亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2663.txt

?? NAT協(xié)議完整源代碼
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                        with src=Addr-X, Dest=Addr-k>              <--------------------------------------Srisuresh & Holdrege         Informational                     [Page 16]RFC 2663           NAT Terminology and Considerations        August 1999   Second method, using a tunnel within private realm:   ==================================================   Host-A               NAT router               Host-X   ------               -----------              ------   <Outer IP header, with   src=Addr-A, Dest=Addr-Np>,   embedding   <End-to-end packet, with   src=Addr-k, Dest=Addr-X>   ----------------------------->                        <End-to-end packet, with                        src=Addr-k, Dest=Addr-X>                        ------------------------------->                             .                             .                             .                                             <End-to-end packet, with                                             src=Addr-X, Dest=Addr-k>                                    <--------------------------------                        <Outer IP header, with                        src=Addr-Np, Dest=Addr-A>,                        embedding <End-to-end packet,                        with src=Addr-X, Dest=Addr-k>                  <----------------------------------   There may be other approaches to pursue.   An RSA-IP-Client has the following characteristics. The collective   set of operations performed by an RSA-IP-Client may be termed "RSA-   IP".   1. Aware of the realm to which its peer nodes belong.   2. Assumes an address from external realm when communicating with      hosts in that realm. Such an address may be assigned statically      or obtained dynamically (through a yet-to-be-defined protocol)      from a node capable of assigning addresses from external realm.      RSA-IP-Server could be the node coordinating external realm      address assignment.Srisuresh & Holdrege         Informational                     [Page 17]RFC 2663           NAT Terminology and Considerations        August 1999   3. Route packets to external hosts using an approach amenable to      RSA-IP-Server. In all cases, RSA-IP-Client will likely need      to act as a tunnel end-point, capable of encapsulating      end-to-end packets while forwarding and decapsulating in the      return path.   "Realm Specific Address IP Server" (RSA-IP server) is a node resident   on both private and external realms, that facilitates routing of   external realm packets specific to RSA-IP clients inside a private   realm. An RSA-IP-Server may be described as having the following   characteristics.   1. May be configured to assign addresses from external realm to      RSA-IP-Clients, either statically or dynamically.   2. Must be a router resident on both the private and external      address realms.   3. Must be able to provide a mechanism to route external realm      packets within private realm. Of the two approaches described,      the first approach requires RSA-IP-Server to be a NAT router      providing transparent routing for the outer header. This      approach requires the external peer to be a tunnel end-point.      With the second approach, an RSA-IP-Server could be any router      (including a NAT router) that can be a tunnel end-point with      RSA-IP-Clients.  