[go: up one dir, main page]

CN100334858C - Method of breakthrough NAT using dual tunnel mechanism - Google Patents

Method of breakthrough NAT using dual tunnel mechanism Download PDF

Info

Publication number
CN100334858C
CN100334858C CNB031474713A CN03147471A CN100334858C CN 100334858 C CN100334858 C CN 100334858C CN B031474713 A CNB031474713 A CN B031474713A CN 03147471 A CN03147471 A CN 03147471A CN 100334858 C CN100334858 C CN 100334858C
Authority
CN
China
Prior art keywords
ipv4
ipv6
address
nat
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031474713A
Other languages
Chinese (zh)
Other versions
CN1476206A (en
Inventor
刘敏
吴贤国
石晶林
李忠诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai United Information Polytron Technologies Inc
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CNB031474713A priority Critical patent/CN100334858C/en
Publication of CN1476206A publication Critical patent/CN1476206A/en
Application granted granted Critical
Publication of CN100334858C publication Critical patent/CN100334858C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种利用双重隧道机制穿透NAT(网络地址翻译)的方法,主要是利用含有伪隧道头部的IPv4(IP第4版)报文来封装传递IPv6(IP第6版)报文,并通过一个隧道服务器的重新封装,使位于IPv4 NAT后面的IPv6/IPv4双栈主机,能够使用自己的IPv4私有地址建立双重隧道,从而穿越IPv4网络,和其他的IPv6主机建立连接。该方法可以穿透所有类型的NAT,并且和现有的网络体系兼容,无需对现有的路由设备进行升级。利用这种方法穿透NAT时,位于IPv4 NAT后面的IPv6/IPv4双栈主机可以使用独立于IPv4地址的任意IPv6地址,该地址在公共的地址服务器上注册后,即可接收由一般IPv6结点主动发起的连接,并且可以和其他位于IPv4 NAT后面的IPv6/IPv4双栈主机建立连接。

Figure 03147471

A method for penetrating NAT (Network Address Translation) using a double-tunnel mechanism, mainly using an IPv4 (IP 4th Edition) message containing a pseudo-tunnel header to encapsulate and transmit an IPv6 (IP 6th Edition) message, and passing The re-encapsulation of a tunnel server enables the IPv6/IPv4 dual-stack host behind the IPv4 NAT to use its own IPv4 private address to establish a double tunnel, thereby traversing the IPv4 network and establishing connections with other IPv6 hosts. This method can penetrate all types of NAT, and is compatible with the existing network system, without upgrading the existing routing equipment. When using this method to penetrate NAT, the IPv6/IPv4 dual-stack host behind the IPv4 NAT can use any IPv6 address independent of the IPv4 address. Actively initiated connections, and can establish connections with other IPv6/IPv4 dual-stack hosts behind IPv4 NAT.

Figure 03147471

Description

一种利用双重隧道机制穿透NAT的方法A Method of Penetrating NAT Using Double Tunnel Mechanism

技术领域technical field

本发明涉及一种利用双重隧道机制穿透NAT(Network AddressTranslation,网络地址翻译)的方法,特别涉及一种利用一个隧道服务器,建立双重隧道,使用IPv4(Internet Protocol Version 4,IP第4版)报文来封装传递IPv6(Internet Protocol Version 6,IP第6版)报文,使位于IPv4 NAT后面的IPv6/IPv4双栈主机,能够使用自己的IPv4私有地址,通过隧道机制,穿越IPv4网络,和其他的IPv6主机建立连接的方法。The present invention relates to a method for penetrating NAT (Network Address Translation, Network Address Translation) by using a double tunnel mechanism, and in particular to a method for using a tunnel server to establish a double tunnel and use IPv4 (Internet Protocol Version 4, IP version 4) to report The text is used to encapsulate and transmit IPv6 (Internet Protocol Version 6, IP version 6) packets, so that the IPv6/IPv4 dual-stack host behind the IPv4 NAT can use its own IPv4 private address, pass through the IPv4 network through the tunnel mechanism, and other The method by which an IPv6 host establishes a connection.

背景技术Background technique

如上文所述,IPv4地址空间的耗尽使得IPv4在获得巨大成功的同时也面临困境。虽然使用NAT技术、CIDR(无类别编址)技术在一定程度上缓解了IP(Internet Protocol)地址的短缺,但是移动通信技术的发展对IP地址空间提出了更大的需求。因此下一代互联网协议IPv6的实施势在必行。IPv6是面向下一代因特网设计的网络层协议。实施IPv6网络,必须充分利用现有的网络环境来构造下一代互联网,以避免过多的投资浪费。IPv4因其出色的技术特性在互联网领域获得了巨大的成功,现在的互联网络是基于IPv4的,不可能将它们在短时间内都过渡到基于IPv6的网络。因此,在相当长的一段时期内,IPv6网络将和IPv4网络共存。如何实现IPv4与IPv6的互操作及平滑过渡是目前面临的重要问题。由于IPv6和IPv4的报文格式并不兼容,人们设计了多种过渡机制,令IPv6能够在今天广泛使用的IPv4基础设施上实现虚拟网络互连。隧道技术由于满足IPv6端到端通信的要求而得到广泛的使用。隧道技术的核心是把IPv6的报文封装在IPv4的报文中,使用现有的支持IPv4的互联网传送IPv6的报文。如果两个IPv6节点A和B之间建立了一条隧道,那么当节点A要向节点B发送IPv6报文时,它把IPv6报文封装在以节点B的IPv4地址为目的地址的IPv4报文中发送出去,节点B收到此报文后则解除IPv4封装,取出其中的IPv6报文放入自己的IPv6协议栈,以此实现在IPv4基础设施上的IPv6互通。但是,传统隧道技术均不能穿透NAT,原因在于NAT的过滤机制不允许一些类型的报文穿过,即使允许,私有地址也不能用于隧道的建立。As mentioned above, the exhaustion of IPv4 address space makes IPv4 face difficulties while achieving great success. Although the use of NAT technology and CIDR (Classless Addressing) technology has alleviated the shortage of IP (Internet Protocol) addresses to a certain extent, the development of mobile communication technology has put forward a greater demand for IP address space. Therefore, the implementation of the next generation Internet protocol IPv6 is imperative. IPv6 is a network layer protocol designed for the next generation Internet. To implement IPv6 network, we must make full use of the existing network environment to construct the next generation Internet, so as to avoid excessive waste of investment. IPv4 has achieved great success in the Internet field because of its excellent technical characteristics. The current Internet is based on IPv4, and it is impossible to transition them to IPv6-based networks in a short period of time. Therefore, for a long period of time, IPv6 networks will coexist with IPv4 networks. How to realize the interoperability and smooth transition between IPv4 and IPv6 is an important issue at present. Since the packet formats of IPv6 and IPv4 are not compatible, various transition mechanisms have been designed to enable IPv6 to realize virtual network interconnection on the widely used IPv4 infrastructure today. Tunnel technology is widely used because it meets the requirements of IPv6 end-to-end communication. The core of the tunnel technology is to encapsulate IPv6 packets into IPv4 packets, and use the existing Internet that supports IPv4 to transmit IPv6 packets. If a tunnel is established between two IPv6 nodes A and B, when node A wants to send an IPv6 message to node B, it encapsulates the IPv6 message in an IPv4 message with the IPv4 address of node B as the destination address After sending it out, Node B will remove the IPv4 encapsulation after receiving the message, take out the IPv6 message and put it into its own IPv6 protocol stack, so as to realize IPv6 intercommunication on the IPv4 infrastructure. However, none of the traditional tunneling technologies can penetrate NAT because the filtering mechanism of NAT does not allow certain types of packets to pass through. Even if it is allowed, private addresses cannot be used to establish tunnels.

