summaryrefslogtreecommitdiff
path: root/templates
diff options
context:
space:
mode:
authorDaniil Baturin <daniil.baturin@vyatta.com>2011-11-04 05:55:45 +0700
committerDaniil Baturin <daniil.baturin@vyatta.com>2011-11-04 05:55:45 +0700
commite59537545e40756a893134c25eff533ccce3adb8 (patch)
tree85110d89d4ea23c2650b0d0f42b3cbd32a150dd9 /templates
parent174565005c06c4b7cc6f64b977f63f87b9bd75df (diff)
downloadvyatta-conntrack-e59537545e40756a893134c25eff533ccce3adb8.tar.gz
vyatta-conntrack-e59537545e40756a893134c25eff533ccce3adb8.zip
Move templates t templates-cfg to let op mode templates also exist.
Diffstat (limited to 'templates')
-rw-r--r--templates/system/conntrack/expect-table-size/node.def32
-rw-r--r--templates/system/conntrack/hash-size/node.def18
-rw-r--r--templates/system/conntrack/modules/ftp/disable/node.def7
-rw-r--r--templates/system/conntrack/modules/ftp/node.def1
-rw-r--r--templates/system/conntrack/modules/gre/disable/node.def21
-rw-r--r--templates/system/conntrack/modules/gre/node.def1
-rw-r--r--templates/system/conntrack/modules/h323/disable/node.def7
-rw-r--r--templates/system/conntrack/modules/h323/node.def1
-rw-r--r--templates/system/conntrack/modules/node.def1
-rw-r--r--templates/system/conntrack/modules/pptp/disable/node.def20
-rw-r--r--templates/system/conntrack/modules/pptp/node.def1
-rw-r--r--templates/system/conntrack/modules/sip/disable/node.def7
-rw-r--r--templates/system/conntrack/modules/sip/enable-indirect-media/node.def1
-rw-r--r--templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def1
-rw-r--r--templates/system/conntrack/modules/sip/node.def61
-rw-r--r--templates/system/conntrack/modules/sip/port/node.def8
-rw-r--r--templates/system/conntrack/modules/tftp/disable/node.def7
-rw-r--r--templates/system/conntrack/modules/tftp/node.def1
-rw-r--r--templates/system/conntrack/node.def24
-rw-r--r--templates/system/conntrack/table-size/node.def39
-rw-r--r--templates/system/conntrack/tcp/half-open-connections/node.def13
-rw-r--r--templates/system/conntrack/tcp/loose/node.def50
-rw-r--r--templates/system/conntrack/tcp/max-retrans/node.def13
-rw-r--r--templates/system/conntrack/tcp/node.def1
-rw-r--r--templates/system/conntrack/timeout/icmp/node.def13
-rw-r--r--templates/system/conntrack/timeout/node.def1
-rw-r--r--templates/system/conntrack/timeout/other/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/close-wait/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/close/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/established/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/fin-wait/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/last-ack/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/node.def1
-rw-r--r--templates/system/conntrack/timeout/tcp/syn-recv/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/syn-sent/node.def13
-rw-r--r--templates/system/conntrack/timeout/tcp/time-wait/node.def13
-rw-r--r--templates/system/conntrack/timeout/udp/node.def1
-rw-r--r--templates/system/conntrack/timeout/udp/other/node.def13
-rw-r--r--templates/system/conntrack/timeout/udp/stream/node.def13
39 files changed, 0 insertions, 495 deletions
diff --git a/templates/system/conntrack/expect-table-size/node.def b/templates/system/conntrack/expect-table-size/node.def
deleted file mode 100644
index f9f1ae5..0000000
--- a/templates/system/conntrack/expect-table-size/node.def
+++ /dev/null
@@ -1,32 +0,0 @@
-#
-# Config template for: system conntrack expect-table-size
-#
-# This is the table of expectations. Connection tracking expectations are
-# the mechanism used to "expect" RELATED connections to existing ones.
-# Expectations are generally used by "connection tracking helpers" (sometimes
-# called application level gateways [ALGs]) for more complex protocols such as
-# FTP, SIP, H.323.
-#
-# default value when no conntrack options set - 2048
-# default value when no conntrack options set - 4096
-#
-
-type: u32
-
-help: Size of connection tracking expect table
-
-default: 4096
-
-val_help: u32: 1-50000000; Number of entries allowed in connection tracking expect table
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 50000000) ; "Value must be between 1 and 50000000"
-
-update:
- sudo sysctl -q -w net/netfilter/nf_conntrack_expect_max=$VAR(@)
-
-
-
-
-
-
-
diff --git a/templates/system/conntrack/hash-size/node.def b/templates/system/conntrack/hash-size/node.def
deleted file mode 100644
index 242d0fe..0000000
--- a/templates/system/conntrack/hash-size/node.def
+++ /dev/null
@@ -1,18 +0,0 @@
-help: Hash size for connection tracking table
-type: u32
-
-default: 4096
-
-val_help: u32:1-50000000; Size of hash to use for connection tracking table
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 50000000) ; "Value must be between 1 and 50000000"
-
-update:
- if ! grep -q "nf_conntrack hashsize=$VAR(@)$" /etc/modprobe.d/vyatta_nf_conntrack.conf
- then
- sudo sh -c "sed -i -e '/options nf_conntrack hashsize/d' \
- /etc/modprobe.d/vyatta_nf_conntrack.conf"
- sudo sh -c "echo options nf_conntrack hashsize=$VAR(@) >> \
- /etc/modprobe.d/vyatta_nf_conntrack.conf"
- echo "Updated conntrack hash size. This change will take affect when the system is rebooted."
- fi
diff --git a/templates/system/conntrack/modules/ftp/disable/node.def b/templates/system/conntrack/modules/ftp/disable/node.def
deleted file mode 100644
index 40a64d5..0000000
--- a/templates/system/conntrack/modules/ftp/disable/node.def
+++ /dev/null
@@ -1,7 +0,0 @@
-help: Disable FTP connection tracking
-
-create: sudo rmmod nf_nat_ftp
- sudo rmmod nf_conntrack_ftp
-
-delete: sudo modprobe nf_conntrack_ftp
- sudo modprobe nf_nat_ftp \ No newline at end of file
diff --git a/templates/system/conntrack/modules/ftp/node.def b/templates/system/conntrack/modules/ftp/node.def
deleted file mode 100644
index 74a94b4..0000000
--- a/templates/system/conntrack/modules/ftp/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: FTP connection tracking settings \ No newline at end of file
diff --git a/templates/system/conntrack/modules/gre/disable/node.def b/templates/system/conntrack/modules/gre/disable/node.def
deleted file mode 100644
index f6f9546..0000000
--- a/templates/system/conntrack/modules/gre/disable/node.def
+++ /dev/null
@@ -1,21 +0,0 @@
-help: Disable GRE connection tracking
-
-# GRE shouldn't be disabled when PPTP is enabled because PPTP depends on it
-create: cli-shell-api exists system conntrack modules pptp disable
- if [ $? == 0 ]; then
- # Unload PPTP modules if they are loaded
- lsmod | grep -e "^nf_nat_pptp" 2>&1 >/dev/null
- if [ $? == 0 ]; then
- sudo rmmod nf_nat_pptp
- sudo rmmod nf_conntrack_pptp
- fi
- # And GRE modules then
- sudo rmmod nf_nat_proto_gre
- sudo rmmod nf_conntrack_proto_gre
- else
- echo "Error: can not disable GRE connection tracking when PPTP connection tracking is enabled!"
- exit 1
- fi
-
-delete: sudo modprobe nf_conntrack_proto_gre
- sudo modprobe nf_nat_proto_gre
diff --git a/templates/system/conntrack/modules/gre/node.def b/templates/system/conntrack/modules/gre/node.def
deleted file mode 100644
index d192f7d..0000000
--- a/templates/system/conntrack/modules/gre/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: GRE connection tracking settings \ No newline at end of file
diff --git a/templates/system/conntrack/modules/h323/disable/node.def b/templates/system/conntrack/modules/h323/disable/node.def
deleted file mode 100644
index 1fb0117..0000000
--- a/templates/system/conntrack/modules/h323/disable/node.def
+++ /dev/null
@@ -1,7 +0,0 @@
-help: Disable H.323 connection tracking
-
-create: sudo rmmod nf_nat_h323
- sudo rmmod nf_conntrack_h323
-
-delete: sudo modprobe nf_conntrack_h323
- sudo modprobe nf_nat_h323 \ No newline at end of file
diff --git a/templates/system/conntrack/modules/h323/node.def b/templates/system/conntrack/modules/h323/node.def
deleted file mode 100644
index ae4b787..0000000
--- a/templates/system/conntrack/modules/h323/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: H.323 connection tracking settings \ No newline at end of file
diff --git a/templates/system/conntrack/modules/node.def b/templates/system/conntrack/modules/node.def
deleted file mode 100644
index 9666287..0000000
--- a/templates/system/conntrack/modules/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: Connection tracking modules settings \ No newline at end of file
diff --git a/templates/system/conntrack/modules/pptp/disable/node.def b/templates/system/conntrack/modules/pptp/disable/node.def
deleted file mode 100644
index 4ffd980..0000000
--- a/templates/system/conntrack/modules/pptp/disable/node.def
+++ /dev/null
@@ -1,20 +0,0 @@
-help: Disable PPTP connection tracking
-
-create: cli-shell-api exists system conntrack modules gre disable
- if [ $? == 0 ]; then
- # Do nothing, this case is handled in GRE module templates
- :;
- else
- sudo rmmod nf_nat_pptp
- sudo rmmod nf_conntrack_pptp
- fi
-
-# PPTP shouldn't be enabled when GRE is disabled because PPTP depends on it
-delete: cli-shell-api exists system conntrack modules gre disable
- if [ $? == 0 ]; then
- echo "Error: can not enable PPTP connection tracking when GRE connection tracking is disabled!"
- exit 1
- else
- sudo modprobe nf_conntrack_pptp
- sudo modprobe nf_nat_pptp
- fi
diff --git a/templates/system/conntrack/modules/pptp/node.def b/templates/system/conntrack/modules/pptp/node.def
deleted file mode 100644
index a6ae0c4..0000000
--- a/templates/system/conntrack/modules/pptp/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: PPTP connection tracking settings \ No newline at end of file
diff --git a/templates/system/conntrack/modules/sip/disable/node.def b/templates/system/conntrack/modules/sip/disable/node.def
deleted file mode 100644
index d0eaf81..0000000
--- a/templates/system/conntrack/modules/sip/disable/node.def
+++ /dev/null
@@ -1,7 +0,0 @@
-help: Disable SIP connection tracking
-
-create: sudo rmmod nf_nat_sip
- sudo rmmod nf_conntrack_sip
-
-delete: sudo modprobe nf_conntrack_sip
- sudo modprobe nf_nat_sip \ No newline at end of file
diff --git a/templates/system/conntrack/modules/sip/enable-indirect-media/node.def b/templates/system/conntrack/modules/sip/enable-indirect-media/node.def
deleted file mode 100644
index c29389e..0000000
--- a/templates/system/conntrack/modules/sip/enable-indirect-media/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: Option to support for indirect media streams
diff --git a/templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def b/templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def
deleted file mode 100644
index 82782ff..0000000
--- a/templates/system/conntrack/modules/sip/enable-indirect-signalling/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: Option to support for indirect signalling streams
diff --git a/templates/system/conntrack/modules/sip/node.def b/templates/system/conntrack/modules/sip/node.def
deleted file mode 100644
index b5a3225..0000000
--- a/templates/system/conntrack/modules/sip/node.def
+++ /dev/null
