Advertisement
Guest User

Untitled

a guest
Apr 12th, 2012
390
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.51 KB | None | 0 0
  1. # /etc/ppp/options
  2. #
  3. # Originally created by Jim Knoble <jmknoble@mercury.interpath.net>
  4. # Modified for Debian by alvar Bray <alvar@meiko.co.uk>
  5. # Modified for PPP Server setup by Christoph Lameter <clameter@debian.org>
  6. #
  7. # To quickly see what options are active in this file, use this command:
  8. # egrep -v '#|^ *$' /etc/ppp/options
  9.  
  10. # Specify which DNS Servers the incoming Win95 or WinNT Connection should use
  11. # Two Servers can be remotely configured
  12. # ms-dns 192.168.1.1
  13. # ms-dns 192.168.1.2
  14.  
  15. # Specify which WINS Servers the incoming connection Win95 or WinNT should use
  16. # ms-wins 192.168.1.50
  17. # ms-wins 192.168.1.51
  18.  
  19. # Run the executable or shell command specified after pppd has
  20. # terminated the link. This script could, for example, issue commands
  21. # to the modem to cause it to hang up if hardware modem control signals
  22. # were not available.
  23. #disconnect "chat -- \d+++\d\c OK ath0 OK"
  24.  
  25. # async character map -- 32-bit hex; each bit is a character
  26. # that needs to be escaped for pppd to receive it. 0x00000001
  27. # represents '\x01', and 0x80000000 represents '\x1f'.
  28. asyncmap 0
  29.  
  30. # Require the peer to authenticate itself before allowing network
  31. # packets to be sent or received.
  32. # Please do not disable this setting. It is expected to be standard in
  33. # future releases of pppd. Use the call option (see manpage) to disable
  34. # authentication for specific peers.
  35. #auth
  36. noauth
  37. # ... Unfortunately, fixing this properly in the peers file
  38. # (/etc/ppp/peers/ppp0, typically) is apparently incompatible with the
  39. # paradigm used by gnome-system-tools and system-tools-backend for
  40. # managing the peers files. So in Ubuntu Feisty we change the default.
  41.  
  42. # Use hardware flow control (i.e. RTS/CTS) to control the flow of data
  43. # on the serial port.
  44. crtscts
  45.  
  46. # Use software flow control (i.e. XON/XOFF) to control the flow of data
  47. # on the serial port.
  48. #xonxoff
  49.  
  50. # Specifies that certain characters should be escaped on transmission
  51. # (regardless of whether the peer requests them to be escaped with its
  52. # async control character map). The characters to be escaped are
  53. # specified as a list of hex numbers separated by commas. Note that
  54. # almost any character can be specified for the escape option, unlike
  55. # the asyncmap option which only allows control characters to be
  56. # specified. The characters which may not be escaped are those with hex
  57. # values 0x20 - 0x3f or 0x5e.
  58. #escape 11,13,ff
  59.  
  60. # Don't use the modem control lines.
  61. #local
  62.  
  63. # Specifies that pppd should use a UUCP-style lock on the serial device
  64. # to ensure exclusive access to the device.
  65. lock
  66.  
  67. # Don't show the passwords when logging the contents of PAP packets.
  68. # This is the default.
  69. hide-password
  70.  
  71. # When logging the contents of PAP packets, this option causes pppd to
  72. # show the password string in the log message.
  73. #show-password
  74.  
  75. # Use the modem control lines. On Ultrix, this option implies hardware
  76. # flow control, as for the crtscts option. (This option is not fully
  77. # implemented.)
  78. modem
  79.  
  80. # Set the MRU [Maximum Receive Unit] value to <n> for negotiation. pppd
  81. # will ask the peer to send packets of no more than <n> bytes. The
  82. # minimum MRU value is 128. The default MRU value is 1500. A value of
  83. # 296 is recommended for slow links (40 bytes for TCP/IP header + 256
  84. # bytes of data).
  85. #mru 542
  86.  
  87. # Set the interface netmask to <n>, a 32 bit netmask in "decimal dot"
  88. # notation (e.g. 255.255.255.0).
  89. #netmask 255.255.255.0
  90.  
  91. # Disables the default behaviour when no local IP address is specified,
  92. # which is to determine (if possible) the local IP address from the
  93. # hostname. With this option, the peer will have to supply the local IP
  94. # address during IPCP negotiation (unless it specified explicitly on the
  95. # command line or in an options file).
  96. #noipdefault
  97.  
  98. # Enables the "passive" option in the LCP. With this option, pppd will
  99. # attempt to initiate a connection; if no reply is received from the
  100. # peer, pppd will then just wait passively for a valid LCP packet from
  101. # the peer (instead of exiting, as it does without this option).
  102. #passive
  103.  
  104. # With this option, pppd will not transmit LCP packets to initiate a
  105. # connection until a valid LCP packet is received from the peer (as for
  106. # the "passive" option with old versions of pppd).
  107. #silent
  108.  
  109. # Don't request or allow negotiation of any options for LCP and IPCP
  110. # (use default values).
  111. #-all
  112.  
  113. # Disable Address/Control compression negotiation (use default, i.e.
