Firewalls & Network Security Concepts: NAT, PAT, and Implementation

Verified

Added on  2022/08/25

|4
|821
|21
Homework Assignment
AI Summary
This assignment delves into the core concepts of network security, specifically focusing on Network Address Translation (NAT) and Port Address Translation (PAT). It explains the purpose of NAT, highlighting its role in allowing a Local Area Network (LAN) to use a single set of IP addresses for internal traffic and a separate one for external communication. The assignment describes how NAT protects the number of public addresses used within a business, enabling stricter access control. It further elaborates on the advantages of PAT, which translates private IP addresses using port numbers, enabling multiple devices on a LAN to share a single public IP address. The assignment also covers the preference of PAT over NAT in some scenarios, particularly in home-based networks, and discusses how these technologies work in conjunction with firewalls to control network access and enhance security. The assignment is supported by references to relevant research papers.
Document Page
Running head: FIREWALLS & NETWORK SECURITY
FIREWALLS & NETWORK SECURITY
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1FIREWALLS & NETWORK SECURITY
Explain in detail the purpose of why we use NAT.
IT is a network standard which allows a LAN to apply single set of protocol locations for
in-house traffic and an additional location fixed for outward traffic. A NAT box positioned
where the local network connects to the Internet that creates each necessary IP location
transformations.
It is a very significant characteristic of firewall safety. It protects the number of public
addresses applied within a business, and it permits stricter access control to resources on each
firewall side. NAT is applicable for some purposes (Bocchi et al. 2016). NAT delivers a category
of firewall hiding in-house protocol locations. This also permits a business to apply additional
internal IP locations. Subsequently they are applied inside only, there is no opportunity of
encounter with protocol location applied by other businesses and administrations. NAT permits
an enterprise to syndicate numerous ISDN networks into a particular network connection.
NAT allows a particular device, like a router, to perform as a mediator between the
private and public internet network (Zaostrovnykh et al. 2017). It can be applied to permit proper
access to the outside of the network. The processors were demanding superior access to an
external network, which can be allocated exact external protocol using NAT. It has been
extensively applying in conducive atmospheres for a specific time. With the initiation of local
Document Page
2FIREWALLS & NETWORK SECURITY
broadband routers, it is currently seen in households to permit multiple structures to share a
particular IP address allocated by the ISP. These denote that only an isolated, exceptional IP
location is compulsory to denote a perfect set of computers. This network is also permitting them
to interconnect with processors and applications that necessitate an exceptional public protocol
address. The firewall performs as the transitional and can switch the session in each direction,
controlling protocols and port access.
Why can PAT be a preferred method?
Some PAT is preferable from NAT. In PAT, Private IP addresses are interpreting the
public protocol location through Port numbers. It is an addition to NAT that certify numerous
devices on a LAN to be recorded to a particular public protocol address. The objective of PAT is
to protect IP addresses. Most home-based networks apply PAT. When a classified machine
directs traffic to the router, this constructs a stand with the private IP Address, the source port,
and then applies a translated location and an innovative port ID (Hao et al. 2017). This method
can trail where the traffic originates from, so when the terminus machine proceeds the traffic, the
router distinguishes where to direct it. In such a situation, ISP allocates a distinct protocol
address to the household network's router.
The hosts on the isolated network do not take to visible their private protocol addresses to
the open network, creating outbreaks from the open network less likely (Dong, Dwarkadas and
Cox 2016). So it is correct to say that PAT can be the preferred method. PAT and NAT apply at
least individual protocol addresses and that PAT is also denoted as NAT overworking because it
applies a single IP address for every client to several ports. In contrast, standard NAT applies a
one-to-one protocol address connection per client.
Document Page
3FIREWALLS & NETWORK SECURITY
References:-
Bocchi, E., Khatouni, A.S., Traverso, S., Finamore, A., Munafò, M., Mellia, M. and Rossi, D.,
2016. Statistical network monitoring: Methodology and application to carrier-grade NAT.
Computer Networks, 107, pp.20-35.
Dong, X., Dwarkadas, S. and Cox, A.L., 2016, April. Shared address translation revisited. In
Proceedings of the Eleventh European Conference on Computer Systems (pp. 1-15).
Hao, Y., Fang, Z., Reinman, G. and Cong, J., 2017, February. Supporting address translation for
accelerator-centric architectures. In 2017 IEEE International Symposium on High Performance
Computer Architecture (HPCA) (pp. 37-48). IEEE.
Zaostrovnykh, A., Pirelli, S., Pedrosa, L., Argyraki, K. and Candea, G., 2017, August. A
formally verified nat. In Proceedings of the conference of the acm special interest group on data
communication (pp. 141-154).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]