US20020159447A1 - Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet - Google Patents
Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet Download PDFInfo
- Publication number
- US20020159447A1 US20020159447A1 US09/844,309 US84430901A US2002159447A1 US 20020159447 A1 US20020159447 A1 US 20020159447A1 US 84430901 A US84430901 A US 84430901A US 2002159447 A1 US2002159447 A1 US 2002159447A1
- Authority
- US
- United States
- Prior art keywords
- address
- packet
- translation rules
- translation
- destination address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004590 computer program Methods 0.000 title claims abstract description 17
- 238000012545 processing Methods 0.000 claims abstract description 27
- 238000013519 translation Methods 0.000 claims description 229
- 238000010586 diagram Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 2
- 230000002950 deficient Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2514—Translation of Internet protocol [IP] addresses between local and global IP addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2564—NAT traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]
Definitions
- the present invention relates to the field of communications in general and more particularly to network address translation (NAT).
- NAT network address translation
- NAT is a widely used technology for resolving address conflicts between two discrete Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
- TCP/IP Transmission Control Protocol/Internet Protocol
- the NAT function translates the source and/or destination IP addresses in the header portion of IP packets as they cross the NAT threshold, so that packets originating in one network are mapped into unique addresses as they cross into the other network.
- This basic technology may be suitable for some types of network traffic, but may not be sufficient for the needs of network management platforms.
- Embodiments of the present invention provide methods, systems and computer program products for processing a packet.
- Internet Protocol (IP) addresses located in the payload of the packet are translated if a source address and/or a destination address located in a packet header has been previously translated.
- IP Internet Protocol
- the packet may be received at a network address translator (NAT) device.
- the received packet may be a Simple Network Management Protocol (SNMP) packet. It may be determined if the source address and/or the destination address located in the packet header have been previously translated to a normalized IP address.
- the payload of the packet may be searched for IP addresses if the source and/or destination address located in the packet header is determined to have been previously translated.
- the IP addresses may be translated by replacing at least one occurrence of an IP address located in the payload of the packet.
- the IP addresses may be identified by a unique SNMP object identifier (OID) located within a Management Information Base (MIB).
- MIB Management Information Base
- the source and the destination address may be identified in the packet header. It may be determined if the source and/or destination address is present in a set of translation rules. If it is determined that the source and/or destination address is present in the set of translation rules, the source and/or destination address may have been previously translated.
- the set of translation rules may be a list of each IP address that has been translated and its corresponding normalized IP address.
- the set of translation rules may include a first set of translation rules that correspond to a first customer and a second set of translation rules that correspond to a second customer. The set of translation rules that correspond to the first customer may be unique with respect to the set of translation rules that correspond to the second customer.
- an occurrence of an IP address may be identified in the payload of the packet.
- a corresponding normalized IP address for this IP address may be determined using the set of translation rules in which the source and/or destination address was found.
- Each occurrence of an IP address in the payload of the packet may be identified and its corresponding normalized IP address may be determined.
- IP addresses may be translated by replacing the IP address located in the payload of the packet with the corresponding normalized IP address.
- the source and/or destination address may be determined if the source and/or destination address is present in a header translation set of translation rules.
- the source and/or destination address may have been previously translated if it is determined that the source and/or destination address are not present in the header translation set of translation rules.
- the source address and/or destination address may have been previously translated by a router or a border firewall.
- the source and/or destination address located in the packet header may be translated if the source and/or destination address is found in the header translation set of translation rules. If it is determined that the source and/or destination address is present in the header translation set of translation rules, a corresponding normalized IP address for the IP addresses identified in the payload of the packet may be determined using the header translation set of translation rules.
- a packet may be discarded if it is determined that the source and/or destination address is not present in a set of translation rules and the source address and the destination address are not present in the header translation set of translation rules.
- the packet may be discarded if the source and/or destination address is present in more than one set of translation rules, unless one of the sets of translation rules is the header translation set of translation rules.
- FIG. 1 is a block diagram of a data processing system according to embodiments of the present invention.
- FIG. 2 is a block diagram of a data processing system according to embodiments of the present invention.
- FIG. 3 is a block diagram of a basic network incorporating CNAT according to embodiments of the present invention.
- FIG. 4 is a block diagram of a header sensitive translator according to embodiments of the present invention.
- FIG. 5 is a table illustrating sets of translation rules according to embodiments of the present invention.
- FIG. 6 is a flowchart illustrating operations of a header sensitive translator according to embodiments of the present invention.
- FIG. 7 is a flowchart illustrating operations of a header sensitive translator according to other embodiments of the present invention.
- the present invention may be embodied as a method, data processing system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit.” Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code means embodied in the medium. Any suitable computer readable medium may be utilized including hard disks, CD-ROMs, optical storage devices, a transmission media such as those supporting the Internet or an intranet, or magnetic storage devices.
- Computer program code for carrying out operations of the present invention may be written in an object oriented programming language such as Java®, Smalltalk or C++.
- the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the “C” programming language.
- the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer.
- the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- LAN local area network
- WAN wide area network
- Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart and/or block diagram block or blocks.
- the present invention provides for translation of Internet Protocol (IP) addresses located in a payload of a packet.
- IP Internet Protocol
- This capability of modifying the actual payloads of, for example, specific network management messages, may enable network management across networks that have conflicting or out-of-range IP addresses.
- the header sensitive translator monitors packets coming through the machine and determines if a source and/or destination address has been previously translated. If it is determined that the source and/or destination address has been previously translated, the header sensitive translator replaces IP addresses located in the payload of the packet using a set of translation rules.
- the translation of IP addresses located in the payload of the packet typically ensures that no conflicts will occur in the destination network.
- FIG. 1 illustrates an exemplary embodiment of a data processing system 130 in accordance with embodiments of the present invention.
- a data processing system 130 typically includes input device(s) 132 such as a keyboard or keypad, a display 134 , and a memory 136 that communicate with a processor 138 .
- the data processing system 130 may further include a speaker 144 , and an I/O data port(s) 146 that also communicates with the processor 138 .
- the I/O data port 146 can be used to transfer information between the data processing system 130 and another computer system or a network, for example, the Internet.
- These components may be conventional components such as those used in many conventional data processing systems which may be configured to operate as described herein.
- FIG. 2 is a block diagram of embodiments of a data processing system that illustrates systems, methods, and computer program products in accordance with embodiments of the present invention.
- the processor 138 communicates with the memory 136 via an address/data bus 248 .
- the processor 138 can be any commercially available or custom microprocessor.
- the memory 136 is representative of the overall hierarchy of memory devices containing the software and data used to implement the functionality of the data processing system 130 .
- the memory 136 can include, but is not limited to, the following types of devices: cache, ROM, PROM, EPROM, EEPROM, flash memory, SRAM, and DRAM.
- the memory 136 may include several categories of software and data used in the data processing system 130 : the operating system 252 ; the application programs 254 ; the input/output (I/O) device drivers 258 ; and the data 256 .
- the operating system 252 may be any operating system suitable for use with a data processing system, such as OS/2, AIX or System390 from International Business Machines Corporation, Armonk, N.Y. Windows95, Windows98 or Windows2000 from Microsoft Corporation, Redmond, Wash. Unix or Linux.
- the I/O device drivers 258 typically include software routines accessed through the operating system 252 by the application programs 254 to communicate with devices such as the input devices 132 , the display 134 , the speaker 144 , the I/O data port(s) 146 , and certain memory 136 components.
- the application programs 254 are illustrative of the programs that implement the various features of the data processing system 130 and preferably include at least one application which provides the header sensitive translation aspects of embodiments of the present invention.
- the data 256 represents the static and dynamic data used by the application programs 254 , the operating system 252 , the I/O device drivers 258 , and other software programs that may reside in the memory 136 .
- the application programs 254 preferably include a header sensitive translator module 260 .
- the header sensitive translator module 260 preferably carries out operations as described herein for translating Internet Protocol (IP) addresses located in a packet.
- IP Internet Protocol
- the data portion 256 of memory 136 preferably includes one or more sets of translation rules 270 and 271 which may be used to identify IP addresses that need to be translated and the corresponding normalized IP addresses, i.e. unique IP addresses.
- the data portion 256 of memory 236 may also include a buffer 272 which may be used to store the packet during the translation process.
- header sensitive translator module 260 being an application program
- other configurations may also be utilized while still benefiting from the teachings of the present invention.
- the header sensitive translator module 260 may also be incorporated into the operating system 252 or other such logical division of the data processing system 130 .
- the present invention should not be construed as limited to the configuration of FIG. 2 but is intended to encompass any configuration capable of carrying out the operations described herein.
- a header sensitive translator may be incorporated into a Comprehensive Network Address Translator (CNAT) as shown in FIG. 3.
- CNAT may provide a monitoring program that may reside at the edge of the network, for example, between the service provider's network and the customer's network as shown in FIG. 3.
- CNAT may monitor packets coming through a network device and enable management of conflicting Internet Protocol (IP) address ranges by mapping conflicting addresses into available addresses within the service provider's network. For all packets routed through the system, CNAT may check the source and destination IP addresses and may translate any conflicting addresses to typically ensure that no conflicts occur in the destination network.
- IP Internet Protocol
- CNAT typically scans the contents of the payload of the packet, and translates all values associated with IP address type attributes within the packets where applicable before forwarding these packets on to their destinations.
- SNMP Simple Network Management Protocol
- ICMP Internet Control Message Protocol
- the header sensitive translator may provide CNAT with the additional capability to bypass the header translation function of CNAT discussed above.
- CNAT may be incorporated into the customer's network without having to change the existing NAT translation configuration of the customer's network.
- CNAT machines may be integrated into the network topology and may represent the only TCP/IP route from the service provider's network to the customer's network. Integrating CNAT into the network topology typically requires static routes on all routers adjacent to the CNAT node, as well as on the CNAT node itself.
- a service provider may provide network monitoring and management services to a customer or multiple customers.
