亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2663.txt

?? NAT協議完整源代碼
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                       P. SrisureshRequest for Comments: 2663                                   M. HoldregeCategory: Informational                              Lucent Technologies                                                             August 1999    IP Network Address Translator (NAT) Terminology and ConsiderationsStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Preface   The motivation behind this document is to provide clarity to the   terms used in conjunction with Network Address Translators.  The term   "Network Address Translator" means different things in different   contexts. The intent of this document is to define the various   flavors of NAT and standardize the meaning of terms used.   The authors listed are editors for this document and owe the content   to contributions from members of the working group. Large chunks of   the document titled, "IP Network Address Translator (NAT)" were   extracted almost as is, to form the initial basis for this document.   The editors would like to thank the authors Pyda Srisuresh and Kjeld   Egevang for the same. The editors would like to thank Praveen   Akkiraju for his contributions in describing NAT deployment   scenarios. The editors would also like to thank the IESG members   Scott Bradner, Vern Paxson and Thomas Narten for their detailed   review of the document and adding clarity to the text.Abstract   Network Address Translation is a method by which IP addresses are   mapped from one realm to another, in an attempt to provide   transparent routing to hosts. Traditionally, NAT devices are used to   connect an isolated address realm with private unregistered addresses   to an external realm with globally unique registered addresses. This   document attempts to describe the operation of NAT devices and the   associated considerations in general, and to define the terminology   used to identify various flavors of NAT.Srisuresh & Holdrege         Informational                      [Page 1]RFC 2663           NAT Terminology and Considerations        August 19991. Introduction and Overview   The need for IP Address translation arises when a network's internal   IP addresses cannot be used outside the network either because they   are invalid for use outside, or because the internal addressing must   be kept private from the external network.   Address translation allows (in many cases, except as noted in   sections 8 and 9) hosts in a private network to transparently   communicate with destinations on an external network and vice versa.   There are a variety of flavors of NAT and terms to match them. This   document attempts to define the terminology used and to identify   various flavors of NAT. The document also attempts to describe other   considerations applicable to NAT devices in general.   Note, however, this document is not intended to describe the   operations of individual NAT variations or the applicability of NAT   devices.   NAT devices attempt to provide a transparent routing solution to end   hosts trying to communicate from disparate address realms. This is   achieved by modifying end node addresses en-route and maintaining   state for these updates so that datagrams pertaining to a session are   routed to the right end-node in either realm. This solution only   works when the applications do not use the IP addresses as part of   the protocol itself. For example, identifying endpoints using DNS   names rather than addresses makes applications less dependent of the   actual addresses that NAT chooses and avoids the need to also   translate payload contents when NAT changes an IP address.   The NAT function cannot by itself support all applications   transparently and often must co-exist with application level gateways   (ALGs) for this reason. People looking to deploy NAT based solutions   need to determine their application requirements first and assess the   NAT extensions (i.e., ALGs) necessary to provide application   transparency for their environment.   