Configuring IP pools
An IP pool is essentially one in which the IP address that is assigned to the sending computer is not known until the session is created, therefore at the very least it will have to be a pool of at least 2 potential addresses. A quick example would be an IP pool for users of a VPN. IP pools are based upon the version of IP determined by the interface that they are associated with so as expected there are two types of IP pools that can be configured:
l “Creating a IPv4 pool” on page 243 l “Creating a IPv6 pool” on page 247
Because of the differences in the configuration for the two types of pools, instructions for configuring them will be done separately.
Creating a IPv4 pool
- Go to Policy & Objects > IP Pools.
- Select Create New.
- In the IP Pool Type field choose IPv4 Pool
- Enter a name in the Name field for the new service Include any description you would like in the Comments field
- In the Type field choose between:
l Overload l One-to-One l Fixed Port Range l Port Block Allocation
At this point the configurations can start to differ based on the type of type of pool.
For more information on the different types of IP pools, check IP Pools in the Concepts section.
Overload
- For the External IP Range fields, enter the lowest and highest addresses in the range. If you only want a single address used, enter the same address in both fields.
- Enable the ARP Reply field by making sure there is a check in the box
- Select OK
Overload example for GUI
In this example, the Sales team needs to connect to an Application Service Provider that does the accounting for the company. As a security measure, the ASP only accepts traffic from a white list of IP addresses. There is 1 public IP address of the company on that list.The Sales team consists of 40 people, so they need to share.The external interface is wan1.
Field | Value |
IP Pool Type | IPv4 Pool |
Name | Sales_Team |
Comments | For the Sales team to use to connect to the Accounting ASP |
Type | Overload (This is the default) |
External IP Range | 10.23.56.20 – 10.23.56.20 |
ARP Reply | enabled |
Overload example for CLI
config firewall ippool edit Sales_Team set comments “For the Sales team to use to connect to the Accounting ASP”
set type overload set startip 10.23.56.20 set endip 10.23.56.20 set arp-reply enable set arp-intf wan1 end
One-to-one
- For the External IP Range fields, enter the lowest and highest addresses in the range. If you only want a single address used, enter the same address in both fields.
- Enable the ARP Reply field by making sure there is a check in the box.
- Select OK
One-to-one example for GUI
In this example, the external IP address of the mail server is part of a range assigned to the company but not the one that is assigned to the Internet facing interface. A VIP has been set up but in order to properly resolve Reverse DNS lookups the mail server always has to use a specific IP address.The external interface is wan1.
Field | Value |
IP Pool Type | IPv4 Pool |
Name | Mail-Server |
Comments | So the correct IP address is resolved on Reverse DNS look ups of the mail server. |
Type | One-to-one |
External IP Range | 10.23.56.21 – 10.23.56.21 |
ARP Reply | enabled |
One-to-one example for CLI
config firewall ippool edit Mail-Server set comments “So the the correct IP address is resolved on reverse DNS look ups of the mail server.”
set type one-to-one set startip 10.23.56.21 set endip 10.23.56.21 set arp-reply enable set arp-intf wan1 end
Fixed port range
- For the External IP Range fields, enter the lowest and highest addresses in the range. If you only want a single address used, enter the same address in both fields.
- Fort the Internal IP Range fields, enter the lowest and highest addresses in the range.
- Enable the ARP Reply field by making sure there is a check in the box
- Select OK
Fixed port range example for GUI
In this example, the company has a range of 10 IP address that they want to be used by employees on a specific subnet for NATing.The external interface is wan1.
Field | Value |
IP Pool Type | IPv4 Pool |
Name | IPPool-3 |
Comments | IP range to be used by outgoing traffic |
Type | Fixed Port Range |
External IP Range | 10.23.56.22 – 10.23.56.31 |
Internal IP Range | 192.168.23.1 – 192.168.23.254 |
ARP Reply | enabled |
Fixed port range example for CLI
config firewall ippool edit IPPool-3 set comments “So the the correct IP address is resolved on reverse DNS look ups of the mail server.”
set type fixed-port-range set startip 10.23.56.22 set endip 10.23.56.31 set source-startip 192.168.23.1 set source-endip 192.168.23.254 set arp-reply enable set arp-intf wan1 end
Port block allocation
- For the External IP Range fields, enter the lowest and highest addresses in the range. If you only want a single address used, enter the same address in both fields.
