The nat bind acl address-group command binds an address pool to an ACl on a specified interface in the simplified NAT scenario for NAT traffic distribution on an outbound interface.
The undo nat bind acl address-group command deletes the binding between an address pool and an ACl on a specified interface in the simplified NAT scenario.
By default, no ACL is bound to an address pool on an outbound interface for distributing NAT traffic in a simplified NAT instance.
This command is supported only on the NetEngine 8000 F1A.
Parameter | Description | Value |
---|---|---|
acl-index | Specifies an ACL index. |
The value is an integer. Basic ACLs are numbered from 2000 to 2999, and advanced ACLs are numbered from 3000 to 3999. |
name acl-name | Specifies the name of an ACL. |
The value is a string of 1 to 64 case-sensitive characters. It cannot contain spaces. |
mode | Specifies the packet forwarding mode. |
- |
deny-forward | Transparently transmits traffic matching an ACL deny rule. If this parameter is not configured, such traffic is dropped. |
- |
address-group-name | Specifies an address pool name in a simplified NAT instance. |
The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string. |
precedence precedence-index | Specifies a precedence index. |
The value is an integer that ranges from 0 to 8191. |
100GE-Trunk member interface view, 100GE interface view, 10G LAN interface view, 10G WAN interface view, Eth-Trunk member Layer 3 interface view, Eth-Trunk member interface view, Eth-Trunk interface view, Eth-Trunk interface view, GE-Trunk member Layer 3 interface view, GE-Trunk member interface view, Layer 3 GE interface view, GE optical interface view, GE sub-interface view, GE interface view, GE electrical interface view, Serial-Trunk member interface view, VLANIF interface view, XGE interface view
Usage Scenario
A NAT-enabled device is deployed on the egress of an enterprise network, whereas NAT does not need to be performed for a great amount of traffic transmitted within the enterprise network. To prevent an inbound interface from enforcing a NAT traffic policy to direct intra-enterprise network traffic to a NAT board for NAT processing, a NAT traffic policy can be configured on an outbound interface connected to a public network. Therefore, the device matches traffic only destined for a public network against the NAT traffic policy.
The device processes traffic matching an ACL deny rule as follows:Prerequisites
Ensure that the following operations have been performed:
Precautions
The nat bind acl address-group command is mutually exclusive with the nat bind acl instance command.
In VS mode, this command is supported only by the admin VS.
<HUAWEI> system-view [~HUAWEI] interface GigabitEthernet0/1/1 [~HUAWEI-GigabitEthernet0/1/1] ip address 10.1.1.0 255.255.255.0 [~HUAWEI-GigabitEthernet0/1/1] commit [~HUAWEI-GigabitEthernet0/1/1] quit [~HUAWEI] acl number 3000 [*HUAWEI-acl-adv-3000] rule 1 permit source 10.1.1.0 0.0.0.255 [*HUAWEI-acl-adv-3000] commit [~HUAWEI-acl-adv-3000] quit [~HUAWEI] nat instance cpe1 id 1 simple-configuration [~HUAWEI-nat-instance-cpe1] commit [~HUAWEI-nat-instance-cpe1] quit [~HUAWEI] nat address-group group1 group-id 1 unnumbered interface GigabitEthernet 0/1/1 [~HUAWEI] interface GigabitEthernet0/1/1 [~HUAWEI-GigabitEthernet0/1/1] nat bind acl 3000 address-group group