summaryrefslogtreecommitdiffstats
path: root/src/vnet/l2/l2_vtr.h
blob: 893b2272b04b1b0a7d564320ab521f5c08106403 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
/*
 * l2_vtr.h : layer 2 vlan tag rewrite processing
 *
 * Copyright (c) 2013 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#ifndef included_vnet_l2_vtr_h
#define included_vnet_l2_vtr_h

#include <vlib/vlib.h>
#include <vnet/vnet.h>
#include <vnet/ethernet/packet.h>
#include <vnet/l2/l2_vtr.h>

/* VTR config options for API and CLI support */
typedef enum
{
  L2_VTR_DISABLED,
  L2_VTR_PUSH_1,
  L2_VTR_PUSH_2,
  L2_VTR_POP_1,
  L2_VTR_POP_2,
  L2_VTR_TRANSLATE_1_1,
  L2_VTR_TRANSLATE_1_2,
  L2_VTR_TRANSLATE_2_1,
  L2_VTR_TRANSLATE_2_2
} l2_vtr_op_t;

/**
 * Per-interface vlan tag rewrite configuration
 * There will be one instance of this struct for each sw_if_index
 * for both input vtr and output vtr
 */
typedef struct
{
  union
  {
    /*
     * Up to two vlan tags to push.
     * if there is only one vlan tag to push, it is in tags[1].
     */
    ethernet_vlan_header_tv_t tags[2];
    u64 raw_tags;
  };

  union
  {
    struct
    {
      u8 push_bytes;		/* number of bytes to push for up to 2 vlans (0,4,8) */
      u8 pop_bytes;		/* number of bytes to pop for up to 2 vlans (0,4,8) */
    };
    u16 push_and_pop_bytes;	/* if 0 then the feature is disabled */
  };
} vtr_config_t;


/**
 * Perform the configured tag rewrite on the packet.
 * Return 0 if ok, 1 if packet should be dropped (e.g. tried to pop
 * too many tags)
 */
always_inline u32
l2_vtr_process (vlib_buffer_t * b0, vtr_config_t * config)
{
  u64 temp_8;
  u32 temp_4;
  u8 *eth;

  eth = vlib_buffer_get_current (b0);

  /* copy the 12B dmac and smac to a temporary location */
  temp_8 = *((u64 *) eth);
  temp_4 = *((u32 *) (eth + 8));

  /* adjust for popped tags */
  eth += config->pop_bytes;

  /* if not enough tags to pop then drop packet */
  if (PREDICT_FALSE ((vnet_buffer (b0)->l2.l2_len - 12) < config->pop_bytes))
    {
      return 1;
    }

  /* copy the 2 new tags to the start of the packet  */
  *((u64 *) (eth + 12 - 8)) = config->raw_tags;

  /* TODO: set cos bits */

  /* adjust for pushed tags: */
  eth -= config->push_bytes;

  /* copy the 12 dmac and smac back to the packet */
  *((u64 *) eth) = temp_8;
  *((u32 *) (eth + 8)) = temp_4;

  /* Update l2_len */
  vnet_buffer (b0)->l2.l2_len +=
    (word) config->push_bytes - (word) config->pop_bytes;

  /* Update vlan tag count */
  ethernet_buffer_adjust_vlan_count_by_bytes (b0,
					      (word) config->push_bytes -
					      (word) config->pop_bytes);

  /* Update packet len */
  vlib_buffer_advance (b0,
		       (word) config->pop_bytes - (word) config->push_bytes);

  return 0;
}


/*
 *  Perform the egress pre-vlan tag rewrite EFP Filter check.
 * The post-vlan tag rewrite check is a separate graph node.
 *
 *  This check insures that a packet being output to an interface
 * (before output vtr is performed) has vlan tags that match those
 * on a packet received from that interface (after vtr has been performed).
 * This means verifying that any tags pushed by input vtr are present
 * on the packet.
 *
 *  Return 0 if ok, 1 if packet should be dropped.
 * This function should be passed the input vtr config for the interface.
 */
always_inline u8
l2_efp_filter_process (vlib_buffer_t * b0, vtr_config_t * in_config)
{
  u8 *eth;
  u64 packet_tags;
  u64 tag_mask;

  eth = vlib_buffer_get_current (b0);