- the IP addresses for example, in customer A's network 310 , may overlap with the IP addresses in the service provider's network 370 or with IP addresses in customer B's network 320 .
- the service provider may use the header sensitive translator 350 to translate IP addresses in the payload of packets received from a NAT device 330 to corresponding normalized IP addresses, i.e., unique IP addresses, to avoid conflicts in the service provider's network 370 .
- the NAT device 330 may have already translated the source and/or destination address located in the header of the packet. Accordingly, the header sensitive translator 350 portion of CNAT 340 may be used to avoid confusing overlap of IP addresses within packets, for example, Simple Network Management Protocol (SNMP) packets or Internet Control Message Protocol (ICMP) packets, by translating IP addresses found within the payloads of packets to unique IP addresses, i.e. IP addresses not currently assigned.
- SNMP Simple Network Management Protocol
- ICMP Internet Control Message Protocol
- FIG. 3 only shows two customer networks, the present invention is not limited to this configuration. For example, there may be three or more customer networks routed through the CNAT. Alternatively, there may only be one customer network routed through the CNAT to the service provider.
- a packet for example, an SNMP packet, may be received at the header sensitive translator 350 from a first NAT device, for example, NAT device 330 , and stored in a buffer 272 .
- the header sensitive translator 350 is located within a CNAT product and thus, the header sensitive translator is part of a second NAT device.
- the header sensitive translator located in the second NAT device may translate Internet Protocol (IP) addresses located in a payload of the packet if at least one of the source address and the destination address has been previously translated by the first NAT device.
- IP Internet Protocol
- the first NAT device may be, for example, a border firewall or a router.
- a detector circuit 410 determines if a source address and/or a destination address located in the packet header has been previously translated by the first NAT device. The detector circuit 410 may determine this by first identifying the source address and the destination address located in the packet header. The detector circuit 410 may search all sets of translation rules for the identified source and destination addresses.
- a set of translation rules is a list of each IP address that has been translated and its corresponding normalized IP address, i.e. unique IP address.
- the sets of translation rules may correspond to different customers, for example, Customers A and B of FIG. 3.
- a set of translation rules may include one or more pairs of IP addresses, i e. an IP address and a corresponding normalized IP address.
- IP addresses may overlap between sets of translation rules, but the normalized IP addresses are globally unique. Thus, each customer's set of translation rules are unique to that particular customer, i e. Customer A's set of translation rules do not overlap with Customer B's set of translation rules and so on.
- FIG. 5 depicts two exemplary sets of translation rules for Customer A and Customer B and will be discussed in detail below.
- the set of translation rules may be defined for each NAT device when CNAT is configured. Each set may be defined in a CNAT configuration database. A set 0 or “header translation” set of translation rules is used for standard translation entries. For packets fitting the translation rules defined in the set 0 set of translation rules, the header sensitive translator may translate the source and/or destination address located in the header and any IP addresses located in the payload as discussed below.
- the detector circuit 410 determines if the set is the set 0 set of translation rules.
- the presence of the source and/or destination address in the set 0 set of translation rules indicates that the packet header has not been previously translated.
- the presence of the source and/or destination address in a set of translation rules other than the set 0 set of translation rules indicates that the header has been previously translated by the first NAT device to a unique IP address.
- the detector circuit 410 may discard the packet if the packet appears to be defective. For example, if neither the source nor the destination address is present in any of the sets of translation rules including the set 0 set of translation rules, the packet may be discarded. Alternatively, the detector circuit 410 may forward the packet if neither the source nor the destination address is present in any of the sets of translation rules including the set 0 set of translation rules. Furthermore, if the source and/or destination address is present in multiple sets of translation rules other than the set 0 set of translation rules, the packet may also be discarded.
- a scanner circuit 420 searches the payload of the packet for all IP addresses.
- the scanner circuit 420 may identify a first occurrence of an IP address in the payload of the packet.
- the capability to translate IP addresses found within the packets typically requires the proper identification of the IP addresses that need to be translated and the location of the IP addresses in the packet.
- CNAT may use a list of SNMP Object Identifiers (OIDs) to identify an IP address and its location.
- OIDs SNMP Object Identifiers
- An SNMP OID is an administratively assigned name of an object which specifies the object type.
- the OID is a sequence of integers and each of these integers has an assigned significance.
- the SNMP object identifier is typically located within a Management Information Base (MIB).
- MIB Management Information Base
- the object identifier might be 1 . 3 . 6 . 1 . 2 . 1 . 4 . 20 . 1 . 1 .IP address.
- MIB Management Information Base
- MIB Management Information Base
- the scanner circuit 420 may use the set of translation rules that the source and/or destination address was found in to identify the corresponding normalized IP address.
- a payload translator circuit 440 may then translate the occurrence of the IP address by replacing the IP address located in the payload of the packet with the corresponding normalized IP address.
- the scanner circuit 420 may identify each occurrence of an IP address located in the payload of the packet and find the corresponding normalized IP address for each identified IP address.
- the payload translator circuit 440 may continue to translate each occurrence of an IP address located in the payload of the packet by replacing the IP address with the corresponding normalized IP address.
- the header sensitive translator 350 may further include a header translator circuit 450 specifically for networks that are directly connected to the second NAT device and do not connect through a first NAT device, i.e. those networks that do not already have a NAT-capable device, i. e. a border firewall or router.
- the header translator circuit 450 may translate the source and/or the destination address located in the packet header if the detector circuit 410 determines that the source and/or the destination address is present in the set 0 set of translation rules as discussed above. If the source and/or destination address is present in the set 0 set of translation rules, the scanner circuit 420 may use the set 0 set of translation rules to determine the corresponding normalized IP addresses for each occurrence of an IP address for this particular packet.
- FIG. 5 a table illustrating exemplary sets of translation rules according to embodiments of the present invention will be used to illustrate the functionality of the header sensitive translator discussed above. Although only two sets of translation rules are shown in FIG. 5, many more sets may be employed. Furthermore, each set of translation rules may contain more than two pair, i.e. an IP address and its corresponding normalized IP address, of IP addresses. Set 0 is not shown in FIG. 5 because, as discussed above, set 0 contains a set of translation rules used for header translation entries.
- FIG. 5 is illustrated as having sets of translation rules, IP addresses and corresponding normalized IP addresses, the table may also include network masks. Such network masks may be utilized in the determination of whether an address is present in the table.
- the x's may refer to a network mask value of 0 such that any value in the positions occupied by the x's would be considered a match.
- the table of FIG. 5 is provided for illustrative purposes only, and, therefore, the present invention should not be construed as limited to table structures as seen in FIG. 5.
- a packet for example, an SNMP packet is received at the header sensitive translator 350 and stored in the buffer 272 .
- the detector circuit 410 identifies the source and destination addresses located in the header of the packet. Assuming the source address is identified as 9 . 40 .x.x by the detector circuit, the detector circuit 410 will search for this particular IP address in every set of translation rules, in this case sets 1 and 2 . In this example, the detector circuit 410 would determine that the IP address 9 . 40 .x.x is in set 2 271 which belongs to customer B.
- the scanner circuit 420 identifies the first occurrence of an IP address found in the payload of the packet using a unique SNMP object identifier (OID) located within a Management Information Base (MIB) as discussed above. Once the source address is determined to belong to set 2 , the payload is searched for all of the IP addresses in set 2 . Thus, the scanner circuit 420 in this example will search for IP addresses 10 . 10 .x.x and 92 . 168 .x.x in the payload of the packet. Once the scanner circuit 420 identifies the first occurrence of one of these IP addresses in the payload of the packet, the payload translator circuit 440 replaces the IP address with its corresponding normalized IP address. For example, 10 .
- MIB Management Information Base
- 10 .x.x would be replaced with its corresponding normalized IP address 9 . 39 .x.x.
- 92 . 168 .x.x would be replaced with its corresponding normalized IP address 9 . 40 .x.x.
- the scanner circuit 420 will continue to identify IP addresses and the corresponding normalized IP addresses for each occurrence of either 10 . 10 .x.x or 92 . 168 .x.x in the payload of the packet until it reaches the end of the payload of the packet and the payload translator circuit 440 will also continue to replace each IP address with its corresponding normalized IP address.
- the process would be similar if the source and/or destination address was identified to be a normalized IP address from set 1 270 , for example, 9 . 37 .x.x. It will also be understood that if the source and/or destination address were found in the set 0 set of translation rules, the header translator circuit 450 would translate the header information and the payload would be translated, as discussed above, using the set 0 set of translation rules.
- FIGS. 6 and 7 are flowchart illustrations of operations carried out by a header sensitive translator according to embodiments of the present invention.
- a packet such as an SNMP packet
- the header sensitive translator determines if a translation has occurred in the header of the packet, i.e. have the source and/or destination address been previously translated to a normalized IP address by another NAT device. This may be done by determining if the source and/or destination address is present in any set of translation rules (block 722 ).
- a set of translation rules is a list of each IP address that has been translated and its corresponding normalized IP address, i.e. unique IP address.
- the sets of translation rules may correspond to different customers.
- a set of translation rules may include one or more pairs of IP addresses, i.e. an IP address and a corresponding normalized IP address.
- the IP addresses may overlap between sets of translation rules, but the normalized IP addresses are globally unique.
- each customer's set of translation rules are unique to that particular customer, i.e. Customer A's set of translation rules do not overlap with Customer B's set of translation rules and so on. If the source and/or destination address is present in any of the sets of translation rules, the header of the packet may have been previously translated.
- the packet may optionally be discarded (block 630 ) and operations may be terminated with respect to this packet. If, on the other hand, it is determined that a translation has occurred (block 620 ), the payload of the packet is searched for an IP address (block 640 ). Each occurrence of an IP address that is found to match any of the sets of translation rules during the search of the payload may be translated (block 650 ). The translation may consist of replacing the original IP address with a corresponding normalized IP address or replacing a normalized IP address with a corresponding original address. The normalized IP address and/or original IP address may be found in the set of translation rules in which the source and/or destination address was found.
