Correct PPTP server firewall rules chain.
[tomato/davidwu.git] / release / src / router / xl2tpd / doc / l2tpd.conf.sample
blob9f2f03a50480594481ceabaeea6016228eea0cca
2 ; Sample l2tpd configuration file
4 ; This example file should give you some idea of how the options for l2tpd
5 ; should work.  The best place to look for a list of all options is in
6 ; the source code itself, until I have the time to write better documetation :)
7 ; Specifically, the file "file.c" contains a list of commands at the end.
9 ; You most definitely don't have to spell out everything as it is done here
11 ; [global]                                                              ; Global parameters:
12 ; port = 1701                                                   ; * Bind to port 1701
13 ; auth file = /etc/l2tpd/l2tp-secrets   ; * Where our challenge secrets are
14 ; access control = yes                                  ; * Refuse connections without IP match
15 ; rand source = dev                     ; Source for entropy for random
16 ;                                       ; numbers, options are:
17 ;                                       ; dev - reads of /dev/urandom
18 ;                                       ; sys - uses rand()
19 ;                                       ; egd - reads from egd socket
20 ;                                       ; egd is not yet implemented
22 ; [lns default]                                                 ; Our fallthrough LNS definition
23 ; exclusive = no                                                ; * Only permit one tunnel per host
24 ; ip range = 192.168.0.1-192.168.0.20   ; * Allocate from this IP range
25 ; no ip range = 192.168.0.3-192.168.0.9 ; * Except these hosts
26 ; ip range = 192.168.0.5                                ; * But this one is okay
27 ; ip range = lac1-lac2                                  ; * And anything from lac1 to lac2's IP
28 ; lac = 192.168.1.4 - 192.168.1.8               ; * These can connect as LAC's
29 ; no lac = untrusted.marko.net                  ; * This guy can't connect
30 ; hidden bit = no                                               ; * Use hidden AVP's?
31 ; local ip = 192.168.1.2                                ; * Our local IP to use
32 ; length bit = yes                                              ; * Use length bit in payload?
33 ; require chap = yes                                    ; * Require CHAP auth. by peer
34 ; refuse pap = yes                                              ; * Refuse PAP authentication
35 ; refuse chap = no                                              ; * Refuse CHAP authentication
36 ; refuse authentication = no                    ; * Refuse authentication altogether
37 ; require authentication = yes                  ; * Require peer to authenticate
38 ; unix authentication = no                              ; * Use /etc/passwd for auth.
39 ; name = myhostname                                             ; * Report this as our hostname
40 ; ppp debug = no                                                ; * Turn on PPP debugging
41 ; pppoptfile = /etc/ppp/options.l2tpd.lns       ; * ppp options file
42 ; call rws = 10                                                 ; * RWS for call (-1 is valid)
43 ; tunnel rws = 4                                                ; * RWS for tunnel (must be > 0)
44 ; flow bit = yes                                                ; * Include sequence numbers
45 ; challenge = yes                                               ; * Challenge authenticate peer ; 
46 ; rx bps = 10000000                             ; Receive tunnel speed
47 ; tx bps = 10000000                             ; Transmit tunnel speed
48 ; bps = 100000                                  ; Define both receive and transmit speed in one option
50 ; [lac marko]                                                   ; Example VPN LAC definition
51 ; lns = lns.marko.net                                   ; * Who is our LNS?
52 ; lns = lns2.marko.net                                  ; * A backup LNS (not yet used)
53 ; redial = yes                                                  ; * Redial if disconnected?
54 ; redial timeout = 15                                   ; * Wait n seconds between redials
55 ; max redials = 5                                               ; * Give up after n consecutive failures
56 ; hidden bit = yes                                              ; * User hidden AVP's?
57 ; local ip = 192.168.1.1                                ; * Force peer to use this IP for us
58 ; remote ip = 192.168.1.2                               ; * Force peer to use this as their IP
59 ; length bit = no                                               ; * Use length bit in payload?
60 ; require pap = no                                              ; * Require PAP auth. by peer
61 ; require chap = yes                                    ; * Require CHAP auth. by peer
62 ; refuse pap = yes                                              ; * Refuse PAP authentication
63 ; refuse chap = no                                              ; * Refuse CHAP authentication
64 ; refuse authentication = no                    ; * Refuse authentication altogether
65 ; require authentication = yes                  ; * Require peer to authenticate
66 ; name = marko                                                  ; * Report this as our hostname
67 ; ppp debug = no                                                ; * Turn on PPP debugging
68 ; pppoptfile = /etc/ppp/options.l2tpd.marko     ; * ppp options file for this lac
69 ; call rws = 10                                                 ; * RWS for call (-1 is valid)
70 ; tunnel rws = 4                                                ; * RWS for tunnel (must be > 0)
71 ; flow bit = yes                                                ; * Include sequence numbers
72 ; challenge = yes                                               ; * Challenge authenticate peer 
74 ; [lac cisco]                                                   ; Another quick LAC
75 ; lns = cisco.marko.net                                 ; * Required, but can take from default
76 ; require authentication = yes