⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ip-sysctl.txt

📁 linux 内核源代码
💻 TXT
📖 第 1 页 / 共 3 页
字号:
	window after an idle period.  An idle period is defined at	the current RTO.  If unset, the congestion window will not	be timed out after an idle period.	Default: 1tcp_stdurg - BOOLEAN	Use the Host requirements interpretation of the TCP urg pointer field.	Most hosts use the older BSD interpretation, so if you turn this on	Linux might not communicate correctly with them.	Default: FALSEtcp_synack_retries - INTEGER	Number of times SYNACKs for a passive TCP connection attempt will	be retransmitted. Should not be higher than 255. Default value	is 5, which corresponds to ~180seconds.tcp_syncookies - BOOLEAN	Only valid when the kernel was compiled with CONFIG_SYNCOOKIES	Send out syncookies when the syn backlog queue of a socket	overflows. This is to prevent against the common 'syn flood attack'	Default: FALSE	Note, that syncookies is fallback facility.	It MUST NOT be used to help highly loaded servers to stand	against legal connection rate. If you see synflood warnings	in your logs, but investigation	shows that they occur	because of overload with legal connections, you should tune	another parameters until this warning disappear.	See: tcp_max_syn_backlog, tcp_synack_retries, tcp_abort_on_overflow.	syncookies seriously violate TCP protocol, do not allow	to use TCP extensions, can result in serious degradation	of some services (f.e. SMTP relaying), visible not by you,	but your clients and relays, contacting you. While you see	synflood warnings in logs not being really flooded, your server	is seriously misconfigured.tcp_syn_retries - INTEGER	Number of times initial SYNs for an active TCP connection attempt	will be retransmitted. Should not be higher than 255. Default value	is 5, which corresponds to ~180seconds.tcp_timestamps - BOOLEAN	Enable timestamps as defined in RFC1323.tcp_tso_win_divisor - INTEGER	This allows control over what percentage of the congestion window	can be consumed by a single TSO frame.	The setting of this parameter is a choice between burstiness and	building larger TSO frames.	Default: 3tcp_tw_recycle - BOOLEAN	Enable fast recycling TIME-WAIT sockets. Default value is 0.	It should not be changed without advice/request of technical	experts.tcp_tw_reuse - BOOLEAN	Allow to reuse TIME-WAIT sockets for new connections when it is	safe from protocol viewpoint. Default value is 0.	It should not be changed without advice/request of technical	experts.tcp_window_scaling - BOOLEAN	Enable window scaling as defined in RFC1323.tcp_wmem - vector of 3 INTEGERs: min, default, max	min: Amount of memory reserved for send buffers for TCP socket.	Each TCP socket has rights to use it due to fact of its birth.	Default: 4K	default: Amount of memory allowed for send buffers for TCP socket	by default. This value overrides net.core.wmem_default used	by other protocols, it is usually lower than net.core.wmem_default.	Default: 16K	max: Maximal amount of memory allowed for automatically selected	send buffers for TCP socket. This value does not override	net.core.wmem_max, "static" selection via SO_SNDBUF does not use this.	Default: 128Ktcp_workaround_signed_windows - BOOLEAN	If set, assume no receipt of a window scaling option means the	remote TCP is broken and treats the window as a signed quantity.	If unset, assume the remote TCP is not broken even if we do	not receive a window scaling option from them.	Default: 0tcp_dma_copybreak - INTEGER	Lower limit, in bytes, of the size of socket reads that will be	offloaded to a DMA copy engine, if one is present in the system	and CONFIG_NET_DMA is enabled.	Default: 4096CIPSOv4 Variables:cipso_cache_enable - BOOLEAN	If set, enable additions to and lookups from the CIPSO label mapping	cache.  If unset, additions are ignored and lookups always result in a	miss.  However, regardless of the setting the cache is still	invalidated when required when means you can safely toggle this on and	off and the cache will always be "safe".	Default: 1cipso_cache_bucket_size - INTEGER	The CIPSO label cache consists of a fixed size hash table with each	hash bucket containing a number of cache entries.  This variable limits	the number of entries in each hash bucket; the larger the value the	more CIPSO label mappings that can be cached.  When the number of	entries in a given hash bucket reaches this limit adding new entries	causes the oldest entry in the bucket to be removed to make room.	