When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Traversal Using Relays around NAT - Wikipedia

    en.wikipedia.org/wiki/Traversal_Using_Relays...

    Traversal Using Relays around NAT (TURN) is a protocol that assists in traversal of network address translators (NAT) or firewalls for multimedia applications. It may be used with the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

  3. Port forwarding - Wikipedia

    en.wikipedia.org/wiki/Port_forwarding

    Port forwarding facilitates the connection by remote computers, for example, Internet hosts, to a specific computer or service within a local area network (LAN). [3]In a typical residential network, nodes obtain Internet access through a DSL or cable modem connected to a router or network address translator (NAT/NAPT).

  4. Port triggering - Wikipedia

    en.wikipedia.org/wiki/Port_triggering

    Port triggering is a configuration option on a NAT-enabled router that controls communication between internal and external host machines in an IP network. It is similar to port forwarding in that it enables incoming traffic to be forwarded to a specific internal host machine, although the forwarded port is not open permanently and the target internal host machine is chosen dynamically.

  5. NAT traversal - Wikipedia

    en.wikipedia.org/wiki/NAT_traversal

    Network address translation traversal is a computer networking technique of establishing and maintaining Internet Protocol connections across gateways that implement network address translation (NAT). NAT traversal techniques are required for many network applications, such as peer-to-peer file sharing and voice over IP. [1]

  6. NAT Port Mapping Protocol - Wikipedia

    en.wikipedia.org/wiki/NAT_Port_Mapping_Protocol

    NAT Port Mapping Protocol (NAT-PMP) is a network protocol for establishing network address translation (NAT) settings and port forwarding configurations automatically without user effort. [1] The protocol automatically determines the external IPv4 address of a NAT gateway, and provides means for an application to communicate the parameters for ...

  7. SonicWall - Wikipedia

    en.wikipedia.org/wiki/SonicWall

    SonicWall is an American cybersecurity company that sells a range of Internet appliances primarily directed at content control and network security. These include devices providing services for network firewalls , unified threat management (UTM), virtual private networks (VPNs), virtual firewalls , SD-WAN , cloud security and anti-spam for email.

  8. Reverse connection - Wikipedia

    en.wikipedia.org/wiki/Reverse_connection

    A reverse connection is usually used to bypass firewall restrictions on open ports. [1] A firewall usually blocks incoming connections on closed ports, but does not block outgoing traffic . In a normal forward connection, a client connects to a server through the server's open port , but in the case of a reverse connection, the client opens the ...

  9. Firewall pinhole - Wikipedia

    en.wikipedia.org/wiki/Firewall_pinhole

    In computer networking, a firewall pinhole is a port that is not protected by a firewall to allow a particular application to gain access to a service on a host in the network protected by the firewall. [1] [2] Leaving ports open in firewall configurations exposes the protected system to potentially malicious abuse.