1/proc/sys/net/ipv4/* Variables: 2 3ip_forward - BOOLEAN 4 0 - disabled (default) 5 not 0 - enabled 6 7 Forward Packets between interfaces. 8 9 This variable is special, its change resets all configuration 10 parameters to their default state (RFC1122 for hosts, RFC1812 11 for routers) 12 13ip_default_ttl - INTEGER 14 Default value of TTL field (Time To Live) for outgoing (but not 15 forwarded) IP packets. Should be between 1 and 255 inclusive. 16 Default: 64 (as recommended by RFC1700) 17 18ip_no_pmtu_disc - BOOLEAN 19 Disable Path MTU Discovery. 20 default FALSE 21 22min_pmtu - INTEGER 23 default 552 - minimum discovered Path MTU 24 25fwmark_reflect - BOOLEAN 26 Controls the fwmark of kernel-generated IPv4 reply packets that are not 27 associated with a socket for example, TCP RSTs or ICMP echo replies). 28 If unset, these packets have a fwmark of zero. If set, they have the 29 fwmark of the packet they are replying to. 30 Default: 0 31 32route/max_size - INTEGER 33 Maximum number of routes allowed in the kernel. Increase 34 this when using large numbers of interfaces and/or routes. 35 36neigh/default/gc_thresh3 - INTEGER 37 Maximum number of neighbor entries allowed. Increase this 38 when using large numbers of interfaces and when communicating 39 with large numbers of directly-connected peers. 40 41neigh/default/unres_qlen_bytes - INTEGER 42 The maximum number of bytes which may be used by packets 43 queued for each unresolved address by other network layers. 44 (added in linux 3.3) 45 46neigh/default/unres_qlen - INTEGER 47 The maximum number of packets which may be queued for each 48 unresolved address by other network layers. 49 (deprecated in linux 3.3) : use unres_qlen_bytes instead. 50 51mtu_expires - INTEGER 52 Time, in seconds, that cached PMTU information is kept. 53 54min_adv_mss - INTEGER 55 The advertised MSS depends on the first hop route MTU, but will 56 never be lower than this setting. 57 58rt_cache_rebuild_count - INTEGER 59 The per net-namespace route cache emergency rebuild threshold. 60 Any net-namespace having its route cache rebuilt due to 61 a hash bucket chain being too long more than this many times 62 will have its route caching disabled 63 64IP Fragmentation: 65 66ipfrag_high_thresh - INTEGER 67 Maximum memory used to reassemble IP fragments. When 68 ipfrag_high_thresh bytes of memory is allocated for this purpose, 69 the fragment handler will toss packets until ipfrag_low_thresh 70 is reached. 71 72ipfrag_low_thresh - INTEGER 73 See ipfrag_high_thresh 74 75ipfrag_time - INTEGER 76 Time in seconds to keep an IP fragment in memory. 77 78ipfrag_secret_interval - INTEGER 79 Regeneration interval (in seconds) of the hash secret (or lifetime 80 for the hash secret) for IP fragments. 81 Default: 600 82 83ipfrag_max_dist - INTEGER 84 ipfrag_max_dist is a non-negative integer value which defines the 85 maximum "disorder" which is allowed among fragments which share a 86 common IP source address. Note that reordering of packets is 87 not unusual, but if a large number of fragments arrive from a source 88 IP address while a particular fragment queue remains incomplete, it 89 probably indicates that one or more fragments belonging to that queue 90 have been lost. When ipfrag_max_dist is positive, an additional check 91 is done on fragments before they are added to a reassembly queue - if 92 ipfrag_max_dist (or more) fragments have arrived from a particular IP 93 address between additions to any IP fragment queue using that source 94 address, it's presumed that one or more fragments in the queue are 95 lost. The existing fragment queue will be dropped, and a new one 96 started. An ipfrag_max_dist value of zero disables this check. 97 98 Using a very small value, e.g. 1 or 2, for ipfrag_max_dist can 99 result in unnecessarily dropping fragment queues when normal 100 reordering of packets occurs, which could lead to poor application 101 performance. Using a very large value, e.g. 50000, increases the 102 likelihood of incorrectly reassembling IP fragments that originate 103 from different IP datagrams, which could result in data corruption. 104 Default: 64 105 106INET peer storage: 107 108inet_peer_threshold - INTEGER 109 The approximate size of the storage. Starting from this threshold 110 entries will be thrown aggressively. This threshold also determines 111 entries' time-to-live and time intervals between garbage collection 112 passes. More entries, less time-to-live, less GC interval. 113 114inet_peer_minttl - INTEGER 115 Minimum time-to-live of entries. Should be enough to cover fragment 116 time-to-live on the reassembling side. This minimum time-to-live is 117 guaranteed if the pool size is less than inet_peer_threshold. 118 Measured in seconds. 119 120inet_peer_maxttl - INTEGER 121 Maximum time-to-live of entries. Unused entries will expire after 122 this period of time if there is no memory pressure on the pool (i.e. 123 when the number of entries in the pool is very small). 124 Measured in seconds. 125 126TCP variables: 127 128somaxconn - INTEGER 129 Limit of socket listen() backlog, known in userspace as SOMAXCONN. 130 Defaults to 128. See also tcp_max_syn_backlog for additional tuning 131 for TCP sockets. 132 133tcp_abc - INTEGER 134 Controls Appropriate Byte Count (ABC) defined in RFC3465. 135 ABC is a way of increasing congestion window (cwnd) more slowly 136 in response to partial acknowledgments. 137 Possible values are: 138 0 increase cwnd once per acknowledgment (no ABC) 139 1 increase cwnd once per acknowledgment of full sized segment 140 2 allow increase cwnd by two if acknowledgment is 141 of two segments to compensate for delayed acknowledgments. 142 Default: 0 (off) 143 144tcp_abort_on_overflow - BOOLEAN 145 If listening service is too slow to accept new connections, 146 reset them. Default state is FALSE. It means that if overflow 147 occurred due to a burst, connection will recover. Enable this 148 option _only_ if you are really sure that listening daemon 149 cannot be tuned to accept connections faster. Enabling this 150 option can harm clients of your server. 151 152tcp_adv_win_scale - INTEGER 153 Count buffering overhead as bytes/2^tcp_adv_win_scale 154 (if tcp_adv_win_scale > 0) or bytes-bytes/2^(-tcp_adv_win_scale), 155 if it is <= 0. 156 Possible values are [-31, 31], inclusive. 157 Default: 1 158 159tcp_allowed_congestion_control - STRING 160 Show/set the congestion control choices available to non-privileged 161 processes. The list is a subset of those listed in 162 tcp_available_congestion_control. 163 Default is "reno" and the default setting (tcp_congestion_control). 164 165tcp_app_win - INTEGER 166 Reserve max(window/2^tcp_app_win, mss) of window for application 167 buffer. Value 0 is special, it means that nothing is reserved. 168 Default: 31 169 170tcp_available_congestion_control - STRING 171 Shows the available congestion control choices that are registered. 172 More congestion control algorithms may be available as modules, 173 but not loaded. 174 175tcp_base_mss - INTEGER 176 The initial value of search_low to be used by the packetization layer 177 Path MTU discovery (MTU probing). If MTU probing is enabled, 178 this is the initial MSS used by the connection. 179 180tcp_congestion_control - STRING 181 Set the congestion control algorithm to be used for new 182 connections. The algorithm "reno" is always available, but 183 additional choices may be available based on kernel configuration. 184 Default is set as part of kernel configuration. 