Default: 10cipso_rbm_optfmt - BOOLEAN	Enable the "Optimized Tag 1 Format" as defined in section 3.4.2.6 of	the CIPSO draft specification (see Documentation/netlabel for details).	This means that when set the CIPSO tag will be padded with empty	categories in order to make the packet data 32-bit aligned.	Default: 0cipso_rbm_structvalid - BOOLEAN	If set, do a very strict check of the CIPSO option when	ip_options_compile() is called.  If unset, relax the checks done during	ip_options_compile().  Either way is "safe" as errors are caught else	where in the CIPSO processing code but setting this to 0 (False) should	result in less work (i.e. it should be faster) but could cause problems	with other implementations that require strict checking.	Default: 0IP Variables:ip_local_port_range - 2 INTEGERS	Defines the local port range that is used by TCP and UDP to	choose the local port. The first number is the first, the 	second the last local port number. Default value depends on	amount of memory available on the system:	> 128Mb 32768-61000	< 128Mb 1024-4999 or even less.	This number defines number of active connections, which this	system can issue simultaneously to systems not supporting	TCP extensions (timestamps). With tcp_tw_recycle enabled	(i.e. by default) range 1024-4999 is enough to issue up to	2000 connections per second to systems supporting timestamps.ip_nonlocal_bind - BOOLEAN	If set, allows processes to bind() to non-local IP addresses,	which can be quite useful - but may break some applications.	Default: 0ip_dynaddr - BOOLEAN	If set non-zero, enables support for dynamic addresses.	If set to a non-zero value larger than 1, a kernel log	message will be printed when dynamic address rewriting	occurs.	Default: 0icmp_echo_ignore_all - BOOLEAN	If set non-zero, then the kernel will ignore all ICMP ECHO	requests sent to it.	Default: 0icmp_echo_ignore_broadcasts - BOOLEAN	If set non-zero, then the kernel will ignore all ICMP ECHO and	TIMESTAMP requests sent to it via broadcast/multicast.	Default: 1icmp_ratelimit - INTEGER	Limit the maximal rates for sending ICMP packets whose type matches	icmp_ratemask (see below) to specific targets.	0 to disable any limiting, otherwise the maximal rate in jiffies(1)	Default: 100icmp_ratemask - INTEGER	Mask made of ICMP types for which rates are being limited.	Significant bits: IHGFEDCBA9876543210	Default mask:     0000001100000011000 (6168)	Bit definitions (see include/linux/icmp.h):		0 Echo Reply		3 Destination Unreachable *		4 Source Quench *		5 Redirect		8 Echo Request		B Time Exceeded *		C Parameter Problem *		D Timestamp Request		E Timestamp Reply		F Info Request		G Info Reply		H Address Mask Request		I Address Mask Reply	* These are rate limited by default (see default mask above)icmp_ignore_bogus_error_responses - BOOLEAN	Some routers violate RFC1122 by sending bogus responses to broadcast	frames.  Such violations are normally logged via a kernel warning.	If this is set to TRUE, the kernel will not give such warnings, which	will avoid log file clutter.	Default: FALSEicmp_errors_use_inbound_ifaddr - BOOLEAN	If zero, icmp error messages are sent with the primary address of	the exiting interface. 	If non-zero, the message will be sent with the primary address of	the interface that received the packet that caused the icmp error.	This is the behaviour network many administrators will expect from	a router. And it can make debugging complicated network layouts	much easier. 	Note that if no primary address exists for the interface selected,	then the primary address of the first non-loopback interface that	has one will be used regardless of this setting.	Default: 0igmp_max_memberships - INTEGER	Change the maximum number of multicast groups we can subscribe to.	Default: 20conf/interface/*  changes special settings per interface (where "interface" is 		  the name of your network interface)conf/all/*	  is special, changes the settings for all interfaceslog_martians - BOOLEAN	Log packets with impossible addresses to kernel log.	log_martians for the interface will be enabled if at least one of	conf/{all,interface}/log_martians is set to TRUE,	it will be disabled otherwiseaccept_redirects - BOOLEAN	Accept ICMP redirect messages.	accept_redirects for the interface will be enabled if:	- both conf/{all,interface}/accept_redirects are TRUE in the case forwarding	  for the interface is enabled	or	- at least one of conf/{all,interface}/accept_redirects is TRUE in the case	  forwarding for the interface is disabled	accept_redirects for the interface will be disabled otherwise	default TRUE (host)		FALSE (router)forwarding - BOOLEAN	Enable IP forwarding on this interface.mc_forwarding - BOOLEAN	Do multicast routing. The kernel needs to be compiled with CONFIG_MROUTE	and a multicast routing daemon is required.	conf/all/mc_forwarding must also be set to TRUE to enable multicast routing	for the interfacemedium_id - INTEGER	Integer value used to differentiate the devices by the medium they	are attached to. Two devices can have different id values when	the broadcast packets are received only on one of them.	The default value 0 means that the device is the only interface	to its medium, value of -1 means that medium is not known.		Currently, it is used to change the proxy_arp behavior:	the proxy_arp feature is enabled for packets forwarded between	two devices attached to different media.proxy_arp - BOOLEAN	Do proxy arp.	proxy_arp for the interface will be enabled if at least one of	conf/{all,interface}/proxy_arp is set to TRUE,	it will be disabled otherwiseshared_media - BOOLEAN	Send(router) or accept(host) RFC1620 shared media redirects.	Overrides ip_secure_redirects.	shared_media for the interface will be enabled if at least one of	conf/{all,interface}/shared_media is set to TRUE,	it will be disabled otherwise	default TRUEsecure_redirects - BOOLEAN	Accept ICMP redirect messages only for gateways,	listed in default gateway list.	secure_redirects for the interface will be enabled if at least one of	conf/{all,interface}/secure_redirects is set to TRUE,	it will be disabled otherwise	default TRUEsend_redirects - BOOLEAN	Send redirects, if router.	send_redirects for the interface will be enabled if at least one of	conf/{all,interface}/send_redirects is set to TRUE,	it will be disabled otherwise	Default: TRUEbootp_relay - BOOLEAN	Accept packets with source address 0.b.c.d destined	not to this host as local ones. It is supposed, that	BOOTP relay daemon will catch and forward such packets.	conf/all/bootp_relay must also be set to TRUE to enable BOOTP relay	for the interface	default FALSE	Not Implemented Yet.accept_source_route - BOOLEAN	Accept packets with SRR option.	conf/all/accept_source_route must also be set to TRUE to accept packets	with SRR option on the interface	default TRUE (router)		FALSE (host)rp_filter - BOOLEAN	1 - do source validation by reversed path, as specified in RFC1812	    Recommended option for single homed hosts and stub network	    routers. Could cause troubles for complicated (not loop free)	    networks running a slow unreliable protocol (sort of RIP),	    or using static routes.	0 - No source validation.	conf/all/rp_filter must also be set to TRUE to do source validation	on the interface	Default value is 0. Note that some distributions enable it	in startup scripts.arp_filter - BOOLEAN	1 - Allows you to have multiple network interfaces on the same	subnet, and have the ARPs for each interface be answered	based on whether or not the kernel would route a packet from	the ARP'd IP out that interface (therefore you must use source	based routing for this to work). In other words it allows control	of which cards (usually 1) will respond to an arp request.	0 - (default) The kernel can respond to arp requests with addresses	from other interfaces. This may seem wrong but it usually makes	sense, because it increases the chance of successful communication.	IP addresses are owned by the complete host on Linux, not by	particular interfaces. Only for more complex setups like load-	balancing, does this behaviour cause problems.	arp_filter for the interface will be enabled if at least one of	conf/{all,interface}/arp_filter is set to TRUE,	it will be disabled otherwisearp_announce - INTEGER	Define different restriction levels for announcing the local	source IP address from IP packets in ARP requests sent on	interface:	0 - (default) Use any local address, configured on any interface	1 - Try to avoid local addresses that are not in the target's	subnet for this interface. This mode is useful when target	hosts reachable via this interface require the source IP	address in ARP requests to be part of their logical network	configured on the receiving interface. When we generate the

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -