Method for penetrating the NAT and corresponding communication terminal and NAT device

A communication terminal and equipment technology, applied in the field of network communication, can solve the problems of not supporting address pool, not supporting TCP connection traversal, not supporting application protocols, etc., and achieve the effect of eliminating limitations

Inactive Publication Date: 2007-10-17
NEW H3C TECH CO LTD
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the limitations of the STUN protocol are: 1. The devices in the private network need to support the STUN protocol; 2. STUN does not support the traversal of TCP connections, so it does not support TCP-based application p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for penetrating the NAT and corresponding communication terminal and NAT device
  • Method for penetrating the NAT and corresponding communication terminal and NAT device
  • Method for penetrating the NAT and corresponding communication terminal and NAT device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The above and other technical features and advantages of the NAT traversal method, NAT device, and communication terminal provided by the present invention will be described in detail as follows with reference to the accompanying drawings.

[0038] Fig. 1 shows a flow chart of a preferred embodiment of the NAT traversal method of the present invention. In order to realize NAT traversal on ordinary NAT devices, especially when address / port information is embedded in the message payload, the communication terminal behind the NAT device must first pass through the private network with the NAT device Inner interaction to learn its public network address / port after NAT, that is, to execute step S1 in Figure 1.

[0039] As shown in FIG. 1 , the interaction in the private network between the communication terminal and the NAT device can be realized by sequentially executing steps S1-1 to S1-3.

[0040] First, step S1-1 is executed: the communication terminal sends a request m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network communication area and discloses a method for penetrating the NAT. The method mainly includes: step S1: the communication terminal after the NAT device interacts with the NAT device to get the public network address and/or port behind the NAT from the NAT; step S2: the communication terminal fills the private network address and/or port information of the packet net payload as the public network address and/or port, and send the packets to the NAT device. The invention discloses the corresponding communication terminal and NAT device to support the implementation of the above method. Compared with the existing technology, the invention does not require NAT device to support the ALG (application layer gateway) and need not realize the STUN (UDP simple penetration mode of NAT) protocol, so it eliminates the limit of the static manual configuration.

Description

technical field [0001] The present invention relates to the field of network communication, in particular to the technology of traversing NAT (Network Address Translation, Network Address Translation); more specifically, the present invention relates to a method of traversing NAT, as well as corresponding communication terminals and NAT devices. Background technique [0002] Now a large number of enterprises adopt private address networking (RFC1918), and control communication with the public network through NAT (Network Address Translation, Network Address Translation). NAT can complete the conversion between private addressing and public network addressing, and set corresponding packet filtering rules, so that IP (Internet Protocol, Internet Protocol) packets that do not meet the conditions cannot penetrate NAT. The use of NAT has brought many benefits to the IP network, for example, it alleviates the problem of IP address tension in the Internet under the IPv4 framework, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L12/66H04L29/06H04L29/12
Inventor 刘先楠
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products