185 For passive connections, the listener congestion control choice 186 is inherited. 187 [see setsockopt(listenfd, SOL_TCP, TCP_CONGESTION, "name" ...) ] 188 189tcp_cookie_size - INTEGER 190 Default size of TCP Cookie Transactions (TCPCT) option, that may be 191 overridden on a per socket basis by the TCPCT socket option. 192 Values greater than the maximum (16) are interpreted as the maximum. 193 Values greater than zero and less than the minimum (8) are interpreted 194 as the minimum. Odd values are interpreted as the next even value. 195 Default: 0 (off). 196 197tcp_dsack - BOOLEAN 198 Allows TCP to send "duplicate" SACKs. 199 200tcp_ecn - INTEGER 201 Enable Explicit Congestion Notification (ECN) in TCP. ECN is only 202 used when both ends of the TCP flow support it. It is useful to 203 avoid losses due to congestion (when the bottleneck router supports 204 ECN). 205 Possible values are: 206 0 disable ECN 207 1 ECN enabled 208 2 Only server-side ECN enabled. If the other end does 209 not support ECN, behavior is like with ECN disabled. 210 Default: 2 211 212tcp_fack - BOOLEAN 213 Enable FACK congestion avoidance and fast retransmission. 214 The value is not used, if tcp_sack is not enabled. 215 216tcp_fin_timeout - INTEGER 217 Time to hold socket in state FIN-WAIT-2, if it was closed 218 by our side. Peer can be broken and never close its side, 219 or even died unexpectedly. Default value is 60sec. 220 Usual value used in 2.2 was 180 seconds, you may restore 221 it, but remember that if your machine is even underloaded WEB server, 222 you risk to overflow memory with kilotons of dead sockets, 223 FIN-WAIT-2 sockets are less dangerous than FIN-WAIT-1, 224 because they eat maximum 1.5K of memory, but they tend 225 to live longer. Cf. tcp_max_orphans. 226 227tcp_frto - INTEGER 228 Enables Forward RTO-Recovery (F-RTO) defined in RFC4138. 229 F-RTO is an enhanced recovery algorithm for TCP retransmission 230 timeouts. It is particularly beneficial in wireless environments 231 where packet loss is typically due to random radio interference 232 rather than intermediate router congestion. F-RTO is sender-side 233 only modification. Therefore it does not require any support from 234 the peer. 235 236 If set to 1, basic version is enabled. 2 enables SACK enhanced 237 F-RTO if flow uses SACK. The basic version can be used also when 238 SACK is in use though scenario(s) with it exists where F-RTO 239 interacts badly with the packet counting of the SACK enabled TCP 240 flow. 241 242tcp_frto_response - INTEGER 243 When F-RTO has detected that a TCP retransmission timeout was 244 spurious (i.e, the timeout would have been avoided had TCP set a 245 longer retransmission timeout), TCP has several options what to do 246 next. Possible values are: 247 0 Rate halving based; a smooth and conservative response, 248 results in halved cwnd and ssthresh after one RTT 249 1 Very conservative response; not recommended because even 250 though being valid, it interacts poorly with the rest of 251 Linux TCP, halves cwnd and ssthresh immediately 252 2 Aggressive response; undoes congestion control measures 253 that are now known to be unnecessary (ignoring the 254 possibility of a lost retransmission that would require 255 TCP to be more cautious), cwnd and ssthresh are restored 256 to the values prior timeout 257 Default: 0 (rate halving based) 258 259tcp_keepalive_time - INTEGER 260 How often TCP sends out keepalive messages when keepalive is enabled. 261 Default: 2hours. 262 263tcp_keepalive_probes - INTEGER 264 How many keepalive probes TCP sends out, until it decides that the 265 connection is broken. Default value: 9. 266 267tcp_keepalive_intvl - INTEGER 268 How frequently the probes are send out. Multiplied by 269 tcp_keepalive_probes it is time to kill not responding connection, 270 after probes started. Default value: 75sec i.e. connection 271 will be aborted after ~11 minutes of retries. 272 273tcp_low_latency - BOOLEAN 274 If set, the TCP stack makes decisions that prefer lower 275 latency as opposed to higher throughput. By default, this 276 option is not set meaning that higher throughput is preferred. 277 An example of an application where this default should be 278 changed would be a Beowulf compute cluster. 279 Default: 0 280 281tcp_max_orphans - INTEGER 282 Maximal number of TCP sockets not attached to any user file handle, 283 held by system. If this number is exceeded orphaned connections are 284 reset immediately and warning is printed. This limit exists 285 only to prevent simple DoS attacks, you _must_ not rely on this 286 or lower the limit artificially, but rather increase it 287 (probably, after increasing installed memory), 288 if network conditions require more than default value, 289 and tune network services to linger and kill such states 290 more aggressively. Let me to remind again: each orphan eats 291 up to ~64K of unswappable memory. 292 293tcp_max_ssthresh - INTEGER 294 Limited Slow-Start for TCP with large congestion windows (cwnd) defined in 295 RFC3742. Limited slow-start is a mechanism to limit growth of the cwnd 296 on the region where cwnd is larger than tcp_max_ssthresh. TCP increases cwnd 297 by at most tcp_max_ssthresh segments, and by at least tcp_max_ssthresh/2 298 segments per RTT when the cwnd is above tcp_max_ssthresh. 299 If TCP connection increased cwnd to thousands (or tens of thousands) segments, 300 and thousands of packets were being dropped during slow-start, you can set 301 tcp_max_ssthresh to improve performance for new TCP connection. 302 Default: 0 (off) 303 304tcp_max_syn_backlog - INTEGER 305 Maximal number of remembered connection requests, which have not 306 received an acknowledgment from connecting client. 307 The minimal value is 128 for low memory machines, and it will 308 increase in proportion to the memory of machine. 309 If server suffers from overload, try increasing this number. 310 311tcp_max_tw_buckets - INTEGER 312 Maximal number of timewait sockets held by system simultaneously. 313 If this number is exceeded time-wait socket is immediately destroyed 314 and warning is printed. This limit exists only to prevent 315 simple DoS attacks, you _must_ not lower the limit artificially, 316 but rather increase it (probably, after increasing installed memory), 317 if network conditions require more than default value. 318 319tcp_mem - vector of 3 INTEGERs: min, pressure, max 320 min: below this number of pages TCP is not bothered about its 321 memory appetite. 322 323 pressure: when amount of memory allocated by TCP exceeds this number 324 of pages, TCP moderates its memory consumption and enters memory 325 pressure mode, which is exited when memory consumption falls 326 under "min". 327 328 max: number of pages allowed for queueing by all TCP sockets. 329 330 Defaults are calculated at boot time from amount of available 331 memory. 332 333tcp_moderate_rcvbuf - BOOLEAN 334 If set, TCP performs receive buffer auto-tuning, attempting to 335 automatically size the buffer (no greater than tcp_rmem[2]) to 336 match the size required by the path for full throughput. Enabled by 337 default. 338 339tcp_mtu_probing - INTEGER 340 Controls TCP Packetization-Layer Path MTU Discovery. Takes three 341 values: 342 0 - Disabled 343 1 - Disabled by default, enabled when an ICMP black hole detected 344 2 - Always enabled, use initial MSS of tcp_base_mss. 345 346tcp_no_metrics_save - BOOLEAN 347 By default, TCP saves various connection metrics in the route cache 348 when the connection closes, so that connections established in the 349 near future can use these to set initial conditions. Usually, this 350 increases overall performance, but may sometimes cause performance 351 degradation. If set, TCP will not cache metrics on closing 352 connections. 353 354tcp_orphan_retries - INTEGER 355 This value influences the timeout of a locally closed TCP connection, 356 when RTO retransmissions remain unacknowledged. 357 See tcp_retries2 for more details. 358 359 The default value is 8. 360 If your machine is a loaded WEB server, 361 you should think about lowering this value, such sockets 362 may consume significant resources. Cf. tcp_max_orphans. 363 364tcp_reordering - INTEGER 365 Maximal reordering of packets in a TCP stream. 366 Default: 3 367 368tcp_retrans_collapse - BOOLEAN 369 Bug-to-bug compatibility with some broken printers. 370 On retransmit try to send bigger packets to work around bugs in 371 certain TCP stacks. 372 373tcp_retries1 - INTEGER 374 This value influences the time, after which TCP decides, that 375 something is wrong due to unacknowledged RTO retransmissions, 376 and reports this suspicion to the network layer. 377 See tcp_retries2 for more details. 378 379 RFC 1122 recommends at least 3 retransmissions, which is the 380 default. 381 382tcp_retries2 - INTEGER 383 This value influences the timeout of an alive TCP connection, 384 when RTO retransmissions remain unacknowledged. 385 Given a value of N, a hypothetical TCP connection following 386 exponential backoff with an initial RTO of TCP_RTO_MIN would 387 retransmit N times before killing the connection at the (N+1)th RTO. 388 389 The default value of 15 yields a hypothetical timeout of 924.6 390 seconds and is a lower bound for the effective timeout. 391 TCP will effectively time out at the first RTO which exceeds the 392 hypothetical timeout. 393 394 RFC 1122 recommends at least 100 seconds for the timeout, 395 which corresponds to a value of at least 8. 396 397tcp_rfc1337 - BOOLEAN 398 If set, the TCP stack behaves conforming to RFC1337. If unset, 399 we are not conforming to RFC, but prevent TCP TIME_WAIT 400 assassination. 401 Default: 0 402 403tcp_rmem - vector of 3 INTEGERs: min, default, max 404 min: Minimal size of receive buffer used by TCP sockets. 405 It is guaranteed to each TCP socket, even under moderate memory 406 pressure. 407 Default: 1 page 408 409 default: initial size of receive buffer used by TCP sockets. 410 This value overrides net.core.rmem_default used by other protocols. 411 Default: 87380 bytes. This value results in window of 65535 with 412 default setting of tcp_adv_win_scale and tcp_app_win:0 and a bit 413 less for default tcp_app_win. See below about these variables. 414 415 max: maximal size of receive buffer allowed for automatically 416 selected receiver buffers for TCP socket. This value does not override 417 net.core.rmem_max. Calling setsockopt() with SO_RCVBUF disables 418 automatic tuning of that socket's receive buffer size, in which 419 case this value is ignored. 420 Default: between 87380B and 6MB, depending on RAM size. 421 422tcp_sack - BOOLEAN 423 Enable select acknowledgments (SACKS). 424 425tcp_slow_start_after_idle - BOOLEAN 426 If set, provide RFC2861 behavior and time out the congestion 427 window after an idle period. An idle period is defined at 428 the current RTO. If unset, the congestion window will not 429 be timed out after an idle period. 430 Default: 1 431 432tcp_stdurg - BOOLEAN 433 Use the Host requirements interpretation of the TCP urgent pointer field. 434 Most hosts use the older BSD interpretation, so if you turn this on 435 Linux might not communicate correctly with them. 436 Default: FALSE 437 438tcp_synack_retries - INTEGER 439 Number of times SYNACKs for a passive TCP connection attempt will 440 be retransmitted. Should not be higher than 255. Default value 441 is 5, which corresponds to ~180seconds. 442 443tcp_syncookies - BOOLEAN 444 Only valid when the kernel was compiled with CONFIG_SYNCOOKIES 445 Send out syncookies when the syn backlog queue of a socket 446 overflows. This is to prevent against the common 'SYN flood attack' 447 Default: FALSE 448 449 Note, that syncookies is fallback facility. 450 It MUST NOT be used to help highly loaded servers to stand 451 against legal connection rate. If you see SYN flood warnings 452 in your logs, but investigation shows that they occur 453 because of overload with legal connections, you should tune 454 another parameters until this warning disappear. 455 See: tcp_max_syn_backlog, tcp_synack_retries, tcp_abort_on_overflow. 456 457 syncookies seriously violate TCP protocol, do not allow 458 to use TCP extensions, can result in serious degradation 459 of some services (f.e. SMTP relaying), visible not by you, 460 but your clients and relays, contacting you. While you see 461 SYN flood warnings in logs not being really flooded, your server 462 is seriously misconfigured. 463 464tcp_syn_retries - INTEGER 465 Number of times initial SYNs for an active TCP connection attempt 466 will be retransmitted. Should not be higher than 255. Default value 467 is 5, which corresponds to ~180seconds. 468 469tcp_timestamps - BOOLEAN 470 Enable timestamps as defined in RFC1323. 471 472tcp_tso_win_divisor - INTEGER 473 This allows control over what percentage of the congestion window 474 can be consumed by a single TSO frame. 475 The setting of this parameter is a choice between burstiness and 476 building larger TSO frames. 477 Default: 3 478 479tcp_tw_recycle - BOOLEAN 480 Enable fast recycling TIME-WAIT sockets. Default value is 0. 481 It should not be changed without advice/request of technical 482 experts. 483 484tcp_tw_reuse - BOOLEAN 485 Allow to reuse TIME-WAIT sockets for new connections when it is 486 safe from protocol viewpoint. Default value is 0. 487 It should not be changed without advice/request of technical 488 experts. 489 490tcp_window_scaling - BOOLEAN 491 Enable window scaling as defined in RFC1323. 492 493tcp_wmem - vector of 3 INTEGERs: min, default, max 494 min: Amount of memory reserved for send buffers for TCP sockets. 495 Each TCP socket has rights to use it due to fact of its birth. 496 Default: 1 page 497 498 default: initial size of send buffer used by TCP sockets. This 499 value overrides net.core.wmem_default used by other protocols. 500 It is usually lower than net.core.wmem_default. 501 Default: 16K 502 503 max: Maximal amount of memory allowed for automatically tuned 504 send buffers for TCP sockets. This value does not override 505 net.core.wmem_max. Calling setsockopt() with SO_SNDBUF disables 506 automatic tuning of that socket's send buffer size, in which case 507 this value is ignored. 508 Default: between 64K and 4MB, depending on RAM size. 509 510tcp_workaround_signed_windows - BOOLEAN 511 If set, assume no receipt of a window scaling option means the 512 remote TCP is broken and treats the window as a signed quantity. 513 If unset, assume the remote TCP is not broken even if we do 514 not receive a window scaling option from them. 515 Default: 0 516 517tcp_dma_copybreak - INTEGER 518 Lower limit, in bytes, of the size of socket reads that will be 519 offloaded to a DMA copy engine, if one is present in the system 520 and CONFIG_NET_DMA is enabled. 521 Default: 4096 522 523tcp_thin_linear_timeouts - BOOLEAN 524 Enable dynamic triggering of linear timeouts for thin streams. 525 If set, a check is performed upon retransmission by timeout to 526 determine if the stream is thin (less than 4 packets in flight). 