Net:NAT穿透

来自WHY42
Riguz留言 | 贡献2021年5月11日 (二) 09:02的版本
(差异) ←上一版本 | 最后版本 (差异) | 下一版本→ (差异)

NAT穿越(NAT traversal)涉及TCP/IP网络中的一个常见问题,即在处于使用了NAT设备的私有TCP/IP网络中的主机之间建立连接的问题。

常用的NAT穿透的技术有:

Socket Secure
(SOCKS) is a technology created in the early 1990s that uses proxy servers to relay traffic between networks or systems
Traversal Using Relays around NAT (TURN)
is a relay protocol designed specifically for NAT traversal.
NAT hole punching
is a general technique that exploits how NATs handle some protocols (for example, UDP, TCP, or ICMP) to allow previously blocked packets through the NAT.
Session Traversal Utilities for NAT (STUN)
is a standardized set of methods and a network protocol for NAT hole punching. It was designed for UDP but was also extended to TCP.
Interactive Connectivity Establishment (ICE)
is a complete protocol for using STUN and/or TURN to do NAT traversal while picking the best network route available. It fills in some of the missing pieces and deficiencies that were not mentioned by STUN specification.
UPnP Internet Gateway Device Protocol (IGDP)
is supported by many small NAT gateways in home or small office settings. It allows a device on a network to ask the router to open a port.
NAT-PMP
is a protocol introduced by Apple as an alternative to IGDP.
PCP
is a successor of NAT-PMP.
Application-level gateway (ALG)
is a component of a firewall or NAT that allows for configuring NAT traversal filters.[2] It is claimed by numerous people that this technique creates more problems than it solves