借助微软公司所提出的Teredo方案可以解决这一问题,但是Teredo的实现比较复杂,很难和现有的网络结构兼容。不仅需要增设TeredoServer(Teredo服务器)来协助Teredo Client(Teredo用户)建立连接,还要求Teredo Client所要访问的一般IPv6站点附近的路由器有TeredoRelay(Teredo中继)的功能,即该路由器不但能识别Teredo格式的IPv6地址,并能和Teredo Server共同完成穿透NAT的功能,而后再将报文在Teredo Client和其他IPv6节点间转发。这必然需要对所有的IPv6网络入口处的路由器进行升级。另外,Teredo Client的IPv6地址是由Teredo Server的IPv4地址和端口,以及Teredo Client经NAT转换后的外部公有IPv4地址和端口共同组成的,所以其IPv6网络标识也依赖于IPv4地址,需要申请并注册特定的IPv6地址空间,否则无法接收由其他的IPv6结点所首先发起的连接。The Teredo solution proposed by Microsoft can solve this problem, but the implementation of Teredo is complicated and difficult to be compatible with the existing network structure. Not only does it need to add Teredo Server (Teredo server) to assist Teredo Client (Teredo user) to establish a connection, but also requires the router near the general IPv6 site to be accessed by Teredo Client to have the function of TeredoRelay (Teredo relay), that is, the router can not only recognize the Teredo format IPv6 address, and can work with Teredo Server to complete the function of penetrating NAT, and then forward the message between Teredo Client and other IPv6 nodes. This will necessarily require upgrading of routers at the ingress of all IPv6 networks. In addition, the IPv6 address of the Teredo Client is composed of the IPv4 address and port of the Teredo Server, and the external public IPv4 address and port of the Teredo Client converted by NAT, so its IPv6 network identification also depends on the IPv4 address, which requires application and registration Specific IPv6 address space, otherwise it cannot receive connections first initiated by other IPv6 nodes.

发明内容Contents of the invention

本发明的一个目的是提供一种利用双重隧道机制穿透NAT的方法,使位于IPv4 NAT后面的IPv6/IPv4双栈主机,利用一个隧道服务器,建立双重隧道,从而能够使用自己的IPv4私有地址,穿越IPv4网络,和其他的IPv6主机建立连接。An object of the present invention is to provide a kind of method utilizing double tunnel mechanism to penetrate NAT, make the IPv6/IPv4 dual-stack host computer behind IPv4 NAT, utilize a tunnel server, establish double tunnel, thus can use own IPv4 private address, Through the IPv4 network, establish connections with other IPv6 hosts.

本发明的另一个目的是提供一种穿透NAT的通用方法,该方法通过增加伪隧道头,可以穿透所有类型的NAT,并且和现有的网络体系兼容,无需对现有的路由设备进行升级。在UDP报文的负荷部分所定义的伪隧道头部用于指明目的结点所在IPv6网络的IPv4入口地址,以及必要的控制信息,可用于传输性能优化、网络安全、以及网络控制及管理。Another object of the present invention is to provide a general method for penetrating NAT, which can penetrate all types of NAT by adding a pseudo-tunnel header, and is compatible with existing network systems, without the need for existing routing equipment upgrade. The pseudo-tunnel header defined in the payload part of the UDP message is used to indicate the IPv4 entry address of the IPv6 network where the destination node is located, as well as necessary control information, which can be used for transmission performance optimization, network security, and network control and management.

本发明的另一个目的是提供一种穿透NAT的方法,该方法提供了一个公共的地址服务器,用于注册并查询所有的IPv6网络地址及其对应的IPv4入口地址,以保证所有发往该IPv6网络的报文都会在封装后发给这个IPv4入口地址,不仅便于地址的集中查询和管理,有效地提高报文传输的效率,也可以很好地和DNS(域名服务)等其他的网络服务相集成。Another object of the present invention is to provide a method for traversing NAT, which provides a public address server for registering and querying all IPv6 network addresses and their corresponding IPv4 entry addresses, so as to ensure that all IPv6 network packets will be sent to this IPv4 entry address after encapsulation, which not only facilitates centralized query and management of addresses, effectively improves the efficiency of packet transmission, but also can be well integrated with other network services such as DNS (Domain Name Service) integrated.

本发明的另一个目的是提供一种穿透NAT的方法,使位于IPv4 NAT后面的IPv6/IPv4双栈主机可以使用独立于IPv4地址的任意IPv6地址,该地址在公共的地址服务器上注册后,即可接收由其他IPv6结点首先发起的连接。Another object of the present invention is to provide a kind of method of penetrating NAT, make the IPv6/IPv4 dual-stack host computer behind IPv4 NAT can use any IPv6 address independent of IPv4 address, after this address is registered on public address server, That is, the connection firstly initiated by other IPv6 nodes can be received.

本发明的另一个目的是提供一种穿透NAT的方法,使位于IPv4 NAT后面的IPv6/IPv4双栈主机不仅能和一般的IPv6结点建立连接,也可以和其它位于IPv4 NAT后面的IPv6/IPv4双栈主机建立连接。Another object of the present invention is to provide a method for traversing NAT, so that the IPv6/IPv4 dual-stack host behind the IPv4 NAT can not only establish a connection with a general IPv6 node, but also connect with other IPv6/IPv4 hosts behind the IPv4 NAT. An IPv4 dual-stack host establishes a connection.

