Tunnelling of Information
First Claim
1. A device comprising at least one processor, and at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processor, cause the device tocommunicate information in packets conforming a first protocol, andtunnel information to be communicated to another device to a second protocol in response to determining possibility of packets conforming the first protocol being incapable of traversing at least one node between the device and the other device.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
71 Citations
20 Claims
-
1. A device comprising at least one processor, and at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processor, cause the device to
communicate information in packets conforming a first protocol, and tunnel information to be communicated to another device to a second protocol in response to determining possibility of packets conforming the first protocol being incapable of traversing at least one node between the device and the other device.
- 8. A method for communication of packets from a device configured for communication of packets according to a first protocol, the method comprising tunneling information to be communicated from the device to another device to a second protocol in response to determining possibility of packets conforming the first protocol being incapable of traversing at least one node between the device and the other device.
-
14. A non-transitory computer readable media, comprising program code for causing a processor to perform instructions for
communicating, by a device, information in packets conforming a first protocol, and tunneling information to be communicated from the device to another device to a second protocol in response to determining possibility of packets conforming the first protocol being incapable of traversing at least one node between the device and the other device.
Specification