Talk:Internet Gateway Device Protocol
This is the talk page for discussing improvements to the Internet Gateway Device Protocol article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||
|
Unnamed section
[edit]What does it mean if my connections show internet gateway?
IGD
[edit]how to remove it ? —Preceding unsigned comment added by 91.140.210.224 (talk) 09:50, 20 February 2008 (UTC)
Better definition
[edit]To me, it sounds as if IGD is a protocol for configuring routers (especially for doing port forwarding) and getting information from routers (e.g. the external IP). So instead of letting users manually configure and look up this stuff on a router configuration web page, an application developer can make the application request the configuration changes automatically from the router. If I have understood this correctly, maybe one could improve the top of the article to include this information directly instead of just saying that the IGD protocol is a NAT-PMP (which many readers won't understand; also, the article on NAT-PMP does not define it the way it is used in this article on IGD). 95.90.43.41 (talk) 12:25, 7 July 2013 (UTC)
Primary reference
[edit][1] links to the IGD-PCP interop RFC rather than the ISO standard, which is actually incorrect for defining what UPnP actually is. — Preceding unsigned comment added by 82.135.144.188 (talk) 08:15, 13 June 2022 (UTC)
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class Computer networking articles
- Mid-importance Computer networking articles
- Start-Class Computer networking articles of Mid-importance
- All Computer networking articles
- Start-Class Computer Security articles
- Low-importance Computer Security articles
- Start-Class Computer Security articles of Low-importance
- All Computer Security articles
- All Computing articles