scispace - formally typeset
Search or ask a question
Topic

NAT Port Mapping Protocol

About: NAT Port Mapping Protocol is a research topic. Over the lifetime, 1127 publications have been published within this topic receiving 22342 citations. The topic is also known as: NAT-PMP.


Papers
More filters
01 Mar 2003
TL;DR: Simple Traversal of User Datagram Protocol Through Network Address Translators (STUN) is a lightweight protocol that allows applications to discover the presence and types of NATs and firewalls between them and the public Internet.
Abstract: Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN) is a lightweight protocol that allows applications to discover the presence and types of NATs and firewalls between them and the public Internet. It also provides the ability for applications to determine the public Internet Protocol (IP) addresses allocated to them by the NAT. STUN works with many existing NATs, and does not require any special behavior from them. As a result, it allows a wide variety of applications to work through existing NAT infrastructure.

688 citations

01 Jan 2001
TL;DR: Together, these two operations, referred to as traditional NAT, provide a mechanism to connect a realm with private addresses to an external realm with globally unique registered addresses.
Abstract: Basic Network Address Translation or Basic NAT is a method by which IP addresses are mapped from one group to another, transparent to end users. Network Address Port Translation, or NAPT is a method by which many network addresses and their TCP/UDP (Transmission Control Protocol/User Datagram Protocol) ports are translated into a single network address and its TCP/UDP ports. Together, these two operations, referred to as traditional NAT, provide a mechanism to connect a realm with private addresses to an external realm with globally unique registered addresses.

640 citations

01 Apr 2010
TL;DR: This document describes a protocol for Network Address Translator (NAT) traversal for multimedia session signaling protocols based on the offer/answer model, such as the Session Initiation Protocol (SIP).
Abstract: This document describes a protocol for Network Address Translator (NAT) traversal for multimedia session signaling protocols based on the offer/answer model, such as the Session Initiation Protocol (SIP). This protocol is called Interactive Connectivity Establishment (ICE). ICE makes use of existing protocols, such as Simple Traversal of UDP Through NAT (STUN) and Traversal Using Relay NAT (TURN). ICE makes use of STUN in peer-to-peer cooperative fashion, allowing participants to discover, create and verify mutual connectivity.

636 citations

Proceedings ArticleDOI
28 Oct 2007
TL;DR: This paper proposes a new approach to protocol reverse engineering using program binaries, shadowing, which uses dynamic analysis and is based on a unique intuition - the way that an implementation of the protocol processes the received application data reveals a wealth of information about the protocol message format.
Abstract: Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering on network traces. That kind of approach is limited by the lack of semantic information on network traces. In this paper we propose a new approach using program binaries. Our approach, shadowing, uses dynamic analysis and is based on a unique intuition - the way that an implementation of the protocol processes the received application data reveals a wealth of information about the protocol message format. We have implemented our approach in a system called Polyglot and evaluated it extensively using real-world implementations of five different protocols: DNS, HTTP, IRC, Samba and ICQ. We compare our results with the manually crafted message format, included in Wireshark, one of the state-of-the-art protocol analyzers. The differences we find are small and usually due to different implementations handling fields in different ways. Finding such differences between implementations is an added benefit, as they are important for problems such as fingerprint generation, fuzzing, and error detection.

402 citations

ReportDOI
01 Feb 2020
TL;DR: Session Traversal Utilities for NAT (STUN) as mentioned in this paper is a protocol that serves as a tool for other protocols in dealing with Network Address Translator (NAT) traversal, which can be used by an endpoint to determine the IP address and port allocated to it by a NAT.
Abstract: Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with Network Address Translator (NAT) traversal. It can be used by an endpoint to determine the IP address and port allocated to it by a NAT. It can also be used to check connectivity between two endpoints, and as a keep-alive protocol to maintain NAT bindings. STUN works with many existing NATs, and does not require any special behavior from them. STUN is not a NAT traversal solution by itself. Rather, it is a tool to be used in the context of a NAT traversal solution. This document obsoletes RFC 5389.

328 citations


Network Information
Related Topics (5)
Wi-Fi array
30.5K papers, 672.8K citations
72% related
Wireless WAN
20K papers, 467.3K citations
70% related
Ad hoc wireless distribution service
17.7K papers, 488.2K citations
69% related
Relay
69.6K papers, 579.9K citations
69% related
Vehicular ad hoc network
24.1K papers, 548.6K citations
69% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20216
202010
201914
201820
201736
201636