Technical White Paper for NAT Traversal
|
|
- Giles Long
- 6 years ago
- Views:
Transcription
1 V300R002 Technical White Paper for NAT Traversal Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
2 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China support@huawei.com i
3 About This Document About This Document Author Prepared by Song Xin Date Reviewed by Reviewed by Granted by Date Date Date Change History Date Version Description Author Completed the initial draft. Song Xin ii
4 Contents Contents About This Document... ii Overview... 2 Origin of NAT Traversal... 2 NAT Type... 3 Addressing NAT Traversal Problems by the Proxy Mechanism... 4 Proxy Mechanism Overview... 4 Location of the SE2900 on the Network... 5 Signaling NAT Traversal... 5 Registration Process... 6 Signaling NAT Keepalive... 7 Media NAT Traversal... 8 Comparison Between Traversal Technologies ALG Technology STUN Technology MIDCOM Technology Protocol Modification Traversal Technology Comparison iii
5 SE2900 V300R002 Keywords: NAT Abstract: Abbreviations: Abbreviations ALG NAT STUN Full Name Application Level Gateway Network Address Translation Simple Traversal of UDP through NAT 1
6 0Overview Overview Origin of NAT Traversal NAT technology was developed to alleviate IPv4 address exhaustion. The early IPv4 system aimed to enable each IP network element to have a globally reachable IP address. If so, all network elements can communicate with each other using IP addresses. As IP networks keep expanding, the available IP addresses become exhausted. NAT technology can mitigate this problem during the IPv4-to-IPv6 transition which provides larger address space. Unlike traditional gateways that connect various networks, NAT devices can be regarded as special gateways that connect private and public IP networks. NAT devices connect private and public networks by translating IP addresses. The source IP address contained in an IP packet from a private network is a private address. After the IP packet passes through a NAT device, its source IP address is translated into a routable public address. In addition, the NAT device create an address binding relationship covering the private source address, public source address, and public destination address. In this way, the response packet from the public network can be routed to the source element on the private network. Although NAT technology can mitigate IP address exhaustion, the technology brings about the following problems: Most of the existing protocols are incompatible with NAT technology. IP addresses can be translated by NAT devices at the network and transport layers but cannot be translated at the application layer. As a result, IP addresses contained in the application-layer protocol are still private addresses and response packets sent based on these IP addresses cannot be routed to the source network elements. NAT devices bind the private source address, public source address, and public destination address together only for IP packets sent from a private network to a public network. Public network entities cannot proactively connect to private network entities before the binding relationship is created. Each address mapping entry generated on a NAT device has a lifecycle. If no packets matching an entry are received before the lifecycle expires, the NAT device deletes the entry. This makes public network entities unable to connect to the intended private network entities after the lifecycle expires. NAT traversal includes four modes: static NAT, STUN, ALG, and proxy. For details about differences between these NAT traversal modes, see chapter 0"Comparison Between Traversal Technologies." This document describes the NAT traversal in proxy mode based on the SE
7 0Overview NAT Type NAT is classified into the following types based on address mapping behaviors on NAT devices: Full cone NAT Restricted cone NAT Port restricted cone NAT Symmetric NAT Sample addresses used in the following NAT type descriptions are as follows: Private address :6060 Public address :5060 translated by NAT devices Public address :7060 Full cone NAT: After a NAT mapping is established between :6060 and :5060, the NAT device forwards all public network IP packets destined for :5060 to :6060. All static NAT mappings configured on the NAT device are full cone NAT mappings. Restricted cone NAT: The NAT device sends IP packets with the source address of and destination address of :5060 to the network element at :6060 only if the NAT device sets up a dynamic NAT mapping between :6060 and :5060 and the private network entity at :6060 sends packets to the public network entity at :7060 through the NAT device. In the lifecycle of a NAT mapping, IP packets using the same private address as the source address use the same NAT mapping when passing through NAT devices. Therefore, the source address of all IP packets from :6060 is translated into :5060, regardless of their destination addresses. Port restricted cone NAT: This NAT type is similar to restricted cone NAT and has the restriction on port numbers. Only IP packets from :7060 are matched the NAT mapping. Symmetric NAT: Public ports selected for NAT mappings vary with destination addresses of IP packets. If IP packets from :6060 are sent to different destination addresses, NAT devices set up different mappings for the IP packets. Like port restricted cone NAT, symmetric NAT defines that a private address must proactively send IP packets to a public address before these IP packets are matched the NAT mapping. Currently, most of the NAT devices support port restricted cone NAT. 3
