1NM-SETTINGS-NMCLI(5)             Configuration            NM-SETTINGS-NMCLI(5)
2
3
4

NAME

6       nm-settings-nmcli - Description of settings and properties of
7       NetworkManager connection profiles for nmcli
8

DESCRIPTION

10       NetworkManager is based on a concept of connection profiles, sometimes
11       referred to as connections only. These connection profiles contain a
12       network configuration. When NetworkManager activates a connection
13       profile on a network device the configuration will be applied and an
14       active network connection will be established. Users are free to create
15       as many connection profiles as they see fit. Thus they are flexible in
16       having various network configurations for different networking needs.
17
18       NetworkManager provides an API for configuring connection profiles, for
19       activating them to configure the network, and inspecting the current
20       network configuration. The command line tool nmcli is a client
21       application to NetworkManager that uses this API. See nmcli(1) for
22       details.
23
24       With commands like nmcli connection add, nmcli connection modify and
25       nmcli connection show, connection profiles can be created, modified and
26       inspected. A profile consists of properties. On D-Bus this follows the
27       format as described by nm-settings-dbus(5), while this manual page
28       describes the settings format how they are expected by nmcli.
29
30       The settings and properties shown in tables below list all available
31       connection configuration options. However, note that not all settings
32       are applicable to all connection types.  nmcli connection editor has
33       also a built-in describe command that can display description of
34       particular settings and properties of this page.
35
36       The setting and property can be abbreviated provided they are unique.
37       The list below also shows aliases that can be used unqualified instead
38       of the full name. For example connection.interface-name and ifname
39       refer to the same property.
40
41   connection setting
42       General Connection Profile Settings.
43
44       Properties:
45
46       auth-retries
47           The number of retries for the authentication. Zero means to try
48           indefinitely; -1 means to use a global default. If the global
49           default is not set, the authentication retries for 3 times before
50           failing the connection. Currently, this only applies to 802-1x
51           authentication.
52
53           Format: int32
54
55       autoconnect
56           Alias: autoconnect
57
58           Whether or not the connection should be automatically connected by
59           NetworkManager when the resources for the connection are available.
60           TRUE to automatically activate the connection, FALSE to require
61           manual intervention to activate the connection. Note that
62           autoconnect is not implemented for VPN profiles. See "secondaries"
63           as an alternative to automatically connect VPN profiles.
64
65           Format: boolean
66
67       autoconnect-priority
68           The autoconnect priority. If the connection is set to autoconnect,
69           connections with higher priority will be preferred. Defaults to 0.
70           The higher number means higher priority.
71
72           Format: int32
73
74       autoconnect-retries
75           The number of times a connection should be tried when
76           autoactivating before giving up. Zero means forever, -1 means the
77           global default (4 times if not overridden). Setting this to 1 means
78           to try activation only once before blocking autoconnect. Note that
79           after a timeout, NetworkManager will try to autoconnect again.
80
81           Format: int32
82
83       autoconnect-slaves
84           Whether or not slaves of this connection should be automatically
85           brought up when NetworkManager activates this connection. This only
86           has a real effect for master connections. The properties
87           "autoconnect", "autoconnect-priority" and "autoconnect-retries" are
88           unrelated to this setting. The permitted values are: 0: leave slave
89           connections untouched, 1: activate all the slave connections with
90           this connection, -1: default. If -1 (default) is set, global
91           connection.autoconnect-slaves is read to determine the real value.
92           If it is default as well, this fallbacks to 0.
93
94           Format: NMSettingConnectionAutoconnectSlaves (int32)
95
96       gateway-ping-timeout
97           If greater than zero, delay success of IP addressing until either
98           the timeout is reached, or an IP gateway replies to a ping.
99
100           Format: uint32
101
102       id
103           Alias: con-name
104
105           A human readable unique identifier for the connection, like "Work
106           Wi-Fi" or "T-Mobile 3G".
107
108           Format: string
109
110       interface-name
111           Alias: ifname
112
113           The name of the network interface this connection is bound to. If
114           not set, then the connection can be attached to any interface of
115           the appropriate type (subject to restrictions imposed by other
116           settings). For software devices this specifies the name of the
117           created device. For connection types where interface names cannot
118           easily be made persistent (e.g. mobile broadband or USB Ethernet),
119           this property should not be used. Setting this property restricts
120           the interfaces a connection can be used with, and if interface
121           names change or are reordered the connection may be applied to the
122           wrong interface.
123
124           Format: string
125
126       lldp
127           Whether LLDP is enabled for the connection.
128
129           Format: int32
130
131       llmnr
132           Whether Link-Local Multicast Name Resolution (LLMNR) is enabled for
133           the connection. LLMNR is a protocol based on the Domain Name System
134           (DNS) packet format that allows both IPv4 and IPv6 hosts to perform
135           name resolution for hosts on the same local link. The permitted
136           values are: "yes" (2) register hostname and resolving for the
137           connection, "no" (0) disable LLMNR for the interface, "resolve" (1)
138           do not register hostname but allow resolving of LLMNR host names If
139           unspecified, "default" ultimately depends on the DNS plugin (which
140           for systemd-resolved currently means "yes"). This feature requires
141           a plugin which supports LLMNR. Otherwise, the setting has no
142           effect. One such plugin is dns-systemd-resolved.
143
144           Format: int32
145
146       master
147           Alias: master
148
149           Interface name of the master device or UUID of the master
150           connection.
151
152           Format: string
153
154       mdns
155           Whether mDNS is enabled for the connection. The permitted values
156           are: "yes" (2) register hostname and resolving for the connection,
157           "no" (0) disable mDNS for the interface, "resolve" (1) do not
158           register hostname but allow resolving of mDNS host names and
159           "default" (-1) to allow lookup of a global default in
160           NetworkManager.conf. If unspecified, "default" ultimately depends
161           on the DNS plugin (which for systemd-resolved currently means
162           "no"). This feature requires a plugin which supports mDNS.
163           Otherwise, the setting has no effect. One such plugin is
164           dns-systemd-resolved.
165
166           Format: int32
167
168       metered
169           Whether the connection is metered. When updating this property on a
170           currently activated connection, the change takes effect
171           immediately.
172
173           Format: NMMetered (int32)
174
175       mud-url
176           If configured, set to a Manufacturer Usage Description (MUD) URL
177           that points to manufacturer-recommended network policies for IoT
178           devices. It is transmitted as a DHCPv4 or DHCPv6 option. The value
179           must be a valid URL starting with "https://". The special value
180           "none" is allowed to indicate that no MUD URL is used. If the
181           per-profile value is unspecified (the default), a global connection
182           default gets consulted. If still unspecified, the ultimate default
183           is "none".
184
185           Format: string
186
187       multi-connect
188           Specifies whether the profile can be active multiple times at a
189           particular moment. The value is of type NMConnectionMultiConnect.
190
191           Format: int32
192
193       permissions
194           An array of strings defining what access a given user has to this
195           connection. If this is NULL or empty, all users are allowed to
196           access this connection; otherwise users are allowed if and only if
197           they are in this list. When this is not empty, the connection can
198           be active only when one of the specified users is logged into an
199           active session. Each entry is of the form "[type]:[id]:[reserved]";
200           for example, "user:dcbw:blah". At this time only the "user" [type]
201           is allowed. Any other values are ignored and reserved for future
202           use. [id] is the username that this permission refers to, which may
203           not contain the ":" character. Any [reserved] information present
204           must be ignored and is reserved for future use. All of [type],
205           [id], and [reserved] must be valid UTF-8.
206
207           Format: array of string
208
209       read-only
210           FALSE if the connection can be modified using the provided settings
211           service's D-Bus interface with the right privileges, or TRUE if the
212           connection is read-only and cannot be modified.
213
214           Format: boolean
215
216       secondaries
217           List of connection UUIDs that should be activated when the base
218           connection itself is activated. Currently, only VPN connections are
219           supported.
220
221           Format: array of string
222
223       slave-type
224           Alias: slave-type
225
226           Setting name of the device type of this slave's master connection
227           (eg, "bond"), or NULL if this connection is not a slave.
228
229           Format: string
230
231       stable-id
232           This represents the identity of the connection used for various
233           purposes. It allows to configure multiple profiles to share the
234           identity. Also, the stable-id can contain placeholders that are
235           substituted dynamically and deterministically depending on the
236           context. The stable-id is used for generating IPv6 stable private
237           addresses with ipv6.addr-gen-mode=stable-privacy. It is also used
238           to seed the generated cloned MAC address for
239           ethernet.cloned-mac-address=stable and
240           wifi.cloned-mac-address=stable. It is also used as DHCP client
241           identifier with ipv4.dhcp-client-id=stable and to derive the DHCP
242           DUID with ipv6.dhcp-duid=stable-[llt,ll,uuid]. Note that depending
243           on the context where it is used, other parameters are also seeded
244           into the generation algorithm. For example, a per-host key is
245           commonly also included, so that different systems end up generating
246           different IDs. Or with ipv6.addr-gen-mode=stable-privacy, also the
247           device's name is included, so that different interfaces yield
248           different addresses. The per-host key is the identity of your
249           machine and stored in /var/lib/NetworkManager/secret-key. The '$'
250           character is treated special to perform dynamic substitutions at
251           runtime. Currently, supported are "${CONNECTION}", "${DEVICE}",
252           "${MAC}", "${BOOT}", "${RANDOM}". These effectively create unique
253           IDs per-connection, per-device, per-boot, or every time. Note that
254           "${DEVICE}" corresponds to the interface name of the device and
255           "${MAC}" is the permanent MAC address of the device. Any
256           unrecognized patterns following '$' are treated verbatim, however
257           are reserved for future use. You are thus advised to avoid '$' or
258           escape it as "$$". For example, set it to
259           "${CONNECTION}-${BOOT}-${DEVICE}" to create a unique id for this
260           connection that changes with every reboot and differs depending on
261           the interface where the profile activates. If the value is unset, a
262           global connection default is consulted. If the value is still
263           unset, the default is similar to "${CONNECTION}" and uses a unique,
264           fixed ID for the connection.
265
266           Format: string
267
268       timestamp
269           The time, in seconds since the Unix Epoch, that the connection was
270           last _successfully_ fully activated. NetworkManager updates the
271           connection timestamp periodically when the connection is active to
272           ensure that an active connection has the latest timestamp. The
273           property is only meant for reading (changes to this property will
274           not be preserved).
275
276           Format: uint64
277
278       type
279           Alias: type
280
281           Base type of the connection. For hardware-dependent connections,
282           should contain the setting name of the hardware-type specific
283           setting (ie, "802-3-ethernet" or "802-11-wireless" or "bluetooth",
284           etc), and for non-hardware dependent connections like VPN or
285           otherwise, should contain the setting name of that setting type
286           (ie, "vpn" or "bridge", etc).
287
288           Format: string
289
290       uuid
291           A universally unique identifier for the connection, for example
292           generated with libuuid. It should be assigned when the connection
293           is created, and never changed as long as the connection still
294           applies to the same network. For example, it should not be changed
295           when the "id" property or NMSettingIP4Config changes, but might
296           need to be re-created when the Wi-Fi SSID, mobile broadband network
297           provider, or "type" property changes. The UUID must be in the
298           format "2815492f-7e56-435e-b2e9-246bd7cdc664" (ie, contains only
299           hexadecimal characters and "-").
300
301           Format: string
302
303       wait-device-timeout
304           Timeout in milliseconds to wait for device at startup. During boot,
305           devices may take a while to be detected by the driver. This
306           property will cause to delay NetworkManager-wait-online.service and
307           nm-online to give the device a chance to appear. This works by
308           waiting for the given timeout until a compatible device for the
309           profile is available and managed. The value 0 means no wait time.
310           The default value is -1, which currently has the same meaning as no
311           wait time.
312
313           Format: int32
314
315       zone
316           The trust level of a the connection. Free form case-insensitive
317           string (for example "Home", "Work", "Public"). NULL or unspecified
318           zone means the connection will be placed in the default zone as
319           defined by the firewall. When updating this property on a currently
320           activated connection, the change takes effect immediately.
321
322           Format: string
323
324   6lowpan setting
325       6LoWPAN Settings.
326
327       Properties:
328
329       parent
330           Alias: dev
331
332           If given, specifies the parent interface name or parent connection
333           UUID from which this 6LowPAN interface should be created.
334
335           Format: string
336
337   802-1x setting
338       IEEE 802.1x Authentication Settings.
339
340       Properties:
341
342       altsubject-matches
343           List of strings to be matched against the altSubjectName of the
344           certificate presented by the authentication server. If the list is
345           empty, no verification of the server certificate's altSubjectName
346           is performed.
347
348           Format: array of string
349
350       anonymous-identity
351           Anonymous identity string for EAP authentication methods. Used as
352           the unencrypted identity with EAP types that support different
353           tunneled identity like EAP-TTLS.
354
355           Format: string
356
357       auth-timeout
358           A timeout for the authentication. Zero means the global default; if
359           the global default is not set, the authentication timeout is 25
360           seconds.
361
362           Format: int32
363
364       ca-cert
365           Contains the CA certificate if used by the EAP method specified in
366           the "eap" property. Certificate data is specified using a "scheme";
367           three are currently supported: blob, path and pkcs#11 URL. When
368           using the blob scheme this property should be set to the
369           certificate's DER encoded data. When using the path scheme, this
370           property should be set to the full UTF-8 encoded path of the
371           certificate, prefixed with the string "file://" and ending with a
372           terminating NUL byte. This property can be unset even if the EAP
373           method supports CA certificates, but this allows man-in-the-middle
374           attacks and is NOT recommended. Note that enabling
375           NMSetting8021x:system-ca-certs will override this setting to use
376           the built-in path, if the built-in path is not a directory.
377
378           Format: byte array
379
380       ca-cert-password
381           The password used to access the CA certificate stored in "ca-cert"
382           property. Only makes sense if the certificate is stored on a
383           PKCS#11 token that requires a login.
384
385           Format: string
386
387       ca-cert-password-flags
388           Flags indicating how to handle the "ca-cert-password" property. See
389           the section called “Secret flag types:” for flag values.
390
391           Format: NMSettingSecretFlags (uint32)
392
393       ca-path
394           UTF-8 encoded path to a directory containing PEM or DER formatted
395           certificates to be added to the verification chain in addition to
396           the certificate specified in the "ca-cert" property. If
397           NMSetting8021x:system-ca-certs is enabled and the built-in CA path
398           is an existing directory, then this setting is ignored.
399
400           Format: string
401
402       client-cert
403           Contains the client certificate if used by the EAP method specified
404           in the "eap" property. Certificate data is specified using a
405           "scheme"; two are currently supported: blob and path. When using
406           the blob scheme (which is backwards compatible with NM 0.7.x) this
407           property should be set to the certificate's DER encoded data. When
408           using the path scheme, this property should be set to the full
409           UTF-8 encoded path of the certificate, prefixed with the string
410           "file://" and ending with a terminating NUL byte.
411
412           Format: byte array
413
414       client-cert-password
415           The password used to access the client certificate stored in
416           "client-cert" property. Only makes sense if the certificate is
417           stored on a PKCS#11 token that requires a login.
418
419           Format: string
420
421       client-cert-password-flags
422           Flags indicating how to handle the "client-cert-password" property.
423           See the section called “Secret flag types:” for flag values.
424
425           Format: NMSettingSecretFlags (uint32)
426
427       domain-match
428           Constraint for server domain name. If set, this list of FQDNs is
429           used as a match requirement for dNSName element(s) of the
430           certificate presented by the authentication server. If a matching
431           dNSName is found, this constraint is met. If no dNSName values are
432           present, this constraint is matched against SubjectName CN using
433           the same comparison. Multiple valid FQDNs can be passed as a ";"
434           delimited list.
435
436           Format: string
437
438       domain-suffix-match
439           Constraint for server domain name. If set, this FQDN is used as a
440           suffix match requirement for dNSName element(s) of the certificate
441           presented by the authentication server. If a matching dNSName is
442           found, this constraint is met. If no dNSName values are present,
443           this constraint is matched against SubjectName CN using same suffix
444           match comparison. Since version 1.24, multiple valid FQDNs can be
445           passed as a ";" delimited list.
446
447           Format: string
448
449       eap
450           The allowed EAP method to be used when authenticating to the
451           network with 802.1x. Valid methods are: "leap", "md5", "tls",
452           "peap", "ttls", "pwd", and "fast". Each method requires different
453           configuration using the properties of this setting; refer to
454           wpa_supplicant documentation for the allowed combinations.
455
456           Format: array of string
457
458       identity
459           Identity string for EAP authentication methods. Often the user's
460           user or login name.
461
462           Format: string
463
464       optional
465           Whether the 802.1X authentication is optional. If TRUE, the
466           activation will continue even after a timeout or an authentication
467           failure. Setting the property to TRUE is currently allowed only for
468           Ethernet connections. If set to FALSE, the activation can continue
469           only after a successful authentication.
470
471           Format: boolean
472
473       pac-file
474           UTF-8 encoded file path containing PAC for EAP-FAST.
475
476           Format: string
477
478       password
479           UTF-8 encoded password used for EAP authentication methods. If both
480           the "password" property and the "password-raw" property are
481           specified, "password" is preferred.
482
483           Format: string
484
485       password-flags
486           Flags indicating how to handle the "password" property. See the
487           section called “Secret flag types:” for flag values.
488
489           Format: NMSettingSecretFlags (uint32)
490
491       password-raw
492           Password used for EAP authentication methods, given as a byte array
493           to allow passwords in other encodings than UTF-8 to be used. If
494           both the "password" property and the "password-raw" property are
495           specified, "password" is preferred.
496
497           Format: byte array
498
499       password-raw-flags
500           Flags indicating how to handle the "password-raw" property. See the
501           section called “Secret flag types:” for flag values.
502
503           Format: NMSettingSecretFlags (uint32)
504
505       phase1-auth-flags
506           Specifies authentication flags to use in "phase 1" outer
507           authentication using NMSetting8021xAuthFlags options. The
508           individual TLS versions can be explicitly disabled. If a certain
509           TLS disable flag is not set, it is up to the supplicant to allow or
510           forbid it. The TLS options map to tls_disable_tlsv1_x settings. See
511           the wpa_supplicant documentation for more details.