  114. # address/control field disabled).
  115. #-ac
  116.  
  117. # Disable asyncmap negotiation (use the default asyncmap, i.e. escape
  118. # all control characters).
  119. #-am
  120.  
  121. # Don't fork to become a background process (otherwise pppd will do so
  122. # if a serial device is specified).
  123. #-detach
  124.  
  125. # Disable IP address negotiation (with this option, the remote IP
  126. # address must be specified with an option on the command line or in
  127. # an options file).
  128. #-ip
  129.  
  130. # Disable IPCP negotiation and IP communication. This option should
  131. # only be required if the peer is buggy and gets confused by requests
  132. # from pppd for IPCP negotiation.
  133. #noip
  134.  
  135. # Disable magic number negotiation. With this option, pppd cannot
  136. # detect a looped-back line.
  137. #-mn
  138.  
  139. # Disable MRU [Maximum Receive Unit] negotiation (use default, i.e.
  140. # 1500).
  141. #-mru
  142.  
  143. # Disable protocol field compression negotiation (use default, i.e.
  144. # protocol field compression disabled).
  145. #-pc
  146.  
  147. # Require the peer to authenticate itself using PAP.
  148. #+pap
  149.  
  150. # Don't agree to authenticate using PAP.
  151. #-pap
  152.  
  153. # Require the peer to authenticate itself using CHAP [Cryptographic
  154. # Handshake Authentication Protocol] authentication.
  155. #+chap
  156.  
  157. # Don't agree to authenticate using CHAP.
  158. -chap
  159.  
  160. # Disable negotiation of Van Jacobson style IP header compression (use
  161. # default, i.e. no compression).
  162. #-vj
  163.  
  164. # Increase debugging level (same as -d). If this option is given, pppd
  165. # will log the contents of all control packets sent or received in a
  166. # readable form. The packets are logged through syslog with facility
  167. # daemon and level debug. This information can be directed to a file by
  168. # setting up /etc/syslog.conf appropriately (see syslog.conf(5)). (If
  169. # pppd is compiled with extra debugging enabled, it will log messages
  170. # using facility local2 instead of daemon).
  171. #debug
  172.  
  173. # Append the domain name <d> to the local host name for authentication
  174. # purposes. For example, if gethostname() returns the name porsche,
  175. # but the fully qualified domain name is porsche.Quotron.COM, you would
  176. # use the domain option to set the domain name to Quotron.COM.
  177. #domain <d>
  178.  
  179. # Enable debugging code in the kernel-level PPP driver. The argument n
  180. # is a number which is the sum of the following values: 1 to enable
  181. # general debug messages, 2 to request that the contents of received
  182. # packets be printed, and 4 to request that the contents of transmitted
  183. # packets be printed.
  184. #kdebug n
  185.  
  186. # Set the MTU [Maximum Transmit Unit] value to <n>. Unless the peer
  187. # requests a smaller value via MRU negotiation, pppd will request that
  188. # the kernel networking code send data packets of no more than n bytes
  189. # through the PPP network interface.
  190. #mtu <n>
  191.  
  192. # Set the name of the local system for authentication purposes to <n>.
  193. # This is a privileged option. With this option, pppd will use lines in the
  194. # secrets files which have <n> as the second field when looking for a
  195. # secret to use in authenticating the peer. In addition, unless overridden
  196. # with the user option, <n> will be used as the name to send to the peer
  197. # when authenticating the local system to the peer. (Note that pppd does
  198. # not append the domain name to <n>.)
  199. #name <n>
  200.  
  201. # Enforce the use of the hostname as the name of the local system for
  202. # authentication purposes (overrides the name option).
  203. #usehostname
  204.  
  205. # Set the assumed name of the remote system for authentication purposes
  206. # to <n>.
  207. #remotename <n>
  208.  
  209. # Add an entry to this system's ARP [Address Resolution Protocol]
  210. # table with the IP address of the peer and the Ethernet address of this
  211. # system.
  212. #proxyarp
  213.  
  214. # Use the system password database for authenticating the peer using
  215. # PAP. Note: mgetty already provides this option. If this is specified
  216. # then dialin from users using a script under Linux to fire up ppp wont work.
  217. # login
  218.  
  219. # If this option is given, pppd will send an LCP echo-request frame to the
  220. # peer every n seconds. Normally the peer should respond to the echo-request
  221. # by sending an echo-reply. This option can be used with the
  222. # lcp-echo-failure option to detect that the peer is no longer connected.
  223. lcp-echo-interval 30
  224.  
  225. # If this option is given, pppd will presume the peer to be dead if n
  226. # LCP echo-requests are sent without receiving a valid LCP echo-reply.
  227. # If this happens, pppd will terminate the connection. Use of this
  228. # option requires a non-zero value for the lcp-echo-interval parameter.
  229. # This option can be used to enable pppd to terminate after the physical
  230. # connection has been broken (e.g., the modem has hung up) in
  231. # situations where no hardware modem control lines are available.
  232. lcp-echo-failure 4
  233.  
  234. # Set the LCP restart interval (retransmission timeout) to <n> seconds
  235. # (default 3).
