1SYSTEMD.NETWORK(5) systemd.network SYSTEMD.NETWORK(5)
2
3
4
6 systemd.network - Network configuration
7
9 network.network
10
12 A plain ini-style text file that encodes network configuration for
13 matching network interfaces, used by systemd-networkd(8). See
14 systemd.syntax(7) for a general description of the syntax.
15
16 The main network file must have the extension .network; other
17 extensions are ignored. Networks are applied to links whenever the
18 links appear.
19
20 The .network files are read from the files located in the system
21 network directories /usr/lib/systemd/network and
22 /usr/local/lib/systemd/network, the volatile runtime network directory
23 /run/systemd/network and the local administration network directory
24 /etc/systemd/network. All configuration files are collectively sorted
25 and processed in alphanumeric order, regardless of the directories in
26 which they live. However, files with identical filenames replace each
27 other. It is recommended that each filename is prefixed with a number
28 (e.g. 10-eth0.network). Otherwise, the default .network files or those
29 generated by systemd-network-generator.service(8) may take precedence
30 over user configured files. Files in /etc/ have the highest priority,
31 files in /run/ take precedence over files with the same name under
32 /usr/. This can be used to override a system-supplied configuration
33 file with a local file if needed. As a special case, an empty file
34 (file size 0) or symlink with the same name pointing to /dev/null
35 disables the configuration file entirely (it is "masked").
36
37 Along with the network file foo.network, a "drop-in" directory
38 foo.network.d/ may exist. All files with the suffix ".conf" from this
39 directory will be merged in the alphanumeric order and parsed after the
40 main file itself has been parsed. This is useful to alter or add
41 configuration settings, without having to modify the main configuration
42 file. Each drop-in file must have appropriate section headers.
43
44 In addition to /etc/systemd/network, drop-in ".d" directories can be
45 placed in /usr/lib/systemd/network or /run/systemd/network directories.
46 Drop-in files in /etc/ take precedence over those in /run/ which in
47 turn take precedence over those in /usr/lib/. Drop-in files under any
48 of these directories take precedence over the main network file
49 wherever located.
50
52 The network file contains a [Match] section, which determines if a
53 given network file may be applied to a given interface; and a [Network]
54 section specifying how the interface should be configured. The first
55 (in alphanumeric order) of the network files that matches a given
56 interface is applied, all later files are ignored, even if they match
57 as well.
58
59 A network file is said to match a network interface if all matches
60 specified by the [Match] section are satisfied. When a network file
61 does not contain valid settings in [Match] section, then the file will
62 match all interfaces and systemd-networkd warns about that. Hint: to
63 avoid the warning and to make it clear that all interfaces shall be
64 matched, add the following:
65
66 Name=*
67
68 The following keys are accepted:
69
70 MACAddress=
71 A whitespace-separated list of hardware addresses. The acceptable
72 formats are:
73
74 colon-delimited hexadecimal
75 Each field must be one byte. E.g. "12:34:56:78:90:ab" or
76 "AA:BB:CC:DD:EE:FF".
77
78 hyphen-delimited hexadecimal
79 Each field must be one byte. E.g. "12-34-56-78-90-ab" or
80 "AA-BB-CC-DD-EE-FF".
81
82 dot-delimited hexadecimal
83 Each field must be two bytes. E.g. "1234.5678.90ab" or
84 "AABB.CCDD.EEFF".
85
86 IPv4 address format
87 E.g. "127.0.0.1" or "192.168.0.1".
88
89 IPv6 address format
90 E.g. "2001:0db8:85a3::8a2e:0370:7334" or "::1".
91
92 The total length of each MAC address must be 4 (for IPv4 tunnel), 6
93 (for Ethernet), 16 (for IPv6 tunnel), or 20 (for InfiniBand). This
94 option may appear more than once, in which case the lists are
95 merged. If the empty string is assigned to this option, the list of
96 hardware addresses defined prior to this is reset. Defaults to
97 unset.
98
99 PermanentMACAddress=
100 A whitespace-separated list of hardware's permanent addresses.
101 While MACAddress= matches the device's current MAC address, this
102 matches the device's permanent MAC address, which may be different
103 from the current one. Use full colon-, hyphen- or dot-delimited
104 hexadecimal, or IPv4 or IPv6 address format. This option may appear
105 more than once, in which case the lists are merged. If the empty
106 string is assigned to this option, the list of hardware addresses
107 defined prior to this is reset. Defaults to unset.
108
109 Path=
110 A whitespace-separated list of shell-style globs matching the
111 persistent path, as exposed by the udev property ID_PATH.
112
113 Driver=
114 A whitespace-separated list of shell-style globs matching the
115 driver currently bound to the device, as exposed by the udev
116 property ID_NET_DRIVER of its parent device, or if that is not set,
117 the driver as exposed by ethtool -i of the device itself. If the
118 list is prefixed with a "!", the test is inverted.
119
120 Type=
121 A whitespace-separated list of shell-style globs matching the
122 device type, as exposed by networkctl list. If the list is prefixed
123 with a "!", the test is inverted. Some valid values are "ether",
124 "loopback", "wlan", "wwan". Valid types are named either from the
125 udev "DEVTYPE" attribute, or "ARPHRD_" macros in linux/if_arp.h, so
126 this is not comprehensive.
127
128 Kind=
129 A whitespace-separated list of shell-style globs matching the
130 device kind, as exposed by networkctl status INTERFACE or ip -d
131 link show INTERFACE. If the list is prefixed with a "!", the test
132 is inverted. Some valid values are "bond", "bridge", "gre", "tun",
133 "veth". Valid kinds are given by netlink's "IFLA_INFO_KIND"
134 attribute, so this is not comprehensive.
135
136 Property=
137 A whitespace-separated list of udev property names with their
138 values after equals sign ("="). If multiple properties are
139 specified, the test results are ANDed. If the list is prefixed with
140 a "!", the test is inverted. If a value contains white spaces, then
141 please quote whole key and value pair. If a value contains
142 quotation, then please escape the quotation with "\".
143
144 Example: if a .link file has the following:
145
146 Property=ID_MODEL_ID=9999 "ID_VENDOR_FROM_DATABASE=vendor name" "KEY=with \"quotation\""
147
148 then, the .link file matches only when an interface has all the
149 above three properties.
150
151 Name=
152 A whitespace-separated list of shell-style globs matching the
153 device name, as exposed by the udev property "INTERFACE", or
154 device's alternative names. If the list is prefixed with a "!", the
155 test is inverted.
156
157 WLANInterfaceType=
158 A whitespace-separated list of wireless network type. Supported
159 values are "ad-hoc", "station", "ap", "ap-vlan", "wds", "monitor",
160 "mesh-point", "p2p-client", "p2p-go", "p2p-device", "ocb", and
161 "nan". If the list is prefixed with a "!", the test is inverted.
162
163 SSID=
164 A whitespace-separated list of shell-style globs matching the SSID
165 of the currently connected wireless LAN. If the list is prefixed
166 with a "!", the test is inverted.
167
168 BSSID=
169 A whitespace-separated list of hardware address of the currently
170 connected wireless LAN. Use full colon-, hyphen- or dot-delimited
171 hexadecimal. See the example in MACAddress=. This option may appear
172 more than once, in which case the lists are merged. If the empty
173 string is assigned to this option, the list is reset.
174
175 Host=
176 Matches against the hostname or machine ID of the host. See
177 ConditionHost= in systemd.unit(5) for details. When prefixed with
178 an exclamation mark ("!"), the result is negated. If an empty
179 string is assigned, then previously assigned value is cleared.
180
181 Virtualization=
182 Checks whether the system is executed in a virtualized environment
183 and optionally test whether it is a specific implementation. See
184 ConditionVirtualization= in systemd.unit(5) for details. When
185 prefixed with an exclamation mark ("!"), the result is negated. If
186 an empty string is assigned, then previously assigned value is
187 cleared.
188
189 KernelCommandLine=
190 Checks whether a specific kernel command line option is set. See
191 ConditionKernelCommandLine= in systemd.unit(5) for details. When
192 prefixed with an exclamation mark ("!"), the result is negated. If
193 an empty string is assigned, then previously assigned value is
194 cleared.
195
196 KernelVersion=
197 Checks whether the kernel version (as reported by uname -r) matches
198 a certain expression. See ConditionKernelVersion= in
199 systemd.unit(5) for details. When prefixed with an exclamation mark
200 ("!"), the result is negated. If an empty string is assigned, then
201 previously assigned value is cleared.
202
203 Architecture=
204 Checks whether the system is running on a specific architecture.
205 See ConditionArchitecture= in systemd.unit(5) for details. When
206 prefixed with an exclamation mark ("!"), the result is negated. If
207 an empty string is assigned, then previously assigned value is
208 cleared.
209
210 Firmware=
211 Checks whether the system is running on a machine with the
212 specified firmware. See ConditionFirmware= in systemd.unit(5) for
213 details. When prefixed with an exclamation mark ("!"), the result
214 is negated. If an empty string is assigned, then previously
215 assigned value is cleared.
216
218 The [Link] section accepts the following keys:
219
220 MACAddress=
221 The hardware address to set for the device.
222
223 MTUBytes=
224 The maximum transmission unit in bytes to set for the device. The
225 usual suffixes K, M, G, are supported and are understood to the
226 base of 1024.
227
228 Note that if IPv6 is enabled on the interface, and the MTU is
229 chosen below 1280 (the minimum MTU for IPv6) it will automatically
230 be increased to this value.
231
232 ARP=
233 Takes a boolean. If set to true, the ARP (low-level Address
234 Resolution Protocol) for this interface is enabled. When unset, the
235 kernel's default will be used.
236
237 For example, disabling ARP is useful when creating multiple MACVLAN
238 or VLAN virtual interfaces atop a single lower-level physical
239 interface, which will then only serve as a link/"bridge" device
240 aggregating traffic to the same physical link and not participate
241 in the network otherwise. Defaults to unset.
242
243 Multicast=
244 Takes a boolean. If set to true, the multicast flag on the device
245 is enabled. Defaults to unset.
246
247 AllMulticast=
248 Takes a boolean. If set to true, the driver retrieves all multicast
249 packets from the network. This happens when multicast routing is
250 enabled. Defaults to unset.
251
252 Promiscuous=
253 Takes a boolean. If set to true, promiscuous mode of the interface
254 is enabled. Defaults to unset.
255
256 If this is set to false for the underlying link of a "passthru"
257 mode MACVLAN/MACVTAP, the virtual interface will be created with
258 the "nopromisc" flag set.
259
260 Unmanaged=
261 Takes a boolean. When "yes", no attempts are made to bring up or
262 configure matching links, equivalent to when there are no matching
263 network files. Defaults to "no".
264
265 This is useful for preventing later matching network files from
266 interfering with certain interfaces that are fully controlled by
267 other applications.
268
269 Group=
270 Link groups are similar to port ranges found in managed switches.
271 When network interfaces are added to a numbered group, operations
272 on all the interfaces from that group can be performed at once.
273 Takes an unsigned integer in the range 0...2147483647. Defaults to
274 unset.
275
276 RequiredForOnline=
277 Takes a boolean or a minimum operational state and an optional
278 maximum operational state. Please see networkctl(1) for possible
279 operational states. When "yes", the network is deemed required when
280 determining whether the system is online (including when running
281 systemd-networkd-wait-online). When "no", the network is ignored
282 when determining the online state. When a minimum operational state
283 and an optional maximum operational state are set, "yes" is
284 implied, and this controls the minimum and maximum operational
285 state required for the network interface to be considered online.
286
287 Defaults to "yes" when ActivationPolicy= is not set, or set to
288 "up", "always-up", or "bound". Defaults to "no" when
289 ActivationPolicy= is set to "manual" or "down". This is forced to
290 "no" when ActivationPolicy= is set to "always-down".
291
292 The network will be brought up normally (as configured by
293 ActivationPolicy=), but in the event that there is no address being
294 assigned by DHCP or the cable is not plugged in, the link will
295 simply remain offline and be skipped automatically by
296 systemd-networkd-wait-online if "RequiredForOnline=no".
297
298 RequiredFamilyForOnline=
299 Takes an address family. When specified, an IP address in the given
300 family is deemed required when determining whether the link is
301 online (including when running systemd-networkd-wait-online). Takes
302 one of "ipv4", "ipv6", "both", or "any". Defaults to "any". Note
303 that this option has no effect if "RequiredForOnline=no", or if
304 "RequiredForOnline=" specifies a minimum operational state below
305 "degraded".
306
307 ActivationPolicy=
308 Specifies the policy for systemd-networkd managing the link
309 administrative state. Specifically, this controls how
310 systemd-networkd changes the network device's "IFF_UP" flag, which
311 is sometimes controlled by system administrators by running e.g.,
312 ip link set dev eth0 up or ip link set dev eth0 down, and can also
313 be changed with networkctl up eth0 or networkctl down eth0.
314
315 Takes one of "up", "always-up", "manual", "always-down", "down", or
316 "bound". When "manual", systemd-networkd will not change the link's
317 admin state automatically; the system administrator must bring the
318 interface up or down manually, as desired. When "up" (the default)
319 or "always-up", or "down" or "always-down", systemd-networkd will
320 set the link up or down, respectively, when the interface is
321 (re)configured. When "always-up" or "always-down", systemd-networkd
322 will set the link up or down, respectively, any time
323 systemd-networkd detects a change in the administrative state. When
324 BindCarrier= is also set, this is automatically set to "bound" and
325 any other value is ignored.
326
327 When the policy is set to "down" or "manual", the default value of
328 RequiredForOnline= is "no". When the policy is set to
329 "always-down", the value of RequiredForOnline= forced to "no".
330
331 The administrative state is not the same as the carrier state, so
332 using "always-up" does not mean the link will never lose carrier.
333 The link carrier depends on both the administrative state as well
334 as the network device's physical connection. However, to avoid
335 reconfiguration failures, when using "always-up",
336 IgnoreCarrierLoss= is forced to true.
337
339 The [SR-IOV] section accepts the following keys. Specify several
340 [SR-IOV] sections to configure several SR-IOVs. SR-IOV provides the
341 ability to partition a single physical PCI resource into virtual PCI
342 functions which can then be injected into a VM. In the case of network
343 VFs, SR-IOV improves north-south network performance (that is, traffic
344 with endpoints outside the host machine) by allowing traffic to bypass
345 the host machine’s network stack.
346
347 VirtualFunction=
348 Specifies a Virtual Function (VF), lightweight PCIe function
349 designed solely to move data in and out. Takes an integer in the
350 range 0...2147483646. This option is compulsory.
351
352 VLANId=
353 Specifies VLAN ID of the virtual function. Takes an integer in the
354 range 1...4095.
355
356 QualityOfService=
357 Specifies quality of service of the virtual function. Takes an
358 integer in the range 1...4294967294.
359
360 VLANProtocol=
361 Specifies VLAN protocol of the virtual function. Takes "802.1Q" or
362 "802.1ad".
363
364 MACSpoofCheck=
365 Takes a boolean. Controls the MAC spoof checking. When unset, the
366 kernel's default will be used.
367
368 QueryReceiveSideScaling=
369 Takes a boolean. Toggle the ability of querying the receive side
370 scaling (RSS) configuration of the virtual function (VF). The VF
371 RSS information like RSS hash key may be considered sensitive on
372 some devices where this information is shared between VF and the
373 physical function (PF). When unset, the kernel's default will be
374 used.
375
376 Trust=
377 Takes a boolean. Allows one to set trust mode of the virtual
378 function (VF). When set, VF users can set a specific feature which
379 may impact security and/or performance. When unset, the kernel's
380 default will be used.
381
382 LinkState=
383 Allows one to set the link state of the virtual function (VF).
384 Takes a boolean or a special value "auto". Setting to "auto" means
385 a reflection of the physical function (PF) link state, "yes" lets
386 the VF to communicate with other VFs on this host even if the PF
387 link state is down, "no" causes the hardware to drop any packets
388 sent by the VF. When unset, the kernel's default will be used.
389
390 MACAddress=
391 Specifies the MAC address for the virtual function.
392
394 The [Network] section accepts the following keys:
395
396 Description=
397 A description of the device. This is only used for presentation
398 purposes.
399
400 DHCP=
401 Enables DHCPv4 and/or DHCPv6 client support. Accepts "yes", "no",
402 "ipv4", or "ipv6". Defaults to "no".
403
404 Note that DHCPv6 will by default be triggered by Router
405 Advertisement, if that is enabled, regardless of this parameter. By
406 explicitly enabling DHCPv6 support here, the DHCPv6 client will be
407 started in the mode specified by the
408 <variable>WithoutRA=</variable> setting in the [DHCPv6] section,
409 regardless of the presence of routers on the link, or what flags
410 the routers pass. See "IPv6AcceptRA=".
411
412 Furthermore, note that by default the domain name specified through
413 DHCP is not used for name resolution. See option UseDomains= below.
414
415 See the [DHCPv4] or [DHCPv6] sections below for further
416 configuration options for the DHCP client support.
417
418 DHCPServer=
419 Takes a boolean. If set to "yes", DHCPv4 server will be started.
420 Defaults to "no". Further settings for the DHCP server may be set
421 in the [DHCPServer] section described below.
422
423 LinkLocalAddressing=
424 Enables link-local address autoconfiguration. Accepts yes, no,
425 ipv4, and ipv6. An IPv6 link-local address is configured when yes
426 or ipv6. An IPv4 link-local address is configured when yes or ipv4
427 and when DHCPv4 autoconfiguration has been unsuccessful for some
428 time. (IPv4 link-local address autoconfiguration will usually
429 happen in parallel with repeated attempts to acquire a DHCPv4
430 lease).
431
432 Defaults to no when KeepMaster= or Bridge= is set or when the
433 specified MACVLAN=/MACVTAP= has Mode=passthru, or ipv6 otherwise.
434
435 IPv6LinkLocalAddressGenerationMode=
436 Specifies how IPv6 link-local address is generated. Takes one of
437 "eui64", "none", "stable-privacy" and "random". When unset,
438 "stable-privacy" is used if IPv6StableSecretAddress= is specified,
439 and if not, "eui64" is used. Note that if LinkLocalAddressing= is
440 "no" or "ipv4", then IPv6LinkLocalAddressGenerationMode= will be
441 ignored. Also, even if LinkLocalAddressing= is "yes" or "ipv6",
442 setting IPv6LinkLocalAddressGenerationMode=none disables to
443 configure an IPv6 link-local address.
444
445 IPv6StableSecretAddress=
446 Takes an IPv6 address. The specified address will be used as a
447 stable secret for generating IPv6 link-local address. If this
448 setting is specified, and IPv6LinkLocalAddressGenerationMode= is
449 unset, then IPv6LinkLocalAddressGenerationMode=stable-privacy is
450 implied. If this setting is not specified, and "stable-privacy" is
451 set to IPv6LinkLocalAddressGenerationMode=, then a stable secret
452 address will be generated from the local machine ID and the
453 interface name.
454
455 IPv4LLRoute=
456 Takes a boolean. If set to true, sets up the route needed for
457 non-IPv4LL hosts to communicate with IPv4LL-only hosts. Defaults to
458 false.