8 0Addressing NAT Traversal Problems by the Proxy Mechanism Addressing NAT Traversal Problems by the Proxy Mechanism Proxy Mechanism Overview An SE2900 functions as a proxy to address NAT traversal problems. It directionally transmits signaling or media streams in proxy mode that has no specific requirement for NAT devices. Carriers do not need to replace NAT devices on the live network. The SE2900 re-specifies a destination address and port for a signaling or RTP stream from a private or public address to help achieve address translation between various network domains, including address translation between private and public networks. This technically ensures that signaling or media streams can traverse NAT devices. The SE2900 is a logical function entity and provides two functions: SIP signaling proxy and media proxy. SIP signaling proxy: For users, the SE2900 can be regarded as part of an IMS or NGN network. Registration and call messages from IMS or NGN network users are sent to the SE2900. The SE2900 processes these messages and forwards them to the core CSCF or softswitch. For the core CSCF and softswitch, the SE2900 can be regarded as a user. The core CSCF or softswitch sends call requests to the SE2900. The SE2900 processes these messages and forwards them to callees. The SE2900 processes and analyzes the signaling to obtain address change and bandwidth requirement information about calls and determine whether the media streams pass through the SE2900 based on the network resource usage. This helps to protect networks, prevent bandwidth theft, and achieve NAT traversal. Media proxy: All RTP media streams pass through the SE2900. The SE2900 processes and forwards media streams to enable communications between internal and external users. The SE2900 checks whether the packets are valid and specifies a forwarding policy for the media streams based on the signaling processing results. The forwarding policy covers packet filtering, QoS, and address translation. The SE2900 specifies IP addresses and ports for internal and external users to receive RTP media streams to correctly forward the media streams and ensure QoS and security. 4
9 0Addressing NAT Traversal Problems by the Proxy Mechanism Location of the SE2900 on the Network 图 1-1 Location of the SE2900 on an IMS network Core network SE2900 Signaling Media NAT/ Firewall Access network Access network NAT/ Firewall The SE2900 that serves as a proxy is deployed at the edge or aggregation layer of an IP network and acts as a signaling and media aggregation point. Signaling NAT Traversal Enabling an INVITE request to reach the intended user behind an NAT device is the major problem to be resolved in signaling NAT traversal. The problem can be resolved by completing the registration process to set up an address mapping on the NAT device for sending messages. The SE2900 or user keeps the NAT channel alive by sending packets periodically. 5
10 0Addressing NAT Traversal Problems by the Proxy Mechanism Registration Process 图 1-2 Registration process when the SE2900 acts as a proxy The registration process is as follows: 1. A UE sends a REGISTER request to the NAT device. The source IP address contained in the REGISTER packet header and the contact address contained in the payload are both the private address/port (Aa) of the UE. 2. The NAT device executes the following operations: Allocates a public address/port (Nn) to the UE. Generates a mapping between Aa and Nn. Translates Aa in the packet header into Nn. Forwards the REGISTER request to the SE The SE2900 receives the REGISTER request and executes the following operations: - Allocates a public signaling address/port (Dd). Translates the address contained in the REGISTER packet header and payload. Records the mapping between Nn/Cc and Dd/Ee. Sends the REGISTER request to the P-CSCF or softswitch to which the UE belongs. 4. The P-CSCF or softswitch authenticates the UE and sends a response packet to the SE The SE2900 receives the response packet and executes the following operations: Modifies the address contained in the packet header and payload according to the address mapping. Forwards the response packet to the NAT device. 6. The NAT device translates the IP address contain in the response packet into Aa and forwards the packet to the UE. 6
11 0Addressing NAT Traversal Problems by the Proxy Mechanism Signaling NAT Keepalive After the registration process, a signaling channel between the SE2900 and UE is formed. The address mapping established on the NAT device, however, has an aging period. The address mapping will be deleted if the NAT device does not receive packets from the UE or SE2900 before the aging period expires. Therefore, the SE2900 or UE must send keepalive packets to the NAT device to update NAT entries and prevent the address mapping from getting aged. The SE2900 can send following packets to keep the address mapping alive: Hello packets The SE2900 sends a Hello packet (UDP packet) to the UE within a period of time. The format of the Hello packets can be customized. SIP Re-REGISTER packets After the SE2900 receives a response packet from the core network, the SE2900 changes the Expires header or parameter to make the UE quickly send a REGISTER request to update the address mapping entry. STUN packets If a NAT device is deployed between the SE2900 and the UE, the UE periodically sends STUN requests to the NAT device to keep the corresponding address mapping entries on the NAT device alive. SIP keepalive using STUN requests applies to SIP over UDP in the A-SBC scenario. PING/PONG packets PING and PONG messages are transmitted between the UE and SE2900 to keep a TCP connection alive. If a NAT device is deployed between the SE2900 and the UE, the exchanges of the PING and PONG packets also keep corresponding address mapping entries on the NAT device alive. SIP keepalive using PING/PONG packets applies to SIP over TCP in the A-SBC scenario. 表 1-1 shows the differences between the four types of packets. 表 1-1 Differences between sending the four types of packets Category Sending Hello Packets Sending SIP Re-REGISTE R Packets Sending STUN Packets Sending PING/PONG Packets Remarks Flexibility Flexible Not flexible Flexible Flexible The format of the Hello packets can be customized. Impact on SE2900 performance Lightly impacted Greatly impacted Lightly impacted Lightly impacted The SE2900 needs to transcode the SIP Re-REGISTER packets. This affects SE2900 performance. 7
