// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef REMOTING_PROTOCOL_NETWORK_SETTINGS_H_ #define REMOTING_PROTOCOL_NETWORK_SETTINGS_H_ #include #include #include "base/logging.h" #include "base/time/time.h" #include "remoting/protocol/port_range.h" namespace remoting { namespace protocol { struct NetworkSettings { // When hosts are configured with NAT traversal disabled they will // typically also limit their P2P ports to this range, so that // sessions may be blocked or un-blocked via firewall rules. static const uint16_t kDefaultMinPort = 12400; static const uint16_t kDefaultMaxPort = 12409; enum Flags { // Don't use STUN or relay servers. Accept incoming P2P connection // attempts, but don't initiate any. This ensures that the peer is // on the same network. Note that connection will always fail if // both ends use this mode. NAT_TRAVERSAL_DISABLED = 0x0, // Allow outgoing connections, even when STUN and RELAY are not enabled. NAT_TRAVERSAL_OUTGOING = 0x1, // Active NAT traversal using STUN. NAT_TRAVERSAL_STUN = 0x2, // Allow the use of relay servers when a direct connection is not available. NAT_TRAVERSAL_RELAY = 0x4, // Active NAT traversal using STUN and relay servers. NAT_TRAVERSAL_FULL = NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY | NAT_TRAVERSAL_OUTGOING }; NetworkSettings() {} explicit NetworkSettings(uint32_t flags) : flags(flags) {} uint32_t flags = NAT_TRAVERSAL_DISABLED; // Range of ports used by P2P sessions. PortRange port_range; // ICE Timeout. base::TimeDelta ice_timeout = base::TimeDelta::FromSeconds(15); // ICE reconnect attempts. int ice_reconnect_attempts = 2; }; } // namespace protocol } // namespace remoting #endif // REMOTING_HOST_NETWORK_SETTINGS_H_