1NM-SETTINGS-NMCLI(5)             Configuration            NM-SETTINGS-NMCLI(5)
2
3
4

NAME

6       nm-settings-nmcli - Description of settings and properties of
7       NetworkManager connection profiles for nmcli
8

DESCRIPTION

10       NetworkManager is based on a concept of connection profiles, sometimes
11       referred to as connections only. These connection profiles contain a
12       network configuration. When NetworkManager activates a connection
13       profile on a network device the configuration will be applied and an
14       active network connection will be established. Users are free to create
15       as many connection profiles as they see fit. Thus they are flexible in
16       having various network configurations for different networking needs.
17
18       NetworkManager provides an API for configuring connection profiles, for
19       activating them to configure the network, and inspecting the current
20       network configuration. The command line tool nmcli is a client
21       application to NetworkManager that uses this API. See nmcli(1) for
22       details.
23
24       With commands like nmcli connection add, nmcli connection modify and
25       nmcli connection show, connection profiles can be created, modified and
26       inspected. A profile consists of properties. On D-Bus this follows the
27       format as described by nm-settings-dbus(5), while this manual page
28       describes the settings format how they are expected by nmcli.
29
30       The settings and properties shown in tables below list all available
31       connection configuration options. However, note that not all settings
32       are applicable to all connection types.  nmcli connection editor has
33       also a built-in describe command that can display description of
34       particular settings and properties of this page.
35
36       The setting and property can be abbreviated provided they are unique.
37       The list below also shows aliases that can be used unqualified instead
38       of the full name. For example connection.interface-name and ifname
39       refer to the same property.
40
41   connection setting
42       General Connection Profile Settings.
43
44       Properties:
45
46       auth-retries
47           The number of retries for the authentication. Zero means to try
48           indefinitely; -1 means to use a global default. If the global
49           default is not set, the authentication retries for 3 times before
50           failing the connection.
51
52           Currently, this only applies to 802-1x authentication.
53
54           Format: int32
55
56       autoconnect
57           Alias: autoconnect
58
59           Whether or not the connection should be automatically connected by
60           NetworkManager when the resources for the connection are available.
61           TRUE to automatically activate the connection, FALSE to require
62           manual intervention to activate the connection.
63
64           Autoconnect happens when the circumstances are suitable. That means
65           for example that the device is currently managed and not active.
66           Autoconnect thus never replaces or competes with an already active
67           profile.
68
69           Note that autoconnect is not implemented for VPN profiles. See
70           "secondaries" as an alternative to automatically connect VPN
71           profiles.
72
73           If multiple profiles are ready to autoconnect on the same device,
74           the one with the better "connection.autoconnect-priority" is
75           chosen. If the priorities are equal, then the most recently
76           connected profile is activated. If the profiles were not connected
77           earlier or their "connection.timestamp" is identical, the choice is
78           undefined.
79
80           Depending on "connection.multi-connect", a profile can
81           (auto)connect only once at a time or multiple times.
82
83           Format: boolean
84
85       autoconnect-priority
86           The autoconnect priority in range -999 to 999. If the connection is
87           set to autoconnect, connections with higher priority will be
88           preferred. The higher number means higher priority. Defaults to 0.
89           Note that this property only matters if there are more than one
90           candidate profile to select for autoconnect. In case of equal
91           priority, the profile used most recently is chosen.
92
93           Format: int32
94
95       autoconnect-retries
96           The number of times a connection should be tried when
97           autoactivating before giving up. Zero means forever, -1 means the
98           global default (4 times if not overridden). Setting this to 1 means
99           to try activation only once before blocking autoconnect. Note that
100           after a timeout, NetworkManager will try to autoconnect again.
101
102           Format: int32
103
104       autoconnect-slaves
105           Whether or not slaves of this connection should be automatically
106           brought up when NetworkManager activates this connection. This only
107           has a real effect for master connections. The properties
108           "autoconnect", "autoconnect-priority" and "autoconnect-retries" are
109           unrelated to this setting. The permitted values are: 0: leave slave
110           connections untouched, 1: activate all the slave connections with
111           this connection, -1: default. If -1 (default) is set, global
112           connection.autoconnect-slaves is read to determine the real value.
113           If it is default as well, this fallbacks to 0.
114
115           Format: NMSettingConnectionAutoconnectSlaves (int32)
116
117       dns-over-tls
118           Whether DNSOverTls (dns-over-tls) is enabled for the connection.
119           DNSOverTls is a technology which uses TLS to encrypt dns traffic.
120
121           The permitted values are: "yes" (2) use DNSOverTls and disabled
122           fallback, "opportunistic" (1) use DNSOverTls but allow fallback to
123           unencrypted resolution, "no" (0) don't ever use DNSOverTls. If
124           unspecified "default" depends on the plugin used. Systemd-resolved
125           uses global setting.
126
127           This feature requires a plugin which supports DNSOverTls.
128           Otherwise, the setting has no effect. One such plugin is
129           dns-systemd-resolved.
130
131           Format: int32
132
133       gateway-ping-timeout
134           If greater than zero, delay success of IP addressing until either
135           the timeout is reached, or an IP gateway replies to a ping.
136
137           Format: uint32
138
139       id
140           Alias: con-name
141
142           A human readable unique identifier for the connection, like "Work
143           Wi-Fi" or "T-Mobile 3G".
144
145           Format: string
146
147       interface-name
148           Alias: ifname
149
150           The name of the network interface this connection is bound to. If
151           not set, then the connection can be attached to any interface of
152           the appropriate type (subject to restrictions imposed by other
153           settings).
154
155           For software devices this specifies the name of the created device.
156
157           For connection types where interface names cannot easily be made
158           persistent (e.g. mobile broadband or USB Ethernet), this property
159           should not be used. Setting this property restricts the interfaces
160           a connection can be used with, and if interface names change or are
161           reordered the connection may be applied to the wrong interface.
162
163           Format: string
164
165       lldp
166           Whether LLDP is enabled for the connection.
167
168           Format: int32
169
170       llmnr
171           Whether Link-Local Multicast Name Resolution (LLMNR) is enabled for
172           the connection. LLMNR is a protocol based on the Domain Name System
173           (DNS) packet format that allows both IPv4 and IPv6 hosts to perform
174           name resolution for hosts on the same local link.
175
176           The permitted values are: "yes" (2) register hostname and resolving
177           for the connection, "no" (0) disable LLMNR for the interface,
178           "resolve" (1) do not register hostname but allow resolving of LLMNR
179           host names If unspecified, "default" ultimately depends on the DNS
180           plugin (which for systemd-resolved currently means "yes").
181
182           This feature requires a plugin which supports LLMNR. Otherwise, the
183           setting has no effect. One such plugin is dns-systemd-resolved.
184
185           Format: int32
186
187       master
188           Alias: master
189
190           Interface name of the master device or UUID of the master
191           connection.