12 0Addressing NAT Traversal Problems by the Proxy Mechanism Media NAT Traversal Media streams are transmitted over an IMS or NGN network using RTP. RTP is carried over UDP. The IP addresses and ports used for the RTP media streams are negotiated using the signaling messages sent for establishing calls. The following signaling protocols can be used to establish calls: SIP, H.323, H.248, and MGCP. These protocols use the SDP information of the caller and callee to negotiate the media addresses and ports for the caller and callee. When the signaling carrying SDP information passes through the NAT device, the NAT device converts only the IP, TCP, and UDP packet headers, and not the IP address and port. The media address obtained by a callee is the private address and port a caller. As a result, the callee cannot use the private address to access the caller on the private network. Deploying a media proxy on the network is an effective way to implement media NAT traversal. The media proxy translates private media addresses and ports into public addresses and ports during E2E media negotiation. The SE2900 provides the media proxy function to support media NAT traversal without the need to upgrade the NAT devices on the live network. The SE2900-based media NAT traversal can be divided into two stages: signaling negotiation and media latching. Signaling negotiation stage, at which media address mappings are set up by SDP negotiation 8
13 0Addressing NAT Traversal Problems by the Proxy Mechanism Before a caller and callee make a call, they must send signaling packets to negotiate a channel for transmitting media streams. The SE2900 executes the following operations at the signaling negotiation stage: 7. Obtains the caller and callee IP address and port for receiving media streams according to SDP information contained in the signaling packets. 8. Allocates the access- and core-side media addresses and ports to the caller and callee. 9. Creates address mapping entry ( :2008, :7003)<->( :5007, :9000) for media sessions. All media streams will pass through the SE2900 but only the media streams matching media session entries on the SE2900 will be forwarded. Media transmission stage, at which the IP addresses for media packets are learned and translated The media transmission stage can be further divided into three sub stages: pre-media-latching, media latching, and post-media-latching. Pre-media-latching sub stage Because UE1 with the IP address of has not sent media packets to the SE2900, the media address mapping between the UE1 and SE2900 is not generated on the NAT device. As a result, the NAT device discards all media packets destined for UE1. 9
14 0Addressing NAT Traversal Problems by the Proxy Mechanism Media latching sub stage UE1 sends the first media packet to the SE2900. After the first media packet passes through the NAT device, the NAT device creates an address mapping between :3008 and :8028. The SE2900 receives the media packet processed by the NAT device and executes the following operations: 1. Learns the transport-layer address and port ( :8028) contained in the media packet. 2. Updates the address mapping entry ( :8028, :7003)<->( :5007, :9000) for media sessions. 10
15 0Addressing NAT Traversal Problems by the Proxy Mechanism Post-media-latching sub stage The SE2900 queries the updated address mapping entry ( :8028, :7003)<->( :5007, :9000) after it receives media packets destined for UE1 and forwards the media packets to :8028. The NAT device queries the address mapping entry ( :3008)<->( :8028) and forwards the media packets to UE1. 11
16 0Addressing NAT Traversal Problems by the Proxy Mechanism The disadvantage of the preceding media NAT traversal solution is that, in some cases, the UE receives but does not send media packets. For example, if the stream mode in the SDP information contained in the signaling packets from the caller is sendonly, the stream mode negotiated for the callee can only be recvonly. To prevent this problem, the SE2900 changes the stream mode for the caller to sendrecv before it forwards the caller's SDP information to the callee. By doing this, the stream mode negotiated for the callee can be sendrecv or sendonly. 12
17 0Comparison Between Traversal Technologies Comparison Between Traversal Technologies At present, the following traversal technologies are available: ALG, STUN, MIDCOM, protocol modification, and proxy. ALG Technology NAT and NAPT are applicable only to IP addresses in IP packet headers and port information in TCP/UDP packet headers. The data part of packets using special protocols may contain IP address or port information that cannot be fully translated by the NAT device. This may cause problems. For example, an FTP server using a private address may need to send its IP address to a PC on the public network to establish a session between them. The private address is in the data part of the IP packet and cannot be translated by the NAT device. Once the PC receives and uses this private address, the FTP server becomes unreachable for the PC. The ALG technology can be used to resolve such a problem. The ALG is a proxy for translating IP addresses contained in the packets with a certain application protocol. It interacts with the NAT device to establish the state, uses the NAT state information to modify the specific data encapsulated in the data part of IP packets, and implements other necessary works to make the application protocol run across different ranges. Use an ICMP packet for which the destination is unreachable as an example. The data part of this packet contains the packet A's header that causes the error. Before the NAT device forwards packet A, the NAT device has translated the IP address contained in packet A. Therefore, the source address contained in packet A is not the real IP address of the PC on the private network. If the ICMP ALG function is enabled, the ALG interworks with the NAT device before the NAT device forwards the ICMP packet. The ALG opens the ICMP packet and translates the address in packet's A header of the data part. The translated address is presented as the real address of the PC on the private network. The NAT device forwards the ICMP packet after the ALG completes other necessary works. The H.323 ALG, SIP ALG, MGCP ALG, H.248 ALG functions must be implemented for the following protocols: H.323, SIP, MGCP, and H
18 0Comparison Between Traversal Technologies 图 1-3 shows a typical networking scenario in which ALG technology is applied. 图 1-3 Typical NAT ALG networking diagram Softswitch Register Response Register Request Provider Network NAT with ALG Function Firewall/NAT NAT with ALG Function Firewall/NAT L2 Intranet of Corporation L2 Intranet of Corporation SoftPhone IAD STUN Technology STUN consists of two parts: the STUN client deployed on the private network and the STUN server deployed on the public network. The UE must support the STUN client function. The STUN server can be integrated into a component of the corresponding application device, such as a softswitch on the NGN, or function as an independent device. 图 1-4 shows a typical networking scenario in which STUN technology is applied. 图 1-4 Typical STUN networking diagram Provider Network Register Response Register Request Softswitch Binding Response Binding Request STUN Server Firewall/NAT Firewall/NAT L2 Intranet of Corporation L2 Intranet of Corporation STUN Client SoftPhone STUN Client IAD 14
19 0Comparison Between Traversal Technologies STUN technology is simple traversal of UDP through a NAT device. The STUN client uses UDP to send a STUN request to the STUN server. After the STUN server receives the request, it generates a response message that carries information about the source port in the request, that is, the corresponding public port of the STUN client on the NAT device. The NAT device then forwards the response message to the STUN client. The STUN client obtains its public address on the NAT device based on the response message, adds this public address to the UDP load of the later call protocol, and notifies the remote end that the local RTP receiving address and port are those in the front of the NAT device. The NAT mapping entry for media streams has been established on the NAT device using the STUN protocol. The media streams can successfully traverse the NAT device. The STUN protocol supports NAT traversal without the need to change existing NAT devices or firewalls on the live network. A large number of NAT devices and firewalls on the live network do not support VoIP services. To resolve this problem using MIDCOM or NAT ALG technology, the NAT devices and firewalls must be replaced. Replacing all these devices is difficult. STUN technology, however, can resolve the problem without the need to replace all the existing NAT devices and firewalls. In addition, STUN technology can be used on a network where multiple NAT devices are connected in series. On the contrary, MIDCOM technology cannot effectively control multi-level NAT devices. For details, see section 0"MIDCOM Technology." The disadvantage of STUN technology is that the NGN UE must support the STUN client function. STUN technology does not support H.323 or traversal of TCP connections. In addition, STUN technology does not support firewall traversal for NGN services or symmetric NAT traversal. On an enterprise network that requires high security, symmetric NAT is usually deployed at the egress node. MIDCOM Technology MIDCOM technology includes two parts: MIDCOM agent and Middlebox. The MIDCOM agent instructs the Middlebox to establish NAT mapping entries. Generally, the Middlebox is integrated into a NAT device or firewall. A softswitch, proxy server, or UE can act as the MIDCOM agent. 图 1-5 shows a typical networking scenario in which MIDCOM technology is applied. 图 1-5 Typical MIDCOM networking diagram Provider Network Softswitch MIDCOM Agent Firewall/NAT/MIDBOX Firewall/NAT/MIDBOX L2 Intranet of Corporation L2 Intranet of Corporation SoftPhone IAD 15
