期刊文献+

VOIP防火墙穿越方法的研究与比较 被引量:1

A Study of Methods of Traversing across NAT/FIREWALL
下载PDF
导出
摘要 VOIP技术己经广泛应用于企业级的语音业务,但是为了安全性和节省IP地址的使用,目前大量的企业和局域网都采用Firewall/NAT技术连接到Internet。本文比较了传统的Firewall/NAT的的穿越方案,并介绍和比较了最近比较新的ICE和VPN穿越方式,描述了各种穿越方法的穿越机制,分析了各种方法的优缺点,并横向做了比较。 VoIP is widely used as a main voice service in enterprise level application, whereas most companies adopt Firewall/ NAT to connect to Internet, for the sake of security and saving IP addresses. The present paper aims to analyze the main Fire-wall/NAT traversing methods, and makes a detailed comparison between them, focusing on the ICE and VPN traversing methods newly brought forward.
出处 《微型电脑应用》 2006年第3期11-14,66,共4页 Microcomputer Applications
关键词 VOIP IALGI STUNI TURN Full PROXY ICE 虚拟专用网 防火墙 NAT VoIP ALG STUN TURN Full Proxy ICE VPN Firewall NAT
  • 相关文献

参考文献1

二级参考文献7

  • 1Rosenberg, Schulzrinne, Camarillo. SIP: Session initiation protocol[EB/OL], http://www.cs.columbia.edu/sip.
  • 2Rosenberg, Weinberger, Huitema. STUN-simple traversal ofuser datagram protocol (UDP) through network address translators(NATs) [EB/OL]. http://www.faqs.org/rfcs/rfc 3489. html.
  • 3Rosenberg. Traversal using relay NAT (TURN) [EB/OL]. http://www.jdrosen.net/midcom-turn.html.
  • 4Rosenberg. Interactive connectivity establishment(ICE):A methodology for nettwork address translator (NAT) traversal for the session initiation protocol(SIP)[EB/OL], http://www.jdrosen.net/papers/draft-rosenberg-sipping-ice-00.html.
  • 5Rosenberg. Examples of network address translation(NAT) and firewall traversal for the session initiation protocol(SIP) [EB/OL]. http://www.jdrosen.net/papers/ draft-rosenberg-sipping-nat-scenarios-02.html.
  • 6Rosenberg, Schulzrinne. An extension to the session initiation protocol (SIP) for symmetric response routing [EB/OL]. http://www.ietf.org/html.charters/sip-charter.html.
  • 7刘杨 姜琳颖 王中.基于ICE方式的SIPNAT解决方案研究[C].北京:中科院计算所,2004..

共引文献8

同被引文献3

  • 1张志杰.浅谈VoIP技术原理与发展应用[J].电脑知识与技术,2006,1(9):88-90. 被引量:3
  • 2Allen Doug.On the far side:NAT and session border controllers[J].Network Magazine,2003,(4):30-34.
  • 3Michael Stukas,Douglas C.Sicke.An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment[C].Information Systems Frontiers.2004,219-228.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部