192
193           Format: string
194
195       mdns
196           Whether mDNS is enabled for the connection.
197
198           The permitted values are: "yes" (2) register hostname and resolving
199           for the connection, "no" (0) disable mDNS for the interface,
200           "resolve" (1) do not register hostname but allow resolving of mDNS
201           host names and "default" (-1) to allow lookup of a global default
202           in NetworkManager.conf. If unspecified, "default" ultimately
203           depends on the DNS plugin (which for systemd-resolved currently
204           means "no").
205
206           This feature requires a plugin which supports mDNS. Otherwise, the
207           setting has no effect. One such plugin is dns-systemd-resolved.
208
209           Format: int32
210
211       metered
212           Whether the connection is metered.
213
214           When updating this property on a currently activated connection,
215           the change takes effect immediately.
216
217           Format: NMMetered (int32)
218
219       mptcp-flags
220           Whether to configure MPTCP endpoints and the address flags. If
221           MPTCP is enabled in NetworkManager, it will configure the addresses
222           of the interface as MPTCP endpoints. Note that IPv4 loopback
223           addresses (127.0.0.0/8), IPv4 link local addresses
224           (169.254.0.0/16), the IPv6 loopback address (::1), IPv6 link local
225           addresses (fe80::/10), IPv6 unique local addresses (ULA, fc00::/7)
226           and IPv6 privacy extension addresses (rfc3041, ipv6.ip6-privacy)
227           will be excluded from being configured as endpoints.
228
229           If "disabled" (0x1), MPTCP handling for the interface is disabled
230           and no endpoints are registered.
231
232           The "enabled" (0x2) flag means that MPTCP handling is enabled. This
233           flag can also be implied from the presence of other flags.
234
235           Even when enabled, MPTCP handling will by default still be disabled
236           unless "/proc/sys/net/mptcp/enabled" sysctl is on. NetworkManager
237           does not change the sysctl and this is up to the administrator or
238           distribution. To configure endpoints even if the sysctl is
239           disabled, "also-without-sysctl" (0x4) flag can be used. In that
240           case, NetworkManager doesn't look at the sysctl and configures
241           endpoints regardless.
242
243           Even when enabled, NetworkManager will only configure MPTCP
244           endpoints for a certain address family, if there is a unicast
245           default route (0.0.0.0/0 or ::/0) in the main routing table. The
246           flag "also-without-default-route" (0x8) can override that.
247
248           When MPTCP handling is enabled then endpoints are configured with
249           the specified address flags "signal" (0x10), "subflow" (0x20),
250           "backup" (0x40), "fullmesh" (0x80). See ip-mptcp(8) manual for
251           additional information about the flags.
252
253           If the flags are zero (0x0), the global connection default from
254           NetworkManager.conf is honored. If still unspecified, the fallback
255           is "enabled,subflow". Note that this means that MPTCP is by default
256           done depending on the "/proc/sys/net/mptcp/enabled" sysctl.
257
258           NetworkManager does not change the MPTCP limits nor enable MPTCP
259           via "/proc/sys/net/mptcp/enabled". That is a host configuration
260           which the admin can change via sysctl and ip-mptcp.
261
262           Strict reverse path filtering (rp_filter) breaks many MPTCP use
263           cases, so when MPTCP handling for IPv4 addresses on the interface
264           is enabled, NetworkManager would loosen the strict reverse path
265           filtering (1) to the loose setting (2).
266
267           Format: uint32
268
269       mud-url
270           If configured, set to a Manufacturer Usage Description (MUD) URL
271           that points to manufacturer-recommended network policies for IoT
272           devices. It is transmitted as a DHCPv4 or DHCPv6 option. The value
273           must be a valid URL starting with "https://".
274
275           The special value "none" is allowed to indicate that no MUD URL is
276           used.
277
278           If the per-profile value is unspecified (the default), a global
279           connection default gets consulted. If still unspecified, the
280           ultimate default is "none".
281
282           Format: string
283
284       multi-connect
285           Specifies whether the profile can be active multiple times at a
286           particular moment. The value is of type NMConnectionMultiConnect.
287
288           Format: int32
289
290       permissions
291           An array of strings defining what access a given user has to this
292           connection. If this is NULL or empty, all users are allowed to
293           access this connection; otherwise users are allowed if and only if
294           they are in this list. When this is not empty, the connection can
295           be active only when one of the specified users is logged into an
296           active session. Each entry is of the form "[type]:[id]:[reserved]";
297           for example, "user:dcbw:blah".
298
299           At this time only the "user" [type] is allowed. Any other values
300           are ignored and reserved for future use. [id] is the username that
301           this permission refers to, which may not contain the ":" character.
302           Any [reserved] information present must be ignored and is reserved
303           for future use. All of [type], [id], and [reserved] must be valid
304           UTF-8.
305
306           Format: array of string
307
308       read-only
309           FALSE if the connection can be modified using the provided settings
310           service's D-Bus interface with the right privileges, or TRUE if the
311           connection is read-only and cannot be modified.
312
313           Format: boolean
314
315       secondaries
316           List of connection UUIDs that should be activated when the base
317           connection itself is activated. Currently, only VPN connections are
318           supported.
319
320           Format: array of string
321
322       slave-type
323           Alias: slave-type
324
325           Setting name of the device type of this slave's master connection
326           (eg, "bond"), or NULL if this connection is not a slave.
327
328           Format: string
329
330       stable-id
331           This represents the identity of the connection used for various
332           purposes. It allows to configure multiple profiles to share the
333           identity. Also, the stable-id can contain placeholders that are
334           substituted dynamically and deterministically depending on the
335           context.
336
337           The stable-id is used for generating IPv6 stable private addresses
338           with ipv6.addr-gen-mode=stable-privacy. It is also used to seed the
339           generated cloned MAC address for ethernet.cloned-mac-address=stable
340           and wifi.cloned-mac-address=stable. It is also used as DHCP client
341           identifier with ipv4.dhcp-client-id=stable and to derive the DHCP
342           DUID with ipv6.dhcp-duid=stable-[llt,ll,uuid].
343
344           Note that depending on the context where it is used, other
345           parameters are also seeded into the generation algorithm. For
346           example, a per-host key is commonly also included, so that
347           different systems end up generating different IDs. Or with
348           ipv6.addr-gen-mode=stable-privacy, also the device's name is
349           included, so that different interfaces yield different addresses.
350           The per-host key is the identity of your machine and stored in
351           /var/lib/NetworkManager/secret_key. See NetworkManager(8) manual
352           about the secret-key and the host identity.
353
354           The '$' character is treated special to perform dynamic
355           substitutions at runtime. Currently, supported are "${CONNECTION}",
356           "${DEVICE}", "${MAC}", "${BOOT}", "${RANDOM}". These effectively
357           create unique IDs per-connection, per-device, per-boot, or every
358           time. Note that "${DEVICE}" corresponds to the interface name of
359           the device and "${MAC}" is the permanent MAC address of the device.
