Navigation


Changeset 1400:1409e693fa0f in freeDiameter for doc/freediameter.conf.sample


Ignore:
Timestamp:
Dec 4, 2019, 2:18:59 AM (10 months ago)
Author:
Thomas Klausner <tk@giga.or.at>
Branch:
default
Phase:
public
Message:

Document IncomingQueueLimit?, OutgoingQueueLimit?, and LocalQueueLimit?

File:
1 edited

Legend:

Unmodified
Added
Removed
  • doc/freediameter.conf.sample

    r1397 r1400  
    66# It is possible to use "include" keyword to import additional files
    77# e.g.: include "/etc/freeDiameter.d/*.conf"
    8 # This is exactly equivalent as copy & paste the content of the included file(s) 
     8# This is exactly equivalent as copy & paste the content of the included file(s)
    99# where the "include" keyword is found.
    1010
    1111
    1212##############################################################
    13 ##  Peer identity and realm 
     13##  Peer identity and realm
    1414
    1515# The Diameter Identity of this daemon.
     
    3535#SecPort = 5868;
    3636
    37 # Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed 
    38 # on the unsecure connection. The alternative is RFC6733 mechanism, where TLS protects also the 
     37# Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed
     38# on the unsecure connection. The alternative is RFC6733 mechanism, where TLS protects also the
    3939# CER/CEA exchange on a dedicated secure port.
    40 # This parameter only affects outgoing connections. 
     40# This parameter only affects outgoing connections.
    4141# The setting can be also defined per-peer (see Peers configuration section).
    4242# Default: use RFC6733 method with separate port for TLS.
     
    127127# Certificate Revocation List file
    128128# The information about revoked certificates.
    129 # The file contains a list of trusted CRLs in PEM format. They should have been verified before. 
     129# The file contains a list of trusted CRLs in PEM format. They should have been verified before.
    130130# (This parameter is passed to gnutls_certificate_set_x509_crl_file function)
    131131# Note: openssl CRL format might have interoperability issue with GNUTLS format.
     
    134134
    135135# GNU TLS Priority string
    136 # This string allows to configure the behavior of GNUTLS key exchanges 
     136# This string allows to configure the behavior of GNUTLS key exchanges
    137137# algorithms. See gnutls_priority_init function documentation for information.
    138138# You should also refer to the Diameter required TLS support here:
     
    145145# Set the number of bits for generated DH parameters
    146146# Valid value should be 768, 1024, 2048, 3072 or 4096.
    147 # (This parameter is passed to gnutls_dh_params_generate2 function, 
     147# (This parameter is passed to gnutls_dh_params_generate2 function,
    148148# it usually should match RSA key size)
    149149# Default : 1024
     
    151151
    152152# Alternatively, you can specify a file to load the PKCS#3 encoded
    153 # DH parameters directly from. This accelerates the daemon start 
     153# DH parameters directly from. This accelerates the daemon start
    154154# but is slightly less secure. If this file is provided, the
    155155# TLS_DH_Bits parameters has no effect.
     
    179179# Disable the relaying of Diameter messages?
    180180# For messages not handled locally, the default behavior is to forward the
    181 # message to another peer if any is available, according to the routing 
    182 # algorithms. In addition the "0xffffff" application is advertised in CER/CEA 
     181# message to another peer if any is available, according to the routing
     182# algorithms. In addition the "0xffffff" application is advertised in CER/CEA
    183183# exchanges.
    184184# Default: Relaying is enabled.
     
    196196# Default: 1
    197197#RoutingOutThreads= 1;
     198
     199# Maximum size of the incoming queue (messages queued after accepting
     200# them from the network) before blocking
     201# Default: 20
     202#IncomingQueueLimit = 20;
     203
     204# Maximum size of the outgoing queue (messages queued for sending to
     205# the network) before blocking
     206# Default: 30
     207#OutgoingQueueLimit = 30;
     208
     209# Maximum size of the local queue (messages queued for local handling)
     210# before blocking
     211# Default: 25
     212#LocalQueueLimit = 25;
    198213
    199214# Other applications are configured by loaded extensions.
     
    206221# as well as advanced functions, are provided
    207222# by loadable extensions (plug-ins).
    208 #  These extensions may in addition receive the name of a 
     223#  These extensions may in addition receive the name of a
    209224# configuration file, the format of which is extension-specific.
    210225#
     
    245260#  The local server listens for incoming connections. By default,
    246261# all unknown connecting peers are rejected. Extensions can override this behavior (e.g., acl_wl).
    247 # 
     262#
    248263#  In addition to incoming connections, the local peer can
    249 # be configured to establish and maintain connections to some 
     264# be configured to establish and maintain connections to some
    250265# Diameter nodes and allow connections from these nodes.
    251266#  This is achieved with the ConnectPeer directive described below.
     
    278293# Default: Always
    279294#RouteRecordInAnswers = Never;
     295
Note: See TracChangeset for help on using the changeset viewer.