512
513           Format: uint32
514
515       phase1-fast-provisioning
516           Enables or disables in-line provisioning of EAP-FAST credentials
517           when FAST is specified as the EAP method in the "eap" property.
518           Recognized values are "0" (disabled), "1" (allow unauthenticated
519           provisioning), "2" (allow authenticated provisioning), and "3"
520           (allow both authenticated and unauthenticated provisioning). See
521           the wpa_supplicant documentation for more details.
522
523           Format: string
524
525       phase1-peaplabel
526           Forces use of the new PEAP label during key derivation. Some RADIUS
527           servers may require forcing the new PEAP label to interoperate with
528           PEAPv1. Set to "1" to force use of the new PEAP label. See the
529           wpa_supplicant documentation for more details.
530
531           Format: string
532
533       phase1-peapver
534           Forces which PEAP version is used when PEAP is set as the EAP
535           method in the "eap" property. When unset, the version reported by
536           the server will be used. Sometimes when using older RADIUS servers,
537           it is necessary to force the client to use a particular PEAP
538           version. To do so, this property may be set to "0" or "1" to force
539           that specific PEAP version.
540
541           Format: string
542
543       phase2-altsubject-matches
544           List of strings to be matched against the altSubjectName of the
545           certificate presented by the authentication server during the inner
546           "phase 2" authentication. If the list is empty, no verification of
547           the server certificate's altSubjectName is performed.
548
549           Format: array of string
550
551       phase2-auth
552           Specifies the allowed "phase 2" inner authentication method when an
553           EAP method that uses an inner TLS tunnel is specified in the "eap"
554           property. For TTLS this property selects one of the supported
555           non-EAP inner methods: "pap", "chap", "mschap", "mschapv2" while
556           "phase2-autheap" selects an EAP inner method. For PEAP this selects
557           an inner EAP method, one of: "gtc", "otp", "md5" and "tls". Each
558           "phase 2" inner method requires specific parameters for successful
559           authentication; see the wpa_supplicant documentation for more
560           details. Both "phase2-auth" and "phase2-autheap" cannot be
561           specified.
562
563           Format: string
564
565       phase2-autheap
566           Specifies the allowed "phase 2" inner EAP-based authentication
567           method when TTLS is specified in the "eap" property. Recognized
568           EAP-based "phase 2" methods are "md5", "mschapv2", "otp", "gtc",
569           and "tls". Each "phase 2" inner method requires specific parameters
570           for successful authentication; see the wpa_supplicant documentation
571           for more details.
572
573           Format: string
574
575       phase2-ca-cert
576           Contains the "phase 2" CA certificate if used by the EAP method
577           specified in the "phase2-auth" or "phase2-autheap" properties.
578           Certificate data is specified using a "scheme"; three are currently
579           supported: blob, path and pkcs#11 URL. When using the blob scheme
580           this property should be set to the certificate's DER encoded data.
581           When using the path scheme, this property should be set to the full
582           UTF-8 encoded path of the certificate, prefixed with the string
583           "file://" and ending with a terminating NUL byte. This property can
584           be unset even if the EAP method supports CA certificates, but this
585           allows man-in-the-middle attacks and is NOT recommended. Note that
586           enabling NMSetting8021x:system-ca-certs will override this setting
587           to use the built-in path, if the built-in path is not a directory.
588
589           Format: byte array
590
591       phase2-ca-cert-password
592           The password used to access the "phase2" CA certificate stored in
593           "phase2-ca-cert" property. Only makes sense if the certificate is
594           stored on a PKCS#11 token that requires a login.
595
596           Format: string
597
598       phase2-ca-cert-password-flags
599           Flags indicating how to handle the "phase2-ca-cert-password"
600           property. See the section called “Secret flag types:” for flag
601           values.
602
603           Format: NMSettingSecretFlags (uint32)
604
605       phase2-ca-path
606           UTF-8 encoded path to a directory containing PEM or DER formatted
607           certificates to be added to the verification chain in addition to
608           the certificate specified in the "phase2-ca-cert" property. If
609           NMSetting8021x:system-ca-certs is enabled and the built-in CA path
610           is an existing directory, then this setting is ignored.
611
612           Format: string
613
614       phase2-client-cert
615           Contains the "phase 2" client certificate if used by the EAP method
616           specified in the "phase2-auth" or "phase2-autheap" properties.
617           Certificate data is specified using a "scheme"; two are currently
618           supported: blob and path. When using the blob scheme (which is
619           backwards compatible with NM 0.7.x) this property should be set to
620           the certificate's DER encoded data. When using the path scheme,
621           this property should be set to the full UTF-8 encoded path of the
622           certificate, prefixed with the string "file://" and ending with a
623           terminating NUL byte. This property can be unset even if the EAP
624           method supports CA certificates, but this allows man-in-the-middle
625           attacks and is NOT recommended.
626
627           Format: byte array
628
629       phase2-client-cert-password
630           The password used to access the "phase2" client certificate stored
631           in "phase2-client-cert" property. Only makes sense if the
632           certificate is stored on a PKCS#11 token that requires a login.
633
634           Format: string
635
636       phase2-client-cert-password-flags
637           Flags indicating how to handle the "phase2-client-cert-password"
638           property. See the section called “Secret flag types:” for flag
639           values.
640
641           Format: NMSettingSecretFlags (uint32)
642
643       phase2-domain-match
644           Constraint for server domain name. If set, this list of FQDNs is
645           used as a match requirement for dNSName element(s) of the
646           certificate presented by the authentication server during the inner
647           "phase 2" authentication. If a matching dNSName is found, this
648           constraint is met. If no dNSName values are present, this
649           constraint is matched against SubjectName CN using the same
650           comparison. Multiple valid FQDNs can be passed as a ";" delimited
651           list.
652
653           Format: string
654
655       phase2-domain-suffix-match
656           Constraint for server domain name. If set, this FQDN is used as a
657           suffix match requirement for dNSName element(s) of the certificate
658           presented by the authentication server during the inner "phase 2"
659           authentication. If a matching dNSName is found, this constraint is
660           met. If no dNSName values are present, this constraint is matched
661           against SubjectName CN using same suffix match comparison. Since
662           version 1.24, multiple valid FQDNs can be passed as a ";" delimited
663           list.
664
665           Format: string
666
667       phase2-private-key
668           Contains the "phase 2" inner private key when the "phase2-auth" or
669           "phase2-autheap" property is set to "tls". Key data is specified
670           using a "scheme"; two are currently supported: blob and path. When
671           using the blob scheme and private keys, this property should be set
672           to the key's encrypted PEM encoded data. When using private keys
673           with the path scheme, this property should be set to the full UTF-8
674           encoded path of the key, prefixed with the string "file://" and
675           ending with a terminating NUL byte. When using PKCS#12 format
676           private keys and the blob scheme, this property should be set to
677           the PKCS#12 data and the "phase2-private-key-password" property
678           must be set to password used to decrypt the PKCS#12 certificate and
679           key. When using PKCS#12 files and the path scheme, this property
680           should be set to the full UTF-8 encoded path of the key, prefixed
681           with the string "file://" and ending with a terminating NUL byte,
682           and as with the blob scheme the "phase2-private-key-password"
683           property must be set to the password used to decode the PKCS#12
684           private key and certificate.
685
686           Format: byte array
687
688       phase2-private-key-password
689           The password used to decrypt the "phase 2" private key specified in
690           the "phase2-private-key" property when the private key either uses
691           the path scheme, or is a PKCS#12 format key.
692
693           Format: string
694
695       phase2-private-key-password-flags
696           Flags indicating how to handle the "phase2-private-key-password"
697           property. See the section called “Secret flag types:” for flag
698           values.
699
700           Format: NMSettingSecretFlags (uint32)
701
702       phase2-subject-match
703           Substring to be matched against the subject of the certificate
704           presented by the authentication server during the inner "phase 2"
705           authentication. When unset, no verification of the authentication
706           server certificate's subject is performed. This property provides
707           little security, if any, and its use is deprecated in favor of
708           NMSetting8021x:phase2-domain-suffix-match.
709
710           Format: string
711
712       pin
713           PIN used for EAP authentication methods.
714
715           Format: string
716
717       pin-flags
718           Flags indicating how to handle the "pin" property. See the section
719           called “Secret flag types:” for flag values.
720
721           Format: NMSettingSecretFlags (uint32)
722
723       private-key
724           Contains the private key when the "eap" property is set to "tls".
725           Key data is specified using a "scheme"; two are currently
726           supported: blob and path. When using the blob scheme and private
727           keys, this property should be set to the key's encrypted PEM
728           encoded data. When using private keys with the path scheme, this
729           property should be set to the full UTF-8 encoded path of the key,
730           prefixed with the string "file://" and ending with a terminating
731           NUL byte. When using PKCS#12 format private keys and the blob
732           scheme, this property should be set to the PKCS#12 data and the
733           "private-key-password" property must be set to password used to
734           decrypt the PKCS#12 certificate and key. When using PKCS#12 files
735           and the path scheme, this property should be set to the full UTF-8
736           encoded path of the key, prefixed with the string "file://" and
737           ending with a terminating NUL byte, and as with the blob scheme the
738           "private-key-password" property must be set to the password used to
739           decode the PKCS#12 private key and certificate. WARNING:
740           "private-key" is not a "secret" property, and thus unencrypted
741           private key data using the BLOB scheme may be readable by
742           unprivileged users. Private keys should always be encrypted with a
743           private key password to prevent unauthorized access to unencrypted
744           private key data.
745
746           Format: byte array
747
748       private-key-password
749           The password used to decrypt the private key specified in the
750           "private-key" property when the private key either uses the path
751           scheme, or if the private key is a PKCS#12 format key.
752
753           Format: string
754
755       private-key-password-flags
756           Flags indicating how to handle the "private-key-password" property.
757           See the section called “Secret flag types:” for flag values.
758
759           Format: NMSettingSecretFlags (uint32)
760
761       subject-match
762           Substring to be matched against the subject of the certificate
763           presented by the authentication server. When unset, no verification
764           of the authentication server certificate's subject is performed.
765           This property provides little security, if any, and its use is
766           deprecated in favor of NMSetting8021x:domain-suffix-match.
767
768           Format: string
769
770       system-ca-certs
771           When TRUE, overrides the "ca-path" and "phase2-ca-path" properties
772           using the system CA directory specified at configure time with the
773           --system-ca-path switch. The certificates in this directory are
774           added to the verification chain in addition to any certificates
775           specified by the "ca-cert" and "phase2-ca-cert" properties. If the
776           path provided with --system-ca-path is rather a file name (bundle
777           of trusted CA certificates), it overrides "ca-cert" and
778           "phase2-ca-cert" properties instead (sets ca_cert/ca_cert2 options
779           for wpa_supplicant).
780
781           Format: boolean
782
783   adsl setting
784       ADSL Settings.
785
786       Properties:
787
788       encapsulation
789           Alias: encapsulation
790
791           Encapsulation of ADSL connection. Can be "vcmux" or "llc".
792
793           Format: string
794
795       password
796           Alias: password
797
798           Password used to authenticate with the ADSL service.
799
800           Format: string
801
802       password-flags
803           Flags indicating how to handle the "password" property. See the
804           section called “Secret flag types:” for flag values.
805
806           Format: NMSettingSecretFlags (uint32)
807
808       protocol
809           Alias: protocol
810
811           ADSL connection protocol. Can be "pppoa", "pppoe" or "ipoatm".
812
813           Format: string
814
815       username
816           Alias: username
817
818           Username used to authenticate with the ADSL service.
819
820           Format: string
821
822       vci
823           VCI of ADSL connection
824
825           Format: uint32
826
827       vpi
828           VPI of ADSL connection
829
830           Format: uint32
831
832   bluetooth setting
833       Bluetooth Settings.
834
835       Properties:
836
837       bdaddr
838           Alias: addr
839
840           The Bluetooth address of the device.
841
842           Format: byte array
843
844       type
845           Alias: bt-type
846
847           Either "dun" for Dial-Up Networking connections or "panu" for
848           Personal Area Networking connections to devices supporting the NAP
849           profile.
850
851           Format: string
852
853   bond setting
854       Bonding Settings.
855
856       Properties:
857
858       options
859           Dictionary of key/value pairs of bonding options. Both keys and
860           values must be strings. Option names must contain only alphanumeric
861           characters (ie, [a-zA-Z0-9]).
862
863           Format: dict of string to string
864
865   bridge setting
866       Bridging Settings.
867
868       Properties:
869
870       ageing-time
871           Alias: ageing-time
872
873           The Ethernet MAC address aging time, in seconds.
874
875           Format: uint32
876
877       forward-delay
878           Alias: forward-delay
879
880           The Spanning Tree Protocol (STP) forwarding delay, in seconds.
881
882           Format: uint32
883
884       group-address
885           If specified, The MAC address of the multicast group this bridge
886           uses for STP. The address must be a link-local address in standard
887           Ethernet MAC address format, ie an address of the form
888           01:80:C2:00:00:0X, with X in [0, 4..F]. If not specified the
889           default value is 01:80:C2:00:00:00.
890
891           Format: byte array
892
893       group-forward-mask
894           Alias: group-forward-mask
895
896           A mask of group addresses to forward. Usually, group addresses in
897           the range from 01:80:C2:00:00:00 to 01:80:C2:00:00:0F are not
898           forwarded according to standards. This property is a mask of 16
899           bits, each corresponding to a group address in that range that must
900           be forwarded. The mask can't have bits 0, 1 or 2 set because they
901           are used for STP, MAC pause frames and LACP.
902
903           Format: uint32
904
905       hello-time
906           Alias: hello-time
907
908           The Spanning Tree Protocol (STP) hello time, in seconds.
909
910           Format: uint32
911
912       mac-address
913           Alias: mac
914
915           If specified, the MAC address of bridge. When creating a new
916           bridge, this MAC address will be set. If this field is left
917           unspecified, the "ethernet.cloned-mac-address" is referred instead
918           to generate the initial MAC address. Note that setting
919           "ethernet.cloned-mac-address" anyway overwrites the MAC address of
920           the bridge later while activating the bridge. Hence, this property
921           is deprecated. Deprecated: 1
922
923           Format: byte array
924
925       max-age
926           Alias: max-age
927
928           The Spanning Tree Protocol (STP) maximum message age, in seconds.
929
930           Format: uint32
931
932       multicast-hash-max
933           Set maximum size of multicast hash table (value must be a power of
934           2).
935
936           Format: uint32
937
938       multicast-last-member-count
939           Set the number of queries the bridge will send before stopping
940           forwarding a multicast group after a "leave" message has been
941           received.
942
943           Format: uint32
944
945       multicast-last-member-interval
946           Set interval (in deciseconds) between queries to find remaining
947           members of a group, after a "leave" message is received.
948
949           Format: uint64
950
951       multicast-membership-interval
952           Set delay (in deciseconds) after which the bridge will leave a
953           group, if no membership reports for this group are received.
954
955           Format: uint64
956
957       multicast-querier
958           Enable or disable sending of multicast queries by the bridge. If
959           not specified the option is disabled.
960
961           Format: boolean
962
963       multicast-querier-interval
964           If no queries are seen after this delay (in deciseconds) has
965           passed, the bridge will start to send its own queries.
966
967           Format: uint64
968
969       multicast-query-interval
970           Interval (in deciseconds) between queries sent by the bridge after
971           the end of the startup phase.
972
973           Format: uint64
974
975       multicast-query-response-interval
976           Set the Max Response Time/Max Response Delay (in deciseconds) for
977           IGMP/MLD queries sent by the bridge.
978
979           Format: uint64
980
981       multicast-query-use-ifaddr
982           If enabled the bridge's own IP address is used as the source
983           address for IGMP queries otherwise the default of 0.0.0.0 is used.
984
985           Format: boolean
986
987       multicast-router
988           Sets bridge's multicast router. Multicast-snooping must be enabled
989           for this option to work. Supported values are: 'auto', 'disabled',
990           'enabled' to which kernel assigns the numbers 1, 0, and 2,
991           respectively. If not specified the default value is 'auto' (1).
992
993           Format: string
994
995       multicast-snooping
996           Alias: multicast-snooping
997
998           Controls whether IGMP snooping is enabled for this bridge. Note
999           that if snooping was automatically disabled due to hash collisions,
1000           the system may refuse to enable the feature until the collisions
1001           are resolved.
1002
1003           Format: boolean
1004
1005       multicast-startup-query-count
1006           Set the number of IGMP queries to send during startup phase.
1007
1008           Format: uint32
1009
1010       multicast-startup-query-interval
1011           Sets the time (in deciseconds) between queries sent out at startup
1012           to determine membership information.
1013
1014           Format: uint64
1015
1016       priority
1017           Alias: priority
1018
1019           Sets the Spanning Tree Protocol (STP) priority for this bridge.
1020           Lower values are "better"; the lowest priority bridge will be
1021           elected the root bridge.
1022
1023           Format: uint32
1024
1025       stp
1026           Alias: stp
1027
1028           Controls whether Spanning Tree Protocol (STP) is enabled for this
1029           bridge.
1030
1031           Format: boolean
1032
1033       vlan-default-pvid
1034           The default PVID for the ports of the bridge, that is the VLAN id
1035           assigned to incoming untagged frames.
1036
1037           Format: uint32
1038
1039       vlan-filtering
1040           Control whether VLAN filtering is enabled on the bridge.
1041
1042           Format: boolean
1043
1044       vlan-protocol
1045           If specified, the protocol used for VLAN filtering. Supported
1046           values are: '802.1Q', '802.1ad'. If not specified the default value
1047           is '802.1Q'.
1048
1049           Format: string
1050
1051       vlan-stats-enabled
1052           Controls whether per-VLAN stats accounting is enabled.
1053
1054           Format: boolean
1055
1056       vlans
1057           Array of bridge VLAN objects. In addition to the VLANs specified
1058           here, the bridge will also have the default-pvid VLAN configured by
1059           the bridge.vlan-default-pvid property. In nmcli the VLAN list can
1060           be specified with the following syntax: $vid [pvid] [untagged] [,
1061           $vid [pvid] [untagged]]... where $vid is either a single id between
1062           1 and 4094 or a range, represented as a couple of ids separated by
1063           a dash.
1064
1065           Format: array of vardict
1066
1067   bridge-port setting
1068       Bridge Port Settings.
1069
1070       Properties:
1071
1072       hairpin-mode
1073           Alias: hairpin
1074
1075           Enables or disables "hairpin mode" for the port, which allows
1076           frames to be sent back out through the port the frame was received
1077           on.