- a packet for example, an SNMP packet, may be received at a second NAT device from a first NAT device and may be stored temporarily in a buffer (block 710 ).
- the header sensitive translator of the present invention is located within the second NAT device, such as a CNAT.
- the first NAT device may be, for example, a border firewall or a router.
- the header sensitive translator may identify a source address and a destination address located in the packet header (block 720 ). It is determined if the source address is present in any set of translation rules (block 722 ).
- a set of translation rules is a list of each IP address that has been translated and its corresponding normalized IP address, i.e. unique IP address.
- the sets of translation rules may correspond to different customers. Each customer's set of translation rules may be unique to that particular customer, i.e. a first Customer A's set of translation rules would not overlap with a second Customer B's set of translation rules and so on.
- the packet may be discarded (block 740 ) and operations with respect to this packet may terminate.
- the address occurs more than once in a single set of translation rules or if the address occurs in more than one set of translation rules (block 725 ). Alternatively, it may be determined if the address occurs multiple times during configuration. For example, when a new pair, i.e. an IP address and a corresponding normalized IP address, is added to a set of translation rules, an error message may be displayed if the address occurs more than once in a single set of translation rules or if the address occurs in more than one set of translation rules.
- the address is determined to occur multiple times (block 725 )
- the set 0 set of translation rules is used for standard translation entries. If the source address is determined to be in the set 0 set of translation rules (block 726 ), the header sensitive translator translates the source and/or destination address in the packet header (block 728 ). If the source address is determined not to be in the set 0 set of translation rules (block 726 ), the packet may be discarded as defective and operations with respect to this packet may terminate.
- the payload of the packet is searched for IP addresses (block 730 ).
- the set of translation rules that the source or destination address was identified to be in is searched for the corresponding normalized IP address. It will be understood that every IP address pair, i.e. an IP address and a corresponding normalized IP address, in the relevant set of translation rules is used to translate the packet.
- the identified IP address is then translated (replaced) using the corresponding normalized IP address found in the set of translation rules (block 750 ).
- the capability to translate IP addresses found within the packet typically requires the proper identification of the IP addresses that need to be translated and the location of the IP addresses in the packet.
- the payload of the packet is searched for IP addresses (block 730 ).
- the set of translation rules that the source or destination address was identified in is searched for the corresponding normalized IP address. It will be understood that every IP address pair, ie. an IP address and a corresponding normalized IP address, in the relevant set of translation rules is used to translate the packet.
- the identified IP address is then translated (replaced) using the corresponding normalized IP address found in the set of translation rules (block 750 ).
- the capability to translate IP addresses found within the packet typically requires the proper identification of the IP addresses that need to be translated and the location of the IP addresses in the packet.
- each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The present invention relates to the field of communications in general and more particularly to network address translation (NAT).
- NAT is a widely used technology for resolving address conflicts between two discrete Transmission Control Protocol/Internet Protocol (TCP/IP) networks. The NAT function translates the source and/or destination IP addresses in the header portion of IP packets as they cross the NAT threshold, so that packets originating in one network are mapped into unique addresses as they cross into the other network. This basic technology may be suitable for some types of network traffic, but may not be sufficient for the needs of network management platforms.
- Embodiments of the present invention provide methods, systems and computer program products for processing a packet. Internet Protocol (IP) addresses located in the payload of the packet are translated if a source address and/or a destination address located in a packet header has been previously translated.
- In particular embodiments of the present invention, the packet may be received at a network address translator (NAT) device. The received packet may be a Simple Network Management Protocol (SNMP) packet. It may be determined if the source address and/or the destination address located in the packet header have been previously translated to a normalized IP address. The payload of the packet may be searched for IP addresses if the source and/or destination address located in the packet header is determined to have been previously translated. The IP addresses may be translated by replacing at least one occurrence of an IP address located in the payload of the packet. The IP addresses may be identified by a unique SNMP object identifier (OID) located within a Management Information Base (MIB).
- In further embodiments of the present invention the source and the destination address may be identified in the packet header. It may be determined if the source and/or destination address is present in a set of translation rules. If it is determined that the source and/or destination address is present in the set of translation rules, the source and/or destination address may have been previously translated. The set of translation rules may be a list of each IP address that has been translated and its corresponding normalized IP address. The set of translation rules may include a first set of translation rules that correspond to a first customer and a second set of translation rules that correspond to a second customer. The set of translation rules that correspond to the first customer may be unique with respect to the set of translation rules that correspond to the second customer.
- In further embodiments of the present invention, an occurrence of an IP address may be identified in the payload of the packet. A corresponding normalized IP address for this IP address may be determined using the set of translation rules in which the source and/or destination address was found. Each occurrence of an IP address in the payload of the packet may be identified and its corresponding normalized IP address may be determined. IP addresses may be translated by replacing the IP address located in the payload of the packet with the corresponding normalized IP address.
- In still further embodiments of the present invention, it may be determined if the source and/or destination address is present in a header translation set of translation rules. The source and/or destination address may have been previously translated if it is determined that the source and/or destination address are not present in the header translation set of translation rules. The source address and/or destination address may have been previously translated by a router or a border firewall.
- In further embodiments of the present invention, the source and/or destination address located in the packet header may be translated if the source and/or destination address is found in the header translation set of translation rules. If it is determined that the source and/or destination address is present in the header translation set of translation rules, a corresponding normalized IP address for the IP addresses identified in the payload of the packet may be determined using the header translation set of translation rules.
- In still further embodiments of the present invention a packet may be discarded if it is determined that the source and/or destination address is not present in a set of translation rules and the source address and the destination address are not present in the header translation set of translation rules. Alternatively, the packet may be discarded if the source and/or destination address is present in more than one set of translation rules, unless one of the sets of translation rules is the header translation set of translation rules.
- FIG. 1 is a block diagram of a data processing system according to embodiments of the present invention;
- FIG. 2 is a block diagram of a data processing system according to embodiments of the present invention;
- FIG. 3 is a block diagram of a basic network incorporating CNAT according to embodiments of the present invention;
- FIG. 4 is a block diagram of a header sensitive translator according to embodiments of the present invention;
- FIG. 5 is a table illustrating sets of translation rules according to embodiments of the present invention;
- FIG. 6 is a flowchart illustrating operations of a header sensitive translator according to embodiments of the present invention; and
- FIG. 7 is a flowchart illustrating operations of a header sensitive translator according to other embodiments of the present invention.
- The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which illustrative embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
- As will be appreciated by one of skill in the art, the present invention may be embodied as a method, data processing system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit.” Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code means embodied in the medium. Any suitable computer readable medium may be utilized including hard disks, CD-ROMs, optical storage devices, a transmission media such as those supporting the Internet or an intranet, or magnetic storage devices.
- Computer program code for carrying out operations of the present invention may be written in an object oriented programming language such as Java®, Smalltalk or C++. However, the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the “C” programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart and/or block diagram block or blocks.
- The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart and/or block diagram block or blocks.
- As described in more detail below, the present invention provides for translation of Internet Protocol (IP) addresses located in a payload of a packet. This capability of modifying the actual payloads of, for example, specific network management messages, may enable network management across networks that have conflicting or out-of-range IP addresses. The header sensitive translator monitors packets coming through the machine and determines if a source and/or destination address has been previously translated. If it is determined that the source and/or destination address has been previously translated, the header sensitive translator replaces IP addresses located in the payload of the packet using a set of translation rules. The translation of IP addresses located in the payload of the packet typically ensures that no conflicts will occur in the destination network.
- Various embodiments of the present invention will now be described with reference to FIGS. 1 through 7. FIG. 1 illustrates an exemplary embodiment of a
data processing system 130 in accordance with embodiments of the present invention. Adata processing system 130 typically includes input device(s) 132 such as a keyboard or keypad, adisplay 134, and amemory 136 that communicate with aprocessor 138. Thedata processing system 130 may further include a speaker 144, and an I/O data port(s) 146 that also communicates with theprocessor 138. The I/O data port 146 can be used to transfer information between thedata processing system 130 and another computer system or a network, for example, the Internet. These components may be conventional components such as those used in many conventional data processing systems which may be configured to operate as described herein. - FIG. 2 is a block diagram of embodiments of a data processing system that illustrates systems, methods, and computer program products in accordance with embodiments of the present invention. The
processor 138 communicates with thememory 136 via an address/data bus 248. Theprocessor 138 can be any commercially available or custom microprocessor. Thememory 136 is representative of the overall hierarchy of memory devices containing the software and data used to implement the functionality of thedata processing system 130. Thememory 136 can include, but is not limited to, the following types of devices: cache, ROM, PROM, EPROM, EEPROM, flash memory, SRAM, and DRAM. - As shown in FIG. 2, the
memory 136 may include several categories of software and data used in the data processing system 130: theoperating system 252; theapplication programs 254; the input/output (I/O)device drivers 258; and thedata 256. As will be appreciated by those of skill in the art, theoperating system 252 may be any operating system suitable for use with a data processing system, such as OS/2, AIX or System390 from International Business Machines Corporation, Armonk, N.Y. Windows95, Windows98 or Windows2000 from Microsoft Corporation, Redmond, Wash. Unix or Linux. The I/O device drivers 258 typically include software routines accessed through theoperating system 252 by theapplication programs 254 to communicate with devices such as theinput devices 132, thedisplay 134, the speaker 144, the I/O data port(s) 146, andcertain memory 136 components. Theapplication programs 254 are illustrative of the programs that implement the various features of thedata processing system 130 and preferably include at least one application which provides the header sensitive translation aspects of embodiments of the present invention. Finally, thedata 256 represents the static and dynamic data used by theapplication programs 254, theoperating system 252, the I/O device drivers 258, and other software programs that may reside in thememory 136. - As is further seen in FIG. 2, the
application programs 254 preferably include a headersensitive translator module 260. The headersensitive translator module 260 preferably carries out operations as described herein for translating Internet Protocol (IP) addresses located in a packet. Furthermore, thedata portion 256 ofmemory 136 preferably includes one or more sets oftranslation rules data portion 256 of memory 236 may also include abuffer 272 which may be used to store the packet during the translation process. - While the present invention is illustrated, for example, with reference to a header
sensitive translator module 260 being an application program, as will be appreciated by those of skill in the art, other configurations may also be utilized while still benefiting from the teachings of the present invention. For example, the headersensitive translator module 260 may also be incorporated into theoperating system 252 or other such logical division of thedata processing system 130. Thus, the present invention should not be construed as limited to the configuration of FIG. 2 but is intended to encompass any configuration capable of carrying out the operations described herein. - A header sensitive translator may be incorporated into a Comprehensive Network Address Translator (CNAT) as shown in FIG. 3. CNAT may provide a monitoring program that may reside at the edge of the network, for example, between the service provider's network and the customer's network as shown in FIG. 3. CNAT may monitor packets coming through a network device and enable management of conflicting Internet Protocol (IP) address ranges by mapping conflicting addresses into available addresses within the service provider's network. For all packets routed through the system, CNAT may check the source and destination IP addresses and may translate any conflicting addresses to typically ensure that no conflicts occur in the destination network. In addition, for certain payloads of an IP packet, for example, Simple Network Management Protocol (SNMP) data and Internet Control Message Protocol (ICMP) data, CNAT typically scans the contents of the payload of the packet, and translates all values associated with IP address type attributes within the packets where applicable before forwarding these packets on to their destinations.
