OpenCores
URL https://opencores.org/ocsvn/or1k/or1k/trunk

Subversion Repositories or1k

[/] [or1k/] [trunk/] [linux/] [linux-2.4/] [Documentation/] [networking/] [ip-sysctl.txt] - Blame information for rev 1765

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 1275 phoenix
/proc/sys/net/ipv4/* Variables:
2
 
3
ip_forward - BOOLEAN
4
 
5
        not 0 - enabled
6
 
7
        Forward Packets between interfaces.
8
 
9
        This variable is special, its change resets all configuration
10
        parameters to their default state (RFC1122 for hosts, RFC1812
11
        for routers)
12
 
13
ip_default_ttl - INTEGER
14
        default 64
15
 
16
ip_no_pmtu_disc - BOOLEAN
17
        Disable Path MTU Discovery.
18
        default FALSE
19
 
20
IP Fragmentation:
21
 
22
ipfrag_high_thresh - INTEGER
23
        Maximum memory used to reassemble IP fragments. When
24
        ipfrag_high_thresh bytes of memory is allocated for this purpose,
25
        the fragment handler will toss packets until ipfrag_low_thresh
26
        is reached.
27
 
28
ipfrag_low_thresh - INTEGER
29
        See ipfrag_high_thresh
30
 
31
ipfrag_time - INTEGER
32
        Time in seconds to keep an IP fragment in memory.
33
 
34
INET peer storage:
35
 
36
inet_peer_threshold - INTEGER
37
        The approximate size of the storage.  Starting from this threshold
38
        entries will be thrown aggressively.  This threshold also determines
39
        entries' time-to-live and time intervals between garbage collection
40
        passes.  More entries, less time-to-live, less GC interval.
41
 
42
inet_peer_minttl - INTEGER
43
        Minimum time-to-live of entries.  Should be enough to cover fragment
44
        time-to-live on the reassembling side.  This minimum time-to-live  is
45
        guaranteed if the pool size is less than inet_peer_threshold.
46
        Measured in jiffies(1).
47
 
48
inet_peer_maxttl - INTEGER
49
        Maximum time-to-live of entries.  Unused entries will expire after
50
        this period of time if there is no memory pressure on the pool (i.e.
51
        when the number of entries in the pool is very small).
52
        Measured in jiffies(1).
53
 
54
inet_peer_gc_mintime - INTEGER
55
        Minimum interval between garbage collection passes.  This interval is
56
        in effect under high memory pressure on the pool.
57
        Measured in jiffies(1).
58
 
59
inet_peer_gc_maxtime - INTEGER
60
        Minimum interval between garbage collection passes.  This interval is
61
        in effect under low (or absent) memory pressure on the pool.
62
        Measured in jiffies(1).
63
 
64
TCP variables:
65
 
66
tcp_syn_retries - INTEGER
67
        Number of times initial SYNs for an active TCP connection attempt
68
        will be retransmitted. Should not be higher than 255. Default value
69
        is 5, which corresponds to ~180seconds.
70
 
71
tcp_synack_retries - INTEGER
72
        Number of times SYNACKs for a passive TCP connection attempt will
73
        be retransmitted. Should not be higher than 255. Default value
74
        is 5, which corresponds to ~180seconds.
75
 
76
tcp_keepalive_time - INTEGER
77
        How often TCP sends out keepalive messages when keepalive is enabled.
78
        Default: 2hours.
79
 
80
tcp_keepalive_probes - INTEGER
81
        How many keepalive probes TCP sends out, until it decides that the
82
        connection is broken. Default value: 9.
83
 
84
tcp_keepalive_intvl - INTEGER
85
        How frequently the probes are send out. Multiplied by
86
        tcp_keepalive_probes it is time to kill not responding connection,
87
        after probes started. Default value: 75sec i.e. connection
88
        will be aborted after ~11 minutes of retries.
89
 