  /*
   * If there are 2 tags pushed, they must match config->tags[0] and
   * config->tags[1].
   * If there is one tag pushed, it must match config->tag[1].
   * If there are 0 tags pushed, the check passes.
   */

  /* mask for two vlan id and ethertypes, no cos bits */
  tag_mask = clib_net_to_host_u64 (0xFFFF0FFFFFFF0FFF);
  /* mask for one vlan id and ethertype, no cos bits */
  tag_mask =
    (in_config->push_bytes ==
     4) ? clib_net_to_host_u64 (0xFFFF0FFF) : tag_mask;
  /* mask for always match */
  tag_mask = (in_config->push_bytes == 0) ? 0 : tag_mask;

  /*
   * Read 8B from the packet, getting the proper set of vlan tags
   * For 0 push bytes, the address doesn't matter since the mask
   * clears the data to 0.
   */
  packet_tags = *((u64 *) (eth + 4 + in_config->push_bytes));

  /* Check if the packet tags match the configured tags */
  return (packet_tags & tag_mask) != in_config->raw_tags;
}

typedef struct
{
  union
  {
    ethernet_pbb_header_t macs_tags;
    struct
    {
      u64 data1;
      u64 data2;
      u16 data3;
      u32 data4;
    } raw_data;
  };
  union
  {
    struct
    {
      u8 push_bytes;		/* number of bytes to push pbb tags */
      u8 pop_bytes;		/* number of bytes to pop pbb tags */
    };
    u16 push_and_pop_bytes;	/* if 0 then the feature is disabled */
  };
} ptr_config_t;

always_inline u32
l2_pbb_process (vlib_buffer_t * b0, ptr_config_t * config)
{
  u8 *eth = vlib_buffer_get_current (b0);

  if (config->pop_bytes > 0)
    {
      ethernet_pbb_header_packed_t *ph = (ethernet_pbb_header_packed_t *) eth;

      // drop packet without PBB header or with wrong I-tag or B-tag
      if (clib_net_to_host_u16 (ph->priority_dei_id) !=
	  clib_net_to_host_u16 (config->macs_tags.priority_dei_id)
	  || clib_net_to_host_u32 (ph->priority_dei_uca_res_sid) !=
	  clib_net_to_host_u32 (config->macs_tags.priority_dei_uca_res_sid))
	return 1;

      eth += config->pop_bytes;
    }

  if (config->push_bytes > 0)
    {
      eth -= config->push_bytes;
      // copy the B-DA (6B), B-SA (6B), B-TAG (4B), I-TAG (6B)
      *((u64 *) eth) = config->raw_data.data1;
      *((u64 *) (eth + 8)) = config->raw_data.data2;
      *((u16 *) (eth + 16)) = config->raw_data.data3;
      *((u32 *) (eth + 18)) = config->raw_data.data4;
    }

  /* Update l2_len */
  vnet_buffer (b0)->l2.l2_len +=
    (word) config->push_bytes - (word) config->pop_bytes;
  /* Update packet len */
  vlib_buffer_advance (b0,
		       (word) config->pop_bytes - (word) config->push_bytes);

  return 0;
}

u32 l2pbb_configure (vlib_main_t * vlib_main,
		     vnet_main_t * vnet_main, u32 sw_if_index, u32 vtr_op,
		     u8 * b_dmac, u8 * b_smac,
		     u16 b_vlanid, u32 i_sid, u16 vlan_outer_tag);

/**
 * Configure vtag tag rewrite on the given interface.
 * Return 1 if there is an error, 0 if ok
 */
u32 l2vtr_configure (vlib_main_t * vlib_main,
		     vnet_main_t * vnet_main,
		     u32 sw_if_index,
		     u32 vtr_op, u32 push_dot1q, u32 vtr_tag1, u32 vtr_tag2);

/**
 * Get vtag tag rewrite on the given interface.
 * Return 1 if there is an error, 0 if ok
 */
u32 l2vtr_get (vlib_main_t * vlib_main,
	       vnet_main_t * vnet_main,
	       u32 sw_if_index,
	       u32 * vtr_op,
	       u32 * push_dot1q, u32 * vtr_tag1, u32 * vtr_tag2);

#endif /* included_vnet_l2_vtr_h */


/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
u32 context; }; /** \brief S-NAT static mapping details response @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param addr_only - 1 if address only mapping @param local_ip_address - local IP address @param external_ip_address - external IP address @param protocol - IP protocol @param local_port - local port number @param external_port - external port number @param external_sw_if_index - external interface @param vfr_id - VRF ID */ define snat_static_mapping_details { u32 context; u8 is_ip4; u8 addr_only; u8 local_ip_address[16]; u8 external_ip_address[16]; u8 protocol; u16 local_port; u16 external_port; u32 external_sw_if_index; u32 vrf_id; }; /** \brief Control ping from client to api server request @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_control_ping { u32 client_index; u32 context; }; /** \brief Control ping from the client to the server response @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param retval - return code for the request @param vpe_pid - the pid of the vpe, returned by the server */ define snat_control_ping_reply { u32 context; i32 retval; u32 client_index; u32 vpe_pid; }; /** \brief Show S-NAT plugin startup config @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_show_config { u32 client_index; u32 context; }; /** \brief Show S-NAT plugin startup config reply @param context - sender context, to match reply w/ request @param retval - return code for the request @param static_mapping_only - if 1 dynamic translations disabled @param static_mapping_connection_tracking - if 1 create session data @param deterministic - if 1 deterministic mapping @param translation_buckets - number of translation hash buckets @param translation_memory_size - translation hash memory size @param user_buckets - number of user hash buckets @param user_memory_size - user hash memory size @param max_translations_per_user - maximum number of translations per user @param outside_vrf_id - outside VRF id @param inside_vrf_id - default inside VRF id */ define snat_show_config_reply { u32 context; i32 retval; u8 static_mapping_only; u8 static_mapping_connection_tracking; u8 deterministic; u32 translation_buckets; u32 translation_memory_size; u32 user_buckets; u32 user_memory_size; u32 max_translations_per_user; u32 outside_vrf_id; u32 inside_vrf_id; }; /** \brief Set S-NAT workers @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param worker_mask - S-NAT workers mask */ autoreply define snat_set_workers { u32 client_index; u32 context; u64 worker_mask; }; /** \brief Dump S-NAT workers @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_worker_dump { u32 client_index; u32 context; }; /** \brief S-NAT workers details response @param context - sender context, to match reply w/ request @param worker_index - worker index @param lcore_id - lcore ID @param name - worker name */ define snat_worker_details { u32 context; u32 worker_index; u32 lcore_id; u8 name[64]; }; /** \brief Add/delete S-NAT pool address from specific interfce @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_add - 1 if add, 0 if delete @param sw_if_index - software index of the interface */ autoreply define snat_add_del_interface_addr { u32 client_index; u32 context; u8 is_add; u8 is_inside; u32 sw_if_index; }; /** \brief Dump S-NAT pool addresses interfaces @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_interface_addr_dump { u32 client_index; u32 context; }; /** \brief S-NAT pool addresses interfaces details response @param context - sender context, to match reply w/ request @param sw_if_index - software index of the interface */ define snat_interface_addr_details { u32 context; u32 sw_if_index; }; /** \brief Enable/disable S-NAT IPFIX logging @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param domain_id - observation domain ID @param src_port - source port number @param enable - 1 if enable, 0 if disable */ autoreply define snat_ipfix_enable_disable { u32 client_index; u32 context; u32 domain_id; u16 src_port; u8 enable; }; /** \brief Dump S-NAT users @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_user_dump { u32 client_index; u32 context; }; /** \brief S-NAT users response @param context - sender context, to match reply w/ request @vrf_id - VRF ID @param is_ip4 - 1 if address type is IPv4 @param ip_adress - IP address @param nsessions - number of dynamic sessions @param nstaticsessions - number of static sessions */ define snat_user_details { u32 context; u32 vrf_id; u8 is_ip4; u8 ip_address[16]; u32 nsessions; u32 nstaticsessions; }; /** \brief S-NAT user's sessions @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param user_ip - IP address of the user to dump @param vrf_id - VRF_ID */ define snat_user_session_dump { u32 client_index; u32 context; u8 is_ip4; u8 ip_address[16]; u32 vrf_id; }; /** \brief S-NAT user's sessions response @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param outside_ip_address - outside IP address @param outside_port - outside port @param inside_ip_address - inside IP address @param inside_port - inside port @param protocol - protocol @param is_static - 1 if session is static @param last_heard - last heard timer @param total_bytes - count of bytes sent through session @param total_pkts - count of pakets sent through session */ define snat_user_session_details { u32 context; u8 is_ip4; u8 outside_ip_address[16]; u16 outside_port; u8 inside_ip_address[16]; u16 inside_port; u16 protocol; u8 is_static; u64 last_heard; u64 total_bytes; u32 total_pkts; }; /** \brief Add/delete S-NAT deterministic mapping @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_add - 1 if add, 0 if delete @param is_ip4 - 1 if address type is IPv4 @param in_addr - inside IP address @param in_plen - inside IP address prefix length @param out_addr - outside IP address @param out_addr - outside IP address prefix length */ autoreply define snat_add_det_map { u32 client_index; u32 context; u8 is_add; u8 is_ip4; u8 addr_only; u8 in_addr[16]; u8 in_plen; u8 out_addr[16]; u8 out_plen; }; /** \brief Get outside address and port range from inside address @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param in_addr - inside IP address */ define snat_det_forward { u32 client_index; u32 context; u8 is_ip4; u8 in_addr[16]; }; /** \brief Get outside address and port range from inside address @param context - sender context, to match reply w/ request @param retval - return code @param out_port_lo - outside port range start @param out_port_hi - outside port range end @param is_ip4 - 1 if address type is IPv4 @param out_addr - outside IP address */ define snat_det_forward_reply { u32 context; i32 retval; u16 out_port_lo; u16 out_port_hi; u8 is_ip4; u8 out_addr[16]; }; /** \brief Get inside address from outside address and port @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param out_port - outside port @param is_ip4 - 1 if address type is IPv4 @param out_addr - outside IP address */ define snat_det_reverse { u32 client_index; u32 context; u16 out_port; u8 is_ip4; u8 out_addr[16]; }; /** \brief Get inside address from outside address and port reply @param context - sender context, to match reply w/ request @param retval - return code @param is_ip4 - 1 if address type is IPv4 @param in_addr - inside IP address */ define snat_det_reverse_reply { u32 context; i32 retval; u8 is_ip4; u8 in_addr[16]; }; /** \brief Dump S-NAT deterministic mappings @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_det_map_dump { u32 client_index; u32 context; }; /** \brief S-NAT users response @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param in_addr - inside IP address @param in_plen - inside IP address prefix length @param out_addr - outside IP address @param out_plen - outside IP address prefix length @param sharing_ratio - outside to inside address sharing ratio @param ports_per_host - number of ports available to a host @param ses_num - number of sessions belonging to this mapping */ define snat_det_map_details { u32 context; u8 is_ip4; u8 in_addr[16]; u8 in_plen; u8 out_addr[16]; u8 out_plen; u32 sharing_ratio; u16 ports_per_host; u32 ses_num; }; /** \brief Set values of timeouts for deterministic NAT (seconds, 0 = default) @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param udp - UDP timeout (default 300sec) @param tcp_established - TCP established timeout (default 7440sec) @param tcp_transitory - TCP transitory timeout (default 240sec) @param icmp - ICMP timeout (default 60sec) */ autoreply define snat_det_set_timeouts { u32 client_index; u32 context; u32 udp; u32 tcp_established; u32 tcp_transitory; u32 icmp; }; /** \brief Get values of timeouts for deterministic NAT (seconds) @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define snat_det_get_timeouts { u32 client_index; u32 context; }; /** \brief Get values of timeouts for deterministic NAT reply @param context - sender context, to match reply w/ request @param retval - return code @param udp - UDP timeout (default 300sec) @param tcp_established - TCP established timeout (default 7440sec) @param tcp_transitory - TCP transitory timeout (default 240sec) @param icmp - ICMP timeout (default 60sec) */ define snat_det_get_timeouts_reply { u32 context; i32 retval; u32 udp; u32 tcp_established; u32 tcp_transitory; u32 icmp; }; /** \brief Close CGNAT session by outside address and port @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param out_addr - outside IP address @param out_port - outside port @param ext_addr - external host address @param ext_port - external host port */ autoreply define snat_det_close_session_out { u32 client_index; u32 context; u8 is_ip4; u8 out_addr[16]; u16 out_port; u8 ext_addr[16]; u16 ext_port; }; /** \brief Close CGNAT session by inside address and port @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param in_addr - inside IP address @param in_port - inside port @param ext_addr - external host address @param ext_port - external host port */ autoreply define snat_det_close_session_in { u32 client_index; u32 context; u8 is_ip4; u8 in_addr[16]; u16 in_port; u8 ext_addr[16]; u16 ext_port; }; /** \brief Dump S-NAT deterministic sessions @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param user_addr - address of an inside user whose sessions to dump */ define snat_det_session_dump { u32 client_index; u32 context; u8 is_ip4; u8 user_addr[16]; }; /** \brief S-NAT deterministic sessions reply @param context - sender context, to match reply w/ request @param is_ip4 - 1 if address type is IPv4 @param in_port - inside port @param ext_addr - external host address @param ext_port - external host port @param out_port - outside NAT port @param state - session state @param expire - session expiration timestamp */ define snat_det_session_details { u32 client_index; u32 context; u8 is_ip4; u16 in_port; u8 ext_addr[16]; u16 ext_port; u16 out_port; u8 state; u32 expire; }; /** \brief Add/delete address range to NAT64 pool @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param start_addr - start address of the range @param end_addr - end address of the range @param vrf_id - VRF id of tenant, ~0 means independent of VRF @param is_add - 1 if add, 0 if delete */ autoreply define nat64_add_del_pool_addr_range { u32 client_index; u32 context; u8 start_addr[4]; u8 end_addr[4]; u32 vrf_id; u8 is_add; }; /** \brief Dump NAT64 pool addresses @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define nat64_pool_addr_dump { u32 client_index; u32 context; }; /** \brief NAT64 pool address details response @param context - sender context, to match reply w/ request @param address - IPv4 address @param vfr_id - VRF id of tenant, ~0 means independent of VRF */ define nat64_pool_addr_details { u32 context; u8 address[4]; u32 vrf_id; }; /** \brief Enable/disable NAT64 feature on the interface @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param sw_if_index - index of the interface @param is_inside - 1 if inside, 0 if outside @param is_add - 1 if add, 0 if delete */ autoreply define nat64_add_del_interface { u32 client_index; u32 context; u32 sw_if_index; u8 is_inside; u8 is_add; }; /** \brief Dump interfaces with NAT64 feature @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define nat64_interface_dump { u32 client_index; u32 context; }; /** \brief NAT64 interface details response @param context - sender context, to match reply w/ request @param is_inside - 1 if inside, 0 if outside @param sw_if_index - index of the interface */ define nat64_interface_details { u32 context; u8 is_inside; u32 sw_if_index; }; /** \brief Add/delete NAT64 static BIB entry @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param