CN108183838B - Method and device for testing source NAT function - Google Patents

Method and device for testing source NAT function Download PDF

Info

Publication number
CN108183838B
CN108183838B CN201711424095.XA CN201711424095A CN108183838B CN 108183838 B CN108183838 B CN 108183838B CN 201711424095 A CN201711424095 A CN 201711424095A CN 108183838 B CN108183838 B CN 108183838B
Authority
CN
China
Prior art keywords
source
nat
strategy
source nat
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711424095.XA
Other languages
Chinese (zh)
Other versions
CN108183838A (en
Inventor
张佰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201711424095.XA priority Critical patent/CN108183838B/en
Publication of CN108183838A publication Critical patent/CN108183838A/en
Application granted granted Critical
Publication of CN108183838B publication Critical patent/CN108183838B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2521Translation architectures other than single NAT servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2557Translation policies or rules

Abstract

The application provides a method for testing a source NAT function, which comprises the following steps: in the preparation stage: configuring available source NAT strategy parameters, and storing the configured available source NAT strategy parameters into a database; respectively obtaining source NAT strategy parameters from a database to form a source NAT strategy, writing the source NAT strategy into a source NAT strategy database, and issuing the source NAT strategy to NAT equipment; in the treatment stage: calling the test equipment to obtain a source NAT strategy from a source NAT strategy database, constructing a corresponding verification message, and sending the verification message to the NAT equipment; extracting a source IP from a conversion message sent by the NAT equipment and received by the testing equipment; and comparing the extracted source IP with the public network IP contained in the source NAT strategy.

Description

Method and device for testing source NAT function
Technical Field
The present application relates to the field of computer internet, and in particular, to a method and an apparatus for testing a source NAT function.
Background
NAT (Network Address Translation) is divided into NAT based on a source IP Address and NAT based on a destination IP Address, which are called source NAT and destination NAT for short. NAT based on a source IP address means that a source IP address in an IP packet header initiating a session connection is converted, and a user inside a network accesses a resource outside the network by converting a private network address inside the network into a public network address outside the network. NAT based on a destination IP address is to translate the destination IP address in the IP header of the originating session connection. The NAT based on the source IP address is used as a basic function frequently used by a user, the source NAT function needs to be tested, and whether the source NAT can be successfully converted or not is tested according to the source NAT strategy. However, because the source NAT policies composed of parameters such as source IP, destination IP, port, public network IP in the address pool, etc., have many combination forms, the source NAT policies used by different users are different. When a tester tests manually, a certain parameter combination is easy to miss, and the situation of a simulation user field can not be achieved.
Disclosure of Invention
In view of the above, the present application provides a method and an apparatus for testing a source NAT function.
Specifically, the method is realized through the following technical scheme:
a method of source NAT function testing, the method comprising:
in the preparation stage: configuring available source NAT strategy parameters, and storing the configured available source NAT strategy parameters into a database;
respectively obtaining source NAT strategy parameters from a database to form a source NAT strategy, writing the source NAT strategy into a source NAT strategy database, and issuing the source NAT strategy to NAT equipment;
in the treatment stage:
calling the test equipment to obtain a source NAT strategy from a source NAT strategy database, constructing a corresponding verification message, and sending the verification message to the NAT equipment;
extracting a source IP from a conversion message sent by the NAT equipment and received by the testing equipment;
and comparing the extracted source IP with the public network IP contained in the source NAT strategy.
An apparatus for source NAT function testing, the apparatus comprising:
the parameter configuration unit is used for configuring available source NAT strategy parameters in a preparation stage;
the parameter storage unit is used for storing the configured available source NAT strategy parameters into a database in a preparation stage;
the strategy storage unit is used for respectively acquiring source NAT strategy parameters from the database in the preparation stage to form a source NAT strategy and writing the source NAT strategy into the source NAT strategy database;
the strategy issuing unit is used for issuing the source NAT strategy to the NAT equipment in a preparation stage;
the testing device comprises a calling unit, a source NAT policy database and a verification unit, wherein the calling unit is used for calling the testing device in a processing stage so as to obtain a source NAT policy from the source NAT policy database, construct a corresponding verification message and send the verification message to the NAT device;
a source IP extraction unit, configured to extract a source IP from a translation packet sent by the NAT device and received by a testing device at a processing stage;
and the comparison unit is used for comparing the extracted source IP with the public network IP contained in the source NAT strategy in the processing stage.
By the technical scheme, comprehensive combined test can be performed on the source NAT parameters, and the corresponding source NAT strategy consisting of the source NAT strategy parameters can achieve full-specification test.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required in the description of the embodiments will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a schematic diagram of an application scenario illustrated in an exemplary embodiment of the present application;
FIG. 2 is a schematic diagram of a source IP database source IP shown in an exemplary embodiment of the present application;
fig. 3 is a flowchart illustrating an implementation of a method for testing a source NAT function according to an exemplary embodiment of the present application;
fig. 4 is a flow chart of a preferred implementation of a method for testing the functionality of a source NAT, according to an exemplary embodiment of the present application;
fig. 5 is a schematic structural diagram of an apparatus for source NAT function testing according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
First, a method for testing a source NAT function provided in an embodiment of the present application is described, where the method may include the following steps:
in the preparation stage: configuring available source NAT strategy parameters, and storing the configured available source NAT strategy parameters into a database;
respectively obtaining source NAT strategy parameters from a database to form a source NAT strategy, writing the source NAT strategy into a source NAT strategy database, and issuing the source NAT strategy to NAT equipment;
in the treatment stage:
calling the test equipment to obtain a source NAT strategy from a source NAT strategy database, constructing a corresponding verification message, and sending the verification message to the NAT equipment;
extracting a source IP from a conversion message sent by the NAT equipment and received by the testing equipment;
and comparing the extracted source IP with the public network IP contained in the source NAT strategy.
In the background art, the source NAT policy includes parameters such as a source IP, a destination IP, a port, and a public network IP in an address pool, and the combination forms of the source NAT policy are many, and the source NAT policies used by different users are different from each other, so that a certain parameter combination is easily omitted when a tester performs a test manually, and the situation of simulating a user site cannot be achieved. Based on the above problem, the present application provides a technical solution, as shown in fig. 1, which can automatically test the source NAT function. The method comprises the steps of obtaining parameters randomly in an appointed parameter range according to an appointed parameter range and an appointed source NAT strategy to form a source NAT strategy, calling test equipment to construct a response message according to the formed source NAT strategy, sending the response message to the NAT equipment in sequence, extracting a source IP from a conversion message sent by the NAT equipment and received by the test equipment, comparing the extracted source IP with a public network IP contained in the source NAT strategy, and outputting and displaying a source NAT result according to a comparison result of the extracted source IP and the public network IP contained in the source NAT strategy.
Specifically, in the process of testing the source NAT function, the method is divided into a preparation stage and a processing stage. In the preparation stage, configuring available source NAT strategy parameters, namely configuring available source IP, destination IP, ports and public network IP, wherein the public network IP is in an address pool, and storing the configured available source NAT strategy parameters into a database; respectively and randomly acquiring NAT strategy parameters from a database to form a source NAT strategy, writing the source NAT strategy into a source NAT strategy database, and issuing the source NAT strategy to NAT equipment so that the NAT equipment performs source IP network address translation on the message according to the source NAT strategy; in the processing stage, the testing equipment is called to obtain a source NAT strategy from a source NAT strategy database, a corresponding verification message is constructed according to the obtained source NAT strategy, and the verification message is sent to the NAT equipment; extracting a source IP from a conversion message sent by the NAT equipment and received by the testing equipment; and comparing the extracted source IP with the public network IP contained in the source NAT strategy, and outputting and displaying a source NAT result according to a comparison result of the comparison between the extracted source IP and the public network IP contained in the source NAT strategy. For further explanation of the present application, the following examples are provided to illustrate the present application:
the method for testing the source NAT function comprises a preparation stage and a processing stage, wherein the preparation stage and the processing stage are described below respectively, and the preparation stage specifically comprises the following steps:
in the preparation stage: configuring available source NAT strategy parameters, and storing the configured available source NAT strategy parameters into a database;
in an embodiment, available source NAT policy parameters are configured, that is, available source IP, destination IP, port and public network IP are configured, for example, 1000 source IP addresses, 10 destination IP addresses, 3 port and 5 public network IP addresses are configured, and a corresponding database is created for each source NAT policy parameter, for example, a source IP database, a destination IP database, a port database and a public network IP database, and the configured 1000 source IP addresses, 10 destination IP addresses, 3 port and 5 public network IP addresses are respectively stored in the corresponding databases.
Respectively obtaining source NAT strategy parameters from a database to form a source NAT strategy, writing the source NAT strategy into a source NAT strategy database, and issuing the source NAT strategy to NAT equipment;
in an embodiment, source NAT policy parameters are respectively randomly acquired from each database to form a source NAT policy, the source NAT policy is written into the source NAT policy database, and the source NAT policy is issued to the NAT device. For each database, such as the source IP database, the destination IP database, the port database, and the public IP database, each source NAT policy parameter is written into the corresponding database, and each source NAT policy parameter stored in the database is encoded and sorted in the database, for example, the source IP database is encoded and sorted in the source IP database when the 1000 source IPs are written into the source IP database, and for each source IP address, there is a corresponding index value, as shown in fig. 2, an index value of a 1 st source IP address in the source IP database is 1, an index value of a 2 nd source IP address in the source IP database is 2, and so on, … …, an index value of a 1000 th source IP address in the source IP database is 1000. And randomly acquiring an index value from the 1000 index values, for example, acquiring the 2 nd index value, adding a source IP address corresponding to the index value 2 into the source NAT policy, wherein the destination IP database, the port database and the public network IP database are the same as the source IP in the manner of acquiring the destination IP, the port and the public network IP, and when the source IP, the destination IP, the port and the public network IP are acquired, the source NAT policy is written into the source NAT policy database. For example, the number of the source NAT policies can be freely set, such as the above 1000 source IP addresses, 10 destination IP addresses, 3 ports, and 5 public network IP addresses, and according to these source NAT policy parameters, the source NAT policy parameters can be freely combined, and the number of the finally combined source NAT policies can be set to 1000, or can be set by default without being set, and under the default condition, the above possible source NAT policies will be exhausted. And after the source NAT strategy is formed by the source NAT strategy parameters, the formed source NAT strategy is issued to the NAT equipment.
In addition, for the established databases, such as a source IP database, a destination IP database, a port database, and a public network IP database, the attribute default of the database is an Any value, and Any one of the source NAT policy parameters can be acquired at will, without limitation. And adding an outgoing interface address to the public network IP database by default, wherein the outgoing interface address is also the public network IP address. The outbound interface address typically refers to a public network IP address that is directly connected to the service operator. And setting a storage path for each source NAT parameter database and each source NAT strategy database, and correspondingly setting the storage path for the test report.
The serial port tool can be used for communicating with the testing equipment and the NAT equipment, before NAT function testing, the address information of the serial port tool and the address information of the testing equipment need to be determined, and intercommunication testing is correspondingly carried out on the serial port tool and the testing equipment.
As shown in fig. 3, an implementation flowchart of a processing stage of the method for testing the source NAT function of the present application specifically includes the following steps:
in the treatment stage:
s101, calling a test device to obtain a source NAT strategy from a source NAT strategy database, constructing a corresponding verification message, and sending the verification message to an NAT device;
in an embodiment, the testing device is called to obtain the source NAT policy from the source NAT policy database, the source NAT policy parameters included in the source NAT policy, such as the source IP, the destination IP, the port, and the public network IP, are extracted, a corresponding verification message is constructed according to the source NAT policy parameters, and the verification message is sent to the NAT device. For example, a testing device is called to obtain a source NAT policy, for a source NAT policy database, multiple source NAT policies are included, each source NAT policy is obtained, according to the source NAT policy parameters included in the policy database, for example, the source IP is 192.168.1.110, the destination IP is 192.165.1.110, the port is 80, and the public network IP is 192.165.1.10, a verification message is constructed according to the source NAT policy parameters, and the corresponding constructed verification message is recorded, where the form may be the source NAT policy parameter + verification message 1. If the source IP and the destination IP appearing in the source NAT policy database are within a certain range, or if the source IP and the destination IP are 1000 and 10 as described above, 10000 messages are correspondingly constructed, and the form of the messages is that the number of constructed messages is equal to the number of source IP and the number of constructed IP, and the purpose is to consider all combination conditions of parameters.
