Lines Matching +full:layer +full:- +full:primary
1 .. SPDX-License-Identifier: GPL-2.0
10 ip_forward - BOOLEAN
11 - 0 - disabled (default)
12 - not 0 - enabled
20 ip_default_ttl - INTEGER
25 ip_no_pmtu_disc - INTEGER
27 fragmentation-required ICMP is received, the PMTU to this
37 accept fragmentation-needed errors if the underlying protocol
47 Possible values: 0-3
51 min_pmtu - INTEGER
52 default 552 - minimum discovered Path MTU
54 ip_forward_use_pmtu - BOOLEAN
58 You only need to enable this if you have user-space software
67 - 0 - disabled
68 - 1 - enabled
70 fwmark_reflect - BOOLEAN
71 Controls the fwmark of kernel-generated IPv4 reply packets that are not
78 fib_multipath_use_neigh - BOOLEAN
88 - 0 - disabled
89 - 1 - enabled
91 fib_multipath_hash_policy - INTEGER
95 Default: 0 (Layer 3)
99 - 0 - Layer 3
100 - 1 - Layer 4
101 - 2 - Layer 3 or inner Layer 3 if present
103 fib_sync_mem - UNSIGNED INTEGER
109 ip_forward_update_priority - INTEGER
112 according to an rt_tos2priority table (see e.g. man tc-prio).
118 - 0 - Do not update priority.
119 - 1 - Update priority.
121 route/max_size - INTEGER
128 neigh/default/gc_thresh1 - INTEGER
134 neigh/default/gc_thresh2 - INTEGER
141 neigh/default/gc_thresh3 - INTEGER
142 Maximum number of non-PERMANENT neighbor entries allowed. Increase
144 with large numbers of directly-connected peers.
148 neigh/default/unres_qlen_bytes - INTEGER
161 neigh/default/unres_qlen - INTEGER
174 mtu_expires - INTEGER
177 min_adv_mss - INTEGER
183 ipfrag_high_thresh - LONG INTEGER
186 ipfrag_low_thresh - LONG INTEGER
187 (Obsolete since linux-4.17)
192 ipfrag_time - INTEGER
195 ipfrag_max_dist - INTEGER
196 ipfrag_max_dist is a non-negative integer value which defines the
203 is done on fragments before they are added to a reassembly queue - if
221 inet_peer_threshold - INTEGER
224 entries' time-to-live and time intervals between garbage collection
225 passes. More entries, less time-to-live, less GC interval.
227 inet_peer_minttl - INTEGER
228 Minimum time-to-live of entries. Should be enough to cover fragment
229 time-to-live on the reassembling side. This minimum time-to-live is
233 inet_peer_maxttl - INTEGER
234 Maximum time-to-live of entries. Unused entries will expire after
242 somaxconn - INTEGER
244 Defaults to 4096. (Was 128 before linux-5.4)
247 tcp_abort_on_overflow - BOOLEAN
255 tcp_adv_win_scale - INTEGER
257 (if tcp_adv_win_scale > 0) or bytes-bytes/2^(-tcp_adv_win_scale),
260 Possible values are [-31, 31], inclusive.
264 tcp_allowed_congestion_control - STRING
265 Show/set the congestion control choices available to non-privileged
271 tcp_app_win - INTEGER
279 tcp_autocorking - BOOLEAN
290 tcp_available_congestion_control - STRING
295 tcp_base_mss - INTEGER
296 The initial value of search_low to be used by the packetization layer
300 tcp_mtu_probe_floor - INTEGER
306 tcp_min_snd_mss - INTEGER
315 tcp_congestion_control - STRING
325 tcp_dsack - BOOLEAN
328 tcp_early_retrans - INTEGER
330 losses into fast recovery (draft-ietf-tcpm-rack). Note that
335 - 0 disables TLP
336 - 3 or 4 enables TLP
340 tcp_ecn - INTEGER
359 tcp_ecn_fallback - BOOLEAN
361 back to non-ECN. Currently, this knob implements the fallback
369 tcp_fack - BOOLEAN
372 tcp_fin_timeout - INTEGER
376 valid "receive only" state for an un-orphaned connection, an
384 tcp_frto - INTEGER
385 Enables Forward RTO-Recovery (F-RTO) defined in RFC5682.
386 F-RTO is an enhanced recovery algorithm for TCP retransmission
388 RTT fluctuates (e.g., wireless). F-RTO is sender-side only
391 By default it's enabled with a non-zero value. 0 disables F-RTO.
393 tcp_fwmark_accept - BOOLEAN
404 tcp_invalid_ratelimit - INTEGER
409 (a) out-of-window sequence number,
410 (b) out-of-window acknowledgment number, or
414 a buggy or malicious middlebox or man-in-the-middle can
420 Using 0 disables rate-limiting of dupacks in response to
426 tcp_keepalive_time - INTEGER
430 tcp_keepalive_probes - INTEGER
434 tcp_keepalive_intvl - INTEGER
440 tcp_l3mdev_accept - BOOLEAN
450 tcp_low_latency - BOOLEAN
453 tcp_max_orphans - INTEGER
465 tcp_max_syn_backlog - INTEGER
469 This is a per-listener limit.
479 tcp_max_tw_buckets - INTEGER
481 If this number is exceeded time-wait socket is immediately destroyed
487 tcp_mem - vector of 3 INTEGERs: min, pressure, max
501 tcp_min_rtt_wlen - INTEGER
508 Possible values: 0 - 86400 (1 day)
512 tcp_moderate_rcvbuf - BOOLEAN
513 If set, TCP performs receive buffer auto-tuning, attempting to
518 tcp_mtu_probing - INTEGER
519 Controls TCP Packetization-Layer Path MTU Discovery. Takes three
522 - 0 - Disabled
523 - 1 - Disabled by default, enabled when an ICMP black hole detected
524 - 2 - Always enabled, use initial MSS of tcp_base_mss.
526 tcp_probe_interval - UNSIGNED INTEGER
527 Controls how often to start TCP Packetization-Layer Path MTU
531 tcp_probe_threshold - INTEGER
532 Controls when TCP Packetization-Layer Path MTU Discovery probing
536 tcp_no_metrics_save - BOOLEAN
544 tcp_no_ssthresh_metrics_save - BOOLEAN
549 tcp_orphan_retries - INTEGER
560 tcp_recovery - INTEGER
576 tcp_reordering - INTEGER
583 tcp_max_reordering - INTEGER
590 tcp_retrans_collapse - BOOLEAN
591 Bug-to-bug compatibility with some broken printers.
595 tcp_retries1 - INTEGER
598 and reports this suspicion to the network layer.
604 tcp_retries2 - INTEGER
619 tcp_rfc1337 - BOOLEAN
626 tcp_rmem - vector of 3 INTEGERs: min, default, max
645 tcp_sack - BOOLEAN
648 tcp_comp_sack_delay_ns - LONG INTEGER
655 tcp_comp_sack_slack_ns - LONG INTEGER
663 tcp_comp_sack_nr - INTEGER
669 tcp_slow_start_after_idle - BOOLEAN
677 tcp_stdurg - BOOLEAN
684 tcp_synack_retries - INTEGER
691 tcp_syncookies - INTEGER
716 tcp_migrate_req - BOOLEAN
718 the initial SYN packet is received during the three-way handshake.
719 When a listener is closed, in-flight request sockets during the
741 tcp_fastopen - INTEGER
752 the option value being the length of the syn-data backlog.
760 application before 3-way handshake finishes.
763 0x200 (server) accept data-in-SYN w/o any cookie option present.
773 tcp_fastopen_blackhole_timeout_sec - INTEGER
777 get detected right after Fastopen is re-enabled and will reset to
783 tcp_fastopen_key - list of comma separated 32-digit hexadecimal INTEGERs
784 The list consists of a primary key and an optional backup key. The
785 primary key is used for both creating and validating cookies, while the
789 A randomly chosen primary key may be configured by the kernel if
794 per-socket keys will be used instead of any keys that are specified via
797 A key is specified as 4 8-digit hexadecimal integers which are separated
798 by a '-' as: xxxxxxxx-xxxxxxxx-xxxxxxxx-xxxxxxxx. Leading zeros may be
799 omitted. A primary and a backup key may be specified by separating them
800 by a comma. If only one key is specified, it becomes the primary key and
803 tcp_syn_retries - INTEGER
810 tcp_timestamps - INTEGER
813 - 0: Disabled.
