Questions tagged [nat]

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Related reading

76 questions
3
votes
1 answer

How does the website "whatsmyrouterip.com" detect the LAN router IPaddress and the LAN device IP address as well as the WAN gateway router IP address?

The http://whatsmyrouterip.com/ website can be used to resolve the public internet WAN IP address of a gateway router. However, it also shows the the private lan IP address of the gateway router and the private lan address of the device sending the…
Riker
  • 31
  • 1
1
vote
3 answers

Can a magical packet traverse thru a NAT?

In the case of "normal" tightened security where no DMZ, Port Forwarding is setup is it possible with any of the available NAT traversal methods for a magic packet to traverse thru a NAT from the outside network (Internet) and wake up a PC? The…
Sir Muffington
  • 1,611
  • 2
  • 13
  • 25
1
vote
1 answer

ASA VTI NAT policy options

I am using a virtual tunnel interface to connect my ASA to a router in order to use BGP between the two. The inside network on the ASA (10.10.10.0/24) needs to use source NAT to make it appear to the router that 10.10.10.0/24 traffic it is in fact…
Daveba123
  • 43
  • 5
1
vote
1 answer

Port forwarding border router security

Few days ago I was asking where to place the OpenVPN Access Server to provide network conectivity to LAN resources for remote users. While looking at the admin guide one of the few options is "One Network Interface on Private Network Behind the…
cyzczy
  • 1,578
  • 5
  • 23
  • 42
0
votes
0 answers

Methods for device enumeration behind NAT and its prevention

What methods do exist for enumeration devices behind a NAT from the upstream connection? I found sflow which uses TTL values. Are there other ways? I think this is partially related to OS fingerprinting. But from OS fingerprinting alone you would…
0
votes
1 answer

How to attack a specific computer behind a NAT using remote buffer overflow

I know the victim's public ip of his router, and also the victim runs a program that is vuln to a remote buffer overflow. How does an attacker attack this victim computer with just an exploit that needs IP and port? For example: public ip of the…
Dzinosky
  • 11
  • 3
0
votes
1 answer

Differentiating identical requests from different computers in a local network

On the same local network, we have two identical computers (a) and (b) which have identical software installed which send identical HTTP headers and requests to the same server, except for the url which reveals which machine the request comes…
forthrin
  • 1,821
  • 1
  • 14
  • 22