S102, extracting a source IP from a conversion message sent by the NAT equipment and received by a testing device;
in an embodiment, after sending the constructed verification message to the NAT device, the NAT device receives the verification message, and converts the source IP address in the verification message into the public network IP address according to a pre-sent source NAT policy, for example, as described above, the verification message is constructed according to the source NAT policy that the source IP address is 192.168.1.110, the destination IP is 192.165.1.110, the port is 80, and the public network IP is 192.165.1.10, and correspondingly, at the NAT device end, the source IP of the verification message is converted into the public network IP according to the source NAT policy, that is, the source IP192.168.1.110 is converted into the public network IP192.165.1.10, and the converted verification message is sent to the test device. After the testing equipment receives the converted verification message sent by the NAT equipment, the source IP is extracted from the converted verification message. I.e., the extraction public network IP192.165.1.10.
S103, comparing the extracted source IP with the public network IP contained in the source NAT strategy.
In an embodiment, after the source IP, i.e., the public network IP, in the converted verification message is extracted, the extracted source IP is compared with the public network IP included in the source NAT policy, and whether the extracted source IP is the same as the public network IP included in the source NAT policy is compared. For example, the extracted source IP, i.e., the public network IP192.165.1.10, is the same as the public network IP192.165.1.10 in the source NAT policy in which the authentication message was originally constructed.
As shown in fig. 4, another implementation flowchart of the present application may specifically include the following steps:
s104, when the extracted source IP is the same as the public network IP contained in the source NAT strategy, determining that the source NAT is successful;
in one embodiment, when the extracted source IP is the same as the public network IP included in the source NAT policy, it is determined that the source IP network address translation is successful this time. For example, if the extracted source IP is 192.165.1.10 and the public network IP included in the source NAT policy is 192.165.1.10, the two are the same, which indicates that the source NAT is successful.
And S105, when the extracted source IP is different from the public network IP contained in the source NAT strategy, determining that the source NAT fails.
In an embodiment, when the extracted source IP is different from the public network IP included in the source NAT policy, it is determined that the source NAT fails, and at the NAT device, because some reasons cause the source NAT policy to fail, when the source IP is translated, translation fails, and accordingly, when the source IP is extracted, the source IP is also different from the public network IP included in the source NAT policy, and the source NAT naturally fails.
And S106, outputting and displaying the source NAT result according to the comparison result of the extracted source IP and the public network IP contained in the source NAT strategy.
In an embodiment, the path is saved according to a preset test report, and after the extracted source IP is compared with the public network IP included in the source NAT policy, the source NAT result is output and displayed according to the comparison result. For example, as described above, if the extracted source IP is the same as the public network IP included in the source NAT policy, the output source NAT is successful, and otherwise, the output source NAT fails.
Correspondingly, in the process of testing the source NAT function, if a certain link has an error, an alarm prompt is correspondingly given, and the operation steps performed by the certain link with the error are recorded.
Through the steps, comprehensive combined test can be carried out on the source NAT parameters, and the corresponding source NAT strategy consisting of the source NAT strategy parameters can achieve the test of full specification.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Corresponding to the foregoing embodiment of the method for testing a source NAT function, the present application also provides an embodiment of a device for testing a source NAT function, as shown in fig. 5, including a parameter configuration unit 200, a parameter storage unit 210, a policy storage unit 220, a policy issuing unit 230, a calling unit 240, a source IP extracting unit 250, and a comparing unit 260.
The parameter configuration unit 200 is configured to configure available source NAT policy parameters in a preparation phase;
the parameter storage unit 210 is configured to store the configured available source NAT policy parameters into a database in a preparation phase;
the policy storage unit 220 is configured to obtain source NAT policy parameters from the database in the preparation phase to form a source NAT policy, and write the source NAT policy into the source NAT policy database;
the policy issuing unit 230 is configured to issue the source NAT policy to the NAT device in a preparation phase;
the invoking unit 240 is configured to invoke the test device at a processing stage, so that the test device obtains the source NAT policy from the source NAT policy database, constructs a corresponding verification message, and issues the verification message to the NAT device;
the source IP extracting unit 250 is configured to extract a source IP from a translation packet sent by the NAT device and received by the testing device in a processing stage;
the comparing unit 260 is configured to compare, in the processing stage, the extracted source IP with the public network IP included in the source NAT policy.
In a specific embodiment of the present application, the policy holding unit 210 is specifically configured to:
configuring a unique index value for each configured source NAT strategy parameter in a database, randomly acquiring the index value from the index value, and forming a source NAT strategy parameter corresponding to the acquired index value into a source NAT strategy database.
In one embodiment of the present application, the apparatus further comprises: first determining unit 270, second determining unit 280, output unit 290
The first determining unit 270 is configured to determine that the source NAT succeeds, when the extracted source IP is the same as the public network IP included in the source NAT policy;
the second determining unit 280 is configured to determine that the source NAT fails when the extracted source IP is different from the public network IP included in the source NAT policy;
the output unit 280 is configured to output and display the source NAT result according to a comparison result obtained by comparing the extracted source IP with the public network IP included in the source NAT policy.
The implementation process of the functions of each unit in the system is specifically described in the implementation process of the corresponding step in the method, and is not described herein again.
For the system embodiment, since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment for relevant points. The above-described system embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The foregoing is directed to embodiments of the present invention, and it is understood that various modifications and improvements can be made by those skilled in the art without departing from the spirit of the invention.

