Net:NAT穿透
NAT穿越(NAT traversal)涉及TCP/IP网络中的一个常见问题,即在处于使用了NAT设备的私有TCP/IP网络中的主机之间建立连接的问题。
常用的NAT穿透的技术有:
- Socket Secure
- (SOCKS) is a technology created in the early 1990s that uses proxy servers to relay traffic between networks or systems
- Traversal Using Relays around NAT (TURN)
- is a relay protocol designed specifically for NAT traversal.
- NAT hole punching
- is a general technique that exploits how NATs handle some protocols (for example, UDP, TCP, or ICMP) to allow previously blocked packets through the NAT.
- Session Traversal Utilities for NAT (STUN)
- is a standardized set of methods and a network protocol for NAT hole punching. It was designed for UDP but was also extended to TCP.
- Interactive Connectivity Establishment (ICE)
- is a complete protocol for using STUN and/or TURN to do NAT traversal while picking the best network route available. It fills in some of the missing pieces and deficiencies that were not mentioned by STUN specification.
- UPnP Internet Gateway Device Protocol (IGDP)
- is supported by many small NAT gateways in home or small office settings. It allows a device on a network to ask the router to open a port.
- NAT-PMP
- is a protocol introduced by Apple as an alternative to IGDP.
- PCP
- is a successor of NAT-PMP.
- Application-level gateway (ALG)
- is a component of a firewall or NAT that allows for configuring NAT traversal filters.[2] It is claimed by numerous people that this technique creates more problems than it solves