It would detunnel end-to-end packets outbound      from RSA-IP-Clients and forward to external hosts. On the      return path, it would locate RSA-IP-Client tunnel, based on the      destination address of the end-to-end packet and encapsulate the      packet in a tunnel to forward to RSA-IP-Client.   RSA-IP-Clients may pursue any of the IPsec techniques, namely   transport or tunnel mode Authentication and confidentiality using AH   and ESP headers on the embedded packets. Any of the tunneling   techniques may be adapted for encapsulation between RSA-IP-Client and   RSA-IP-Server or between RSA-IP-Client and external host.  For   example, IPsec tunnel mode encapsulation is a valid type of   encapsulation that ensures IPsec authentication and confidentiality   for the embedded end-to-end packets.5.2 Realm Specific Address and port IP (RSAP-IP)   Realm Specific Address and port IP (RSAP-IP) is a variation of RSIP   in that multiple private hosts use a single external address,   multiplexing on transport IDentifiers (i.e., TCP/UDP port numbers and   ICMP Query IDs).Srisuresh & Holdrege         Informational                     [Page 18]RFC 2663           NAT Terminology and Considerations        August 1999   "RSAP-IP-Client" may be defined similar to RSA-IP-Client with the   variation that RSAP-IP-Client assumes a tuple of (external address,   transport Identifier) when connecting to hosts in external realm to   pursue end-to-end communication. As such, communication with external   nodes for an RSAP-IP-Client may be limited to TCP, UDP and ICMP   sessions.   "RSAP-IP-Server" is similar to RSA-IP-Server in that it facilitates   routing of external realm packets specific to RSAP-IP clients inside   a private realm. Typically, an RSAP-IP-Server would also be the one   to assign transport tuples to RSAP-IP-Clients.   A NAPT router enroute could serve as RSAP-IP-Server, when the outer   encapsulation is TCP/UDP based and is addressed between the RSAP-IP-   Client and external peer. This approach requires the external peer to   be  the end-point of TCP/UDP based tunnel. Using this approach,   RSAP-IP-Clients may pursue any of the IPsec techniques, namely   transport or tunnel mode authentication and confidentiality using AH   and ESP headers on the embedded packets.  Note however, IPsec tunnel   mode is not a valid type of encapsulation, as a NAPT router cannot   provide routing transparency to AH and ESP protocols.   Alternately, packets may be tunneled between RSAP-IP-Client and   RSAP-IP-Server such that RSAP-IP-Server would detunnel packets   outbound from RSAP-IP-Clients and forward to external hosts. On the   return path, RSAP-IP-Server  would locate RSAP-IP-Client tunnel,   based on the tuple of (destination address, transport Identifier) and   encapsulate the original packet within a tunnel to forward to RSAP-   IP-Client. With this approach, there is no limitation on the   tunneling technique employed between RSAP-IP-Client and RSAP-IP-   Server. However, there are limitations to applying IPsec based   security on end-to-end packets.  Transport mode based authentication   and integrity may be attained.  But, confidentiality cannot be   permitted because RSAP-IP-Server must be able to examine the   destination transport Identifier in order to identify the RSAP-IP-   tunnel to forward inbound packets to. For this reason, only the   transport mode TCP, UDP and ICMP packets protected by AH and ESP-   authentication can traverse a RSAP-IP-Server using this approach.   As an example, say Host-A in figure 2 above, obtains a tuple of   (Addr-Nx, TCP port T-Nx) from NAPT router to act as RSAP-IP-Client to   initiate end-to-end TCP sessions with Host-X.  