459
460 DefaultRouteOnDevice=
461 Takes a boolean. If set to true, sets up the default route bound to
462 the interface. Defaults to false. This is useful when creating
463 routes on point-to-point interfaces. This is equivalent to e.g. the
464 following,
465
466 ip route add default dev veth99
467
468 or,
469
470 [Route]
471 Gateway=0.0.0.0
472
473 Currently, there are no way to specify e.g., the table for the
474 route configured by this setting. To configure the default route
475 with such an additional property, please use the following instead:
476
477 [Route]
478 Gateway=0.0.0.0
479 Table=1234
480
481 LLMNR=
482 Takes a boolean or "resolve". When true, enables Link-Local
483 Multicast Name Resolution[1] on the link. When set to "resolve",
484 only resolution is enabled, but not host registration and
485 announcement. Defaults to true. This setting is read by systemd-
486 resolved.service(8).
487
488 MulticastDNS=
489 Takes a boolean or "resolve". When true, enables Multicast DNS[2]
490 support on the link. When set to "resolve", only resolution is
491 enabled, but not host or service registration and announcement.
492 Defaults to false. This setting is read by systemd-
493 resolved.service(8).
494
495 DNSOverTLS=
496 Takes a boolean or "opportunistic". When true, enables
497 DNS-over-TLS[3] support on the link. When set to "opportunistic",
498 compatibility with non-DNS-over-TLS servers is increased, by
499 automatically turning off DNS-over-TLS servers in this case. This
500 option defines a per-interface setting for resolved.conf(5)'s
501 global DNSOverTLS= option. Defaults to unset, and the global
502 setting will be used. This setting is read by systemd-
503 resolved.service(8).
504
505 DNSSEC=
506 Takes a boolean or "allow-downgrade". When true, enables DNSSEC[4]
507 DNS validation support on the link. When set to "allow-downgrade",
508 compatibility with non-DNSSEC capable networks is increased, by
509 automatically turning off DNSSEC in this case. This option defines
510 a per-interface setting for resolved.conf(5)'s global DNSSEC=
511 option. Defaults to unset, and the global setting will be used.
512 This setting is read by systemd-resolved.service(8).
513
514 DNSSECNegativeTrustAnchors=
515 A space-separated list of DNSSEC negative trust anchor domains. If
516 specified and DNSSEC is enabled, look-ups done via the interface's
517 DNS server will be subject to the list of negative trust anchors,
518 and not require authentication for the specified domains, or
519 anything below it. Use this to disable DNSSEC authentication for
520 specific private domains, that cannot be proven valid using the
521 Internet DNS hierarchy. Defaults to the empty list. This setting is
522 read by systemd-resolved.service(8).
523
524 LLDP=
525 Controls support for Ethernet LLDP packet reception. LLDP is a
526 link-layer protocol commonly implemented on professional routers
527 and bridges which announces which physical port a system is
528 connected to, as well as other related data. Accepts a boolean or
529 the special value "routers-only". When true, incoming LLDP packets
530 are accepted and a database of all LLDP neighbors maintained. If
531 "routers-only" is set only LLDP data of various types of routers is
532 collected and LLDP data about other types of devices ignored (such
533 as stations, telephones and others). If false, LLDP reception is
534 disabled. Defaults to "routers-only". Use networkctl(1) to query
535 the collected neighbor data. LLDP is only available on Ethernet
536 links. See EmitLLDP= below for enabling LLDP packet emission from
537 the local system.
538
539 EmitLLDP=
540 Controls support for Ethernet LLDP packet emission. Accepts a
541 boolean parameter or the special values "nearest-bridge",
542 "non-tpmr-bridge" and "customer-bridge". Defaults to false, which
543 turns off LLDP packet emission. If not false, a short LLDP packet
544 with information about the local system is sent out in regular
545 intervals on the link. The LLDP packet will contain information
546 about the local hostname, the local machine ID (as stored in
547 machine-id(5)) and the local interface name, as well as the pretty
548 hostname of the system (as set in machine-info(5)). LLDP emission
549 is only available on Ethernet links. Note that this setting passes
550 data suitable for identification of host to the network and should
551 thus not be enabled on untrusted networks, where such
552 identification data should not be made available. Use this option
553 to permit other systems to identify on which interfaces they are
554 connected to this system. The three special values control
555 propagation of the LLDP packets. The "nearest-bridge" setting
556 permits propagation only to the nearest connected bridge,
557 "non-tpmr-bridge" permits propagation across Two-Port MAC Relays,
558 but not any other bridges, and "customer-bridge" permits
559 propagation until a customer bridge is reached. For details about
560 these concepts, see IEEE 802.1AB-2016[5]. Note that configuring
561 this setting to true is equivalent to "nearest-bridge", the
562 recommended and most restricted level of propagation. See LLDP=
563 above for an option to enable LLDP reception.
564
565 BindCarrier=
566 A link name or a list of link names. When set, controls the
567 behavior of the current link. When all links in the list are in an
568 operational down state, the current link is brought down. When at
569 least one link has carrier, the current interface is brought up.
570
571 This forces ActivationPolicy= to be set to "bound".
572
573 Address=
574 A static IPv4 or IPv6 address and its prefix length, separated by a
575 "/" character. Specify this key more than once to configure several
576 addresses. The format of the address must be as described in
577 inet_pton(3). This is a short-hand for an [Address] section only
578 containing an Address key (see below). This option may be specified
579 more than once.
580
581 If the specified address is "0.0.0.0" (for IPv4) or "::" (for
582 IPv6), a new address range of the requested size is automatically
583 allocated from a system-wide pool of unused ranges. Note that the
584 prefix length must be equal or larger than 8 for IPv4, and 64 for
585 IPv6. The allocated range is checked against all current network
586 interfaces and all known network configuration files to avoid
587 address range conflicts. The default system-wide pool consists of
588 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8 for IPv4, and fd00::/8
589 for IPv6. This functionality is useful to manage a large number of
590 dynamically created network interfaces with the same network
591 configuration and automatic address range assignment.
592
593 Gateway=
594 The gateway address, which must be in the format described in
595 inet_pton(3). This is a short-hand for a [Route] section only
596 containing a Gateway= key. This option may be specified more than
597 once.
598
599 DNS=
600 A DNS server address, which must be in the format described in
601 inet_pton(3). This option may be specified more than once. Each
602 address can optionally take a port number separated with ":", a
603 network interface name or index separated with "%", and a Server
604 Name Indication (SNI) separated with "#". When IPv6 address is
605 specified with a port number, then the address must be in the
606 square brackets. That is, the acceptable full formats are
607 "111.222.333.444:9953%ifname#example.com" for IPv4 and
608 "[1111:2222::3333]:9953%ifname#example.com" for IPv6. If an empty
609 string is assigned, then the all previous assignments are cleared.
610 This setting is read by systemd-resolved.service(8).
611
612 Domains=
613 A whitespace-separated list of domains which should be resolved
614 using the DNS servers on this link. Each item in the list should be
615 a domain name, optionally prefixed with a tilde ("~"). The domains
616 with the prefix are called "routing-only domains". The domains
617 without the prefix are called "search domains" and are first used
618 as search suffixes for extending single-label hostnames (hostnames
619 containing no dots) to become fully qualified domain names (FQDNs).
620 If a single-label hostname is resolved on this interface, each of
621 the specified search domains are appended to it in turn, converting
622 it into a fully qualified domain name, until one of them may be
623 successfully resolved.
624
625 Both "search" and "routing-only" domains are used for routing of
626 DNS queries: look-ups for hostnames ending in those domains (hence
627 also single label names, if any "search domains" are listed), are
628 routed to the DNS servers configured for this interface. The domain
629 routing logic is particularly useful on multi-homed hosts with DNS
630 servers serving particular private DNS zones on each interface.
631
632 The "routing-only" domain "~." (the tilde indicating definition of
633 a routing domain, the dot referring to the DNS root domain which is
634 the implied suffix of all valid DNS names) has special effect. It
635 causes all DNS traffic which does not match another configured
636 domain routing entry to be routed to DNS servers specified for this
637 interface. This setting is useful to prefer a certain set of DNS
638 servers if a link on which they are connected is available.
639
640 This setting is read by systemd-resolved.service(8). "Search
641 domains" correspond to the domain and search entries in
642 resolv.conf(5). Domain name routing has no equivalent in the
643 traditional glibc API, which has no concept of domain name servers
644 limited to a specific link.
645
646 DNSDefaultRoute=
647 Takes a boolean argument. If true, this link's configured DNS
648 servers are used for resolving domain names that do not match any
649 link's configured Domains= setting. If false, this link's
650 configured DNS servers are never used for such domains, and are
651 exclusively used for resolving names that match at least one of the
652 domains configured on this link. If not specified defaults to an
653 automatic mode: queries not matching any link's configured domains
654 will be routed to this link if it has no routing-only domains
655 configured.
656
657 NTP=
658 An NTP server address (either an IP address, or a hostname). This
659 option may be specified more than once. This setting is read by
660 systemd-timesyncd.service(8).
661
662 IPForward=
663 Configures IP packet forwarding for the system. If enabled,
664 incoming packets on any network interface will be forwarded to any
665 other interfaces according to the routing table. Takes a boolean,
666 or the values "ipv4" or "ipv6", which only enable IP packet
667 forwarding for the specified address family. This controls the
668 net.ipv4.ip_forward and net.ipv6.conf.all.forwarding sysctl options
669 of the network interface (see ip-sysctl.txt[6] for details about
670 sysctl options). Defaults to "no".
671
672 Note: this setting controls a global kernel option, and does so one
673 way only: if a network that has this setting enabled is set up the
674 global setting is turned on. However, it is never turned off again,
675 even after all networks with this setting enabled are shut down
676 again.
677
678 To allow IP packet forwarding only between specific network
679 interfaces use a firewall.
680
681 IPMasquerade=
682 Configures IP masquerading for the network interface. If enabled,
683 packets forwarded from the network interface will be appear as
684 coming from the local host. Takes one of "ipv4", "ipv6", "both", or
685 "no". Defaults to "no". If enabled, this automatically sets
686 IPForward= to one of "ipv4", "ipv6" or "yes".
687
688 Note. Any positive boolean values such as "yes" or "true" are now
689 deprecated. Please use one of the values in the above.
690
691 IPv6PrivacyExtensions=
692 Configures use of stateless temporary addresses that change over
693 time (see RFC 4941[7], Privacy Extensions for Stateless Address
694 Autoconfiguration in IPv6). Takes a boolean or the special values
695 "prefer-public" and "kernel". When true, enables the privacy
696 extensions and prefers temporary addresses over public addresses.
697 When "prefer-public", enables the privacy extensions, but prefers
698 public addresses over temporary addresses. When false, the privacy
699 extensions remain disabled. When "kernel", the kernel's default
700 setting will be left in place. Defaults to "no".
701
702 IPv6AcceptRA=
703 Takes a boolean. Controls IPv6 Router Advertisement (RA) reception
704 support for the interface. If true, RAs are accepted; if false, RAs
705 are ignored. When RAs are accepted, they may trigger the start of
706 the DHCPv6 client if the relevant flags are set in the RA data, or
707 if no routers are found on the link. The default is to disable RA
708 reception for bridge devices or when IP forwarding is enabled, and
709 to enable it otherwise. Cannot be enabled on bond devices and when
710 link-local addressing is disabled.
711
712 Further settings for the IPv6 RA support may be configured in the
713 [IPv6AcceptRA] section, see below.
714
715 Also see ip-sysctl.txt[6] in the kernel documentation regarding
716 "accept_ra", but note that systemd's setting of 1 (i.e. true)
717 corresponds to kernel's setting of 2.
718
719 Note that kernel's implementation of the IPv6 RA protocol is always
720 disabled, regardless of this setting. If this option is enabled, a
721 userspace implementation of the IPv6 RA protocol is used, and the
722 kernel's own implementation remains disabled, since
723 systemd-networkd needs to know all details supplied in the
724 advertisements, and these are not available from the kernel if the
725 kernel's own implementation is used.
726
727 IPv6DuplicateAddressDetection=
728 Configures the amount of IPv6 Duplicate Address Detection (DAD)
729 probes to send. When unset, the kernel's default will be used.
730
731 IPv6HopLimit=
732 Configures IPv6 Hop Limit. For each router that forwards the
733 packet, the hop limit is decremented by 1. When the hop limit field
734 reaches zero, the packet is discarded. When unset, the kernel's
735 default will be used.
736
737 IPv4AcceptLocal=
738 Takes a boolean. Accept packets with local source addresses. In
739 combination with suitable routing, this can be used to direct
740 packets between two local interfaces over the wire and have them
741 accepted properly. When unset, the kernel's default will be used.
742
743 IPv4RouteLocalnet=
744 Takes a boolean. When true, the kernel does not consider loopback
745 addresses as martian source or destination while routing. This
746 enables the use of 127.0.0.0/8 for local routing purposes. When
747 unset, the kernel's default will be used.
748
749 IPv4ProxyARP=
750 Takes a boolean. Configures proxy ARP for IPv4. Proxy ARP is the
751 technique in which one host, usually a router, answers ARP requests
752 intended for another machine. By "faking" its identity, the router
753 accepts responsibility for routing packets to the "real"
754 destination. See RFC 1027[8]. When unset, the kernel's default will
755 be used.
756
757 IPv6ProxyNDP=
758 Takes a boolean. Configures proxy NDP for IPv6. Proxy NDP (Neighbor
759 Discovery Protocol) is a technique for IPv6 to allow routing of
760 addresses to a different destination when peers expect them to be
761 present on a certain physical link. In this case a router answers
762 Neighbour Advertisement messages intended for another machine by
763 offering its own MAC address as destination. Unlike proxy ARP for
764 IPv4, it is not enabled globally, but will only send Neighbour
765 Advertisement messages for addresses in the IPv6 neighbor proxy
766 table, which can also be shown by ip -6 neighbour show proxy.
767 systemd-networkd will control the per-interface `proxy_ndp` switch
768 for each configured interface depending on this option. When unset,
769 the kernel's default will be used.
770
771 IPv6ProxyNDPAddress=
772 An IPv6 address, for which Neighbour Advertisement messages will be
773 proxied. This option may be specified more than once.
774 systemd-networkd will add the IPv6ProxyNDPAddress= entries to the
775 kernel's IPv6 neighbor proxy table. This setting implies
776 IPv6ProxyNDP=yes but has no effect if IPv6ProxyNDP= has been set to
777 false. When unset, the kernel's default will be used.
778
779 IPv6SendRA=
780 Whether to enable or disable Router Advertisement sending on a
781 link. Takes a boolean value. When enabled, prefixes configured in
782 [IPv6Prefix] sections and routes configured in the
783 [IPv6RoutePrefix] sections are distributed as defined in the
784 [IPv6SendRA] section. If DHCPPrefixDelegation= is enabled, then the
785 delegated prefixes are also distributed. See DCHPPrefixDelegation=
786 setting and the [IPv6SendRA], [IPv6Prefix], [IPv6RoutePrefix], and
787 [DHCPPrefixDelegation] sections for more configuration options.
788
789 DHCPPrefixDelegation=
790 Takes a boolean value. When enabled, requests subnet prefixes on
791 another link via the DHCPv6 protocol or via the 6RD option in the
792 DHCPv4 protocol. An address within each delegated prefix will be
793 assigned, and the prefixes will be announced through IPv6 Router
794 Advertisement if IPv6SendRA= is enabled. This behaviour can be
795 configured in the [DHCPPrefixDelegation] section. Defaults to
796 disabled.
797
798 IPv6MTUBytes=
799 Configures IPv6 maximum transmission unit (MTU). An integer greater
800 than or equal to 1280 bytes. When unset, the kernel's default will
801 be used.
802
803 KeepMaster=
804 Takes a boolean value. When enabled, the current master interface
805 index will not be changed, and BatmanAdvanced=, Bond=, Bridge=, and
806 VRF= settings are ignored. This may be useful when a netdev with a
807 master interface is created by another program, e.g. systemd-
808 nspawn(1). Defaults to false.
809
810 BatmanAdvanced=, Bond=, Bridge=, VRF=
811 The name of the B.A.T.M.A.N. Advanced, bond, bridge, or VRF
812 interface to add the link to. See systemd.netdev(5).
813
814 IPoIB=, IPVLAN=, IPVTAP=, MACsec=, MACVLAN=, MACVTAP=, Tunnel=, VLAN=,
815 VXLAN=, Xfrm=
816 The name of an IPoIB, IPVLAN, IPVTAP, MACsec, MACVLAN, MACVTAP,
817 tunnel, VLAN, VXLAN, or Xfrm to be created on the link. See
818 systemd.netdev(5). This option may be specified more than once.
819
820 ActiveSlave=
821 Takes a boolean. Specifies the new active slave. The "ActiveSlave="
822 option is only valid for following modes: "active-backup",
823 "balance-alb", and "balance-tlb". Defaults to false.
824
825 PrimarySlave=
826 Takes a boolean. Specifies which slave is the primary device. The
827 specified device will always be the active slave while it is
828 available. Only when the primary is off-line will alternate devices
829 be used. This is useful when one slave is preferred over another,
830 e.g. when one slave has higher throughput than another. The
831 "PrimarySlave=" option is only valid for following modes:
832 "active-backup", "balance-alb", and "balance-tlb". Defaults to
833 false.
834
835 ConfigureWithoutCarrier=
836 Takes a boolean. Allows networkd to configure a specific link even
837 if it has no carrier. Defaults to false. If enabled, and the
838 IgnoreCarrierLoss= setting is not explicitly set, then it is
839 enabled as well.
840
841 IgnoreCarrierLoss=
842 Takes a boolean or a timespan. When true, systemd-networkd retains
843 both the static and dynamic configuration of the interface even if
844 its carrier is lost. When false, systemd-networkd drops both the
845 static and dynamic configuration of the interface. When a timespan
846 is specified, systemd-networkd waits for the specified timespan,
847 and ignores the carrier loss if the link regain its carrier within
848 the timespan. Setting 0 seconds is equivalent to "no", and
849 "infinite" is equivalent to "yes".
850
851 Setting a finite timespan may be useful when e.g. in the following
852 cases:
853
854 • A wireless interface connecting to a network which has multiple
855 access points with the same SSID.
856
857 • Enslaving a wireless interface to a bond interface, which may
858 disconnect from the connected access point and causes its
859 carrier to be lost.
860
861 • The driver of the interface resets when the MTU is changed.
862
863 When Bond= is specified to a wireless interface, defaults to 3
864 seconds. When the DHCPv4 client is enabled and UseMTU= in the
865 [DHCPv4] section enabled, defaults to 5 seconds. Otherwise,
866 defaults to the value specified with ConfigureWithoutCarrier=. When
867 ActivationPolicy= is set to "always-up", this is forced to "yes",
868 and ignored any user specified values.
869
870 KeepConfiguration=
871 Takes a boolean or one of "static", "dhcp-on-stop", "dhcp". When
872 "static", systemd-networkd will not drop static addresses and
873 routes on starting up process. When set to "dhcp-on-stop",
874 systemd-networkd will not drop addresses and routes on stopping the
875 daemon. When "dhcp", the addresses and routes provided by a DHCP
876 server will never be dropped even if the DHCP lease expires. This
877 is contrary to the DHCP specification, but may be the best choice
878 if, e.g., the root filesystem relies on this connection. The
879 setting "dhcp" implies "dhcp-on-stop", and "yes" implies "dhcp" and
880 "static". Defaults to "dhcp-on-stop" when systemd-networkd is
881 running in initrd, "yes" when the root filesystem is a network
882 filesystem, and "no" otherwise.
883
885 An [Address] section accepts the following keys. Specify several
886 [Address] sections to configure several addresses.
887
888 Address=
889 As in the [Network] section. This setting is mandatory. Each
890 [Address] section can contain one Address= setting.
891
892 Peer=
893 The peer address in a point-to-point connection. Accepts the same
894 format as the Address= setting.
895
896 Broadcast=
897 Takes an IPv4 address or boolean value. The address must be in the
898 format described in inet_pton(3). If set to true, then the IPv4
899 broadcast address will be derived from the Address= setting. If set
900 to false, then the broadcast address will not be set. Defaults to
901 true, except for wireguard interfaces, where it default to false.
902
903 Label=
904 Specifies the label for the IPv4 address. The label must be a 7-bit
905 ASCII string with a length of 1...15 characters. Defaults to unset.
906
907 PreferredLifetime=
908 Allows the default "preferred lifetime" of the address to be
909 overridden. Only three settings are accepted: "forever",
910 "infinity", which is the default and means that the address never
911 expires, and "0", which means that the address is considered
912 immediately "expired" and will not be used, unless explicitly
913 requested. A setting of PreferredLifetime=0 is useful for addresses
914 which are added to be used only by a specific application, which is
915 then configured to use them explicitly.
916
917 Scope=
918 The scope of the address, which can be "global" (valid everywhere
919 on the network, even through a gateway), "link" (only valid on this
920 device, will not traverse a gateway) or "host" (only valid within
921 the device itself, e.g. 127.0.0.1) or an integer in the range
922 0...255. Defaults to "global".
923
924 RouteMetric=
925 The metric of the prefix route, which is pointing to the subnet of
926 the configured IP address, taking the configured prefix length into
927 account. Takes an unsigned integer in the range 0...4294967295.
928 When unset or set to 0, the kernel's default value is used. This
929 setting will be ignored when AddPrefixRoute= is false.
930
931 HomeAddress=
932 Takes a boolean. Designates this address the "home address" as
933 defined in RFC 6275[9]. Supported only on IPv6. Defaults to false.
934
935 DuplicateAddressDetection=
936 Takes one of "ipv4", "ipv6", "both", or "none". When "ipv4",
937 performs IPv4 Address Conflict Detection. See RFC 5227[10]. When
938 "ipv6", performs IPv6 Duplicate Address Detection. See RFC
939 4862[11]. Defaults to "ipv4" for IPv4 link-local addresses, "ipv6"
940 for IPv6 addresses, and "none" otherwise.
941
942 ManageTemporaryAddress=
943 Takes a boolean. If true the kernel manage temporary addresses
944 created from this one as template on behalf of Privacy Extensions
945 RFC 3041[12]. For this to become active, the use_tempaddr sysctl
946 setting has to be set to a value greater than zero. The given
947 address needs to have a prefix length of 64. This flag allows using
948 privacy extensions in a manually configured network, just like if
949 stateless auto-configuration was active. Defaults to false.
950
951 AddPrefixRoute=
952 Takes a boolean. When true, the prefix route for the address is
953 automatically added. Defaults to true.
954
955 AutoJoin=
956 Takes a boolean. Joining multicast group on ethernet level via ip
957 maddr command would not work if we have an Ethernet switch that
958 does IGMP snooping since the switch would not replicate multicast
959 packets on ports that did not have IGMP reports for the multicast
960 addresses. Linux vxlan interfaces created via ip link add vxlan or
961 networkd's netdev kind vxlan have the group option that enables
962 them to do the required join. By extending ip address command with
963 option "autojoin" we can get similar functionality for openvswitch
964 (OVS) vxlan interfaces as well as other tunneling mechanisms that
965 need to receive multicast traffic. Defaults to "no".
966
968 A [Neighbor] section accepts the following keys. The neighbor section
969 adds a permanent, static entry to the neighbor table (IPv6) or ARP
970 table (IPv4) for the given hardware address on the links matched for
971 the network. Specify several [Neighbor] sections to configure several
972 static neighbors.
973
974 Address=
975 The IP address of the neighbor.
976
977 LinkLayerAddress=
978 The link layer address (MAC address or IP address) of the neighbor.
979
981 An [IPv6AddressLabel] section accepts the following keys. Specify
982 several [IPv6AddressLabel] sections to configure several address
983 labels. IPv6 address labels are used for address selection. See RFC
984 3484[13]. Precedence is managed by userspace, and only the label itself
985 is stored in the kernel.
986
987 Label=
988 The label for the prefix, an unsigned integer in the range
989 0...4294967294. 0xffffffff is reserved. This setting is mandatory.
990
991 Prefix=
992 IPv6 prefix is an address with a prefix length, separated by a
993 slash "/" character. This setting is mandatory.
994
996 An [RoutingPolicyRule] section accepts the following settings. Specify
997 several [RoutingPolicyRule] sections to configure several rules.
998
999 TypeOfService=
1000 Takes a number between 0 and 255 that specifies the type of service
1001 to match.
1002
1003 From=
1004 Specifies the source address prefix to match. Possibly followed by
1005 a slash and the prefix length.
1006
1007 To=
1008 Specifies the destination address prefix to match. Possibly
1009 followed by a slash and the prefix length.
1010
1011 FirewallMark=
1012 Specifies the iptables firewall mark value to match (a number in
1013 the range 1...4294967295). Optionally, the firewall mask (also a
1014 number between 1...4294967295) can be suffixed with a slash ("/"),
1015 e.g., "7/255".
1016
1017 Table=
1018 Specifies the routing table identifier to lookup if the rule
1019 selector matches. Takes one of predefined names "default", "main",
1020 and "local", and names defined in RouteTable= in networkd.conf(5),
1021 or a number between 1 and 4294967295. Defaults to "main".
1022
1023 Priority=
1024 Specifies the priority of this rule. Priority= is an integer in
1025 the range 0...4294967295. Higher number means lower priority, and
1026 rules get processed in order of increasing number. Defaults to
1027 unset, and the kernel will pick a value dynamically.
1028
1029 IncomingInterface=
1030 Specifies incoming device to match. If the interface is loopback,
1031 the rule only matches packets originating from this host.
1032
1033 OutgoingInterface=
1034 Specifies the outgoing device to match. The outgoing interface is
1035 only available for packets originating from local sockets that are
1036 bound to a device.
1037
1038 SourcePort=
1039 Specifies the source IP port or IP port range match in forwarding
1040 information base (FIB) rules. A port range is specified by the
1041 lower and upper port separated by a dash. Defaults to unset.
1042
1043 DestinationPort=
1044 Specifies the destination IP port or IP port range match in
1045 forwarding information base (FIB) rules. A port range is specified
1046 by the lower and upper port separated by a dash. Defaults to unset.
1047
1048 IPProtocol=
1049 Specifies the IP protocol to match in forwarding information base
1050 (FIB) rules. Takes IP protocol name such as "tcp", "udp" or "sctp",
1051 or IP protocol number such as "6" for "tcp" or "17" for "udp".
1052 Defaults to unset.
1053
1054 InvertRule=
1055 A boolean. Specifies whether the rule is to be inverted. Defaults
1056 to false.
1057
1058 Family=
1059 Takes a special value "ipv4", "ipv6", or "both". By default, the
1060 address family is determined by the address specified in To= or
1061 From=. If neither To= nor From= are specified, then defaults to
1062 "ipv4".
1063
1064 User=
1065 Takes a username, a user ID, or a range of user IDs separated by a
1066 dash. Defaults to unset.
1067
1068 SuppressPrefixLength=
1069 Takes a number N in the range 0...128 and rejects routing decisions
1070 that have a prefix length of N or less. Defaults to unset.
1071
1072 SuppressInterfaceGroup=
1073 Takes an integer in the range 0...2147483647 and rejects routing
1074 decisions that have an interface with the same group id. It has the
1075 same meaning as suppress_ifgroup in ip rule. Defaults to unset.
1076
1077 Type=
1078 Specifies Routing Policy Database (RPDB) rule type. Takes one of
1079 "blackhole", "unreachable" or "prohibit".
1080
1082 The [NextHop] section is used to manipulate entries in the kernel's
1083 "nexthop" tables. The [NextHop] section accepts the following settings.
1084 Specify several [NextHop] sections to configure several hops.
1085
1086 Id=
1087 The id of the next hop. Takes an integer in the range
1088 1...4294967295. If unspecified, then automatically chosen by
1089 kernel.
1090
1091 Gateway=
1092 As in the [Network] section.
1093
1094 Family=
1095 Takes one of the special values "ipv4" or "ipv6". By default, the
1096 family is determined by the address specified in Gateway=. If
1097 Gateway= is not specified, then defaults to "ipv4".
1098
1099 OnLink=
1100 Takes a boolean. If set to true, the kernel does not have to check
1101 if the gateway is reachable directly by the current machine (i.e.,
1102 attached to the local network), so that we can insert the nexthop
1103 in the kernel table without it being complained about. Defaults to
1104 "no".
1105
1106 Blackhole=
1107 Takes a boolean. If enabled, packets to the corresponding routes
1108 are discarded silently, and Gateway= cannot be specified. Defaults
1109 to "no".
1110
1111 Group=
1112 Takes a whitespace separated list of nexthop IDs. Each ID must be
1113 in the range 1...4294967295. Optionally, each nexthop ID can take a
1114 weight after a colon ("id[:weight]"). The weight must be in the
1115 range 1...255. If the weight is not specified, then it is assumed
1116 that the weight is 1. This setting cannot be specified with
1117 Gateway=, Family=, Blackhole=. This setting can be specified
1118 multiple times. If an empty string is assigned, then the all
1119 previous assignments are cleared. Defaults to unset.
1120
1122 The [Route] section accepts the following settings. Specify several
1123 [Route] sections to configure several routes.
1124
1125 Gateway=
1126 Takes the gateway address or the special values "_dhcp4" and
1127 "_ipv6ra". If "_dhcp4" or "_ipv6ra" is set, then the gateway
1128 address provided by DHCPv4 or IPv6 RA is used.
1129
1130 GatewayOnLink=
1131 Takes a boolean. If set to true, the kernel does not have to check
1132 if the gateway is reachable directly by the current machine (i.e.,
1133 attached to the local network), so that we can insert the route in
1134 the kernel table without it being complained about. Defaults to
1135 "no".
1136
1137 Destination=
1138 The destination prefix of the route. Possibly followed by a slash
1139 and the prefix length. If omitted, a full-length host route is
1140 assumed.
1141
1142 Source=
1143 The source prefix of the route. Possibly followed by a slash and
1144 the prefix length. If omitted, a full-length host route is assumed.
1145
1146 Metric=
1147 The metric of the route. Takes an unsigned integer in the range
1148 0...4294967295. Defaults to unset, and the kernel's default will be
1149 used.
1150
1151 IPv6Preference=
1152 Specifies the route preference as defined in RFC 4191[14] for
1153 Router Discovery messages. Which can be one of "low" the route has
1154 a lowest priority, "medium" the route has a default priority or
1155 "high" the route has a highest priority.
1156
1157 Scope=
1158 The scope of the IPv4 route, which can be "global", "site", "link",
1159 "host", or "nowhere":
1160
1161 • "global" means the route can reach hosts more than one hop
1162 away.
1163
1164 • "site" means an interior route in the local autonomous system.
1165
1166 • "link" means the route can only reach hosts on the local
1167 network (one hop away).
1168
1169 • "host" means the route will not leave the local machine (used
1170 for internal addresses like 127.0.0.1).
1171
1172 • "nowhere" means the destination doesn't exist.
1173
1174 For IPv4 route, defaults to "host" if Type= is "local" or "nat",
1175 and "link" if Type= is "broadcast", "multicast", "anycast", or
1176 "unicast". In other cases, defaults to "global". The value is not
1177 used for IPv6.
1178
1179 PreferredSource=
1180 The preferred source address of the route. The address must be in
1181 the format described in inet_pton(3).
1182
1183 Table=
1184 The table identifier for the route. Takes one of predefined names
1185 "default", "main", and "local", and names defined in RouteTable= in
1186 networkd.conf(5), or a number between 1 and 4294967295. The table
1187 can be retrieved using ip route show table num. If unset and Type=
1188 is "local", "broadcast", "anycast", or "nat", then "local" is used.
1189 In other cases, defaults to "main".
1190
1191 Protocol=
1192 The protocol identifier for the route. Takes a number between 0 and
1193 255 or the special values "kernel", "boot", "static", "ra" and
1194 "dhcp". Defaults to "static".
1195
1196 Type=
1197 Specifies the type for the route. Takes one of "unicast", "local",
1198 "broadcast", "anycast", "multicast", "blackhole", "unreachable",
1199 "prohibit", "throw", "nat", and "xresolve". If "unicast", a regular
1200 route is defined, i.e. a route indicating the path to take to a
1201 destination network address. If "blackhole", packets to the defined
1202 route are discarded silently. If "unreachable", packets to the
1203 defined route are discarded and the ICMP message "Host Unreachable"
1204 is generated. If "prohibit", packets to the defined route are
1205 discarded and the ICMP message "Communication Administratively
1206 Prohibited" is generated. If "throw", route lookup in the current
1207 routing table will fail and the route selection process will return
1208 to Routing Policy Database (RPDB). Defaults to "unicast".
1209
1210 InitialCongestionWindow=
1211 The TCP initial congestion window is used during the start of a TCP
1212 connection. During the start of a TCP session, when a client
1213 requests a resource, the server's initial congestion window
1214 determines how many packets will be sent during the initial burst
1215 of data without waiting for acknowledgement. Takes a number between
1216 1 and 1023. Note that 100 is considered an extremely large value
1217 for this option. When unset, the kernel's default (typically 10)
1218 will be used.
1219
1220 InitialAdvertisedReceiveWindow=
1221 The TCP initial advertised receive window is the amount of receive
1222 data (in bytes) that can initially be buffered at one time on a
1223 connection. The sending host can send only that amount of data
1224 before waiting for an acknowledgment and window update from the
1225 receiving host. Takes a number between 1 and 1023. Note that 100 is
1226 considered an extremely large value for this option. When unset,
1227 the kernel's default will be used.
1228
1229 QuickAck=
1230 Takes a boolean. When true enables TCP quick ack mode for the
1231 route. When unset, the kernel's default will be used.
1232
1233 FastOpenNoCookie=
1234 Takes a boolean. When true enables TCP fastopen without a cookie on
1235 a per-route basis. When unset, the kernel's default will be used.
1236
1237 TTLPropagate=
1238 Takes a boolean. When true enables TTL propagation at Label
1239 Switched Path (LSP) egress. When unset, the kernel's default will
1240 be used.
1241
1242 MTUBytes=
1243 The maximum transmission unit in bytes to set for the route. The
1244 usual suffixes K, M, G, are supported and are understood to the
1245 base of 1024.
1246
1247 TCPAdvertisedMaximumSegmentSize=
1248 Specifies the Path MSS (in bytes) hints given on TCP layer. The
1249 usual suffixes K, M, G, are supported and are understood to the
1250 base of 1024. An unsigned integer in the range 1...4294967294. When
1251 unset, the kernel's default will be used.
1252
1253 MultiPathRoute=address[@name] [weight]
1254 Configures multipath route. Multipath routing is the technique of
1255 using multiple alternative paths through a network. Takes gateway
1256 address. Optionally, takes a network interface name or index
1257 separated with "@", and a weight in 1..256 for this multipath route
1258 separated with whitespace. This setting can be specified multiple
1259 times. If an empty string is assigned, then the all previous
1260 assignments are cleared.
1261
1262 NextHop=
1263 Specifies the nexthop id. Takes an unsigned integer in the range
1264 1...4294967295. If set, the corresponding [NextHop] section must be
1265 configured. Defaults to unset.
1266
1268 The [DHCPv4] section configures the DHCPv4 client, if it is enabled
1269 with the DHCP= setting described above:
1270
1271 SendHostname=
1272 When true (the default), the machine's hostname (or the value
1273 specified with Hostname=, described below) will be sent to the DHCP
1274 server. Note that the hostname must consist only of 7-bit ASCII
1275 lower-case characters and no spaces or dots, and be formatted as a
1276 valid DNS domain name. Otherwise, the hostname is not sent even if
1277 this option is true.
1278
1279 Hostname=
1280 Use this value for the hostname which is sent to the DHCP server,
1281 instead of machine's hostname. Note that the specified hostname
1282 must consist only of 7-bit ASCII lower-case characters and no
1283 spaces or dots, and be formatted as a valid DNS domain name.
1284
1285 MUDURL=
1286 When configured, the specified Manufacturer Usage Description (MUD)
1287 URL will be sent to the DHCPv4 server. Takes a URL of length up to
1288 255 characters. A superficial verification that the string is a
1289 valid URL will be performed. DHCPv4 clients are intended to have at
1290 most one MUD URL associated with them. See RFC 8520[15].
1291
1292 MUD is an embedded software standard defined by the IETF that
1293 allows IoT device makers to advertise device specifications,
1294 including the intended communication patterns for their device when
1295 it connects to the network. The network can then use this to author
1296 a context-specific access policy, so the device functions only
1297 within those parameters.
1298
1299 ClientIdentifier=
1300 The DHCPv4 client identifier to use. Takes one of mac, duid or
1301 duid-only. If set to mac, the MAC address of the link is used. If
1302 set to duid, an RFC4361-compliant Client ID, which is the
1303 combination of IAID and DUID (see below), is used. If set to
1304 duid-only, only DUID is used, this may not be RFC compliant, but
1305 some setups may require to use this. Defaults to duid.
1306
1307 VendorClassIdentifier=
1308 The vendor class identifier used to identify vendor type and
1309 configuration.
1310
1311 UserClass=
1312 A DHCPv4 client can use UserClass option to identify the type or
1313 category of user or applications it represents. The information
1314 contained in this option is a string that represents the user class
1315 of which the client is a member. Each class sets an identifying
1316 string of information to be used by the DHCP service to classify
1317 clients. Takes a whitespace-separated list of strings.
1318
1319 DUIDType=
1320 Override the global DUIDType= setting for this network. See
1321 networkd.conf(5) for a description of possible values.
1322
1323 DUIDRawData=
1324 Override the global DUIDRawData= setting for this network. See
1325 networkd.conf(5) for a description of possible values.
1326
1327 IAID=
1328 The DHCP Identity Association Identifier (IAID) for the interface,
1329 a 32-bit unsigned integer.
1330
1331 Anonymize=
1332 Takes a boolean. When true, the options sent to the DHCP server
1333 will follow the RFC 7844[16] (Anonymity Profiles for DHCP Clients)
1334 to minimize disclosure of identifying information. Defaults to
1335 false.
1336
1337 This option should only be set to true when MACAddressPolicy= is
1338 set to random (see systemd.link(5)).
1339
1340 When true, SendHostname=, ClientIdentifier=,
1341 VendorClassIdentifier=, UserClass=, RequestOptions=, SendOption=,
1342 SendVendorOption=, and MUDURL= are ignored.
1343
1344 With this option enabled DHCP requests will mimic those generated
1345 by Microsoft Windows, in order to reduce the ability to fingerprint
1346 and recognize installations. This means DHCP request sizes will
1347 grow and lease data will be more comprehensive than normally,
1348 though most of the requested data is not actually used.
1349
1350 RequestOptions=
1351 Sets request options to be sent to the server in the DHCPv4 request
1352 options list. A whitespace-separated list of integers in the range
1353 1...254. Defaults to unset.
1354
1355 SendOption=
1356 Send an arbitrary raw option in the DHCPv4 request. Takes a DHCP
1357 option number, data type and data separated with a colon
1358 ("option:type:value"). The option number must be an integer in the
1359 range 1...254. The type takes one of "uint8", "uint16", "uint32",
1360 "ipv4address", or "string". Special characters in the data string
1361 may be escaped using C-style escapes[17]. This setting can be
1362 specified multiple times. If an empty string is specified, then all
1363 options specified earlier are cleared. Defaults to unset.
