Request for Comments(RFC) 3489

Slides:



Advertisements
Similar presentations
A New Method for Symmetric NAT Traversal in UDP and TCP
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
P2P and NAT How to traverse NAT Davide Carboni ©
NAT/Firewall Traversal April NAT revisited – “port-translating NAT”
STUN Date: Speaker: Hui-Hsiung Chung 1.
SIP Traversal over NAT Problems and Solutions Mr. Ting-Yun Chi May 2,2006 (Taiwan,NICI IPv6 R&D Division)
Copyright 2005 – 2009 © by Elliot Eichen. All rights reserved. NAT (NAPT/PAT), STUN, and ICE `Structure of ice II, viewed along the hexagonal c-axis. Hydrogen.
NAT Network Address Translation Presented by Snoopers Eduardo Segura Shenal Shroff Shinichi Nishiyama Suyou He Thu Nguyen.
STUN Tutorial Jonathan Rosenberg Chief Technology Officer.
NAT and NAT Traversal SEng490 Directed Study Haoran Song Supervised by Dr. Jianping Pan.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
NAT: Network Address Translation local network (e.g., home network) /24 rest of Internet Datagrams.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Subnetting.
Section 461.  ARP  Ghostbusters  Grew up in Lexington, KY  Enjoy stargazing, cycling, and mushroom hunting  Met Mario once (long time ago)
Middleboxes & Network Appliances EE122 TAs Past and Present.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) speaker : Wenping Zhang date :
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Network Layer4-1 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
1 NAT & RTP Proxy Date: 2009/7/2 Speaker: Ni-Ya Li Advisor: Quincy Wu.
Exploring Office 2003 – Grauer and Barber HTML And Basic Web page.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
Introduction to Sockets “A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
Presented by Rebecca Meinhold But How Does the Internet Work?
VersionIHLTotal Length FlagsIdentificationFragment Offset Time To Live Destination Address OptionsPadding Protocol = 6 Type of Service IP Header TCP Destination.
NAT/PAT by S K SATAPATHY
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
DIYTP Network Basics  How do computers communicate?  Network Interface Card (NIC)  Media Access Control Address (MAC)  Unique to each NIC 
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 11 – VoIP Hardware.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
H.323 NAT Traversal Problem particular to H.323(RAS->Q.931->H.245):  RAS from private network to public network can pass NAT  Q931 、 H.245 adopts the.
Network Address Translation Sandip Chakraborty. NAT PRIVATE NETWORK PUBLIC NETWORK IP: Port: 8123 IP: Port: 9678 IP:
HIP-Based NAT Traversal in P2P-Environments
CS 3700 Networks and Distributed Systems
NAT (Network Address Translation)
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Network Address Translation
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Only Two Ways through the PIX Firewall
改良UDP洞穿技術設計物聯網通訊: 以遠端門鈴監控系統為例 Improving UDP Hole Punching Technique For IoT Communications: A Remote Door-bell Monitoring System 報告時間28~32分佳 楊凱勝 指導教授:柯開維.
– Chapter 6 – NAT and Security
Introducing To Networking
Hiding Network Computers Gateways
NET323 D: Network Protocols
I. Basic Network Concepts
NET323 D: Network Protocols
Firewalls Routers, Switches, Hubs VPNs
Starting TCP Connection – A High Level View
Chapter 11: Network Address Translation for IPv4
Network Address Translation (NAT)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Request for Comments(RFC) 3489 STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) 江俊杰 1

2 Outline NAT four type Full Cone NAT Restricted Cone NAT Port Restricted Cone NAT Symmetric NAT What is STUN ? Testing NATs with STUN Algorithm Conclusion 2

Full Cone NAT A full cone NAT is one where all requests from the same internal IP address and port are mapped to the same external IP address and port 3

Full Cone NAT 4

Full Cone NAT 5

Restricted Cone NAT Sent from the destination IP address inside the packet will be remembered, Only those who receive these packets into the NAT address can send packets, Sent here by other incoming packets, will be block. 6

Restricted Cone NAT 7

Restricted Cone NAT 8

Port Restricted Cone NAT Restricted Cone A port restricted cone NAT is like a restricted cone NAT, but the restriction includes port numbers, An external host can send a packet, with source IP address X and source port P To the internal host only if the internal host had previously sent a packet to IP address X and port P. 9

Port Restricted Cone NAT 10

Port Restricted Cone NAT 11

Symmetric NAT A symmetric NAT is one where all requests from the same internal IP address and port. To a specific destination IP address and port, are mapped to the same external IP address and port. If the same host sends a packet with the same source address and port, but to a different destination, a different mapping is used. 12

Symmetric NAT 13

Symmetric NAT 14

What is STUN ? This protocol is not a cure-all for the problems associated with NAT. It does not enable incoming TCP connections through NAT. It allows incoming UDP packets through NAT, but only through a subset of existing NAT types. 15

STUN 16

Testing NATs with STUN Algorithm 17

Testing NATs with STUN Algorithm 18

Conclusion Determining the type of NAT is important in many cases. Depending on what the application wants to do, it may need to take the particular behavior into account. 19