STUN (redirect from Simple Traversal of UDP Through NATs)
STUN (Session Traversal Utilities for NAT; originally Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) is a standardized...
8 KB (1,059 words) - 16:34, 19 December 2023
PDF – contains a detailed explanation of the hole punching process STUNT – Simple Traversal of UDP Through NATs and TCP too Network Address Translation...
8 KB (1,012 words) - 02:56, 14 June 2025
Network address translation (redirect from Full cone NAT)
protocol Simple Traversal of UDP over NATs (STUN) in 2003. It classified NAT implementations as full-cone NAT, (address) restricted-cone NAT, port-restricted...
44 KB (5,558 words) - 16:03, 20 June 2025
This is a list of TCP and UDP port numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User...
320 KB (13,096 words) - 00:34, 25 June 2025
remote endpoint the IP:port of the other peer as seen by the network, or the external parts of both NATs. NAT traversal, through TCP hole punching, establishes...
9 KB (1,271 words) - 21:29, 28 December 2023
Universal Plug and Play (category Wikipedia articles in need of updating from August 2017)
by running HTTP on top of UDP (port 1900) using multicast (known as HTTPMU). Responses to search requests are also sent over UDP, but are instead sent...
39 KB (4,585 words) - 16:40, 24 June 2025
File Transfer Protocol (redirect from Simple File Transfer Protocol)
is problematic for both NATs and firewalls, which do not allow connections from the Internet towards internal hosts. For NATs, an additional complication...
34 KB (4,034 words) - 04:12, 4 June 2025
Internet protocol suite (redirect from Five-layer adaptation of the TCP/IP model)
Datagram Protocol (UDP), and the Internet Protocol (IP). Early versions of this networking model were known as the Department of Defense (DoD) model...
59 KB (6,843 words) - 08:18, 25 June 2025
ESP in User Datagram Protocol (UDP port 4500) enables these protocols to pass through a device or firewall performing NAT. Stream Control Transmission Protocol...
20 KB (2,352 words) - 16:38, 14 May 2025
default in most new hardware. "UDP NAT Traversal" is the proper working solution, supported by just a few. DHT permits use of trackerless torrents (with supporting...
67 KB (3,012 words) - 17:11, 21 April 2025
(PCP) NAT Port Mapping Protocol (NAT-PMP) Firewall pinhole NAT traversal Packet forwarding Port address translation (PAT) Port triggering UDP Helper...
14 KB (1,822 words) - 12:27, 20 March 2025
Micro Transport Protocol (redirect from UDP Torrent Protocol)
of the then-current Internet Draft. μTP also adds support for NAT traversal using UDP hole punching between two port-restricted peers where a third unrestricted...
9 KB (783 words) - 07:26, 25 June 2025
Session Initiation Protocol (redirect from List of SIP request methods)
designed to be independent of the underlying transport layer protocol and can be used with the User Datagram Protocol (UDP), the Transmission Control...
29 KB (3,366 words) - 10:53, 31 May 2025
sharing Additional plugins SIP according to RFC 3261 (UDP, TCP and TLS) SIP SIMPLE NAT traversal by TURN and ICE RTP/RTCP Media-security: SRTP and ZRTP...
10 KB (551 words) - 23:26, 8 November 2024
IPsec (section Modes of operation)
(ESP) RFC 3947: Negotiation of NAT-Traversal in the IKE RFC 3948: UDP Encapsulation of IPsec ESP Packets RFC 4106: The Use of Galois/Counter Mode (GCM)...
44 KB (5,337 words) - 03:03, 15 May 2025
TR-069 (section Connection request over NAT)
devices that are connected behind NAT (e.g. IP-Phones, Set-top boxes). This mechanism, based on STUN and UDP NAT traversal, is defined in document TR-069...
17 KB (1,982 words) - 21:06, 24 May 2025
Netfilter (section NAT helpers)
protocol; for TCP/UDP it is the port numbers, for tunnels it can be their tunnel ID, but otherwise is just zero, as if it were not part of the tuple. To be...
23 KB (2,724 words) - 09:12, 29 April 2025
Gnutella2 (redirect from Comparison of Gnutella2 software)
2007-11-07. "Simple Query Language and Metadata". Gnutella2 Wiki. Archived from the original on 2007-12-19. Retrieved 2007-11-07. "UDP Transceiver -...
20 KB (1,909 words) - 22:21, 24 January 2025
synthesis of several suggested versions, v6 Simple Internet Protocol, v7 TP/IX: The Next Internet, v8 PIP — The P Internet Protocol, and v9 TUBA — Tcp & Udp with...
32 KB (4,384 words) - 04:29, 26 May 2025
IPv6 (redirect from Simple Internet Protocol Plus)
IPv6 requires a checksum in UDP headers. IPv6 routers do not perform IP fragmentation. IPv6 hosts are required to do one of the following: perform Path...
60 KB (8,190 words) - 13:02, 10 June 2025
behind a NAT Router. As an alternative, one can tunnel VNC through SSH, avoiding the opening of additional ports and automatically traversing the NAT router...
8 KB (797 words) - 23:45, 11 September 2024
connected to identity Network Protocol Visibility - Including HTTP, gRPC, Kafka, UDP, and SCTP Metrics & Tracing Export - Sends data to Prometheus, OpenTelemetry...
39 KB (3,051 words) - 11:40, 13 June 2025
Voice over IP (category Wikipedia articles in need of updating from April 2022)
alleviate the congestion. But VoIP usually uses UDP not TCP because recovering from congestion through retransmission usually entails too much latency...
88 KB (10,327 words) - 18:49, 26 June 2025
Transport Layer Security (redirect from Security of Transport Layer Security)
VPN technologies, TLS has some inherent advantages in firewall and NAT traversal that make it easier to administer for large remote-access populations...
178 KB (17,519 words) - 23:52, 19 June 2025
destination TCP and UDP ports, all or multiple ports, specific types of interfaces, ICMP and ICMPv6 traffic by Type and Code, services, edge traversal, IPsec protection...
51 KB (6,809 words) - 05:21, 21 February 2025
Features new to Windows XP (redirect from List of features new to Windows XP)
address. Other types of tunnels can be set up include: 6over4, Teredo, ISATAP, PortProxy. Teredo also helps traverse cone and restricted NATs. Teredo host-specific...
180 KB (20,807 words) - 11:39, 20 June 2025
operate on proprietary protocols but can integrate with SIP-based systems through specialized business telephone system (PBX) software. The VoIP ecosystem...
51 KB (1,693 words) - 00:40, 20 June 2025