Network Access Transla0on - NAT
|
|
- Ilene Sanders
- 6 years ago
- Views:
Transcription
1 Network Access Transla0on - NAT
2 Foreword Those slides have been done by gathering a lot of informa0on on the net Ø Cisco tutorial Ø Lectures from other ins0tu0ons University of Princeton University of Standford 2
3 Applica0ons Gateways Hosts have unique iden0fiers and are linked through devices execu0ng simple packet forwarding Ø Hosts are reachable from anywhere at any0me Ø Forwarding devices only forward packet. Do not modify nor filter packets Middleboxes sit between two end hosts Ø Middleboxes violate the end- to- end principle Ø Middleboxes take packets and may modify the traffic behavior, and even, the content of packets Ø End hosts might be unaware of the presence of middleboxes 3
4 Middleboxes as a solu0on to Internet challenges Security Ø DoS, DDoS aqacks Ø Virus, backdoors, Performance Ø Large propaga0on delays Ø Large bandwidth Mobility Ø Mobile devices (smartphones, connected objects, ) Private LANs Private IP addresses Source: hqp://bgp.potaroo.net/ 4
5 Advantages and Disadvantages Advantages Disadvantages New networking services Ø Keeping the same network infrastructure Ø Keeping the same addressing scheme Break the E2E principle Frequently hard to debug New devices per service Network complexity 5
6 Example of middleboxes Firewalls Intrussion detec0on systems (IDS) Transparent Web Proxies Performance Enhancing Proxies Traffic shappers Network Address Transla0on 6
7 Origin of NATs IP address space deple0on Pervasiveness of the Internet Ø Difficult to get as many needed IP global addresses Ø Share a single address between mul0ple hosts, without modifying the end hosts NAT has been proposed as a short- term, temporary, solu0on Ø NATs got widely deployed Ø A limit to the IPv6 success 7
8 Network Address Transla0on Inside Private LAN Inside Inside Local IP P NAT Outside Local IP G Outside Outside 8
9 IP address transla0on Make the inside part look like a single IP address Ø Private IP addresses Outgoing traffic Ø Replace the source IP address with IP G Incoming traffic Ø Replace the des0na0on IP address with IP source of the original hosts What about checksum?? 9
10 NAT Transla0on Table The NAT devices maintain a transla0on table which tells which internal hosts are communica0ng with a given external server Ø Create an entry upon seeing an outgoing packet Crea0ng permanent mappings also Ø How to remove unused entries? Keep 0mer 0meouts What about idle connec0ons? Traffic ini0ated inside the LAN successfully reaches the external hosts What about traffic ini0ated outside the LAN?
11 NAT benefits and drawbacks Benefits Ø Communicate private LANs with the global Internet Ø No need to renumber hosts in case of change of the ISP Ø Communicate 2 private LANs with conflic0ng IP addresses Drawbacks Ø Again, problem with E2E principles A lot of Internet bugs are introduced by middleboxes Ø Needs sta0c mapping to set up servers behind NATs Ø Hosts behind NATs cannot be pinged Ø Limits the development of IPv6, the clean solu0on to the address deple0on problem 11
12 Shortcoming of NAT Transla0on Table What happen when two different internal hosts want to communicate with the same external host Ø Traffic from inside to outside OK Ø Traffic from outside to inside??
13 Port- Transla0ng NATs Port- transla0ng NATs or Network Address Port Transla0on expand the table to include addi0onal fields Ø PT- NATs might translate both the IP and the Port number to avoid ambiguity Enable many- to- one communica0on Inside Inside Global Port Outside Outside Local Port Outside Outside Global Port Transport Protocol TCP TCP TCP TCP 13
14 Address and Port transla0on Example : : : :80 NAT Inside Outside 14
15 Transla0on Methods Full Cone NAT From PortX From PortY Port5000 Port20000 NAT From PortA Inside From PortB 15
16 Transla0on Methods (Address)- Restricted Cone NAT From PortX From PortY Port5000 Port20000 NAT From PortA Inside From PortB 16
17 Transla0on Methods Port- Restricted Cone NAT (1) From PortX From PortY Port5000 Port20000 NAT From PortA Inside From PortB 17
18 Transla0on Methods Port- Restricted Cone NAT (2) From PortX From PortY Port5000 Port20000 NAT From PortA Inside From PortB 18
19 Transla0on Methods Symmetric NAT (1) From PortX From PortY Port5000 Port20000 NAT From PortA Inside From PortB 19
20 Transla0on Methods Symmetric NAT (2) From PortX From PortY Port5000 Port20000 Port20001 NAT From PortA Inside From PortB 20
21 NAT Traversal 21
22 Problem and solu0ons to NAT traversal Problem: the inside host must ini0ate the connec0on with the outside host to let data flow Ø Servers at the private LAN will not receive incoming connec0ons, eg. Preven0ng the right execu0on of P2P applica0ons. Solu0ons: Ø Individual solu0ons: manual mapping (port forwarding) Ø NAT- behavior based approaches hole punching using STUN (IETF - RFC 3489) Ø External Data- Relay TURN (IETF - Dran) Ø Frameworks integra0ng several techniques ICE as the most promising for VoIP (IETF Dran) 22
23 STUN Session Traversal U0li0es for NAT (STUN) RFC 5389 The client sends a biding request to a STUN server The STUN server responds with a success message providing the IP address and port as seen by the server Messages are exchanges in UDP The client uses the informa0on provided by the STUN server to provide its external iden0ty to a 0er server providing a networking service (e.g. SIP) STUN works well with Full Cone NATs, Address Restricted Cone NAT, Port Restricted Cone NAT STUN does not work with symmetric NATs 23
24 STUN and hole punching determine external IP address/port and exchange it through Rendezvous Point both hosts send packets towards the other host outgoing packet creates hole establish connec0on hole is created by first packet From hqps:// masterkurs_rechnernetze/ws0910/mnet_04_network_layer_nat.pdf 24
25 Symmetric NAT traversal Connec0ons from inside LAN to outside Internet is possible Traversal Using Relays around NAT - TURN Ø Hosts from private LANs connect to a relay server Ø The relay server forwards packets between hosts in private LANs Skype, one of the most famous data relay with TURN NAT Server Relay NAT 25
Outline today. MPLS Overview. We saw tunneling on top of IP. What about tunneling below IP? Introducing Mul<- Protocol Label Switching (MPLS) 3/21/11
UNDERLAYS and MIDDLEBOXES Outline today Network- layer principles Globally unique iden
More informationNetwork Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example
Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying
More informationFirewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.
Firews and NAT 1 Firews By conventional definition, a firew is a partition made of fireproof material designed to prevent the spread of fire from one part of a building to another. firew isolates organization
More informationNetwork Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013
Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic
More informationInternet Networking recitation #
recitation # UDP NAT Traversal Winter Semester 2013, Dept. of Computer Science, Technion 1 UDP NAT Traversal problems 2 A sender from the internet can't pass a packet through a NAT to a destination host.
More informationNetwork Address Translators (NATs) and NAT Traversal
Network Address Translators (NATs) and NAT Traversal Ari Keränen ari.keranen@ericsson.com Ericsson Research Finland, NomadicLab Outline Introduction to NATs NAT Behavior UDP TCP NAT Traversal STUN TURN
More informationNAT (NAPT/PAT), STUN, and ICE
NAT (NAPT/PAT), STUN, and ICE `Structure of ice II, viewed along the hexagonal c-axis. Hydrogen bonds between the water molecules are shown as dashed lines. Lengths are in angstroms.'' (Hobbs, 1970, p.
More informationLecture 10: TCP Friendliness, DCCP, NATs, and STUN
Lecture 10: TCP Friendliness, DCCP, NATs, and STUN TCP Friendliness Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do
More informationLecture 12: TCP Friendliness, DCCP, NATs, and STUN
Lecture 12: TCP Friendliness, DCCP, NATs, and STUN Congestion Control TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit
More informationOn the Applicability of knowledge based NAT-Traversal for Home Networks
On the Applicability of knowledge based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany
More informationOn the Applicability of Knowledge Based NAT-Traversal for Home Networks
On the Applicability of Knowledge Based NAT-Traversal for Home Networks Andreas Müller, Andreas Klenk, and Georg Carle University of Tübingen, Computer Networks and Internet, Sand 13, 72076 Tübingen, Germany
More informationUNIT 12A The Internet: Fundamentals
UNIT 12A The Internet: Fundamentals 1 What is the Internet? The Internet is a system to deliver data (bits) from one computa?onal device to another. No one en?ty controls/owns the Internet. The Internet
More informationCongestion Control. Lecture 12: TCP Friendliness, DCCP, NATs, and STUN. Chiu Jain Phase Plots. Fair A=B. Responding to Loss. Flow B rate (bps) t 1 t 3
Congestion Control Lecture 12: TCP Friendliness, DCCP, s, and STUN TCP dynamically adapts its rate in response to congestion AIMD causes flows to converge to fair goodput But how do losses (e.g., bit errors)
More informationTechnical White Paper for NAT Traversal
V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationNAT Traversal for VoIP
NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: solomon@ipv6.club.tw.tw 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download
More informationLecture 11: Middleboxes and NAT (Duct tape for IPv4)
CSCI-351 Data communication and Networks Lecture 11: Middleboxes and NAT (Duct tape for IPv4) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and David Choffnes's class Middleboxes
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationRealtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015
Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or
More informationNAT Tutorial. Dan Wing, IETF77, Anaheim March 21, 2010 V2.1
NAT Tutorial Dan Wing, dwing@cisco.com IETF77, Anaheim March 21, 2010 V2.1 1 Agenda NAT and NAPT Types of NATs Application Impact Application Layer Gateway (ALG) STUN, ICE, TURN Large-Scale NATs (LSN,
More informationHow to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
More informationInternet Technology 4/29/2013
Session Initiation Protocol (SIP) Internet Technology 14. VoIP and Traversal Paul Krzyzanowski Rutgers University Spring 2013 Dominant protocol for Voice over IP (VoIP) RFC 3261 llows a call to be established
More informationMySip.ch. SIP Network Address Translation (NAT) SIP Architecture with NAT Version 1.0 SIEMENS SCHWEIZ AKTIENGESELLSCHAFT
s MySip.ch SIP Network Address Translation () SIP Architecture with Version 1.0 Issued by DS MS, Software house Albisriederstr. 245, CH-8047 Zurich Copyright Siemens Schweiz AG 2004 All Rights Reserved.
More informationJournal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication
More informationFrom POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno
Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan
More informationCOSC 301 Network Management
COSC 301 Network Management Lecture 21: Firewalls & NAT Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 21: Firewalls & NAT 1 Today s Focus How to protect an intranet? -- Firewall --
More informationUDP NAT Traversal. CSCI-4220 Network Programming Spring 2015
UDP NAT Traversal CSCI-4220 Network Programming Spring 2015 What is NAT Traversal? NAT traversal means establishing a connection between two hosts when one or both is behind NAT. Many of today s network
More informationNetwork Administra0on
Network Administra0on (Introduc0on) Administración en Red 1 Index Introduc0on (TCP/IP) Network Interface Link Layer Network Layer Monitoring/Test Administración en Red 2 Introduc0on (TCP/IP) Protocol Suite,
More informationDesktop sharing with the Session Initiation Protocol
Desktop sharing with the Session Initiation Protocol Willem Toorop willem.toorop@os3.nl February 25, 2009 How can application and desktop sharing, initiated by SIP, be realised in existing SIP infrastructure
More informationAdvanced Computer Networks
Advanced Computer Networks VoIP Jianping Pan Summer 2007 6/6/07 csc485b/586b/seng480b 1 Feedback on reading & summaries Be aware of deadlines the day before the presentation Read papers not someone else's
More informationComputer Networks. Course Reference Model. Topic. Error Handling with ICMP. ICMP Errors. Internet Control Message Protocol 12/2/2014.
Course Reference Model Computer Networks 7 lication Provides functions needed by users Zhang, Xinyu Fall 2014 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School
More informationCSCI 1800 Cybersecurity and Interna4onal Rela4ons. Design and Opera-on of the Internet John E. Savage Brown University
CSCI 1800 Cybersecurity and Interna4onal Rela4ons Design and Opera-on of the Internet John E. Savage Brown University Outline Network security The link layer The network layer The transport layer Denial
More informationCS519: Computer Networks. Lecture 7: Apr 14, 2004 Firewalls and NATs
: Computer Networks Lecture 7: Apr 14, 2004 Firewalls and NATs Network security topics I m going to limit work security to three topic areas: Network access issues (user or host authentication, and VPNs)
More informationPeer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal. R. Naber
Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal R. Naber April 22, 2005 Peer-to-Peer Connectivity Using Firewall and Network Address Translator Traversal Research Assignment
More informationInternet Engineering Task Force (IETF) Request for Comments: 7604 Category: Informational. September 2015
Internet Engineering Task Force (IETF) Request for Comments: 7604 Category: Informational ISSN: 2070-1721 M. Westerlund Ericsson T. Zeng PacketVideo Corp September 2015 Comparison of Different NAT Traversal
More informationCSE/EE 461: Introduction to Computer Communications Networks Autumn Module 9
CSE/EE 461: Introduction to Computer Communications Networks Autumn 2010 Module 9 IP Addressing John Zahorjan zahorjan@cs.washington.edu 534 Allen Center Last Time: Addresses Imply Location 142.150.210.12
More informationSai Praveen Sadhu George Mason University Fall 2014, ECE 646
Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 VoIP - > Voice over IP Technology to send voice and mul9media over Internet Protocol. Skype is a good example of VoIP. Skype was developed in
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More informationUNIX Sockets. COS 461 Precept 1
UNIX Sockets COS 461 Precept 1 Socket and Process Communica;on application layer User Process Socket transport layer (TCP/UDP) OS network stack network layer (IP) link layer (e.g. ethernet) Internet Internet
More informationFrameworks. Data Relay. Skype. Recap
Data Relay relaying (used in Skype) NATed client establishes connection to relay External client connects to relay relay bridges packets between to connections Traversal using Relay NAT (TURN) as IETF
More informationConfigure Basic Firewall Settings on the RV34x Series Router
Configure Basic Firewall Settings on the RV34x Series Router Objective The primary objective of a firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationCategory: Informational M.I.T. D. Kegel kegel.com March State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)
Network Working Group Request for Comments: 5128 Category: Informational P. Srisuresh Kazeon Systems B. Ford M.I.T. D. Kegel kegel.com March 2008 Status of This Memo State of Peer-to-Peer (P2P) Communication
More informationLecture 14: DHCP and NAT
Lecture 14: DHCP and NAT Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks IPv4 Address Shortage Classless IP addressing solved IPv4 address shortage
More informationANTS - A Framework for Knowledge based NAT Traversal
- A Framework for Knowledge based NAT Traversal Andreas Müller, Andreas Klenk and Georg Carle Chair for Network Architectures and Services Technische Universität München {mueller, klenk, carle}@net.in.tum.de
More informationNetwork Address Translator Traversal Using Interactive Connectivity Establishment
HELSINKI UNIVERSITY OF TECHNOLOGY Department of Communications and Networking S-38.3138 Networking Technology, Special Assignment Veera Andersson Network Address Translator Traversal Using Interactive
More informationestos STUN/TURN Server
estos STUN/TURN Server 5.1.110.44786 1 Welcome to estos STUN/TURN Server...4 1.1 Chapter Overview...4 2 Requirements...5 3 Operating Mode...6 3.1 Components and terms...6 3.2 Use cases...7 4 Installation
More informationPolicy-preserving Middlebox Placement in SDN-Enabled Data Centers
Policy-preserving Middlebox Placement in SDN-Enabled Data Centers Bin Tang Computer Science Department California State University Dominguez Hills Some slides are from www.cs.berkeley.edu/~randy/courses/cs268.f08/lectures/22-
More informationABC SBC: Secure Peering. FRAFOS GmbH
ABC SBC: Secure Peering FRAFOS GmbH Introduction While an increasing number of operators have already replaced their SS7 based telecommunication core network with a SIP based solution, the interconnection
More information[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions
[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationChapter 15 IPv6 Transition Technologies
Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationGoals of Today s Lecture. Transla'ng Addresses. Separa'ng Names and IP Addresses. Separa'ng IP and MAC Addresses
Goals of Today s Lecture Transla'ng ddresses Three different kinds of addresses Host names (e.g., www.cnn.com) IP addresses (e.g., 64.236.16.20) MC addresses (e.g., 00-15- C5-49- 04-9) Protocols for transla'ng
More informationApplication Note Asterisk BE with Remote Phones - Configuration Guide
Application Note Asterisk BE with Remote Phones - Configuration Guide 15 January 2009 Asterisk BE - Remote SIP Phones Table of Contents 1 ASTERISK BUSINESS EDITION AND INGATE... 1 1.1 REMOTE SIP PHONE
More informationTransla'ng Addresses. Goals of Today s Lecture
Transla'ng ddresses 1 Goals of Today s Lecture Three different kinds of addresses Host names (e.g., www.cnn.com) IP addresses (e.g., 64.236.16.20) MC addresses (e.g., 00-15- C5-49- 04-9) Protocols for
More informationICE-Lite Support on CUBE
Interactive Connectivity Establishment (ICE) is a protocol for Network Address Translator (NAT) traversal for UDP-based multimedia sessions established with the offer-answer model. ICE makes use of the
More informationCustomer Edge Switching & Realm Gateway Tutorial Session Day 2
Customer Edge Switching & Realm Gateway Tutorial Session Day 2 Jesus Llorente Santos jesus.llorente.santos@aalto.fi www.re2ee.org August 21 st, 2015 Outline Recap from yesterday Current Internet Model
More informationAPP NOTES TeamLink and Firewall Detect
APP NOTES TeamLink and Firewall Detect May 2017 Table of Contents 1. Overview... 4 1.1 When is TeamLink Used?... 4 1.2 Onsight Connect Solution Architecture... 4 1.3 Three Stages of Onsight Connectivity...
More informationNetwork Address Translation
10 Network Address Translation This chapter introduces Network Address Translation (NAT) and looks at the issues and challenges involved in making SIP and other Internet communications protocols work through
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More informationNetwork Layer II. Getting IP addresses. DHCP client-server scenario. DHCP client-server scenario. C compiler. You writing assignment 2
Network Layer II Still chapter 4 in the textbook C compiler You writing assignment 2 Getting IP addresses ARP is the simplest way, which we will barely discuss (now) It s a mapping between Ethernet MAC
More informationYealink VCS Network Deployment Solution
Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating
More informationCDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol
CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK
More informationNetwork Configuration Example
Network Configuration Example Configuring Stateful NAT64 for Handling IPv4 Address Depletion Release NCE0030 Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationCompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]
s@lm@n CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 3: Troubleshooting 140
More informationSwitching and bridging
Switching and bridging CSCI 466: Networks Keith Vertanen Fall 2011 Last chapter: Overview Crea7ng networks from: Point- to- point links Shared medium (wireless) This chapter: SoCware and hardware connec7ng
More information[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0
[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0 Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
More informationIn Defence of NATs. Geoff Huston APNIC. IEEE Global Internet Symposium, May 2017
In Defence of NATs Geoff Huston APNIC IEEE Global Internet Symposium, May 2017 The Architecture of the 1990 Internet Dumb Network, Smart Hosts Remove all the functionality from the network apart from forwarding
More informationHP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls
HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 7.4 Firewalls CSC 474/574 Dr. Peng Ning 1 Outline What are firewalls? Types Filtering Packet filtering Session filtering Proxy Circuit Level Application Level
More informationSecurity Enhancement by Detecting Network Address Translation Based on Instant Messaging
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Jun Bi, Miao Zhang, and Lei Zhao Network Research Center Tsinghua University Beijing, P.R.China, 100084 junbi@tsinghua.edu.cn
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More informationAdvanced Linux System Administra3on
Advanced Linux System Administra3on Subject 11. Network administra3on (Introduc3on). Pablo Abad Fidalgo José Ángel Herrero Velasco Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica
More informationTransition Strategies from IPv4 to IPv6: The case of GRNET
Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering
More informationIntroduction to Network Address Translation
Introduction to Network Address Translation Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationIf your router or firewall is SIP-aware or SIP ALG-enabled, you must turn it off (so the device doesn t interfere with any signalling).
BT Cloud Voice Firewalls and LAN You need to make sure that your BT Cloud Voice service connects to the access network across your internal data network so you can make and receive consistently high quality
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationIf your router or firewall is SIP-aware or SIP ALG-enabled, you must turn it off (so the device doesn t interfere with any signalling).
BT Cloud Voice Firewalls and LAN You need to make sure that your BT Cloud Voice service connects to our network across your internal data network so you can make and receive consistently high quality calls.
More informationEyeball Any-Firewall Technology. VoIP, video telephony, and the industry s highest call completion rate
VoIP, video telephony, and the industry s highest call completion rate www.eyeball.com Copyright 2005 Seamless VoIP and Video Telephony Internet-based VoIP and video telephony is poised for phenomenal
More informationIf your router or firewall is SIP-aware or SIP ALG-enabled, you must turn it off (so the device doesn t interfere with any signalling).
BT Cloud Voice Firewalls and LAN You need to make sure that your BT Cloud Voice service connects to our network across your internal data network so you can make and receive consistently high quality calls.
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized
More informationAdvanced Computer Networks. Mobility Support
Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationImplementation Guide - VPN Network with Static Routing
Implementation Guide - VPN Network with Static Routing This guide contains advanced topics and concepts. Follow the links in each section for step-by-step instructions on how to configure the following
More informationHow to Configure a Remote Management Tunnel for an F-Series Firewall
How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.
More informationReal-Time Communications for the Web. Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund
Real-Time Communications for the Web Presentation of paper by:cullen Jennings,Ted Hardie,Magnus Westerlund What is the paper about? Describes a peer-to-peer architecture that allows direct,interactive,rich
More informationP2PSIP, ICE, and RTCWeb
P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment
More information20-CS Cyber Defense Overview Fall, Network Basics
20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter
More informationEE 122 Fall 2010 Discussion Section III 5 October 2010
EE 122 Fall 2010 Discussion Section III 5 October 2010 http://www.cs.berkeley.edu/~alspaugh/ee122/fa10/ Question 1: IP Header This is the IPv4 header structure we will need for the problems Kisco Inc.
More informationIntroduc)on to Computer Networks
Introduc)on to Computer Networks COSC 4377 Lecture 7 Spring 2012 February 8, 2012 Announcements HW3 due today Start working on HW4 HW5 posted In- class student presenta)ons No TA office hours this week
More informationElas%c Load Balancing, Amazon CloudWatch, and Auto Scaling Sco) Linder
Elas%c Load Balancing, Amazon, and Auto Scaling Sco) Linder Overview Elas4c Load Balancing Features/Restric4ons Connec4on Types Listeners Configura4on Op4ons Auto Scaling Launch Configura4ons Scaling Types
More informationNetwork Address Translation. All you want to know about
Network Address Translation All you want to know about (C) Herbert Haas 2005/03/11 Reasons for NAT Mitigate Internet address depletion Save global addresses (and money) Conserve internal address plan TCP
More informationNetwork Interconnection
Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture
More information[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions
[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther
More informationAPP NOTES Onsight Connect Network Requirements
APP NOTES Onsight Connect Network Requirements May 2017 Table of Contents 1. Overview... 4 1.1 Onsight Connect Solution Architecture... 4 1.2 Three Stages of Onsight Connectivity... 5 2. Web (HTTP/S) Proxy
More informationIPsec NAT Transparency
The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities
More information