Nothing Special   »   [go: up one dir, main page]

skip to main content
RFC2663: IP Network Address Translator (NAT) Terminology and Considerations1999 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 August 1999
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

Network Address Translation is a method by which IP addresses are mapped from one realm to another, in an attempt to provide transparent routing to hosts. Traditionally, NAT devices are used to connect an isolated address realm with private unregistered addresses to an external realm with globally unique registered addresses. This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.

RFC Downloads

Cited By

  1. ACM
    Olson K, Wampler J and Keller E (2023). Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers, ACM Computing Surveys, 55:14s, (1-37), Online publication date: 31-Dec-2024.
  2. ACM
    Copik M, Böhringer R, Calotoiu A and Hoefler T FMI: Fast and Cheap Message Passing for Serverless Functions Proceedings of the 37th International Conference on Supercomputing, (373-385)
  3. Feng X, Li Q, Sun K, Fu C and Xu K (2021). Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID, IEEE/ACM Transactions on Networking, 30:1, (409-422), Online publication date: 1-Feb-2022.
  4. ACM
    Novo O (2018). Making Constrained Things Reachable, ACM Transactions on Internet Technology, 19:1, (1-21), Online publication date: 28-Feb-2019.
  5. Sun W, Zhang H, Cai L, Yu A, Shi J, Jiang J and Li F (2019). A Novel Device Identification Method Based on Passive Measurement, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  6. Lencse G and Répás S (2016). Performance analysis and comparison of four DNS64 implementations under different free operating systems, Telecommunications Systems, 63:4, (557-577), Online publication date: 1-Dec-2016.
  7. ACM
    Czyz J, Allman M, Zhang J, Iekel-Johnson S, Osterweil E and Bailey M (2014). Measuring IPv6 adoption, ACM SIGCOMM Computer Communication Review, 44:4, (87-98), Online publication date: 25-Feb-2015.
  8. ACM
    Ohara Y, Nishizuka K, Chinen K, Akashi K, Kohrin M, Muramoto E and Miyakawa S On the Impact of Mobile Network Delays on Connection Establishment Performance of a Carrier Grade NAT Device Proceedings of the 10th Asian Internet Engineering Conference, (1-8)
  9. ACM
    Czyz J, Allman M, Zhang J, Iekel-Johnson S, Osterweil E and Bailey M Measuring IPv6 adoption Proceedings of the 2014 ACM conference on SIGCOMM, (87-98)
  10. ACM
    Detal G, Hesmans B, Bonaventure O, Vanaubel Y and Donnet B Revealing middlebox interference with tracebox Proceedings of the 2013 conference on Internet measurement conference, (1-8)
  11. Raiciu C, Paasch C, Barre S, Ford A, Honda M, Duchene F, Bonaventure O and Handley M How hard can it be? designing and implementing a deployable multipath TCP Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (29-29)
  12. ACM
    Zúquete A and Frade C (2012). A new location layer for the TCP/IP protocol stack, ACM SIGCOMM Computer Communication Review, 42:2, (16-27), Online publication date: 29-Mar-2012.
  13. ACM
    Honda M, Nishida Y, Raiciu C, Greenhalgh A, Handley M and Tokuda H Is it still possible to extend TCP? Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, (181-194)
  14. ACM
    Bijwaard D, van Kleunen W, Havinga P, Kleiboer L and Bijl M Industry Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, (218-231)
  15. Lim H and Chung T A survey on privacy problems and solutions for VANET based on network model Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II, (74-88)
  16. ACM
    Lindsey M What went wrong? Proceedings of the 5th International Conference on Principles, Systems and Applications of IP Telecommunications, (1-3)
  17. ACM
    Zagorodnov D, Marzullo K, Alvisi L and Bressoud T (2009). Practical and low-overhead masking of failures of TCP-based servers, ACM Transactions on Computer Systems, 27:2, (1-39), Online publication date: 1-May-2009.
  18. ACM
    Hayes D, But J and Armitage G (2008). Issues with network address translation for SCTP, ACM SIGCOMM Computer Communication Review, 39:1, (23-33), Online publication date: 31-Dec-2009.
  19. ACM
