Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - nat
Search - nat - List
VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
Date : 2008-10-13 Size : 2.28mb User : 肖荣

通信机制: 结构C-S-C Relay在中间,为console和agent提供双向服务,承担传递console命令和文件到agent, 返回agent命令执行结果与文件开始接收、接收完成信号的功能。此外relay也接受console的控制(与agent类似,通过DosPipe实现).这样的设计是为解决穿透防火墙或路由器(NAT)障碍――由agent发起连接,即从里到外建立一个通道,然后通过relay达到控制目的。通过一个可预设的relay地址序列文件,由agent轮循查找relay;连接建立后,可通过文件传输功能更新该地址序列。 -communication mechanism : C-S-C Relay in the middle, and the agent for the console to provide a two-way service, commitment console commands and transmit documents to the agent, the agent ordered to return to the implementation of the outcome document and the beginning of the reception, the receiving signals function. In addition relay accept the control console (with similar agent, DosPipe achieved). Such a design is to solve penetrate the firewall or router (NAT) obstacles -- initiated by linking agent, from inside out a route, then relay to control purposes. Through a predetermined sequence of relay document addresses from the search agent Round Robin relay; Connections, through file transfer functions to update the address sequence.
Date : 2008-10-13 Size : 290.09kb User : 黄双龙

STUN演示程序,可以穿过绝大多数防火墙NAT等.演示实际应用中的VOIP上UDP通信体系-STUN demo program, across the vast majority of other NAT firewall. demonstrated practical application of VoIP on UDP communications system
Date : 2008-10-13 Size : 8.6kb User : weng

stun client的完整实现,用于对称式NAT的网络穿越。供大家参考!-stun client to achieve the integrity, symmetric NAT for the network through. For your reference!
Date : 2008-10-13 Size : 53.49kb User : 吴运明

一个轻量级的nat穿越服务器端,源码质量很高,很适合学习编程,特别是编写网络程序的人学习。-a lightweight nat through the server, the source of high quality, very suitable for learning programming, Special procedures for the preparation of network learning from the people.
Date : 2008-10-13 Size : 123.17kb User : yii

论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。-regular forum for the discussion of P2P principle, but the discussion under discussion, Few things have real (source code). Oh, and here I will use one of their own to achieve the source code to illustrate the UDP Through NAT principle.
Date : 2008-10-13 Size : 39.57kb User : li_guotao

C++编写的用于WINDOWS的基于IMD的NAT型防火墙.
Date : 2008-10-13 Size : 3.17mb User : xy

Windows下基于IMD的NAT型防火墙. 在防火墙技术中,单独使用一种技术总会出现性能瓶颈或安全隐患的问题,综合利用多种技术制作的防火墙能够满足需要高标准网络安全的环境.通过模块化的设计方法,在Windows网络体系结构的IMD层下把NAT技术、过滤技术、状态检测技术,以及不同的认证方法结合起来实现防火墙,以达到高效抵御各种网络攻击
Date : 2008-10-13 Size : 528.07kb User : wangshan

NAT实现源码,linux NAT裁减而来,可以在windows下调试。
Date : 2008-10-13 Size : 32kb User : guo

防火墙提供了内核模式的防火墙和 NAT 机制,这些机制可以通过用户模式运行的接口程序进行监视和控制。 防火墙规则可以使用 ipf(8) 工具来动态地设置和删除。 NAT 规则可以通过 ipnat(1) 工具来维护。 ipfstat(8) 工具则可以用来显示 IPFILTER 内核部分的统计数据。 最后, 使用 ipmon(8) 程序可以把 IPFILTER 的动作记录到系统日志文件中。
Date : 2008-10-13 Size : 4.48kb User : sun

一个通用的防火墙,管理包括,Filter管理,NAT管理和mangle管理
Date : 2008-10-13 Size : 18.53kb User : tengulre

VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
Date : 2025-12-16 Size : 2.28mb User : 肖荣

通信机制: 结构C-S-C Relay在中间,为console和agent提供双向服务,承担传递console命令和文件到agent, 返回agent命令执行结果与文件开始接收、接收完成信号的功能。此外relay也接受console的控制(与agent类似,通过DosPipe实现).这样的设计是为解决穿透防火墙或路由器(NAT)障碍――由agent发起连接,即从里到外建立一个通道,然后通过relay达到控制目的。通过一个可预设的relay地址序列文件,由agent轮循查找relay;连接建立后,可通过文件传输功能更新该地址序列。 -communication mechanism : C-S-C Relay in the middle, and the agent for the console to provide a two-way service, commitment console commands and transmit documents to the agent, the agent ordered to return to the implementation of the outcome document and the beginning of the reception, the receiving signals function. In addition relay accept the control console (with similar agent, DosPipe achieved). Such a design is to solve penetrate the firewall or router (NAT) obstacles-- initiated by linking agent, from inside out a route, then relay to control purposes. Through a predetermined sequence of relay document addresses from the search agent Round Robin relay; Connections, through file transfer functions to update the address sequence.
Date : 2025-12-16 Size : 290kb User : 黄双龙

stun client的完整实现,用于对称式NAT的网络穿越。供大家参考!-stun client to achieve the integrity, symmetric NAT for the network through. For your reference!
Date : 2025-12-16 Size : 53kb User : 吴运明

一个轻量级的nat穿越服务器端,源码质量很高,很适合学习编程,特别是编写网络程序的人学习。-a lightweight nat through the server, the source of high quality, very suitable for learning programming, Special procedures for the preparation of network learning from the people.
Date : 2025-12-16 Size : 123kb User : yii

论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。-regular forum for the discussion of P2P principle, but the discussion under discussion, Few things have real (source code). Oh, and here I will use one of their own to achieve the source code to illustrate the UDP Through NAT principle.
Date : 2025-12-16 Size : 39kb User : li_guotao

C++编写的用于WINDOWS的基于IMD的NAT型防火墙.-C++ Prepared for WINDOWS-based IMD
Date : 2025-12-16 Size : 3.17mb User : xy


Date : 2025-12-16 Size : 95kb User : 寒心

NAT实现源码,linux NAT裁减而来,可以在windows下调试。-NAT realize source, linux NAT reductions come in the windows under the debugger.
Date : 2025-12-16 Size : 32kb User : guo

防火墙提供了内核模式的防火墙和 NAT 机制,这些机制可以通过用户模式运行的接口程序进行监视和控制。 防火墙规则可以使用 ipf(8) 工具来动态地设置和删除。 NAT 规则可以通过 ipnat(1) 工具来维护。 ipfstat(8) 工具则可以用来显示 IPFILTER 内核部分的统计数据。 最后, 使用 ipmon(8) 程序可以把 IPFILTER 的动作记录到系统日志文件中。 -Firewall provides a kernel-mode firewall and NAT mechanisms, these mechanisms can be run through the user-mode interface program to conduct surveillance and control. Firewall rules can use the ipf (8) tools to dynamically set up and delete. NAT rules can be adopted ipnat (1) tools to maintain. ipfstat (8) tools can be used to show the core part of IPFILTER statistics. Finally, the use of ipmon (8) program can record the movements IPFILTER to the system log file.
Date : 2025-12-16 Size : 4kb User : sun
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.