summaryrefslogtreecommitdiff
path: root/src/nat/nat.conf
blob: 9afa0aad0999003eaaea5114bf559ac30995c54a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
[nat]
# Are we behind NAT?
BEHIND_NAT = NO

# Is the NAT hole-punched?
PUNCHED_NAT = NO

# Enable UPNP by default?
ENABLE_UPNP = NO

# Use addresses from the local network interfaces (inluding loopback, but also others)
USE_LOCALADDR = YES

# Use address obtained from a DNS lookup of our hostname
USE_HOSTNAME = NO

# External IP address of the NAT box (if known); IPv4 dotted-decimal ONLY at this time (should allow DynDNS!)
# normal interface IP address for non-NATed peers; 
# possibly auto-detected (using UPnP) if possible if not specified
# EXTERNAL_ADDRESS = 

# Should we use ICMP-based NAT traversal to try connect to NATed peers
# or, if we are behind NAT, to allow connections to us?
ENABLE_ICMP_CLIENT = NO
ENABLE_ICMP_SERVER = NO

# IP address of the interface connected to the NAT box; IPv4 dotted-decimal ONLY;
# normal interface IP address for non-NATed peers; 
# likely auto-detected (via interface list) if not specified (!)
# INTERNAL_ADDRESS = 

# Disable IPv6 support
DISABLEV6 = NO

# Do we use addresses from localhost address ranges? (::1, 127.0.0.0/8)
RETURN_LOCAL_ADDRESSES = NO

# How often do we query the DNS resolver
# for our hostname (to get our own IP)
HOSTNAME_DNS_FREQUENCY = 20 min

# How often do we iterate over our 
# network interfaces to check for changes
# in our IP address?
IFC_SCAN_FREQUENCY = 15 min

# How often do we query the DNS resolver
# for our hostname (to get our own IP)
DYNDNS_FREQUENCY = 7 min

# SHOULD USE STUN ?
USE_STUN = YES
STUN_FREQUENCY = 2 min
# Default list of stun servers
STUN_SERVERS = stun.services.mozilla.com:3478 stun2.l.google.com:19302


[gnunet-nat-server]
HOSTNAME = gnunet.org
PORT = 5724
NOARMBIND = YES