360           Any unrecognized patterns following '$' are treated verbatim,
361           however are reserved for future use. You are thus advised to avoid
362           '$' or escape it as "$$". For example, set it to
363           "${CONNECTION}-${BOOT}-${DEVICE}" to create a unique id for this
364           connection that changes with every reboot and differs depending on
365           the interface where the profile activates.
366
367           If the value is unset, a global connection default is consulted. If
368           the value is still unset, the default is similar to "${CONNECTION}"
369           and uses a unique, fixed ID for the connection.
370
371           Format: string
372
373       timestamp
374           The time, in seconds since the Unix Epoch, that the connection was
375           last _successfully_ fully activated.
376
377           NetworkManager updates the connection timestamp periodically when
378           the connection is active to ensure that an active connection has
379           the latest timestamp. The property is only meant for reading
380           (changes to this property will not be preserved).
381
382           Format: uint64
383
384       type
385           Alias: type
386
387           Base type of the connection. For hardware-dependent connections,
388           should contain the setting name of the hardware-type specific
389           setting (ie, "802-3-ethernet" or "802-11-wireless" or "bluetooth",
390           etc), and for non-hardware dependent connections like VPN or
391           otherwise, should contain the setting name of that setting type
392           (ie, "vpn" or "bridge", etc).
393
394           Format: string
395
396       uuid
397           A universally unique identifier for the connection, for example
398           generated with libuuid. It should be assigned when the connection
399           is created, and never changed as long as the connection still
400           applies to the same network. For example, it should not be changed
401           when the "id" property or NMSettingIP4Config changes, but might
402           need to be re-created when the Wi-Fi SSID, mobile broadband network
403           provider, or "type" property changes.
404
405           The UUID must be in the format
406           "2815492f-7e56-435e-b2e9-246bd7cdc664" (ie, contains only
407           hexadecimal characters and "-").
408
409           Format: a valid RFC4122 universally unique identifier (UUID).
410
411       wait-activation-delay
412           Time in milliseconds to wait for connection to be considered
413           activated. The wait will start after the pre-up dispatcher event.
414
415           The value 0 means no wait time. The default value is -1, which
416           currently has the same meaning as no wait time.
417
418           Format: int32
419
420       wait-device-timeout
421           Timeout in milliseconds to wait for device at startup. During boot,
422           devices may take a while to be detected by the driver. This
423           property will cause to delay NetworkManager-wait-online.service and
424           nm-online to give the device a chance to appear. This works by
425           waiting for the given timeout until a compatible device for the
426           profile is available and managed.
427
428           The value 0 means no wait time. The default value is -1, which
429           currently has the same meaning as no wait time.
430
431           Format: int32
432
433       zone
434           The trust level of a the connection. Free form case-insensitive
435           string (for example "Home", "Work", "Public"). NULL or unspecified
436           zone means the connection will be placed in the default zone as
437           defined by the firewall.
438
439           When updating this property on a currently activated connection,
440           the change takes effect immediately.
441
442           Format: string
443
444   6lowpan setting
445       6LoWPAN Settings.
446
447       Properties:
448
449       parent
450           Alias: dev
451
452           If given, specifies the parent interface name or parent connection
453           UUID from which this 6LowPAN interface should be created.
454
455           Format: string
456
457   802-1x setting
458       IEEE 802.1x Authentication Settings.
459
460       Properties:
461
462       altsubject-matches
463           List of strings to be matched against the altSubjectName of the
464           certificate presented by the authentication server. If the list is
465           empty, no verification of the server certificate's altSubjectName
466           is performed.
467
468           Format: array of string
469
470       anonymous-identity
471           Anonymous identity string for EAP authentication methods. Used as
472           the unencrypted identity with EAP types that support different
473           tunneled identity like EAP-TTLS.
474
475           Format: string
476
477       auth-timeout
478           A timeout for the authentication. Zero means the global default; if
479           the global default is not set, the authentication timeout is 25
480           seconds.
481
482           Format: int32
483
484       ca-cert
485           Contains the CA certificate if used by the EAP method specified in
486           the "eap" property.
487
488           Certificate data is specified using a "scheme"; three are currently
489           supported: blob, path and pkcs#11 URL. When using the blob scheme
490           this property should be set to the certificate's DER encoded data.
491           When using the path scheme, this property should be set to the full
492           UTF-8 encoded path of the certificate, prefixed with the string
493           "file://" and ending with a terminating NUL byte. This property can
494           be unset even if the EAP method supports CA certificates, but this
495           allows man-in-the-middle attacks and is NOT recommended.
496
497           Note that enabling NMSetting8021x:system-ca-certs will override
498           this setting to use the built-in path, if the built-in path is not
499           a directory.
500
501           Format: byte array
502
503       ca-cert-password
504           The password used to access the CA certificate stored in "ca-cert"
505           property. Only makes sense if the certificate is stored on a
506           PKCS#11 token that requires a login.
507
508           Format: string
509
510       ca-cert-password-flags
511           Flags indicating how to handle the "ca-cert-password" property.
512
513           Format: NMSettingSecretFlags (uint32)
514
515       ca-path
516           UTF-8 encoded path to a directory containing PEM or DER formatted
517           certificates to be added to the verification chain in addition to
518           the certificate specified in the "ca-cert" property.
519
520           If NMSetting8021x:system-ca-certs is enabled and the built-in CA
521           path is an existing directory, then this setting is ignored.
522
523           Format: string
524
525       client-cert
526           Contains the client certificate if used by the EAP method specified
527           in the "eap" property.
528
529           Certificate data is specified using a "scheme"; two are currently
530           supported: blob and path. When using the blob scheme (which is
531           backwards compatible with NM 0.7.x) this property should be set to
532           the certificate's DER encoded data. When using the path scheme,
533           this property should be set to the full UTF-8 encoded path of the
534           certificate, prefixed with the string "file://" and ending with a
535           terminating NUL byte.
536
537           Format: byte array
538
539       client-cert-password
540           The password used to access the client certificate stored in
541           "client-cert" property. Only makes sense if the certificate is
542           stored on a PKCS#11 token that requires a login.
543
544           Format: string
545
546       client-cert-password-flags
547           Flags indicating how to handle the "client-cert-password" property.
548
549           Format: NMSettingSecretFlags (uint32)
550
551       domain-match
552           Constraint for server domain name. If set, this list of FQDNs is
553           used as a match requirement for dNSName element(s) of the
554           certificate presented by the authentication server. If a matching
555           dNSName is found, this constraint is met. If no dNSName values are
556           present, this constraint is matched against SubjectName CN using
557           the same comparison. Multiple valid FQDNs can be passed as a ";"
558           delimited list.
