亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rfc3022.txt

?? NAT協(xié)議完整源代碼
?? TXT
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
                           |  LAN     --------------------------------------------        |        ^{s=10.0.0.10,sport=3017, |  v{s=138.76.29.7, sport=23,        |        ^ d=138.76.29.7,dport=23} |  v d=10.0.0.10, dport=3017}        |                                  |       +--+      +--+                    +--+       |--|      |--|                    |--|      /____\    /____\                  /____\     10.0.0.1  10.0.0.2   .....        10.0.0.10      Figure 3: Network Address Port Translation (NAPT) Operation   When stub A host 10.0.0.10 sends a telnet packet to host 138.76.29.7,   it uses the globally unique address 138.76.29.7 as destination, and   sends the packet to it's primary router.  The stub router has a   static route for the subnet 138.76.0.0/16 so the packet is forwarded   to the WAN-link.  However, NAPT translates the tuple of source   address 10.0.0.10 and source TCP port 3017 in the IP and TCP headers   into the globally unique 138.76.28.4 and a uniquely assigned TCP   port, say 1024, before the packet is forwarded.  Packets on the   return path go through similar address and TCP port translations for   the target IP address and target TCP port.  Once again, notice that   this requires no changes to hosts or routers.  The translation is   completely transparent.   In this setup, only TCP/UDP sessions are allowed and must originate   from the local network.  However, there are services such as DNS that   demand inbound access.  There may be other services for which an   organization wishes to allow inbound session access.  It is possible   to statically configure a well known TU port service [RFC 1700] on   the stub router to be directed to a specific node in the private   network.Srisuresh & Egevang          Informational                      [Page 6]RFC 3022                    Traditional NAT                 January 2001   In addition to TCP/UDP sessions, ICMP messages, with the exception of   REDIRECT message type may also be monitored by NAPT router.  ICMP   query type packets are translated similar to that of TCP/UDP packets,   in that the identifier field in ICMP message header will be uniquely   mapped to a query identifier of the registered IP address.  The   identifier field in ICMP query messages is set by Query sender and   returned unchanged in response message from the Query responder.  So,   the tuple of (Local IP address, local ICMP query identifier) is   mapped to a tuple of (registered IP address, assigned ICMP query   Identifier) by the NAPT router to uniquely identify ICMP queries of   all types from any of the local hosts. Modifications to ICMP error   messages are discussed in a later section, as that involves   modifications to ICMP payload as well as the IP and ICMP headers.   In NAPT setup, where the registered IP address is the same as the IP   address of the stub router WAN interface, the router has to be sure   to make distinction between TCP, UDP or ICMP query sessions   originated from itself versus those originated from the nodes on   local network.  All inbound sessions (including TCP, UDP and ICMP   query sessions) are assumed to be directed to the NAT router as the   end node, unless the target service port is statically mapped to a   different node in the local network.   Sessions other than TCP, UDP and ICMP query type are simply not   permitted from local nodes, serviced by a NAPT router.3.0. Translation phases of a session.   The translation phases with traditional NAT are same as described in   [NAT-TERM].  The following sub-sections identify items that are   specific to traditional NAT.3.1. Address binding:   With Basic NAT, a private address is bound to an external address,   when the first outgoing session is initiated from the private host.   