Many internet applications can be adversely affected when end nodes are not in the same address realm and seek the assistance of an IP Network Address Translator (NAT) enroute to bridge the realms. The NAT device alone cannot provide the necessary application/protocol transparency in all cases and seeks the assistance of Application Level Gateways (ALGs) where possible, to provide transparency. The purpose of this document is to identify the protocols and applications that break with NAT enroute. The document also attempts to identify any known workarounds. It is not possible to capture all applications that break with NAT in a single document. This document attempts to capture as much information as possible, but is by no means a comprehensive coverage. We hope the coverage provides sufficient clues for applications not covered.
RFC Downloads
Cited By
- Lischka J and Karl H RiaS Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures, (9-16)
- Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
- Atkinson R, Bhatti S and Hailes S A proposal for unifying mobility with multi-homing, NAT, & security Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (74-83)
- Ford B (2007). Structured streams, ACM SIGCOMM Computer Communication Review, 37:4, (361-372), Online publication date: 1-Oct-2007.
- Ford B Structured streams Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (361-372)
- Bi J, Zhang M and Zhao L Security enhancement by detecting network address translation based on instant messaging Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (962-971)
- Ford B, Strauss J, Lesniewski-Laas C, Rhea S, Kaashoek F and Morris R Persistent personal names for globally connected mobile devices Proceedings of the 7th symposium on Operating systems design and implementation, (233-248)
- Jelger C and Tschudin C Dynamic names and private address maps Proceedings of the 2006 ACM CoNEXT conference, (1-9)
- Ford B (2004). Unmanaged Internet Protocol, ACM SIGCOMM Computer Communication Review, 34:1, (93-98), Online publication date: 1-Jan-2004.
- Turányi Z, Valkó A and Campbell A (2003). 4+4, ACM SIGCOMM Computer Communication Review, 33:5, (43-54), Online publication date: 1-Oct-2003.
- Bellovin S A technique for counting natted hosts Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (267-272)
- Osman S, Subhraveti D, Su G and Nieh J The design and implementation of Zap Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading), (361-376)
- Osman S, Subhraveti D, Su G and Nieh J (2002). The design and implementation of Zap, ACM SIGOPS Operating Systems Review, 36:SI, (361-376), Online publication date: 31-Dec-2003.