@@ -1,61 +0,0 @@
-help: SIP connection tracking settings
-
-end: /bin/cli-shell-api existsEffective system conntrack modules sip disable && exit 0
- reload=0
- sdm=2
- if [ -f /sys/module/nf_conntrack_sip/parameters/sip_direct_media ]; then
- sdm=$(sudo cat /sys/module/nf_conntrack_sip/parameters/sip_direct_media)
- fi
- if [ -n "$VAR(./enable-indirect-media)" ]; then
- indirectmedia='sip_direct_media=0'
- if [ $sdm -ge 1 ]; then reload=1; fi
- else
- if [ $sdm -eq 0 ]; then reload=1; fi
- fi
-
- sds=2
- if [ -f /sys/module/nf_conntrack_sip/parameters/sip_direct_signalling ]; then
- sds=$(sudo cat /sys/module/nf_conntrack_sip/parameters/sip_direct_signalling)
- fi
- if [ -n "$VAR(./enable-indirect-signalling)" ]; then
- indirectsignalling='sip_direct_signalling=0'
- if [ $sds -ge 1 ]; then reload=1; fi
- else
- if [ $sds -eq 0 ]; then reload=1; fi
- fi
-
- if [ -n "$VAR(./port/@@)" ]; then
- numports=0
- for port in $VAR(./port/@@); do
- if [ -z "$portval" ]; then
- portval=$port
- else
- portval="${portval},$port"
- fi
- (( numports++ ))
- done
- portopt="ports=$portval"
- if [ $numports -gt 8 ]; then
- echo "Error: Can not specify more than 8 ports."
- exit 1
- fi
- reload=1
- fi
-
- if [ -f /etc/modprobe.d/options ]; then
- sudo sed -i '/nf_conntrack_sip/d' /etc/modprobe.d/options
- fi
-
- if [ -n "$indirectmedia" ] || [ -n "$indirectsignalling" ] || \
- [ -n "$portopt" ]; then
- sudo sh -c "echo \# Auto-generated by `whoami` at `date` > /etc/modprobe.d/vyatta_sip_options.conf"
- sudo sh -c "echo options nf_conntrack_sip $indirectmedia $indirectsignalling $portopt >> /etc/modprobe.d/vyatta_sip_options.conf "
- else
- sudo rm -f /etc/modprobe.d/vyatta_sip_options.conf
- fi
-
- if [ $reload -eq 1 ]; then
- sudo modprobe -r nf_nat_sip nf_conntrack_sip
- sudo modprobe nf_conntrack_sip
- sudo modprobe nf_nat_sip
- fi
diff --git a/templates/system/conntrack/modules/sip/port/node.def b/templates/system/conntrack/modules/sip/port/node.def
deleted file mode 100644
index b72f1ca..0000000
--- a/templates/system/conntrack/modules/sip/port/node.def
+++ /dev/null
@@ -1,8 +0,0 @@
-multi:
-type: u32
-
-help: Port number that SIP traffic is carried on
-
-val_help: u32:1-65535; SIP port number
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <=65535) ; "Port number must be in range 1 to 65535"
diff --git a/templates/system/conntrack/modules/tftp/disable/node.def b/templates/system/conntrack/modules/tftp/disable/node.def
deleted file mode 100644
index ebdecf4..0000000
--- a/templates/system/conntrack/modules/tftp/disable/node.def
+++ /dev/null
@@ -1,7 +0,0 @@
-help: Disable TFTP connection tracking
-
-create: sudo rmmod nf_nat_tftp
- sudo rmmod nf_conntrack_tftp
-
-delete: sudo modprobe nf_conntrack_tftp
- sudo modprobe nf_nat_tftp
diff --git a/templates/system/conntrack/modules/tftp/node.def b/templates/system/conntrack/modules/tftp/node.def
deleted file mode 100644
index 901f52e..0000000
--- a/templates/system/conntrack/modules/tftp/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: TFTP connection tracking settings \ No newline at end of file
diff --git a/templates/system/conntrack/node.def b/templates/system/conntrack/node.def
deleted file mode 100644
index 53488ae..0000000
--- a/templates/system/conntrack/node.def
+++ /dev/null
@@ -1,24 +0,0 @@
-help: Connection tracking engine options
-
-priority: 218 # before NAT and conntrack-sync are configured
-
-delete: # set conntrack table size to standard 16384 entries if conntrack settings are removed
- sudo sysctl -q -w net/nf_conntrack_max=16384
-
- # set conntrack expect table size to standard 2048 entries if conntrack settings are removed
- sudo sysctl -q -w net/netfilter/nf_conntrack_expect_max=2048
-
- # set conntrack hash size to standard 4096
- if ! grep -q "nf_conntrack hashsize=4096$" /etc/modprobe.d/vyatta_nf_conntrack.conf
- then
- sudo sh -c "sed -i -e '/options nf_conntrack hashsize/d' \
- /etc/modprobe.d/vyatta_nf_conntrack.conf"
- sudo sh -c "echo options nf_conntrack hashsize=4096 >> \
- /etc/modprobe.d/vyatta_nf_conntrack.conf"
- echo "Conntrack hash size set to default 4096. This change will take effect when the system is rebooted."