Claims (6)

1. A method for source NAT function testing, the method comprising:
in the preparation stage: configuring available source NAT strategy parameters, and storing the configured available source NAT strategy parameters into a database;
configuring a unique index value for each configured source NAT strategy parameter in a database, randomly acquiring the index value from the index value, forming a source NAT strategy parameter corresponding to the acquired index value into a source NAT strategy database, and issuing the source NAT strategy to NAT equipment;
in the treatment stage:
calling the test equipment to obtain a source NAT strategy from a source NAT strategy database, extracting source NAT strategy parameters contained in the source NAT strategy, constructing a corresponding verification message according to the source NAT strategy parameters, and sending the verification message to the NAT equipment;
extracting a source IP from a conversion message sent by the NAT equipment and received by the testing equipment;
and comparing the extracted source IP with the public network IP contained in the source NAT strategy.
2. The method of claim 1, further comprising:
when the extracted source IP is the same as the public network IP contained in the source NAT strategy, determining that the source NAT is successful;
and when the extracted source IP is different from the public network IP contained in the source NAT strategy, determining that the source NAT fails.
3. The method of claim 1, further comprising:
and outputting and displaying the source NAT result according to the comparison result of the extracted source IP and the public network IP contained in the source NAT strategy.
4. An apparatus for source NAT function testing, the apparatus comprising:
the parameter configuration unit is used for configuring available source NAT strategy parameters in a preparation stage;
the parameter storage unit is used for storing the configured available source NAT strategy parameters into a database in a preparation stage;
the strategy storage unit is used for configuring a unique index value for each configured source NAT strategy parameter in the database, randomly acquiring the index value from the index value, and forming a source NAT strategy parameter corresponding to the acquired index value into a source NAT strategy database;
the strategy issuing unit is used for issuing the source NAT strategy to the NAT equipment in a preparation stage;
the testing device comprises a calling unit, a source NAT policy database and a verification unit, wherein the calling unit is used for calling the testing device in a processing stage so as to obtain a source NAT policy from the source NAT policy database, extracting source NAT policy parameters contained in the source NAT policy, constructing a corresponding verification message according to the source NAT policy parameters and sending the verification message to the NAT device;
a source IP extraction unit, configured to extract a source IP from a translation packet sent by the NAT device and received by a testing device at a processing stage;
and the comparison unit is used for comparing the extracted source IP with the public network IP contained in the source NAT strategy in the processing stage.
5. The apparatus of claim 4, further comprising: first determining unit and second determining unit
The first determining unit is configured to determine that the source NAT succeeds when the extracted source IP is the same as the public network IP included in the source NAT policy;
and the second determining unit is used for determining that the source NAT fails when the extracted source IP is different from the public network IP contained in the source NAT strategy.
6. The apparatus of claim 4, further comprising: output unit
And the output unit is used for outputting and displaying the source NAT result according to the comparison result of the extracted source IP and the public network IP contained in the source NAT strategy.
CN201711424095.XA 2017-12-25 2017-12-25 Method and device for testing source NAT function Active CN108183838B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711424095.XA CN108183838B (en) 2017-12-25 2017-12-25 Method and device for testing source NAT function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711424095.XA CN108183838B (en) 2017-12-25 2017-12-25 Method and device for testing source NAT function