要解决穿透NAT的问题,首先要分析NAT的实现机制。NAT实现的核心是把内部网络中数据报文的地址(称为内部地址或私有地址)翻译为外部合法地址(称为外部地址或公有地址)并向外部网络发送,而在收到外部数据报文后,再翻译为内部地址并向内部网络发送。所谓外部地址或公有地址,是由Inter NIC(Internet Network Information Center,因特网信息中心)分配给提出申请的组织机构的可以直接访问因特网的全局IP地址。而内部地址或私有地址则属于非注册地址,专门为组织机构内部使用,无法直接访问外部因特网。NAT的实质就是动态维护一个映射表,用来把内部的地址(IP地址,端口)映射到合法的外部地址上去。用<IN.ip,IN.port>表示内部计算机的地址,对应的NAT翻译后的合法外部地址为<NAT.ip,NAT.port>,而与之通信的外部计算机地址就相应表示为<OUT.ip,OUT.port>。因此,在NAT系统中,映射表就表示为这样一个<IN.ip,IN.port,NAT.ip,NAT.port,OUT.ip,OUT.port>六元组的映射表项的集合。当内部网络有报文时,若其目标地址不在内部,NAT就以<IN.ip,IN.port>为关键字查找该映射表,表项存在时直接翻译并向外转发报文;否则分配新的地址资源<NAT.ip,NAT.port>,记录新的表项后再翻译转发报文。收到外部报文后,以<NAT.ip,NAT.port>为关键字查找,找到后进行地址翻译并向内部转发。这种表项是动态维护的,超过一定时间还未继续使用的<NAT.ip,NAT.port>会被系统自动回收,以备下次重新分配。To solve the problem of traversing NAT, we must first analyze the implementation mechanism of NAT. The core of NAT implementation is to translate the address of the data packet in the internal network (called internal address or private address) into an external legal address (called external address or public address) and send it to the external network. After the text, it is translated into an internal address and sent to the internal network. The so-called external address or public address is a global IP address assigned by the Inter NIC (Internet Network Information Center) to the applying organization that can directly access the Internet. The internal address or private address is a non-registered address, which is specially used within the organization and cannot directly access the external Internet. The essence of NAT is to dynamically maintain a mapping table, which is used to map internal addresses (IP addresses, ports) to legal external addresses. Use <IN.ip, IN.port> to indicate the address of the internal computer, the corresponding legal external address after NAT translation is <NAT.ip, NAT.port>, and the address of the external computer communicating with it is correspondingly expressed as <OUT .ip,out.port>. Therefore, in the NAT system, the mapping table is represented as a set of mapping table entries of such a <IN.ip, IN.port, NAT.ip, NAT.port, OUT.ip, OUT.port> six-tuple. When there is a message in the internal network, if the destination address is not inside, NAT will search the mapping table with <IN.ip, IN.port> as the key word, and if the entry exists, it will directly translate and forward the message; otherwise, it will allocate The new address resource <NAT.ip, NAT.port>, record the new entry and then translate and forward the message. After receiving the external message, use <NAT.ip, NAT.port> as the keyword to search, and after finding it, translate the address and forward it to the inside. This kind of entry is dynamically maintained, and the <NAT.ip, NAT.port> that has not been used for a certain period of time will be automatically recycled by the system for the next redistribution.

根据NAT具体实现时的策略可以对NAT进行分类。当报文源在NAT内部时,此时根据内部报文由内向外转发时的匹配过程来分类。当根据<IN.ip,IN.port>查找到对应元组后(匹配失败说明需要申请新的网络资源),主要有2种具体的实现方式。一种称为最少端口分配方式,此时直接进行地址翻译,然后发送数据即可。另外一种方式称为竞争端口分配方式,需要匹配原来预存的<OUT.ip,OUT.port>(或两者之一),若匹配结果不一致,则认为需要重新生成新的端口;否则才允许进行地址翻译并发送。当报文源在NAT外部时,此时根据外部报文的匹配过程来分:在收到外部报文后根据<NAT.ip,NAT.port>查找到对应元组,匹配失败说明该报文非法,直接丢弃;否则存在3种常见的匹配规则:NATs can be classified according to the policies used in the specific implementation of NATs. When the source of the packet is inside the NAT, it is classified according to the matching process when the internal packet is forwarded from the inside to the outside. When the corresponding tuple is found according to <IN.ip, IN.port> (matching failure indicates that a new network resource needs to be applied for), there are mainly two specific implementation methods. One is called the least port allocation method. At this time, the address translation can be performed directly, and then the data can be sent. The other method is called competitive port allocation method, which needs to match the original pre-stored <OUT.ip, OUT.port> (or one of the two). If the matching results are inconsistent, it is considered that a new port needs to be regenerated; otherwise, it is allowed Translate the address and send it. When the source of the message is outside the NAT, it is divided according to the matching process of the external message: after receiving the external message, the corresponding tuple is found according to <NAT.ip, NAT.port>, and the matching failure indicates that the message If it is illegal, discard it directly; otherwise, there are 3 common matching rules:

I.不进行任何匹配,直接用<IN.ip,IN.port>进行地址翻译,称之为宽匹配方式。I. Do not perform any matching, and directly use <IN.ip, IN.port> for address translation, which is called wide matching.

II.只匹配OUT.ip或OUT.port,即对报文的源地址或端口实现甄别,如果与对应元组中存放的不符,认为是非法报文而直接丢弃,否则再进行地址翻译。相应的,可以称之为地址匹配/端口匹配方式。II. Only match OUT.ip or OUT.port, that is, screen the source address or port of the message. If it does not match the one stored in the corresponding tuple, it will be considered as an illegal message and discarded directly, otherwise, address translation will be performed. Correspondingly, it can be called the address matching/port matching mode.

III.匹配OUT.ip和OUT.port,只有两者全部符合的情况下才进行地址翻译,称为安全匹配方式。III. Match OUT.ip and OUT.port, and address translation is performed only when both match. This is called a safe matching method.