- fi
-
- # need to restart conntrackd with updated conntrack table size
- if cli-shell-api existsActive service conntrack-sync; then
- sudo /opt/vyatta/sbin/vyatta-conntrack-sync.pl --action=enable
- fi
diff --git a/templates/system/conntrack/table-size/node.def b/templates/system/conntrack/table-size/node.def
deleted file mode 100644
index f91b101..0000000
--- a/templates/system/conntrack/table-size/node.def
+++ /dev/null
@@ -1,39 +0,0 @@
-#
-# Config template for: system conntrack table-size
-#
-# Sets the size of the TCP connection tracking table in the netfilter
-# nf_conntrack module, which is used by firewall and NAT. The size of
-# this table determines how many TCP connections can be simultaneously
-# tracked. If new connections arrive and the table is full, older
-# connections will be dropped out of the table. System administrators
-# must set the connection tracking table size based on the number of
-# connections they expect their system to track. The connection
-# tracking table consumes kernel memory, so the size selected should
-# be no larger than necessary.
-#
-# default value when contrack is not set - 16384
-# default value when conntrack is set - 32768
-#
-
-type: u32
-
-help: Size of connection tracking table
-
-default: 32768
-
-val_help: u32:1-50000000; Number of entries allowed in connection tracking table
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 50000000) ; "Value must be between 1 and 50000000"
-
-update:
- sudo sysctl -q -w net/nf_conntrack_max=$VAR(@)
- # need to restart conntrackd with updated conntrack table size
- if cli-shell-api existsActive service conntrack-sync; then
- sudo /opt/vyatta/sbin/vyatta-conntrack-sync.pl --action=enable
- fi
-
-
-
-
-
-
diff --git a/templates/system/conntrack/tcp/half-open-connections/node.def b/templates/system/conntrack/tcp/half-open-connections/node.def
deleted file mode 100644
index 9474463..0000000
--- a/templates/system/conntrack/tcp/half-open-connections/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: Maximum number of TCP half-open connections
-
-default: 512
-
-val_help: u32:1-2147483647; Generic connection timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 2147483647) ; "Value must be between 1 and 2147483647"
-
-update: sudo sysctl -q -w net/ipv4/tcp_max_syn_backlog=$VAR(@)
-
-delete: sudo sysctl -q -w net/ipv4/tcp_max_syn_backlog=512
diff --git a/templates/system/conntrack/tcp/loose/node.def b/templates/system/conntrack/tcp/loose/node.def
deleted file mode 100644
index 06706a2..0000000
--- a/templates/system/conntrack/tcp/loose/node.def
+++ /dev/null
@@ -1,50 +0,0 @@
-#
-# This parameter directs the netfilter TCP connection tracking modules
-# (nf_conntrack, and others) to either allow or disallow the tracking
-# of TCP connections which are "previously established". This
-# includes all cases where the three-way connection opening handshake
-# was not seen by this machine. That includes the case the connection
-# was opened before this machine booted. It also includes cases where
-# the packets comprising the three-way handshake were routed via some
-# other router.
-#
-# If this parameter is set to "enable", tracking such connections is
-# allowed. If disabled, such tracking is disabled.
-# default value - 1
-
-type: txt
-
-help: Policy to track previously established connections
-
-val_help: enable; Allow tracking of previously established connections
-val_help: disable; Do not allow tracking of previously established connections
-
-default: "enable"
-
-syntax:expression: $VAR(@) in "enable", "disable"; "must be either enable or disable"
-
-update:
- if [ ! -e /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_loose ]; then
- sudo modprobe nf_conntrack_ipv4
- fi
- if [ "$VAR(@)" = "enable" ]; then
- sudo sysctl -q -w net/ipv4/netfilter/ip_conntrack_tcp_loose=1
- elif [ "$VAR(@)" = "disable" ]; then
- sudo sysctl -q -w net/ipv4/netfilter/ip_conntrack_tcp_loose=0
- else
- echo "Invalid parameter: $VAR(@)"
- exit 1
- fi
-
-delete:
- if [ ! -e /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_loose ]; then
- sudo modprobe nf_conntrack_ipv4
- fi
- sudo sysctl -q -w net/ipv4/netfilter/ip_conntrack_tcp_loose=1
-
-
-
-
-
-
-
diff --git a/templates/system/conntrack/tcp/max-retrans/node.def b/templates/system/conntrack/tcp/max-retrans/node.def
deleted file mode 100644
index bf56f1f..0000000
--- a/templates/system/conntrack/tcp/max-retrans/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP maximum retransmit attempts
-
-default: 3
-
-val_help: u32:1-2147483647; Generic connection timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 2147483647) ; "Value must be between 1 and 2147483647"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_max_retrans=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_max_retrans=3
diff --git a/templates/system/conntrack/tcp/node.def b/templates/system/conntrack/tcp/node.def
deleted file mode 100644
index 67543ca..0000000
--- a/templates/system/conntrack/tcp/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: TCP options \ No newline at end of file
diff --git a/templates/system/conntrack/timeout/icmp/node.def b/templates/system/conntrack/timeout/icmp/node.def
deleted file mode 100644
index 952178e..0000000
--- a/templates/system/conntrack/timeout/icmp/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: ICMP timeout in seconds
-
-default: 30
-
-val_help: u32:1-21474836; ICMP timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_icmp_timeout=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_icmp_timeout=30
diff --git a/templates/system/conntrack/timeout/node.def b/templates/system/conntrack/timeout/node.def
deleted file mode 100644
index f0193c6..0000000
--- a/templates/system/conntrack/timeout/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: Connection timeout options \ No newline at end of file
diff --git a/templates/system/conntrack/timeout/other/node.def b/templates/system/conntrack/timeout/other/node.def
deleted file mode 100644
index a794bb7..0000000
--- a/templates/system/conntrack/timeout/other/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: Generic connection timeout in seconds
-
-default: 600
-
-val_help: u32:1-21474836; Generic connection timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_generic_timeout=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_generic_timeout=600
diff --git a/templates/system/conntrack/timeout/tcp/close-wait/node.def b/templates/system/conntrack/timeout/tcp/close-wait/node.def
deleted file mode 100644
index 0491b68..0000000
--- a/templates/system/conntrack/timeout/tcp/close-wait/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP CLOSE-WAIT timeout in seconds
-
-default: 60
-
-val_help: u32:1-21474836; TCP CLOSE-WAIT timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close_wait=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close_wait=60
diff --git a/templates/system/conntrack/timeout/tcp/close/node.def b/templates/system/conntrack/timeout/tcp/close/node.def
deleted file mode 100644
index 38317d5..0000000
--- a/templates/system/conntrack/timeout/tcp/close/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP CLOSE timeout in seconds
-
-default: 10
-
-val_help: u32:1-21474836; TCP CLOSE timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_close=10
diff --git a/templates/system/conntrack/timeout/tcp/established/node.def b/templates/system/conntrack/timeout/tcp/established/node.def
deleted file mode 100644
index 9e47f1e..0000000
--- a/templates/system/conntrack/timeout/tcp/established/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP ESTABLISHED timeout in seconds
-
-default: 432000
