NAT Masquerade in one picture posted April 2014
I wanted a recall on how masquerade worked in NAT, and I wanted a fast recall.
What's better than a picture? Nothing of course :D
Hey! I'm David, cofounder of zkSecurity and the author of the Real-World Cryptography book. I was previously a crypto architect at O(1) Labs (working on the Mina cryptocurrency), before that I was the security lead for Diem (formerly Libra) at Novi (Facebook), and a security consultant for the Cryptography Services of NCC Group. This is my blog about cryptography and security and other related topics that I find interesting.
I wanted a recall on how masquerade worked in NAT, and I wanted a fast recall.
What's better than a picture? Nothing of course :D
Here are some random popular articles:
Here are some random recent articles:
My book Real-World Cryptography is finished and shipping! You can purchase it here.
If you don't know where to start, you might want to check these popular articles:
Here are the latest links posted:
You can also suggest a link.
Comments
Marcus
Thanks for this comprehensive single picture explanation, but I have a question: Why does the router change the packet's destination address? Why is the client's belief the destination to be 192.10.1.5 false? I don't see a reason for this to occur without any further information available.
leave a comment...