nf_conntrack-sysctl.txt 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. /proc/sys/net/netfilter/nf_conntrack_* Variables:
  2. nf_conntrack_acct - BOOLEAN
  3. 0 - disabled (default)
  4. not 0 - enabled
  5. Enable connection tracking flow accounting. 64-bit byte and packet
  6. counters per flow are added.
  7. nf_conntrack_buckets - INTEGER
  8. Size of hash table. If not specified as parameter during module
  9. loading, the default size is calculated by dividing total memory
  10. by 16384 to determine the number of buckets but the hash table will
  11. never have fewer than 32 and limited to 16384 buckets. For systems
  12. with more than 4GB of memory it will be 65536 buckets.
  13. This sysctl is only writeable in the initial net namespace.
  14. nf_conntrack_checksum - BOOLEAN
  15. 0 - disabled
  16. not 0 - enabled (default)
  17. Verify checksum of incoming packets. Packets with bad checksums are
  18. in INVALID state. If this is enabled, such packets will not be
  19. considered for connection tracking.
  20. nf_conntrack_count - INTEGER (read-only)
  21. Number of currently allocated flow entries.
  22. nf_conntrack_events - BOOLEAN
  23. 0 - disabled
  24. not 0 - enabled (default)
  25. If this option is enabled, the connection tracking code will
  26. provide userspace with connection tracking events via ctnetlink.
  27. nf_conntrack_expect_max - INTEGER
  28. Maximum size of expectation table. Default value is
  29. nf_conntrack_buckets / 256. Minimum is 1.
  30. nf_conntrack_frag6_high_thresh - INTEGER
  31. default 262144
  32. Maximum memory used to reassemble IPv6 fragments. When
  33. nf_conntrack_frag6_high_thresh bytes of memory is allocated for this
  34. purpose, the fragment handler will toss packets until
  35. nf_conntrack_frag6_low_thresh is reached.
  36. nf_conntrack_frag6_low_thresh - INTEGER
  37. default 196608
  38. See nf_conntrack_frag6_low_thresh
  39. nf_conntrack_frag6_timeout - INTEGER (seconds)
  40. default 60
  41. Time to keep an IPv6 fragment in memory.
  42. nf_conntrack_generic_timeout - INTEGER (seconds)
  43. default 600
  44. Default for generic timeout. This refers to layer 4 unknown/unsupported
  45. protocols.
  46. nf_conntrack_helper - BOOLEAN
  47. 0 - disabled (default)
  48. not 0 - enabled
  49. Enable automatic conntrack helper assignment.
  50. If disabled it is required to set up iptables rules to assign
  51. helpers to connections. See the CT target description in the
  52. iptables-extensions(8) man page for further information.
  53. nf_conntrack_icmp_timeout - INTEGER (seconds)
  54. default 30
  55. Default for ICMP timeout.
  56. nf_conntrack_icmpv6_timeout - INTEGER (seconds)
  57. default 30
  58. Default for ICMP6 timeout.
  59. nf_conntrack_log_invalid - INTEGER
  60. 0 - disable (default)
  61. 1 - log ICMP packets
  62. 6 - log TCP packets
  63. 17 - log UDP packets
  64. 33 - log DCCP packets
  65. 41 - log ICMPv6 packets
  66. 136 - log UDPLITE packets
  67. 255 - log packets of any protocol
  68. Log invalid packets of a type specified by value.
  69. nf_conntrack_max - INTEGER
  70. Size of connection tracking table. Default value is
  71. nf_conntrack_buckets value * 4.
  72. nf_conntrack_tcp_be_liberal - BOOLEAN
  73. 0 - disabled (default)
  74. not 0 - enabled
  75. Be conservative in what you do, be liberal in what you accept from others.
  76. If it's non-zero, we mark only out of window RST segments as INVALID.
  77. nf_conntrack_tcp_loose - BOOLEAN
  78. 0 - disabled
  79. not 0 - enabled (default)
  80. If it is set to zero, we disable picking up already established
  81. connections.
  82. nf_conntrack_tcp_max_retrans - INTEGER
  83. default 3
  84. Maximum number of packets that can be retransmitted without
  85. received an (acceptable) ACK from the destination. If this number
  86. is reached, a shorter timer will be started.
  87. nf_conntrack_tcp_timeout_close - INTEGER (seconds)
  88. default 10
  89. nf_conntrack_tcp_timeout_close_wait - INTEGER (seconds)
  90. default 60
  91. nf_conntrack_tcp_timeout_established - INTEGER (seconds)
  92. default 432000 (5 days)
  93. nf_conntrack_tcp_timeout_fin_wait - INTEGER (seconds)
  94. default 120
  95. nf_conntrack_tcp_timeout_last_ack - INTEGER (seconds)
  96. default 30
  97. nf_conntrack_tcp_timeout_max_retrans - INTEGER (seconds)
  98. default 300
  99. nf_conntrack_tcp_timeout_syn_recv - INTEGER (seconds)
  100. default 60
  101. nf_conntrack_tcp_timeout_syn_sent - INTEGER (seconds)
  102. default 120
  103. nf_conntrack_tcp_timeout_time_wait - INTEGER (seconds)
  104. default 120
  105. nf_conntrack_tcp_timeout_unacknowledged - INTEGER (seconds)
  106. default 300
  107. nf_conntrack_timestamp - BOOLEAN
  108. 0 - disabled (default)
  109. not 0 - enabled
  110. Enable connection tracking flow timestamping.
  111. nf_conntrack_udp_timeout - INTEGER (seconds)
  112. default 30
  113. nf_conntrack_udp_timeout_stream2 - INTEGER (seconds)
  114. default 180
  115. This extended timeout will be used in case there is an UDP stream
  116. detected.