12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364 |
- // Copyright 2014 The Chromium Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style license that can be
- // found in the LICENSE file.
- #ifndef REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
- #define REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
- #include <stdint.h>
- #include "base/time/time.h"
- #include "remoting/protocol/port_range.h"
- namespace remoting {
- namespace protocol {
- struct NetworkSettings {
- // When hosts are configured with NAT traversal disabled they will
- // typically also limit their P2P ports to this range, so that
- // sessions may be blocked or un-blocked via firewall rules.
- static const uint16_t kDefaultMinPort = 12400;
- static const uint16_t kDefaultMaxPort = 12409;
- enum Flags {
- // Don't use STUN or relay servers. Accept incoming P2P connection
- // attempts, but don't initiate any. This ensures that the peer is
- // on the same network. Note that connection will always fail if
- // both ends use this mode.
- NAT_TRAVERSAL_DISABLED = 0x0,
- // Allow outgoing connections, even when STUN and RELAY are not enabled.
- NAT_TRAVERSAL_OUTGOING = 0x1,
- // Active NAT traversal using STUN.
- NAT_TRAVERSAL_STUN = 0x2,
- // Allow the use of relay servers when a direct connection is not available.
- NAT_TRAVERSAL_RELAY = 0x4,
- // Active NAT traversal using STUN and relay servers.
- NAT_TRAVERSAL_FULL = NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY |
- NAT_TRAVERSAL_OUTGOING
- };
- NetworkSettings() {}
- explicit NetworkSettings(uint32_t flags) : flags(flags) {}
- uint32_t flags = NAT_TRAVERSAL_DISABLED;
- // Range of ports used by P2P sessions.
- PortRange port_range;
- // ICE Timeout.
- base::TimeDelta ice_timeout = base::Seconds(15);
- // ICE reconnect attempts.
- int ice_reconnect_attempts = 2;
- };
- } // namespace protocol
- } // namespace remoting
- #endif // REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
|