i_addr - inside IPv6 address @param o_addr - outside IPv4 address @param i_port - inside port number @param o_port - outside port number @param vrf_id - VRF id of tenant @param proto - protocol number @param is_add - 1 if add, 0 if delete */ autoreply define nat64_add_del_static_bib { u32 client_index; u32 context; u8 i_addr[16]; u8 o_addr[4]; u16 i_port; u16 o_port; u32 vrf_id; u8 proto; u8 is_add; }; /** \brief Dump NAT64 BIB @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param proto - protocol of the BIB: 255 - all BIBs 6 - TCP BIB 17 - UDP BIB 1/58 - ICMP BIB otherwise - "unknown" protocol BIB */ define nat64_bib_dump { u32 client_index; u32 context; u8 proto; }; /** \brief NAT64 BIB details response @param context - sender context, to match reply w/ request @param i_addr - inside IPv6 address @param o_addr - outside IPv4 address @param i_port - inside port number @param o_port - outside port number @param vrf_id - VRF id of tenant @param proto - protocol number @param is_static - 1 if static BIB entry, 0 if dynamic @param ses_num - number of sessions associated with the BIB entry */ define nat64_bib_details { u32 context; u8 i_addr[16]; u8 o_addr[4]; u16 i_port; u16 o_port; u32 vrf_id; u8 proto; u8 is_static; u32 ses_num; }; /** \brief Set values of timeouts for NAT64 (seconds, 0 = default) @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param udp - UDP timeout (default 300sec) @param icmp - ICMP timeout (default 60sec) @param tcp_trans - TCP transitory timeout (default 240sec) @param tcp_est - TCP established timeout (default 7440sec) @param tcp_incoming_syn - TCP incoming SYN timeout (default 6sec) */ autoreply define nat64_set_timeouts { u32 client_index; u32 context; u32 udp; u32 icmp; u32 tcp_trans; u32 tcp_est; u32 tcp_incoming_syn; }; /** \brief Get values of timeouts for NAT64 (seconds) @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define nat64_get_timeouts { u32 client_index; u32 context; }; /** \brief Get values of timeouts for NAT64 reply @param context - sender context, to match reply w/ request @param retval - return code @param udp - UDP timeout @param icmp - ICMP timeout @param tcp_trans - TCP transitory timeout @param tcp_est - TCP established timeout @param tcp_incoming_syn - TCP incoming SYN timeout */ define nat64_get_timeouts_reply { u32 context; i32 retval; u32 udp; u32 icmp; u32 tcp_trans; u32 tcp_est; u32 tcp_incoming_syn; }; /** \brief Dump NAT64 session table @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param proto - protocol of the session table: 255 - all STs 6 - TCP ST 17 - UDP ST 1/58 - ICMP ST otherwise - "unknown" proto ST */ define nat64_st_dump { u32 client_index; u32 context; u8 proto; }; /** \brief NAT64 session table details response @param context - sender context, to match reply w/ request @param il_addr - inside IPv6 address of the local host @param ol_addr - outside IPv4 address of the local host @param il_port - inside port number id of the local host/inside ICMP id @param ol_port - outside port number of the local host/outside ICMP id @param il_addr - inside IPv6 address of the remote host @param ol_addr - outside IPv4 address of the remote host @param l_port - port number of the remote host (not used for ICMP) @param vrf_id - VRF id of tenant @param proto - protocol number */ define nat64_st_details { u32 context; u8 il_addr[16]; u8 ol_addr[4]; u16 il_port; u16 ol_port; u8 ir_addr[16]; u8 or_addr[4]; u16 r_port; u32 vrf_id; u8 proto; }; /** \brief Add/del NAT64 prefix @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request @param prefix - NAT64 prefix @param prefix - NAT64 prefix length @param vrf_id - VRF id of tenant @param is_add - 1 if add, 0 if delete */ autoreply define nat64_add_del_prefix { u32 client_index; u32 context; u8 prefix[16]; u8 prefix_len; u32 vrf_id; u8 is_add; }; /** \brief Dump NAT64 prefix @param client_index - opaque cookie to identify the sender @param context - sender context, to match reply w/ request */ define nat64_prefix_dump { u32 client_index; u32 context; }; /** \brief Dump NAT64 prefix details response @param context - sender context, to match reply w/ request @param prefix - NAT64 prefix @param prefix - NAT64 prefix length @param vrf_id - VRF id of tenant */ define nat64_prefix_details { u32 context; u8 prefix[16]; u8 prefix_len; u32 vrf_id; };