814 - 1: Enable timestamps as defined in RFC1323 and use random offset for
816 - 2: Like 1, but without random offsets.
820 tcp_min_tso_segs - INTEGER
823 Since linux-3.12, TCP does an automatic sizing of TSO frames,
831 tcp_pacing_ss_ratio - INTEGER
832 sk->sk_pacing_rate is set by TCP stack using a ratio applied
840 tcp_pacing_ca_ratio - INTEGER
841 sk->sk_pacing_rate is set by TCP stack using a ratio applied
848 tcp_tso_win_divisor - INTEGER
856 tcp_tw_reuse - INTEGER
857 Enable reuse of TIME-WAIT sockets for new connections when it is
860 - 0 - disable
861 - 1 - global enable
862 - 2 - enable for loopback traffic only
869 tcp_window_scaling - BOOLEAN
872 tcp_wmem - vector of 3 INTEGERs: min, default, max
893 tcp_notsent_lowat - UNSIGNED INTEGER
906 tcp_workaround_signed_windows - BOOLEAN
914 tcp_thin_linear_timeouts - BOOLEAN
921 non-aggressive thin streams, often found to be time-dependent.
923 Documentation/networking/tcp-thin.rst
927 tcp_limit_output_bytes - INTEGER
939 tcp_challenge_ack_limit - INTEGER
941 in RFC 5961 (Improving TCP's Robustness to Blind In-Window Attacks)
944 tcp_rx_skb_cache - BOOLEAN
955 udp_l3mdev_accept - BOOLEAN
964 udp_mem - vector of 3 INTEGERs: min, pressure, max
977 udp_rmem_min - INTEGER
984 udp_wmem_min - INTEGER
994 raw_l3mdev_accept - BOOLEAN
1006 cipso_cache_enable - BOOLEAN
1015 cipso_cache_bucket_size - INTEGER
1025 cipso_rbm_optfmt - BOOLEAN
1029 categories in order to make the packet data 32-bit aligned.
1033 cipso_rbm_structvalid - BOOLEAN
1046 ip_local_port_range - 2 INTEGERS
1055 ip_local_reserved_ports - list of comma separated ranges
1056 Specify the ports which are reserved for known third-party
1062 list of ranges (e.g. "1,2-4,10-10" for ports 1, 2, 3, 4 and
1086 ip_unprivileged_port_start - INTEGER
1087 This is a per-namespace sysctl. It defines the first
1095 ip_nonlocal_bind - BOOLEAN
1096 If set, allows processes to bind() to non-local IP addresses,
1097 which can be quite useful - but may break some applications.
1101 ip_autobind_reuse - BOOLEAN
1110 ip_dynaddr - INTEGER
1111 If set non-zero, enables support for dynamic addresses.
1112 If set to a non-zero value larger than 1, a kernel log
1118 ip_early_demux - BOOLEAN
1128 ping_group_range - 2 INTEGERS
1135 tcp_early_demux - BOOLEAN
1140 udp_early_demux - BOOLEAN
1146 icmp_echo_ignore_all - BOOLEAN
1147 If set non-zero, then the kernel will ignore all ICMP ECHO
1152 icmp_echo_ignore_broadcasts - BOOLEAN
1153 If set non-zero, then the kernel will ignore all ICMP ECHO and
1158 icmp_ratelimit - INTEGER
1168 icmp_msgs_per_sec - INTEGER
1176 icmp_msgs_burst - INTEGER
1183 icmp_ratemask - INTEGER
1210 icmp_ignore_bogus_error_responses - BOOLEAN
1218 icmp_errors_use_inbound_ifaddr - BOOLEAN
1220 If zero, icmp error messages are sent with the primary address of
1223 If non-zero, the message will be sent with the primary address of
1229 Note that if no primary address exists for the interface selected,
1230 then the primary address of the first non-loopback interface that
1235 igmp_max_memberships - INTEGER
1247 M = 65536-sizeof (ip header)/(sizeof(Group record))
1252 (65536-24) / 12 = 5459
1257 igmp_max_msf - INTEGER
1263 igmp_qrv - INTEGER
1270 force_igmp_version - INTEGER
1271 - 0 - (default) No enforcement of a IGMP version, IGMPv1/v2 fallback
1274 - 1 - Enforce to use IGMP version 1. Will also reply IGMPv1 report if
1276 - 2 - Enforce to use IGMP version 2. Will fallback to IGMPv1 if receive
1278 - 3 - Enforce to use IGMP version 3. The same react with default 0.
