throbber
Network Working Group P. Srisuresh
`Request for Comments: 2663 M. Holdrege
`Category: Informational Lucent Technologies
` August 1999
`
` IP Network Address Translator (NAT) Terminology and Considerations
`Status of this Memo
` This memo provides information for the Internet community. It does
` not specify an Internet standard of any kind. Distribution of this
` memo is unlimited.
`Copyright Notice
` Copyright (C) The Internet Society (1999). All Rights Reserved.
`Preface
` The motivation behind this document is to provide clarity to the
` terms used in conjunction with Network Address Translators. The term
` "Network Address Translator" means different things in different
` contexts. The intent of this document is to define the various
` flavors of NAT and standardize the meaning of terms used.
` The authors listed are editors for this document and owe the content
` to contributions from members of the working group. Large chunks of
` the document titled, "IP Network Address Translator (NAT)" were
` extracted almost as is, to form the initial basis for this document.
` The editors would like to thank the authors Pyda Srisuresh and Kjeld
` Egevang for the same. The editors would like to thank Praveen
` Akkiraju for his contributions in describing NAT deployment
` scenarios. The editors would also like to thank the IESG members
` Scott Bradner, Vern Paxson and Thomas Narten for their detailed
` review of the document and adding clarity to the text.
`Abstract
` Network Address Translation is a method by which IP addresses are
` mapped from one realm to another, in an attempt to provide
` transparent routing to hosts. Traditionally, NAT devices are used to
` connect an isolated address realm with private unregistered addresses
` to an external realm with globally unique registered addresses. This
` document attempts to describe the operation of NAT devices and the
` associated considerations in general, and to define the terminology
` used to identify various flavors of NAT.
`
`Srisuresh & Holdrege Informational [Page 1]
`RFC 2663 NAT Terminology and Considerations August 1999
`
`1. Introduction and Overview
` The need for IP Address translation arises when a network's internal
` IP addresses cannot be used outside the network either because they
` are invalid for use outside, or because the internal addressing must
` be kept private from the external network.
` Address translation allows (in many cases, except as noted in
` sections 8 and 9) hosts in a private network to transparently
` communicate with destinations on an external network and vice versa.
` There are a variety of flavors of NAT and terms to match them. This
` document attempts to define the terminology used and to identify
` various flavors of NAT. The document also attempts to describe other
` considerations applicable to NAT devices in general.
` Note, however, this document is not intended to describe the
` operations of individual NAT variations or the applicability of NAT
` devices.
` NAT devices attempt to provide a transparent routing solution to end
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 1
`
`

`

` hosts trying to communicate from disparate address realms. This is
` achieved by modifying end node addresses en-route and maintaining
` state for these updates so that datagrams pertaining to a session are
` routed to the right end-node in either realm. This solution only
` works when the applications do not use the IP addresses as part of
` the protocol itself. For example, identifying endpoints using DNS
` names rather than addresses makes applications less dependent of the
` actual addresses that NAT chooses and avoids the need to also
` translate payload contents when NAT changes an IP address.
` The NAT function cannot by itself support all applications
` transparently and often must co-exist with application level gateways
` (ALGs) for this reason. People looking to deploy NAT based solutions
` need to determine their application requirements first and assess the
` NAT extensions (i.e., ALGs) necessary to provide application
` transparency for their environment.
` IPsec techniques which are intended to preserve the Endpoint
` addresses of an IP packet will not work with NAT enroute for most
` applications in practice. Techniques such as AH and ESP protect the
` contents of the IP headers (including the source and destination
` addresses) from modification. Yet, NAT's fundamental role is to alter
` the addresses in the IP header of a packet.
`2. Terminology and concepts used
` Terms most frequently used in the context of NAT are defined here for
` reference.
`
`Srisuresh & Holdrege Informational [Page 2]
`RFC 2663 NAT Terminology and Considerations August 1999
`
`2.1. Address realm or realm
` An address realm is a network domain in which the network addresses
` are uniquely assigned to entities such that datagrams can be routed
` to them. Routing protocols used within the network domain are
` responsible for finding routes to entities given their network
` addresses. Note that this document is limited to describing NAT in
` IPv4 environment and does not address the use of NAT in other types
` of environment. (e.g. IPv6 environments)
`2.2. Transparent routing
` The term "transparent routing" is used throughout the document to
` identify the routing functionality that a NAT device provides. This
` is different from the routing functionality provided by a traditional
` router device in that a traditional router routes packets within a
` single address realm.
` Transparent routing refers to routing a datagram between disparate
` address realms, by modifying address contents in the IP header to be
` valid in the address realm into which the datagram is routed.
` Section 3.2 has a detailed description of transparent routing.
`2.3. Session flow vs. Packet flow
` Connection or session flows are different from packet flows. A
` session flow indicates the direction in which the session was
` initiated with reference to a network interface. Packet flow is the
` direction in which the packet has traveled with reference to a
` network interface. Take for example, an outbound telnet session. The
` telnet session consists of packet flows in both inbound and outbound
` directions. Outbound telnet packets carry terminal keystrokes and
` inbound telnet packets carry screen displays from the telnet server.
` For purposes of discussion in this document, a session is defined as
` the set of traffic that is managed as a unit for translation.
` TCP/UDP sessions are uniquely identified by the tuple of (source IP
` address, source TCP/UDP port, target IP address, target TCP/UDP
` port). ICMP query sessions are identified by the tuple of (source IP
` address, ICMP query ID, target IP address). All other sessions are
` characterized by the tuple of (source IP address, target IP address,
` IP protocol).
` Address translations performed by NAT are session based and would
` include translation of incoming as well as outgoing packets belonging
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 2
`
`

