Nothing Special   »   [go: up one dir, main page]

skip to main content
RFC3027: Protocol Complications with the IP Network Address Translator2001 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 January 2001
Reflects downloads up to 24 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

Many internet applications can be adversely affected when end nodes are not in the same address realm and seek the assistance of an IP Network Address Translator (NAT) enroute to bridge the realms. The NAT device alone cannot provide the necessary application/protocol transparency in all cases and seeks the assistance of Application Level Gateways (ALGs) where possible, to provide transparency. The purpose of this document is to identify the protocols and applications that break with NAT enroute. The document also attempts to identify any known workarounds. It is not possible to capture all applications that break with NAT in a single document. This document attempts to capture as much information as possible, but is by no means a comprehensive coverage. We hope the coverage provides sufficient clues for applications not covered.

RFC Downloads

Cited By

  1. ACM
    Lischka J and Karl H RiaS Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures, (9-16)
  2. ACM
    Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
  3. ACM
    Atkinson R, Bhatti S and Hailes S A proposal for unifying mobility with multi-homing, NAT, & security Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (74-83)
  4. ACM
    Ford B (2007). Structured streams, ACM SIGCOMM Computer Communication Review, 37:4, (361-372), Online publication date: 1-Oct-2007.
  5. ACM
    Ford B Structured streams Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (361-372)
  6. Bi J, Zhang M and Zhao L Security enhancement by detecting network address translation based on instant messaging Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (962-971)
  7. Ford B, Strauss J, Lesniewski-Laas C, Rhea S, Kaashoek F and Morris R Persistent personal names for globally connected mobile devices Proceedings of the 7th symposium on Operating systems design and implementation, (233-248)
  8. ACM
    Jelger C and Tschudin C Dynamic names and private address maps Proceedings of the 2006 ACM CoNEXT conference, (1-9)
  9. ACM
    Ford B (2004). Unmanaged Internet Protocol, ACM SIGCOMM Computer Communication Review, 34:1, (93-98), Online publication date: 1-Jan-2004.
  10. ACM
    Turányi Z, Valkó A and Campbell A (2003). 4+4, ACM SIGCOMM Computer Communication Review, 33:5, (43-54), Online publication date: 1-Oct-2003.
  11. ACM
    Bellovin S A technique for counting natted hosts Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (267-272)
  12. Osman S, Subhraveti D, Su G and Nieh J The design and implementation of Zap Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading), (361-376)
  13. ACM
    Osman S, Subhraveti D, Su G and Nieh J (2002). The design and implementation of Zap, ACM SIGOPS Operating Systems Review, 36:SI, (361-376), Online publication date: 31-Dec-2003.
Contributors
  • Advanced Micro Devices, Inc.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations