5 # Is the NAT hole-punched?
8 # Enable UPNP by default?
11 # Use addresses from the local network interfaces (inluding loopback, but also others)
14 # Use address obtained from a DNS lookup of our hostname
17 # External IP address of the NAT box (if known); IPv4 dotted-decimal ONLY at this time (should allow DynDNS!)
18 # normal interface IP address for non-NATed peers;
19 # possibly auto-detected (using UPnP) if possible if not specified
22 # Should we use ICMP-based NAT traversal to try connect to NATed peers
23 # or, if we are behind NAT, to allow connections to us?
24 ENABLE_ICMP_CLIENT = NO
25 ENABLE_ICMP_SERVER = NO
27 # IP address of the interface connected to the NAT box; IPv4 dotted-decimal ONLY;
28 # normal interface IP address for non-NATed peers;
29 # likely auto-detected (via interface list) if not specified (!)
32 # Disable IPv6 support
35 # Do we use addresses from localhost address ranges? (::1, 127.0.0.0/8)
36 RETURN_LOCAL_ADDRESSES = NO
38 # How often do we query the DNS resolver
39 # for our hostname (to get our own IP), in ms
40 HOSTNAME_DNS_FREQUENCY = 1200000
42 # How often do we iterate over our
43 # network interfaces to check for changes
44 # in our IP address? in ms
45 IFC_SCAN_FREQUENCY = 3000000
47 # How often do we query the DNS resolver
48 # for our hostname (to get our own IP), in ms
49 DYNDNS_FREQUENCY = 140000