WIP commit moving towards working server support.
[radsecproxy.git] / lib / examples / client.conf
1 realm blocking-udp {
2     type = "UDP"
3     timeout = 2
4     retries = 2
5     server {
6         hostname = "127.0.0.1"
7         service = "1820"
8         secret = "sikrit"
9     }
10 }
11
12 realm testcli-udp {
13     type = "UDP"
14     timeout = 2
15     retries = 2
16     server {
17         hostname = "srv1"
18         service = "4711"
19         secret = "sikrit"
20     }
21 }
22
23 realm blocking-tls {
24     type = "TLS"
25     timeout = 1
26     retries = 3
27     cacertfile = "/home/linus/p/radsecproxy/demoCA/newcerts/01.pem"
28     certfile = "/home/linus/p/radsecproxy/demoCA/newcerts/03.pem"
29     certkeyfile = "/home/linus/p/radsecproxy/demoCA/private/cli1.key"
30     #pskstr = "sikrit psk"
31     #pskhexstr = "deadbeef4711"
32     #pskid = "Client_identity"
33     #pskex = "PSK"
34     server {
35         hostname = "srv1"
36         # test setup: radsecproxy fronting freeradius on 2083
37         service = "2083"
38         # test setup: examples/server on 4711
39         #service = "4711"
40         secret = "sikrit"
41     }
42 }
43
44 realm testcli {
45     type = "TLS"
46     cacertfile = "/home/linus/p/radsecproxy/demoCA/newcerts/01.pem"
47     certfile = "/home/linus/p/radsecproxy/demoCA/newcerts/03.pem"
48     certkeyfile = "/home/linus/p/radsecproxy/demoCA/private/cli1.key"
49     server {
50         hostname = "srv1"
51         service = "4711"
52         secret = "sikrit"
53     }
54 }
55
56 realm dispatching-tls {
57     type = "TLS"
58     cacertfile = "/home/linus/p/radsecproxy/demoCA/newcerts/01.pem"
59     certfile = "/home/linus/p/radsecproxy/demoCA/newcerts/03.pem"
60     certkeyfile = "/home/linus/p/radsecproxy/demoCA/private/cli1.key"
61     server {
62         hostname = "srv1"
63         service = "2083"
64         secret = "sikrit"
65     }
66 }