- The header sensitive translator may provide CNAT with the additional capability to bypass the header translation function of CNAT discussed above. Thus, for example, if the customer's network already has a NAT-capable device, i.e. a border firewall or router, CNAT may be incorporated into the customer's network without having to change the existing NAT translation configuration of the customer's network. CNAT machines may be integrated into the network topology and may represent the only TCP/IP route from the service provider's network to the customer's network. Integrating CNAT into the network topology typically requires static routes on all routers adjacent to the CNAT node, as well as on the CNAT node itself.
- Now referring to FIG. 3, a block diagram illustrating a
network 300 incorporating CNAT including the header sensitive translator of embodiments of the present invention will be described. A service provider may provide network monitoring and management services to a customer or multiple customers. The IP addresses, for example, in customer A'snetwork 310, may overlap with the IP addresses in the service provider'snetwork 370 or with IP addresses in customer B'snetwork 320. Thus, for packets flowing from customer A'snetwork 310 to the service provider'snetwork 320, the service provider may use the headersensitive translator 350 to translate IP addresses in the payload of packets received from aNAT device 330 to corresponding normalized IP addresses, i.e., unique IP addresses, to avoid conflicts in the service provider'snetwork 370. TheNAT device 330 may have already translated the source and/or destination address located in the header of the packet. Accordingly, the headersensitive translator 350 portion ofCNAT 340 may be used to avoid confusing overlap of IP addresses within packets, for example, Simple Network Management Protocol (SNMP) packets or Internet Control Message Protocol (ICMP) packets, by translating IP addresses found within the payloads of packets to unique IP addresses, i.e. IP addresses not currently assigned. - When packets flow from the service provider's
network 370 to, for example, customer B'snetwork 320, the process discussed above would be reversed. For example, customer B may use the headersensitive translator 350 to translate the normalized, i.e. unique, IP addresses in the payload of packets received from aNAT device 360 back to the original IP addresses. Although FIG. 3 only shows two customer networks, the present invention is not limited to this configuration. For example, there may be three or more customer networks routed through the CNAT. Alternatively, there may only be one customer network routed through the CNAT to the service provider. - Now referring to FIG. 4, a block diagram of a header
sensitive translator 350 according to embodiments of the present invention will be described. A packet, for example, an SNMP packet, may be received at the headersensitive translator 350 from a first NAT device, for example,NAT device 330, and stored in abuffer 272. The headersensitive translator 350 is located within a CNAT product and thus, the header sensitive translator is part of a second NAT device. The header sensitive translator located in the second NAT device may translate Internet Protocol (IP) addresses located in a payload of the packet if at least one of the source address and the destination address has been previously translated by the first NAT device. The first NAT device may be, for example, a border firewall or a router. - A
detector circuit 410 determines if a source address and/or a destination address located in the packet header has been previously translated by the first NAT device. Thedetector circuit 410 may determine this by first identifying the source address and the destination address located in the packet header. Thedetector circuit 410 may search all sets of translation rules for the identified source and destination addresses. A set of translation rules is a list of each IP address that has been translated and its corresponding normalized IP address, i.e. unique IP address. The sets of translation rules may correspond to different customers, for example, Customers A and B of FIG. 3. A set of translation rules may include one or more pairs of IP addresses, i e. an IP address and a corresponding normalized IP address. The IP addresses may overlap between sets of translation rules, but the normalized IP addresses are globally unique. Thus, each customer's set of translation rules are unique to that particular customer, i e. Customer A's set of translation rules do not overlap with Customer B's set of translation rules and so on. FIG. 5 depicts two exemplary sets of translation rules for Customer A and Customer B and will be discussed in detail below. - The set of translation rules may be defined for each NAT device when CNAT is configured. Each set may be defined in a CNAT configuration database. A
set 0 or “header translation” set of translation rules is used for standard translation entries. For packets fitting the translation rules defined in theset 0 set of translation rules, the header sensitive translator may translate the source and/or destination address located in the header and any IP addresses located in the payload as discussed below. - If the
detector circuit 410 determines that the source and/or destination address is found in one of the sets of translation rules, thedetector circuit 410 determines if the set is theset 0 set of translation rules. The presence of the source and/or destination address in theset 0 set of translation rules indicates that the packet header has not been previously translated. The presence of the source and/or destination address in a set of translation rules other than theset 0 set of translation rules indicates that the header has been previously translated by the first NAT device to a unique IP address. - Optionally, the
detector circuit 410 may discard the packet if the packet appears to be defective. For example, if neither the source nor the destination address is present in any of the sets of translation rules including theset 0 set of translation rules, the packet may be discarded. Alternatively, thedetector circuit 410 may forward the packet if neither the source nor the destination address is present in any of the sets of translation rules including theset 0 set of translation rules. Furthermore, if the source and/or destination address is present in multiple sets of translation rules other than theset 0 set of translation rules, the packet may also be discarded. - Once it is determined that the source and/or destination address has been previously translated by the first NAT device, i.e. the source and/or destination address is present in one of the sets of translation rules other than the
set 0 set of translation rules, ascanner circuit 420 searches the payload of the packet for all IP addresses. Thescanner circuit 420 may identify a first occurrence of an IP address in the payload of the packet. The capability to translate IP addresses found within the packets typically requires the proper identification of the IP addresses that need to be translated and the location of the IP addresses in the packet. - CNAT may use a list of SNMP Object Identifiers (OIDs) to identify an IP address and its location. An SNMP OID is an administratively assigned name of an object which specifies the object type. The OID is a sequence of integers and each of these integers has an assigned significance. The SNMP object identifier is typically located within a Management Information Base (MIB). For example, in a MIB file the object identifier might be1.3.6.1.2.1.4.20.1.1.IP address. Thus, the IP address begins at the eleventh digit of the OID. Methods, Systems and Computer Program Products for Determining Simple Network Management Protocol (SNMP) Object Identifiers in a Management Information Base (MIB) File are discussed in U.S. patent application Ser. No. 09/768,086 filed Jan. 23, 2001 and assigned to assignee of the present invention, the disclosure of which is incorporated herein by reference.
- Once the first occurrence of an IP address is identified, the
scanner circuit 420 may use the set of translation rules that the source and/or destination address was found in to identify the corresponding normalized IP address. Apayload translator circuit 440 may then translate the occurrence of the IP address by replacing the IP address located in the payload of the packet with the corresponding normalized IP address. Thescanner circuit 420 may identify each occurrence of an IP address located in the payload of the packet and find the corresponding normalized IP address for each identified IP address. Furthermore, thepayload translator circuit 440 may continue to translate each occurrence of an IP address located in the payload of the packet by replacing the IP address with the corresponding normalized IP address. - The header
sensitive translator 350 may further include aheader translator circuit 450 specifically for networks that are directly connected to the second NAT device and do not connect through a first NAT device, i.e. those networks that do not already have a NAT-capable device, i. e. a border firewall or router. Theheader translator circuit 450 may translate the source and/or the destination address located in the packet header if thedetector circuit 410 determines that the source and/or the destination address is present in theset 0 set of translation rules as discussed above. If the source and/or destination address is present in theset 0 set of translation rules, thescanner circuit 420 may use theset 0 set of translation rules to determine the corresponding normalized IP addresses for each occurrence of an IP address for this particular packet. - Now referring to FIG. 5, a table illustrating exemplary sets of translation rules according to embodiments of the present invention will be used to illustrate the functionality of the header sensitive translator discussed above. Although only two sets of translation rules are shown in FIG. 5, many more sets may be employed. Furthermore, each set of translation rules may contain more than two pair, i.e. an IP address and its corresponding normalized IP address, of IP addresses.
Set 0 is not shown in FIG. 5 because, as discussed above, set 0 contains a set of translation rules used for header translation entries. - While FIG. 5 is illustrated as having sets of translation rules, IP addresses and corresponding normalized IP addresses, the table may also include network masks. Such network masks may be utilized in the determination of whether an address is present in the table. For example, in the address10.10.x.x, the x's may refer to a network mask value of 0 such that any value in the positions occupied by the x's would be considered a match. Accordingly, the table of FIG. 5 is provided for illustrative purposes only, and, therefore, the present invention should not be construed as limited to table structures as seen in FIG. 5.
