Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

When debugging it is often nice to be able to gather information about NAT type and behavior. ZeroTier does not use STUN (for various reasons), but many STUN implementations contain some helpful code for doing this. It's helpful to use an external utility since it's "out of band" and therefore independent of ZeroTier.

Code Block
sudo apt-get install stun
sudo stun stun.callwithus.com 0

This will perform the basic NAT characterization test from the STUN RFC. The STUN server can be any public STUN server.

It will generate output like:

Code Block
STUN client version 0.96
running test number 0
Primary: Indepndent Mapping, Port Dependent Filter, preserves ports, no hairpin
Return value is 0x000017
According to this good STUN/NAT resource page this indicates a port-restricted cone NAT.

Filter by label (Content by label)
showLabelsfalse
max5
spacescom.atlassian.confluence.content.render.xhtml.model.resource.identifiers.SpaceResourceIdentifier@a51
showSpacefalse
sortmodified
reversetrue
typepage
cqllabel in ("stun","nat","linux") and type = "page" and space = "SD"
labelsnat linux stun

...

Page Properties
hiddentrue


Related issues