Lines Matching refs:control

34 	# printed from unbound-control. default off, because of speed.
191 # define a number of tags here, use with local-zone, access-control.
232 # Use systemd socket activation for UDP, TCP, and control sockets.
239 # control which clients are allowed to make (recursive) queries
247 # access-control: 0.0.0.0/0 refuse
248 # access-control: 127.0.0.0/8 allow
249 # access-control: ::0/0 refuse
250 # access-control: ::1 allow
251 # access-control: ::ffff:127.0.0.1 allow
253 # tag access-control with list of tags (in "" with spaces between)
254 # Clients using this access control element use localzones that
256 # access-control-tag: 192.0.2.0/24 "tag2 tag3"
258 # set action for particular tag for given access control element
260 # is the first tag match between access-control-tag and local-zone-tag
262 # access-control-tag-action: 192.0.2.0/24 tag3 refuse
264 # set redirect data for particular tag for access control element
265 # access-control-tag-data: 192.0.2.0/24 tag2 "A 127.0.0.1"
267 # Set view for access control element
268 # access-control-view: 192.0.2.0/24 viewname
737 # Default is no. Can be turned on and off with unbound-control.
803 # enabled/disabled via remote-control(below).
837 # Remote control config section.
838 remote-control:
839 # Enable remote control with unbound-control(8) here.
840 # set up the keys and certificates with unbound-control-setup.
841 # control-enable: no
843 # what interfaces are listened to for remote control.
847 # control-interface: 127.0.0.1
848 # control-interface: ::1
850 # port number for remote control operations.
851 # control-port: 8953
855 # control-use-cert: "yes"
863 # unbound-control key file.
864 # control-key-file: "/var/unbound/unbound_control.key"
866 # unbound-control certificate file.
867 # control-cert-file: "/var/unbound/unbound_control.pem"
943 # the access-control-view option. Views can contain zero or more local-zone