5 .Id $Id: startup-config.5,v 1.3.2.3 2005/05/30 02:55:42 bodea Exp $
6 .TH STARTUP-CONFIG 5 "\*(Dt" L2TPNS "File Formats and Conventions"
8 startup\-config \- configuration file for l2tpns
10 /etc/l2tpns/startup-config
13 is the configuration file for
16 The format is plain text, in the same format as accepted by the
19 telnet administrative interface. Comments are indicated by either the
25 Settings are specified with
27 .BI "set " "variable value"
35 Set the level of debugging messages written to the log file. The
36 value should be between 0 and 5, with 0 being no debugging, and 5
40 This will be where all logging and debugging information is written
41 to. This may be either a filename, such as
44 .BR syslog : \fIfacility\fR ,
47 is any one of the syslog logging facilities, such as
51 If set, the process id will be written to the specified file. The
52 value must be an absolute path.
57 for authenticating tunnel request. Must be the same as the LAC, or
58 authentication will fail. Only actually be used if the LAC requests
61 .BR primary_dns , " secondary_dns"
62 Whenever a PPP connection is established, DNS servers will be sent to the
63 user, both a primary and a secondary. If either is set to 0.0.0.0, then that
69 receives a STGTERM it will write out its current ip_address_pool,
70 session and tunnel tables to disk prior to exiting to be re-loaded at
71 startup. The validity of this data is obviously quite short and the
72 intent is to allow an sessions to be retained over a software upgrade.
74 .BR primary_radius , " secondary_radius"
75 Sets the RADIUS servers used for both authentication and accounting.
76 If the primary server does not respond, then the secondary RADIUS
79 .BR primary_radius_port , " secondary_radius_port"
80 Sets the authentication ports for the primary and secondary RADIUS
81 servers. The accounting port is one more than the authentication
82 port. If no ports are given, authentication defaults to 1645, and
86 If set to true, then RADIUS accounting packets will be sent. A
88 record will be sent when the session is successfully authenticated,
91 record when the session is closed.
94 Secret to be used in RADIUS packets.
97 When the tun interface is created, it is assigned the address
98 specified here. If no address is given, 1.1.1.1 is used. Packets
99 containing user traffic should be routed via this address if given,
100 otherwise the primary address of the machine.
103 Address to send to clients as the default gateway.
106 Determines whether or not to send a gratuitous ARP for the
108 when the server is ready to handle traffic (default: true). This
109 setting is ignored if BGP is configured.
112 Sets the default speed (in kbits/s) which sessions will be limited to.
115 Number of token buckets to allocate for throttling. Each throttled
116 session requires two buckets (in and out).
119 If set to a directory, then every 5 minutes the current usage for
120 every connected use will be dumped to a file in this directory.
123 After starting up and binding the interface, change UID to this. This
124 doesn't work properly.
127 If set to true, then the current bandwidth utilization will be logged
128 every second. Even if this is disabled, you can see this information
135 Interval between regular cleanups in seconds (default: 2).
138 Maximum number of session actions to perform each cleanup (default: 50).
141 Number of packets to read off each of the UDP and TUN fds when
142 returned as readable by select (default: 10). Avoids incurring the
143 unnecessary system call overhead of select on busy servers.
146 Sets the scheduling policy for the
150 This causes the kernel to immediately preempt any currently running
152 (normal) process in favour of
154 when it becomes runnable.
156 Ignored on uniprocessor systems.
159 Keep all pages mapped by the
164 Maximum number of host unreachable ICMP packets to send per second.
167 Maximum number of packets of downstream traffic to be handled each
168 tenth of a second per session. If zero, no limit is applied (default:
169 0). Intended as a DoS prevention mechanism and not a general
170 throttling control (packets are dropped, not queued).
173 Multicast cluster address (default: 239.192.13.13).
176 Interface for cluster packets (default: eth0).
178 .B cluster_hb_interval
179 Interval in tenths of a second between cluster heartbeat/pings.
181 .B cluster_hb_timeout
182 Cluster heartbeat timeout in tenths of a second. A new master will be
183 elected when this interval has been passed without seeing a heartbeat
186 .B cluster_master_min_adv
187 Determines the minumum number of up to date slaves required before the
188 master will drop routes (default: 1).
191 The routing configuration section is entered by the command
197 specifies the local AS number.
199 Subsequent lines prefixed with
200 .BI "neighbour " peer
201 define the attributes of BGP neighhbours. Valid commands are:
203 .BI "neighbour " peer " remote-as " as
205 .BI "neighbour " peer " timers " "keepalive hold"
209 specifies the BGP neighbour as either a hostname or IP address,
211 is the remote AS number and
214 are the timer values in seconds.
215 .SS NAMED ACCESS LISTS
216 Named access lists may be defined with either of
218 .BI "ip access\-list standard " name
220 .BI "ip access\-list extended " name
222 Subsequent lines starting with
226 define the body of the access\-list.
228 .B Standard Access Lists
230 Standard access lists are defined with:
232 .RB { permit | deny }
233 .IR source " [" dest ]
239 specify IP matches using one of:
252 are in dotted-quad notation, bits in the
254 indicate which address bits in
256 are relevant to the match (0 = exact match; 1 = don't care).
267 .BR 255.255.255.255 '.
270 .B Extended Access Lists
272 Extended access lists are defined with:
274 .RB { permit | deny }
276 .IR source " [" ports "] " dest " [" ports "] [" flags ]
289 are as described above for standard lists.
291 For TCP and UDP matches, source and destination may be optionally
296 .RB { eq | neq | gt | lt }
307 .RB { match\-any | match\-all }
308 .RB { + | - }{ fin | syn | rst | psh | ack | urg }
311 Match packets with any or all of the tcp flags set
318 Match "established" TCP connections: packets with
328 Match IP fragments. May not be specified on rules with layer 4