self.pg_start()
1706 capture = self.pg2.get_capture(len(pkts))
1707 self.verify_capture_no_translation(capture, self.pg0, self.pg2)
1708
1709 # in2out 1st interface
1710 pkts = self.create_stream_in(self.pg0, self.pg3)
1711 self.pg0.add_stream(pkts)
1712 self.pg_enable_capture(self.pg_interfaces)
1713 self.pg_start()
1714 capture = self.pg3.get_capture(len(pkts))
1715 self.verify_capture_out(capture)
1716
1717 # out2in 1st interface
1718 pkts = self.create_stream_out(self.pg3)
1719 self.pg3.add_stream(pkts)
1720 self.pg_enable_capture(self.pg_interfaces)
1721 self.pg_start()
1722 capture = self.pg0.get_capture(len(pkts))
1723 self.verify_capture_in(capture, self.pg0)
1724
1725 # in2out 2nd interface
1726 pkts = self.create_stream_in(self.pg1, self.pg3)
1727 self.pg1.add_stream(pkts)
1728 self.pg_enable_capture(self.pg_interfaces)
1729 self.pg_start()
1730 capture = self.pg3.get_capture(len(pkts))
1731 self.verify_capture_out(capture)
1732
1733 # out2in 2nd interface
1734 pkts = self.create_stream_out(self.pg3)
1735 self.pg3.add_stream(pkts)
1736 self.pg_enable_capture(self.pg_interfaces)
1737 self.pg_start()
1738 capture = self.pg1.get_capture(len(pkts))
1739 self.verify_capture_in(capture, self.pg1)
1740
1741 def test_inside_overlapping_interfaces(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001742 """NAT44EI multiple inside interfaces with overlapping address space"""
Filip Varga18f1e412020-12-03 15:27:40 +01001743
1744 static_nat_ip = "10.0.0.10"
1745 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001746 flags = self.config_flags.NAT44_EI_IF_INSIDE
1747 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001748 sw_if_index=self.pg3.sw_if_index, is_add=1
1749 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001750 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001751 sw_if_index=self.pg4.sw_if_index, flags=flags, is_add=1
1752 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001753 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001754 sw_if_index=self.pg5.sw_if_index, flags=flags, is_add=1
1755 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001756 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001757 sw_if_index=self.pg6.sw_if_index, flags=flags, is_add=1
1758 )
1759 self.nat44_add_static_mapping(self.pg6.remote_ip4, static_nat_ip, vrf_id=20)
Filip Varga18f1e412020-12-03 15:27:40 +01001760
1761 # between NAT44EI inside interfaces with same VRF (no translation)
1762 pkts = self.create_stream_in(self.pg4, self.pg5)
1763 self.pg4.add_stream(pkts)
1764 self.pg_enable_capture(self.pg_interfaces)
1765 self.pg_start()
1766 capture = self.pg5.get_capture(len(pkts))
1767 self.verify_capture_no_translation(capture, self.pg4, self.pg5)
1768
1769 # between NAT44EI inside interfaces with different VRF (hairpinning)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001770 p = (
1771 Ether(src=self.pg4.remote_mac, dst=self.pg4.local_mac)
1772 / IP(src=self.pg4.remote_ip4, dst=static_nat_ip)
1773 / TCP(sport=1234, dport=5678)
1774 )
Filip Varga18f1e412020-12-03 15:27:40 +01001775 self.pg4.add_stream(p)
1776 self.pg_enable_capture(self.pg_interfaces)
1777 self.pg_start()
1778 capture = self.pg6.get_capture(1)
1779 p = capture[0]
1780 try:
1781 ip = p[IP]
1782 tcp = p[TCP]
1783 self.assertEqual(ip.src, self.nat_addr)
1784 self.assertEqual(ip.dst, self.pg6.remote_ip4)
1785 self.assertNotEqual(tcp.sport, 1234)
1786 self.assertEqual(tcp.dport, 5678)
1787 except:
1788 self.logger.error(ppp("Unexpected or invalid packet:", p))
1789 raise
1790
1791 # in2out 1st interface
1792 pkts = self.create_stream_in(self.pg4, self.pg3)
1793 self.pg4.add_stream(pkts)
1794 self.pg_enable_capture(self.pg_interfaces)
1795 self.pg_start()
1796 capture = self.pg3.get_capture(len(pkts))
1797 self.verify_capture_out(capture)
1798
1799 # out2in 1st interface
1800 pkts = self.create_stream_out(self.pg3)
1801 self.pg3.add_stream(pkts)
1802 self.pg_enable_capture(self.pg_interfaces)
1803 self.pg_start()
1804 capture = self.pg4.get_capture(len(pkts))
1805 self.verify_capture_in(capture, self.pg4)
1806
1807 # in2out 2nd interface
1808 pkts = self.create_stream_in(self.pg5, self.pg3)
1809 self.pg5.add_stream(pkts)
1810 self.pg_enable_capture(self.pg_interfaces)
1811 self.pg_start()
1812 capture = self.pg3.get_capture(len(pkts))
1813 self.verify_capture_out(capture)
1814
1815 # out2in 2nd interface
1816 pkts = self.create_stream_out(self.pg3)
1817 self.pg3.add_stream(pkts)
1818 self.pg_enable_capture(self.pg_interfaces)
1819 self.pg_start()
1820 capture = self.pg5.get_capture(len(pkts))
1821 self.verify_capture_in(capture, self.pg5)
1822
1823 # pg5 session dump
Filip Varga0eaf4e62021-02-17 14:34:54 +01001824 addresses = self.vapi.nat44_ei_address_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01001825 self.assertEqual(len(addresses), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001826 sessions = self.vapi.nat44_ei_user_session_dump(self.pg5.remote_ip4, 10)
Filip Varga18f1e412020-12-03 15:27:40 +01001827 self.assertEqual(len(sessions), 3)
1828 for session in sessions:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001829 self.assertFalse(session.flags & self.config_flags.NAT44_EI_STATIC_MAPPING)
1830 self.assertEqual(str(session.inside_ip_address), self.pg5.remote_ip4)
1831 self.assertEqual(session.outside_ip_address, addresses[0].ip_address)
Filip Varga18f1e412020-12-03 15:27:40 +01001832 self.assertEqual(sessions[0].protocol, IP_PROTOS.tcp)
1833 self.assertEqual(sessions[1].protocol, IP_PROTOS.udp)
1834 self.assertEqual(sessions[2].protocol, IP_PROTOS.icmp)
1835 self.assertEqual(sessions[0].inside_port, self.tcp_port_in)
1836 self.assertEqual(sessions[1].inside_port, self.udp_port_in)
1837 self.assertEqual(sessions[2].inside_port, self.icmp_id_in)
1838 self.assertEqual(sessions[0].outside_port, self.tcp_port_out)
1839 self.assertEqual(sessions[1].outside_port, self.udp_port_out)
1840 self.assertEqual(sessions[2].outside_port, self.icmp_id_out)
1841
1842 # in2out 3rd interface
1843 pkts = self.create_stream_in(self.pg6, self.pg3)
1844 self.pg6.add_stream(pkts)
1845 self.pg_enable_capture(self.pg_interfaces)
1846 self.pg_start()
1847 capture = self.pg3.get_capture(len(pkts))
1848 self.verify_capture_out(capture, static_nat_ip, True)
1849
1850 # out2in 3rd interface
1851 pkts = self.create_stream_out(self.pg3, static_nat_ip)
1852 self.pg3.add_stream(pkts)
1853 self.pg_enable_capture(self.pg_interfaces)
1854 self.pg_start()
1855 capture = self.pg6.get_capture(len(pkts))
1856 self.verify_capture_in(capture, self.pg6)
1857
1858 # general user and session dump verifications
Filip Varga0eaf4e62021-02-17 14:34:54 +01001859 users = self.vapi.nat44_ei_user_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01001860 self.assertGreaterEqual(len(users), 3)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001861 addresses = self.vapi.nat44_ei_address_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01001862 self.assertEqual(len(addresses), 1)
1863 for user in users:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001864 sessions = self.vapi.nat44_ei_user_session_dump(
1865 user.ip_address, user.vrf_id
1866 )
Filip Varga18f1e412020-12-03 15:27:40 +01001867 for session in sessions:
1868 self.assertEqual(user.ip_address, session.inside_ip_address)
1869 self.assertTrue(session.total_bytes > session.total_pkts > 0)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001870 self.assertTrue(
1871 session.protocol in [IP_PROTOS.tcp, IP_PROTOS.udp, IP_PROTOS.icmp]
1872 )
Filip Varga18f1e412020-12-03 15:27:40 +01001873
1874 # pg4 session dump
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001875 sessions = self.vapi.nat44_ei_user_session_dump(self.pg4.remote_ip4, 10)
Filip Varga18f1e412020-12-03 15:27:40 +01001876 self.assertGreaterEqual(len(sessions), 4)
1877 for session in sessions:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001878 self.assertFalse(session.flags & self.config_flags.NAT44_EI_STATIC_MAPPING)
1879 self.assertEqual(str(session.inside_ip_address), self.pg4.remote_ip4)
1880 self.assertEqual(session.outside_ip_address, addresses[0].ip_address)
Filip Varga18f1e412020-12-03 15:27:40 +01001881
1882 # pg6 session dump
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001883 sessions = self.vapi.nat44_ei_user_session_dump(self.pg6.remote_ip4, 20)
Filip Varga18f1e412020-12-03 15:27:40 +01001884 self.assertGreaterEqual(len(sessions), 3)
1885 for session in sessions:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001886 self.assertTrue(session.flags & self.config_flags.NAT44_EI_STATIC_MAPPING)
1887 self.assertEqual(str(session.inside_ip_address), self.pg6.remote_ip4)
1888 self.assertEqual(str(session.outside_ip_address), static_nat_ip)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001889 self.assertTrue(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001890 session.inside_port
1891 in [self.tcp_port_in, self.udp_port_in, self.icmp_id_in]
1892 )
Filip Varga18f1e412020-12-03 15:27:40 +01001893
1894 def test_hairpinning(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001895 """NAT44EI hairpinning - 1:1 NAPT"""
Filip Varga18f1e412020-12-03 15:27:40 +01001896
1897 host = self.pg0.remote_hosts[0]
1898 server = self.pg0.remote_hosts[1]
1899 host_in_port = 1234
1900 host_out_port = 0
1901 server_in_port = 5678
1902 server_out_port = 8765
1903
1904 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001905 flags = self.config_flags.NAT44_EI_IF_INSIDE
1906 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001907 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1908 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001909 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001910 sw_if_index=self.pg1.sw_if_index, is_add=1
1911 )
Filip Varga18f1e412020-12-03 15:27:40 +01001912
1913 # add static mapping for server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001914 self.nat44_add_static_mapping(
1915 server.ip4,
1916 self.nat_addr,
1917 server_in_port,
1918 server_out_port,
1919 proto=IP_PROTOS.tcp,
1920 )
Filip Varga18f1e412020-12-03 15:27:40 +01001921
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001922 cnt = self.statistics["/nat44-ei/hairpinning"]
Filip Varga18f1e412020-12-03 15:27:40 +01001923 # send packet from host to server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001924 p = (
1925 Ether(src=host.mac, dst=self.pg0.local_mac)
1926 / IP(src=host.ip4, dst=self.nat_addr)
1927 / TCP(sport=host_in_port, dport=server_out_port)
1928 )
Filip Varga18f1e412020-12-03 15:27:40 +01001929 self.pg0.add_stream(p)
1930 self.pg_enable_capture(self.pg_interfaces)
1931 self.pg_start()
1932 capture = self.pg0.get_capture(1)
1933 p = capture[0]
1934 try:
1935 ip = p[IP]
1936 tcp = p[TCP]
1937 self.assertEqual(ip.src, self.nat_addr)
1938 self.assertEqual(ip.dst, server.ip4)
1939 self.assertNotEqual(tcp.sport, host_in_port)
1940 self.assertEqual(tcp.dport, server_in_port)
1941 self.assert_packet_checksums_valid(p)
1942 host_out_port = tcp.sport
1943 except:
1944 self.logger.error(ppp("Unexpected or invalid packet:", p))
1945 raise
1946
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001947 after = self.statistics["/nat44-ei/hairpinning"]
Filip Varga18f1e412020-12-03 15:27:40 +01001948 if_idx = self.pg0.sw_if_index
Klement Sekeraeafb5db2021-03-15 16:34:01 +01001949 self.assertEqual(after[:, if_idx].sum() - cnt[:, if_idx].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01001950
1951 # send reply from server to host
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001952 p = (
1953 Ether(src=server.mac, dst=self.pg0.local_mac)
1954 / IP(src=server.ip4, dst=self.nat_addr)
1955 / TCP(sport=server_in_port, dport=host_out_port)
1956 )
Filip Varga18f1e412020-12-03 15:27:40 +01001957 self.pg0.add_stream(p)
1958 self.pg_enable_capture(self.pg_interfaces)
1959 self.pg_start()
1960 capture = self.pg0.get_capture(1)
1961 p = capture[0]
1962 try:
1963 ip = p[IP]
1964 tcp = p[TCP]
1965 self.assertEqual(ip.src, self.nat_addr)
1966 self.assertEqual(ip.dst, host.ip4)
1967 self.assertEqual(tcp.sport, server_out_port)
1968 self.assertEqual(tcp.dport, host_in_port)
1969 self.assert_packet_checksums_valid(p)
1970 except:
1971 self.logger.error(ppp("Unexpected or invalid packet:", p))
1972 raise
1973
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001974 after = self.statistics["/nat44-ei/hairpinning"]
Filip Varga18f1e412020-12-03 15:27:40 +01001975 if_idx = self.pg0.sw_if_index
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001976 self.assertEqual(
1977 after[:, if_idx].sum() - cnt[:, if_idx].sum(),
1978 2 + (1 if self.vpp_worker_count > 0 else 0),
1979 )
Filip Varga18f1e412020-12-03 15:27:40 +01001980
1981 def test_hairpinning2(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001982 """NAT44EI hairpinning - 1:1 NAT"""
Filip Varga18f1e412020-12-03 15:27:40 +01001983
1984 server1_nat_ip = "10.0.0.10"
1985 server2_nat_ip = "10.0.0.11"
1986 host = self.pg0.remote_hosts[0]
1987 server1 = self.pg0.remote_hosts[1]
1988 server2 = self.pg0.remote_hosts[2]
1989 server_tcp_port = 22
1990 server_udp_port = 20
1991
1992 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01001993 flags = self.config_flags.NAT44_EI_IF_INSIDE
1994 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001995 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
1996 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01001997 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02001998 sw_if_index=self.pg1.sw_if_index, is_add=1
1999 )
Filip Varga18f1e412020-12-03 15:27:40 +01002000
2001 # add static mapping for servers
2002 self.nat44_add_static_mapping(server1.ip4, server1_nat_ip)
2003 self.nat44_add_static_mapping(server2.ip4, server2_nat_ip)
2004
2005 # host to server1
2006 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002007 p = (
2008 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2009 / IP(src=host.ip4, dst=server1_nat_ip)
2010 / TCP(sport=self.tcp_port_in, dport=server_tcp_port)
2011 )
Filip Varga18f1e412020-12-03 15:27:40 +01002012 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002013 p = (
2014 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2015 / IP(src=host.ip4, dst=server1_nat_ip)
2016 / UDP(sport=self.udp_port_in, dport=server_udp_port)
2017 )
Filip Varga18f1e412020-12-03 15:27:40 +01002018 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002019 p = (
2020 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2021 / IP(src=host.ip4, dst=server1_nat_ip)
2022 / ICMP(id=self.icmp_id_in, type="echo-request")
2023 )
Filip Varga18f1e412020-12-03 15:27:40 +01002024 pkts.append(p)
2025 self.pg0.add_stream(pkts)
2026 self.pg_enable_capture(self.pg_interfaces)
2027 self.pg_start()
2028 capture = self.pg0.get_capture(len(pkts))
2029 for packet in capture:
2030 try:
2031 self.assertEqual(packet[IP].src, self.nat_addr)
2032 self.assertEqual(packet[IP].dst, server1.ip4)
2033 if packet.haslayer(TCP):
2034 self.assertNotEqual(packet[TCP].sport, self.tcp_port_in)
2035 self.assertEqual(packet[TCP].dport, server_tcp_port)
2036 self.tcp_port_out = packet[TCP].sport
2037 self.assert_packet_checksums_valid(packet)
2038 elif packet.haslayer(UDP):
2039 self.assertNotEqual(packet[UDP].sport, self.udp_port_in)
2040 self.assertEqual(packet[UDP].dport, server_udp_port)
2041 self.udp_port_out = packet[UDP].sport
2042 else:
2043 self.assertNotEqual(packet[ICMP].id, self.icmp_id_in)
2044 self.icmp_id_out = packet[ICMP].id
2045 except:
2046 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2047 raise
2048
2049 # server1 to host
2050 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002051 p = (
2052 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2053 / IP(src=server1.ip4, dst=self.nat_addr)
2054 / TCP(sport=server_tcp_port, dport=self.tcp_port_out)
2055 )
Filip Varga18f1e412020-12-03 15:27:40 +01002056 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002057 p = (
2058 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2059 / IP(src=server1.ip4, dst=self.nat_addr)
2060 / UDP(sport=server_udp_port, dport=self.udp_port_out)
