You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Looking at the output, you can know the following:
104
104
@@ -109,7 +109,7 @@ Looking at the output, you can know the following:
109
109
110
110
You can also test a specific multiaddr and transport combination, by entering the full multiaddr in the **Multiaddr** field. For example, this is what the output looks like when testing the Secure WebSockets multiaddr:
Since the Secure WebSockets multiaddr is also supported by all browsers, you can also test connectivity to the provider directly from a browser (rather than the IPFS Check backend like in this example) with the [Helia Identify tool](#debug-browser-connectivity-with-helia-identify).
115
115
@@ -123,7 +123,7 @@ In this mode, IPFS Check will search for providers both in the IPNI and the DHT,
Looking at the output, you can know the following:
129
129
@@ -135,7 +135,7 @@ Looking at the output, you can know the following:
135
135
136
136
When using IPFS Check, you can identify whether NAT hole punching was necessary to connect to a provider, by looking at the connection multiaddrs in the output. If there are two connection multiaddrs, and one of them contains `p2p-circuit`, for example:
137
137
138
-

138
+

139
139
140
140
This is because when a provider peer is behind NAT, it will acquire a circuit relay reservation as part of the [NAT hole punching process (DCUtR)](https://blog.ipfs.tech/2022-01-20-libp2p-hole-punching/).
141
141
@@ -153,7 +153,7 @@ The following video gives an overview of how to use IPFS Check and its different
153
153
154
154
The following gif shows how to use Helia Identify to test whether a provider is reachable from a browser, by entering a Peer ID in the input field and clicking the **Identify** button.
0 commit comments