CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - nat
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - nat - List
[
Firewall-Security
]
NATVOIP
DL : 0
VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
Date
: 2008-10-13
Size
: 2.28mb
User
:
肖荣
[
Firewall-Security
]
20041113(初建文档)
DL : 0
通信机制: 结构C-S-C Relay在中间,为console和agent提供双向服务,承担传递console命令和文件到agent, 返回agent命令执行结果与文件开始接收、接收完成信号的功能。此外relay也接受console的控制(与agent类似,通过DosPipe实现).这样的设计是为解决穿透防火墙或路由器(NAT)障碍――由agent发起连接,即从里到外建立一个通道,然后通过relay达到控制目的。通过一个可预设的relay地址序列文件,由agent轮循查找relay;连接建立后,可通过文件传输功能更新该地址序列。 -communication mechanism : C-S-C Relay in the middle, and the agent for the console to provide a two-way service, commitment console commands and transmit documents to the agent, the agent ordered to return to the implementation of the outcome document and the beginning of the reception, the receiving signals function. In addition relay accept the control console (with similar agent, DosPipe achieved). Such a design is to solve penetrate the firewall or router (NAT) obstacles -- initiated by linking agent, from inside out a route, then relay to control purposes. Through a predetermined sequence of relay document addresses from the search agent Round Robin relay; Connections, through file transfer functions to update the address sequence.
Date
: 2008-10-13
Size
: 290.09kb
User
:
黄双龙
[
Firewall-Security
]
stun_server
DL : 0
STUN演示程序,可以穿过绝大多数防火墙NAT等.演示实际应用中的VOIP上UDP通信体系-STUN demo program, across the vast majority of other NAT firewall. demonstrated practical application of VoIP on UDP communications system
Date
: 2008-10-13
Size
: 8.6kb
User
:
weng
[
Firewall-Security
]
stun_vovida-v1.0
DL : 0
stun client的完整实现,用于对称式NAT的网络穿越。供大家参考!-stun client to achieve the integrity, symmetric NAT for the network through. For your reference!
Date
: 2008-10-13
Size
: 53.49kb
User
:
吴运明
[
Firewall-Security
]
stun_client_win32_linux
DL : 0
一个轻量级的nat穿越服务器端,源码质量很高,很适合学习编程,特别是编写网络程序的人学习。-a lightweight nat through the server, the source of high quality, very suitable for learning programming, Special procedures for the preparation of network learning from the people.
Date
: 2008-10-13
Size
: 123.17kb
User
:
yii
[
Firewall-Security
]
P2PUDPNANjiaqian
DL : 0
论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。-regular forum for the discussion of P2P principle, but the discussion under discussion, Few things have real (source code). Oh, and here I will use one of their own to achieve the source code to illustrate the UDP Through NAT principle.
Date
: 2008-10-13
Size
: 39.57kb
User
:
li_guotao
[
Firewall-Security
]
NAT_firewall
DL : 0
C++编写的用于WINDOWS的基于IMD的NAT型防火墙.
Date
: 2008-10-13
Size
: 3.17mb
User
:
xy
[
Firewall-Security
]
2007101717408670
DL : 0
Windows下基于IMD的NAT型防火墙. 在防火墙技术中,单独使用一种技术总会出现性能瓶颈或安全隐患的问题,综合利用多种技术制作的防火墙能够满足需要高标准网络安全的环境.通过模块化的设计方法,在Windows网络体系结构的IMD层下把NAT技术、过滤技术、状态检测技术,以及不同的认证方法结合起来实现防火墙,以达到高效抵御各种网络攻击
Date
: 2008-10-13
Size
: 528.07kb
User
:
wangshan
[
Firewall-Security
]
nat
DL : 2
NAT实现源码,linux NAT裁减而来,可以在windows下调试。
Date
: 2008-10-13
Size
: 32kb
User
:
guo
[
Firewall-Security
]
firewall
DL : 0
防火墙提供了内核模式的防火墙和 NAT 机制,这些机制可以通过用户模式运行的接口程序进行监视和控制。 防火墙规则可以使用 ipf(8) 工具来动态地设置和删除。 NAT 规则可以通过 ipnat(1) 工具来维护。 ipfstat(8) 工具则可以用来显示 IPFILTER 内核部分的统计数据。 最后, 使用 ipmon(8) 程序可以把 IPFILTER 的动作记录到系统日志文件中。
Date
: 2008-10-13
Size
: 4.48kb
User
:
sun
[
Firewall-Security
]
firewall-0.9.tar
DL : 0
一个通用的防火墙,管理包括,Filter管理,NAT管理和mangle管理
Date
: 2008-10-13
Size
: 18.53kb
User
:
tengulre
[
Firewall-Security
]
NATVOIP
DL : 0
VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
Date
: 2025-12-16
Size
: 2.28mb
User
:
肖荣
[
Firewall-Security
]
20041113(初建文档)
DL : 0
通信机制: 结构C-S-C Relay在中间,为console和agent提供双向服务,承担传递console命令和文件到agent, 返回agent命令执行结果与文件开始接收、接收完成信号的功能。此外relay也接受console的控制(与agent类似,通过DosPipe实现).这样的设计是为解决穿透防火墙或路由器(NAT)障碍――由agent发起连接,即从里到外建立一个通道,然后通过relay达到控制目的。通过一个可预设的relay地址序列文件,由agent轮循查找relay;连接建立后,可通过文件传输功能更新该地址序列。 -communication mechanism : C-S-C Relay in the middle, and the agent for the console to provide a two-way service, commitment console commands and transmit documents to the agent, the agent ordered to return to the implementation of the outcome document and the beginning of the reception, the receiving signals function. In addition relay accept the control console (with similar agent, DosPipe achieved). Such a design is to solve penetrate the firewall or router (NAT) obstacles-- initiated by linking agent, from inside out a route, then relay to control purposes. Through a predetermined sequence of relay document addresses from the search agent Round Robin relay; Connections, through file transfer functions to update the address sequence.
Date
: 2025-12-16
Size
: 290kb
User
:
黄双龙
[
Firewall-Security
]
stun_vovida-v1.0
DL : 0
stun client的完整实现,用于对称式NAT的网络穿越。供大家参考!-stun client to achieve the integrity, symmetric NAT for the network through. For your reference!
Date
: 2025-12-16
Size
: 53kb
User
:
吴运明
[
Firewall-Security
]
stun_client_win32_linux
DL : 0
一个轻量级的nat穿越服务器端,源码质量很高,很适合学习编程,特别是编写网络程序的人学习。-a lightweight nat through the server, the source of high quality, very suitable for learning programming, Special procedures for the preparation of network learning from the people.
Date
: 2025-12-16
Size
: 123kb
User
:
yii
[
Firewall-Security
]
P2PUDPNANjiaqian
DL : 0
论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。-regular forum for the discussion of P2P principle, but the discussion under discussion, Few things have real (source code). Oh, and here I will use one of their own to achieve the source code to illustrate the UDP Through NAT principle.
Date
: 2025-12-16
Size
: 39kb
User
:
li_guotao
[
Firewall-Security
]
NAT_firewall
DL : 0
C++编写的用于WINDOWS的基于IMD的NAT型防火墙.-C++ Prepared for WINDOWS-based IMD
Date
: 2025-12-16
Size
: 3.17mb
User
:
xy
[
Firewall-Security
]
TCPhole
DL : 0
Date
: 2025-12-16
Size
: 95kb
User
:
寒心
[
Firewall-Security
]
nat
DL : 0
NAT实现源码,linux NAT裁减而来,可以在windows下调试。-NAT realize source, linux NAT reductions come in the windows under the debugger.
Date
: 2025-12-16
Size
: 32kb
User
:
guo
[
Firewall-Security
]
firewall
DL : 0
防火墙提供了内核模式的防火墙和 NAT 机制,这些机制可以通过用户模式运行的接口程序进行监视和控制。 防火墙规则可以使用 ipf(8) 工具来动态地设置和删除。 NAT 规则可以通过 ipnat(1) 工具来维护。 ipfstat(8) 工具则可以用来显示 IPFILTER 内核部分的统计数据。 最后, 使用 ipmon(8) 程序可以把 IPFILTER 的动作记录到系统日志文件中。 -Firewall provides a kernel-mode firewall and NAT mechanisms, these mechanisms can be run through the user-mode interface program to conduct surveillance and control. Firewall rules can use the ipf (8) tools to dynamically set up and delete. NAT rules can be adopted ipnat (1) tools to maintain. ipfstat (8) tools can be used to show the core part of IPFILTER statistics. Finally, the use of ipmon (8) program can record the movements IPFILTER to the system log file.
Date
: 2025-12-16
Size
: 4kb
User
:
sun
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.