NAT (Network Address Translator) Atif Karamat In the name of God the most merciful and the most compassionate.

Slides:



Advertisements
Similar presentations
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
CS 4700 / CS 5700 Network Fundamentals Lecture 15: NAT (You Better Forward Those Ports) Revised 3/9/2013.
STUN Date: Speaker: Hui-Hsiung Chung 1.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CCNA 4 version 3.0.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
Firewall Configuration Strategies
1 Comnet 2010 Communication Networks Recitation 7 Lookups & NAT.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Subnetting.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Network Address Translation (NAT) CS-480b Dick Steflik.
Network Address Translation
COMS W COMS W Lecture 8. NAT, DHCP & Firewalls.
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Common Devices Used In Computer Networks
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
CS 540 Computer Networks II Sandy Wang
Mr. Mark Welton.  Firewalls are devices that prevent traffic from entering or leaving a network  Firewalls are often used between networks, or when.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
NAT and PAT. Topics RFCs 1597(obs by 1918), 1631,1917, 1918 & 1797 Network Address Translation – Static and Dynamic Port Address Translation Issues with.
1 Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP) Relates to Lab 7. Module about private networks and NAT.
NAT/PAT by S K SATAPATHY
AUTHOR DETAILS: CHANDRASEKHAR NAIDU MUTTINENI Mail: Blog:
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Network Layer IP Address.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CS 3700 Networks and Distributed Systems
An Analysis on NAT Security
© 2002, Cisco Systems, Inc. All rights reserved.
NAT : Network Address Translation
Network Address Translation (NAT)
Network Address Translation
CS 3700 Networks and Distributed Systems
Network Address Translation (NAT)
Introduction to Networking
Introducing To Networking
EEC-484/584 Computer Networks
By - Ricardo Sanchez, Ken Wolters and William Hibbard
Cabrillo College Building Cisco Remote Access Network
CS 3700 Networks and Distributed Systems
EEC-484/584 Computer Networks
Chapter 11: Network Address Translation for IPv4
Network Address Translation (NAT)
DHCP: Dynamic Host Configuration Protocol
Presentation transcript:

NAT (Network Address Translator) Atif Karamat In the name of God the most merciful and the most compassionate

1/8/2002 NAT Presentation2 NAT: Is it Necessary? n Scenario: One High Speed Dial Up, Multiple Devices How to Share ? –Solution: Gateway, but it requires that each device should have a unique IP address.. n IP addresses may become an endangered species very soon..

1/8/2002 NAT Presentation3 NAT:The Solution n NAT: –Instead of requiring that each device behind the gateway have a globally unique IP address, then, we can allocate private addresses to such devices and the gateway can then translate private IP addresses in all traffic that passes through the connection.

1/8/2002 NAT Presentation4 NAT: Scenario II n Network Security: –Denial of Service –Trojan Horse Attacks n NAT drops all unsolicited inbound traffic, which minimizes threats of this kind.

1/8/2002 NAT Presentation5 NAT:What is It? n NAT: NAT exists primarily to allow machine on a local network to share a single internet connection by replacing the source address of each outgoing message with the address assigned to the shared connection.

1/8/2002 NAT Presentation6 NAT: Components

1/8/2002 NAT Presentation7 NAT: Requires n To function NAT requires to: –Maintain a mapping between the original addressing information and the replaced addressing information. –Update the checksums to reflect the modifications made.

1/8/2002 NAT Presentation8 NAT: NAT Gateway n The main component is the NAT Gateway. A basic NAT Gateway has two interfaces. One interface to public network and the other interface to private network. n A more advanced NAT gateway may have multiple interface i.e corporate network.

1/8/2002 NAT Presentation9 NAT: Mapping Table

1/8/2002 NAT Presentation10 NAT:Operation n Traffic generated by client is received on the private interface. Gateway looks into the packet header, extracts the header in to and creates an entry in the mapping table. When the reply comes back, NAT looks up in the mapping table and directs the packet to the private client.

1/8/2002 NAT Presentation11 NAT: Application I n Address Port Translation: –Modification of source address and source ports (out going packets). –Modification of destination address and ports (Incoming packets).

1/8/2002 NAT Presentation12 NAT: Application II n Address Mapping: –A pool of private addresses is to be mapped to a smaller pool of public addresses. –Mapping from private to public addresses are established until no more addresses are available. –At this point, NAT may switch over to translation of port information.

1/8/2002 NAT Presentation13 NAT: Application III n Static Mapping: –To achieve security, the most important feature is that no unsolicited traffic may pass through NAT. But this feature prevents from hosting any service behind NAT. –Static mapping allows a static entry to be made in the mapping table which allows for unsolicited incoming traffic, only for that entry.

1/8/2002 NAT Presentation14 NAT: Constraints I n Limited Port Numbers. n Using IP addresses in Payload: –When the server on the public domain reads the address of the client in payload it doesn’t recognize the private address. n Using Port number in payload: –This may cause a failure because some time the port requested by a client is not available and so NAT is forced to assign some other port number.

1/8/2002 NAT Presentation15 NAT:Constraints II n Specifying port or range of ports: –The server side should not be programmed to expect traffic from a specific port because the client may not be able to get the specific port. n Assuming that IP address will remain same during conversation: –Mobile clients behind NAT

1/8/2002 NAT Presentation16 NAT: Constraint III n Assuming that Application can receive unsolicited Inbound connections: –Offering of any services behind NAT will fail. –Primary control session to a port is followed one or more secondary connection to different ports, which will fail.

1/8/2002 NAT Presentation17 NAT: Design Principles I n IP address and port information shouldn’t be embedded in the payload. n Use fully qualified domain names and/or user names where possible. Let DNS do the work. n Traffic shouldn’t be required to originate from a specific port number.

1/8/2002 NAT Presentation18 NAT: Design Principles II n Unsolicited inbound connections should be avoided. n Encrypted protocols should avoid the checksum cover the IP header, because NAT cannot decrypt and change the IP header information by default.

1/8/2002 NAT Presentation19 NAT: Application Level Gateway (ALG) n When a protocol is unable to pass cleanly through a NAT, the use of an Application Level Gateway (ALG) may still permit operation of the protocol.