1078
1079           Format: boolean
1080
1081       path-cost
1082           Alias: path-cost
1083
1084           The Spanning Tree Protocol (STP) port cost for destinations via
1085           this port.
1086
1087           Format: uint32
1088
1089       priority
1090           Alias: priority
1091
1092           The Spanning Tree Protocol (STP) priority of this bridge port.
1093
1094           Format: uint32
1095
1096       vlans
1097           Array of bridge VLAN objects. In addition to the VLANs specified
1098           here, the port will also have the default-pvid VLAN configured on
1099           the bridge by the bridge.vlan-default-pvid property. In nmcli the
1100           VLAN list can be specified with the following syntax: $vid [pvid]
1101           [untagged] [, $vid [pvid] [untagged]]... where $vid is either a
1102           single id between 1 and 4094 or a range, represented as a couple of
1103           ids separated by a dash.
1104
1105           Format: array of vardict
1106
1107   cdma setting
1108       CDMA-based Mobile Broadband Settings.
1109
1110       Properties:
1111
1112       mtu
1113           If non-zero, only transmit packets of the specified size or
1114           smaller, breaking larger packets up into multiple frames.
1115
1116           Format: uint32
1117
1118       number
1119           The number to dial to establish the connection to the CDMA-based
1120           mobile broadband network, if any. If not specified, the default
1121           number (#777) is used when required.
1122
1123           Format: string
1124
1125       password
1126           Alias: password
1127
1128           The password used to authenticate with the network, if required.
1129           Many providers do not require a password, or accept any password.
1130           But if a password is required, it is specified here.
1131
1132           Format: string
1133
1134       password-flags
1135           Flags indicating how to handle the "password" property. See the
1136           section called “Secret flag types:” for flag values.
1137
1138           Format: NMSettingSecretFlags (uint32)
1139
1140       username
1141           Alias: user
1142
1143           The username used to authenticate with the network, if required.
1144           Many providers do not require a username, or accept any username.
1145           But if a username is required, it is specified here.
1146
1147           Format: string
1148
1149   dcb setting
1150       Data Center Bridging Settings.
1151
1152       Properties:
1153
1154       app-fcoe-flags
1155           Specifies the NMSettingDcbFlags for the DCB FCoE application. Flags
1156           may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1157           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1158           NM_SETTING_DCB_FLAG_WILLING (0x4).
1159
1160           Format: NMSettingDcbFlags (uint32)
1161
1162       app-fcoe-mode
1163           The FCoE controller mode; either "fabric" (default) or "vn2vn".
1164
1165           Format: string
1166
1167       app-fcoe-priority
1168           The highest User Priority (0 - 7) which FCoE frames should use, or
1169           -1 for default priority. Only used when the "app-fcoe-flags"
1170           property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1171
1172           Format: int32
1173
1174       app-fip-flags
1175           Specifies the NMSettingDcbFlags for the DCB FIP application. Flags
1176           may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1177           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1178           NM_SETTING_DCB_FLAG_WILLING (0x4).
1179
1180           Format: NMSettingDcbFlags (uint32)
1181
1182       app-fip-priority
1183           The highest User Priority (0 - 7) which FIP frames should use, or
1184           -1 for default priority. Only used when the "app-fip-flags"
1185           property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1186
1187           Format: int32
1188
1189       app-iscsi-flags
1190           Specifies the NMSettingDcbFlags for the DCB iSCSI application.
1191           Flags may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1192           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1193           NM_SETTING_DCB_FLAG_WILLING (0x4).
1194
1195           Format: NMSettingDcbFlags (uint32)
1196
1197       app-iscsi-priority
1198           The highest User Priority (0 - 7) which iSCSI frames should use, or
1199           -1 for default priority. Only used when the "app-iscsi-flags"
1200           property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1201
1202           Format: int32
1203
1204       priority-bandwidth
1205           An array of 8 uint values, where the array index corresponds to the
1206           User Priority (0 - 7) and the value indicates the percentage of
1207           bandwidth of the priority's assigned group that the priority may
1208           use. The sum of all percentages for priorities which belong to the
1209           same group must total 100 percents.
1210
1211           Format: array of uint32
1212
1213       priority-flow-control
1214           An array of 8 boolean values, where the array index corresponds to
1215           the User Priority (0 - 7) and the value indicates whether or not
1216           the corresponding priority should transmit priority pause.
1217
1218           Format: array of uint32
1219
1220       priority-flow-control-flags
1221           Specifies the NMSettingDcbFlags for DCB Priority Flow Control
1222           (PFC). Flags may be any combination of NM_SETTING_DCB_FLAG_ENABLE
1223           (0x1), NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1224           NM_SETTING_DCB_FLAG_WILLING (0x4).
1225
1226           Format: NMSettingDcbFlags (uint32)
1227
1228       priority-group-bandwidth
1229           An array of 8 uint values, where the array index corresponds to the
1230           Priority Group ID (0 - 7) and the value indicates the percentage of
1231           link bandwidth allocated to that group. Allowed values are 0 - 100,
1232           and the sum of all values must total 100 percents.
1233
1234           Format: array of uint32
1235
1236       priority-group-flags
1237           Specifies the NMSettingDcbFlags for DCB Priority Groups. Flags may
1238           be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1239           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1240           NM_SETTING_DCB_FLAG_WILLING (0x4).
1241
1242           Format: NMSettingDcbFlags (uint32)
1243
1244       priority-group-id
1245           An array of 8 uint values, where the array index corresponds to the
1246           User Priority (0 - 7) and the value indicates the Priority Group
1247           ID. Allowed Priority Group ID values are 0 - 7 or 15 for the
1248           unrestricted group.
1249
1250           Format: array of uint32
1251
1252       priority-strict-bandwidth
1253           An array of 8 boolean values, where the array index corresponds to
1254           the User Priority (0 - 7) and the value indicates whether or not
1255           the priority may use all of the bandwidth allocated to its assigned
1256           group.
1257
1258           Format: array of uint32
1259
1260       priority-traffic-class
1261           An array of 8 uint values, where the array index corresponds to the
1262           User Priority (0 - 7) and the value indicates the traffic class (0
1263           - 7) to which the priority is mapped.
1264
1265           Format: array of uint32
1266
1267   ethtool setting
1268       Ethtool Ethernet Settings.
1269
1270       Properties:
1271
1272       coalesce-adaptive-rx
1273
1274       coalesce-adaptive-tx
1275
1276       coalesce-pkt-rate-high
1277
1278       coalesce-pkt-rate-low
1279
1280       coalesce-rx-frames
1281
1282       coalesce-rx-frames-high
1283
1284       coalesce-rx-frames-irq
1285
1286       coalesce-rx-frames-low
1287
1288       coalesce-rx-usecs
1289
1290       coalesce-rx-usecs-high
1291
1292       coalesce-rx-usecs-irq
1293
1294       coalesce-rx-usecs-low
1295
1296       coalesce-sample-interval
1297
1298       coalesce-stats-block-usecs
1299
1300       coalesce-tx-frames
1301
1302       coalesce-tx-frames-high
1303
1304       coalesce-tx-frames-irq
1305
1306       coalesce-tx-frames-low
1307
1308       coalesce-tx-usecs
1309
1310       coalesce-tx-usecs-high
1311
1312       coalesce-tx-usecs-irq
1313
1314       coalesce-tx-usecs-low
1315
1316       feature-esp-hw-offload
1317
1318       feature-esp-tx-csum-hw-offload
1319
1320       feature-fcoe-mtu
1321
1322       feature-gro
1323
1324       feature-gso
1325
1326       feature-highdma
1327
1328       feature-hw-tc-offload
1329
1330       feature-l2-fwd-offload
1331
1332       feature-loopback
1333
1334       feature-lro
1335
1336       feature-macsec-hw-offload
1337
1338       feature-ntuple
1339
1340       feature-rx
1341
1342       feature-rx-all
1343
1344       feature-rx-fcs
1345
1346       feature-rx-gro-hw
1347
1348       feature-rx-gro-list
1349
1350       feature-rx-udp-gro-forwarding
1351
1352       feature-rx-udp_tunnel-port-offload
1353
1354       feature-rx-vlan-filter
1355
1356       feature-rx-vlan-stag-filter
1357
1358       feature-rx-vlan-stag-hw-parse
1359
1360       feature-rxhash
1361
1362       feature-rxvlan
1363
1364       feature-sg
1365
1366       feature-tls-hw-record
1367
1368       feature-tls-hw-rx-offload
1369
1370       feature-tls-hw-tx-offload
1371
1372       feature-tso
1373
1374       feature-tx
1375
1376       feature-tx-checksum-fcoe-crc
1377
1378       feature-tx-checksum-ip-generic
1379
1380       feature-tx-checksum-ipv4
1381
1382       feature-tx-checksum-ipv6
1383
1384       feature-tx-checksum-sctp
1385
1386       feature-tx-esp-segmentation
1387
1388       feature-tx-fcoe-segmentation
1389
1390       feature-tx-gre-csum-segmentation
1391
1392       feature-tx-gre-segmentation
1393
1394       feature-tx-gso-list
1395
1396       feature-tx-gso-partial
1397
1398       feature-tx-gso-robust
1399
1400       feature-tx-ipxip4-segmentation
1401
1402       feature-tx-ipxip6-segmentation
1403
1404       feature-tx-nocache-copy
1405
1406       feature-tx-scatter-gather
1407
1408       feature-tx-scatter-gather-fraglist
1409
1410       feature-tx-sctp-segmentation
1411
1412       feature-tx-tcp-ecn-segmentation
1413
1414       feature-tx-tcp-mangleid-segmentation
1415
1416       feature-tx-tcp-segmentation
1417
1418       feature-tx-tcp6-segmentation
1419
1420       feature-tx-tunnel-remcsum-segmentation
1421
1422       feature-tx-udp-segmentation
1423
1424       feature-tx-udp_tnl-csum-segmentation
1425
1426       feature-tx-udp_tnl-segmentation
1427
1428       feature-tx-vlan-stag-hw-insert
1429
1430       feature-txvlan
1431
1432       ring-rx
1433
1434       ring-rx-jumbo
1435
1436       ring-rx-mini
1437
1438       ring-tx
1439
1440   gsm setting
1441       GSM-based Mobile Broadband Settings.
1442
1443       Properties:
1444
1445       apn
1446           Alias: apn
1447
1448           The GPRS Access Point Name specifying the APN used when
1449           establishing a data session with the GSM-based network. The APN
1450           often determines how the user will be billed for their network
1451           usage and whether the user has access to the Internet or just a
1452           provider-specific walled-garden, so it is important to use the
1453           correct APN for the user's mobile broadband plan. The APN may only
1454           be composed of the characters a-z, 0-9, ., and - per GSM 03.60
1455           Section 14.9.
1456
1457           Format: string
1458
1459       auto-config
1460           When TRUE, the settings such as APN, username, or password will
1461           default to values that match the network the modem will register to
1462           in the Mobile Broadband Provider database.
1463
1464           Format: boolean
1465
1466       device-id
1467           The device unique identifier (as given by the WWAN management
1468           service) which this connection applies to. If given, the connection
1469           will only apply to the specified device.
1470
1471           Format: string
1472
1473       home-only
1474           When TRUE, only connections to the home network will be allowed.
1475           Connections to roaming networks will not be made.
1476
1477           Format: boolean
1478
1479       mtu
1480           If non-zero, only transmit packets of the specified size or
1481           smaller, breaking larger packets up into multiple frames.
1482
1483           Format: uint32
1484
1485       network-id
1486           The Network ID (GSM LAI format, ie MCC-MNC) to force specific
1487           network registration. If the Network ID is specified,
1488           NetworkManager will attempt to force the device to register only on
1489           the specified network. This can be used to ensure that the device
1490           does not roam when direct roaming control of the device is not
1491           otherwise possible.
1492
1493           Format: string
1494
1495       number
1496           Legacy setting that used to help establishing PPP data sessions for
1497           GSM-based modems. Deprecated: 1
1498
1499           Format: string
1500
1501       password
1502           Alias: password
1503
1504           The password used to authenticate with the network, if required.
1505           Many providers do not require a password, or accept any password.
1506           But if a password is required, it is specified here.
1507
1508           Format: string
1509
1510       password-flags
1511           Flags indicating how to handle the "password" property. See the
1512           section called “Secret flag types:” for flag values.
1513
1514           Format: NMSettingSecretFlags (uint32)
1515
1516       pin
1517           If the SIM is locked with a PIN it must be unlocked before any
1518           other operations are requested. Specify the PIN here to allow
1519           operation of the device.
1520
1521           Format: string
1522
1523       pin-flags
1524           Flags indicating how to handle the "pin" property. See the section
1525           called “Secret flag types:” for flag values.
1526
1527           Format: NMSettingSecretFlags (uint32)
1528
1529       sim-id
1530           The SIM card unique identifier (as given by the WWAN management
1531           service) which this connection applies to. If given, the connection
1532           will apply to any device also allowed by "device-id" which contains
1533           a SIM card matching the given identifier.
1534
1535           Format: string
1536
1537       sim-operator-id
1538           A MCC/MNC string like "310260" or "21601" identifying the specific
1539           mobile network operator which this connection applies to. If given,
1540           the connection will apply to any device also allowed by "device-id"
1541           and "sim-id" which contains a SIM card provisioned by the given
1542           operator.
1543
1544           Format: string
1545
1546       username
1547           Alias: user
1548
1549           The username used to authenticate with the network, if required.
1550           Many providers do not require a username, or accept any username.
1551           But if a username is required, it is specified here.
1552
1553           Format: string
1554
1555   infiniband setting
1556       Infiniband Settings.
1557
1558       Properties:
1559
1560       mac-address
1561           Alias: mac
1562
1563           If specified, this connection will only apply to the IPoIB device
1564           whose permanent MAC address matches. This property does not change
1565           the MAC address of the device (i.e. MAC spoofing).
1566
1567           Format: byte array
1568
1569       mtu
1570           Alias: mtu
1571
1572           If non-zero, only transmit packets of the specified size or
1573           smaller, breaking larger packets up into multiple frames.
1574
1575           Format: uint32
1576
1577       p-key
1578           Alias: p-key
1579
1580           The InfiniBand P_Key to use for this device. A value of -1 means to
1581           use the default P_Key (aka "the P_Key at index 0"). Otherwise, it
1582           is a 16-bit unsigned integer, whose high bit is set if it is a
1583           "full membership" P_Key.
1584
1585           Format: int32
1586
1587       parent
1588           Alias: parent
1589
1590           The interface name of the parent device of this device. Normally
1591           NULL, but if the "p_key" property is set, then you must specify the
1592           base device by setting either this property or "mac-address".
1593
1594           Format: string
1595
1596       transport-mode
1597           Alias: transport-mode
1598
1599           The IP-over-InfiniBand transport mode. Either "datagram" or
1600           "connected".
1601
1602           Format: string
1603
1604   ipv4 setting
1605       IPv4 Settings.
1606
1607       Properties:
1608
1609       addresses
1610           Alias: ip4
1611
1612           Array of IP addresses.
1613
1614           Format: array of array of uint32
1615
1616       dad-timeout
1617           Timeout in milliseconds used to check for the presence of duplicate
1618           IP addresses on the network. If an address conflict is detected,
1619           the activation will fail. A zero value means that no duplicate
1620           address detection is performed, -1 means the default value (either
1621           configuration ipvx.dad-timeout override or zero). A value greater
1622           than zero is a timeout in milliseconds. The property is currently
1623           implemented only for IPv4.
1624
1625           Format: int32
1626
1627       dhcp-client-id
1628           A string sent to the DHCP server to identify the local machine
1629           which the DHCP server may use to customize the DHCP lease and
1630           options. When the property is a hex string ('aa:bb:cc') it is
1631           interpreted as a binary client ID, in which case the first byte is
1632           assumed to be the 'type' field as per RFC 2132 section 9.14 and the
1633           remaining bytes may be an hardware address (e.g.
1634           '01:xx:xx:xx:xx:xx:xx' where 1 is the Ethernet ARP type and the
1635           rest is a MAC address). If the property is not a hex string it is
1636           considered as a non-hardware-address client ID and the 'type' field
1637           is set to 0. The special values "mac" and "perm-mac" are supported,
1638           which use the current or permanent MAC address of the device to
1639           generate a client identifier with type ethernet (01). Currently,
1640           these options only work for ethernet type of links. The special
1641           value "ipv6-duid" uses the DUID from "ipv6.dhcp-duid" property as
1642           an RFC4361-compliant client identifier. As IAID it uses
1643           "ipv4.dhcp-iaid" and falls back to "ipv6.dhcp-iaid" if unset. The
1644           special value "duid" generates a RFC4361-compliant client
1645           identifier based on "ipv4.dhcp-iaid" and uses a DUID generated by
1646           hashing /etc/machine-id. The special value "stable" is supported to
1647           generate a type 0 client identifier based on the stable-id (see
1648           connection.stable-id) and a per-host key. If you set the stable-id,
1649           you may want to include the "${DEVICE}" or "${MAC}" specifier to
1650           get a per-device key. If unset, a globally configured default is
1651           used. If still unset, the default depends on the DHCP plugin.
1652
1653           Format: string
1654
1655       dhcp-fqdn
1656           If the "dhcp-send-hostname" property is TRUE, then the specified
1657           FQDN will be sent to the DHCP server when acquiring a lease. This
1658           property and "dhcp-hostname" are mutually exclusive and cannot be
1659           set at the same time.
1660
1661           Format: string
1662
1663       dhcp-hostname
1664           If the "dhcp-send-hostname" property is TRUE, then the specified
1665           name will be sent to the DHCP server when acquiring a lease. This
1666           property and "dhcp-fqdn" are mutually exclusive and cannot be set
1667           at the same time.
1668
1669           Format: string
1670
1671       dhcp-hostname-flags
1672           Flags for the DHCP hostname and FQDN. Currently, this property only
1673           includes flags to control the FQDN flags set in the DHCP FQDN
1674           option. Supported FQDN flags are
1675           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
1676           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) and
1677           NM_DHCP_HOSTNAME_FLAG_FQDN_NO_UPDATE (0x4). When no FQDN flag is
1678           set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is set, the
1679           DHCP FQDN option will contain no flag. Otherwise, if no FQDN flag
1680           is set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is not set,
1681           the standard FQDN flags are set in the request:
1682           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
1683           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) for IPv4 and
1684           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1) for IPv6. When this
1685           property is set to the default value NM_DHCP_HOSTNAME_FLAG_NONE
1686           (0x0), a global default is looked up in NetworkManager
1687           configuration. If that value is unset or also
1688           NM_DHCP_HOSTNAME_FLAG_NONE (0x0), then the standard FQDN flags
1689           described above are sent in the DHCP requests.
1690
1691           Format: uint32
1692
1693       dhcp-iaid
1694           A string containing the "Identity Association Identifier" (IAID)
1695           used by the DHCP client. The property is a 32-bit decimal value or
1696           a special value among "mac", "perm-mac", "ifname" and "stable".
1697           When set to "mac" (or "perm-mac"), the last 4 bytes of the current
1698           (or permanent) MAC address are used as IAID. When set to "ifname",
1699           the IAID is computed by hashing the interface name. The special
1700           value "stable" can be used to generate an IAID based on the
1701           stable-id (see connection.stable-id), a per-host key and the
1702           interface name. When the property is unset, the value from global
1703           configuration is used; if no global default is set then the IAID is
1704           assumed to be "ifname". Note that at the moment this property is
1705           ignored for IPv6 by dhclient, which always derives the IAID from
1706           the MAC address.
1707
1708           Format: string
1709
1710       dhcp-reject-servers
1711           Array of servers from which DHCP offers must be rejected. This
1712           property is useful to avoid getting a lease from misconfigured or
1713           rogue servers. For DHCPv4, each element must be an IPv4 address,
1714           optionally followed by a slash and a prefix length (e.g.
1715           "192.168.122.0/24"). This property is currently not implemented for
1716           DHCPv6.
1717
1718           Format: array of string
1719
1720       dhcp-send-hostname
1721           If TRUE, a hostname is sent to the DHCP server when acquiring a
1722           lease. Some DHCP servers use this hostname to update DNS databases,
1723           essentially providing a static hostname for the computer. If the
1724           "dhcp-hostname" property is NULL and this property is TRUE, the
1725           current persistent hostname of the computer is sent.
1726
1727           Format: boolean
1728
1729       dhcp-timeout
1730           A timeout for a DHCP transaction in seconds. If zero (the default),
1731           a globally configured default is used. If still unspecified, a
1732           device specific timeout is used (usually 45 seconds). Set to
1733           2147483647 (MAXINT32) for infinity.
1734
1735           Format: int32
1736
1737       dhcp-vendor-class-identifier
1738           The Vendor Class Identifier DHCP option (60). Special characters in
1739           the data string may be escaped using C-style escapes, nevertheless
1740           this property cannot contain nul bytes. If the per-profile value is
1741           unspecified (the default), a global connection default gets
1742           consulted. If still unspecified, the DHCP option is not sent to the
1743           server. Since 1.28
1744
1745           Format: string
1746
1747       dns
1748           Array of IP addresses of DNS servers.
1749
1750           Format: array of uint32
1751
1752       dns-options
1753           Array of DNS options as described in man 5 resolv.conf. NULL means
1754           that the options are unset and left at the default. In this case
1755           NetworkManager will use default options. This is distinct from an
1756           empty list of properties. The currently supported options are
1757           "attempts", "debug", "edns0", "inet6", "ip6-bytestring",
1758           "ip6-dotint", "ndots", "no-check-names", "no-ip6-dotint",
1759           "no-reload", "no-tld-query", "rotate", "single-request",
1760           "single-request-reopen", "timeout", "trust-ad", "use-vc". The
1761           "trust-ad" setting is only honored if the profile contributes name
1762           servers to resolv.conf, and if all contributing profiles have
1763           "trust-ad" enabled. When using a caching DNS plugin (dnsmasq or
1764           systemd-resolved in NetworkManager.conf) then "edns0" and
1765           "trust-ad" are automatically added.
1766
1767           Format: array of string
1768
1769       dns-priority
1770           DNS servers priority. The relative priority for DNS servers
1771           specified by this setting. A lower numerical value is better
1772           (higher priority). Negative values have the special effect of
1773           excluding other configurations with a greater numerical priority
1774           value; so in presence of at least one negative priority, only DNS
1775           servers from connections with the lowest priority value will be
1776           used. To avoid all DNS leaks, set the priority of the profile that
1777           should be used to the most negative value of all active connections
1778           profiles. Zero selects a globally configured default value. If the
1779           latter is missing or zero too, it defaults to 50 for VPNs
1780           (including WireGuard) and 100 for other connections. Note that the
1781           priority is to order DNS settings for multiple active connections.
1782           It does not disambiguate multiple DNS servers within the same
1783           connection profile. When multiple devices have configurations with
1784           the same priority, VPNs will be considered first, then devices with
1785           the best (lowest metric) default route and then all other devices.
1786           When using dns=default, servers with higher priority will be on top
1787           of resolv.conf. To prioritize a given server over another one
1788           within the same connection, just specify them in the desired order.
1789           Note that commonly the resolver tries name servers in
1790           /etc/resolv.conf in the order listed, proceeding with the next
1791           server in the list on failure. See for example the "rotate" option
1792           of the dns-options setting. If there are any negative DNS
1793           priorities, then only name servers from the devices with that
1794           lowest priority will be considered. When using a DNS resolver that
1795           supports Conditional Forwarding or Split DNS (with dns=dnsmasq or
1796           dns=systemd-resolved settings), each connection is used to query
1797           domains in its search list. The search domains determine which name
1798           servers to ask, and the DNS priority is used to prioritize name
1799           servers based on the domain. Queries for domains not present in any
1800           search list are routed through connections having the '~.' special
1801           wildcard domain, which is added automatically to connections with
1802           the default route (or can be added manually). When multiple
1803           connections specify the same domain, the one with the best priority
1804           (lowest numerical value) wins. If a sub domain is configured on
1805           another interface it will be accepted regardless the priority,
1806           unless parent domain on the other interface has a negative
1807           priority, which causes the sub domain to be shadowed. With Split
1808           DNS one can avoid undesired DNS leaks by properly configuring DNS
1809           priorities and the search domains, so that only name servers of the
1810           desired interface are configured.
1811
1812           Format: int32
1813
1814       dns-search
1815           Array of DNS search domains. Domains starting with a tilde ('~')
1816           are considered 'routing' domains and are used only to decide the
1817           interface over which a query must be forwarded; they are not used
1818           to complete unqualified host names. When using a DNS plugin that
1819           supports Conditional Forwarding or Split DNS, then the search
1820           domains specify which name servers to query. This makes the
1821           behavior different from running with plain /etc/resolv.conf. For
1822           more information see also the dns-priority setting.
1823
1824           Format: array of string
1825
1826       gateway
1827           Alias: gw4
1828
1829           The gateway associated with this configuration. This is only
1830           meaningful if "addresses" is also set. The gateway's main purpose
1831           is to control the next hop of the standard default route on the
1832           device. Hence, the gateway property conflicts with "never-default"
1833           and will be automatically dropped if the IP configuration is set to
1834           never-default. As an alternative to set the gateway, configure a
1835           static default route with /0 as prefix length.
1836
1837           Format: string
1838
1839       ignore-auto-dns
1840           When "method" is set to "auto" and this property to TRUE,
1841           automatically configured name servers and search domains are
1842           ignored and only name servers and search domains specified in the
1843           "dns" and "dns-search" properties, if any, are used.
1844
1845           Format: boolean
1846
1847       ignore-auto-routes
1848           When "method" is set to "auto" and this property to TRUE,
1849           automatically configured routes are ignored and only routes
1850           specified in the "routes" property, if any, are used.
1851
1852           Format: boolean
1853
1854       may-fail
1855           If TRUE, allow overall network configuration to proceed even if the
1856           configuration specified by this property times out. Note that at
1857           least one IP configuration must succeed or overall network
1858           configuration will still fail. For example, in IPv6-only networks,
1859           setting this property to TRUE on the NMSettingIP4Config allows the
1860           overall network configuration to succeed if IPv4 configuration
1861           fails but IPv6 configuration completes successfully.
1862
1863           Format: boolean
1864
1865       method
1866           IP configuration method. NMSettingIP4Config and NMSettingIP6Config
1867           both support "disabled", "auto", "manual", and "link-local". See
1868           the subclass-specific documentation for other values. In general,
1869           for the "auto" method, properties such as "dns" and "routes"
1870           specify information that is added on to the information returned
1871           from automatic configuration. The "ignore-auto-routes" and
1872           "ignore-auto-dns" properties modify this behavior. For methods that
1873           imply no upstream network, such as "shared" or "link-local", these
1874           properties must be empty. For IPv4 method "shared", the IP subnet
1875           can be configured by adding one manual IPv4 address or otherwise
1876           10.42.x.0/24 is chosen. Note that the shared method must be
1877           configured on the interface which shares the internet to a subnet,
1878           not on the uplink which is shared.
1879
1880           Format: string
1881
1882       never-default
1883           If TRUE, this connection will never be the default connection for
1884           this IP type, meaning it will never be assigned the default route
1885           by NetworkManager.
1886
1887           Format: boolean
1888
1889       route-metric
1890           The default metric for routes that don't explicitly specify a
1891           metric. The default value -1 means that the metric is chosen
1892           automatically based on the device type. The metric applies to
1893           dynamic routes, manual (static) routes that don't have an explicit
1894           metric setting, address prefix routes, and the default route. Note
1895           that for IPv6, the kernel accepts zero (0) but coerces it to 1024
1896           (user default). Hence, setting this property to zero effectively
1897           mean setting it to 1024. For IPv4, zero is a regular value for the
1898           metric.
1899
1900           Format: int64
1901
1902       route-table
1903           Enable policy routing (source routing) and set the routing table
1904           used when adding routes. This affects all routes, including
1905           device-routes, IPv4LL, DHCP, SLAAC, default-routes and static
1906           routes. But note that static routes can individually overwrite the
1907           setting by explicitly specifying a non-zero routing table. If the
1908           table setting is left at zero, it is eligible to be overwritten via
1909           global configuration. If the property is zero even after applying
1910           the global configuration value, policy routing is disabled for the
1911           address family of this connection. Policy routing disabled means
1912           that NetworkManager will add all routes to the main table (except
1913           static routes that explicitly configure a different table).
1914           Additionally, NetworkManager will not delete any extraneous routes
1915           from tables except the main table. This is to preserve backward
1916           compatibility for users who manage routing tables outside of
1917           NetworkManager.
1918
1919           Format: uint32
1920
1921       routes
1922           Array of IP routes.
1923
1924           Format: array of array of uint32
1925
1926       routing-rules
1927
1928   ipv6 setting
1929       IPv6 Settings.
1930
1931       Properties:
1932
1933       addr-gen-mode
1934           Configure method for creating the address for use with RFC4862 IPv6
1935           Stateless Address Autoconfiguration. The permitted values are:
1936           NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_EUI64 (0) or
1937           NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_STABLE_PRIVACY (1). If the
1938           property is set to EUI64, the addresses will be generated using the
1939           interface tokens derived from hardware address. This makes the host
1940           part of the address to stay constant, making it possible to track
1941           host's presence when it changes networks. The address changes when
1942           the interface hardware is replaced. The value of stable-privacy
1943           enables use of cryptographically secure hash of a secret
1944           host-specific key along with the connection's stable-id and the
1945           network address as specified by RFC7217. This makes it impossible
1946           to use the address track host's presence, and makes the address
1947           stable when the network interface hardware is replaced. On D-Bus,
1948           the absence of an addr-gen-mode setting equals enabling
1949           stable-privacy. For keyfile plugin, the absence of the setting on
1950           disk means EUI64 so that the property doesn't change on upgrade
1951           from older versions. Note that this setting is distinct from the
1952           Privacy Extensions as configured by "ip6-privacy" property and it
1953           does not affect the temporary addresses configured with this
1954           option.
1955
1956           Format: int32
1957
1958       addresses
1959           Alias: ip6
1960
1961           Array of IP addresses.
1962
1963           Format: array of legacy IPv6 address struct
1964
1965       dhcp-duid
1966           A string containing the DHCPv6 Unique Identifier (DUID) used by the
1967           dhcp client to identify itself to DHCPv6 servers (RFC 3315). The
1968           DUID is carried in the Client Identifier option. If the property is
1969           a hex string ('aa:bb:cc') it is interpreted as a binary DUID and
1970           filled as an opaque value in the Client Identifier option. The
1971           special value "lease" will retrieve the DUID previously used from
1972           the lease file belonging to the connection. If no DUID is found and
1973           "dhclient" is the configured dhcp client, the DUID is searched in
1974           the system-wide dhclient lease file. If still no DUID is found, or
1975           another dhcp client is used, a global and permanent DUID-UUID (RFC
1976           6355) will be generated based on the machine-id. The special values
1977           "llt" and "ll" will generate a DUID of type LLT or LL (see RFC
1978           3315) based on the current MAC address of the device. In order to
1979           try providing a stable DUID-LLT, the time field will contain a
1980           constant timestamp that is used globally (for all profiles) and
1981           persisted to disk. The special values "stable-llt", "stable-ll" and
1982           "stable-uuid" will generate a DUID of the corresponding type,
1983           derived from the connection's stable-id and a per-host unique key.
1984           You may want to include the "${DEVICE}" or "${MAC}" specifier in
1985           the stable-id, in case this profile gets activated on multiple
1986           devices. So, the link-layer address of "stable-ll" and "stable-llt"
1987           will be a generated address derived from the stable id. The
1988           DUID-LLT time value in the "stable-llt" option will be picked among
1989           a static timespan of three years (the upper bound of the interval
1990           is the same constant timestamp used in "llt"). When the property is
1991           unset, the global value provided for "ipv6.dhcp-duid" is used. If
1992           no global value is provided, the default "lease" value is assumed.
1993
1994           Format: string
1995
1996       dhcp-hostname
1997           If the "dhcp-send-hostname" property is TRUE, then the specified
1998           name will be sent to the DHCP server when acquiring a lease. This
1999           property and "dhcp-fqdn" are mutually exclusive and cannot be set
2000           at the same time.
2001
2002           Format: string
2003
2004       dhcp-hostname-flags
2005           Flags for the DHCP hostname and FQDN. Currently, this property only
2006           includes flags to control the FQDN flags set in the DHCP FQDN
2007           option. Supported FQDN flags are
2008           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
2009           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) and
2010           NM_DHCP_HOSTNAME_FLAG_FQDN_NO_UPDATE (0x4). When no FQDN flag is
2011           set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is set, the
2012           DHCP FQDN option will contain no flag. Otherwise, if no FQDN flag
2013           is set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is not set,
2014           the standard FQDN flags are set in the request:
2015           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
2016           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) for IPv4 and
2017           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1) for IPv6. When this
2018           property is set to the default value NM_DHCP_HOSTNAME_FLAG_NONE
2019           (0x0), a global default is looked up in NetworkManager
2020           configuration. If that value is unset or also
2021           NM_DHCP_HOSTNAME_FLAG_NONE (0x0), then the standard FQDN flags
2022           described above are sent in the DHCP requests.
2023
2024           Format: uint32
2025
2026       dhcp-iaid
2027           A string containing the "Identity Association Identifier" (IAID)
2028           used by the DHCP client. The property is a 32-bit decimal value or
2029           a special value among "mac", "perm-mac", "ifname" and "stable".
2030           When set to "mac" (or "perm-mac"), the last 4 bytes of the current
2031           (or permanent) MAC address are used as IAID. When set to "ifname",
2032           the IAID is computed by hashing the interface name. The special
2033           value "stable" can be used to generate an IAID based on the
2034           stable-id (see connection.stable-id), a per-host key and the
2035           interface name. When the property is unset, the value from global
2036           configuration is used; if no global default is set then the IAID is
2037           assumed to be "ifname". Note that at the moment this property is
2038           ignored for IPv6 by dhclient, which always derives the IAID from
2039           the MAC address.
2040
2041           Format: string
2042
2043       dhcp-send-hostname
2044           If TRUE, a hostname is sent to the DHCP server when acquiring a
2045           lease. Some DHCP servers use this hostname to update DNS databases,
2046           essentially providing a static hostname for the computer. If the
2047           "dhcp-hostname" property is NULL and this property is TRUE, the
2048           current persistent hostname of the computer is sent.
2049
2050           Format: boolean
2051
2052       dhcp-timeout
2053           A timeout for a DHCP transaction in seconds. If zero (the default),
2054           a globally configured default is used. If still unspecified, a
2055           device specific timeout is used (usually 45 seconds). Set to
2056           2147483647 (MAXINT32) for infinity.
2057
2058           Format: int32
2059
2060       dns
2061           Array of IP addresses of DNS servers.
2062
2063           Format: array of byte array
2064
2065       dns-options
2066           Array of DNS options as described in man 5 resolv.conf. NULL means
2067           that the options are unset and left at the default. In this case
2068           NetworkManager will use default options. This is distinct from an
2069           empty list of properties. The currently supported options are
2070           "attempts", "debug", "edns0", "inet6", "ip6-bytestring",
2071           "ip6-dotint", "ndots", "no-check-names", "no-ip6-dotint",
2072           "no-reload", "no-tld-query", "rotate", "single-request",
2073           "single-request-reopen", "timeout", "trust-ad", "use-vc". The
2074           "trust-ad" setting is only honored if the profile contributes name
2075           servers to resolv.conf, and if all contributing profiles have
2076           "trust-ad" enabled. When using a caching DNS plugin (dnsmasq or
2077           systemd-resolved in NetworkManager.conf) then "edns0" and
2078           "trust-ad" are automatically added.
2079
2080           Format: array of string
2081
2082       dns-priority
2083           DNS servers priority. The relative priority for DNS servers
2084           specified by this setting. A lower numerical value is better
2085           (higher priority). Negative values have the special effect of
2086           excluding other configurations with a greater numerical priority
2087           value; so in presence of at least one negative priority, only DNS
2088           servers from connections with the lowest priority value will be
2089           used. To avoid all DNS leaks, set the priority of the profile that
2090           should be used to the most negative value of all active connections
2091           profiles. Zero selects a globally configured default value. If the
2092           latter is missing or zero too, it defaults to 50 for VPNs
2093           (including WireGuard) and 100 for other connections. Note that the
2094           priority is to order DNS settings for multiple active connections.
2095           It does not disambiguate multiple DNS servers within the same
2096           connection profile. When multiple devices have configurations with
2097           the same priority, VPNs will be considered first, then devices with
2098           the best (lowest metric) default route and then all other devices.
2099           When using dns=default, servers with higher priority will be on top
2100           of resolv.conf. To prioritize a given server over another one
2101           within the same connection, just specify them in the desired order.
2102           Note that commonly the resolver tries name servers in
2103           /etc/resolv.conf in the order listed, proceeding with the next
2104           server in the list on failure. See for example the "rotate" option
2105           of the dns-options setting. If there are any negative DNS
2106           priorities, then only name servers from the devices with that
2107           lowest priority will be considered. When using a DNS resolver that
2108           supports Conditional Forwarding or Split DNS (with dns=dnsmasq or
2109           dns=systemd-resolved settings), each connection is used to query
2110           domains in its search list. The search domains determine which name
2111           servers to ask, and the DNS priority is used to prioritize name
2112           servers based on the domain. Queries for domains not present in any
2113           search list are routed through connections having the '~.' special
2114           wildcard domain, which is added automatically to connections with
2115           the default route (or can be added manually). When multiple
2116           connections specify the same domain, the one with the best priority
2117           (lowest numerical value) wins. If a sub domain is configured on
2118           another interface it will be accepted regardless the priority,
2119           unless parent domain on the other interface has a negative
2120           priority, which causes the sub domain to be shadowed. With Split
2121           DNS one can avoid undesired DNS leaks by properly configuring DNS
2122           priorities and the search domains, so that only name servers of the
2123           desired interface are configured.
2124
2125           Format: int32
2126
2127       dns-search
2128           Array of DNS search domains. Domains starting with a tilde ('~')
2129           are considered 'routing' domains and are used only to decide the
2130           interface over which a query must be forwarded; they are not used
2131           to complete unqualified host names. When using a DNS plugin that
2132           supports Conditional Forwarding or Split DNS, then the search
2133           domains specify which name servers to query. This makes the
2134           behavior different from running with plain /etc/resolv.conf. For
2135           more information see also the dns-priority setting.
2136
2137           Format: array of string
2138
2139       gateway
2140           Alias: gw6
2141
2142           The gateway associated with this configuration. This is only
2143           meaningful if "addresses" is also set. The gateway's main purpose
2144           is to control the next hop of the standard default route on the
2145           device. Hence, the gateway property conflicts with "never-default"
2146           and will be automatically dropped if the IP configuration is set to
2147           never-default. As an alternative to set the gateway, configure a
2148           static default route with /0 as prefix length.
2149
2150           Format: string
2151
2152       ignore-auto-dns
2153           When "method" is set to "auto" and this property to TRUE,
2154           automatically configured name servers and search domains are
2155           ignored and only name servers and search domains specified in the
2156           "dns" and "dns-search" properties, if any, are used.
2157
2158           Format: boolean
2159
2160       ignore-auto-routes
2161           When "method" is set to "auto" and this property to TRUE,
2162           automatically configured routes are ignored and only routes
2163           specified in the "routes" property, if any, are used.
2164
2165           Format: boolean
2166
2167       ip6-privacy
2168           Configure IPv6 Privacy Extensions for SLAAC, described in RFC4941.
2169           If enabled, it makes the kernel generate a temporary IPv6 address
2170           in addition to the public one generated from MAC address via
2171           modified EUI-64. This enhances privacy, but could cause problems in
2172           some applications, on the other hand. The permitted values are: -1:
2173           unknown, 0: disabled, 1: enabled (prefer public address), 2:
2174           enabled (prefer temporary addresses). Having a per-connection
2175           setting set to "-1" (unknown) means fallback to global
2176           configuration "ipv6.ip6-privacy". If also global configuration is
2177           unspecified or set to "-1", fallback to read
2178           "/proc/sys/net/ipv6/conf/default/use_tempaddr". Note that this
2179           setting is distinct from the Stable Privacy addresses that can be
2180           enabled with the "addr-gen-mode" property's "stable-privacy"
2181           setting as another way of avoiding host tracking with IPv6
2182           addresses.
2183
2184           Format: NMSettingIP6ConfigPrivacy (int32)
2185
2186       may-fail
2187           If TRUE, allow overall network configuration to proceed even if the
2188           configuration specified by this property times out. Note that at
2189           least one IP configuration must succeed or overall network
2190           configuration will still fail. For example, in IPv6-only networks,
2191           setting this property to TRUE on the NMSettingIP4Config allows the
2192           overall network configuration to succeed if IPv4 configuration
2193           fails but IPv6 configuration completes successfully.
2194
2195           Format: boolean
2196
2197       method
2198           IP configuration method. NMSettingIP4Config and NMSettingIP6Config
2199           both support "disabled", "auto", "manual", and "link-local". See
2200           the subclass-specific documentation for other values. In general,
2201           for the "auto" method, properties such as "dns" and "routes"
2202           specify information that is added on to the information returned
2203           from automatic configuration. The "ignore-auto-routes" and
2204           "ignore-auto-dns" properties modify this behavior. For methods that
2205           imply no upstream network, such as "shared" or "link-local", these
2206           properties must be empty. For IPv4 method "shared", the IP subnet
2207           can be configured by adding one manual IPv4 address or otherwise
2208           10.42.x.0/24 is chosen. Note that the shared method must be
2209           configured on the interface which shares the internet to a subnet,
2210           not on the uplink which is shared.
2211
2212           Format: string
2213
2214       never-default
2215           If TRUE, this connection will never be the default connection for
2216           this IP type, meaning it will never be assigned the default route
2217           by NetworkManager.
2218
2219           Format: boolean
2220
2221       ra-timeout
2222           A timeout for waiting Router Advertisements in seconds. If zero
2223           (the default), a globally configured default is used. If still
2224           unspecified, the timeout depends on the sysctl settings of the
2225           device. Set to 2147483647 (MAXINT32) for infinity.
2226
2227           Format: int32
2228
2229       route-metric
2230           The default metric for routes that don't explicitly specify a
2231           metric. The default value -1 means that the metric is chosen
2232           automatically based on the device type. The metric applies to
2233           dynamic routes, manual (static) routes that don't have an explicit
2234           metric setting, address prefix routes, and the default route. Note
2235           that for IPv6, the kernel accepts zero (0) but coerces it to 1024
2236           (user default). Hence, setting this property to zero effectively
2237           mean setting it to 1024. For IPv4, zero is a regular value for the
2238           metric.
2239
2240           Format: int64
2241
2242       route-table
2243           Enable policy routing (source routing) and set the routing table
2244           used when adding routes. This affects all routes, including
2245           device-routes, IPv4LL, DHCP, SLAAC, default-routes and static
2246           routes. But note that static routes can individually overwrite the
2247           setting by explicitly specifying a non-zero routing table. If the
2248           table setting is left at zero, it is eligible to be overwritten via
2249           global configuration. If the property is zero even after applying
2250           the global configuration value, policy routing is disabled for the
2251           address family of this connection. Policy routing disabled means
2252           that NetworkManager will add all routes to the main table (except
2253           static routes that explicitly configure a different table).
2254           Additionally, NetworkManager will not delete any extraneous routes
2255           from tables except the main table. This is to preserve backward
2256           compatibility for users who manage routing tables outside of
2257           NetworkManager.
2258
2259           Format: uint32
2260
2261       routes
2262           Array of IP routes.
2263
2264           Format: array of legacy IPv6 route struct
2265
2266       routing-rules
2267
2268       token
2269           Configure the token for
2270           draft-chown-6man-tokenised-ipv6-identifiers-02 IPv6 tokenized
2271           interface identifiers. Useful with eui64 addr-gen-mode.
2272
2273           Format: string
2274
2275   ip-tunnel setting
2276       IP Tunneling Settings.
2277
2278       Properties:
2279
2280       encapsulation-limit
2281           How many additional levels of encapsulation are permitted to be
2282           prepended to packets. This property applies only to IPv6 tunnels.
2283
2284           Format: uint32
2285
2286       flags
2287           Tunnel flags. Currently, the following values are supported:
2288           NM_IP_TUNNEL_FLAG_IP6_IGN_ENCAP_LIMIT (0x1),
2289           NM_IP_TUNNEL_FLAG_IP6_USE_ORIG_TCLASS (0x2),
2290           NM_IP_TUNNEL_FLAG_IP6_USE_ORIG_FLOWLABEL (0x4),
2291           NM_IP_TUNNEL_FLAG_IP6_MIP6_DEV (0x8),
2292           NM_IP_TUNNEL_FLAG_IP6_RCV_DSCP_COPY (0x10),
2293           NM_IP_TUNNEL_FLAG_IP6_USE_ORIG_FWMARK (0x20). They are valid only
2294           for IPv6 tunnels.
2295
2296           Format: uint32
2297
2298       flow-label
2299           The flow label to assign to tunnel packets. This property applies
2300           only to IPv6 tunnels.
2301
2302           Format: uint32
2303
2304       input-key
2305           The key used for tunnel input packets; the property is valid only
2306           for certain tunnel modes (GRE, IP6GRE). If empty, no key is used.
2307
2308           Format: string
2309
2310       local
2311           Alias: local
2312
2313           The local endpoint of the tunnel; the value can be empty, otherwise
2314           it must contain an IPv4 or IPv6 address.
2315
2316           Format: string
2317
2318       mode
2319           Alias: mode
2320
2321           The tunneling mode, for example NM_IP_TUNNEL_MODE_IPIP (1) or
2322           NM_IP_TUNNEL_MODE_GRE (2).
2323
2324           Format: uint32
2325
2326       mtu
2327           If non-zero, only transmit packets of the specified size or
2328           smaller, breaking larger packets up into multiple fragments.
2329
2330           Format: uint32
2331
2332       output-key
2333           The key used for tunnel output packets; the property is valid only
2334           for certain tunnel modes (GRE, IP6GRE). If empty, no key is used.
2335
2336           Format: string
2337
2338       parent
2339           Alias: dev
2340
2341           If given, specifies the parent interface name or parent connection
2342           UUID the new device will be bound to so that tunneled packets will
2343           only be routed via that interface.
2344
2345           Format: string
2346
2347       path-mtu-discovery
2348           Whether to enable Path MTU Discovery on this tunnel.
2349
2350           Format: boolean
2351
2352       remote
2353           Alias: remote
2354
2355           The remote endpoint of the tunnel; the value must contain an IPv4
2356           or IPv6 address.
2357
2358           Format: string
2359
2360       tos
2361           The type of service (IPv4) or traffic class (IPv6) field to be set
2362           on tunneled packets.
2363
2364           Format: uint32
2365
2366       ttl
2367           The TTL to assign to tunneled packets. 0 is a special value meaning
2368           that packets inherit the TTL value.
2369
2370           Format: uint32
2371
2372   macsec setting
2373       MACSec Settings.
2374
2375       Properties:
2376
2377       encrypt
2378           Alias: encrypt
2379
2380           Whether the transmitted traffic must be encrypted.
2381
2382           Format: boolean
2383
2384       mka-cak
2385           Alias: cak
2386
2387           The pre-shared CAK (Connectivity Association Key) for MACsec Key
2388           Agreement.
2389
2390           Format: string
2391
2392       mka-cak-flags
2393           Flags indicating how to handle the "mka-cak" property. See the
2394           section called “Secret flag types:” for flag values.
2395
2396           Format: NMSettingSecretFlags (uint32)
2397
2398       mka-ckn
2399           Alias: ckn
2400
2401           The pre-shared CKN (Connectivity-association Key Name) for MACsec
2402           Key Agreement.
2403
2404           Format: string
2405
2406       mode
2407           Alias: mode
2408
2409           Specifies how the CAK (Connectivity Association Key) for MKA
2410           (MACsec Key Agreement) is obtained.
2411
2412           Format: int32
2413
2414       parent
2415           Alias: dev
2416
2417           If given, specifies the parent interface name or parent connection
2418           UUID from which this MACSEC interface should be created. If this
2419           property is not specified, the connection must contain an
2420           "802-3-ethernet" setting with a "mac-address" property.
2421
2422           Format: string
2423
2424       port
2425           Alias: port
2426
2427           The port component of the SCI (Secure Channel Identifier), between
2428           1 and 65534.
2429
2430           Format: int32
2431
2432       send-sci
2433           Specifies whether the SCI (Secure Channel Identifier) is included
2434           in every packet.
2435
2436           Format: boolean
2437
2438       validation
2439           Specifies the validation mode for incoming frames.
2440
2441           Format: int32
2442
2443   macvlan setting
2444       MAC VLAN Settings.
2445
2446       Properties:
2447
2448       mode
2449           Alias: mode
2450
2451           The macvlan mode, which specifies the communication mechanism
2452           between multiple macvlans on the same lower device.
2453
2454           Format: uint32
2455
2456       parent
2457           Alias: dev
2458
2459           If given, specifies the parent interface name or parent connection
2460           UUID from which this MAC-VLAN interface should be created. If this
2461           property is not specified, the connection must contain an
2462           "802-3-ethernet" setting with a "mac-address" property.
2463
2464           Format: string
2465
2466       promiscuous
2467           Whether the interface should be put in promiscuous mode.
2468
2469           Format: boolean
2470
2471       tap
2472           Alias: tap
2473
2474           Whether the interface should be a MACVTAP.
2475
2476           Format: boolean
2477
2478   match setting
2479       Match settings.
2480
2481       Properties:
2482
2483       driver
2484           A list of driver names to match. Each element is a shell wildcard
2485           pattern. See NMSettingMatch:interface-name for how special
2486           characters '|', '&', '!' and '\' are used for optional and
2487           mandatory matches and inverting the pattern.
2488
2489           Format: array of string
2490
2491       interface-name
2492           A list of interface names to match. Each element is a shell
2493           wildcard pattern. An element can be prefixed with a pipe symbol (|)
2494           or an ampersand (&). The former means that the element is optional
2495           and the latter means that it is mandatory. If there are any
2496           optional elements, than the match evaluates to true if at least one
2497           of the optional element matches (logical OR). If there are any
2498           mandatory elements, then they all must match (logical AND). By
2499           default, an element is optional. This means that an element "foo"
2500           behaves the same as "|foo". An element can also be inverted with
2501           exclamation mark (!) between the pipe symbol (or the ampersand) and
2502           before the pattern. Note that "!foo" is a shortcut for the
2503           mandatory match "&!foo". Finally, a backslash can be used at the
2504           beginning of the element (after the optional special characters) to
2505           escape the start of the pattern. For example, "&\!a" is an
2506           mandatory match for literally "!a".
2507
2508           Format: array of string
2509
2510       kernel-command-line
2511           A list of kernel command line arguments to match. This may be used
2512           to check whether a specific kernel command line option is set (or
2513           if prefixed with the exclamation mark unset). The argument must
2514           either be a single word, or an assignment (i.e. two words,
2515           separated "="). In the former case the kernel command line is
2516           searched for the word appearing as is, or as left hand side of an
2517           assignment. In the latter case, the exact assignment is looked for
2518           with right and left hand side matching. See
2519           NMSettingMatch:interface-name for how special characters '|', '&',
2520           '!' and '\' are used for optional and mandatory matches and
2521           inverting the pattern.
2522
2523           Format: array of string
2524
2525       path
2526           A list of paths to match against the ID_PATH udev property of
2527           devices. ID_PATH represents the topological persistent path of a
2528           device. It typically contains a subsystem string (pci, usb,
2529           platform, etc.) and a subsystem-specific identifier. For PCI
2530           devices the path has the form "pci-$domain:$bus:$device.$function",
2531           where each variable is an hexadecimal value; for example
2532           "pci-0000:0a:00.0". The path of a device can be obtained with
2533           "udevadm info /sys/class/net/$dev | grep ID_PATH=" or by looking at
2534           the "path" property exported by NetworkManager ("nmcli -f
2535           general.path device show $dev"). Each element of the list is a
2536           shell wildcard pattern. See NMSettingMatch:interface-name for how
2537           special characters '|', '&', '!' and '\' are used for optional and
2538           mandatory matches and inverting the pattern.
2539
2540           Format: array of string
2541
2542   802-11-olpc-mesh setting
2543       Alias: olpc-mesh
2544
2545       OLPC Wireless Mesh Settings.
2546
2547       Properties:
2548
2549       channel
2550           Alias: channel
2551
2552           Channel on which the mesh network to join is located.
2553
2554           Format: uint32
2555
2556       dhcp-anycast-address
2557           Alias: dhcp-anycast
2558
2559           Anycast DHCP MAC address used when requesting an IP address via
2560           DHCP. The specific anycast address used determines which DHCP
2561           server class answers the request.
2562
2563           Format: byte array
2564
2565       ssid
2566           Alias: ssid
2567
2568           SSID of the mesh network to join.
2569
2570           Format: byte array
2571
2572   ovs-bridge setting
2573       OvsBridge Link Settings.
2574
2575       Properties:
2576
2577       datapath-type
2578           The data path type. One of "system", "netdev" or empty.
2579
2580           Format: string
2581
2582       fail-mode
2583           The bridge failure mode. One of "secure", "standalone" or empty.
2584
2585           Format: string
2586
2587       mcast-snooping-enable
2588           Enable or disable multicast snooping.
2589
2590           Format: boolean
2591
2592       rstp-enable
2593           Enable or disable RSTP.
2594
2595           Format: boolean
2596
2597       stp-enable
2598           Enable or disable STP.
2599
2600           Format: boolean
2601
2602   ovs-dpdk setting
2603       OvsDpdk Link Settings.
2604
2605       Properties:
2606
2607       devargs
2608           Open vSwitch DPDK device arguments.
2609
2610           Format: string
2611
2612   ovs-interface setting
2613       Open vSwitch Interface Settings.
2614
2615       Properties:
2616
2617       type
2618           The interface type. Either "internal", "system", "patch", "dpdk",
2619           or empty.
2620
2621           Format: string
2622
2623   ovs-patch setting
2624       OvsPatch Link Settings.
2625
2626       Properties:
2627
2628       peer
2629           Specifies the name of the interface for the other side of the
2630           patch. The patch on the other side must also set this interface as
2631           peer.
2632
2633           Format: string
2634
2635   ovs-port setting
2636       OvsPort Link Settings.
2637
2638       Properties:
2639
2640       bond-downdelay
2641           The time port must be inactive in order to be considered down.
2642
2643           Format: uint32
2644
2645       bond-mode
2646           Bonding mode. One of "active-backup", "balance-slb", or
2647           "balance-tcp".
2648
2649           Format: string
2650
2651       bond-updelay
2652           The time port must be active before it starts forwarding traffic.
2653
2654           Format: uint32
2655
2656       lacp
2657           LACP mode. One of "active", "off", or "passive".
2658
2659           Format: string
2660
2661       tag
2662           The VLAN tag in the range 0-4095.
2663
2664           Format: uint32
2665
2666       vlan-mode
2667           The VLAN mode. One of "access", "native-tagged", "native-untagged",
2668           "trunk" or unset.
2669
2670           Format: string
2671
2672   ppp setting
2673       Point-to-Point Protocol Settings.
2674
2675       Properties:
2676
2677       baud
2678           If non-zero, instruct pppd to set the serial port to the specified
2679           baudrate. This value should normally be left as 0 to automatically
2680           choose the speed.
2681
2682           Format: uint32
2683
2684       crtscts
2685           If TRUE, specify that pppd should set the serial port to use
2686           hardware flow control with RTS and CTS signals. This value should
2687           normally be set to FALSE.
2688
2689           Format: boolean
2690
2691       lcp-echo-failure
2692           If non-zero, instruct pppd to presume the connection to the peer
2693           has failed if the specified number of LCP echo-requests go
2694           unanswered by the peer. The "lcp-echo-interval" property must also
2695           be set to a non-zero value if this property is used.
2696
2697           Format: uint32
2698
2699       lcp-echo-interval
2700           If non-zero, instruct pppd to send an LCP echo-request frame to the
2701           peer every n seconds (where n is the specified value). Note that
2702           some PPP peers will respond to echo requests and some will not, and
2703           it is not possible to autodetect this.
2704
2705           Format: uint32
2706
2707       mppe-stateful
2708           If TRUE, stateful MPPE is used. See pppd documentation for more
2709           information on stateful MPPE.
2710
2711           Format: boolean
2712
2713       mru
2714           If non-zero, instruct pppd to request that the peer send packets no
2715           larger than the specified size. If non-zero, the MRU should be
2716           between 128 and 16384.
2717
2718           Format: uint32
2719
2720       mtu
2721           If non-zero, instruct pppd to send packets no larger than the
2722           specified size.
2723
2724           Format: uint32
2725
2726       no-vj-comp
2727           If TRUE, Van Jacobsen TCP header compression will not be requested.
2728
2729           Format: boolean
2730
2731       noauth
2732           If TRUE, do not require the other side (usually the PPP server) to
2733           authenticate itself to the client. If FALSE, require authentication
2734           from the remote side. In almost all cases, this should be TRUE.
2735
2736           Format: boolean
2737
2738       nobsdcomp
2739           If TRUE, BSD compression will not be requested.
2740
2741           Format: boolean
2742
2743       nodeflate
2744           If TRUE, "deflate" compression will not be requested.
2745
2746           Format: boolean
2747
2748       refuse-chap
2749           If TRUE, the CHAP authentication method will not be used.
2750
2751           Format: boolean
2752
2753       refuse-eap
2754           If TRUE, the EAP authentication method will not be used.
2755
2756           Format: boolean
2757
2758       refuse-mschap
2759           If TRUE, the MSCHAP authentication method will not be used.
2760
2761           Format: boolean
2762
2763       refuse-mschapv2
2764           If TRUE, the MSCHAPv2 authentication method will not be used.
2765
2766           Format: boolean
2767
2768       refuse-pap
2769           If TRUE, the PAP authentication method will not be used.
2770
2771           Format: boolean
2772
2773       require-mppe
2774           If TRUE, MPPE (Microsoft Point-to-Point Encryption) will be
2775           required for the PPP session. If either 64-bit or 128-bit MPPE is
2776           not available the session will fail. Note that MPPE is not used on
2777           mobile broadband connections.
2778
2779           Format: boolean
2780
2781       require-mppe-128
2782           If TRUE, 128-bit MPPE (Microsoft Point-to-Point Encryption) will be
2783           required for the PPP session, and the "require-mppe" property must
2784           also be set to TRUE. If 128-bit MPPE is not available the session
2785           will fail.
2786
2787           Format: boolean
2788
2789   pppoe setting
2790       PPP-over-Ethernet Settings.
2791
2792       Properties:
2793
2794       parent
2795           Alias: parent
2796
2797           If given, specifies the parent interface name on which this PPPoE
2798           connection should be created. If this property is not specified,
2799           the connection is activated on the interface specified in
2800           "interface-name" of NMSettingConnection.
2801
2802           Format: string
2803
2804       password
2805           Alias: password
2806
2807           Password used to authenticate with the PPPoE service.
2808
2809           Format: string
2810
2811       password-flags
2812           Flags indicating how to handle the "password" property. See the
2813           section called “Secret flag types:” for flag values.
2814
2815           Format: NMSettingSecretFlags (uint32)
2816
2817       service
2818           Alias: service
2819
2820           If specified, instruct PPPoE to only initiate sessions with access
2821           concentrators that provide the specified service. For most
2822           providers, this should be left blank. It is only required if there
2823           are multiple access concentrators or a specific service is known to
2824           be required.
2825
2826           Format: string
2827
2828       username
2829           Alias: username
2830
2831           Username used to authenticate with the PPPoE service.
2832
2833           Format: string
2834
2835   proxy setting
2836       WWW Proxy Settings.
2837
2838       Properties:
2839
2840       browser-only
2841           Alias: browser-only
2842
2843           Whether the proxy configuration is for browser only.
2844
2845           Format: boolean
2846
2847       method
2848           Alias: method
2849
2850           Method for proxy configuration, Default is
2851           NM_SETTING_PROXY_METHOD_NONE (0)
2852
2853           Format: int32
2854
2855       pac-script
2856           Alias: pac-script
2857
2858           PAC script for the connection.
2859
2860           Format: string
2861
2862       pac-url
2863           Alias: pac-url
2864
2865           PAC URL for obtaining PAC file.
2866
2867           Format: string
2868
2869   serial setting
2870       Serial Link Settings.
2871
2872       Properties:
2873
2874       baud
2875           Speed to use for communication over the serial port. Note that this
2876           value usually has no effect for mobile broadband modems as they
2877           generally ignore speed settings and use the highest available
2878           speed.
2879
2880           Format: uint32
2881
2882       bits
2883           Byte-width of the serial communication. The 8 in "8n1" for example.
2884
2885           Format: uint32
2886
2887       parity
2888           Parity setting of the serial port.
2889
2890           Format: NMSettingSerialParity (byte)
2891
2892       send-delay
2893           Time to delay between each byte sent to the modem, in microseconds.
2894
2895           Format: uint64
2896
2897       stopbits
2898           Number of stop bits for communication on the serial port. Either 1
2899           or 2. The 1 in "8n1" for example.
2900
2901           Format: uint32
2902
2903   sriov setting
2904       SR-IOV settings.
2905
2906       Properties:
2907
2908       autoprobe-drivers
2909           Whether to autoprobe virtual functions by a compatible driver. If
2910           set to NM_TERNARY_TRUE (1), the kernel will try to bind VFs to a
2911           compatible driver and if this succeeds a new network interface will
2912           be instantiated for each VF. If set to NM_TERNARY_FALSE (0), VFs
2913           will not be claimed and no network interfaces will be created for
2914           them. When set to NM_TERNARY_DEFAULT (-1), the global default is
2915           used; in case the global default is unspecified it is assumed to be
2916           NM_TERNARY_TRUE (1).
2917
2918           Format: NMTernary (int32)
2919
2920       total-vfs
2921           The total number of virtual functions to create. Note that when the
2922           sriov setting is present NetworkManager enforces the number of
2923           virtual functions on the interface (also when it is zero) during
2924           activation and resets it upon deactivation. To prevent any changes
2925           to SR-IOV parameters don't add a sriov setting to the connection.
2926
2927           Format: uint32
2928
2929       vfs
2930           Array of virtual function descriptors. Each VF descriptor is a
2931           dictionary mapping attribute names to GVariant values. The 'index'
2932           entry is mandatory for each VF. When represented as string a VF is
2933           in the form: "INDEX [ATTR=VALUE[ ATTR=VALUE]...]". for example: "2
2934           mac=00:11:22:33:44:55 spoof-check=true". Multiple VFs can be
2935           specified using a comma as separator. Currently, the following
2936           attributes are supported: mac, spoof-check, trust, min-tx-rate,
2937           max-tx-rate, vlans. The "vlans" attribute is represented as a
2938           semicolon-separated list of VLAN descriptors, where each descriptor
2939           has the form "ID[.PRIORITY[.PROTO]]". PROTO can be either 'q' for
2940           802.1Q (the default) or 'ad' for 802.1ad.
2941
2942           Format: array of vardict
2943
2944   tc setting
2945       Linux Traffic Control Settings.
2946
2947       Properties:
2948
2949       qdiscs
2950           Array of TC queueing disciplines.
2951
2952           Format: array of vardict
2953
2954       tfilters
2955           Array of TC traffic filters.
2956
2957           Format: array of vardict
2958
2959   team setting
2960       Teaming Settings.
2961
2962       Properties:
2963
2964       config
2965           Alias: config
2966
2967           The JSON configuration for the team network interface. The property
2968           should contain raw JSON configuration data suitable for teamd,
2969           because the value is passed directly to teamd. If not specified,
2970           the default configuration is used. See man teamd.conf for the
2971           format details.
2972
2973           Format: string
2974
2975       link-watchers
2976           Link watchers configuration for the connection: each link watcher
2977           is defined by a dictionary, whose keys depend upon the selected
2978           link watcher. Available link watchers are 'ethtool', 'nsna_ping'
2979           and 'arp_ping' and it is specified in the dictionary with the key
2980           'name'. Available keys are: ethtool: 'delay-up', 'delay-down',
2981           'init-wait'; nsna_ping: 'init-wait', 'interval', 'missed-max',
2982           'target-host'; arp_ping: all the ones in nsna_ping and
2983           'source-host', 'validate-active', 'validate-inactive',
2984           'send-always'. See teamd.conf man for more details.
2985
2986           Format: array of vardict
2987
2988       mcast-rejoin-count
2989           Corresponds to the teamd mcast_rejoin.count.
2990
2991           Format: int32
2992
2993       mcast-rejoin-interval
2994           Corresponds to the teamd mcast_rejoin.interval.
2995
2996           Format: int32
2997
2998       notify-peers-count
2999           Corresponds to the teamd notify_peers.count.
3000
3001           Format: int32
3002
3003       notify-peers-interval
3004           Corresponds to the teamd notify_peers.interval.
3005
3006           Format: int32
3007
3008       runner
3009           Corresponds to the teamd runner.name. Permitted values are:
3010           "roundrobin", "broadcast", "activebackup", "loadbalance", "lacp",
3011           "random".
3012
3013           Format: string
3014
3015       runner-active
3016           Corresponds to the teamd runner.active.
3017
3018           Format: boolean
3019
3020       runner-agg-select-policy
3021           Corresponds to the teamd runner.agg_select_policy.
3022
3023           Format: string
3024
3025       runner-fast-rate
3026           Corresponds to the teamd runner.fast_rate.
3027
3028           Format: boolean
3029
3030       runner-hwaddr-policy
3031           Corresponds to the teamd runner.hwaddr_policy.
3032
3033           Format: string
3034
3035       runner-min-ports
3036           Corresponds to the teamd runner.min_ports.
3037
3038           Format: int32
3039
3040       runner-sys-prio
3041           Corresponds to the teamd runner.sys_prio.
3042
3043           Format: int32
3044
3045       runner-tx-balancer
3046           Corresponds to the teamd runner.tx_balancer.name.
3047
3048           Format: string
3049
3050       runner-tx-balancer-interval
3051           Corresponds to the teamd runner.tx_balancer.interval.
3052
3053           Format: int32
3054
3055       runner-tx-hash
3056           Corresponds to the teamd runner.tx_hash.
3057
3058           Format: array of string
3059
3060   team-port setting
3061       Team Port Settings.
3062
3063       Properties:
3064
3065       config
3066           Alias: config
3067
3068           The JSON configuration for the team port. The property should
3069           contain raw JSON configuration data suitable for teamd, because the
3070           value is passed directly to teamd. If not specified, the default
3071           configuration is used. See man teamd.conf for the format details.
3072
3073           Format: string
3074
3075       lacp-key
3076           Corresponds to the teamd ports.PORTIFNAME.lacp_key.
3077
3078           Format: int32
3079
3080       lacp-prio
3081           Corresponds to the teamd ports.PORTIFNAME.lacp_prio.
3082
3083           Format: int32
3084
3085       link-watchers
3086           Link watchers configuration for the connection: each link watcher
3087           is defined by a dictionary, whose keys depend upon the selected
3088           link watcher. Available link watchers are 'ethtool', 'nsna_ping'
3089           and 'arp_ping' and it is specified in the dictionary with the key
3090           'name'. Available keys are: ethtool: 'delay-up', 'delay-down',
3091           'init-wait'; nsna_ping: 'init-wait', 'interval', 'missed-max',
3092           'target-host'; arp_ping: all the ones in nsna_ping and
3093           'source-host', 'validate-active', 'validate-inactive',
3094           'send-always'. See teamd.conf man for more details.
3095
3096           Format: array of vardict
3097
3098       prio
3099           Corresponds to the teamd ports.PORTIFNAME.prio.
3100
3101           Format: int32
3102
3103       queue-id
3104           Corresponds to the teamd ports.PORTIFNAME.queue_id. When set to -1
3105           means the parameter is skipped from the json config.
3106
3107           Format: int32
3108
3109       sticky
3110           Corresponds to the teamd ports.PORTIFNAME.sticky.
3111
3112           Format: boolean
3113
3114   tun setting
3115       Tunnel Settings.
3116
3117       Properties:
3118
3119       group
3120           Alias: group
3121
3122           The group ID which will own the device. If set to NULL everyone
3123           will be able to use the device.
3124
3125           Format: string
3126
3127       mode
3128           Alias: mode
3129
3130           The operating mode of the virtual device. Allowed values are
3131           NM_SETTING_TUN_MODE_TUN (1) to create a layer 3 device and
3132           NM_SETTING_TUN_MODE_TAP (2) to create an Ethernet-like layer 2 one.
3133
3134           Format: uint32
3135
3136       multi-queue
3137           Alias: multi-queue
3138
3139           If the property is set to TRUE, the interface will support multiple
3140           file descriptors (queues) to parallelize packet sending or
3141           receiving. Otherwise, the interface will only support a single
3142           queue.
3143
3144           Format: boolean
3145
3146       owner
3147           Alias: owner
3148
3149           The user ID which will own the device. If set to NULL everyone will
3150           be able to use the device.
3151
3152           Format: string
3153
3154       pi
3155           Alias: pi
3156
3157           If TRUE the interface will prepend a 4 byte header describing the
3158           physical interface to the packets.
3159
3160           Format: boolean
3161
3162       vnet-hdr
3163           Alias: vnet-hdr
3164
3165           If TRUE the IFF_VNET_HDR the tunnel packets will include a virtio
3166           network header.
3167
3168           Format: boolean
3169
3170   vlan setting
3171       VLAN Settings.
3172
3173       Properties:
3174
3175       egress-priority-map
3176           Alias: egress
3177
3178           For outgoing packets, a list of mappings from Linux SKB priorities
3179           to 802.1p priorities. The mapping is given in the format "from:to"
3180           where both "from" and "to" are unsigned integers, ie "7:3".
3181
3182           Format: array of string
3183
3184       flags
3185           Alias: flags
3186
3187           One or more flags which control the behavior and features of the
3188           VLAN interface. Flags include NM_VLAN_FLAG_REORDER_HEADERS (0x1)
3189           (reordering of output packet headers), NM_VLAN_FLAG_GVRP (0x2) (use
3190           of the GVRP protocol), and NM_VLAN_FLAG_LOOSE_BINDING (0x4) (loose
3191           binding of the interface to its master device's operating state).
3192           NM_VLAN_FLAG_MVRP (0x8) (use of the MVRP protocol). The default
3193           value of this property is NM_VLAN_FLAG_REORDER_HEADERS, but it used
3194           to be 0. To preserve backward compatibility, the default-value in
3195           the D-Bus API continues to be 0 and a missing property on D-Bus is
3196           still considered as 0.
3197
3198           Format: NMVlanFlags (uint32)
3199
3200       id
3201           Alias: id
3202
3203           The VLAN identifier that the interface created by this connection
3204           should be assigned. The valid range is from 0 to 4094, without the
3205           reserved id 4095.
3206
3207           Format: uint32
3208
3209       ingress-priority-map
3210           Alias: ingress
3211
3212           For incoming packets, a list of mappings from 802.1p priorities to
3213           Linux SKB priorities. The mapping is given in the format "from:to"
3214           where both "from" and "to" are unsigned integers, ie "7:3".
3215
3216           Format: array of string
3217
3218       parent
3219           Alias: dev
3220
3221           If given, specifies the parent interface name or parent connection
3222           UUID from which this VLAN interface should be created. If this
3223           property is not specified, the connection must contain an
3224           "802-3-ethernet" setting with a "mac-address" property.
3225
3226           Format: string
3227
3228   vpn setting
3229       VPN Settings.
3230
3231       Properties:
3232
3233       data
3234           Dictionary of key/value pairs of VPN plugin specific data. Both
3235           keys and values must be strings.
3236
3237           Format: dict of string to string
3238
3239       persistent
3240           If the VPN service supports persistence, and this property is TRUE,
3241           the VPN will attempt to stay connected across link changes and
3242           outages, until explicitly disconnected.
3243
3244           Format: boolean
3245
3246       secrets
3247           Dictionary of key/value pairs of VPN plugin specific secrets like
3248           passwords or private keys. Both keys and values must be strings.
3249
3250           Format: dict of string to string
3251
3252       service-type
3253           Alias: vpn-type
3254
3255           D-Bus service name of the VPN plugin that this setting uses to
3256           connect to its network. i.e. org.freedesktop.NetworkManager.vpnc
3257           for the vpnc plugin.
3258
3259           Format: string
3260
3261       timeout
3262           Timeout for the VPN service to establish the connection. Some
3263           services may take quite a long time to connect. Value of 0 means a
3264           default timeout, which is 60 seconds (unless overridden by
3265           vpn.timeout in configuration file). Values greater than zero mean
3266           timeout in seconds.
3267
3268           Format: uint32
3269
3270       user-name
3271           Alias: user
3272
3273           If the VPN connection requires a user name for authentication, that
3274           name should be provided here. If the connection is available to
3275           more than one user, and the VPN requires each user to supply a
3276           different name, then leave this property empty. If this property is
3277           empty, NetworkManager will automatically supply the username of the
3278           user which requested the VPN connection.
3279
3280           Format: string
3281
3282   vrf setting
3283       VRF settings.
3284
3285       Properties:
3286
3287       table
3288           Alias: table
3289
3290           The routing table for this VRF.
3291
3292           Format: uint32
3293
3294   vxlan setting
3295       VXLAN Settings.
3296
3297       Properties:
3298
3299       ageing
3300           Specifies the lifetime in seconds of FDB entries learnt by the
3301           kernel.
3302
3303           Format: uint32
3304
3305       destination-port
3306           Alias: destination-port
3307
3308           Specifies the UDP destination port to communicate to the remote
3309           VXLAN tunnel endpoint.
3310
3311           Format: uint32
3312
3313       id
3314           Alias: id
3315
3316           Specifies the VXLAN Network Identifier (or VXLAN Segment
3317           Identifier) to use.
3318
3319           Format: uint32
3320
3321       l2-miss
3322           Specifies whether netlink LL ADDR miss notifications are generated.
3323
3324           Format: boolean
3325
3326       l3-miss
3327           Specifies whether netlink IP ADDR miss notifications are generated.
3328
3329           Format: boolean
3330
3331       learning
3332           Specifies whether unknown source link layer addresses and IP
3333           addresses are entered into the VXLAN device forwarding database.
3334
3335           Format: boolean
3336
3337       limit
3338           Specifies the maximum number of FDB entries. A value of zero means
3339           that the kernel will store unlimited entries.
3340
3341           Format: uint32
3342
3343       local
3344           Alias: local
3345
3346           If given, specifies the source IP address to use in outgoing
3347           packets.
3348
3349           Format: string
3350
3351       parent
3352           Alias: dev
3353
3354           If given, specifies the parent interface name or parent connection
3355           UUID.
3356
3357           Format: string
3358
3359       proxy
3360           Specifies whether ARP proxy is turned on.
3361
3362           Format: boolean
3363
3364       remote
3365           Alias: remote
3366
3367           Specifies the unicast destination IP address to use in outgoing
3368           packets when the destination link layer address is not known in the
3369           VXLAN device forwarding database, or the multicast IP address to
3370           join.
3371
3372           Format: string
3373
3374       rsc
3375           Specifies whether route short circuit is turned on.
3376
3377           Format: boolean
3378
3379       source-port-max
3380           Alias: source-port-max
3381
3382           Specifies the maximum UDP source port to communicate to the remote
3383           VXLAN tunnel endpoint.
3384
3385           Format: uint32
3386
3387       source-port-min
3388           Alias: source-port-min
3389
3390           Specifies the minimum UDP source port to communicate to the remote
3391           VXLAN tunnel endpoint.
3392
3393           Format: uint32
3394
3395       tos
3396           Specifies the TOS value to use in outgoing packets.
3397
3398           Format: uint32
3399
3400       ttl
3401           Specifies the time-to-live value to use in outgoing packets.
3402
3403           Format: uint32
3404
3405   wifi-p2p setting
3406       Wi-Fi P2P Settings.
3407
3408       Properties:
3409
3410       peer
3411           Alias: peer
3412
3413           The P2P device that should be connected to. Currently, this is the
3414           only way to create or join a group.
3415
3416           Format: string
3417
3418       wfd-ies
3419           The Wi-Fi Display (WFD) Information Elements (IEs) to set. Wi-Fi
3420           Display requires a protocol specific information element to be set
3421           in certain Wi-Fi frames. These can be specified here for the
3422           purpose of establishing a connection. This setting is only useful
3423           when implementing a Wi-Fi Display client.
3424
3425           Format: byte array
3426
3427       wps-method
3428           Flags indicating which mode of WPS is to be used. There's little
3429           point in changing the default setting as NetworkManager will
3430           automatically determine the best method to use.
3431
3432           Format: uint32
3433
3434   wimax setting
3435       WiMax Settings.
3436
3437       Properties:
3438
3439       mac-address
3440           Alias: mac
3441
3442           If specified, this connection will only apply to the WiMAX device
3443           whose MAC address matches. This property does not change the MAC
3444           address of the device (known as MAC spoofing). Deprecated: 1
3445
3446           Format: byte array
3447
3448       network-name
3449           Alias: nsp
3450
3451           Network Service Provider (NSP) name of the WiMAX network this
3452           connection should use. Deprecated: 1
3453
3454           Format: string
3455
3456   802-3-ethernet setting
3457       Alias: ethernet
3458
3459       Wired Ethernet Settings.
3460
3461       Properties:
3462
3463       auto-negotiate
3464           When TRUE, enforce auto-negotiation of speed and duplex mode. If
3465           "speed" and "duplex" properties are both specified, only that
3466           single mode will be advertised and accepted during the link
3467           auto-negotiation process: this works only for BASE-T 802.3
3468           specifications and is useful for enforcing gigabits modes, as in
3469           these cases link negotiation is mandatory. When FALSE, "speed" and
3470           "duplex" properties should be both set or link configuration will
3471           be skipped.
3472
3473           Format: boolean
3474
3475       cloned-mac-address
3476           Alias: cloned-mac
3477
3478           If specified, request that the device use this MAC address instead.
3479           This is known as MAC cloning or spoofing. Beside explicitly
3480           specifying a MAC address, the special values "preserve",
3481           "permanent", "random" and "stable" are supported. "preserve" means
3482           not to touch the MAC address on activation. "permanent" means to
3483           use the permanent hardware address if the device has one (otherwise
3484           this is treated as "preserve"). "random" creates a random MAC
3485           address on each connect. "stable" creates a hashed MAC address
3486           based on connection.stable-id and a machine dependent key. If
3487           unspecified, the value can be overwritten via global defaults, see
3488           manual of NetworkManager.conf. If still unspecified, it defaults to
3489           "preserve" (older versions of NetworkManager may use a different
3490           default value). On D-Bus, this field is expressed as
3491           "assigned-mac-address" or the deprecated "cloned-mac-address".
3492
3493           Format: byte array
3494
3495       duplex
3496           When a value is set, either "half" or "full", configures the device
3497           to use the specified duplex mode. If "auto-negotiate" is "yes" the
3498           specified duplex mode will be the only one advertised during link
3499           negotiation: this works only for BASE-T 802.3 specifications and is
3500           useful for enforcing gigabits modes, as in these cases link
3501           negotiation is mandatory. If the value is unset (the default), the
3502           link configuration will be either skipped (if "auto-negotiate" is
3503           "no", the default) or will be auto-negotiated (if "auto-negotiate"
3504           is "yes") and the local device will advertise all the supported
3505           duplex modes. Must be set together with the "speed" property if
3506           specified. Before specifying a duplex mode be sure your device
3507           supports it.
3508
3509           Format: string
3510
3511       generate-mac-address-mask
3512           With "cloned-mac-address" setting "random" or "stable", by default
3513           all bits of the MAC address are scrambled and a
3514           locally-administered, unicast MAC address is created. This property
3515           allows to specify that certain bits are fixed. Note that the least
3516           significant bit of the first MAC address will always be unset to
3517           create a unicast MAC address. If the property is NULL, it is
3518           eligible to be overwritten by a default connection setting. If the
3519           value is still NULL or an empty string, the default is to create a
3520           locally-administered, unicast MAC address. If the value contains
3521           one MAC address, this address is used as mask. The set bits of the
3522           mask are to be filled with the current MAC address of the device,
3523           while the unset bits are subject to randomization. Setting
3524           "FE:FF:FF:00:00:00" means to preserve the OUI of the current MAC
3525           address and only randomize the lower 3 bytes using the "random" or
3526           "stable" algorithm. If the value contains one additional MAC
3527           address after the mask, this address is used instead of the current
3528           MAC address to fill the bits that shall not be randomized. For
3529           example, a value of "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set
3530           the OUI of the MAC address to 68:F7:28, while the lower bits are
3531           randomized. A value of "02:00:00:00:00:00 00:00:00:00:00:00" will
3532           create a fully scrambled globally-administered, burned-in MAC
3533           address. If the value contains more than one additional MAC
3534           addresses, one of them is chosen randomly. For example,
3535           "02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00" will create
3536           a fully scrambled MAC address, randomly locally or globally
3537           administered.
3538
3539           Format: string
3540
3541       mac-address
3542           Alias: mac
3543
3544           If specified, this connection will only apply to the Ethernet
3545           device whose permanent MAC address matches. This property does not
3546           change the MAC address of the device (i.e. MAC spoofing).
3547
3548           Format: byte array
3549
3550       mac-address-blacklist
3551           If specified, this connection will never apply to the Ethernet
3552           device whose permanent MAC address matches an address in the list.
3553           Each MAC address is in the standard hex-digits-and-colons notation
3554           (00:11:22:33:44:55).
3555
3556           Format: array of string
3557
3558       mtu
3559           Alias: mtu
3560
3561           If non-zero, only transmit packets of the specified size or
3562           smaller, breaking larger packets up into multiple Ethernet frames.
3563
3564           Format: uint32
3565
3566       port
3567           Specific port type to use if the device supports multiple
3568           attachment methods. One of "tp" (Twisted Pair), "aui" (Attachment
3569           Unit Interface), "bnc" (Thin Ethernet) or "mii" (Media Independent
3570           Interface). If the device supports only one port type, this setting
3571           is ignored.
3572
3573           Format: string
3574
3575       s390-nettype
3576           s390 network device type; one of "qeth", "lcs", or "ctc",
3577           representing the different types of virtual network devices
3578           available on s390 systems.
3579
3580           Format: string
3581
3582       s390-options
3583           Dictionary of key/value pairs of s390-specific device options. Both
3584           keys and values must be strings. Allowed keys include "portno",
3585           "layer2", "portname", "protocol", among others. Key names must
3586           contain only alphanumeric characters (ie, [a-zA-Z0-9]).
3587
3588           Format: dict of string to string
3589
3590       s390-subchannels
3591           Identifies specific subchannels that this network device uses for
3592           communication with z/VM or s390 host. Like the "mac-address"
3593           property for non-z/VM devices, this property can be used to ensure
3594           this connection only applies to the network device that uses these
3595           subchannels. The list should contain exactly 3 strings, and each
3596           string may only be composed of hexadecimal characters and the
3597           period (.) character.
3598
3599           Format: array of string
3600
3601       speed
3602           When a value greater than 0 is set, configures the device to use
3603           the specified speed. If "auto-negotiate" is "yes" the specified
3604           speed will be the only one advertised during link negotiation: this
3605           works only for BASE-T 802.3 specifications and is useful for
3606           enforcing gigabit speeds, as in this case link negotiation is
3607           mandatory. If the value is unset (0, the default), the link
3608           configuration will be either skipped (if "auto-negotiate" is "no",
3609           the default) or will be auto-negotiated (if "auto-negotiate" is
3610           "yes") and the local device will advertise all the supported
3611           speeds. In Mbit/s, ie 100 == 100Mbit/s. Must be set together with
3612           the "duplex" property when non-zero. Before specifying a speed
3613           value be sure your device supports it.
3614
3615           Format: uint32
3616
3617       wake-on-lan
3618           The NMSettingWiredWakeOnLan options to enable. Not all devices
3619           support all options. May be any combination of
3620           NM_SETTING_WIRED_WAKE_ON_LAN_PHY (0x2),
3621           NM_SETTING_WIRED_WAKE_ON_LAN_UNICAST (0x4),
3622           NM_SETTING_WIRED_WAKE_ON_LAN_MULTICAST (0x8),
3623           NM_SETTING_WIRED_WAKE_ON_LAN_BROADCAST (0x10),
3624           NM_SETTING_WIRED_WAKE_ON_LAN_ARP (0x20),
3625           NM_SETTING_WIRED_WAKE_ON_LAN_MAGIC (0x40) or the special values
3626           NM_SETTING_WIRED_WAKE_ON_LAN_DEFAULT (0x1) (to use global settings)
3627           and NM_SETTING_WIRED_WAKE_ON_LAN_IGNORE (0x8000) (to disable
3628           management of Wake-on-LAN in NetworkManager).
3629
3630           Format: uint32
3631
3632       wake-on-lan-password
3633           If specified, the password used with magic-packet-based
3634           Wake-on-LAN, represented as an Ethernet MAC address. If NULL, no
3635           password will be required.
3636
3637           Format: string
3638
3639   wireguard setting
3640       WireGuard Settings.
3641
3642       Properties:
3643
3644       fwmark
3645           The use of fwmark is optional and is by default off. Setting it to
3646           0 disables it. Otherwise, it is a 32-bit fwmark for outgoing
3647           packets. Note that "ip4-auto-default-route" or
3648           "ip6-auto-default-route" enabled, implies to automatically choose a
3649           fwmark.
3650
3651           Format: uint32
3652
3653       ip4-auto-default-route
3654           Whether to enable special handling of the IPv4 default route. If
3655           enabled, the IPv4 default route from wireguard.peer-routes will be
3656           placed to a dedicated routing-table and two policy routing rules
3657           will be added. The fwmark number is also used as routing-table for
3658           the default-route, and if fwmark is zero, an unused fwmark/table is
3659           chosen automatically. This corresponds to what wg-quick does with
3660           Table=auto and what WireGuard calls "Improved Rule-based Routing".
3661           Note that for this automatism to work, you usually don't want to
3662           set ipv4.gateway, because that will result in a conflicting default
3663           route. Leaving this at the default will enable this option
3664           automatically if ipv4.never-default is not set and there are any
3665           peers that use a default-route as allowed-ips.
3666
3667           Format: NMTernary (int32)
3668
3669       ip6-auto-default-route
3670           Like ip4-auto-default-route, but for the IPv6 default route.
3671
3672           Format: NMTernary (int32)
3673
3674       listen-port
3675           The listen-port. If listen-port is not specified, the port will be
3676           chosen randomly when the interface comes up.
3677
3678           Format: uint32
3679
3680       mtu
3681           If non-zero, only transmit packets of the specified size or
3682           smaller, breaking larger packets up into multiple fragments. If
3683           zero a default MTU is used. Note that contrary to wg-quick's MTU
3684           setting, this does not take into account the current routes at the
3685           time of activation.
3686
3687           Format: uint32
3688
3689       peer-routes
3690           Whether to automatically add routes for the AllowedIPs ranges of
3691           the peers. If TRUE (the default), NetworkManager will automatically
3692           add routes in the routing tables according to ipv4.route-table and
3693           ipv6.route-table. Usually you want this automatism enabled. If
3694           FALSE, no such routes are added automatically. In this case, the
3695           user may want to configure static routes in ipv4.routes and
3696           ipv6.routes, respectively. Note that if the peer's AllowedIPs is
3697           "0.0.0.0/0" or "::/0" and the profile's ipv4.never-default or
3698           ipv6.never-default setting is enabled, the peer route for this peer
3699           won't be added automatically.
3700
3701           Format: boolean
3702
3703       private-key
3704           The 256 bit private-key in base64 encoding.
3705
3706           Format: string
3707
3708       private-key-flags
3709           Flags indicating how to handle the "private-key" property. See the
3710           section called “Secret flag types:” for flag values.
3711
3712           Format: NMSettingSecretFlags (uint32)
3713
3714   802-11-wireless setting
3715       Alias: wifi
3716
3717       Wi-Fi Settings.
3718
3719       Properties:
3720
3721       ap-isolation
3722           Configures AP isolation, which prevents communication between
3723           wireless devices connected to this AP. This property can be set to
3724           a value different from NM_TERNARY_DEFAULT (-1) only when the
3725           interface is configured in AP mode. If set to NM_TERNARY_TRUE (1),
3726           devices are not able to communicate with each other. This increases
3727           security because it protects devices against attacks from other
3728           clients in the network. At the same time, it prevents devices to
3729           access resources on the same wireless networks as file shares,
3730           printers, etc. If set to NM_TERNARY_FALSE (0), devices can talk to
3731           each other. When set to NM_TERNARY_DEFAULT (-1), the global default
3732           is used; in case the global default is unspecified it is assumed to
3733           be NM_TERNARY_FALSE (0).
3734
3735           Format: NMTernary (int32)
3736
3737       band
3738           802.11 frequency band of the network. One of "a" for 5GHz 802.11a
3739           or "bg" for 2.4GHz 802.11. This will lock associations to the Wi-Fi
3740           network to the specific band, i.e. if "a" is specified, the device
3741           will not associate with the same network in the 2.4GHz band even if
3742           the network's settings are compatible. This setting depends on
3743           specific driver capability and may not work with all drivers.
3744
3745           Format: string
3746
3747       bssid
3748           If specified, directs the device to only associate with the given
3749           access point. This capability is highly driver dependent and not
3750           supported by all devices. Note: this property does not control the
3751           BSSID used when creating an Ad-Hoc network and is unlikely to in
3752           the future.
3753
3754           Format: byte array
3755
3756       channel
3757           Wireless channel to use for the Wi-Fi connection. The device will
3758           only join (or create for Ad-Hoc networks) a Wi-Fi network on the
3759           specified channel. Because channel numbers overlap between bands,
3760           this property also requires the "band" property to be set.
3761
3762           Format: uint32
3763
3764       cloned-mac-address
3765           Alias: cloned-mac
3766
3767           If specified, request that the device use this MAC address instead.
3768           This is known as MAC cloning or spoofing. Beside explicitly
3769           specifying a MAC address, the special values "preserve",
3770           "permanent", "random" and "stable" are supported. "preserve" means
3771           not to touch the MAC address on activation. "permanent" means to
3772           use the permanent hardware address of the device. "random" creates
3773           a random MAC address on each connect. "stable" creates a hashed MAC
3774           address based on connection.stable-id and a machine dependent key.
3775           If unspecified, the value can be overwritten via global defaults,
3776           see manual of NetworkManager.conf. If still unspecified, it
3777           defaults to "preserve" (older versions of NetworkManager may use a
3778           different default value). On D-Bus, this field is expressed as
3779           "assigned-mac-address" or the deprecated "cloned-mac-address".
3780
3781           Format: byte array
3782
3783       generate-mac-address-mask
3784           With "cloned-mac-address" setting "random" or "stable", by default
3785           all bits of the MAC address are scrambled and a
3786           locally-administered, unicast MAC address is created. This property
3787           allows to specify that certain bits are fixed. Note that the least
3788           significant bit of the first MAC address will always be unset to
3789           create a unicast MAC address. If the property is NULL, it is
3790           eligible to be overwritten by a default connection setting. If the
3791           value is still NULL or an empty string, the default is to create a
3792           locally-administered, unicast MAC address. If the value contains
3793           one MAC address, this address is used as mask. The set bits of the
3794           mask are to be filled with the current MAC address of the device,
3795           while the unset bits are subject to randomization. Setting
3796           "FE:FF:FF:00:00:00" means to preserve the OUI of the current MAC
3797           address and only randomize the lower 3 bytes using the "random" or
3798           "stable" algorithm. If the value contains one additional MAC
3799           address after the mask, this address is used instead of the current
3800           MAC address to fill the bits that shall not be randomized. For
3801           example, a value of "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set
3802           the OUI of the MAC address to 68:F7:28, while the lower bits are
3803           randomized. A value of "02:00:00:00:00:00 00:00:00:00:00:00" will
3804           create a fully scrambled globally-administered, burned-in MAC
3805           address. If the value contains more than one additional MAC
3806           addresses, one of them is chosen randomly. For example,
3807           "02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00" will create
3808           a fully scrambled MAC address, randomly locally or globally
3809           administered.
3810
3811           Format: string
3812
3813       hidden
3814           If TRUE, indicates that the network is a non-broadcasting network
3815           that hides its SSID. This works both in infrastructure and AP mode.
3816           In infrastructure mode, various workarounds are used for a more
3817           reliable discovery of hidden networks, such as probe-scanning the
3818           SSID. However, these workarounds expose inherent insecurities with
3819           hidden SSID networks, and thus hidden SSID networks should be used
3820           with caution. In AP mode, the created network does not broadcast
3821           its SSID. Note that marking the network as hidden may be a privacy
3822           issue for you (in infrastructure mode) or client stations (in AP
3823           mode), as the explicit probe-scans are distinctly recognizable on
3824           the air.
3825
3826           Format: boolean
3827
3828       mac-address
3829           Alias: mac
3830
3831           If specified, this connection will only apply to the Wi-Fi device
3832           whose permanent MAC address matches. This property does not change
3833           the MAC address of the device (i.e. MAC spoofing).
3834
3835           Format: byte array
3836
3837       mac-address-blacklist
3838           A list of permanent MAC addresses of Wi-Fi devices to which this
3839           connection should never apply. Each MAC address should be given in
3840           the standard hex-digits-and-colons notation (eg
3841           "00:11:22:33:44:55").
3842
3843           Format: array of string
3844
3845       mac-address-randomization
3846           One of NM_SETTING_MAC_RANDOMIZATION_DEFAULT (0) (never randomize
3847           unless the user has set a global default to randomize and the
3848           supplicant supports randomization),
3849           NM_SETTING_MAC_RANDOMIZATION_NEVER (1) (never randomize the MAC
3850           address), or NM_SETTING_MAC_RANDOMIZATION_ALWAYS (2) (always
3851           randomize the MAC address). This property is deprecated for
3852           'cloned-mac-address'. Deprecated: 1
3853
3854           Format: uint32
3855
3856       mode
3857           Alias: mode
3858
3859           Wi-Fi network mode; one of "infrastructure", "mesh", "adhoc" or
3860           "ap". If blank, infrastructure is assumed.
3861
3862           Format: string
3863
3864       mtu
3865           Alias: mtu
3866
3867           If non-zero, only transmit packets of the specified size or
3868           smaller, breaking larger packets up into multiple Ethernet frames.
3869
3870           Format: uint32
3871
3872       powersave
3873           One of NM_SETTING_WIRELESS_POWERSAVE_DISABLE (2) (disable Wi-Fi
3874           power saving), NM_SETTING_WIRELESS_POWERSAVE_ENABLE (3) (enable
3875           Wi-Fi power saving), NM_SETTING_WIRELESS_POWERSAVE_IGNORE (1)
3876           (don't touch currently configure setting) or
3877           NM_SETTING_WIRELESS_POWERSAVE_DEFAULT (0) (use the globally
3878           configured value). All other values are reserved.
3879
3880           Format: uint32
3881
3882       rate
3883           If non-zero, directs the device to only use the specified bitrate
3884           for communication with the access point. Units are in Kb/s, ie 5500
3885           = 5.5 Mbit/s. This property is highly driver dependent and not all
3886           devices support setting a static bitrate.
3887
3888           Format: uint32
3889
3890       seen-bssids
3891           A list of BSSIDs (each BSSID formatted as a MAC address like
3892           "00:11:22:33:44:55") that have been detected as part of the Wi-Fi
3893           network. NetworkManager internally tracks previously seen BSSIDs.
3894           The property is only meant for reading and reflects the BSSID list
3895           of NetworkManager. The changes you make to this property will not
3896           be preserved.
3897
3898           Format: array of string
3899
3900       ssid
3901           Alias: ssid
3902
3903           SSID of the Wi-Fi network. Must be specified.
3904
3905           Format: byte array
3906
3907       tx-power
3908           If non-zero, directs the device to use the specified transmit
3909           power. Units are dBm. This property is highly driver dependent and
3910           not all devices support setting a static transmit power.
3911
3912           Format: uint32
3913
3914       wake-on-wlan
3915           The NMSettingWirelessWakeOnWLan options to enable. Not all devices
3916           support all options. May be any combination of
3917           NM_SETTING_WIRELESS_WAKE_ON_WLAN_ANY (0x2),
3918           NM_SETTING_WIRELESS_WAKE_ON_WLAN_DISCONNECT (0x4),
3919           NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC (0x8),
3920           NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE (0x10),
3921           NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST (0x20),
3922           NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE (0x40),
3923           NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE (0x80),
3924           NM_SETTING_WIRELESS_WAKE_ON_WLAN_TCP (0x100) or the special values
3925           NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT (0x1) (to use global
3926           settings) and NM_SETTING_WIRELESS_WAKE_ON_WLAN_IGNORE (0x8000) (to
3927           disable management of Wake-on-LAN in NetworkManager).
3928
3929           Format: uint32
3930
3931   802-11-wireless-security setting
3932       Alias: wifi-sec
3933
3934       Wi-Fi Security Settings.
3935
3936       Properties:
3937
3938       auth-alg
3939           When WEP is used (ie, key-mgmt = "none" or "ieee8021x") indicate
3940           the 802.11 authentication algorithm required by the AP here. One of
3941           "open" for Open System, "shared" for Shared Key, or "leap" for
3942           Cisco LEAP. When using Cisco LEAP (ie, key-mgmt = "ieee8021x" and
3943           auth-alg = "leap") the "leap-username" and "leap-password"
3944           properties must be specified.
3945
3946           Format: string
3947
3948       fils
3949           Indicates whether Fast Initial Link Setup (802.11ai) must be
3950           enabled for the connection. One of
3951           NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) (use global default
3952           value), NM_SETTING_WIRELESS_SECURITY_FILS_DISABLE (1) (disable
3953           FILS), NM_SETTING_WIRELESS_SECURITY_FILS_OPTIONAL (2) (enable FILS
3954           if the supplicant and the access point support it) or
3955           NM_SETTING_WIRELESS_SECURITY_FILS_REQUIRED (3) (enable FILS and
3956           fail if not supported). When set to
3957           NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) and no global default
3958           is set, FILS will be optionally enabled.
3959
3960           Format: int32
3961
3962       group
3963           A list of group/broadcast encryption algorithms which prevents
3964           connections to Wi-Fi networks that do not utilize one of the
3965           algorithms in the list. For maximum compatibility leave this
3966           property empty. Each list element may be one of "wep40", "wep104",
3967           "tkip", or "ccmp".
3968
3969           Format: array of string
3970
3971       key-mgmt
3972           Key management used for the connection. One of "none" (WEP),
3973           "ieee8021x" (Dynamic WEP), "wpa-psk" (infrastructure WPA-PSK),
3974           "sae" (SAE), "owe" (Opportunistic Wireless Encryption), "wpa-eap"
3975           (WPA-Enterprise) or "wpa-eap-suite-b-192" (WPA3-Enterprise Suite
3976           B). This property must be set for any Wi-Fi connection that uses
3977           security.
3978
3979           Format: string
3980
3981       leap-password
3982           The login password for legacy LEAP connections (ie, key-mgmt =
3983           "ieee8021x" and auth-alg = "leap").
3984
3985           Format: string
3986
3987       leap-password-flags
3988           Flags indicating how to handle the "leap-password" property. See
3989           the section called “Secret flag types:” for flag values.
3990
3991           Format: NMSettingSecretFlags (uint32)
3992
3993       leap-username
3994           The login username for legacy LEAP connections (ie, key-mgmt =
3995           "ieee8021x" and auth-alg = "leap").
3996
3997           Format: string
3998
3999       pairwise
4000           A list of pairwise encryption algorithms which prevents connections
4001           to Wi-Fi networks that do not utilize one of the algorithms in the
4002           list. For maximum compatibility leave this property empty. Each
4003           list element may be one of "tkip" or "ccmp".
4004
4005           Format: array of string
4006
4007       pmf
4008           Indicates whether Protected Management Frames (802.11w) must be
4009           enabled for the connection. One of
4010           NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) (use global default
4011           value), NM_SETTING_WIRELESS_SECURITY_PMF_DISABLE (1) (disable PMF),
4012           NM_SETTING_WIRELESS_SECURITY_PMF_OPTIONAL (2) (enable PMF if the
4013           supplicant and the access point support it) or
4014           NM_SETTING_WIRELESS_SECURITY_PMF_REQUIRED (3) (enable PMF and fail
4015           if not supported). When set to
4016           NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) and no global default
4017           is set, PMF will be optionally enabled.
4018
4019           Format: int32
4020
4021       proto
4022           List of strings specifying the allowed WPA protocol versions to
4023           use. Each element may be one "wpa" (allow WPA) or "rsn" (allow
4024           WPA2/RSN). If not specified, both WPA and RSN connections are
4025           allowed.
4026
4027           Format: array of string
4028
4029       psk
4030           Pre-Shared-Key for WPA networks. For WPA-PSK, it's either an ASCII
4031           passphrase of 8 to 63 characters that is (as specified in the
4032           802.11i standard) hashed to derive the actual key, or the key in
4033           form of 64 hexadecimal character. The WPA3-Personal networks use a
4034           passphrase of any length for SAE authentication.
4035
4036           Format: string
4037
4038       psk-flags
4039           Flags indicating how to handle the "psk" property. See the section
4040           called “Secret flag types:” for flag values.
4041
4042           Format: NMSettingSecretFlags (uint32)
4043
4044       wep-key-flags
4045           Flags indicating how to handle the "wep-key0", "wep-key1",
4046           "wep-key2", and "wep-key3" properties. See the section called
4047           “Secret flag types:” for flag values.
4048
4049           Format: NMSettingSecretFlags (uint32)
4050
4051       wep-key-type
4052           Controls the interpretation of WEP keys. Allowed values are
4053           NM_WEP_KEY_TYPE_KEY (1), in which case the key is either a 10- or
4054           26-character hexadecimal string, or a 5- or 13-character ASCII
4055           password; or NM_WEP_KEY_TYPE_PASSPHRASE (2), in which case the
4056           passphrase is provided as a string and will be hashed using the
4057           de-facto MD5 method to derive the actual WEP key.
4058
4059           Format: NMWepKeyType (uint32)
4060
4061       wep-key0
4062           Index 0 WEP key. This is the WEP key used in most networks. See the
4063           "wep-key-type" property for a description of how this key is
4064           interpreted.
4065
4066           Format: string
4067
4068       wep-key1
4069           Index 1 WEP key. This WEP index is not used by most networks. See
4070           the "wep-key-type" property for a description of how this key is
4071           interpreted.
4072
4073           Format: string
4074
4075       wep-key2
4076           Index 2 WEP key. This WEP index is not used by most networks. See
4077           the "wep-key-type" property for a description of how this key is
4078           interpreted.
4079
4080           Format: string
4081
4082       wep-key3
4083           Index 3 WEP key. This WEP index is not used by most networks. See
4084           the "wep-key-type" property for a description of how this key is
4085           interpreted.
4086
4087           Format: string
4088
4089       wep-tx-keyidx
4090           When static WEP is used (ie, key-mgmt = "none") and a non-default
4091           WEP key index is used by the AP, put that WEP key index here. Valid
4092           values are 0 (default key) through 3. Note that some consumer
4093           access points (like the Linksys WRT54G) number the keys 1 - 4.
4094
4095           Format: uint32
4096
4097       wps-method
4098           Flags indicating which mode of WPS is to be used if any. There's
4099           little point in changing the default setting as NetworkManager will
4100           automatically determine whether it's feasible to start WPS
4101           enrollment from the Access Point capabilities. WPS can be disabled
4102           by setting this property to a value of 1.
4103
4104           Format: uint32
4105
4106   wpan setting
4107       IEEE 802.15.4 (WPAN) MAC Settings.
4108
4109       Properties:
4110
4111       channel
4112           Alias: channel
4113
4114           IEEE 802.15.4 channel. A positive integer or -1, meaning "do not
4115           set, use whatever the device is already set to".
4116
4117           Format: int32
4118
4119       mac-address
4120           Alias: mac
4121
4122           If specified, this connection will only apply to the IEEE 802.15.4
4123           (WPAN) MAC layer device whose permanent MAC address matches.
4124
4125           Format: string
4126
4127       page
4128           Alias: page
4129
4130           IEEE 802.15.4 channel page. A positive integer or -1, meaning "do
4131           not set, use whatever the device is already set to".
4132
4133           Format: int32
4134
4135       pan-id
4136           Alias: pan-id
4137
4138           IEEE 802.15.4 Personal Area Network (PAN) identifier.
4139
4140           Format: uint32
4141
4142       short-address
4143           Alias: short-addr
4144
4145           Short IEEE 802.15.4 address to be used within a restricted
4146           environment.
4147
4148           Format: uint32
4149
4150   hostname setting
4151       Hostname settings.
4152
4153       Properties:
4154
4155       from-dhcp
4156           Whether the system hostname can be determined from DHCP on this
4157           connection. When set to NM_TERNARY_DEFAULT (-1), the value from
4158           global configuration is used. If the property doesn't have a value
4159           in the global configuration, NetworkManager assumes the value to be
4160           NM_TERNARY_TRUE (1).
4161
4162           Format: NMTernary (int32)
4163
4164       from-dns-lookup
4165           Whether the system hostname can be determined from reverse DNS
4166           lookup of addresses on this device. When set to NM_TERNARY_DEFAULT
4167           (-1), the value from global configuration is used. If the property
4168           doesn't have a value in the global configuration, NetworkManager
4169           assumes the value to be NM_TERNARY_TRUE (1).
4170
4171           Format: NMTernary (int32)
4172
4173       only-from-default
4174           If set to NM_TERNARY_TRUE (1), NetworkManager attempts to get the
4175           hostname via DHCPv4/DHCPv6 or reverse DNS lookup on this device
4176           only when the device has the default route for the given address
4177           family (IPv4/IPv6). If set to NM_TERNARY_FALSE (0), the hostname
4178           can be set from this device even if it doesn't have the default
4179           route. When set to NM_TERNARY_DEFAULT (-1), the value from global
4180           configuration is used. If the property doesn't have a value in the
4181           global configuration, NetworkManager assumes the value to be
4182           NM_TERNARY_FALSE (0).
4183
4184           Format: NMTernary (int32)
4185
4186       priority
4187           The relative priority of this connection to determine the system
4188           hostname. A lower numerical value is better (higher priority). A
4189           connection with higher priority is considered before connections
4190           with lower priority. If the value is zero, it can be overridden by
4191           a global value from NetworkManager configuration. If the property
4192           doesn't have a value in the global configuration, the value is
4193           assumed to be 100. Negative values have the special effect of
4194           excluding other connections with a greater numerical priority
4195           value; so in presence of at least one negative priority, only
4196           connections with the lowest priority value will be used to
4197           determine the hostname.
4198
4199           Format: int32
4200
4201   veth setting
4202       Veth Settings.
4203
4204       Properties:
4205
4206       peer
4207           Alias: peer
4208
4209           This property specifies the peer interface name of the veth. This
4210           property is mandatory.
4211
4212           Format: string
4213
4214   Secret flag types:
4215       Each password or secret property in a setting has an associated flags
4216       property that describes how to handle that secret. The flags property
4217       is a bitfield that contains zero or more of the following values
4218       logically OR-ed together.
4219
4220       •   0x0 (none) - the system is responsible for providing and storing
4221           this secret. This may be required so that secrets are already
4222           available before the user logs in. It also commonly means that the
4223           secret will be stored in plain text on disk, accessible to root
4224           only. For example via the keyfile settings plugin as described in
4225           the "PLUGINS" section in NetworkManager.conf(5).
4226
4227       •   0x1 (agent-owned) - a user-session secret agent is responsible for
4228           providing and storing this secret; when it is required, agents will
4229           be asked to provide it.
4230
4231       •   0x2 (not-saved) - this secret should not be saved but should be
4232           requested from the user each time it is required. This flag should
4233           be used for One-Time-Pad secrets, PIN codes from hardware tokens,
4234           or if the user simply does not want to save the secret.
4235
4236       •   0x4 (not-required) - in some situations it cannot be automatically
4237           determined that a secret is required or not. This flag hints that
4238           the secret is not required and should not be requested from the
4239           user.
4240

FILES

4242       /etc/NetworkManager/system-connections or distro plugin-specific
4243       location
4244

SEE ALSO

4246       nmcli(1), nmcli-examples(7), NetworkManager(8), nm-settings-dbus(5),
4247       nm-settings-keyfile(5), NetworkManager.conf(5)
4248
4249
4250
4251NetworkManager 1.30.4                                     NM-SETTINGS-NMCLI(5)
Impressum