90
tcp_retries1 - INTEGER
91
        How many times to retry before deciding that something is wrong
92
        and it is necessary to report this suspection to network layer.
93
        Minimal RFC value is 3, it is default, which corresponds
94
        to ~3sec-8min depending on RTO.
95
 
96
tcp_retries2 - INTEGER
97
        How may times to retry before killing alive TCP connection.
98
        RFC1122 says that the limit should be longer than 100 sec.
99
        It is too small number. Default value 15 corresponds to ~13-30min
100
        depending on RTO.
101
 
102
tcp_orphan_retries - INTEGER
103
        How may times to retry before killing TCP connection, closed
104
        by our side. Default value 7 corresponds to ~50sec-16min
105
        depending on RTO. If you machine is loaded WEB server,
106
        you should think about lowering this value, such sockets
107
        may consume significant resources. Cf. tcp_max_orphans.
108
 
109
tcp_fin_timeout - INTEGER
110
        Time to hold socket in state FIN-WAIT-2, if it was closed
111
        by our side. Peer can be broken and never close its side,
112
        or even died unexpectedly. Default value is 60sec.
113
        Usual value used in 2.2 was 180 seconds, you may restore
114
        it, but remember that if your machine is even underloaded WEB server,
115
        you risk to overflow memory with kilotons of dead sockets,
116
        FIN-WAIT-2 sockets are less dangerous than FIN-WAIT-1,
117
        because they eat maximum 1.5K of memory, but they tend
118
        to live longer. Cf. tcp_max_orphans.
119
 
120
tcp_max_tw_buckets - INTEGER
121
        Maximal number of timewait sockets held by system simultaneously.
122
        If this number is exceeded time-wait socket is immediately destroyed
123
        and warning is printed. This limit exists only to prevent
124
        simple DoS attacks, you _must_ not lower the limit artificially,
125
        but rather increase it (probably, after increasing installed memory),
126
        if network conditions require more than default value.
127
 
128
tcp_tw_recycle - BOOLEAN
129
        Enable fast recycling TIME-WAIT sockets. Default value is 0.
130
        It should not be changed without advice/request of technical
131
        experts.
132
 
133
tcp_tw_reuse - BOOLEAN
134
        Allow to reuse TIME-WAIT sockets for new connections when it is
135
        safe from protocol viewpoint. Default value is 0.
136
        It should not be changed without advice/request of technical
137
        experts.
138
 
139
tcp_max_orphans - INTEGER
140
        Maximal number of TCP sockets not attached to any user file handle,
141
        held by system. If this number is exceeded orphaned connections are
142
        reset immediately and warning is printed. This limit exists
143
        only to prevent simple DoS attacks, you _must_ not rely on this
144
        or lower the limit artificially, but rather increase it
145
        (probably, after increasing installed memory),
146
        if network conditions require more than default value,
147
        and tune network services to linger and kill such states
148
        more aggressively. Let me to remind again: each orphan eats
149
        up to ~64K of unswappable memory.
150
 
151
tcp_abort_on_overflow - BOOLEAN
152
        If listening service is too slow to accept new connections,
153
        reset them. Default state is FALSE. It means that if overflow
154
        occurred due to a burst, connection will recover. Enable this
155
        option _only_ if you are really sure that listening daemon
156
        cannot be tuned to accept connections faster. Enabling this
157
        option can harm clients of your server.
158
 
159
tcp_syncookies - BOOLEAN
160
        Only valid when the kernel was compiled with CONFIG_SYNCOOKIES
161
        Send out syncookies when the syn backlog queue of a socket
162
        overflows. This is to prevent against the common 'syn flood attack'
163
        Default: FALSE
164
 
165
        Note, that syncookies is fallback facility.
166
        It MUST NOT be used to help highly loaded servers to stand
167
        against legal connection rate. If you see synflood warnings
168
        in your logs, but investigation shows that they occur
169
        because of overload with legal connections, you should tune
170
        another parameters until this warning disappear.
171
        See: tcp_max_syn_backlog, tcp_synack_retries, tcp_abort_on_overflow.
172
 
173
        syncookies seriously violate TCP protocol, do not allow
174
        to use TCP extensions, can result in serious degradation
175
        of some services (f.e. SMTP relaying), visible not by you,
176
        but your clients and relays, contacting you. While you see
177
        synflood warnings in logs not being really flooded, your server
178
        is seriously misconfigured.
179
 
180
tcp_stdurg - BOOLEAN
181
        Use the Host requirements interpretation of the TCP urg pointer field.
182
        Most hosts use the older BSD interpretation, so if you turn this on
183
        Linux might not communicate correctly with them.
184
        Default: FALSE
185
 
186
tcp_max_syn_backlog - INTEGER
187
        Maximal number of remembered connection requests, which are
188
        still did not receive an acknowledgement from connecting client.
189
        Default value is 1024 for systems with more than 128Mb of memory,
190
        and 128 for low memory machines. If server suffers of overload,
191
        try to increase this number.
192
 
193
tcp_window_scaling - BOOLEAN
194
        Enable window scaling as defined in RFC1323.
195
 
196
tcp_timestamps - BOOLEAN
197
        Enable timestamps as defined in RFC1323.
198
 
199
tcp_sack - BOOLEAN
200
        Enable select acknowledgments (SACKS).
201
 
202
tcp_fack - BOOLEAN
203
        Enable FACK congestion avoidance and fast restransmission.
204
        The value is not used, if tcp_sack is not enabled.
205
 
206
tcp_dsack - BOOLEAN
207
        Allows TCP to send "duplicate" SACKs.
208
 
209
tcp_ecn - BOOLEAN
210
        Enable Explicit Congestion Notification in TCP.
211
 
212
tcp_reordering - INTEGER
213
        Maximal reordering of packets in a TCP stream.
214
        Default: 3
215
 
216
tcp_retrans_collapse - BOOLEAN
217
        Bug-to-bug compatibility with some broken printers.
218
        On retransmit try to send bigger packets to work around bugs in
219
        certain TCP stacks.
220
 
221
tcp_wmem - vector of 3 INTEGERs: min, default, max
222
        min: Amount of memory reserved for send buffers for TCP socket.
223
        Each TCP socket has rights to use it due to fact of its birth.
224
        Default: 4K
225
 
226
        default: Amount of memory allowed for send buffers for TCP socket
227
        by default. This value overrides net.core.wmem_default used
228
        by other protocols, it is usually lower than net.core.wmem_default.
229
        Default: 16K
230
 
231
        max: Maximal amount of memory allowed for automatically selected
232
        send buffers for TCP socket. This value does not override
233
        net.core.wmem_max, "static" selection via SO_SNDBUF does not use this.
234
        Default: 128K
235
 
236
tcp_rmem - vector of 3 INTEGERs: min, default, max
237
        min: Minimal size of receive buffer used by TCP sockets.
238
        It is guaranteed to each TCP socket, even under moderate memory
239
        pressure.
240
        Default: 8K
241
 
242
        default: default size of receive buffer used by TCP sockets.
243
        This value overrides net.core.rmem_default used by other protocols.
244
        Default: 87380 bytes. This value results in window of 65535 with
245
        default setting of tcp_adv_win_scale and tcp_app_win:0 and a bit
246
        less for default tcp_app_win. See below about these variables.
247
 
248
        max: maximal size of receive buffer allowed for automatically
249
        selected receiver buffers for TCP socket. This value does not override
250
        net.core.rmem_max, "static" selection via SO_RCVBUF does not use this.
251
        Default: 87380*2 bytes.
252
 
253
tcp_mem - vector of 3 INTEGERs: min, pressure, max
254
        low: below this number of pages TCP is not bothered about its
255
        memory appetite.
256
 
257
        pressure: when amount of memory allocated by TCP exceeds this number
258
        of pages, TCP moderates its memory consumption and enters memory
259
        pressure mode, which is exited when memory consumtion falls
260
        under "low".
261
 
262
        high: number of pages allowed for queueing by all TCP sockets.
263
 
264
        Defaults are calculated at boot time from amount of available
265
        memory.
266
 
267
tcp_app_win - INTEGER
268
        Reserve max(window/2^tcp_app_win, mss) of window for application
269
        buffer. Value 0 is special, it means that nothing is reserved.
270
        Default: 31
271
 
272
tcp_adv_win_scale - INTEGER
273
        Count buffering overhead as bytes/2^tcp_adv_win_scale
274
        (if tcp_adv_win_scale > 0) or bytes-bytes/2^(-tcp_adv_win_scale),
275
        if it is <= 0.
276
        Default: 2
277
 
278
tcp_rfc1337 - BOOLEAN
279
        If set, the TCP stack behaves conforming to RFC1337. If unset,
280
        we are not conforming to RFC, but prevent TCP TIME_WAIT
281
        asassination.
282
        Default: 0
283
 
284
tcp_low_latency - BOOLEAN
285
        If set, the TCP stack makes decisions that prefer lower
286
        latency as opposed to higher throughput.  By default, this
287
        option is not set meaning that higher throughput is preferred.
288
        An example of an application where this default should be
289
        changed would be a Beowulf compute cluster.
290
        Default: 0
291
 
292
ip_local_port_range - 2 INTEGERS
293
        Defines the local port range that is used by TCP and UDP to
294
        choose the local port. The first number is the first, the
295
        second the last local port number. Default value depends on
296
        amount of memory available on the system:
297
        > 128Mb 32768-61000
298
        < 128Mb 1024-4999 or even less.
299
        This number defines number of active connections, which this
300
        system can issue simultaneously to systems not supporting
301
        TCP extensions (timestamps). With tcp_tw_recycle enabled
302
        (i.e. by default) range 1024-4999 is enough to issue up to
303
        2000 connections per second to systems supporting timestamps.
304
 
305
ip_nonlocal_bind - BOOLEAN
306
        If set, allows processes to bind() to non-local IP adresses,
307
        which can be quite useful - but may break some applications.
308
        Default: 0
309
 
310
ip_dynaddr - BOOLEAN
311
        If set non-zero, enables support for dynamic addresses.
312
        If set to a non-zero value larger than 1, a kernel log
313
        message will be printed when dynamic address rewriting
314
        occurs.
315
        Default: 0
316
 
317
icmp_echo_ignore_all - BOOLEAN
318
icmp_echo_ignore_broadcasts - BOOLEAN
319
        If either is set to true, then the kernel will ignore either all
320
        ICMP ECHO requests sent to it or just those to broadcast/multicast
321
        addresses, respectively.
322
 
323
icmp_ratelimit - INTEGER
324
        Limit the maximal rates for sending ICMP packets whose type matches
325
        icmp_ratemask (see below) to specific targets.
326
 
327
        Default: 100
328
 
329
icmp_ratemask - INTEGER
330
        Mask made of ICMP types for which rates are being limited.
331
        Significant bits: IHGFEDCBA9876543210
332
        Default mask:     0000001100000011000 (6168)
333
 
334
        Bit definitions (see include/linux/icmp.h):
335
 
336
                3 Destination Unreachable *
337
                4 Source Quench *
338
                5 Redirect
339
                8 Echo Request
340
                B Time Exceeded *
341
                C Parameter Problem *
342
                D Timestamp Request
343
                E Timestamp Reply
344
                F Info Request
345
                G Info Reply
346
                H Address Mask Request
347
                I Address Mask Reply
348
 
349
        * These are rate limited by default (see default mask above)
350
 
351
icmp_ignore_bogus_error_responses - BOOLEAN
352
        Some routers violate RFC1122 by sending bogus responses to broadcast
353
        frames.  Such violations are normally logged via a kernel warning.
354
        If this is set to TRUE, the kernel will not give such warnings, which
355
        will avoid log file clutter.
356
        Default: FALSE
357
 
358
igmp_max_memberships - INTEGER
359
        Change the maximum number of multicast groups we can subscribe to.
360
        Default: 20
361
 
362
conf/interface/*  changes special settings per interface (where "interface" is
363
                  the name of your network interface)
364
conf/all/*        is special, changes the settings for all interfaces
365
 
366
 
367
log_martians - BOOLEAN
368
        Log packets with impossible addresses to kernel log.
369
        log_martians for the interface will be enabled if at least one of
370
        conf/{all,interface}/log_martians is set to TRUE,
371
        it will be disabled otherwise
372
 
373
accept_redirects - BOOLEAN
374
        Accept ICMP redirect messages.
375
        accept_redirects for the interface will be enabled if:
376
        - both conf/{all,interface}/accept_redirects are TRUE in the case forwarding
377
          for the interface is enabled
378
        or
379
        - at least one of conf/{all,interface}/accept_redirects is TRUE in the case
380
          forwarding for the interface is disabled
381
        accept_redirects for the interface will be disabled otherwise
382
        default TRUE (host)
383
                FALSE (router)
384
 
385
forwarding - BOOLEAN
386
        Enable IP forwarding on this interface.
387
 
388
mc_forwarding - BOOLEAN
389
        Do multicast routing. The kernel needs to be compiled with CONFIG_MROUTE
390
        and a multicast routing daemon is required.
391
        conf/all/mc_forwarding must also be set to TRUE to enable multicast routing
392
        for the interface
393
 
394
medium_id - INTEGER
395
        Integer value used to differentiate the devices by the medium they
396
        are attached to. Two devices can have different id values when
397
        the broadcast packets are received only on one of them.
398
        The default value 0 means that the device is the only interface
399
        to its medium, value of -1 means that medium is not known.
400
 
401
        Currently, it is used to change the proxy_arp behavior:
402
        the proxy_arp feature is enabled for packets forwarded between
403
        two devices attached to different media.
404
 
405
proxy_arp - BOOLEAN
406
        Do proxy arp.
407
        proxy_arp for the interface will be enabled if at least one of
408
        conf/{all,interface}/proxy_arp is set to TRUE,
409
        it will be disabled otherwise
410
 
411
shared_media - BOOLEAN
412
        Send(router) or accept(host) RFC1620 shared media redirects.
413
        Overrides ip_secure_redirects.
414
        shared_media for the interface will be enabled if at least one of
415
        conf/{all,interface}/shared_media is set to TRUE,
416
        it will be disabled otherwise
417
        default TRUE
418
 
419
secure_redirects - BOOLEAN
420
        Accept ICMP redirect messages only for gateways,
421
        listed in default gateway list.
422
        secure_redirects for the interface will be enabled if at least one of
423
        conf/{all,interface}/secure_redirects is set to TRUE,
424
        it will be disabled otherwise
425
        default TRUE
426
 
427
send_redirects - BOOLEAN
428
        Send redirects, if router.
429
        send_redirects for the interface will be enabled if at least one of
430
        conf/{all,interface}/send_redirects is set to TRUE,
431
        it will be disabled otherwise
432
        Default: TRUE
433
 
434
bootp_relay - BOOLEAN
435
        Accept packets with source address 0.b.c.d destined
436
        not to this host as local ones. It is supposed, that
437
        BOOTP relay daemon will catch and forward such packets.
438
        conf/all/bootp_relay must also be set to TRUE to enable BOOTP relay
439
        for the interface
440
        default FALSE
441
        Not Implemented Yet.
442
 
443
accept_source_route - BOOLEAN
444
        Accept packets with SRR option.
445
        conf/all/accept_source_route must also be set to TRUE to accept packets
446
        with SRR option on the interface
447
        default TRUE (router)
448
                FALSE (host)
449
 
450
rp_filter - BOOLEAN
451
        1 - do source validation by reversed path, as specified in RFC1812
452
            Recommended option for single homed hosts and stub network
453
            routers. Could cause troubles for complicated (not loop free)
454
            networks running a slow unreliable protocol (sort of RIP),
455
            or using static routes.
456
 
457
 
458
 
459
        conf/all/rp_filter must also be set to TRUE to do source validation
460
        on the interface
461
 
462
        Default value is 0. Note that some distributions enable it
463
        in startup scripts.
464
 
465
arp_filter - BOOLEAN
466
        1 - Allows you to have multiple network interfaces on the same
467
        subnet, and have the ARPs for each interface be answered
468
        based on whether or not the kernel would route a packet from
469
        the ARP'd IP out that interface (therefore you must use source
470
        based routing for this to work). In other words it allows control
471
        of which cards (usually 1) will respond to an arp request.
472
 
473
 
474
        from other interfaces. This may seem wrong but it usually makes
475
        sense, because it increases the chance of successful communication.
476
        IP addresses are owned by the complete host on Linux, not by
477
        particular interfaces. Only for more complex setups like load-
478
        balancing, does this behaviour cause problems.
479
 
480
        arp_filter for the interface will be enabled if at least one of
481
        conf/{all,interface}/arp_filter is set to TRUE,
482
        it will be disabled otherwise
483
 
484
arp_announce - INTEGER
485
        Define different restriction levels for announcing the local
486
        source IP address from IP packets in ARP requests sent on
487
        interface:
488
 
489
        1 - Try to avoid local addresses that are not in the target's
490
        subnet for this interface. This mode is useful when target
491
        hosts reachable via this interface require the source IP
492
        address in ARP requests to be part of their logical network
493
        configured on the receiving interface. When we generate the
494
        request we will check all our subnets that include the
495
        target IP and will preserve the source address if it is from
496
        such subnet. If there is no such subnet we select source
497
        address according to the rules for level 2.
498
        2 - Always use the best local address for this target.
499
        In this mode we ignore the source address in the IP packet
500
        and try to select local address that we prefer for talks with
501
        the target host. Such local address is selected by looking
502
        for primary IP addresses on all our subnets on the outgoing
503
        interface that include the target IP address. If no suitable
504
        local address is found we select the first local address
505
        we have on the outgoing interface or on all other interfaces,
506
        with the hope we will receive reply for our request and
507
        even sometimes no matter the source IP address we announce.
508
 
509
        The max value from conf/{all,interface}/arp_announce is used.
510
 
511
        Increasing the restriction level gives more chance for
512
        receiving answer from the resolved target while decreasing
513
        the level announces more valid sender's information.
514
 
515
arp_ignore - INTEGER
516
        Define different modes for sending replies in response to
517
        received ARP requests that resolve local target IP addresses:
518
 
519
        on any interface
520
        1 - reply only if the target IP address is local address
521
        configured on the incoming interface
522
        2 - reply only if the target IP address is local address
523
        configured on the incoming interface and both with the
524
        sender's IP address are part from same subnet on this interface
525
        3 - do not reply for local addresses configured with scope host,
526
        only resolutions for global and link addresses are replied
527
        4-7 - reserved
528
        8 - do not reply for all local addresses
529
 
530
        The max value from conf/{all,interface}/arp_ignore is used
531
        when ARP request is received on the {interface}
532
 
533
tag - INTEGER
534
        Allows you to write a number, which can be used as required.
535
        Default value is 0.
536
 
537
(1) Jiffie: internal timeunit for the kernel. On the i386 1/100s, on the
538
Alpha 1/1024s. See the HZ define in /usr/include/asm/param.h for the exact
539
value on your system.
540
 
541
Alexey Kuznetsov.
542
kuznet@ms2.inr.ac.ru
543
 
544
Updated by:
545
Andi Kleen
546
ak@muc.de
547
Nicolas Delon
548
delon.nicolas@wanadoo.fr
549
 
550
 
551
 
552
 
553
/proc/sys/net/ipv6/* Variables:
554
 
555
IPv6 has no global variables such as tcp_*.  tcp_* settings under ipv4/ also
556
apply to IPv6 [XXX?].
557
 
558
bindv6only - BOOLEAN
559
        Default value for IPV6_V6ONLY socket option,
560
        which restricts use of the IPv6 socket to IPv6 communication
561
        only.
562
                TRUE: disable IPv4-mapped address feature
563
                FALSE: enable IPv4-mapped address feature
564
 
565
        Default: FALSE (as specified in RFC2553bis)
566
 
567
conf/default/*:
568
        Change the interface-specific default settings.
569
 
570
 
571
conf/all/*:
572
        Change all the interface-specific settings.
573
 
574
        [XXX:  Other special features than forwarding?]
575
 
576
conf/all/forwarding - BOOLEAN
577
        Enable global IPv6 forwarding between all interfaces.
578
 
579
        IPv4 and IPv6 work differently here; e.g. netfilter must be used
580
        to control which interfaces may forward packets and which not.
581
 
582
        This also sets all interfaces' Host/Router setting
583
        'forwarding' to the specified value.  See below for details.
584
 
585
        This referred to as global forwarding.
586
 
587
conf/interface/*:
588
        Change special settings per interface.
589
 
590
        The functional behaviour for certain settings is different
591
        depending on whether local forwarding is enabled or not.
592
 
593
accept_ra - BOOLEAN
594
        Accept Router Advertisements; autoconfigure using them.
595
 
596
        Functional default: enabled if local forwarding is disabled.
597
                            disabled if local forwarding is enabled.
598
 
599
accept_redirects - BOOLEAN
600
        Accept Redirects.
601
 
602
        Functional default: enabled if local forwarding is disabled.
603
                            disabled if local forwarding is enabled.
604
 
605
autoconf - BOOLEAN
606
        Configure link-local addresses using L2 hardware addresses.
607
 
608
        Default: TRUE
609
 
610
dad_transmits - INTEGER
611
        The amount of Duplicate Address Detection probes to send.
612
        Default: 1
613
 
614
forwarding - BOOLEAN
615
        Configure interface-specific Host/Router behaviour.
616
 
617
        Note: It is recommended to have the same setting on all
618
        interfaces; mixed router/host scenarios are rather uncommon.
619
 
620
        FALSE:
621
 
622
        By default, Host behaviour is assumed.  This means:
623
 
624
        1. IsRouter flag is not set in Neighbour Advertisements.
625
        2. Router Solicitations are being sent when necessary.
626
        3. If accept_ra is TRUE (default), accept Router
627
           Advertisements (and do autoconfiguration).
628
        4. If accept_redirects is TRUE (default), accept Redirects.
629
 
630
        TRUE:
631
 
632
        If local forwarding is enabled, Router behaviour is assumed.
633
        This means exactly the reverse from the above:
634
 
635
        1. IsRouter flag is set in Neighbour Advertisements.
636
        2. Router Solicitations are not sent.
637
        3. Router Advertisements are ignored.
638
        4. Redirects are ignored.
639
 
640
        Default: FALSE if global forwarding is disabled (default),
641
                 otherwise TRUE.
642
 
643
hop_limit - INTEGER
644
        Default Hop Limit to set.
645
        Default: 64
646
 
647
mtu - INTEGER
648
        Default Maximum Transfer Unit
649
        Default: 1280 (IPv6 required minimum)
650
 
651
router_solicitation_delay - INTEGER
652
        Number of seconds to wait after interface is brought up
653
        before sending Router Solicitations.
654
        Default: 1
655
 
656
router_solicitation_interval - INTEGER
657
        Number of seconds to wait between Router Solicitations.
658
        Default: 4
659
 
660
router_solicitations - INTEGER
661
        Number of Router Solicitations to send until assuming no
662
        routers are present.
663
        Default: 3
664
 
665
icmp/*:
666
ratelimit - INTEGER
667
        Limit the maximal rates for sending ICMPv6 packets.
668
 
669
        Default: 100
670
 
671
IPv6 Update by:
672
Pekka Savola 
673
YOSHIFUJI Hideaki / USAGI Project 
674
 
675
$Id: ip-sysctl.txt,v 1.1.1.1 2004-04-15 02:33:46 phoenix Exp $

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.