IPsec techniques which are intended to preserve the Endpoint   addresses of an IP packet will not work with NAT enroute for most   applications in practice. Techniques such as AH and ESP protect the   contents of the IP headers (including the source and destination   addresses) from modification. Yet, NAT's fundamental role is to alter   the addresses in the IP header of a packet.2. Terminology and concepts used   Terms most frequently used in the context of NAT are defined here for   reference.Srisuresh & Holdrege         Informational                      [Page 2]RFC 2663           NAT Terminology and Considerations        August 19992.1. Address realm or realm   An address realm is a network domain in which the network addresses   are uniquely assigned to entities such that datagrams can be routed   to them. Routing protocols used within the network domain are   responsible for finding routes to entities given their network   addresses. Note that this document is limited to describing NAT in   IPv4 environment and does not address the use of NAT in other types   of environment. (e.g. IPv6 environments)2.2. Transparent routing   The term "transparent routing" is used throughout the document to   identify the routing functionality that a NAT device provides.  This   is different from the routing functionality provided by a traditional   router device in that a traditional router routes packets within a   single address realm.   Transparent routing refers to routing a datagram between disparate   address realms, by modifying address contents in the IP header to be   valid in the address realm into which the datagram is routed.   Section 3.2 has a detailed description of transparent routing.2.3. Session flow vs. Packet flow   Connection or session flows are different from packet flows.  A   session flow  indicates the direction in which the session was   initiated with reference to a network interface. Packet flow is the   direction in which the packet has traveled with reference to a   network interface. Take for example, an outbound telnet session.  The   telnet session consists of packet flows in both inbound and outbound   directions. Outbound telnet packets carry terminal keystrokes and   inbound telnet packets carry screen displays from the telnet server.   For purposes of discussion in this document, a session is defined as   the set of traffic that is managed as a unit for translation.   TCP/UDP sessions are uniquely identified by the tuple of (source IP   address, source TCP/UDP port, target IP address, target TCP/UDP   port). ICMP query sessions are identified by the tuple of (source IP   address, ICMP query ID, target IP address). All other sessions are   characterized by the tuple of (source IP address, target IP address,   IP protocol).   Address translations performed by NAT are session based and would   include translation of incoming as well as outgoing packets belonging   to that session. Session direction is identified by the direction of   the first packet of that session (see sec 2.5).Srisuresh & Holdrege         Informational                      [Page 3]RFC 2663           NAT Terminology and Considerations        August 1999   Note, there is no guarantee that the idea of a session, determined as   above by NAT, will coincide with the application's idea of a session.   An application might view a bundle of sessions (as viewed by NAT) as   a single session and might not even view its communication with its   peers as a session. Not all applications are guaranteed to work   across realms, even with an ALG (defined below in section 2.9)   enroute.2.4. TU ports, Server ports, Client ports   For the reminder of this document, we will refer TCP/UDP ports   associated with an IP address simply as "TU ports".   