20 0Comparison Between Traversal Technologies The MIDCOM agent, not the Middlebox, identifies application services. According to the MIDCOM architecture, more services can be supported by upgrading the MIDCOM agent without modifying basic Middlebox features. This makes MIDCOM technology outperform NAT ALG technology. In NGN service applications, the Middlebox function can be implemented on a NAT device or firewall. The softswitch, MIDCOM agent, identifies the IP voice and video protocols such as H.323, SIP, MGCP, and H.248, and controls the NAT device and firewall. Therefore, MIDCOM can be a solution for NGN services to traverse the NAT device and firewall. MIDCOM technology supports control packet and media stream encryption and is secure. Protocol Modification Current multimedia application protocols cannot traverse a NAT device or firewall. Modifying the protocols can address this problem. Protocols such as H.323, SIP, MGCP, and H.248, however, cannot be modified for the traversal because technology for tackling this issue is being developed. It is not described in this document. Traversal Technology Comparison 表 1-2 Traversal technology comparison Technology Type ALG STUN MIDCOM Protocol Modification Proxy Location Edge of a private or public network Any location Any location Any location Any location Requirements for the Existing NAT Devices and Firewalls The existing NAT devices and firewalls must be replaced or upgraded to support ALG technology. Symmetric NAT is not supported. The existing NAT devices and firewalls must be replaced or upgraded to support the Middlebox function. Changing the existing NAT devices and firewalls is not required. Changing the existing NAT devices and firewalls is not required. Multi-level NAT The NAT device at each level must support ALG technology. No NAT device at any level is the symmetric NAT device. The Middlebox or ALG function must be supported. Supported Supported Impact on the Live Network Routes need to be added. No impact Routes need to be added. No impact No impact 16
21 0Comparison Between Traversal Technologies Technology Type ALG STUN MIDCOM Protocol Modification Proxy Requirements for UEs No specific requirements UEs must support the STUN client function. No specific requirements (The MIDCOM agent function can be implemented on the server.) Protocol modification A UE uses the same port to send and receive streams. Requirements for the Server No specific requirements No specific requirements The server must support the MIDCOM agent function. Protocols must be modified. No specific requirements Deployment location: If proxy technology is used, a proxy device can be deployed at the edge or aggregation layer of the IP network in overlay network mode. If ALG technology is used, the device implementing ALG technology must be deployed at the private network's egress to the public network. If STUN, MIDCOM, or protocol modification technology is used, the device implementing the technology can also be deployed at any location on the IP network. Requirements for the existing NAT devices and firewalls: If proxy or protocol modification technology is used, the existing NAT devices and firewalls do not need to be modified or upgraded. If ALG, STUN, or MIDCOM technology is used, the existing NAT devices and firewall must support the technology. If they do not support the technology, they must be upgraded. Multi-level NAT: If proxy technology is used, multi-level NAT is supported and all the NAT devices do not need to be upgraded or modified. If ALG, STUN, or MIDCOM technology is used, the NAT devices and firewall at all levels must support the ALG, STUN, or MIDCOM function. The NAT device that does not support the ALG, STUN, or MIDCOM function must be upgraded. If protocol modification technology is used, the server and UE must support the corresponding functions and multi-level NAT. Impact on the live network: If proxy, STUN, or protocol modification technology is used, the live network is not impacted, and the live network topology and routes remain unchanged. If ALG or MIDCOM technology is used, routes must be added. Requirements for UEs: Proxy, ALG, and MIDCOM technologies have no requirements for UEs. STUN and protocol modification technologies require UEs to provide specific functions. UEs that do not provide specific functions must be upgraded. Requirements for the server: Proxy, ALG, and STUN technologies have no requirements for the server. MIDCOM and protocol modification technologies require the server to support specific functions. 17
AD SSO Technical White Paper
Issue V1.0 Date 2017-02-28 Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationHUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date
HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or
More informationHuawei esight LogCenter Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date PUBLIC
Huawei esight LogCenter Technical White Paper Issue 1.0 Date 2013-12-03 PUBLIC HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any
More informationHUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date
HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More informationespace SoftConsole V200R001C02 Product Description HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date
espace SoftConsole V200R001C02 Issue 01 Date 2012-07-10 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
More informationNetwork Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example
Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying
More informationNetwork Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013
Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More informationConfiguring Hosted NAT Traversal for Session Border Controller
Configuring Hosted NAT Traversal for Session Border Controller The Cisco IOS Hosted NAT Traversal for Session Border Controller Phase-1 feature enables a Cisco IOS Network Address Translation (NAT) Session
More informationNAT (NAPT/PAT), STUN, and ICE
NAT (NAPT/PAT), STUN, and ICE `Structure of ice II, viewed along the hexagonal c-axis. Hydrogen bonds between the water molecules are shown as dashed lines. Lengths are in angstroms.'' (Hobbs, 1970, p.
More informationS Series Switches. MACsec Technology White Paper. Issue 1.0. Date HUAWEI TECHNOLOGIES CO., LTD.
S Series Switches MACsec Technology White Paper Issue 1.0 Date 2016-03-25 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2016. All rights reserved. No part of this document may be
More informationHUAWEI Secospace USG Series User Management and Control White Paper
Doc. code HUAWEI Secospace USG Series User Management and Control White Paper Issue 1.0 Date 2014-03-27 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.
More informationSBC Configuration Examples for Mediant SBC
Configuration Note AudioCodes Mediant Series of Session Border Controllers (SBC) SBC Configuration Examples for Mediant SBC Version 7.2 Configuration Note Contents Table of Contents 1 Introduction...
More informationespace UMS V100R001C01SPC100 Product Description Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
V100R001C01SPC100 Issue 03 Date 2012-07-10 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior
More informationMPLS OAM Technology White Paper
MPLS OAM Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
More information[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0
[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0 Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
More informationJournal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication
More informationHG531 V1 300Mbps Wireless ADSL2+ Router Product Description. Issue _01 HUAWEI TECHNOLOGIES CO., LTD.
HG531 V1 300Mbps Wireless ADSL2+ Router Issue 203275_01 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted
More informationesight V300R001C10 SLA Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
V300R001C10 Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationNAT and Firewall Traversal Technical Report
PacketCable 2.0 CLOSED Notice This PacketCable technical report is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry
More informationSBC Configuration Examples
Configuration Note SBC Configuration Examples Mediant Session Border Controllers (SBC) Version 7.0 Configuration Note Contents Table of Contents 1 Introduction... 7 1.1 Configuration Terminology... 7
More informationAdvanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 17 Date 2018-08-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationLive Streaming Accelerator. Quick Start. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationOceanStor 9000 InfiniBand Technical White Paper. Issue V1.01 Date HUAWEI TECHNOLOGIES CO., LTD.
OceanStor 9000 Issue V1.01 Date 2014-03-29 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be reproduced or transmitted in
More informationOpenScape Business V2
OpenScape Business V2 Tutorial Support of SIP Endpoints connected via the internet Version 3.1 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature
More informationBroadvox Fusion Platform Version 1.2 ITSP Setup Guide
November 13 Broadvox Fusion Platform Version 1.2 ITSP Setup Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone
More informationNetwork Address Translators (NATs) and NAT Traversal
Network Address Translators (NATs) and NAT Traversal Ari Keränen ari.keranen@ericsson.com Ericsson Research Finland, NomadicLab Outline Introduction to NATs NAT Behavior UDP TCP NAT Traversal STUN TURN
More informationAnti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationVPN-1 Power/UTM. Administration guide Version NGX R
VPN-1 Power/UTM Administration guide Version NGX R65.2.100 January 15, 2009 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationBGP/MPLS VPN Technical White Paper
V300R001C10 BGP/MPLS VPN Technical White Paper Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or
More information[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions
[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationdraft-aoun-mgcp-nat-package-02.txt
Internet Draft C.Aoun Category Informational M. Wakley T.Sassenberg Nortel Networks Expires on July 28 2003 February 28 2003 A NAT package for MGCP NAT traversal < > Status of this Memo This document is
More informationUnofficial IRONTON ITSP Setup Guide
September 13 Unofficial IRONTON ITSP Setup Guide Author: Zultys Technical Support This unofficial configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone System
More informationCDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol
CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK
More informationImplementing SBC Firewall Traversal and NAT
CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the
More informationHUAWEI TE Mobile&TE Desktop V100R001C10. Product Overview. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
V100R001C10 Issue 01 Date 2014-10-10 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More information8.4 IMS Network Architecture A Closer Look
8.4 IMS Network Architecture A Closer Look 243 The anchoring of the media in TrGW also has an implicit topology-hiding effect. Without anchoring, the SDP answer provided to the other network would contain
More informationMySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT
s MySip.ch SIP Network Address Translation () SIP Architecture with Version 1.0 Issued by DS MS, Software house Albisriederstr. 245, CH-8047 Zurich Copyright Siemens Schweiz AG 2004 All Rights Reserved.