`

` to that session. Session direction is identified by the direction of
` the first packet of that session (see sec 2.5).
`
`Srisuresh & Holdrege Informational [Page 3]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` Note, there is no guarantee that the idea of a session, determined as
` above by NAT, will coincide with the application's idea of a session.
` An application might view a bundle of sessions (as viewed by NAT) as
` a single session and might not even view its communication with its
` peers as a session. Not all applications are guaranteed to work
` across realms, even with an ALG (defined below in section 2.9)
` enroute.
`2.4. TU ports, Server ports, Client ports
` For the reminder of this document, we will refer TCP/UDP ports
` associated with an IP address simply as "TU ports".
` For most TCP/IP hosts, TU port range 0-1023 is used by servers
` listening for incoming connections. Clients trying to initiate a
` connection typically select a source TU port in the range of 1024-
` 65535. However, this convention is not universal and not always
` followed. Some client stations initiate connections using a source TU
` port number in the range of 0-1023, and there are servers listening
` on TU port numbers in the range of 1024-65535.
` A list of assigned TU port services may be found in RFC 1700 [Ref 2].
`2.5. Start of session for TCP, UDP and others
` The first packet of every TCP session tries to establish a session
` and contains connection startup information. The first packet of a
` TCP session may be recognized by the presence of SYN bit and absence
` of ACK bit in the TCP flags. All TCP packets, with the exception of
` the first packet, must have the ACK bit set.
` However, there is no deterministic way of recognizing the start of a
` UDP based session or any non-TCP session. A heuristic approach would
` be to assume the first packet with hitherto non-existent session
` parameters (as defined in section 2.3) as constituting the start of
` new session.
`2.6. End of session for TCP, UDP and others
` The end of a TCP session is detected when FIN is acknowledged by both
` halves of the session or when either half receives a segment with the
` RST bit in TCP flags field. However, because it is impossible for a
` NAT device to know whether the packets it sees will actually be
` delivered to the destination (they may be dropped between the NAT
` device and the destination), the NAT device cannot safely assume that
` the segments containing FINs or SYNs will be the last packets of the
` session (i.e., there could be retransmissions). Consequently, a
` session can be assumed to have been terminated only after a period of
`
`Srisuresh & Holdrege Informational [Page 4]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` 4 minutes subsequent to this detection. The need for this extended
` wait period is described in RFC 793 [Ref 7], which suggests a TIME-
` WAIT duration of 2 * MSL (Maximum Segment Lifetime) or 4 minutes.
` Note that it is also possible for a TCP connection to terminate
` without the NAT device becoming aware of the event (e.g., in the case
` where one or both peers reboot). Consequently, garbage collection is
` necessary on NAT devices to clean up unused state about TCP sessions
` that no longer exist. However, it is not possible in the general case
` to distinguish between connections that have been idle for an
` extended period of time from those that no longer exist. In the case
` of UDP-based sessions, there is no single way to determine when a
` session ends, since UDP-based protocols are application specific.
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 3
`
`

`

` Many heuristic approaches are used to terminate sessions. You can
` make the assumption that TCP sessions that have not been used for
` say, 24 hours, and non-TCP sessions that have not been used for a
` couple of minutes, are terminated. Often this assumption works, but
` sometimes it doesn't. These idle period session timeouts vary a great
` deal both from application to application and for different sessions
` of the same application. Consequently, session timeouts must be
` configurable. Even so, there is no guarantee that a satisfactory
` value can be found. Further, as stated in section 2.3, there is no
` guarantee that NAT's view of session termination will coincide with
` that of the application.
` Another way to handle session terminations is to timestamp entries
` and keep them as long as possible and retire the longest idle session
` when it becomes necessary.
`2.7. Public/Global/External network
` A Global or Public Network is an address realm with unique network
` addresses assigned by Internet Assigned Numbers Authority (IANA) or
` an equivalent address registry. This network is also referred as
` External network during NAT discussions.
`2.8. Private/Local network
` A private network is an address realm independent of external network
` addresses. Private network may also be referred alternately as Local
` Network. Transparent routing between hosts in private realm and
` external realm is facilitated by a NAT router.
` RFC 1918 [Ref 1] has recommendations on address space allocation for
` private networks. Internet Assigned Numbers Authority (IANA) has
` three blocks of IP address space, namely 10/8, 172.16/12, and
` 192.168/16 set aside for private internets. In pre-CIDR notation, the
`
`Srisuresh & Holdrege Informational [Page 5]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` first block is nothing but a single class A network number, while the
` second block is a set of 16 contiguous class B networks, and the
` third block is a set of 256 contiguous class C networks.
` An organization that decides to use IP addresses in the address space
` defined above can do so without coordination with IANA or any other
` Internet registry such as APNIC, RIPE and ARIN. The address space
` can thus be used privately by many independent organizations at the
` same time. However, if those independent organizations later decide
` they wish to communicate with each other or the public Internet, they
` will either have to renumber their networks or enable NAT on their
` border routers.
`2.9. Application Level gateway (ALG)
` Not all applications lend themselves easily to translation by NAT
` devices; especially those that include IP addresses and TCP/UDP ports
` in the payload. Application Level Gateways (ALGs) are application
` specific translation agents that allow an application on a host in
` one address realm to connect to its counterpart running on a host in
` different realm transparently. An ALG may interact with NAT to set up
` state, use NAT state information, modify application specific payload
` and perform whatever else is necessary to get the application running
` across disparate address realms.
` ALGs may not always utilize NAT state information. They may glean
` application payload and simply notify NAT to add additional state
` information in some cases. ALGs are similar to Proxies, in that, both
` ALGs and proxies facilitate Application specific communication
` between clients and servers. Proxies use a special protocol to
` communicate with proxy clients and relay client data to servers and
` vice versa. Unlike Proxies, ALGs do not use a special protocol to
` communicate with application clients and do not require changes to
` application clients.
`3. What is NAT?
` Network Address Translation is a method by which IP addresses are
` mapped from one address realm to another, providing transparent
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 4
`
`

