Talk:Interactive Connectivity Establishment

From Wikipedia, the free encyclopedia

"Bus" network topology This article is part of WikiProject Computer networking, an attempt to build a comprehensive and detailed guide to Computer networking on Wikipedia. If you would like to participate, you can edit the article attached to this page, or visit the project page, where you can join the project and/or contribute to the discussion.
Stub This article has been rated as stub-Class on the assessment scale.
Mid This article is on a subject of mid priority within Computer networking for inclusion in Wikipedia 1.0.

The terms NAT and Firewall should be carefully considered and contrasted in this topic. While both functions are sometimes combined in a signgle device, ICE's procedures are designed to optimize the NAT Traversal technique chosen, not to traverse firewalls. ICEs techniques (STUN, TURN, etc.) will typically succeed in crossing a router/nat/firewall device designed for minimal administrative managment (i.e. home/small business devices like those marketed under brands like D-Link and Linksys), but will frequently not cross a corporate firewall. This is because the corporate firewall devices are often configured so that UDP traffic is blocked.

24.19.31.45 (talk) 16:51, 3 May 2008 (UTC)