This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
I think this is a very poor and unclear description of NAT traversal. Usually Wikipedia is quite clear and concise regarding IT-related topics. Sometimes documentation is not written clearly because the author does not understand the topic well. Please give examples of NAT traversal configurations related to IPSEC earlier in the description.
Here is an example of a convoluted sentence at the beginning of this topic: "Intercepting and modifying traffic can only be performed transparently in the absence of secure encryption and authentication." How about NAT IP address and port translation can break host to host authentication protocols?
This needs reworking... — Preceding unsigned comment added by 198.200.194.137 (talk) 17:24, 12 June 2015 (UTC)
Internet Protocol doesn't have "ports"
editEncapsulating Security Payload (ESP) - Internet Protocol (IP) port 50 A "port" exists only at the TCP or UDP layer. 76.92.138.240 (talk) 00:52, 10 May 2009 (UTC)
Symmetric NAT Traversal with BitJet One SDK
editSorry, I deleted your edit again, for those reasons
- 1.No reliable sources.
- Your company page is no source, which establishes notability. You need some independent source (scientific proceeding, tec magazine, ...)
- Even your patent is no
- 2.Advertizing language, WP needs some technical information
- 3.Doubts: "so it is able to traverse any symmetric NAT device, even non-deterministic ones", your home page gives a somewhat more complete picture. Your invention and product may be great, but does it solve every symmetric NAT traversal problem in every situation?