sctp and nat
play

SCTP and NAT draft-ietf-behave-sctpnat-00.txt Randall Stewart - PowerPoint PPT Presentation

SCTP and NAT draft-ietf-behave-sctpnat-00.txt Randall Stewart (rrs@lakerest.net) Michael Txen (tuexen@fh-muenster.de) Irene Rngeler (i.ruengeler@fh-muenster.de) Message Format Common Header First Chunk Second Chunk Third Chunk Last Chunk Common


  1. SCTP and NAT draft-ietf-behave-sctpnat-00.txt Randall Stewart (rrs@lakerest.net) Michael Tüxen (tuexen@fh-muenster.de) Irene Rüngeler (i.ruengeler@fh-muenster.de)

  2. Message Format Common Header First Chunk Second Chunk Third Chunk Last Chunk

  3. Common Header Format Source Port Destination Port Verification Tag Checksum

  4. A NAT with NAPT capabilities for SCTP • Does not use the port numbers to identify the SCTP association, but the verification tag. • The IP address is modified based on the port numbers and the verification tag. • No recalculation of the checksum is necessary. • No change of the port number is required. • If an ephemeral port number is used one has a 32+14 = 46 bit random number for identifying the association. • Every packet contains only one verification tag (except for the INIT-ACK).

  5. Changes • Address single- and multi-homed scenarios. • Address client-server and peer to peer scenarios. • Adopted terminology. • Clarified figures. • We added a lot of examples, showing the message flow and the state changes in the NAT box. • Addressed all comments we got.

  6. Terminology Internal Network | External Network | Private | Public External +---------+ Address | Address /--\/--\ Address +---------+ | SCTP | +-----+ / \ | SCTP | |end point|==========| NAT |======= | Internet | ========== |end point| | A | +-----+ \ / | B | +---------+ Internal | \--/\--/ External +---------+ Internal Port | Port External VTag | VTag

  7. Implementations • The Swinburne University of Technology has implemented the middlebox behavior on FreeBSD. • Münster University of Applied Sciences has implemented implemented the middlebox and endpoint behavior in a simulation tool. • Münster University of Applied Sciences is working on the middlebox behavior on Linux. • Endpoint behavior on FreeBSD is also coming…

  8. To Do • Incorporate some of the comments received form the Swinburne University of Technology. • Add some more examples. • IPv6?

  9. Questions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend