#############################
## Main options             #
#############################

role bob

## device type tun = ip/ipv6, tap = ethernet
type tun

## Automaticaly configure the interface
## the address hast to be supplied in CIDR notation
ifconfig 192.168.223.2/30

## payload encryption algorithm
#cipher null
#cipher aes-ctr-128
#cipher aes-ctr-192
#cipher aes-ctr-256
cipher aes-ctr

## message authentication algorithm
#auth-algo null
auth-algo sha1

##message auth tag length
#auth-tag-length 10

## Passphrase
## this is used to generate the crypto-key and salt
## this should be al least 30 characters
passphrase Creating_P2P_VPN_Tunnels_With_Anytun_Is_Easy

## local ip address to bind to (for tunnel data)
## (if you run an anycast cluster this has to be the anycast ip address)
#interface <ip-address>

## local port to bind to (for tunnel data)
## make sure to use a different port for every server and client!
port 4445

## The remote host and port
remote-host p2p-a.example.com
remote-port 4445

#############################
## Debug options            #
#############################

## don't run in background
#nodaemonize

## additional log to standard output with a level of 5
#log stdout:5


#############################
## Expert options           #
#############################

## log to syslog with a level of 3
log syslog:3,uanytun-p2p-b,daemon

## change user and group after init
#username uanytun
#groupname uanytun

## chroot to users home directory
#chroot /var/run/uanytun

## key derivation pseudo random function
#kd-prf null
#kd-prf aes-ctr
#kd-prf aes-ctr-128
#kd-prf aes-ctr-192
#kd-prf aes-ctr-256

## Device name
#dev uanytun0

## Manually set encryption key and salt
## (this replaces the passphrase)
#key 0123456789ABCDEF0123456789ABCDEF
#salt 0123456789ABCD0123456789ABCD

## Setting a window size > 0 will enable replay protection
## This most likely will only work with external rekeying
#window-size 0
