1NM-SETTINGS-NMCLI(5) Configuration NM-SETTINGS-NMCLI(5)
2
3
4
6 nm-settings-nmcli - Description of settings and properties of
7 NetworkManager connection profiles for nmcli
8
10 NetworkManager is based on a concept of connection profiles, sometimes
11 referred to as connections only. These connection profiles contain a
12 network configuration. When NetworkManager activates a connection
13 profile on a network device the configuration will be applied and an
14 active network connection will be established. Users are free to create
15 as many connection profiles as they see fit. Thus they are flexible in
16 having various network configurations for different networking needs.
17
18 NetworkManager provides an API for configuring connection profiles, for
19 activating them to configure the network, and inspecting the current
20 network configuration. The command line tool nmcli is a client
21 application to NetworkManager that uses this API. See nmcli(1) for
22 details.
23
24 With commands like nmcli connection add, nmcli connection modify and
25 nmcli connection show, connection profiles can be created, modified and
26 inspected. A profile consists of properties. On D-Bus this follows the
27 format as described by nm-settings-dbus(5), while this manual page
28 describes the settings format how they are expected by nmcli.
29
30 The settings and properties shown in tables below list all available
31 connection configuration options. However, note that not all settings
32 are applicable to all connection types. nmcli connection editor has
33 also a built-in describe command that can display description of
34 particular settings and properties of this page.
35
36 The setting and property can be abbreviated provided they are unique.
37 The list below also shows aliases that can be used unqualified instead
38 of the full name. For example connection.interface-name and ifname
39 refer to the same property.
40
41 connection setting
42 General Connection Profile Settings.
43
44 Properties:
45
46 connection.auth-retries
47 The number of retries for the authentication. Zero means to try
48 indefinitely; -1 means to use a global default. If the global
49 default is not set, the authentication retries for 3 times before
50 failing the connection.
51
52 Currently, this only applies to 802-1x authentication.
53
54 Format: int32
55
56 connection.autoconnect
57 Alias: autoconnect
58
59 Whether or not the connection should be automatically connected by
60 NetworkManager when the resources for the connection are available.
61 TRUE to automatically activate the connection, FALSE to require
62 manual intervention to activate the connection.
63
64 Autoconnect happens when the circumstances are suitable. That means
65 for example that the device is currently managed and not active.
66 Autoconnect thus never replaces or competes with an already active
67 profile.
68
69 Note that autoconnect is not implemented for VPN profiles. See
70 "secondaries" as an alternative to automatically connect VPN
71 profiles.
72
73 If multiple profiles are ready to autoconnect on the same device,
74 the one with the better "connection.autoconnect-priority" is
75 chosen. If the priorities are equal, then the most recently
76 connected profile is activated. If the profiles were not connected
77 earlier or their "connection.timestamp" is identical, the choice is
78 undefined.
79
80 Depending on "connection.multi-connect", a profile can
81 (auto)connect only once at a time or multiple times.
82
83 Format: boolean
84
85 connection.autoconnect-priority
86 The autoconnect priority in range -999 to 999. If the connection is
87 set to autoconnect, connections with higher priority will be
88 preferred. The higher number means higher priority. Defaults to 0.
89 Note that this property only matters if there are more than one
90 candidate profile to select for autoconnect. In case of equal
91 priority, the profile used most recently is chosen.
92
93 Format: int32
94
95 connection.autoconnect-retries
96 The number of times a connection should be tried when
97 autoactivating before giving up. Zero means forever, -1 means the
98 global default (4 times if not overridden). Setting this to 1 means
99 to try activation only once before blocking autoconnect. Note that
100 after a timeout, NetworkManager will try to autoconnect again.
101
102 Format: int32
103
104 connection.autoconnect-slaves
105 Whether or not slaves of this connection should be automatically
106 brought up when NetworkManager activates this connection. This only
107 has a real effect for master connections. The properties
108 "autoconnect", "autoconnect-priority" and "autoconnect-retries" are
109 unrelated to this setting. The permitted values are: 0: leave slave
110 connections untouched, 1: activate all the slave connections with
111 this connection, -1: default. If -1 (default) is set, global
112 connection.autoconnect-slaves is read to determine the real value.
113 If it is default as well, this fallbacks to 0.
114
115 Format: NMSettingConnectionAutoconnectSlaves (int32)
116
117 connection.dns-over-tls
118 Whether DNSOverTls (dns-over-tls) is enabled for the connection.
119 DNSOverTls is a technology which uses TLS to encrypt dns traffic.
120
121 The permitted values are: "yes" (2) use DNSOverTls and disabled
122 fallback, "opportunistic" (1) use DNSOverTls but allow fallback to
123 unencrypted resolution, "no" (0) don't ever use DNSOverTls. If
124 unspecified "default" depends on the plugin used. Systemd-resolved
125 uses global setting.
126
127 This feature requires a plugin which supports DNSOverTls.
128 Otherwise, the setting has no effect. One such plugin is
129 dns-systemd-resolved.
130
131 Format: int32
132
133 connection.gateway-ping-timeout
134 If greater than zero, delay success of IP addressing until either
135 the timeout is reached, or an IP gateway replies to a ping.
136
137 Format: uint32
138
139 connection.id
140 Alias: con-name
141
142 A human readable unique identifier for the connection, like "Work
143 Wi-Fi" or "T-Mobile 3G".
144
145 Format: string
146
147 connection.interface-name
148 Alias: ifname
149
150 The name of the network interface this connection is bound to. If
151 not set, then the connection can be attached to any interface of
152 the appropriate type (subject to restrictions imposed by other
153 settings).
154
155 For software devices this specifies the name of the created device.
156
157 For connection types where interface names cannot easily be made
158 persistent (e.g. mobile broadband or USB Ethernet), this property
159 should not be used. Setting this property restricts the interfaces
160 a connection can be used with, and if interface names change or are
161 reordered the connection may be applied to the wrong interface.
162
163 Format: string
164
165 connection.lldp
166 Whether LLDP is enabled for the connection.
167
168 Format: int32
169
170 connection.llmnr
171 Whether Link-Local Multicast Name Resolution (LLMNR) is enabled for
172 the connection. LLMNR is a protocol based on the Domain Name System
173 (DNS) packet format that allows both IPv4 and IPv6 hosts to perform
174 name resolution for hosts on the same local link.
175
176 The permitted values are: "yes" (2) register hostname and resolving
177 for the connection, "no" (0) disable LLMNR for the interface,
178 "resolve" (1) do not register hostname but allow resolving of LLMNR
179 host names If unspecified, "default" ultimately depends on the DNS
180 plugin (which for systemd-resolved currently means "yes").
181
182 This feature requires a plugin which supports LLMNR. Otherwise, the
183 setting has no effect. One such plugin is dns-systemd-resolved.
184
185 Format: int32
186
187 connection.master
188 Alias: master
189
190 Interface name of the master device or UUID of the master
191 connection.
192
193 Format: string
194
195 connection.mdns
196 Whether mDNS is enabled for the connection.
197
198 The permitted values are: "yes" (2) register hostname and resolving
199 for the connection, "no" (0) disable mDNS for the interface,
200 "resolve" (1) do not register hostname but allow resolving of mDNS
201 host names and "default" (-1) to allow lookup of a global default
202 in NetworkManager.conf. If unspecified, "default" ultimately
203 depends on the DNS plugin (which for systemd-resolved currently
204 means "no").
205
206 This feature requires a plugin which supports mDNS. Otherwise, the
207 setting has no effect. One such plugin is dns-systemd-resolved.
208
209 Format: int32
210
211 connection.metered
212 Whether the connection is metered.
213
214 When updating this property on a currently activated connection,
215 the change takes effect immediately.
216
217 Format: NMMetered (int32)
218
219 connection.mptcp-flags
220 Whether to configure MPTCP endpoints and the address flags. If
221 MPTCP is enabled in NetworkManager, it will configure the addresses
222 of the interface as MPTCP endpoints. Note that IPv4 loopback
223 addresses (127.0.0.0/8), IPv4 link local addresses
224 (169.254.0.0/16), the IPv6 loopback address (::1), IPv6 link local
225 addresses (fe80::/10), IPv6 unique local addresses (ULA, fc00::/7)
226 and IPv6 privacy extension addresses (rfc3041, ipv6.ip6-privacy)
227 will be excluded from being configured as endpoints.
228
229 If "disabled" (0x1), MPTCP handling for the interface is disabled
230 and no endpoints are registered.
231
232 The "enabled" (0x2) flag means that MPTCP handling is enabled. This
233 flag can also be implied from the presence of other flags.
234
235 Even when enabled, MPTCP handling will by default still be disabled
236 unless "/proc/sys/net/mptcp/enabled" sysctl is on. NetworkManager
237 does not change the sysctl and this is up to the administrator or
238 distribution. To configure endpoints even if the sysctl is
239 disabled, "also-without-sysctl" (0x4) flag can be used. In that
240 case, NetworkManager doesn't look at the sysctl and configures
241 endpoints regardless.
242
243 Even when enabled, NetworkManager will only configure MPTCP
244 endpoints for a certain address family, if there is a unicast
245 default route (0.0.0.0/0 or ::/0) in the main routing table. The
246 flag "also-without-default-route" (0x8) can override that.
247
248 When MPTCP handling is enabled then endpoints are configured with
249 the specified address flags "signal" (0x10), "subflow" (0x20),
250 "backup" (0x40), "fullmesh" (0x80). See ip-mptcp(8) manual for
251 additional information about the flags.
252
253 If the flags are zero (0x0), the global connection default from
254 NetworkManager.conf is honored. If still unspecified, the fallback
255 is "enabled,subflow". Note that this means that MPTCP is by default
256 done depending on the "/proc/sys/net/mptcp/enabled" sysctl.
257
258 NetworkManager does not change the MPTCP limits nor enable MPTCP
259 via "/proc/sys/net/mptcp/enabled". That is a host configuration
260 which the admin can change via sysctl and ip-mptcp.
261
262 Strict reverse path filtering (rp_filter) breaks many MPTCP use
263 cases, so when MPTCP handling for IPv4 addresses on the interface
264 is enabled, NetworkManager would loosen the strict reverse path
265 filtering (1) to the loose setting (2).
266
267 Format: uint32
268
269 connection.mud-url
270 If configured, set to a Manufacturer Usage Description (MUD) URL
271 that points to manufacturer-recommended network policies for IoT
272 devices. It is transmitted as a DHCPv4 or DHCPv6 option. The value
273 must be a valid URL starting with "https://".
274
275 The special value "none" is allowed to indicate that no MUD URL is
276 used.
277
278 If the per-profile value is unspecified (the default), a global
279 connection default gets consulted. If still unspecified, the
280 ultimate default is "none".
281
282 Format: string
283
284 connection.multi-connect
285 Specifies whether the profile can be active multiple times at a
286 particular moment. The value is of type NMConnectionMultiConnect.
287
288 Format: int32
289
290 connection.permissions
291 An array of strings defining what access a given user has to this
292 connection. If this is NULL or empty, all users are allowed to
293 access this connection; otherwise users are allowed if and only if
294 they are in this list. When this is not empty, the connection can
295 be active only when one of the specified users is logged into an
296 active session. Each entry is of the form "[type]:[id]:[reserved]";
297 for example, "user:dcbw:blah".
298
299 At this time only the "user" [type] is allowed. Any other values
300 are ignored and reserved for future use. [id] is the username that
301 this permission refers to, which may not contain the ":" character.
302 Any [reserved] information present must be ignored and is reserved
303 for future use. All of [type], [id], and [reserved] must be valid
304 UTF-8.
305
306 Format: array of string
307
308 connection.secondaries
309 List of connection UUIDs that should be activated when the base
310 connection itself is activated. Currently, only VPN connections are
311 supported.
312
313 Format: array of string
314
315 connection.slave-type
316 Alias: slave-type
317
318 Setting name of the device type of this slave's master connection
319 (eg, "bond"), or NULL if this connection is not a slave.
320
321 Format: string
322
323 connection.stable-id
324 This represents the identity of the connection used for various
325 purposes. It allows to configure multiple profiles to share the
326 identity. Also, the stable-id can contain placeholders that are
327 substituted dynamically and deterministically depending on the
328 context.
329
330 The stable-id is used for generating IPv6 stable private addresses
331 with ipv6.addr-gen-mode=stable-privacy. It is also used to seed the
332 generated cloned MAC address for ethernet.cloned-mac-address=stable
333 and wifi.cloned-mac-address=stable. It is also used to derive the
334 DHCP client identifier with ipv4.dhcp-client-id=stable, the DHCPv6
335 DUID with ipv6.dhcp-duid=stable-[llt,ll,uuid] and the DHCP IAID
336 with ipv4.iaid=stable and ipv6.iaid=stable.
337
338 Note that depending on the context where it is used, other
339 parameters are also seeded into the generation algorithm. For
340 example, a per-host key is commonly also included, so that
341 different systems end up generating different IDs. Or with
342 ipv6.addr-gen-mode=stable-privacy, also the device's name is
343 included, so that different interfaces yield different addresses.
344 The per-host key is the identity of your machine and stored in
345 /var/lib/NetworkManager/secret_key. See NetworkManager(8) manual
346 about the secret-key and the host identity.
347
348 The '$' character is treated special to perform dynamic
349 substitutions at activation time. Currently, supported are
350 "${CONNECTION}", "${DEVICE}", "${MAC}", "${BOOT}", "${RANDOM}".
351 These effectively create unique IDs per-connection, per-device,
352 per-boot, or every time. The "${CONNECTION}" uses the profile's
353 connection.uuid, the "${DEVICE}" uses the interface name of the
354 device and "${MAC}" the permanent MAC address of the device. Any
355 unrecognized patterns following '$' are treated verbatim, however
356 are reserved for future use. You are thus advised to avoid '$' or
357 escape it as "$$". For example, set it to
358 "${CONNECTION}-${BOOT}-${DEVICE}" to create a unique id for this
359 connection that changes with every reboot and differs depending on
360 the interface where the profile activates.
361
362 If the value is unset, a global connection default is consulted. If
363 the value is still unset, the default is "default${CONNECTION}" go
364 generate an ID unique per connection profile.
365
366 Format: string
367
368 connection.timestamp
369 The time, in seconds since the Unix Epoch, that the connection was
370 last _successfully_ fully activated.
371
372 NetworkManager updates the connection timestamp periodically when
373 the connection is active to ensure that an active connection has
374 the latest timestamp. The property is only meant for reading
375 (changes to this property will not be preserved).
376
377 Format: uint64
378
379 connection.type
380 Alias: type
381
382 Base type of the connection. For hardware-dependent connections,
383 should contain the setting name of the hardware-type specific
384 setting (ie, "802-3-ethernet" or "802-11-wireless" or "bluetooth",
385 etc), and for non-hardware dependent connections like VPN or
386 otherwise, should contain the setting name of that setting type
387 (ie, "vpn" or "bridge", etc).
388
389 Format: string
390
391 connection.uuid
392 The connection.uuid is the real identifier of a profile. It cannot
393 change and it must be unique. It is therefore often best to refer
394 to a profile by UUID, for example with `nmcli connection up uuid
395 $UUID`.
396
397 The UUID cannot be changed, except in offline mode. In that case,
398 the special values "new", "generate" and "" are allowed to generate
399 a new random UUID.
400
401 Format: a valid RFC4122 universally unique identifier (UUID).
402
403 connection.wait-activation-delay
404 Time in milliseconds to wait for connection to be considered
405 activated. The wait will start after the pre-up dispatcher event.
406
407 The value 0 means no wait time. The default value is -1, which
408 currently has the same meaning as no wait time.
409
410 Format: int32
411
412 connection.wait-device-timeout
413 Timeout in milliseconds to wait for device at startup. During boot,
414 devices may take a while to be detected by the driver. This
415 property will cause to delay NetworkManager-wait-online.service and
416 nm-online to give the device a chance to appear. This works by
417 waiting for the given timeout until a compatible device for the
418 profile is available and managed.
419
420 The value 0 means no wait time. The default value is -1, which
421 currently has the same meaning as no wait time.
422
423 Format: int32
424
425 connection.zone
426 The trust level of a the connection. Free form case-insensitive
427 string (for example "Home", "Work", "Public"). NULL or unspecified
428 zone means the connection will be placed in the default zone as
429 defined by the firewall.
430
431 When updating this property on a currently activated connection,
432 the change takes effect immediately.
433
434 Format: string
435
436 6lowpan setting
437 6LoWPAN Settings.
438
439 Properties:
440
441 6lowpan.parent
442 Alias: dev
443
444 If given, specifies the parent interface name or parent connection
445 UUID from which this 6LowPAN interface should be created.
446
447 Format: string
448
449 802-1x setting
450 IEEE 802.1x Authentication Settings.
451
452 Properties:
453
454 802-1x.altsubject-matches
455 List of strings to be matched against the altSubjectName of the
456 certificate presented by the authentication server. If the list is
457 empty, no verification of the server certificate's altSubjectName
458 is performed.
459
460 Format: array of string
461
462 802-1x.anonymous-identity
463 Anonymous identity string for EAP authentication methods. Used as
464 the unencrypted identity with EAP types that support different
465 tunneled identity like EAP-TTLS.
466
467 Format: string
468
469 802-1x.auth-timeout
470 A timeout for the authentication. Zero means the global default; if
471 the global default is not set, the authentication timeout is 25
472 seconds.
473
474 Format: int32
475
476 802-1x.ca-cert
477 Contains the CA certificate if used by the EAP method specified in
478 the "eap" property.
479
480 Certificate data is specified using a "scheme"; three are currently
481 supported: blob, path and pkcs#11 URL. When using the blob scheme
482 this property should be set to the certificate's DER encoded data.
483 When using the path scheme, this property should be set to the full
484 UTF-8 encoded path of the certificate, prefixed with the string
485 "file://" and ending with a terminating NUL byte. This property can
486 be unset even if the EAP method supports CA certificates, but this
487 allows man-in-the-middle attacks and is NOT recommended.
488
489 Note that enabling NMSetting8021x:system-ca-certs will override
490 this setting to use the built-in path, if the built-in path is not
491 a directory.
492
493 Format: byte array
494
495 802-1x.ca-cert-password
496 The password used to access the CA certificate stored in "ca-cert"
497 property. Only makes sense if the certificate is stored on a
498 PKCS#11 token that requires a login.
499
500 Format: string
501
502 802-1x.ca-cert-password-flags
503 Flags indicating how to handle the "ca-cert-password" property.
504
505 See the section called “Secret flag types:” for flag values.
506
507 Format: NMSettingSecretFlags (uint32)
508
509 802-1x.ca-path
510 UTF-8 encoded path to a directory containing PEM or DER formatted
511 certificates to be added to the verification chain in addition to
512 the certificate specified in the "ca-cert" property.
513
514 If NMSetting8021x:system-ca-certs is enabled and the built-in CA
515 path is an existing directory, then this setting is ignored.
516
517 Format: string
518
519 802-1x.client-cert
520 Contains the client certificate if used by the EAP method specified
521 in the "eap" property.
522
523 Certificate data is specified using a "scheme"; two are currently
524 supported: blob and path. When using the blob scheme (which is
525 backwards compatible with NM 0.7.x) this property should be set to
526 the certificate's DER encoded data. When using the path scheme,
527 this property should be set to the full UTF-8 encoded path of the
528 certificate, prefixed with the string "file://" and ending with a
529 terminating NUL byte.
530
531 Format: byte array
532
533 802-1x.client-cert-password
534 The password used to access the client certificate stored in
535 "client-cert" property. Only makes sense if the certificate is
536 stored on a PKCS#11 token that requires a login.
537
538 Format: string
539
540 802-1x.client-cert-password-flags
541 Flags indicating how to handle the "client-cert-password" property.
542
543 See the section called “Secret flag types:” for flag values.
544
545 Format: NMSettingSecretFlags (uint32)
546
547 802-1x.domain-match
548 Constraint for server domain name. If set, this list of FQDNs is
549 used as a match requirement for dNSName element(s) of the
550 certificate presented by the authentication server. If a matching
551 dNSName is found, this constraint is met. If no dNSName values are
552 present, this constraint is matched against SubjectName CN using
553 the same comparison. Multiple valid FQDNs can be passed as a ";"
554 delimited list.
555
556 Format: string
557
558 802-1x.domain-suffix-match
559 Constraint for server domain name. If set, this FQDN is used as a
560 suffix match requirement for dNSName element(s) of the certificate
561 presented by the authentication server. If a matching dNSName is
562 found, this constraint is met. If no dNSName values are present,
563 this constraint is matched against SubjectName CN using same suffix
564 match comparison. Since version 1.24, multiple valid FQDNs can be
565 passed as a ";" delimited list.
566
567 Format: string
568
569 802-1x.eap
570 The allowed EAP method to be used when authenticating to the
571 network with 802.1x. Valid methods are: "leap", "md5", "tls",
572 "peap", "ttls", "pwd", and "fast". Each method requires different
573 configuration using the properties of this setting; refer to
574 wpa_supplicant documentation for the allowed combinations.
575
576 Format: array of string
577
578 802-1x.identity
579 Identity string for EAP authentication methods. Often the user's
580 user or login name.
581
582 Format: string
583
584 802-1x.optional
585 Whether the 802.1X authentication is optional. If TRUE, the
586 activation will continue even after a timeout or an authentication
587 failure. Setting the property to TRUE is currently allowed only for
588 Ethernet connections. If set to FALSE, the activation can continue
589 only after a successful authentication.
590
591 Format: boolean
592
593 802-1x.pac-file
594 UTF-8 encoded file path containing PAC for EAP-FAST.
595
596 Format: string
597
598 802-1x.password
599 UTF-8 encoded password used for EAP authentication methods. If both
600 the "password" property and the "password-raw" property are
601 specified, "password" is preferred.
602
603 Format: string
604
605 802-1x.password-flags
606 Flags indicating how to handle the "password" property.
607
608 See the section called “Secret flag types:” for flag values.
609
610 Format: NMSettingSecretFlags (uint32)
611
612 802-1x.password-raw
613 Password used for EAP authentication methods, given as a byte array
614 to allow passwords in other encodings than UTF-8 to be used. If
615 both the "password" property and the "password-raw" property are
616 specified, "password" is preferred.
617
618 Format: byte array
619
620 802-1x.password-raw-flags
621 Flags indicating how to handle the "password-raw" property.
622
623 See the section called “Secret flag types:” for flag values.
624
625 Format: NMSettingSecretFlags (uint32)
626
627 802-1x.phase1-auth-flags
628 Specifies authentication flags to use in "phase 1" outer
629 authentication using NMSetting8021xAuthFlags options. The
630 individual TLS versions can be explicitly disabled. TLS time checks
631 can be also disabled. If a certain TLS disable flag is not set, it
632 is up to the supplicant to allow or forbid it. The TLS options map
633 to tls_disable_tlsv1_x and tls_disable_time_checks settings. See
634 the wpa_supplicant documentation for more details.
635
636 Format: uint32
637
638 802-1x.phase1-fast-provisioning
639 Enables or disables in-line provisioning of EAP-FAST credentials
640 when FAST is specified as the EAP method in the "eap" property.
