Cisco SPA962-NA Administration Guide - Page 26

NAT Types, Simple Traversal of UDP Through NAT, a UDP packet back to the internal host.

Page 26 highlights

Technology Background Chapter 1 Introducing Linksys 900 Series IP Phones This is the preferred option because it eliminates the need for managing NAT on the 900 Series phone. If this is not available, you need to discuss with the ITSP how to use the NAT Support Parameters provided by the 900 Series phone, such as and . A typical application of a NAT is to allow all the devices in a subscriber home network to access the Internet through a router with a single public IP address assigned by an ISP. The IP header of the packets sent from the private network to the public network is substituted by NAT with the public IP address and a port assigned by the router. The receiver of the packets on the public network sees the packets as coming from the external address instead of the private address of the device. NAT Types The ways that NAT is implemented can be divided into the following categories: • Full cone NAT-Also known as one-to-one NAT. All requests from the same internal IP address and port are mapped to the same external IP address and port. An external host can send a packet to the internal host, by sending a packet to the mapped external address • Restricted cone NAT-All requests from the same internal IP address and port are mapped to the same external IP address and port. Unlike a full cone NAT, an external host can send a packet to the internal host only if the internal host had previously sent a packet to it. • Port restricted cone NAT/symmetric NAT-Port restricted cone NAT or symmetric NAT is like a restricted cone NAT, but the restriction includes port numbers. Specifically, an external host can send a packet to a particular port on the internal host only if the internal host had previously sent a packet from that port to the external host. With symmetric NAT, all requests from the same internal IP address and port to a specific destination IP address and port are mapped to a unique external source IP address and port. If the same internal host sends a packet with the same source address and port to a different destination, a different mapping is used. Only an external host that receives a packet can send a UDP packet back to the internal host. Simple Traversal of UDP Through NAT Simple Traversal of UDP through NATs (STUN) is a protocol defined by RFC 3489, that allows a client behind a NAT device to find out its public address, the type of NAT it is behind, and the port associated on the Internet connection with a particular local port. This information is used to set up UDP communication between two hosts that are both behind NAT routers. Open source STUN software can be obtained at the following website: http://www.voip-info.org/wiki-Open+Source+VOIP+Software STUN does not work with a symmetric NAT router. To determine the type of NAT your router uses, complete the following steps: Step 1 Enable debugging on the 900 Series phone: 1. Make sure you do not have firewall running on your PC that could block the syslog port (by default this is 514). 1-12 Linksys 900 Series IP Phone Administrator Guide Document Version 3.0

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164

1-12
Linksys 900 Series IP Phone Administrator Guide
Document Version 3.0
Chapter 1
Introducing Linksys 900 Series IP Phones
Technology Background
This is the preferred option because it eliminates the need for managing NAT on the 900 Series
phone. If this is not available, you need to discuss with the ITSP how to use the NAT Support
Parameters provided by the 900 Series phone, such as <Outbound Proxy> and <STUN Server
Enable>.
A typical application of a NAT is to allow all the devices in a subscriber home network to
access the Internet through a router with a single public IP address assigned by an ISP. The IP
header of the packets sent from the private network to the public network is substituted by NAT
with the public IP address and a port assigned by the router. The receiver of the packets on the
public network sees the packets as coming from the external address instead of the private
address of the device.
NAT Types
The ways that NAT is implemented can be divided into the following categories:
Full cone NAT—Also known as one-to-one NAT. All requests from the same internal IP address and
port are mapped to the same external IP address and port. An external host can send a packet to the
internal host, by sending a packet to the mapped external address
Restricted cone NAT—All requests from the same internal IP address and port are mapped to the
same external IP address and port. Unlike a full cone NAT, an external host can send a packet to the
internal host only if the internal host had previously sent a packet to it.
Port restricted cone NAT/symmetric NAT—Port restricted cone NAT or symmetric NAT is like a
restricted cone NAT, but the restriction includes port numbers. Specifically, an external host can
send a packet to a particular port on the internal host only if the internal host had previously sent a
packet from that port to the external host.
With symmetric NAT, all requests from the same internal IP address and port to a specific
destination IP address and port are mapped to a unique external source IP address and port. If
the same internal host sends a packet with the same source address and port to a different
destination, a different mapping is used. Only an external host that receives a packet can send
a UDP packet back to the internal host.
Simple Traversal of UDP Through NAT
Simple Traversal of UDP through NATs (STUN) is a protocol defined by RFC 3489, that allows
a client behind a NAT device to find out its public address, the type of NAT it is behind, and
the port associated on the Internet connection with a particular local port. This information is
used to set up UDP communication between two hosts that are both behind NAT routers. Open
source STUN software can be obtained at the following website:
STUN does not work with a symmetric NAT router. To determine the type of NAT your router
uses, complete the following steps:
Step 1
Enable debugging on the 900 Series phone:
1.
Make sure you do not have firewall running on your PC that could block the syslog port (by default
this is 514).