blob: 73d5171eced3a58a876c08e1b5803646e55f1bde [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
#define REMOTING_PROTOCOL_NETWORK_SETTINGS_H_
#include <stdint.h>
#include <string>
#include "base/logging.h"
#include "base/time/time.h"
#include "remoting/protocol/port_range.h"
namespace remoting {
namespace protocol {
struct NetworkSettings {
// When hosts are configured with NAT traversal disabled they will
// typically also limit their P2P ports to this range, so that
// sessions may be blocked or un-blocked via firewall rules.
static const uint16_t kDefaultMinPort = 12400;
static const uint16_t kDefaultMaxPort = 12409;
enum Flags {
// Don't use STUN or relay servers. Accept incoming P2P connection
// attempts, but don't initiate any. This ensures that the peer is
// on the same network. Note that connection will always fail if
// both ends use this mode.
NAT_TRAVERSAL_DISABLED = 0x0,
// Allow outgoing connections, even when STUN and RELAY are not enabled.
NAT_TRAVERSAL_OUTGOING = 0x1,
// Active NAT traversal using STUN.
NAT_TRAVERSAL_STUN = 0x2,
// Allow the use of relay servers when a direct connection is not available.
NAT_TRAVERSAL_RELAY = 0x4,
// Active NAT traversal using STUN and relay servers.
NAT_TRAVERSAL_FULL = NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY |
NAT_TRAVERSAL_OUTGOING
};
NetworkSettings() {}
explicit NetworkSettings(uint32_t flags) : flags(flags) {}
uint32_t flags = NAT_TRAVERSAL_DISABLED;
// Range of ports used by P2P sessions.
PortRange port_range;
// ICE Timeout.
base::TimeDelta ice_timeout = base::TimeDelta::FromSeconds(15);
// ICE reconnect attempts.
int ice_reconnect_attempts = 2;
};
} // namespace protocol
} // namespace remoting
#endif // REMOTING_HOST_NETWORK_SETTINGS_H_