Option Name:tcp_outgoing_tos
Replaces:tcp_outgoing_ds, tcp_outgoing_dscp
Requires:
Default Value:none
Suggested Config:

	Allows you to select a TOS/Diffserv value to mark outgoing
	connections with, based on the username or source address
	making the request.

	tcp_outgoing_tos ds-field [!]aclname ...

	Example where normal_service_net uses the TOS value 0x00
	and good_service_net uses 0x20

	acl normal_service_net src 10.0.0.0/255.255.255.0
	acl good_service_net src 10.0.1.0/255.255.255.0
	tcp_outgoing_tos 0x00 normal_service_net
	tcp_outgoing_tos 0x20 good_service_net

	TOS/DSCP values really only have local significance - so you should
	know what you're specifying. For more information, see RFC2474 and
	RFC3260.

	The TOS/DSCP byte must be exactly that - a octet value  0 - 255, or
	"default" to use whatever default your host has. Note that in
	practice often only values 0 - 63 is usable as the two highest bits
	have been redefined for use by ECN (RFC3168).

	Processing proceeds in the order specified, and stops at first fully
	matching line.

	Note: The use of this directive using client dependent ACLs is
	incompatible with the use of server side persistent connections. To
	ensure correct results it is best to set server_persisten_connections
	to off when using this directive in such configurations.