- In the Block Size field, either type in the value or use the up or down arrows to set the value of the block size.
- In the Blocks Per User field, either type in the value or use the up or down arrows to set the value for the number of blocks per user.
- Enable the ARP Reply field by making sure there is a check in the box
- Select OK
Port block allocation timeout
The port block allocation timeout value is configurable. The setting is found in the CLI.
The option pba-timeout has been added to the firewall ip pool configuration. The availability of this option is dependent on the type option being set to port-block-allocation. The timeout value is measured in seconds and is an integer between 3 and 300, with the default being 30.
Syntax:
config firewall ippool
edit <name of PBA pool> set type port-block-allocation set pba-timeout <integer> end
Port block allocation example for GUI
In this example, an small ISP is setting up NATing for its clients, but to be fair it is putting some restrictions on the number of connections each client can have so that no one hogs all of the possible ports and addresses.The external interface is port12.
Field | Value |
IP Pool Type | IPv4 Pool |
Name | Client-IPPool |
Comments | IP Pool for clients to access the Internet |
Type | Port Block Allocation |
External IP Range | 10.23.75.5 – 10.23.75.200 |
Block Size | 64 |
Blocks Per User | 8 |
ARP Reply | enabled |
Port block allocation example for CLI
config firewall ippool edit Client-IPPool set comments “IP Pool for clients to access the Internet”
set type port-block-allocation set startip 10.23.75.5 set endip 10.23.75.200 set block-size 64 set num-blocks-per-user 8 set permit-any-host disable set arp-intf wan1 set arp-reply enableset arp-intf port12
end
Creating a IPv6 pool
- Go to Policy & Objects > IP Pools.
- Select Create New.
- In the IP Pool Type field choose IPv6 Pool
- Enter a name in the Name field for the new service
- Include any description you would like in the Comments field
- For the External IP Range fields, enter the lowest and highest addresses in the range.
IPv6 example for GUI
In this example, there is a similar situation to the One-to-one example earlier.There is a mail server that needs to be resolved to a specific IP address in Reverse DNS look-ups. The difference in this case is the company is an early adopter of IPv6 connectivity to the Internet.
Field | Value |
IP Pool Type | IPv6 Pool |
Name | Mail-svr-ipv6 |
Comments | Registered IPv6 address for mail server |
External IP Range | fd2f:50ec:cdea:0663::1025 – fd2f:50ec:cdea:0663::1025 |
Port block allocation example for CLI
config firewall ippool6 edit Mail-svr-ipv6 set comments “Registered IPv6 address for mail server”
set startip fd2f:50ec:cdea:663::102 set endip fd2f:50ec:cdea:663::1025 end
Creating NAT46 IP pool and multiple (secondary) NAT64 prefixes
Policies that translate between IPv4 and IPv6 can use IPv4 address pools or IPv6 prefixes to be used in the policies, giving more options to the configuration of addresses.
NAT46
For using the ippool in NAT46 policies, first enable the use of ippools and then set the names of the ippool(s).
config firewall policy46 edit 1 set uuid e9c6ca3e-72ea-51e7-554a-1185693d03eb
set srcintf “wan1” set dstintf “internal7” set srcaddr “external-net4” set dstaddr “internal-vip46” set action accept set schedule “always”
set service “ALL” set ippool enable set poolname “intit-pool6” end
NAT64
In order to use these options in the NAT64 firewall policies the new settingssecondary-prefix status and secondary-prefix options have to be configured as in the example below.
config system nat64 set nat64-prefix 2001::/96 set secondary-prefix enable config secondary-prefix edit 1 set nat64-prefix 2002::/94
next
edit 2 set nat64-prefix 2003::/95
end end