NAT Behavioral Requirements for ICMP
RFC 5508
Document | Type |
RFC - Best Current Practice
(April 2009; No errata)
Updated by RFC 7857
Also known as BCP 148
|
|
---|---|---|---|
Authors | Saikat Guha , Bryan Ford , Senthil Sivakumar , Pyda Srisuresh | ||
Last updated | 2015-10-14 | ||
Replaces | draft-srisuresh-behave-nat-icmp | ||
Stream | Internet Engineering Task Force (IETF) | ||
Formats | plain text html pdf htmlized (tools) htmlized bibtex | ||
Reviews | |||
Stream | WG state | WG Document | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | RFC 5508 (Best Current Practice) | |
Action Holders |
(None)
|
||
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | Magnus Westerlund | ||
Send notices to | suresh@kazeon.com |
Network Working Group P. Srisuresh Request for Comments: 5508 Kazeon Systems BCP: 148 B. Ford Category: Best Current Practice MPI-SWS S. Sivakumar Cisco Systems S. Guha Cornell U. April 2009 NAT Behavioral Requirements for ICMP Status of This Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English. Srisuresh, et al. Best Current Practice [Page 1] RFC 5508 NAT Behavioral Requirements for ICMP April 2009 Abstract This document specifies the behavioral properties required of the Network Address Translator (NAT) devices in conjunction with the Internet Control Message Protocol (ICMP). The objective of this memo is to make NAT devices more predictable and compatible with diverse application protocols that traverse the devices. Companion documents provide behavioral recommendations specific to TCP, UDP, and other protocols. Table of Contents 1. Introduction and Scope ..........................................3 2. Terminology .....................................................4 3. ICMP Query Handling .............................................6 3.1. ICMP Query Mapping .........................................6 3.2. ICMP Query Session Timeouts ................................7 4. ICMP Error Forwarding ...........................................8 4.1. ICMP Error Payload Validation ..............................8 4.2. ICMP Error Packet Translation .............................10 4.2.1. ICMP Error Packet Received from the External Realm .11 4.2.2. ICMP Error Packet Received from the Private Realm ..13 4.3. NAT Sessions Pertaining to ICMP Error Payload .............15 5. Hairpinning Support for ICMP Packets ...........................16 6. Rejection of Outbound Flows Disallowed by NAT ..................17 7. Conformance to RFC 1812 ........................................17 7.1. IP Packet Fragmentation ...................................19 7.1.1. Generating "Packet Too Big" ICMP Error Message ....19 7.1.2. Forwarding "Packet Too Big" ICMP Error Message ....20 7.2. Time Exceeded Message .....................................20 7.3. Source Route Options ......................................20 7.4. Address Mask Request/Reply Messages .......................20 7.5. Parameter Problem Message .................................21 7.6. Router Advertisement and Solicitations ....................21 7.7. DS Field Usage ............................................21 8. Non-QueryError ICMP Messages ...................................22 9. Summary of Requirements ........................................22 10. Security Considerations .......................................25 11. Acknowledgements ..............................................26 12. References ....................................................27 12.1. Normative References .....................................27 12.2. Informative References ...................................27 Srisuresh, et al. Best Current Practice [Page 2]Show full document text