Talk:Interactive Connectivity Establishment

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
WikiProject Computing / Networking (Rated Start-class)
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (marked as Mid-importance).
 

Unnamed section[edit]

The terms NAT and Firewall should be carefully considered and contrasted in this topic. While both functions are sometimes combined in a signgle device, ICE's procedures are designed to optimize the NAT Traversal technique chosen, not to traverse firewalls. ICEs techniques (STUN, TURN, etc.) will typically succeed in crossing a router/nat/firewall device designed for minimal administrative managment (i.e. home/small business devices like those marketed under brands like D-Link and Linksys), but will frequently not cross a corporate firewall. This is because the corporate firewall devices are often configured so that UDP traffic is blocked.

24.19.31.45 (talk) 16:51, 3 May 2008 (UTC)

To my understanding ICE helps in both. STUN is used for the client to gain knowledge of its NAT if there is one and TURN to relay messages through a third party where Firewalls would block peer to peer traffic Mmick66 (talk) 08:21, 3 May 2011 (UTC)

How does ICE work?[edit]

This page does not at all explain how ICE works. Can someone add some information on the principles and limitations of this?

THANKS -- Michael Janich (talk) 03:43, 5 February 2014 (UTC)