    Tantayakul K, Kamolphiwong S and Angchuan T IPv6@HOME Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
  20. Chen W, Huang Y and Chao H (2008). NAT traversing solutions for SIP applications, EURASIP Journal on Wireless Communications and Networking, 2008, (1-9), Online publication date: 1-Jan-2008.
  21. Harris A, Miozzo M, Rossi M and Zorzi M Performance improvements in Ad Hoc networks through mobility groups and channel diversity Proceedings of the 3rd international conference on Wireless internet, (1-8)
  22. Topal C and Akinlar C Implementing IPv4+4 addressing architecture with IPv4 LSRR option for seamless peer-to-peer (P2P) communication Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications, (809-820)
  23. Tantayakul K, Elz R, Kamolphiwong S and Angchuan T Mobility mechanism between MIPv4 and MIPv6 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks, (196-201)
  24. Kim I and Yeom H Mixing heterogeneous address spaces in a single edge network Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services, (578-581)
  25. Xenakis C and Merakos L Vulnerabilities and possible attacks against the GPRS backbone network Proceedings of the First international conference on Critical Information Infrastructures Security, (262-272)
  26. ACM
    Kitahara R, Ueno H, Suzuki H, Ishikawa N, Komura T, Fujikawa K and Takagi H MAPT Proceedings of the 2006 international conference on Wireless communications and mobile computing, (785-790)
  27. ACM
    Henkel D, Dixon C, Elston J and Brown T A reliable sensor data collection network using unmanned aircraft Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality, (125-127)
  28. Lim H, Lee D, Kim T and Chung T An evaluation and analysis for IP VPN model in IPv6 transition environment Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (135-144)
  29. Park H, Lee T and Choo H Optimized path registration with prefix delegation in nested mobile networks Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (327-336)
  30. ACM
    Kaneda Y, Takahashi H, Saito M, Aida H and Tokuda H A challenge for reusing multiplayer online games without modifying binaries Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games, (1-9)
  31. Demerjian J, Hajjeh I, Badra M and Ferraz S A secure way to combine IPsec, NAT & DHCP Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (104-118)
  32. ACM
    Campos R and Ricardo M Dynamic autoconfiguration in 4G networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (7-11)
  33. Lee K and Choi H Bidirectional FSL3/4 on NEDIA (flow separation by layer 3/4 on network environment using dual IP addresses) Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (619-626)
  34. Walfish M, Stribling J, Krohn M, Balakrishnan H, Morris R and Shenker S Middleboxes no longer considered harmful Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (15-15)
  35. Rabinovich M and Wang H (2004). DHTTP, IEEE/ACM Transactions on Networking, 12:6, (1007-1020), Online publication date: 1-Dec-2004.
  36. Schmid S, Eggert L, Brunner M and Quittek J TurfNet Proceedings of the First international IFIP conference on Autonomic Communication, (94-114)
  37. Ylitalo J and Nikander P BLIND Proceedings of the 12th international conference on Security Protocols, (163-176)
  38. Aura T and Zugenmaier A Privacy, control and internet mobility Proceedings of the 12th international conference on Security Protocols, (133-145)
  39. ACM
    Bauer M New covert channels in HTTP Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (72-78)
  40. ACM
    Kravets R, Carter C and Magalhães L (2001). A cooperative approach to user mobility, ACM SIGCOMM Computer Communication Review, 31:5, (57-69), Online publication date: 1-Oct-2001.
  41. Borella M and Montenegro G RSIP Proceedings of the Workshop on Intelligence at the Network Edge, (3-3)
  42. ACM
    Wetherall D (1999). Active network vision and reality, ACM SIGOPS Operating Systems Review, 33:5, (64-79), Online publication date: 12-Dec-1999.
  43. ACM
    Wetherall D Active network vision and reality Proceedings of the seventeenth ACM symposium on Operating systems principles, (64-79)
Contributors
  • Advanced Micro Devices, Inc.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations