1. Internet Engineering Task Force (IETF) RFC 3022: In "Traditional IP Network Address Translator (Traditional NAT)
" Section 4.2
"Security Considerations
" it is stated: "NAT offers a side benefit of security in that it hides the real addresses of hosts in a private network. Unless a NAT is specifically configured to pass-through traffic for a specific application
it will block all incoming connections."
2. Kurose
J. F.
& Ross
K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 4
Section 4.4.2
the text explains that devices behind a NAT router are not directly addressable or visible to the outside world. It notes
"Thus
a NAT-enabled router provides a line of defense against hosts in the outside world that might want to enter your home network and probe your computers for open ports..."
3. Stallings
W. (2017). Data and Computer Communications (10th ed.). Pearson. Chapter 19
"Internetwork Protocols
" discusses NAT and its security implications
describing how it can prevent network scanning and direct attacks from the internet by obscuring the internal network topology.