Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
NAT Behavior Discovery Using Classic STUN (RFC 3489)
November 04, 2013 | By Netmanias (tech@netmanias.com)
Online viewer:
Comments (3)
15
SUMMARY
Let us introduce the NAT behavior discovery algorithms defined in RFC 3489.

Let us introduce the NAT behavior discovery algorithms defined in RFC 3489.  
To fully understand what's discussed below, we recommend you read the following posts first:

 

1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior
2. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 2. Filtering Behavior
3. STUN (RFC 3489) vs. STUN (RFC 5389/5780)

 


1. NAT Type Discovery

 

The NAT behavior discovery algorithms defined in RFC 3489 are as follows:

 

10.1  Discovery Process

The flow makes use of three tests. In test I, the client sends a STUN Binding Request to a server, without any flags set in the CHANGE-REQUEST attribute, and without the RESPONSE-ADDRESS attribute. This causes the server to send the response back to the address and port that the request came from. In test II, the client sends a Binding Request with both the "change IP" and "change port" flags from the CHANGE-REQUEST attribute set. In test III, the client sends a Binding Request with only the "change port" flag set.

The client begins by initiating test I. If this test yields no response, the client knows right away that it is not capable of UDP connectivity. If the test produces a response, the client examines the MAPPED-ADDRESS attribute. If this address and port are the same as the local IP address and port of the socket used to send the request, the client knows that it is not natted. It executes test II.

If a response is received, the client knows that it has open access to the Internet (or, at least, its behind a firewall that behaves like a full-cone NAT, but without the translation). If no response is received, the client knows its behind a symmetric UDP firewall.

In the event that the IP address and port of the socket did not match the MAPPED-ADDRESS attribute in the response to test I, the client knows that it is behind a NAT. It performs test II. If a response is received, the client knows that it is behind a full-cone NAT. If no response is received, it performs test I (test I' in this post) again, but this time, does so to the address and port from the CHANGED-ADDRESS attribute from the response to test I. If the IP address and port returned in the MAPPED-ADDRESS attribute are not the same as the ones from the first test I, the client knows its behind a symmetric NAT. If the address and port are the same, the client is either behind a restricted or port restricted NAT. To make a determination about which one it is behind, the client initiates test III. If a response is received, its behind a restricted NAT, and if no response is received, its behind a port restricted NAT.

 

 

 


1.1 Test (Discovery) Procedure

 

  • Test II checks the presence of a NAT or symmetric UDP firewall, and discovers a full cone NAT 
  • Test I' discovers a symmetric NAT 
  • Test III discovers a restricted con NAT or port restricted cone NAT 

 

1.2 No NAT/Firewall (Open Internet)

 


Test I

  • The client sends a Binding Request message to a server (at Primary IP:Primary Port (1.1.1.1:3478)), and receives a Binding Response message back from the server. 
  • The client then compares the following two fields. If they match, the client knows that there is no NAT between the Internet and itself. 
    • [a] Binding Request message: IP header source information = 10.1.1.1:40000
    • [b] Binding Response message: MAPPED-ADDRESS attribute = 10.1.1.1:40000
  • When the server sends a Binding Response message back to the client, it includes the source information of the Binding Request message ([a]) in the MAPPED-ADDRESS field of the Binding Response message ([b]). So, if the two values match, that indicates there is no NAT, and thus no address/port has been translated. 

Test II

  • Next, the client sends the server a Binding Request message with both the Change IP and Change Port flags from the CHANGE-REQUEST attribute set as 1. 
  • When the server receives the message, it uses a set of Alternate IP:Alternate Port (2.2.2.2:3479), instead of the Primary IP:Primary Port (1.1.1.1:3478) of the received packet, as its source information for a Binding Response message, then sends the message back to the client.   
  • If this response is received, the client knows it's not behind a UDP firewall.
  • That is, i) the Internal Address/Port (prior to NAT translation) and the External Address/Port (after NAT translation) values were matched, and ii) the inbound packet with the source information (2.2.2.2:3479), which is different from the destination information (1.1.1.1:3478) of the outbound packet, was ALLOWED. This means there is neither NAT nor firewall.

 

1.3 Symmetric UDP Firewall

 


 


Test I

  • Same as in the test for Open Internet above 

Test II

  • The client sends the same Binding Request message as in Open Internet test, but no Binding Response is received. 
  • Thus, the client knows that there is a UDP symmetric firewall.
  • That is, i) the Internal Address/Port and the External Address/Port were matched, and ii) the inbound packet with the source information (2.2.2.2:3479), which is different from the destination information of the outbound packet (1.1.1.1:3478), was DROPPED. This indicates there is a firewall, not a NAT.

 

1.4 Full Cone NAT

 


 
Test I

  • The client sends a Binding Request message to a server (at Primary IP:Primary Port (1.1.1.1:3478)), and receives a Binding Response message back from the server. 
  • The client then compares the following two fields. If they don't match, the client knows that there is a NAT. 
    • [a] Binding Request message: IP header source information = 10.1.1.1:40000
    • [b] Binding Response message: MAPPED-ADDRESS attribute = 5.5.5.1:40000

Test II

  • Next, the client sends the server a Binding Request message with both the Change IP and Change Port flags from the CHANGE-REQUEST attribute set as 1. 
  • When the server receives the message, it uses a set of Alternate IP:Alternate Port (2.2.2.2:3479), instead of the Primary IP:Primary Port (1.1.1.1:3478) of the received packet, as its source information for a Binding Response message. Next, it sends the message back to the client. 
  • If this response is received, the client knows it's behind a full cone NAT.
  • That is, i) the Internal Address/Port (10.1.1.1:40000) and the External Address/Port (5.5.5.1:40000) values were not matched, and ii) the inbound packet with the source information (2.2.2.2:3479), which is different from the destination information of the outbound packet (1.1.1.1:3478), was ALLOWED. This means the client is behind a full cone NAT. Note that symmetric, restricted cone and port restricted cone NATs all DROP inbound packets if their source information (source IP (2.2.2.2) & source Port (3479)) is different from the destination information of the outbound packet (1.1.1.1:3478), as to be explained below.  

