[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
RFC3022: Traditional IP Network Address Translator (Traditional NAT)2001 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 January 2001
Reflects downloads up to 02 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

Basic Network Address Translation or Basic NAT is a method by which IP addresses are mapped from one group to another, transparent to end users. Network Address Port Translation, or NAPT is a method by which many network addresses and their TCP/UDP (Transmission Control Protocol/User Datagram Protocol) ports are translated into a single network address and its TCP/UDP ports. Together, these two operations, referred to as traditional NAT, provide a mechanism to connect a realm with private addresses to an external realm with globally unique registered addresses.

RFC Downloads

Cited By

  1. Liang H, Li M, Xu J, Hu W, Pei X, Jia X and Song Y (2017). vmOS, Computers and Security, 65:C, (329-343), Online publication date: 1-Mar-2017.
  2. Lan C, Sherry J, Popa R, Ratnasamy S and Liu Z Embark Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (255-273)
  3. ACM
    Nishimura T A Flexible Router with Tangible Network Interfaces for Sharing a Last Mile Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, (303-308)
  4. ACM
    Nelson T, Ferguson A, Yu D, Fonseca R and Krishnamurthi S Exodus Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, (1-7)
  5. ACM
    Naylor D, Mukerjee M and Steenkiste P (2014). Balancing accountability and privacy in the network, ACM SIGCOMM Computer Communication Review, 44:4, (75-86), Online publication date: 25-Feb-2015.
  6. ACM
    Naylor D, Mukerjee M and Steenkiste P Balancing accountability and privacy in the network Proceedings of the 2014 ACM conference on SIGCOMM, (75-86)
  7. ACM
    Berger A, Weaver N, Beverly R and Campbell L Internet nameserver IPv4 and IPv6 address relationships Proceedings of the 2013 conference on Internet measurement conference, (91-104)
  8. ACM
    Gilad Y and Herzberg A (2013). Fragmentation Considered Vulnerable, ACM Transactions on Information and System Security, 15:4, (1-31), Online publication date: 1-Apr-2013.
  9. ACM
    Ide M, Kaneko K and Teraoka F Validation of session layer protocols and API in ZNA Proceedings of the 8th Asian Internet Engineering Conference, (77-84)
  10. ACM
    Tazaki H, Van Meter R, Wakikawa R, Shigechika N, Uehara K and Murai J Floating ground architecture Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, (187-198)
  11. ACM
    Gilad Y and Herzberg A (2012). LOT, ACM Transactions on Information and System Security, 15:2, (1-30), Online publication date: 1-Jul-2012.
  12. ACM
    Schulz S, Sadeghi A, Zhdanova M, Mustafa H, Xu W and Varadharajan V Tetherway Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, (149-160)
  13. Huang T (2012). Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing, Journal of Network and Computer Applications, 35:1, (423-446), Online publication date: 1-Jan-2012.
  14. ACM
    Ihm S and Pai V Towards understanding modern web traffic Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, (295-312)
  15. ACM
    Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
  16. Huang T, Zeadally S, Chilamkurti N and Shieh C (2009). Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks, Journal of Network and Computer Applications, 32:3, (741-759), Online publication date: 1-May-2009.
  17. Cohen M (2009). Source attribution for network address translated forensic captures, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 5:3-4, (138-145), Online publication date: 1-Mar-2009.
  18. ACM
    Hayes D, But J and Armitage G (2008). Issues with network address translation for SCTP, ACM SIGCOMM Computer Communication Review, 39:1, (23-33), Online publication date: 31-Dec-2009.
  19. ACM
    Lindqvist J and Tapio J Protecting privacy with protocol stack virtualization Proceedings of the 7th ACM workshop on Privacy in the electronic society, (65-74)
  20. ACM
    Vogt C Six/one router Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture, (13-18)
  21. ACM
    Gamess E and Morales N Implementing IPv6 at Central University of Venezuela Proceedings of the 4th international IFIP/ACM Latin American conference on Networking, (43-51)
  22. ACM