For most TCP/IP hosts, TU port range 0-1023 is used by servers   listening for incoming connections. Clients trying to initiate a   connection typically select a source TU port in the range of 1024-   65535. However, this convention is not universal and not always   followed. Some client stations initiate connections using a source TU   port number in the range of 0-1023, and there are servers listening   on TU port numbers in the range of 1024-65535.   A list of assigned TU port services may be found in RFC 1700 [Ref 2].2.5. Start of session for TCP, UDP and others   The first packet of every TCP session tries to establish a session   and contains connection startup information. The first packet of a   TCP session may be recognized by the presence of SYN bit and absence   of ACK bit in the TCP flags. All TCP packets, with the exception of   the first packet, must have the ACK bit set.   However, there is no deterministic way of recognizing the start of a   UDP based session or any non-TCP session. A heuristic approach would   be to assume the first packet with hitherto non-existent session   parameters (as defined in section 2.3) as constituting the start of   new session.2.6. End of session for TCP, UDP and others   The end of a TCP session is detected when FIN is acknowledged by both   halves of the session or when either half receives a segment with the   RST bit in TCP flags field. However, because it is impossible for a   NAT device to know whether the packets it sees will actually be   delivered to the destination (they may be dropped between the NAT   device and the destination), the NAT device cannot safely assume that   the segments containing FINs or SYNs will be the last packets of the   session (i.e., there could be retransmissions).  Consequently, a   session can be assumed to have been terminated only after a period ofSrisuresh & Holdrege         Informational                      [Page 4]RFC 2663           NAT Terminology and Considerations        August 1999   4 minutes subsequent to this detection. The need for this extended   wait period is described in RFC 793 [Ref 7], which suggests a TIME-   WAIT duration of 2 * MSL (Maximum Segment Lifetime) or 4 minutes.   Note that it is also possible for a TCP connection to terminate   without the NAT device becoming aware of the event (e.g., in the case   where one or both peers reboot). Consequently, garbage collection is   necessary on NAT devices to clean up unused state about TCP sessions   that no longer exist. However, it is not possible in the general case   to distinguish between connections that have been idle for an   extended period of time from those that no longer exist.  In the case   of UDP-based sessions, there is no single way to determine when a   session ends, since UDP-based protocols are application specific.   Many heuristic approaches are used to terminate sessions. You can   make the assumption that TCP sessions that have not been used for   say, 24 hours, and non-TCP sessions that have not been used for a   couple of minutes, are terminated. Often this assumption works, but   sometimes it doesn't. These idle period session timeouts vary a great   deal both from application to application and for different sessions   of the same application. Consequently, session timeouts must be   configurable. Even so, there is no guarantee that a satisfactory   value can be found. Further, as stated in section 2.3, there is no   guarantee that NAT's view of session termination will coincide with   that of the application.   Another way to handle session terminations is to timestamp entries   and keep them as long as possible and retire the longest idle session   when it becomes necessary.2.7. Public/Global/External network   A Global or Public Network is an address realm with unique network   addresses assigned by Internet Assigned Numbers Authority (IANA) or   an equivalent address registry. This network is also referred as   External network during NAT discussions.2.8. Private/Local network   A private network is an address realm independent of external network   addresses. Private network may also be referred alternately as Local   Network. Transparent routing between hosts in private realm and   external realm is facilitated by a NAT router.   RFC 1918 [Ref 1] has recommendations on address space allocation for   private networks. Internet Assigned Numbers Authority (IANA) has   three blocks of IP address space, namely 10/8, 172.16/12, and   192.168/16 set aside for private internets. In pre-CIDR notation, theSrisuresh & Holdrege         Informational                      [Page 5]RFC 2663           NAT Terminology and Considerations        August 1999   first block is nothing but a single class A network number, while the   second block is a set of 16 contiguous class B networks, and the   third block is a set of 256 contiguous class C networks.   An organization that decides to use IP addresses in the address space   defined above can do so without coordination with IANA or any other   Internet registry such as APNIC, RIPE and ARIN.  The address space   can thus be used privately by many independent organizations at the   same time. However, if those independent organizations later decide   they wish to communicate with each other or the public Internet, they   will either have to renumber their networks or enable NAT on their

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品制服美女丁香| 婷婷成人综合网| 51精品国自产在线| 国产精品一区二区在线观看不卡 | 波多野结衣在线一区| 亚洲图片欧美视频| 国产精品美女久久久久av爽李琼| 717成人午夜免费福利电影| 成人精品免费看| 麻豆成人在线观看| 亚洲第一会所有码转帖| 国产精品福利一区二区三区| 久久久亚洲综合| 日韩久久久精品| 这里只有精品99re| 欧美男同性恋视频网站| 在线国产电影不卡| 97久久精品人人爽人人爽蜜臀 | 国产精品国产三级国产aⅴ入口| 69精品人人人人| 91成人网在线| 日本高清不卡aⅴ免费网站| 国产+成+人+亚洲欧洲自线| 精品一区二区在线视频| 五月天久久比比资源色| 亚洲网友自拍偷拍| 亚洲亚洲精品在线观看| 亚洲三级在线免费| 日韩一区在线免费观看| 国产精品无码永久免费888| 久久久久九九视频| 精品少妇一区二区三区 | 亚洲精品大片www| 亚洲欧洲成人自拍| 最好看的中文字幕久久| 亚洲欧洲99久久| 亚洲欧美电影院| 亚洲精品第一国产综合野| 一区二区三区在线播放| 亚洲最大的成人av| 亚洲国产精品一区二区久久| 亚洲一区二区欧美激情| 亚洲v日本v欧美v久久精品| 亚洲高清不卡在线观看| 天天色综合天天| 蜜臀av性久久久久蜜臀aⅴ| 另类的小说在线视频另类成人小视频在线| 日韩精品亚洲一区| 看片网站欧美日韩| 精品亚洲porn| 成人一区二区三区视频在线观看| 成人av电影免费在线播放| 99国产精品久久久久久久久久久| 成人天堂资源www在线| av在线不卡电影| 欧美三级蜜桃2在线观看| 欧美在线不卡视频| 亚洲欧美日韩久久| 亚洲一区二区中文在线| 秋霞电影网一区二区| 国产精品自拍三区| 99久久亚洲一区二区三区青草| 欧美在线你懂得| 91精品国产免费| 日本一区二区不卡视频| 亚洲欧美日韩综合aⅴ视频| 亚洲成人动漫精品| 国产一区二区三区综合| 99国产精品一区| 在线综合视频播放| 国产精品欧美一级免费| 香蕉加勒比综合久久| 国产一区二区三区四区五区美女| 91蜜桃传媒精品久久久一区二区| 欧美日韩高清一区二区三区| 久久这里只有精品首页| 成人亚洲精品久久久久软件| 欧日韩精品视频| 精品久久一区二区三区| 国产精品成人免费| 日韩福利电影在线| 成人精品国产免费网站| 91麻豆精品国产91久久久久久 | 久久综合狠狠综合| 亚洲激情在线激情| 国产一区久久久| 欧美日韩一卡二卡三卡| 欧美激情一二三区| 免费日本视频一区| 欧洲生活片亚洲生活在线观看| 欧美大片一区二区| 亚洲精品网站在线观看| 国产呦精品一区二区三区网站| 在线观看一区不卡| 国产精品欧美综合在线| 久久国产麻豆精品| 欧美日韩一级二级| 最新日韩在线视频| 国产原创一区二区三区| 制服丝袜一区二区三区| 一区二区三区在线观看视频| 国产成人免费在线| 欧美va亚洲va| 五月激情六月综合| 在线视频一区二区三| 国产欧美综合色| 精品一区二区三区影院在线午夜| 欧美中文字幕一区二区三区| 国产一区二区三区在线看麻豆| 在线观看国产91| 国产精品成人免费在线| 国产毛片精品视频| 欧美成人三级电影在线| 亚洲午夜久久久| 97se亚洲国产综合在线| 中文字幕第一页久久| 国内外成人在线视频| 日韩天堂在线观看| 午夜伊人狠狠久久| 欧美色倩网站大全免费| 一级精品视频在线观看宜春院| gogo大胆日本视频一区| 国产亚洲欧美日韩在线一区| 国产一区久久久| 精品国产乱码久久久久久老虎| 日韩国产一区二| 欧美高清性hdvideosex| 亚洲一区二区三区在线| 色婷婷久久久亚洲一区二区三区| 国产精品福利一区| 成人丝袜视频网| 国产精品久久夜| av中文字幕不卡| 中文字幕亚洲一区二区va在线| 成人网在线播放| 国产精品久久久一本精品 | 亚洲电影一区二区| 欧美三级资源在线| 亚洲一区二区欧美激情| 欧美日韩一区视频| 日本伊人精品一区二区三区观看方式 | 国产美女一区二区三区| 国产亚洲一区二区在线观看| 岛国精品在线播放| 1024成人网色www| 在线亚洲欧美专区二区| 天堂va蜜桃一区二区三区漫画版| 欧美日韩精品欧美日韩精品| 三级久久三级久久| 精品国产伦一区二区三区观看方式| 韩国精品一区二区| 国产精品久久久久久久浪潮网站 | 国产精品一区专区| **性色生活片久久毛片| 欧美性色黄大片| 全国精品久久少妇| 久久婷婷久久一区二区三区| 成人动漫av在线| 一区二区三区免费观看| 8x福利精品第一导航| 国产综合色精品一区二区三区| 国产欧美日韩在线| 色综合久久中文字幕| 午夜精品一区在线观看| 欧美xxxxxxxxx| 99精品国产视频| 日韩电影在线免费看| 国产欧美一区二区精品忘忧草| 99精品久久免费看蜜臀剧情介绍| 丝袜亚洲另类欧美综合| 精品国产第一区二区三区观看体验 | 欧美日韩高清一区| 国产精品一区久久久久| 亚洲裸体在线观看| 日韩一区二区三区视频在线| 成人性生交大片免费看中文 | 久久毛片高清国产| 91九色最新地址| 久久99深爱久久99精品| 最近中文字幕一区二区三区| 日韩一级片网站| 一本大道久久a久久综合| 奇米在线7777在线精品| 亚洲日本青草视频在线怡红院| 日韩视频一区二区在线观看| 97久久精品人人澡人人爽| 青青草91视频| 亚洲制服欧美中文字幕中文字幕| 免费在线欧美视频| 亚洲三级免费观看| 久久久www成人免费毛片麻豆 | 亚洲愉拍自拍另类高清精品| 久久久777精品电影网影网| 欧美日韩一区二区三区四区五区| 成人综合婷婷国产精品久久蜜臀| 日本欧美一区二区| 亚洲综合无码一区二区| 国产欧美精品一区aⅴ影院 | 日韩精品一区二区三区视频播放| 色婷婷精品大在线视频|