H.323 NAT Traversal Problem particular to H.323(RAS->Q.931->H.245):  RAS from private network to public network can pass NAT  Q931 、 H.245 adopts the.

Slides:



Advertisements
Similar presentations
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Transport Layer Network Fundamentals – Chapter 4.
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
CCNA – Network Fundamentals
STUN Date: Speaker: Hui-Hsiung Chung 1.
Security implications of Network Address Translators (NATs) (draft-gont-behave-nat-security) Fernando Gont Pyda Srisuresh UTN/FRH EMC Corporation 76th.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
K. Salah1 Security Protocols in the Internet IPSec.
Section 461.  ARP  Ghostbusters  Grew up in Lexington, KY  Enjoy stargazing, cycling, and mushroom hunting  Met Mario once (long time ago)
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SOCKS Group: Challenger Member: Lichun Zhan. Agenda Introduction SOCKS v4 SOCKS v5 Summary Conclusion References Questions.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
IPv6, the Protocol of the Future, Today Mathew Harris.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Protocol Headers 0x0800 Internet Protocol, Version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x8100 IEEE 802.1Q-tagged frame 0x86DD Internet Protocol,
Networking Basics CCNA 1 Chapter 11.
Packetizer ® Copyright © 2010 Into the Cloud Future Direction of Video Conferencing 1 Simon Horne H323.net 11 February 2010.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Firewalls Original slides prepared by Theo Benson.
Breno de MedeirosFlorida State University Fall 2005 The IP, TCP, UDP protocols A quick refresher.
NAT/PAT by S K SATAPATHY
© 2002, Cisco Systems, Inc. All rights reserved..
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
K. Salah1 Security Protocols in the Internet IPSec.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
Network Address Translation Sandip Chakraborty. NAT PRIVATE NETWORK PUBLIC NETWORK IP: Port: 8123 IP: Port: 9678 IP:
An Analysis on NAT Security
Could SP-NAT Save the Internet?
NAT (Network Address Translation)
Introduction to Networks
Preferred Alternatives for Tunnelling HIP (PATH)
Network Fundamentals – Chapter 4
Encapsulation/Decapsulation
Introduction to Networks
The IP, TCP, UDP protocols
Network Fundamentals – Chapter 4
Network Fundamentals – Chapter 4
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Security Protocols in the Internet
Network Fundamentals – Chapter 4
Network Fundamentals – Chapter 4
Network Fundamentals – Chapter 4
Network Fundamentals – Chapter 4
Request for Comments(RFC) 3489
Transport Layer 9/22/2019.
Network Fundamentals – Chapter 4
Network Fundamentals – Chapter 4
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

H.323 NAT Traversal Problem particular to H.323(RAS->Q.931->H.245):  RAS from private network to public network can pass NAT  Q931 、 H.245 adopts the TCP, if Q.931 is initialized from public network (such as from GK)  Cannot initialize a TCP connection from outside to a terminal inside a private network SYN packet cannot pass the NAT device TE in private network TE in public network NAT SYN SYN + ACK ACK B B A A X TCP SYN packet TCP utilizes three way handshake, it has direction. NAT TE

Principle of UDP Enhanced Tunnel TE ServerNAT Private Network Public Network Tunnel xTSxTC xTC -traversal Tunnel Client xTS -traversal Tunnel Server Signal and media stream share the same tunnel between xTC and xTS

UDP enhanced Tunnel Mechanism IP TCP/UDP Data Original UTH Encapsulated Standard UDP header Orig-protocol other-fields TCP/UDP Data UTH IP The UDP enhanced Tunnel Header(UTH) is comprised of three parts:  a UDP header (standard RFC0768 header)  a protocol field (holds the protocol field of original IP header.)  other-fields (reserved for extension)

Different from RFC3948 TCP/UDP Data RFC3948 UTH Encapsulated Standard UDP header Orig-protocol other-fields UTH IP ESP header Data UDP IP RFC3948 is specific for IPsec ESP packets UTH can be used for more general aims

xTC behavior Encapsulate:  Insert a UDP enhanced tunnel header  Modify the IP header, and the relation fields of the new IP header are edited to match the resulting IP packet.  The destination should be one ip address of xTS.  And cause IP header is modified, a map entry should be recorded by xTC for correct processing the packets sent from xTS.  The resulting packet is forwarded to xTS.

xTC behavior Decapsulate:  The UTH header is removed from the packet.  The IP header is modified, the relation fields in the new IP header are edited to match the resulting IP packet, in this procedure, the map entry recorded earlier is used to aid the process.  The resulting packet is forwarded to the real destination.

xTS behavior Decapsulate:  The UTH header is removed from the packet.  Do the ALG process if needed.  The IP header is modified, and the relation fields in the new IP header are edited to match the resulting IP packet.  The resulting packet is forwarded to the real destination.

xTS behavior Encapsulate:  A properly formatted UDP enhanced tunnel header(UTH header) is inserted.  Do the ALG process if needed.  Modify the IP header, and the relation fields in the new IP header are edited to match the resulting IP packet. To accomplish this, the map entry recorded in previously procedure should be used.  The resulting packet is forwarded to xTC.

How to use -Tunnel and Proxy (1) Tunnel client integrated with Proxy:  A dedicated proxy is deployed in the private network;  Tunnel is established between internal proxy and external proxy.  Terminals don't require modifications;  No public IP address will be consumed by proxy. TE1 TE2 TEn ServerNAT Private Network Public Network Tunnel Proxy xTS Proxy xTC

How to use -Tunnel and Proxy (2) Tunnel client integrated within the terminal:  No additional device is needed;  Tunnels are established between the terminals and proxy.  Terminals require modifications;  No public address will be consumed by terminals. TE Proxy ServerNAT Private Network Public Network Tunnel xTC TE xTC TE xTC xTS