nf_conntrack-sysctl.txt 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177
  1. /proc/sys/net/netfilter/nf_conntrack_* Variables:
  2. nf_conntrack_acct - BOOLEAN
  3. 0 - disabled (default)
  4. not 0 - enabled
  5. Enable connection tracking flow accounting. 64-bit byte and packet
  6. counters per flow are added.
  7. nf_conntrack_buckets - INTEGER (read-only)
  8. Size of hash table. If not specified as parameter during module
  9. loading, the default size is calculated by dividing total memory
  10. by 16384 to determine the number of buckets but the hash table will
  11. never have fewer than 32 and limited to 16384 buckets. For systems
  12. with more than 4GB of memory it will be 65536 buckets.
  13. nf_conntrack_checksum - BOOLEAN
  14. 0 - disabled
  15. not 0 - enabled (default)
  16. Verify checksum of incoming packets. Packets with bad checksums are
  17. in INVALID state. If this is enabled, such packets will not be
  18. considered for connection tracking.
  19. nf_conntrack_count - INTEGER (read-only)
  20. Number of currently allocated flow entries.
  21. nf_conntrack_events - BOOLEAN
  22. 0 - disabled
  23. not 0 - enabled (default)
  24. If this option is enabled, the connection tracking code will
  25. provide userspace with connection tracking events via ctnetlink.
  26. nf_conntrack_events_retry_timeout - INTEGER (seconds)
  27. default 15
  28. This option is only relevant when "reliable connection tracking
  29. events" are used. Normally, ctnetlink is "lossy", that is,
  30. events are normally dropped when userspace listeners can't keep up.
  31. Userspace can request "reliable event mode". When this mode is
  32. active, the conntrack will only be destroyed after the event was
  33. delivered. If event delivery fails, the kernel periodically
  34. re-tries to send the event to userspace.
  35. This is the maximum interval the kernel should use when re-trying
  36. to deliver the destroy event.
  37. A higher number means there will be fewer delivery retries and it
  38. will take longer for a backlog to be processed.
  39. nf_conntrack_expect_max - INTEGER
  40. Maximum size of expectation table. Default value is
  41. nf_conntrack_buckets / 256. Minimum is 1.
  42. nf_conntrack_frag6_high_thresh - INTEGER
  43. default 262144
  44. Maximum memory used to reassemble IPv6 fragments. When
  45. nf_conntrack_frag6_high_thresh bytes of memory is allocated for this
  46. purpose, the fragment handler will toss packets until
  47. nf_conntrack_frag6_low_thresh is reached.
  48. nf_conntrack_frag6_low_thresh - INTEGER
  49. default 196608
  50. See nf_conntrack_frag6_low_thresh
  51. nf_conntrack_frag6_timeout - INTEGER (seconds)
  52. default 60
  53. Time to keep an IPv6 fragment in memory.
  54. nf_conntrack_generic_timeout - INTEGER (seconds)
  55. default 600
  56. Default for generic timeout. This refers to layer 4 unknown/unsupported
  57. protocols.
  58. nf_conntrack_helper - BOOLEAN
  59. 0 - disabled
  60. not 0 - enabled (default)
  61. Enable automatic conntrack helper assignment.
  62. nf_conntrack_icmp_timeout - INTEGER (seconds)
  63. default 30
  64. Default for ICMP timeout.
  65. nf_conntrack_icmpv6_timeout - INTEGER (seconds)
  66. default 30
  67. Default for ICMP6 timeout.
  68. nf_conntrack_log_invalid - INTEGER
  69. 0 - disable (default)
  70. 1 - log ICMP packets
  71. 6 - log TCP packets
  72. 17 - log UDP packets
  73. 33 - log DCCP packets
  74. 41 - log ICMPv6 packets
  75. 136 - log UDPLITE packets
  76. 255 - log packets of any protocol
  77. Log invalid packets of a type specified by value.
  78. nf_conntrack_max - INTEGER
  79. Size of connection tracking table. Default value is
  80. nf_conntrack_buckets value * 4.
  81. nf_conntrack_tcp_be_liberal - BOOLEAN
  82. 0 - disabled (default)
  83. not 0 - enabled
  84. Be conservative in what you do, be liberal in what you accept from others.
  85. If it's non-zero, we mark only out of window RST segments as INVALID.
  86. nf_conntrack_tcp_loose - BOOLEAN
  87. 0 - disabled
  88. not 0 - enabled (default)
  89. If it is set to zero, we disable picking up already established
  90. connections.
  91. nf_conntrack_tcp_max_retrans - INTEGER
  92. default 3
  93. Maximum number of packets that can be retransmitted without
  94. received an (acceptable) ACK from the destination. If this number
  95. is reached, a shorter timer will be started.
  96. nf_conntrack_tcp_timeout_close - INTEGER (seconds)
  97. default 10
  98. nf_conntrack_tcp_timeout_close_wait - INTEGER (seconds)
  99. default 60
  100. nf_conntrack_tcp_timeout_established - INTEGER (seconds)
  101. default 432000 (5 days)
  102. nf_conntrack_tcp_timeout_fin_wait - INTEGER (seconds)
  103. default 120
  104. nf_conntrack_tcp_timeout_last_ack - INTEGER (seconds)
  105. default 30
  106. nf_conntrack_tcp_timeout_max_retrans - INTEGER (seconds)
  107. default 300
  108. nf_conntrack_tcp_timeout_syn_recv - INTEGER (seconds)
  109. default 60
  110. nf_conntrack_tcp_timeout_syn_sent - INTEGER (seconds)
  111. default 120
  112. nf_conntrack_tcp_timeout_time_wait - INTEGER (seconds)
  113. default 120
  114. nf_conntrack_tcp_timeout_unacknowledged - INTEGER (seconds)
  115. default 300
  116. nf_conntrack_timestamp - BOOLEAN
  117. 0 - disabled (default)
  118. not 0 - enabled
  119. Enable connection tracking flow timestamping.
  120. nf_conntrack_udp_timeout - INTEGER (seconds)
  121. default 30
  122. nf_conntrack_udp_timeout_stream2 - INTEGER (seconds)
  123. default 180
  124. This extended timeout will be used in case there is an UDP stream
  125. detected.