// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef REMOTING_PROTOCOL_NETWORK_SETTINGS_H_ #define REMOTING_PROTOCOL_NETWORK_SETTINGS_H_ #include #include "base/basictypes.h" #include "base/logging.h" #include "remoting/protocol/port_range.h" namespace remoting { namespace protocol { struct NetworkSettings { // When hosts are configured with NAT traversal disabled they will // typically also limit their P2P ports to this range, so that // sessions may be blocked or un-blocked via firewall rules. static const uint16 kDefaultMinPort = 12400; static const uint16 kDefaultMaxPort = 12409; enum Flags { // Don't use STUN or relay servers. Accept incoming P2P connection // attempts, but don't initiate any. This ensures that the peer is // on the same network. Note that connection will always fail if // both ends use this mode. NAT_TRAVERSAL_DISABLED = 0x0, // Allow outgoing connections, even when STUN and RELAY are not enabled. NAT_TRAVERSAL_OUTGOING = 0x1, // Active NAT traversal using STUN. NAT_TRAVERSAL_STUN = 0x2, // Allow the use of relay servers when a direct connection is not available. NAT_TRAVERSAL_RELAY = 0x4, // Active NAT traversal using STUN and relay servers. NAT_TRAVERSAL_FULL = NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY | NAT_TRAVERSAL_OUTGOING }; NetworkSettings() : flags(NAT_TRAVERSAL_DISABLED) { DCHECK(!(flags & (NAT_TRAVERSAL_STUN | NAT_TRAVERSAL_RELAY)) || (flags & NAT_TRAVERSAL_OUTGOING)); } explicit NetworkSettings(uint32 flags) : flags(flags) {} uint32 flags; // Range of ports used by P2P sessions. PortRange port_range; }; } // namespace protocol } // namespace remoting #endif // REMOTING_HOST_NETWORK_SETTINGS_H_