diff options
author | Daniil Baturin <daniil.baturin@vyatta.com> | 2011-11-04 05:55:45 +0700 |
---|---|---|
committer | Daniil Baturin <daniil.baturin@vyatta.com> | 2011-11-04 05:55:45 +0700 |
commit | e59537545e40756a893134c25eff533ccce3adb8 (patch) | |
tree | 85110d89d4ea23c2650b0d0f42b3cbd32a150dd9 /templates | |
parent | 174565005c06c4b7cc6f64b977f63f87b9bd75df (diff) | |
download | vyatta-conntrack-e59537545e40756a893134c25eff533ccce3adb8.tar.gz vyatta-conntrack-e59537545e40756a893134c25eff533ccce3adb8.zip |
Move templates t templates-cfg to let op mode templates also exist.
Diffstat (limited to 'templates')
39 files changed, 0 insertions, 495 deletions
diff --git a/templates/system/conntrack/expect-table-size/node.def b/templates/system/conntrack/expect-table-size/node.def deleted file mode 100644 index f9f1ae5..0000000 --- a/templates/system/conntrack/expect-table-size/node.def +++ /dev/null @@ -1,32 +0,0 @@ -# -# Config template for: system conntrack expect-table-size -# -# This is the table of expectations. Connection tracking expectations are -# the mechanism used to "expect" RELATED connections to existing ones. -# Expectations are generally used by "connection tracking helpers" (sometimes -# called application level gateways [ALGs]) for more complex protocols such as -# FTP, SIP, H.323. -# -# default value when no conntrack options set - 2048 -# default value when no conntrack options set - 4096 -# - -type: u32 - -help: Size of connection tracking expect table - -default: 4096 - -val_help: u32: 1-50000000; Number of entries allowed in connection tracking expect table - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 50000000) ; "Value must be between 1 and 50000000" - -update: - sudo sysctl -q -w net/netfilter/nf_conntrack_expect_max=$VAR(@) - - - - - - - diff --git a/templates/system/conntrack/hash-size/node.def b/templates/system/conntrack/hash-size/node.def deleted file mode 100644 index 242d0fe..0000000 --- a/templates/system/conntrack/hash-size/node.def +++ /dev/null @@ -1,18 +0,0 @@ -help: Hash size for connection tracking table -type: u32 - -default: 4096 - -val_help: u32:1-50000000; Size of hash to use for connection tracking table - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 50000000) ; "Value must be between 1 and 50000000" - -update: - if ! grep -q "nf_conntrack hashsize=$VAR(@)$" /etc/modprobe.d/vyatta_nf_conntrack.conf - then - sudo sh -c "sed -i -e '/options nf_conntrack hashsize/d' \ - /etc/modprobe.d/vyatta_nf_conntrack.conf" - sudo sh -c "echo options nf_conntrack hashsize=$VAR(@) >> \ - /etc/modprobe.d/vyatta_nf_conntrack.conf" - echo "Updated conntrack hash size. This change will take affect when the system is rebooted." - fi diff --git a/templates/system/conntrack/modules/ftp/disable/node.def b/templates/system/conntrack/modules/ftp/disable/node.def deleted file mode 100644 index 40a64d5..0000000 --- a/templates/system/conntrack/modules/ftp/disable/node.def +++ /dev/null @@ -1,7 +0,0 @@ -help: Disable FTP connection tracking - -create: sudo rmmod nf_nat_ftp - sudo rmmod nf_conntrack_ftp - -delete: sudo modprobe nf_conntrack_ftp - sudo modprobe nf_nat_ftp
\ No newline at end of file diff --git a/templates/system/conntrack/modules/ftp/node.def b/templates/system/conntrack/modules/ftp/node.def deleted file mode 100644 index 74a94b4..0000000 --- a/templates/system/conntrack/modules/ftp/node.def +++ /dev/null @@ -1 +0,0 @@ -help: FTP connection tracking settings
\ No newline at end of file diff --git a/templates/system/conntrack/modules/gre/disable/node.def b/templates/system/conntrack/modules/gre/disable/node.def deleted file mode 100644 index f6f9546..0000000 --- a/templates/system/conntrack/modules/gre/disable/node.def +++ /dev/null @@ -1,21 +0,0 @@ -help: Disable GRE connection tracking - -# GRE shouldn't be disabled when PPTP is enabled because PPTP depends on it -create: cli-shell-api exists system conntrack modules pptp disable - if [ $? == 0 ]; then - # Unload PPTP modules if they are loaded - lsmod | grep -e "^nf_nat_pptp" 2>&1 >/dev/null - if [ $? == 0 ]; then - sudo rmmod nf_nat_pptp - sudo rmmod nf_conntrack_pptp - fi - # And GRE modules then - sudo rmmod nf_nat_proto_gre - sudo rmmod nf_conntrack_proto_gre - else - echo "Error: can not disable GRE connection tracking when PPTP connection tracking is enabled!" - exit 1 - fi - -delete: sudo modprobe nf_conntrack_proto_gre - sudo modprobe nf_nat_proto_gre diff --git a/templates/system/conntrack/modules/gre/node.def b/templates/system/conntrack/modules/gre/node.def deleted file mode 100644 index d192f7d..0000000 --- a/templates/system/conntrack/modules/gre/node.def +++ /dev/null @@ -1 +0,0 @@ -help: GRE connection tracking settings
\ No newline at end of file diff --git a/templates/system/conntrack/modules/h323/disable/node.def b/templates/system/conntrack/modules/h323/disable/node.def deleted file mode 100644 index 1fb0117..0000000 --- a/templates/system/conntrack/modules/h323/disable/node.def +++ /dev/null @@ -1,7 +0,0 @@ -help: Disable H.323 connection tracking - -create: sudo rmmod nf_nat_h323 - sudo rmmod nf_conntrack_h323 - -delete: sudo modprobe nf_conntrack_h323 - sudo modprobe nf_nat_h323
\ No newline at end of file diff --git a/templates/system/conntrack/modules/h323/node.def b/templates/system/conntrack/modules/h323/node.def deleted file mode 100644 index ae4b787..0000000 --- a/templates/system/conntrack/modules/h323/node.def +++ /dev/null @@ -1 +0,0 @@ -help: H.323 connection tracking settings
\ No newline at end of file diff --git a/templates/system/conntrack/modules/node.def b/templates/system/conntrack/modules/node.def deleted file mode 100644 index 9666287..0000000 --- a/templates/system/conntrack/modules/node.def +++ /dev/null @@ -1 +0,0 @@ -help: Connection tracking modules settings
\ No newline at end of file diff --git a/templates/system/conntrack/modules/pptp/disable/node.def b/templates/system/conntrack/modules/pptp/disable/node.def deleted file mode 100644 index 4ffd980..0000000 --- a/templates/system/conntrack/modules/pptp/disable/node.def +++ /dev/null @@ -1,20 +0,0 @@ -help: Disable PPTP connection tracking - -create: cli-shell-api exists system conntrack modules gre disable - if [ $? == 0 ]; then - # Do nothing, this case is handled in GRE module templates - :; - else - sudo rmmod nf_nat_pptp - sudo rmmod nf_conntrack_pptp - fi - -# PPTP shouldn't be enabled when GRE is disabled because PPTP depends on it -delete: cli-shell-api exists system conntrack modules gre disable - if [ $? == 0 ]; then - echo "Error: can not enable PPTP connection tracking when GRE connection tracking is disabled!" - exit 1 - else - sudo modprobe nf_conntrack_pptp - sudo modprobe nf_nat_pptp - fi diff --git a/templates/system/conntrack/modules/pptp/node.def b/templates/system/conntrack/modules/pptp/node.def deleted file mode 100644 index a6ae0c4..0000000 --- a/templates/system/conntrack/modules/pptp/node.def +++ /dev/null @@ -1 +0,0 @@ -help: PPTP connection tracking settings
\ No newline at end of file diff --git a/templates/system/conntrack/modules/sip/disable/node.def b/templates/system/conntrack/modules/sip/disable/node.def deleted file mode 100644 index d0eaf81..0000000 --- a/templates/system/conntrack/modules/sip/disable/node.def +++ /dev/null @@ -1,7 +0,0 @@ -help: Disable SIP connection tracking - -create: sudo rmmod nf_nat_sip - sudo rmmod nf_conntrack_sip - -delete: sudo modprobe nf_conntrack_sip - sudo modprobe nf_nat_sip
\ No newline at end of file diff --git a/templates/system/conntrack/modules/sip/enable-indirect-media/node.def b/templates/system/conntrack/modules/sip/enable-indirect-media/node.def deleted file mode 100644 index c29389e..0000000 --- a/templates/system/conntrack/modules/sip/enable-indirect-media/node.def +++ /dev/null @@ -1 +0,0 @@ -help: Option to support for indirect media streams diff --git a/templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def b/templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def deleted file mode 100644 index 82782ff..0000000 --- a/templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def +++ /dev/null @@ -1 +0,0 @@ -help: Option to support for indirect signalling