    Maassen J and Bal H Smartsockets Proceedings of the 16th international symposium on High performance distributed computing, (1-10)
  23. Guha S and Francis P Identity trail Proceedings of the 7th international conference on Privacy enhancing technologies, (153-166)
  24. Puongmanee M, Elz R, Kamolphiwong S, Kamolphiwong T, Jantaraprim C and Angchuan T NAT-PT with multicast Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks, (90-102)
  25. Kim I and Yeom H Mixing heterogeneous address spaces in a single edge network Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services, (578-581)
  26. Bi J, Zhang M and Zhao L Security enhancement by detecting network address translation based on instant messaging Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (962-971)
  27. Karakos A, Patsas D, Bornea A and Kontogiannis S Balancing HTTP traffic using dynamically updated weights, an implementation approach Proceedings of the 10th Panhellenic conference on Advances in Informatics, (858-868)
  28. Lustosa L, de A. Rodrigues P, David F and Quinellato D A voice over IP quality monitoring architecture Proceedings of the 8th international conference on Management of Multimedia Networks and Services, (168-178)
  29. Demerjian J, Hajjeh I, Badra M and Ferraz S A secure way to combine IPsec, NAT & DHCP Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (104-118)
  30. Zhang G and Reuther B A Model for User Based Traffic Accounting Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, (354-361)
  31. Manzanares A, Márquez J, Estevez-Tapiador J and Castro J Attacks on port knocking authentication mechanism Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1292-1300)
  32. Chen Y, Chan Y and She C (2005). Enabling location-based services in wireless LAN hotspots, International Journal of Network Management, 15:3, (163-175), Online publication date: 1-May-2005.
  33. Lee K and Choi H Bidirectional FSL3/4 on NEDIA (flow separation by layer 3/4 on network environment using dual IP addresses) Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (619-626)
  34. Walfish M, Stribling J, Krohn M, Balakrishnan H, Morris R and Shenker S Middleboxes no longer considered harmful Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (15-15)
  35. ACM
    Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M (2004). A layered naming architecture for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (343-352), Online publication date: 30-Aug-2004.
  36. ACM
    Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M A layered naming architecture for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (343-352)
  37. ACM
    Ford B (2004). Unmanaged Internet Protocol, ACM SIGCOMM Computer Communication Review, 34:1, (93-98), Online publication date: 1-Jan-2004.
  38. Francis P (2003). Is the Internet Going NUTSS?, IEEE Internet Computing, 7:6, (96-95), Online publication date: 1-Nov-2003.
  39. ACM
    Crowcroft J, Hand S, Mortier R, Roscoe T and Warfield A (2003). Plutarch, ACM SIGCOMM Computer Communication Review, 33:4, (258-266), Online publication date: 1-Oct-2003.
  40. ACM
    Buddhikot M, Hari A, Singh K and Miller S MobileNAT Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (75-84)
  41. ACM
    Crowcroft J, Hand S, Mortier R, Roscoe T and Warfield A Plutarch Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (258-266)
  42. Kong I, Lee J and Lee J Design and implementation of IPv6-IPv4 protocol translation system using dynamic IP address Proceedings of the 2nd international conference on Human.society@internet, (496-506)
  43. Magoni D Hierarchical addressing and routing mechanisms for distributed applications over heterogeneous networks Proceedings of the 2003 international conference on Computational science: PartIII, (1093-1102)
  44. ACM
    Bellovin S A technique for counting natted hosts Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (267-272)
  45. ACM
    Kravets R, Carter C and Magalhães L (2001). A cooperative approach to user mobility, ACM SIGCOMM Computer Communication Review, 31:5, (57-69), Online publication date: 1-Oct-2001.
  46. ACM
    Weiser M (2001). Whatever happened to the next-generation Internet?, Communications of the ACM, 44:9, (61-69), Online publication date: 1-Sep-2001.
Contributors
  • Advanced Micro Devices, Inc.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations