Net:NAT穿透:修订间差异

来自WHY42
(建立內容為「NAT穿越(NAT traversal)涉及TCP/IP网络中的一个常见问题,即在处于使用了NAT设备的私有TCP/IP网络中的主机之间建立连接的问…」的新頁面)
 
无编辑摘要
 
第3行: 第3行:
常用的NAT穿透的技术有:
常用的NAT穿透的技术有:


* UDP路由验证
;Socket Secure:(SOCKS) is a technology created in the early 1990s that uses proxy servers to relay traffic between networks or systems
* STUN
;Traversal Using Relays around NAT (TURN): is a relay protocol designed specifically for NAT traversal.
* TURN
;NAT hole punching: is a general technique that exploits how NATs handle some protocols (for example, UDP, TCP, or ICMP) to allow previously blocked packets through the NAT.
* ICE
;Session Traversal Utilities for NAT (STUN): is a standardized set of methods and a network protocol for NAT hole punching. It was designed for UDP but was also extended to TCP.
* ALG
;Interactive Connectivity Establishment (ICE): is a complete protocol for using STUN and/or TURN to do NAT traversal while picking the best network route available. It fills in some of the missing pieces and deficiencies that were not mentioned by STUN specification.
* SBC
;UPnP Internet Gateway Device Protocol (IGDP): is supported by many small NAT gateways in home or small office settings. It allows a device on a network to ask the router to open a port.
;NAT-PMP: is a protocol introduced by Apple as an alternative to IGDP.
;PCP: is a successor of NAT-PMP.
;Application-level gateway (ALG): is a component of a firewall or NAT that allows for configuring NAT traversal filters.[2] It is claimed by numerous people that this technique creates more problems than it solves


[[Category:Distributed]]
[[Category:Distributed]]
[[Category:Network]]
[[Category:Network]]

2021年5月11日 (二) 09:02的最新版本

NAT穿越(NAT traversal)涉及TCP/IP网络中的一个常见问题,即在处于使用了NAT设备的私有TCP/IP网络中的主机之间建立连接的问题。

常用的NAT穿透的技术有:

Socket Secure
(SOCKS) is a technology created in the early 1990s that uses proxy servers to relay traffic between networks or systems
Traversal Using Relays around NAT (TURN)
is a relay protocol designed specifically for NAT traversal.
NAT hole punching
is a general technique that exploits how NATs handle some protocols (for example, UDP, TCP, or ICMP) to allow previously blocked packets through the NAT.
Session Traversal Utilities for NAT (STUN)
is a standardized set of methods and a network protocol for NAT hole punching. It was designed for UDP but was also extended to TCP.
Interactive Connectivity Establishment (ICE)
is a complete protocol for using STUN and/or TURN to do NAT traversal while picking the best network route available. It fills in some of the missing pieces and deficiencies that were not mentioned by STUN specification.
UPnP Internet Gateway Device Protocol (IGDP)
is supported by many small NAT gateways in home or small office settings. It allows a device on a network to ask the router to open a port.
NAT-PMP
is a protocol introduced by Apple as an alternative to IGDP.
PCP
is a successor of NAT-PMP.
Application-level gateway (ALG)
is a component of a firewall or NAT that allows for configuring NAT traversal filters.[2] It is claimed by numerous people that this technique creates more problems than it solves