Op#mizing NAT and Firewall Keepalives using PCP



Similar documents
NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE

Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer

NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University

Application Note. Onsight TeamLink And Firewall Detect v6.3

Introduc)on to Real- Time Applica)ons and Infrastructure development in the IETF

How To Configure Virtual Host with Load Balancing and Health Checking

IETF Security Architecture Update

The H.323 NAT/FW Traversal Solution

Network Convergence and the NAT/Firewall Problems

Telephone Related Queries (TeRQ) IETF 85 (Atlanta)

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Creating your own service profile for SJphone

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Cullen Jennings July 2015

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist David Schwartz Director, Telephony Research

Skype characteristics

NAT and Firewall Traversal. VoIP and MultiMedia /77

A Scalable Multi-Server Cluster VoIP System

Intro to Firewalls. Summary

Application Note. Onsight Connect Network Requirements v6.3

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

LifeSize Transit Deployment Guide June 2011

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

RTC-Web Security Considerations

NAT Traversal for VoIP

Network Address Translation (NAT)

Source-Connect Network Configuration Last updated May 2009

DNS SRV Usage June 22, 2011

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Managing (VoIP) Applications DYSWIS

WebSOCKET based Real time text (RTT) WebRTC gateway For WebRTC and SIP interop. Version 2.5a. Projet Sécuritas

How To Set Up Mybpx Security Configuration Guide V1.2.2 (V1.3.2) On A Pc Or Mac)

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Business VoIP Solution Training 04/2009

Application Note. Onsight Connect Network Requirements V6.1

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Analog IP Gateway GXW410x Quick Installation Guide SW version

Application Description

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D December 2013

VoIP Impairment, Failure, and Restrictions

A Comparative Study of Signalling Protocols Used In VoIP

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office Issue 1.0

WINGS WEB SERVICE MODULE

VoIP Router TA G81022MS User Guide

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Dial91 Android Edition User Guide

Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide

Internet Engineering Task Force (IETF) Category: Standards Track. T. Reddy Cisco March 2015

Using OPTIONS to Query for Operational Status in the Session Initiation Protocol (SIP)

Nokia E65 Internet calls

Mediatrix 3000 with Asterisk June 22, 2011

GÉANT: Delivering Global Real-Time Video Communication Services

Asterisk SIP Settings User Guide. Schmooze Com Inc.

Basic configuration of the GXW410x with Asterisk

OpenScape Business V2

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

Firewalls P+S Linux Router & Firewall 2013

Design of a SIP Outbound Edge Proxy (EPSIP)

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

Defending Computer Networks Lecture 6: TCP and Scanning. Stuart Staniford Adjunct Professor of Computer Science

ENUM: Migrating to VoIP. P2P Voice Applications

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Firewall Defaults and Some Basic Rules

Funkwerk UTM Release Notes (english)

Microsoft Present and Future

Solving the Firewall/NAT Traversal Issue of SIP:

SIP, Security and Session Border Controllers

ISG50 Application Note Version 1.0 June, 2011

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date:

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

OSSIR, November /45

SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops

CSCE 465 Computer & Network Security

Enhancements to Collaborative Media Streaming with IETF Protocols

Note: these functions are available if service provider supports them.

Design of a SIP Outbound Edge Proxy (EPSIP)

Configuring Your Gateman Proxy Server

Managing SIP traffic with Zeus Traffic Manager

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Transcription:

Op#mizing NAT and Firewall Keepalives using PCP dra:- reddy- pcp- op#mize- keepalives- 01 IETF 86- Orlando, March 2013 T.Reddy, M.Isomaki, D.Wing, P.Pa#l 1

Keep- alive Op=miza=on Applica#on Client PCP Server NAT/FW Internet Applica#on Server PCP PEER (max Life=me) Applica#on heartbeat (max interval) Applica#on heartbeat (max interval) Applica#on heartbeat (max interval) Applica#on heartbeat (max interval) PCP PEER (Max Life=me) Synchronize PCP and applica#on messages to save power 2

Approaches in General 1. Applica#on uses PCP but con#nues using predetermined fixed keep- alive interval PCP adds robustness, but no reduc#ons on keep- alive rate 2. Applica#on uses PCP and uses some dynamic mechanism to detect and op#mize keep- alive interval Just detect a (seemingly) working interval or also try to detect if there are addi#onal NATs or firewalls on the path Adds risk but keep- alive interval can be reduced This dra: explores and recommends the mechanisms apps can use in case 2. 3

Scenarios Client- Server applica#ons Peer- to- Peer applica#ons Updates since IETF 85 Detec#on Unexpected NATs before or a:er PCP server PCP Unaware Firewalls on the path (New) Keep- alive op=miza=on (Updated) Keepalive Interval Determina=on Procedure when PCP unaware Firewall or NAT is detected (New) Opera#on with App protocols SIP, HTTP, RTP, RTCWeb Data Channel (XMPP, WebSocket, ) 4

Update on Keep- alive Op=miza=on Sending a PEER request with a very short Requested Life#me can be used to query the life#me of an exis#ng mapping. PCP clients can reduce the frequency of their NAT and firewall keep- alive message. PCP base dra: recommends that life#mes of mappings created or lengthened with PEER be longer than the life#mes of implicitly- created mappings - PCP can thus be used to save barery consump=on by making PCP PEER message interval longer than what the applica=on would normally use the keep middle box state alive, and strictly shorter than the server state refresh interval. 5

ICE - Detec=ng Unexpected NATs Alice PCP Server NAT/FW Internet Bob PCP MAP (External IP x : Port y) ICE Connec#vity checks Detec#on: Does XOR- MAPPED- ADDRESS in STUN response match IP x : Port y? Yes : Unexpected NAT not detected Server- reflexive candidates gathered using PCP and STUN/TURN PCP itself can detect unexpected NATs between client and PCP server Applica#on can detect unexpected NATs behind PCP server using ICE 6

Detec=ng Unexpected Firewalls Alice PCP Server FW Unknown FW STUN Server Primary IP address/port Alternate IP address/port Internet STUN Binding Request/Response : Learn STUN Alternate IP address/port PCP MAP (FILTER: STUN Server Alternate IP address/port ) STUN Binding Request to send response from Alternate IP address/port STUN Binding response from Alternate IP address/port A:er mul#ple retries client confirms PCP unaware Firewall. 7

PCP unaware Firewall or NAT is detected - Heuris=cs STUN Server Alice PCP Server NAT/FW Unknown NAT/FW Internet Primary IP address/port Alternate IP address Port STUN Binding Request/Response : Learn STUN Alternate IP address/port STUN Binding Request/Response to Alternate IP address/port Wait for X seconds STUN Binding Request to send response from Alternate IP address/port STUN Binding response from alternate address/port Wait for (X + X/2) seconds Repeat procedure un=l no response received to determine Keepalive interval value of X Repeat for each transport protocol Other protocols like Teredo use it s own mechanism 8

Other changes To improve reliability, applica=ons SHOULD con=nue to use PCP to lengthen the FW/NAT mappings even if the PCP unaware NAT/Firewall is detected. This ensures that PCP aware FW/NAT do not close old mappings with no packet exchange when there is a resource- crunch situa=on. In cases of an intermediary device e.g. transparent HTTP proxy then PCP client must use Heuris=cs and compare the results with the life=me learnt using PCP PEER request. 9

Next Steps Consider adop=on of this document as WG item. 10