Introduction to Address Translation


Back in the old days of the Internet, the TCP/IP address space defined by IP version 4 (IPv4, the version used today) was thought to be more than enough. Organizations could reserve their own address spaces through the Internet Assigned Numbers Authority (IANA), now called the Internet Corporation for Assigned Names and Numbers (ICANN), and anyone who wanted a block of IP addresses generally got them.

Since the early 1990s, various people have been predicting that the IPv4 address space will simply run out of available addresses. This is partially due to the explosive growth of the Internet, but it is also due to how the IPv4 address space is divided. Many organizations that were allocated address spaces early on simply have more address spaces allocated to them than they are using on the Internet. There are also parts of the IPv4 address space that are not legal for hosts to be assigned to on the Internet, namely, the multicast (224.0.0.0/240.0.0.0 mask) and the Class E (240.0.0.0/240.0.0.0) address spaces.

As organizations are connecting to the Internet, some are discovering that their internal networks do not connect well. The main reason for this is usually a conflict in addressing. Long before the Internet was a household word, some corporations set up their internal networks using made-up addresses. However, you cannot simply make up addresses and use them on the Internet. You must use IP addresses assigned by IANA or an ISP. Renumbering a large, internal network would be a daunting task, not to mention that your ISP or IANA is not likely to give you enough addresses to cover all your hosts. Then again, does every host on your internal network really need to be uniquely addressable on the Internet?

IPv6 (the next version of IP) has far more address space ”128 bits of address space versus the 32 provided by IPv4 (in wide use today) ”which will solve this problem. However, most of today's Internet is still running IPv4 and probably will be for some time to come. A solution is needed that will help extend the IPv4 address space used today.

Network Address Translation does exactly this. It is a technology that allows hosts to transparently talk to one another with addresses that are agreeable to each other. To put it another way, NAT allows hosts with illegal or private address spaces to talk with hosts on a public network and vice versa. It is a godsend for network managers who have limited address space or want to make better use of the address spaces they have without having to subnet, thus reducing the number of IPs that can be used. NAT can also be perceived as a security enhancement because a firewall is required for communication between the hosts. NAT, as it is commonly implemented today, is described in RFC3022. [1]

[1] You can get copies of RFCs from http://www.rfc-editor.org, among other places.

NAT is implemented as part of the FireWall-1 kernel module that sits between the data link and network layers . As such, NAT can be provided transparently without the client's or the server's knowledge. Application proxies, by their nature, can also provide this functionality because they originate all connections coming from the internal network. However, proxies usually are not transparent and do not usually give you the level of control you have over FireWall-1's NAT functionality. You can modify the source, destination, and service port of any connection going through FireWall-1.

Consider the following example (see Figure 10.1). Let's say your ISP gives you a /29 block of addresses ( netmask 255.255.255.248). If you were to use this address space between your Internet router and your firewall, the address space would break down into the host numbers listed in Table 10.1. [2]

[2] If you are unfamiliar with subnetting and how it affects address space, you might want to read LAN Technologies Explained by Philip Miller and Michael Cummins [2000], TCP/IP Illustrated by W. Richard Stevens and Gary R. Wright [1993 “95], or any other appropriate TCP/IP book.

Figure 10.1. Sample network

graphics/10fig01.gif

Table 10.1. Breakdown of 192.168.0.0/29 address space

Host Number

Description

.0

Network identifier (cannot be used by hosts)

.1

Internet router

.2

Firewall

.3

Available

.4

Available

.5

Available

.6

Available

.7

Broadcast address (cannot be used by hosts)

Between the broadcast address, the network identifier, your firewall, and your Internet router, you have a grand total of four IP addresses you can use for other purposes. With NAT, you can do the following.

  • Give your e-mail, intranet Web server, and Web server externally reachable IP addresses.

  • Allow all your clients to access the Internet using the firewall's external IP address.

  • Have all of your computers protected by your firewall.

  • Change ISPs without having to renumber your internal network.

Figure 10.1 illustrates a sample network.

Although NAT does add an extra layer of protection and gives you flexibility, there are some downsides to NAT.

  • Using NAT is like using proxies in that NAT must be updated to handle new applications. As a result, it is not compatible with every application that exists today or in the future.

  • NAT requires additional work to maintain. This is discussed in more detail later in this chapter in Implementing NAT: A Step-by-Step Example.

  • Only so many connections can be hidden behind a single IP address.

  • NAT requires extra memory and CPU on the gateway. In most cases, this is negligible, but it starts becoming noticeable when over 20,000 connections through a single gateway are subject to NAT.

More information about the disadvantages of using NAT is documented in RFC3027.



Essential Check Point FireWall-1 NG
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
ISBN: 0321180615
EAN: 2147483647
Year: 2004
Pages: 143

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net