1294 log_martians - BOOLEAN
1300 accept_redirects - BOOLEAN
1304 - both conf/{all,interface}/accept_redirects are TRUE in the case
1309 - at least one of conf/{all,interface}/accept_redirects is TRUE in the
1316 - TRUE (host)
1317 - FALSE (router)
1319 forwarding - BOOLEAN
1323 mc_forwarding - BOOLEAN
1329 medium_id - INTEGER
1334 to its medium, value of -1 means that medium is not known.
1340 proxy_arp - BOOLEAN
1347 proxy_arp_pvlan - BOOLEAN
1365 Hewlett-Packard call it Source-Port filtering or port-isolation.
1366 Ericsson call it MAC-Forced Forwarding (RFC Draft).
1368 shared_media - BOOLEAN
1378 secure_redirects - BOOLEAN
1391 send_redirects - BOOLEAN
1400 bootp_relay - BOOLEAN
1411 accept_source_route - BOOLEAN
1418 - TRUE (router)
1419 - FALSE (host)
1421 accept_local - BOOLEAN
1427 route_localnet - BOOLEAN
1433 rp_filter - INTEGER
1434 - 0 - No source validation.
1435 - 1 - Strict mode as defined in RFC3704 Strict Reverse Path
1439 - 2 - Loose mode as defined in RFC3704 Loose Reverse Path
1454 arp_filter - BOOLEAN
1455 - 1 - Allows you to have multiple network interfaces on the same
1462 - 0 - (default) The kernel can respond to arp requests with addresses
1466 particular interfaces. Only for more complex setups like load-
1473 arp_announce - INTEGER
1478 - 0 - (default) Use any local address, configured on any interface
1479 - 1 - Try to avoid local addresses that are not in the target's
1488 - 2 - Always use the best local address for this target.
1492 for primary IP addresses on all our subnets on the outgoing
1505 arp_ignore - INTEGER
1509 - 0 - (default): reply for any local target IP address, configured
1511 - 1 - reply only if the target IP address is local address
1513 - 2 - reply only if the target IP address is local address
1516 - 3 - do not reply for local addresses configured with scope host,
1518 - 4-7 - reserved
1519 - 8 - do not reply for all local addresses
1524 arp_notify - BOOLEAN
1533 arp_accept - BOOLEAN
1537 - 0 - don't create new entries in the ARP table
1538 - 1 - create new entries in the ARP table
1547 mcast_solicit - INTEGER
1552 ucast_solicit - INTEGER
1556 app_solicit - INTEGER
1561 mcast_resolicit - INTEGER
1565 disable_policy - BOOLEAN
1568 disable_xfrm - BOOLEAN
1571 igmpv2_unsolicited_report_interval - INTEGER
1577 igmpv3_unsolicited_report_interval - INTEGER
1583 promote_secondaries - BOOLEAN
1584 When a primary IP address is removed from this interface
1588 drop_unicast_in_l2_multicast - BOOLEAN
1589 Drop any unicast IP packets that are received in link-layer
1597 drop_gratuitous_arp - BOOLEAN
1605 tag - INTEGER
1610 xfrm4_gc_thresh - INTEGER
1611 (Obsolete since linux-4.14)
1616 igmp_link_local_mcast_reports - BOOLEAN
1627 - Andi Kleen
1629 - Nicolas Delon
1641 bindv6only - BOOLEAN
1646 - TRUE: disable IPv4-mapped address feature
1647 - FALSE: enable IPv4-mapped address feature
1651 flowlabel_consistency - BOOLEAN
1656 - TRUE: enabled
1657 - FALSE: disabled
1661 auto_flowlabels - INTEGER
1680 flowlabel_state_ranges - BOOLEAN
1681 Split the flow label number space into two ranges. 0-0x7FFFF is
1682 reserved for the IPv6 flow manager facility, 0x80000-0xFFFFF
1685 - TRUE: enabled
1686 - FALSE: disabled
1690 flowlabel_reflect - INTEGER
1694 https://tools.ietf.org/html/draft-wang-6man-flow-label-reflection-01
1698 - 1: enabled for established flows
1701 in "tcp: change IPv6 flow-label upon receiving spurious retransmission"
1704 - 2: enabled for TCP RESET packets (no active listener)
1708 - 4: enabled for ICMPv6 echo reply messages.
1712 fib_multipath_hash_policy - INTEGER
1715 Default: 0 (Layer 3)
1719 - 0 - Layer 3 (source and destination addresses plus flow label)
1720 - 1 - Layer 4 (standard 5-tuple)
1721 - 2 - Layer 3 or inner Layer 3 if present
1723 anycast_src_echo_reply - BOOLEAN
1727 - TRUE: enabled
1728 - FALSE: disabled
1732 idgen_delay - INTEGER
1739 idgen_retries - INTEGER
1745 mld_qrv - INTEGER
1752 max_dst_opts_number - INTEGER
1753 Maximum number of non-padding TLVs allowed in a Destination
1760 max_hbh_opts_number - INTEGER
1761 Maximum number of non-padding TLVs allowed in a Hop-by-Hop
1768 max_dst_opts_length - INTEGER
1774 max_hbh_length - INTEGER
1775 Maximum length allowed for a Hop-by-Hop options extension
1780 skip_notify_on_dev_down - BOOLEAN
1789 nexthop_compat_mode - BOOLEAN
1803 ip6frag_high_thresh - INTEGER
1809 ip6frag_low_thresh - INTEGER
1812 ip6frag_time - INTEGER
1817 seg6_flowlabel - INTEGER
1822 -1 set flowlabel to zero.
1831 Change the interface-specific default settings.
1835 Change all the interface-specific settings.
1839 conf/all/forwarding - BOOLEAN
1850 proxy_ndp - BOOLEAN
1853 fwmark_reflect - BOOLEAN
1854 Controls the fwmark of kernel-generated IPv6 reply packets that are not
1867 accept_ra - INTEGER
1886 - enabled if local forwarding is disabled.
1887 - disabled if local forwarding is enabled.
1889 accept_ra_defrtr - BOOLEAN
1894 - enabled if accept_ra is enabled.
1895 - disabled if accept_ra is disabled.
1897 accept_ra_from_local - BOOLEAN
1898 Accept RA with source-address that is found on local machine
1901 Default is to NOT accept these as it may be an un-intended
1906 - enabled if accept_ra_from_local is enabled
1908 - disabled if accept_ra_from_local is disabled
1911 accept_ra_min_hop_limit - INTEGER
1919 accept_ra_min_lft - INTEGER
1927 accept_ra_pinfo - BOOLEAN
1932 - enabled if accept_ra is enabled.
1933 - disabled if accept_ra is disabled.
1935 accept_ra_rt_info_min_plen - INTEGER
1944 * -1 if accept_ra_rtr_pref is disabled.
1946 accept_ra_rt_info_max_plen - INTEGER
1955 * -1 if accept_ra_rtr_pref is disabled.
1957 accept_ra_rtr_pref - BOOLEAN
1962 - enabled if accept_ra is enabled.
1963 - disabled if accept_ra is disabled.
1965 accept_ra_mtu - BOOLEAN
1971 - enabled if accept_ra is enabled.
1972 - disabled if accept_ra is disabled.
1974 accept_redirects - BOOLEAN
1979 - enabled if local forwarding is disabled.
1980 - disabled if local forwarding is enabled.
1982 accept_source_route - INTEGER
1985 - >= 0: Accept only routing header type 2.
1986 - < 0: Do not accept routing header.
1990 autoconf - BOOLEAN
1996 - enabled if accept_ra_pinfo is enabled.
1997 - disabled if accept_ra_pinfo is disabled.
1999 dad_transmits - INTEGER
2004 forwarding - INTEGER
2005 Configure interface-specific Host/Router behaviour.
2014 - 0 Forwarding disabled
2015 - 1 Forwarding enabled
2041 hop_limit - INTEGER
2046 mtu - INTEGER
2051 ip_nonlocal_bind - BOOLEAN
2052 If set, allows processes to bind() to non-local IPv6 addresses,
2053 which can be quite useful - but may break some applications.
