NAT Support for Inspected Protocols

Some application layer protocols that open secondary connections, or that embedded IP addresses in packets, are inspected to provide the following services:

  • Pinhole creation—Some application protocols open secondary TCP or UDP connections either on standard or negotiated ports. Inspection opens pinholes for these secondary ports so that you do not need to create access control rules to allow them.

  • NAT rewrite— Protocols such as FTP embed IP addresses and ports for the secondary connections in packet data as part of the protocol. If there is NAT translation involved for either of the endpoints, the inspection engines rewrite the packet data to reflect the NAT translation of the embedded addresses and ports. The secondary connections would not work without NAT rewrite.

  • Protocol enforcement—Some inspections enforce some degree of conformance to the RFCs for the inspected protocol.

The following table lists the inspected protocols that apply NAT rewrite and their NAT limitations. Keep these limitations in mind when writing NAT rules that include these protocols. Inspected protocols not listed here do not apply NAT rewrite. These inspections include GTP, HTTP, IMAP, POP, SMTP, SSH, and SSL.

Note

NAT rewrite is supported on the listed ports only. For some of these protocols, you can extend inspection to other ports using Network Analysis Policies, but NAT rewrite is not extended to those ports. This includes DCERPC, DNS, FTP, and Sun RPC inspection. If you use these protocols on non-standard ports, do not use NAT on the connections.

NAT Supported Application Inspection

Application

Inspected Protocol, Port

NAT Limitations

Pinholes Created

DCERPC

TCP/135

No NAT64.

Yes

DNS over UDP

UDP/53

No NAT support is available for name resolution through WINS.

No

ESMTP

TCP/25

No NAT64.

No

FTP

TCP/21

(Clustering) No static PAT.

Yes

H.323 H.225 (Call signaling)

H.323 RAS

TCP/1720

UDP/1718

For RAS,
 UDP/1718-1719

(Clustering) No static PAT.

No extended PAT.

No NAT64.

Yes

ICMP

ICMP Error

ICMP

(ICMP traffic directed to a device interface is never inspected.)

No limitations.

No

IP Options

RSVP

No NAT64.

No

NetBIOS Name Server over IP

UDP/137, 138 (Source ports)

No extended PAT.

No NAT64.

No

RSH

TCP/514

No PAT.

No NAT64.

(Clustering) No static PAT.

Yes

RTSP

TCP/554

(No handling for HTTP cloaking.)

No extended PAT.

No NAT64.

(Clustering) No static PAT.

Yes

SIP

TCP/5060


UDP/5060

No extended PAT.

No NAT64 or NAT46.

(Clustering) No static PAT.

Yes

Skinny (SCCP)

TCP/2000

No extended PAT.

No NAT64, NAT46, or NAT66.

(Clustering) No static PAT.

Yes

SQL*Net

(versions 1, 2)

TCP/1521

No extended PAT.

No NAT64.

(Clustering) No static PAT.

Yes

Sun RPC

TCP/111

UDP/111

No extended PAT.

No NAT64.

Yes

TFTP

UDP/69

No NAT64.

(Clustering) No static PAT.

Payload IP addresses are not translated.

Yes

XDMCP

UDP/177

No extended PAT.

No NAT64.

(Clustering) No static PAT.

Yes