527 As long as the stream is found to be thin, up to 6 linear 528 timeouts may be performed before exponential backoff mode is 529 initiated. This improves retransmission latency for 530 non-aggressive thin streams, often found to be time-dependent. 531 For more information on thin streams, see 532 Documentation/networking/tcp-thin.txt 533 Default: 0 534 535tcp_thin_dupack - BOOLEAN 536 Enable dynamic triggering of retransmissions after one dupACK 537 for thin streams. If set, a check is performed upon reception 538 of a dupACK to determine if the stream is thin (less than 4 539 packets in flight). As long as the stream is found to be thin, 540 data is retransmitted on the first received dupACK. This 541 improves retransmission latency for non-aggressive thin 542 streams, often found to be time-dependent. 543 For more information on thin streams, see 544 Documentation/networking/tcp-thin.txt 545 Default: 0 546 547tcp_challenge_ack_limit - INTEGER 548 Limits number of Challenge ACK sent per second, as recommended 549 in RFC 5961 (Improving TCP's Robustness to Blind In-Window Attacks) 550 Default: 100 551 552UDP variables: 553 554udp_mem - vector of 3 INTEGERs: min, pressure, max 555 Number of pages allowed for queueing by all UDP sockets. 556 557 min: Below this number of pages UDP is not bothered about its 558 memory appetite. When amount of memory allocated by UDP exceeds 559 this number, UDP starts to moderate memory usage. 560 561 pressure: This value was introduced to follow format of tcp_mem. 562 563 max: Number of pages allowed for queueing by all UDP sockets. 564 565 Default is calculated at boot time from amount of available memory. 566 567udp_rmem_min - INTEGER 568 Minimal size of receive buffer used by UDP sockets in moderation. 569 Each UDP socket is able to use the size for receiving data, even if 570 total pages of UDP sockets exceed udp_mem pressure. The unit is byte. 571 Default: 1 page 572 573udp_wmem_min - INTEGER 574 Minimal size of send buffer used by UDP sockets in moderation. 575 Each UDP socket is able to use the size for sending data, even if 576 total pages of UDP sockets exceed udp_mem pressure. The unit is byte. 577 Default: 1 page 578 579CIPSOv4 Variables: 580 581cipso_cache_enable - BOOLEAN 582 If set, enable additions to and lookups from the CIPSO label mapping 583 cache. If unset, additions are ignored and lookups always result in a 584 miss. However, regardless of the setting the cache is still 585 invalidated when required when means you can safely toggle this on and 586 off and the cache will always be "safe". 587 Default: 1 588 589cipso_cache_bucket_size - INTEGER 590 The CIPSO label cache consists of a fixed size hash table with each 591 hash bucket containing a number of cache entries. This variable limits 592 the number of entries in each hash bucket; the larger the value the 593 more CIPSO label mappings that can be cached. When the number of 594 entries in a given hash bucket reaches this limit adding new entries 595 causes the oldest entry in the bucket to be removed to make room. 596 Default: 10 597 598cipso_rbm_optfmt - BOOLEAN 599 Enable the "Optimized Tag 1 Format" as defined in section 3.4.2.6 of 600 the CIPSO draft specification (see Documentation/netlabel for details). 601 This means that when set the CIPSO tag will be padded with empty 602 categories in order to make the packet data 32-bit aligned. 603 Default: 0 604 605cipso_rbm_structvalid - BOOLEAN 606 If set, do a very strict check of the CIPSO option when 607 ip_options_compile() is called. If unset, relax the checks done during 608 ip_options_compile(). Either way is "safe" as errors are caught else 609 where in the CIPSO processing code but setting this to 0 (False) should 610 result in less work (i.e. it should be faster) but could cause problems 611 with other implementations that require strict checking. 612 Default: 0 613 614IP Variables: 615 616ip_local_port_range - 2 INTEGERS 617 Defines the local port range that is used by TCP and UDP to 618 choose the local port. The first number is the first, the 619 second the last local port number. The default values are 620 32768 and 61000 respectively. 621 622ip_local_reserved_ports - list of comma separated ranges 623 Specify the ports which are reserved for known third-party 624 applications. These ports will not be used by automatic port 625 assignments (e.g. when calling connect() or bind() with port 626 number 0). Explicit port allocation behavior is unchanged. 627 628 The format used for both input and output is a comma separated 629 list of ranges (e.g. "1,2-4,10-10" for ports 1, 2, 3, 4 and 630 10). Writing to the file will clear all previously reserved 631 ports and update the current list with the one given in the 632 input. 633 634 Note that ip_local_port_range and ip_local_reserved_ports 635 settings are independent and both are considered by the kernel 636 when determining which ports are available for automatic port 637 assignments. 638 639 You can reserve ports which are not in the current 640 ip_local_port_range, e.g.: 641 642 $ cat /proc/sys/net/ipv4/ip_local_port_range 643 32000 61000 644 $ cat /proc/sys/net/ipv4/ip_local_reserved_ports 645 8080,9148 646 647 although this is redundant. However such a setting is useful 648 if later the port range is changed to a value that will 649 include the reserved ports. 650 651 Default: Empty 652 653ip_nonlocal_bind - BOOLEAN 654 If set, allows processes to bind() to non-local IP addresses, 655 which can be quite useful - but may break some applications. 656 Default: 0 657 658ip_dynaddr - BOOLEAN 659 If set non-zero, enables support for dynamic addresses. 660 If set to a non-zero value larger than 1, a kernel log 661 message will be printed when dynamic address rewriting 662 occurs. 663 Default: 0 664 665icmp_echo_ignore_all - BOOLEAN 666 If set non-zero, then the kernel will ignore all ICMP ECHO 667 requests sent to it. 668 Default: 0 669 670icmp_echo_ignore_broadcasts - BOOLEAN 671 If set non-zero, then the kernel will ignore all ICMP ECHO and 672 TIMESTAMP requests sent to it via broadcast/multicast. 673 Default: 1 674 675icmp_ratelimit - INTEGER 676 Limit the maximal rates for sending ICMP packets whose type matches 677 icmp_ratemask (see below) to specific targets. 678 0 to disable any limiting, 679 otherwise the minimal space between responses in milliseconds. 680 Default: 1000 681 682icmp_ratemask - INTEGER 683 Mask made of ICMP types for which rates are being limited. 684 Significant bits: IHGFEDCBA9876543210 685 Default mask: 0000001100000011000 (6168) 686 687 Bit definitions (see include/linux/icmp.h): 688 0 Echo Reply 689 3 Destination Unreachable * 690 4 Source Quench * 691 5 Redirect 692 8 Echo Request 693 B Time Exceeded * 694 C Parameter Problem * 695 D Timestamp Request 696 E Timestamp Reply 697 F Info Request 698 G Info Reply 699 H Address Mask Request 700 I Address Mask Reply 701 702 * These are rate limited by default (see default mask above) 703 704icmp_ignore_bogus_error_responses - BOOLEAN 705 Some routers violate RFC1122 by sending bogus responses to broadcast 706 frames. Such violations are normally logged via a kernel warning. 707 If this is set to TRUE, the kernel will not give such warnings, which 708 will avoid log file clutter. 709 Default: FALSE 710 711icmp_errors_use_inbound_ifaddr - BOOLEAN 712 713 If zero, icmp error messages are sent with the primary address of 714 the exiting interface. 715 716 If non-zero, the message will be sent with the primary address of 717 the interface that received the packet that caused the icmp error. 718 This is the behaviour network many administrators will expect from 719 a router. And it can make debugging complicated network layouts 720 much easier. 721 722 Note that if no primary address exists for the interface selected, 723 then the primary address of the first non-loopback interface that 724 has one will be used regardless of this setting. 725 726 Default: 0 727 728igmp_max_memberships - INTEGER 729 Change the maximum number of multicast groups we can subscribe to. 730 Default: 20 731 732 Theoretical maximum value is bounded by having to send a membership 733 report in a single datagram (i.e. the report can't span multiple 734 datagrams, or risk confusing the switch and leaving groups you don't 735 intend to). 736 737 The number of supported groups 'M' is bounded by the number of group 738 report entries you can fit into a single datagram of 65535 bytes. 739 740 M = 65536-sizeof (ip header)/(sizeof(Group record)) 741 742 Group records are variable length, with a minimum of 12 bytes. 743 So net.ipv4.igmp_max_memberships should not be set higher than: 744 745 (65536-24) / 12 = 5459 746 747 The value 5459 assumes no IP header options, so in practice 748 this number may be lower. 749 750 conf/interface/* changes special settings per interface (where 751 "interface" is the name of your network interface) 752 753 conf/all/* is special, changes the settings for all interfaces 754 755log_martians - BOOLEAN 756 Log packets with impossible addresses to kernel log. 757 log_martians for the interface will be enabled if at least one of 758 conf/{all,interface}/log_martians is set to TRUE, 759 it will be disabled otherwise 760 761accept_redirects - BOOLEAN 762 Accept ICMP redirect messages. 763 accept_redirects for the interface will be enabled if: 764 - both conf/{all,interface}/accept_redirects are TRUE in the case 765 forwarding for the interface is enabled 766 or 767 - at least one of conf/{all,interface}/accept_redirects is TRUE in the 768 case forwarding for the interface is disabled 769 accept_redirects for the interface will be disabled otherwise 770 default TRUE (host) 771 FALSE (router) 772 773forwarding - BOOLEAN 774 Enable IP forwarding on this interface. 775 776mc_forwarding - BOOLEAN 777 Do multicast routing. The kernel needs to be compiled with CONFIG_MROUTE 778 and a multicast routing daemon is required. 779 conf/all/mc_forwarding must also be set to TRUE to enable multicast 780 routing for the interface 781 782medium_id - INTEGER 783 Integer value used to differentiate the devices by the medium they 784 are attached to. Two devices can have different id values when 785 the broadcast packets are received only on one of them. 786 The default value 0 means that the device is the only interface 787 to its medium, value of -1 means that medium is not known. 788 789 Currently, it is used to change the proxy_arp behavior: 790 the proxy_arp feature is enabled for packets forwarded between 791 two devices attached to different media. 792 793proxy_arp - BOOLEAN 794 Do proxy arp. 795 proxy_arp for the interface will be enabled if at least one of 796 conf/{all,interface}/proxy_arp is set to TRUE, 797 it will be disabled otherwise 798 799proxy_arp_pvlan - BOOLEAN 800 Private VLAN proxy arp. 801 Basically allow proxy arp replies back to the same interface 802 (from which the ARP request/solicitation was received). 803 804 This is done to support (ethernet) switch features, like RFC 805 3069, where the individual ports are NOT allowed to 806 communicate with each other, but they are allowed to talk to 807 the upstream router. As described in RFC 3069, it is possible 808 to allow these hosts to communicate through the upstream 809 router by proxy_arp'ing. Don't need to be used together with 810 proxy_arp. 811 812 This technology is known by different names: 813 In RFC 3069 it is called VLAN Aggregation. 814 Cisco and Allied Telesyn call it Private VLAN. 815 Hewlett-Packard call it Source-Port filtering or port-isolation. 816 Ericsson call it MAC-Forced Forwarding (RFC Draft). 817 818shared_media - BOOLEAN 819 Send(router) or accept(host) RFC1620 shared media redirects. 820 Overrides ip_secure_redirects. 821 shared_media for the interface will be enabled if at least one of 822 conf/{all,interface}/shared_media is set to TRUE, 823 it will be disabled otherwise 824 default TRUE 825 826secure_redirects - BOOLEAN 827 Accept ICMP redirect messages only for gateways, 828 listed in default gateway list. 829 secure_redirects for the interface will be enabled if at least one of 830 conf/{all,interface}/secure_redirects is set to TRUE, 831 it will be disabled otherwise 832 default TRUE 833 834send_redirects - BOOLEAN 835 Send redirects, if router. 836 send_redirects for the interface will be enabled if at least one of 837 conf/{all,interface}/send_redirects is set to TRUE, 838 it will be disabled otherwise 839 Default: TRUE 840 841bootp_relay - BOOLEAN 842 Accept packets with source address 0.b.c.d destined 843 not to this host as local ones. It is supposed, that 844 BOOTP relay daemon will catch and forward such packets. 845 conf/all/bootp_relay must also be set to TRUE to enable BOOTP relay 846 for the interface 847 default FALSE 848 Not Implemented Yet. 849 850accept_source_route - BOOLEAN 851 Accept packets with SRR option. 852 conf/all/accept_source_route must also be set to TRUE to accept packets 853 with SRR option on the interface 854 default TRUE (router) 855 FALSE (host) 856 857accept_local - BOOLEAN 858 Accept packets with local source addresses. In combination with 859 suitable routing, this can be used to direct packets between two 860 local interfaces over the wire and have them accepted properly. 861 default FALSE 862 863rp_filter - INTEGER 864 0 - No source validation. 865 1 - Strict mode as defined in RFC3704 Strict Reverse Path 866 Each incoming packet is tested against the FIB and if the interface 867 is not the best reverse path the packet check will fail. 868 By default failed packets are discarded. 869 2 - Loose mode as defined in RFC3704 Loose Reverse Path 870 Each incoming packet's source address is also tested against the FIB 871 and if the source address is not reachable via any interface 872 the packet check will fail. 873 874 Current recommended practice in RFC3704 is to enable strict mode 875 to prevent IP spoofing from DDos attacks. If using asymmetric routing 876 or other complicated routing, then loose mode is recommended. 877 878 The max value from conf/{all,interface}/rp_filter is used 879 when doing source validation on the {interface}. 880 881 Default value is 0. Note that some distributions enable it 882 in startup scripts. 883 884arp_filter - BOOLEAN 885 1 - Allows you to have multiple network interfaces on the same 886 subnet, and have the ARPs for each interface be answered 887 based on whether or not the kernel would route a packet from 888 the ARP'd IP out that interface (therefore you must use source 889 based routing for this to work). In other words it allows control 890 of which cards (usually 1) will respond to an arp request. 891 892 0 - (default) The kernel can respond to arp requests with addresses 893 from other interfaces. This may seem wrong but it usually makes 894 sense, because it increases the chance of successful communication. 895 IP addresses are owned by the complete host on Linux, not by 896 particular interfaces. Only for more complex setups like load- 897 balancing, does this behaviour cause problems. 898 899 arp_filter for the interface will be enabled if at least one of 900 conf/{all,interface}/arp_filter is set to TRUE, 901 it will be disabled otherwise 902 903arp_announce - INTEGER 904 Define different restriction levels for announcing the local 905 source IP address from IP packets in ARP requests sent on 906 interface: 907 0 - (default) Use any local address, configured on any interface 908 1 - Try to avoid local addresses that are not in the target's 909 subnet for this interface. This mode is useful when target 910 hosts reachable via this interface require the source IP 911 address in ARP requests to be part of their logical network 912 configured on the receiving interface. When we generate the 913 request we will check all our subnets that include the 914 target IP and will preserve the source address if it is from 915 such subnet. If there is no such subnet we select source 916 address according to the rules for level 2. 917 2 - Always use the best local address for this target. 918 In this mode we ignore the source address in the IP packet 919 and try to select local address that we prefer for talks with 920 the target host. Such local address is selected by looking 921 for primary IP addresses on all our subnets on the outgoing 922 interface that include the target IP address. If no suitable 923 local address is found we select the first local address 924 we have on the outgoing interface or on all other interfaces, 925 with the hope we will receive reply for our request and 926 even sometimes no matter the source IP address we announce. 927 928 The max value from conf/{all,interface}/arp_announce is used. 929 930 Increasing the restriction level gives more chance for 931 receiving answer from the resolved target while decreasing 932 the level announces more valid sender's information. 933 934arp_ignore - INTEGER 935 Define different modes for sending replies in response to 936 received ARP requests that resolve local target IP addresses: 937 0 - (default): reply for any local target IP address, configured 938 on any interface 939 1 - reply only if the target IP address is local address 940 configured on the incoming interface 941 2 - reply only if the target IP address is local address 942 configured on the incoming interface and both with the 943 sender's IP address are part from same subnet on this interface 944 3 - do not reply for local addresses configured with scope host, 945 only resolutions for global and link addresses are replied 946 4-7 - reserved 947 8 - do not reply for all local addresses 948 949 The max value from conf/{all,interface}/arp_ignore is used 950 when ARP request is received on the {interface} 951 952arp_notify - BOOLEAN 953 Define mode for notification of address and device changes. 954 0 - (default): do nothing 955 1 - Generate gratuitous arp requests when device is brought up 956 or hardware address changes. 957 958arp_accept - BOOLEAN 959 Define behavior for gratuitous ARP frames who's IP is not 960 already present in the ARP table: 961 0 - don't create new entries in the ARP table 962 1 - create new entries in the ARP table 963 964 Both replies and requests type gratuitous arp will trigger the 965 ARP table to be updated, if this setting is on. 966 967 If the ARP table already contains the IP address of the 968 gratuitous arp frame, the arp table will be updated regardless 969 if this setting is on or off. 970 971 972app_solicit - INTEGER 973 The maximum number of probes to send to the user space ARP daemon 974 via netlink before dropping back to multicast probes (see 975 mcast_solicit). Defaults to 0. 976 977disable_policy - BOOLEAN 978 Disable IPSEC policy (SPD) for this interface 979 980disable_xfrm - BOOLEAN 981 Disable IPSEC encryption on this interface, whatever the policy 982 983 984 985tag - INTEGER 986 Allows you to write a number, which can be used as required. 987 Default value is 0. 988 989Alexey Kuznetsov. 990kuznet@ms2.inr.ac.ru 991 992Updated by: 993Andi Kleen 994ak@muc.de 995Nicolas Delon 996delon.nicolas@wanadoo.fr 997 998 999 1000 1001/proc/sys/net/ipv6/* Variables: 1002 1003IPv6 has no global variables such as tcp_*. tcp_* settings under ipv4/ also 1004apply to IPv6 [XXX?]. 1005 1006bindv6only - BOOLEAN 1007 Default value for IPV6_V6ONLY socket option, 1008 which restricts use of the IPv6 socket to IPv6 communication 1009 only. 1010 TRUE: disable IPv4-mapped address feature 1011 FALSE: enable IPv4-mapped address feature 1012 1013 Default: FALSE (as specified in RFC3493) 1014 1015IPv6 Fragmentation: 1016 1017ip6frag_high_thresh - INTEGER 1018 Maximum memory used to reassemble IPv6 fragments. When 1019 ip6frag_high_thresh bytes of memory is allocated for this purpose, 1020 the fragment handler will toss packets until ip6frag_low_thresh 1021 is reached. 1022 1023ip6frag_low_thresh - INTEGER 1024 See ip6frag_high_thresh 1025 1026ip6frag_time - INTEGER 1027 Time in seconds to keep an IPv6 fragment in memory. 1028 1029ip6frag_secret_interval - INTEGER 1030 Regeneration interval (in seconds) of the hash secret (or lifetime 1031 for the hash secret) for IPv6 fragments. 1032 Default: 600 1033 1034conf/default/*: 1035 Change the interface-specific default settings. 1036 1037 1038conf/all/*: 1039 Change all the interface-specific settings. 1040 1041 [XXX: Other special features than forwarding?] 1042 1043conf/all/forwarding - BOOLEAN 1044 Enable global IPv6 forwarding between all interfaces. 1045 1046 IPv4 and IPv6 work differently here; e.g. netfilter must be used 1047 to control which interfaces may forward packets and which not. 1048 1049 This also sets all interfaces' Host/Router setting 1050 'forwarding' to the specified value. See below for details. 1051 1052 This referred to as global forwarding. 1053 1054proxy_ndp - BOOLEAN 1055 Do proxy ndp. 1056 1057fwmark_reflect - BOOLEAN 1058 Controls the fwmark of kernel-generated IPv6 reply packets that are not 1059 associated with a socket for example, TCP RSTs or ICMPv6 echo replies). 1060 If unset, these packets have a fwmark of zero. If set, they have the 1061 fwmark of the packet they are replying to. 1062 Default: 0 1063 1064conf/interface/*: 1065 Change special settings per interface. 1066 1067 The functional behaviour for certain settings is different 1068 depending on whether local forwarding is enabled or not. 1069 1070accept_ra - INTEGER 1071 Accept Router Advertisements; autoconfigure using them. 1072 1073 It also determines whether or not to transmit Router 1074 Solicitations. If and only if the functional setting is to 1075 accept Router Advertisements, Router Solicitations will be 1076 transmitted. 1077 1078 Possible values are: 1079 0 Do not accept Router Advertisements. 1080 1 Accept Router Advertisements if forwarding is disabled. 1081 2 Overrule forwarding behaviour. Accept Router Advertisements 1082 even if forwarding is enabled. 1083 1084 Functional default: enabled if local forwarding is disabled. 1085 disabled if local forwarding is enabled. 1086 1087accept_ra_defrtr - BOOLEAN 1088 Learn default router in Router Advertisement. 1089 1090 Functional default: enabled if accept_ra is enabled. 1091 disabled if accept_ra is disabled. 1092 1093accept_ra_pinfo - BOOLEAN 1094 Learn Prefix Information in Router Advertisement. 1095 1096 Functional default: enabled if accept_ra is enabled. 1097 disabled if accept_ra is disabled. 1098 1099accept_ra_rt_info_max_plen - INTEGER 1100 Maximum prefix length of Route Information in RA. 1101 1102 Route Information w/ prefix larger than or equal to this 1103 variable shall be ignored. 1104 1105 Functional default: 0 if accept_ra_rtr_pref is enabled. 