The Community for Technology Leaders
Green Image
<p>Some widely deployed protocols work transparently within NAT environments, but others fail completely or require special solutions to NAT-enable them. As NATs proliferate, it is important to recognize where they can be used without breaking the protocols used in the networks.</p>
Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo, "Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack", IEEE Internet Computing, vol. 4, no. , pp. 42-49, November/December 2000, doi:10.1109/4236.895015
93 ms
(Ver 3.3 (11022016))