… | |
… | |
122 | .\} |
122 | .\} |
123 | .rm #[ #] #H #V #F C |
123 | .rm #[ #] #H #V #F C |
124 | .\" ======================================================================== |
124 | .\" ======================================================================== |
125 | .\" |
125 | .\" |
126 | .IX Title "GVPE.CONF 5" |
126 | .IX Title "GVPE.CONF 5" |
127 | .TH GVPE.CONF 5 "2013-07-18" "2.25" "GNU Virtual Private Ethernet" |
127 | .TH GVPE.CONF 5 "2013-10-11" "2.25" "GNU Virtual Private Ethernet" |
128 | .\" For nroff, turn off justification. Always turn off hyphenation; it makes |
128 | .\" For nroff, turn off justification. Always turn off hyphenation; it makes |
129 | .\" way too many mistakes in technical documents. |
129 | .\" way too many mistakes in technical documents. |
130 | .if n .ad l |
130 | .if n .ad l |
131 | .nh |
131 | .nh |
132 | .SH "NAME" |
132 | .SH "NAME" |
… | |
… | |
754 | .IX Item "inherit-tos = yes|true|on | no|false|off" |
754 | .IX Item "inherit-tos = yes|true|on | no|false|off" |
755 | Whether to inherit the \s-1TOS\s0 settings of packets sent to the tunnel when |
755 | Whether to inherit the \s-1TOS\s0 settings of packets sent to the tunnel when |
756 | sending packets to this node (default: \f(CW\*(C`yes\*(C'\fR). If set to \f(CW\*(C`yes\*(C'\fR then |
756 | sending packets to this node (default: \f(CW\*(C`yes\*(C'\fR). If set to \f(CW\*(C`yes\*(C'\fR then |
757 | outgoing tunnel packets will have the same \s-1TOS\s0 setting as the packets sent |
757 | outgoing tunnel packets will have the same \s-1TOS\s0 setting as the packets sent |
758 | to the tunnel device, which is usually what you want. |
758 | to the tunnel device, which is usually what you want. |
|
|
759 | .IP "low-power = yes|true|on | no|false|off" 4 |
|
|
760 | .IX Item "low-power = yes|true|on | no|false|off" |
|
|
761 | If true, designates a node as a low-power node. Low-power nodes use |
|
|
762 | larger timeouts and try to reduce cpu time. Other nodes talking to a |
|
|
763 | low-power node will also use larger timeouts, and will use less aggressive |
|
|
764 | optimisations, in the hope of reducing load. Security is not compromised. |
|
|
765 | .Sp |
|
|
766 | The typical low-power node would be a mobile phone, where wakeups and |
|
|
767 | encryption can significantly increase power drain. |
759 | .IP "max-retry = positive-number" 4 |
768 | .IP "max-retry = positive-number" 4 |
760 | .IX Item "max-retry = positive-number" |
769 | .IX Item "max-retry = positive-number" |
761 | The maximum interval in seconds (default: \f(CW3600\fR, one hour) between |
770 | The maximum interval in seconds (default: \f(CW3600\fR, one hour) between |
762 | retries to establish a connection to this node. When a connection cannot |
771 | retries to establish a connection to this node. When a connection cannot |
763 | be established, gvpe uses exponential back-off capped at this value. It's |
772 | be established, gvpe uses exponential back-off capped at this value. It's |