| Index | Alphabetical Index |
Option Name: | tcp_outgoing_tos |
---|---|
Replaces: | tcp_outgoing_ds, tcp_outgoing_dscp |
Requires: | |
Default Value: | none |
Suggested Config: |
|
Allows you to select a TOS/Diffserv value to mark outgoing connections with, based on the username or source address making the request. tcp_outgoing_tos ds-field [!]aclname ... Example where normal_service_net uses the TOS value 0x00 and good_service_net uses 0x20 acl normal_service_net src 10.0.0.0/255.255.255.0 acl good_service_net src 10.0.1.0/255.255.255.0 tcp_outgoing_tos 0x00 normal_service_net tcp_outgoing_tos 0x20 good_service_net TOS/DSCP values really only have local significance - so you should know what you're specifying. For more information, see RFC2474 and RFC3260. The TOS/DSCP byte must be exactly that - a octet value 0 - 255, or "default" to use whatever default your host has. Note that in practice often only values 0 - 63 is usable as the two highest bits have been redefined for use by ECN (RFC3168). Processing proceeds in the order specified, and stops at first fully matching line. Note: The use of this directive using client dependent ACLs is incompatible with the use of server side persistent connections. To ensure correct results it is best to set server_persisten_connections to off when using this directive in such configurations. |
|
| Index | Alphabetical Index |