2061 )
Filip Varga18f1e412020-12-03 15:27:40 +01002062 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002063 p = (
2064 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2065 / IP(src=server1.ip4, dst=self.nat_addr)
2066 / ICMP(id=self.icmp_id_out, type="echo-reply")
2067 )
Filip Varga18f1e412020-12-03 15:27:40 +01002068 pkts.append(p)
2069 self.pg0.add_stream(pkts)
2070 self.pg_enable_capture(self.pg_interfaces)
2071 self.pg_start()
2072 capture = self.pg0.get_capture(len(pkts))
2073 for packet in capture:
2074 try:
2075 self.assertEqual(packet[IP].src, server1_nat_ip)
2076 self.assertEqual(packet[IP].dst, host.ip4)
2077 if packet.haslayer(TCP):
2078 self.assertEqual(packet[TCP].dport, self.tcp_port_in)
2079 self.assertEqual(packet[TCP].sport, server_tcp_port)
2080 self.assert_packet_checksums_valid(packet)
2081 elif packet.haslayer(UDP):
2082 self.assertEqual(packet[UDP].dport, self.udp_port_in)
2083 self.assertEqual(packet[UDP].sport, server_udp_port)
2084 else:
2085 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
2086 except:
2087 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2088 raise
2089
2090 # server2 to server1
2091 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002092 p = (
2093 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2094 / IP(src=server2.ip4, dst=server1_nat_ip)
2095 / TCP(sport=self.tcp_port_in, dport=server_tcp_port)
2096 )
Filip Varga18f1e412020-12-03 15:27:40 +01002097 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002098 p = (
2099 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2100 / IP(src=server2.ip4, dst=server1_nat_ip)
2101 / UDP(sport=self.udp_port_in, dport=server_udp_port)
2102 )
Filip Varga18f1e412020-12-03 15:27:40 +01002103 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002104 p = (
2105 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2106 / IP(src=server2.ip4, dst=server1_nat_ip)
2107 / ICMP(id=self.icmp_id_in, type="echo-request")
2108 )
Filip Varga18f1e412020-12-03 15:27:40 +01002109 pkts.append(p)
2110 self.pg0.add_stream(pkts)
2111 self.pg_enable_capture(self.pg_interfaces)
2112 self.pg_start()
2113 capture = self.pg0.get_capture(len(pkts))
2114 for packet in capture:
2115 try:
2116 self.assertEqual(packet[IP].src, server2_nat_ip)
2117 self.assertEqual(packet[IP].dst, server1.ip4)
2118 if packet.haslayer(TCP):
2119 self.assertEqual(packet[TCP].sport, self.tcp_port_in)
2120 self.assertEqual(packet[TCP].dport, server_tcp_port)
2121 self.tcp_port_out = packet[TCP].sport
2122 self.assert_packet_checksums_valid(packet)
2123 elif packet.haslayer(UDP):
2124 self.assertEqual(packet[UDP].sport, self.udp_port_in)
2125 self.assertEqual(packet[UDP].dport, server_udp_port)
2126 self.udp_port_out = packet[UDP].sport
2127 else:
2128 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
2129 self.icmp_id_out = packet[ICMP].id
2130 except:
2131 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2132 raise
2133
2134 # server1 to server2
2135 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002136 p = (
2137 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2138 / IP(src=server1.ip4, dst=server2_nat_ip)
2139 / TCP(sport=server_tcp_port, dport=self.tcp_port_out)
2140 )
Filip Varga18f1e412020-12-03 15:27:40 +01002141 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002142 p = (
2143 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2144 / IP(src=server1.ip4, dst=server2_nat_ip)
2145 / UDP(sport=server_udp_port, dport=self.udp_port_out)
2146 )
Filip Varga18f1e412020-12-03 15:27:40 +01002147 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002148 p = (
2149 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2150 / IP(src=server1.ip4, dst=server2_nat_ip)
2151 / ICMP(id=self.icmp_id_out, type="echo-reply")
2152 )
Filip Varga18f1e412020-12-03 15:27:40 +01002153 pkts.append(p)
2154 self.pg0.add_stream(pkts)
2155 self.pg_enable_capture(self.pg_interfaces)
2156 self.pg_start()
2157 capture = self.pg0.get_capture(len(pkts))
2158 for packet in capture:
2159 try:
2160 self.assertEqual(packet[IP].src, server1_nat_ip)
2161 self.assertEqual(packet[IP].dst, server2.ip4)
2162 if packet.haslayer(TCP):
2163 self.assertEqual(packet[TCP].dport, self.tcp_port_in)
2164 self.assertEqual(packet[TCP].sport, server_tcp_port)
2165 self.assert_packet_checksums_valid(packet)
2166 elif packet.haslayer(UDP):
2167 self.assertEqual(packet[UDP].dport, self.udp_port_in)
2168 self.assertEqual(packet[UDP].sport, server_udp_port)
2169 else:
2170 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
2171 except:
2172 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2173 raise
2174
2175 def test_hairpinning_avoid_inf_loop(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002176 """NAT44EI hairpinning - 1:1 NAPT avoid infinite loop"""
Filip Varga18f1e412020-12-03 15:27:40 +01002177
2178 host = self.pg0.remote_hosts[0]
2179 server = self.pg0.remote_hosts[1]
2180 host_in_port = 1234
2181 host_out_port = 0
2182 server_in_port = 5678
2183 server_out_port = 8765
2184
2185 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002186 flags = self.config_flags.NAT44_EI_IF_INSIDE
2187 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002188 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2189 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002190 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002191 sw_if_index=self.pg1.sw_if_index, is_add=1
2192 )
Filip Varga18f1e412020-12-03 15:27:40 +01002193
2194 # add static mapping for server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002195 self.nat44_add_static_mapping(
2196 server.ip4,
2197 self.nat_addr,
2198 server_in_port,
2199 server_out_port,
2200 proto=IP_PROTOS.tcp,
2201 )
Filip Varga18f1e412020-12-03 15:27:40 +01002202
2203 # add another static mapping that maps pg0.local_ip4 address to itself
2204 self.nat44_add_static_mapping(self.pg0.local_ip4, self.pg0.local_ip4)
2205
2206 # send packet from host to VPP (the packet should get dropped)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002207 p = (
2208 Ether(src=host.mac, dst=self.pg0.local_mac)
2209 / IP(src=host.ip4, dst=self.pg0.local_ip4)
2210 / TCP(sport=host_in_port, dport=server_out_port)
2211 )
Filip Varga18f1e412020-12-03 15:27:40 +01002212 self.pg0.add_stream(p)
2213 self.pg_enable_capture(self.pg_interfaces)
2214 self.pg_start()
2215 # Here VPP used to crash due to an infinite loop
2216
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002217 cnt = self.statistics["/nat44-ei/hairpinning"]
Filip Varga18f1e412020-12-03 15:27:40 +01002218 # send packet from host to server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002219 p = (
2220 Ether(src=host.mac, dst=self.pg0.local_mac)
2221 / IP(src=host.ip4, dst=self.nat_addr)
2222 / TCP(sport=host_in_port, dport=server_out_port)
2223 )
Filip Varga18f1e412020-12-03 15:27:40 +01002224 self.pg0.add_stream(p)
2225 self.pg_enable_capture(self.pg_interfaces)
2226 self.pg_start()
2227 capture = self.pg0.get_capture(1)
2228 p = capture[0]
2229 try:
2230 ip = p[IP]
2231 tcp = p[TCP]
2232 self.assertEqual(ip.src, self.nat_addr)
2233 self.assertEqual(ip.dst, server.ip4)
2234 self.assertNotEqual(tcp.sport, host_in_port)
2235 self.assertEqual(tcp.dport, server_in_port)
2236 self.assert_packet_checksums_valid(p)
2237 host_out_port = tcp.sport
2238 except:
2239 self.logger.error(ppp("Unexpected or invalid packet:", p))
2240 raise
2241
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002242 after = self.statistics["/nat44-ei/hairpinning"]
Filip Varga18f1e412020-12-03 15:27:40 +01002243 if_idx = self.pg0.sw_if_index
Klement Sekeraeafb5db2021-03-15 16:34:01 +01002244 self.assertEqual(after[:, if_idx].sum() - cnt[:, if_idx].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01002245
2246 # send reply from server to host
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002247 p = (
2248 Ether(src=server.mac, dst=self.pg0.local_mac)
2249 / IP(src=server.ip4, dst=self.nat_addr)
2250 / TCP(sport=server_in_port, dport=host_out_port)
2251 )
Filip Varga18f1e412020-12-03 15:27:40 +01002252 self.pg0.add_stream(p)
2253 self.pg_enable_capture(self.pg_interfaces)
2254 self.pg_start()
2255 capture = self.pg0.get_capture(1)
2256 p = capture[0]
2257 try:
2258 ip = p[IP]
2259 tcp = p[TCP]
2260 self.assertEqual(ip.src, self.nat_addr)
2261 self.assertEqual(ip.dst, host.ip4)
2262 self.assertEqual(tcp.sport, server_out_port)
2263 self.assertEqual(tcp.dport, host_in_port)
2264 self.assert_packet_checksums_valid(p)
2265 except:
2266 self.logger.error(ppp("Unexpected or invalid packet:", p))
2267 raise
2268
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002269 after = self.statistics["/nat44-ei/hairpinning"]
Filip Varga18f1e412020-12-03 15:27:40 +01002270 if_idx = self.pg0.sw_if_index
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002271 self.assertEqual(
2272 after[:, if_idx].sum() - cnt[:, if_idx].sum(),
2273 2 + (1 if self.vpp_worker_count > 0 else 0),
2274 )
Filip Varga18f1e412020-12-03 15:27:40 +01002275
2276 def test_interface_addr(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002277 """NAT44EI acquire addresses from interface"""
Filip Varga0eaf4e62021-02-17 14:34:54 +01002278 self.vapi.nat44_ei_add_del_interface_addr(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002279 is_add=1, sw_if_index=self.pg7.sw_if_index
2280 )
Filip Varga18f1e412020-12-03 15:27:40 +01002281
2282 # no address in NAT pool
Filip Varga0eaf4e62021-02-17 14:34:54 +01002283 addresses = self.vapi.nat44_ei_address_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002284 self.assertEqual(0, len(addresses))
2285
2286 # configure interface address and check NAT address pool
2287 self.pg7.config_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002288 addresses = self.vapi.nat44_ei_address_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002289 self.assertEqual(1, len(addresses))
2290 self.assertEqual(str(addresses[0].ip_address), self.pg7.local_ip4)
2291
2292 # remove interface address and check NAT address pool
2293 self.pg7.unconfig_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002294 addresses = self.vapi.nat44_ei_address_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002295 self.assertEqual(0, len(addresses))
2296
2297 def test_interface_addr_static_mapping(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002298 """NAT44EI Static mapping with addresses from interface"""
Filip Varga18f1e412020-12-03 15:27:40 +01002299 tag = "testTAG"
2300
Filip Varga0eaf4e62021-02-17 14:34:54 +01002301 self.vapi.nat44_ei_add_del_interface_addr(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002302 is_add=1, sw_if_index=self.pg7.sw_if_index
2303 )
Filip Varga18f1e412020-12-03 15:27:40 +01002304 self.nat44_add_static_mapping(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002305 "1.2.3.4", external_sw_if_index=self.pg7.sw_if_index, tag=tag
2306 )
Filip Varga18f1e412020-12-03 15:27:40 +01002307
2308 # static mappings with external interface
Filip Varga0eaf4e62021-02-17 14:34:54 +01002309 static_mappings = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002310 self.assertEqual(1, len(static_mappings))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002311 self.assertEqual(self.pg7.sw_if_index, static_mappings[0].external_sw_if_index)
Filip Varga18f1e412020-12-03 15:27:40 +01002312 self.assertEqual(static_mappings[0].tag, tag)
2313
2314 # configure interface address and check static mappings
2315 self.pg7.config_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002316 static_mappings = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002317 self.assertEqual(2, len(static_mappings))
2318 resolved = False
2319 for sm in static_mappings:
2320 if sm.external_sw_if_index == 0xFFFFFFFF:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002321 self.assertEqual(str(sm.external_ip_address), self.pg7.local_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +01002322 self.assertEqual(sm.tag, tag)
2323 resolved = True
2324 self.assertTrue(resolved)
2325
2326 # remove interface address and check static mappings
2327 self.pg7.unconfig_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002328 static_mappings = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002329 self.assertEqual(1, len(static_mappings))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002330 self.assertEqual(self.pg7.sw_if_index, static_mappings[0].external_sw_if_index)
Filip Varga18f1e412020-12-03 15:27:40 +01002331 self.assertEqual(static_mappings[0].tag, tag)
2332
2333 # configure interface address again and check static mappings
2334 self.pg7.config_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002335 static_mappings = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002336 self.assertEqual(2, len(static_mappings))
2337 resolved = False
2338 for sm in static_mappings:
2339 if sm.external_sw_if_index == 0xFFFFFFFF:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002340 self.assertEqual(str(sm.external_ip_address), self.pg7.local_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +01002341 self.assertEqual(sm.tag, tag)
2342 resolved = True
2343 self.assertTrue(resolved)
2344
2345 # remove static mapping
2346 self.nat44_add_static_mapping(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002347 "1.2.3.4", external_sw_if_index=self.pg7.sw_if_index, tag=tag, is_add=0
2348 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002349 static_mappings = self.vapi.nat44_ei_static_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002350 self.assertEqual(0, len(static_mappings))
2351
2352 def test_interface_addr_identity_nat(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002353 """NAT44EI Identity NAT with addresses from interface"""
Filip Varga18f1e412020-12-03 15:27:40 +01002354
2355 port = 53053
Filip Varga0eaf4e62021-02-17 14:34:54 +01002356 self.vapi.nat44_ei_add_del_interface_addr(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002357 is_add=1, sw_if_index=self.pg7.sw_if_index
2358 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002359 self.vapi.nat44_ei_add_del_identity_mapping(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002360 ip_address=b"0",
Filip Varga18f1e412020-12-03 15:27:40 +01002361 sw_if_index=self.pg7.sw_if_index,
2362 port=port,
2363 protocol=IP_PROTOS.tcp,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002364 is_add=1,
2365 )
Filip Varga18f1e412020-12-03 15:27:40 +01002366
2367 # identity mappings with external interface
Filip Varga0eaf4e62021-02-17 14:34:54 +01002368 identity_mappings = self.vapi.nat44_ei_identity_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002369 self.assertEqual(1, len(identity_mappings))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002370 self.assertEqual(self.pg7.sw_if_index, identity_mappings[0].sw_if_index)
Filip Varga18f1e412020-12-03 15:27:40 +01002371
2372 # configure interface address and check identity mappings
2373 self.pg7.config_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002374 identity_mappings = self.vapi.nat44_ei_identity_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002375 resolved = False
2376 self.assertEqual(2, len(identity_mappings))
2377 for sm in identity_mappings:
2378 if sm.sw_if_index == 0xFFFFFFFF:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002379 self.assertEqual(
2380 str(identity_mappings[0].ip_address), self.pg7.local_ip4
2381 )
Filip Varga18f1e412020-12-03 15:27:40 +01002382 self.assertEqual(port, identity_mappings[0].port)
2383 self.assertEqual(IP_PROTOS.tcp, identity_mappings[0].protocol)
2384 resolved = True
2385 self.assertTrue(resolved)
2386
2387 # remove interface address and check identity mappings
2388 self.pg7.unconfig_ip4()
Filip Varga0eaf4e62021-02-17 14:34:54 +01002389 identity_mappings = self.vapi.nat44_ei_identity_mapping_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01002390 self.assertEqual(1, len(identity_mappings))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002391 self.assertEqual(self.pg7.sw_if_index, identity_mappings[0].sw_if_index)