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Configuring Session Initiated Protocol over Port Network Address Translation for Avaya 4602 SIP IP Telephones using the Kagoor VoiceFlow 200 Application Layer
More informationNAT Traversal for VoIP
NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: solomon@ipv6.club.tw.tw 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download
More informationHWTACACS Technology White Paper
S Series Switches HWTACACS Technology White Paper Issue 1.0 Date 2015-08-08 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationThinkTel ITSP with Registration Setup
January 13 ThinkTel ITSP with Registration Setup Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone System with ThinkTel
More informationInternet Engineering Task Force (IETF) Request for Comments: 7604 Category: Informational. September 2015
Internet Engineering Task Force (IETF) Request for Comments: 7604 Category: Informational ISSN: 2070-1721 M. Westerlund Ericsson T. Zeng PacketVideo Corp September 2015 Comparison of Different NAT Traversal
More informationS Series Switch. Cisco HSRP Replacement. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Cisco HSRP Replacement Issue 01 Date 2013-08-05 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior
More informationAgile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationTroubleshooting One Way Voice Issues
Troubleshooting One Way Voice Issues Document ID: 5219 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solutions Ensure That IP Routing Is Enabled on the Cisco IOS
More informationVirtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 21 Date 2018-09-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationEnterprise Data Communication Products. Feature Description - IP Service. Issue 05 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 05 Date 2013-04-25 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationVoice over IP (VoIP)
Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationWhite Paper. Huawei Campus Switches VXLAN Technology. White Paper
White Paper Huawei Campus Switches VXLAN Technology White Paper 1 Terms Abbreviation VXLAN NVo3 BUM VNI VM VTEP SDN Full English Name Virtual Extensible Local Area Network Network Virtualization over L3
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationPart Number: HG532s Home Gateway Product Description. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Part Number: 203192 HG532s Home Gateway Issue 01 Date 2012-03-26 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any
More informationInternet Networking recitation #
recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.
More informationDomain Name Service. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationCommon Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL
The following components of the Cisco Unified Border Element are common to all of the configuration profile examples in this document. Secure Media Adjacencies Call Policies CAC Policies SIP Profiles 5
More informationRequest for Comments: 3989 Category: Informational T. Taylor Nortel February Middlebox Communications (MIDCOM) Protocol Semantics
Network Working Group Request for Comments: 3989 Category: Informational M. Stiemerling J. Quittek NEC T. Taylor Nortel February 2005 Status of This Memo Middlebox Communications (MIDCOM) Protocol Semantics
More informationSBC Deployment Guide Architecture Options and Configuration Examples
Enterprise Session Border Controllers Mediant E-SBC Series AudioCodes SBC Deployment Guide Architecture Options and Configuration Examples Version 6.4 April 2012 Document # LTRT-31620 Deployment Guide
More informationCUCM 10.5 / CUBE 9.5. BT SIP Trunk Configuration Guide. 1 BT SIP Trunk Configuration Guide
1 BT SIP Trunk Configuration Guide CUCM 10.5 / CUBE 9.5 BT SIP Trunk Configuration Guide This document covers service specific configuration required for interoperability with the BT SIP Trunk service.
More informationesdk Storage Plugins 1.0.RC4 Compilation Guide 01(vRO) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
1.0.RC4 Issue 01 Date 2017-04-06 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationPreface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone
VoIP quality and performance issues Delay Jitter Packet loss Echo and talk overlap Approaches to maintaining VoIP quality Network-level QoS VoIP codecs VoIP applications and services Fax Emergency numbers
More informationConfiguration Guide IP-to-IP Application
Multi-Service Business Gateways Enterprise Session Border Controllers VoIP Media Gateways Configuration Guide IP-to-IP Application Version 6.8 November 2013 Document # LTRT-40004 Configuration Guide Contents
More informationIPsec NAT Transparency
The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationApplication Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0
Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These Application Notes describe the steps to configure trunking
More informationBT SIP Trunk Configuration Guide
CUCM 9.1 BT SIP Trunk Configuration Guide This document covers service specific configuration required for interoperability with the BT SIP Trunk service. Anything which could be considered as normal CUCM
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More information[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions
[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationTable of Contents 1 IKE 1-1
Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration
More informationElastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationP2PSIP, ICE, and RTCWeb
P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment
More informationQuidway S5700 Series Ethernet Switches V100R006C01. Configuration Guide - Ethernet. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.
