NAT/FW NSLP State Machine
draft-werner-nsis-natfw-nslp-statemachine-06
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Constantin Werner , Niklas Steinleitner , Xiaoming Fu , Hannes Tschofenig , Cedric Aoun | ||
Last updated | 2007-11-09 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes the state machines for the NSIS Signaling Layer Protocol for Network Address Translation/Firewall signaling (NAT/FW NSLP). A set of state machines for NAT/FW NSLP entities at different locations of a signaling path are presented in order to illustrate how NAT/FW NSLP may be implemented.
Authors
Constantin Werner
Niklas Steinleitner
Xiaoming Fu
Hannes Tschofenig
Cedric Aoun
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)