1106 -1 if accept_ra_rtr_pref is disabled. 1107 1108accept_ra_rtr_pref - BOOLEAN 1109 Accept Router Preference in RA. 1110 1111 Functional default: enabled if accept_ra is enabled. 1112 disabled if accept_ra is disabled. 1113 1114accept_redirects - BOOLEAN 1115 Accept Redirects. 1116 1117 Functional default: enabled if local forwarding is disabled. 1118 disabled if local forwarding is enabled. 1119 1120accept_source_route - INTEGER 1121 Accept source routing (routing extension header). 1122 1123 >= 0: Accept only routing header type 2. 1124 < 0: Do not accept routing header. 1125 1126 Default: 0 1127 1128autoconf - BOOLEAN 1129 Autoconfigure addresses using Prefix Information in Router 1130 Advertisements. 1131 1132 Functional default: enabled if accept_ra_pinfo is enabled. 1133 disabled if accept_ra_pinfo is disabled. 1134 1135dad_transmits - INTEGER 1136 The amount of Duplicate Address Detection probes to send. 1137 Default: 1 1138 1139forwarding - INTEGER 1140 Configure interface-specific Host/Router behaviour. 1141 1142 Note: It is recommended to have the same setting on all 1143 interfaces; mixed router/host scenarios are rather uncommon. 1144 1145 Possible values are: 1146 0 Forwarding disabled 1147 1 Forwarding enabled 1148 1149 FALSE (0): 1150 1151 By default, Host behaviour is assumed. This means: 1152 1153 1. IsRouter flag is not set in Neighbour Advertisements. 1154 2. If accept_ra is TRUE (default), transmit Router 1155 Solicitations. 1156 3. If accept_ra is TRUE (default), accept Router 1157 Advertisements (and do autoconfiguration). 1158 4. If accept_redirects is TRUE (default), accept Redirects. 1159 1160 TRUE (1): 1161 1162 If local forwarding is enabled, Router behaviour is assumed. 1163 This means exactly the reverse from the above: 1164 1165 1. IsRouter flag is set in Neighbour Advertisements. 1166 2. Router Solicitations are not sent unless accept_ra is 2. 1167 3. Router Advertisements are ignored unless accept_ra is 2. 1168 4. Redirects are ignored. 1169 1170 Default: 0 (disabled) if global forwarding is disabled (default), 1171 otherwise 1 (enabled). 1172 1173hop_limit - INTEGER 1174 Default Hop Limit to set. 1175 Default: 64 1176 1177mtu - INTEGER 1178 Default Maximum Transfer Unit 1179 Default: 1280 (IPv6 required minimum) 1180 1181router_probe_interval - INTEGER 1182 Minimum interval (in seconds) between Router Probing described 1183 in RFC4191. 1184 1185 Default: 60 1186 1187router_solicitation_delay - INTEGER 1188 Number of seconds to wait after interface is brought up 1189 before sending Router Solicitations. 1190 Default: 1 1191 1192router_solicitation_interval - INTEGER 1193 Number of seconds to wait between Router Solicitations. 1194 Default: 4 1195 1196router_solicitations - INTEGER 1197 Number of Router Solicitations to send until assuming no 1198 routers are present. 1199 Default: 3 1200 1201use_oif_addrs_only - BOOLEAN 1202 When enabled, the candidate source addresses for destinations 1203 routed via this interface are restricted to the set of addresses 1204 configured on this interface (vis. RFC 6724, section 4). 1205 1206 Default: false 1207 1208use_tempaddr - INTEGER 1209 Preference for Privacy Extensions (RFC3041). 1210 <= 0 : disable Privacy Extensions 1211 == 1 : enable Privacy Extensions, but prefer public 1212 addresses over temporary addresses. 1213 > 1 : enable Privacy Extensions and prefer temporary 1214 addresses over public addresses. 1215 Default: 0 (for most devices) 1216 -1 (for point-to-point devices and loopback devices) 1217 1218temp_valid_lft - INTEGER 1219 valid lifetime (in seconds) for temporary addresses. 1220 Default: 604800 (7 days) 1221 1222temp_prefered_lft - INTEGER 1223 Preferred lifetime (in seconds) for temporary addresses. 1224 Default: 86400 (1 day) 1225 1226max_desync_factor - INTEGER 1227 Maximum value for DESYNC_FACTOR, which is a random value 1228 that ensures that clients don't synchronize with each 1229 other and generate new addresses at exactly the same time. 1230 value is in seconds. 1231 Default: 600 1232 1233regen_max_retry - INTEGER 1234 Number of attempts before give up attempting to generate 1235 valid temporary addresses. 1236 Default: 5 1237 1238max_addresses - INTEGER 1239 Maximum number of autoconfigured addresses per interface. Setting 1240 to zero disables the limitation. It is not recommended to set this 1241 value too large (or to zero) because it would be an easy way to 1242 crash the kernel by allowing too many addresses to be created. 1243 Default: 16 1244 1245disable_ipv6 - BOOLEAN 1246 Disable IPv6 operation. If accept_dad is set to 2, this value 1247 will be dynamically set to TRUE if DAD fails for the link-local 1248 address. 1249 Default: FALSE (enable IPv6 operation) 1250 1251 When this value is changed from 1 to 0 (IPv6 is being enabled), 1252 it will dynamically create a link-local address on the given 1253 interface and start Duplicate Address Detection, if necessary. 1254 1255 When this value is changed from 0 to 1 (IPv6 is being disabled), 1256 it will dynamically delete all address on the given interface. 1257 1258accept_dad - INTEGER 1259 Whether to accept DAD (Duplicate Address Detection). 1260 0: Disable DAD 1261 1: Enable DAD (default) 1262 2: Enable DAD, and disable IPv6 operation if MAC-based duplicate 1263 link-local address has been found. 1264 1265force_tllao - BOOLEAN 1266 Enable sending the target link-layer address option even when 1267 responding to a unicast neighbor solicitation. 1268 Default: FALSE 1269 1270 Quoting from RFC 2461, section 4.4, Target link-layer address: 1271 1272 "The option MUST be included for multicast solicitations in order to 1273 avoid infinite Neighbor Solicitation "recursion" when the peer node 1274 does not have a cache entry to return a Neighbor Advertisements 1275 message. When responding to unicast solicitations, the option can be 1276 omitted since the sender of the solicitation has the correct link- 1277 layer address; otherwise it would not have be able to send the unicast 1278 solicitation in the first place. However, including the link-layer 1279 address in this case adds little overhead and eliminates a potential 1280 race condition where the sender deletes the cached link-layer address 1281 prior to receiving a response to a previous solicitation." 1282 1283optimistic_dad - BOOLEAN 1284 Whether to perform Optimistic Duplicate Address Detection (RFC 4429). 1285 0: disabled (default) 1286 1: enabled 1287 1288use_optimistic - BOOLEAN 1289 If enabled, do not classify optimistic addresses as deprecated during 1290 source address selection. Preferred addresses will still be chosen 1291 before optimistic addresses, subject to other ranking in the source 1292 address selection algorithm. 1293 0: disabled (default) 1294 1: enabled 1295 1296icmp/*: 1297ratelimit - INTEGER 1298 Limit the maximal rates for sending ICMPv6 packets. 1299 0 to disable any limiting, 1300 otherwise the minimal space between responses in milliseconds. 1301 Default: 1000 1302 1303 1304IPv6 Update by: 1305Pekka Savola <pekkas@netcore.fi> 1306YOSHIFUJI Hideaki / USAGI Project <yoshfuji@linux-ipv6.org> 1307 1308 1309/proc/sys/net/bridge/* Variables: 1310 1311bridge-nf-call-arptables - BOOLEAN 1312 1 : pass bridged ARP traffic to arptables' FORWARD chain. 1313 0 : disable this. 1314 Default: 1 1315 1316bridge-nf-call-iptables - BOOLEAN 1317 1 : pass bridged IPv4 traffic to iptables' chains. 1318 0 : disable this. 1319 Default: 1 1320 1321bridge-nf-call-ip6tables - BOOLEAN 1322 1 : pass bridged IPv6 traffic to ip6tables' chains. 