V100R006C01 Issue 02 Date 2011-11-21 HUAWEI TECHNOLOGIES CO., LTD. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationExpires: August 22, 2005 Microsoft R. Mahy Airspace February 21, 2005
BEHAVE Internet-Draft Expires: August 22, 2005 J. Rosenberg Cisco Systems C. Huitema Microsoft R. Mahy Airspace February 21, 2005 Simple Traversal of UDP Through Network Address Translators (NAT) (STUN)
More informationNAT Tutorial. Dan Wing, IETF77, Anaheim March 21, 2010 V2.1
NAT Tutorial Dan Wing, dwing@cisco.com IETF77, Anaheim March 21, 2010 V2.1 1 Agenda NAT and NAPT Types of NATs Application Impact Application Layer Gateway (ALG) STUN, ICE, TURN Large-Scale NATs (LSN,
More informationH3C SecPath Series High-End Firewalls
H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210
More informationEP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: H04L 12/56 ( )
(19) (12) EUROPEAN PATENT APPLICATION (11) EP 1 760 963 A1 (43) Date of publication: 07.03.07 Bulletin 07/ (1) Int Cl.: H04L 12/6 (06.01) (21) Application number: 06018260.7 (22) Date of filing: 31.08.06
More informationPeer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal. R. Naber
Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal R. Naber April 22, 2005 Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal Research Assignment
More informationReserving N and N+1 Ports with PCP
Reserving N and N+1 Ports with PCP draft-boucadair-pcp-rtp-rtcp IETF 83-Paris, March 2012 M. Boucadair and S. Sivakumar 1 Scope Defines a new PCP Option to reserve a pair of ports (N and N+1) in a PCP-controlled
More informationAllstream NGNSIP Security Recommendations
Allstream NGN SIP Trunking Quick Start Guide We are confident that our service will help increase your organization s performance and productivity while keeping a cap on your costs. Summarized below is
More informationHuawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.
Huawei FusionCloud Desktop Solution 5.1 Resource Reuse Technical White Paper Issue 01 Date 2014-03-26 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced
More informationNetwork Configuration Guide
Cloud VoIP Network Configuration PURPOSE This document outlines the recommended VoIP configuration settings for customer provided Firewalls and internet bandwidth requirements to support Mitel phones.
More informationDesktop sharing with the Session Initiation Protocol
Desktop sharing with the Session Initiation Protocol Willem Toorop willem.toorop@os3.nl February 25, 2009 How can application and desktop sharing, initiated by SIP, be realised in existing SIP infrastructure
More informationAnti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 11 Date 2018-05-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationA Flow Label Based QoS Scheme for End-to-End Mobile Services
A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract
More informationNetwork Address Translator Traversal Using Interactive Connectivity Establishment
HELSINKI UNIVERSITY OF TECHNOLOGY Department of Communications and Networking S-38.3138 Networking Technology, Special Assignment Veera Andersson Network Address Translator Traversal Using Interactive
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,
More informationAPP NOTES TeamLink and Firewall Detect
APP NOTES TeamLink and Firewall Detect May 2017 Table of Contents 1. Overview... 4 1.1 When is TeamLink Used?... 4 1.2 Onsight Connect Solution Architecture... 4 1.3 Three Stages of Onsight Connectivity...
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP LTM for SIP Traffic Management. Archived
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP LTM for SIP Traffic Management Table of Contents Table of Contents Configuring the BIG-IP LTM for SIP traffic management Product versions and revision
More informationAn IP Network: Application s View. SIP & NATs / Firewalls. An IP Network: Router s View. Reminder: Internet Architecture
An IP : Application s View SIP & s / Firewalls The primary purpose of firewalls has always been to shield buggy code from bad guys. Steve ellovin, IETF Security AD Source IP Address 1.2.3.4 Source Port
More informationIngate Firewall & SIParator Product Training. SIP Trunking Focused
Ingate Firewall & SIParator Product Training SIP Trunking Focused Common SIP Applications SIP Trunking Remote Desktop Ingate Product Training Common SIP Applications SIP Trunking A SIP Trunk is a concurrent
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationFreeSWITCH as a Kickass SBC. Moises Silva Manager, Software Engineering
FreeSWITCH as a Kickass SBC Moises Silva Manager, Software Engineering FreeSWITCH as a Kickass SBC Moises Silva Manager, Software Engineering Moises Silva
More informationConfiguration Note. Connecting XO Communications SIP Trunking Service to Microsoft Lync Server Using
Mediant 800 MSBG E-SBC, Mediant 1000 MSBG E-SBC and Mediant 3000 E-SBC Media Gateway Configuration Note Connecting XO Communications SIP Trunking Service to Microsoft Lync Server 2010 Using AudioCodes
More informationH3C SecPath Series High-End Firewalls
H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATH1000FE&SECBLADEII-CMW520-R3166 SECPATH5000FA-CMW520-R3206
More informationFIREWALL SETUP AND NAT CONFIGURATION GUIDE FOR H.323 / SIP ROOM SYSTEMS BLUEJEANS 2018
FIREWALL SETUP AND NAT CONFIGURATION GUIDE FOR H.323 / SIP ROOM SYSTEMS BLUEJEANS 2018 0 H.323 / SIP Room Systems Table of Contents 1. How to setup Firewall and NAT to work with Blue Jeans Network - page
More informationApplication Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Tidal Communications tnet Business VoIP with Avaya IP Office using SIP Registration - Issue 1.0 Abstract These Application Notes
More information