-
-val_help: u32:1-21474836; TCP ESTABLISHED timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_established=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_established=432000
diff --git a/templates/system/conntrack/timeout/tcp/fin-wait/node.def b/templates/system/conntrack/timeout/tcp/fin-wait/node.def
deleted file mode 100644
index 985a6a4..0000000
--- a/templates/system/conntrack/timeout/tcp/fin-wait/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP FIN-WAIT timeout in seconds
-
-default: 120
-
-val_help: u32:1-21474836; TCP FIN-WAIT timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_fin_wait=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_fin_wait=120
diff --git a/templates/system/conntrack/timeout/tcp/last-ack/node.def b/templates/system/conntrack/timeout/tcp/last-ack/node.def
deleted file mode 100644
index 3e07fe4..0000000
--- a/templates/system/conntrack/timeout/tcp/last-ack/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP LAST-ACK timeout in seconds
-
-default: 30
-
-val_help: u32:1-21474836; TCP LAST-ACK timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_last_ack=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_last_ack=30
diff --git a/templates/system/conntrack/timeout/tcp/node.def b/templates/system/conntrack/timeout/tcp/node.def
deleted file mode 100644
index 2b67c51..0000000
--- a/templates/system/conntrack/timeout/tcp/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: TCP connection timeout options \ No newline at end of file
diff --git a/templates/system/conntrack/timeout/tcp/syn-recv/node.def b/templates/system/conntrack/timeout/tcp/syn-recv/node.def
deleted file mode 100644
index 50c5512..0000000
--- a/templates/system/conntrack/timeout/tcp/syn-recv/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP SYN-RECEIVED timeout in seconds
-
-default: 60
-
-val_help: u32:1-21474836; TCP SYN-RECEIVED timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_recv=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_recv=60
diff --git a/templates/system/conntrack/timeout/tcp/syn-sent/node.def b/templates/system/conntrack/timeout/tcp/syn-sent/node.def
deleted file mode 100644
index 5856ba7..0000000
--- a/templates/system/conntrack/timeout/tcp/syn-sent/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP SYN-SENT timeout in seconds
-
-default: 120
-
-val_help: u32:1-21474836; TCP SYN-SENT timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_sent=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_syn_sent=120
diff --git a/templates/system/conntrack/timeout/tcp/time-wait/node.def b/templates/system/conntrack/timeout/tcp/time-wait/node.def
deleted file mode 100644
index f6bd1c8..0000000
--- a/templates/system/conntrack/timeout/tcp/time-wait/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: TCP TIME-WAIT timeout in seconds
-
-default: 120
-
-val_help: u32:1-21474836; TCP TIME-WAIT timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_time_wait=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_tcp_timeout_time_wait=120
diff --git a/templates/system/conntrack/timeout/udp/node.def b/templates/system/conntrack/timeout/udp/node.def
deleted file mode 100644
index 7ee8fd3..0000000
--- a/templates/system/conntrack/timeout/udp/node.def
+++ /dev/null
@@ -1 +0,0 @@
-help: UDP timeout \ No newline at end of file
diff --git a/templates/system/conntrack/timeout/udp/other/node.def b/templates/system/conntrack/timeout/udp/other/node.def
deleted file mode 100644
index 0018f1c..0000000
--- a/templates/system/conntrack/timeout/udp/other/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: UDP generic timeout in seconds
-
-default: 30
-
-val_help: u32:1-21474836; UDP generic timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout=30
diff --git a/templates/system/conntrack/timeout/udp/stream/node.def b/templates/system/conntrack/timeout/udp/stream/node.def
deleted file mode 100644
index d86e683..0000000
--- a/templates/system/conntrack/timeout/udp/stream/node.def
+++ /dev/null
@@ -1,13 +0,0 @@
-type: u32
-
-help: UDP stream timeout in seconds
-
-default: 180
-
-val_help: u32:1-21474836; UDP stream timeout in seconds
-
-syntax:expression: ($VAR(@) >= 1 && $VAR(@) <= 21474836) ; "Value must be between 1 and 21474836"
-
-update: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout_stream=$VAR(@)
-
-delete: sudo sysctl -q -w net/netfilter/nf_conntrack_udp_timeout_stream=180