Solved

Network address translation

Posted on 2004-04-06
9
179 Views
Last Modified: 2010-03-18
Hi,

What is the advantage/disadvantage of applying NAT at internet?

Thanks!
0
Comment
Question by:iecu
9 Comments
 
LVL 32

Expert Comment

by:Luc Franken
ID: 10767235
This looks very much like a homework question to me..

LucF
0
 
LVL 30

Accepted Solution

by:
Rich Weissler earned 43 total points
ID: 10767946
Another learning opportunity!  If this is a homework assignment, I'd recommend reading your text.  In either case, if you need supplemental text, try this:
http://computer.howstuffworks.com/nat.htm

This one looks like it deals more directly with your question:
http://stalin.iodynamics.com/education/nat.html
0
 
LVL 9

Assisted Solution

by:jamesreddy
jamesreddy earned 41 total points
ID: 10767952
LOL.  Possibly.  But maybe not.

NAT is a great way of saving money on public IP addresses for a company or any organization that wants to share a network connection.  It allows a range of internal IP addresses to be resolved into a single external IP address.  That external IP address is the only address that can be seen on the Internet.  Anyone attempting to trace the IP address from a remote location will be stopped dead at the router and unable to resolve individual PCs, so it does help with security as well.

The other side of that is that is that people within your network can theoretically do things "anonymously" because they are all being seen as the single external IP address.  So it is somewhat of a security flaw, as well, if you do not have the proper monitoring software.  Illegal Internet activity can occur like downloading copyrighted material through Kazaa, and any law enforcement officials that try to trace that will find only the public IP address and can hold them liable.  There is a big movement on throughout the country in trying to prosecute colleges for their students' illegal Internet activities.

Maybe that might help clarify some of the highpoints of NAT.

James
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 
LVL 11

Assisted Solution

by:ewtaylor
ewtaylor earned 41 total points
ID: 10768259
I dol not think so he has been registered for a while. JAmes hit most of the pros and cons. I will see if I can add to them. VPN through NAT is complicated and normally needs a third party client or a win2k3 server. Some games cannot traverser NAT especially if more than one computer behind the firewall is trying to play at the same time. Big advantages are cost, and security.
0
 
LVL 9

Expert Comment

by:jamesreddy
ID: 10768325
I'll agree on the games and cost issue, but I've set up dozens of these and have thus far never had a problem with VPN/NAT compatibility.  Granted, I use a Cisco PIX firewall for my VPN and NAT device, so maybe Cisco just has it figured out, but so far...with my PIX's, I've never had an issue.
0
 
LVL 11

Expert Comment

by:ewtaylor
ID: 10768538
Well it depends on the ios and the version of secure client. I have banged my head agains the wall enough times to know this. Used to be I would have to setup a real NAT (Not the pat everyone is calling NAT these days) to get multiple clients behind the pix to be able to connect via vpn. Thus using routable ip addresses. I know win2k3 vpn has NAT traversal and that there is downloadable upgrade to win2k and winxp for this, so it is not as big a problem as it used to be. However if you are using a win2k server as your vpn endpoint then you will have a problem
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonicwall AP 3 61
Windows 7 home sp1 updates 9 96
internet access from windows servers 4 71
File Server Migration - Questions and advice 7 125
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question