本发明所提出的方法可以穿透上述所有的NAT类型,主要是利用含有伪隧道头部的IPv4的UDP(用户数据报协议)报文来封装传递IPv6报文,并通过一个隧道服务器来建立双重隧道,以完成穿透NAT的功能。选用UDP报文作为承载报文的原因是,TCP(传输控制协议)报文和UDP报文是唯一两个可以通过所有常用的NAT类型的报文类型。而由于TCP的拥塞控制机制,利用TCP来传输IPv6报文实时性差,故此选用UDP报文作为承载报文。隧道服务器必须具有IPv4的公有地址,可以是IPv6/IPv4双栈主机,也可以是一台纯IPv4主机。它主要完成对位于IPv4NAT后面的IPv6/IPv4双栈主机所传来的具有伪隧道头部的IPv4报文(里面封装了IPv6报文)进行重新组装,去掉伪隧道头部后向真正的目的结点转发;对外部传来的封装了IPv6报文的IPv4报文也重新进行组装,向位于IPv4 NAT后面的IPv6/IPv4双栈主机转发的功能。The method proposed by the present invention can penetrate all above-mentioned NAT types, mainly utilizes the UDP (User Datagram Protocol) message of the IPv4 that contains the pseudo-tunnel header to encapsulate and deliver the IPv6 message, and establishes a dual channel through a tunnel server. Tunnel to complete the function of traversing NAT. The reason why UDP packets are selected as bearer packets is that TCP (Transmission Control Protocol) packets and UDP packets are the only two types of packets that can pass through all commonly used NAT types. However, due to the congestion control mechanism of TCP, the real-time performance of using TCP to transmit IPv6 packets is poor, so UDP packets are selected as bearer packets. The tunnel server must have an IPv4 public address, and it can be an IPv6/IPv4 dual-stack host or a pure IPv4 host. It mainly completes the reassembly of the IPv4 packets with pseudo-tunnel headers (IPv6 packets encapsulated inside) transmitted from the IPv6/IPv4 dual-stack host behind the IPv4NAT, removes the pseudo-tunnel headers and forwards to the real destination node. Point forwarding; the function of reassembling the IPv4 packets encapsulated with IPv6 packets from the outside, and forwarding them to the IPv6/IPv4 dual-stack host behind the IPv4 NAT.

该方法提供了一个公共的地址服务器,用于注册并查询所有的IPv6网络地址及其对应的IPv4入口地址,以保证所有发往该IPv6网络的报文都会在封装后发给这个IPv4入口地址,这不仅便于地址的集中查询和管理,可有效地提高报文传输的效率,也可以很好地和DNS域名服务的网络服务相集成。This method provides a public address server for registering and querying all IPv6 network addresses and their corresponding IPv4 entry addresses, so as to ensure that all packets sent to the IPv6 network will be sent to this IPv4 entry address after encapsulation. This not only facilitates centralized query and management of addresses, can effectively improve the efficiency of message transmission, but also can be well integrated with DNS domain name service network services.

此外,要求隧道服务器的IPv4地址对位于IPv4 NAT后面的IPv6/IPv4双栈主机来说是公开的,即该主机已知可用的隧道服务器的地址或地址列表。另外,位于IPv4 NAT后面的IPv6/IPv4双栈主机的IPv6地址在公共的地址服务器上所注册的IPv4入口是隧道服务器的IPv4地址。而且隧道服务器保存着一张地址映射表,记录以自己的IPv4地址所注册的IPv6地址的真正IPv4入口(即位于IPv4 NAT后面的IPv6/IPv4双栈主机经NAT转换后的公有IPv4地址)。In addition, the IPv4 address of the tunnel server is required to be open to the IPv6/IPv4 dual-stack host behind the IPv4 NAT, that is, the address or address list of the available tunnel server is known to the host. In addition, the IPv4 entry registered by the IPv6 address of the IPv6/IPv4 dual-stack host behind the IPv4 NAT on the public address server is the IPv4 address of the tunnel server. And the tunnel server keeps an address mapping table, which records the real IPv4 entry of the IPv6 address registered with its own IPv4 address (that is, the public IPv4 address of the IPv6/IPv4 dual-stack host behind the IPv4 NAT converted by NAT).

本发明通过下述技术方案来实现。The present invention is realized through the following technical solutions.

一种利用双重隧道机制穿透NAT(网络地址翻译)的方法,其特征在于,通过一个隧道服务器建立双重隧道,使位于IPv4(Internet ProtocolVersion 4,IP第4版)NAT后面的IPv6/IPv4双栈主机,利用含有伪隧道头部的IPv4的UDP报文来封装传递IPv6报文,和其他的IPv6(InternetProtocol Version 6,IP第6版)主机建立连接,其中伪隧道头部用于指明目标主机所在IPv6网络的IPv4入口地址(在公共的地址服务器上查询得到)以及必要的控制信息,双栈主机所发送的含有伪隧道头部并封装有IPv6报文的IPv4 UDP报文的目的地址是隧道服务器的IPv4地址,隧道服务器收到此报文后,将伪隧道头部取出,而后以隧道服务器的IPv4地址和目标主机所在IPv6网络的IPv4入口地址分别作为源和目的地址重新封装一个IPv4报文,并向外转发;反之,其它IPv6主机发给此双栈主机的IPv6报文也会在封装后发送到隧道服务器(双栈主机的IPv6地址所注册的IPv4入口地址是隧道服务器的IPv4地址),隧道服务器根据目的IPv6地址匹配映射表,找到双栈主机经过NAT映射后的公有IPv4地址,然后以隧道服务器的IPv4地址和双栈主机经过NAT映射后的公有IPv4地址分别作为源和目的地址重新封装一个IPv4的UDP报文,而后向外转发。A kind of method utilizing double tunnel mechanism to penetrate NAT (network address translation), it is characterized in that, set up double tunnel by a tunnel server, make the IPv6/IPv4 dual stack that is positioned at IPv4 (Internet ProtocolVersion 4, IP 4th edition) NAT back The host uses the IPv4 UDP message containing the pseudo-tunnel header to encapsulate and transmit the IPv6 message, and establishes a connection with other IPv6 (Internet Protocol Version 6, IP version 6) hosts, where the pseudo-tunnel header is used to indicate the location of the target host The IPv4 entry address of the IPv6 network (queried on the public address server) and the necessary control information, the destination address of the IPv4 UDP message containing the pseudo-tunnel header and encapsulated with IPv6 messages sent by the dual-stack host is the tunnel server After the tunnel server receives the packet, it takes out the fake tunnel header, and then re-encapsulates an IPv4 packet with the IPv4 address of the tunnel server and the IPv4 entry address of the IPv6 network where the target host is located as the source and destination addresses respectively. and forward it outward; otherwise, other IPv6 hosts send IPv6 messages to this dual-stack host and send them to the tunnel server after encapsulation (the IPv4 entry address registered by the IPv6 address of the dual-stack host is the IPv4 address of the tunnel server), The tunnel server matches the mapping table according to the destination IPv6 address, finds the public IPv4 address of the dual-stack host after NAT mapping, and then re-encapsulates with the IPv4 address of the tunnel server and the public IPv4 address of the dual-stack host after NAT mapping as the source and destination addresses respectively An IPv4 UDP packet is forwarded outward.

