24
NAT and NAT Traversal SEng490 Directed Study Haoran Song Supervised by Dr. Jianping Pan

NAT and NAT Traversal

  • Upload
    nizana

  • View
    150

  • Download
    0

Embed Size (px)

DESCRIPTION

NAT and NAT Traversal. SEng490 Directed Study Haoran Song Supervised by Dr. Jianping Pan. Outline. Problems of NAT in the real world NAT Traversal in our research Conclusion. Firewalls and NAT. Four Types of NAT. Full Cone NAT IP Restricted NAT Port Restricted NAT Symmetric NAT - PowerPoint PPT Presentation

Citation preview

Page 1: NAT and NAT Traversal

NAT and NAT Traversal

SEng490 Directed StudyHaoran Song

Supervised by Dr. Jianping Pan

Page 2: NAT and NAT Traversal

Outline

• Problems of NAT in the real world

• NAT Traversal in our research

• Conclusion

Page 3: NAT and NAT Traversal

Firewalls and NAT

Page 4: NAT and NAT Traversal

Four Types of NAT

1. Full Cone NAT2. IP Restricted NAT3. Port Restricted NAT4. Symmetric NATThen let us see how these four NATs

work?

Page 5: NAT and NAT Traversal

Full Cone: not very restricted

B

Page 6: NAT and NAT Traversal

IP Restricted NAT Has restrictions on incoming IP

Page 7: NAT and NAT Traversal

Port Restricted NAT Not only has restrictions on IP, but

also on Port

Page 8: NAT and NAT Traversal

Symmetric NAT Very restricted. New mapping for

each different connection.

Page 9: NAT and NAT Traversal

Problems caused by NAT So, When we do communication

with NAT, outside packets can not come in until inside packets go out first.

We need to find a way to overcome this problem and this technique is called NAT Traversal.

Page 10: NAT and NAT Traversal

NAT Traversal Our plan1. We need to know what NAT we are

behind2. Do NAT traversal according to the

identified NAT Therefore, two main parts in our

research1. NAT Detection2. NAT Traversal

Page 11: NAT and NAT Traversal

NAT Detection

We get the PolyNAT from Dr. Hoffman. It can emulates four different NATs.

Thanks to Dr. Hoffman and his students.

Page 12: NAT and NAT Traversal

NAT Detection Flow

Page 13: NAT and NAT Traversal

Example: Full Cone Detection

Page 14: NAT and NAT Traversal

NAT Traversal NAT Traversal

cone IP restricted port restricted symmetric

cone

IP restricted

port restricted

symmetric

A B

?

?

Page 15: NAT and NAT Traversal

Full Cone-Full Cone

Page 16: NAT and NAT Traversal

Full Cone-Full Cone: Scenario

Page 17: NAT and NAT Traversal

Full cone/restricted-restricted

Page 18: NAT and NAT Traversal

Full cone/restricted-restricted Scenario

Page 19: NAT and NAT Traversal

Full cone/IP restricted-symmetric

Page 20: NAT and NAT Traversal

Full cone/IP restricted-symmetric Scenario

Page 21: NAT and NAT Traversal

How does clients describe who they are

We build our own traversal commands We use XML to describe necessary

information and embed these descriptions in our traversal commands.

So, other clients get specified information about their peers by learning these XML contents.

Page 22: NAT and NAT Traversal

An example of a traversal command

Page 23: NAT and NAT Traversal

Conclusion We have implemented1. Full Cone – Full Cone2. Full/Restricted Cone – Restricted Cone3. Full/IP Restricted Cone – Symmetric The things we will do in the future1. Port Restricted Cone – Symmetric2. Symmetric – Symmetric

Page 24: NAT and NAT Traversal

NAT and NAT Traversal Questions?