streams diff --git a/templates/system/conntrack/modules/sip/node.def b/templates/system/conntrack/modules/sip/node.def deleted file mode 100644 index b5a3225..0000000 --- a/templates/system/conntrack/modules/sip/node.def +++ /dev/null @@ -1,61 +0,0 @@ -help: SIP connection tracking settings - -end: /bin/cli-shell-api existsEffective system conntrack modules sip disable && exit 0 - reload=0 - sdm=2 - if [ -f /sys/module/nf_conntrack_sip/parameters/sip_direct_media ]; then - sdm=$(sudo cat /sys/module/nf_conntrack_sip/parameters/sip_direct_media) - fi - if [ -n "$VAR(./enable-indirect-media)" ]; then - indirectmedia='sip_direct_media=0' - if [ $sdm -ge 1 ]; then reload=1; fi - else - if [ $sdm -eq 0 ]; then reload=1; fi - fi - - sds=2 - if [ -f /sys/module/nf_conntrack_sip/parameters/sip_direct_signalling ]; then - sds=$(sudo cat /sys/module/nf_conntrack_sip/parameters/sip_direct_signalling) - fi - if [ -n "$VAR(./enable-indirect-signalling)" ]; then - indirectsignalling='sip_direct_signalling=0' - if [ $sds -ge 1 ]; then reload=1; fi - else - if [ $sds -eq 0 ]; then reload=1; fi - fi - - if [ -n "$VAR(./port/@@)" ]; then - numports=0 - for port in $VAR(./port/@@); do - if [ -z "$portval" ]; then - portval=$port - else - portval="${portval},$port" - fi - (( numports++ )) - done - portopt="ports=$portval" - if [ $numports -gt 8 ]; then - echo "Error: Can not specify more than 8 ports." - exit 1 - fi - reload=1 - fi - - if [ -f /etc/modprobe.d/options ]; then - sudo sed -i '/nf_conntrack_sip/d' /etc/modprobe.d/options - fi - - if [ -n "$indirectmedia" ] || [ -n "$indirectsignalling" ] || \ - [ -n "$portopt" ]; then - sudo sh -c "echo \# Auto-generated by `whoami` at `date` > /etc/modprobe.d/vyatta_sip_options.conf" - sudo sh -c "echo options nf_conntrack_sip $indirectmedia $indirectsignalling $portopt >> /etc/modprobe.d/vyatta_sip_options.conf " - else - sudo rm -f /etc/modprobe.d/vyatta_sip_options.conf - fi - - if [ $reload -eq 1 ]; then - sudo modprobe -r nf_nat_sip nf_conntrack_sip - sudo modprobe nf_conntrack_sip - sudo modprobe nf_nat_sip - fi diff --git a/templates/system/conntrack/modules/sip/port/node.def b/templates/system/conntrack/modules/sip/port/node.def deleted file mode 100644 index b72f1ca..0000000 --- a/templates/system/conntrack/modules/sip/port/node.def +++ /dev/null @@ -1,8 +0,0 @@ -multi: -type: u32 - -help: Port number that SIP traffic is carried on - -val_help: u32:1-65535; SIP port number - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <=65535) ; "Port number must be in range 1 to 65535" diff --git a/templates/system/conntrack/modules/tftp/disable/node.def b/templates/system/conntrack/modules/tftp/disable/node.def deleted file mode 100644 index ebdecf4..0000000 --- a/templates/system/conntrack/modules/tftp/disable/node.def +++ /dev/null @@ -1,7 +0,0 @@ -help: Disable TFTP connection tracking - -create: sudo rmmod nf_nat_tftp - sudo rmmod nf_conntrack_tftp - -delete: sudo modprobe nf_conntrack_tftp - sudo modprobe nf_nat_tftp diff --git a/templates/system/conntrack/modules/tftp/node.def b/templates/system/conntrack/modules/tftp/node.def deleted file mode 100644 index 901f52e..0000000 --- a/templates/system/conntrack/modules/tftp/node.def +++ /dev/null @@ -1 +0,0 @@ -help: TFTP connection tracking settings
\ No newline at end of file diff --git a/templates/system/conntrack/node.def b/templates/system/conntrack/node.def deleted file mode 100644 index 53488ae..0000000 --- a/templates/system/conntrack/node.def +++ /dev/null @@ -1,24 +0,0 @@ -help: Connection tracking engine options - -priority: 218 # before NAT and conntrack-sync are configured - -delete: # set conntrack table size to standard 16384 entries if conntrack settings are removed - sudo sysctl -q -w net/nf_conntrack_max=16384 - - # set conntrack expect table size to standard 2048 entries if conntrack settings are removed - sudo sysctl -q -w net/netfilter/nf_conntrack_expect_max=2048 - - # set conntrack hash size to standard 4096 - if ! grep -q "nf_conntrack hashsize=4096$" /etc/modprobe.d/vyatta_nf_conntrack.conf - then - sudo sh -c "sed -i -e '/options nf_conntrack hashsize/d' \ - /etc/modprobe.d/vyatta_nf_conntrack.conf" - sudo sh -c "echo options nf_conntrack hashsize=4096 >> \ - /etc/modprobe.d/vyatta_nf_conntrack.conf" - echo "Conntrack hash size set to default 4096. This change will take effect when the system is rebooted." - fi - - # need to restart conntrackd with updated conntrack table size - if cli-shell-api existsActive service conntrack-sync; then - sudo /opt/vyatta/sbin/vyatta-conntrack-sync.pl --action=enable - fi diff --git a/templates/system/conntrack/table-size/node.def b/templates/system/conntrack/table-size/node.def deleted file mode 100644 index f91b101..0000000 --- a/templates/system/conntrack/table-size/node.def +++ /dev/null @@ -1,39 +0,0 @@ -# -# Config template for: system conntrack table-size -# -# Sets the size of the TCP connection tracking table in the netfilter -# nf_conntrack module, which is used by firewall and NAT. The size of -# this table determines how many TCP connections can be simultaneously -# tracked. If new connections arrive and the table is full, older -# connections will be dropped out of the table. System administrators -# must set the connection tracking table size based on the number of -# connections they expect their system to track. The connection -# tracking table consumes kernel memory, so the size selected should -# be no larger than necessary. -# -# default value when contrack is not set - 16384 -# default value when conntrack is set - 32768 -# - -type: u32 - -help: Size of connection tracking table - -default: 32768 - -val_help: u32:1-50000000; Number of entries allowed in connection tracking table - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 50000000) ; "Value must be between 1 and 50000000" - -update: - sudo sysctl -q -w net/nf_conntrack_max=$VAR(@) - # need to restart conntrackd with updated conntrack table size - if cli-shell-api existsActive service conntrack-sync; then - sudo /opt/vyatta/sbin/vyatta-conntrack-sync.pl --action=enable - fi - - - - - - diff --git a/templates/system/conntrack/tcp/half-open-connections/node.def b/templates/system/conntrack/tcp/half-open-connections/node.def deleted file mode 100644 index 9474463..0000000 --- a/templates/system/conntrack/tcp/half-open-connections/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: Maximum number of TCP half-open connections - -default: 512 - -val_help: u32:1-2147483647; Generic connection timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 2147483647) ; "Value must be between 1 and 2147483647" - -update: sudo sysctl -q -w net/ipv4/tcp_max_syn_backlog=$VAR(@) - -delete: sudo sysctl -q -w net/ipv4/tcp_max_syn_backlog=512 diff --git a/templates/system/conntrack/tcp/loose/node.def b/templates/system/conntrack/tcp/loose/node.def deleted file mode 100644 index 06706a2..0000000 --- a/templates/system/conntrack/tcp/loose/node.def +++ /dev/null @@ -1,50 +0,0 @@ -# -# This parameter directs the netfilter TCP connection tracking modules -# (nf_conntrack, and others) to either allow or disallow the tracking -# of TCP connections which are "previously established". This -# includes all cases where the three-way connection opening handshake -# was not seen by this machine. That includes the case the connection -# was opened before this machine booted. It also includes cases where -# the packets comprising the three-way handshake were routed via some -# other router. -# -# If this parameter is set to "enable", tracking such connections is -# allowed. If disabled, such tracking is disabled. -# default value - 1 - -type: txt - -help: Policy to track previously established connections - -val_help: enable; Allow tracking of previously established connections -val_help: disable; Do not allow tracking of previously established connections - -default: "enable" - -syntax:expression: $VAR(@) in "enable", "disable"; "must be either enable or disable" - -update: - if [ ! -e /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_loose ]; then - sudo modprobe nf_conntrack_ipv4 - fi - if [ "$VAR(@)" = "enable" ]; then - sudo sysctl -q -w net/ipv4/netfilter/ip_conntrack_tcp_loose=1 - elif [ "$VAR(@)" = "disable" ]; then - sudo sysctl -q -w net/ipv4/netfilter/ip_conntrack_tcp_loose=0 - else - echo "Invalid parameter: $VAR(@)" - exit 1 - fi - -delete: - if [ ! -e /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_loose ]; then - sudo modprobe nf_conntrack_ipv4 - fi - sudo sysctl -q -w net/ipv4/netfilter/ip_conntrack_tcp_loose=1 - - - - - - - diff --git a/templates/system/conntrack/tcp/max-retrans/node.def b/templates/system/conntrack/tcp/max-retrans/node.def deleted file mode 100644 index bf56f1f..0000000 --- a/templates/system/conntrack/tcp/max-retrans/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP maximum retransmit attempts - -default: 3 - -val_help: u32:1-2147483647; Generic connection timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 2147483647) ; "Value must be between 1 and 2147483647" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_max_retrans=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_max_retrans=3 diff --git a/templates/system/conntrack/tcp/node.def b/templates/system/conntrack/tcp/node.def deleted file mode 100644 index 67543ca..0000000 --- a/templates/system/conntrack/tcp/node.def +++ /dev/null @@ -1 +0,0 @@ -help: TCP options
\ No newline at end of file diff --git a/templates/system/conntrack/timeout/icmp/node.def b/templates/system/conntrack/timeout/icmp/node.def deleted file mode 100644 index 952178e..0000000 --- a/templates/system/conntrack/timeout/icmp/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: ICMP timeout in seconds - -default: 30 - -val_help: u32:1-21474836; ICMP timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_icmp_timeout=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_icmp_timeout=30 diff --git a/templates/system/conntrack/timeout/node.def b/templates/system/conntrack/timeout/node.def deleted file mode 100644 index f0193c6..0000000 --- a/templates/system/conntrack/timeout/node.def +++ /dev/null @@ -1 +0,0 @@ -help: Connection timeout options
\ No newline at end of file diff --git a/templates/system/conntrack/timeout/other/node.def b/templates/system/conntrack/timeout/other/node.def deleted file mode 100644 index a794bb7..0000000 --- a/templates/system/conntrack/timeout/other/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: Generic connection timeout in seconds - -default: 600 - -val_help: u32:1-21474836; Generic connection timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_generic_timeout=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_generic_timeout=600 diff --git a/templates/system/conntrack/timeout/tcp/close-wait/node.def b/templates/system/conntrack/timeout/tcp/close-wait/node.def deleted file mode 100644 index 0491b68..0000000 --- a/templates/system/conntrack/timeout/tcp/close-wait/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP CLOSE-WAIT timeout in seconds - -default: 60 - -val_help: u32:1-21474836; TCP CLOSE-WAIT timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close_wait=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close_wait=60 diff --git a/templates/system/conntrack/timeout/tcp/close/node.def b/templates/system/conntrack/timeout/tcp/close/node.def deleted file mode 100644 index 38317d5..0000000 --- a/templates/system/conntrack/timeout/tcp/close/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP CLOSE timeout in seconds - -default: 10 - -val_help: u32:1-21474836; TCP CLOSE timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close=10 diff --git a/templates/system/conntrack/timeout/tcp/established/node.def b/templates/system/conntrack/timeout/tcp/established/node.def deleted file mode 100644 index 9e47f1e..0000000 --- a/templates/system/conntrack/timeout/tcp/established/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP ESTABLISHED timeout in seconds - -default: 432000 - -val_help: u32:1-21474836; TCP ESTABLISHED timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_established=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_established=432000 diff --git a/templates/system/conntrack/timeout/tcp/fin-wait/node.def