You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,6 +173,8 @@ Configuration options:
173
173
* `multiplier`: interval multiplier if reconnect failed, *default:* `1.5`
174
174
* `max_interval`: maximal time client would wait before redialing the server, *default:* `1m`
175
175
* `max_time`: maximal time client would try to reconnect to the server if connection was lost, set `0` to never stop trying, *default:* `15m`
176
+
* `keep_alive`**
177
+
* `interval`: the amount of time to wait between sending keepalive packets, *default:* `25s`
176
178
177
179
## Configuration - Server
178
180
@@ -185,6 +187,7 @@ Configuration options:
185
187
* `tlsKey`: Path to a TLS key file, *default:* `server.key`
186
188
* `rootCA`: Path to the trusted certificate chian used for client certificate authentication, if empty any client certificate is accepted
187
189
* `clients`: Comma-separated list of tunnel client ids, if empty accept all clients
190
+
* `keepAlive`: the amount of time to wait between sending keepalive packets *default:* `45s`
188
191
* `logLevel`: Level of messages to log, 0-3, *default:* 1
189
192
190
193
If both `httpAddr` and `httpsAddr` are configured, an automatic redirect to the secure channel will be established using an `http.StatusMovedPermanently` (301)
Copy file name to clipboardExpand all lines: cmd/tunneld/options.go
+4-1Lines changed: 4 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -48,6 +48,7 @@ type options struct {
48
48
tlsKeystring
49
49
rootCAstring
50
50
clientsstring
51
+
keepAlivestring
51
52
logLevelint
52
53
versionbool
53
54
}
@@ -62,7 +63,8 @@ func parseArgs() *options {
62
63
tlsKey:=flag.String("tlsKey", "server.key", "Path to a TLS key file")
63
64
rootCA:=flag.String("rootCA", "", "Path to the trusted certificate chian used for client certificate authentication, if empty any client certificate is accepted")
64
65
clients:=flag.String("clients", "", "Comma-separated list of tunnel client ids, if empty accept all clients")
65
-
logLevel:=flag.Int("log-level", 1, "Level of messages to log, 0-3")
0 commit comments