- A packet, for example, an SNMP packet is received at the header
sensitive translator 350 and stored in thebuffer 272. Thedetector circuit 410 identifies the source and destination addresses located in the header of the packet. Assuming the source address is identified as 9.40.x.x by the detector circuit, thedetector circuit 410 will search for this particular IP address in every set of translation rules, in this case sets 1 and 2. In this example, thedetector circuit 410 would determine that the IP address 9.40.x.x is inset 2 271 which belongs to customer B. - The
scanner circuit 420 identifies the first occurrence of an IP address found in the payload of the packet using a unique SNMP object identifier (OID) located within a Management Information Base (MIB) as discussed above. Once the source address is determined to belong to set 2, the payload is searched for all of the IP addresses inset 2. Thus, thescanner circuit 420 in this example will search for IP addresses 10.10.x.x and 92.168.x.x in the payload of the packet. Once thescanner circuit 420 identifies the first occurrence of one of these IP addresses in the payload of the packet, thepayload translator circuit 440 replaces the IP address with its corresponding normalized IP address. For example, 10.10.x.x would be replaced with its corresponding normalized IP address 9.39.x.x. Similarly, 92.168.x.x would be replaced with its corresponding normalized IP address 9.40.x.x. Thescanner circuit 420 will continue to identify IP addresses and the corresponding normalized IP addresses for each occurrence of either 10.10.x.x or 92.168.x.x in the payload of the packet until it reaches the end of the payload of the packet and thepayload translator circuit 440 will also continue to replace each IP address with its corresponding normalized IP address. - The process would be similar if the source and/or destination address was identified to be a normalized IP address from
set 1 270, for example, 9.37.x.x. It will also be understood that if the source and/or destination address were found in theset 0 set of translation rules, theheader translator circuit 450 would translate the header information and the payload would be translated, as discussed above, using theset 0 set of translation rules. - When packets flow from the service provider's
network 370 to, for example, customer B'snetwork 320, the process discussed above will be reversed. For example, the customer may use the headersensitive translator 350 to translate the normalized IP addresses in the payload of the packet received fromNAT device 360 back to the original IP addresses. With respect to the example above, the normalized IP addresses, 9.39.x.x. and 9.40.x.x would be replaced with original IP addresses 10.10.x.x and 92.168.x.x, respectively. - Embodiments of the present invention will now be described in more detail with reference to FIGS. 6 and 7 which are flowchart illustrations of operations carried out by a header sensitive translator according to embodiments of the present invention. As seen in FIG. 6, a packet, such as an SNMP packet, is received by the header sensitive translator (block610). As discussed above, the packet may be stored in a buffer temporarily during the translation process. The header sensitive translator determines if a translation has occurred in the header of the packet, i.e. have the source and/or destination address been previously translated to a normalized IP address by another NAT device. This may be done by determining if the source and/or destination address is present in any set of translation rules (block 722). A set of translation rules is a list of each IP address that has been translated and its corresponding normalized IP address, i.e. unique IP address. The sets of translation rules may correspond to different customers. As discussed above, a set of translation rules may include one or more pairs of IP addresses, i.e. an IP address and a corresponding normalized IP address. The IP addresses may overlap between sets of translation rules, but the normalized IP addresses are globally unique. Thus, each customer's set of translation rules are unique to that particular customer, i.e. Customer A's set of translation rules do not overlap with Customer B's set of translation rules and so on. If the source and/or destination address is present in any of the sets of translation rules, the header of the packet may have been previously translated.
- If it is determined that a translation has not occurred (block620), the packet may optionally be discarded (block 630) and operations may be terminated with respect to this packet. If, on the other hand, it is determined that a translation has occurred (block 620), the payload of the packet is searched for an IP address (block 640). Each occurrence of an IP address that is found to match any of the sets of translation rules during the search of the payload may be translated (block 650). The translation may consist of replacing the original IP address with a corresponding normalized IP address or replacing a normalized IP address with a corresponding original address. The normalized IP address and/or original IP address may be found in the set of translation rules in which the source and/or destination address was found.
- It is determined if another IP address in the payload of the packet has been identified (block660). If it is determined that another IP address in the payload has been identified, operations return to block 650 and repeat until no more IP addresses are found in the payload of the packet. If it is determined that no more IP addresses are identified in the payload of the packet, operations of the header sensitive translator may terminate with respect to this packet. Note that the header IP addresses which have been translated are not translated again as this will be done by another NAT device.
- Now referring to FIG. 7, a flowchart illustrating operations of other embodiments of a header sensitive translator will be described. A packet, for example, an SNMP packet, may be received at a second NAT device from a first NAT device and may be stored temporarily in a buffer (block710). The header sensitive translator of the present invention is located within the second NAT device, such as a CNAT. The first NAT device may be, for example, a border firewall or a router.
- The header sensitive translator may identify a source address and a destination address located in the packet header (block720). It is determined if the source address is present in any set of translation rules (block 722). A set of translation rules is a list of each IP address that has been translated and its corresponding normalized IP address, i.e. unique IP address. The sets of translation rules may correspond to different customers. Each customer's set of translation rules may be unique to that particular customer, i.e. a first Customer A's set of translation rules would not overlap with a second Customer B's set of translation rules and so on.
- If it is determined that the source address is not present in any of the sets of translation rules (block722), it is determined if the destination address is present in any of the sets of translation rules (block 724). If it is determined that the destination address is not present in any of the sets of translation rules, the packet may be discarded (block 740) and operations with respect to this packet may terminate.
- If it is determined that the source address or the destination address is present in any of the sets of translation rules (block722 or 724), it is determined if the address occurs more than once in a single set of translation rules or if the address occurs in more than one set of translation rules (block 725). Alternatively, it may be determined if the address occurs multiple times during configuration. For example, when a new pair, i.e. an IP address and a corresponding normalized IP address, is added to a set of translation rules, an error message may be displayed if the address occurs more than once in a single set of translation rules or if the address occurs in more than one set of translation rules.
- If the address is determined to occur multiple times (block725), it is determined if the source address is in a
set 0 set of translation rules (block 726). Theset 0 set of translation rules is used for standard translation entries. If the source address is determined to be in theset 0 set of translation rules (block 726), the header sensitive translator translates the source and/or destination address in the packet header (block 728). If the source address is determined not to be in theset 0 set of translation rules (block 726), the packet may be discarded as defective and operations with respect to this packet may terminate. - The payload of the packet is searched for IP addresses (block730). When the first IP address in the payload is identified, the set of translation rules that the source or destination address was identified to be in is searched for the corresponding normalized IP address. It will be understood that every IP address pair, i.e. an IP address and a corresponding normalized IP address, in the relevant set of translation rules is used to translate the packet. The identified IP address is then translated (replaced) using the corresponding normalized IP address found in the set of translation rules (block 750). As discussed above, the capability to translate IP addresses found within the packet typically requires the proper identification of the IP addresses that need to be translated and the location of the IP addresses in the packet.
- It is determined if another IP address has been identified in the payload of the packet (block760). If it is determined that another IP address has been identified, operations return to block 750 and repeat until it is determined that no more IP addresses have been identified.
- If it is determined that no more IP addresses have been identified (block760), translation operations may terminate with respect to this packet.
- If it is determined that the address is not present in the set of translation rules multiple times (block725), it is determined if the set that the address is present in is the
set 0 set of translation rules (block 727). If the address is determined to be in theset 0 set of translation rules, the header sensitive translator translates the source and/or destination address in the packet header (block 728) and operations continue to block 730. If it is determined that the set that the address is present in is not theset 0 set of translation rules (block 727), operations continue to block 730. - The payload of the packet is searched for IP addresses (block730). When the first IP address in the payload is identified, the set of translation rules that the source or destination address was identified in is searched for the corresponding normalized IP address. It will be understood that every IP address pair, ie. an IP address and a corresponding normalized IP address, in the relevant set of translation rules is used to translate the packet. The identified IP address is then translated (replaced) using the corresponding normalized IP address found in the set of translation rules (block 750). As discussed above, the capability to translate IP addresses found within the packet typically requires the proper identification of the IP addresses that need to be translated and the location of the IP addresses in the packet.
- It is determined if another IP address has been identified in the payload of the packet (block760). If it is determined that another IP address has been identified, operations return to block 750 and repeat until it is determined that no more IP addresses have been identified. If it is determined that no more IP addresses have been identified (block 760), operations terminate with respect to this packet.
- The flowcharts and block diagrams of FIGS. 1 through 7 illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products for translating IP addresses located in the payload of a packet according to various embodiments of the present invention. In this regard, each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- In the drawings and specification, there have been disclosed typical illustrative embodiments of the invention and, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation, the scope of the invention being set forth in the following claims.
Claims (52)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/844,309 US7085267B2 (en) | 2001-04-27 | 2001-04-27 | Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/844,309 US7085267B2 (en) | 2001-04-27 | 2001-04-27 | Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020159447A1 true US20020159447A1 (en) | 2002-10-31 |
US7085267B2 US7085267B2 (en) | 2006-08-01 |
Family
ID=25292354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/844,309 Expired - Fee Related US7085267B2 (en) | 2001-04-27 | 2001-04-27 | Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet |
Country Status (1)
Country | Link |
---|---|
US (1) | US7085267B2 (en) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133582A1 (en) * | 2000-12-21 | 2002-09-19 | Atsushi Shibata | Network management system |
US20030227905A1 (en) * | 2002-06-10 | 2003-12-11 | George Bouleros | Access nodes in packet-based communications networks |
US20030236913A1 (en) * | 2002-06-25 | 2003-12-25 | Hoban Adrian C. | Network address translation for internet control message protocol packets |
US20040044758A1 (en) * | 2002-09-04 | 2004-03-04 | John Palmer | SNMP firewall |
US20050108407A1 (en) * | 2003-09-26 | 2005-05-19 | Surgient, Inc. | Network abstraction and isolation layer for masquerading machine identity of a computer |
US20050147120A1 (en) * | 2003-09-26 | 2005-07-07 | Willman Charles A. | Network abstraction and isolation layer rules-based federation and masquerading |
FR2867004A1 (en) * | 2004-03-01 | 2005-09-02 | Everbee Networks | Data packet flow delay method for data packet flow delay device, involves temporarily retaining part of applicative layers data or entire data of data packet flow in data packet flow delay device in transparent manner |
US20060227769A1 (en) * | 2003-05-12 | 2006-10-12 | Oliver Veits | Method for data exchange between network elements in networks with different address ranges |
US7139841B1 (en) * | 2002-07-24 | 2006-11-21 | Cisco Technology, Inc. | Method and apparatus for handling embedded address in data sent through multiple network address translation (NAT) devices |
US20070094412A1 (en) * | 2001-06-14 | 2007-04-26 | Nortel Networks Limited | Providing telephony services to terminals behind a firewall and/or a network address translator |
WO2007060564A3 (en) * | 2005-11-22 | 2007-09-13 | Koninkl Philips Electronics Nv | Translator for translating addresses of packets |
US7406043B1 (en) * | 2001-11-13 | 2008-07-29 | At&T Corp. | Method for providing voice-over-IP service |
US7454525B1 (en) * | 2002-12-05 | 2008-11-18 | Cisco Technology, Inc. | Enabling communication when signaling protocol packets contain embedded addresses subject to translation |
US20090006435A1 (en) * | 2007-06-28 | 2009-01-01 | Cisco Technology, Inc. | Object identifier awareness for network device notifications |
US20090092132A1 (en) * | 2005-05-04 | 2009-04-09 | Alfons Fartmann | Method and device for translating internet protocol addresses inside a communications network |
US20090138611A1 (en) * | 2007-11-27 | 2009-05-28 | Yu-Ben Miao | System And Method For Connection Of Hosts Behind NATs |
US7657104B2 (en) | 2005-11-21 | 2010-02-02 | Mcafee, Inc. | Identifying image type in a capture system |
US7689614B2 (en) | 2006-05-22 | 2010-03-30 | Mcafee, Inc. | Query generation for a capture system |
US7730011B1 (en) | 2005-10-19 | 2010-06-01 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US7774604B2 (en) | 2003-12-10 | 2010-08-10 | Mcafee, Inc. | Verifying captured objects before presentation |
US7814327B2 (en) | 2003-12-10 | 2010-10-12 | Mcafee, Inc. | Document registration |
US7818326B2 (en) | 2005-08-31 | 2010-10-19 | Mcafee, Inc. | System and method for word indexing in a capture system and querying thereof |
US20100332681A1 (en) * | 2009-06-29 | 2010-12-30 | Canon Kabushiki Kaisha | Communication apparatus capable of selecting a proper source address from a plurality of source addresses assigned thereto, method of controlling the same, and storage medium |
US7899828B2 (en) | 2003-12-10 | 2011-03-01 | Mcafee, Inc. | Tag data structure for maintaining relational data over captured objects |
US7907608B2 (en) | 2005-08-12 | 2011-03-15 | Mcafee, Inc. | High speed packet capture |
US7930540B2 (en) | 2004-01-22 | 2011-04-19 | Mcafee, Inc. | Cryptographic policy enforcement |
US7949849B2 (en) | 2004-08-24 | 2011-05-24 | Mcafee, Inc. | File system for a capture system |
US7958227B2 (en) | 2006-05-22 | 2011-06-07 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US7962591B2 (en) | 2004-06-23 | 2011-06-14 | Mcafee, Inc. | Object classification in a capture system |
US7984175B2 (en) | 2003-12-10 | 2011-07-19 | Mcafee, Inc. | Method and apparatus for data capture and analysis system |
US8010689B2 (en) * | 2006-05-22 | 2011-08-30 | Mcafee, Inc. | Locational tagging in a capture system |
US8078728B1 (en) | 2006-03-31 | 2011-12-13 | Quest Software, Inc. | Capacity pooling for application reservation and delivery |
US8194674B1 (en) | 2007-12-20 | 2012-06-05 | Quest Software, Inc. | System and method for aggregating communications and for translating between overlapping internal network addresses and unique external network addresses |
US8205242B2 (en) | 2008-07-10 | 2012-06-19 | Mcafee, Inc. | System and method for data mining and security policy management |
US8447722B1 (en) | 2009-03-25 | 2013-05-21 | Mcafee, Inc. | System and method for data mining and security policy management |
CN103166855A (en) * | 2011-12-12 | 2013-06-19 | 深圳市共进电子股份有限公司 | Method and system for recognizing and transforming address information in network message |
US8473442B1 (en) | 2009-02-25 | 2013-06-25 | Mcafee, Inc. | System and method for intelligent state management |
US8504537B2 (en) | 2006-03-24 | 2013-08-06 | Mcafee, Inc. | Signature distribution in a document registration system |
US8548170B2 (en) | 2003-12-10 | 2013-10-01 | Mcafee, Inc. | Document de-registration |
US8560534B2 (en) | 2004-08-23 | 2013-10-15 | Mcafee, Inc. | Database for a capture system |
US20130311608A1 (en) * | 2008-11-25 | 2013-11-21 | Citrix Systems, Inc. | Systems and methods for applying transformations to ip addresses obtained by domain name service (dns) |
US8656039B2 (en) | 2003-12-10 | 2014-02-18 | Mcafee, Inc. | Rule parser |
US8667121B2 (en) | 2009-03-25 | 2014-03-04 | Mcafee, Inc. | System and method for managing data and policies |
US8700561B2 (en) | 2011-12-27 | 2014-04-15 | Mcafee, Inc. | System and method for providing data protection workflows in a network environment |
US8706709B2 (en) | 2009-01-15 | 2014-04-22 | Mcafee, Inc. | System and method for intelligent term grouping |
US8806615B2 (en) | 2010-11-04 | 2014-08-12 | Mcafee, Inc. | System and method for protecting specified data combinations |
US8850591B2 (en) | 2009-01-13 | 2014-09-30 | Mcafee, Inc. | System and method for concept building |
US9253154B2 (en) | 2008-08-12 | 2016-02-02 | Mcafee, Inc. | Configuration management for a capture/registration system |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7408928B2 (en) * | 2001-12-21 | 2008-08-05 | Nortel Networks Limited | Methods and apparatus for setting up telephony connections between two address domains having overlapping address ranges |
US7080148B2 (en) * | 2002-09-30 | 2006-07-18 | America Online, Inc. | Translating switch and method |
JP4045936B2 (en) * | 2002-11-26 | 2008-02-13 | 株式会社日立製作所 | Address translation device |
JP4161758B2 (en) * | 2003-03-19 | 2008-10-08 | 日本電気株式会社 | Network information detection apparatus and method |
US7483437B1 (en) * | 2003-11-20 | 2009-01-27 | Juniper Networks, Inc. | Method of communicating packet multimedia to restricted endpoints |
GB2412038B (en) * | 2004-03-10 | 2006-04-19 | Toshiba Res Europ Ltd | Packet format |
US8577998B2 (en) * | 2008-07-08 | 2013-11-05 | Cisco Technology, Inc. | Systems and methods of detecting non-colocated subscriber devices |
US8566900B1 (en) * | 2011-05-23 | 2013-10-22 | Palo Alto Networks, Inc. | Using geographical information in policy enforcement |
US8819818B2 (en) | 2012-02-09 | 2014-08-26 | Harris Corporation | Dynamic computer network with variable identity parameters |
US8935780B2 (en) | 2012-02-09 | 2015-01-13 | Harris Corporation | Mission management for dynamic computer networks |
US8898795B2 (en) * | 2012-02-09 | 2014-11-25 | Harris Corporation | Bridge for communicating with a dynamic computer network |
US9130907B2 (en) | 2012-05-01 | 2015-09-08 | Harris Corporation | Switch for communicating data in a dynamic computer network |
US8966626B2 (en) | 2012-05-01 | 2015-02-24 | Harris Corporation | Router for communicating data in a dynamic computer network |
US9154458B2 (en) | 2012-05-01 | 2015-10-06 | Harris Corporation | Systems and methods for implementing moving target technology in legacy hardware |
US8959573B2 (en) | 2012-05-01 | 2015-02-17 | Harris Corporation | Noise, encryption, and decoys for communications in a dynamic computer network |
US9075992B2 (en) | 2012-05-01 | 2015-07-07 | Harris Corporation | Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques |
US8935786B2 (en) | 2012-05-01 | 2015-01-13 | Harris Corporation | Systems and methods for dynamically changing network states |
US8898782B2 (en) | 2012-05-01 | 2014-11-25 | Harris Corporation | Systems and methods for spontaneously configuring a computer network |
US9503324B2 (en) | 2013-11-05 | 2016-11-22 | Harris Corporation | Systems and methods for enterprise mission management of a computer network |
US9264496B2 (en) | 2013-11-18 | 2016-02-16 | Harris Corporation | Session hopping |
US9338183B2 (en) | 2013-11-18 | 2016-05-10 | Harris Corporation | Session hopping |
US10122708B2 (en) | 2013-11-21 | 2018-11-06 | Harris Corporation | Systems and methods for deployment of mission plans using access control technologies |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4933938A (en) * | 1989-03-22 | 1990-06-12 | Hewlett-Packard Company | Group address translation through a network bridge |
US5343471A (en) * | 1992-05-11 | 1994-08-30 | Hughes Aircraft Company | Address filter for a transparent bridge interconnecting local area networks |
US5724510A (en) * | 1996-09-06 | 1998-03-03 | Fluke Corporation | Method of configuring a valid IP address and detecting duplicate IP addresses in a local area network |
US5751971A (en) * | 1995-07-12 | 1998-05-12 | Cabletron Systems, Inc. | Internet protocol (IP) work group routing |
US5793763A (en) * | 1995-11-03 | 1998-08-11 | Cisco Technology, Inc. | Security system for network address translation systems |
US5815664A (en) * | 1995-03-20 | 1998-09-29 | Fujitsu Limited | Address reporting device and method for detecting authorized and unauthorized addresses in a network environment |
US5920886A (en) * | 1997-03-14 | 1999-07-06 | Music Semiconductor Corporation | Accelerated hierarchical address filtering and translation using binary and ternary CAMs |
US6006272A (en) * | 1998-02-23 | 1999-12-21 | Lucent Technologies Inc. | Method for network address translation |
US6011795A (en) * | 1997-03-20 | 2000-01-04 | Washington University | Method and apparatus for fast hierarchical address lookup using controlled expansion of prefixes |
US6058431A (en) * | 1998-04-23 | 2000-05-02 | Lucent Technologies Remote Access Business Unit | System and method for network address translation as an external service in the access server of a service provider |
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6535511B1 (en) * | 1999-01-07 | 2003-03-18 | Cisco Technology, Inc. | Method and system for identifying embedded addressing information in a packet for translation between disparate addressing systems |
US6581108B1 (en) * | 1999-11-30 | 2003-06-17 | Lucent Technologies Inc. | Managing multiple private data networks using network and payload address translation |
US6772347B1 (en) * | 1999-04-01 | 2004-08-03 | Juniper Networks, Inc. | Method, apparatus and computer program product for a network firewall |
US6775277B1 (en) * | 1999-06-04 | 2004-08-10 | Nortel Networks Limited | Methods and systems for processing calls in a packet network using peer call servers |
US6963982B1 (en) * | 1999-10-28 | 2005-11-08 | Lucent Technologies Inc. | Method and apparatus for application-independent end-to-end security in shared-link access networks |
-
2001
- 2001-04-27 US US09/844,309 patent/US7085267B2/en not_active Expired - Fee Related
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4933938A (en) * | 1989-03-22 | 1990-06-12 | Hewlett-Packard Company | Group address translation through a network bridge |
US5343471A (en) * | 1992-05-11 | 1994-08-30 | Hughes Aircraft Company | Address filter for a transparent bridge interconnecting local area networks |
US5815664A (en) * | 1995-03-20 | 1998-09-29 | Fujitsu Limited | Address reporting device and method for detecting authorized and unauthorized addresses in a network environment |
US5751971A (en) * | 1995-07-12 | 1998-05-12 | Cabletron Systems, Inc. | Internet protocol (IP) work group routing |
US5793763A (en) * | 1995-11-03 | 1998-08-11 | Cisco Technology, Inc. | Security system for network address translation systems |
US5724510A (en) * | 1996-09-06 | 1998-03-03 | Fluke Corporation | Method of configuring a valid IP address and detecting duplicate IP addresses in a local area network |
US5920886A (en) * | 1997-03-14 | 1999-07-06 | Music Semiconductor Corporation | Accelerated hierarchical address filtering and translation using binary and ternary CAMs |
US6011795A (en) * | 1997-03-20 | 2000-01-04 | Washington University | Method and apparatus for fast hierarchical address lookup using controlled expansion of prefixes |
US6119171A (en) * | 1998-01-29 | 2000-09-12 | Ip Dynamics, Inc. | Domain name routing |
US6006272A (en) * | 1998-02-23 | 1999-12-21 | Lucent Technologies Inc. | Method for network address translation |
US6058431A (en) * | 1998-04-23 | 2000-05-02 | Lucent Technologies Remote Access Business Unit | System and method for network address translation as an external service in the access server of a service provider |
US6535511B1 (en) * | 1999-01-07 | 2003-03-18 | Cisco Technology, Inc. | Method and system for identifying embedded addressing information in a packet for translation between disparate addressing systems |
US6772347B1 (en) * | 1999-04-01 | 2004-08-03 | Juniper Networks, Inc. | Method, apparatus and computer program product for a network firewall |
US6775277B1 (en) * | 1999-06-04 | 2004-08-10 | Nortel Networks Limited | Methods and systems for processing calls in a packet network using peer call servers |
US6963982B1 (en) * | 1999-10-28 | 2005-11-08 | Lucent Technologies Inc. | Method and apparatus for application-independent end-to-end security in shared-link access networks |
US6581108B1 (en) * | 1999-11-30 | 2003-06-17 | Lucent Technologies Inc. | Managing multiple private data networks using network and payload address translation |
Cited By (94)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7315888B2 (en) * | 2000-12-21 | 2008-01-01 | Hitachi, Ltd. | Network management system |
US20020133582A1 (en) * | 2000-12-21 | 2002-09-19 | Atsushi Shibata | Network management system |
US20070192508A1 (en) * | 2001-06-14 | 2007-08-16 | Nortel Networks Limited | Providing network address translation information |
US20070094412A1 (en) * | 2001-06-14 | 2007-04-26 | Nortel Networks Limited | Providing telephony services to terminals behind a firewall and/or a network address translator |
US8244876B2 (en) | 2001-06-14 | 2012-08-14 | Rockstar Bidco, LP | Providing telephony services to terminals behind a firewall and/or a network address translator |
US8484359B2 (en) | 2001-06-14 | 2013-07-09 | Rockstar Consortium Us Lp | Providing telephony services to terminals behind a firewall and/or a network address translator |
US8108553B2 (en) * | 2001-06-14 | 2012-01-31 | Rockstar Bidco, LP | Providing network address translation information |
US7406043B1 (en) * | 2001-11-13 | 2008-07-29 | At&T Corp. | Method for providing voice-over-IP service |
US8203946B1 (en) | 2001-11-13 | 2012-06-19 | At&T Intellectual Property Ii, L.P. | Method for providing voice-over-IP service |
US7224696B2 (en) * | 2002-06-10 | 2007-05-29 | Nortel Networks, Ltd. | Access nodes in packet-based communications networks |
US20030227905A1 (en) * | 2002-06-10 | 2003-12-11 | George Bouleros | Access nodes in packet-based communications networks |
US20030236913A1 (en) * | 2002-06-25 | 2003-12-25 | Hoban Adrian C. | Network address translation for internet control message protocol packets |
US7139841B1 (en) * | 2002-07-24 | 2006-11-21 | Cisco Technology, Inc. | Method and apparatus for handling embedded address in data sent through multiple network address translation (NAT) devices |
US7957382B1 (en) | 2002-07-24 | 2011-06-07 | Cisco Technology, Inc. | Method and apparatus for handling embedded addresses in data sent through multiple network address translation (NAT) devices |
US20040044758A1 (en) * | 2002-09-04 | 2004-03-04 | John Palmer | SNMP firewall |
US7606884B2 (en) * | 2002-09-04 | 2009-10-20 | Northrop Grumman Corporation | SNMP firewall for network identification |
US7454525B1 (en) * | 2002-12-05 | 2008-11-18 | Cisco Technology, Inc. | Enabling communication when signaling protocol packets contain embedded addresses subject to translation |
US20060227769A1 (en) * | 2003-05-12 | 2006-10-12 | Oliver Veits | Method for data exchange between network elements in networks with different address ranges |
US7499448B2 (en) * | 2003-05-12 | 2009-03-03 | Siemens Aktiengesellschaft | Method for data exchange between network elements in networks with different address ranges |
US7769004B2 (en) * | 2003-09-26 | 2010-08-03 | Surgient, Inc. | Network abstraction and isolation layer for masquerading machine identity of a computer |
US8331391B2 (en) | 2003-09-26 | 2012-12-11 | Quest Software, Inc. | Network abstraction and isolation layer for masquerading machine identity of a computer |
US20050147120A1 (en) * | 2003-09-26 | 2005-07-07 | Willman Charles A. | Network abstraction and isolation layer rules-based federation and masquerading |
US7643484B2 (en) | 2003-09-26 | 2010-01-05 | Surgient, Inc. | Network abstraction and isolation layer rules-based federation and masquerading |
US20050108407A1 (en) * | 2003-09-26 | 2005-05-19 | Surgient, Inc. | Network abstraction and isolation layer for masquerading machine identity of a computer |
US20100281181A1 (en) * | 2003-09-26 | 2010-11-04 | Surgient, Inc. | Network abstraction and isolation layer for masquerading machine identity of a computer |
US7774604B2 (en) | 2003-12-10 | 2010-08-10 | Mcafee, Inc. | Verifying captured objects before presentation |
US8548170B2 (en) | 2003-12-10 | 2013-10-01 | Mcafee, Inc. | Document de-registration |
US9374225B2 (en) | 2003-12-10 | 2016-06-21 | Mcafee, Inc. | Document de-registration |
US7814327B2 (en) | 2003-12-10 | 2010-10-12 | Mcafee, Inc. | Document registration |
US8301635B2 (en) | 2003-12-10 | 2012-10-30 | Mcafee, Inc. | Tag data structure for maintaining relational data over captured objects |
US8166307B2 (en) | 2003-12-10 | 2012-04-24 | McAffee, Inc. | Document registration |
US8656039B2 (en) | 2003-12-10 | 2014-02-18 | Mcafee, Inc. | Rule parser |
US7899828B2 (en) | 2003-12-10 | 2011-03-01 | Mcafee, Inc. | Tag data structure for maintaining relational data over captured objects |
US8271794B2 (en) | 2003-12-10 | 2012-09-18 | Mcafee, Inc. | Verifying captured objects before presentation |
US8762386B2 (en) | 2003-12-10 | 2014-06-24 | Mcafee, Inc. | Method and apparatus for data capture and analysis system |
US9092471B2 (en) | 2003-12-10 | 2015-07-28 | Mcafee, Inc. | Rule parser |
US7984175B2 (en) | 2003-12-10 | 2011-07-19 | Mcafee, Inc. | Method and apparatus for data capture and analysis system |
US7930540B2 (en) | 2004-01-22 | 2011-04-19 | Mcafee, Inc. | Cryptographic policy enforcement |
US8307206B2 (en) | 2004-01-22 | 2012-11-06 | Mcafee, Inc. | Cryptographic policy enforcement |
FR2867004A1 (en) * | 2004-03-01 | 2005-09-02 | Everbee Networks | Data packet flow delay method for data packet flow delay device, involves temporarily retaining part of applicative layers data or entire data of data packet flow in data packet flow delay device in transparent manner |
WO2005086455A3 (en) * | 2004-03-01 | 2005-12-29 | Everbee Networks | Method, system and device for time-delaying a data packet flow |
US7962591B2 (en) | 2004-06-23 | 2011-06-14 | Mcafee, Inc. | Object classification in a capture system |
US8560534B2 (en) | 2004-08-23 | 2013-10-15 | Mcafee, Inc. | Database for a capture system |
US7949849B2 (en) | 2004-08-24 | 2011-05-24 | Mcafee, Inc. | File system for a capture system |
US8707008B2 (en) | 2004-08-24 | 2014-04-22 | Mcafee, Inc. | File system for a capture system |
US8223762B2 (en) * | 2005-05-04 | 2012-07-17 | Siemens Enterprise Communications Gmbh & Co. Kg | Method and device for translating internet protocol addresses inside a communications network |
US20090092132A1 (en) * | 2005-05-04 | 2009-04-09 | Alfons Fartmann | Method and device for translating internet protocol addresses inside a communications network |
US7907608B2 (en) | 2005-08-12 | 2011-03-15 | Mcafee, Inc. | High speed packet capture |
US8730955B2 (en) | 2005-08-12 | 2014-05-20 | Mcafee, Inc. | High speed packet capture |
US8554774B2 (en) | 2005-08-31 | 2013-10-08 | Mcafee, Inc. | System and method for word indexing in a capture system and querying thereof |
US7818326B2 (en) | 2005-08-31 | 2010-10-19 | Mcafee, Inc. | System and method for word indexing in a capture system and querying thereof |
US8463800B2 (en) | 2005-10-19 | 2013-06-11 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US8176049B2 (en) | 2005-10-19 | 2012-05-08 | Mcafee Inc. | Attributes of captured objects in a capture system |
US7730011B1 (en) | 2005-10-19 | 2010-06-01 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US8200026B2 (en) | 2005-11-21 | 2012-06-12 | Mcafee, Inc. | Identifying image type in a capture system |
US7657104B2 (en) | 2005-11-21 | 2010-02-02 | Mcafee, Inc. | Identifying image type in a capture system |
WO2007060564A3 (en) * | 2005-11-22 | 2007-09-13 | Koninkl Philips Electronics Nv | Translator for translating addresses of packets |
US8504537B2 (en) | 2006-03-24 | 2013-08-06 | Mcafee, Inc. | Signature distribution in a document registration system |
US8078728B1 (en) | 2006-03-31 | 2011-12-13 | Quest Software, Inc. | Capacity pooling for application reservation and delivery |
US8683035B2 (en) | 2006-05-22 | 2014-03-25 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US7689614B2 (en) | 2006-05-22 | 2010-03-30 | Mcafee, Inc. | Query generation for a capture system |
US8307007B2 (en) | 2006-05-22 | 2012-11-06 | Mcafee, Inc. | Query generation for a capture system |
US9094338B2 (en) | 2006-05-22 | 2015-07-28 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US8010689B2 (en) * | 2006-05-22 | 2011-08-30 | Mcafee, Inc. | Locational tagging in a capture system |
US8005863B2 (en) | 2006-05-22 | 2011-08-23 | Mcafee, Inc. | Query generation for a capture system |
US7958227B2 (en) | 2006-05-22 | 2011-06-07 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US20090006435A1 (en) * | 2007-06-28 | 2009-01-01 | Cisco Technology, Inc. | Object identifier awareness for network device notifications |
US20090138611A1 (en) * | 2007-11-27 | 2009-05-28 | Yu-Ben Miao | System And Method For Connection Of Hosts Behind NATs |
US8194674B1 (en) | 2007-12-20 | 2012-06-05 | Quest Software, Inc. | System and method for aggregating communications and for translating between overlapping internal network addresses and unique external network addresses |
US8601537B2 (en) | 2008-07-10 | 2013-12-03 | Mcafee, Inc. | System and method for data mining and security policy management |
US8635706B2 (en) | 2008-07-10 | 2014-01-21 | Mcafee, Inc. | System and method for data mining and security policy management |
US8205242B2 (en) | 2008-07-10 | 2012-06-19 | Mcafee, Inc. | System and method for data mining and security policy management |
US9253154B2 (en) | 2008-08-12 | 2016-02-02 | Mcafee, Inc. | Configuration management for a capture/registration system |
US10367786B2 (en) | 2008-08-12 | 2019-07-30 | Mcafee, Llc | Configuration management for a capture/registration system |
US20130311608A1 (en) * | 2008-11-25 | 2013-11-21 | Citrix Systems, Inc. | Systems and methods for applying transformations to ip addresses obtained by domain name service (dns) |
US9313123B2 (en) * | 2008-11-25 | 2016-04-12 | Citrix Systems, Inc. | Systems and methods for applying transformations to IP addresses obtained by domain name service (DNS) |
US8850591B2 (en) | 2009-01-13 | 2014-09-30 | Mcafee, Inc. | System and method for concept building |
US8706709B2 (en) | 2009-01-15 | 2014-04-22 | Mcafee, Inc. | System and method for intelligent term grouping |
US9602548B2 (en) | 2009-02-25 | 2017-03-21 | Mcafee, Inc. | System and method for intelligent state management |
US9195937B2 (en) | 2009-02-25 | 2015-11-24 | Mcafee, Inc. | System and method for intelligent state management |
US8473442B1 (en) | 2009-02-25 | 2013-06-25 | Mcafee, Inc. | System and method for intelligent state management |
US8918359B2 (en) | 2009-03-25 | 2014-12-23 | Mcafee, Inc. | System and method for data mining and security policy management |
US8447722B1 (en) | 2009-03-25 | 2013-05-21 | Mcafee, Inc. | System and method for data mining and security policy management |
US8667121B2 (en) | 2009-03-25 | 2014-03-04 | Mcafee, Inc. | System and method for managing data and policies |
US9313232B2 (en) | 2009-03-25 | 2016-04-12 | Mcafee, Inc. | System and method for data mining and security policy management |
US20100332681A1 (en) * | 2009-06-29 | 2010-12-30 | Canon Kabushiki Kaisha | Communication apparatus capable of selecting a proper source address from a plurality of source addresses assigned thereto, method of controlling the same, and storage medium |
US10313337B2 (en) | 2010-11-04 | 2019-06-04 | Mcafee, Llc | System and method for protecting specified data combinations |
US9794254B2 (en) | 2010-11-04 | 2017-10-17 | Mcafee, Inc. | System and method for protecting specified data combinations |
US8806615B2 (en) | 2010-11-04 | 2014-08-12 | Mcafee, Inc. | System and method for protecting specified data combinations |
US10666646B2 (en) | 2010-11-04 | 2020-05-26 | Mcafee, Llc | System and method for protecting specified data combinations |
US11316848B2 (en) | 2010-11-04 | 2022-04-26 | Mcafee, Llc | System and method for protecting specified data combinations |
CN103166855A (en) * | 2011-12-12 | 2013-06-19 | 深圳市共进电子股份有限公司 | Method and system for recognizing and transforming address information in network message |
US9430564B2 (en) | 2011-12-27 | 2016-08-30 | Mcafee, Inc. | System and method for providing data protection workflows in a network environment |
US8700561B2 (en) | 2011-12-27 | 2014-04-15 | Mcafee, Inc. | System and method for providing data protection workflows in a network environment |
Also Published As
Publication number | Publication date |
---|---|
US7085267B2 (en) | 2006-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7085267B2 (en) | Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet | |
EP4113919A1 (en) | Method for forwarding message in srv6 service function chain, sff and sf device | |
CN109379359B (en) | SRv6 data packet processing method and device | |
US7009941B1 (en) | Node-search method, device, and medium on which a node-search program is recorded | |
US6778541B2 (en) | Dynamic data tunnelling | |
US6532241B1 (en) | Method and apparatus for determining SNA sessions using various protocols for transport based on filter criteria | |
US7701936B2 (en) | Obtaining path information related to a bridged network | |
CA2706581C (en) | System, method and program for determining failed routers in a network | |
US6430595B1 (en) | Method and apparatus for establishing a database used for correlating information gathered via SNMP | |
US7664045B2 (en) | Sampling to a next hop | |
CN110324245B (en) | Method and device for forwarding message based on integrated flow table | |
US20020021675A1 (en) | System and method for packet network configuration debugging and database | |
US6981038B2 (en) | Methods, systems and computer program products for determining simple network management protocol (SNMP) object identifiers in a management information base (MIB) file | |
US20030112808A1 (en) | Automatic configuration of IP tunnels | |
CN111988266B (en) | Method for processing message | |
US7373563B2 (en) | Root cause correlation in connectionless networks | |
US7349427B1 (en) | Routing method and apparatus for optimising auto-tunnelling in a heterogeneous network | |
US20220255772A1 (en) | Packet sending method, apparatus, and system | |
Iannone et al. | Implementing the locator/id separation protocol: Design and experience | |
US20240106748A1 (en) | Packet processing method, apparatus, and system | |
US7433963B2 (en) | Methods, systems, and computer program products for using a translation/instruction system to redirect a multiprotocol label switching (MPLS) packet | |
KR20050052639A (en) | Apparatus and method of dividing virtual sites with policy properties in multi-protocol label switching networks | |
CN112787930B (en) | Method, device and storage medium for monitoring running state of peer | |
US7257624B2 (en) | System for storing active and inactive configuration commands at a network node for managing its configuration state | |
Geissler et al. | Tablevisor 2.0: Towards full-featured, scalable and hardware-independent multi table processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CAREY, JAMES HORAN;COSTA, SERGIO DOS SANTOS;JOYCE, GLENN JOSEPH;AND OTHERS;REEL/FRAME:011791/0777;SIGNING DATES FROM 20010424 TO 20010426 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20140801 |