b/templates/system/conntrack/timeout/tcp/fin-wait/node.def deleted file mode 100644 index 985a6a4..0000000 --- a/templates/system/conntrack/timeout/tcp/fin-wait/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP FIN-WAIT timeout in seconds - -default: 120 - -val_help: u32:1-21474836; TCP FIN-WAIT timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_fin_wait=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_fin_wait=120 diff --git a/templates/system/conntrack/timeout/tcp/last-ack/node.def b/templates/system/conntrack/timeout/tcp/last-ack/node.def deleted file mode 100644 index 3e07fe4..0000000 --- a/templates/system/conntrack/timeout/tcp/last-ack/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP LAST-ACK timeout in seconds - -default: 30 - -val_help: u32:1-21474836; TCP LAST-ACK timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_last_ack=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_last_ack=30 diff --git a/templates/system/conntrack/timeout/tcp/node.def b/templates/system/conntrack/timeout/tcp/node.def deleted file mode 100644 index 2b67c51..0000000 --- a/templates/system/conntrack/timeout/tcp/node.def +++ /dev/null @@ -1 +0,0 @@ -help: TCP connection timeout options
\ No newline at end of file diff --git a/templates/system/conntrack/timeout/tcp/syn-recv/node.def b/templates/system/conntrack/timeout/tcp/syn-recv/node.def deleted file mode 100644 index 50c5512..0000000 --- a/templates/system/conntrack/timeout/tcp/syn-recv/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP SYN-RECEIVED timeout in seconds - -default: 60 - -val_help: u32:1-21474836; TCP SYN-RECEIVED timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_recv=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_recv=60 diff --git a/templates/system/conntrack/timeout/tcp/syn-sent/node.def b/templates/system/conntrack/timeout/tcp/syn-sent/node.def deleted file mode 100644 index 5856ba7..0000000 --- a/templates/system/conntrack/timeout/tcp/syn-sent/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP SYN-SENT timeout in seconds - -default: 120 - -val_help: u32:1-21474836; TCP SYN-SENT timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_sent=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_sent=120 diff --git a/templates/system/conntrack/timeout/tcp/time-wait/node.def b/templates/system/conntrack/timeout/tcp/time-wait/node.def deleted file mode 100644 index f6bd1c8..0000000 --- a/templates/system/conntrack/timeout/tcp/time-wait/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: TCP TIME-WAIT timeout in seconds - -default: 120 - -val_help: u32:1-21474836; TCP TIME-WAIT timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_time_wait=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_time_wait=120 diff --git a/templates/system/conntrack/timeout/udp/node.def b/templates/system/conntrack/timeout/udp/node.def deleted file mode 100644 index 7ee8fd3..0000000 --- a/templates/system/conntrack/timeout/udp/node.def +++ /dev/null @@ -1 +0,0 @@ -help: UDP timeout
\ No newline at end of file diff --git a/templates/system/conntrack/timeout/udp/other/node.def b/templates/system/conntrack/timeout/udp/other/node.def deleted file mode 100644 index 0018f1c..0000000 --- a/templates/system/conntrack/timeout/udp/other/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: UDP generic timeout in seconds - -default: 30 - -val_help: u32:1-21474836; UDP generic timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout=30 diff --git a/templates/system/conntrack/timeout/udp/stream/node.def b/templates/system/conntrack/timeout/udp/stream/node.def deleted file mode 100644 index d86e683..0000000 --- a/templates/system/conntrack/timeout/udp/stream/node.def +++ /dev/null @@ -1,13 +0,0 @@ -type: u32 - -help: UDP stream timeout in seconds - -default: 180 - -val_help: u32:1-21474836; UDP stream timeout in seconds - -syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836" - -update: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout_stream=$VAR(@) - -delete: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout_stream=180 |