- draft version - Behavior and Classification of NAT devices and implications for NAT Traversal - draft
نویسندگان
چکیده
For a long time, traditional client-server communication was the predominant communication paradigm of the Internet. Network Address Translation devices (NAT) emerged to help with the limited availability of IP addresses and were designed with the hypothesis of asymmetric connection establishment in mind. But with the growing success of peer-to-peer applications, this assumption is no longer true. Consequently NAT Traversal became a field of intensive research and standardization for enabling efficient operation of new services. This article provides a comprehensive overview of Network Address Translation and introduces established NAT Traversal techniques. A new categorization of applications into four NAT Traversal Service Categories helps to determine applicable techniques for NAT Traversal. The Interactive Connectivity Establishment (ICE) framework is categorized and a new framework is introduced that addresses scenarios that are not supported by ICE. Current results from a field test on NAT behavior and the success ratio of NAT Traversal techniques support the feasibility of this classification.
منابع مشابه
Internet - Draft Cisco
Session Traversal Utilities for (NAT) (STUN) draft-ietf-behave-rfc3489bis-11 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documen...
متن کاملBEHAVE Working Group Internet-Draft Obsoletes: 3489 (if approved) Intended status: Standards Track
Session Traversal Utilities for (NAT) (STUN) draft-ietf-behave-rfc3489bis-15 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documen...
متن کاملInternet - Draft STUN March 2007
Session Traversal Utilities for NAT (STUN) is a lightweight protocol that serves as a tool for application protocols in dealing with NAT traversal. It allows a client to determine the IP address and port Rosenberg, et al. Expires September 6, 2007 [Page 1] Internet-Draft STUN March 2007 allocated to them by a NAT and to keep NAT bindings open. It can also serve as a check for connectivity betwe...
متن کاملInternet Key Exchange (IKEv2) Protocol
This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations. This version of the IKE specification combines the contents of what IKEv2 draft-ietf-ipsec-ikev2-15.txt [Page 1] Internet-Draft August 13, 2004 were previously separate documents, including IS...
متن کاملNAT Traversal Capability and Keep-Alive Functionality with IPSec in IKEv2 Implementation
Since IPv4 Private Networks are behind NAT (Network Address Translation) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, we need to encapsulate it in UDP (User datagram Protocol) Packets. Hence, the Dual Stack Mobile IPv6 should support NAT Traversal and Detection. So for proper securing and fully functionality of NAT traversal, it should be IP Security Protected. P...
متن کامل