New Solutions For Scaling The Internet Address Space

Slides:



Advertisements
Similar presentations
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Advertisements

Network Layer: Logical Addressing. 4-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
NAT: Network Address Translation local network (e.g., home network) /24 rest of Internet Datagrams.
CSE5803 Advanced Internet Protocols and Applications (7) Introduction The IP addressing scheme discussed in Chapter 2 are classful and can be summarised.
M. Dahshan - TCOM52721 TCOM 5272 Telecomm Lab Dr. Mostafa Dahshan OU-Tulsa 4W 2 nd floor
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Subnetting.
Sybex CCENT Chapter 13: Network Address Translation Instructor & Todd Lammle.
Network Addressing Issues in /err_con/crc.htm.
Types of Addresses in IPv4 Network Range
4: Addressing Working At A Small-to-Medium Business or ISP.
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
ECE 4110 – Internetwork Programming Subnetting, Supernetting, and Classless Addressing.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Scaling the Network with NAT and PAT.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Network Address Translation
IP Addressing Introductory material. An entire module devoted to IP addresses.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
Introduction to Network Address Translation
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning the Addressing Structure Working at a Small-to-Medium Business.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
Network Security1 – Chapter 6 – NAT and Security Network Address Translation (NAT) is useful: –Hide internal private IP addresses –Conserve routable IP.
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
NAT and PAT. Topics RFCs 1597(obs by 1918), 1631,1917, 1918 & 1797 Network Address Translation – Static and Dynamic Port Address Translation Issues with.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
NAT/PAT by S K SATAPATHY
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
IP Logical Networks COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Network Layer IP Address.
TCP/IP Addressing and Subnetting. IP Addressing Roadmap Format of IP Addresses Traditional Class Networks Network Masks Subnetting Supernetting Special.
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
CCNA4-1 Chapter 7-1 IP Addressing Services Scaling Networks With Network Address Translation (NAT)
CCNA4-1 Chapter 7-1 NAT Chapter 11 Routing and Switching (CCNA2)
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Planning the Addressing Structure
LESSON Networking Fundamentals Understand IPv4.
4.3 Network Layer Logical Addressing
NAT : Network Address Translation
Network Address Translation
Chapter 13 Network Address Translation
Network Address Translation (NAT)
Network Address Translation
Instructor Materials Chapter 9: NAT for IPv4
CS 3700 Networks and Distributed Systems
4 Network Layer Part I Computer Networks Tutun Juhana
– Chapter 6 – NAT and Security
IPV4.
Network Address Translation (NAT)
Routing and Switching Essentials v6.0
Introducing To Networking
NET323 D: Network Protocols
CIS 82 Routing Protocols and Concepts Chapter 11 NAT
Routing and Switching Essentials v6.0
NAT and Security Source: Ch. 6 of Malik
Cabrillo College Building Cisco Remote Access Network
CS 3700 Networks and Distributed Systems
Instructor Materials Chapter 9: NAT for IPv4
NET323 D: Network Protocols
Dr. John P. Abraham Professor UTPA
Planning the Addressing Structure
Planning the Addressing Structure
Planning the Addressing Structure
Chapter 11: Network Address Translation for IPv4
Prepared by :Adeel Ahmad
Network Address Translation (NAT)
DHCP: Dynamic Host Configuration Protocol
Presentation transcript:

New Solutions For Scaling The Internet Address Space IPV4 address shortages and expanding internet routing tables are still problems * RFC - 1917 is an appeal to return unused address blocks to Internet Assigned Numbers Authority (IANA) for redistribution. Address allocation for private internets RFC - 1918 suggests organizations use private address space with translation performed on a smaller “routable” pool of addresses at edge of network. IANA has reserved: 10.0.0.0 - 10.255.255.255 (10.0.0.0/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16.0.0/12 prefix) 192.168.0.0.- 192.168.255.255 (192.168.0.0/16 prefix) Private not routable on internet Can be used simultaneously by many organizations Requires a network address translator (NAT) for internet access. Easier for customer to change ISP’s. NAT breaks IP security (IPSEC) because changing IP address in between end points invalidates crypto graphic transforms. * Address allocation from the reserved class A address space. RFC-1797 explores allocation of upper half of class A by using CIDR blocks from the 64.0.0.0/2 address space

Network Address Translation (Source: http://www.suse.de/~mha/linux-ip-nat/diplom/node4.html) Can do address translation either statically or dynamically Static- a given fixed original IP address is always translated into the same NAT IP Dynamic- NAT IP depends upon runtime conditions and may different each time

Example of Static NAT: This NAT strategy is easy to implement, since the entire translation process can be written as one line containing a few simple logic transformations: new-address = new-network OR (old-address AND (NOT netmask)) In addition, no information about the state of connections that are being translated needs to be kept, looking at each IPpacket individually is sufficient. Connections from outside the network to inside hosts are no problem, they just appear to have a different IP than on the inside, so static NAT is (almost) completely transparent.

Dynamic Address Translation Dynamic NAT is more complex than static NAT, since we must keep track of communicating hosts and possibly even of connections which requires looking at TCP information in packets. Some people use this as a security measure: it is impossible for someone outside a network to get useful IP numbers to connect to of hosts behind a NAT router doing dynamic address translation by looking at connections that take place, since next time the same host may connect using a completely different IP. Connections from outside are only possible when the host that shall be reached still has a NAT-IP assigned, i.e. if it still has an entry in the dynamic NAT table, where the NAT router keeps track of which internal IP is mapped to which NAT IP.

Example of Dynamic NAT: NAT rule: dynamically translate all IPs in (class B) network 138.201 to IPs in (class C) network 178.201.112 each new connection from the inside gets assigned an IP from the pool of class C addresses, as long as there are unused addresses left if a mapping already exists for the internal host this one is used instead as long as the mapping exists the internal host can be reached via the IP that has been (temporarily) assigned to it. In the next figure, the left side is internal, connections there cause the result on the right side which is the external network.

Dynamic NAT

Masquerading NAT A very special case of dynamic NAT is many:1-translation, a.k.a. masquerading which became famous under that name because Linux can do it. It is probably the kind of NAT-technique that is used most often these days. Here many IP numbers are hidden behind a single one. In masquerading an almost arbitrary number of connections is multiplexed using TCP port information. The number of simultaneous connections is limited only by the number of TCP-ports available. Incoming connections are impossible with masquerading, since even when a host has an entry in the masquerading table of the NAT device this entry is only valid for the connection being active. While it is true that incoming connections are impossible we can take additional measures to enable them, but they are not part of the masquerading code. The greatest advantage of masquerading for many people is that they only need one official IP-address but the entire internal network can still directly access the Internet.

Example of Masquerading: NAT rule: masquerade the internal network 138.201 using the NAT routers own address for each outgoing packet the source IP is replaced by the routers (external) IP, and the source port is exchanged against an unused port from the range reserved exclusively for masquerading on the router if the destination IP of an incoming packet is the local router IP and the destination port is inside the range of ports used for masquerading on the router, the NAT router checks its masquerading table if the packet belongs to a masqueraded session; if this is the case, the destination IP and port of the internal host is inserted and the packet is sent to the internal host In the next figure, the left side is the internal network, the right side is the external network. All data appears from source 195.112.12.161 but different ports.

Example of Masquerading

Linux Implementation Detail: Masquerading usually uses ports in the upper range, in Linux this range starts at port 61000 and ends at 61000+4096, which is the default and can easily be changed by editing linux/include/net/ip_masq.h. This also shows that the Linux implementation by default only allows 4096 concurrent connections. To allow masqueraded connections on ports outside of such a port range requires keeping and managing even more information about the state of connections. Linux, for example, simply treats all packets with destination IP = local IP and destination port is inside the range used for masquerading , as packets that have to be demasqueraded, i.e. they are answers to packets that have been masqueraded on their way out. See http://www.cisco.com/warp/public/556/nat-cisco.shtml for a demo of NAT.