Subsequent to that, all other outgoing sessions originating from the   same private address will use the same address binding for packet   translation.   In the case of NAPT, where many private addresses are mapped to a   single globally unique address, the binding would be from the tuple   of (private address, private TU port) to the tuple of (assigned   address, assigned TU port).  As with Basic NAT, this binding is   determined when the first outgoing session is initiated by the tuple   of (private address, private TU port) on the private host.  While not   a common practice, it is possible to have an application on private   host establish multiple simultaneous sessions originating from theSrisuresh & Egevang          Informational                      [Page 7]RFC 3022                    Traditional NAT                 January 2001   same tuple of (private address, private TU port).  In such a case, a   single binding for the tuple of (private address, private TU port)   may be used for translation of packets pertaining to all sessions   originating from the same tuple on a host.3.2. Address lookup and translation:   After an address binding or (address, TU port) tuple binding in case   of NAPT is established, a soft state may be maintained for each of   the connections using the binding.  Packets belonging to the same   session will be subject to session lookup for translation purposes.   The exact nature of translation is discussed in the follow-on   section.3.3. Address unbinding:   When the last session based on an address or (address, TU port) tuple   binding is terminated,  the binding itself may be terminated.4.0. Packet Translations   Packets pertaining to NAT managed sessions undergo translation in   either direction.  Individual packet translation issues  are covered   in detail in the following sub-sections.4.1. IP, TCP, UDP and ICMP Header Manipulations   In Basic NAT model, the IP header of every packet must be modified.   This modification includes IP address (source IP address for outbound   packets and destination IP address for inbound packets) and the IP   checksum.   For TCP ([TCP]) and UDP ([UDP]) sessions, modifications must include   update of checksum in the TCP/UDP headers.  This is because TCP/UDP   checksum also covers a pseudo header which contains the source and   destination IP addresses.  As an exception, UDP headers with 0   checksum should not be modified.  As for ICMP Query packets ([ICMP]),   no further changes in ICMP header are required as the checksum in   ICMP header does not cover IP addresses.   In NAPT model, modifications to IP header are similar to that of   Basic NAT.  For TCP/UDP sessions, modifications must be extended to   include translation of TU port (source TU port for outbound packets   and destination TU port for inbound packets) in the TCP/UDP header.   ICMP header in ICMP Query packets must  also be modified to replace   the query ID and ICMP header checksum.  Private host query ID must beSrisuresh & Egevang          Informational                      [Page 8]RFC 3022                    Traditional NAT                 January 2001   translated into assigned ID on the outbound and the exact reverse on   the inbound.  ICMP header checksum must be corrected to account for   Query ID translation.4.2. Checksum Adjustment   NAT modifications are per packet based and can be very compute   intensive, as they involve one or more checksum modifications in   addition to simple field translations.  Luckily, we have an algorithm   below, which makes checksum adjustment to IP, TCP, UDP and ICMP   headers very simple and efficient.  Since all these headers use a   one's complement sum, it is sufficient to calculate the arithmetic   difference between the before-translation and after-translation   addresses and add this to the checksum.  