[nat]
# Are we behind NAT?
BEHIND_NAT = NO

# Is the NAT hole-punched?
PUNCHED_NAT = NO

# Enable UPNP by default?
ENABLE_UPNP = NO

# Use addresses from the local network interfaces (inluding loopback, but also others)
USE_LOCALADDR = YES

# Use address obtained from a DNS lookup of our hostname
USE_HOSTNAME = NO

# External IP address of the NAT box (if known); IPv4 dotted-decimal ONLY at this time (should allow DynDNS!)
# normal interface IP address for non-NATed peers; 
# possibly auto-detected (using UPnP) if possible if not specified
# EXTERNAL_ADDRESS = 

# Should we use ICMP-based NAT traversal to try connect to NATed peers
# or, if we are behind NAT, to allow connections to us?
ENABLE_ICMP_CLIENT = NO
ENABLE_ICMP_SERVER = NO

# IP address of the interface connected to the NAT box; IPv4 dotted-decimal ONLY;
# normal interface IP address for non-NATed peers; 
# likely auto-detected (via interface list) if not specified (!)
# INTERNAL_ADDRESS = 

# Disable IPv6 support
DISABLEV6 = NO

# Do we use addresses from localhost address ranges? (::1, 127.0.0.0/8)
RETURN_LOCAL_ADDRESSES = NO

# How often do we query the DNS resolver
# for our hostname (to get our own IP)
HOSTNAME_DNS_FREQUENCY = 20 min

# How often do we iterate over our 
# network interfaces to check for changes
# in our IP address?
IFC_SCAN_FREQUENCY = 15 min

# How often do we query the DNS resolver
# for our hostname (to get our own IP)
DYNDNS_FREQUENCY = 7 min

# SHOULD USE STUN ?
USE_STUN = YES
STUN_FREQUENCY = 5 min
# Default list of stun servers
STUN_SERVERS = stun.gnunet.org stun.services.mozilla.com:3478 stun.ekiga.net:3478


[gnunet-nat-server]
HOSTNAME = gnunet.org
PORT = 5724
NOARMBIND = YES
