Sorry to inform, but apparently there are issues with RouterOS resolving AAAA records:well, there should be no problem with RouterOS resolving AAAA records.
+1NAT64 YES!!! A full native IPv6 network accessing IPv4 resources via NAT64 on Mikrotik ROS is all we need nowdays!!!
I agree with you, NAT64/DSN64 will not be indispensable until the address space is exhausted, in the meantime it it more important to have full support for dual-stack features (DHCPv6, prefix delegation, prefix labels, services over IPv6, etc..).I don't vote for NAT64 for one simple reason.
We don't actually need it, at least not yet, I think there are higher priorities.
Is there a working implementation of this on Linux or *BSD that we can play with?
Is there an RFC?
Or is this just a Cisco Proprietory thing?
Why can't you run Dual Stack?However it has to be ready (and tested) by the time the address space is exhausted otherwise we are in deep s....
What problems does it solve? I don't see how it's any better, and considering it's not well tested I expect it would in fact be worse!Dual stacking only works when you have v4 space to dual stack with, If you dual stack with private v4 space you run into double nat issues, NAT64 is a way around this for some but not all applications
When the address space is exhausted what IPv4 address would you use? There will not be any even if you want to NAT everything on a single one.Why can't you run Dual Stack?
You can legislate all you like, but once there is no more IPv4 space to go around thats the end of the game.double NAT is neither acceptable nor legal here in Italy for ISPs.
I think I like this one better.It's a work in progress.
http://tools.ietf.org/html/draft-ietf-b ... tateful-12
Because there is no port NAT only address NAT, Its not like what your used to, v6 address port 1000 maps to v4 address port 1000 but then the next connection on port 2000 can map to another v4 address, Its not port natting where you have a couple of hundred users behind a single v4 address and once someone takes port 1000 nobody else can use it, with NAT64 if another user wants to use port 1000 it will map to another v4 addressYou can legislate all you like, but once there is no more IPv4 space to go around thats the end of the game.double NAT is neither acceptable nor legal here in Italy for ISPs.
I still don't see how NAT64 solves this problem especially if the ISP is not allowed to use NAT.
What a load on nonsense. If NAT64 worked like that it would be a huge waste of IPv4 address spaceBecause there is no port NAT only address NAT, Its not like what your used to, v6 address port 1000 maps to v4 address port 1000 but then the next connection on port 2000 can map to another v4 address, Its not port natting where you have a couple of hundred users behind a single v4 address and once someone takes port 1000 nobody else can use it, with NAT64 if another user wants to use port 1000 it will map to another v4 addressYou can legislate all you like, but once there is no more IPv4 space to go around thats the end of the game.double NAT is neither acceptable nor legal here in Italy for ISPs.
I still don't see how NAT64 solves this problem especially if the ISP is not allowed to use NAT.
The IPv4 address pool is a set of IPv4 addresses, normally a prefix
assigned by the local administrator. Since IPv4 address space is a
scarce resource, the IPv4 address pool is small and typically not
sufficient to establish permanent one-to-one mappings with IPv6
addresses. So, except for the static/manually created ones, mappings
using the IPv4 address pool will be created and released dynamically.
Moreover, because of the IPv4 address scarcity, the usual practice
for NAT64 is likely to be the binding of IPv6 transport addresses
into IPv4 transport addresses, instead of IPv6 addresses into IPv4
addresses directly, enabling a higher utilization of the limited IPv4
address pool. This implies that NAT64 performs both address and port
translation.
I suggest you gain access to NAT64 devices a v6 client accessing v4 space will use the same port on v4 that the v6 address is attempting to use thus its normal mode is only to address translate and will port translate only when the v4 pool assigned to the NAT64 box is exhausted for the v6 side portWhat a load on nonsense. If NAT64 worked like that it would be a huge waste of IPv4 address space
and besides,
if you wanted NAT44 to work like that then it's pretty easy to do in iptables or ROS.
The IPv4 address pool is a set of IPv4 addresses, normally a prefix
assigned by the local administrator. Since IPv4 address space is a
scarce resource, the IPv4 address pool is small and typically not
sufficient to establish permanent one-to-one mappings with IPv6
addresses. So, except for the static/manually created ones, mappings
using the IPv4 address pool will be created and released dynamically.
Moreover, because of the IPv4 address scarcity, the usual practice
for NAT64 is likely to be the binding of IPv6 transport addresses
into IPv4 transport addresses, instead of IPv6 addresses into IPv4
addresses directly, enabling a higher utilization of the limited IPv4
address pool. This implies that NAT64 performs both address and port
translation.
NAT44 will also keep the port the same if it can. However it will always change the port in preference to changing the address. The reason for this is to do with the RELATED state. Firewall hole punching requires the IP Addresses to match to work, If you start changing the address while keeping the port the same, then hole punching will cease to work and it will break heaps of applications.I suggest you gain access to NAT64 devices a v6 client accessing v4 space will use the same port on v4 that the v6 address is attempting to use thus its normal mode is only to address translate and will port translate only when the v4 pool assigned to the NAT64 box is exhausted for the v6 side port
I think you're confusing Hole Punching with ALG (Application Layer Gateway) kernel modules.You dont need hole punching unless the application your attempting to use sends the IP contact info within the packet i.e SIP/RTP/FTP etc
Finally we actually agree on something. Although I was not aware that Juniper had a NAT64 offering!allowing pure v6 CPE users to access the v4 world, But perhaps this is a tech that should be kept in the big boys league of Cisco/Juniper as those that will actually run into the NAT44 issues will have the money to buy them
Maybe I am Its late where I amI think you're confusing Hole Punching with ALG (Application Layer Gateway) kernel modules.You dont need hole punching unless the application your attempting to use sends the IP contact info within the packet i.e SIP/RTP/FTP etc
Or MSN ?And how well does skype work?
Isn't that list just for "hardware"? Thought NAT64 was a "software" implementation... Although Ive seen other soft ones in there. *bump*I've added NAT64 and DNS64 to the unofficial Feature Request page.
http://wiki.mikrotik.com/wiki/RouterBOA ... re_Request
Feel free to add your votes and move it up the list
Did you try it with Windows XP? Mac OS X?Do you really think manual port forwarding at the ISP level is ever going to work?? I doubt we'll see NAT64 in ROS but the big players are deploying it, It will likely end up another transition step after large scale ISP's find that NAT444 is just not worth the hassle.
Have you actually used NAT64 before? Its quite nice, There is a liveCD floating around, Very fun turning off v4 on your computer and having everything keep working
Web browsing worked fine, never ran into an issue. Skype worked for voice but I didnt try video (Never had a need) Existing NAT-busting methods used in alot of software works fine but will run into issues in a NAT444 setup. SIP and FTP had issues due to IP info carried inside the application level data. Some form of ALG ala NAT-PT will help with thisDid you try it with Windows XP? Mac OS X?Do you really think manual port forwarding at the ISP level is ever going to work?? I doubt we'll see NAT64 in ROS but the big players are deploying it, It will likely end up another transition step after large scale ISP's find that NAT444 is just not worth the hassle.
Have you actually used NAT64 before? Its quite nice, There is a liveCD floating around, Very fun turning off v4 on your computer and having everything keep working
When you say everything keeps working? What did you test? I'm sure outbound connections would work but what about P2P applications?
Skype?
What about http://66.102.11.104/
Or inbound connections can you remote desktop to an XP computer through NAT64?
How do inbound connections work from the IPv4 Internet?
Sorry to keep on about this, but what OS did you try this on?Web browsing worked fine, never ran into an issue. Skype worked for voice but I didnt try video (Never had a need) Existing NAT-busting methods used in alot of software works fine but will run into issues in a NAT444 setup. SIP and FTP had issues due to IP info carried inside the application level data. Some form of ALG ala NAT-PT will help with this
Ok, so I found the CD, downloaded it, had a play. Read the specs.,There is a liveCD floating around
http://tools.ietf.org/html/rfc6146If i may jump into conversation.
From what i notices MikroTik really loves when feature description is set in stone - so there are actual "Internet Standard".
From what i was able to find on this topic is:
a) http://tools.ietf.org/id/draft-bagnulo- ... t64-03.txt
"This Internet-Draft will expire on September 8, 2009"
b) http://tools.ietf.org/html/draft-ietf-b ... tateful-00
"This Internet-Draft will expire on January 5, 2010"
So, it is not even "Proposed Standard" not talking about "Draft Standard" and "Internet Standard"...
IF i'm missing something, please, provide me proper links
not really. it "should" not.v6 should be end to end connection. But if mikrotik released this feature that should be +10.
We really need NAT64. And also IPv6 NAT (not IPv6 masqureade, just NAT).Google just made a public DNS64 server, NAT64 gateway is more relevant then ever.
https://developers.google.com/speed/pub ... docs/dns64
It would be nice if my Hex router had the "NAT64" voodoo.To take the next step of the transition to IPv6 and deploy IPv6-only networks, network operators must still preserve access to IPv4-only networks and services. There are several transition mechanisms to provide IPv6 access to IPv4; an increasingly popular choice with many network operators is NAT64. Using a NAT64 gateway with IPv4-IPv6 translation capability lets IPv6-only clients connect to IPv4-only services via synthetic IPv6 addresses starting with a prefix that routes them to the NAT64 gateway.
DNS64 is a DNS service that returns AAAA records with these synthetic IPv6 addresses for IPv4-only destinations (with A but not AAAA records in the DNS). This lets IPv6-only clients use NAT64 gateways without any other configuration. Google Public DNS64 provides DNS64 as a global service using the reserved NAT64 prefix 64:ff9b::/96.
so, i hope other people interested in NAT64 will also request it. (i also mentioned 464XLAT in my request, so i assume that response applies to both.)We do not have any plans to add such a feature at the moment, but if more users will request it, we will see how this can be implemented.
PLAT is pretty much a required standard for many providers at this point. NAT64 would be a step toward better IPv6 adoption, and is a pretty gaping hole in Mikrotik ROS right now - I get asked about it frequently, and when the answer to Mikrotik customers is "yank out the CPE (for CLAT support) and the routers (for PLAT), you can probably guess the response.DNS64 is incompatible with DNSSEC. As both Android & iOS have supported 464XLAT for a number of years I would expect this approach, a Stateless IP/ICMP Translator (SIIT) at the client and NAT64 at the provider, to become more widespread so Mikrotik support for this would be good.
The ND pref64 is different, this is a protocol option in IPv6 RA that allows you to inform the client of your NAT64 prefix.Can anyone explain the current possibilities for NAT64 in Mikrotik?
I see there's parameter in IPv6 ND, but no clues anywhere else or example on how to use this:
pref64-prefixes (unspecified | ipv6 prefixes; Default: unspecified) Specify IPv6 prefix or list of prefixes within /32, /40. /48, /56, /64, or /96 subnet that will be provided to hosts as NAT64 prefixes.
I know the way to run tayga inside a container, but maybe there are more already built in?