The algorithm below is   applicable only for even offsets (i.e., optr below must be at an even   offset from start of header) and even lengths (i.e., olen and nlen   below must be even).  Sample code (in C) for this is as follows.   void checksumadjust(unsigned char *chksum, unsigned char *optr,   int olen, unsigned char *nptr, int nlen)   /* assuming: unsigned char is 8 bits, long is 32 bits.     - chksum points to the chksum in the packet     - optr points to the old data in the packet     - nptr points to the new data in the packet   */   {     long x, old, new;     x=chksum[0]*256+chksum[1];     x=~x & 0xFFFF;     while (olen)     {         old=optr[0]*256+optr[1]; optr+=2;         x-=old & 0xffff;         if (x<=0) { x--; x&=0xffff; }         olen-=2;     }     while (nlen)     {         new=nptr[0]*256+nptr[1]; nptr+=2;         x+=new & 0xffff;         if (x & 0x10000) { x++; x&=0xffff; }         nlen-=2;     }     x=~x & 0xFFFF;     chksum[0]=x/256; chksum[1]=x & 0xff;   }Srisuresh & Egevang          Informational                      [Page 9]RFC 3022                    Traditional NAT                 January 20014.3. ICMP error packet modifications   Changes to ICMP error message ([ICMP]) will include changes to IP and   ICMP headers on the outer layer as well as changes to headers of the   packet embedded within the ICMP-error message payload.   In order for NAT to be transparent to end-host, the IP address of the   IP header embedded within the payload of ICMP-Error message must be   modified, the checksum field of the embedded IP header must be   modified, and lastly, the ICMP header checksum must also be modified   to reflect changes to payload.   In a NAPT setup, if the IP message embedded within ICMP happens to be   a TCP, UDP or ICMP Query packet, you will also need to modify the   appropriate TU port number within the TCP/UDP header or the Query   Identifier field in the ICMP Query header.   Lastly, the IP header of the ICMP packet must also be modified.4.4. FTP support   One of the most popular applications, "FTP" ([FTP]) would require an   ALG to monitor the control session payload to determine the ensuing   data session parameters.  FTP ALG is an integral part of most NAT   implementations.   The FTP ALG would require a special table to correct the TCP sequence   and acknowledge numbers with source port FTP or destination port FTP.   The table entries should have source address, destination address,   source port, destination port, delta for sequence numbers and a   timestamp.  New entries are created only when FTP PORT commands or   PASV responses are seen.  The sequence number delta may be increased   or decreased for every FTP PORT command or PASV response.  Sequence   numbers are incremented on the outbound and acknowledge numbers are   decremented on the inbound by this delta.   FTP payload translations are limited to private addresses and their   assigned external addresses (encoded as individual octets in ASCII)   for Basic NAT.  For NAPT setup, however, the translations must be   extended to include the TCP port octets (in ASCII) following the   address octets.4.5 DNS support   Considering that sessions in a traditional NAT are predominantly   outbound from a private domain, DNS ALG may be obviated from use in   conjunction with traditional NAT as follows.  DNS server(s) internal   to the private domain maintain mapping of names to IP addresses forSrisuresh & Egevang          Informational                     [Page 10]RFC 3022                    Traditional NAT                 January 2001   internal hosts and possibly some external hosts.  External DNS   servers maintain name mapping for external hosts alone and not for   any of the internal hosts.  If the private network does not have an   internal DNS server, all DNS requests may be directed to external DNS   server to find address mapping for the external hosts.4.6. IP option handling   An IP datagram with any of the IP options Record Route, Strict Source   Route or Loose Source Route would involve recording or using IP   addresses of intermediate routers.  A NAT intermediate router may   choose not to support these options or leave the addresses   untranslated while processing the options.  The result of leaving the   addresses untranslated would be that private addresses along the   source route are exposed end to end.  This should not jeopardize the   traversal path of the packet, per se, as each router is supposed to   look at the next hop router only.5. Miscellaneous issues5.1. Partitioning of Local and Global Addresses   For NAT to operate as described in this document, it is necessary to   partition the IP address space into two parts - the private addresses   used internal to stub domain, and the globally unique addresses.  Any   given address must either be a private address or a global address.   There is no overlap.   The problem with overlap is the following.  Say a host in stub A   wished to send packets to a host in stub B, but the global addresses   of stub B overlapped the private addressees of stub A. In this case,   the routers in stub A would not be able to distinguish the global   address of stub B from its own private addresses.

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美专区在线观看一区| 懂色av一区二区夜夜嗨| 欧美日韩中文另类| 一区二区三区欧美视频| 日本一区二区三区高清不卡| 日韩av在线发布| 欧美一区二区三区思思人| 午夜精品一区二区三区三上悠亚| 欧美性欧美巨大黑白大战| 亚洲一区二区免费视频| 欧美群妇大交群中文字幕| 亚洲第一二三四区| 9191精品国产综合久久久久久| 偷拍日韩校园综合在线| 精品国产凹凸成av人网站| 国产黄色精品网站| 国产精品久久久久久久久免费丝袜 | 日韩电影在线观看电影| 欧美成人三级在线| 成人晚上爱看视频| 亚洲一区二区三区视频在线播放 | 成人永久免费视频| 一区二区三区四区在线播放| 亚洲午夜久久久久| 777精品伊人久久久久大香线蕉| 精品一区二区三区欧美| 日韩毛片精品高清免费| 777色狠狠一区二区三区| 国产高清亚洲一区| 一区二区三区欧美| 精品乱人伦一区二区三区| 成人听书哪个软件好| 亚洲不卡av一区二区三区| 精品国产91乱码一区二区三区| 风流少妇一区二区| 亚洲高清免费一级二级三级| 国产亚洲欧美日韩俺去了| 欧美三级欧美一级| 成人免费毛片片v| 激情深爱一区二区| 亚洲成人激情av| 亚洲欧美日韩系列| 日本一区二区三区国色天香| 欧美一区二区视频在线观看2022| av一二三不卡影片| 国产乱色国产精品免费视频| 日韩影院精彩在线| 五月天精品一区二区三区| 亚洲精品va在线观看| 久久久久久毛片| 日韩视频免费观看高清完整版 | 亚洲国产成人av好男人在线观看| 国产精品的网站| 国产午夜精品在线观看| 欧美va日韩va| 欧美一卡2卡三卡4卡5免费| 欧美精品色一区二区三区| 在线一区二区视频| 在线亚洲一区二区| 日本道精品一区二区三区| 色综合视频在线观看| 成人性色生活片| av在线这里只有精品| www.性欧美| 色呦呦日韩精品| 色94色欧美sute亚洲线路一久| 色综合天天天天做夜夜夜夜做| 99在线热播精品免费| 日本韩国欧美国产| 日本福利一区二区| 7777精品久久久大香线蕉| 精品区一区二区| 《视频一区视频二区| 亚洲www啪成人一区二区麻豆| 亚洲福利一二三区| 麻豆精品国产91久久久久久| 国产黄色成人av| 91在线无精精品入口| 欧美图片一区二区三区| 日韩欧美国产wwwww| 国产精品女上位| 天堂成人国产精品一区| 九九**精品视频免费播放| 懂色av噜噜一区二区三区av| 色先锋aa成人| 精品美女一区二区| 最新成人av在线| 欧美视频一区二| 久久影视一区二区| 亚洲综合激情网| 国产91清纯白嫩初高中在线观看| 91丝袜美腿高跟国产极品老师| 日韩亚洲欧美成人一区| 亚洲日本丝袜连裤袜办公室| 午夜久久久影院| 91视频在线看| 国产亚洲精品福利| 日本不卡的三区四区五区| 91网址在线看| 国产欧美精品一区二区色综合 | 国产精品911| 欧美日韩国产成人在线91 | 成人午夜视频免费看| 日韩亚洲欧美在线| 亚洲一区二区三区视频在线| 丁香另类激情小说| 欧美不卡一区二区三区四区| 丝瓜av网站精品一区二区| 国产一区不卡在线| 精品美女在线播放| 午夜av一区二区三区| 91国内精品野花午夜精品| 国产亚洲欧美中文| 精彩视频一区二区| 欧美一卡二卡三卡| 欧美色老头old∨ideo| 亚洲免费在线观看| www.日韩在线| 亚洲视频免费观看| 91久久精品一区二区二区| 中文字幕一区二区三区av| 成人亚洲一区二区一| 国产精品热久久久久夜色精品三区| 国产美女精品在线| 国产欧美综合在线观看第十页| 国产一区二区三区不卡在线观看| 精品国产乱码久久久久久牛牛 | 欧美日韩精品欧美日韩精品一 | www.av亚洲| 伊人一区二区三区| 91成人网在线| 日韩电影一二三区| 精品国产sm最大网站| 国产成人精品免费看| 亚洲视频狠狠干| 欧美日韩国产综合一区二区| 日韩中文字幕av电影| 精品捆绑美女sm三区| 国产在线观看一区二区| 国产精品少妇自拍| 欧美日韩www| 国产一区二区视频在线| 亚洲丝袜美腿综合| 欧美日韩你懂得| 国产乱码精品一品二品| 1000精品久久久久久久久| 欧美日韩国产精选| 国产成人在线视频网站| 亚洲综合久久久| 久久亚洲影视婷婷| 91传媒视频在线播放| 经典三级视频一区| 亚洲国产三级在线| 国产欧美一区二区精品性色| 欧美视频精品在线观看| 久久亚洲一级片| 欧美特级限制片免费在线观看| 国产一区二区三区精品视频| 洋洋成人永久网站入口| 久久久夜色精品亚洲| 777午夜精品视频在线播放| 99久久久无码国产精品| 国产一区二区毛片| 日韩国产在线一| 亚洲欧美国产77777| 中文字幕的久久| 久久亚洲春色中文字幕久久久| 777色狠狠一区二区三区| 一本大道av一区二区在线播放| 国产91清纯白嫩初高中在线观看| 蜜乳av一区二区三区| 琪琪一区二区三区| 午夜精品国产更新| 亚洲成人久久影院| 亚洲一区在线观看视频| 亚洲免费在线播放| 亚洲色图在线播放| 亚洲欧洲在线观看av| 国产精品蜜臀在线观看| 欧美国产激情二区三区| 国产精品麻豆久久久| 国产精品国产三级国产普通话三级 | 午夜电影一区二区| 日韩av二区在线播放| 日韩中文字幕不卡| 黑人精品欧美一区二区蜜桃| 另类小说色综合网站| 国产一区二区三区免费看| 国产一区二区三区观看| 国产乱码字幕精品高清av| 国产高清精品网站| 91免费版在线看| 欧美日韩一区二区三区四区五区| 欧美精品aⅴ在线视频| 久久综合久久鬼色| 国产精品福利电影一区二区三区四区| 国产精品久久久久影院亚瑟| 一级精品视频在线观看宜春院| 色综合亚洲欧洲| 日韩一本二本av|