As shown in Figure-1, a company upgrades the network to IPv6, and it has an IPv4 address 10.1.1.1.
To allow the IPv6 FTP server to provide FTP services to IPv4 hosts, configure the following AFT policies on the device:
Map the IPv6 FTP server's IPv6 address and port number to the company's IPv4 address and port number.
Configure a NAT64 prefix to translate source IPv4 addresses of IPv4 packets to IPv6 addresses.
This configuration example was created and verified on R9900P2705 of the F5000-AI-55-G device.
Assign IP addresses to interfaces and add the interfaces to security zones.
# On the top navigation bar, click
# From the navigation pane, select
# Click the
# In the dialog box that opens, configure the interface as follows:
From the
On the
Use the default settings for other parameters.
# Click
# Add GE1/0/2 to the
Configure settings for routing:
This example configures a static route. If dynamic routes are required, configure a dynamic routing protocol.
# On the top navigation bar, click
# From the navigation pane, select
# On the
# In the dialog box that opens, perform the following tasks:
Specify the destination IP address as 20.1.1.0.
Set the mask length to
Specify the next-hop address as 10.1.1.100.
Use the default settings for other parameters.
# Click
Configure security policies:
# On the top navigation bar, click
# From the navigation pane, select
# On the
# On the page that opens, perform the following tasks to create the following security policies:
IPv4 security policy:
In the
From the
From the
Select
Select
Specify the destination IPv4 address as 10.1.1.1.
Use the default settings for other parameters.
Click
IPv6 security policy 1:
In the
From the
From the
Select
Select
Specify the source IPv6 address as 2012::96.
Specify the destination IPv6 address as 2013::102.
Use the default settings for other parameters.
Click
IPv6 security policy 2:
In the
From the
From the
Select
Select
Specify the source IPv6 address as 2012:: 96.
Specify the destination IPv6 address as 2013::102.
Use the default settings for other parameters.
Click
Create a policy-based NAT rule.
# Configure an AFT mapping for the IPv6 server so that IPv4 users can access the IPv6 server by using the IPv4 address and port specified in the AFT mapping.
# On the top navigation bar, click
# From the navigation pane, select
# Click the chevron icon next to
# Select the
# Create a policy-based NAT rule, as shown in Figure-2.
Figure-2 Creating a policy-based NAT rule
# Click
Enable AFT on the interfaces connected to the IPv4 Internet and IPv6 network, respectively.
# Access the CLI of the device, enter the view of each interface, and then execute the
# Verify that IPv4 hosts can use FTP to access the IPv6 FTP server. (Details not shown.)
# Display detailed information about IPv4 AFT sessions on the device.
[Device] display aft session ipv4 verbose
Initiator:
Source IP/port: 20.1.1.1/11025
Destination IP/port: 10.1.1.1/21
DS-Lite tunnel peer: -
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: TCP(6)
Inbound interface: GigabitEthernet1/0/1
Source security zone: Untrust
Responder:
Source IP/port: 10.1.1.1/21
Destination IP/port: 20.1.1.1/11025
DS-Lite tunnel peer: -
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: TCP(6)
Inbound interface: GigabitEthernet1/0/2
Source security zone: Local
State: TCP_ESTABLISHED
Application: FTP
Rule ID: -/-/-
Rule name:
Start time: 2014-03-13 09:07:30 TTL: 3577s
Initiator->Responder: 3 packets 124 bytes
Responder->Initiator: 2 packets 108 bytes
Total sessions found: 1
# Display detailed information about IPv6 AFT sessions on the device.
[Device] display aft session ipv6 verbose
Initiator:
Source IP/port: 2012::1401:0101/1029
Destination IP/port: 2013::102/21
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: TCP(6)
Inbound interface: GigabitEthernet1/0/1
Source security zone: Local
Responder:
Source IP/port: 2013::102/21
Destination IP/port: 2012::1401:0101/1029
VPN instance/VLAN ID/Inline ID: -/-/-
Protocol: TCP(6)
Inbound interface: GigabitEthernet1/0/2
Source security zone: Trust
State: TCP_ESTABLISHED
Application: FTP
Rule ID: 0
Rule name: aftlocalout
Start time: 2014-03-13 09:07:30 TTL: 3582s
Initiator->Responder: 3 packets 184 bytes
Responder->Initiator: 2 packets 148 bytes