2057 router_probe_interval - INTEGER
2063 router_solicitation_delay - INTEGER
2069 router_solicitation_interval - INTEGER
2074 router_solicitations - INTEGER
2080 use_oif_addrs_only - BOOLEAN
2087 use_tempaddr - INTEGER
2099 * -1 (for point-to-point devices and loopback devices)
2101 temp_valid_lft - INTEGER
2106 temp_prefered_lft - INTEGER
2111 keep_addr_on_down - INTEGER
2121 max_desync_factor - INTEGER
2129 regen_max_retry - INTEGER
2135 max_addresses - INTEGER
2143 disable_ipv6 - BOOLEAN
2145 will be dynamically set to TRUE if DAD fails for the link-local
2151 it will dynamically create a link-local address on the given
2159 accept_dad - INTEGER
2165 2 Enable DAD, and disable IPv6 operation if MAC-based duplicate
2166 link-local address has been found.
2172 force_tllao - BOOLEAN
2173 Enable sending the target link-layer address option even when
2178 Quoting from RFC 2461, section 4.4, Target link-layer address:
2184 omitted since the sender of the solicitation has the correct link-
2185 layer address; otherwise it would not have be able to send the unicast
2186 solicitation in the first place. However, including the link-layer
2188 race condition where the sender deletes the cached link-layer address
2191 ndisc_notify - BOOLEAN
2194 * 0 - (default): do nothing
2195 * 1 - Generate unsolicited neighbour advertisements when device is brought
2198 ndisc_tclass - INTEGER
2206 * 0 - (default)
2208 mldv1_unsolicited_report_interval - INTEGER
2214 mldv2_unsolicited_report_interval - INTEGER
2220 force_mld_version - INTEGER
2221 * 0 - (default) No enforcement of a MLD version, MLDv1 fallback allowed
2222 * 1 - Enforce to use MLD version 1
2223 * 2 - Enforce to use MLD version 2
2225 suppress_frag_ndisc - INTEGER
2229 * 1 - (default) discard fragmented neighbor discovery packets
2230 * 0 - allow fragmented neighbor discovery packets
2232 optimistic_dad - BOOLEAN
2242 use_optimistic - BOOLEAN
2254 stable_secret - IPv6 address
2256 addresses for link-local addresses and autoconfigured
2259 addrgenmode ip-link. conf/default/stable_secret is used as the
2268 addr_gen_mode - INTEGER
2269 Defines how link-local and autoconf addresses are generated.
2273 1 do no generate a link-local address, use EUI64 for addresses
2280 drop_unicast_in_l2_multicast - BOOLEAN
2281 Drop any unicast IPv6 packets that are received in link-layer
2286 drop_unsolicited_na - BOOLEAN
2293 enhanced_dad - BOOLEAN
2306 ratelimit - INTEGER
2314 ratemask - list of comma separated ranges
2319 list of ranges (e.g. "0-127,129" for ICMPv6 message type 0 to 127 and
2323 Refer to: https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml
2327 Default: 0-1,3-127 (rate limit ICMPv6 errors except Packet Too Big)
2329 echo_ignore_all - BOOLEAN
2330 If set non-zero, then the kernel will ignore all ICMP ECHO
2335 echo_ignore_multicast - BOOLEAN
2336 If set non-zero, then the kernel will ignore all ICMP ECHO
2341 echo_ignore_anycast - BOOLEAN
2342 If set non-zero, then the kernel will ignore all ICMP ECHO
2347 xfrm6_gc_thresh - INTEGER
2348 (Obsolete since linux-4.14)
2356 YOSHIFUJI Hideaki / USAGI Project <yoshfuji@linux-ipv6.org>
2362 bridge-nf-call-arptables - BOOLEAN
2363 - 1 : pass bridged ARP traffic to arptables' FORWARD chain.
2364 - 0 : disable this.
2368 bridge-nf-call-iptables - BOOLEAN
2369 - 1 : pass bridged IPv4 traffic to iptables' chains.
2370 - 0 : disable this.
2374 bridge-nf-call-ip6tables - BOOLEAN
2375 - 1 : pass bridged IPv6 traffic to ip6tables' chains.
2376 - 0 : disable this.
2380 bridge-nf-filter-vlan-tagged - BOOLEAN
2381 - 1 : pass bridged vlan-tagged ARP/IP/IPv6 traffic to {arp,ip,ip6}tables.
2382 - 0 : disable this.
2386 bridge-nf-filter-pppoe-tagged - BOOLEAN
2387 - 1 : pass bridged pppoe-tagged IP/IPv6 traffic to {ip,ip6}tables.
2388 - 0 : disable this.
2392 bridge-nf-pass-vlan-input-dev - BOOLEAN
2393 - 1: if bridge-nf-filter-vlan-tagged is enabled, try to find a vlan
2395 vlan. This allows use of e.g. "iptables -i br0.1" and makes the
2396 REDIRECT target work with vlan-on-top-of-bridge interfaces. When no
2400 - 0: disable bridge netfilter vlan interface lookup.
2407 addip_enable - BOOLEAN
2409 (ADD-IP) functionality specified in RFC5061. This extension provides
2419 pf_enable - INTEGER
2429 https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-failover for
2438 pf_expose - INTEGER
2443 SCTP_ADDR_PF state will be sent and a SCTP_PF-state transport info
2446 SCTP_PF state and a SCTP_PF-state transport info can be got via
2448 SCTP_PEER_ADDR_CHANGE event will be sent and it returns -EACCES when
2449 trying to get a SCTP_PF-state transport info via SCTP_GET_PEER_ADDR_INFO
2460 addip_noauth_enable - BOOLEAN
2461 Dynamic Address Reconfiguration (ADD-IP) requires the use of
2466 allowing the ADD-IP extension. For reasons of interoperability,
2471 1 Allow ADD-IP extension to be used without authentication. This
2480 auth_enable - BOOLEAN
2484 (ADD-IP) extension.
2486 - 1: Enable this extension.
2487 - 0: Disable this extension.
2491 prsctp_enable - BOOLEAN
2495 - 1: Enable extension
2496 - 0: Disable
2500 max_burst - INTEGER
2506 association_max_retrans - INTEGER
2513 max_init_retransmits - INTEGER
2514 The maximum number of retransmissions of INIT and COOKIE-ECHO chunks
2520 path_max_retrans - INTEGER
2528 pf_retrans - INTEGER
2536 http://www.ietf.org/id/draft-nishida-tsvwg-sctp-failover-05.txt
2544 ps_retrans - INTEGER
2545 Primary.Switchover.Max.Retrans (PSMR), it's a tunable parameter coming
2546 from section-5 "Primary Path Switchover" in rfc7829. The primary path
2548 the old primary path exceeds PSMR, so that "the SCTP sender is allowed
2550 primary destination address becomes active again". Note this feature
2556 rto_initial - INTEGER
2563 rto_max - INTEGER
2569 rto_min - INTEGER
2575 hb_interval - INTEGER
2582 sack_timeout - INTEGER
2588 valid_cookie_life - INTEGER
2594 cookie_preserve_enable - BOOLEAN
2598 - 1: Enable cookie lifetime extension.
2599 - 0: Disable
2603 cookie_hmac_alg - STRING
2605 a listening sctp socket to a connecting client in the INIT-ACK chunk.
2619 rcvbuf_policy - INTEGER
2630 - 1: rcvbuf space is per association
2631 - 0: rcvbuf space is per socket
2635 sndbuf_policy - INTEGER
2638 - 1: Send buffer is tracked per association
2639 - 0: Send buffer is tracked per socket.
2643 sctp_mem - vector of 3 INTEGERs: min, pressure, max
2656 sctp_rmem - vector of 3 INTEGERs: min, default, max
2666 sctp_wmem - vector of 3 INTEGERs: min, default, max
2676 addr_scope_policy - INTEGER
2677 Control IPv4 address scoping - draft-stewart-tsvwg-sctp-ipv4-00
2679 - 0 - Disable IPv4 address scoping
2680 - 1 - Enable IPv4 address scoping
2681 - 2 - Follow draft but allow IPv4 private addresses
2682 - 3 - Follow draft but allow IPv4 link local addresses
2690 Please see: Documentation/admin-guide/sysctl/net.rst for descriptions of these entries.
2696 max_dgram_qlen - INTEGER