1.1. border --- Network management application¶
1.1.1. Synopsis¶
border [-c <config-file>] [-f] [-g] [-t <directory>] [-u <username>]
border [-h | -V]
1.1.2. Description¶
border is a network management application with a web-based user interface. It also implements a REST API interface that can be used by non-interactive clients.
To access border's web-based user interface, users require a JavaScript-capable web browser that supports modern web standards.
1.1.3. Options¶
- -c <config-file>¶
Use <config-file> as the border configuration file. The default is
/etc/border/border.conf
.
- -f¶
Don't daemonize the border process. Run it in the foreground.
- -g¶
Don't daemonize the border process. Run it in the foreground. Force all logging to standard-error.
- -h¶
Print program usage information and exit.
- -t <directory>¶
chroot(2) to <directory> after processing the command line arguments, but before reading the configuration file.
Note
This option should be used in conjunction with the
-u
option, as chrooting a process running as root doesn't enhance security on most systems; the way chroot(2) is defined allows a process with root privileges to escape a chroot jail.
- -u <username>¶
setuid(2) to user <username> after completing privileged operations, such as creating sockets that listen on privileged ports.
On Linux, border uses the kernel's capability mechanism to drop all root privileges except the ability to bind(2) to a privileged port (
CAP_NET_BIND_SERVICE
) and set process resource limits (CAP_SYS_RESOURCE
).
- -V¶
Print program version and exit.
1.1.4. Files¶
/etc/border/border.conf
The default configuration file. A complete description of border's configuration file is provided in border.conf(5) and in the Border User Manual.
/run/border/border.pid
The default process ID file.
1.1.5. See also¶
border.conf(8)
1.1.6. Copyright¶
Copyright (C) 2025 Banu Systems Private Limited. All rights reserved.
Copyright (c) 2000-2001, 2003-2009, 2011, 2013-2018 Internet Systems Consortium, Inc. ("ISC").