Traversal of end-to-   end packets within private realm may be illustrated as follows. In   the first method, outer layer of the outgoing packet from Host-A uses   (private address Addr-A, source port T-Na) as source tuple to   communicate with Host-X. NAPT router enroute translates this tuple   into (Addr-Nx, Port T-Nxa). This translation is independent of RSAP-   IP-Client tuple parameters used in the embedded packet.Srisuresh & Holdrege         Informational                     [Page 19]RFC 2663           NAT Terminology and Considerations        August 1999   First method, using NAPT router enroute to translate:   ====================================================   Host-A               NAPT router              Host-X   ------               -----------              ------   <Outer TCP/UDP packet, with   src=Addr-A, Src Port=T-Na,   Dest=Addr-X>,   embedding   <End-to-end packet, with   src=Addr-Nx, Src Port=T-Nx, Dest=Addr-X>   ----------------------------->                        <Outer TCP/UDP packet, with                        src=Addr-Nx, Src Port=T-Nxa,                        Dest=Addr-X>,                        embedding                        <End-to-end packet, with                        src=Addr-Nx, Src Port=T-Nx, Dest=Addr-X>                        --------------------------------------->                             .                             .                             .                                             <Outer TCP/UDP packet with                                             src=Addr-X, Dest=Addr-Nx,                                             Dest Port=T-Nxa>,                                             embedding                                             <End-to-end packet, with                                             src=Addr-X, Dest=Addr-Nx,                                             Dest Port=T-Nx>                                     <----------------------------------                        <Outer TCP/UDP packet, with                        src=Addr-X, Dest=Addr-A,                        Dest Port=T-Na>,                        embedding                        <End-to-end packet, with                        src=Addr-X, Dest=Addr-Nx,                        Dest Port=T-Nx>              <-----------------------------------Srisuresh & Holdrege         Informational                     [Page 20]RFC 2663           NAT Terminology and Considerations        August 1999   Second method, using a tunnel within private realm:   ==================================================   Host-A               NAPT router              Host-X   ------               -----------              ------   <Outer IP header, with   src=Addr-A, Dest=Addr-Np>,   embedding   <End-to-end packet, with   src=Addr-Nx, Src Port=T-Nx,   Dest=Addr-X>   ----------------------------->                        <End-to-end packet, with                        src=Addr-Nx, Src Port=T-Nx,                        Dest=Addr-X>                        -------------------------------->                             .                             .                             .                                             <End-to-end packet, with                                             src=Addr-X, Dest=Addr-Nx,                                             Dest Port=T-Nx>                                   <----------------------------------                        <Outer IP header, with                        src=Addr-Np, Dest=Addr-A>,                        embedding                        <End-to-end packet, with                        src=Addr-X, Dest=Addr-Nx,                        Dest Port=T-Nx>                <----------------------------------6.0. Private Networks and Tunnels   Let us consider the case where your private network is connected to   the external world via tunnels. In such a case, tunnel encapsulated   traffic may or may not contain translated packets depending upon the   characteristics of address realms a tunnel is bridging.   The following subsections discuss two scenarios where tunnels are   used (a) in conjunction with Address translation, and (b) without   translation.Srisuresh & Holdrege         Informational                     [Page 21]RFC 2663           NAT Terminology and Considerations        August 19996.1. Tunneling translated packets   All variations of  address translations discussed in the previous   section can be applicable to direct connected links as well as   tunnels and virtual private networks (VPNs).

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91香蕉视频污| 欧美日韩国产天堂| 在线观看一区二区视频| 制服丝袜日韩国产| 国产精品初高中害羞小美女文| 亚洲男人的天堂网| 国产精品综合视频| 欧美日韩不卡在线| 中文字幕一区在线观看视频| 美腿丝袜亚洲一区| 欧美午夜电影网| 国产精品久久久久9999吃药| 国产做a爰片久久毛片| 7777精品伊人久久久大香线蕉的| **性色生活片久久毛片| 国产成人av电影在线观看| 欧美一级xxx| 天天色天天爱天天射综合| 91丨porny丨首页| 国产精品久久777777| 国产不卡在线一区| 久久久.com| 国产在线乱码一区二区三区| 日韩欧美国产精品| 日本中文字幕一区二区视频| 欧美性猛片xxxx免费看久爱| 亚洲精品日韩一| 91影院在线观看| 伊人色综合久久天天| 91麻豆精品在线观看| 亚洲伦理在线免费看| 一本高清dvd不卡在线观看| 一区免费观看视频| 91天堂素人约啪| 亚洲亚洲人成综合网络| 91国产丝袜在线播放| 一区二区三区四区高清精品免费观看 | 欧美麻豆精品久久久久久| 一二三区精品视频| 欧美日韩一区二区欧美激情| 亚洲国产日韩在线一区模特 | 日韩美女一区二区三区四区| 奇米影视7777精品一区二区| 日韩欧美色综合网站| 国产一区二区三区久久悠悠色av| 久久久久九九视频| 丰满放荡岳乱妇91ww| 日韩久久一区二区| 欧美性高清videossexo| 日本亚洲免费观看| 精品美女被调教视频大全网站| 激情综合网天天干| 国产精品久久久久久久久免费桃花 | 欧美一区二区三区四区视频| 秋霞电影网一区二区| 久久久久久99久久久精品网站| 99精品国产视频| 石原莉奈在线亚洲三区| 久久久亚洲午夜电影| 一本久久精品一区二区| 久久精品国产99国产精品| 中文成人av在线| 欧美在线你懂的| 久久99精品国产| 亚洲色大成网站www久久九九| 欧美日韩日日骚| 国产精品一级黄| 一区二区三区美女视频| 精品久久久久久最新网址| 99精品1区2区| 精品一区二区三区在线观看国产| 中文字幕人成不卡一区| 欧美一区午夜视频在线观看| 成人免费视频网站在线观看| 午夜久久久影院| 国产精品热久久久久夜色精品三区 | 舔着乳尖日韩一区| 中文子幕无线码一区tr| 91精品久久久久久久久99蜜臂| 懂色av中文字幕一区二区三区| 天天色图综合网| 亚洲精品精品亚洲| 久久久亚洲午夜电影| 欧美精品国产精品| av电影在线观看一区| 久久99精品国产.久久久久| 亚洲丰满少妇videoshd| 国产精品视频yy9299一区| 日韩一区二区三区电影| 在线观看视频91| www.欧美精品一二区| 国产在线一区观看| 奇米影视一区二区三区| 亚洲成人综合视频| 亚洲黄一区二区三区| 亚洲国产成人午夜在线一区| 欧美精品一区二区不卡| 91精品国产高清一区二区三区| 日本高清无吗v一区| 99久久精品国产精品久久| 国产精品456| 国精产品一区一区三区mba桃花| 青娱乐精品视频在线| 免费高清在线视频一区·| 亚洲国产中文字幕在线视频综合| 亚洲日本乱码在线观看| 亚洲少妇30p| 亚洲免费视频成人| 亚洲日本护士毛茸茸| 亚洲人亚洲人成电影网站色| 国产精品理论在线观看| 国产精品毛片高清在线完整版| 国产午夜精品一区二区三区视频| 精品久久久久久久久久久久久久久 | 亚洲欧美自拍偷拍色图| 国产精品高潮呻吟久久| 国产精品久久久99| 亚洲色图清纯唯美| 亚洲一区免费视频| 日一区二区三区| 蜜桃一区二区三区在线观看| 久久精品99国产精品日本| 精品制服美女丁香| 国产一区三区三区| 国产不卡一区视频| 日本道在线观看一区二区| 日本电影亚洲天堂一区| 欧美精品日韩一本| 欧美成人午夜电影| 国产午夜精品久久久久久久 | 色综合中文综合网| 午夜精品福利在线| 日韩电影在线一区二区三区| 久久精品国产成人一区二区三区| 国产高清久久久久| 97se狠狠狠综合亚洲狠狠| 日本高清视频一区二区| 日韩亚洲欧美成人一区| 久久久精品tv| 樱花草国产18久久久久| 狂野欧美性猛交blacked| 粉嫩av亚洲一区二区图片| 欧美亚洲综合久久| 久久综合九色综合久久久精品综合| 国产欧美日韩三区| 亚洲国产你懂的| 激情伊人五月天久久综合| 91首页免费视频| 精品国产免费久久| 一区二区三区在线观看国产| 久久精品国产99| 欧美在线观看视频一区二区| 精品少妇一区二区三区日产乱码 | 久久精品亚洲精品国产欧美 | 1024成人网| 蜜桃一区二区三区四区| av在线不卡电影| 欧美一区二区黄| 亚洲女爱视频在线| 久久se精品一区二区| 色美美综合视频| 久久综合色之久久综合| 亚洲国产精品自拍| 亚洲天天做日日做天天谢日日欢 | 天天综合网 天天综合色| 裸体一区二区三区| 97成人超碰视| 欧美精品一区二区不卡| 亚洲国产精品尤物yw在线观看| 国产精品456露脸| 91麻豆精品国产自产在线观看一区 | 午夜视黄欧洲亚洲| 99久久er热在这里只有精品66| 日韩一级免费一区| 一区二区国产盗摄色噜噜| 国产东北露脸精品视频| 欧美一区二区三区不卡| 一区二区成人在线视频| 风间由美中文字幕在线看视频国产欧美| 欧美日韩一本到| 亚洲美女淫视频| av电影天堂一区二区在线| 久久久影视传媒| 国产制服丝袜一区| 精品久久久久久久久久久久久久久 | 欧美精品18+| 一区二区高清免费观看影视大全| 97久久精品人人做人人爽| 欧美国产激情二区三区| 国产美女在线观看一区| 精品免费国产一区二区三区四区| 免费精品视频最新在线| 欧美另类久久久品| 亚洲国产日韩在线一区模特| 欧美丝袜丝nylons| 亚洲综合在线五月| 欧美撒尿777hd撒尿| 亚洲永久精品国产| 欧美日韩一级二级三级| 亚洲第一搞黄网站|