Filip Varga18f1e412020-12-03 15:27:40 +01002392
2393 def test_ipfix_nat44_sess(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002394 """NAT44EI IPFIX logging NAT44EI session created/deleted"""
Filip Varga18f1e412020-12-03 15:27:40 +01002395 self.ipfix_domain_id = 10
2396 self.ipfix_src_port = 20202
2397 collector_port = 30303
2398 bind_layers(UDP, IPFIX, dport=30303)
2399 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002400 flags = self.config_flags.NAT44_EI_IF_INSIDE
2401 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002402 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2403 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002404 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002405 sw_if_index=self.pg1.sw_if_index, is_add=1
2406 )
2407 self.vapi.set_ipfix_exporter(
2408 collector_address=self.pg3.remote_ip4,
2409 src_address=self.pg3.local_ip4,
2410 path_mtu=512,
2411 template_interval=10,
2412 collector_port=collector_port,
2413 )
2414 self.vapi.nat44_ei_ipfix_enable_disable(
2415 domain_id=self.ipfix_domain_id, src_port=self.ipfix_src_port, enable=1
2416 )
Filip Varga18f1e412020-12-03 15:27:40 +01002417
2418 pkts = self.create_stream_in(self.pg0, self.pg1)
2419 self.pg0.add_stream(pkts)
2420 self.pg_enable_capture(self.pg_interfaces)
2421 self.pg_start()
2422 capture = self.pg1.get_capture(len(pkts))
2423 self.verify_capture_out(capture)
2424 self.nat44_add_address(self.nat_addr, is_add=0)
2425 self.vapi.ipfix_flush()
2426 capture = self.pg3.get_capture(7)
2427 ipfix = IPFIXDecoder()
2428 # first load template
2429 for p in capture:
2430 self.assertTrue(p.haslayer(IPFIX))
2431 self.assertEqual(p[IP].src, self.pg3.local_ip4)
2432 self.assertEqual(p[IP].dst, self.pg3.remote_ip4)
2433 self.assertEqual(p[UDP].sport, self.ipfix_src_port)
2434 self.assertEqual(p[UDP].dport, collector_port)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002435 self.assertEqual(p[IPFIX].observationDomainID, self.ipfix_domain_id)
Filip Varga18f1e412020-12-03 15:27:40 +01002436 if p.haslayer(Template):
2437 ipfix.add_template(p.getlayer(Template))
2438 # verify events in data set
2439 for p in capture:
2440 if p.haslayer(Data):
2441 data = ipfix.decode_data_set(p.getlayer(Set))
2442 self.verify_ipfix_nat44_ses(data)
2443
2444 def test_ipfix_addr_exhausted(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002445 """NAT44EI IPFIX logging NAT addresses exhausted"""
Filip Varga0eaf4e62021-02-17 14:34:54 +01002446 flags = self.config_flags.NAT44_EI_IF_INSIDE
2447 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002448 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2449 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002450 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002451 sw_if_index=self.pg1.sw_if_index, is_add=1
2452 )
2453 self.vapi.set_ipfix_exporter(
2454 collector_address=self.pg3.remote_ip4,
2455 src_address=self.pg3.local_ip4,
2456 path_mtu=512,
2457 template_interval=10,
2458 )
2459 self.vapi.nat44_ei_ipfix_enable_disable(
2460 domain_id=self.ipfix_domain_id, src_port=self.ipfix_src_port, enable=1
2461 )
Filip Varga18f1e412020-12-03 15:27:40 +01002462
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002463 p = (
2464 Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
2465 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
2466 / TCP(sport=3025)
2467 )
Filip Varga18f1e412020-12-03 15:27:40 +01002468 self.pg0.add_stream(p)
2469 self.pg_enable_capture(self.pg_interfaces)
2470 self.pg_start()
2471 self.pg1.assert_nothing_captured()
Filip Varga18f1e412020-12-03 15:27:40 +01002472 self.vapi.ipfix_flush()
2473 capture = self.pg3.get_capture(7)
2474 ipfix = IPFIXDecoder()
2475 # first load template
2476 for p in capture:
2477 self.assertTrue(p.haslayer(IPFIX))
2478 self.assertEqual(p[IP].src, self.pg3.local_ip4)
2479 self.assertEqual(p[IP].dst, self.pg3.remote_ip4)
2480 self.assertEqual(p[UDP].sport, self.ipfix_src_port)
2481 self.assertEqual(p[UDP].dport, 4739)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002482 self.assertEqual(p[IPFIX].observationDomainID, self.ipfix_domain_id)
Filip Varga18f1e412020-12-03 15:27:40 +01002483 if p.haslayer(Template):
2484 ipfix.add_template(p.getlayer(Template))
2485 # verify events in data set
2486 for p in capture:
2487 if p.haslayer(Data):
2488 data = ipfix.decode_data_set(p.getlayer(Set))
2489 self.verify_ipfix_addr_exhausted(data)
2490
2491 def test_ipfix_max_sessions(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002492 """NAT44EI IPFIX logging maximum session entries exceeded"""
Filip Varga18f1e412020-12-03 15:27:40 +01002493 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002494 flags = self.config_flags.NAT44_EI_IF_INSIDE
2495 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002496 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2497 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002498 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002499 sw_if_index=self.pg1.sw_if_index, is_add=1
2500 )
Filip Varga18f1e412020-12-03 15:27:40 +01002501
Klement Sekeraeafb5db2021-03-15 16:34:01 +01002502 max_sessions_per_thread = self.max_translations
2503 max_sessions = max(1, self.vpp_worker_count) * max_sessions_per_thread
Filip Varga18f1e412020-12-03 15:27:40 +01002504
2505 pkts = []
2506 for i in range(0, max_sessions):
2507 src = "10.10.%u.%u" % ((i & 0xFF00) >> 8, i & 0xFF)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002508 p = (
2509 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2510 / IP(src=src, dst=self.pg1.remote_ip4)
2511 / TCP(sport=1025)
2512 )
Filip Varga18f1e412020-12-03 15:27:40 +01002513 pkts.append(p)
2514 self.pg0.add_stream(pkts)
2515 self.pg_enable_capture(self.pg_interfaces)
2516 self.pg_start()
2517
2518 self.pg1.get_capture(max_sessions)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002519 self.vapi.set_ipfix_exporter(
2520 collector_address=self.pg3.remote_ip4,
2521 src_address=self.pg3.local_ip4,
2522 path_mtu=512,
2523 template_interval=10,
2524 )
2525 self.vapi.nat44_ei_ipfix_enable_disable(
2526 domain_id=self.ipfix_domain_id, src_port=self.ipfix_src_port, enable=1
2527 )
Filip Varga18f1e412020-12-03 15:27:40 +01002528
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002529 p = (
2530 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2531 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
2532 / TCP(sport=1025)
2533 )
Filip Varga18f1e412020-12-03 15:27:40 +01002534 self.pg0.add_stream(p)
2535 self.pg_enable_capture(self.pg_interfaces)
2536 self.pg_start()
2537 self.pg1.assert_nothing_captured()
Filip Varga18f1e412020-12-03 15:27:40 +01002538 self.vapi.ipfix_flush()
2539 capture = self.pg3.get_capture(7)
2540 ipfix = IPFIXDecoder()
2541 # first load template
2542 for p in capture:
2543 self.assertTrue(p.haslayer(IPFIX))
2544 self.assertEqual(p[IP].src, self.pg3.local_ip4)
2545 self.assertEqual(p[IP].dst, self.pg3.remote_ip4)
2546 self.assertEqual(p[UDP].sport, self.ipfix_src_port)
2547 self.assertEqual(p[UDP].dport, 4739)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002548 self.assertEqual(p[IPFIX].observationDomainID, self.ipfix_domain_id)
Filip Varga18f1e412020-12-03 15:27:40 +01002549 if p.haslayer(Template):
2550 ipfix.add_template(p.getlayer(Template))
2551 # verify events in data set
2552 for p in capture:
2553 if p.haslayer(Data):
2554 data = ipfix.decode_data_set(p.getlayer(Set))
Klement Sekeraeafb5db2021-03-15 16:34:01 +01002555 self.verify_ipfix_max_sessions(data, max_sessions_per_thread)
Filip Varga18f1e412020-12-03 15:27:40 +01002556
2557 def test_syslog_apmap(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002558 """NAT44EI syslog address and port mapping creation and deletion"""
2559 self.vapi.syslog_set_filter(self.SYSLOG_SEVERITY.SYSLOG_API_SEVERITY_INFO)
Filip Varga18f1e412020-12-03 15:27:40 +01002560 self.vapi.syslog_set_sender(self.pg3.local_ip4, self.pg3.remote_ip4)
2561 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002562 flags = self.config_flags.NAT44_EI_IF_INSIDE
2563 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002564 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2565 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002566 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002567 sw_if_index=self.pg1.sw_if_index, is_add=1
2568 )
Filip Varga18f1e412020-12-03 15:27:40 +01002569
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002570 p = (
2571 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2572 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
2573 / TCP(sport=self.tcp_port_in, dport=20)
2574 )
Filip Varga18f1e412020-12-03 15:27:40 +01002575 self.pg0.add_stream(p)
2576 self.pg_enable_capture(self.pg_interfaces)
2577 self.pg_start()
2578 capture = self.pg1.get_capture(1)
2579 self.tcp_port_out = capture[0][TCP].sport
2580 capture = self.pg3.get_capture(1)
2581 self.verify_syslog_apmap(capture[0][Raw].load)
2582
2583 self.pg_enable_capture(self.pg_interfaces)
2584 self.pg_start()
2585 self.nat44_add_address(self.nat_addr, is_add=0)
2586 capture = self.pg3.get_capture(1)
2587 self.verify_syslog_apmap(capture[0][Raw].load, False)
2588
2589 def test_pool_addr_fib(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002590 """NAT44EI add pool addresses to FIB"""
2591 static_addr = "10.0.0.10"
Filip Varga18f1e412020-12-03 15:27:40 +01002592 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002593 flags = self.config_flags.NAT44_EI_IF_INSIDE
2594 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002595 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2596 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002597 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002598 sw_if_index=self.pg1.sw_if_index, is_add=1
2599 )
Filip Varga18f1e412020-12-03 15:27:40 +01002600 self.nat44_add_static_mapping(self.pg0.remote_ip4, static_addr)
2601
2602 # NAT44EI address
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002603 p = Ether(src=self.pg1.remote_mac, dst="ff:ff:ff:ff:ff:ff") / ARP(
2604 op=ARP.who_has,
2605 pdst=self.nat_addr,
2606 psrc=self.pg1.remote_ip4,
2607 hwsrc=self.pg1.remote_mac,
2608 )
Filip Varga18f1e412020-12-03 15:27:40 +01002609 self.pg1.add_stream(p)
2610 self.pg_enable_capture(self.pg_interfaces)
2611 self.pg_start()
2612 capture = self.pg1.get_capture(1)
2613 self.assertTrue(capture[0].haslayer(ARP))
2614 self.assertTrue(capture[0][ARP].op, ARP.is_at)
2615
2616 # 1:1 NAT address
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002617 p = Ether(src=self.pg1.remote_mac, dst="ff:ff:ff:ff:ff:ff") / ARP(
2618 op=ARP.who_has,
2619 pdst=static_addr,
2620 psrc=self.pg1.remote_ip4,
2621 hwsrc=self.pg1.remote_mac,
2622 )
Filip Varga18f1e412020-12-03 15:27:40 +01002623 self.pg1.add_stream(p)
2624 self.pg_enable_capture(self.pg_interfaces)
2625 self.pg_start()
2626 capture = self.pg1.get_capture(1)
2627 self.assertTrue(capture[0].haslayer(ARP))
2628 self.assertTrue(capture[0][ARP].op, ARP.is_at)
2629
2630 # send ARP to non-NAT44EI interface
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002631 p = Ether(src=self.pg2.remote_mac, dst="ff:ff:ff:ff:ff:ff") / ARP(
2632 op=ARP.who_has,
2633 pdst=self.nat_addr,
2634 psrc=self.pg2.remote_ip4,
2635 hwsrc=self.pg2.remote_mac,
2636 )
Filip Varga18f1e412020-12-03 15:27:40 +01002637 self.pg2.add_stream(p)
2638 self.pg_enable_capture(self.pg_interfaces)
2639 self.pg_start()
2640 self.pg1.assert_nothing_captured()
2641
2642 # remove addresses and verify
2643 self.nat44_add_address(self.nat_addr, is_add=0)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002644 self.nat44_add_static_mapping(self.pg0.remote_ip4, static_addr, is_add=0)
Filip Varga18f1e412020-12-03 15:27:40 +01002645
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002646 p = Ether(src=self.pg1.remote_mac, dst="ff:ff:ff:ff:ff:ff") / ARP(
2647 op=ARP.who_has,
2648 pdst=self.nat_addr,
2649 psrc=self.pg1.remote_ip4,
2650 hwsrc=self.pg1.remote_mac,
2651 )
Filip Varga18f1e412020-12-03 15:27:40 +01002652 self.pg1.add_stream(p)
2653 self.pg_enable_capture(self.pg_interfaces)
2654 self.pg_start()
2655 self.pg1.assert_nothing_captured()
2656
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002657 p = Ether(src=self.pg1.remote_mac, dst="ff:ff:ff:ff:ff:ff") / ARP(
2658 op=ARP.who_has,
2659 pdst=static_addr,
2660 psrc=self.pg1.remote_ip4,
2661 hwsrc=self.pg1.remote_mac,
2662 )
Filip Varga18f1e412020-12-03 15:27:40 +01002663 self.pg1.add_stream(p)
2664 self.pg_enable_capture(self.pg_interfaces)
2665 self.pg_start()
2666 self.pg1.assert_nothing_captured()
2667
2668 def test_vrf_mode(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002669 """NAT44EI tenant VRF aware address pool mode"""
Filip Varga18f1e412020-12-03 15:27:40 +01002670
2671 vrf_id1 = 1
2672 vrf_id2 = 2
2673 nat_ip1 = "10.0.0.10"
2674 nat_ip2 = "10.0.0.11"
2675
2676 self.pg0.unconfig_ip4()
2677 self.pg1.unconfig_ip4()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002678 self.vapi.ip_table_add_del(is_add=1, table={"table_id": vrf_id1})
2679 self.vapi.ip_table_add_del(is_add=1, table={"table_id": vrf_id2})
Filip Varga18f1e412020-12-03 15:27:40 +01002680 self.pg0.set_table_ip4(vrf_id1)
2681 self.pg1.set_table_ip4(vrf_id2)
2682 self.pg0.config_ip4()
2683 self.pg1.config_ip4()
2684 self.pg0.resolve_arp()
2685 self.pg1.resolve_arp()
2686
2687 self.nat44_add_address(nat_ip1, vrf_id=vrf_id1)
2688 self.nat44_add_address(nat_ip2, vrf_id=vrf_id2)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002689 flags = self.config_flags.NAT44_EI_IF_INSIDE
2690 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002691 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2692 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002693 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002694 sw_if_index=self.pg1.sw_if_index, flags=flags, is_add=1
2695 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002696 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002697 sw_if_index=self.pg2.sw_if_index, is_add=1
2698 )
Filip Varga18f1e412020-12-03 15:27:40 +01002699
2700 try:
2701 # first VRF
2702 pkts = self.create_stream_in(self.pg0, self.pg2)
2703 self.pg0.add_stream(pkts)
2704 self.pg_enable_capture(self.pg_interfaces)
2705 self.pg_start()
2706 capture = self.pg2.get_capture(len(pkts))
2707 self.verify_capture_out(capture, nat_ip1)
2708
2709 # second VRF
2710 pkts = self.create_stream_in(self.pg1, self.pg2)
2711 self.pg1.add_stream(pkts)
2712 self.pg_enable_capture(self.pg_interfaces)
2713 self.pg_start()
2714 capture = self.pg2.get_capture(len(pkts))
2715 self.verify_capture_out(capture, nat_ip2)
2716
2717 finally:
2718 self.pg0.unconfig_ip4()
2719 self.pg1.unconfig_ip4()
2720 self.pg0.set_table_ip4(0)
2721 self.pg1.set_table_ip4(0)
2722 self.pg0.config_ip4()
2723 self.pg1.config_ip4()
2724 self.pg0.resolve_arp()
2725 self.pg1.resolve_arp()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002726 self.vapi.ip_table_add_del(is_add=0, table={"table_id": vrf_id1})
2727 self.vapi.ip_table_add_del(is_add=0, table={"table_id": vrf_id2})
Filip Varga18f1e412020-12-03 15:27:40 +01002728
2729 def test_vrf_feature_independent(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002730 """NAT44EI tenant VRF independent address pool mode"""
Filip Varga18f1e412020-12-03 15:27:40 +01002731
2732 nat_ip1 = "10.0.0.10"
2733 nat_ip2 = "10.0.0.11"
2734
2735 self.nat44_add_address(nat_ip1)
2736 self.nat44_add_address(nat_ip2, vrf_id=99)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002737 flags = self.config_flags.NAT44_EI_IF_INSIDE
2738 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002739 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2740 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002741 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002742 sw_if_index=self.pg1.sw_if_index, flags=flags, is_add=1
2743 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002744 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002745 sw_if_index=self.pg2.sw_if_index, is_add=1
2746 )
Filip Varga18f1e412020-12-03 15:27:40 +01002747
2748 # first VRF
2749 pkts = self.create_stream_in(self.pg0, self.pg2)
2750 self.pg0.add_stream(pkts)
2751 self.pg_enable_capture(self.pg_interfaces)
2752 self.pg_start()
2753 capture = self.pg2.get_capture(len(pkts))
2754 self.verify_capture_out(capture, nat_ip1)
2755
2756 # second VRF
2757 pkts = self.create_stream_in(self.pg1, self.pg2)
2758 self.pg1.add_stream(pkts)
2759 self.pg_enable_capture(self.pg_interfaces)
2760 self.pg_start()
2761 capture = self.pg2.get_capture(len(pkts))
2762 self.verify_capture_out(capture, nat_ip1)
2763
2764 def test_dynamic_ipless_interfaces(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002765 """NAT44EI interfaces without configured IP address"""
Filip Varga18f1e412020-12-03 15:27:40 +01002766 self.create_routes_and_neigbors()
2767 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002768 flags = self.config_flags.NAT44_EI_IF_INSIDE
2769 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002770 sw_if_index=self.pg7.sw_if_index, flags=flags, is_add=1
2771 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002772 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002773 sw_if_index=self.pg8.sw_if_index, is_add=1
2774 )
Filip Varga18f1e412020-12-03 15:27:40 +01002775
2776 # in2out
2777 pkts = self.create_stream_in(self.pg7, self.pg8)
2778 self.pg7.add_stream(pkts)
2779 self.pg_enable_capture(self.pg_interfaces)
2780 self.pg_start()
2781 capture = self.pg8.get_capture(len(pkts))
2782 self.verify_capture_out(capture)
2783
2784 # out2in
2785 pkts = self.create_stream_out(self.pg8, self.nat_addr)
2786 self.pg8.add_stream(pkts)
2787 self.pg_enable_capture(self.pg_interfaces)
2788 self.pg_start()
2789 capture = self.pg7.get_capture(len(pkts))
2790 self.verify_capture_in(capture, self.pg7)
2791
2792 def test_static_ipless_interfaces(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002793 """NAT44EI interfaces without configured IP address - 1:1 NAT"""
Filip Varga18f1e412020-12-03 15:27:40 +01002794
2795 self.create_routes_and_neigbors()
2796 self.nat44_add_static_mapping(self.pg7.remote_ip4, self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002797 flags = self.config_flags.NAT44_EI_IF_INSIDE
2798 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002799 sw_if_index=self.pg7.sw_if_index, flags=flags, is_add=1
2800 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002801 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002802 sw_if_index=self.pg8.sw_if_index, is_add=1
2803 )
Filip Varga18f1e412020-12-03 15:27:40 +01002804
2805 # out2in
2806 pkts = self.create_stream_out(self.pg8)
2807 self.pg8.add_stream(pkts)
2808 self.pg_enable_capture(self.pg_interfaces)
2809 self.pg_start()
2810 capture = self.pg7.get_capture(len(pkts))
2811 self.verify_capture_in(capture, self.pg7)
2812
2813 # in2out
2814 pkts = self.create_stream_in(self.pg7, self.pg8)
2815 self.pg7.add_stream(pkts)
2816 self.pg_enable_capture(self.pg_interfaces)
2817 self.pg_start()
2818 capture = self.pg8.get_capture(len(pkts))
2819 self.verify_capture_out(capture, self.nat_addr, True)
2820
2821 def test_static_with_port_ipless_interfaces(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002822 """NAT44EI interfaces without configured IP address - 1:1 NAPT"""
Filip Varga18f1e412020-12-03 15:27:40 +01002823
2824 self.tcp_port_out = 30606
2825 self.udp_port_out = 30607
2826 self.icmp_id_out = 30608
2827
2828 self.create_routes_and_neigbors()
2829 self.nat44_add_address(self.nat_addr)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002830 self.nat44_add_static_mapping(
2831 self.pg7.remote_ip4,
2832 self.nat_addr,
2833 self.tcp_port_in,
2834 self.tcp_port_out,
2835 proto=IP_PROTOS.tcp,
2836 )
2837 self.nat44_add_static_mapping(
2838 self.pg7.remote_ip4,
2839 self.nat_addr,
2840 self.udp_port_in,
2841 self.udp_port_out,
2842 proto=IP_PROTOS.udp,
2843 )
2844 self.nat44_add_static_mapping(
2845 self.pg7.remote_ip4,
2846 self.nat_addr,
2847 self.icmp_id_in,
2848 self.icmp_id_out,
2849 proto=IP_PROTOS.icmp,
2850 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002851 flags = self.config_flags.NAT44_EI_IF_INSIDE
2852 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002853 sw_if_index=self.pg7.sw_if_index, flags=flags, is_add=1
2854 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002855 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002856 sw_if_index=self.pg8.sw_if_index, is_add=1
2857 )
Filip Varga18f1e412020-12-03 15:27:40 +01002858
2859 # out2in
2860 pkts = self.create_stream_out(self.pg8)
2861 self.pg8.add_stream(pkts)
2862 self.pg_enable_capture(self.pg_interfaces)
2863 self.pg_start()
2864 capture = self.pg7.get_capture(len(pkts))
2865 self.verify_capture_in(capture, self.pg7)
2866
2867 # in2out
2868 pkts = self.create_stream_in(self.pg7, self.pg8)
2869 self.pg7.add_stream(pkts)
2870 self.pg_enable_capture(self.pg_interfaces)
2871 self.pg_start()
2872 capture = self.pg8.get_capture(len(pkts))
2873 self.verify_capture_out(capture)
2874
2875 def test_static_unknown_proto(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002876 """NAT44EI 1:1 translate packet with unknown protocol"""
Filip Varga18f1e412020-12-03 15:27:40 +01002877 nat_ip = "10.0.0.10"
2878 self.nat44_add_static_mapping(self.pg0.remote_ip4, nat_ip)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002879 flags = self.config_flags.NAT44_EI_IF_INSIDE
2880 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002881 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2882 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002883 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002884 sw_if_index=self.pg1.sw_if_index, is_add=1
2885 )
Filip Varga18f1e412020-12-03 15:27:40 +01002886
2887 # in2out
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002888 p = (
2889 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
2890 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
2891 / GRE()
2892 / IP(src=self.pg2.remote_ip4, dst=self.pg3.remote_ip4)
2893 / TCP(sport=1234, dport=1234)
2894 )
Filip Varga18f1e412020-12-03 15:27:40 +01002895 self.pg0.add_stream(p)
2896 self.pg_enable_capture(self.pg_interfaces)
2897 self.pg_start()
2898 p = self.pg1.get_capture(1)
2899 packet = p[0]
2900 try:
2901 self.assertEqual(packet[IP].src, nat_ip)
2902 self.assertEqual(packet[IP].dst, self.pg1.remote_ip4)
2903 self.assertEqual(packet.haslayer(GRE), 1)
2904 self.assert_packet_checksums_valid(packet)
2905 except:
2906 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2907 raise
2908
2909 # out2in
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002910 p = (
2911 Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
2912 / IP(src=self.pg1.remote_ip4, dst=nat_ip)
2913 / GRE()
2914 / IP(src=self.pg3.remote_ip4, dst=self.pg2.remote_ip4)
2915 / TCP(sport=1234, dport=1234)
2916 )
Filip Varga18f1e412020-12-03 15:27:40 +01002917 self.pg1.add_stream(p)
2918 self.pg_enable_capture(self.pg_interfaces)
2919 self.pg_start()
2920 p = self.pg0.get_capture(1)
2921 packet = p[0]
2922 try:
2923 self.assertEqual(packet[IP].src, self.pg1.remote_ip4)
2924 self.assertEqual(packet[IP].dst, self.pg0.remote_ip4)
2925 self.assertEqual(packet.haslayer(GRE), 1)
2926 self.assert_packet_checksums_valid(packet)
2927 except:
2928 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2929 raise
2930
2931 def test_hairpinning_static_unknown_proto(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002932 """NAT44EI 1:1 translate packet with unknown protocol - hairpinning"""
Filip Varga18f1e412020-12-03 15:27:40 +01002933
2934 host = self.pg0.remote_hosts[0]
2935 server = self.pg0.remote_hosts[1]
2936
2937 host_nat_ip = "10.0.0.10"
2938 server_nat_ip = "10.0.0.11"
2939
2940 self.nat44_add_static_mapping(host.ip4, host_nat_ip)
2941 self.nat44_add_static_mapping(server.ip4, server_nat_ip)
Filip Varga0eaf4e62021-02-17 14:34:54 +01002942 flags = self.config_flags.NAT44_EI_IF_INSIDE
2943 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002944 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
2945 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01002946 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002947 sw_if_index=self.pg1.sw_if_index, is_add=1
2948 )
Filip Varga18f1e412020-12-03 15:27:40 +01002949
2950 # host to server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002951 p = (
2952 Ether(dst=self.pg0.local_mac, src=host.mac)
2953 / IP(src=host.ip4, dst=server_nat_ip)
2954 / GRE()
2955 / IP(src=self.pg2.remote_ip4, dst=self.pg3.remote_ip4)
2956 / TCP(sport=1234, dport=1234)
2957 )
Filip Varga18f1e412020-12-03 15:27:40 +01002958 self.pg0.add_stream(p)
2959 self.pg_enable_capture(self.pg_interfaces)
2960 self.pg_start()
2961 p = self.pg0.get_capture(1)
2962 packet = p[0]
2963 try:
2964 self.assertEqual(packet[IP].src, host_nat_ip)
2965 self.assertEqual(packet[IP].dst, server.ip4)
2966 self.assertEqual(packet.haslayer(GRE), 1)
2967 self.assert_packet_checksums_valid(packet)
2968 except:
2969 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2970 raise
2971
2972 # server to host
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002973 p = (
2974 Ether(dst=self.pg0.local_mac, src=server.mac)
2975 / IP(src=server.ip4, dst=host_nat_ip)
2976 / GRE()
2977 / IP(src=self.pg3.remote_ip4, dst=self.pg2.remote_ip4)
2978 / TCP(sport=1234, dport=1234)
2979 )
Filip Varga18f1e412020-12-03 15:27:40 +01002980 self.pg0.add_stream(p)
2981 self.pg_enable_capture(self.pg_interfaces)
2982 self.pg_start()
2983 p = self.pg0.get_capture(1)
2984 packet = p[0]
2985 try:
2986 self.assertEqual(packet[IP].src, server_nat_ip)
2987 self.assertEqual(packet[IP].dst, host.ip4)
2988 self.assertEqual(packet.haslayer(GRE), 1)
2989 self.assert_packet_checksums_valid(packet)
2990 except:
2991 self.logger.error(ppp("Unexpected or invalid packet:", packet))
2992 raise
2993
2994 def test_output_feature(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002995 """NAT44EI output feature (in2out postrouting)"""
Filip Varga18f1e412020-12-03 15:27:40 +01002996 self.nat44_add_address(self.nat_addr)
Filip Varga9c25eb12021-10-21 13:00:27 +02002997 self.vapi.nat44_ei_add_del_output_interface(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02002998 sw_if_index=self.pg3.sw_if_index, is_add=1
2999 )
Filip Varga18f1e412020-12-03 15:27:40 +01003000
3001 # in2out
3002 pkts = self.create_stream_in(self.pg0, self.pg3)
3003 self.pg0.add_stream(pkts)
3004 self.pg_enable_capture(self.pg_interfaces)
3005 self.pg_start()
3006 capture = self.pg3.get_capture(len(pkts))
3007 self.verify_capture_out(capture)
3008
3009 # out2in
3010 pkts = self.create_stream_out(self.pg3)
3011 self.pg3.add_stream(pkts)
3012 self.pg_enable_capture(self.pg_interfaces)
3013 self.pg_start()
3014 capture = self.pg0.get_capture(len(pkts))
3015 self.verify_capture_in(capture, self.pg0)
3016
3017 # from non-NAT interface to NAT inside interface
3018 pkts = self.create_stream_in(self.pg2, self.pg0)
3019 self.pg2.add_stream(pkts)
3020 self.pg_enable_capture(self.pg_interfaces)
3021 self.pg_start()
3022 capture = self.pg0.get_capture(len(pkts))
3023 self.verify_capture_no_translation(capture, self.pg2, self.pg0)
3024
3025 def test_output_feature_vrf_aware(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003026 """NAT44EI output feature VRF aware (in2out postrouting)"""
Filip Varga18f1e412020-12-03 15:27:40 +01003027 nat_ip_vrf10 = "10.0.0.10"
3028 nat_ip_vrf20 = "10.0.0.20"
3029
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003030 r1 = VppIpRoute(
3031 self,
3032 self.pg3.remote_ip4,
3033 32,
3034 [VppRoutePath(self.pg3.remote_ip4, self.pg3.sw_if_index)],
3035 table_id=10,
3036 )
3037 r2 = VppIpRoute(
3038 self,
3039 self.pg3.remote_ip4,
3040 32,
3041 [VppRoutePath(self.pg3.remote_ip4, self.pg3.sw_if_index)],
3042 table_id=20,
3043 )
Filip Varga18f1e412020-12-03 15:27:40 +01003044 r1.add_vpp_config()
3045 r2.add_vpp_config()
3046
3047 self.nat44_add_address(nat_ip_vrf10, vrf_id=10)
3048 self.nat44_add_address(nat_ip_vrf20, vrf_id=20)
Filip Varga9c25eb12021-10-21 13:00:27 +02003049 self.vapi.nat44_ei_add_del_output_interface(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003050 sw_if_index=self.pg3.sw_if_index, is_add=1
3051 )
Filip Varga18f1e412020-12-03 15:27:40 +01003052
3053 # in2out VRF 10
3054 pkts = self.create_stream_in(self.pg4, self.pg3)
3055 self.pg4.add_stream(pkts)
3056 self.pg_enable_capture(self.pg_interfaces)
3057 self.pg_start()
3058 capture = self.pg3.get_capture(len(pkts))
3059 self.verify_capture_out(capture, nat_ip=nat_ip_vrf10)
3060
3061 # out2in VRF 10
3062 pkts = self.create_stream_out(self.pg3, dst_ip=nat_ip_vrf10)
3063 self.pg3.add_stream(pkts)
3064 self.pg_enable_capture(self.pg_interfaces)
3065 self.pg_start()
3066 capture = self.pg4.get_capture(len(pkts))
3067 self.verify_capture_in(capture, self.pg4)
3068
3069 # in2out VRF 20
3070 pkts = self.create_stream_in(self.pg6, self.pg3)
3071 self.pg6.add_stream(pkts)
3072 self.pg_enable_capture(self.pg_interfaces)
3073 self.pg_start()
3074 capture = self.pg3.get_capture(len(pkts))
3075 self.verify_capture_out(capture, nat_ip=nat_ip_vrf20)
3076
3077 # out2in VRF 20
3078 pkts = self.create_stream_out(self.pg3, dst_ip=nat_ip_vrf20)
3079 self.pg3.add_stream(pkts)
3080 self.pg_enable_capture(self.pg_interfaces)
3081 self.pg_start()
3082 capture = self.pg6.get_capture(len(pkts))
3083 self.verify_capture_in(capture, self.pg6)
3084
3085 def test_output_feature_hairpinning(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003086 """NAT44EI output feature hairpinning (in2out postrouting)"""
Filip Varga18f1e412020-12-03 15:27:40 +01003087 host = self.pg0.remote_hosts[0]
3088 server = self.pg0.remote_hosts[1]
3089 host_in_port = 1234
3090 host_out_port = 0
3091 server_in_port = 5678
3092 server_out_port = 8765
3093
3094 self.nat44_add_address(self.nat_addr)
Filip Varga9c25eb12021-10-21 13:00:27 +02003095 self.vapi.nat44_ei_add_del_output_interface(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003096 sw_if_index=self.pg0.sw_if_index, is_add=1
3097 )
Filip Varga9c25eb12021-10-21 13:00:27 +02003098 self.vapi.nat44_ei_add_del_output_interface(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003099 sw_if_index=self.pg1.sw_if_index, is_add=1
3100 )
Filip Varga18f1e412020-12-03 15:27:40 +01003101
3102 # add static mapping for server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003103 self.nat44_add_static_mapping(
3104 server.ip4,
3105 self.nat_addr,
3106 server_in_port,
3107 server_out_port,
3108 proto=IP_PROTOS.tcp,
3109 )
Filip Varga18f1e412020-12-03 15:27:40 +01003110
3111 # send packet from host to server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003112 p = (
3113 Ether(src=host.mac, dst=self.pg0.local_mac)
3114 / IP(src=host.ip4, dst=self.nat_addr)
3115 / TCP(sport=host_in_port, dport=server_out_port)
3116 )
Filip Varga18f1e412020-12-03 15:27:40 +01003117 self.pg0.add_stream(p)
3118 self.pg_enable_capture(self.pg_interfaces)
3119 self.pg_start()
3120 capture = self.pg0.get_capture(1)
3121 p = capture[0]
3122 try:
3123 ip = p[IP]
3124 tcp = p[TCP]
3125 self.assertEqual(ip.src, self.nat_addr)
3126 self.assertEqual(ip.dst, server.ip4)
3127 self.assertNotEqual(tcp.sport, host_in_port)
3128 self.assertEqual(tcp.dport, server_in_port)
3129 self.assert_packet_checksums_valid(p)
3130 host_out_port = tcp.sport
3131 except:
3132 self.logger.error(ppp("Unexpected or invalid packet:", p))
3133 raise
3134
3135 # send reply from server to host
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003136 p = (
3137 Ether(src=server.mac, dst=self.pg0.local_mac)
3138 / IP(src=server.ip4, dst=self.nat_addr)
3139 / TCP(sport=server_in_port, dport=host_out_port)
3140 )
Filip Varga18f1e412020-12-03 15:27:40 +01003141 self.pg0.add_stream(p)
3142 self.pg_enable_capture(self.pg_interfaces)
3143 self.pg_start()
3144 capture = self.pg0.get_capture(1)
3145 p = capture[0]
3146 try:
3147 ip = p[IP]
3148 tcp = p[TCP]
3149 self.assertEqual(ip.src, self.nat_addr)
3150 self.assertEqual(ip.dst, host.ip4)
3151 self.assertEqual(tcp.sport, server_out_port)
3152 self.assertEqual(tcp.dport, host_in_port)
3153 self.assert_packet_checksums_valid(p)
3154 except:
3155 self.logger.error(ppp("Unexpected or invalid packet:", p))
3156 raise
3157
3158 def test_one_armed_nat44(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003159 """NAT44EI One armed NAT"""
Filip Varga18f1e412020-12-03 15:27:40 +01003160 remote_host = self.pg9.remote_hosts[0]
3161 local_host = self.pg9.remote_hosts[1]
3162 external_port = 0
3163
3164 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003165 flags = self.config_flags.NAT44_EI_IF_INSIDE
3166 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003167 sw_if_index=self.pg9.sw_if_index, is_add=1
3168 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003169 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003170 sw_if_index=self.pg9.sw_if_index, flags=flags, is_add=1
3171 )
Filip Varga18f1e412020-12-03 15:27:40 +01003172
3173 # in2out
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003174 p = (
3175 Ether(src=self.pg9.remote_mac, dst=self.pg9.local_mac)
3176 / IP(src=local_host.ip4, dst=remote_host.ip4)
3177 / TCP(sport=12345, dport=80)
3178 )
Filip Varga18f1e412020-12-03 15:27:40 +01003179 self.pg9.add_stream(p)
3180 self.pg_enable_capture(self.pg_interfaces)
3181 self.pg_start()
3182 capture = self.pg9.get_capture(1)
3183 p = capture[0]
3184 try:
3185 ip = p[IP]
3186 tcp = p[TCP]
3187 self.assertEqual(ip.src, self.nat_addr)
3188 self.assertEqual(ip.dst, remote_host.ip4)
3189 self.assertNotEqual(tcp.sport, 12345)
3190 external_port = tcp.sport
3191 self.assertEqual(tcp.dport, 80)
3192 self.assert_packet_checksums_valid(p)
3193 except:
3194 self.logger.error(ppp("Unexpected or invalid packet:", p))
3195 raise
3196
3197 # out2in
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003198 p = (
3199 Ether(src=self.pg9.remote_mac, dst=self.pg9.local_mac)
3200 / IP(src=remote_host.ip4, dst=self.nat_addr)
3201 / TCP(sport=80, dport=external_port)
3202 )
Filip Varga18f1e412020-12-03 15:27:40 +01003203 self.pg9.add_stream(p)
3204 self.pg_enable_capture(self.pg_interfaces)
3205 self.pg_start()
3206 capture = self.pg9.get_capture(1)
3207 p = capture[0]
3208 try:
3209 ip = p[IP]
3210 tcp = p[TCP]
3211 self.assertEqual(ip.src, remote_host.ip4)
3212 self.assertEqual(ip.dst, local_host.ip4)
3213 self.assertEqual(tcp.sport, 80)
3214 self.assertEqual(tcp.dport, 12345)
3215 self.assert_packet_checksums_valid(p)
3216 except:
3217 self.logger.error(ppp("Unexpected or invalid packet:", p))
3218 raise
3219
Klement Sekerac294c502021-03-24 17:20:40 +01003220 if self.vpp_worker_count > 1:
3221 node = "nat44-ei-handoff-classify"
3222 else:
3223 node = "nat44-ei-classify"
3224
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003225 err = self.statistics.get_err_counter("/err/%s/next in2out" % node)
Filip Varga18f1e412020-12-03 15:27:40 +01003226 self.assertEqual(err, 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003227 err = self.statistics.get_err_counter("/err/%s/next out2in" % node)
Filip Varga18f1e412020-12-03 15:27:40 +01003228 self.assertEqual(err, 1)
3229
3230 def test_del_session(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003231 """NAT44EI delete session"""
Filip Varga18f1e412020-12-03 15:27:40 +01003232 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003233 flags = self.config_flags.NAT44_EI_IF_INSIDE
3234 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003235 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3236 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003237 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003238 sw_if_index=self.pg1.sw_if_index, is_add=1
3239 )
Filip Varga18f1e412020-12-03 15:27:40 +01003240
3241 pkts = self.create_stream_in(self.pg0, self.pg1)
3242 self.pg0.add_stream(pkts)
3243 self.pg_enable_capture(self.pg_interfaces)
3244 self.pg_start()
3245 self.pg1.get_capture(len(pkts))
3246
Filip Varga0eaf4e62021-02-17 14:34:54 +01003247 sessions = self.vapi.nat44_ei_user_session_dump(self.pg0.remote_ip4, 0)
Filip Varga18f1e412020-12-03 15:27:40 +01003248 nsessions = len(sessions)
3249
Filip Varga0eaf4e62021-02-17 14:34:54 +01003250 self.vapi.nat44_ei_del_session(
3251 address=sessions[0].inside_ip_address,
3252 port=sessions[0].inside_port,
3253 protocol=sessions[0].protocol,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003254 flags=self.config_flags.NAT44_EI_IF_INSIDE,
3255 )
Filip Varga18f1e412020-12-03 15:27:40 +01003256
Filip Varga0eaf4e62021-02-17 14:34:54 +01003257 self.vapi.nat44_ei_del_session(
3258 address=sessions[1].outside_ip_address,
3259 port=sessions[1].outside_port,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003260 protocol=sessions[1].protocol,
3261 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003262
3263 sessions = self.vapi.nat44_ei_user_session_dump(self.pg0.remote_ip4, 0)
Filip Varga18f1e412020-12-03 15:27:40 +01003264 self.assertEqual(nsessions - len(sessions), 2)
3265
Filip Varga0eaf4e62021-02-17 14:34:54 +01003266 self.vapi.nat44_ei_del_session(
3267 address=sessions[0].inside_ip_address,
3268 port=sessions[0].inside_port,
3269 protocol=sessions[0].protocol,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003270 flags=self.config_flags.NAT44_EI_IF_INSIDE,
3271 )
Filip Varga18f1e412020-12-03 15:27:40 +01003272
3273 self.verify_no_nat44_user()
3274
3275 def test_frag_in_order(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003276 """NAT44EI translate fragments arriving in order"""
Filip Varga18f1e412020-12-03 15:27:40 +01003277
3278 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003279 flags = self.config_flags.NAT44_EI_IF_INSIDE
3280 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003281 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3282 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003283 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003284 sw_if_index=self.pg1.sw_if_index, is_add=1
3285 )
Filip Varga18f1e412020-12-03 15:27:40 +01003286
3287 self.frag_in_order(proto=IP_PROTOS.tcp)
3288 self.frag_in_order(proto=IP_PROTOS.udp)
3289 self.frag_in_order(proto=IP_PROTOS.icmp)
3290
3291 def test_frag_forwarding(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003292 """NAT44EI forwarding fragment test"""
Filip Varga0eaf4e62021-02-17 14:34:54 +01003293 self.vapi.nat44_ei_add_del_interface_addr(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003294 is_add=1, sw_if_index=self.pg1.sw_if_index
3295 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003296 flags = self.config_flags.NAT44_EI_IF_INSIDE
3297 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003298 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3299 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003300 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003301 sw_if_index=self.pg1.sw_if_index, is_add=1
3302 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003303 self.vapi.nat44_ei_forwarding_enable_disable(enable=1)
Filip Varga18f1e412020-12-03 15:27:40 +01003304
3305 data = b"A" * 16 + b"B" * 16 + b"C" * 3
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003306 pkts = self.create_stream_frag(
3307 self.pg1, self.pg0.remote_ip4, 4789, 4789, data, proto=IP_PROTOS.udp
3308 )
Filip Varga18f1e412020-12-03 15:27:40 +01003309 self.pg1.add_stream(pkts)
3310 self.pg_enable_capture(self.pg_interfaces)
3311 self.pg_start()
3312 frags = self.pg0.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003313 p = self.reass_frags_and_verify(frags, self.pg1.remote_ip4, self.pg0.remote_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +01003314 self.assertEqual(p[UDP].sport, 4789)
3315 self.assertEqual(p[UDP].dport, 4789)
3316 self.assertEqual(data, p[Raw].load)
3317
3318 def test_reass_hairpinning(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003319 """NAT44EI fragments hairpinning"""
Filip Varga18f1e412020-12-03 15:27:40 +01003320
3321 server_addr = self.pg0.remote_hosts[1].ip4
3322 host_in_port = random.randint(1025, 65535)
3323 server_in_port = random.randint(1025, 65535)
3324 server_out_port = random.randint(1025, 65535)
3325
3326 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003327 flags = self.config_flags.NAT44_EI_IF_INSIDE
3328 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003329 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3330 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003331 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003332 sw_if_index=self.pg1.sw_if_index, is_add=1
3333 )
Filip Varga18f1e412020-12-03 15:27:40 +01003334 # add static mapping for server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003335 self.nat44_add_static_mapping(
3336 server_addr,
3337 self.nat_addr,
3338 server_in_port,
3339 server_out_port,
3340 proto=IP_PROTOS.tcp,
3341 )
3342 self.nat44_add_static_mapping(
3343 server_addr,
3344 self.nat_addr,
3345 server_in_port,
3346 server_out_port,
3347 proto=IP_PROTOS.udp,
3348 )
Filip Varga18f1e412020-12-03 15:27:40 +01003349 self.nat44_add_static_mapping(server_addr, self.nat_addr)
3350
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003351 self.reass_hairpinning(
3352 server_addr,
3353 server_in_port,
3354 server_out_port,
3355 host_in_port,
3356 proto=IP_PROTOS.tcp,
3357 )
3358 self.reass_hairpinning(
3359 server_addr,
3360 server_in_port,
3361 server_out_port,
3362 host_in_port,
3363 proto=IP_PROTOS.udp,
3364 )
3365 self.reass_hairpinning(
3366 server_addr,
3367 server_in_port,
3368 server_out_port,
3369 host_in_port,
3370 proto=IP_PROTOS.icmp,
3371 )
Filip Varga18f1e412020-12-03 15:27:40 +01003372
3373 def test_frag_out_of_order(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003374 """NAT44EI translate fragments arriving out of order"""
Filip Varga18f1e412020-12-03 15:27:40 +01003375
3376 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003377 flags = self.config_flags.NAT44_EI_IF_INSIDE
3378 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003379 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3380 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003381 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003382 sw_if_index=self.pg1.sw_if_index, is_add=1
3383 )
Filip Varga18f1e412020-12-03 15:27:40 +01003384
3385 self.frag_out_of_order(proto=IP_PROTOS.tcp)
3386 self.frag_out_of_order(proto=IP_PROTOS.udp)
3387 self.frag_out_of_order(proto=IP_PROTOS.icmp)
3388
3389 def test_port_restricted(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003390 """NAT44EI Port restricted NAT44EI (MAP-E CE)"""
Filip Varga18f1e412020-12-03 15:27:40 +01003391 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003392 flags = self.config_flags.NAT44_EI_IF_INSIDE
3393 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003394 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3395 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003396 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003397 sw_if_index=self.pg1.sw_if_index, is_add=1
3398 )
3399 self.vapi.nat44_ei_set_addr_and_port_alloc_alg(
3400 alg=1, psid_offset=6, psid_length=6, psid=10
3401 )
Filip Varga18f1e412020-12-03 15:27:40 +01003402
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003403 p = (
3404 Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
3405 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
3406 / TCP(sport=4567, dport=22)
3407 )
Filip Varga18f1e412020-12-03 15:27:40 +01003408 self.pg0.add_stream(p)
3409 self.pg_enable_capture(self.pg_interfaces)
3410 self.pg_start()
3411 capture = self.pg1.get_capture(1)
3412 p = capture[0]
3413 try:
3414 ip = p[IP]
3415 tcp = p[TCP]
3416 self.assertEqual(ip.dst, self.pg1.remote_ip4)
3417 self.assertEqual(ip.src, self.nat_addr)
3418 self.assertEqual(tcp.dport, 22)
3419 self.assertNotEqual(tcp.sport, 4567)
3420 self.assertEqual((tcp.sport >> 6) & 63, 10)
3421 self.assert_packet_checksums_valid(p)
3422 except:
3423 self.logger.error(ppp("Unexpected or invalid packet:", p))
3424 raise
3425
3426 def test_port_range(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003427 """NAT44EI External address port range"""
Filip Varga18f1e412020-12-03 15:27:40 +01003428 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003429 flags = self.config_flags.NAT44_EI_IF_INSIDE
3430 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003431 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3432 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003433 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003434 sw_if_index=self.pg1.sw_if_index, is_add=1
3435 )
3436 self.vapi.nat44_ei_set_addr_and_port_alloc_alg(
3437 alg=2, start_port=1025, end_port=1027
3438 )
Filip Varga18f1e412020-12-03 15:27:40 +01003439
3440 pkts = []
3441 for port in range(0, 5):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003442 p = (
3443 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
3444 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
3445 / TCP(sport=1125 + port)
3446 )
Filip Varga18f1e412020-12-03 15:27:40 +01003447 pkts.append(p)
3448 self.pg0.add_stream(pkts)
3449 self.pg_enable_capture(self.pg_interfaces)
3450 self.pg_start()
3451 capture = self.pg1.get_capture(3)
3452 for p in capture:
3453 tcp = p[TCP]
3454 self.assertGreaterEqual(tcp.sport, 1025)
3455 self.assertLessEqual(tcp.sport, 1027)
3456
3457 def test_multiple_outside_vrf(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003458 """NAT44EI Multiple outside VRF"""
Filip Varga18f1e412020-12-03 15:27:40 +01003459 vrf_id1 = 1
3460 vrf_id2 = 2
3461
3462 self.pg1.unconfig_ip4()
3463 self.pg2.unconfig_ip4()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003464 self.vapi.ip_table_add_del(is_add=1, table={"table_id": vrf_id1})
3465 self.vapi.ip_table_add_del(is_add=1, table={"table_id": vrf_id2})
Filip Varga18f1e412020-12-03 15:27:40 +01003466 self.pg1.set_table_ip4(vrf_id1)
3467 self.pg2.set_table_ip4(vrf_id2)
3468 self.pg1.config_ip4()
3469 self.pg2.config_ip4()
3470 self.pg1.resolve_arp()
3471 self.pg2.resolve_arp()
3472
3473 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003474 flags = self.config_flags.NAT44_EI_IF_INSIDE
3475 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003476 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3477 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003478 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003479 sw_if_index=self.pg1.sw_if_index, is_add=1
3480 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003481 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003482 sw_if_index=self.pg2.sw_if_index, is_add=1
3483 )
Filip Varga18f1e412020-12-03 15:27:40 +01003484
3485 try:
3486 # first VRF
3487 pkts = self.create_stream_in(self.pg0, self.pg1)
3488 self.pg0.add_stream(pkts)
3489 self.pg_enable_capture(self.pg_interfaces)
3490 self.pg_start()
3491 capture = self.pg1.get_capture(len(pkts))
3492 self.verify_capture_out(capture, self.nat_addr)
3493
3494 pkts = self.create_stream_out(self.pg1, self.nat_addr)
3495 self.pg1.add_stream(pkts)
3496 self.pg_enable_capture(self.pg_interfaces)
3497 self.pg_start()
3498 capture = self.pg0.get_capture(len(pkts))
3499 self.verify_capture_in(capture, self.pg0)
3500
3501 self.tcp_port_in = 60303
3502 self.udp_port_in = 60304
3503 self.icmp_id_in = 60305
3504
3505 # second VRF
3506 pkts = self.create_stream_in(self.pg0, self.pg2)
3507 self.pg0.add_stream(pkts)
3508 self.pg_enable_capture(self.pg_interfaces)
3509 self.pg_start()
3510 capture = self.pg2.get_capture(len(pkts))
3511 self.verify_capture_out(capture, self.nat_addr)
3512
3513 pkts = self.create_stream_out(self.pg2, self.nat_addr)
3514 self.pg2.add_stream(pkts)
3515 self.pg_enable_capture(self.pg_interfaces)
3516 self.pg_start()
3517 capture = self.pg0.get_capture(len(pkts))
3518 self.verify_capture_in(capture, self.pg0)
3519
3520 finally:
3521 self.nat44_add_address(self.nat_addr, is_add=0)
3522 self.pg1.unconfig_ip4()
3523 self.pg2.unconfig_ip4()
3524 self.pg1.set_table_ip4(0)
3525 self.pg2.set_table_ip4(0)
3526 self.pg1.config_ip4()
3527 self.pg2.config_ip4()
3528 self.pg1.resolve_arp()
3529 self.pg2.resolve_arp()
3530
3531 def test_mss_clamping(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003532 """NAT44EI TCP MSS clamping"""
Filip Varga18f1e412020-12-03 15:27:40 +01003533 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003534 flags = self.config_flags.NAT44_EI_IF_INSIDE
3535 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003536 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3537 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003538 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003539 sw_if_index=self.pg1.sw_if_index, is_add=1
3540 )
Filip Varga18f1e412020-12-03 15:27:40 +01003541
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003542 p = (
3543 Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
3544 / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4)
3545 / TCP(
3546 sport=self.tcp_port_in,
3547 dport=self.tcp_external_port,
3548 flags="S",
3549 options=[("MSS", 1400)],
3550 )
3551 )
Filip Varga18f1e412020-12-03 15:27:40 +01003552
Filip Varga0eaf4e62021-02-17 14:34:54 +01003553 self.vapi.nat44_ei_set_mss_clamping(enable=1, mss_value=1000)
Filip Varga18f1e412020-12-03 15:27:40 +01003554 self.pg0.add_stream(p)
3555 self.pg_enable_capture(self.pg_interfaces)
3556 self.pg_start()
3557 capture = self.pg1.get_capture(1)
3558 # Negotiated MSS value greater than configured - changed
3559 self.verify_mss_value(capture[0], 1000)
3560
Filip Varga0eaf4e62021-02-17 14:34:54 +01003561 self.vapi.nat44_ei_set_mss_clamping(enable=0, mss_value=1500)
Filip Varga18f1e412020-12-03 15:27:40 +01003562 self.pg0.add_stream(p)
3563 self.pg_enable_capture(self.pg_interfaces)
3564 self.pg_start()
3565 capture = self.pg1.get_capture(1)
3566 # MSS clamping disabled - negotiated MSS unchanged
3567 self.verify_mss_value(capture[0], 1400)
3568
Filip Varga0eaf4e62021-02-17 14:34:54 +01003569 self.vapi.nat44_ei_set_mss_clamping(enable=1, mss_value=1500)
Filip Varga18f1e412020-12-03 15:27:40 +01003570 self.pg0.add_stream(p)
3571 self.pg_enable_capture(self.pg_interfaces)
3572 self.pg_start()
3573 capture = self.pg1.get_capture(1)
3574 # Negotiated MSS value smaller than configured - unchanged
3575 self.verify_mss_value(capture[0], 1400)
3576
3577 def test_ha_send(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003578 """NAT44EI Send HA session synchronization events (active)"""
Filip Varga0eaf4e62021-02-17 14:34:54 +01003579 flags = self.config_flags.NAT44_EI_IF_INSIDE
3580 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003581 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3582 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003583 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003584 sw_if_index=self.pg1.sw_if_index, is_add=1
3585 )
Filip Varga18f1e412020-12-03 15:27:40 +01003586 self.nat44_add_address(self.nat_addr)
3587
Filip Varga0eaf4e62021-02-17 14:34:54 +01003588 self.vapi.nat44_ei_ha_set_listener(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003589 ip_address=self.pg3.local_ip4, port=12345, path_mtu=512
3590 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003591 self.vapi.nat44_ei_ha_set_failover(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003592 ip_address=self.pg3.remote_ip4, port=12346, session_refresh_interval=10
3593 )
Filip Varga18f1e412020-12-03 15:27:40 +01003594 bind_layers(UDP, HANATStateSync, sport=12345)
3595
3596 # create sessions
3597 pkts = self.create_stream_in(self.pg0, self.pg1)
3598 self.pg0.add_stream(pkts)
3599 self.pg_enable_capture(self.pg_interfaces)
3600 self.pg_start()
3601 capture = self.pg1.get_capture(len(pkts))
3602 self.verify_capture_out(capture)
3603 # active send HA events
Filip Varga0eaf4e62021-02-17 14:34:54 +01003604 self.vapi.nat44_ei_ha_flush()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003605 stats = self.statistics["/nat44-ei/ha/add-event-send"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003606 self.assertEqual(stats[:, 0].sum(), 3)
Filip Varga18f1e412020-12-03 15:27:40 +01003607 capture = self.pg3.get_capture(1)
3608 p = capture[0]
3609 self.assert_packet_checksums_valid(p)
3610 try:
3611 ip = p[IP]
3612 udp = p[UDP]
3613 hanat = p[HANATStateSync]
3614 except IndexError:
3615 self.logger.error(ppp("Invalid packet:", p))
3616 raise
3617 else:
3618 self.assertEqual(ip.src, self.pg3.local_ip4)
3619 self.assertEqual(ip.dst, self.pg3.remote_ip4)
3620 self.assertEqual(udp.sport, 12345)
3621 self.assertEqual(udp.dport, 12346)
3622 self.assertEqual(hanat.version, 1)
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003623 # self.assertEqual(hanat.thread_index, 0)
Filip Varga18f1e412020-12-03 15:27:40 +01003624 self.assertEqual(hanat.count, 3)
3625 seq = hanat.sequence_number
3626 for event in hanat.events:
3627 self.assertEqual(event.event_type, 1)
3628 self.assertEqual(event.in_addr, self.pg0.remote_ip4)
3629 self.assertEqual(event.out_addr, self.nat_addr)
3630 self.assertEqual(event.fib_index, 0)
3631
3632 # ACK received events
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003633 ack = (
3634 Ether(dst=self.pg3.local_mac, src=self.pg3.remote_mac)
3635 / IP(src=self.pg3.remote_ip4, dst=self.pg3.local_ip4)
3636 / UDP(sport=12346, dport=12345)
3637 / HANATStateSync(
3638 sequence_number=seq, flags="ACK", thread_index=hanat.thread_index
3639 )
3640 )
Filip Varga18f1e412020-12-03 15:27:40 +01003641 self.pg3.add_stream(ack)
3642 self.pg_start()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003643 stats = self.statistics["/nat44-ei/ha/ack-recv"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003644 self.assertEqual(stats[:, 0].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01003645
3646 # delete one session
3647 self.pg_enable_capture(self.pg_interfaces)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003648 self.vapi.nat44_ei_del_session(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003649 address=self.pg0.remote_ip4,
3650 port=self.tcp_port_in,
3651 protocol=IP_PROTOS.tcp,
3652 flags=self.config_flags.NAT44_EI_IF_INSIDE,
3653 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003654 self.vapi.nat44_ei_ha_flush()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003655 stats = self.statistics["/nat44-ei/ha/del-event-send"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003656 self.assertEqual(stats[:, 0].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01003657 capture = self.pg3.get_capture(1)
3658 p = capture[0]
3659 try:
3660 hanat = p[HANATStateSync]
3661 except IndexError:
3662 self.logger.error(ppp("Invalid packet:", p))
3663 raise
3664 else:
3665 self.assertGreater(hanat.sequence_number, seq)
3666
3667 # do not send ACK, active retry send HA event again
3668 self.pg_enable_capture(self.pg_interfaces)
Benoît Ganne56eccdb2021-08-20 09:18:31 +02003669 self.virtual_sleep(12)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003670 stats = self.statistics["/nat44-ei/ha/retry-count"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003671 self.assertEqual(stats[:, 0].sum(), 3)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003672 stats = self.statistics["/nat44-ei/ha/missed-count"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003673 self.assertEqual(stats[:, 0].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01003674 capture = self.pg3.get_capture(3)
3675 for packet in capture:
3676 self.assertEqual(packet, p)
3677
3678 # session counters refresh
3679 pkts = self.create_stream_out(self.pg1)
3680 self.pg1.add_stream(pkts)
3681 self.pg_enable_capture(self.pg_interfaces)
3682 self.pg_start()
3683 self.pg0.get_capture(2)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003684 self.vapi.nat44_ei_ha_flush()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003685 stats = self.statistics["/nat44-ei/ha/refresh-event-send"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003686 self.assertEqual(stats[:, 0].sum(), 2)
Filip Varga18f1e412020-12-03 15:27:40 +01003687 capture = self.pg3.get_capture(1)
3688 p = capture[0]
3689 self.assert_packet_checksums_valid(p)
3690 try:
3691 ip = p[IP]
3692 udp = p[UDP]
3693 hanat = p[HANATStateSync]
3694 except IndexError:
3695 self.logger.error(ppp("Invalid packet:", p))
3696 raise
3697 else:
3698 self.assertEqual(ip.src, self.pg3.local_ip4)
3699 self.assertEqual(ip.dst, self.pg3.remote_ip4)
3700 self.assertEqual(udp.sport, 12345)
3701 self.assertEqual(udp.dport, 12346)
3702 self.assertEqual(hanat.version, 1)
3703 self.assertEqual(hanat.count, 2)
3704 seq = hanat.sequence_number
3705 for event in hanat.events:
3706 self.assertEqual(event.event_type, 3)
3707 self.assertEqual(event.out_addr, self.nat_addr)
3708 self.assertEqual(event.fib_index, 0)
3709 self.assertEqual(event.total_pkts, 2)
3710 self.assertGreater(event.total_bytes, 0)
3711
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003712 stats = self.statistics["/nat44-ei/ha/ack-recv"]
3713 ack = (
3714 Ether(dst=self.pg3.local_mac, src=self.pg3.remote_mac)
3715 / IP(src=self.pg3.remote_ip4, dst=self.pg3.local_ip4)
3716 / UDP(sport=12346, dport=12345)
3717 / HANATStateSync(
3718 sequence_number=seq, flags="ACK", thread_index=hanat.thread_index
3719 )
3720 )
Filip Varga18f1e412020-12-03 15:27:40 +01003721 self.pg3.add_stream(ack)
3722 self.pg_start()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003723 stats = self.statistics["/nat44-ei/ha/ack-recv"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003724 self.assertEqual(stats[:, 0].sum(), 2)
Filip Varga18f1e412020-12-03 15:27:40 +01003725
3726 def test_ha_recv(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003727 """NAT44EI Receive HA session synchronization events (passive)"""
Filip Varga18f1e412020-12-03 15:27:40 +01003728 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003729 flags = self.config_flags.NAT44_EI_IF_INSIDE
3730 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003731 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
3732 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01003733 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003734 sw_if_index=self.pg1.sw_if_index, is_add=1
3735 )
3736 self.vapi.nat44_ei_ha_set_listener(
3737 ip_address=self.pg3.local_ip4, port=12345, path_mtu=512
3738 )
Filip Varga18f1e412020-12-03 15:27:40 +01003739 bind_layers(UDP, HANATStateSync, sport=12345)
3740
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003741 # this is a bit tricky - HA dictates thread index due to how it's
3742 # designed, but once we use HA to create a session, we also want
3743 # to pass a packet through said session. so the session must end
3744 # up on the correct thread from both directions - in2out (based on
3745 # IP address) and out2in (based on outside port)
3746
3747 # first choose a thread index which is correct for IP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003748 thread_index = get_nat44_ei_in2out_worker_index(
3749 self.pg0.remote_ip4, self.vpp_worker_count
3750 )
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003751
3752 # now pick a port which is correct for given thread
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003753 port_per_thread = int((0xFFFF - 1024) / max(1, self.vpp_worker_count))
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003754 self.tcp_port_out = 1024 + random.randint(1, port_per_thread)
3755 self.udp_port_out = 1024 + random.randint(1, port_per_thread)
3756 if self.vpp_worker_count > 0:
3757 self.tcp_port_out += port_per_thread * (thread_index - 1)
3758 self.udp_port_out += port_per_thread * (thread_index - 1)
Filip Varga18f1e412020-12-03 15:27:40 +01003759
3760 # send HA session add events to failover/passive
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003761 p = (
3762 Ether(dst=self.pg3.local_mac, src=self.pg3.remote_mac)
3763 / IP(src=self.pg3.remote_ip4, dst=self.pg3.local_ip4)
3764 / UDP(sport=12346, dport=12345)
3765 / HANATStateSync(
3766 sequence_number=1,
3767 events=[
3768 Event(
3769 event_type="add",
3770 protocol="tcp",
3771 in_addr=self.pg0.remote_ip4,
3772 out_addr=self.nat_addr,
3773 in_port=self.tcp_port_in,
3774 out_port=self.tcp_port_out,
3775 eh_addr=self.pg1.remote_ip4,
3776 ehn_addr=self.pg1.remote_ip4,
3777 eh_port=self.tcp_external_port,
3778 ehn_port=self.tcp_external_port,
3779 fib_index=0,
3780 ),
3781 Event(
3782 event_type="add",
3783 protocol="udp",
3784 in_addr=self.pg0.remote_ip4,
3785 out_addr=self.nat_addr,
3786 in_port=self.udp_port_in,
3787 out_port=self.udp_port_out,
3788 eh_addr=self.pg1.remote_ip4,
3789 ehn_addr=self.pg1.remote_ip4,
3790 eh_port=self.udp_external_port,
3791 ehn_port=self.udp_external_port,
3792 fib_index=0,
3793 ),
3794 ],
3795 thread_index=thread_index,
3796 )
3797 )
Filip Varga18f1e412020-12-03 15:27:40 +01003798
3799 self.pg3.add_stream(p)
3800 self.pg_enable_capture(self.pg_interfaces)
3801 self.pg_start()
3802 # receive ACK
3803 capture = self.pg3.get_capture(1)
3804 p = capture[0]
3805 try:
3806 hanat = p[HANATStateSync]
3807 except IndexError:
3808 self.logger.error(ppp("Invalid packet:", p))
3809 raise
3810 else:
3811 self.assertEqual(hanat.sequence_number, 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003812 self.assertEqual(hanat.flags, "ACK")
Filip Varga18f1e412020-12-03 15:27:40 +01003813 self.assertEqual(hanat.version, 1)
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003814 self.assertEqual(hanat.thread_index, thread_index)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003815 stats = self.statistics["/nat44-ei/ha/ack-send"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003816 self.assertEqual(stats[:, 0].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003817 stats = self.statistics["/nat44-ei/ha/add-event-recv"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003818 self.assertEqual(stats[:, 0].sum(), 2)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003819 users = self.statistics["/nat44-ei/total-users"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003820 self.assertEqual(users[:, 0].sum(), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003821 sessions = self.statistics["/nat44-ei/total-sessions"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003822 self.assertEqual(sessions[:, 0].sum(), 2)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003823 users = self.vapi.nat44_ei_user_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01003824 self.assertEqual(len(users), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003825 self.assertEqual(str(users[0].ip_address), self.pg0.remote_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +01003826 # there should be 2 sessions created by HA
Filip Varga0eaf4e62021-02-17 14:34:54 +01003827 sessions = self.vapi.nat44_ei_user_session_dump(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003828 users[0].ip_address, users[0].vrf_id
3829 )
Filip Varga18f1e412020-12-03 15:27:40 +01003830 self.assertEqual(len(sessions), 2)
3831 for session in sessions:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003832 self.assertEqual(str(session.inside_ip_address), self.pg0.remote_ip4)
3833 self.assertEqual(str(session.outside_ip_address), self.nat_addr)
3834 self.assertIn(session.inside_port, [self.tcp_port_in, self.udp_port_in])
3835 self.assertIn(session.outside_port, [self.tcp_port_out, self.udp_port_out])
Filip Varga18f1e412020-12-03 15:27:40 +01003836 self.assertIn(session.protocol, [IP_PROTOS.tcp, IP_PROTOS.udp])
3837
3838 # send HA session delete event to failover/passive
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003839 p = (
3840 Ether(dst=self.pg3.local_mac, src=self.pg3.remote_mac)
3841 / IP(src=self.pg3.remote_ip4, dst=self.pg3.local_ip4)
3842 / UDP(sport=12346, dport=12345)
3843 / HANATStateSync(
3844 sequence_number=2,
3845 events=[
3846 Event(
3847 event_type="del",
3848 protocol="udp",
3849 in_addr=self.pg0.remote_ip4,
3850 out_addr=self.nat_addr,
3851 in_port=self.udp_port_in,
3852 out_port=self.udp_port_out,
3853 eh_addr=self.pg1.remote_ip4,
3854 ehn_addr=self.pg1.remote_ip4,
3855 eh_port=self.udp_external_port,
3856 ehn_port=self.udp_external_port,
3857 fib_index=0,
3858 )
3859 ],
3860 thread_index=thread_index,
3861 )
3862 )
Filip Varga18f1e412020-12-03 15:27:40 +01003863
3864 self.pg3.add_stream(p)
3865 self.pg_enable_capture(self.pg_interfaces)
3866 self.pg_start()
3867 # receive ACK
3868 capture = self.pg3.get_capture(1)
3869 p = capture[0]
3870 try:
3871 hanat = p[HANATStateSync]
3872 except IndexError:
3873 self.logger.error(ppp("Invalid packet:", p))
3874 raise
3875 else:
3876 self.assertEqual(hanat.sequence_number, 2)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003877 self.assertEqual(hanat.flags, "ACK")
Filip Varga18f1e412020-12-03 15:27:40 +01003878 self.assertEqual(hanat.version, 1)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003879 users = self.vapi.nat44_ei_user_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01003880 self.assertEqual(len(users), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003881 self.assertEqual(str(users[0].ip_address), self.pg0.remote_ip4)
Filip Varga18f1e412020-12-03 15:27:40 +01003882 # now we should have only 1 session, 1 deleted by HA
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003883 sessions = self.vapi.nat44_ei_user_session_dump(
3884 users[0].ip_address, users[0].vrf_id
3885 )
Filip Varga18f1e412020-12-03 15:27:40 +01003886 self.assertEqual(len(sessions), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003887 stats = self.statistics["/nat44-ei/ha/del-event-recv"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003888 self.assertEqual(stats[:, 0].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01003889
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003890 stats = self.statistics.get_err_counter("/err/nat44-ei-ha/pkts-processed")
Filip Varga18f1e412020-12-03 15:27:40 +01003891 self.assertEqual(stats, 2)
3892
3893 # send HA session refresh event to failover/passive
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003894 p = (
3895 Ether(dst=self.pg3.local_mac, src=self.pg3.remote_mac)
3896 / IP(src=self.pg3.remote_ip4, dst=self.pg3.local_ip4)
3897 / UDP(sport=12346, dport=12345)
3898 / HANATStateSync(
3899 sequence_number=3,
3900 events=[
3901 Event(
3902 event_type="refresh",
3903 protocol="tcp",
3904 in_addr=self.pg0.remote_ip4,
3905 out_addr=self.nat_addr,
3906 in_port=self.tcp_port_in,
3907 out_port=self.tcp_port_out,
3908 eh_addr=self.pg1.remote_ip4,
3909 ehn_addr=self.pg1.remote_ip4,
3910 eh_port=self.tcp_external_port,
3911 ehn_port=self.tcp_external_port,
3912 fib_index=0,
3913 total_bytes=1024,
3914 total_pkts=2,
3915 )
3916 ],
3917 thread_index=thread_index,
3918 )
3919 )
Filip Varga18f1e412020-12-03 15:27:40 +01003920 self.pg3.add_stream(p)
3921 self.pg_enable_capture(self.pg_interfaces)
3922 self.pg_start()
3923 # receive ACK
3924 capture = self.pg3.get_capture(1)
3925 p = capture[0]
3926 try:
3927 hanat = p[HANATStateSync]
3928 except IndexError:
3929 self.logger.error(ppp("Invalid packet:", p))
3930 raise
3931 else:
3932 self.assertEqual(hanat.sequence_number, 3)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003933 self.assertEqual(hanat.flags, "ACK")
Filip Varga18f1e412020-12-03 15:27:40 +01003934 self.assertEqual(hanat.version, 1)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003935 users = self.vapi.nat44_ei_user_dump()
Filip Varga18f1e412020-12-03 15:27:40 +01003936 self.assertEqual(len(users), 1)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003937 self.assertEqual(str(users[0].ip_address), self.pg0.remote_ip4)
Filip Varga0eaf4e62021-02-17 14:34:54 +01003938 sessions = self.vapi.nat44_ei_user_session_dump(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003939 users[0].ip_address, users[0].vrf_id
3940 )
Filip Varga18f1e412020-12-03 15:27:40 +01003941 self.assertEqual(len(sessions), 1)
3942 session = sessions[0]
3943 self.assertEqual(session.total_bytes, 1024)
3944 self.assertEqual(session.total_pkts, 2)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003945 stats = self.statistics["/nat44-ei/ha/refresh-event-recv"]
Klement Sekeraeafb5db2021-03-15 16:34:01 +01003946 self.assertEqual(stats[:, 0].sum(), 1)
Filip Varga18f1e412020-12-03 15:27:40 +01003947
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003948 stats = self.statistics.get_err_counter("/err/nat44-ei-ha/pkts-processed")
Filip Varga18f1e412020-12-03 15:27:40 +01003949 self.assertEqual(stats, 3)
3950
3951 # send packet to test session created by HA
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003952 p = (
3953 Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
3954 / IP(src=self.pg1.remote_ip4, dst=self.nat_addr)
3955 / TCP(sport=self.tcp_external_port, dport=self.tcp_port_out)
3956 )
Filip Varga18f1e412020-12-03 15:27:40 +01003957 self.pg1.add_stream(p)
3958 self.pg_enable_capture(self.pg_interfaces)
3959 self.pg_start()
3960 capture = self.pg0.get_capture(1)
3961 p = capture[0]
3962 try:
3963 ip = p[IP]
3964 tcp = p[TCP]
3965 except IndexError:
3966 self.logger.error(ppp("Invalid packet:", p))
3967 raise
3968 else:
3969 self.assertEqual(ip.src, self.pg1.remote_ip4)
3970 self.assertEqual(ip.dst, self.pg0.remote_ip4)
3971 self.assertEqual(tcp.sport, self.tcp_external_port)
3972 self.assertEqual(tcp.dport, self.tcp_port_in)
3973
Filip Varga0eaf4e62021-02-17 14:34:54 +01003974 def reconfigure_frame_queue_nelts(self, frame_queue_nelts):
3975 self.vapi.nat44_ei_plugin_enable_disable(enable=0)
3976 self.vapi.nat44_ei_set_fq_options(frame_queue_nelts=frame_queue_nelts)
3977 # keep plugin configuration persistent
3978 self.plugin_enable()
3979 return self.vapi.nat44_ei_show_fq_options().frame_queue_nelts
3980
3981 def test_set_frame_queue_nelts(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003982 """NAT44EI API test - worker handoff frame queue elements"""
Filip Varga0eaf4e62021-02-17 14:34:54 +01003983 self.assertEqual(self.reconfigure_frame_queue_nelts(512), 512)
3984
Filip Varga18f1e412020-12-03 15:27:40 +01003985 def show_commands_at_teardown(self):
Filip Varga0eaf4e62021-02-17 14:34:54 +01003986 self.logger.info(self.vapi.cli("show nat44 ei timeouts"))
3987 self.logger.info(self.vapi.cli("show nat44 ei addresses"))
3988 self.logger.info(self.vapi.cli("show nat44 ei interfaces"))
3989 self.logger.info(self.vapi.cli("show nat44 ei static mappings"))
3990 self.logger.info(self.vapi.cli("show nat44 ei interface address"))
3991 self.logger.info(self.vapi.cli("show nat44 ei sessions detail"))
3992 self.logger.info(self.vapi.cli("show nat44 ei hash tables detail"))
3993 self.logger.info(self.vapi.cli("show nat44 ei ha"))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003994 self.logger.info(self.vapi.cli("show nat44 ei addr-port-assignment-alg"))
Filip Varga18f1e412020-12-03 15:27:40 +01003995
Klement Sekeradc243ee2021-02-25 16:47:23 +01003996 def test_outside_address_distribution(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02003997 """Outside address distribution based on source address"""
Klement Sekeradc243ee2021-02-25 16:47:23 +01003998
3999 x = 100
4000 nat_addresses = []
4001
4002 for i in range(1, x):
4003 a = "10.0.0.%d" % i
4004 nat_addresses.append(a)
4005
4006 flags = self.config_flags.NAT44_EI_IF_INSIDE
4007 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004008 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
4009 )
Klement Sekeradc243ee2021-02-25 16:47:23 +01004010 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004011 sw_if_index=self.pg1.sw_if_index, is_add=1
4012 )
Klement Sekeradc243ee2021-02-25 16:47:23 +01004013
4014 self.vapi.nat44_ei_add_del_address_range(
4015 first_ip_address=nat_addresses[0],
4016 last_ip_address=nat_addresses[-1],
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004017 vrf_id=0xFFFFFFFF,
4018 is_add=1,
4019 )
Klement Sekeradc243ee2021-02-25 16:47:23 +01004020
4021 self.pg0.generate_remote_hosts(x)
4022
4023 pkts = []
4024 for i in range(x):
Klement Sekerab2da6d62021-03-24 17:25:14 +01004025 info = self.create_packet_info(self.pg0, self.pg1)
4026 payload = self.info_to_payload(info)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004027 p = (
4028 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4029 / IP(src=self.pg0.remote_hosts[i].ip4, dst=self.pg1.remote_ip4)
4030 / UDP(sport=7000 + i, dport=8000 + i)
4031 / Raw(payload)
4032 )
Klement Sekerab2da6d62021-03-24 17:25:14 +01004033 info.data = p
Klement Sekeradc243ee2021-02-25 16:47:23 +01004034 pkts.append(p)
4035
4036 self.pg0.add_stream(pkts)
4037 self.pg_enable_capture(self.pg_interfaces)
4038 self.pg_start()
4039 recvd = self.pg1.get_capture(len(pkts))
Klement Sekerab2da6d62021-03-24 17:25:14 +01004040 for p_recvd in recvd:
4041 payload_info = self.payload_to_info(p_recvd[Raw])
4042 packet_index = payload_info.index
4043 info = self._packet_infos[packet_index]
4044 self.assertTrue(info is not None)
4045 self.assertEqual(packet_index, info.index)
4046 p_sent = info.data
Klement Sekeradc243ee2021-02-25 16:47:23 +01004047 packed = socket.inet_aton(p_sent[IP].src)
4048 numeric = struct.unpack("!L", packed)[0]
4049 numeric = socket.htonl(numeric)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004050 a = nat_addresses[(numeric - 1) % len(nat_addresses)]
Klement Sekerab2da6d62021-03-24 17:25:14 +01004051 self.assertEqual(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004052 a,
4053 p_recvd[IP].src,
Klement Sekerab2da6d62021-03-24 17:25:14 +01004054 "Invalid packet (src IP %s translated to %s, but expected %s)"
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004055 % (p_sent[IP].src, p_recvd[IP].src, a),
4056 )
Klement Sekeradc243ee2021-02-25 16:47:23 +01004057
Matthew Smith01930f52021-05-13 11:11:33 -05004058 def test_default_user_sessions(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004059 """NAT44EI default per-user session limit is used and reported"""
Matthew Smith01930f52021-05-13 11:11:33 -05004060 nat44_ei_config = self.vapi.nat44_ei_show_running_config()
4061 # a nonzero default should be reported for user_sessions
4062 self.assertNotEqual(nat44_ei_config.user_sessions, 0)
4063
Filip Varga18f1e412020-12-03 15:27:40 +01004064
4065class TestNAT44Out2InDPO(MethodHolder):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004066 """NAT44EI Test Cases using out2in DPO"""
Filip Varga18f1e412020-12-03 15:27:40 +01004067
4068 @classmethod
4069 def setUpClass(cls):
4070 super(TestNAT44Out2InDPO, cls).setUpClass()
Filip Varga0eaf4e62021-02-17 14:34:54 +01004071 cls.vapi.cli("set log class nat44-ei level debug")
Filip Varga18f1e412020-12-03 15:27:40 +01004072
4073 cls.tcp_port_in = 6303
4074 cls.tcp_port_out = 6303
4075 cls.udp_port_in = 6304
4076 cls.udp_port_out = 6304
4077 cls.icmp_id_in = 6305
4078 cls.icmp_id_out = 6305
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004079 cls.nat_addr = "10.0.0.3"
4080 cls.dst_ip4 = "192.168.70.1"
Filip Varga18f1e412020-12-03 15:27:40 +01004081
4082 cls.create_pg_interfaces(range(2))
4083
4084 cls.pg0.admin_up()
4085 cls.pg0.config_ip4()
4086 cls.pg0.resolve_arp()
4087
4088 cls.pg1.admin_up()
4089 cls.pg1.config_ip6()
4090 cls.pg1.resolve_ndp()
4091
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004092 r1 = VppIpRoute(
4093 cls,
4094 "::",
4095 0,
4096 [VppRoutePath(cls.pg1.remote_ip6, cls.pg1.sw_if_index)],
4097 register=False,
4098 )
Filip Varga18f1e412020-12-03 15:27:40 +01004099 r1.add_vpp_config()
4100
4101 def setUp(self):
4102 super(TestNAT44Out2InDPO, self).setUp()
Filip Varga0eaf4e62021-02-17 14:34:54 +01004103 flags = self.config_flags.NAT44_EI_OUT2IN_DPO
4104 self.vapi.nat44_ei_plugin_enable_disable(enable=1, flags=flags)
Filip Varga18f1e412020-12-03 15:27:40 +01004105
4106 def tearDown(self):
4107 super(TestNAT44Out2InDPO, self).tearDown()
4108 if not self.vpp_dead:
Filip Varga0eaf4e62021-02-17 14:34:54 +01004109 self.vapi.nat44_ei_plugin_enable_disable(enable=0)
Filip Varga18f1e412020-12-03 15:27:40 +01004110 self.vapi.cli("clear logging")
4111
4112 def configure_xlat(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004113 self.dst_ip6_pfx = "1:2:3::"
4114 self.dst_ip6_pfx_n = socket.inet_pton(socket.AF_INET6, self.dst_ip6_pfx)
Filip Varga18f1e412020-12-03 15:27:40 +01004115 self.dst_ip6_pfx_len = 96
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004116 self.src_ip6_pfx = "4:5:6::"
4117 self.src_ip6_pfx_n = socket.inet_pton(socket.AF_INET6, self.src_ip6_pfx)
Filip Varga18f1e412020-12-03 15:27:40 +01004118 self.src_ip6_pfx_len = 96
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004119 self.vapi.map_add_domain(
4120 self.dst_ip6_pfx_n,
4121 self.dst_ip6_pfx_len,
4122 self.src_ip6_pfx_n,
4123 self.src_ip6_pfx_len,
4124 "\x00\x00\x00\x00",
4125 0,
4126 )
Filip Varga18f1e412020-12-03 15:27:40 +01004127
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004128 @unittest.skip("Temporary disabled")
Filip Varga18f1e412020-12-03 15:27:40 +01004129 def test_464xlat_ce(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004130 """Test 464XLAT CE with NAT44EI"""
Filip Varga18f1e412020-12-03 15:27:40 +01004131
Filip Varga18f1e412020-12-03 15:27:40 +01004132 self.configure_xlat()
4133
Filip Varga0eaf4e62021-02-17 14:34:54 +01004134 flags = self.config_flags.NAT44_EI_IF_INSIDE
4135 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004136 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
4137 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01004138 self.vapi.nat44_ei_add_del_address_range(
4139 first_ip_address=self.nat_addr_n,
4140 last_ip_address=self.nat_addr_n,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004141 vrf_id=0xFFFFFFFF,
4142 is_add=1,
4143 )
Filip Varga18f1e412020-12-03 15:27:40 +01004144
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004145 out_src_ip6 = self.compose_ip6(
4146 self.dst_ip4, self.dst_ip6_pfx, self.dst_ip6_pfx_len
4147 )
4148 out_dst_ip6 = self.compose_ip6(
4149 self.nat_addr, self.src_ip6_pfx, self.src_ip6_pfx_len
4150 )
Filip Varga18f1e412020-12-03 15:27:40 +01004151
4152 try:
4153 pkts = self.create_stream_in(self.pg0, self.pg1, self.dst_ip4)
4154 self.pg0.add_stream(pkts)
4155 self.pg_enable_capture(self.pg_interfaces)
4156 self.pg_start()
4157 capture = self.pg1.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004158 self.verify_capture_out_ip6(capture, nat_ip=out_dst_ip6, dst_ip=out_src_ip6)
Filip Varga18f1e412020-12-03 15:27:40 +01004159
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004160 pkts = self.create_stream_out_ip6(self.pg1, out_src_ip6, out_dst_ip6)
Filip Varga18f1e412020-12-03 15:27:40 +01004161 self.pg1.add_stream(pkts)
4162 self.pg_enable_capture(self.pg_interfaces)
4163 self.pg_start()
4164 capture = self.pg0.get_capture(len(pkts))
4165 self.verify_capture_in(capture, self.pg0)
4166 finally:
Filip Varga0eaf4e62021-02-17 14:34:54 +01004167 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004168 sw_if_index=self.pg0.sw_if_index, flags=flags
4169 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01004170 self.vapi.nat44_ei_add_del_address_range(
Filip Varga18f1e412020-12-03 15:27:40 +01004171 first_ip_address=self.nat_addr_n,
4172 last_ip_address=self.nat_addr_n,
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004173 vrf_id=0xFFFFFFFF,
4174 )
Filip Varga18f1e412020-12-03 15:27:40 +01004175
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004176 @unittest.skip("Temporary disabled")
Filip Varga18f1e412020-12-03 15:27:40 +01004177 def test_464xlat_ce_no_nat(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004178 """Test 464XLAT CE without NAT44EI"""
Filip Varga18f1e412020-12-03 15:27:40 +01004179
4180 self.configure_xlat()
4181
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004182 out_src_ip6 = self.compose_ip6(
4183 self.dst_ip4, self.dst_ip6_pfx, self.dst_ip6_pfx_len
4184 )
4185 out_dst_ip6 = self.compose_ip6(
4186 self.pg0.remote_ip4, self.src_ip6_pfx, self.src_ip6_pfx_len
4187 )
Filip Varga18f1e412020-12-03 15:27:40 +01004188
4189 pkts = self.create_stream_in(self.pg0, self.pg1, self.dst_ip4)
4190 self.pg0.add_stream(pkts)
4191 self.pg_enable_capture(self.pg_interfaces)
4192 self.pg_start()
4193 capture = self.pg1.get_capture(len(pkts))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004194 self.verify_capture_out_ip6(
4195 capture, dst_ip=out_src_ip6, nat_ip=out_dst_ip6, same_port=True