Publications (2)

Publication Number Publication Date
CN108183838A CN108183838A (en) 2018-06-19
CN108183838B true CN108183838B (en) 2020-11-06

Family

ID=62547420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711424095.XA Active CN108183838B (en) 2017-12-25 2017-12-25 Method and device for testing source NAT function

Country Status (1)

Country Link
CN (1) CN108183838B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917611A (en) * 2020-08-20 2020-11-10 杭州迪普科技股份有限公司 Test method, device and system of semitransparent proxy server

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743231A (en) * 2019-02-22 2019-05-10 杭州迪普科技股份有限公司 A kind of acl feature test method and device
CN109756401B (en) * 2019-03-25 2020-11-27 新华三信息安全技术有限公司 Test method, test device, electronic equipment and storage medium
CN112565001A (en) * 2020-11-18 2021-03-26 浪潮思科网络科技有限公司 NAT equipment performance test system, method, equipment and medium
CN113098733B (en) * 2021-03-26 2022-04-19 杭州迪普科技股份有限公司 Network address translation equipment test system and method
CN113794608B (en) * 2021-10-19 2022-10-11 成都安恒信息技术有限公司 NAT tester and testing method for automatically testing forwarding of SCTP message by NAT equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159986A (en) * 2015-08-31 2015-12-16 浪潮(北京)电子信息产业有限公司 Optimal configuration method and system of ORACLE database

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159986A (en) * 2015-08-31 2015-12-16 浪潮(北京)电子信息产业有限公司 Optimal configuration method and system of ORACLE database

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
集成NAT功能的防火墙测试方法;魏蓉;《科技资讯》;20110313(第8期);第19页 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917611A (en) * 2020-08-20 2020-11-10 杭州迪普科技股份有限公司 Test method, device and system of semitransparent proxy server

Also Published As

Publication number Publication date
CN108183838A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
CN108183838B (en) Method and device for testing source NAT function
CN105391811B (en) domain name resolution method, access method of application server and terminal thereof
CN106354634A (en) Interface testing method and device
CN105787364B (en) Automatic testing method, device and system for tasks
CN104580451B (en) Realize the method and system and electronic equipment of multi-platform account synchronization
CN107436844B (en) Method and device for generating interface use case aggregate
CN107241315B (en) Access method and device of bank gateway interface and computer readable storage medium
CN103973741A (en) Method and device for performing remote debugging in cloud system
CN112988608B (en) Data testing method and device, computer equipment and storage medium
CN106209503B (en) RPC interface test method and system
CN104468655B (en) The method and system tested reverse proxy software
WO2019075994A1 (en) Method, device and system for mock data at ios end, and storage medium
CN109542780B (en) Test method, test device and storage medium for natural language processing application
CN112131126B (en) Switching method and device of test environment
CN106713242B (en) Data request processing method and processing device
CN107113199B (en) Analysis device for analyzing and processing communication sequences
CN104375935B (en) The test method and device of SQL injection attack
EP3651045A1 (en) Security diagnostic device and security diagnostic method
CN116056126A (en) Simulation test method, simulation test device, computer equipment and computer readable storage medium
CN104679648B (en) Across the automated testing method of application
US9329960B2 (en) Methods, systems, and computer readable media for utilizing abstracted user-defined data to conduct network protocol testing
CN108874675A (en) A kind of fuzzing method for generating test case based on field classification
JP2012084054A (en) Portable terminal and program
CN104536887B (en) communication data detection method and device
CN105446867B (en) A kind of generation method and device of test data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant