https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219803

--- Comment #2 from Damjan Jovanovic <damjan....@gmail.com> ---
In its current state, the patch provides application with a NAT hole punching
capability. Unlike in a symmetric NAT, in any cone-type NAT, an internal UDP
application can negotiate to receive packets from a known peer, by using STUN
to create a external IP:port for its UDP socket and discover what they are,
communicating them to its peer and learning what external IP:port its peer is
using, and even if it's behind the most restrictive "ported-restricted cone"
NAT, it can just send 1 packet to its peer's IP:port to create a connection and
allow that peer to send packets back.

This works even if both peers are NATed, as long as at least 1 (the server) is
not a symmetric NAT.

-- 
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
freebsd-pf@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"

Reply via email to