Mercurial > hg > freeDiameter
view doc/acl_wl.conf.sample @ 1508:eb19aa48829f
Add 3GPP TS 29.343 V15.1.0 (2019-09)
Add AVPs:
- Origin-App-Layer-User-Id, UTF8String, code 3600, section 6.4.2
- Target-App-Layer-User-Id, UTF8String, code 3601, section 6.4.3
- ProSe-Function-ID, OctetString, code 3602, section 6.4.4
- ProSe-Request-Type, Unsigned32, code 3603, section 6.4.5
- PDUID, OctetString, code 3604, section 6.4.6
- Application-Data, UTF8String, code 3605, section 6.4.7
- Allowed-Suffixes-Number, Unsigned32, code 3606, section 6.4.8
- Monitor-Target, Grouped, code 3607, section 6.4.9
- ProSe-Code-Suffix-Mask, Grouped, code 3608, section 6.4.10
- Suffix-Code, OctetString, code 3609, section 6.4.11
- Suffix-Mask, OctetString, code 3610, section 6.4.12
- Banned-User-Target, Grouped, code 3611, section 6.4.17
- Metadata-Indicator, Unsigned32, code 3612, section 6.4.18
author | Luke Mewburn <luke@mewburn.net> |
---|---|
date | Sat, 04 Apr 2020 21:28:45 +1100 |
parents | 0dff6a604b0a |
children |
line wrap: on
line source
# Configuration file for the peer whitelist extension. # # This extension is meant to allow connection from remote peers, without actively # maintaining this connection ourselves (as it would be the case by declaring the # peer in a ConnectPeer directive). # # This extension supports configuration reload at runtime. Send # signal SIGUSR1 to the process to cause the process to reload its # config. # # The format of this file is very simple. It contains a list of peer names # separated by spaces or newlines. # # The peer name must be a fqdn. We allow also a special "*" character as the # first label of the fqdn, to allow all fqdn with the same domain name. # Example: *.example.net will allow host1.example.net and host2.example.net # # At the beginning of a line, the following flags are allowed (case sensitive) -- either or both can appear: # ALLOW_OLD_TLS : we accept unprotected CER/CEA exchange with Inband-Security-Id = TLS # ALLOW_IPSEC : we accept implicitly protected connection with with peer (Inband-Security-Id = IPSec) # It is specified for example as: # ALLOW_IPSEC vpn.example.net vpn2.example.net *.vpn.example.net # These flag take effect from their position, until the end of the line.