Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Middleboxes: Taxonomy and Issues (RFC3234)

IP.com Disclosure Number: IPCOM000006979D
Original Publication Date: 2002-Feb-01
Included in the Prior Art Database: 2002-Feb-14
Document File: 28 page(s) / 62K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

B. Carpenter: AUTHOR [+2]

Abstract

This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions. It does not, however, claim to be definitive.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 5% of the total text.

Network Working Group                                       B. Carpenter

Request for Comments: 3234                IBM Zurich Research Laboratory

Category: Informational                                          S. Brim

                                                           February 2002

                    Middleboxes: Taxonomy and Issues

Status of this Memo

   This memo provides information for the Internet community.  It does

   not specify an Internet standard of any kind.  Distribution of this

   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   This document is intended as part of an IETF discussion about

   "middleboxes" - defined as any intermediary box performing functions

   apart from normal, standard functions of an IP router on the data

   path between a source host and destination host.  This document

   establishes a catalogue or taxonomy of middleboxes, cites previous

   and current IETF work concerning middleboxes, and attempts to

   identify some preliminary conclusions.  It does not, however, claim

   to be definitive.

Carpenter & Brim             Informational                      [Page 1]

RFC 3234            Middleboxes: Taxonomy and Issues       February 2002

Table of Contents

   1. Introduction and Goals.........................................  3

   1.1. Terminology..................................................  3

   1.2. The Hourglass Model, Past and Future.........................  3

   1.4. Goals of this Document.......................................  4

   2. A catalogue of middleboxes.....................................  5

   2.1 NAT...........................................................  6

   2.2 NAT-PT........................................................  7

   2.3 SOCKS gateway.................................................  7

   2.4 IP Tunnel Endpoints...........................................  8

   2.5. Packet classifiers, markers and schedulers...................  8

   2.6 Transport relay...............................................  9

   2.7. TCP performance enhancing proxies............................ 10

   2.8. Load balancers that divert/munge packets..................... 10

   2.9. IP Firewalls................................................. 11

   2.10. Application Firewalls....................................... 11

   2.11. Application-level gateways.................................. 12

   2.12. Gatekeepers/ session control boxes.......................... 12

   2.13. Transcoders................................................. 12

   2.14. Proxies..................................................... 13

   2.15. Caches...................................................... 14

   2.16. Modified DNS servers........................................ 14

   2.17. Content and applications distribution boxes................. 15

   2.18. Load balancers that divert/munge URLs....................... 16

   2.19. Application-level interceptors.............................. 16

   2.20. Application-level multicast................................. 16

   2.21. Involuntary packet redirection.............................. 16

   2.22. Anonymisers................................................. 17

   2.23. Not included................................................ 17

   2.24. Summary of facets....