Changeset 1400:1409e693fa0f in freeDiameter for doc/freediameter.conf.sample
- Timestamp:
- Dec 4, 2019, 2:18:59 AM (3 years ago)
- Branch:
- default
- Phase:
- public
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/freediameter.conf.sample
r1397 r1400 6 6 # It is possible to use "include" keyword to import additional files 7 7 # e.g.: include "/etc/freeDiameter.d/*.conf" 8 # This is exactly equivalent as copy & paste the content of the included file(s) 8 # This is exactly equivalent as copy & paste the content of the included file(s) 9 9 # where the "include" keyword is found. 10 10 11 11 12 12 ############################################################## 13 ## Peer identity and realm 13 ## Peer identity and realm 14 14 15 15 # The Diameter Identity of this daemon. … … 35 35 #SecPort = 5868; 36 36 37 # Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed 38 # on the unsecure connection. The alternative is RFC6733 mechanism, where TLS protects also the 37 # Use RFC3588 method for TLS protection, where TLS is negociated after CER/CEA exchange is completed 38 # on the unsecure connection. The alternative is RFC6733 mechanism, where TLS protects also the 39 39 # CER/CEA exchange on a dedicated secure port. 40 # This parameter only affects outgoing connections. 40 # This parameter only affects outgoing connections. 41 41 # The setting can be also defined per-peer (see Peers configuration section). 42 42 # Default: use RFC6733 method with separate port for TLS. … … 127 127 # Certificate Revocation List file 128 128 # The information about revoked certificates. 129 # The file contains a list of trusted CRLs in PEM format. They should have been verified before. 129 # The file contains a list of trusted CRLs in PEM format. They should have been verified before. 130 130 # (This parameter is passed to gnutls_certificate_set_x509_crl_file function) 131 131 # Note: openssl CRL format might have interoperability issue with GNUTLS format. … … 134 134 135 135 # GNU TLS Priority string 136 # This string allows to configure the behavior of GNUTLS key exchanges 136 # This string allows to configure the behavior of GNUTLS key exchanges 137 137 # algorithms. See gnutls_priority_init function documentation for information. 138 138 # You should also refer to the Diameter required TLS support here: … … 145 145 # Set the number of bits for generated DH parameters 146 146 # Valid value should be 768, 1024, 2048, 3072 or 4096. 147 # (This parameter is passed to gnutls_dh_params_generate2 function, 147 # (This parameter is passed to gnutls_dh_params_generate2 function, 148 148 # it usually should match RSA key size) 149 149 # Default : 1024 … … 151 151 152 152 # Alternatively, you can specify a file to load the PKCS#3 encoded 153 # DH parameters directly from. This accelerates the daemon start 153 # DH parameters directly from. This accelerates the daemon start 154 154 # but is slightly less secure. If this file is provided, the 155 155 # TLS_DH_Bits parameters has no effect. … … 179 179 # Disable the relaying of Diameter messages? 180 180 # For messages not handled locally, the default behavior is to forward the 181 # message to another peer if any is available, according to the routing 182 # algorithms. In addition the "0xffffff" application is advertised in CER/CEA 181 # message to another peer if any is available, according to the routing 182 # algorithms. In addition the "0xffffff" application is advertised in CER/CEA 183 183 # exchanges. 184 184 # Default: Relaying is enabled. … … 196 196 # Default: 1 197 197 #RoutingOutThreads= 1; 198 199 # Maximum size of the incoming queue (messages queued after accepting 200 # them from the network) before blocking 201 # Default: 20 202 #IncomingQueueLimit = 20; 203 204 # Maximum size of the outgoing queue (messages queued for sending to 205 # the network) before blocking 206 # Default: 30 207 #OutgoingQueueLimit = 30; 208 209 # Maximum size of the local queue (messages queued for local handling) 210 # before blocking 211 # Default: 25 212 #LocalQueueLimit = 25; 198 213 199 214 # Other applications are configured by loaded extensions. … … 206 221 # as well as advanced functions, are provided 207 222 # by loadable extensions (plug-ins). 208 # These extensions may in addition receive the name of a 223 # These extensions may in addition receive the name of a 209 224 # configuration file, the format of which is extension-specific. 210 225 # … … 245 260 # The local server listens for incoming connections. By default, 246 261 # all unknown connecting peers are rejected. Extensions can override this behavior (e.g., acl_wl). 247 # 262 # 248 263 # In addition to incoming connections, the local peer can 249 # be configured to establish and maintain connections to some 264 # be configured to establish and maintain connections to some 250 265 # Diameter nodes and allow connections from these nodes. 251 266 # This is achieved with the ConnectPeer directive described below. … … 278 293 # Default: Always 279 294 #RouteRecordInAnswers = Never; 295
Note: See TracChangeset
for help on using the changeset viewer.