blob: 83d750761ffc4ed96aef132244833024e8761d7a [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
#define REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
#include <string>
#include "base/basictypes.h"
#include "base/logging.h"
#include "remoting/protocol/port_range.h"
namespace remoting {
namespace protocol {
struct NetworkSettings {
// When hosts are configured with NAT traversal disabled they will
// typically also limit their P2P ports to this range, so that
// sessions may be blocked or un-blocked via firewall rules.
static const uint16 kDefaultMinPort = 12400;
static const uint16 kDefaultMaxPort = 12409;
enum Flags {
// Don't use STUN or relay servers. Accept incoming P2P connection
// attempts, but don't initiate any. This ensures that the peer is
// on the same network. Note that connection will always fail if
// both ends use this mode.
NAT_TRAVERSAL_DISABLED = 0x0,
// Allow outgoing connections, even when STUN and RELAY are not enabled.
NAT_TRAVERSAL_OUTGOING = 0x1,
// Active NAT traversal using STUN.
NAT_TRAVERSAL_STUN = 0x2,
// Allow the use of relay servers when a direct connection is not available.
NAT_TRAVERSAL_RELAY = 0x4,
// Active NAT traversal using STUN and relay servers.
NAT_TRAVERSAL_FULL = NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY |
NAT_TRAVERSAL_OUTGOING
};
NetworkSettings() : flags(NAT_TRAVERSAL_DISABLED) {
DCHECK(!(flags & (NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY)) ||
(flags & NAT_TRAVERSAL_OUTGOING));
}
explicit NetworkSettings(uint32 flags) : flags(flags) {}
uint32 flags;
// Range of ports used by P2P sessions.
PortRange port_range;
};
} // namespace protocol
} // namespace remoting
#endif // REMOTING_HOST_NETWORK_SETTINGS_H_