aboutsummaryrefslogtreecommitdiff
path: root/doc/man/gnunet-nat.1
blob: a8a82883b7e417915594b3de43e55d1c4b2190ac (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
.TH GNUNET\-NAT 1 "27 Nov 2016" "GNUnet"

.SH NAME
gnunet\-nat \- interact with the NAT service

.SH SYNOPSIS
.B gnunet\-nat
.RI [ options ]
.br

.SH DESCRIPTION

This tool allows testing various NAT traversal functions, as well
as attempting auto\-configuration.

.SH OPTIONS

.B
.IP "\-b ADDRESS,  \-\-bind=ADDRESS"
Assume that the service is (locally) bound to ADDRESS.

.B
.IP "\-c FILENAME,  \-\-config=FILENAME"
Use the configuration file FILENAME.

.B
.IP "\-e ADDRESS,  \-\-external=ADDRESS"
Assume that ADDRESS is the globally visible address of the peer.

.B
.IP "\-i ADDRESS,  \-\-in=ADDRESS"
Assuming we are listening at ADDRESS for connection reversal requests.

.B
.IP "\-r ADDRESS,  \-\-remote=ADDRESS"
Ask the peer at ADDRESS for connection reversal, using the local address for the target address of the reversal.

.B
.IP "\-S NAME,  \-\-section=NAME"
Name of section in configuration file to use for additional options.

.B
.IP "\-s,  \-\-stun"
Enable processing of STUN requests.  Will try to read UDP packets from the bind address and handle the packets if they are STUN packets. Will only work with UDP.

.B
.IP "\-t,  \-\-tcp"
Use TCP.

.B
.IP "\-u,  \-\-udp"
Use UDP.

.B
.IP "\-W,  \-\-watch"
Watch for connection reversal requests.  

.SH EXAMPLES
.PP

\fBBasic examples\fR

We are bound to "0.0.0.0:8080" on UDP and want to obtain all applicable IP addresses:

  # gnunet-nat -i 0.0.0.0:8080 -u

We are bound to "::0" on port 8080 on TCP and want to obtain all applicable IP addresses:

  # gnunet-nat -i '[::0]':8080 -t

We are bound to "127.0.0.1:8080" on UDP and want to obtain all applicable IP addresses:

  # gnunet-nat -i 127.0.0.1:8080 -u

\fBICMP-based NAT traversal:\fR

Watch for connection reversal request (you must be bound to NAT range or to wildcard, 0.0.0.0), only works for IPv4:

  # gnunet-nat -Wt -i 192.168.178.12:8080

Initiate connection reversal request from peer at external IPv4 address 1.2.3.4 while we are running ourselves at 2.3.4.5:8080 (must use IPv4 addresses):

  # gnunet-nat -t -r 1.2.3.4:8080 -i 2.3.4.5:8080

  # gnunet-nat -t -r 1.2.3.4:8080 -i 0.0.0.0:8080 ### TEST THIS!

\fBManual hole punching:\fR

Assume manually punched NAT, but determine external IP automatically:

  # gnunet-nat -t -p AUTO:8080

\fBSTUN-based XXX:\fR

XXX:

  # gnunet-nat FIXME -s


.SH BUGS
Report bugs by using Mantis <https://gnunet.org/bugs/> or by sending electronic mail to <gnunet\-developers@gnu.org>

.SH SEE ALSO
gnunet\-transport(1)