`

` routing to end hosts. There are many variations of address
` translation that lend themselves to different applications. However,
` all flavors of NAT devices should share the following
` characteristics.
`
`Srisuresh & Holdrege Informational [Page 6]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` a) Transparent Address assignment.
` b) Transparent routing through address translation.
` (routing here refers to forwarding packets, and not
` exchanging routing information)
` c) ICMP error packet payload translation.
` Below is a diagram illustrating a scenario in which NAT is enabled on
` a stub domain border router, connected to the Internet through a
` regional router made available by a service provider.
` \ | / . /
` +---------------+ WAN . +-----------------+/
` |Regional Router|----------------------|Stub Router w/NAT|---
` +---------------+ . +-----------------+\
` . | \
` . | LAN
` . ---------------
` Stub border
` Figure 1: A typical NAT operation scenario
`3.1. Transparent Address Assignment
` NAT binds addresses in private network with addresses in global
` network and vice versa to provide transparent routing for the
` datagrams traversing between address realms. The binding in some
` cases may extend to transport level identifiers (such as TCP/UDP
` ports). Address binding is done at the start of a session. The
` following sub-sections describe two types of address assignments.
`3.1.1. Static Address assignment
` In the case of static address assignment, there is one-to-one address
` mapping for hosts between a private network address and an external
` network address for the lifetime of NAT operation. Static address
` assignment ensures that NAT does not have to administer address
` management with session flows.
`3.1.2. Dynamic Address assignment
` In this case, external addresses are assigned to private network
` hosts or vice versa, dynamically based on usage requirements and
` session flow determined heuristically by NAT. When the last session
` using an address binding is terminated, NAT would free the binding so
` that the global address could be recycled for later use. The exact
` nature of address assignment is specific to individual NAT
` implementations.
`
`Srisuresh & Holdrege Informational [Page 7]
`RFC 2663 NAT Terminology and Considerations August 1999
`
`3.2. Transparent routing
` A NAT router sits at the border between two address realms and
` translates addresses in IP headers so that when the packet leaves one
` realm and enters another, it can be routed properly. Because NAT
` devices have connections to multiple address realms, they must be
` careful to not improperly propagate information (e.g., via routing
` protocols) about networks from one address realm into another, where
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 5
`
`

`

` such an advertisement would be deemed unacceptable.
` There are three phases to Address translation, as follows. Together
` these phases result in creation, maintenance and termination of state
` for sessions passing through NAT devices.
`3.2.1. Address binding
` Address binding is the phase in which a local node IP address is
` associated with an external address or vice versa, for purposes of
` translation. Address binding is fixed with static address assignments
` and is dynamic at session startup time with dynamic address
` assignments. Once the binding between two addresses is in place, all
` subsequent sessions originating from or to this host will use the
` same binding for session based packet translation.
` New address bindings are made at the start of a new session, if such
` an address binding didn't already exist. Once a local address is
` bound to an external address, all subsequent sessions originating
` from the same local address or directed to the same local address
` will use the same binding.
` The start of each new session will result in the creation of a state
` to facilitate translation of datagrams pertaining to the session.
` There can be many simultaneous sessions originating from the same
` host, based on a single address binding.
`3.2.2. Address lookup and translation
` Once a state is established for a session, all packets belonging to
` the session will be subject to address lookup (and transport
` identifier lookup, in some cases) and translation.
` Address or transport identifier translation for a datagram will
` result in the datagram forwarding from the origin address realm to
` the destination address realm with network addresses appropriately
` updated.
`
`Srisuresh & Holdrege Informational [Page 8]
`RFC 2663 NAT Terminology and Considerations August 1999
`
`3.2.3. Address unbinding
` Address unbinding is the phase in which a private address is no
` longer associated with a global address for purposes of translation.
` NAT will perform address unbinding when it believes that the last
` session using an address binding has terminated. Refer section 2.6
` for some heuristic ways to handle session terminations.
`3.3. ICMP error packet translation
` All ICMP error messages (with the exception of Redirect message type)
` will need to be modified, when passed through NAT. The ICMP error
` message types needing NAT modification would include Destination-
` Unreachable, Source-Quench, Time-Exceeded and Parameter-Problem. NAT
` should not attempt to modify a Redirect message type.
` Changes to ICMP error message will include changes to the original IP
` packet (or portions thereof) embedded in the payload of the ICMP
` error message. In order for NAT to be completely transparent to end
` hosts, the IP address of the IP header embedded in the payload of the
` ICMP packet must be modified, the checksum field of the same IP
` header must correspondingly be modified, and the accompanying
` transport header. The ICMP header checksum must also be modified to
` reflect changes made to the IP and transport headers in the payload.
` Furthermore, the normal IP header must also be modified.
`4.0. Various flavors of NAT
` There are many variations of address translation that lend themselves
` to different applications. NAT flavors listed in the following sub-
` sections are by no means exhaustive, but they do capture the
` significant differences that abound.
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 6
`
`

