Jump to content

NAT traversal

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by MichaelJanich (talk | contribs) at 03:38, 5 February 2014 (→‎Traversal across Symmetric NAT: c/e). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

NAT traversal is a general term for techniques that establish and maintain Internet protocol connections traversing network address translation (NAT) gateways. Network address translation breaks end-to-end connectivity. Intercepting and modifying traffic can only be performed transparently in the absence of secure encryption and authentication. NAT traversal techniques are typically required for client-to-client networking applications.[1] The majority of NAT traversal techniques fail to traverse Carrier-grade NATs which are typically Symmetric NATs.[2]

Explanation

NAT traversal is of importance for peer-to-peer and Voice over IP (VoIP) deployments [1] . Many techniques exist, but no single method works in every situation since NAT behavior is not standardized. Many NAT traversal techniques require assistance from a server at a publicly routable IP address. Some methods use the server only when establishing the connection, while others are based on relaying all data through it, which adds bandwidth costs and increases latency, detrimental to real-time voice and video communications.

Most NAT behavior-based techniques bypass enterprise security policies. Enterprise security experts prefer techniques that explicitly cooperate with NAT and firewalls, allowing NAT traversal while still enabling marshalling at the NAT to enforce enterprise security policies. IETF standards based on this security model are Realm-Specific IP (RSIP) and middlebox communications (MIDCOM).

Socket Secure (SOCKS) is a technology created in the early 1990s that uses proxy servers to relay traffic between networks or systems. In home or small office settings, UPnP IGD is supported by many small NAT gateways. NAT-T is commonly used by IPsec virtual private network clients in order to have Encapsulating Security Payload packets traverse NAT.

NAT devices are commonly used to alleviate IPv4 address exhaustion by allowing the use of private IP addresses on home and corporate networks behind routers with a single public IP address facing the public Internet. The internal network devices communicate with hosts on the external network by changing the source address of outgoing requests to that of the NAT device and relaying replies back to the originating device. This leaves the internal network ill-suited to host servers, as the NAT device has no automatic method of determining the internal host for which incoming packets are destined. This is not a problem for home users behind NAT devices doing general web access and e-mail. However, applications such as peer-to-peer file sharing, VoIP services and the online services of current generation video game consoles require clients to be servers as well, thereby posing a problem for users behind NAT devices, as incoming requests cannot be easily correlated to the proper internal host. Furthermore many of these types of services carry IP address and port number information in the application data, potentially requiring substitution or special traversal techniques for NAT traversal.

Traversal across Symmetric NAT

The recent proliferation of symmetric NATs has reduced NAT traversal success rates in many practical situations like mobile and public WiFi internet connections. The presence of a symmetric NAT anywhere on the route renders all legacy NAT traversal methods like STUN and ICE ineffective. In 2013, a new method for NAT traversal across symmetric NATs became available in the form of a multi-platform SDK licensed by Bit Action, Inc. This method is able to establish a direct connection between two peers when only one of the peers is behind a symmetric NAT and is effective from behind multiple levels of NAT.[2]

IPsec traversal across NAT

IPsec uses several protocols in its operation which must be enabled to traverse firewalls and network address translators:

Many routers provide explicit features, often called IPsec Passthrough.

In Windows XP, NAT-T is enabled by default, but in Windows XP with Service Pack 2 it has been disabled by default for the case when the VPN server is also behind a NAT device, because of a rare and controversial security issue.[3] IPsec NAT-T patches are also available for Windows 2000, Windows NT and Windows 98.

NAT-T and IPsec may be used to enable opportunistic encryption of traffic between systems. NAT-T allows systems behind NATs to request and establish secure connections on demand.

Hosted NAT Traversal

Hosted NAT Traversal (HNT) is set of mechanisms including media relaying and latching used by intermediaries. The IETF advises against using latching over the Internet and recommends ICE for security reasons.[4]

IETF references

  • RFC 1579 - Firewall Friendly FTP
  • RFC 2663 - IP Network Address Translator (NAT) Terminology and Considerations
  • RFC 2709 - Security Model with Tunnel-mode IPsec for NAT Domains
  • RFC 2993 - Architectural Implications of NAT
  • RFC 3022 - Traditional IP Network Address Translator (Traditional NAT)
  • RFC 3027 - Protocol Complications with the IP Network Address Translator (NAT)
  • RFC 3235 - Network Address Translator (NAT)-Friendly Application Design Guidelines
  • RFC 3715 - IPsec-Network Address Translation (NAT) Compatibility
  • RFC 3947 - Negotiation of NAT-Traversal in the IKE
  • RFC 5128 - State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)
  • RFC 5245 - Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols

See also

References

  1. ^ a b "Firewall and NAT Traversal Explained". Eyeball Networks Inc. 2013-07-05. Retrieved 2013-10-10.
  2. ^ a b "Symmetric NAT Traversal with BitJet One SDK". Bit Action, Inc.
  3. ^ "IPSec NAT-T is not recommended for Windows Server 2003 computers that are behind network address translators". Microsoft knowledge base #885348.
  4. ^ Latching: Hosted NAT Traversal (HNT) for Media in Real-Time Communication draft-ietf-mmusic-latching-04 2013-10-08