在UDP报文的负荷部分所定义的伪隧道头部,用于指明目的结点所在IPv6网络的IPv4入口地址以及必要的控制信息,可用于传输性能优化、网络安全、以及网络控制及管理。The pseudo-tunnel header defined in the payload part of the UDP message is used to indicate the IPv4 entry address of the IPv6 network where the destination node is located and necessary control information, which can be used for transmission performance optimization, network security, and network control and management.

该方法可以穿透所有类型的NAT,并且和现有的网络体系兼容,无需对现有的路由设备进行升级。This method can penetrate all types of NAT, and is compatible with the existing network system, without upgrading the existing routing equipment.

穿透NAT的方法,提供了一个公共的地址服务器,用于注册并查询所有的IPv6网络地址及其对应的IPv4入口地址,以保证所有发往该IPv6网络的报文都会在封装后发给这个IPv4入口地址,这不仅便于地址的集中查询和管理,可有效地提高报文传输的效率,也可以很好地和DNS(域名服务)等其他的网络服务相集成。The method of traversing NAT provides a public address server for registering and querying all IPv6 network addresses and their corresponding IPv4 entry addresses, so as to ensure that all packets destined for the IPv6 network will be sent to this IPv6 network after encapsulation. IPv4 entry address, which not only facilitates centralized query and management of addresses, can effectively improve the efficiency of message transmission, but also can be well integrated with DNS (Domain Name Service) and other network services.

位于IPv4 NAT后面的IPv6/IPv4双栈主机可以使用独立于IPv4地址的任意IPv6地址,该地址在公共的地址服务器上注册后,即可接收由其他IPv6结点首先发起的连接。The IPv6/IPv4 dual-stack host behind the IPv4 NAT can use any IPv6 address independent of the IPv4 address. After the address is registered on the public address server, it can receive the connection first initiated by other IPv6 nodes.

使位于IPv4 NAT后面的IPv6/IPv4双栈主机不仅能和一般的IPv6结点建立连接,也可以和其他位于IPv4 NAT后面的IPv6/IPv4双栈主机建立连接。The IPv6/IPv4 dual-stack host behind the IPv4 NAT can not only establish connections with general IPv6 nodes, but also establish connections with other IPv6/IPv4 dual-stack hosts behind the IPv4 NAT.

附图说明Description of drawings

图1是双重隧道机制工作过程示意图。Fig. 1 is a schematic diagram of the working process of the double tunnel mechanism.

具体实施方式Detailed ways

图1中,先来看一下一般的IPv6结点间的通讯过程。假设IPv6结点A想发起到IPv6结点B的连接。因为目前的互联网络仍是基于IPv4的,各个IPv6网络都通过一台双栈主机或路由器连入IPv4网络,以实现与其他IPv4网络或IPv6网络的互通,这台双栈主机或路由器的IPv4地址即为该IPv6网络的入口地址。这里我们提供了一个公共的地址服务器,用于注册并查询所有的IPv6网络地址及其对应的IPv4入口地址。所以,A需要先从公共的地址服务器上查询得到B所在IPv6网络的IPv4入口地址,然后将以A,B为源和目的地址的IPv6报文封装在IPv4报文里面,发给B所在IPv6网络的IPv4入口地址(如果A为纯IPv6节点,则封装过程需由A所在网络的IPv4入口来完成),B所在IPv6网络的IPv4入口处的双栈主机或路由器去掉IPv4报文头部后,再将IPv6报文转发给B。当然,如果B本身即为双栈主机,且已注册,则该报文会直接发给B的IPv4地址,由B来去掉IPv4报文头部。In Fig. 1, first look at the communication process between general IPv6 nodes. Suppose IPv6 node A wants to initiate a connection to IPv6 node B. Because the current Internet is still based on IPv4, each IPv6 network is connected to the IPv4 network through a dual-stack host or router to achieve intercommunication with other IPv4 or IPv6 networks. The IPv4 address of this dual-stack host or router It is the entry address of the IPv6 network. Here we provide a public address server for registering and querying all IPv6 network addresses and their corresponding IPv4 entry addresses. Therefore, A needs to obtain the IPv4 entry address of B's IPv6 network from the public address server first, and then encapsulates the IPv6 packet with A and B as source and destination addresses in the IPv4 packet and sends it to the IPv6 network of B. (if A is a pure IPv6 node, the encapsulation process needs to be completed by the IPv4 entrance of the network where A is located), the dual-stack host or router at the IPv4 entrance of the IPv6 network where B is located removes the IPv4 packet header, and then Forward the IPv6 packet to B. Of course, if B itself is a dual-stack host and has registered, the packet will be sent directly to B's IPv4 address, and B will remove the IPv4 packet header.

现在,假设A为双栈结点,且位于IPv4 NAT后面,即A只有NAT所分配的IPv4的私有地址,无IPv4的公有地址。A想发起到其他IPv6网络的IPv6结点B的连接(B可为一般的IPv6主机,也可为位于IPv4 NAT后面的IPv6/IPv4双栈主机)。A首先形成以A,B为源和目的地址的IPv6报文,并形成一个伪隧道头部,该头部指明B所在IPv6网络的IPv4入口地址(在公共的地址服务器上查询得到)以及必要的控制信息,然后将此两部分一同封装在IPv4的UDP报文里面,此报文的目的地址为隧道服务器S的IPv4地址。S收到此报文后,将伪隧道头部取出,而后重新生成一个IPv4报文,以S的IPv4地址和B所在IPv6网络的IPv4入口地址分别作为源和目的地址,其内容是A所封装的以A,B为源和目的地址的IPv6报文。S可以为纯IPv4主机,无需具体识别IPv6报文,只是将A传来的报文除去伪隧道头部后,重新生成以S的IPv4地址和B所在IPv6网络的IPv4入口地址为源和目的地址的IPv4报文。反之,由于A的IPv6地址所注册的IPv4入口是隧道服务器S的IPv4地址,所以B传给A的IPv6报文封装后会发给S的IPv4地址。S收到后,将IPv6报文的目的地址取出。S可以为纯IPv4主机,无需真正识别IPv6报文,只是将收到的封装IPv6报文的IPv4报文内容中和IPv6目的地址相对应的部分取出,去匹配地址映射表,找出真正的IPv4入口(即A经过NAT映射后的公有IPv4地址)。然后重新生成一个IPv4的UDP报文,以S的IPv4地址和A经过NAT映射后的公有IPv4地址分别作为源和目的地址,而UDP报文内容是刚接到的报文的数据部分(即B传给A的IPv6报文)。由于A和S之间已经在NAT的地址映射表中建立了映射表项,所以NAT会将该报文转发给A。这样,通过隧道服务器对数据的重新组装和转发,建立了双重隧道,从而使位于IPv4 NAT后面的IPv6/IPv4双栈主机,能够使用自己的IPv4私有地址,穿越IPv4网络,和其他的IPv6主机建立连接。图1说明上述双重隧道机制工作的过程。需要说明的是,无论哪种NAT,映射表项都不是永久保存的。所以A应该向S定期发送联络报文,来维持NAT中相应的映射表项。Now, assume that A is a dual-stack node and is located behind an IPv4 NAT, that is, A only has an IPv4 private address assigned by the NAT, and has no IPv4 public address. A wants to initiate a connection to an IPv6 node B of another IPv6 network (B can be a general IPv6 host, or an IPv6/IPv4 dual-stack host behind an IPv4 NAT). A first forms an IPv6 message with A and B as source and destination addresses, and forms a pseudo-tunnel header, which indicates the IPv4 entry address of B's IPv6 network (obtained by querying on a public address server) and the necessary Control information, and then encapsulate the two parts together in the IPv4 UDP message, the destination address of this message is the IPv4 address of the tunnel server S. After receiving this message, S takes out the pseudo-tunnel header, and then regenerates an IPv4 message, using the IPv4 address of S and the IPv4 entry address of B's IPv6 network as the source and destination addresses respectively, and its content is encapsulated by A IPv6 packets with A and B as source and destination addresses. S can be a pure IPv4 host without specific identification of IPv6 packets. It just removes the fake tunnel header from the packets sent by A and regenerates the source and destination addresses with the IPv4 address of S and the IPv4 entry address of the IPv6 network where B is located. IPv4 packets. Conversely, since the IPv4 entry registered by A's IPv6 address is the IPv4 address of tunnel server S, the IPv6 packet sent by B to A will be encapsulated and sent to S's IPv4 address. After receiving it, S takes out the destination address of the IPv6 packet. S can be a pure IPv4 host, without actually identifying the IPv6 message, it just takes out the part corresponding to the IPv6 destination address in the IPv4 message content of the received encapsulated IPv6 message, matches the address mapping table, and finds out the real IPv4 message. Ingress (that is, the public IPv4 address of A after NAT mapping). Then regenerate an IPv4 UDP message, use the IPv4 address of S and the public IPv4 address of A after NAT mapping as the source and destination addresses respectively, and the UDP message content is the data part of the message just received (that is, B IPv6 packets sent to A). Since a mapping entry has been established between A and S in the address mapping table of NAT, NAT will forward the packet to A. In this way, through the reassembly and forwarding of data by the tunnel server, a double tunnel is established, so that the IPv6/IPv4 dual-stack host behind the IPv4 NAT can use its own IPv4 private address to traverse the IPv4 network and establish a tunnel with other IPv6 hosts. connect. Figure 1 illustrates the working process of the above-mentioned double tunneling mechanism. It should be noted that no matter what kind of NAT, the mapping table entries are not permanently saved. Therefore, A should periodically send contact messages to S to maintain the corresponding mapping entries in the NAT.

我们提出的利用隧道服务器建立双重隧道穿透NAT的方法可以使位于IPv4 NAT后面的IPv6/IPv4双栈主机,能够使用自己的IPv4私有地址,通过隧道机制,穿越IPv4网络,和其他的IPv6主机建立连接。该方法通过增加伪隧道头部,可以穿透所有类型的NAT,并且和现有的网络体系兼容,无需对现有的路由设备进行升级。在UDP报文的负荷部分所定义的伪隧道头部用于指明目的结点所在IPv6网络的IPv4入口地址以及必要的控制信息,可用于传输性能优化、网络安全、以及网络控制及管理。该方法通过一个公共的地址服务器来注册并查询IPv6网络的IPv4入口地址,所有的IPv6网络地址及其对应的IPv4入口地址都必须在该服务器上进行注册,以保证所有发往该IPv6网络的报文都会在封装后发给这个IPv4入口地址,这样不仅便于地址的集中管理和查询,有效地提高报文传输的效率,也可以很好地和DNS等其他的网络服务相集成。使用这种方法,位于IPv4 NAT后面的IPv6/IPv4双栈主机可以使用独立于IPv4地址的任意IPv6地址,该地址在公共的地址服务器上注册后,即可接收由一般IPv6结点主动发起的连接,并且可以和其他位于IPv4 NAT后面的IPv6/IPv4双栈主机建立连接。这对于处理现有IPv4网络和未来IPv6网络之间的关系,从而实现IPv4向IPv6的平滑过渡有着重要的意义。The method we propose to use the tunnel server to establish a double tunnel to penetrate NAT can enable the IPv6/IPv4 dual-stack host behind the IPv4 NAT to use its own IPv4 private address, pass through the IPv4 network through the tunnel mechanism, and establish a tunnel with other IPv6 hosts. connect. The method can penetrate all types of NAT by adding a pseudo-tunnel header, and is compatible with the existing network system without upgrading the existing routing equipment. The pseudo-tunnel header defined in the payload part of the UDP message is used to indicate the IPv4 entry address of the IPv6 network where the destination node is located and necessary control information, which can be used for transmission performance optimization, network security, and network control and management. This method uses a public address server to register and query the IPv4 entry address of the IPv6 network. All IPv6 network addresses and their corresponding IPv4 entry addresses must be registered on the server to ensure that all reports sent to the IPv6 network All files will be sent to this IPv4 entry address after encapsulation, which not only facilitates centralized management and query of addresses, effectively improves the efficiency of message transmission, but also can be well integrated with other network services such as DNS. Using this method, the IPv6/IPv4 dual-stack host behind the IPv4 NAT can use any IPv6 address independent of the IPv4 address. After the address is registered on the public address server, it can receive the connection initiated by the general IPv6 node. , and can establish connections with other IPv6/IPv4 dual-stack hosts behind IPv4 NAT. This is of great significance for dealing with the relationship between the existing IPv4 network and the future IPv6 network, so as to realize the smooth transition from IPv4 to IPv6.

Claims (6)

1.一种利用双重隧道机制穿透NAT的方法,其特征在于,通过一个隧道服务器建立双重隧道,使位于IPv4 NAT后面的IPv6/IPv4双栈主机,利用含有伪隧道头部的IPv4的UDP报文来封装传递IPv6报文,和其他的IPv6主机建立连接,其中伪隧道头部用于指明目标主机所在IPv6网络的IPv4入口地址以及必要的控制信息,双栈主机所发送的含有伪隧道头部并封装有IPv6报文的IPv4 UDP报文的目的地址是隧道服务器的IPv4地址,隧道服务器收到此报文后,将伪隧道头部取出,而后以隧道服务器的IPv4地址和目标主机所在IPv6网络的IPv4入口地址分别作为源和目的地址重新封装一个IPv4报文,并向外转发;反之,其它IPv6主机发给此双栈主机的IPv6报文也会在封装后发送到隧道服务器,隧道服务器根据目的IPv6地址匹配映射表,找到双栈主机经过NAT映射后的公有IPv4地址,然后以隧道服务器的IPv4地址和双栈主机经过NAT映射后的公有IPv4地址分别作为源和目的地址重新封装一个IPv4的UDP报文,而后向外转发。1. A kind of method that utilizes double tunnel mechanism to penetrate NAT, it is characterized in that, set up double tunnel by a tunnel server, make the IPv6/IPv4 dual-stack host that is positioned at the IPv4 NAT back, utilize the UDP report that contains the IPv4 of false tunnel head To encapsulate and transmit IPv6 packets, and establish connections with other IPv6 hosts, the pseudo-tunnel header is used to indicate the IPv4 entry address of the IPv6 network where the target host is located and necessary control information, and the dual-stack host sends a pseudo-tunnel header. And the destination address of the IPv4 UDP message encapsulated with IPv6 message is the IPv4 address of the tunnel server. The IPv4 ingress address of the host is used as the source and destination addresses to re-encapsulate an IPv4 packet and forward it outward; otherwise, the IPv6 packets sent by other IPv6 hosts to this dual-stack host will also be encapsulated and sent to the tunnel server. The destination IPv6 address matches the mapping table to find the public IPv4 address of the dual-stack host after NAT mapping, and then re-encapsulates an IPv4 address with the IPv4 address of the tunnel server and the public IPv4 address of the dual-stack host after NAT mapping as the source and destination addresses respectively. UDP packets, and then forwarded outward. 2.根据权利要求1所述的穿透NAT的方法,其特征在于,在UDP报文的负荷部分所定义的伪隧道头部,用于指明目的结点所在IPv6网络的IPv4入口地址以及必要的控制信息,可用于传输性能优化、网络安全、以及网络控制及管理。2. the method for traversing NAT according to claim 1, is characterized in that, the pseudo-tunnel header defined in the load part of UDP message, is used for specifying the IPv4 entry address of destination node place IPv6 network and necessary Control information, which can be used for transmission performance optimization, network security, and network control and management. 3.根据权利要求1所述的穿透NAT的方法,其特征在于,该方法利用隧道服务器建立双重隧道,可以穿透所有类型的NAT,并且和现有的网络体系兼容,无需对现有的路由设备进行升级。3. The method for penetrating NAT according to claim 1, characterized in that, the method utilizes a tunnel server to establish a double tunnel, which can penetrate all types of NAT, and is compatible with existing network systems, without requiring Routing equipment is upgraded. 4.根据权利要求1所述的穿透NAT的方法,其特征在于,提供了一个公共的地址服务器,用于注册并查询所有的IPv6网络地址及其对应的IPv4入口地址,以保证所有发往该IPv6网络的报文都会在封装后发给这个IPv4入口地址,这不仅便于地址的集中查询和管理,可有效地提高报文传输的效率,也可以很好地和DNS其他的网络服务相集成。4. The method for traversing NAT according to claim 1, wherein a public address server is provided for registering and querying all IPv6 network addresses and their corresponding IPv4 entry addresses, so as to ensure that all The packets of the IPv6 network will be sent to the IPv4 entry address after encapsulation, which not only facilitates the centralized query and management of addresses, but also effectively improves the efficiency of packet transmission, and can also be well integrated with other DNS network services . 5.根据权利要求1所述的穿透NAT的方法,其特征在于,位于IPv4NAT后面的IPv6/IPv4双栈主机可以使用独立于IPv4地址的任意IPv6地址,该地址在公共的地址服务器上注册后,即可接收由其他IPv6结点首先发起的连接。5. the method for penetrating NAT according to claim 1, is characterized in that, the IPv6/IPv4 dual-stack host computer that is positioned at IPv4NAT back can use the arbitrary IPv6 address independent of IPv4 address, after this address is registered on public address server , to receive the connection first initiated by other IPv6 nodes. 6.根据权利要求1所述的穿透NAT的方法,其特征在于,位于IPv4 NAT后面的IPv6/IPv4双栈主机不仅能和一般的IPv6结点建立连接,也可以和其他位于IPv4 NAT后面的IPv6/IPv4双栈主机建立连接。6. the method for penetrating NAT according to claim 1, is characterized in that, the IPv6/IPv4 dual-stack host computer that is positioned at IPv4 NAT back not only can establish connection with general IPv6 node, also can be positioned at other behind IPv4 NAT An IPv6/IPv4 dual-stack host establishes a connection.
CNB031474713A 2003-07-14 2003-07-14 Method of breakthrough NAT using dual tunnel mechanism Expired - Fee Related CN100334858C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031474713A CN100334858C (en) 2003-07-14 2003-07-14 Method of breakthrough NAT using dual tunnel mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031474713A CN100334858C (en) 2003-07-14 2003-07-14 Method of breakthrough NAT using dual tunnel mechanism

Publications (2)

Publication Number Publication Date
CN1476206A CN1476206A (en) 2004-02-18
CN100334858C true CN100334858C (en) 2007-08-29

Family

ID=34156152

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031474713A Expired - Fee Related CN100334858C (en) 2003-07-14 2003-07-14 Method of breakthrough NAT using dual tunnel mechanism

Country Status (1)

Country Link
CN (1) CN100334858C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100459566C (en) * 2004-05-10 2009-02-04 华为技术有限公司 Implementation method of tunnel relay in network for network address translation
CN100364292C (en) * 2004-06-30 2008-01-23 华为技术有限公司 Virtual Private Network System and Implementation Method of Hybrid Backbone Network with Hybrid Sites
GB2416958A (en) * 2004-07-30 2006-02-08 Orange Personal Comm Serv Ltd Communicating internet packet data over a packet radio network
FI20041556A0 (en) * 2004-12-01 2004-12-01 Nokia Corp Request trigger to open a network link
CN101651718B (en) * 2009-08-27 2013-01-16 中国电信股份有限公司 Method and system for changing IP flow protocol stack
CN102045244A (en) * 2009-10-10 2011-05-04 中兴通讯股份有限公司 IPV4 (Internet Protocol Version 4) network as well as implementation method and system for intercommunicating with new network
CN102143246B (en) * 2010-12-20 2013-11-06 华为技术有限公司 Method for end-to-end communication between internet protocol version (IPV) 4 network and IPV6 network
CN102075401B (en) 2011-01-28 2013-08-07 华为技术有限公司 Method, equipment and system for transmitting message on peripheral component interface express (PCIE) bus
CN103428303A (en) * 2012-05-22 2013-12-04 中兴通讯股份有限公司 Method and system for IPv6 host to have access to IPv4 server
CN102904976B (en) * 2012-10-23 2015-02-18 清华大学 Extended double stateless IPv4(Internet Protocol) -IPv6 translation method based on prefix distribution

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002073933A1 (en) * 2001-03-08 2002-09-19 British Telecommunications Public Limited Company Address translator
WO2003005656A1 (en) * 2001-06-05 2003-01-16 Kwang Woo Ahn System and method for using the address of internet protocol version 6

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002073933A1 (en) * 2001-03-08 2002-09-19 British Telecommunications Public Limited Company Address translator
WO2003005656A1 (en) * 2001-06-05 2003-01-16 Kwang Woo Ahn System and method for using the address of internet protocol version 6

Also Published As

Publication number Publication date
CN1476206A (en) 2004-02-18

Similar Documents

Publication Publication Date Title
JP5335886B2 (en) Method and apparatus for communicating data packets between local networks
EP1186146B1 (en) A method and arrangement for providing security through network address translations using tunneling and compensations
US7443880B2 (en) Arrangement for reaching IPv4 public network nodes by a node in a IPv4 private network via an IPv6 access network
US8223780B2 (en) Method for forwarding data packet, system, and device
CN102347993B (en) Network communication method and equipment
US7912062B2 (en) Methods and apparatus for managing addresses related to virtual partitions of a session exchange device
CN100469038C (en) ISATAP router and method for tunneling packets
CN100484083C (en) Addressing converting method and mixed addressing converting router for realizing the same
CN102484656B (en) Method and apparatus for relaying packets
US20040148439A1 (en) Apparatus and method for peer to peer network connectivty
US20040044778A1 (en) Accessing an entity inside a private network
CN101515882B (en) Method, device and system for communication between local area network and public network
CN101800781B (en) Tunnel transition method and system for passing through NAT
US7450585B2 (en) Method and system in an IP network for using a network address translation (NAT) with any type of application
CN102148773A (en) Method and system for converting IPv6 (Internet Protocol Version 6) protocol and IPv4 (Internet Protocol Version 4) protocol
CN101030935B (en) A method for IPSec to traverse NAT-PT
CN101325580A (en) Method for implementing FTP application-layer gateway based on NAT-PT
CN100334858C (en) Method of breakthrough NAT using dual tunnel mechanism
US20070198735A1 (en) Method and system for supporting RSVP in IPv4/IPv6 hybrid network
KR100433621B1 (en) Multi layer internet protocol(MLIP) for peer to peer service of private internet and method for transmitting/receiving the MLIP packet
CN116488958A (en) Gateway processing method, virtual access gateway, virtual service gateway and related equipment
KR101124635B1 (en) Connecting gateway with ipv4/ipv6
CN1529480B (en) A method of IP network protocol conversion
CN100550826C (en) A method for establishing a virtual tunnel through IPv6 network address translation
CN100505754C (en) Method of establishing dynamic 4-in-6 tunnels

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Beijing Zhongke Jingshang Technology Co., Ltd.

Assignor: Institute of Computing Technology, Chinese Academy of Sciences

Contract record no.: 2011110000143

Denomination of invention: Method of breakthrough NAT using dual tunnel mechanism

Granted publication date: 20070829

License type: Exclusive License

Open date: 20040218

Record date: 20110823

EC01 Cancellation of recordation of patent licensing contract

Assignee: Institute of Computing Technology, Chinese Academy of Sciences

Assignor: Beijing Zhongke Jingshang Technology Co., Ltd.

Contract record no.: 2011110000143

Date of cancellation: 20120711

ASS Succession or assignment of patent right

Owner name: SHANGHAI YINGLIAN TIGAN INTELLIGENT TECHNOLOGY CO.

Free format text: FORMER OWNER: INSTITUTE OF COMPUTING TECHNOLOGY, CHINESE ACADEMY OF SCIENCES

Effective date: 20130108

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100080 HAIDIAN, BEIJING TO: 200072 ZHABEI, SHANGHAI

TR01 Transfer of patent right

Effective date of registration: 20130108

Address after: 200072 Shanghai Road, Luochuan, No. 840, room 3, building 104

Patentee after: SHANGHAI YINGLIAN SOMATOSENSORY INTELLIGENT TECHNOLOGY CO., LTD.

Address before: 100080 No. 6 South Road, Zhongguancun Academy of Sciences, Beijing

Patentee before: Institute of Computing Technology, Chinese Academy of Sciences

CP01 Change in the name or title of a patent holder

Address after: 200072 Shanghai Road, Luochuan, No. 840, room 3, building 104

Patentee after: Shanghai united information Polytron Technologies Inc

Address before: 200072 Shanghai Road, Luochuan, No. 840, room 3, building 104

Patentee before: SHANGHAI YINGLIAN SOMATOSENSORY INTELLIGENT TECHNOLOGY CO., LTD.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070829

Termination date: 20210714

CF01 Termination of patent right due to non-payment of annual fee