1364
1365 SendVendorOption=
1366 Send an arbitrary vendor option in the DHCPv4 request. Takes a DHCP
1367 option number, data type and data separated with a colon
1368 ("option:type:value"). The option number must be an integer in the
1369 range 1...254. The type takes one of "uint8", "uint16", "uint32",
1370 "ipv4address", or "string". Special characters in the data string
1371 may be escaped using C-style escapes[17]. This setting can be
1372 specified multiple times. If an empty string is specified, then all
1373 options specified earlier are cleared. Defaults to unset.
1374
1375 IPServiceType=
1376 Takes one of the special values "none", "CS6", or "CS4". When
1377 "none" no IP service type is set to the packet sent from the DHCPv4
1378 client. When "CS6" (network control) or "CS4" (realtime), the
1379 corresponding service type will be set. Defaults to "CS6".
1380
1381 Label=
1382 Specifies the label for the IPv4 address received from the DHCP
1383 server. The label must be a 7-bit ASCII string with a length of
1384 1...15 characters. Defaults to unset.
1385
1386 UseDNS=
1387 When true (the default), the DNS servers received from the DHCP
1388 server will be used.
1389
1390 This corresponds to the nameserver option in resolv.conf(5).
1391
1392 RoutesToDNS=
1393 When true, the routes to the DNS servers received from the DHCP
1394 server will be configured. When UseDNS= is disabled, this setting
1395 is ignored. Defaults to true.
1396
1397 UseNTP=
1398 When true (the default), the NTP servers received from the DHCP
1399 server will be used by systemd-timesyncd.service.
1400
1401 RoutesToNTP=
1402 When true, the routes to the NTP servers received from the DHCP
1403 server will be configured. When UseNTP= is disabled, this setting
1404 is ignored. Defaults to true.
1405
1406 UseSIP=
1407 When true (the default), the SIP servers received from the DHCP
1408 server will be collected and made available to client programs.
1409
1410 UseMTU=
1411 When true, the interface maximum transmission unit from the DHCP
1412 server will be used on the current link. If MTUBytes= is set, then
1413 this setting is ignored. Defaults to false.
1414
1415 Note, some drivers will reset the interfaces if the MTU is changed.
1416 For such interfaces, please try to use IgnoreCarrierLoss= with a
1417 short timespan, e.g. "3 seconds".
1418
1419 UseHostname=
1420 When true (the default), the hostname received from the DHCP server
1421 will be set as the transient hostname of the system.
1422
1423 UseDomains=
1424 Takes a boolean, or the special value route. When true, the domain
1425 name received from the DHCP server will be used as DNS search
1426 domain over this link, similar to the effect of the Domains=
1427 setting. If set to route, the domain name received from the DHCP
1428 server will be used for routing DNS queries only, but not for
1429 searching, similar to the effect of the Domains= setting when the
1430 argument is prefixed with "~". Defaults to false.
1431
1432 It is recommended to enable this option only on trusted networks,
1433 as setting this affects resolution of all hostnames, in particular
1434 of single-label names. It is generally safer to use the supplied
1435 domain only as routing domain, rather than as search domain, in
1436 order to not have it affect local resolution of single-label names.
1437
1438 When set to true, this setting corresponds to the domain option in
1439 resolv.conf(5).
1440
1441 UseRoutes=
1442 When true (the default), the static routes will be requested from
1443 the DHCP server and added to the routing table with a metric of
1444 1024, and a scope of global, link or host, depending on the route's
1445 destination and gateway. If the destination is on the local host,
1446 e.g., 127.x.x.x, or the same as the link's own address, the scope
1447 will be set to host. Otherwise if the gateway is null (a direct
1448 route), a link scope will be used. For anything else, scope
1449 defaults to global.
1450
1451 RouteMetric=
1452 Set the routing metric for routes specified by the DHCP server
1453 (including the prefix route added for the specified prefix). Takes
1454 an unsigned integer in the range 0...4294967295. Defaults to 1024.
1455
1456 RouteTable=num
1457 The table identifier for DHCP routes (a number between 1 and
1458 4294967295, or 0 to unset). The table can be retrieved using ip
1459 route show table num.
1460
1461 When used in combination with VRF=, the VRF's routing table is used
1462 when this parameter is not specified.
1463
1464 RouteMTUBytes=
1465 Specifies the MTU for the DHCP routes. Please see the [Route]
1466 section for further details.
1467
1468 UseGateway=
1469 When true, the gateway will be requested from the DHCP server and
1470 added to the routing table with a metric of 1024, and a scope of
1471 link. When unset, the value specified with UseRoutes= is used.
1472
1473 UseTimezone=
1474 When true, the timezone received from the DHCP server will be set
1475 as timezone of the local system. Defaults to false.
1476
1477 Use6RD=
1478 When true, subnets of the received IPv6 prefix are assigned to
1479 downstream interfaces which enables DHCPPrefixDelegation=. See also
1480 DHCPPrefixDelegation= in the [Network] section, the
1481 [DHCPPrefixDelegation] section, and RFC 5969[18]. Defaults to
1482 false.
1483
1484 FallbackLeaseLifetimeSec=
1485 Allows one to set DHCPv4 lease lifetime when DHCPv4 server does not
1486 send the lease lifetime. Takes one of "forever" or "infinity". If
1487 specified, the acquired address never expires. Defaults to unset.
1488
1489 RequestBroadcast=
1490 Request the server to use broadcast messages before the IP address
1491 has been configured. This is necessary for devices that cannot
1492 receive RAW packets, or that cannot receive packets at all before
1493 an IP address has been configured. On the other hand, this must not
1494 be enabled on networks where broadcasts are filtered out.
1495
1496 MaxAttempts=
1497 Specifies how many times the DHCPv4 client configuration should be
1498 attempted. Takes a number or "infinity". Defaults to "infinity".
1499 Note that the time between retries is increased exponentially, up
1500 to approximately one per minute, so the network will not be
1501 overloaded even if this number is high. The default is suitable in
1502 most circumstances.
1503
1504 ListenPort=
1505 Set the port from which the DHCP client packets originate.
1506
1507 DenyList=
1508 A whitespace-separated list of IPv4 addresses. Each address can
1509 optionally take a prefix length after "/". DHCP offers from servers
1510 in the list are rejected. Note that if AllowList= is configured
1511 then DenyList= is ignored.
1512
1513 AllowList=
1514 A whitespace-separated list of IPv4 addresses. Each address can
1515 optionally take a prefix length after "/". DHCP offers from servers
1516 in the list are accepted.
1517
1518 SendRelease=
1519 When true, the DHCPv4 client sends a DHCP release packet when it
1520 stops. Defaults to true.
1521
1522 SendDecline=
1523 A boolean. When true, systemd-networkd performs IPv4 Duplicate
1524 Address Detection to the acquired address by the DHCPv4 client. If
1525 duplicate is detected, the DHCPv4 client rejects the address by
1526 sending a DHCPDECLINE packet to the DHCP server, and tries to
1527 obtain an IP address again. See RFC 5227[10]. Defaults to false.
1528
1530 The [DHCPv6] section configures the DHCPv6 client, if it is enabled
1531 with the DHCP= setting described above, or invoked by the IPv6 Router
1532 Advertisement:
1533
1534 MUDURL=, IAID=, DUIDType=, DUIDRawData=, RequestOptions=
1535 As in the [DHCPv4] section.
1536
1537 SendOption=
1538 As in the [DHCPv4] section, however because DHCPv6 uses 16-bit
1539 fields to store option numbers, the option number is an integer in
1540 the range 1...65536.
1541
1542 SendVendorOption=
1543 Send an arbitrary vendor option in the DHCPv6 request. Takes an
1544 enterprise identifier, DHCP option number, data type, and data
1545 separated with a colon ("enterprise identifier:option:type:value").
1546 Enterprise identifier is an unsigned integer in the range
1547 1...4294967294. The option number must be an integer in the range
1548 1...254. Data type takes one of "uint8", "uint16", "uint32",
1549 "ipv4address", "ipv6address", or "string". Special characters in
1550 the data string may be escaped using C-style escapes[17]. This
1551 setting can be specified multiple times. If an empty string is
1552 specified, then all options specified earlier are cleared. Defaults
1553 to unset.
1554
1555 UserClass=
1556 A DHCPv6 client can use User Class option to identify the type or
1557 category of user or applications it represents. The information
1558 contained in this option is a string that represents the user class
1559 of which the client is a member. Each class sets an identifying
1560 string of information to be used by the DHCP service to classify
1561 clients. Special characters in the data string may be escaped using
1562 C-style escapes[17]. This setting can be specified multiple times.
1563 If an empty string is specified, then all options specified earlier
1564 are cleared. Takes a whitespace-separated list of strings. Note
1565 that currently NUL bytes are not allowed.
1566
1567 VendorClass=
1568 A DHCPv6 client can use VendorClass option to identify the vendor
1569 that manufactured the hardware on which the client is running. The
1570 information contained in the data area of this option is contained
1571 in one or more opaque fields that identify details of the hardware
1572 configuration. Takes a whitespace-separated list of strings.
1573
1574 PrefixDelegationHint=
1575 Takes an IPv6 address with prefix length in the same format as the
1576 Address= in the [Network] section. The DHCPv6 client will include a
1577 prefix hint in the DHCPv6 solicitation sent to the server. The
1578 prefix length must be in the range 1...128. Defaults to unset.
1579
1580 UseAddress=
1581 When true (the default), the IP addresses provided by the DHCPv6
1582 server will be assigned.
1583
1584 UseDelegatedPrefix=
1585 When true (the default), the client will request the DHCPv6 server
1586 to delegate prefixes. If the server provides prefixes to be
1587 delegated, then subnets of the prefixes are assigned to the
1588 interfaces that have DHCPPrefixDelegation=yes. See also the
1589 DHCPPrefixDelegation= setting in the [Network] section, settings in
1590 the [DHCPPrefixDelegation] section, and RFC 8415[19].
1591
1592 UseDNS=, UseNTP=, UseHostname=, UseDomains=
1593 As in the [DHCPv4] section.
1594
1595 WithoutRA=
1596 Allows DHCPv6 client to start without router advertisements's
1597 "managed" or "other configuration" flag. Takes one of "no",
1598 "solicit", or "information-request". If this is not specified,
1599 "solicit" is used when DHCPPrefixDelegation= is enabled and
1600 UplinkInterface=:self is specified in the [DHCPPrefixDelegation]
1601 section. Otherwise, defaults to "no", and the DHCPv6 client will be
1602 started when an RA is received. See also the DHCPv6Client= setting
1603 in the [IPv6AcceptRA] section.
1604
1606 The [DHCPPrefixDelegation] section configures subnet prefixes of the
1607 delegated prefixes acquired by a DHCPv6 client, or by a DHCPv4 client
1608 through the 6RD option on another interface. The settings in this
1609 section are used only when the DHCPPrefixDelegation= setting in the
1610 [Network] section is enabled.
1611
1612 UplinkInterface=
1613 Specifies the name or the index of the uplink interface, or one of
1614 the special values ":self" and ":auto". When ":self", the interface
1615 itself is considered the uplink interface, and WithoutRA=solicit is
1616 implied if the setting is not explicitly specified. When ":auto",
1617 the first link which acquired prefixes to be delegated from the
1618 DHCPv6 or DHCPv4 server is selected. Defaults to ":auto".
1619
1620 SubnetId=
1621 Configure a specific subnet ID on the interface from a (previously)
1622 received prefix delegation. You can either set "auto" (the default)
1623 or a specific subnet ID (as defined in RFC 4291[20], section
1624 2.5.4), in which case the allowed value is hexadecimal, from 0 to
1625 0x7fffffffffffffff inclusive.
1626
1627 Announce=
1628 Takes a boolean. When enabled, and IPv6SendRA= in [Network] section
1629 is enabled, the delegated prefixes are distributed through the IPv6
1630 Router Advertisement. This setting will be ignored when the
1631 DHCPPrefixDelegation= setting is enabled on the upstream interface.
1632 Defaults to yes.
1633
1634 Assign=
1635 Takes a boolean. Specifies whether to add an address from the
1636 delegated prefixes which are received from the WAN interface by the
1637 DHCPv6 Prefix Delegation. When true (on LAN interfce), the EUI-64
1638 algorithm will be used by default to form an interface identifier
1639 from the delegated prefixes. See also Token= setting below.
1640 Defaults to yes.
1641
1642 Token=
1643 Specifies an optional address generation mode for assigning an
1644 address in each delegated prefix. This accepts the same syntax as
1645 Token= in the [IPv6AcceptRA] section. If Assign= is set to false,
1646 then this setting will be ignored. Defaults to unset, which means
1647 the EUI-64 algorithm will be used.
1648
1649 ManageTemporaryAddress=
1650 As in the [Address] section, but defaults to true.
1651
1652 RouteMetric=
1653 The metric of the route to the delegated prefix subnet. Takes an
1654 unsigned integer in the range 0...4294967295. When set to 0, the
1655 kernel's default value is used. Defaults to 256.
1656
1658 The [IPv6AcceptRA] section configures the IPv6 Router Advertisement
1659 (RA) client, if it is enabled with the IPv6AcceptRA= setting described
1660 above:
1661
1662 Token=
1663 Specifies an optional address generation mode for the Stateless
1664 Address Autoconfiguration (SLAAC). The following values are
1665 supported:
1666
1667 eui64
1668 The EUI-64 algorithm will be used to generate an address for
1669 that prefix. Only supported by Ethernet or InfiniBand
1670 interfaces.
1671
1672 static:ADDRESS
1673 An IPv6 address must be specified after a colon (":"), and the
1674 lower bits of the supplied address are combined with the upper
1675 bits of a prefix received in a Router Advertisement (RA)
1676 message to form a complete address. Note that if multiple
1677 prefixes are received in an RA message, or in multiple RA
1678 messages, addresses will be formed from each of them using the
1679 supplied address. This mode implements SLAAC but uses a static
1680 interface identifier instead of an identifier generated by
1681 using the EUI-64 algorithm. Because the interface identifier is
1682 static, if Duplicate Address Detection detects that the
1683 computed address is a duplicate (in use by another node on the
1684 link), then this mode will fail to provide an address for that
1685 prefix. If an IPv6 address without mode is specified, then
1686 "static" mode is assumed.
1687
1688 prefixstable[:ADDRESS][,UUID]
1689 The algorithm specified in RFC 7217[21] will be used to
1690 generate interface identifiers. This mode can optionally take
1691 an IPv6 address separated with a colon (":"). If an IPv6
1692 address is specified, then an interface identifier is generated
1693 only when a prefix received in an RA message matches the
1694 supplied address.
1695
1696 This mode can also optionally take a non-null UUID in the
1697 format which sd_id128_from_string() accepts, e.g.
1698 "86b123b969ba4b7eb8b3d8605123525a" or
1699 "86b123b9-69ba-4b7e-b8b3-d8605123525a". If a UUID is specified,
1700 the value is used as the secret key to generate interface
1701 identifiers. If not specified, then an application specific ID
1702 generated with the system's machine-ID will be used as the
1703 secret key. See sd-id128(3), sd_id128_from_string(3), and
1704 sd_id128_get_machine(3).
1705
1706 Note that the "prefixstable" algorithm uses both the interface
1707 name and MAC address as input to the hash to compute the
1708 interface identifier, so if either of those are changed the
1709 resulting interface identifier (and address) will be changed,
1710 even if the prefix received in the RA message has not been
1711 changed.
1712
1713 If no address generation mode is specified (which is the default),
1714 or a received prefix does not match any of the addresses provided
1715 in "prefixstable" mode, then the EUI-64 algorithm will be used for
1716 Ethernet or InfiniBand interfaces, otherwise "prefixstable" will be
1717 used to form an interface identifier for that prefix.
1718
1719 This setting can be specified multiple times. If an empty string is
1720 assigned, then the all previous assignments are cleared.
1721
1722 Examples:
1723
1724 Token=eui64
1725 Token=::1a:2b:3c:4d
1726 Token=static:::1a:2b:3c:4d
1727 Token=prefixstable
1728 Token=prefixstable:2002:da8:1::
1729
1730 UseDNS=
1731 When true (the default), the DNS servers received in the Router
1732 Advertisement will be used.
1733
1734 This corresponds to the nameserver option in resolv.conf(5).
1735
1736 UseDomains=
1737 Takes a boolean, or the special value "route". When true, the
1738 domain name received via IPv6 Router Advertisement (RA) will be
1739 used as DNS search domain over this link, similar to the effect of
1740 the Domains= setting. If set to "route", the domain name received
1741 via IPv6 RA will be used for routing DNS queries only, but not for
1742 searching, similar to the effect of the Domains= setting when the
1743 argument is prefixed with "~". Defaults to false.
1744
1745 It is recommended to enable this option only on trusted networks,
1746 as setting this affects resolution of all hostnames, in particular
1747 of single-label names. It is generally safer to use the supplied
1748 domain only as routing domain, rather than as search domain, in
1749 order to not have it affect local resolution of single-label names.
1750
1751 When set to true, this setting corresponds to the domain option in
1752 resolv.conf(5).
1753
1754 RouteTable=num
1755 The table identifier for the routes received in the Router
1756 Advertisement (a number between 1 and 4294967295, or 0 to unset).
1757 The table can be retrieved using ip route show table num.
1758
1759 RouteMetric=
1760 Set the routing metric for the routes received in the Router
1761 Advertisement. Takes an unsigned integer in the range
1762 0...4294967295. Defaults to 1024.
1763
1764 UseMTU=
1765 Takes a boolean. When true, the MTU received in the Router
1766 Advertisement will be used. Defaults to true.
1767
1768 UseGateway=
1769 When true (the default), the router address will be configured as
1770 the default gateway.
1771
1772 UseRoutePrefix=
1773 When true (the default), the routes corresponding to the route
1774 prefixes received in the Router Advertisement will be configured.
1775
1776 UseAutonomousPrefix=
1777 When true (the default), the autonomous prefix received in the
1778 Router Advertisement will be used and take precedence over any
1779 statically configured ones.
1780
1781 UseOnLinkPrefix=
1782 When true (the default), the onlink prefix received in the Router
1783 Advertisement will be used and takes precedence over any statically
1784 configured ones.
1785
1786 RouterDenyList=
1787 A whitespace-separated list of IPv6 router addresses. Each address
1788 can optionally take a prefix length after "/". Any information
1789 advertised by the listed router is ignored.
1790
1791 RouterAllowList=
1792 A whitespace-separated list of IPv6 router addresses. Each address
1793 can optionally take a prefix length after "/". Only information
1794 advertised by the listed router is accepted. Note that if
1795 RouterAllowList= is configured then RouterDenyList= is ignored.
1796
1797 PrefixDenyList=
1798 A whitespace-separated list of IPv6 prefixes. Each prefix can
1799 optionally take its prefix length after "/". IPv6 prefixes supplied
1800 via router advertisements in the list are ignored.
1801
1802 PrefixAllowList=
1803 A whitespace-separated list of IPv6 prefixes. Each prefix can
1804 optionally take its prefix length after "/". IPv6 prefixes supplied
1805 via router advertisements in the list are allowed. Note that if
1806 PrefixAllowList= is configured then PrefixDenyList= is ignored.
1807
1808 RouteDenyList=
1809 A whitespace-separated list of IPv6 route prefixes. Each prefix can
1810 optionally take its prefix length after "/". IPv6 route prefixes
1811 supplied via router advertisements in the list are ignored.
