Evaluation of Three Approaches for CORBA Firewall/NAT Traversal
نویسندگان
چکیده
Applications that use CORBA as communication layer often have some restrictions for multi-domain deployment. This is particularly true when they have to face firewall/NAT traversal. Furthermore, nowadays there isn’t a well-accepted unique or standardized solution adopted by all ORBs, compelling applications using this middleware to use proprietary solutions that sometimes do not address the environment restrictions in which they are deployed (e.g. impossibility to open firewall ports). This work presents and compares three solutions for firewall/NAT traversal by CORBA-based distributed applications, each one suitable for a specific situation and exploring its advantages. Examples of such situations are the possibility of opening firewall ports or the possibility of starting a TCP connection to the outside network.
منابع مشابه
A New Method for Symmetric NAT Traversal in UDP and TCP
This paper proposes a new method for Network Address Translator (NAT) Traversal in UDP. Several techniques have been proposed for traversing NAT or firewall boxes in UDP. These techniques can establish UDP communication between hosts behind NATs. However, existing NAT traversal methods, including Universal Plug and Play (UPnP), Simple traversal of UDP over NATs (STUN) and Teredo, cannot travers...
متن کاملFirewall traversal in mobile IPv6 networks
Middleboxes such as firewalls are an important aspect for a majority of IP networks today. Current IP networks are predominantly based on IPv4 technology, and hence various firewalls as well as Network Address Translators (NATs) have been originally designed for these networks. Deployment of IPv6 networks is currently work in progress. Given the fact that Mobile IPv6 is a recent standard, most ...
متن کاملCORBA Firewall Security: Increasing the Security of CORBA Applications
Traditional network firewalls prevent unauthorised access and attacks by protecting the points of entry into the network. Currently, however, there is no standard mechanism by which a firewall identifies and controls the flow of Internet Inter-ORB Protocol (IIOP), that has become the de-facto standard interoperability protocol for Internet providing "out-of-the-box" interoperation with ORBs, an...
متن کاملNAT Behavior Discovery Using Session Traversal Utilities for NAT (STUN)
This specification defines an experimental usage of the Session Traversal Utilities for NAT (STUN) Protocol that discovers the presence and current behavior of NATs and firewalls between the STUN client and the STUN server.
متن کاملSCTP association between multi-homed endpoints over NAT using NSLP
Extended abstract. Network address translation poses a challenge for hosts that attempt to use protocols that place internet protocol addressing information inside IP payload. The same issue exists for the Stream Control Transmission Protocol and is even more difficult when SCTP associations are multi-homed. This paper deals with the options available for establishment of an SCTP association be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005