 

1.5 Symmetric NAT

 


 

 

Test I

  • Same as in the test for a full cone NAT

Test II

  • The client sends the same Binding Request message as in the full cone NAT test, but no Binding Response is received. 
  • Thus, the client knows that there is no full cone NAT, and thus performs Test I'.

Test I'

  • The client sends a Binding Request message to a server (at Alternate IP:Alternate Port (2.2.2.2:3479)), and receives a Binding Response message back from the server. 
  • The client then compares the following two fields. If they don't match, the client knows that there is a symmetric NAT.
    • [b] Binding Response message: MAPPED-ADDRESS attribute = 5.5.5.1:40000
    • [c] Binding Response message: MAPPED-ADDRESS attribute = 5.5.5.1:50000
  • Through the comparison of RFC 3489 and RFC 5780 in the last post, we found that, in terms of NAT mapping behavior, full cone, restricted cone and port restricted cone NATs all use Endpoint-Independent Mapping, whereas a symmetric NAT uses Address and Port-Dependent Mapping. Here in this test, two different packets with different destination information (1.1.1.1:3478 and 2.2.2.2:3470) were mapped to two different External Ports (40000 and 50000). Therefore, the client is behind a symmetric NAT.

 

1.6 Restricted Cone NAT

 

 
 

 

Test I

  • Same as in the test for a symmetric NAT

Test II

  • Same as in the test for a symmetric NAT

Test I'

  • The client sends the same Binding Request message as in the symmetric NAT test, and a Binding Response is received.
  • The client then compares the following two fields. If they match, the client knows that there is no symmetric NAT. So, it performs Test III. 
    • [b] Binding Response message: MAPPED-ADDRESS attribute = 5.5.5.1:40000
    • [c] Binding Response message: MAPPED-ADDRESS attribute = 5.5.5.1:40000

Test III

  • The client sends a server (at Primary IP:Primary Port (1.1.1.1:3478)) a Binding Request message with the Change Port flags from the CHANGE-REQUEST attribute set as 1. 
  • Then, the server sends the client a Binding Response message after including Primary IP:Alternate Port (1.1.1.1:3479) as its source information. If this message is received, the client knows that it's behind a restricted cone NAT.
  • That is, the inbound packet with the source information (1.1.1.1:3479), which has the same destination IP as in the outbound packet, but a different destination port, was ALLOWED. Therefore, the client is behind a restricted cone NAT.

 

1.7 Port Restricted Cone NAT

 


 

 
Test I

  • Same as in the test for a restricted cone NAT

Test II

  • Same as in the test for a restricted cone NAT

Test I'

  • Same as in the test for a restricted cone NAT

Test III

  • The client sends the same Binding Request message as in a restricted cone NAT test, but no Binding Response is received. So, the client knows it's behind a port restricted cone NAT. 
  • That is, the inbound packet with the source information (1.1.1.1:3479), which has the same destination IP as in the outbound packet, but a different destination Port, was DROPPED. Therefore, the client is behind a restricted cone NAT. 

 


RFC 3489 NAT Behavior Discovery Tools Used in Our Test

  • STUN Server: STUNTMAN (RFC 3489/5780 supported), http://www.stunprotocol.org/
  • STUN Client: JSTUN, http://jstun.javawi.de/
  • Test: STUNTMAN, JSTUN and ipTIME N2E used in classifying NAT types
  • Test Result: A port restricted cone NAT discovered

 

 

Legacy 2015-05-22 08:51:29

Great diagrams for showing the types of NAT and firewalls behave, I think there is a mistake with Symmetric NAT at test I' where the mapped port 40000 to 50000 on the return needs to map from 50000 to 40000 to 10.1.1.1

Netmanias 2015-05-28 03:10:34

Thank you for your comments. Typo has been fixed in figure.

c pavan kumar 2015-08-11 11:48:40

superb information thank u for publishing

 

Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.
 
 
 
 

[HFR Private 5G: my5G]

 

Details >>

 

 

 

     
         
     

 

     
     

Subscribe FREE >>

Currently, 55,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can view all netmanias' contents

  • You can download all netmanias'

    contents in pdf file

     
     

 

     
         
     

 

 

 

View All (181)
5G (9) 6G (1) Backbone (2) Backhaul (3) Blockchain (1) CDN (1) Carrier Ethernet (3) Charging (1) Cloud Native (1) Core (1) DHCP (4) ECM (2) EMM (16) EPS (2) Google (1) HLS (1) HTTP Adaptive Streaming (3) Handover (5) IPTV (4) Initial Attach (2) IoT (2) Korea (1) LTE (39) LTE Identification (2) LTE-A (1) MPLS (2) Mobility (2) NAT (7) Netflix (1) Network Architecture (3) Network Protocol (20) New Radio (1) OTT (1) PCRF (3) Private 5G (1) QoS (3) RCS (3) SDF (2) SDN/NFV (3) SK Telecom (2) Samsung (3) Security (5) Sk Telecom (1) Transparent Cache (1) Video Streaming (4) VoLTE (2) Wi-Fi (1) YouTube (2)
Password confirmation
Please enter your registered comment password.
Password