641 Recognized values are "0" (disabled), "1" (allow unauthenticated
642 provisioning), "2" (allow authenticated provisioning), and "3"
643 (allow both authenticated and unauthenticated provisioning). See
644 the wpa_supplicant documentation for more details.
645
646 Format: string
647
648 802-1x.phase1-peaplabel
649 Forces use of the new PEAP label during key derivation. Some RADIUS
650 servers may require forcing the new PEAP label to interoperate with
651 PEAPv1. Set to "1" to force use of the new PEAP label. See the
652 wpa_supplicant documentation for more details.
653
654 Format: string
655
656 802-1x.phase1-peapver
657 Forces which PEAP version is used when PEAP is set as the EAP
658 method in the "eap" property. When unset, the version reported by
659 the server will be used. Sometimes when using older RADIUS servers,
660 it is necessary to force the client to use a particular PEAP
661 version. To do so, this property may be set to "0" or "1" to force
662 that specific PEAP version.
663
664 Format: string
665
666 802-1x.phase2-altsubject-matches
667 List of strings to be matched against the altSubjectName of the
668 certificate presented by the authentication server during the inner
669 "phase 2" authentication. If the list is empty, no verification of
670 the server certificate's altSubjectName is performed.
671
672 Format: array of string
673
674 802-1x.phase2-auth
675 Specifies the allowed "phase 2" inner authentication method when an
676 EAP method that uses an inner TLS tunnel is specified in the "eap"
677 property. For TTLS this property selects one of the supported
678 non-EAP inner methods: "pap", "chap", "mschap", "mschapv2" while
679 "phase2-autheap" selects an EAP inner method. For PEAP this selects
680 an inner EAP method, one of: "gtc", "otp", "md5" and "tls". Each
681 "phase 2" inner method requires specific parameters for successful
682 authentication; see the wpa_supplicant documentation for more
683 details. Both "phase2-auth" and "phase2-autheap" cannot be
684 specified.
685
686 Format: string
687
688 802-1x.phase2-autheap
689 Specifies the allowed "phase 2" inner EAP-based authentication
690 method when TTLS is specified in the "eap" property. Recognized
691 EAP-based "phase 2" methods are "md5", "mschapv2", "otp", "gtc",
692 and "tls". Each "phase 2" inner method requires specific parameters
693 for successful authentication; see the wpa_supplicant documentation
694 for more details.
695
696 Format: string
697
698 802-1x.phase2-ca-cert
699 Contains the "phase 2" CA certificate if used by the EAP method
700 specified in the "phase2-auth" or "phase2-autheap" properties.
701
702 Certificate data is specified using a "scheme"; three are currently
703 supported: blob, path and pkcs#11 URL. When using the blob scheme
704 this property should be set to the certificate's DER encoded data.
705 When using the path scheme, this property should be set to the full
706 UTF-8 encoded path of the certificate, prefixed with the string
707 "file://" and ending with a terminating NUL byte. This property can
708 be unset even if the EAP method supports CA certificates, but this
709 allows man-in-the-middle attacks and is NOT recommended.
710
711 Note that enabling NMSetting8021x:system-ca-certs will override
712 this setting to use the built-in path, if the built-in path is not
713 a directory.
714
715 Format: byte array
716
717 802-1x.phase2-ca-cert-password
718 The password used to access the "phase2" CA certificate stored in
719 "phase2-ca-cert" property. Only makes sense if the certificate is
720 stored on a PKCS#11 token that requires a login.
721
722 Format: string
723
724 802-1x.phase2-ca-cert-password-flags
725 Flags indicating how to handle the "phase2-ca-cert-password"
726 property.
727
728 See the section called “Secret flag types:” for flag values.
729
730 Format: NMSettingSecretFlags (uint32)
731
732 802-1x.phase2-ca-path
733 UTF-8 encoded path to a directory containing PEM or DER formatted
734 certificates to be added to the verification chain in addition to
735 the certificate specified in the "phase2-ca-cert" property.
736
737 If NMSetting8021x:system-ca-certs is enabled and the built-in CA
738 path is an existing directory, then this setting is ignored.
739
740 Format: string
741
742 802-1x.phase2-client-cert
743 Contains the "phase 2" client certificate if used by the EAP method
744 specified in the "phase2-auth" or "phase2-autheap" properties.
745
746 Certificate data is specified using a "scheme"; two are currently
747 supported: blob and path. When using the blob scheme (which is
748 backwards compatible with NM 0.7.x) this property should be set to
749 the certificate's DER encoded data. When using the path scheme,
750 this property should be set to the full UTF-8 encoded path of the
751 certificate, prefixed with the string "file://" and ending with a
752 terminating NUL byte. This property can be unset even if the EAP
753 method supports CA certificates, but this allows man-in-the-middle
754 attacks and is NOT recommended.
755
756 Format: byte array
757
758 802-1x.phase2-client-cert-password
759 The password used to access the "phase2" client certificate stored
760 in "phase2-client-cert" property. Only makes sense if the
761 certificate is stored on a PKCS#11 token that requires a login.
762
763 Format: string
764
765 802-1x.phase2-client-cert-password-flags
766 Flags indicating how to handle the "phase2-client-cert-password"
767 property.
768
769 See the section called “Secret flag types:” for flag values.
770
771 Format: NMSettingSecretFlags (uint32)
772
773 802-1x.phase2-domain-match
774 Constraint for server domain name. If set, this list of FQDNs is
775 used as a match requirement for dNSName element(s) of the
776 certificate presented by the authentication server during the inner
777 "phase 2" authentication. If a matching dNSName is found, this
778 constraint is met. If no dNSName values are present, this
779 constraint is matched against SubjectName CN using the same
780 comparison. Multiple valid FQDNs can be passed as a ";" delimited
781 list.
782
783 Format: string
784
785 802-1x.phase2-domain-suffix-match
786 Constraint for server domain name. If set, this FQDN is used as a
787 suffix match requirement for dNSName element(s) of the certificate
788 presented by the authentication server during the inner "phase 2"
789 authentication. If a matching dNSName is found, this constraint is
790 met. If no dNSName values are present, this constraint is matched
791 against SubjectName CN using same suffix match comparison. Since
792 version 1.24, multiple valid FQDNs can be passed as a ";" delimited
793 list.
794
795 Format: string
796
797 802-1x.phase2-private-key
798 Contains the "phase 2" inner private key when the "phase2-auth" or
799 "phase2-autheap" property is set to "tls".
800
801 Key data is specified using a "scheme"; two are currently
802 supported: blob and path. When using the blob scheme and private
803 keys, this property should be set to the key's encrypted PEM
804 encoded data. When using private keys with the path scheme, this
805 property should be set to the full UTF-8 encoded path of the key,
806 prefixed with the string "file://" and ending with a terminating
807 NUL byte. When using PKCS#12 format private keys and the blob
808 scheme, this property should be set to the PKCS#12 data and the
809 "phase2-private-key-password" property must be set to password used
810 to decrypt the PKCS#12 certificate and key. When using PKCS#12
811 files and the path scheme, this property should be set to the full
812 UTF-8 encoded path of the key, prefixed with the string "file://"
813 and ending with a terminating NUL byte, and as with the blob scheme
814 the "phase2-private-key-password" property must be set to the
815 password used to decode the PKCS#12 private key and certificate.
816
817 Format: byte array
818
819 802-1x.phase2-private-key-password
820 The password used to decrypt the "phase 2" private key specified in
821 the "phase2-private-key" property when the private key either uses
822 the path scheme, or is a PKCS#12 format key.
823
824 Format: string
825
826 802-1x.phase2-private-key-password-flags
827 Flags indicating how to handle the "phase2-private-key-password"
828 property.
829
830 See the section called “Secret flag types:” for flag values.
831
832 Format: NMSettingSecretFlags (uint32)
833
834 802-1x.phase2-subject-match
835 Substring to be matched against the subject of the certificate
836 presented by the authentication server during the inner "phase 2"
837 authentication. When unset, no verification of the authentication
838 server certificate's subject is performed. This property provides
839 little security, if any, and should not be used.
840
841 This property is deprecated since version 1.2. Use
842 "phase2-domain-suffix-match" instead.
843
844 Format: string
845
846 802-1x.pin
847 PIN used for EAP authentication methods.
848
849 Format: string
850
851 802-1x.pin-flags
852 Flags indicating how to handle the "pin" property.
853
854 See the section called “Secret flag types:” for flag values.
855
856 Format: NMSettingSecretFlags (uint32)
857
858 802-1x.private-key
859 Contains the private key when the "eap" property is set to "tls".
860
861 Key data is specified using a "scheme"; two are currently
862 supported: blob and path. When using the blob scheme and private
863 keys, this property should be set to the key's encrypted PEM
864 encoded data. When using private keys with the path scheme, this
865 property should be set to the full UTF-8 encoded path of the key,
866 prefixed with the string "file://" and ending with a terminating
867 NUL byte. When using PKCS#12 format private keys and the blob
868 scheme, this property should be set to the PKCS#12 data and the
869 "private-key-password" property must be set to password used to
870 decrypt the PKCS#12 certificate and key. When using PKCS#12 files
871 and the path scheme, this property should be set to the full UTF-8
872 encoded path of the key, prefixed with the string "file://" and
873 ending with a terminating NUL byte, and as with the blob scheme the
874 "private-key-password" property must be set to the password used to
875 decode the PKCS#12 private key and certificate.
876
877 WARNING: "private-key" is not a "secret" property, and thus
878 unencrypted private key data using the BLOB scheme may be readable
879 by unprivileged users. Private keys should always be encrypted with
880 a private key password to prevent unauthorized access to
881 unencrypted private key data.
882
883 Format: byte array
884
885 802-1x.private-key-password
886 The password used to decrypt the private key specified in the
887 "private-key" property when the private key either uses the path
888 scheme, or if the private key is a PKCS#12 format key.
889
890 Format: string
891
892 802-1x.private-key-password-flags
893 Flags indicating how to handle the "private-key-password" property.
894
895 See the section called “Secret flag types:” for flag values.
896
897 Format: NMSettingSecretFlags (uint32)
898
899 802-1x.subject-match
900 Substring to be matched against the subject of the certificate
901 presented by the authentication server. When unset, no verification
902 of the authentication server certificate's subject is performed.
903 This property provides little security, if any, and should not be
904 used.
905
906 This property is deprecated since version 1.2. Use
907 "phase2-domain-suffix-match" instead.
908
909 Format: string
910
911 802-1x.system-ca-certs
912 When TRUE, overrides the "ca-path" and "phase2-ca-path" properties
913 using the system CA directory specified at configure time with the
914 --system-ca-path switch. The certificates in this directory are
915 added to the verification chain in addition to any certificates
916 specified by the "ca-cert" and "phase2-ca-cert" properties. If the
917 path provided with --system-ca-path is rather a file name (bundle
918 of trusted CA certificates), it overrides "ca-cert" and
919 "phase2-ca-cert" properties instead (sets ca_cert/ca_cert2 options
920 for wpa_supplicant).
921
922 Format: boolean
923
924 adsl setting
925 ADSL Settings.
926
927 Properties:
928
929 adsl.encapsulation
930 Alias: encapsulation
931
932 Encapsulation of ADSL connection. Can be "vcmux" or "llc".
933
934 Format: string
935
936 adsl.password
937 Alias: password
938
939 Password used to authenticate with the ADSL service.
940
941 Format: string
942
943 adsl.password-flags
944 Flags indicating how to handle the "password" property.
945
946 See the section called “Secret flag types:” for flag values.
947
948 Format: NMSettingSecretFlags (uint32)
949
950 adsl.protocol
951 Alias: protocol
952
953 ADSL connection protocol. Can be "pppoa", "pppoe" or "ipoatm".
954
955 Format: string
956
957 adsl.username
958 Alias: username
959
960 Username used to authenticate with the ADSL service.
961
962 Format: string
963
964 adsl.vci
965 VCI of ADSL connection
966
967 Format: uint32
968
969 adsl.vpi
970 VPI of ADSL connection
971
972 Format: uint32
973
974 bluetooth setting
975 Bluetooth Settings.
976
977 Properties:
978
979 bluetooth.bdaddr
980 Alias: addr
981
982 The Bluetooth address of the device.
983
984 Format: byte array
985
986 bluetooth.type
987 Alias: bt-type
988
989 Either "dun" for Dial-Up Networking connections or "panu" for
990 Personal Area Networking connections to devices supporting the NAP
991 profile.
992
993 Format: string
994
995 bond setting
996 Bonding Settings.
997
998 Properties:
999
1000 bond.options
1001 Dictionary of key/value pairs of bonding options. Both keys and
1002 values must be strings. Option names must contain only alphanumeric
1003 characters (ie, [a-zA-Z0-9]).
1004
1005 Format: dict of string to string
1006
1007 bridge setting
1008 Bridging Settings.
1009
1010 Properties:
1011
1012 bridge.ageing-time
1013 Alias: ageing-time
1014
1015 The Ethernet MAC address aging time, in seconds.
1016
1017 Format: uint32
1018
1019 bridge.forward-delay
1020 Alias: forward-delay
1021
1022 The Spanning Tree Protocol (STP) forwarding delay, in seconds.
1023
1024 Format: uint32
1025
1026 bridge.group-address
1027 If specified, The MAC address of the multicast group this bridge
1028 uses for STP.
1029
1030 The address must be a link-local address in standard Ethernet MAC
1031 address format, ie an address of the form 01:80:C2:00:00:0X, with X
1032 in [0, 4..F]. If not specified the default value is
1033 01:80:C2:00:00:00.
1034
1035 Format: byte array
1036
1037 bridge.group-forward-mask
1038 Alias: group-forward-mask
1039
1040 A mask of group addresses to forward. Usually, group addresses in
1041 the range from 01:80:C2:00:00:00 to 01:80:C2:00:00:0F are not
1042 forwarded according to standards. This property is a mask of 16
1043 bits, each corresponding to a group address in that range that must
1044 be forwarded. The mask can't have bits 0, 1 or 2 set because they
1045 are used for STP, MAC pause frames and LACP.
1046
1047 Format: uint32
1048
1049 bridge.hello-time
1050 Alias: hello-time
1051
1052 The Spanning Tree Protocol (STP) hello time, in seconds.
1053
1054 Format: uint32
1055
1056 bridge.mac-address
1057 Alias: mac
1058
1059 If specified, the MAC address of bridge. When creating a new
1060 bridge, this MAC address will be set.
1061
1062 If this field is left unspecified, the
1063 "ethernet.cloned-mac-address" is referred instead to generate the
1064 initial MAC address. Note that setting
1065 "ethernet.cloned-mac-address" anyway overwrites the MAC address of
1066 the bridge later while activating the bridge.
1067
1068 This property is deprecated since version 1.12. Use the
1069 "cloned-mac-address" property instead.
1070
1071 Format: byte array
1072
1073 bridge.max-age
1074 Alias: max-age
1075
1076 The Spanning Tree Protocol (STP) maximum message age, in seconds.
1077
1078 Format: uint32
1079
1080 bridge.multicast-hash-max
1081 Set maximum size of multicast hash table (value must be a power of
1082 2).
1083
1084 Format: uint32
1085
1086 bridge.multicast-last-member-count
1087 Set the number of queries the bridge will send before stopping
1088 forwarding a multicast group after a "leave" message has been
1089 received.
1090
1091 Format: uint32
1092
1093 bridge.multicast-last-member-interval
1094 Set interval (in deciseconds) between queries to find remaining
1095 members of a group, after a "leave" message is received.
1096
1097 Format: uint64
1098
1099 bridge.multicast-membership-interval
1100 Set delay (in deciseconds) after which the bridge will leave a
1101 group, if no membership reports for this group are received.
1102
1103 Format: uint64
1104
1105 bridge.multicast-querier
1106 Enable or disable sending of multicast queries by the bridge. If
1107 not specified the option is disabled.
1108
1109 Format: boolean
1110
1111 bridge.multicast-querier-interval
1112 If no queries are seen after this delay (in deciseconds) has
1113 passed, the bridge will start to send its own queries.
1114
1115 Format: uint64
1116
1117 bridge.multicast-query-interval
1118 Interval (in deciseconds) between queries sent by the bridge after
1119 the end of the startup phase.
1120
1121 Format: uint64
1122
1123 bridge.multicast-query-response-interval
1124 Set the Max Response Time/Max Response Delay (in deciseconds) for
1125 IGMP/MLD queries sent by the bridge.
1126
1127 Format: uint64
1128
1129 bridge.multicast-query-use-ifaddr
1130 If enabled the bridge's own IP address is used as the source
1131 address for IGMP queries otherwise the default of 0.0.0.0 is used.
1132
1133 Format: boolean
1134
1135 bridge.multicast-router
1136 Sets bridge's multicast router. Multicast-snooping must be enabled
1137 for this option to work.
1138
1139 Supported values are: 'auto', 'disabled', 'enabled' to which kernel
1140 assigns the numbers 1, 0, and 2, respectively. If not specified the
1141 default value is 'auto' (1).
1142
1143 Format: string
1144
1145 bridge.multicast-snooping
1146 Alias: multicast-snooping
1147
1148 Controls whether IGMP snooping is enabled for this bridge. Note
1149 that if snooping was automatically disabled due to hash collisions,
1150 the system may refuse to enable the feature until the collisions
1151 are resolved.
1152
1153 Format: boolean
1154
1155 bridge.multicast-startup-query-count
1156 Set the number of IGMP queries to send during startup phase.
1157
1158 Format: uint32
1159
1160 bridge.multicast-startup-query-interval
1161 Sets the time (in deciseconds) between queries sent out at startup
1162 to determine membership information.
1163
1164 Format: uint64
1165
1166 bridge.priority
1167 Alias: priority
1168
1169 Sets the Spanning Tree Protocol (STP) priority for this bridge.
1170 Lower values are "better"; the lowest priority bridge will be
1171 elected the root bridge.
1172
1173 Format: uint32
1174
1175 bridge.stp
1176 Alias: stp
1177
1178 Controls whether Spanning Tree Protocol (STP) is enabled for this
1179 bridge.
1180
1181 Format: boolean
1182
1183 bridge.vlan-default-pvid
1184 The default PVID for the ports of the bridge, that is the VLAN id
1185 assigned to incoming untagged frames.
1186
1187 Format: uint32
1188
1189 bridge.vlan-filtering
1190 Control whether VLAN filtering is enabled on the bridge.
1191
1192 Format: boolean
1193
1194 bridge.vlan-protocol
1195 If specified, the protocol used for VLAN filtering.
1196
1197 Supported values are: '802.1Q', '802.1ad'. If not specified the
1198 default value is '802.1Q'.
1199
1200 Format: string
1201
1202 bridge.vlan-stats-enabled
1203 Controls whether per-VLAN stats accounting is enabled.
1204
1205 Format: boolean
1206
1207 bridge.vlans
1208 Array of bridge VLAN objects. In addition to the VLANs specified
1209 here, the bridge will also have the default-pvid VLAN configured by
1210 the bridge.vlan-default-pvid property.
1211
1212 In nmcli the VLAN list can be specified with the following syntax:
1213
1214 $vid [pvid] [untagged] [, $vid [pvid] [untagged]]...
1215
1216 where $vid is either a single id between 1 and 4094 or a range,
1217 represented as a couple of ids separated by a dash.
1218
1219 Format: array of vardict
1220
1221 bridge-port setting
1222 Bridge Port Settings.
1223
1224 Properties:
1225
1226 bridge-port.hairpin-mode
1227 Alias: hairpin
1228
1229 Enables or disables "hairpin mode" for the port, which allows
1230 frames to be sent back out through the port the frame was received
1231 on.
1232
1233 Format: boolean
1234
1235 bridge-port.path-cost
1236 Alias: path-cost
1237
1238 The Spanning Tree Protocol (STP) port cost for destinations via
1239 this port.
1240
1241 Format: uint32
1242
1243 bridge-port.priority
1244 Alias: priority
1245
1246 The Spanning Tree Protocol (STP) priority of this bridge port.
1247
1248 Format: uint32
1249
1250 bridge-port.vlans
1251 Array of bridge VLAN objects. In addition to the VLANs specified
1252 here, the port will also have the default-pvid VLAN configured on
1253 the bridge by the bridge.vlan-default-pvid property.
1254
1255 In nmcli the VLAN list can be specified with the following syntax:
1256
1257 $vid [pvid] [untagged] [, $vid [pvid] [untagged]]...
1258
1259 where $vid is either a single id between 1 and 4094 or a range,
1260 represented as a couple of ids separated by a dash.
1261
1262 Format: array of vardict
1263
1264 cdma setting
1265 CDMA-based Mobile Broadband Settings.
1266
1267 Properties:
1268
1269 cdma.mtu
1270 If non-zero, only transmit packets of the specified size or
1271 smaller, breaking larger packets up into multiple frames.
1272
1273 Format: uint32
1274
1275 cdma.number
1276 The number to dial to establish the connection to the CDMA-based
1277 mobile broadband network, if any. If not specified, the default
1278 number (#777) is used when required.
1279
1280 Format: string
1281
1282 cdma.password
1283 Alias: password
1284
1285 The password used to authenticate with the network, if required.
1286 Many providers do not require a password, or accept any password.
1287 But if a password is required, it is specified here.
1288
1289 Format: string
1290
1291 cdma.password-flags
1292 Flags indicating how to handle the "password" property.
1293
1294 See the section called “Secret flag types:” for flag values.
1295
1296 Format: NMSettingSecretFlags (uint32)
1297
1298 cdma.username
1299 Alias: user
1300
1301 The username used to authenticate with the network, if required.
1302 Many providers do not require a username, or accept any username.
1303 But if a username is required, it is specified here.
1304
1305 Format: string
1306
1307 dcb setting
1308 Data Center Bridging Settings.
1309
1310 Properties:
1311
1312 dcb.app-fcoe-flags
1313 Specifies the NMSettingDcbFlags for the DCB FCoE application. Flags
1314 may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1315 NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1316 NM_SETTING_DCB_FLAG_WILLING (0x4).
1317
1318 Format: NMSettingDcbFlags (uint32)
1319
1320 dcb.app-fcoe-mode
1321 The FCoE controller mode; either "fabric" or "vn2vn".
1322
1323 Since 1.34, NULL is the default and means "fabric". Before 1.34,
1324 NULL was rejected as invalid and the default was "fabric".
1325
1326 Format: string
1327
1328 dcb.app-fcoe-priority
1329 The highest User Priority (0 - 7) which FCoE frames should use, or
1330 -1 for default priority. Only used when the "app-fcoe-flags"
1331 property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1332
1333 Format: int32
1334
1335 dcb.app-fip-flags
1336 Specifies the NMSettingDcbFlags for the DCB FIP application. Flags
1337 may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1338 NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1339 NM_SETTING_DCB_FLAG_WILLING (0x4).
1340
1341 Format: NMSettingDcbFlags (uint32)
1342
1343 dcb.app-fip-priority
1344 The highest User Priority (0 - 7) which FIP frames should use, or
1345 -1 for default priority. Only used when the "app-fip-flags"
1346 property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1347
1348 Format: int32
1349
1350 dcb.app-iscsi-flags
1351 Specifies the NMSettingDcbFlags for the DCB iSCSI application.
1352 Flags may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1353 NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1354 NM_SETTING_DCB_FLAG_WILLING (0x4).
1355
1356 Format: NMSettingDcbFlags (uint32)
1357
1358 dcb.app-iscsi-priority
1359 The highest User Priority (0 - 7) which iSCSI frames should use, or
1360 -1 for default priority. Only used when the "app-iscsi-flags"
1361 property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1362
1363 Format: int32
1364
1365 dcb.priority-bandwidth
1366 An array of 8 uint values, where the array index corresponds to the
1367 User Priority (0 - 7) and the value indicates the percentage of
1368 bandwidth of the priority's assigned group that the priority may
1369 use. The sum of all percentages for priorities which belong to the
1370 same group must total 100 percents.
1371
1372 Format: array of uint32
1373
1374 dcb.priority-flow-control
1375 An array of 8 boolean values, where the array index corresponds to
1376 the User Priority (0 - 7) and the value indicates whether or not
1377 the corresponding priority should transmit priority pause.
1378
1379 Format: array of uint32
1380
1381 dcb.priority-flow-control-flags
1382 Specifies the NMSettingDcbFlags for DCB Priority Flow Control
1383 (PFC). Flags may be any combination of NM_SETTING_DCB_FLAG_ENABLE
1384 (0x1), NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1385 NM_SETTING_DCB_FLAG_WILLING (0x4).
1386
1387 Format: NMSettingDcbFlags (uint32)
1388
1389 dcb.priority-group-bandwidth
1390 An array of 8 uint values, where the array index corresponds to the
1391 Priority Group ID (0 - 7) and the value indicates the percentage of
1392 link bandwidth allocated to that group. Allowed values are 0 - 100,
1393 and the sum of all values must total 100 percents.
1394
1395 Format: array of uint32
1396
1397 dcb.priority-group-flags
1398 Specifies the NMSettingDcbFlags for DCB Priority Groups. Flags may
1399 be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1400 NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1401 NM_SETTING_DCB_FLAG_WILLING (0x4).
1402
1403 Format: NMSettingDcbFlags (uint32)
1404
1405 dcb.priority-group-id
1406 An array of 8 uint values, where the array index corresponds to the
1407 User Priority (0 - 7) and the value indicates the Priority Group
1408 ID. Allowed Priority Group ID values are 0 - 7 or 15 for the
1409 unrestricted group.
1410
1411 Format: array of uint32
1412
1413 dcb.priority-strict-bandwidth
1414 An array of 8 boolean values, where the array index corresponds to
1415 the User Priority (0 - 7) and the value indicates whether or not
1416 the priority may use all of the bandwidth allocated to its assigned
1417 group.
1418
1419 Format: array of uint32
1420
1421 dcb.priority-traffic-class
1422 An array of 8 uint values, where the array index corresponds to the
1423 User Priority (0 - 7) and the value indicates the traffic class (0
1424 - 7) to which the priority is mapped.
1425
1426 Format: array of uint32
1427
1428 ethtool setting
1429 Ethtool Ethernet Settings.
1430
1431 Properties:
1432
1433 ethtool.coalesce-adaptive-rx
1434
1435 ethtool.coalesce-adaptive-tx
1436
1437 ethtool.coalesce-pkt-rate-high
1438
1439 ethtool.coalesce-pkt-rate-low
1440
1441 ethtool.coalesce-rx-frames
1442
1443 ethtool.coalesce-rx-frames-high
1444
1445 ethtool.coalesce-rx-frames-irq
1446
1447 ethtool.coalesce-rx-frames-low
1448
1449 ethtool.coalesce-rx-usecs
1450
1451 ethtool.coalesce-rx-usecs-high
1452
1453 ethtool.coalesce-rx-usecs-irq
1454
1455 ethtool.coalesce-rx-usecs-low
1456
1457 ethtool.coalesce-sample-interval
1458
1459 ethtool.coalesce-stats-block-usecs
1460
1461 ethtool.coalesce-tx-frames
1462
1463 ethtool.coalesce-tx-frames-high
1464
1465 ethtool.coalesce-tx-frames-irq
1466
1467 ethtool.coalesce-tx-frames-low
1468
1469 ethtool.coalesce-tx-usecs
1470
1471 ethtool.coalesce-tx-usecs-high
1472
1473 ethtool.coalesce-tx-usecs-irq
1474
1475 ethtool.coalesce-tx-usecs-low
1476
1477 ethtool.feature-esp-hw-offload
1478
1479 ethtool.feature-esp-tx-csum-hw-offload
1480
1481 ethtool.feature-fcoe-mtu
1482
1483 ethtool.feature-gro
1484
1485 ethtool.feature-gso
1486
1487 ethtool.feature-highdma
1488
1489 ethtool.feature-hw-tc-offload
1490
1491 ethtool.feature-l2-fwd-offload
1492
1493 ethtool.feature-loopback
1494
1495 ethtool.feature-lro
1496
1497 ethtool.feature-macsec-hw-offload
1498
1499 ethtool.feature-ntuple
1500
1501 ethtool.feature-rx
1502
1503 ethtool.feature-rx-all
1504
1505 ethtool.feature-rx-fcs
1506
1507 ethtool.feature-rx-gro-hw
1508
1509 ethtool.feature-rx-gro-list
1510
1511 ethtool.feature-rx-udp-gro-forwarding
1512
1513 ethtool.feature-rx-udp_tunnel-port-offload
1514
1515 ethtool.feature-rx-vlan-filter
1516
1517 ethtool.feature-rx-vlan-stag-filter
1518
1519 ethtool.feature-rx-vlan-stag-hw-parse
1520
1521 ethtool.feature-rxhash
1522
1523 ethtool.feature-rxvlan
1524
1525 ethtool.feature-sg
1526
1527 ethtool.feature-tls-hw-record
1528
1529 ethtool.feature-tls-hw-rx-offload
1530
1531 ethtool.feature-tls-hw-tx-offload
1532
1533 ethtool.feature-tso
1534
1535 ethtool.feature-tx
1536
1537 ethtool.feature-tx-checksum-fcoe-crc
1538
1539 ethtool.feature-tx-checksum-ip-generic
1540
1541 ethtool.feature-tx-checksum-ipv4
1542
1543 ethtool.feature-tx-checksum-ipv6
1544
1545 ethtool.feature-tx-checksum-sctp
1546
1547 ethtool.feature-tx-esp-segmentation
1548
1549 ethtool.feature-tx-fcoe-segmentation
1550
1551 ethtool.feature-tx-gre-csum-segmentation
1552
1553 ethtool.feature-tx-gre-segmentation
1554
1555 ethtool.feature-tx-gso-list
1556
1557 ethtool.feature-tx-gso-partial
1558
1559 ethtool.feature-tx-gso-robust
1560
1561 ethtool.feature-tx-ipxip4-segmentation
1562
1563 ethtool.feature-tx-ipxip6-segmentation
1564
1565 ethtool.feature-tx-nocache-copy
1566
1567 ethtool.feature-tx-scatter-gather
1568
1569 ethtool.feature-tx-scatter-gather-fraglist
1570
1571 ethtool.feature-tx-sctp-segmentation
1572
1573 ethtool.feature-tx-tcp-ecn-segmentation
1574
1575 ethtool.feature-tx-tcp-mangleid-segmentation
1576
1577 ethtool.feature-tx-tcp-segmentation
1578
1579 ethtool.feature-tx-tcp6-segmentation
1580
1581 ethtool.feature-tx-tunnel-remcsum-segmentation
1582
1583 ethtool.feature-tx-udp-segmentation
1584
1585 ethtool.feature-tx-udp_tnl-csum-segmentation
1586
1587 ethtool.feature-tx-udp_tnl-segmentation
1588
1589 ethtool.feature-tx-vlan-stag-hw-insert
1590
1591 ethtool.feature-txvlan
1592
1593 ethtool.pause-autoneg
1594
1595 ethtool.pause-rx
1596
1597 ethtool.pause-tx
1598
1599 ethtool.ring-rx
1600
1601 ethtool.ring-rx-jumbo
1602
1603 ethtool.ring-rx-mini
1604
1605 ethtool.ring-tx
1606
1607 gsm setting
1608 GSM-based Mobile Broadband Settings.
1609
1610 Properties:
1611
1612 gsm.apn
1613 Alias: apn
1614
1615 The GPRS Access Point Name specifying the APN used when
1616 establishing a data session with the GSM-based network. The APN
1617 often determines how the user will be billed for their network
1618 usage and whether the user has access to the Internet or just a
1619 provider-specific walled-garden, so it is important to use the
1620 correct APN for the user's mobile broadband plan. The APN may only
1621 be composed of the characters a-z, 0-9, ., and - per GSM 03.60
1622 Section 14.9.
1623
1624 Format: string
1625
1626 gsm.auto-config
1627 When TRUE, the settings such as APN, username, or password will
1628 default to values that match the network the modem will register to
1629 in the Mobile Broadband Provider database.
1630
1631 Format: boolean
1632
1633 gsm.device-id
1634 The device unique identifier (as given by the WWAN management
1635 service) which this connection applies to. If given, the connection
1636 will only apply to the specified device.
1637
1638 Format: string
1639
1640 gsm.home-only
1641 When TRUE, only connections to the home network will be allowed.
1642 Connections to roaming networks will not be made.
1643
1644 Format: boolean
1645
1646 gsm.initial-eps-bearer-apn
1647 For LTE modems, this sets the APN for the initial EPS bearer that
1648 is set up when attaching to the network. Setting this parameter
1649 implies initial-eps-bearer-configure to be TRUE.
1650
1651 Format: string
1652
1653 gsm.initial-eps-bearer-configure
1654 For LTE modems, this setting determines whether the initial EPS
1655 bearer shall be configured when bringing up the connection. It is
1656 inferred TRUE if initial-eps-bearer-apn is set.
1657
1658 Format: boolean
1659
1660 gsm.mtu
1661 If non-zero, only transmit packets of the specified size or
1662 smaller, breaking larger packets up into multiple frames.
1663
1664 Format: uint32
1665
1666 gsm.network-id
1667 The Network ID (GSM LAI format, ie MCC-MNC) to force specific
1668 network registration. If the Network ID is specified,
1669 NetworkManager will attempt to force the device to register only on
1670 the specified network. This can be used to ensure that the device
1671 does not roam when direct roaming control of the device is not
1672 otherwise possible.
1673
1674 Format: string
1675
1676 gsm.number
1677 Legacy setting that used to help establishing PPP data sessions for
1678 GSM-based modems.
1679
1680 This property is deprecated since version 1.16. User-provided
1681 values for this setting are no longer used.
1682
1683 Format: string
1684
1685 gsm.password
1686 Alias: password
1687
1688 The password used to authenticate with the network, if required.
1689 Many providers do not require a password, or accept any password.
1690 But if a password is required, it is specified here.
1691
1692 Format: string
1693
1694 gsm.password-flags
1695 Flags indicating how to handle the "password" property.
1696
1697 See the section called “Secret flag types:” for flag values.
1698
1699 Format: NMSettingSecretFlags (uint32)
1700
1701 gsm.pin
1702 If the SIM is locked with a PIN it must be unlocked before any
1703 other operations are requested. Specify the PIN here to allow
1704 operation of the device.
1705
1706 Format: string
1707
1708 gsm.pin-flags
1709 Flags indicating how to handle the "pin" property.
1710
1711 See the section called “Secret flag types:” for flag values.
1712
1713 Format: NMSettingSecretFlags (uint32)
1714
1715 gsm.sim-id
1716 The SIM card unique identifier (as given by the WWAN management
1717 service) which this connection applies to. If given, the connection
1718 will apply to any device also allowed by "device-id" which contains
1719 a SIM card matching the given identifier.
1720
1721 Format: string
1722
1723 gsm.sim-operator-id
1724 A MCC/MNC string like "310260" or "21601" identifying the specific
1725 mobile network operator which this connection applies to. If given,
1726 the connection will apply to any device also allowed by "device-id"
1727 and "sim-id" which contains a SIM card provisioned by the given
1728 operator.
1729
1730 Format: string
1731
1732 gsm.username
1733 Alias: user
1734
1735 The username used to authenticate with the network, if required.
1736 Many providers do not require a username, or accept any username.
1737 But if a username is required, it is specified here.
1738
1739 Format: string
1740
1741 infiniband setting
1742 Infiniband Settings.
1743
1744 Properties:
1745
1746 infiniband.mac-address
1747 Alias: mac
1748
1749 If specified, this connection will only apply to the IPoIB device
1750 whose permanent MAC address matches. This property does not change
1751 the MAC address of the device (i.e. MAC spoofing).
1752
1753 Format: byte array
1754
1755 infiniband.mtu
1756 Alias: mtu
1757
1758 If non-zero, only transmit packets of the specified size or
1759 smaller, breaking larger packets up into multiple frames.
1760
1761 Format: uint32
1762
1763 infiniband.p-key
1764 Alias: p-key
1765
1766 The InfiniBand p-key to use for this device. A value of -1 means to
1767 use the default p-key (aka "the p-key at index 0"). Otherwise, it
1768 is a 16-bit unsigned integer, whose high bit 0x8000 is set if it is
1769 a "full membership" p-key. The values 0 and 0x8000 are not allowed.
1770
1771 With the p-key set, the interface name is always "$parent.$p_key".
1772 Setting "connection.interface-name" to another name is not
1773 supported.
1774
1775 Note that kernel will internally always set the full membership
1776 bit, although the interface name does not reflect that. Usually the
1777 user would want to configure a full membership p-key with 0x8000
1778 flag set.
1779
1780 Format: int32
1781
1782 infiniband.parent
1783 Alias: parent
1784
1785 The interface name of the parent device of this device. Normally
1786 NULL, but if the "p_key" property is set, then you must specify the
1787 base device by setting either this property or "mac-address".
1788
1789 Format: string
1790
1791 infiniband.transport-mode
1792 Alias: transport-mode
1793
1794 The IP-over-InfiniBand transport mode. Either "datagram" or
1795 "connected".
1796
1797 Format: string
1798
1799 ipv4 setting
1800 IPv4 Settings.
1801
1802 Properties:
1803
1804 ipv4.addresses
1805 Alias: ip4
1806
1807 A list of IPv4 addresses and their prefix length. Multiple
1808 addresses can be separated by comma. For example "192.168.1.5/24,
1809 10.1.0.5/24". The addresses are listed in decreasing priority,
1810 meaning the first address will be the primary address.
1811
1812 Format: a comma separated list of addresses
1813
1814 ipv4.auto-route-ext-gw
1815 VPN connections will default to add the route automatically unless
1816 this setting is set to FALSE.
1817
1818 For other connection types, adding such an automatic route is
1819 currently not supported and setting this to TRUE has no effect.
1820
1821 Format: NMTernary (int32)
1822
1823 ipv4.dad-timeout
1824 Timeout in milliseconds used to check for the presence of duplicate
1825 IP addresses on the network. If an address conflict is detected,
1826 the activation will fail. A zero value means that no duplicate
1827 address detection is performed, -1 means the default value (either
1828 configuration ipvx.dad-timeout override or zero). A value greater
1829 than zero is a timeout in milliseconds.
1830
1831 The property is currently implemented only for IPv4.
1832
1833 Format: int32
1834
1835 ipv4.dhcp-client-id
1836 A string sent to the DHCP server to identify the local machine
1837 which the DHCP server may use to customize the DHCP lease and
1838 options. When the property is a hex string ('aa:bb:cc') it is
1839 interpreted as a binary client ID, in which case the first byte is
1840 assumed to be the 'type' field as per RFC 2132 section 9.14 and the
1841 remaining bytes may be an hardware address (e.g.
1842 '01:xx:xx:xx:xx:xx:xx' where 1 is the Ethernet ARP type and the
1843 rest is a MAC address). If the property is not a hex string it is
1844 considered as a non-hardware-address client ID and the 'type' field
1845 is set to 0.
1846
1847 The special values "mac" and "perm-mac" are supported, which use
1848 the current or permanent MAC address of the device to generate a
1849 client identifier with type ethernet (01). Currently, these options
1850 only work for ethernet type of links.
1851
1852 The special value "ipv6-duid" uses the DUID from "ipv6.dhcp-duid"
1853 property as an RFC4361-compliant client identifier. As IAID it uses
1854 "ipv4.dhcp-iaid" and falls back to "ipv6.dhcp-iaid" if unset.
1855
1856 The special value "duid" generates a RFC4361-compliant client
1857 identifier based on "ipv4.dhcp-iaid" and uses a DUID generated by
1858 hashing /etc/machine-id.
1859
1860 The special value "stable" is supported to generate a type 0 client
1861 identifier based on the stable-id (see connection.stable-id) and a
1862 per-host key. If you set the stable-id, you may want to include the
1863 "${DEVICE}" or "${MAC}" specifier to get a per-device key.
1864
1865 If unset, a globally configured default is used. If still unset,
1866 the default depends on the DHCP plugin.
1867
1868 Format: string
1869
1870 ipv4.dhcp-fqdn
1871 If the "dhcp-send-hostname" property is TRUE, then the specified
1872 FQDN will be sent to the DHCP server when acquiring a lease. This
1873 property and "dhcp-hostname" are mutually exclusive and cannot be
1874 set at the same time.
1875
1876 Format: string
1877
1878 ipv4.dhcp-hostname
1879 If the "dhcp-send-hostname" property is TRUE, then the specified
1880 name will be sent to the DHCP server when acquiring a lease. This
1881 property and "dhcp-fqdn" are mutually exclusive and cannot be set
1882 at the same time.
1883
1884 Format: string
1885
1886 ipv4.dhcp-hostname-flags
1887 Flags for the DHCP hostname and FQDN.
1888
1889 Currently, this property only includes flags to control the FQDN
1890 flags set in the DHCP FQDN option. Supported FQDN flags are
1891 NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
1892 NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) and
1893 NM_DHCP_HOSTNAME_FLAG_FQDN_NO_UPDATE (0x4). When no FQDN flag is
1894 set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is set, the
1895 DHCP FQDN option will contain no flag. Otherwise, if no FQDN flag
1896 is set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is not set,
1897 the standard FQDN flags are set in the request:
1898 NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
1899 NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) for IPv4 and
1900 NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1) for IPv6.
1901
1902 When this property is set to the default value
1903 NM_DHCP_HOSTNAME_FLAG_NONE (0x0), a global default is looked up in
1904 NetworkManager configuration. If that value is unset or also
1905 NM_DHCP_HOSTNAME_FLAG_NONE (0x0), then the standard FQDN flags
1906 described above are sent in the DHCP requests.
1907
1908 Format: uint32
1909
1910 ipv4.dhcp-iaid
1911 A string containing the "Identity Association Identifier" (IAID)
1912 used by the DHCP client. The string can be a 32-bit number (either
1913 decimal, hexadecimal or as colon separated hexadecimal numbers).
1914 Alternatively it can be set to the special values "mac",
1915 "perm-mac", "ifname" or "stable". When set to "mac" (or
1916 "perm-mac"), the last 4 bytes of the current (or permanent) MAC
1917 address are used as IAID. When set to "ifname", the IAID is
1918 computed by hashing the interface name. The special value "stable"
1919 can be used to generate an IAID based on the stable-id (see
1920 connection.stable-id), a per-host key and the interface name. When
1921 the property is unset, the value from global configuration is used;
1922 if no global default is set then the IAID is assumed to be
1923 "ifname".
1924
1925 For DHCPv4, the IAID is only used with "ipv4.dhcp-client-id" values
1926 "duid" and "ipv6-duid" to generate the client-id.
1927
1928 For DHCPv6, note that at the moment this property is only supported
1929 by the "internal" DHCPv6 plugin. The "dhclient" DHCPv6 plugin
1930 always derives the IAID from the MAC address.
1931
1932 The actually used DHCPv6 IAID for a currently activated interface
1933 is exposed in the lease information of the device.
1934
1935 Format: string
1936
1937 ipv4.dhcp-reject-servers
1938 Array of servers from which DHCP offers must be rejected. This
1939 property is useful to avoid getting a lease from misconfigured or
1940 rogue servers.
1941
1942 For DHCPv4, each element must be an IPv4 address, optionally
1943 followed by a slash and a prefix length (e.g. "192.168.122.0/24").
1944
1945 This property is currently not implemented for DHCPv6.
1946
1947 Format: array of string
1948
1949 ipv4.dhcp-send-hostname
1950 If TRUE, a hostname is sent to the DHCP server when acquiring a
1951 lease. Some DHCP servers use this hostname to update DNS databases,
1952 essentially providing a static hostname for the computer. If the
1953 "dhcp-hostname" property is NULL and this property is TRUE, the
1954 current persistent hostname of the computer is sent.
1955
1956 Format: boolean
1957
1958 ipv4.dhcp-timeout
1959 A timeout for a DHCP transaction in seconds. If zero (the default),
1960 a globally configured default is used. If still unspecified, a
1961 device specific timeout is used (usually 45 seconds).
1962
1963 Set to 2147483647 (MAXINT32) for infinity.
1964
1965 Format: int32
1966
1967 ipv4.dhcp-vendor-class-identifier
1968 The Vendor Class Identifier DHCP option (60). Special characters in
1969 the data string may be escaped using C-style escapes, nevertheless
1970 this property cannot contain nul bytes. If the per-profile value is
1971 unspecified (the default), a global connection default gets
1972 consulted. If still unspecified, the DHCP option is not sent to the
1973 server.
1974
1975 Format: string
1976
1977 ipv4.dns
1978 Array of IP addresses of DNS servers.
1979
1980 For DoT (DNS over TLS), the SNI server name can be specified by
1981 appending "#example.com" to the IP address of the DNS server. This
1982 currently only has effect when using systemd-resolved.
1983
1984 Format: array of uint32
1985
1986 ipv4.dns-options
1987 DNS options for /etc/resolv.conf as described in resolv.conf(5)
1988 manual.
1989
1990 The currently supported options are "attempts", "debug", "edns0",
1991 "ndots", "no-aaaa", "no-check-names", "no-reload", "no-tld-query",
1992 "rotate", "single-request", "single-request-reopen", "timeout",
1993 "trust-ad", "use-vc". See the resolv.conf(5) manual.
1994
1995 Note that there is a distinction between an unset (default) list
1996 and an empty list. In nmcli, to unset the list set the value to "".
1997 To set an empty list, set it to " ". Currently, an unset list has
1998 the same meaning as an empty list. That might change in the future.
1999
2000 The "trust-ad" setting is only honored if the profile contributes
2001 name servers to resolv.conf, and if all contributing profiles have
2002 "trust-ad" enabled.
2003
2004 When using a caching DNS plugin (dnsmasq or systemd-resolved in
2005 NetworkManager.conf) then "edns0" and "trust-ad" are automatically
2006 added.
2007
2008 The valid "ipv4.dns-options" and "ipv6.dns-options" get merged
2009 together.
2010
2011 Format: a comma separated list of DNS options
2012
2013 ipv4.dns-priority
2014 DNS servers priority.
2015
2016 The relative priority for DNS servers specified by this setting. A
2017 lower numerical value is better (higher priority).
2018
2019 Negative values have the special effect of excluding other
2020 configurations with a greater numerical priority value; so in
2021 presence of at least one negative priority, only DNS servers from
2022 connections with the lowest priority value will be used. To avoid
2023 all DNS leaks, set the priority of the profile that should be used
2024 to the most negative value of all active connections profiles.
2025
2026 Zero selects a globally configured default value. If the latter is
2027 missing or zero too, it defaults to 50 for VPNs (including
2028 WireGuard) and 100 for other connections.
2029
2030 Note that the priority is to order DNS settings for multiple active
2031 connections. It does not disambiguate multiple DNS servers within
2032 the same connection profile.
2033
2034 When multiple devices have configurations with the same priority,
2035 VPNs will be considered first, then devices with the best (lowest
2036 metric) default route and then all other devices.
2037
2038 When using dns=default, servers with higher priority will be on top
2039 of resolv.conf. To prioritize a given server over another one
2040 within the same connection, just specify them in the desired order.
2041 Note that commonly the resolver tries name servers in
2042 /etc/resolv.conf in the order listed, proceeding with the next
2043 server in the list on failure. See for example the "rotate" option
2044 of the dns-options setting. If there are any negative DNS
2045 priorities, then only name servers from the devices with that
2046 lowest priority will be considered.
2047
2048 When using a DNS resolver that supports Conditional Forwarding or
2049 Split DNS (with dns=dnsmasq or dns=systemd-resolved settings), each
2050 connection is used to query domains in its search list. The search
2051 domains determine which name servers to ask, and the DNS priority
2052 is used to prioritize name servers based on the domain. Queries for
2053 domains not present in any search list are routed through
2054 connections having the '~.' special wildcard domain, which is added
2055 automatically to connections with the default route (or can be
2056 added manually). When multiple connections specify the same domain,
2057 the one with the best priority (lowest numerical value) wins. If a
2058 sub domain is configured on another interface it will be accepted
2059 regardless the priority, unless parent domain on the other
2060 interface has a negative priority, which causes the sub domain to
2061 be shadowed. With Split DNS one can avoid undesired DNS leaks by
2062 properly configuring DNS priorities and the search domains, so that
2063 only name servers of the desired interface are configured.
2064
2065 Format: int32
2066
2067 ipv4.dns-search
2068 List of DNS search domains. Domains starting with a tilde ('~') are
2069 considered 'routing' domains and are used only to decide the
2070 interface over which a query must be forwarded; they are not used
2071 to complete unqualified host names.
2072
2073 When using a DNS plugin that supports Conditional Forwarding or
2074 Split DNS, then the search domains specify which name servers to
2075 query. This makes the behavior different from running with plain
2076 /etc/resolv.conf. For more information see also the dns-priority
2077 setting.
2078
2079 When set on a profile that also enabled DHCP, the DNS search list
2080 received automatically (option 119 for DHCPv4 and option 24 for
2081 DHCPv6) gets merged with the manual list. This can be prevented by
2082 setting "ignore-auto-dns". Note that if no DNS searches are
2083 configured, the fallback will be derived from the domain from DHCP
2084 (option 15).
2085
2086 Format: array of string
2087
2088 ipv4.gateway
2089 Alias: gw4
2090
2091 The gateway associated with this configuration. This is only
2092 meaningful if "addresses" is also set.
2093
2094 Setting the gateway causes NetworkManager to configure a standard
2095 default route with the gateway as next hop. This is ignored if
2096 "never-default" is set. An alternative is to configure the default
2097 route explicitly with a manual route and /0 as prefix length.
2098
2099 Note that the gateway usually conflicts with routing that
2100 NetworkManager configures for WireGuard interfaces, so usually it
2101 should not be set in that case. See "ip4-auto-default-route".
2102
2103 Format: string
2104
2105 ipv4.ignore-auto-dns
2106 When "method" is set to "auto" and this property to TRUE,
2107 automatically configured name servers and search domains are
2108 ignored and only name servers and search domains specified in the
2109 "dns" and "dns-search" properties, if any, are used.
2110
2111 Format: boolean
2112
2113 ipv4.ignore-auto-routes
2114 When "method" is set to "auto" and this property to TRUE,
2115 automatically configured routes are ignored and only routes
2116 specified in the "routes" property, if any, are used.
2117
2118 Format: boolean
2119
2120 ipv4.link-local
2121 Enable and disable the IPv4 link-local configuration independently
2122 of the ipv4.method configuration. This allows a link-local address
2123 (169.254.x.y/16) to be obtained in addition to other addresses,
2124 such as those manually configured or obtained from a DHCP server.
2125
2126 When set to "auto", the value is dependent on "ipv4.method". When
2127 set to "default", it honors the global connection default, before
2128 falling back to "auto". Note that if "ipv4.method" is "disabled",
2129 then link local addressing is always disabled too. The default is
2130 "default".
2131
2132 Format: int32
2133
2134 ipv4.may-fail
2135 If TRUE, allow overall network configuration to proceed even if the
2136 configuration specified by this property times out. Note that at
2137 least one IP configuration must succeed or overall network
2138 configuration will still fail. For example, in IPv6-only networks,
2139 setting this property to TRUE on the NMSettingIP4Config allows the
2140 overall network configuration to succeed if IPv4 configuration
2141 fails but IPv6 configuration completes successfully.
2142
2143 Format: boolean
2144
2145 ipv4.method
2146 Sets the IPv4 connection method. You can set one of the following
2147 values:
2148
2149 • "auto" - Enables automatic IPv4 address assignment from DHCP,
2150 PPP, or similar services.
2151
2152 • "manual" - Enables the configuration of static IPv4 addresses
2153 on the interface. Note that you must set at least one IP
2154 address and subnet mask in the "ipv4.addresses" property.
2155
2156 • "disabled" - Disables the IPv4 protocol in this connection
2157 profile.
2158
2159 • "shared" - Provides network access to other computers. If you
2160 do not specify an IP address and subnet mask in
2161 "ipv4.addresses", NetworkManager assigns 10.42.x.1/24 to the
2162 interface. Additionally, NetworkManager starts a DHCP server
2163 and DNS forwarder. Hosts that connect to this interface will
2164 then receive an IP address from the configured range, and
2165 NetworkManager configures NAT to map client addresses to the
2166 one of the current default network connection.
2167
2168 • "link-local" - Enables link-local addresses according to RFC
2169 3927. NetworkManager assigns a random link-local address from
2170 the 169.254.0.0/16 subnet to the interface.
2171
2172 Format: string
2173
2174 ipv4.never-default
2175 If TRUE, this connection will never be the default connection for
2176 this IP type, meaning it will never be assigned the default route
2177 by NetworkManager.
2178
2179 Format: boolean
2180
2181 ipv4.replace-local-rule
2182 Connections will default to keep the autogenerated priority 0 local
2183 rule unless this setting is set to TRUE.
2184
2185 Format: NMTernary (int32)
2186
2187 ipv4.required-timeout
2188 The minimum time interval in milliseconds for which dynamic IP
2189 configuration should be tried before the connection succeeds.
2190
2191 This property is useful for example if both IPv4 and IPv6 are
2192 enabled and are allowed to fail. Normally the connection succeeds
2193 as soon as one of the two address families completes; by setting a
2194 required timeout for e.g. IPv4, one can ensure that even if IP6
2195 succeeds earlier than IPv4, NetworkManager waits some time for IPv4
2196 before the connection becomes active.
2197
2198 Note that if "may-fail" is FALSE for the same address family, this
2199 property has no effect as NetworkManager needs to wait for the full
2200 DHCP timeout.
2201
2202 A zero value means that no required timeout is present, -1 means
2203 the default value (either configuration ipvx.required-timeout
2204 override or zero).
2205
2206 Format: int32
2207
2208 ipv4.route-metric
2209 The default metric for routes that don't explicitly specify a
2210 metric. The default value -1 means that the metric is chosen
2211 automatically based on the device type. The metric applies to
2212 dynamic routes, manual (static) routes that don't have an explicit
2213 metric setting, address prefix routes, and the default route. Note
2214 that for IPv6, the kernel accepts zero (0) but coerces it to 1024
2215 (user default). Hence, setting this property to zero effectively
2216 mean setting it to 1024. For IPv4, zero is a regular value for the
2217 metric.
2218
2219 Format: int64
2220
2221 ipv4.route-table
2222 Enable policy routing (source routing) and set the routing table
2223 used when adding routes.
2224
2225 This affects all routes, including device-routes, IPv4LL, DHCP,
2226 SLAAC, default-routes and static routes. But note that static
2227 routes can individually overwrite the setting by explicitly
2228 specifying a non-zero routing table.
2229
2230 If the table setting is left at zero, it is eligible to be
2231 overwritten via global configuration. If the property is zero even
2232 after applying the global configuration value, policy routing is
2233 disabled for the address family of this connection.
2234
2235 Policy routing disabled means that NetworkManager will add all
2236 routes to the main table (except static routes that explicitly
2237 configure a different table). Additionally, NetworkManager will not
2238 delete any extraneous routes from tables except the main table.
2239 This is to preserve backward compatibility for users who manage
2240 routing tables outside of NetworkManager.
2241
2242 Format: uint32
2243
2244 ipv4.routes
2245 A list of IPv4 destination addresses, prefix length, optional IPv4
2246 next hop addresses, optional route metric, optional attribute. The
2247 valid syntax is: "ip[/prefix] [next-hop] [metric]
2248 [attribute=val]...[,ip[/prefix]...]". For example "192.0.2.0/24
2249 10.1.1.1 77, 198.51.100.0/24".
2250
2251 Various attributes are supported:
2252
2253 • "advmss" - an unsigned 32 bit integer.
2254
2255 • "cwnd" - an unsigned 32 bit integer.
2256
2257 • "initcwnd" - an unsigned 32 bit integer.
2258
2259 • "initrwnd" - an unsigned 32 bit integer.
2260
2261 • "lock-advmss" - a boolean value.
2262
2263 • "lock-cwnd" - a boolean value.
2264
2265 • "lock-initcwnd" - a boolean value.
2266
2267 • "lock-initrwnd" - a boolean value.
2268
2269 • "lock-mtu" - a boolean value.
2270
2271 • "lock-window" - a boolean value.
2272
2273 • "mtu" - an unsigned 32 bit integer.
2274
2275 • "onlink" - a boolean value. The onlink flag is ignored for IPv4
2276 routes without a gateway. That also means, with a positive
2277 "weight" the route cannot merge with ECMP routes which are
2278 onlink and have a gateway.
2279
2280 • "quickack" - a boolean value.
2281
2282 • "rto_min" - an unsigned 32 bit integer. The value is in
2283 milliseconds.
2284
2285 • "scope" - an unsigned 8 bit integer. IPv4 only.
2286
2287 • "src" - an IPv4 address.
2288
2289 • "table" - an unsigned 32 bit integer. The default depends on
2290 ipv4.route-table.
2291
2292 • "tos" - an unsigned 8 bit integer. IPv4 only.
2293
2294 • "type" - one of unicast, local, blackhole, unreachable,
2295 prohibit, throw. The default is unicast.
2296
2297 • "weight" - an unsigned 32 bit integer ranging from 0 to 256. A
2298 non-zero weight indicates that the IPv4 route is an ECMP IPv4
2299 route. NetworkManager will automatically merge compatible ECMP
2300 routes into multi-hop routes. Setting to zero or omitting the
2301 attribute configures single hop routes that won't get merged.
2302 If the route finds no merge partner, it is configured as single
2303 hop route.
2304
2305 Note that in NetworkManager, currently all nexthops of a ECMP
2306 route must share the same "onlink" flag in order to be
2307 mergable.
2308
2309 • "window" - an unsigned 32 bit integer.
2310
2311 For details see also `man ip-route`.
2312
2313 Format: a comma separated list of routes
2314
2315 ipv4.routing-rules
2316 A comma separated list of routing rules for policy routing. The
2317 format is based on ip rule add syntax and mostly compatible. One
2318 difference is that routing rules in NetworkManager always need a
2319 fixed priority.
2320
2321 Example: priority 5 from 192.167.4.0/24 table 45
2322
2323 Format: a comma separated list of routing rules
2324
2325 ipv6 setting
2326 IPv6 Settings.
2327
2328 Properties:
2329
2330 ipv6.addr-gen-mode
2331 Configure method for creating the IPv6 interface identifer of
2332 addresses with RFC4862 IPv6 Stateless Address Autoconfiguration and
2333 Link Local addresses.
2334
2335 The permitted values are: "eui64" (0), "stable-privacy" (1),
2336 "default" (3) or "default-or-eui64" (2).
2337
2338 If the property is set to "eui64", the addresses will be generated
2339 using the interface token derived from hardware address. This makes
2340 the host part of the address to stay constant, making it possible
2341 to track the host's presence when it changes networks. The address
2342 changes when the interface hardware is replaced. If a duplicate
2343 address is detected, there is also no fallback to generate another
2344 address. When configured, the "ipv6.token" is used instead of the
2345 MAC address to generate addresses for stateless autoconfiguration.
2346
2347 If the property is set to "stable-privacy", the interface
2348 identifier is generated as specified by RFC7217. This works by
2349 hashing a host specific key (see NetworkManager(8) manual), the
2350 interface name, the connection's "connection.stable-id" property
2351 and the address prefix. This improves privacy by making it harder
2352 to use the address to track the host's presence and the address is
2353 stable when the network interface hardware is replaced.
2354
2355 The special values "default" and "default-or-eui64" will fallback
2356 to the global connection default as documented in the
2357 NetworkManager.conf(5) manual. If the global default is not
2358 specified, the fallback value is "stable-privacy" or "eui64",
2359 respectively.
2360
2361 If not specified, when creating a new profile the default is
2362 "default".
2363
2364 Note that this setting is distinct from the Privacy Extensions as
2365 configured by "ip6-privacy" property and it does not affect the
2366 temporary addresses configured with this option.
2367
2368 Format: one of "eui64" (0), "stable-privacy" (1), "default" (3) or
2369 "default-or-eui64" (2)
2370
2371 ipv6.addresses
2372 Alias: ip6
2373
2374 A list of IPv6 addresses and their prefix length. Multiple
2375 addresses can be separated by comma. For example
2376 "2001:db8:85a3::8a2e:370:7334/64, 2001:db8:85a3::5/64". The
2377 addresses are listed in decreasing priority, meaning the first
2378 address will be the primary address. This can make a difference
2379 with IPv6 source address selection (RFC 6724, section 5).
2380
2381 Format: a comma separated list of addresses
2382
2383 ipv6.auto-route-ext-gw
2384 VPN connections will default to add the route automatically unless
2385 this setting is set to FALSE.
2386
2387 For other connection types, adding such an automatic route is
2388 currently not supported and setting this to TRUE has no effect.
2389
2390 Format: NMTernary (int32)
2391
2392 ipv6.dhcp-duid
2393 A string containing the DHCPv6 Unique Identifier (DUID) used by the
2394 dhcp client to identify itself to DHCPv6 servers (RFC 3315). The
2395 DUID is carried in the Client Identifier option. If the property is
2396 a hex string ('aa:bb:cc') it is interpreted as a binary DUID and
2397 filled as an opaque value in the Client Identifier option.
2398
2399 The special value "lease" will retrieve the DUID previously used
2400 from the lease file belonging to the connection. If no DUID is
2401 found and "dhclient" is the configured dhcp client, the DUID is
2402 searched in the system-wide dhclient lease file. If still no DUID
2403 is found, or another dhcp client is used, a global and permanent
2404 DUID-UUID (RFC 6355) will be generated based on the machine-id.
2405
2406 The special values "llt" and "ll" will generate a DUID of type LLT
2407 or LL (see RFC 3315) based on the current MAC address of the
2408 device. In order to try providing a stable DUID-LLT, the time field
2409 will contain a constant timestamp that is used globally (for all
2410 profiles) and persisted to disk.
2411
2412 The special values "stable-llt", "stable-ll" and "stable-uuid" will
2413 generate a DUID of the corresponding type, derived from the
2414 connection's stable-id and a per-host unique key. You may want to
2415 include the "${DEVICE}" or "${MAC}" specifier in the stable-id, in
2416 case this profile gets activated on multiple devices. So, the
2417 link-layer address of "stable-ll" and "stable-llt" will be a
2418 generated address derived from the stable id. The DUID-LLT time
2419 value in the "stable-llt" option will be picked among a static
2420 timespan of three years (the upper bound of the interval is the
2421 same constant timestamp used in "llt").
2422
2423 When the property is unset, the global value provided for
2424 "ipv6.dhcp-duid" is used. If no global value is provided, the
2425 default "lease" value is assumed.
2426
2427 Format: string
2428
2429 ipv6.dhcp-hostname
2430 If the "dhcp-send-hostname" property is TRUE, then the specified
2431 name will be sent to the DHCP server when acquiring a lease. This
2432 property and "dhcp-fqdn" are mutually exclusive and cannot be set
2433 at the same time.
2434
2435 Format: string
2436
2437 ipv6.dhcp-hostname-flags
2438 Flags for the DHCP hostname and FQDN.
2439
2440 Currently, this property only includes flags to control the FQDN
2441 flags set in the DHCP FQDN option. Supported FQDN flags are
2442 NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
2443 NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) and
2444 NM_DHCP_HOSTNAME_FLAG_FQDN_NO_UPDATE (0x4). When no FQDN flag is
2445 set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is set, the
2446 DHCP FQDN option will contain no flag. Otherwise, if no FQDN flag
2447 is set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is not set,
2448 the standard FQDN flags are set in the request:
2449 NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
2450 NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) for IPv4 and
2451 NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1) for IPv6.
2452
2453 When this property is set to the default value
2454 NM_DHCP_HOSTNAME_FLAG_NONE (0x0), a global default is looked up in
2455 NetworkManager configuration. If that value is unset or also
2456 NM_DHCP_HOSTNAME_FLAG_NONE (0x0), then the standard FQDN flags
2457 described above are sent in the DHCP requests.
2458
2459 Format: uint32
2460
2461 ipv6.dhcp-iaid
2462 A string containing the "Identity Association Identifier" (IAID)
2463 used by the DHCP client. The string can be a 32-bit number (either
2464 decimal, hexadecimal or as colon separated hexadecimal numbers).
2465 Alternatively it can be set to the special values "mac",
2466 "perm-mac", "ifname" or "stable". When set to "mac" (or
2467 "perm-mac"), the last 4 bytes of the current (or permanent) MAC
2468 address are used as IAID. When set to "ifname", the IAID is
2469 computed by hashing the interface name. The special value "stable"
2470 can be used to generate an IAID based on the stable-id (see
2471 connection.stable-id), a per-host key and the interface name. When
2472 the property is unset, the value from global configuration is used;
2473 if no global default is set then the IAID is assumed to be
2474 "ifname".
2475
2476 For DHCPv4, the IAID is only used with "ipv4.dhcp-client-id" values
2477 "duid" and "ipv6-duid" to generate the client-id.
2478
2479 For DHCPv6, note that at the moment this property is only supported
2480 by the "internal" DHCPv6 plugin. The "dhclient" DHCPv6 plugin
2481 always derives the IAID from the MAC address.
2482
2483 The actually used DHCPv6 IAID for a currently activated interface
2484 is exposed in the lease information of the device.
2485
2486 Format: string
2487
2488 ipv6.dhcp-pd-hint
2489 A IPv6 address followed by a slash and a prefix length. If set, the
2490 value is sent to the DHCPv6 server as hint indicating the prefix
2491 delegation (IA_PD) we want to receive. To only hint a prefix length
2492 without prefix, set the address part to the zero address (for
2493 example "::/60").
2494
2495 Format: string
2496
2497 ipv6.dhcp-send-hostname
2498 If TRUE, a hostname is sent to the DHCP server when acquiring a
2499 lease. Some DHCP servers use this hostname to update DNS databases,
2500 essentially providing a static hostname for the computer. If the
2501 "dhcp-hostname" property is NULL and this property is TRUE, the
2502 current persistent hostname of the computer is sent.
2503
2504 Format: boolean
2505
2506 ipv6.dhcp-timeout
2507 A timeout for a DHCP transaction in seconds. If zero (the default),
2508 a globally configured default is used. If still unspecified, a
2509 device specific timeout is used (usually 45 seconds).
2510
2511 Set to 2147483647 (MAXINT32) for infinity.
2512
2513 Format: int32
2514
2515 ipv6.dns
2516 Array of IP addresses of DNS servers.
2517
2518 For DoT (DNS over TLS), the SNI server name can be specified by
2519 appending "#example.com" to the IP address of the DNS server. This
2520 currently only has effect when using systemd-resolved.
2521
2522 Format: array of byte array
2523
2524 ipv6.dns-options
2525 DNS options for /etc/resolv.conf as described in resolv.conf(5)
2526 manual.
2527
2528 The currently supported options are "attempts", "debug", "edns0",
2529 "ndots", "no-aaaa", "no-check-names", "no-reload", "no-tld-query",
2530 "rotate", "single-request", "single-request-reopen", "timeout",
2531 "trust-ad", "use-vc" and "inet6", "ip6-bytestring", "ip6-dotint",
2532 "no-ip6-dotint". See the resolv.conf(5) manual.
2533
2534 Note that there is a distinction between an unset (default) list
2535 and an empty list. In nmcli, to unset the list set the value to "".
2536 To set an empty list, set it to " ". Currently, an unset list has
2537 the same meaning as an empty list. That might change in the future.
2538
2539 The "trust-ad" setting is only honored if the profile contributes
2540 name servers to resolv.conf, and if all contributing profiles have
2541 "trust-ad" enabled.
2542
2543 When using a caching DNS plugin (dnsmasq or systemd-resolved in
2544 NetworkManager.conf) then "edns0" and "trust-ad" are automatically
2545 added.
2546
2547 The valid "ipv4.dns-options" and "ipv6.dns-options" get merged
2548 together.
2549
2550 Format: a comma separated list of DNS options
2551
2552 ipv6.dns-priority
2553 DNS servers priority.
2554
2555 The relative priority for DNS servers specified by this setting. A
2556 lower numerical value is better (higher priority).
2557
2558 Negative values have the special effect of excluding other
2559 configurations with a greater numerical priority value; so in
2560 presence of at least one negative priority, only DNS servers from
2561 connections with the lowest priority value will be used. To avoid
2562 all DNS leaks, set the priority of the profile that should be used
2563 to the most negative value of all active connections profiles.
2564
2565 Zero selects a globally configured default value. If the latter is
2566 missing or zero too, it defaults to 50 for VPNs (including
2567 WireGuard) and 100 for other connections.
2568
2569 Note that the priority is to order DNS settings for multiple active
2570 connections. It does not disambiguate multiple DNS servers within
2571 the same connection profile.
2572
2573 When multiple devices have configurations with the same priority,
2574 VPNs will be considered first, then devices with the best (lowest
2575 metric) default route and then all other devices.
2576
2577 When using dns=default, servers with higher priority will be on top
2578 of resolv.conf. To prioritize a given server over another one
2579 within the same connection, just specify them in the desired order.
2580 Note that commonly the resolver tries name servers in
2581 /etc/resolv.conf in the order listed, proceeding with the next
2582 server in the list on failure. See for example the "rotate" option
2583 of the dns-options setting. If there are any negative DNS
2584 priorities, then only name servers from the devices with that
2585 lowest priority will be considered.
2586
2587 When using a DNS resolver that supports Conditional Forwarding or
2588 Split DNS (with dns=dnsmasq or dns=systemd-resolved settings), each
2589 connection is used to query domains in its search list. The search
2590 domains determine which name servers to ask, and the DNS priority
2591 is used to prioritize name servers based on the domain. Queries for
2592 domains not present in any search list are routed through
2593 connections having the '~.' special wildcard domain, which is added
2594 automatically to connections with the default route (or can be
2595 added manually). When multiple connections specify the same domain,
2596 the one with the best priority (lowest numerical value) wins. If a
2597 sub domain is configured on another interface it will be accepted
2598 regardless the priority, unless parent domain on the other
2599 interface has a negative priority, which causes the sub domain to
2600 be shadowed. With Split DNS one can avoid undesired DNS leaks by
2601 properly configuring DNS priorities and the search domains, so that
2602 only name servers of the desired interface are configured.
2603
2604 Format: int32
2605
2606 ipv6.dns-search
2607 List of DNS search domains. Domains starting with a tilde ('~') are
2608 considered 'routing' domains and are used only to decide the
2609 interface over which a query must be forwarded; they are not used
2610 to complete unqualified host names.
2611
2612 When using a DNS plugin that supports Conditional Forwarding or
2613 Split DNS, then the search domains specify which name servers to
2614 query. This makes the behavior different from running with plain
2615 /etc/resolv.conf. For more information see also the dns-priority
2616 setting.
2617
2618 When set on a profile that also enabled DHCP, the DNS search list
2619 received automatically (option 119 for DHCPv4 and option 24 for
2620 DHCPv6) gets merged with the manual list. This can be prevented by
2621 setting "ignore-auto-dns". Note that if no DNS searches are
2622 configured, the fallback will be derived from the domain from DHCP
2623 (option 15).
2624
2625 Format: array of string
2626
2627 ipv6.gateway
2628 Alias: gw6
2629
2630 The gateway associated with this configuration. This is only
2631 meaningful if "addresses" is also set.
2632
2633 Setting the gateway causes NetworkManager to configure a standard
2634 default route with the gateway as next hop. This is ignored if
2635 "never-default" is set. An alternative is to configure the default
2636 route explicitly with a manual route and /0 as prefix length.
2637
2638 Note that the gateway usually conflicts with routing that
2639 NetworkManager configures for WireGuard interfaces, so usually it
2640 should not be set in that case. See "ip4-auto-default-route".
2641
2642 Format: string
2643
2644 ipv6.ignore-auto-dns
2645 When "method" is set to "auto" and this property to TRUE,
2646 automatically configured name servers and search domains are
2647 ignored and only name servers and search domains specified in the
2648 "dns" and "dns-search" properties, if any, are used.
2649
2650 Format: boolean
2651
2652 ipv6.ignore-auto-routes
2653 When "method" is set to "auto" and this property to TRUE,
2654 automatically configured routes are ignored and only routes
2655 specified in the "routes" property, if any, are used.
2656
2657 Format: boolean
2658
2659 ipv6.ip6-privacy
2660 Configure IPv6 Privacy Extensions for SLAAC, described in RFC4941.
2661 If enabled, it makes the kernel generate a temporary IPv6 address
2662 in addition to the public one generated from MAC address via
2663 modified EUI-64. This enhances privacy, but could cause problems in
2664 some applications, on the other hand. The permitted values are: -1:
2665 unknown, 0: disabled, 1: enabled (prefer public address), 2:
2666 enabled (prefer temporary addresses).
2667
2668 Having a per-connection setting set to "-1" (unknown) means
2669 fallback to global configuration "ipv6.ip6-privacy".
2670
2671 If also global configuration is unspecified or set to "-1",
2672 fallback to read "/proc/sys/net/ipv6/conf/default/use_tempaddr".
2673
2674 Note that this setting is distinct from the Stable Privacy
2675 addresses that can be enabled with the "addr-gen-mode" property's
2676 "stable-privacy" setting as another way of avoiding host tracking
2677 with IPv6 addresses.
2678
2679 Format: NMSettingIP6ConfigPrivacy (int32)
2680
2681 ipv6.may-fail
2682 If TRUE, allow overall network configuration to proceed even if the
2683 configuration specified by this property times out. Note that at
2684 least one IP configuration must succeed or overall network
2685 configuration will still fail. For example, in IPv6-only networks,
2686 setting this property to TRUE on the NMSettingIP4Config allows the
2687 overall network configuration to succeed if IPv4 configuration
2688 fails but IPv6 configuration completes successfully.
2689
2690 Format: boolean
2691
2692 ipv6.method
2693 Sets the IPv6 connection method. You can set one of the following
2694 values:
2695
2696 • "auto" - Enables IPv6 auto-configuration. By default,
2697 NetworkManager uses Router Advertisements and, if the router
2698 announces the "managed" flag, NetworkManager requests an IPv6
2699 address and prefix from a DHCPv6 server.
2700
2701 • "dhcp" - Requests an IPv6 address and prefix from a DHCPv6
2702 server. Note that DHCPv6 does not have options to provide
2703 routes and the default gateway. As a consequence, by using the
2704 "dhcp" method, connections are limited to their own subnet.
2705
2706 • "manual" - Enables the configuration of static IPv6 addresses
2707 on the interface. Note that you must set at least one IP
2708 address and prefix in the "ipv6.addresses" property.
2709
2710 • "disabled" - Disables the IPv6 protocol in this connection
2711 profile.
2712
2713 • "ignore" - Configures NetworkManager to make no changes to the
2714 IPv6 configuration on the interface. For example, you can then
2715 use the "accept_ra" feature of the kernel to accept Router
2716 Advertisements.
2717
2718 • "shared" - Provides network access to other computers.
2719 NetworkManager requests a prefix from an upstream DHCPv6
2720 server, assigns an address to the interface, and announces the
2721 prefix to clients that connect to this interface.
2722
2723 • "link-local" - Assigns a random link-local address from the
2724 fe80::/64 subnet to the interface.
2725
2726
2727 If you set "auto", "dhcp", "manual", "ignore", or "shared",
2728 NetworkManager assigns, in addition to the global address, an IPv6
2729 link-local address to the interface. This is compliant with RFC
2730 4291.
2731
2732 Format: string
2733
2734 ipv6.mtu
2735 Maximum transmission unit size, in bytes. If zero (the default),
2736 the MTU is set automatically from router advertisements or is left
2737 equal to the link-layer MTU. If greater than the link-layer MTU, or
2738 greater than zero but less than the minimum IPv6 MTU of 1280, this
2739 value has no effect.
2740
2741 Format: uint32
2742
2743 ipv6.never-default
2744 If TRUE, this connection will never be the default connection for
2745 this IP type, meaning it will never be assigned the default route
2746 by NetworkManager.
2747
2748 Format: boolean
2749
2750 ipv6.ra-timeout
2751 A timeout for waiting Router Advertisements in seconds. If zero
2752 (the default), a globally configured default is used. If still
2753 unspecified, the timeout depends on the sysctl settings of the
2754 device.
2755
2756 Set to 2147483647 (MAXINT32) for infinity.
2757
2758 Format: int32
2759
2760 ipv6.replace-local-rule
2761 Connections will default to keep the autogenerated priority 0 local
2762 rule unless this setting is set to TRUE.
2763
2764 Format: NMTernary (int32)
2765
2766 ipv6.required-timeout
2767 The minimum time interval in milliseconds for which dynamic IP
2768 configuration should be tried before the connection succeeds.
2769
2770 This property is useful for example if both IPv4 and IPv6 are
2771 enabled and are allowed to fail. Normally the connection succeeds
2772 as soon as one of the two address families completes; by setting a
2773 required timeout for e.g. IPv4, one can ensure that even if IP6
2774 succeeds earlier than IPv4, NetworkManager waits some time for IPv4
2775 before the connection becomes active.
2776
2777 Note that if "may-fail" is FALSE for the same address family, this
2778 property has no effect as NetworkManager needs to wait for the full
2779 DHCP timeout.
2780
2781 A zero value means that no required timeout is present, -1 means
2782 the default value (either configuration ipvx.required-timeout
2783 override or zero).
2784
2785 Format: int32
2786
2787 ipv6.route-metric
2788 The default metric for routes that don't explicitly specify a
2789 metric. The default value -1 means that the metric is chosen
2790 automatically based on the device type. The metric applies to
2791 dynamic routes, manual (static) routes that don't have an explicit
2792 metric setting, address prefix routes, and the default route. Note
2793 that for IPv6, the kernel accepts zero (0) but coerces it to 1024
2794 (user default). Hence, setting this property to zero effectively
2795 mean setting it to 1024. For IPv4, zero is a regular value for the
2796 metric.
2797
2798 Format: int64
2799
2800 ipv6.route-table
2801 Enable policy routing (source routing) and set the routing table
2802 used when adding routes.
2803
2804 This affects all routes, including device-routes, IPv4LL, DHCP,
2805 SLAAC, default-routes and static routes. But note that static
2806 routes can individually overwrite the setting by explicitly
2807 specifying a non-zero routing table.
2808
2809 If the table setting is left at zero, it is eligible to be
2810 overwritten via global configuration. If the property is zero even
2811 after applying the global configuration value, policy routing is
2812 disabled for the address family of this connection.
2813
2814 Policy routing disabled means that NetworkManager will add all
2815 routes to the main table (except static routes that explicitly
2816 configure a different table). Additionally, NetworkManager will not
2817 delete any extraneous routes from tables except the main table.
2818 This is to preserve backward compatibility for users who manage
2819 routing tables outside of NetworkManager.
2820
2821 Format: uint32
2822
2823 ipv6.routes
2824 A list of IPv6 destination addresses, prefix length, optional IPv6
2825 next hop addresses, optional route metric, optional attribute. The
2826 valid syntax is: "ip[/prefix] [next-hop] [metric]
2827 [attribute=val]...[,ip[/prefix]...]".
2828
2829 Various attributes are supported:
2830
2831 • "advmss" - an unsigned 32 bit integer.
2832
2833 • "cwnd" - an unsigned 32 bit integer.
2834
2835 • "from" - an IPv6 address with optional prefix. IPv6 only.
2836
2837 • "initcwnd" - an unsigned 32 bit integer.
2838
2839 • "initrwnd" - an unsigned 32 bit integer.
2840
2841 • "lock-advmss" - a boolean value.
2842
2843 • "lock-cwnd" - a boolean value.
2844
2845 • "lock-initcwnd" - a boolean value.
2846
2847 • "lock-initrwnd" - a boolean value.
2848
2849 • "lock-mtu" - a boolean value.
2850
2851 • "lock-window" - a boolean value.
2852
2853 • "mtu" - an unsigned 32 bit integer.
2854
2855 • "onlink" - a boolean value.
2856
2857 • "quickack" - a boolean value.
2858
2859 • "rto_min" - an unsigned 32 bit integer. The value is in
2860 milliseconds.
2861
2862 • "src" - an IPv6 address.
2863
2864 • "table" - an unsigned 32 bit integer. The default depends on
2865 ipv6.route-table.
2866
2867 • "type" - one of unicast, local, blackhole, unreachable,
2868 prohibit, throw. The default is unicast.
2869
2870 • "window" - an unsigned 32 bit integer.
2871
2872 For details see also `man ip-route`.
2873
2874 Format: a comma separated list of routes
2875
2876 ipv6.routing-rules
2877 A comma separated list of routing rules for policy routing. The
2878 format is based on ip rule add syntax and mostly compatible. One
2879 difference is that routing rules in NetworkManager always need a
2880 fixed priority.
2881
2882 Example: priority 5 from 1:2:3::5/128 table 45
2883
2884 Format: a comma separated list of routing rules
2885
2886 ipv6.token
2887 Configure the token for
2888 draft-chown-6man-tokenised-ipv6-identifiers-02 IPv6 tokenized
2889 interface identifiers. Useful with eui64 addr-gen-mode.
2890
2891 When set, the token is used as IPv6 interface identifier instead of
2892 the hardware address. This only applies to addresses from stateless
2893 autoconfiguration, not to IPv6 link local addresses.
2894
2895 Format: string
2896
2897 ip-tunnel setting
2898 IP Tunneling Settings.
2899
2900 Properties:
2901
2902 ip-tunnel.encapsulation-limit
2903 How many additional levels of encapsulation are permitted to be
2904 prepended to packets. This property applies only to IPv6 tunnels.
2905 To disable this option, add 0x1 (ip6-ign-encap-limit) to ip-tunnel
2906 flags.
2907
2908 Format: uint32
2909
2910 ip-tunnel.flags
2911 Tunnel flags. Currently, the following values are supported: 0x1
2912 (ip6-ign-encap-limit), 0x2 (ip6-use-orig-tclass), 0x4
2913 (ip6-use-orig-flowlabel), 0x8 (ip6-mip6-dev), 0x10
2914 (ip6-rcv-dscp-copy) and 0x20 (ip6-use-orig-fwmark). They are valid
2915 only for IPv6 tunnels.
2916
2917 Format: uint32
2918
2919 ip-tunnel.flow-label
2920 The flow label to assign to tunnel packets. This property applies
2921 only to IPv6 tunnels.
2922
2923 Format: uint32
2924
2925 ip-tunnel.fwmark
2926 The fwmark value to assign to tunnel packets. This property can be
2927 set to a non zero value only on VTI and VTI6 tunnels.
2928
2929 Format: uint32
2930
2931 ip-tunnel.input-key
2932 The key used for tunnel input packets; the property is valid only
2933 for certain tunnel modes (GRE, IP6GRE). If empty, no key is used.
2934
2935 Format: string
2936
2937 ip-tunnel.local
2938 Alias: local
2939
2940 The local endpoint of the tunnel; the value can be empty, otherwise
2941 it must contain an IPv4 or IPv6 address.
2942
2943 Format: string
2944
2945 ip-tunnel.mode
2946 Alias: mode
2947
2948 The tunneling mode. Valid values: ipip (1), gre (2), sit (3),
2949 isatap (4), vti (5), ip6ip6 (6), ipip6 (7), ip6gre (8), vti6 (9),
2950 gretap (10) and ip6gretap (11)
2951
2952 Format: uint32
2953
2954 ip-tunnel.mtu
2955 If non-zero, only transmit packets of the specified size or
2956 smaller, breaking larger packets up into multiple fragments.
2957
2958 Format: uint32
2959
2960 ip-tunnel.output-key
2961 The key used for tunnel output packets; the property is valid only
2962 for certain tunnel modes (GRE, IP6GRE). If empty, no key is used.
2963
2964 Format: string
2965
2966 ip-tunnel.parent
2967 Alias: dev
2968
2969 If given, specifies the parent interface name or parent connection
2970 UUID the new device will be bound to so that tunneled packets will
2971 only be routed via that interface.
2972
2973 Format: string
2974
2975 ip-tunnel.path-mtu-discovery
2976 Whether to enable Path MTU Discovery on this tunnel.
2977
2978 Format: boolean
2979
2980 ip-tunnel.remote
2981 Alias: remote
2982
2983 The remote endpoint of the tunnel; the value must contain an IPv4
2984 or IPv6 address.
2985
2986 Format: string
2987
2988 ip-tunnel.tos
2989 The type of service (IPv4) or traffic class (IPv6) field to be set
2990 on tunneled packets.
2991
2992 Format: uint32
2993
2994 ip-tunnel.ttl
2995 The TTL to assign to tunneled packets. 0 is a special value meaning
2996 that packets inherit the TTL value.
2997
2998 Format: uint32
2999
3000 macsec setting
3001 MACSec Settings.
3002
3003 Properties:
3004
3005 macsec.encrypt
3006 Alias: encrypt
3007
3008 Whether the transmitted traffic must be encrypted.
3009
3010 Format: boolean
3011
3012 macsec.mka-cak
3013 Alias: cak
3014
3015 The pre-shared CAK (Connectivity Association Key) for MACsec Key
3016 Agreement. Must be a string of 32 hexadecimal characters.
3017
3018 Format: string
3019
3020 macsec.mka-cak-flags
3021 Flags indicating how to handle the "mka-cak" property.
3022
3023 See the section called “Secret flag types:” for flag values.
3024
3025 Format: NMSettingSecretFlags (uint32)
3026
3027 macsec.mka-ckn
3028 Alias: ckn
3029
3030 The pre-shared CKN (Connectivity-association Key Name) for MACsec
3031 Key Agreement. Must be a string of hexadecimal characters with a
3032 even length between 2 and 64.
3033
3034 Format: string
3035
3036 macsec.mode
3037 Alias: mode
3038
3039 Specifies how the CAK (Connectivity Association Key) for MKA
3040 (MACsec Key Agreement) is obtained.
3041
3042 Format: int32
3043
3044 macsec.parent
3045 Alias: dev
3046
3047 If given, specifies the parent interface name or parent connection
3048 UUID from which this MACSEC interface should be created. If this
3049 property is not specified, the connection must contain an
3050 "802-3-ethernet" setting with a "mac-address" property.
3051
3052 Format: string
3053
3054 macsec.port
3055 Alias: port
3056
3057 The port component of the SCI (Secure Channel Identifier), between
3058 1 and 65534.
3059
3060 Format: int32
3061
3062 macsec.send-sci
3063 Specifies whether the SCI (Secure Channel Identifier) is included
3064 in every packet.
3065
3066 Format: boolean
3067
3068 macsec.validation
3069 Specifies the validation mode for incoming frames.
3070
3071 Format: int32
3072
3073 macvlan setting
3074 MAC VLAN Settings.
3075
3076 Properties:
3077
3078 macvlan.mode
3079 Alias: mode
3080
3081 The macvlan mode, which specifies the communication mechanism
3082 between multiple macvlans on the same lower device.
3083
3084 Format: uint32
3085
3086 macvlan.parent
3087 Alias: dev
3088
3089 If given, specifies the parent interface name or parent connection
3090 UUID from which this MAC-VLAN interface should be created. If this
3091 property is not specified, the connection must contain an
3092 "802-3-ethernet" setting with a "mac-address" property.
3093
3094 Format: string
3095
3096 macvlan.promiscuous
3097 Whether the interface should be put in promiscuous mode.
3098
3099 Format: boolean
3100
3101 macvlan.tap
3102 Alias: tap
3103
3104 Whether the interface should be a MACVTAP.
3105
3106 Format: boolean
3107
3108 match setting
3109 Match settings.
3110
3111 Properties:
3112
3113 match.driver
3114 A list of driver names to match. Each element is a shell wildcard
3115 pattern.
3116
3117 See NMSettingMatch:interface-name for how special characters '|',
3118 '&', '!' and '\\' are used for optional and mandatory matches and
3119 inverting the pattern.
3120
3121 Format: array of string
3122
3123 match.interface-name
3124 A list of interface names to match. Each element is a shell
3125 wildcard pattern.
3126
3127 An element can be prefixed with a pipe symbol (|) or an ampersand
3128 (&). The former means that the element is optional and the latter
3129 means that it is mandatory. If there are any optional elements,
3130 than the match evaluates to true if at least one of the optional
3131 element matches (logical OR). If there are any mandatory elements,
3132 then they all must match (logical AND). By default, an element is
3133 optional. This means that an element "foo" behaves the same as
3134 "|foo". An element can also be inverted with exclamation mark (!)
3135 between the pipe symbol (or the ampersand) and before the pattern.
3136 Note that "!foo" is a shortcut for the mandatory match "&!foo".
3137 Finally, a backslash can be used at the beginning of the element
3138 (after the optional special characters) to escape the start of the
3139 pattern. For example, "&\\!a" is an mandatory match for literally
3140 "!a".
3141
3142 Format: array of string
3143
3144 match.kernel-command-line
3145 A list of kernel command line arguments to match. This may be used
3146 to check whether a specific kernel command line option is set (or
3147 unset, if prefixed with the exclamation mark). The argument must
3148 either be a single word, or an assignment (i.e. two words, joined
3149 by "="). In the former case the kernel command line is searched for
3150 the word appearing as is, or as left hand side of an assignment. In
3151 the latter case, the exact assignment is looked for with right and
3152 left hand side matching. Wildcard patterns are not supported.
3153
3154 See NMSettingMatch:interface-name for how special characters '|',
3155 '&', '!' and '\\' are used for optional and mandatory matches and
3156 inverting the match.
3157
3158 Format: array of string
3159
3160 match.path
3161 A list of paths to match against the ID_PATH udev property of
3162 devices. ID_PATH represents the topological persistent path of a
3163 device. It typically contains a subsystem string (pci, usb,
3164 platform, etc.) and a subsystem-specific identifier.
3165
3166 For PCI devices the path has the form
3167 "pci-$domain:$bus:$device.$function", where each variable is an
3168 hexadecimal value; for example "pci-0000:0a:00.0".
3169
3170 The path of a device can be obtained with "udevadm info
3171 /sys/class/net/$dev | grep ID_PATH=" or by looking at the "path"
3172 property exported by NetworkManager ("nmcli -f general.path device
3173 show $dev").
3174
3175 Each element of the list is a shell wildcard pattern.
3176
3177 See NMSettingMatch:interface-name for how special characters '|',
3178 '&', '!' and '\\' are used for optional and mandatory matches and
3179 inverting the pattern.
3180
3181 Format: array of string
3182
3183 802-11-olpc-mesh setting
3184 Alias: olpc-mesh
3185
3186 OLPC Wireless Mesh Settings.
3187
3188 Properties:
3189
3190 802-11-olpc-mesh.channel
3191 Alias: channel
3192
3193 Channel on which the mesh network to join is located.
3194
3195 Format: uint32
3196
3197 802-11-olpc-mesh.dhcp-anycast-address
3198 Alias: dhcp-anycast
3199
3200 Anycast DHCP MAC address used when requesting an IP address via
3201 DHCP. The specific anycast address used determines which DHCP
3202 server class answers the request.
3203
3204 This is currently only implemented by dhclient DHCP plugin.
3205
3206 Format: byte array
3207
3208 802-11-olpc-mesh.ssid
3209 Alias: ssid
3210
3211 SSID of the mesh network to join.
3212
3213 Format: byte array
3214
3215 ovs-bridge setting
3216 OvsBridge Link Settings.
3217
3218 Properties:
3219
3220 ovs-bridge.datapath-type
3221 The data path type. One of "system", "netdev" or empty.
3222
3223 Format: string
3224
3225 ovs-bridge.fail-mode
3226 The bridge failure mode. One of "secure", "standalone" or empty.
3227
3228 Format: string
3229
3230 ovs-bridge.mcast-snooping-enable
3231 Enable or disable multicast snooping.
3232
3233 Format: boolean
3234
3235 ovs-bridge.rstp-enable
3236 Enable or disable RSTP.
3237
3238 Format: boolean
3239
3240 ovs-bridge.stp-enable
3241 Enable or disable STP.
3242
3243 Format: boolean
3244
3245 ovs-dpdk setting
3246 OvsDpdk Link Settings.
3247
3248 Properties:
3249
3250 ovs-dpdk.devargs
3251 Open vSwitch DPDK device arguments.
3252
3253 Format: string
3254
3255 ovs-dpdk.n-rxq
3256 Open vSwitch DPDK number of rx queues. Defaults to zero which means
3257 to leave the parameter in OVS unspecified and effectively
3258 configures one queue.
3259
3260 Format: uint32
3261
3262 ovs-dpdk.n-rxq-desc
3263 The rx queue size (number of rx descriptors) for DPDK ports. Must
3264 be zero or a power of 2 between 1 and 4096, and supported by the
3265 hardware. Defaults to zero which means to leave the parameter in
3266 OVS unspecified and effectively configures 2048 descriptors.
3267
3268 Format: uint32
3269
3270 ovs-dpdk.n-txq-desc
3271 The tx queue size (number of tx descriptors) for DPDK ports. Must
3272 be zero or a power of 2 between 1 and 4096, and supported by the
3273 hardware. Defaults to zero which means to leave the parameter in
3274 OVS unspecified and effectively configures 2048 descriptors.
3275
3276 Format: uint32
3277
3278 ovs-interface setting
3279 Open vSwitch Interface Settings.
3280
3281 Properties:
3282
3283 ovs-interface.ofport-request
3284 Open vSwitch openflow port number. Defaults to zero which means
3285 that port number will not be specified and it will be chosen
3286 randomly by ovs. OpenFlow ports are the network interfaces for
3287 passing packets between OpenFlow processing and the rest of the
3288 network. OpenFlow switches connect logically to each other via
3289 their OpenFlow ports.
3290
3291 Format: uint32
3292
3293 ovs-interface.type
3294 The interface type. Either "internal", "system", "patch", "dpdk",
3295 or empty.
3296
3297 Format: string
3298
3299 ovs-patch setting
3300 OvsPatch Link Settings.
3301
3302 Properties:
3303
3304 ovs-patch.peer
3305 Specifies the name of the interface for the other side of the
3306 patch. The patch on the other side must also set this interface as
3307 peer.
3308
3309 Format: string
3310
3311 ovs-port setting
3312 OvsPort Link Settings.
3313
3314 Properties:
3315
3316 ovs-port.bond-downdelay
3317 The time port must be inactive in order to be considered down.
3318
3319 Format: uint32
3320
3321 ovs-port.bond-mode
3322 Bonding mode. One of "active-backup", "balance-slb", or
3323 "balance-tcp".
3324
3325 Format: string
3326
3327 ovs-port.bond-updelay
3328 The time port must be active before it starts forwarding traffic.
3329
3330 Format: uint32
3331
3332 ovs-port.lacp
3333 LACP mode. One of "active", "off", or "passive".
3334
3335 Format: string
3336
3337 ovs-port.tag
3338 The VLAN tag in the range 0-4095.
3339
3340 Format: uint32
3341
3342 ovs-port.trunks
3343 A list of VLAN ranges that this port trunks.
3344
3345 The property is valid only for ports with mode "trunk",
3346 "native-tagged", or "native-untagged port". If it is empty, the
3347 port trunks all VLANs.
3348
3349 Format: array of vardict
3350
3351 ovs-port.vlan-mode
3352 The VLAN mode. One of "access", "native-tagged", "native-untagged",
3353 "trunk", "dot1q-tunnel" or unset.
3354
3355 Format: string
3356
3357 ppp setting
3358 Point-to-Point Protocol Settings.
3359
3360 Properties:
3361
3362 ppp.baud
3363 If non-zero, instruct pppd to set the serial port to the specified
3364 baudrate. This value should normally be left as 0 to automatically
3365 choose the speed.
3366
3367 Format: uint32
3368
3369 ppp.crtscts
3370 If TRUE, specify that pppd should set the serial port to use
3371 hardware flow control with RTS and CTS signals. This value should
3372 normally be set to FALSE.
3373
3374 Format: boolean
3375
3376 ppp.lcp-echo-failure
3377 If non-zero, instruct pppd to presume the connection to the peer
3378 has failed if the specified number of LCP echo-requests go
3379 unanswered by the peer. The "lcp-echo-interval" property must also
3380 be set to a non-zero value if this property is used.
3381
3382 Format: uint32
3383
3384 ppp.lcp-echo-interval
3385 If non-zero, instruct pppd to send an LCP echo-request frame to the
3386 peer every n seconds (where n is the specified value). Note that
3387 some PPP peers will respond to echo requests and some will not, and
3388 it is not possible to autodetect this.
3389
3390 Format: uint32
3391
3392 ppp.mppe-stateful
3393 If TRUE, stateful MPPE is used. See pppd documentation for more
3394 information on stateful MPPE.
3395
3396 Format: boolean
3397
3398 ppp.mru
3399 If non-zero, instruct pppd to request that the peer send packets no
3400 larger than the specified size. If non-zero, the MRU should be
3401 between 128 and 16384.
3402
3403 Format: uint32
3404
3405 ppp.mtu
3406 If non-zero, instruct pppd to send packets no larger than the
3407 specified size.
3408
3409 Format: uint32
3410
3411 ppp.no-vj-comp
3412 If TRUE, Van Jacobsen TCP header compression will not be requested.
3413
3414 Format: boolean
3415
3416 ppp.noauth
3417 If TRUE, do not require the other side (usually the PPP server) to
3418 authenticate itself to the client. If FALSE, require authentication
3419 from the remote side. In almost all cases, this should be TRUE.
3420
3421 Format: boolean
3422
3423 ppp.nobsdcomp
3424 If TRUE, BSD compression will not be requested.
3425
3426 Format: boolean
3427
3428 ppp.nodeflate
3429 If TRUE, "deflate" compression will not be requested.
3430
3431 Format: boolean
3432
3433 ppp.refuse-chap
3434 If TRUE, the CHAP authentication method will not be used.
3435
3436 Format: boolean
3437
3438 ppp.refuse-eap
3439 If TRUE, the EAP authentication method will not be used.
3440
3441 Format: boolean
3442
3443 ppp.refuse-mschap
3444 If TRUE, the MSCHAP authentication method will not be used.
3445
3446 Format: boolean
3447
3448 ppp.refuse-mschapv2
3449 If TRUE, the MSCHAPv2 authentication method will not be used.
3450
3451 Format: boolean
3452
3453 ppp.refuse-pap
3454 If TRUE, the PAP authentication method will not be used.
3455
3456 Format: boolean
3457
3458 ppp.require-mppe
3459 If TRUE, MPPE (Microsoft Point-to-Point Encryption) will be
3460 required for the PPP session. If either 64-bit or 128-bit MPPE is
3461 not available the session will fail. Note that MPPE is not used on
3462 mobile broadband connections.
3463
3464 Format: boolean
3465
3466 ppp.require-mppe-128
3467 If TRUE, 128-bit MPPE (Microsoft Point-to-Point Encryption) will be
3468 required for the PPP session, and the "require-mppe" property must
3469 also be set to TRUE. If 128-bit MPPE is not available the session
3470 will fail.
3471
3472 Format: boolean
3473
3474 pppoe setting
3475 PPP-over-Ethernet Settings.
3476
3477 Properties:
3478
3479 pppoe.parent
3480 Alias: parent
3481
3482 If given, specifies the parent interface name on which this PPPoE
3483 connection should be created. If this property is not specified,
3484 the connection is activated on the interface specified in
3485 "interface-name" of NMSettingConnection.
3486
3487 Format: string
3488
3489 pppoe.password
3490 Alias: password
3491
3492 Password used to authenticate with the PPPoE service.
3493
3494 Format: string
3495
3496 pppoe.password-flags
3497 Flags indicating how to handle the "password" property.
3498
3499 See the section called “Secret flag types:” for flag values.
3500
3501 Format: NMSettingSecretFlags (uint32)
3502
3503 pppoe.service
3504 Alias: service
3505
3506 If specified, instruct PPPoE to only initiate sessions with access
3507 concentrators that provide the specified service. For most
3508 providers, this should be left blank. It is only required if there
3509 are multiple access concentrators or a specific service is known to
3510 be required.
3511
3512 Format: string
3513
3514 pppoe.username
3515 Alias: username
3516
3517 Username used to authenticate with the PPPoE service.
3518
3519 Format: string
3520
3521 proxy setting
3522 WWW Proxy Settings.
3523
3524 Properties:
3525
3526 proxy.browser-only
3527 Alias: browser-only
3528
3529 Whether the proxy configuration is for browser only.
3530
3531 Format: boolean
3532
3533 proxy.method
3534 Alias: method
3535
3536 Method for proxy configuration, Default is
3537 NM_SETTING_PROXY_METHOD_NONE (0)
3538
3539 Format: int32
3540
3541 proxy.pac-script
3542 Alias: pac-script
3543
3544 The PAC script. In the profile this must be an UTF-8 encoded
3545 javascript code that defines a FindProxyForURL() function. When
3546 setting the property in nmcli, a filename is accepted too. In that
3547 case, nmcli will read the content of the file and set the script.
3548 The prefixes "file://" and "js://" are supported to explicitly
3549 differentiate between the two.
3550
3551 Format: string
3552
3553 proxy.pac-url
3554 Alias: pac-url
3555
3556 PAC URL for obtaining PAC file.
3557
3558 Format: string
3559
3560 serial setting
3561 Serial Link Settings.
3562
3563 Properties:
3564
3565 serial.baud
3566 Speed to use for communication over the serial port. Note that this
3567 value usually has no effect for mobile broadband modems as they
3568 generally ignore speed settings and use the highest available
3569 speed.
3570
3571 Format: uint32
3572
3573 serial.bits
3574 Byte-width of the serial communication. The 8 in "8n1" for example.
3575
3576 Format: uint32
3577
3578 serial.parity
3579 Parity setting of the serial port.
3580
3581 Format: NMSettingSerialParity (byte)
3582
3583 serial.send-delay
3584 Time to delay between each byte sent to the modem, in microseconds.
3585
3586 Format: uint64
3587
3588 serial.stopbits
3589 Number of stop bits for communication on the serial port. Either 1
3590 or 2. The 1 in "8n1" for example.
3591
3592 Format: uint32
3593
3594 sriov setting
3595 SR-IOV settings.
3596
3597 Properties:
3598
3599 sriov.autoprobe-drivers
3600 Whether to autoprobe virtual functions by a compatible driver.
3601
3602 If set to NM_TERNARY_TRUE (1), the kernel will try to bind VFs to a
3603 compatible driver and if this succeeds a new network interface will
3604 be instantiated for each VF.
3605
3606 If set to NM_TERNARY_FALSE (0), VFs will not be claimed and no
3607 network interfaces will be created for them.
3608
3609 When set to NM_TERNARY_DEFAULT (-1), the global default is used; in
3610 case the global default is unspecified it is assumed to be
3611 NM_TERNARY_TRUE (1).
3612
3613 Format: NMTernary (int32)
3614
3615 sriov.total-vfs
3616 The total number of virtual functions to create.
3617
3618 Note that when the sriov setting is present NetworkManager enforces
3619 the number of virtual functions on the interface (also when it is
3620 zero) during activation and resets it upon deactivation. To prevent
3621 any changes to SR-IOV parameters don't add a sriov setting to the
3622 connection.
3623
3624 Format: uint32
3625
3626 sriov.vfs
3627 Array of virtual function descriptors.
3628
3629 Each VF descriptor is a dictionary mapping attribute names to
3630 GVariant values. The 'index' entry is mandatory for each VF.
3631
3632 When represented as string a VF is in the form:
3633
3634 "INDEX [ATTR=VALUE[ ATTR=VALUE]...]".
3635
3636 for example:
3637
3638 "2 mac=00:11:22:33:44:55 spoof-check=true".
3639
3640 Multiple VFs can be specified using a comma as separator.
3641 Currently, the following attributes are supported: mac,
3642 spoof-check, trust, min-tx-rate, max-tx-rate, vlans.
3643
3644 The "vlans" attribute is represented as a semicolon-separated list
3645 of VLAN descriptors, where each descriptor has the form
3646
3647 "ID[.PRIORITY[.PROTO]]".
3648
3649 PROTO can be either 'q' for 802.1Q (the default) or 'ad' for
3650 802.1ad.
3651
3652 Format: array of vardict
3653
3654 tc setting
3655 Linux Traffic Control Settings.
3656
3657 Properties:
3658
3659 tc.qdiscs
3660 Array of TC queueing disciplines. qdisc is a basic block in the
3661 Linux traffic control subsystem
3662
3663 Each qdisc can be specified by the following attributes:
3664
3665 handle HANDLE
3666 specifies the qdisc handle. A qdisc, which potentially can have
3667 children, gets assigned a major number, called a 'handle',
3668 leaving the minor number namespace available for classes. The
3669 handle is expressed as '10:'. It is customary to explicitly
3670 assign a handle to qdiscs expected to have children.
3671
3672 parent HANDLE
3673 specifies the handle of the parent qdisc the current qdisc must
3674 be attached to.
3675
3676 root
3677 specifies that the qdisc is attached to the root of device.
3678
3679 KIND
3680 this is the qdisc kind. NetworkManager currently supports the
3681 following kinds: fq_codel, sfq, tbf. Each qdisc kind has a
3682 different set of parameters, described below. There are also
3683 some kinds like pfifo, pfifo_fast, prio supported by
3684 NetworkManager but their parameters are not supported by
3685 NetworkManager.
3686
3687 Parameters for 'fq_codel':
3688
3689 limit U32
3690 the hard limit on the real queue size. When this limit is
3691 reached, incoming packets are dropped. Default is 10240
3692 packets.
3693
3694 memory_limit U32
3695 sets a limit on the total number of bytes that can be queued in
3696 this FQ-CoDel instance. The lower of the packet limit of the
3697 limit parameter and the memory limit will be enforced. Default
3698 is 32 MB.
3699
3700 flows U32
3701 the number of flows into which the incoming packets are
3702 classified. Due to the stochastic nature of hashing, multiple
3703 flows may end up being hashed into the same slot. Newer flows
3704 have priority over older ones. This parameter can be set only
3705 at load time since memory has to be allocated for the hash
3706 table. Default value is 1024.
3707
3708 target U32
3709 the acceptable minimum standing/persistent queue delay. This
3710 minimum delay is identified by tracking the local minimum queue
3711 delay that packets experience. The unit of measurement is
3712 microsecond(us). Default value is 5ms.
3713
3714 interval U32
3715 used to ensure that the measured minimum delay does not become
3716 too stale. The minimum delay must be experienced in the last
3717 epoch of length .B interval. It should be set on the order of
3718 the worst-case RTT through the bottleneck to give endpoints
3719 sufficient time to react. Default value is 100ms.
3720
3721 quantum U32
3722 the number of bytes used as 'deficit' in the fair queuing
3723 algorithm. Default is set to 1514 bytes which corresponds to
3724 the Ethernet MTU plus the hardware header length of 14 bytes.
3725
3726 ecn BOOL
3727 can be used to mark packets instead of dropping them. ecn is
3728 turned on by default.
3729
3730 ce_threshold U32
3731 sets a threshold above which all packets are marked with ECN
3732 Congestion Experienced. This is useful for DCTCP-style
3733 congestion control algorithms that require marking at very
3734 shallow queueing thresholds.
3735
3736 Parameters for 'sfq':
3737
3738 divisor U32
3739 can be used to set a different hash table size, available from
3740 kernel 2.6.39 onwards. The specified divisor must be a power of
3741 two and cannot be larger than 65536. Default value: 1024.
3742
3743 limit U32
3744 Upper limit of the SFQ. Can be used to reduce the default
3745 length of 127 packets.
3746
3747 depth U32
3748 Limit of packets per flow. Default to 127 and can be lowered.
3749
3750 perturb_period U32
3751 Interval in seconds for queue algorithm perturbation. Defaults
3752 to 0, which means that no perturbation occurs. Do not set too
3753 low for each perturbation may cause some packet reordering or
3754 losses. Advised value: 60 This value has no effect when
3755 external flow classification is used. Its better to increase
3756 divisor value to lower risk of hash collisions.
3757
3758 quantum U32
3759 Amount of bytes a flow is allowed to dequeue during a round of
3760 the round robin process. Defaults to the MTU of the interface
3761 which is also the advised value and the minimum value.
3762
3763 flows U32
3764 Default value is 127.
3765
3766 Parameters for 'tbf':
3767
3768 rate U64
3769 Bandwidth or rate. These parameters accept a floating point
3770 number, possibly followed by either a unit (both SI and IEC
3771 units supported), or a float followed by a percent character to
3772 specify the rate as a percentage of the device's speed.
3773
3774 burst U32
3775 Also known as buffer or maxburst. Size of the bucket, in bytes.
3776 This is the maximum amount of bytes that tokens can be
3777 available for instantaneously. In general, larger shaping rates
3778 require a larger buffer. For 10mbit/s on Intel, you need at
3779 least 10kbyte buffer if you want to reach your configured rate!
3780
3781 If your buffer is too small, packets may be dropped because
3782 more tokens arrive per timer tick than fit in your bucket. The
3783 minimum buffer size can be calculated by dividing the rate by
3784 HZ.
3785
3786 Token usage calculations are performed using a table which by
3787 default has a resolution of 8 packets. This resolution can be
3788 changed by specifying the cell size with the burst. For
3789 example, to specify a 6000 byte buffer with a 16 byte cell
3790 size, set a burst of 6000/16. You will probably never have to
3791 set this. Must be an integral power of 2.
3792
3793 limit U32
3794 Limit is the number of bytes that can be queued waiting for
3795 tokens to become available.
3796
3797 latency U32
3798 specifies the maximum amount of time a packet can sit in the
3799 TBF. The latency calculation takes into account the size of the
3800 bucket, the rate and possibly the peakrate (if set). The
3801 latency and limit are mutually exclusive.
3802
3803 Format: GPtrArray(NMTCQdisc)
3804
3805 tc.tfilters
3806 Array of TC traffic filters. Traffic control can manage the packet
3807 content during classification by using filters.
3808
3809 Each tfilters can be specified by the following attributes:
3810
3811 handle HANDLE
3812 specifies the tfilters handle. A filter is used by a classful
3813 qdisc to determine in which class a packet will be enqueued. It
3814 is important to notice that filters reside within qdiscs.
3815 Therefore, see qdiscs handle for detailed information.
3816
3817 parent HANDLE
3818 specifies the handle of the parent qdisc the current qdisc must
3819 be attached to.
3820
3821 root
3822 specifies that the qdisc is attached to the root of device.
3823
3824 KIND
3825 this is the tfilters kind. NetworkManager currently supports
3826 following kinds: mirred, simple. Each filter kind has a
3827 different set of actions, described below. There are also some
3828 other kinds like matchall, basic, u32 supported by
3829 NetworkManager.
3830
3831 Actions for 'mirred':
3832
3833 egress bool
3834 Define whether the packet should exit from the interface.
3835
3836 ingress bool
3837 Define whether the packet should come into the interface.
3838
3839 mirror bool
3840 Define whether the packet should be copied to the destination
3841 space.
3842
3843 redirect bool
3844 Define whether the packet should be moved to the destination
3845 space.
3846
3847 Action for 'simple':
3848
3849 sdata char[32]
3850 The actual string to print.
3851
3852 Format: GPtrArray(NMTCTfilter)
3853
3854 team setting
3855 Teaming Settings.
3856
3857 Properties:
3858
3859 team.config
3860 Alias: config
3861
3862 The JSON configuration for the team network interface. The property
3863 should contain raw JSON configuration data suitable for teamd,
3864 because the value is passed directly to teamd. If not specified,
3865 the default configuration is used. See man teamd.conf for the
3866 format details.
3867
3868 Format: string
3869
3870 team.link-watchers
3871 Link watchers configuration for the connection: each link watcher
3872 is defined by a dictionary, whose keys depend upon the selected
3873 link watcher. Available link watchers are 'ethtool', 'nsna_ping'
3874 and 'arp_ping' and it is specified in the dictionary with the key
3875 'name'. Available keys are: ethtool: 'delay-up', 'delay-down',
3876 'init-wait'; nsna_ping: 'init-wait', 'interval', 'missed-max',
3877 'target-host'; arp_ping: all the ones in nsna_ping and
3878 'source-host', 'validate-active', 'validate-inactive',
3879 'send-always'. See teamd.conf man for more details.
3880
3881 Format: array of vardict
3882
3883 team.mcast-rejoin-count
3884 Corresponds to the teamd mcast_rejoin.count.
3885
3886 Format: int32
3887
3888 team.mcast-rejoin-interval
3889 Corresponds to the teamd mcast_rejoin.interval.
3890
3891 Format: int32
3892
3893 team.notify-peers-count
3894 Corresponds to the teamd notify_peers.count.
3895
3896 Format: int32
3897
3898 team.notify-peers-interval
3899 Corresponds to the teamd notify_peers.interval.
3900
3901 Format: int32
3902
3903 team.runner
3904 Corresponds to the teamd runner.name. Permitted values are:
3905 "roundrobin", "broadcast", "activebackup", "loadbalance", "lacp",
3906 "random".
3907
3908 Format: string
3909
3910 team.runner-active
3911 Corresponds to the teamd runner.active.
3912
3913 Format: boolean
3914
3915 team.runner-agg-select-policy
3916 Corresponds to the teamd runner.agg_select_policy.
3917
3918 Format: string
3919
3920 team.runner-fast-rate
3921 Corresponds to the teamd runner.fast_rate.
3922
3923 Format: boolean
3924
3925 team.runner-hwaddr-policy
3926 Corresponds to the teamd runner.hwaddr_policy.
3927
3928 Format: string
3929
3930 team.runner-min-ports
3931 Corresponds to the teamd runner.min_ports.
3932
3933 Format: int32
3934
3935 team.runner-sys-prio
3936 Corresponds to the teamd runner.sys_prio.
3937
3938 Format: int32
3939
3940 team.runner-tx-balancer
3941 Corresponds to the teamd runner.tx_balancer.name.
3942
3943 Format: string
3944
3945 team.runner-tx-balancer-interval
3946 Corresponds to the teamd runner.tx_balancer.interval.
3947
3948 Format: int32
3949
3950 team.runner-tx-hash
3951 Corresponds to the teamd runner.tx_hash.
3952
3953 Format: array of string
3954
3955 team-port setting
3956 Team Port Settings.
3957
3958 Properties:
3959
3960 team-port.config
3961 Alias: config
3962
3963 The JSON configuration for the team port. The property should
3964 contain raw JSON configuration data suitable for teamd, because the
3965 value is passed directly to teamd. If not specified, the default
3966 configuration is used. See man teamd.conf for the format details.
3967
3968 Format: string
3969
3970 team-port.lacp-key
3971 Corresponds to the teamd ports.PORTIFNAME.lacp_key.
3972
3973 Format: int32
3974
3975 team-port.lacp-prio
3976 Corresponds to the teamd ports.PORTIFNAME.lacp_prio.
3977
3978 Format: int32
3979
3980 team-port.link-watchers
3981 Link watchers configuration for the connection: each link watcher
3982 is defined by a dictionary, whose keys depend upon the selected
3983 link watcher. Available link watchers are 'ethtool', 'nsna_ping'
3984 and 'arp_ping' and it is specified in the dictionary with the key
3985 'name'. Available keys are: ethtool: 'delay-up', 'delay-down',
3986 'init-wait'; nsna_ping: 'init-wait', 'interval', 'missed-max',
3987 'target-host'; arp_ping: all the ones in nsna_ping and
3988 'source-host', 'validate-active', 'validate-inactive',
3989 'send-always'. See teamd.conf man for more details.
3990
3991 Format: array of vardict
3992
3993 team-port.prio
3994 Corresponds to the teamd ports.PORTIFNAME.prio.
3995
3996 Format: int32
3997
3998 team-port.queue-id
3999 Corresponds to the teamd ports.PORTIFNAME.queue_id. When set to -1
4000 means the parameter is skipped from the json config.
4001
4002 Format: int32
4003
4004 team-port.sticky
4005 Corresponds to the teamd ports.PORTIFNAME.sticky.
4006
4007 Format: boolean
4008
4009 tun setting
4010 Tunnel Settings.
4011
4012 Properties:
4013
4014 tun.group
4015 Alias: group
4016
4017 The group ID which will own the device. If set to NULL everyone
4018 will be able to use the device.
4019
4020 Format: string
4021
4022 tun.mode
4023 Alias: mode
4024
4025 The operating mode of the virtual device. Allowed values are
4026 NM_SETTING_TUN_MODE_TUN (1) to create a layer 3 device and
4027 NM_SETTING_TUN_MODE_TAP (2) to create an Ethernet-like layer 2 one.
4028
4029 Format: uint32
4030
4031 tun.multi-queue
4032 Alias: multi-queue
4033
4034 If the property is set to TRUE, the interface will support multiple
4035 file descriptors (queues) to parallelize packet sending or
4036 receiving. Otherwise, the interface will only support a single
4037 queue.
4038
4039 Format: boolean
4040
4041 tun.owner
4042 Alias: owner
4043
4044 The user ID which will own the device. If set to NULL everyone will
4045 be able to use the device.
4046
4047 Format: string
4048
4049 tun.pi
4050 Alias: pi
4051
4052 If TRUE the interface will prepend a 4 byte header describing the
4053 physical interface to the packets.
4054
4055 Format: boolean
4056
4057 tun.vnet-hdr
4058 Alias: vnet-hdr
4059
4060 If TRUE the IFF_VNET_HDR the tunnel packets will include a virtio
4061 network header.
4062
4063 Format: boolean
4064
4065 vlan setting
4066 VLAN Settings.
4067
4068 Properties:
4069
4070 vlan.egress-priority-map
4071 Alias: egress
4072
4073 For outgoing packets, a list of mappings from Linux SKB priorities
4074 to 802.1p priorities. The mapping is given in the format "from:to"
4075 where both "from" and "to" are unsigned integers, ie "7:3".
4076
4077 Format: array of string
4078
4079 vlan.flags
4080 Alias: flags
4081
4082 One or more flags which control the behavior and features of the
4083 VLAN interface. Flags include NM_VLAN_FLAG_REORDER_HEADERS (0x1)
4084 (reordering of output packet headers), NM_VLAN_FLAG_GVRP (0x2) (use
4085 of the GVRP protocol), and NM_VLAN_FLAG_LOOSE_BINDING (0x4) (loose
4086 binding of the interface to its master device's operating state).
4087 NM_VLAN_FLAG_MVRP (0x8) (use of the MVRP protocol).
4088
4089 The default value of this property is NM_VLAN_FLAG_REORDER_HEADERS,
4090 but it used to be 0. To preserve backward compatibility, the
4091 default-value in the D-Bus API continues to be 0 and a missing
4092 property on D-Bus is still considered as 0.
4093
4094 Format: NMVlanFlags (uint32)
4095
4096 vlan.id
4097 Alias: id
4098
4099 The VLAN identifier that the interface created by this connection
4100 should be assigned. The valid range is from 0 to 4094, without the
4101 reserved id 4095.
4102
4103 Format: uint32
4104
4105 vlan.ingress-priority-map
4106 Alias: ingress
4107
4108 For incoming packets, a list of mappings from 802.1p priorities to
4109 Linux SKB priorities. The mapping is given in the format "from:to"
4110 where both "from" and "to" are unsigned integers, ie "7:3".
4111
4112 Format: array of string
4113
4114 vlan.parent
4115 Alias: dev
4116
4117 If given, specifies the parent interface name or parent connection
4118 UUID from which this VLAN interface should be created. If this
4119 property is not specified, the connection must contain an
4120 "802-3-ethernet" setting with a "mac-address" property.
4121
4122 Format: string
4123
4124 vlan.protocol
4125 Specifies the VLAN protocol to use for encapsulation.
4126
4127 Supported values are: '802.1Q', '802.1ad'. If not specified the
4128 default value is '802.1Q'.
4129
4130 Format: string
4131
4132 vpn setting
4133 VPN Settings.
4134
4135 Properties:
4136
4137 vpn.data
4138 Dictionary of key/value pairs of VPN plugin specific data. Both
4139 keys and values must be strings.
4140
4141 Format: dict of string to string
4142
4143 vpn.persistent
4144 If the VPN service supports persistence, and this property is TRUE,
4145 the VPN will attempt to stay connected across link changes and
4146 outages, until explicitly disconnected.
4147
4148 Format: boolean
4149
4150 vpn.secrets
4151 Dictionary of key/value pairs of VPN plugin specific secrets like
4152 passwords or private keys. Both keys and values must be strings.
4153
4154 Format: dict of string to string
4155
4156 vpn.service-type
4157 Alias: vpn-type
4158
4159 D-Bus service name of the VPN plugin that this setting uses to
4160 connect to its network. i.e. org.freedesktop.NetworkManager.vpnc
4161 for the vpnc plugin.
4162
4163 Format: string
4164
4165 vpn.timeout
4166 Timeout for the VPN service to establish the connection. Some
4167 services may take quite a long time to connect. Value of 0 means a
4168 default timeout, which is 60 seconds (unless overridden by
4169 vpn.timeout in configuration file). Values greater than zero mean
4170 timeout in seconds.
4171
4172 Format: uint32
4173
4174 vpn.user-name
4175 Alias: user
4176
4177 If the VPN connection requires a user name for authentication, that
4178 name should be provided here. If the connection is available to
4179 more than one user, and the VPN requires each user to supply a
4180 different name, then leave this property empty. If this property is
4181 empty, NetworkManager will automatically supply the username of the
4182 user which requested the VPN connection.
4183
4184 Format: string
4185
4186 vrf setting
4187 VRF settings.
4188
4189 Properties:
4190
4191 vrf.table
4192 Alias: table
4193
4194 The routing table for this VRF.
4195
4196 Format: uint32
4197
4198 vxlan setting
4199 VXLAN Settings.
4200
4201 Properties:
4202
4203 vxlan.ageing
4204 Specifies the lifetime in seconds of FDB entries learnt by the
4205 kernel.
4206
4207 Format: uint32
4208
4209 vxlan.destination-port
4210 Alias: destination-port
4211
4212 Specifies the UDP destination port to communicate to the remote
4213 VXLAN tunnel endpoint.
4214
4215 Format: uint32
4216
4217 vxlan.id
4218 Alias: id
4219
4220 Specifies the VXLAN Network Identifier (or VXLAN Segment
4221 Identifier) to use.
4222
4223 Format: uint32
4224
4225 vxlan.l2-miss
4226 Specifies whether netlink LL ADDR miss notifications are generated.
4227
4228 Format: boolean
4229
4230 vxlan.l3-miss
4231 Specifies whether netlink IP ADDR miss notifications are generated.
4232
4233 Format: boolean
4234
4235 vxlan.learning
4236 Specifies whether unknown source link layer addresses and IP
4237 addresses are entered into the VXLAN device forwarding database.
4238
4239 Format: boolean
4240
4241 vxlan.limit
4242 Specifies the maximum number of FDB entries. A value of zero means
4243 that the kernel will store unlimited entries.
4244
4245 Format: uint32
4246
4247 vxlan.local
4248 Alias: local
4249
4250 If given, specifies the source IP address to use in outgoing
4251 packets.
4252
4253 Format: string
4254
4255 vxlan.parent
4256 Alias: dev
4257
4258 If given, specifies the parent interface name or parent connection
4259 UUID.
4260
4261 Format: string
4262
4263 vxlan.proxy
4264 Specifies whether ARP proxy is turned on.
4265
4266 Format: boolean
4267
4268 vxlan.remote
4269 Alias: remote
4270
4271 Specifies the unicast destination IP address to use in outgoing
4272 packets when the destination link layer address is not known in the
4273 VXLAN device forwarding database, or the multicast IP address to
4274 join.
4275
4276 Format: string
4277
4278 vxlan.rsc
4279 Specifies whether route short circuit is turned on.
4280
4281 Format: boolean
4282
4283 vxlan.source-port-max
4284 Alias: source-port-max
4285
4286 Specifies the maximum UDP source port to communicate to the remote
4287 VXLAN tunnel endpoint.
4288
4289 Format: uint32
4290
4291 vxlan.source-port-min
4292 Alias: source-port-min
4293
4294 Specifies the minimum UDP source port to communicate to the remote
4295 VXLAN tunnel endpoint.
4296
4297 Format: uint32
4298
4299 vxlan.tos
4300 Specifies the TOS value to use in outgoing packets.
4301
4302 Format: uint32
4303
4304 vxlan.ttl
4305 Specifies the time-to-live value to use in outgoing packets.
4306
4307 Format: uint32
4308
4309 wifi-p2p setting
4310 Wi-Fi P2P Settings.
4311
4312 Properties:
4313
4314 wifi-p2p.peer
4315 Alias: peer
4316
4317 The P2P device that should be connected to. Currently, this is the
4318 only way to create or join a group.
4319
4320 Format: string
4321
4322 wifi-p2p.wfd-ies
4323 The Wi-Fi Display (WFD) Information Elements (IEs) to set.
4324
4325 Wi-Fi Display requires a protocol specific information element to
4326 be set in certain Wi-Fi frames. These can be specified here for the
4327 purpose of establishing a connection. This setting is only useful
4328 when implementing a Wi-Fi Display client.
4329
4330 Format: byte array
4331
4332 wifi-p2p.wps-method
4333 Flags indicating which mode of WPS is to be used.
4334
4335 There's little point in changing the default setting as
4336 NetworkManager will automatically determine the best method to use.
4337
4338 Format: uint32
4339
4340 wimax setting
4341 WiMax Settings.
4342
4343 Properties:
4344
4345 wimax.mac-address
4346 Alias: mac
4347
4348 If specified, this connection will only apply to the WiMAX device
4349 whose MAC address matches. This property does not change the MAC
4350 address of the device (known as MAC spoofing).
4351
4352 This property is deprecated since version 1.2. WiMAX is no longer
4353 supported.
4354
4355 Format: byte array
4356
4357 wimax.network-name
4358 Alias: nsp
4359
4360 Network Service Provider (NSP) name of the WiMAX network this
4361 connection should use.
4362
4363 This property is deprecated since version 1.2. WiMAX is no longer
4364 supported.
4365
4366 Format: string
4367
4368 802-3-ethernet setting
4369 Alias: ethernet
4370
4371 Wired Ethernet Settings.
4372
4373 Properties:
4374
4375 802-3-ethernet.accept-all-mac-addresses
4376 When TRUE, setup the interface to accept packets for all MAC
4377 addresses. This is enabling the kernel interface flag IFF_PROMISC.
4378 When FALSE, the interface will only accept the packets with the
4379 interface destination mac address or broadcast.
4380
4381 Format: NMTernary (int32)
4382
4383 802-3-ethernet.auto-negotiate
4384 When TRUE, enforce auto-negotiation of speed and duplex mode. If
4385 "speed" and "duplex" properties are both specified, only that
4386 single mode will be advertised and accepted during the link
4387 auto-negotiation process: this works only for BASE-T 802.3
4388 specifications and is useful for enforcing gigabits modes, as in
4389 these cases link negotiation is mandatory. When FALSE, "speed" and
4390 "duplex" properties should be both set or link configuration will
4391 be skipped.
4392
4393 Format: boolean
4394
4395 802-3-ethernet.cloned-mac-address
4396 Alias: cloned-mac
4397
4398 If specified, request that the device use this MAC address instead.
4399 This is known as MAC cloning or spoofing.
4400
4401 Beside explicitly specifying a MAC address, the special values
4402 "preserve", "permanent", "random" and "stable" are supported.
4403 "preserve" means not to touch the MAC address on activation.
4404 "permanent" means to use the permanent hardware address if the
4405 device has one (otherwise this is treated as "preserve"). "random"
4406 creates a random MAC address on each connect. "stable" creates a
4407 hashed MAC address based on connection.stable-id and a machine
4408 dependent key.
4409
4410 If unspecified, the value can be overwritten via global defaults,
4411 see manual of NetworkManager.conf. If still unspecified, it
4412 defaults to "preserve" (older versions of NetworkManager may use a
4413 different default value).
4414
4415 On D-Bus, this field is expressed as "assigned-mac-address" or the
4416 deprecated "cloned-mac-address".
4417
4418 Format: byte array
4419
4420 802-3-ethernet.duplex
4421 When a value is set, either "half" or "full", configures the device
4422 to use the specified duplex mode. If "auto-negotiate" is "yes" the
4423 specified duplex mode will be the only one advertised during link
4424 negotiation: this works only for BASE-T 802.3 specifications and is
4425 useful for enforcing gigabits modes, as in these cases link
4426 negotiation is mandatory. If the value is unset (the default), the
4427 link configuration will be either skipped (if "auto-negotiate" is
4428 "no", the default) or will be auto-negotiated (if "auto-negotiate"
4429 is "yes") and the local device will advertise all the supported
4430 duplex modes. Must be set together with the "speed" property if
4431 specified. Before specifying a duplex mode be sure your device
4432 supports it.
4433
4434 Format: string
4435
4436 802-3-ethernet.generate-mac-address-mask
4437 With "cloned-mac-address" setting "random" or "stable", by default
4438 all bits of the MAC address are scrambled and a
4439 locally-administered, unicast MAC address is created. This property
4440 allows to specify that certain bits are fixed. Note that the least
4441 significant bit of the first MAC address will always be unset to
4442 create a unicast MAC address.
4443
4444 If the property is NULL, it is eligible to be overwritten by a
4445 default connection setting. If the value is still NULL or an empty
4446 string, the default is to create a locally-administered, unicast
4447 MAC address.
4448
4449 If the value contains one MAC address, this address is used as
4450 mask. The set bits of the mask are to be filled with the current
4451 MAC address of the device, while the unset bits are subject to
4452 randomization. Setting "FE:FF:FF:00:00:00" means to preserve the
4453 OUI of the current MAC address and only randomize the lower 3 bytes
4454 using the "random" or "stable" algorithm.
4455
4456 If the value contains one additional MAC address after the mask,
4457 this address is used instead of the current MAC address to fill the
4458 bits that shall not be randomized. For example, a value of
4459 "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set the OUI of the MAC
4460 address to 68:F7:28, while the lower bits are randomized. A value
4461 of "02:00:00:00:00:00 00:00:00:00:00:00" will create a fully
4462 scrambled globally-administered, burned-in MAC address.
4463
4464 If the value contains more than one additional MAC addresses, one
4465 of them is chosen randomly. For example, "02:00:00:00:00:00
4466 00:00:00:00:00:00 02:00:00:00:00:00" will create a fully scrambled
4467 MAC address, randomly locally or globally administered.
4468
4469 Format: string
4470
4471 802-3-ethernet.mac-address
4472 Alias: mac
4473
4474 If specified, this connection will only apply to the Ethernet
4475 device whose permanent MAC address matches. This property does not
4476 change the MAC address of the device (i.e. MAC spoofing).
4477
4478 Format: byte array
4479
4480 802-3-ethernet.mac-address-blacklist
4481 If specified, this connection will never apply to the Ethernet
4482 device whose permanent MAC address matches an address in the list.
4483 Each MAC address is in the standard hex-digits-and-colons notation
4484 (00:11:22:33:44:55).
4485
4486 Format: array of string
4487
4488 802-3-ethernet.mtu
4489 Alias: mtu
4490
4491 If non-zero, only transmit packets of the specified size or
4492 smaller, breaking larger packets up into multiple Ethernet frames.
4493
4494 Format: uint32
4495
4496 802-3-ethernet.port
4497 Specific port type to use if the device supports multiple
4498 attachment methods. One of "tp" (Twisted Pair), "aui" (Attachment
4499 Unit Interface), "bnc" (Thin Ethernet) or "mii" (Media Independent
4500 Interface). If the device supports only one port type, this setting
4501 is ignored.
4502
4503 Format: string
4504
4505 802-3-ethernet.s390-nettype
4506 s390 network device type; one of "qeth", "lcs", or "ctc",
4507 representing the different types of virtual network devices
4508 available on s390 systems.
4509
4510 Format: string
4511
4512 802-3-ethernet.s390-options
4513 Dictionary of key/value pairs of s390-specific device options. Both
4514 keys and values must be strings. Allowed keys include "portno",
4515 "layer2", "portname", "protocol", among others. Key names must
4516 contain only alphanumeric characters (ie, [a-zA-Z0-9]).
4517
4518 Currently, NetworkManager itself does nothing with this
4519 information. However, s390utils ships a udev rule which parses this
4520 information and applies it to the interface.
4521
4522 Format: dict of string to string
4523
4524 802-3-ethernet.s390-subchannels
4525 Identifies specific subchannels that this network device uses for
4526 communication with z/VM or s390 host. Like the "mac-address"
4527 property for non-z/VM devices, this property can be used to ensure
4528 this connection only applies to the network device that uses these
4529 subchannels. The list should contain exactly 3 strings, and each
4530 string may only be composed of hexadecimal characters and the
4531 period (.) character.
4532
4533 Format: array of string
4534
4535 802-3-ethernet.speed
4536 When a value greater than 0 is set, configures the device to use
4537 the specified speed. If "auto-negotiate" is "yes" the specified
4538 speed will be the only one advertised during link negotiation: this
4539 works only for BASE-T 802.3 specifications and is useful for
4540 enforcing gigabit speeds, as in this case link negotiation is
4541 mandatory. If the value is unset (0, the default), the link
4542 configuration will be either skipped (if "auto-negotiate" is "no",
4543 the default) or will be auto-negotiated (if "auto-negotiate" is
4544 "yes") and the local device will advertise all the supported
4545 speeds. In Mbit/s, ie 100 == 100Mbit/s. Must be set together with
4546 the "duplex" property when non-zero. Before specifying a speed
4547 value be sure your device supports it.
4548
4549 Format: uint32
4550
4551 802-3-ethernet.wake-on-lan
4552 The NMSettingWiredWakeOnLan options to enable. Not all devices
4553 support all options. May be any combination of
4554 NM_SETTING_WIRED_WAKE_ON_LAN_PHY (0x2),
4555 NM_SETTING_WIRED_WAKE_ON_LAN_UNICAST (0x4),
4556 NM_SETTING_WIRED_WAKE_ON_LAN_MULTICAST (0x8),
4557 NM_SETTING_WIRED_WAKE_ON_LAN_BROADCAST (0x10),
4558 NM_SETTING_WIRED_WAKE_ON_LAN_ARP (0x20),
4559 NM_SETTING_WIRED_WAKE_ON_LAN_MAGIC (0x40) or the special values
4560 NM_SETTING_WIRED_WAKE_ON_LAN_DEFAULT (0x1) (to use global settings)
4561 and NM_SETTING_WIRED_WAKE_ON_LAN_IGNORE (0x8000) (to disable
4562 management of Wake-on-LAN in NetworkManager).
4563
4564 Format: uint32
4565
4566 802-3-ethernet.wake-on-lan-password
4567 If specified, the password used with magic-packet-based
4568 Wake-on-LAN, represented as an Ethernet MAC address. If NULL, no
4569 password will be required.
4570
4571 Format: string
4572
4573 wireguard setting
4574 WireGuard Settings.
4575
4576 Properties:
4577
4578 wireguard.fwmark
4579 The use of fwmark is optional and is by default off. Setting it to
4580 0 disables it. Otherwise, it is a 32-bit fwmark for outgoing
4581 packets.
4582
4583 Note that "ip4-auto-default-route" or "ip6-auto-default-route"
4584 enabled, implies to automatically choose a fwmark.
4585
4586 Format: uint32
4587
4588 wireguard.ip4-auto-default-route
4589 Whether to enable special handling of the IPv4 default route. If
4590 enabled, the IPv4 default route from wireguard.peer-routes will be
4591 placed to a dedicated routing-table and two policy routing rules
4592 will be added. The fwmark number is also used as routing-table for
4593 the default-route, and if fwmark is zero, an unused fwmark/table is
4594 chosen automatically. This corresponds to what wg-quick does with
4595 Table=auto and what WireGuard calls "Improved Rule-based Routing".
4596
4597 Note that for this automatism to work, you usually don't want to
4598 set ipv4.gateway, because that will result in a conflicting default
4599 route.
4600
4601 Leaving this at the default will enable this option automatically
4602 if ipv4.never-default is not set and there are any peers that use a
4603 default-route as allowed-ips. Since this automatism only makes
4604 sense if you also have a peer with an /0 allowed-ips, it is usually
4605 not necessary to enable this explicitly. However, you can disable
4606 it if you want to configure your own routing and rules.
4607
4608 Format: NMTernary (int32)
4609
4610 wireguard.ip6-auto-default-route
4611 Like ip4-auto-default-route, but for the IPv6 default route.
4612
4613 Format: NMTernary (int32)
4614
4615 wireguard.listen-port
4616 The listen-port. If listen-port is not specified, the port will be
4617 chosen randomly when the interface comes up.
4618
4619 Format: uint32
4620
4621 wireguard.mtu
4622 If non-zero, only transmit packets of the specified size or
4623 smaller, breaking larger packets up into multiple fragments.
4624
4625 If zero a default MTU is used. Note that contrary to wg-quick's MTU
4626 setting, this does not take into account the current routes at the
4627 time of activation.
4628
4629 Format: uint32
4630
4631 wireguard.peer-routes
4632 Whether to automatically add routes for the AllowedIPs ranges of
4633 the peers. If TRUE (the default), NetworkManager will automatically
4634 add routes in the routing tables according to ipv4.route-table and
4635 ipv6.route-table. Usually you want this automatism enabled. If
4636 FALSE, no such routes are added automatically. In this case, the
4637 user may want to configure static routes in ipv4.routes and
4638 ipv6.routes, respectively.
4639
4640 Note that if the peer's AllowedIPs is "0.0.0.0/0" or "::/0" and the
4641 profile's ipv4.never-default or ipv6.never-default setting is
4642 enabled, the peer route for this peer won't be added automatically.
4643
4644 Format: boolean
4645
4646 wireguard.private-key
4647 The 256 bit private-key in base64 encoding.
4648
4649 Format: string
4650
4651 wireguard.private-key-flags
4652 Flags indicating how to handle the "private-key" property.
4653
4654 See the section called “Secret flag types:” for flag values.
4655
4656 Format: NMSettingSecretFlags (uint32)
4657
4658 802-11-wireless setting
4659 Alias: wifi
4660
4661 Wi-Fi Settings.
4662
4663 Properties:
4664
4665 802-11-wireless.ap-isolation
4666 Configures AP isolation, which prevents communication between
4667 wireless devices connected to this AP. This property can be set to
4668 a value different from NM_TERNARY_DEFAULT (-1) only when the
4669 interface is configured in AP mode.
4670
4671 If set to NM_TERNARY_TRUE (1), devices are not able to communicate
4672 with each other. This increases security because it protects
4673 devices against attacks from other clients in the network. At the
4674 same time, it prevents devices to access resources on the same
4675 wireless networks as file shares, printers, etc.