1323 0 : disable this. 1324 Default: 1 1325 1326bridge-nf-filter-vlan-tagged - BOOLEAN 1327 1 : pass bridged vlan-tagged ARP/IP/IPv6 traffic to {arp,ip,ip6}tables. 1328 0 : disable this. 1329 Default: 1 1330 1331bridge-nf-filter-pppoe-tagged - BOOLEAN 1332 1 : pass bridged pppoe-tagged IP/IPv6 traffic to {ip,ip6}tables. 1333 0 : disable this. 1334 Default: 1 1335 1336 1337proc/sys/net/sctp/* Variables: 1338 1339addip_enable - BOOLEAN 1340 Enable or disable extension of Dynamic Address Reconfiguration 1341 (ADD-IP) functionality specified in RFC5061. This extension provides 1342 the ability to dynamically add and remove new addresses for the SCTP 1343 associations. 1344 1345 1: Enable extension. 1346 1347 0: Disable extension. 1348 1349 Default: 0 1350 1351addip_noauth_enable - BOOLEAN 1352 Dynamic Address Reconfiguration (ADD-IP) requires the use of 1353 authentication to protect the operations of adding or removing new 1354 addresses. This requirement is mandated so that unauthorized hosts 1355 would not be able to hijack associations. However, older 1356 implementations may not have implemented this requirement while 1357 allowing the ADD-IP extension. For reasons of interoperability, 1358 we provide this variable to control the enforcement of the 1359 authentication requirement. 1360 1361 1: Allow ADD-IP extension to be used without authentication. This 1362 should only be set in a closed environment for interoperability 1363 with older implementations. 1364 1365 0: Enforce the authentication requirement 1366 1367 Default: 0 1368 1369auth_enable - BOOLEAN 1370 Enable or disable Authenticated Chunks extension. This extension 1371 provides the ability to send and receive authenticated chunks and is 1372 required for secure operation of Dynamic Address Reconfiguration 1373 (ADD-IP) extension. 1374 1375 1: Enable this extension. 1376 0: Disable this extension. 1377 1378 Default: 0 1379 1380prsctp_enable - BOOLEAN 1381 Enable or disable the Partial Reliability extension (RFC3758) which 1382 is used to notify peers that a given DATA should no longer be expected. 1383 1384 1: Enable extension 1385 0: Disable 1386 1387 Default: 1 1388 1389max_burst - INTEGER 1390 The limit of the number of new packets that can be initially sent. It 1391 controls how bursty the generated traffic can be. 1392 1393 Default: 4 1394 1395association_max_retrans - INTEGER 1396 Set the maximum number for retransmissions that an association can 1397 attempt deciding that the remote end is unreachable. If this value 1398 is exceeded, the association is terminated. 1399 1400 Default: 10 1401 1402max_init_retransmits - INTEGER 1403 The maximum number of retransmissions of INIT and COOKIE-ECHO chunks 1404 that an association will attempt before declaring the destination 1405 unreachable and terminating. 1406 1407 Default: 8 1408 1409path_max_retrans - INTEGER 1410 The maximum number of retransmissions that will be attempted on a given 1411 path. Once this threshold is exceeded, the path is considered 1412 unreachable, and new traffic will use a different path when the 1413 association is multihomed. 1414 1415 Default: 5 1416 1417rto_initial - INTEGER 1418 The initial round trip timeout value in milliseconds that will be used 1419 in calculating round trip times. This is the initial time interval 1420 for retransmissions. 1421 1422 Default: 3000 1423 1424rto_max - INTEGER 1425 The maximum value (in milliseconds) of the round trip timeout. This 1426 is the largest time interval that can elapse between retransmissions. 1427 1428 Default: 60000 1429 1430rto_min - INTEGER 1431 The minimum value (in milliseconds) of the round trip timeout. This 1432 is the smallest time interval the can elapse between retransmissions. 1433 1434 Default: 1000 1435 1436hb_interval - INTEGER 1437 The interval (in milliseconds) between HEARTBEAT chunks. These chunks 1438 are sent at the specified interval on idle paths to probe the state of 1439 a given path between 2 associations. 1440 1441 Default: 30000 1442 1443sack_timeout - INTEGER 1444 The amount of time (in milliseconds) that the implementation will wait 1445 to send a SACK. 1446 1447 Default: 200 1448 1449valid_cookie_life - INTEGER 1450 The default lifetime of the SCTP cookie (in milliseconds). The cookie 1451 is used during association establishment. 1452 1453 Default: 60000 1454 1455cookie_preserve_enable - BOOLEAN 1456 Enable or disable the ability to extend the lifetime of the SCTP cookie 1457 that is used during the establishment phase of SCTP association 1458 1459 1: Enable cookie lifetime extension. 1460 0: Disable 1461 1462 Default: 1 1463 1464rcvbuf_policy - INTEGER 1465 Determines if the receive buffer is attributed to the socket or to 1466 association. SCTP supports the capability to create multiple 1467 associations on a single socket. When using this capability, it is 1468 possible that a single stalled association that's buffering a lot 1469 of data may block other associations from delivering their data by 1470 consuming all of the receive buffer space. To work around this, 1471 the rcvbuf_policy could be set to attribute the receiver buffer space 1472 to each association instead of the socket. This prevents the described 1473 blocking. 1474 1475 1: rcvbuf space is per association 1476 0: recbuf space is per socket 1477 1478 Default: 0 1479 1480sndbuf_policy - INTEGER 1481 Similar to rcvbuf_policy above, this applies to send buffer space. 1482 1483 1: Send buffer is tracked per association 1484 0: Send buffer is tracked per socket. 1485 1486 Default: 0 1487 1488sctp_mem - vector of 3 INTEGERs: min, pressure, max 1489 Number of pages allowed for queueing by all SCTP sockets. 1490 1491 min: Below this number of pages SCTP is not bothered about its 1492 memory appetite. When amount of memory allocated by SCTP exceeds 1493 this number, SCTP starts to moderate memory usage. 1494 1495 pressure: This value was introduced to follow format of tcp_mem. 1496 1497 max: Number of pages allowed for queueing by all SCTP sockets. 1498 1499 Default is calculated at boot time from amount of available memory. 1500 1501sctp_rmem - vector of 3 INTEGERs: min, default, max 1502 Only the first value ("min") is used, "default" and "max" are 1503 ignored. 1504 1505 min: Minimal size of receive buffer used by SCTP socket. 1506 It is guaranteed to each SCTP socket (but not association) even 1507 under moderate memory pressure. 1508 1509 Default: 1 page 1510 1511sctp_wmem - vector of 3 INTEGERs: min, default, max 1512 Currently this tunable has no effect. 1513 1514addr_scope_policy - INTEGER 1515 Control IPv4 address scoping - draft-stewart-tsvwg-sctp-ipv4-00 1516 1517 0 - Disable IPv4 address scoping 1518 1 - Enable IPv4 address scoping 1519 2 - Follow draft but allow IPv4 private addresses 1520 3 - Follow draft but allow IPv4 link local addresses 1521 1522 Default: 1 1523 1524 1525/proc/sys/net/core/* 1526dev_weight - INTEGER 1527 The maximum number of packets that kernel can handle on a NAPI 1528 interrupt, it's a Per-CPU variable. 1529 1530 Default: 64 1531 1532/proc/sys/net/unix/* 1533max_dgram_qlen - INTEGER 1534 The maximum length of dgram socket receive queue 1535 1536 Default: 10 1537 1538 1539UNDOCUMENTED: 1540 1541/proc/sys/net/irda/* 1542 fast_poll_increase FIXME 1543 warn_noreply_time FIXME 1544 discovery_slots FIXME 1545 slot_timeout FIXME 1546 max_baud_rate FIXME 1547 discovery_timeout FIXME 1548 lap_keepalive_time FIXME 1549 max_noreply_time FIXME 1550 max_tx_data_size FIXME 1551 max_tx_window FIXME 1552 min_tx_turn_time FIXME 1553