[171479] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: We hit half-million: The Cidr Report

daemon@ATHENA.MIT.EDU (Fred Baker (fred))
Thu May 1 19:57:16 2014

X-Original-To: nanog@nanog.org
From: "Fred Baker (fred)" <fred@cisco.com>
To: Jean-Francois Mezei <jfmezei_nanog@vaxination.ca>
Date: Thu, 1 May 2014 23:57:06 +0000
In-Reply-To: <5362D450.4050205@vaxination.ca>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

--Apple-Mail=_B2A12110-1937-44E7-B251-43065761A420
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


On May 1, 2014, at 4:10 PM, Jean-Francois Mezei =
<jfmezei_nanog@vaxination.ca> wrote:

> Pardon my ignorance here. But in a carrier-grade NAT implementation =
that
> serves say 5000 users, when happens when someone from the outside =
tries
> to connect to port 80 of the shared routable IP ?=20

More to the point, your trust boundary includes 5000 people. Do you know =
them all? Who maintains their systems and software? Do you trust them?

What happens if they approach you from behind the NAT?

--Apple-Mail=_B2A12110-1937-44E7-B251-43065761A420
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iD8DBQFTYt65bjEdbHIsm0MRAnwoAKCTEMI1X1XxFZnC0+dNsrlJICMQJwCg+GIg
pjXDH33fMMmMSexGR7kxSr0=
=uW5k
-----END PGP SIGNATURE-----

--Apple-Mail=_B2A12110-1937-44E7-B251-43065761A420--

home help back first fref pref prev next nref lref last post