A MAC-address relaying NAT router for PC identification from outside of a LAN

Ryo Murakami, Nariyoshi Yamai, Kiyohiko Okayama

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

NAT (Network Address Translation) is well-known as one of the short-term solutions of IPv4 address exhaustion. NAT is a technique that shares a single IP address in several PCs, and is widely used for alleviating the IPv4 address exhaustion and as a security solution. However, when a backbone network has access control function for PCs based on their IP addresses, it cannot identify the PCs under a NAT router since their original IP addresses are hidden by the NAT router. In this research, we focus on MAC address which identifies PC on datalink layer and propose a NAT router which relays the MAC addresses of PCs inside of a LAN to the outside. Since the source MAC addresses of packets sent from PCs are preserved even after being relayed by the NAT router, a LAN access control server outside of the NAT router can still identify these PCs based on their MAC addresses instead of their IP addresses.

Original languageEnglish
Title of host publicationProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
Pages237-240
Number of pages4
DOIs
Publication statusPublished - Nov 29 2010
Event2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 - Seoul, Korea, Republic of
Duration: Jul 19 2010Jul 23 2010

Publication series

NameProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010

Other

Other2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
CountryKorea, Republic of
CitySeoul
Period7/19/107/23/10

Keywords

  • Access control
  • MAC address
  • NAT

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'A MAC-address relaying NAT router for PC identification from outside of a LAN'. Together they form a unique fingerprint.

Cite this