SlideShare a Scribd company logo
   Port forwarding allows remote hosts from the Internet or outside network
    to connect to a server on the local network (inside network)
    ◦ The default firewall behaviour is to drop any connections starting from the
      outside
   Remote hosts typically use protocols such as http, https, ftp, ssh
   A remote host sends a request to the public global IP address of the inside
    server and the port number of the service required (usually the registered
    port no of the destination service e.g. port 80 for http)
    ◦ If the router is using PAT this is the outside interface address
       The wireless router uses PAT
    ◦ If the router is using static NAT this is mapped one-to-one address
   The request is routed to the outside interface of the router
   The router checks for a port forwarding rule that matches the protocol and
    the destination port of the request
    ◦ If a match to a rule exists the request is forwarded to the local IP address
      and the port number configured in the port forward rule
       Only one inside server can use the global IP/port number mapping
       E.g If there are 2 inside http servers one can use port 80 and one can use port 90
    ◦ If a match to a rule does not exist the request is dropped
   The remote host on the outside network must use the public
    global IP address to create the connection
   The port number used in the port forward rule is reserved for
    only 1 inside IP address
    ◦ A port number can’t be used to forward requests to a second server. To
      do this, select a different unused port no and create a second port
      forwarding rule
   Some applications; multimedia and torrents required several
    ports open for connections.
    ◦ Typically 1 or 2 ports are required for the control channels that setup
      and close the connection and monitor the connection.
    ◦ Extra ports may be required for the data stream, another for
      video, another for voice and another for chat
    ◦ Research the port nos required
    ◦ Use a port range in the forwarding rule
   A port trigger is used to open a port temporarily for a particular
    inside host only
    ◦ The port trigger allows new connections from the outside network to an
      inside host that initiated the data flow
    ◦ E.g. Port 25 is defined as a trigger and 113 as the port
    ◦ A local host checks mail and triggers port 25. The port trigger allows a
      back connection on port 113 (Identity information for mail) to the
      originating host
    ◦ The trigger times out and new connections to 113 are dropped
   The wireless router monitors outgoing traffic for the port numbers
    specified in the trigger
    ◦ When a match is made the IP address of the sending host (local address)
      is saved.
    ◦ When the return traffic arrives back at the router it is forwarded to the
      original sending host.
   Port triggers might be used in online gaming

More Related Content

What's hot

CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
Online
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
Netwax Lab
 
Networking & Socket Programming In Java
Networking & Socket Programming In JavaNetworking & Socket Programming In Java
Networking & Socket Programming In Java
Ankur Agrawal
 
Nat pat
Nat patNat pat
ASA Failover
ASA FailoverASA Failover
ASA Failover
NetProtocol Xpert
 
Router
RouterRouter
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Nat
NatNat
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
Bryley Systems Inc.
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
Anacrissa Soriano
 
Router and types
Router and types Router and types
Router and types
Qazafie Mehrzad
 
Http vs Https
Http vs HttpsHttp vs Https
Http vs Https
shikherwalia
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repotKunal Thakur
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
Rohit Singh
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 

What's hot (20)

CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
 
Networking & Socket Programming In Java
Networking & Socket Programming In JavaNetworking & Socket Programming In Java
Networking & Socket Programming In Java
 
Nat pat
Nat patNat pat
Nat pat
 
ASA Failover
ASA FailoverASA Failover
ASA Failover
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Router
RouterRouter
Router
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Nat
NatNat
Nat
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
 
Router and types
Router and types Router and types
Router and types
 
Http vs Https
Http vs HttpsHttp vs Https
Http vs Https
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 

Similar to Port forward

Network Programming Assignment Help
Network Programming Assignment HelpNetwork Programming Assignment Help
Network Programming Assignment Help
HelpWithAssignment.com
 
NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016
Netgate
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
Shashank Asthana
 
+ Network Programming.pdf
+ Network Programming.pdf+ Network Programming.pdf
+ Network Programming.pdf
OluwafolakeOjo
 
Address Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache PoisoningAddress Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache Poisoning
pifiye9333
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
myrajendra
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
Cassiano Campes
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
Jayaprasanna4
 
Firewall
FirewallFirewall
Firewalllyndyv
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
DhananjayKumbhar15
 
port forwarding.pptx
port forwarding.pptxport forwarding.pptx
port forwarding.pptx
Vignesh kumar
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
DarshaniKarunarathne
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
hamsa nandhini
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Shamsa al mazrooei
Shamsa al mazrooeiShamsa al mazrooei
Shamsa al mazrooei
shamsamaz
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 

Similar to Port forward (20)

Nat
NatNat
Nat
 
Network Programming Assignment Help
Network Programming Assignment HelpNetwork Programming Assignment Help
Network Programming Assignment Help
 
NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Unit05
Unit05Unit05
Unit05
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
+ Network Programming.pdf
+ Network Programming.pdf+ Network Programming.pdf
+ Network Programming.pdf
 
Address Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache PoisoningAddress Resolution Protocol Cache Poisoning
Address Resolution Protocol Cache Poisoning
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
Firewall
FirewallFirewall
Firewall
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
 
port forwarding.pptx
port forwarding.pptxport forwarding.pptx
port forwarding.pptx
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Shamsa al mazrooei
Shamsa al mazrooeiShamsa al mazrooei
Shamsa al mazrooei
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (15)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Security standard
Security standardSecurity standard
Security standard
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Port forward

  • 1. Port forwarding allows remote hosts from the Internet or outside network to connect to a server on the local network (inside network) ◦ The default firewall behaviour is to drop any connections starting from the outside  Remote hosts typically use protocols such as http, https, ftp, ssh
  • 2. A remote host sends a request to the public global IP address of the inside server and the port number of the service required (usually the registered port no of the destination service e.g. port 80 for http) ◦ If the router is using PAT this is the outside interface address  The wireless router uses PAT ◦ If the router is using static NAT this is mapped one-to-one address  The request is routed to the outside interface of the router  The router checks for a port forwarding rule that matches the protocol and the destination port of the request ◦ If a match to a rule exists the request is forwarded to the local IP address and the port number configured in the port forward rule  Only one inside server can use the global IP/port number mapping  E.g If there are 2 inside http servers one can use port 80 and one can use port 90 ◦ If a match to a rule does not exist the request is dropped
  • 3. The remote host on the outside network must use the public global IP address to create the connection  The port number used in the port forward rule is reserved for only 1 inside IP address ◦ A port number can’t be used to forward requests to a second server. To do this, select a different unused port no and create a second port forwarding rule  Some applications; multimedia and torrents required several ports open for connections. ◦ Typically 1 or 2 ports are required for the control channels that setup and close the connection and monitor the connection. ◦ Extra ports may be required for the data stream, another for video, another for voice and another for chat ◦ Research the port nos required ◦ Use a port range in the forwarding rule
  • 4. A port trigger is used to open a port temporarily for a particular inside host only ◦ The port trigger allows new connections from the outside network to an inside host that initiated the data flow ◦ E.g. Port 25 is defined as a trigger and 113 as the port ◦ A local host checks mail and triggers port 25. The port trigger allows a back connection on port 113 (Identity information for mail) to the originating host ◦ The trigger times out and new connections to 113 are dropped  The wireless router monitors outgoing traffic for the port numbers specified in the trigger ◦ When a match is made the IP address of the sending host (local address) is saved. ◦ When the return traffic arrives back at the router it is forwarded to the original sending host.  Port triggers might be used in online gaming