  236. #lcp-restart <n>
  237.  
  238. # Set the maximum number of LCP terminate-request transmissions to <n>
  239. # (default 3).
  240. #lcp-max-terminate <n>
  241.  
  242. # Set the maximum number of LCP configure-request transmissions to <n>
  243. # (default 10).
  244. #lcp-max-configure <n>
  245.  
  246. # Set the maximum number of LCP configure-NAKs returned before starting
  247. # to send configure-Rejects instead to <n> (default 10).
  248. #lcp-max-failure <n>
  249.  
  250. # Set the IPCP restart interval (retransmission timeout) to <n>
  251. # seconds (default 3).
  252. #ipcp-restart <n>
  253.  
  254. # Set the maximum number of IPCP terminate-request transmissions to <n>
  255. # (default 3).
  256. #ipcp-max-terminate <n>
  257.  
  258. # Set the maximum number of IPCP configure-request transmissions to <n>
  259. # (default 10).
  260. #ipcp-max-configure <n>
  261.  
  262. # Set the maximum number of IPCP configure-NAKs returned before starting
  263. # to send configure-Rejects instead to <n> (default 10).
  264. #ipcp-max-failure <n>
  265.  
  266. # Set the PAP restart interval (retransmission timeout) to <n> seconds
  267. # (default 3).
  268. #pap-restart <n>
  269.  
  270. # Set the maximum number of PAP authenticate-request transmissions to
  271. # <n> (default 10).
  272. #pap-max-authreq <n>
  273.  
  274. # Set the maximum time that pppd will wait for the peer to authenticate
  275. # itself with PAP to <n> seconds (0 means no limit).
  276. #pap-timeout <n>
  277.  
  278. # Set the CHAP restart interval (retransmission timeout for
  279. # challenges) to <n> seconds (default 3).
  280. #chap-restart <n>
  281.  
  282. # Set the maximum number of CHAP challenge transmissions to <n>
  283. # (default 10).
  284. #chap-max-challenge
  285.  
  286. # If this option is given, pppd will rechallenge the peer every <n>
  287. # seconds.
  288. #chap-interval <n>
  289.  
  290. # With this option, pppd will accept the peer's idea of our local IP
  291. # address, even if the local IP address was specified in an option.
  292. #ipcp-accept-local
  293.  
  294. # With this option, pppd will accept the peer's idea of its (remote) IP
  295. # address, even if the remote IP address was specified in an option.
  296. #ipcp-accept-remote
  297.  
  298. # Disable the IPXCP and IPX protocols.
  299. # To let pppd pass IPX packets comment this out --- you'll probably also
  300. # want to install ipxripd, and have the Internal IPX Network option enabled
  301. # in your kernel. /usr/doc/HOWTO/IPX-HOWTO.gz contains more info.
  302. noipx
  303.  
  304. # Exit once a connection has been made and terminated. This is the default,
  305. # unless the `persist' or `demand' option has been specified.
  306. #nopersist
  307.  
  308. # Do not exit after a connection is terminated; instead try to reopen
  309. # the connection.
  310. #persist
  311.  
  312. # Terminate after n consecutive failed connection attempts.
  313. # A value of 0 means no limit. The default value is 10.
  314. #maxfail <n>
  315.  
  316. # Initiate the link only on demand, i.e. when data traffic is present.
  317. # With this option, the remote IP address must be specified by the user on
  318. # the command line or in an options file. Pppd will initially configure
  319. # the interface and enable it for IP traffic without connecting to the peer.
  320. # When traffic is available, pppd will connect to the peer and perform
  321. # negotiation, authentication, etc. When this is completed, pppd will
  322. # commence passing data packets (i.e., IP packets) across the link.
  323. #demand
  324.  
  325. # Specifies that pppd should disconnect if the link is idle for <n> seconds.
  326. # The link is idle when no data packets (i.e. IP packets) are being sent or
  327. # received. Note: it is not advisable to use this option with the persist
  328. # option without the demand option. If the active-filter option is given,
  329. # data packets which are rejected by the specified activity filter also
  330. # count as the link being idle.
  331. #idle <n>
  332.  
  333. # Specifies how many seconds to wait before re-initiating the link after
  334. # it terminates. This option only has any effect if the persist or demand
  335. # option is used. The holdoff period is not applied if the link was
  336. # terminated because it was idle.
  337. #holdoff <n>
  338.  
  339. # Wait for up n milliseconds after the connect script finishes for a valid
  340. # PPP packet from the peer. At the end of this time, or when a valid PPP
  341. # packet is received from the peer, pppd will commence negotiation by
  342. # sending its first LCP packet. The default value is 1000 (1 second).
  343. # This wait period only applies if the connect or pty option is used.
  344. #connect-delay <n>
  345.  
  346. # Packet filtering: for more information, see pppd(8)
  347. # Any packets matching the filter expression will be interpreted as link
  348. # activity, and will cause a "demand" connection to be activated, and reset
  349. # the idle connection timer. (idle option)
  350. # The filter expression is akin to that of tcpdump(1)
  351. #active-filter <filter-expression>
  352.  
  353. # ---<End of File>---
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement