nf_conntrack-sysctl.txt 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. /proc/sys/net/netfilter/nf_conntrack_* Variables:
  2. nf_conntrack_acct - BOOLEAN
  3. 0 - disabled (default)
  4. not 0 - enabled
  5. Enable connection tracking flow accounting. 64-bit byte and packet
  6. counters per flow are added.
  7. nf_conntrack_buckets - INTEGER (read-only)
  8. Size of hash table. If not specified as parameter during module
  9. loading, the default size is calculated by dividing total memory
  10. by 16384 to determine the number of buckets but the hash table will
  11. never have fewer than 32 or more than 16384 buckets.
  12. nf_conntrack_checksum - BOOLEAN
  13. 0 - disabled
  14. not 0 - enabled (default)
  15. Verify checksum of incoming packets. Packets with bad checksums are
  16. in INVALID state. If this is enabled, such packets will not be
  17. considered for connection tracking.
  18. nf_conntrack_count - INTEGER (read-only)
  19. Number of currently allocated flow entries.
  20. nf_conntrack_events - BOOLEAN
  21. 0 - disabled
  22. not 0 - enabled (default)
  23. If this option is enabled, the connection tracking code will
  24. provide userspace with connection tracking events via ctnetlink.
  25. nf_conntrack_events_retry_timeout - INTEGER (seconds)
  26. default 15
  27. This option is only relevant when "reliable connection tracking
  28. events" are used. Normally, ctnetlink is "lossy", that is,
  29. events are normally dropped when userspace listeners can't keep up.
  30. Userspace can request "reliable event mode". When this mode is
  31. active, the conntrack will only be destroyed after the event was
  32. delivered. If event delivery fails, the kernel periodically
  33. re-tries to send the event to userspace.
  34. This is the maximum interval the kernel should use when re-trying
  35. to deliver the destroy event.
  36. A higher number means there will be fewer delivery retries and it
  37. will take longer for a backlog to be processed.
  38. nf_conntrack_expect_max - INTEGER
  39. Maximum size of expectation table. Default value is
  40. nf_conntrack_buckets / 256. Minimum is 1.
  41. nf_conntrack_frag6_high_thresh - INTEGER
  42. default 262144
  43. Maximum memory used to reassemble IPv6 fragments. When
  44. nf_conntrack_frag6_high_thresh bytes of memory is allocated for this
  45. purpose, the fragment handler will toss packets until
  46. nf_conntrack_frag6_low_thresh is reached.
  47. nf_conntrack_frag6_low_thresh - INTEGER
  48. default 196608
  49. See nf_conntrack_frag6_low_thresh
  50. nf_conntrack_frag6_timeout - INTEGER (seconds)
  51. default 60
  52. Time to keep an IPv6 fragment in memory.
  53. nf_conntrack_generic_timeout - INTEGER (seconds)
  54. default 600
  55. Default for generic timeout. This refers to layer 4 unknown/unsupported
  56. protocols.
  57. nf_conntrack_helper - BOOLEAN
  58. 0 - disabled
  59. not 0 - enabled (default)
  60. Enable automatic conntrack helper assignment.
  61. nf_conntrack_icmp_timeout - INTEGER (seconds)
  62. default 30
  63. Default for ICMP timeout.
  64. nf_conntrack_icmpv6_timeout - INTEGER (seconds)
  65. default 30
  66. Default for ICMP6 timeout.
  67. nf_conntrack_log_invalid - INTEGER
  68. 0 - disable (default)
  69. 1 - log ICMP packets
  70. 6 - log TCP packets
  71. 17 - log UDP packets
  72. 33 - log DCCP packets
  73. 41 - log ICMPv6 packets
  74. 136 - log UDPLITE packets
  75. 255 - log packets of any protocol
  76. Log invalid packets of a type specified by value.
  77. nf_conntrack_max - INTEGER
  78. Size of connection tracking table. Default value is
  79. nf_conntrack_buckets value * 4.
  80. nf_conntrack_tcp_be_liberal - BOOLEAN
  81. 0 - disabled (default)
  82. not 0 - enabled
  83. Be conservative in what you do, be liberal in what you accept from others.
  84. If it's non-zero, we mark only out of window RST segments as INVALID.
  85. nf_conntrack_tcp_loose - BOOLEAN
  86. 0 - disabled
  87. not 0 - enabled (default)
  88. If it is set to zero, we disable picking up already established
  89. connections.
  90. nf_conntrack_tcp_max_retrans - INTEGER
  91. default 3
  92. Maximum number of packets that can be retransmitted without
  93. received an (acceptable) ACK from the destination. If this number
  94. is reached, a shorter timer will be started.
  95. nf_conntrack_tcp_timeout_close - INTEGER (seconds)
  96. default 10
  97. nf_conntrack_tcp_timeout_close_wait - INTEGER (seconds)
  98. default 60
  99. nf_conntrack_tcp_timeout_established - INTEGER (seconds)
  100. default 432000 (5 days)
  101. nf_conntrack_tcp_timeout_fin_wait - INTEGER (seconds)
  102. default 120
  103. nf_conntrack_tcp_timeout_last_ack - INTEGER (seconds)
  104. default 30
  105. nf_conntrack_tcp_timeout_max_retrans - INTEGER (seconds)
  106. default 300
  107. nf_conntrack_tcp_timeout_syn_recv - INTEGER (seconds)
  108. default 60
  109. nf_conntrack_tcp_timeout_syn_sent - INTEGER (seconds)
  110. default 120
  111. nf_conntrack_tcp_timeout_time_wait - INTEGER (seconds)
  112. default 120
  113. nf_conntrack_tcp_timeout_unacknowledged - INTEGER (seconds)
  114. default 300
  115. nf_conntrack_timestamp - BOOLEAN
  116. 0 - disabled (default)
  117. not 0 - enabled
  118. Enable connection tracking flow timestamping.
  119. nf_conntrack_udp_timeout - INTEGER (seconds)
  120. default 30
  121. nf_conntrack_udp_timeout_stream2 - INTEGER (seconds)
  122. default 180
  123. This extended timeout will be used in case there is an UDP stream
  124. detected.