`

` The following diagram will be used as a base model to illustrate NAT
` flavors. Host-A, with address Addr-A is located in a private realm,
` represented by the network N-Pri. N-Pri is isolated from external
` network through a NAT router. Host-X, with address Addr-X is located
` in an external realm, represented by the network N-Ext. NAT router
` with two interfaces, each attached to one of the realms provides
` transparent routing between the two realms. The interface to the
` external realm is assigned an address of Addr-Nx and the interface to
` private realm is assigned an address of Addr-Np. Further, it may be
` understood that addresses Addr-A and Addr-Np correspond to N-Pri
` network and the addresses Addr-X and Addr-Nx correspond to N-Ext
` network.
`
`Srisuresh & Holdrege Informational [Page 9]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` ________________
` ( )
` ( External ) +--+
` ( Address Realm )-- |__|
` ( (N-Ext) ) /____\
` (________________) Host-X
` | (Addr-X)
` |(Addr-Nx)
` +--------------+
` | |
` | NAT router |
` | |
` +--------------+
` |(Addr-Np)
` |
` ----------------
` ( )
` +--+ ( Private )
` |__|------( Address Realm )
` /____\ ( (N-pri) )
` Host-A (________________)
` (Addr-A)
` Figure 2: A base model to illustrate NAT terms.
`4.1. Traditional NAT (or) Outbound NAT
` Traditional NAT would allow hosts within a private network to
` transparently access hosts in the external network, in most cases.
` In a traditional NAT, sessions are uni-directional, outbound from the
` private network. This is in contrast with Bi-directional NAT, which
` permits sessions in both inbound and outbound directions. A detailed
` description of Bi-directional NAT may be found in section 4.2.
` The following is a description of the properties of realms supported
` by traditional NAT. IP addresses of hosts in external network are
` unique and valid in external as well as private networks. However,
` the addresses of hosts in private network are unique only within the
` private network and may not be valid in the external network. In
` other words, NAT would not advertise private networks to the external
` realm. But, networks from the external realm may be advertised within
` the private network. The addresses used within private network must
` not overlap with the external addresses. Any given address must
` either be a private address or an external address; not both.
`
`Srisuresh & Holdrege Informational [Page 10]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` A traditional NAT router in figure 2 would allow Host-A to initiate
` sessions to Host-X, but not the other way around. Also, N-Ext is
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 7
`
`

`

` routable from within N-Pri, whereas N-Pri may not be routable from
` N-Ext.
` Traditional NAT is primarily used by sites using private addresses
` that wish to allow outbound sessions from their site.
` There are two variations to traditional NAT, namely Basic NAT and
` NAPT (Network Address Port Translation). These are discussed in the
` following sub-sections.
`4.1.1. Basic NAT
` With Basic NAT, a block of external addresses are set aside for
` translating addresses of hosts in a private domain as they originate
` sessions to the external domain. For packets outbound from the
` private network, the source IP address and related fields such as IP,
` TCP, UDP and ICMP header checksums are translated. For inbound
` packets, the destination IP address and the checksums as listed above
` are translated.
` A Basic NAT router in figure 2 may be configured to translate N-Pri
` into a block of external addresses, say Addr-i through Addr-n,
` selected from the external network N-Ext.
`4.1.2. Network Address Port Translation (NAPT)
` NAPT extends the notion of translation one step further by also
` translating transport identifier (e.g., TCP and UDP port numbers,
` ICMP query identifiers). This allows the transport identifiers of a
` number of private hosts to be multiplexed into the transport
` identifiers of a single external address. NAPT allows a set of hosts
` to share a single external address. Note that NAPT can be combined
` with Basic NAT so that a pool of external addresses are used in
` conjunction with port translation.
` For packets outbound from the private network, NAPT would translate
` the source IP address, source transport identifier and related fields
` such as IP, TCP, UDP and ICMP header checksums. Transport identifier
` can be one of TCP/UDP port or ICMP query ID. For inbound packets, the
` destination IP address, destination transport identifier and the IP
` and transport header checksums are translated.
`
`Srisuresh & Holdrege Informational [Page 11]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` A NAPT router in figure 2 may be configured to translate sessions
` originated from N-Pri into a single external address, say Addr-i.
` Very often, the external interface address Addr-Nx of NAPT router is
` used as the address to map N-Pri to.
`4.2. Bi-directional NAT (or) Two-Way NAT
` With a Bi-directional NAT, sessions can be initiated from hosts in
` the public network as well as the private network. Private network
` addresses are bound to globally unique addresses, statically or
` dynamically as connections are established in either direction. The
` name space (i.e., their Fully Qualified Domain Names) between hosts
` in private and external networks is assumed to be end-to-end unique.
` Hosts in external realm access private realm hosts by using DNS for
` address resolution. A DNS-ALG must be employed in conjunction with
` Bi-Directional NAT to facilitate name to address mapping.
` Specifically, the DNS-ALG must be capable of translating private
` realm addresses in DNS Queries and responses into their external
` realm address bindings, and vice versa, as DNS packets traverse
` between private and external realms.
` The address space requirements outlined for traditional NAT routers
` are applicable here as well.
` A Bi-directional NAT router in figure 2 would allow Host-A to
` initiate sessions to Host-X, and Host-X to initiate sessions to
`
`http://www.ietf.org/rfc/rfc2663[7/8/2011 8:29:45 PM]
`
`Petitioner RPX Corporation - Ex. 1018, p. 8
`
`

`

` Host-A. Just as with traditional NAT, N-Ext is routable from within
` N-Pri, but N-Pri may not be routable from N-Ext.
`4.3. Twice NAT
` Twice NAT is a variation of NAT in that both the source and
` destination addresses are modified by NAT as a datagram crosses
` address realms. This is in contrast to Traditional-NAT and Bi-
` Directional NAT, where only one of the addresses (either source or
` destination) is translated. Note, there is no such term as 'Once-
` NAT'.
` Twice NAT is necessary when private and external realms have address
` collisions. The most common case where this would happen is when a
` site had (improperly) numbered its internal nodes using public
` addresses that have been assigned to another organization.
` Alternatively, a site may have changed from one provider to another,
` but chosen to keep (internally) the addresses it had been assigned by
` the first provider. That provider might then later reassign those
` addresses to someone else. The key issue in such cases is that the
` address of the host in the external realm may have been assigned the
`
`Srisuresh & Holdrege Informational [Page 12]
`RFC 2663 NAT Terminology and Considerations August 1999
`
` same address as a host within the local site. If that address were to
` appear in a packet, it would be forwarded to the internal node rather
` than through the NAT device to the external realm. Twice-NAT attempts
` to bridge these realms by translating both source and destination
` address of an IP packet, as the packet transitions realms.
` Twice-NAT works as follows. When Host-A wishes to initiate a session
` to Host-X, it issues a DNS query for Host-X. A DNS-ALG intercepts the
` DNS query, and in the response returned to Host-A the DNS-ALG
` replaces the address for Host-X with one that is properly routable in
` the local site (say Host-XPRIME). Host A then initiates communication
` with Host-XPRIME. When the packets traverse the NAT device, the
` source IP address is translated (as in the case of traditional NAT)
` and the destination address is translated to Host-X. A similar
` translation is performed on return packets coming from Host-X.
` The following is a description of the properties of realms supported
` by Twice-NAT. Network address of hosts in external network are unique
` in external networks, but not within private network. Likewise, the
` network address of hosts in private network are unique only within
` the private network. In other words, the address space used in
` private network to locate hosts in private and public networks is
` unrelated to the address space used in public network to locate hosts
` in private and public networks. Twice NAT would not be allowed to
` advertise local networks to the external network or vice versa.
` A Twice NAT router in figure 2 would allow Host-A to initiate
` sessions to Host-X, and Host-X to initiate sessions to Host-A.
` However, N-Ext (or a subset of N-Ext) is not routable from within N-
` Pri, and N-Pri is not routable from N-Ext.
` Twice NAT is typically used when address space used in a Pr

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket