SlideShare ist ein Scribd-Unternehmen logo
1 von 4
   Port forwarding allows remote hosts from the Internet or outside network
    to connect to a server on the local network (inside network)
    ◦ The default firewall behaviour is to drop any connections starting from the
      outside
   Remote hosts typically use protocols such as http, https, ftp, ssh
   A remote host sends a request to the public global IP address of the inside
    server and the port number of the service required (usually the registered
    port no of the destination service e.g. port 80 for http)
    ◦ If the router is using PAT this is the outside interface address
       The wireless router uses PAT
    ◦ If the router is using static NAT this is mapped one-to-one address
   The request is routed to the outside interface of the router
   The router checks for a port forwarding rule that matches the protocol and
    the destination port of the request
    ◦ If a match to a rule exists the request is forwarded to the local IP address
      and the port number configured in the port forward rule
       Only one inside server can use the global IP/port number mapping
       E.g If there are 2 inside http servers one can use port 80 and one can use port 90
    ◦ If a match to a rule does not exist the request is dropped
   The remote host on the outside network must use the public
    global IP address to create the connection
   The port number used in the port forward rule is reserved for
    only 1 inside IP address
    ◦ A port number can’t be used to forward requests to a second server. To
      do this, select a different unused port no and create a second port
      forwarding rule
   Some applications; multimedia and torrents required several
    ports open for connections.
    ◦ Typically 1 or 2 ports are required for the control channels that setup
      and close the connection and monitor the connection.
    ◦ Extra ports may be required for the data stream, another for
      video, another for voice and another for chat
    ◦ Research the port nos required
    ◦ Use a port range in the forwarding rule
   A port trigger is used to open a port temporarily for a particular
    inside host only
    ◦ The port trigger allows new connections from the outside network to an
      inside host that initiated the data flow
    ◦ E.g. Port 25 is defined as a trigger and 113 as the port
    ◦ A local host checks mail and triggers port 25. The port trigger allows a
      back connection on port 113 (Identity information for mail) to the
      originating host
    ◦ The trigger times out and new connections to 113 are dropped
   The wireless router monitors outgoing traffic for the port numbers
    specified in the trigger
    ◦ When a match is made the IP address of the sending host (local address)
      is saved.
    ◦ When the return traffic arrives back at the router it is forwarded to the
      original sending host.
   Port triggers might be used in online gaming

Weitere ähnliche Inhalte

Was ist angesagt?

Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdfCCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdfpoojaswami31
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOSFaelix Ltd
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall NetProtocol Xpert
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bullsSwapnil Kapate
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Route Redistribution
Route RedistributionRoute Redistribution
Route RedistributionNetwax Lab
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services HayderThary
 

Was ist angesagt? (20)

Mikro tik advanced training
Mikro tik advanced trainingMikro tik advanced training
Mikro tik advanced training
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdfCCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
CCNA-LAB-GUIDE-V3_LAST-ADDITION (4).pdf
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
VPN
VPNVPN
VPN
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
RPKI Tutorial
RPKI Tutorial RPKI Tutorial
RPKI Tutorial
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
Vlan
Vlan Vlan
Vlan
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 

Ähnlich wie Port forward

NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016Netgate
 
+ Network Programming.pdf
+ Network Programming.pdf+ Network Programming.pdf
+ Network Programming.pdfOluwafolakeOjo
 
Address Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache PoisoningAddress Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache Poisoningpifiye9333
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets myrajendra
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallCassiano Campes
 
Firewall
FirewallFirewall
Firewalllyndyv
 
port forwarding.pptx
port forwarding.pptxport forwarding.pptx
port forwarding.pptxVignesh kumar
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicastinghamsa nandhini
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Shamsa al mazrooei
Shamsa al mazrooeiShamsa al mazrooei
Shamsa al mazrooeishamsamaz
 

Ähnlich wie Port forward (20)

Nat
NatNat
Nat
 
Network Programming Assignment Help
Network Programming Assignment HelpNetwork Programming Assignment Help
Network Programming Assignment Help
 
NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Unit05
Unit05Unit05
Unit05
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
+ Network Programming.pdf
+ Network Programming.pdf+ Network Programming.pdf
+ Network Programming.pdf
 
Address Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache PoisoningAddress Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache Poisoning
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
Firewall
FirewallFirewall
Firewall
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
 
port forwarding.pptx
port forwarding.pptxport forwarding.pptx
port forwarding.pptx
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Shamsa al mazrooei
Shamsa al mazrooeiShamsa al mazrooei
Shamsa al mazrooei
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

Mehr von lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

Mehr von lyndyv (15)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Security standard
Security standardSecurity standard
Security standard
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Port forward

  • 1. Port forwarding allows remote hosts from the Internet or outside network to connect to a server on the local network (inside network) ◦ The default firewall behaviour is to drop any connections starting from the outside  Remote hosts typically use protocols such as http, https, ftp, ssh
  • 2. A remote host sends a request to the public global IP address of the inside server and the port number of the service required (usually the registered port no of the destination service e.g. port 80 for http) ◦ If the router is using PAT this is the outside interface address  The wireless router uses PAT ◦ If the router is using static NAT this is mapped one-to-one address  The request is routed to the outside interface of the router  The router checks for a port forwarding rule that matches the protocol and the destination port of the request ◦ If a match to a rule exists the request is forwarded to the local IP address and the port number configured in the port forward rule  Only one inside server can use the global IP/port number mapping  E.g If there are 2 inside http servers one can use port 80 and one can use port 90 ◦ If a match to a rule does not exist the request is dropped
  • 3. The remote host on the outside network must use the public global IP address to create the connection  The port number used in the port forward rule is reserved for only 1 inside IP address ◦ A port number can’t be used to forward requests to a second server. To do this, select a different unused port no and create a second port forwarding rule  Some applications; multimedia and torrents required several ports open for connections. ◦ Typically 1 or 2 ports are required for the control channels that setup and close the connection and monitor the connection. ◦ Extra ports may be required for the data stream, another for video, another for voice and another for chat ◦ Research the port nos required ◦ Use a port range in the forwarding rule
  • 4. A port trigger is used to open a port temporarily for a particular inside host only ◦ The port trigger allows new connections from the outside network to an inside host that initiated the data flow ◦ E.g. Port 25 is defined as a trigger and 113 as the port ◦ A local host checks mail and triggers port 25. The port trigger allows a back connection on port 113 (Identity information for mail) to the originating host ◦ The trigger times out and new connections to 113 are dropped  The wireless router monitors outgoing traffic for the port numbers specified in the trigger ◦ When a match is made the IP address of the sending host (local address) is saved. ◦ When the return traffic arrives back at the router it is forwarded to the original sending host.  Port triggers might be used in online gaming