[178250] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Wisdom of using 100.64/10 (RFC6598) space in an Amazon VPC

daemon@ATHENA.MIT.EDU (Ca By)
Mon Feb 23 10:52:39 2015

X-Original-To: nanog@nanog.org
In-Reply-To: <B6CF52E4-C6B4-4128-ADFD-BA60BECAF94C@cctec.com>
Date: Mon, 23 Feb 2015 07:52:36 -0800
From: Ca By <cb.list6@gmail.com>
To: Eric Germann <ekgermann@cctec.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Mon, Feb 23, 2015 at 7:02 AM, Eric Germann <ekgermann@cctec.com> wrote:

> Currently engaged on a project where they=E2=80=99re building out a VPC
> infrastructure for hosted applications.
>
> Users access apps in the VPC, not the other direction.
>
> The issue I'm trying to get around is the customers who need to connect
> have multiple overlapping RFC1918 space (including overlapping what was
> proposed for the VPC networks).  Finding a hole that is big enough and no=
t
> in use by someone else is nearly impossible AND the customers could go
> through mergers which make them renumber even more in to overlapping 1918
> space.
>
> Initially, I was looking at doing something like (example IP=E2=80=99s):
>
>
> Customer A (172.28.0.0/24)  <=E2=80=94> NAT to 100.127.0.0/28 <=E2=80=94=
=E2=80=94> VPN to DC <=E2=80=94=E2=80=94>
> NAT from 100.64.0.0/18 <=E2=80=94=E2=80=94>  VPC Space (was 172.28.0.0/24=
)
>
> Classic overlapping subnets on both ends with allocations out of
> 100.64.0.0/10 to NAT in both directions.  Each sees the other end in
> 100.64 space, but the mappings can get tricky and hard to keep track of
> (especially if you=E2=80=99re not a network engineer).
>
>
> In spitballing, the boat hasn=E2=80=99t sailed too far to say =E2=80=9CWh=
y not use
> 100.64/10 in the VPC?=E2=80=9D
>
> Then, the customer would be allocated a /28 or larger (depending on needs=
)
> to NAT on their side and NAT it once.  After that, no more NAT for the VP=
C
> and it boils down to firewall rules.  Their device needs to NAT outbound
> before it fires it down the tunnel which pfSense and ASA=E2=80=99s appear=
 to be
> able to do.
>
> I prototyped this up over the weekend with multiple VPC=E2=80=99s in mult=
iple
> regions and it =E2=80=9Cappears=E2=80=9D to work fine.
>
> From the operator community, what are the downsides?
>
> Customers are businesses on dedicated business services vs. consumer cabl=
e
> modems (although there are a few on business class cable).  Others are on
> MPLS and I=E2=80=99m hashing that out.
>
> The only one I can see is if the customer has a service provider with
> their external interface in 100.64 space.  However, this approach would
> have a more specific in that space so it should fire it down the tunnel f=
or
> their allocated customer block (/28) vs. their external side.
>
> Thoughts and thanks in advance.
>
> Eric
>

Wouldn't it be nice if Amazon supported IPv6 in VPC?

I have disqualified several projects from using the "public cloud" and put
them in the on-premise "private cloud"  because Amazon is missing this key
scaling feature -- ipv6.   It is odd that Amazon, a company with scale
deeply in its DNA, fails so hard on IPv6.  I guess they have a lot of
brittle technical debt they can't upgrade.

I suggest you go with private cloud if possible.

Or, you can double NAT non-unique IPv4 space.

Regarding 100.64.0.0/10, despite what the RFCs may say, this space is just
an augment of RFC1918 and i have already deployed it as such.

CB

home help back first fref pref prev next nref lref last post