4676
4677 If set to NM_TERNARY_FALSE (0), devices can talk to each other.
4678
4679 When set to NM_TERNARY_DEFAULT (-1), the global default is used; in
4680 case the global default is unspecified it is assumed to be
4681 NM_TERNARY_FALSE (0).
4682
4683 Format: NMTernary (int32)
4684
4685 802-11-wireless.band
4686 802.11 frequency band of the network. One of "a" for 5GHz 802.11a
4687 or "bg" for 2.4GHz 802.11. This will lock associations to the Wi-Fi
4688 network to the specific band, i.e. if "a" is specified, the device
4689 will not associate with the same network in the 2.4GHz band even if
4690 the network's settings are compatible. This setting depends on
4691 specific driver capability and may not work with all drivers.
4692
4693 Format: string
4694
4695 802-11-wireless.bssid
4696 If specified, directs the device to only associate with the given
4697 access point. This capability is highly driver dependent and not
4698 supported by all devices. Note: this property does not control the
4699 BSSID used when creating an Ad-Hoc network and is unlikely to in
4700 the future.
4701
4702 Locking a client profile to a certain BSSID will prevent roaming
4703 and also disable background scanning. That can be useful, if there
4704 is only one access point for the SSID.
4705
4706 Format: byte array
4707
4708 802-11-wireless.channel
4709 Wireless channel to use for the Wi-Fi connection. The device will
4710 only join (or create for Ad-Hoc networks) a Wi-Fi network on the
4711 specified channel. Because channel numbers overlap between bands,
4712 this property also requires the "band" property to be set.
4713
4714 Format: uint32
4715
4716 802-11-wireless.cloned-mac-address
4717 Alias: cloned-mac
4718
4719 If specified, request that the device use this MAC address instead.
4720 This is known as MAC cloning or spoofing.
4721
4722 Beside explicitly specifying a MAC address, the special values
4723 "preserve", "permanent", "random" and "stable" are supported.
4724 "preserve" means not to touch the MAC address on activation.
4725 "permanent" means to use the permanent hardware address of the
4726 device. "random" creates a random MAC address on each connect.
4727 "stable" creates a hashed MAC address based on connection.stable-id
4728 and a machine dependent key.
4729
4730 If unspecified, the value can be overwritten via global defaults,
4731 see manual of NetworkManager.conf. If still unspecified, it
4732 defaults to "preserve" (older versions of NetworkManager may use a
4733 different default value).
4734
4735 On D-Bus, this field is expressed as "assigned-mac-address" or the
4736 deprecated "cloned-mac-address".
4737
4738 Format: byte array
4739
4740 802-11-wireless.generate-mac-address-mask
4741 With "cloned-mac-address" setting "random" or "stable", by default
4742 all bits of the MAC address are scrambled and a
4743 locally-administered, unicast MAC address is created. This property
4744 allows to specify that certain bits are fixed. Note that the least
4745 significant bit of the first MAC address will always be unset to
4746 create a unicast MAC address.
4747
4748 If the property is NULL, it is eligible to be overwritten by a
4749 default connection setting. If the value is still NULL or an empty
4750 string, the default is to create a locally-administered, unicast
4751 MAC address.
4752
4753 If the value contains one MAC address, this address is used as
4754 mask. The set bits of the mask are to be filled with the current
4755 MAC address of the device, while the unset bits are subject to
4756 randomization. Setting "FE:FF:FF:00:00:00" means to preserve the
4757 OUI of the current MAC address and only randomize the lower 3 bytes
4758 using the "random" or "stable" algorithm.
4759
4760 If the value contains one additional MAC address after the mask,
4761 this address is used instead of the current MAC address to fill the
4762 bits that shall not be randomized. For example, a value of
4763 "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set the OUI of the MAC
4764 address to 68:F7:28, while the lower bits are randomized. A value
4765 of "02:00:00:00:00:00 00:00:00:00:00:00" will create a fully
4766 scrambled globally-administered, burned-in MAC address.
4767
4768 If the value contains more than one additional MAC addresses, one
4769 of them is chosen randomly. For example, "02:00:00:00:00:00
4770 00:00:00:00:00:00 02:00:00:00:00:00" will create a fully scrambled
4771 MAC address, randomly locally or globally administered.
4772
4773 Format: string
4774
4775 802-11-wireless.hidden
4776 If TRUE, indicates that the network is a non-broadcasting network
4777 that hides its SSID. This works both in infrastructure and AP mode.
4778
4779 In infrastructure mode, various workarounds are used for a more
4780 reliable discovery of hidden networks, such as probe-scanning the
4781 SSID. However, these workarounds expose inherent insecurities with
4782 hidden SSID networks, and thus hidden SSID networks should be used
4783 with caution.
4784
4785 In AP mode, the created network does not broadcast its SSID.
4786
4787 Note that marking the network as hidden may be a privacy issue for
4788 you (in infrastructure mode) or client stations (in AP mode), as
4789 the explicit probe-scans are distinctly recognizable on the air.
4790
4791 Format: boolean
4792
4793 802-11-wireless.mac-address
4794 Alias: mac
4795
4796 If specified, this connection will only apply to the Wi-Fi device
4797 whose permanent MAC address matches. This property does not change
4798 the MAC address of the device (i.e. MAC spoofing).
4799
4800 Format: byte array
4801
4802 802-11-wireless.mac-address-blacklist
4803 A list of permanent MAC addresses of Wi-Fi devices to which this
4804 connection should never apply. Each MAC address should be given in
4805 the standard hex-digits-and-colons notation (eg
4806 "00:11:22:33:44:55").
4807
4808 Format: array of string
4809
4810 802-11-wireless.mac-address-randomization
4811 One of NM_SETTING_MAC_RANDOMIZATION_DEFAULT (0) (never randomize
4812 unless the user has set a global default to randomize and the
4813 supplicant supports randomization),
4814 NM_SETTING_MAC_RANDOMIZATION_NEVER (1) (never randomize the MAC
4815 address), or NM_SETTING_MAC_RANDOMIZATION_ALWAYS (2) (always
4816 randomize the MAC address).
4817
4818 This property is deprecated since version 1.4. Use the
4819 "cloned-mac-address" property instead.
4820
4821 Format: uint32
4822
4823 802-11-wireless.mode
4824 Alias: mode
4825
4826 Wi-Fi network mode; one of "infrastructure", "mesh", "adhoc" or
4827 "ap". If blank, infrastructure is assumed.
4828
4829 Format: string
4830
4831 802-11-wireless.mtu
4832 Alias: mtu
4833
4834 If non-zero, only transmit packets of the specified size or
4835 smaller, breaking larger packets up into multiple Ethernet frames.
4836
4837 Format: uint32
4838
4839 802-11-wireless.powersave
4840 One of NM_SETTING_WIRELESS_POWERSAVE_DISABLE (2) (disable Wi-Fi
4841 power saving), NM_SETTING_WIRELESS_POWERSAVE_ENABLE (3) (enable
4842 Wi-Fi power saving), NM_SETTING_WIRELESS_POWERSAVE_IGNORE (1)
4843 (don't touch currently configure setting) or
4844 NM_SETTING_WIRELESS_POWERSAVE_DEFAULT (0) (use the globally
4845 configured value). All other values are reserved.
4846
4847 Format: uint32
4848
4849 802-11-wireless.seen-bssids
4850 A list of BSSIDs (each BSSID formatted as a MAC address like
4851 "00:11:22:33:44:55") that have been detected as part of the Wi-Fi
4852 network. NetworkManager internally tracks previously seen BSSIDs.
4853 The property is only meant for reading and reflects the BSSID list
4854 of NetworkManager. The changes you make to this property will not
4855 be preserved.
4856
4857 This is not a regular property that the user would configure.
4858 Instead, NetworkManager automatically sets the seen BSSIDs and
4859 tracks them internally in "/var/lib/NetworkManager/seen-bssids"
4860 file.
4861
4862 Format: array of string
4863
4864 802-11-wireless.ssid
4865 Alias: ssid
4866
4867 SSID of the Wi-Fi network. Must be specified.
4868
4869 Format: byte array
4870
4871 802-11-wireless.wake-on-wlan
4872 The NMSettingWirelessWakeOnWLan options to enable. Not all devices
4873 support all options. May be any combination of
4874 NM_SETTING_WIRELESS_WAKE_ON_WLAN_ANY (0x2),
4875 NM_SETTING_WIRELESS_WAKE_ON_WLAN_DISCONNECT (0x4),
4876 NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC (0x8),
4877 NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE (0x10),
4878 NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST (0x20),
4879 NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE (0x40),
4880 NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE (0x80),
4881 NM_SETTING_WIRELESS_WAKE_ON_WLAN_TCP (0x100) or the special values
4882 NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT (0x1) (to use global
4883 settings) and NM_SETTING_WIRELESS_WAKE_ON_WLAN_IGNORE (0x8000) (to
4884 disable management of Wake-on-LAN in NetworkManager).
4885
4886 Format: uint32
4887
4888 802-11-wireless-security setting
4889 Alias: wifi-sec
4890
4891 Wi-Fi Security Settings.
4892
4893 Properties:
4894
4895 802-11-wireless-security.auth-alg
4896 When WEP is used (ie, key-mgmt = "none" or "ieee8021x") indicate
4897 the 802.11 authentication algorithm required by the AP here. One of
4898 "open" for Open System, "shared" for Shared Key, or "leap" for
4899 Cisco LEAP. When using Cisco LEAP (ie, key-mgmt = "ieee8021x" and
4900 auth-alg = "leap") the "leap-username" and "leap-password"
4901 properties must be specified.
4902
4903 Format: string
4904
4905 802-11-wireless-security.fils
4906 Indicates whether Fast Initial Link Setup (802.11ai) must be
4907 enabled for the connection. One of
4908 NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) (use global default
4909 value), NM_SETTING_WIRELESS_SECURITY_FILS_DISABLE (1) (disable
4910 FILS), NM_SETTING_WIRELESS_SECURITY_FILS_OPTIONAL (2) (enable FILS
4911 if the supplicant and the access point support it) or
4912 NM_SETTING_WIRELESS_SECURITY_FILS_REQUIRED (3) (enable FILS and
4913 fail if not supported). When set to
4914 NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) and no global default
4915 is set, FILS will be optionally enabled.
4916
4917 Format: int32
4918
4919 802-11-wireless-security.group
4920 A list of group/broadcast encryption algorithms which prevents
4921 connections to Wi-Fi networks that do not utilize one of the
4922 algorithms in the list. For maximum compatibility leave this
4923 property empty. Each list element may be one of "wep40", "wep104",
4924 "tkip", or "ccmp".
4925
4926 Format: array of string
4927
4928 802-11-wireless-security.key-mgmt
4929 Key management used for the connection. One of "none" (WEP or no
4930 password protection), "ieee8021x" (Dynamic WEP), "owe"
4931 (Opportunistic Wireless Encryption), "wpa-psk" (WPA2 + WPA3
4932 personal), "sae" (WPA3 personal only), "wpa-eap" (WPA2 + WPA3
4933 enterprise) or "wpa-eap-suite-b-192" (WPA3 enterprise only).
4934
4935 This property must be set for any Wi-Fi connection that uses
4936 security.
4937
4938 Format: string
4939
4940 802-11-wireless-security.leap-password
4941 The login password for legacy LEAP connections (ie, key-mgmt =
4942 "ieee8021x" and auth-alg = "leap").
4943
4944 Format: string
4945
4946 802-11-wireless-security.leap-password-flags
4947 Flags indicating how to handle the "leap-password" property.
4948
4949 See the section called “Secret flag types:” for flag values.
4950
4951 Format: NMSettingSecretFlags (uint32)
4952
4953 802-11-wireless-security.leap-username
4954 The login username for legacy LEAP connections (ie, key-mgmt =
4955 "ieee8021x" and auth-alg = "leap").
4956
4957 Format: string
4958
4959 802-11-wireless-security.pairwise
4960 A list of pairwise encryption algorithms which prevents connections
4961 to Wi-Fi networks that do not utilize one of the algorithms in the
4962 list. For maximum compatibility leave this property empty. Each
4963 list element may be one of "tkip" or "ccmp".
4964
4965 Format: array of string
4966
4967 802-11-wireless-security.pmf
4968 Indicates whether Protected Management Frames (802.11w) must be
4969 enabled for the connection. One of
4970 NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) (use global default
4971 value), NM_SETTING_WIRELESS_SECURITY_PMF_DISABLE (1) (disable PMF),
4972 NM_SETTING_WIRELESS_SECURITY_PMF_OPTIONAL (2) (enable PMF if the
4973 supplicant and the access point support it) or
4974 NM_SETTING_WIRELESS_SECURITY_PMF_REQUIRED (3) (enable PMF and fail
4975 if not supported). When set to
4976 NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) and no global default
4977 is set, PMF will be optionally enabled.
4978
4979 Format: int32
4980
4981 802-11-wireless-security.proto
4982 List of strings specifying the allowed WPA protocol versions to
4983 use. Each element may be one "wpa" (allow WPA) or "rsn" (allow
4984 WPA2/RSN). If not specified, both WPA and RSN connections are
4985 allowed.
4986
4987 Format: array of string
4988
4989 802-11-wireless-security.psk
4990 Pre-Shared-Key for WPA networks. For WPA-PSK, it's either an ASCII
4991 passphrase of 8 to 63 characters that is (as specified in the
4992 802.11i standard) hashed to derive the actual key, or the key in
4993 form of 64 hexadecimal character. The WPA3-Personal networks use a
4994 passphrase of any length for SAE authentication.
4995
4996 Format: string
4997
4998 802-11-wireless-security.psk-flags
4999 Flags indicating how to handle the "psk" property.
5000
5001 See the section called “Secret flag types:” for flag values.
5002
5003 Format: NMSettingSecretFlags (uint32)
5004
5005 802-11-wireless-security.wep-key-flags
5006 Flags indicating how to handle the "wep-key0", "wep-key1",
5007 "wep-key2", and "wep-key3" properties.
5008
5009 See the section called “Secret flag types:” for flag values.
5010
5011 Format: NMSettingSecretFlags (uint32)
5012
5013 802-11-wireless-security.wep-key-type
5014 Controls the interpretation of WEP keys. Allowed values are
5015 NM_WEP_KEY_TYPE_KEY (1), in which case the key is either a 10- or
5016 26-character hexadecimal string, or a 5- or 13-character ASCII
5017 password; or NM_WEP_KEY_TYPE_PASSPHRASE (2), in which case the
5018 passphrase is provided as a string and will be hashed using the
5019 de-facto MD5 method to derive the actual WEP key.
5020
5021 Format: NMWepKeyType (uint32)
5022
5023 802-11-wireless-security.wep-key0
5024 Index 0 WEP key. This is the WEP key used in most networks. See the
5025 "wep-key-type" property for a description of how this key is
5026 interpreted.
5027
5028 Format: string
5029
5030 802-11-wireless-security.wep-key1
5031 Index 1 WEP key. This WEP index is not used by most networks. See
5032 the "wep-key-type" property for a description of how this key is
5033 interpreted.
5034
5035 Format: string
5036
5037 802-11-wireless-security.wep-key2
5038 Index 2 WEP key. This WEP index is not used by most networks. See
5039 the "wep-key-type" property for a description of how this key is
5040 interpreted.
5041
5042 Format: string
5043
5044 802-11-wireless-security.wep-key3
5045 Index 3 WEP key. This WEP index is not used by most networks. See
5046 the "wep-key-type" property for a description of how this key is
5047 interpreted.
5048
5049 Format: string
5050
5051 802-11-wireless-security.wep-tx-keyidx
5052 When static WEP is used (ie, key-mgmt = "none") and a non-default
5053 WEP key index is used by the AP, put that WEP key index here. Valid
5054 values are 0 (default key) through 3. Note that some consumer
5055 access points (like the Linksys WRT54G) number the keys 1 - 4.
5056
5057 Format: uint32
5058
5059 802-11-wireless-security.wps-method
5060 Flags indicating which mode of WPS is to be used if any.
5061
5062 There's little point in changing the default setting as
5063 NetworkManager will automatically determine whether it's feasible
5064 to start WPS enrollment from the Access Point capabilities.
5065
5066 WPS can be disabled by setting this property to a value of 1.
5067
5068 Format: uint32
5069
5070 wpan setting
5071 IEEE 802.15.4 (WPAN) MAC Settings.
5072
5073 Properties:
5074
5075 wpan.channel
5076 Alias: channel
5077
5078 IEEE 802.15.4 channel. A positive integer or -1, meaning "do not
5079 set, use whatever the device is already set to".
5080
5081 Format: int32
5082
5083 wpan.mac-address
5084 Alias: mac
5085
5086 If specified, this connection will only apply to the IEEE 802.15.4
5087 (WPAN) MAC layer device whose permanent MAC address matches.
5088
5089 Format: string
5090
5091 wpan.page
5092 Alias: page
5093
5094 IEEE 802.15.4 channel page. A positive integer or -1, meaning "do
5095 not set, use whatever the device is already set to".
5096
5097 Format: int32
5098
5099 wpan.pan-id
5100 Alias: pan-id
5101
5102 IEEE 802.15.4 Personal Area Network (PAN) identifier.
5103
5104 Format: uint32
5105
5106 wpan.short-address
5107 Alias: short-addr
5108
5109 Short IEEE 802.15.4 address to be used within a restricted
5110 environment.
5111
5112 Format: uint32
5113
5114 bond-port setting
5115 Bond Port Settings.
5116
5117 Properties:
5118
5119 bond-port.prio
5120 Alias: prio
5121
5122 The port priority for bond active port re-selection during
5123 failover. A higher number means a higher priority in selection. The
5124 primary port has the highest priority. This option is only
5125 compatible with active-backup, balance-tlb and balance-alb modes.
5126
5127 Format: int32
5128
5129 bond-port.queue-id
5130 Alias: queue-id
5131
5132 The queue ID of this bond port. The maximum value of queue ID is
5133 the number of TX queues currently active in device.
5134
5135 Format: uint32
5136
5137 hostname setting
5138 Hostname settings.
5139
5140 Properties:
5141
5142 hostname.from-dhcp
5143 Whether the system hostname can be determined from DHCP on this
5144 connection.
5145
5146 When set to NM_TERNARY_DEFAULT (-1), the value from global
5147 configuration is used. If the property doesn't have a value in the
5148 global configuration, NetworkManager assumes the value to be
5149 NM_TERNARY_TRUE (1).
5150
5151 Format: NMTernary (int32)
5152
5153 hostname.from-dns-lookup
5154 Whether the system hostname can be determined from reverse DNS
5155 lookup of addresses on this device.
5156
5157 When set to NM_TERNARY_DEFAULT (-1), the value from global
5158 configuration is used. If the property doesn't have a value in the
5159 global configuration, NetworkManager assumes the value to be
5160 NM_TERNARY_TRUE (1).
5161
5162 Format: NMTernary (int32)
5163
5164 hostname.only-from-default
5165 If set to NM_TERNARY_TRUE (1), NetworkManager attempts to get the
5166 hostname via DHCPv4/DHCPv6 or reverse DNS lookup on this device
5167 only when the device has the default route for the given address
5168 family (IPv4/IPv6).
5169
5170 If set to NM_TERNARY_FALSE (0), the hostname can be set from this
5171 device even if it doesn't have the default route.
5172
5173 When set to NM_TERNARY_DEFAULT (-1), the value from global
5174 configuration is used. If the property doesn't have a value in the
5175 global configuration, NetworkManager assumes the value to be
5176 NM_TERNARY_FALSE (0).
5177
5178 Format: NMTernary (int32)
5179
5180 hostname.priority
5181 The relative priority of this connection to determine the system
5182 hostname. A lower numerical value is better (higher priority). A
5183 connection with higher priority is considered before connections
5184 with lower priority.
5185
5186 If the value is zero, it can be overridden by a global value from
5187 NetworkManager configuration. If the property doesn't have a value
5188 in the global configuration, the value is assumed to be 100.
5189
5190 Negative values have the special effect of excluding other
5191 connections with a greater numerical priority value; so in presence
5192 of at least one negative priority, only connections with the lowest
5193 priority value will be used to determine the hostname.
5194
5195 Format: int32
5196
5197 link setting
5198 Link settings.
5199
5200 Properties:
5201
5202 link.gro-max-size
5203 The maximum size of a packet built by the Generic Receive Offload
5204 stack for this device. The value must be between 0 and 4294967295.
5205 When set to -1, the existing value is preserved.
5206
5207 Format: int64
5208
5209 link.gso-max-segments
5210 The maximum segments of a Generic Segment Offload packet the device
5211 should accept. The value must be between 0 and 4294967295. When set
5212 to -1, the existing value is preserved.
5213
5214 Format: int64
5215
5216 link.gso-max-size
5217 The maximum size of a Generic Segment Offload packet the device
5218 should accept. The value must be between 0 and 4294967295. When set
5219 to -1, the existing value is preserved.
5220
5221 Format: int64
5222
5223 link.tx-queue-length
5224 The size of the transmit queue for the device, in number of
5225 packets. The value must be between 0 and 4294967295. When set to
5226 -1, the existing value is preserved.
5227
5228 Format: int64
5229
5230 loopback setting
5231 Loopback Link Settings.
5232
5233 Properties:
5234
5235 loopback.mtu
5236 Alias: mtu
5237
5238 If non-zero, only transmit packets of the specified size or
5239 smaller, breaking larger packets up into multiple Ethernet frames.
5240
5241 Format: uint32
5242
5243 veth setting
5244 Veth Settings.
5245
5246 Properties:
5247
5248 veth.peer
5249 Alias: peer
5250
5251 This property specifies the peer interface name of the veth. This
5252 property is mandatory.
5253
5254 Format: string
5255
5256 Secret flag types:
5257 Each password or secret property in a setting has an associated flags
5258 property that describes how to handle that secret. The flags property
5259 is a bitfield that contains zero or more of the following values
5260 logically OR-ed together.
5261
5262 • 0x0 (none) - the system is responsible for providing and storing
5263 this secret. This may be required so that secrets are already
5264 available before the user logs in. It also commonly means that the
5265 secret will be stored in plain text on disk, accessible to root
5266 only. For example via the keyfile settings plugin as described in
5267 the "PLUGINS" section in NetworkManager.conf(5).
5268
5269 • 0x1 (agent-owned) - a user-session secret agent is responsible for
5270 providing and storing this secret; when it is required, agents will
5271 be asked to provide it.
5272
5273 • 0x2 (not-saved) - this secret should not be saved but should be
5274 requested from the user each time it is required. This flag should
5275 be used for One-Time-Pad secrets, PIN codes from hardware tokens,
5276 or if the user simply does not want to save the secret.
5277
5278 • 0x4 (not-required) - in some situations it cannot be automatically
5279 determined that a secret is required or not. This flag hints that
5280 the secret is not required and should not be requested from the
5281 user.
5282
5284 /etc/NetworkManager/system-connections or distro plugin-specific
5285 location
5286
5288 nmcli(1), nmcli-examples(7), NetworkManager(8), nm-settings-dbus(5),
5289 nm-settings-keyfile(5), NetworkManager.conf(5)
5290
5291
5292
5293NetworkManager 1.44.2 NM-SETTINGS-NMCLI(5)