IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.

Slides:



Advertisements
Similar presentations
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Advertisements

CS 4700 / CS 5700 Network Fundamentals Lecture 15: NAT (You Better Forward Those Ports) Revised 3/9/2013.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Firewalls and Intrusion Detection Systems
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Scaling Service Requests Linux: ipvsadm & iptoip.
Computer Network (MASQ/NAT/PROXY)
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Networking Components
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
FIREWALL Mạng máy tính nâng cao-V1.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Network Address Translation (NAT)
Internet Connection Sharing Ben Ramig Erik Tierney.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Common Devices Used In Computer Networks
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Network Addressing TEJ 3M. MAC Address (Media Access Control Address) Hard wired into your network card by the manufacturer Hard wired into your network.
CIS 450 – Network Security Chapter 3 – Information Gathering.
CS 453 Computer Networks Lecture 21 Layer 3 Network Layer Network Layer of the Internet.
Internet and Intranet Fundamentals Class 9 Session A.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Firewalls and Info Services Prevent unathorized access between nets Most of the protection is based upon examination of the IP packets There is always.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
Firewalls and proxies Unit objectives
1 Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP) Relates to Lab 7. Module about private networks and NAT.
NAT & PAT Network Address Translation Port Address Translation.
NAT/PAT by S K SATAPATHY
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
CS 3700 Networks and Distributed Systems
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
NAT (Network Address Translation)
Original slides prepared by Theo Benson
Firewall Techniques Matt Cupp.
Network Address Translation (NAT)
Network Address Translation
CS 3700 Networks and Distributed Systems
WSU Linux Users Group By Haven Hash
Network Address Translation (NAT)
Introducing To Networking
6.6 Firewalls Packet Filter (=filtering router)
NAT/ARP/RARP (Ch 5 & 8) Dr. Clincy Lecture.
8PM – Quickly Overview Final Project
CS 3700 Networks and Distributed Systems
Transport Layer Systems Firewalls and NAT
Example 9 (Continued) 1. The first mask (/26) is applied to the destination address. The result is , which does not match the corresponding network.
Network Address Translation (NAT)
Presentation transcript:

IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines

The problem Extra IPs are an additional cost of you internet service. –Masquerading lets you hook up multiple machines to the same IP Some companies want TCP/IP services and set up a network not connected to the internet to use internal services such as www. –Eventually they want to connect and don’t want to have to reconfigure the entire network.

Unconnected Network If the network is configured with IPs defined for unconnected service (like x.x), masquerading lets you connect with minimal changes. Those special IPs should never directly use the internet as others might also be using the same numbers. Masquerading maps the numbers

Multiple machine to ONE IP Basically the same problem as unconnected networks. Use the special IPs and have a program translate your special IPs into real IPs.

How does it work? Focus on FROM (not TO) of request TO is same for both sides of the request Router Internal Machine Internal Machine From :100 (use same entry for reverse traffic) From :34567 To :34567 To :100 OUTSIDE NEVER SEES NET x, only ! :100 -> :34567

Problem/Considerations Ports range Internal machine Ports range Internal machine Ports range Router 2*65536 ports ports Not a problem only because the internal machines seldom use a large number of the available ports

Problem/Considerations Waiting on port 80 Internal SERVER (www) Gateway To :80 -> NO SUCH SERVICE To :80 -> ILLEGAL ADDRESS No way to access the service. -> Can’t provide external services from the inside. (you can but it requires some extra effort and another software package … more later)

How do you set it up? It’s actually packaged in a firewall solution which effectively does –packet level filtering AND –masquerading This will be explained in the section concerning setting up a firewall. In linux –ipchains or –iptables