4196 )
Filip Varga18f1e412020-12-03 15:27:40 +01004197
4198 pkts = self.create_stream_out_ip6(self.pg1, out_src_ip6, out_dst_ip6)
4199 self.pg1.add_stream(pkts)
4200 self.pg_enable_capture(self.pg_interfaces)
4201 self.pg_start()
4202 capture = self.pg0.get_capture(len(pkts))
4203 self.verify_capture_in(capture, self.pg0)
4204
4205
Klement Sekera98d82ca2021-02-02 13:25:40 +01004206class TestNAT44EIMW(MethodHolder):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004207 """NAT44EI Test Cases (multiple workers)"""
4208
Klement Sekera8d815022021-03-15 16:58:10 +01004209 vpp_worker_count = 2
Klement Sekera98d82ca2021-02-02 13:25:40 +01004210 max_translations = 10240
4211 max_users = 10240
4212
4213 @classmethod
4214 def setUpClass(cls):
4215 super(TestNAT44EIMW, cls).setUpClass()
4216 cls.vapi.cli("set log class nat level debug")
4217
4218 cls.tcp_port_in = 6303
4219 cls.tcp_port_out = 6303
4220 cls.udp_port_in = 6304
4221 cls.udp_port_out = 6304
4222 cls.icmp_id_in = 6305
4223 cls.icmp_id_out = 6305
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004224 cls.nat_addr = "10.0.0.3"
Klement Sekera98d82ca2021-02-02 13:25:40 +01004225 cls.ipfix_src_port = 4739
4226 cls.ipfix_domain_id = 1
4227 cls.tcp_external_port = 80
4228 cls.udp_external_port = 69
4229
4230 cls.create_pg_interfaces(range(10))
4231 cls.interfaces = list(cls.pg_interfaces[0:4])
4232
4233 for i in cls.interfaces:
4234 i.admin_up()
4235 i.config_ip4()
4236 i.resolve_arp()
4237
4238 cls.pg0.generate_remote_hosts(3)
4239 cls.pg0.configure_ipv4_neighbors()
4240
4241 cls.pg1.generate_remote_hosts(1)
4242 cls.pg1.configure_ipv4_neighbors()
4243
4244 cls.overlapping_interfaces = list(list(cls.pg_interfaces[4:7]))
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004245 cls.vapi.ip_table_add_del(is_add=1, table={"table_id": 10})
4246 cls.vapi.ip_table_add_del(is_add=1, table={"table_id": 20})
Klement Sekera98d82ca2021-02-02 13:25:40 +01004247
4248 cls.pg4._local_ip4 = "172.16.255.1"
4249 cls.pg4._remote_hosts[0]._ip4 = "172.16.255.2"
4250 cls.pg4.set_table_ip4(10)
4251 cls.pg5._local_ip4 = "172.17.255.3"
4252 cls.pg5._remote_hosts[0]._ip4 = "172.17.255.4"
4253 cls.pg5.set_table_ip4(10)
4254 cls.pg6._local_ip4 = "172.16.255.1"
4255 cls.pg6._remote_hosts[0]._ip4 = "172.16.255.2"
4256 cls.pg6.set_table_ip4(20)
4257 for i in cls.overlapping_interfaces:
4258 i.config_ip4()
4259 i.admin_up()
4260 i.resolve_arp()
4261
4262 cls.pg7.admin_up()
4263 cls.pg8.admin_up()
4264
4265 cls.pg9.generate_remote_hosts(2)
4266 cls.pg9.config_ip4()
4267 cls.vapi.sw_interface_add_del_address(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004268 sw_if_index=cls.pg9.sw_if_index, prefix="10.0.0.1/24"
4269 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004270
4271 cls.pg9.admin_up()
4272 cls.pg9.resolve_arp()
4273 cls.pg9._remote_hosts[1]._ip4 = cls.pg9._remote_hosts[0]._ip4
4274 cls.pg4._remote_ip4 = cls.pg9._remote_hosts[0]._ip4 = "10.0.0.2"
4275 cls.pg9.resolve_arp()
4276
4277 def setUp(self):
4278 super(TestNAT44EIMW, self).setUp()
Filip Varga0eaf4e62021-02-17 14:34:54 +01004279 self.vapi.nat44_ei_plugin_enable_disable(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004280 sessions=self.max_translations, users=self.max_users, enable=1
4281 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004282
4283 def tearDown(self):
4284 super(TestNAT44EIMW, self).tearDown()
4285 if not self.vpp_dead:
Filip Varga0eaf4e62021-02-17 14:34:54 +01004286 self.vapi.nat44_ei_ipfix_enable_disable(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004287 domain_id=self.ipfix_domain_id, src_port=self.ipfix_src_port, enable=0
4288 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004289 self.ipfix_src_port = 4739
4290 self.ipfix_domain_id = 1
4291
Filip Varga0eaf4e62021-02-17 14:34:54 +01004292 self.vapi.nat44_ei_plugin_enable_disable(enable=0)
Klement Sekera98d82ca2021-02-02 13:25:40 +01004293 self.vapi.cli("clear logging")
4294
4295 def test_hairpinning(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004296 """NAT44EI hairpinning - 1:1 NAPT"""
Klement Sekera98d82ca2021-02-02 13:25:40 +01004297
4298 host = self.pg0.remote_hosts[0]
4299 server = self.pg0.remote_hosts[1]
4300 host_in_port = 1234
4301 host_out_port = 0
4302 server_in_port = 5678
4303 server_out_port = 8765
4304 worker_1 = 1
4305 worker_2 = 2
4306
4307 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01004308 flags = self.config_flags.NAT44_EI_IF_INSIDE
4309 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004310 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
4311 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01004312 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004313 sw_if_index=self.pg1.sw_if_index, is_add=1
4314 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004315
4316 # add static mapping for server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004317 self.nat44_add_static_mapping(
4318 server.ip4,
4319 self.nat_addr,
4320 server_in_port,
4321 server_out_port,
4322 proto=IP_PROTOS.tcp,
4323 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004324
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004325 cnt = self.statistics["/nat44-ei/hairpinning"]
Klement Sekera98d82ca2021-02-02 13:25:40 +01004326 # send packet from host to server
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004327 p = (
4328 Ether(src=host.mac, dst=self.pg0.local_mac)
4329 / IP(src=host.ip4, dst=self.nat_addr)
4330 / TCP(sport=host_in_port, dport=server_out_port)
4331 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004332 self.pg0.add_stream(p)
4333 self.pg_enable_capture(self.pg_interfaces)
4334 self.pg_start()
4335 capture = self.pg0.get_capture(1)
4336 p = capture[0]
4337 try:
4338 ip = p[IP]
4339 tcp = p[TCP]
4340 self.assertEqual(ip.src, self.nat_addr)
4341 self.assertEqual(ip.dst, server.ip4)
4342 self.assertNotEqual(tcp.sport, host_in_port)
4343 self.assertEqual(tcp.dport, server_in_port)
4344 self.assert_packet_checksums_valid(p)
4345 host_out_port = tcp.sport
4346 except:
4347 self.logger.error(ppp("Unexpected or invalid packet:", p))
4348 raise
4349
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004350 after = self.statistics["/nat44-ei/hairpinning"]
Klement Sekera98d82ca2021-02-02 13:25:40 +01004351
4352 if_idx = self.pg0.sw_if_index
4353 self.assertEqual(after[worker_2][if_idx] - cnt[worker_1][if_idx], 1)
4354
4355 # send reply from server to host
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004356 p = (
4357 Ether(src=server.mac, dst=self.pg0.local_mac)
4358 / IP(src=server.ip4, dst=self.nat_addr)
4359 / TCP(sport=server_in_port, dport=host_out_port)
4360 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004361 self.pg0.add_stream(p)
4362 self.pg_enable_capture(self.pg_interfaces)
4363 self.pg_start()
4364 capture = self.pg0.get_capture(1)
4365 p = capture[0]
4366 try:
4367 ip = p[IP]
4368 tcp = p[TCP]
4369 self.assertEqual(ip.src, self.nat_addr)
4370 self.assertEqual(ip.dst, host.ip4)
4371 self.assertEqual(tcp.sport, server_out_port)
4372 self.assertEqual(tcp.dport, host_in_port)
4373 self.assert_packet_checksums_valid(p)
4374 except:
4375 self.logger.error(ppp("Unexpected or invalid packet:", p))
4376 raise
4377
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004378 after = self.statistics["/nat44-ei/hairpinning"]
Klement Sekera98d82ca2021-02-02 13:25:40 +01004379 if_idx = self.pg0.sw_if_index
4380 self.assertEqual(after[worker_1][if_idx] - cnt[worker_1][if_idx], 1)
4381 self.assertEqual(after[worker_2][if_idx] - cnt[worker_2][if_idx], 2)
4382
4383 def test_hairpinning2(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004384 """NAT44EI hairpinning - 1:1 NAT"""
Klement Sekera98d82ca2021-02-02 13:25:40 +01004385
4386 server1_nat_ip = "10.0.0.10"
4387 server2_nat_ip = "10.0.0.11"
4388 host = self.pg0.remote_hosts[0]
4389 server1 = self.pg0.remote_hosts[1]
4390 server2 = self.pg0.remote_hosts[2]
4391 server_tcp_port = 22
4392 server_udp_port = 20
4393
4394 self.nat44_add_address(self.nat_addr)
Filip Varga0eaf4e62021-02-17 14:34:54 +01004395 flags = self.config_flags.NAT44_EI_IF_INSIDE
4396 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004397 sw_if_index=self.pg0.sw_if_index, flags=flags, is_add=1
4398 )
Filip Varga0eaf4e62021-02-17 14:34:54 +01004399 self.vapi.nat44_ei_interface_add_del_feature(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004400 sw_if_index=self.pg1.sw_if_index, is_add=1
4401 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004402
4403 # add static mapping for servers
4404 self.nat44_add_static_mapping(server1.ip4, server1_nat_ip)
4405 self.nat44_add_static_mapping(server2.ip4, server2_nat_ip)
4406
4407 # host to server1
4408 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004409 p = (
4410 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4411 / IP(src=host.ip4, dst=server1_nat_ip)
4412 / TCP(sport=self.tcp_port_in, dport=server_tcp_port)
4413 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004414 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004415 p = (
4416 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4417 / IP(src=host.ip4, dst=server1_nat_ip)
4418 / UDP(sport=self.udp_port_in, dport=server_udp_port)
4419 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004420 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004421 p = (
4422 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4423 / IP(src=host.ip4, dst=server1_nat_ip)
4424 / ICMP(id=self.icmp_id_in, type="echo-request")
4425 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004426 pkts.append(p)
4427 self.pg0.add_stream(pkts)
4428 self.pg_enable_capture(self.pg_interfaces)
4429 self.pg_start()
4430 capture = self.pg0.get_capture(len(pkts))
4431 for packet in capture:
4432 try:
4433 self.assertEqual(packet[IP].src, self.nat_addr)
4434 self.assertEqual(packet[IP].dst, server1.ip4)
4435 if packet.haslayer(TCP):
4436 self.assertNotEqual(packet[TCP].sport, self.tcp_port_in)
4437 self.assertEqual(packet[TCP].dport, server_tcp_port)
4438 self.tcp_port_out = packet[TCP].sport
4439 self.assert_packet_checksums_valid(packet)
4440 elif packet.haslayer(UDP):
4441 self.assertNotEqual(packet[UDP].sport, self.udp_port_in)
4442 self.assertEqual(packet[UDP].dport, server_udp_port)
4443 self.udp_port_out = packet[UDP].sport
4444 else:
4445 self.assertNotEqual(packet[ICMP].id, self.icmp_id_in)
4446 self.icmp_id_out = packet[ICMP].id
4447 except:
4448 self.logger.error(ppp("Unexpected or invalid packet:", packet))
4449 raise
4450
4451 # server1 to host
4452 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004453 p = (
4454 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4455 / IP(src=server1.ip4, dst=self.nat_addr)
4456 / TCP(sport=server_tcp_port, dport=self.tcp_port_out)
4457 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004458 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004459 p = (
4460 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4461 / IP(src=server1.ip4, dst=self.nat_addr)
4462 / UDP(sport=server_udp_port, dport=self.udp_port_out)
4463 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004464 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004465 p = (
4466 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4467 / IP(src=server1.ip4, dst=self.nat_addr)
4468 / ICMP(id=self.icmp_id_out, type="echo-reply")
4469 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004470 pkts.append(p)
4471 self.pg0.add_stream(pkts)
4472 self.pg_enable_capture(self.pg_interfaces)
4473 self.pg_start()
4474 capture = self.pg0.get_capture(len(pkts))
4475 for packet in capture:
4476 try:
4477 self.assertEqual(packet[IP].src, server1_nat_ip)
4478 self.assertEqual(packet[IP].dst, host.ip4)
4479 if packet.haslayer(TCP):
4480 self.assertEqual(packet[TCP].dport, self.tcp_port_in)
4481 self.assertEqual(packet[TCP].sport, server_tcp_port)
4482 self.assert_packet_checksums_valid(packet)
4483 elif packet.haslayer(UDP):
4484 self.assertEqual(packet[UDP].dport, self.udp_port_in)
4485 self.assertEqual(packet[UDP].sport, server_udp_port)
4486 else:
4487 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
4488 except:
4489 self.logger.error(ppp("Unexpected or invalid packet:", packet))
4490 raise
4491
4492 # server2 to server1
4493 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004494 p = (
4495 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4496 / IP(src=server2.ip4, dst=server1_nat_ip)
4497 / TCP(sport=self.tcp_port_in, dport=server_tcp_port)
4498 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004499 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004500 p = (
4501 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4502 / IP(src=server2.ip4, dst=server1_nat_ip)
4503 / UDP(sport=self.udp_port_in, dport=server_udp_port)
4504 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004505 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004506 p = (
4507 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4508 / IP(src=server2.ip4, dst=server1_nat_ip)
4509 / ICMP(id=self.icmp_id_in, type="echo-request")
4510 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004511 pkts.append(p)
4512 self.pg0.add_stream(pkts)
4513 self.pg_enable_capture(self.pg_interfaces)
4514 self.pg_start()
4515 capture = self.pg0.get_capture(len(pkts))
4516 for packet in capture:
4517 try:
4518 self.assertEqual(packet[IP].src, server2_nat_ip)
4519 self.assertEqual(packet[IP].dst, server1.ip4)
4520 if packet.haslayer(TCP):
4521 self.assertEqual(packet[TCP].sport, self.tcp_port_in)
4522 self.assertEqual(packet[TCP].dport, server_tcp_port)
4523 self.tcp_port_out = packet[TCP].sport
4524 self.assert_packet_checksums_valid(packet)
4525 elif packet.haslayer(UDP):
4526 self.assertEqual(packet[UDP].sport, self.udp_port_in)
4527 self.assertEqual(packet[UDP].dport, server_udp_port)
4528 self.udp_port_out = packet[UDP].sport
4529 else:
4530 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
4531 self.icmp_id_out = packet[ICMP].id
4532 except:
4533 self.logger.error(ppp("Unexpected or invalid packet:", packet))
4534 raise
4535
4536 # server1 to server2
4537 pkts = []
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004538 p = (
4539 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4540 / IP(src=server1.ip4, dst=server2_nat_ip)
4541 / TCP(sport=server_tcp_port, dport=self.tcp_port_out)
4542 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004543 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004544 p = (
4545 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4546 / IP(src=server1.ip4, dst=server2_nat_ip)
4547 / UDP(sport=server_udp_port, dport=self.udp_port_out)
4548 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004549 pkts.append(p)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004550 p = (
4551 Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
4552 / IP(src=server1.ip4, dst=server2_nat_ip)
4553 / ICMP(id=self.icmp_id_out, type="echo-reply")
4554 )
Klement Sekera98d82ca2021-02-02 13:25:40 +01004555 pkts.append(p)
4556 self.pg0.add_stream(pkts)
4557 self.pg_enable_capture(self.pg_interfaces)
4558 self.pg_start()
4559 capture = self.pg0.get_capture(len(pkts))
4560 for packet in capture:
4561 try:
4562 self.assertEqual(packet[IP].src, server1_nat_ip)
4563 self.assertEqual(packet[IP].dst, server2.ip4)
4564 if packet.haslayer(TCP):
4565 self.assertEqual(packet[TCP].dport, self.tcp_port_in)
4566 self.assertEqual(packet[TCP].sport, server_tcp_port)
4567 self.assert_packet_checksums_valid(packet)
4568 elif packet.haslayer(UDP):
4569 self.assertEqual(packet[UDP].dport, self.udp_port_in)
4570 self.assertEqual(packet[UDP].sport, server_udp_port)
4571 else:
4572 self.assertEqual(packet[ICMP].id, self.icmp_id_in)
4573 except:
4574 self.logger.error(ppp("Unexpected or invalid packet:", packet))
4575 raise
4576
Filip Varga0eaf4e62021-02-17 14:34:54 +01004577
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02004578if __name__ == "__main__":
Filip Varga18f1e412020-12-03 15:27:40 +01004579 unittest.main(testRunner=VppTestRunner)