1812
1813 RouteAllowList=
1814 A whitespace-separated list of IPv6 route prefixes. Each prefix can
1815 optionally take its prefix length after "/". IPv6 route prefixes
1816 supplied via router advertisements in the list are allowed. Note
1817 that if RouteAllowList= is configured then RouteDenyList= is
1818 ignored.
1819
1820 DHCPv6Client=
1821 Takes a boolean, or the special value "always". When true, the
1822 DHCPv6 client will be started in "solicit" mode if the RA has the
1823 "managed" flag or "information-request" mode if the RA lacks the
1824 "managed" flag but has the "other configuration" flag. If set to
1825 "always", the DHCPv6 client will be started in "solicit" mode when
1826 an RA is received, even if neither the "managed" nor the "other
1827 configuration" flag is set in the RA. This will be ignored when
1828 WithoutRA= in the [DHCPv6] section is enabled, or
1829 UplinkInterface=:self in the [DHCPPrefixDelegation] section is
1830 specified. Defaults to true.
1831
1833 The [DHCPServer] section contains settings for the DHCP server, if
1834 enabled via the DHCPServer= option described above:
1835
1836 ServerAddress=
1837 Specifies server address for the DHCP server. Takes an IPv4 address
1838 with prefix length, for example 192.168.0.1/24. This setting may be
1839 useful when the link on which the DHCP server is running has
1840 multiple static addresses. When unset, one of static addresses in
1841 the link will be automatically selected. Defaults to unset.
1842
1843 PoolOffset=, PoolSize=
1844 Configures the pool of addresses to hand out. The pool is a
1845 contiguous sequence of IP addresses in the subnet configured for
1846 the server address, which does not include the subnet nor the
1847 broadcast address. PoolOffset= takes the offset of the pool from
1848 the start of subnet, or zero to use the default value. PoolSize=
1849 takes the number of IP addresses in the pool or zero to use the
1850 default value. By default, the pool starts at the first address
1851 after the subnet address and takes up the rest of the subnet,
1852 excluding the broadcast address. If the pool includes the server
1853 address (the default), this is reserved and not handed out to
1854 clients.
1855
1856 DefaultLeaseTimeSec=, MaxLeaseTimeSec=
1857 Control the default and maximum DHCP lease time to pass to clients.
1858 These settings take time values in seconds or another common time
1859 unit, depending on the suffix. The default lease time is used for
1860 clients that did not ask for a specific lease time. If a client
1861 asks for a lease time longer than the maximum lease time, it is
1862 automatically shortened to the specified time. The default lease
1863 time defaults to 1h, the maximum lease time to 12h. Shorter lease
1864 times are beneficial if the configuration data in DHCP leases
1865 changes frequently and clients shall learn the new settings with
1866 shorter latencies. Longer lease times reduce the generated DHCP
1867 network traffic.
1868
1869 UplinkInterface=
1870 Specifies the name or the index of the uplink interface, or one of
1871 the special values ":none" and ":auto". When emitting DNS, NTP, or
1872 SIP servers is enabled but no servers are specified, the servers
1873 configured in the uplink interface will be emitted. When ":auto",
1874 the link which has a default gateway with the highest priority will
1875 be automatically selected. When ":none", no uplink interface will
1876 be selected. Defaults to ":auto".
1877
1878 EmitDNS=, DNS=
1879 EmitDNS= takes a boolean. Configures whether the DHCP leases handed
1880 out to clients shall contain DNS server information. Defaults to
1881 "yes". The DNS servers to pass to clients may be configured with
1882 the DNS= option, which takes a list of IPv4 addresses, or special
1883 value "_server_address" which will be converted to the address used
1884 by the DHCP server.
1885
1886 If the EmitDNS= option is enabled but no servers configured, the
1887 servers are automatically propagated from an "uplink" interface
1888 that has appropriate servers set. The "uplink" interface is
1889 determined by the default route of the system with the highest
1890 priority. Note that this information is acquired at the time the
1891 lease is handed out, and does not take uplink interfaces into
1892 account that acquire DNS server information at a later point. If no
1893 suitable uplink interface is found the DNS server data from
1894 /etc/resolv.conf is used. Also, note that the leases are not
1895 refreshed if the uplink network configuration changes. To ensure
1896 clients regularly acquire the most current uplink DNS server
1897 information, it is thus advisable to shorten the DHCP lease time
1898 via MaxLeaseTimeSec= described above.
1899
1900 This setting can be specified multiple times. If an empty string is
1901 specified, then all DNS servers specified earlier are cleared.
1902
1903 EmitNTP=, NTP=, EmitSIP=, SIP=, EmitPOP3=, POP3=, EmitSMTP=, SMTP=,
1904 EmitLPR=, LPR=
1905 Similar to the EmitDNS= and DNS= settings described above, these
1906 settings configure whether and what server information for the
1907 indicate protocol shall be emitted as part of the DHCP lease. The
1908 same syntax, propagation semantics and defaults apply as for
1909 EmitDNS= and DNS=.
1910
1911 EmitRouter=, Router=
1912 The EmitRouter= setting takes a boolean value, and configures
1913 whether the DHCP lease should contain the router option. The
1914 Router= setting takes an IPv4 address, and configures the router
1915 address to be emitted. When the Router= setting is not specified,
1916 then the server address will be used for the router option. When
1917 the EmitRouter= setting is disabled, the Router= setting will be
1918 ignored. The EmitRouter= setting defaults to true, and the Router=
1919 setting defaults to unset.
1920
1921 EmitTimezone=, Timezone=
1922 Takes a boolean. Configures whether the DHCP leases handed out to
1923 clients shall contain timezone information. Defaults to "yes". The
1924 Timezone= setting takes a timezone string (such as "Europe/Berlin"
1925 or "UTC") to pass to clients. If no explicit timezone is set, the
1926 system timezone of the local host is propagated, as determined by
1927 the /etc/localtime symlink.
1928
1929 BootServerAddress=
1930 Takes an IPv4 address of the boot server used by e.g. PXE boot
1931 systems. When specified, this address is sent in the siaddr field
1932 of the DHCP message header. See RFC 2131[22] for more details.
1933 Defaults to unset.
1934
1935 BootServerName=
1936 Takes a name of the boot server used by e.g. PXE boot systems. When
1937 specified, this name is sent in the DHCP option 66 ("TFTP server
1938 name"). See RFC 2132[23] for more details. Defaults to unset.
1939
1940 Note that typically setting one of BootServerName= or
1941 BootServerAddress= is sufficient, but both can be set too, if
1942 desired.
1943
1944 BootFilename=
1945 Takes a path or URL to a file loaded by e.g. a PXE boot loader.
1946 When specified, this path is sent in the DHCP option 67 ("Bootfile
1947 name"). See RFC 2132[23] for more details. Defaults to unset.
1948
1949 SendOption=
1950 Send a raw option with value via DHCPv4 server. Takes a DHCP option
1951 number, data type and data ("option:type:value"). The option number
1952 is an integer in the range 1...254. The type takes one of "uint8",
1953 "uint16", "uint32", "ipv4address", "ipv6address", or "string".
1954 Special characters in the data string may be escaped using C-style
1955 escapes[17]. This setting can be specified multiple times. If an
1956 empty string is specified, then all options specified earlier are
1957 cleared. Defaults to unset.
1958
1959 SendVendorOption=
1960 Send a vendor option with value via DHCPv4 server. Takes a DHCP
1961 option number, data type and data ("option:type:value"). The option
1962 number is an integer in the range 1...254. The type takes one of
1963 "uint8", "uint16", "uint32", "ipv4address", or "string". Special
1964 characters in the data string may be escaped using C-style
1965 escapes[17]. This setting can be specified multiple times. If an
1966 empty string is specified, then all options specified earlier are
1967 cleared. Defaults to unset.
1968
1969 BindToInterface=
1970 Takes a boolean value. When "yes", DHCP server socket will be bound
1971 to its network interface and all socket communication will be
1972 restricted to this interface. Defaults to "yes", except if
1973 RelayTarget= is used (see below), in which case it defaults to
1974 "no".
1975
1976 RelayTarget=
1977 Takes an IPv4 address, which must be in the format described in
1978 inet_pton(3). Turns this DHCP server into a DHCP relay agent. See
1979 RFC 1542[24]. The address is the address of DHCP server or another
1980 relay agent to forward DHCP messages to and from.
1981
1982 RelayAgentCircuitId=
1983 Specifies value for Agent Circuit ID suboption of Relay Agent
1984 Information option. Takes a string, which must be in the format
1985 "string:value", where "value" should be replaced with the value of
1986 the suboption. Defaults to unset (means no Agent Circuit ID
1987 suboption is generated). Ignored if RelayTarget= is not specified.
1988
1989 RelayAgentRemoteId=
1990 Specifies value for Agent Remote ID suboption of Relay Agent
1991 Information option. Takes a string, which must be in the format
1992 "string:value", where "value" should be replaced with the value of
1993 the suboption. Defaults to unset (means no Agent Remote ID
1994 suboption is generated). Ignored if RelayTarget= is not specified.
1995
1997 The "[DHCPServerStaticLease]" section configures a static DHCP lease to
1998 assign a fixed IPv4 address to a specific device based on its MAC
1999 address. This section can be specified multiple times.
2000
2001 MACAddress=
2002 The hardware address of a device to match. This key is mandatory.
2003
2004 Address=
2005 The IPv4 address that should be assigned to the device that was
2006 matched with MACAddress=. This key is mandatory.
2007
2009 The [IPv6SendRA] section contains settings for sending IPv6 Router
2010 Advertisements and whether to act as a router, if enabled via the
2011 IPv6SendRA= option described above. IPv6 network prefixes or routes are
2012 defined with one or more [IPv6Prefix] or [IPv6RoutePrefix] sections.
2013
2014 Managed=, OtherInformation=
2015 Takes a boolean. Controls whether a DHCPv6 server is used to
2016 acquire IPv6 addresses on the network link when Managed= is set to
2017 "true" or if only additional network information can be obtained
2018 via DHCPv6 for the network link when OtherInformation= is set to
2019 "true". Both settings default to "false", which means that a DHCPv6
2020 server is not being used.
2021
2022 RouterLifetimeSec=
2023 Takes a timespan. Configures the IPv6 router lifetime in seconds.
2024 The value must be 0 seconds, or between 4 seconds and 9000 seconds.
2025 When set to 0, the host is not acting as a router. Defaults to 1800
2026 seconds (30 minutes).
2027
2028 RouterPreference=
2029 Configures IPv6 router preference if RouterLifetimeSec= is
2030 non-zero. Valid values are "high", "medium" and "low", with
2031 "normal" and "default" added as synonyms for "medium" just to make
2032 configuration easier. See RFC 4191[14] for details. Defaults to
2033 "medium".
2034
2035 UplinkInterface=
2036 Specifies the name or the index of the uplink interface, or one of
2037 the special values ":none" and ":auto". When emitting DNS servers
2038 or search domains is enabled but no servers are specified, the
2039 servers configured in the uplink interface will be emitted. When
2040 ":auto", the value specified to the same setting in the
2041 [DHCPPrefixDelegation] section will be used if
2042 DHCPPrefixDelegation= is enabled, otherwise the link which has a
2043 default gateway with the highest priority will be automatically
2044 selected. When ":none", no uplink interface will be selected.
2045 Defaults to ":auto".
2046
2047 EmitDNS=, DNS=
2048 DNS= specifies a list of recursive DNS server IPv6 addresses that
2049 are distributed via Router Advertisement messages when EmitDNS= is
2050 true. DNS= also takes special value "_link_local"; in that case
2051 the IPv6 link-local address is distributed. If DNS= is empty, DNS
2052 servers are read from the [Network] section. If the [Network]
2053 section does not contain any DNS servers either, DNS servers from
2054 the uplink interface specified in UplinkInterface= will be used.
2055 When EmitDNS= is false, no DNS server information is sent in Router
2056 Advertisement messages. EmitDNS= defaults to true.
2057
2058 EmitDomains=, Domains=
2059 A list of DNS search domains distributed via Router Advertisement
2060 messages when EmitDomains= is true. If Domains= is empty, DNS
2061 search domains are read from the [Network] section. If the
2062 [Network] section does not contain any DNS search domains either,
2063 DNS search domains from the uplink interface specified in
2064 UplinkInterface= will be used. When EmitDomains= is false, no DNS
2065 search domain information is sent in Router Advertisement messages.
2066 EmitDomains= defaults to true.
2067
2068 DNSLifetimeSec=
2069 Lifetime in seconds for the DNS server addresses listed in DNS= and
2070 search domains listed in Domains=. Defaults to 3600 seconds (one
2071 hour).
2072
2074 One or more [IPv6Prefix] sections contain the IPv6 prefixes that are
2075 announced via Router Advertisements. See RFC 4861[25] for further
2076 details.
2077
2078 AddressAutoconfiguration=, OnLink=
2079 Takes a boolean to specify whether IPv6 addresses can be
2080 autoconfigured with this prefix and whether the prefix can be used
2081 for onlink determination. Both settings default to "true" in order
2082 to ease configuration.
2083
2084 Prefix=
2085 The IPv6 prefix that is to be distributed to hosts. Similarly to
2086 configuring static IPv6 addresses, the setting is configured as an
2087 IPv6 prefix and its prefix length, separated by a "/" character.
2088 Use multiple [IPv6Prefix] sections to configure multiple IPv6
2089 prefixes since prefix lifetimes, address autoconfiguration and
2090 onlink status may differ from one prefix to another.
2091
2092 PreferredLifetimeSec=, ValidLifetimeSec=
2093 Preferred and valid lifetimes for the prefix measured in seconds.
2094 PreferredLifetimeSec= defaults to 1800 seconds (30 minutes) and
2095 ValidLifetimeSec= defaults to 3600 seconds (one hour).
2096
2097 Assign=
2098 Takes a boolean. When true, adds an address from the prefix.
2099 Default to false.
2100
2101 Token=
2102 Specifies an optional address generation mode for assigning an
2103 address in each prefix. This accepts the same syntax as Token= in
2104 the [IPv6AcceptRA] section. If Assign= is set to false, then this
2105 setting will be ignored. Defaults to unset, which means the EUI-64
2106 algorithm will be used.
2107
2108 RouteMetric=
2109 The metric of the prefix route. Takes an unsigned integer in the
2110 range 0...4294967295. When unset or set to 0, the kernel's default
2111 value is used. This setting is ignored when Assign= is false.
2112
2114 One or more [IPv6RoutePrefix] sections contain the IPv6 prefix routes
2115 that are announced via Router Advertisements. See RFC 4191[14] for
2116 further details.
2117
2118 Route=
2119 The IPv6 route that is to be distributed to hosts. Similarly to
2120 configuring static IPv6 routes, the setting is configured as an
2121 IPv6 prefix routes and its prefix route length, separated by a "/"
2122 character. Use multiple [IPv6RoutePrefix] sections to configure
2123 multiple IPv6 prefix routes.
2124
2125 LifetimeSec=
2126 Lifetime for the route prefix measured in seconds. LifetimeSec=
2127 defaults to 3600 seconds (one hour).
2128
2130 The [Bridge] section accepts the following keys:
2131
2132 UnicastFlood=
2133 Takes a boolean. Controls whether the bridge should flood traffic
2134 for which an FDB entry is missing and the destination is unknown
2135 through this port. When unset, the kernel's default will be used.
2136
2137 MulticastFlood=
2138 Takes a boolean. Controls whether the bridge should flood traffic
2139 for which an MDB entry is missing and the destination is unknown
2140 through this port. When unset, the kernel's default will be used.
2141
2142 MulticastToUnicast=
2143 Takes a boolean. Multicast to unicast works on top of the multicast
2144 snooping feature of the bridge. Which means unicast copies are only
2145 delivered to hosts which are interested in it. When unset, the
2146 kernel's default will be used.
2147
2148 NeighborSuppression=
2149 Takes a boolean. Configures whether ARP and ND neighbor suppression
2150 is enabled for this port. When unset, the kernel's default will be
2151 used.
2152
2153 Learning=
2154 Takes a boolean. Configures whether MAC address learning is enabled
2155 for this port. When unset, the kernel's default will be used.
2156
2157 HairPin=
2158 Takes a boolean. Configures whether traffic may be sent back out of
2159 the port on which it was received. When this flag is false, then
2160 the bridge will not forward traffic back out of the receiving port.
2161 When unset, the kernel's default will be used.
2162
2163 Isolated=
2164 Takes a boolean. Configures whether this port is isolated or not.
2165 Within a bridge, isolated ports can only communicate with
2166 non-isolated ports. When set to true, this port can only
2167 communicate with other ports whose Isolated setting is false. When
2168 set to false, this port can communicate with any other ports. When
2169 unset, the kernel's default will be used.
2170
2171 UseBPDU=
2172 Takes a boolean. Configures whether STP Bridge Protocol Data Units
2173 will be processed by the bridge port. When unset, the kernel's
2174 default will be used.
2175
2176 FastLeave=
2177 Takes a boolean. This flag allows the bridge to immediately stop
2178 multicast traffic on a port that receives an IGMP Leave message. It
2179 is only used with IGMP snooping if enabled on the bridge. When
2180 unset, the kernel's default will be used.
2181
2182 AllowPortToBeRoot=
2183 Takes a boolean. Configures whether a given port is allowed to
2184 become a root port. Only used when STP is enabled on the bridge.
2185 When unset, the kernel's default will be used.
2186
2187 ProxyARP=
2188 Takes a boolean. Configures whether proxy ARP to be enabled on this
2189 port. When unset, the kernel's default will be used.
2190
2191 ProxyARPWiFi=
2192 Takes a boolean. Configures whether proxy ARP to be enabled on this
2193 port which meets extended requirements by IEEE 802.11 and Hotspot
2194 2.0 specifications. When unset, the kernel's default will be used.
2195
2196 MulticastRouter=
2197 Configures this port for having multicast routers attached. A port
2198 with a multicast router will receive all multicast traffic. Takes
2199 one of "no" to disable multicast routers on this port, "query" to
2200 let the system detect the presence of routers, "permanent" to
2201 permanently enable multicast traffic forwarding on this port, or
2202 "temporary" to enable multicast routers temporarily on this port,
2203 not depending on incoming queries. When unset, the kernel's default
2204 will be used.
2205
2206 Cost=
2207 Sets the "cost" of sending packets of this interface. Each port in
2208 a bridge may have a different speed and the cost is used to decide
2209 which link to use. Faster interfaces should have lower costs. It is
2210 an integer value between 1 and 65535.
2211
2212 Priority=
2213 Sets the "priority" of sending packets on this interface. Each port
2214 in a bridge may have a different priority which is used to decide
2215 which link to use. Lower value means higher priority. It is an
2216 integer value between 0 to 63. Networkd does not set any default,
2217 meaning the kernel default value of 32 is used.
2218
2220 The [BridgeFDB] section manages the forwarding database table of a port
2221 and accepts the following keys. Specify several [BridgeFDB] sections to
2222 configure several static MAC table entries.
2223
2224 MACAddress=
2225 As in the [Network] section. This key is mandatory.
2226
2227 Destination=
2228 Takes an IP address of the destination VXLAN tunnel endpoint.
2229
2230 VLANId=
2231 The VLAN ID for the new static MAC table entry. If omitted, no VLAN
2232 ID information is appended to the new static MAC table entry.
2233
2234 VNI=
2235 The VXLAN Network Identifier (or VXLAN Segment ID) to use to
2236 connect to the remote VXLAN tunnel endpoint. Takes a number in the
2237 range 1...16777215. Defaults to unset.
2238
2239 AssociatedWith=
2240 Specifies where the address is associated with. Takes one of "use",
2241 "self", "master" or "router". "use" means the address is in use.
2242 User space can use this option to indicate to the kernel that the
2243 fdb entry is in use. "self" means the address is associated with
2244 the port drivers fdb. Usually hardware. "master" means the address
2245 is associated with master devices fdb. "router" means the
2246 destination address is associated with a router. Note that it's
2247 valid if the referenced device is a VXLAN type device and has route
2248 shortcircuit enabled. Defaults to "self".
2249
2250 OutgoingInterface=
2251 Specifies the name or index of the outgoing interface for the VXLAN
2252 device driver to reach the remote VXLAN tunnel endpoint. Defaults
2253 to unset.
2254
2256 The [BridgeMDB] section manages the multicast membership entries
2257 forwarding database table of a port and accepts the following keys.
2258 Specify several [BridgeMDB] sections to configure several permanent
2259 multicast membership entries.
2260
2261 MulticastGroupAddress=
2262 Specifies the IPv4 or IPv6 multicast group address to add. This
2263 setting is mandatory.
2264
2265 VLANId=
2266 The VLAN ID for the new entry. Valid ranges are 0 (no VLAN) to
2267 4094. Optional, defaults to 0.
2268
2270 The [LLDP] section manages the Link Layer Discovery Protocol (LLDP) and
2271 accepts the following keys:
2272
2273 MUDURL=
2274 When configured, the specified Manufacturer Usage Descriptions
2275 (MUD) URL will be sent in LLDP packets. The syntax and semantics
2276 are the same as for MUDURL= in the [DHCPv4] section described
2277 above.
2278
2279 The MUD URLs received via LLDP packets are saved and can be read
2280 using the sd_lldp_neighbor_get_mud_url() function.
2281
2283 The [CAN] section manages the Controller Area Network (CAN bus) and
2284 accepts the following keys:
2285
2286 BitRate=
2287 The bitrate of CAN device in bits per second. The usual SI prefixes
2288 (K, M) with the base of 1000 can be used here. Takes a number in
2289 the range 1...4294967295.
2290
2291 SamplePoint=
2292 Optional sample point in percent with one decimal (e.g. "75%",
2293 "87.5%") or permille (e.g. "875‰"). This will be ignored when
2294 BitRate= is unspecified.
2295
2296 TimeQuantaNSec=, PropagationSegment=, PhaseBufferSegment1=,
2297 PhaseBufferSegment2=, SyncJumpWidth=
2298 Specifies the time quanta, propagation segment, phase buffer
2299 segment 1 and 2, and the synchronization jump width, which allow
2300 one to define the CAN bit-timing in a hardware independent format
2301 as proposed by the Bosch CAN 2.0 Specification. TimeQuantaNSec=
2302 takes a timespan in nanoseconds. PropagationSegment=,
2303 PhaseBufferSegment1=, PhaseBufferSegment2=, and SyncJumpWidth= take
2304 number of time quantum specified in TimeQuantaNSec= and must be an
2305 unsigned integer in the range 0...4294967295. These settings except
2306 for SyncJumpWidth= will be ignored when BitRate= is specified.
2307
2308 DataBitRate=, DataSamplePoint=
2309 The bitrate and sample point for the data phase, if CAN-FD is used.
2310 These settings are analogous to the BitRate= and SamplePoint= keys.
2311
2312 DataTimeQuantaNSec=, DataPropagationSegment=, DataPhaseBufferSegment1=,
2313 DataPhaseBufferSegment2=, DataSyncJumpWidth=
2314 Specifies the time quanta, propagation segment, phase buffer
2315 segment 1 and 2, and the synchronization jump width for the data
2316 phase, if CAN-FD is used. These settings are analogous to the
2317 TimeQuantaNSec= or related settings.
2318
2319 FDMode=
2320 Takes a boolean. When "yes", CAN-FD mode is enabled for the
2321 interface. Note, that a bitrate and optional sample point should
2322 also be set for the CAN-FD data phase using the DataBitRate= and
2323 DataSamplePoint= keys, or DataTimeQuanta= and related settings.
2324
2325 FDNonISO=
2326 Takes a boolean. When "yes", non-ISO CAN-FD mode is enabled for the
2327 interface. When unset, the kernel's default will be used.
2328
2329 RestartSec=
2330 Automatic restart delay time. If set to a non-zero value, a restart
2331 of the CAN controller will be triggered automatically in case of a
2332 bus-off condition after the specified delay time. Subsecond delays
2333 can be specified using decimals (e.g. "0.1s") or a "ms" or "us"
2334 postfix. Using "infinity" or "0" will turn the automatic restart
2335 off. By default automatic restart is disabled.
2336
2337 Termination=
2338 Takes a boolean or a termination resistor value in ohm in the range
2339 0...65535. When "yes", the termination resistor is set to 120 ohm.
2340 When "no" or "0" is set, the termination resistor is disabled. When
2341 unset, the kernel's default will be used.
2342
2343 TripleSampling=
2344 Takes a boolean. When "yes", three samples (instead of one) are
2345 used to determine the value of a received bit by majority rule.
2346 When unset, the kernel's default will be used.
2347
2348 BusErrorReporting=
2349 Takes a boolean. When "yes", reporting of CAN bus errors is
2350 activated (those include single bit, frame format, and bit stuffing
2351 errors, unable to send dominant bit, unable to send recessive bit,
2352 bus overload, active error announcement, error occurred on
2353 transmission). When unset, the kernel's default will be used. Note:
2354 in case of a CAN bus with a single CAN device, sending a CAN frame
2355 may result in a huge number of CAN bus errors.
2356
2357 ListenOnly=
2358 Takes a boolean. When "yes", listen-only mode is enabled. When the
2359 interface is in listen-only mode, the interface neither transmit
2360 CAN frames nor send ACK bit. Listen-only mode is important to debug
2361 CAN networks without interfering with the communication or
2362 acknowledge the CAN frame. When unset, the kernel's default will be
2363 used.
2364
2365 Loopback=
2366 Takes a boolean. When "yes", loopback mode is enabled. When the
2367 loopback mode is enabled, the interface treats messages transmitted
2368 by itself as received messages. The loopback mode is important to
2369 debug CAN networks. When unset, the kernel's default will be used.
2370
2371 OneShot=
2372 Takes a boolean. When "yes", one-shot mode is enabled. When unset,
2373 the kernel's default will be used.
2374
2375 PresumeAck=
2376 Takes a boolean. When "yes", the interface will ignore missing CAN
2377 ACKs. When unset, the kernel's default will be used.
2378
2379 ClassicDataLengthCode=
2380 Takes a boolean. When "yes", the interface will handle the 4bit
2381 data length code (DLC). When unset, the kernel's default will be
2382 used.
2383
2385 The [IPoIB] section manages the IP over Infiniband and accepts the
2386 following keys:
2387
2388 Mode=
2389 Takes one of the special values "datagram" or "connected". Defaults
2390 to unset, and the kernel's default is used.
2391
2392 When "datagram", the Infiniband unreliable datagram (UD) transport
2393 is used, and so the interface MTU is equal to the IB L2 MTU minus
2394 the IPoIB encapsulation header (4 bytes). For example, in a typical
2395 IB fabric with a 2K MTU, the IPoIB MTU will be 2048 - 4 = 2044
2396 bytes.
2397
2398 When "connected", the Infiniband reliable connected (RC) transport
2399 is used. Connected mode takes advantage of the connected nature of
2400 the IB transport and allows an MTU up to the maximal IP packet size
2401 of 64K, which reduces the number of IP packets needed for handling
2402 large UDP datagrams, TCP segments, etc and increases the
2403 performance for large messages.
2404
2405 IgnoreUserspaceMulticastGroup=
2406 Takes an boolean value. When true, the kernel ignores multicast
2407 groups handled by userspace. Defaults to unset, and the kernel's
2408 default is used.
2409
2411 The [QDisc] section manages the traffic control queueing discipline
2412 (qdisc).
2413
2414 Parent=
2415 Specifies the parent Queueing Discipline (qdisc). Takes one of
2416 "clsact" or "ingress". This is mandatory.
2417
2418 Handle=
2419 Configures the major number of unique identifier of the qdisc,
2420 known as the handle. Takes a hexadecimal number in the range
2421 0x1–0xffff. Defaults to unset.
2422
2424 The [NetworkEmulator] section manages the queueing discipline (qdisc)
2425 of the network emulator. It can be used to configure the kernel packet
2426 scheduler and simulate packet delay and loss for UDP or TCP
2427 applications, or limit the bandwidth usage of a particular service to
2428 simulate internet connections.
2429
2430 Parent=
2431 Configures the parent Queueing Discipline (qdisc). Takes one of
2432 "root", "clsact", "ingress" or a class identifier. The class
2433 identifier is specified as the major and minor numbers in
2434 hexadecimal in the range 0x1–Oxffff separated with a colon
2435 ("major:minor"). Defaults to "root".
2436
2437 Handle=
2438 Configures the major number of unique identifier of the qdisc,
2439 known as the handle. Takes a hexadecimal number in the range
2440 0x1–0xffff. Defaults to unset.
2441
2442 DelaySec=
2443 Specifies the fixed amount of delay to be added to all packets
2444 going out of the interface. Defaults to unset.
2445
2446 DelayJitterSec=
2447 Specifies the chosen delay to be added to the packets outgoing to
2448 the network interface. Defaults to unset.
2449
2450 PacketLimit=
2451 Specifies the maximum number of packets the qdisc may hold queued
2452 at a time. An unsigned integer in the range 0...4294967294.
2453 Defaults to 1000.
2454
2455 LossRate=
2456 Specifies an independent loss probability to be added to the
2457 packets outgoing from the network interface. Takes a percentage
2458 value, suffixed with "%". Defaults to unset.
2459
2460 DuplicateRate=
2461 Specifies that the chosen percent of packets is duplicated before
2462 queuing them. Takes a percentage value, suffixed with "%". Defaults
2463 to unset.
2464
2466 The [TokenBucketFilter] section manages the queueing discipline (qdisc)
2467 of token bucket filter (tbf).
2468
2469 Parent=
2470 Configures the parent Queueing Discipline (qdisc). Takes one of
2471 "root", "clsact", "ingress" or a class identifier. The class
2472 identifier is specified as the major and minor numbers in
2473 hexadecimal in the range 0x1–Oxffff separated with a colon
2474 ("major:minor"). Defaults to "root".
2475
2476 Handle=
2477 Configures the major number of unique identifier of the qdisc,
2478 known as the handle. Takes a hexadecimal number in the range
2479 0x1–0xffff. Defaults to unset.
2480
2481 LatencySec=
2482 Specifies the latency parameter, which specifies the maximum amount
2483 of time a packet can sit in the Token Bucket Filter (TBF). Defaults
2484 to unset.
2485
2486 LimitBytes=
2487 Takes the number of bytes that can be queued waiting for tokens to
2488 become available. When the size is suffixed with K, M, or G, it is
2489 parsed as Kilobytes, Megabytes, or Gigabytes, respectively, to the
2490 base of 1024. Defaults to unset.
2491
2492 BurstBytes=
2493 Specifies the size of the bucket. This is the maximum amount of
2494 bytes that tokens can be available for instantaneous transfer. When
2495 the size is suffixed with K, M, or G, it is parsed as Kilobytes,
2496 Megabytes, or Gigabytes, respectively, to the base of 1024.
2497 Defaults to unset.
2498
2499 Rate=
2500 Specifies the device specific bandwidth. When suffixed with K, M,
2501 or G, the specified bandwidth is parsed as Kilobits, Megabits, or
2502 Gigabits, respectively, to the base of 1000. Defaults to unset.
2503
2504 MPUBytes=
2505 The Minimum Packet Unit (MPU) determines the minimal token usage
2506 (specified in bytes) for a packet. When suffixed with K, M, or G,
2507 the specified size is parsed as Kilobytes, Megabytes, or Gigabytes,
2508 respectively, to the base of 1024. Defaults to zero.
2509
2510 PeakRate=
2511 Takes the maximum depletion rate of the bucket. When suffixed with
2512 K, M, or G, the specified size is parsed as Kilobits, Megabits, or
2513 Gigabits, respectively, to the base of 1000. Defaults to unset.
2514
2515 MTUBytes=
2516 Specifies the size of the peakrate bucket. When suffixed with K, M,
2517 or G, the specified size is parsed as Kilobytes, Megabytes, or
2518 Gigabytes, respectively, to the base of 1024. Defaults to unset.
2519
2521 The [PIE] section manages the queueing discipline (qdisc) of
2522 Proportional Integral controller-Enhanced (PIE).
2523
2524 Parent=
2525 Configures the parent Queueing Discipline (qdisc). Takes one of
2526 "root", "clsact", "ingress" or a class identifier. The class
2527 identifier is specified as the major and minor numbers in
2528 hexadecimal in the range 0x1–Oxffff separated with a colon
2529 ("major:minor"). Defaults to "root".
2530
2531 Handle=
2532 Configures the major number of unique identifier of the qdisc,
2533 known as the handle. Takes a hexadecimal number in the range
2534 0x1–0xffff. Defaults to unset.
2535
2536 PacketLimit=
2537 Specifies the hard limit on the queue size in number of packets.
2538 When this limit is reached, incoming packets are dropped. An
2539 unsigned integer in the range 1...4294967294. Defaults to unset and
2540 kernel's default is used.
2541
2543 The "[FlowQueuePIE]" section manages the queueing discipline (qdisc) of
2544 Flow Queue Proportional Integral controller-Enhanced (fq_pie).
2545
2546 Parent=
2547 Configures the parent Queueing Discipline (qdisc). Takes one of
2548 "root", "clsact", "ingress" or a class identifier. The class
2549 identifier is specified as the major and minor numbers in
2550 hexadecimal in the range 0x1–Oxffff separated with a colon
2551 ("major:minor"). Defaults to "root".
2552
2553 Handle=
2554 Configures the major number of unique identifier of the qdisc,
2555 known as the handle. Takes a hexadecimal number in the range
2556 0x1–0xffff. Defaults to unset.
2557
2558 PacketLimit=
2559 Specifies the hard limit on the queue size in number of packets.
2560 When this limit is reached, incoming packets are dropped. An
2561 unsigned integer ranges 1 to 4294967294. Defaults to unset and
2562 kernel's default is used.
2563
2565 The [StochasticFairBlue] section manages the queueing discipline
2566 (qdisc) of stochastic fair blue (sfb).
2567
2568 Parent=
2569 Configures the parent Queueing Discipline (qdisc). Takes one of
2570 "root", "clsact", "ingress" or a class identifier. The class
2571 identifier is specified as the major and minor numbers in
2572 hexadecimal in the range 0x1–Oxffff separated with a colon
2573 ("major:minor"). Defaults to "root".
2574
2575 Handle=
2576 Configures the major number of unique identifier of the qdisc,
2577 known as the handle. Takes a hexadecimal number in the range
2578 0x1–0xffff. Defaults to unset.
2579
2580 PacketLimit=
2581 Specifies the hard limit on the queue size in number of packets.
2582 When this limit is reached, incoming packets are dropped. An
2583 unsigned integer in the range 0...4294967294. Defaults to unset and
2584 kernel's default is used.
2585
2587 The [StochasticFairnessQueueing] section manages the queueing
2588 discipline (qdisc) of stochastic fairness queueing (sfq).
2589
2590 Parent=
2591 Configures the parent Queueing Discipline (qdisc). Takes one of
2592 "root", "clsact", "ingress" or a class identifier. The class
2593 identifier is specified as the major and minor numbers in
2594 hexadecimal in the range 0x1–Oxffff separated with a colon
2595 ("major:minor"). Defaults to "root".
2596
2597 Handle=
2598 Configures the major number of unique identifier of the qdisc,
2599 known as the handle. Takes a hexadecimal number in the range
2600 0x1–0xffff. Defaults to unset.
2601
2602 PerturbPeriodSec=
2603 Specifies the interval in seconds for queue algorithm perturbation.
2604 Defaults to unset.
2605
2607 The [BFIFO] section manages the queueing discipline (qdisc) of Byte
2608 limited Packet First In First Out (bfifo).
2609
2610 Parent=
2611 Configures the parent Queueing Discipline (qdisc). Takes one of
2612 "root", "clsact", "ingress" or a class identifier. The class
2613 identifier is specified as the major and minor numbers in
2614 hexadecimal in the range 0x1–Oxffff separated with a colon
2615 ("major:minor"). Defaults to "root".
2616
2617 Handle=
2618 Configures the major number of unique identifier of the qdisc,
2619 known as the handle. Takes a hexadecimal number in the range
2620 0x1–0xffff. Defaults to unset.
2621
2622 LimitBytes=
2623 Specifies the hard limit in bytes on the FIFO buffer size. The size
2624 limit prevents overflow in case the kernel is unable to dequeue
2625 packets as quickly as it receives them. When this limit is reached,
2626 incoming packets are dropped. When suffixed with K, M, or G, the
2627 specified size is parsed as Kilobytes, Megabytes, or Gigabytes,
2628 respectively, to the base of 1024. Defaults to unset and kernel
2629 default is used.
2630
2632 The [PFIFO] section manages the queueing discipline (qdisc) of Packet
2633 First In First Out (pfifo).
2634
2635 Parent=
2636 Configures the parent Queueing Discipline (qdisc). Takes one of
2637 "root", "clsact", "ingress" or a class identifier. The class
2638 identifier is specified as the major and minor numbers in
2639 hexadecimal in the range 0x1–Oxffff separated with a colon
2640 ("major:minor"). Defaults to "root".
2641
2642 Handle=
2643 Configures the major number of unique identifier of the qdisc,
2644 known as the handle. Takes a hexadecimal number in the range
2645 0x1–0xffff. Defaults to unset.
2646
2647 PacketLimit=
2648 Specifies the hard limit on the number of packets in the FIFO
2649 queue. The size limit prevents overflow in case the kernel is
2650 unable to dequeue packets as quickly as it receives them. When this
2651 limit is reached, incoming packets are dropped. An unsigned integer
2652 in the range 0...4294967294. Defaults to unset and kernel's default
2653 is used.
2654
2656 The [PFIFOHeadDrop] section manages the queueing discipline (qdisc) of
2657 Packet First In First Out Head Drop (pfifo_head_drop).
2658
2659 Parent=
2660 Configures the parent Queueing Discipline (qdisc). Takes one of
2661 "root", "clsact", "ingress" or a class identifier. The class
2662 identifier is specified as the major and minor numbers in
2663 hexadecimal in the range 0x1–Oxffff separated with a colon
2664 ("major:minor"). Defaults to "root".
2665
2666 Handle=
2667 Configures the major number of unique identifier of the qdisc,
2668 known as the handle. Takes a hexadecimal number in the range
2669 0x1–0xffff. Defaults to unset.
2670
2671 PacketLimit=
2672 As in [PFIFO] section.
2673
2675 The [PFIFOFast] section manages the queueing discipline (qdisc) of
2676 Packet First In First Out Fast (pfifo_fast).
2677
2678 Parent=
2679 Configures the parent Queueing Discipline (qdisc). Takes one of
2680 "root", "clsact", "ingress" or a class identifier. The class
2681 identifier is specified as the major and minor numbers in
2682 hexadecimal in the range 0x1–Oxffff separated with a colon
2683 ("major:minor"). Defaults to "root".
2684
2685 Handle=
2686 Configures the major number of unique identifier of the qdisc,
2687 known as the handle. Takes a hexadecimal number in the range
2688 0x1–0xffff. Defaults to unset.
2689
2691 The [CAKE] section manages the queueing discipline (qdisc) of Common
2692 Applications Kept Enhanced (CAKE).
2693
2694 Parent=
2695 Configures the parent Queueing Discipline (qdisc). Takes one of
2696 "root", "clsact", "ingress" or a class identifier. The class
2697 identifier is specified as the major and minor numbers in
2698 hexadecimal in the range 0x1–Oxffff separated with a colon
2699 ("major:minor"). Defaults to "root".
2700
2701 Handle=
2702 Configures the major number of unique identifier of the qdisc,
2703 known as the handle. Takes a hexadecimal number in the range
2704 0x1–0xffff. Defaults to unset.
2705
2706 Bandwidth=
2707 Specifies the shaper bandwidth. When suffixed with K, M, or G, the
2708 specified size is parsed as Kilobits, Megabits, or Gigabits,
2709 respectively, to the base of 1000. Defaults to unset and kernel's
2710 default is used.
2711
2712 AutoRateIngress=
2713 Takes a boolean value. Enables automatic capacity estimation based
2714 on traffic arriving at this qdisc. This is most likely to be useful
2715 with cellular links, which tend to change quality randomly. If this
2716 setting is enabled, the Bandwidth= setting is used as an initial
2717 estimate. Defaults to unset, and the kernel's default is used.
2718
2719 OverheadBytes=
2720 Specifies that bytes to be addeded to the size of each packet.
2721 Bytes may be negative. Takes an integer in the range -64...256.
2722 Defaults to unset and kernel's default is used.
2723
2724 MPUBytes=
2725 Rounds each packet (including overhead) up to the specified bytes.
2726 Takes an integer in the range 1...256. Defaults to unset and
2727 kernel's default is used.
2728
2729 CompensationMode=
2730 Takes one of "none", "atm", or "ptm". Specifies the compensation
2731 mode for overhead calculation. When "none", no compensation is
2732 taken into account. When "atm", enables the compensation for ATM
2733 cell framing, which is normally found on ADSL links. When "ptm",
2734 enables the compensation for PTM encoding, which is normally found
2735 on VDSL2 links and uses a 64b/65b encoding scheme. Defaults to
2736 unset and the kernel's default is used.
2737
2738 UseRawPacketSize=
2739 Takes a boolean value. When true, the packet size reported by the
2740 Linux kernel will be used, instead of the underlying IP packet
2741 size. Defaults to unset, and the kernel's default is used.
2742
2743 FlowIsolationMode=
2744 CAKE places packets from different flows into different queues,
2745 then packets from each queue are delivered fairly. This specifies
2746 whether the fairness is based on source address, destination
2747 address, individual flows, or any combination of those. The
2748 available values are:
2749
2750 none
2751 The flow isolation is disabled, and all traffic passes through
2752 a single queue.
2753
2754 src-host
2755 Flows are defined only by source address. Equivalent to the
2756 "srchost" option for tc qdisc command. See also tc-cake(8).
2757
2758 dst-host
2759 Flows are defined only by destination address. Equivalent to
2760 the "dsthost" option for tc qdisc command. See also tc-cake(8).
2761
2762 hosts
2763 Flows are defined by source-destination host pairs. Equivalent
2764 to the same option for tc qdisc command. See also tc-cake(8).
2765
2766 flows
2767 Flows are defined by the entire 5-tuple of source address,
2768 destination address, transport protocol, source port and
2769 destination port. Equivalent to the same option for tc qdisc
2770 command. See also tc-cake(8).
2771
2772 dual-src-host
2773 Flows are defined by the 5-tuple (see "flows" in the above),
2774 and fairness is applied first over source addresses, then over
2775 individual flows. Equivalent to the "dual-srchost" option for
2776 tc qdisc command. See also tc-cake(8).
2777
2778 dual-dst-host
2779 Flows are defined by the 5-tuple (see "flows" in the above),
2780 and fairness is applied first over destination addresses, then
2781 over individual flows. Equivalent to the "dual-dsthost" option
2782 for tc qdisc command. See also tc-cake(8).
2783
2784 triple
2785 Flows are defined by the 5-tuple (see "flows"), and fairness is
2786 applied over source and destination addresses, and also over
2787 individual flows. Equivalent to the "triple-isolate" option for
2788 tc qdisc command. See also tc-cake(8).
2789
2790 Defaults to unset and the kernel's default is used.
2791
2792 NAT=
2793 Takes a boolean value. When true, CAKE performs a NAT lookup before
2794 applying flow-isolation rules, to determine the true addresses and
2795 port numbers of the packet, to improve fairness between hosts
2796 inside the NAT. This has no practical effect when
2797 FlowIsolationMode= is "none" or "flows", or if NAT is performed on
2798 a different host. Defaults to unset, and the kernel's default is
2799 used.
2800
2801 PriorityQueueingPreset=
2802 CAKE divides traffic into "tins", and each tin has its own
2803 independent set of flow-isolation queues, bandwidth threshold, and
2804 priority. This specifies the preset of tin profiles. The available
2805 values are:
2806
2807 besteffort
2808 Disables priority queueing by placing all traffic in one tin.
2809
2810 precedence
2811 Enables priority queueing based on the legacy interpretation of
2812 TOS "Precedence" field. Use of this preset on the modern
2813 Internet is firmly discouraged.
2814
2815 diffserv8
2816 Enables priority queueing based on the Differentiated Service
2817 ("DiffServ") field with eight tins: Background Traffic, High
2818 Throughput, Best Effort, Video Streaming, Low Latency
2819 Transactions, Interactive Shell, Minimum Latency, and Network
2820 Control.
2821
2822 diffserv4
2823 Enables priority queueing based on the Differentiated Service
2824 ("DiffServ") field with four tins: Background Traffic, Best
2825 Effort, Streaming Media, and Latency Sensitive.
2826
2827 diffserv3
2828 Enables priority queueing based on the Differentiated Service
2829 ("DiffServ") field with three tins: Background Traffic, Best
2830 Effort, and Latency Sensitive.
2831
2832 Defaults to unset, and the kernel's default is used.
2833
2834 FirewallMark=
2835 Takes an integer in the range 1...4294967295. When specified,
2836 firewall-mark-based overriding of CAKE's tin selection is enabled.
2837 Defaults to unset, and the kernel's default is used.
2838
2839 Wash=
2840 Takes a boolean value. When true, CAKE clears the DSCP fields,
2841 except for ECN bits, of any packet passing through CAKE. Defaults
2842 to unset, and the kernel's default is used.
2843
2844 SplitGSO=
2845 Takes a boolean value. When true, CAKE will split General
2846 Segmentation Offload (GSO) super-packets into their on-the-wire
2847 components and dequeue them individually. Defaults to unset, and
2848 the kernel's default is used.
2849
2851 The [ControlledDelay] section manages the queueing discipline (qdisc)
2852 of controlled delay (CoDel).
2853
2854 Parent=
2855 Configures the parent Queueing Discipline (qdisc). Takes one of
2856 "root", "clsact", "ingress" or a class identifier. The class
2857 identifier is specified as the major and minor numbers in
2858 hexadecimal in the range 0x1–Oxffff separated with a colon
2859 ("major:minor"). Defaults to "root".
2860
2861 Handle=
2862 Configures the major number of unique identifier of the qdisc,
2863 known as the handle. Takes a hexadecimal number in the range
2864 0x1–0xffff. Defaults to unset.
2865
2866 PacketLimit=
2867 Specifies the hard limit on the queue size in number of packets.
2868 When this limit is reached, incoming packets are dropped. An
2869 unsigned integer in the range 0...4294967294. Defaults to unset and
2870 kernel's default is used.
2871
2872 TargetSec=
2873 Takes a timespan. Specifies the acceptable minimum
2874 standing/persistent queue delay. Defaults to unset and kernel's
2875 default is used.
2876
2877 IntervalSec=
2878 Takes a timespan. This is used to ensure that the measured minimum
2879 delay does not become too stale. Defaults to unset and kernel's
2880 default is used.
2881
2882 ECN=
2883 Takes a boolean. This can be used to mark packets instead of
2884 dropping them. Defaults to unset and kernel's default is used.
2885
2886 CEThresholdSec=
2887 Takes a timespan. This sets a threshold above which all packets are
2888 marked with ECN Congestion Experienced (CE). Defaults to unset and
2889 kernel's default is used.
2890
2892 The [DeficitRoundRobinScheduler] section manages the queueing
2893 discipline (qdisc) of Deficit Round Robin Scheduler (DRR).
2894
2895 Parent=
2896 Configures the parent Queueing Discipline (qdisc). Takes one of
2897 "root", "clsact", "ingress" or a class identifier. The class
2898 identifier is specified as the major and minor numbers in
2899 hexadecimal in the range 0x1–Oxffff separated with a colon
2900 ("major:minor"). Defaults to "root".
2901
2902 Handle=
2903 Configures the major number of unique identifier of the qdisc,
2904 known as the handle. Takes a hexadecimal number in the range
2905 0x1–0xffff. Defaults to unset.
2906
2908 The [DeficitRoundRobinSchedulerClass] section manages the traffic
2909 control class of Deficit Round Robin Scheduler (DRR).
2910
2911 Parent=
2912 Configures the parent Queueing Discipline (qdisc). Takes one of
2913 "root", or a qdisc identifier. The qdisc identifier is specified as
2914 the major and minor numbers in hexadecimal in the range 0x1–Oxffff
2915 separated with a colon ("major:minor"). Defaults to "root".
2916
2917 ClassId=
2918 Configures the unique identifier of the class. It is specified as
2919 the major and minor numbers in hexadecimal in the range 0x1–Oxffff
2920 separated with a colon ("major:minor"). Defaults to unset.
2921
2922 QuantumBytes=
2923 Specifies the amount of bytes a flow is allowed to dequeue before
2924 the scheduler moves to the next class. When suffixed with K, M, or
2925 G, the specified size is parsed as Kilobytes, Megabytes, or
2926 Gigabytes, respectively, to the base of 1024. Defaults to the MTU
2927 of the interface.
2928
2930 The [EnhancedTransmissionSelection] section manages the queueing
2931 discipline (qdisc) of Enhanced Transmission Selection (ETS).
2932
2933 Parent=
2934 Configures the parent Queueing Discipline (qdisc). Takes one of
2935 "root", "clsact", "ingress" or a class identifier. The class
2936 identifier is specified as the major and minor numbers in
2937 hexadecimal in the range 0x1–Oxffff separated with a colon
2938 ("major:minor"). Defaults to "root".
2939
2940 Handle=
2941 Configures the major number of unique identifier of the qdisc,
2942 known as the handle. Takes a hexadecimal number in the range
2943 0x1–0xffff. Defaults to unset.
2944
2945 Bands=
2946 Specifies the number of bands. An unsigned integer in the range
2947 1...16. This value has to be at least large enough to cover the
2948 strict bands specified through the StrictBands= and
2949 bandwidth-sharing bands specified in QuantumBytes=.
2950
2951 StrictBands=
2952 Specifies the number of bands that should be created in strict
2953 mode. An unsigned integer in the range 1...16.
2954
2955 QuantumBytes=
2956 Specifies the white-space separated list of quantum used in
2957 band-sharing bands. When suffixed with K, M, or G, the specified
2958 size is parsed as Kilobytes, Megabytes, or Gigabytes, respectively,
2959 to the base of 1024. This setting can be specified multiple times.
2960 If an empty string is assigned, then the all previous assignments
2961 are cleared.
2962
2963 PriorityMap=
2964 The priority map maps the priority of a packet to a band. The
2965 argument is a whitespace separated list of numbers. The first
2966 number indicates which band the packets with priority 0 should be
2967 put to, the second is for priority 1, and so on. There can be up to
2968 16 numbers in the list. If there are fewer, the default band that
2969 traffic with one of the unmentioned priorities goes to is the last
2970 one. Each band number must be in the range 0...255. This setting
2971 can be specified multiple times. If an empty string is assigned,
2972 then the all previous assignments are cleared.
2973
2975 The [GenericRandomEarlyDetection] section manages the queueing
2976 discipline (qdisc) of Generic Random Early Detection (GRED).
2977
2978 Parent=
2979 Configures the parent Queueing Discipline (qdisc). Takes one of
2980 "root", "clsact", "ingress" or a class identifier. The class
2981 identifier is specified as the major and minor numbers in
2982 hexadecimal in the range 0x1–Oxffff separated with a colon
2983 ("major:minor"). Defaults to "root".
2984
2985 Handle=
2986 Configures the major number of unique identifier of the qdisc,
2987 known as the handle. Takes a hexadecimal number in the range
2988 0x1–0xffff. Defaults to unset.
2989
2990 VirtualQueues=
2991 Specifies the number of virtual queues. Takes an integer in the
2992 range 1...16. Defaults to unset and kernel's default is used.
2993
2994 DefaultVirtualQueue=
2995 Specifies the number of default virtual queue. This must be less
2996 than VirtualQueue=. Defaults to unset and kernel's default is used.
2997
2998 GenericRIO=
2999 Takes a boolean. It turns on the RIO-like buffering scheme.
3000 Defaults to unset and kernel's default is used.
3001
3003 The [FairQueueingControlledDelay] section manages the queueing
3004 discipline (qdisc) of fair queuing controlled delay (FQ-CoDel).
3005
3006 Parent=
3007 Configures the parent Queueing Discipline (qdisc). Takes one of
3008 "root", "clsact", "ingress" or a class identifier. The class
3009 identifier is specified as the major and minor numbers in
3010 hexadecimal in the range 0x1–Oxffff separated with a colon
3011 ("major:minor"). Defaults to "root".
3012
3013 Handle=
3014 Configures the major number of unique identifier of the qdisc,
3015 known as the handle. Takes a hexadecimal number in the range
3016 0x1–0xffff. Defaults to unset.
3017
3018 PacketLimit=
3019 Specifies the hard limit on the real queue size. When this limit is
3020 reached, incoming packets are dropped. Defaults to unset and
3021 kernel's default is used.
3022
3023 MemoryLimitBytes=
3024 Specifies the limit on the total number of bytes that can be queued
3025 in this FQ-CoDel instance. When suffixed with K, M, or G, the
3026 specified size is parsed as Kilobytes, Megabytes, or Gigabytes,
3027 respectively, to the base of 1024. Defaults to unset and kernel's
3028 default is used.
3029
3030 Flows=
3031 Specifies the number of flows into which the incoming packets are
3032 classified. Defaults to unset and kernel's default is used.
3033
3034 TargetSec=
3035 Takes a timespan. Specifies the acceptable minimum
3036 standing/persistent queue delay. Defaults to unset and kernel's
3037 default is used.
3038
3039 IntervalSec=
3040 Takes a timespan. This is used to ensure that the measured minimum
3041 delay does not become too stale. Defaults to unset and kernel's
3042 default is used.
3043
3044 QuantumBytes=
3045 Specifies the number of bytes used as the "deficit" in the fair
3046 queuing algorithm timespan. When suffixed with K, M, or G, the
3047 specified size is parsed as Kilobytes, Megabytes, or Gigabytes,
3048 respectively, to the base of 1024. Defaults to unset and kernel's
3049 default is used.
3050
3051 ECN=
3052 Takes a boolean. This can be used to mark packets instead of
3053 dropping them. Defaults to unset and kernel's default is used.
3054
3055 CEThresholdSec=
3056 Takes a timespan. This sets a threshold above which all packets are
3057 marked with ECN Congestion Experienced (CE). Defaults to unset and
3058 kernel's default is used.
3059
3061 The [FairQueueing] section manages the queueing discipline (qdisc) of
3062 fair queue traffic policing (FQ).
3063
3064 Parent=
3065 Configures the parent Queueing Discipline (qdisc). Takes one of
3066 "root", "clsact", "ingress" or a class identifier. The class
3067 identifier is specified as the major and minor numbers in
3068 hexadecimal in the range 0x1–Oxffff separated with a colon
3069 ("major:minor"). Defaults to "root".
3070
3071 Handle=
3072 Configures the major number of unique identifier of the qdisc,
3073 known as the handle. Takes a hexadecimal number in the range
3074 0x1–0xffff. Defaults to unset.
3075
3076 PacketLimit=
3077 Specifies the hard limit on the real queue size. When this limit is
3078 reached, incoming packets are dropped. Defaults to unset and
3079 kernel's default is used.
3080
3081 FlowLimit=
3082 Specifies the hard limit on the maximum number of packets queued
3083 per flow. Defaults to unset and kernel's default is used.
3084
3085 QuantumBytes=
3086 Specifies the credit per dequeue RR round, i.e. the amount of bytes
3087 a flow is allowed to dequeue at once. When suffixed with K, M, or
3088 G, the specified size is parsed as Kilobytes, Megabytes, or
3089 Gigabytes, respectively, to the base of 1024. Defaults to unset and
3090 kernel's default is used.
3091
3092 InitialQuantumBytes=
3093 Specifies the initial sending rate credit, i.e. the amount of bytes
3094 a new flow is allowed to dequeue initially. When suffixed with K,
3095 M, or G, the specified size is parsed as Kilobytes, Megabytes, or
3096 Gigabytes, respectively, to the base of 1024. Defaults to unset and
3097 kernel's default is used.
3098
3099 MaximumRate=
3100 Specifies the maximum sending rate of a flow. When suffixed with K,
3101 M, or G, the specified size is parsed as Kilobits, Megabits, or
3102 Gigabits, respectively, to the base of 1000. Defaults to unset and
3103 kernel's default is used.
3104
3105 Buckets=
3106 Specifies the size of the hash table used for flow lookups.
3107 Defaults to unset and kernel's default is used.
3108
3109 OrphanMask=
3110 Takes an unsigned integer. For packets not owned by a socket, fq is
3111 able to mask a part of hash and reduce number of buckets associated
3112 with the traffic. Defaults to unset and kernel's default is used.
3113
3114 Pacing=
3115 Takes a boolean, and enables or disables flow pacing. Defaults to
3116 unset and kernel's default is used.
3117
3118 CEThresholdSec=
3119 Takes a timespan. This sets a threshold above which all packets are
3120 marked with ECN Congestion Experienced (CE). Defaults to unset and
3121 kernel's default is used.
3122
3124 The [TrivialLinkEqualizer] section manages the queueing discipline
3125 (qdisc) of trivial link equalizer (teql).
3126
3127 Parent=
3128 Configures the parent Queueing Discipline (qdisc). Takes one of
3129 "root", "clsact", "ingress" or a class identifier. The class
3130 identifier is specified as the major and minor numbers in
3131 hexadecimal in the range 0x1–Oxffff separated with a colon
3132 ("major:minor"). Defaults to "root".
3133
3134 Handle=
3135 Configures the major number of unique identifier of the qdisc,
3136 known as the handle. Takes a hexadecimal number in the range
3137 0x1–0xffff. Defaults to unset.
3138
3139 Id=
3140 Specifies the interface ID "N" of teql. Defaults to "0". Note that
3141 when teql is used, currently, the module sch_teql with
3142 max_equalizers=N+1 option must be loaded before systemd-networkd is
3143 started.
3144
3146 The [HierarchyTokenBucket] section manages the queueing discipline
3147 (qdisc) of hierarchy token bucket (htb).
3148
3149 Parent=
3150 Configures the parent Queueing Discipline (qdisc). Takes one of
3151 "root", "clsact", "ingress" or a class identifier. The class
3152 identifier is specified as the major and minor numbers in
3153 hexadecimal in the range 0x1–Oxffff separated with a colon
3154 ("major:minor"). Defaults to "root".
3155
3156 Handle=
3157 Configures the major number of unique identifier of the qdisc,
3158 known as the handle. Takes a hexadecimal number in the range
3159 0x1–0xffff. Defaults to unset.
3160
3161 DefaultClass=
3162 Takes the minor id in hexadecimal of the default class.
3163 Unclassified traffic gets sent to the class. Defaults to unset.
3164
3165 RateToQuantum=
3166 Takes an unsigned integer. The DRR quantums are calculated by
3167 dividing the value configured in Rate= by RateToQuantum=.
3168
3170 The [HierarchyTokenBucketClass] section manages the traffic control
3171 class of hierarchy token bucket (htb).
3172
3173 Parent=
3174 Configures the parent Queueing Discipline (qdisc). Takes one of
3175 "root", or a qdisc identifier. The qdisc identifier is specified as
3176 the major and minor numbers in hexadecimal in the range 0x1–Oxffff
3177 separated with a colon ("major:minor"). Defaults to "root".
3178
3179 ClassId=
3180 Configures the unique identifier of the class. It is specified as
3181 the major and minor numbers in hexadecimal in the range 0x1–Oxffff
3182 separated with a colon ("major:minor"). Defaults to unset.
3183
3184 Priority=
3185 Specifies the priority of the class. In the round-robin process,
3186 classes with the lowest priority field are tried for packets first.
3187
3188 QuantumBytes=
3189 Specifies how many bytes to serve from leaf at once. When suffixed
3190 with K, M, or G, the specified size is parsed as Kilobytes,
3191 Megabytes, or Gigabytes, respectively, to the base of 1024.
3192
3193 MTUBytes=
3194 Specifies the maximum packet size we create. When suffixed with K,
3195 M, or G, the specified size is parsed as Kilobytes, Megabytes, or
3196 Gigabytes, respectively, to the base of 1024.
3197
3198 OverheadBytes=
3199 Takes an unsigned integer which specifies per-packet size overhead
3200 used in rate computations. When suffixed with K, M, or G, the
3201 specified size is parsed as Kilobytes, Megabytes, or Gigabytes,
3202 respectively, to the base of 1024.
3203
3204 Rate=
3205 Specifies the maximum rate this class and all its children are
3206 guaranteed. When suffixed with K, M, or G, the specified size is
3207 parsed as Kilobits, Megabits, or Gigabits, respectively, to the
3208 base of 1000. This setting is mandatory.
3209
3210 CeilRate=
3211 Specifies the maximum rate at which a class can send, if its parent
3212 has bandwidth to spare. When suffixed with K, M, or G, the
3213 specified size is parsed as Kilobits, Megabits, or Gigabits,
3214 respectively, to the base of 1000. When unset, the value specified
3215 with Rate= is used.
3216
3217 BufferBytes=
3218 Specifies the maximum bytes burst which can be accumulated during
3219 idle period. When suffixed with K, M, or G, the specified size is
3220 parsed as Kilobytes, Megabytes, or Gigabytes, respectively, to the
3221 base of 1024.
3222
3223 CeilBufferBytes=
3224 Specifies the maximum bytes burst for ceil which can be accumulated
3225 during idle period. When suffixed with K, M, or G, the specified
3226 size is parsed as Kilobytes, Megabytes, or Gigabytes, respectively,
3227 to the base of 1024.
3228
3230 The [HeavyHitterFilter] section manages the queueing discipline (qdisc)
3231 of Heavy Hitter Filter (hhf).
3232
3233 Parent=
3234 Configures the parent Queueing Discipline (qdisc). Takes one of
3235 "root", "clsact", "ingress" or a class identifier. The class
3236 identifier is specified as the major and minor numbers in
3237 hexadecimal in the range 0x1–Oxffff separated with a colon
3238 ("major:minor"). Defaults to "root".
3239
3240 Handle=
3241 Configures the major number of unique identifier of the qdisc,
3242 known as the handle. Takes a hexadecimal number in the range
3243 0x1–0xffff. Defaults to unset.
3244
3245 PacketLimit=
3246 Specifies the hard limit on the queue size in number of packets.
3247 When this limit is reached, incoming packets are dropped. An
3248 unsigned integer in the range 0...4294967294. Defaults to unset and
3249 kernel's default is used.
3250
3252 The [QuickFairQueueing] section manages the queueing discipline (qdisc)
3253 of Quick Fair Queueing (QFQ).
3254
3255 Parent=
3256 Configures the parent Queueing Discipline (qdisc). Takes one of
3257 "root", "clsact", "ingress" or a class identifier. The class
3258 identifier is specified as the major and minor numbers in
3259 hexadecimal in the range 0x1–Oxffff separated with a colon
3260 ("major:minor"). Defaults to "root".
3261
3262 Handle=
3263 Configures the major number of unique identifier of the qdisc,
3264 known as the handle. Takes a hexadecimal number in the range
3265 0x1–0xffff. Defaults to unset.
3266
3268 The [QuickFairQueueingClass] section manages the traffic control class
3269 of Quick Fair Queueing (qfq).
3270
3271 Parent=
3272 Configures the parent Queueing Discipline (qdisc). Takes one of
3273 "root", or a qdisc identifier. The qdisc identifier is specified as
3274 the major and minor numbers in hexadecimal in the range 0x1–Oxffff
3275 separated with a colon ("major:minor"). Defaults to "root".
3276
3277 ClassId=
3278 Configures the unique identifier of the class. It is specified as
3279 the major and minor numbers in hexadecimal in the range 0x1–Oxffff
3280 separated with a colon ("major:minor"). Defaults to unset.
3281
3282 Weight=
3283 Specifies the weight of the class. Takes an integer in the range
3284 1...1023. Defaults to unset in which case the kernel default is
3285 used.
3286
3287 MaxPacketBytes=
3288 Specifies the maximum packet size in bytes for the class. When
3289 suffixed with K, M, or G, the specified size is parsed as
3290 Kilobytes, Megabytes, or Gigabytes, respectively, to the base of
3291 1024. When unset, the kernel default is used.
3292
3294 The [BridgeVLAN] section manages the VLAN ID configuration of a bridge
3295 port and accepts the following keys. Specify several [BridgeVLAN]
3296 sections to configure several VLAN entries. The VLANFiltering= option
3297 has to be enabled, see the [Bridge] section in systemd.netdev(5).
3298
3299 VLAN=
3300 The VLAN ID allowed on the port. This can be either a single ID or
3301 a range M-N. Takes an integer in the range 1...4094.
3302
3303 EgressUntagged=
3304 The VLAN ID specified here will be used to untag frames on egress.
3305 Configuring EgressUntagged= implicates the use of VLAN= above and
3306 will enable the VLAN ID for ingress as well. This can be either a
3307 single ID or a range M-N.
3308
3309 PVID=
3310 The Port VLAN ID specified here is assigned to all untagged frames
3311 at ingress. PVID= can be used only once. Configuring PVID=
3312 implicates the use of VLAN= above and will enable the VLAN ID for
3313 ingress as well.
3314
3316 Example 1. Static network configuration
3317
3318 # /etc/systemd/network/50-static.network
3319 [Match]
3320 Name=enp2s0
3321
3322 [Network]
3323 Address=192.168.0.15/24
3324 Gateway=192.168.0.1
3325
3326 This brings interface "enp2s0" up with a static address. The specified
3327 gateway will be used for a default route.
3328
3329 Example 2. DHCP on ethernet links
3330
3331 # /etc/systemd/network/80-dhcp.network
3332 [Match]
3333 Name=en*
3334
3335 [Network]
3336 DHCP=yes
3337
3338 This will enable DHCPv4 and DHCPv6 on all interfaces with names
3339 starting with "en" (i.e. ethernet interfaces).
3340
3341 Example 3. IPv6 Prefix Delegation (DHCPv6 PD)
3342
3343 # /etc/systemd/network/55-dhcpv6-pd-upstream.network
3344 [Match]
3345 Name=enp1s0
3346
3347 [Network]
3348 DHCP=ipv6
3349
3350 # The below setting is optional, to also assign an address in the delegated prefix
3351 # to the upstream interface. If not necessary, then comment out the line below and
3352 # the [DHCPPrefixDelegation] section.
3353 DHCPPrefixDelegation=yes
3354
3355 # If the upstream network provides Router Advertisement with Managed bit set,
3356 # then comment out the line below and WithoutRA= setting in the [DHCPv6] section.
3357 IPv6AcceptRA=no
3358
3359 [DHCPv6]
3360 WithoutRA=solicit
3361
3362 [DHCPPrefixDelegation]
3363 UplinkInterface=:self
3364 SubnetId=0
3365 Announce=no
3366
3367 # /etc/systemd/network/55-dhcpv6-pd-downstream.network
3368 [Match]
3369 Name=enp2s0
3370
3371 [Network]
3372 DHCPPrefixDelegation=yes
3373 IPv6SendRA=yes
3374
3375 # It is expected that the host is acting as a router. So, usually it is not
3376 # necessary to receive Router Advertisement from other hosts in the downstream network.
3377 IPv6AcceptRA=no
3378
3379 [DHCPPrefixDelegation]
3380 UplinkInterface=enp1s0
3381 SubnetId=1
3382 Announce=yes
3383
3384 This will enable DHCPv6-PD on the interface enp1s0 as an upstream
3385 interface where the DHCPv6 client is running and enp2s0 as a downstream
3386 interface where the prefix is delegated to. The delegated prefixes are
3387 distributed by IPv6 Router Advertisement on the downstream network.
3388
3389 Example 4. IPv6 Prefix Delegation (DHCPv4 6RD)
3390
3391 # /etc/systemd/network/55-dhcpv4-6rd-upstream.network
3392 [Match]
3393 Name=enp1s0
3394
3395 [Network]
3396 DHCP=ipv4
3397
3398 # When DHCPv4-6RD is used, the upstream network does not support IPv6.
3399 # Hence, it is not necessary to wait for Router Advertisement, which is enabled by default.
3400 IPv6AcceptRA=no
3401
3402 [DHCPv4]
3403 Use6RD=yes
3404
3405 # /etc/systemd/network/55-dhcpv4-6rd-downstream.network
3406 [Match]
3407 Name=enp2s0
3408
3409 [Network]
3410 DHCPPrefixDelegation=yes
3411 IPv6SendRA=yes
3412
3413 # It is expected that the host is acting as a router. So, usually it is not
3414 # necessary to receive Router Advertisement from other hosts in the downstream network.
3415 IPv6AcceptRA=no
3416
3417 [DHCPPrefixDelegation]
3418 UplinkInterface=enp1s0
3419 SubnetId=1
3420 Announce=yes
3421
3422 This will enable DHCPv4-6RD on the interface enp1s0 as an upstream
3423 interface where the DHCPv4 client is running and enp2s0 as a downstream
3424 interface where the prefix is delegated to. The delegated prefixes are
3425 distributed by IPv6 Router Advertisement on the downstream network.
3426
3427 Example 5. A bridge with two enslaved links
3428
3429 # /etc/systemd/network/25-bridge-static.netdev
3430 [NetDev]
3431 Name=bridge0
3432 Kind=bridge
3433
3434 # /etc/systemd/network/25-bridge-static.network
3435 [Match]
3436 Name=bridge0
3437
3438 [Network]
3439 Address=192.168.0.15/24
3440 Gateway=192.168.0.1
3441 DNS=192.168.0.1
3442
3443 # /etc/systemd/network/25-bridge-slave-interface-1.network
3444 [Match]
3445 Name=enp2s0
3446
3447 [Network]
3448 Bridge=bridge0
3449
3450 # /etc/systemd/network/25-bridge-slave-interface-2.network
3451 [Match]
3452 Name=wlp3s0
3453
3454 [Network]
3455 Bridge=bridge0
3456
3457 This creates a bridge and attaches devices "enp2s0" and "wlp3s0" to it.
3458 The bridge will have the specified static address and network assigned,
3459 and a default route via the specified gateway will be added. The
3460 specified DNS server will be added to the global list of DNS resolvers.
3461
3462 Example 6. Bridge port with VLAN forwarding
3463
3464 # /etc/systemd/network/25-bridge-slave-interface-1.network
3465 [Match]
3466 Name=enp2s0
3467
3468 [Network]
3469 Bridge=bridge0
3470
3471 [BridgeVLAN]
3472 VLAN=1-32
3473 PVID=42
3474 EgressUntagged=42
3475
3476 [BridgeVLAN]
3477 VLAN=100-200
3478
3479 [BridgeVLAN]
3480 EgressUntagged=300-400
3481
3482 This overrides the configuration specified in the previous example for
3483 the interface "enp2s0", and enables VLAN on that bridge port. VLAN IDs
3484 1-32, 42, 100-400 will be allowed. Packets tagged with VLAN IDs 42,
3485 300-400 will be untagged when they leave on this interface. Untagged
3486 packets which arrive on this interface will be assigned VLAN ID 42.
3487
3488 Example 7. Various tunnels
3489
3490 /etc/systemd/network/25-tunnels.network
3491 [Match]
3492 Name=ens1
3493
3494 [Network]
3495 Tunnel=ipip-tun
3496 Tunnel=sit-tun
3497 Tunnel=gre-tun
3498 Tunnel=vti-tun
3499
3500
3501 /etc/systemd/network/25-tunnel-ipip.netdev
3502 [NetDev]
3503 Name=ipip-tun
3504 Kind=ipip
3505
3506
3507 /etc/systemd/network/25-tunnel-sit.netdev
3508 [NetDev]
3509 Name=sit-tun
3510 Kind=sit
3511
3512
3513 /etc/systemd/network/25-tunnel-gre.netdev
3514 [NetDev]
3515 Name=gre-tun
3516 Kind=gre
3517
3518
3519 /etc/systemd/network/25-tunnel-vti.netdev
3520 [NetDev]
3521 Name=vti-tun
3522 Kind=vti
3523
3524
3525 This will bring interface "ens1" up and create an IPIP tunnel, a SIT
3526 tunnel, a GRE tunnel, and a VTI tunnel using it.
3527
3528 Example 8. A bond device
3529
3530 # /etc/systemd/network/30-bond1.network
3531 [Match]
3532 Name=bond1
3533
3534 [Network]
3535 DHCP=ipv6
3536
3537 # /etc/systemd/network/30-bond1.netdev
3538 [NetDev]
3539 Name=bond1
3540 Kind=bond
3541
3542 # /etc/systemd/network/30-bond1-dev1.network
3543 [Match]
3544 MACAddress=52:54:00:e9:64:41
3545
3546 [Network]
3547 Bond=bond1
3548
3549 # /etc/systemd/network/30-bond1-dev2.network
3550 [Match]
3551 MACAddress=52:54:00:e9:64:42
3552
3553 [Network]
3554 Bond=bond1
3555
3556 This will create a bond device "bond1" and enslave the two devices with
3557 MAC addresses 52:54:00:e9:64:41 and 52:54:00:e9:64:42 to it. IPv6 DHCP
3558 will be used to acquire an address.
3559
3560 Example 9. Virtual Routing and Forwarding (VRF)
3561
3562 Add the "bond1" interface to the VRF master interface "vrf1". This will
3563 redirect routes generated on this interface to be within the routing
3564 table defined during VRF creation. For kernels before 4.8 traffic won't
3565 be redirected towards the VRFs routing table unless specific ip-rules
3566 are added.
3567
3568 # /etc/systemd/network/25-vrf.network
3569 [Match]
3570 Name=bond1
3571
3572 [Network]
3573 VRF=vrf1
3574
3575 Example 10. MacVTap
3576
3577 This brings up a network interface "macvtap-test" and attaches it to
3578 "enp0s25".
3579
3580 # /usr/lib/systemd/network/25-macvtap.network
3581 [Match]
3582 Name=enp0s25
3583
3584 [Network]
3585 MACVTAP=macvtap-test
3586
3587 Example 11. A Xfrm interface with physical underlying device.
3588
3589 # /etc/systemd/network/27-xfrm.netdev
3590 [NetDev]
3591 Name=xfrm0
3592 Kind=xfrm
3593
3594 [Xfrm]
3595 InterfaceId=7
3596
3597 # /etc/systemd/network/27-eth0.network
3598 [Match]
3599 Name=eth0
3600
3601 [Network]
3602 Xfrm=xfrm0
3603
3604 This creates a "xfrm0" interface and binds it to the "eth0" device.
3605 This allows hardware based ipsec offloading to the "eth0" nic. If
3606 offloading is not needed, xfrm interfaces can be assigned to the "lo"
3607 device.
3608
3610 systemd(1), systemd-networkd.service(8), systemd.link(5),
3611 systemd.netdev(5), systemd-network-generator.service(8), systemd-
3612 resolved.service(8)
3613
3615 1. Link-Local Multicast Name Resolution
3616 https://tools.ietf.org/html/rfc4795
3617
3618 2. Multicast DNS
3619 https://tools.ietf.org/html/rfc6762
3620
3621 3. DNS-over-TLS
3622 https://tools.ietf.org/html/rfc7858
3623
3624 4. DNSSEC
3625 https://tools.ietf.org/html/rfc4033
3626
3627 5. IEEE 802.1AB-2016
3628 https://standards.ieee.org/findstds/standard/802.1AB-2016.html
3629
3630 6. ip-sysctl.txt
3631 https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt
3632
3633 7. RFC 4941
3634 https://tools.ietf.org/html/rfc4941
3635
3636 8. RFC 1027
3637 https://tools.ietf.org/html/rfc1027
3638
3639 9. RFC 6275
3640 https://tools.ietf.org/html/rfc6275
3641
3642 10. RFC 5227
3643 https://tools.ietf.org/html/rfc5227
3644
3645 11. RFC 4862
3646 https://tools.ietf.org/html/rfc4862
3647
3648 12. RFC 3041
3649 https://tools.ietf.org/html/rfc3041
3650
3651 13. RFC 3484
3652 https://tools.ietf.org/html/rfc3484
3653
3654 14. RFC 4191
3655 https://tools.ietf.org/html/rfc4191
3656
3657 15. RFC 8520
3658 https://tools.ietf.org/html/rfc8520
3659
3660 16. RFC 7844
3661 https://tools.ietf.org/html/rfc7844
3662
3663 17. C-style escapes
3664 https://en.wikipedia.org/wiki/Escape_sequences_in_C#Table_of_escape_sequences
3665
3666 18. RFC 5969
3667 https://tools.ietf.org/html/rfc5969
3668
3669 19. RFC 8415
3670 https://www.rfc-editor.org/rfc/rfc8415.html#section-6.3
3671
3672 20. RFC 4291
3673 https://tools.ietf.org/html/rfc4291#section-2.5.4
3674
3675 21. RFC 7217
3676 https://tools.ietf.org/html/rfc7217
3677
3678 22. RFC 2131
3679 https://www.rfc-editor.org/rfc/rfc2131.html
3680
3681 23. RFC 2132
3682 https://www.rfc-editor.org/rfc/rfc2132.html
3683
3684 24. RFC 1542
3685 https://tools.ietf.org/html/rfc1542
3686
3687 25. RFC 4861
3688 https://tools.ietf.org/html/rfc4861
3689
3690
3691
3692systemd 251 SYSTEMD.NETWORK(5)