3 # The name of this server. Often, the FQDN is used here.
6 # Enforce the use of the hostname as the name of the local system for
7 # authentication purposes (overrides the name option).
10 # If no local IP address is given, pppd will use the first IP address
11 # that belongs to the local hostname. If "noipdefault" is given, this
12 # is disabled and the peer will have to supply an IP address.
15 # With this option, pppd will accept the peer's idea of our local IP
16 # address, even if the local IP address was specified in an option.
19 # With this option, pppd will accept the peer's idea of its (remote) IP
20 # address, even if the remote IP address was specified in an option.
23 # Specify which DNS Servers the incoming Win95 or WinNT Connection should use
24 # Two Servers can be remotely configured
28 # Specify which WINS Servers the incoming connection Win95 or WinNT should use
29 #wins-addr 192.168.1.50
30 #wins-addr 192.168.1.51
32 # enable this on a server that already has a permanent default route
35 # Run the executable or shell command specified after pppd has terminated
36 # the link. This script could, for example, issue commands to the modem
37 # to cause it to hang up if hardware modem control signals were not
39 # If mgetty is running, it will reset the modem anyway. So there is no need
41 #disconnect "chat -- \d+++\d\c OK ath0 OK"
43 # Increase debugging level (same as -d). The debug output is written
44 # to syslog LOG_LOCAL2.
47 # Enable debugging code in the kernel-level PPP driver. The argument n
48 # is a number which is the sum of the following values: 1 to enable
49 # general debug messages, 2 to request that the contents of received
50 # packets be printed, and 4 to request that the contents of transmitted
54 # Require the peer to authenticate itself before allowing network
55 # packets to be sent or received.
56 # Please do not disable this setting. It is expected to be standard in
57 # future releases of pppd. Use the call option (see manpage) to disable
58 # authentication for specific peers.
61 # authentication can either be pap or chap. As most people only want to
62 # use pap, you can also disable chap:
66 # Use hardware flow control (i.e. RTS/CTS) to control the flow of data
70 # Specifies that pppd should use a UUCP-style lock on the serial device
71 # to ensure exclusive access to the device.
74 # Use the modem control lines.
77 # async character map -- 32-bit hex; each bit is a character
78 # that needs to be escaped for pppd to receive it. 0x00000001
79 # represents '\x01', and 0x80000000 represents '\x1f'.
80 # To allow pppd to work over a rlogin/telnet connection, ou should escape
81 # XON (^Q), XOFF (^S) and ^]: (The peer should use "escape ff".)
85 # Specifies that certain characters should be escaped on transmission
86 # (regardless of whether the peer requests them to be escaped with its
87 # async control character map). The characters to be escaped are
88 # specified as a list of hex numbers separated by commas. Note that
89 # almost any character can be specified for the escape option, unlike
90 # the asyncmap option which only allows control characters to be
91 # specified. The characters which may not be escaped are those with hex
92 # values 0x20 - 0x3f or 0x5e.
95 # Set the MRU [Maximum Receive Unit] value to <n> for negotiation. pppd
96 # will ask the peer to send packets of no more than <n> bytes. The
97 # minimum MRU value is 128. The default MRU value is 1500. A value of
98 # 296 is recommended for slow links (40 bytes for TCP/IP header + 256
102 # Set the MTU [Maximum Transmit Unit] value to <n>. Unless the peer
103 # requests a smaller value via MRU negotiation, pppd will request that
104 # the kernel networking code send data packets of no more than n bytes
105 # through the PPP network interface.
108 # Set the interface netmask to <n>, a 32 bit netmask in "decimal dot"
109 # notation (e.g. 255.255.255.0).
110 #netmask 255.255.255.0
112 # Don't fork to become a background process (otherwise pppd will do so
113 # if a serial device is specified).
116 # Set the assumed name of the remote system for authentication purposes
120 # Add an entry to this system's ARP [Address Resolution Protocol]
121 # table with the IP address of the peer and the Ethernet address of this
122 # system. {proxyarp,noproxyarp}
125 # Use the system password database for authenticating the peer using
126 # PAP. Note: mgetty already provides this option. If this is specified
127 # then dialin from users using a script under Linux to fire up ppp wont work.
130 # If this option is given, pppd will send an LCP echo-request frame to
131 # the peer every n seconds. Under Linux, the echo-request is sent when
132 # no packets have been received from the peer for n seconds. Normally
133 # the peer should respond to the echo-request by sending an echo-reply.
134 # This option can be used with the lcp-echo-failure option to detect
135 # that the peer is no longer connected.
138 # If this option is given, pppd will presume the peer to be dead if n
139 # LCP echo-requests are sent without receiving a valid LCP echo-reply.
140 # If this happens, pppd will terminate the connection. Use of this
141 # option requires a non-zero value for the lcp-echo-interval parameter.
142 # This option can be used to enable pppd to terminate after the physical
143 # connection has been broken (e.g., the modem has hung up) in
144 # situations where no hardware modem control lines are available.
147 # Specifies that pppd should disconnect if the link is idle for n seconds.
150 # Disable the IPXCP and IPX protocols.
153 # ---<End of File>---