559
560           Format: string
561
562       domain-suffix-match
563           Constraint for server domain name. If set, this FQDN is used as a
564           suffix match requirement for dNSName element(s) of the certificate
565           presented by the authentication server. If a matching dNSName is
566           found, this constraint is met. If no dNSName values are present,
567           this constraint is matched against SubjectName CN using same suffix
568           match comparison. Since version 1.24, multiple valid FQDNs can be
569           passed as a ";" delimited list.
570
571           Format: string
572
573       eap
574           The allowed EAP method to be used when authenticating to the
575           network with 802.1x. Valid methods are: "leap", "md5", "tls",
576           "peap", "ttls", "pwd", and "fast". Each method requires different
577           configuration using the properties of this setting; refer to
578           wpa_supplicant documentation for the allowed combinations.
579
580           Format: array of string
581
582       identity
583           Identity string for EAP authentication methods. Often the user's
584           user or login name.
585
586           Format: string
587
588       optional
589           Whether the 802.1X authentication is optional. If TRUE, the
590           activation will continue even after a timeout or an authentication
591           failure. Setting the property to TRUE is currently allowed only for
592           Ethernet connections. If set to FALSE, the activation can continue
593           only after a successful authentication.
594
595           Format: boolean
596
597       pac-file
598           UTF-8 encoded file path containing PAC for EAP-FAST.
599
600           Format: string
601
602       password
603           UTF-8 encoded password used for EAP authentication methods. If both
604           the "password" property and the "password-raw" property are
605           specified, "password" is preferred.
606
607           Format: string
608
609       password-flags
610           Flags indicating how to handle the "password" property.
611
612           Format: NMSettingSecretFlags (uint32)
613
614       password-raw
615           Password used for EAP authentication methods, given as a byte array
616           to allow passwords in other encodings than UTF-8 to be used. If
617           both the "password" property and the "password-raw" property are
618           specified, "password" is preferred.
619
620           Format: byte array
621
622       password-raw-flags
623           Flags indicating how to handle the "password-raw" property.
624
625           Format: NMSettingSecretFlags (uint32)
626
627       phase1-auth-flags
628           Specifies authentication flags to use in "phase 1" outer
629           authentication using NMSetting8021xAuthFlags options. The
630           individual TLS versions can be explicitly disabled. TLS time checks
631           can be also disabled. If a certain TLS disable flag is not set, it
632           is up to the supplicant to allow or forbid it. The TLS options map
633           to tls_disable_tlsv1_x and tls_disable_time_checks settings. See
634           the wpa_supplicant documentation for more details.
635
636           Format: uint32
637
638       phase1-fast-provisioning
639           Enables or disables in-line provisioning of EAP-FAST credentials
640           when FAST is specified as the EAP method in the "eap" property.
641           Recognized values are "0" (disabled), "1" (allow unauthenticated
642           provisioning), "2" (allow authenticated provisioning), and "3"
643           (allow both authenticated and unauthenticated provisioning). See
644           the wpa_supplicant documentation for more details.
645
646           Format: string
647
648       phase1-peaplabel
649           Forces use of the new PEAP label during key derivation. Some RADIUS
650           servers may require forcing the new PEAP label to interoperate with
651           PEAPv1. Set to "1" to force use of the new PEAP label. See the
652           wpa_supplicant documentation for more details.
653
654           Format: string
655
656       phase1-peapver
657           Forces which PEAP version is used when PEAP is set as the EAP
658           method in the "eap" property. When unset, the version reported by
659           the server will be used. Sometimes when using older RADIUS servers,
660           it is necessary to force the client to use a particular PEAP
661           version. To do so, this property may be set to "0" or "1" to force
662           that specific PEAP version.
663
664           Format: string
665
666       phase2-altsubject-matches
667           List of strings to be matched against the altSubjectName of the
668           certificate presented by the authentication server during the inner
669           "phase 2" authentication. If the list is empty, no verification of
670           the server certificate's altSubjectName is performed.
671
672           Format: array of string
673
674       phase2-auth
675           Specifies the allowed "phase 2" inner authentication method when an
676           EAP method that uses an inner TLS tunnel is specified in the "eap"
677           property. For TTLS this property selects one of the supported
678           non-EAP inner methods: "pap", "chap", "mschap", "mschapv2" while
679           "phase2-autheap" selects an EAP inner method. For PEAP this selects
680           an inner EAP method, one of: "gtc", "otp", "md5" and "tls". Each
681           "phase 2" inner method requires specific parameters for successful
682           authentication; see the wpa_supplicant documentation for more
683           details. Both "phase2-auth" and "phase2-autheap" cannot be
684           specified.
685
686           Format: string
687
688       phase2-autheap
689           Specifies the allowed "phase 2" inner EAP-based authentication
690           method when TTLS is specified in the "eap" property. Recognized
691           EAP-based "phase 2" methods are "md5", "mschapv2", "otp", "gtc",
692           and "tls". Each "phase 2" inner method requires specific parameters
693           for successful authentication; see the wpa_supplicant documentation
694           for more details.
695
696           Format: string
697
698       phase2-ca-cert
699           Contains the "phase 2" CA certificate if used by the EAP method
700           specified in the "phase2-auth" or "phase2-autheap" properties.
701
702           Certificate data is specified using a "scheme"; three are currently
703           supported: blob, path and pkcs#11 URL. When using the blob scheme
704           this property should be set to the certificate's DER encoded data.
705           When using the path scheme, this property should be set to the full
706           UTF-8 encoded path of the certificate, prefixed with the string
707           "file://" and ending with a terminating NUL byte. This property can
708           be unset even if the EAP method supports CA certificates, but this
709           allows man-in-the-middle attacks and is NOT recommended.
710
711           Note that enabling NMSetting8021x:system-ca-certs will override
712           this setting to use the built-in path, if the built-in path is not
713           a directory.
714
715           Format: byte array
716
717       phase2-ca-cert-password
718           The password used to access the "phase2" CA certificate stored in
719           "phase2-ca-cert" property. Only makes sense if the certificate is
720           stored on a PKCS#11 token that requires a login.
721
722           Format: string
723
724       phase2-ca-cert-password-flags
725           Flags indicating how to handle the "phase2-ca-cert-password"
726           property.
727
728           Format: NMSettingSecretFlags (uint32)
729
730       phase2-ca-path
731           UTF-8 encoded path to a directory containing PEM or DER formatted
732           certificates to be added to the verification chain in addition to
733           the certificate specified in the "phase2-ca-cert" property.
734
735           If NMSetting8021x:system-ca-certs is enabled and the built-in CA
736           path is an existing directory, then this setting is ignored.
737
738           Format: string
739
740       phase2-client-cert
741           Contains the "phase 2" client certificate if used by the EAP method
742           specified in the "phase2-auth" or "phase2-autheap" properties.
743
744           Certificate data is specified using a "scheme"; two are currently
745           supported: blob and path. When using the blob scheme (which is
746           backwards compatible with NM 0.7.x) this property should be set to
747           the certificate's DER encoded data. When using the path scheme,
748           this property should be set to the full UTF-8 encoded path of the
749           certificate, prefixed with the string "file://" and ending with a
750           terminating NUL byte. This property can be unset even if the EAP
751           method supports CA certificates, but this allows man-in-the-middle
752           attacks and is NOT recommended.
753
754           Format: byte array
755
756       phase2-client-cert-password
757           The password used to access the "phase2" client certificate stored
758           in "phase2-client-cert" property. Only makes sense if the
759           certificate is stored on a PKCS#11 token that requires a login.
760
761           Format: string
762
763       phase2-client-cert-password-flags
764           Flags indicating how to handle the "phase2-client-cert-password"
765           property.
766
767           Format: NMSettingSecretFlags (uint32)
768
769       phase2-domain-match
770           Constraint for server domain name. If set, this list of FQDNs is
771           used as a match requirement for dNSName element(s) of the
772           certificate presented by the authentication server during the inner
773           "phase 2" authentication. If a matching dNSName is found, this
774           constraint is met. If no dNSName values are present, this
775           constraint is matched against SubjectName CN using the same
776           comparison. Multiple valid FQDNs can be passed as a ";" delimited
777           list.
778
779           Format: string
780
781       phase2-domain-suffix-match
782           Constraint for server domain name. If set, this FQDN is used as a
783           suffix match requirement for dNSName element(s) of the certificate
784           presented by the authentication server during the inner "phase 2"
785           authentication. If a matching dNSName is found, this constraint is
786           met. If no dNSName values are present, this constraint is matched
787           against SubjectName CN using same suffix match comparison. Since
788           version 1.24, multiple valid FQDNs can be passed as a ";" delimited
789           list.
790
791           Format: string
792
793       phase2-private-key
794           Contains the "phase 2" inner private key when the "phase2-auth" or
795           "phase2-autheap" property is set to "tls".
796
797           Key data is specified using a "scheme"; two are currently
798           supported: blob and path. When using the blob scheme and private
799           keys, this property should be set to the key's encrypted PEM
800           encoded data. When using private keys with the path scheme, this
801           property should be set to the full UTF-8 encoded path of the key,
802           prefixed with the string "file://" and ending with a terminating
803           NUL byte. When using PKCS#12 format private keys and the blob
804           scheme, this property should be set to the PKCS#12 data and the
805           "phase2-private-key-password" property must be set to password used
806           to decrypt the PKCS#12 certificate and key. When using PKCS#12
807           files and the path scheme, this property should be set to the full
808           UTF-8 encoded path of the key, prefixed with the string "file://"
809           and ending with a terminating NUL byte, and as with the blob scheme
810           the "phase2-private-key-password" property must be set to the
811           password used to decode the PKCS#12 private key and certificate.
812
813           Format: byte array
814
815       phase2-private-key-password
816           The password used to decrypt the "phase 2" private key specified in
817           the "phase2-private-key" property when the private key either uses
818           the path scheme, or is a PKCS#12 format key.
819
820           Format: string
821
822       phase2-private-key-password-flags
823           Flags indicating how to handle the "phase2-private-key-password"
824           property.
825
826           Format: NMSettingSecretFlags (uint32)
827
828       phase2-subject-match
829           Substring to be matched against the subject of the certificate
830           presented by the authentication server during the inner "phase 2"
831           authentication. When unset, no verification of the authentication
832           server certificate's subject is performed. This property provides
833           little security, if any, and should not be used.
834
835           This property is deprecated since version 1.2. Use
836           "phase2-domain-suffix-match" instead.
837
838           Format: string
839
840       pin
841           PIN used for EAP authentication methods.
842
843           Format: string
844
845       pin-flags
846           Flags indicating how to handle the "pin" property.
847
848           Format: NMSettingSecretFlags (uint32)
849
850       private-key
851           Contains the private key when the "eap" property is set to "tls".
852
853           Key data is specified using a "scheme"; two are currently
854           supported: blob and path. When using the blob scheme and private
855           keys, this property should be set to the key's encrypted PEM
856           encoded data. When using private keys with the path scheme, this
857           property should be set to the full UTF-8 encoded path of the key,
858           prefixed with the string "file://" and ending with a terminating
859           NUL byte. When using PKCS#12 format private keys and the blob
860           scheme, this property should be set to the PKCS#12 data and the
861           "private-key-password" property must be set to password used to
862           decrypt the PKCS#12 certificate and key. When using PKCS#12 files
863           and the path scheme, this property should be set to the full UTF-8
864           encoded path of the key, prefixed with the string "file://" and
865           ending with a terminating NUL byte, and as with the blob scheme the
866           "private-key-password" property must be set to the password used to
867           decode the PKCS#12 private key and certificate.
868
869           WARNING: "private-key" is not a "secret" property, and thus
870           unencrypted private key data using the BLOB scheme may be readable
871           by unprivileged users. Private keys should always be encrypted with
872           a private key password to prevent unauthorized access to
873           unencrypted private key data.
874
875           Format: byte array
876
877       private-key-password
878           The password used to decrypt the private key specified in the
879           "private-key" property when the private key either uses the path
880           scheme, or if the private key is a PKCS#12 format key.
881
882           Format: string
883
884       private-key-password-flags
885           Flags indicating how to handle the "private-key-password" property.
886
887           Format: NMSettingSecretFlags (uint32)
888
889       subject-match
890           Substring to be matched against the subject of the certificate
891           presented by the authentication server. When unset, no verification
892           of the authentication server certificate's subject is performed.
893           This property provides little security, if any, and should not be
894           used.
895
896           This property is deprecated since version 1.2. Use
897           "phase2-domain-suffix-match" instead.
898
899           Format: string
900
901       system-ca-certs
902           When TRUE, overrides the "ca-path" and "phase2-ca-path" properties
903           using the system CA directory specified at configure time with the
904           --system-ca-path switch. The certificates in this directory are
905           added to the verification chain in addition to any certificates
906           specified by the "ca-cert" and "phase2-ca-cert" properties. If the
907           path provided with --system-ca-path is rather a file name (bundle
908           of trusted CA certificates), it overrides "ca-cert" and
909           "phase2-ca-cert" properties instead (sets ca_cert/ca_cert2 options
910           for wpa_supplicant).
911
912           Format: boolean
913
914   adsl setting
915       ADSL Settings.
916
917       Properties:
918
919       encapsulation
920           Alias: encapsulation
921
922           Encapsulation of ADSL connection. Can be "vcmux" or "llc".
923
924           Format: string
925
926       password
927           Alias: password
928
929           Password used to authenticate with the ADSL service.
930
931           Format: string
932
933       password-flags
934           Flags indicating how to handle the "password" property.
935
936           Format: NMSettingSecretFlags (uint32)
937
938       protocol
939           Alias: protocol
940
941           ADSL connection protocol. Can be "pppoa", "pppoe" or "ipoatm".
942
943           Format: string
944
945       username
946           Alias: username
947
948           Username used to authenticate with the ADSL service.
949
950           Format: string
951
952       vci
953           VCI of ADSL connection
954
955           Format: uint32
956
957       vpi
958           VPI of ADSL connection
959
960           Format: uint32
961
962   bluetooth setting
963       Bluetooth Settings.
964
965       Properties:
966
967       bdaddr
968           Alias: addr
969
970           The Bluetooth address of the device.
971
972           Format: byte array
973
974       type
975           Alias: bt-type
976
977           Either "dun" for Dial-Up Networking connections or "panu" for
978           Personal Area Networking connections to devices supporting the NAP
979           profile.
980
981           Format: string
982
983   bond setting
984       Bonding Settings.
985
986       Properties:
987
988       options
989           Dictionary of key/value pairs of bonding options. Both keys and
990           values must be strings. Option names must contain only alphanumeric
991           characters (ie, [a-zA-Z0-9]).
992
993           Format: dict of string to string
994
995   bridge setting
996       Bridging Settings.
997
998       Properties:
999
1000       ageing-time
1001           Alias: ageing-time
1002
1003           The Ethernet MAC address aging time, in seconds.
1004
1005           Format: uint32
1006
1007       forward-delay
1008           Alias: forward-delay
1009
1010           The Spanning Tree Protocol (STP) forwarding delay, in seconds.
1011
1012           Format: uint32
1013
1014       group-address
1015           If specified, The MAC address of the multicast group this bridge
1016           uses for STP.
1017
1018           The address must be a link-local address in standard Ethernet MAC
1019           address format, ie an address of the form 01:80:C2:00:00:0X, with X
1020           in [0, 4..F]. If not specified the default value is
1021           01:80:C2:00:00:00.
1022
1023           Format: byte array
1024
1025       group-forward-mask
1026           Alias: group-forward-mask
1027
1028           A mask of group addresses to forward. Usually, group addresses in
1029           the range from 01:80:C2:00:00:00 to 01:80:C2:00:00:0F are not
1030           forwarded according to standards. This property is a mask of 16
1031           bits, each corresponding to a group address in that range that must
1032           be forwarded. The mask can't have bits 0, 1 or 2 set because they
1033           are used for STP, MAC pause frames and LACP.
1034
1035           Format: uint32
1036
1037       hello-time
1038           Alias: hello-time
1039
1040           The Spanning Tree Protocol (STP) hello time, in seconds.
1041
1042           Format: uint32
1043
1044       mac-address
1045           Alias: mac
1046
1047           If specified, the MAC address of bridge. When creating a new
1048           bridge, this MAC address will be set.
1049
1050           If this field is left unspecified, the
1051           "ethernet.cloned-mac-address" is referred instead to generate the
1052           initial MAC address. Note that setting
1053           "ethernet.cloned-mac-address" anyway overwrites the MAC address of
1054           the bridge later while activating the bridge.
1055
1056           This property is deprecated since version 1.12. Use the
1057           "cloned-mac-address" property instead.
1058
1059           Format: byte array
1060
1061       max-age
1062           Alias: max-age
1063
1064           The Spanning Tree Protocol (STP) maximum message age, in seconds.
1065
1066           Format: uint32
1067
1068       multicast-hash-max
1069           Set maximum size of multicast hash table (value must be a power of
1070           2).
1071
1072           Format: uint32
1073
1074       multicast-last-member-count
1075           Set the number of queries the bridge will send before stopping
1076           forwarding a multicast group after a "leave" message has been
1077           received.
1078
1079           Format: uint32
1080
1081       multicast-last-member-interval
1082           Set interval (in deciseconds) between queries to find remaining
1083           members of a group, after a "leave" message is received.
1084
1085           Format: uint64
1086
1087       multicast-membership-interval
1088           Set delay (in deciseconds) after which the bridge will leave a
1089           group, if no membership reports for this group are received.
1090
1091           Format: uint64
1092
1093       multicast-querier
1094           Enable or disable sending of multicast queries by the bridge. If
1095           not specified the option is disabled.
1096
1097           Format: boolean
1098
1099       multicast-querier-interval
1100           If no queries are seen after this delay (in deciseconds) has
1101           passed, the bridge will start to send its own queries.
1102
1103           Format: uint64
1104
1105       multicast-query-interval
1106           Interval (in deciseconds) between queries sent by the bridge after
1107           the end of the startup phase.
1108
1109           Format: uint64
1110
1111       multicast-query-response-interval
1112           Set the Max Response Time/Max Response Delay (in deciseconds) for
1113           IGMP/MLD queries sent by the bridge.
1114
1115           Format: uint64
1116
1117       multicast-query-use-ifaddr
1118           If enabled the bridge's own IP address is used as the source
1119           address for IGMP queries otherwise the default of 0.0.0.0 is used.
1120
1121           Format: boolean
1122
1123       multicast-router
1124           Sets bridge's multicast router. Multicast-snooping must be enabled
1125           for this option to work.
1126
1127           Supported values are: 'auto', 'disabled', 'enabled' to which kernel
1128           assigns the numbers 1, 0, and 2, respectively. If not specified the
1129           default value is 'auto' (1).
1130
1131           Format: string
1132
1133       multicast-snooping
1134           Alias: multicast-snooping
1135
1136           Controls whether IGMP snooping is enabled for this bridge. Note
1137           that if snooping was automatically disabled due to hash collisions,
1138           the system may refuse to enable the feature until the collisions
1139           are resolved.
1140
1141           Format: boolean
1142
1143       multicast-startup-query-count
1144           Set the number of IGMP queries to send during startup phase.
1145
1146           Format: uint32
1147
1148       multicast-startup-query-interval
1149           Sets the time (in deciseconds) between queries sent out at startup
1150           to determine membership information.
1151
1152           Format: uint64
1153
1154       priority
1155           Alias: priority
1156
1157           Sets the Spanning Tree Protocol (STP) priority for this bridge.
1158           Lower values are "better"; the lowest priority bridge will be
1159           elected the root bridge.
1160
1161           Format: uint32
1162
1163       stp
1164           Alias: stp
1165
1166           Controls whether Spanning Tree Protocol (STP) is enabled for this
1167           bridge.
1168
1169           Format: boolean
1170
1171       vlan-default-pvid
1172           The default PVID for the ports of the bridge, that is the VLAN id
1173           assigned to incoming untagged frames.
1174
1175           Format: uint32
1176
1177       vlan-filtering
1178           Control whether VLAN filtering is enabled on the bridge.
1179
1180           Format: boolean
1181
1182       vlan-protocol
1183           If specified, the protocol used for VLAN filtering.
1184
1185           Supported values are: '802.1Q', '802.1ad'. If not specified the
1186           default value is '802.1Q'.
1187
1188           Format: string
1189
1190       vlan-stats-enabled
1191           Controls whether per-VLAN stats accounting is enabled.
1192
1193           Format: boolean
1194
1195       vlans
1196           Array of bridge VLAN objects. In addition to the VLANs specified
1197           here, the bridge will also have the default-pvid VLAN configured by
1198           the bridge.vlan-default-pvid property.
1199
1200           In nmcli the VLAN list can be specified with the following syntax:
1201
1202           $vid [pvid] [untagged] [, $vid [pvid] [untagged]]...
1203
1204           where $vid is either a single id between 1 and 4094 or a range,
1205           represented as a couple of ids separated by a dash.
1206
1207           Format: array of vardict
1208
1209   bridge-port setting
1210       Bridge Port Settings.
1211
1212       Properties:
1213
1214       hairpin-mode
1215           Alias: hairpin
1216
1217           Enables or disables "hairpin mode" for the port, which allows
1218           frames to be sent back out through the port the frame was received
1219           on.
1220
1221           Format: boolean
1222
1223       path-cost
1224           Alias: path-cost
1225
1226           The Spanning Tree Protocol (STP) port cost for destinations via
1227           this port.
1228
1229           Format: uint32
1230
1231       priority
1232           Alias: priority
1233
1234           The Spanning Tree Protocol (STP) priority of this bridge port.
1235
1236           Format: uint32
1237
1238       vlans
1239           Array of bridge VLAN objects. In addition to the VLANs specified
1240           here, the port will also have the default-pvid VLAN configured on
1241           the bridge by the bridge.vlan-default-pvid property.
1242
1243           In nmcli the VLAN list can be specified with the following syntax:
1244
1245           $vid [pvid] [untagged] [, $vid [pvid] [untagged]]...
1246
1247           where $vid is either a single id between 1 and 4094 or a range,
1248           represented as a couple of ids separated by a dash.
1249
1250           Format: array of vardict
1251
1252   cdma setting
1253       CDMA-based Mobile Broadband Settings.
1254
1255       Properties:
1256
1257       mtu
1258           If non-zero, only transmit packets of the specified size or
1259           smaller, breaking larger packets up into multiple frames.
1260
1261           Format: uint32
1262
1263       number
1264           The number to dial to establish the connection to the CDMA-based
1265           mobile broadband network, if any. If not specified, the default
1266           number (#777) is used when required.
1267
1268           Format: string
1269
1270       password
1271           Alias: password
1272
1273           The password used to authenticate with the network, if required.
1274           Many providers do not require a password, or accept any password.
1275           But if a password is required, it is specified here.
1276
1277           Format: string
1278
1279       password-flags
1280           Flags indicating how to handle the "password" property.
1281
1282           Format: NMSettingSecretFlags (uint32)
1283
1284       username
1285           Alias: user
1286
1287           The username used to authenticate with the network, if required.
1288           Many providers do not require a username, or accept any username.
1289           But if a username is required, it is specified here.
1290
1291           Format: string
1292
1293   dcb setting
1294       Data Center Bridging Settings.
1295
1296       Properties:
1297
1298       app-fcoe-flags
1299           Specifies the NMSettingDcbFlags for the DCB FCoE application. Flags
1300           may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1301           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1302           NM_SETTING_DCB_FLAG_WILLING (0x4).
1303
1304           Format: NMSettingDcbFlags (uint32)
1305
1306       app-fcoe-mode
1307           The FCoE controller mode; either "fabric" or "vn2vn".
1308
1309           Since 1.34, NULL is the default and means "fabric". Before 1.34,
1310           NULL was rejected as invalid and the default was "fabric".
1311
1312           Format: string
1313
1314       app-fcoe-priority
1315           The highest User Priority (0 - 7) which FCoE frames should use, or
1316           -1 for default priority. Only used when the "app-fcoe-flags"
1317           property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1318
1319           Format: int32
1320
1321       app-fip-flags
1322           Specifies the NMSettingDcbFlags for the DCB FIP application. Flags
1323           may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1324           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1325           NM_SETTING_DCB_FLAG_WILLING (0x4).
1326
1327           Format: NMSettingDcbFlags (uint32)
1328
1329       app-fip-priority
1330           The highest User Priority (0 - 7) which FIP frames should use, or
1331           -1 for default priority. Only used when the "app-fip-flags"
1332           property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1333
1334           Format: int32
1335
1336       app-iscsi-flags
1337           Specifies the NMSettingDcbFlags for the DCB iSCSI application.
1338           Flags may be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1339           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1340           NM_SETTING_DCB_FLAG_WILLING (0x4).
1341
1342           Format: NMSettingDcbFlags (uint32)
1343
1344       app-iscsi-priority
1345           The highest User Priority (0 - 7) which iSCSI frames should use, or
1346           -1 for default priority. Only used when the "app-iscsi-flags"
1347           property includes the NM_SETTING_DCB_FLAG_ENABLE (0x1) flag.
1348
1349           Format: int32
1350
1351       priority-bandwidth
1352           An array of 8 uint values, where the array index corresponds to the
1353           User Priority (0 - 7) and the value indicates the percentage of
1354           bandwidth of the priority's assigned group that the priority may
1355           use. The sum of all percentages for priorities which belong to the
1356           same group must total 100 percents.
1357
1358           Format: array of uint32
1359
1360       priority-flow-control
1361           An array of 8 boolean values, where the array index corresponds to
1362           the User Priority (0 - 7) and the value indicates whether or not
1363           the corresponding priority should transmit priority pause.
1364
1365           Format: array of uint32
1366
1367       priority-flow-control-flags
1368           Specifies the NMSettingDcbFlags for DCB Priority Flow Control
1369           (PFC). Flags may be any combination of NM_SETTING_DCB_FLAG_ENABLE
1370           (0x1), NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1371           NM_SETTING_DCB_FLAG_WILLING (0x4).
1372
1373           Format: NMSettingDcbFlags (uint32)
1374
1375       priority-group-bandwidth
1376           An array of 8 uint values, where the array index corresponds to the
1377           Priority Group ID (0 - 7) and the value indicates the percentage of
1378           link bandwidth allocated to that group. Allowed values are 0 - 100,
1379           and the sum of all values must total 100 percents.
1380
1381           Format: array of uint32
1382
1383       priority-group-flags
1384           Specifies the NMSettingDcbFlags for DCB Priority Groups. Flags may
1385           be any combination of NM_SETTING_DCB_FLAG_ENABLE (0x1),
1386           NM_SETTING_DCB_FLAG_ADVERTISE (0x2), and
1387           NM_SETTING_DCB_FLAG_WILLING (0x4).
1388
1389           Format: NMSettingDcbFlags (uint32)
1390
1391       priority-group-id
1392           An array of 8 uint values, where the array index corresponds to the
1393           User Priority (0 - 7) and the value indicates the Priority Group
1394           ID. Allowed Priority Group ID values are 0 - 7 or 15 for the
1395           unrestricted group.
1396
1397           Format: array of uint32
1398
1399       priority-strict-bandwidth
1400           An array of 8 boolean values, where the array index corresponds to
1401           the User Priority (0 - 7) and the value indicates whether or not
1402           the priority may use all of the bandwidth allocated to its assigned
1403           group.
1404
1405           Format: array of uint32
1406
1407       priority-traffic-class
1408           An array of 8 uint values, where the array index corresponds to the
1409           User Priority (0 - 7) and the value indicates the traffic class (0
1410           - 7) to which the priority is mapped.
1411
1412           Format: array of uint32
1413
1414   ethtool setting
1415       Ethtool Ethernet Settings.
1416
1417       Properties:
1418
1419       coalesce-adaptive-rx
1420
1421       coalesce-adaptive-tx
1422
1423       coalesce-pkt-rate-high
1424
1425       coalesce-pkt-rate-low
1426
1427       coalesce-rx-frames
1428
1429       coalesce-rx-frames-high
1430
1431       coalesce-rx-frames-irq
1432
1433       coalesce-rx-frames-low
1434
1435       coalesce-rx-usecs
1436
1437       coalesce-rx-usecs-high
1438
1439       coalesce-rx-usecs-irq
1440
1441       coalesce-rx-usecs-low
1442
1443       coalesce-sample-interval
1444
1445       coalesce-stats-block-usecs
1446
1447       coalesce-tx-frames
1448
1449       coalesce-tx-frames-high
1450
1451       coalesce-tx-frames-irq
1452
1453       coalesce-tx-frames-low
1454
1455       coalesce-tx-usecs
1456
1457       coalesce-tx-usecs-high
1458
1459       coalesce-tx-usecs-irq
1460
1461       coalesce-tx-usecs-low
1462
1463       feature-esp-hw-offload
1464
1465       feature-esp-tx-csum-hw-offload
1466
1467       feature-fcoe-mtu
1468
1469       feature-gro
1470
1471       feature-gso
1472
1473       feature-highdma
1474
1475       feature-hw-tc-offload
1476
1477       feature-l2-fwd-offload
1478
1479       feature-loopback
1480
1481       feature-lro
1482
1483       feature-macsec-hw-offload
1484
1485       feature-ntuple
1486
1487       feature-rx
1488
1489       feature-rx-all
1490
1491       feature-rx-fcs
1492
1493       feature-rx-gro-hw
1494
1495       feature-rx-gro-list
1496
1497       feature-rx-udp-gro-forwarding
1498
1499       feature-rx-udp_tunnel-port-offload
1500
1501       feature-rx-vlan-filter
1502
1503       feature-rx-vlan-stag-filter
1504
1505       feature-rx-vlan-stag-hw-parse
1506
1507       feature-rxhash
1508
1509       feature-rxvlan
1510
1511       feature-sg
1512
1513       feature-tls-hw-record
1514
1515       feature-tls-hw-rx-offload
1516
1517       feature-tls-hw-tx-offload
1518
1519       feature-tso
1520
1521       feature-tx
1522
1523       feature-tx-checksum-fcoe-crc
1524
1525       feature-tx-checksum-ip-generic
1526
1527       feature-tx-checksum-ipv4
1528
1529       feature-tx-checksum-ipv6
1530
1531       feature-tx-checksum-sctp
1532
1533       feature-tx-esp-segmentation
1534
1535       feature-tx-fcoe-segmentation
1536
1537       feature-tx-gre-csum-segmentation
1538
1539       feature-tx-gre-segmentation
1540
1541       feature-tx-gso-list
1542
1543       feature-tx-gso-partial
1544
1545       feature-tx-gso-robust
1546
1547       feature-tx-ipxip4-segmentation
1548
1549       feature-tx-ipxip6-segmentation
1550
1551       feature-tx-nocache-copy
1552
1553       feature-tx-scatter-gather
1554
1555       feature-tx-scatter-gather-fraglist
1556
1557       feature-tx-sctp-segmentation
1558
1559       feature-tx-tcp-ecn-segmentation
1560
1561       feature-tx-tcp-mangleid-segmentation
1562
1563       feature-tx-tcp-segmentation
1564
1565       feature-tx-tcp6-segmentation
1566
1567       feature-tx-tunnel-remcsum-segmentation
1568
1569       feature-tx-udp-segmentation
1570
1571       feature-tx-udp_tnl-csum-segmentation
1572
1573       feature-tx-udp_tnl-segmentation
1574
1575       feature-tx-vlan-stag-hw-insert
1576
1577       feature-txvlan
1578
1579       pause-autoneg
1580
1581       pause-rx
1582
1583       pause-tx
1584
1585       ring-rx
1586
1587       ring-rx-jumbo
1588
1589       ring-rx-mini
1590
1591       ring-tx
1592
1593   gsm setting
1594       GSM-based Mobile Broadband Settings.
1595
1596       Properties:
1597
1598       apn
1599           Alias: apn
1600
1601           The GPRS Access Point Name specifying the APN used when
1602           establishing a data session with the GSM-based network. The APN
1603           often determines how the user will be billed for their network
1604           usage and whether the user has access to the Internet or just a
1605           provider-specific walled-garden, so it is important to use the
1606           correct APN for the user's mobile broadband plan. The APN may only
1607           be composed of the characters a-z, 0-9, ., and - per GSM 03.60
1608           Section 14.9.
1609
1610           Format: string
1611
1612       auto-config
1613           When TRUE, the settings such as APN, username, or password will
1614           default to values that match the network the modem will register to
1615           in the Mobile Broadband Provider database.
1616
1617           Format: boolean
1618
1619       device-id
1620           The device unique identifier (as given by the WWAN management
1621           service) which this connection applies to. If given, the connection
1622           will only apply to the specified device.
1623
1624           Format: string
1625
1626       home-only
1627           When TRUE, only connections to the home network will be allowed.
1628           Connections to roaming networks will not be made.
1629
1630           Format: boolean
1631
1632       mtu
1633           If non-zero, only transmit packets of the specified size or
1634           smaller, breaking larger packets up into multiple frames.
1635
1636           Format: uint32
1637
1638       network-id
1639           The Network ID (GSM LAI format, ie MCC-MNC) to force specific
1640           network registration. If the Network ID is specified,
1641           NetworkManager will attempt to force the device to register only on
1642           the specified network. This can be used to ensure that the device
1643           does not roam when direct roaming control of the device is not
1644           otherwise possible.
1645
1646           Format: string
1647
1648       number
1649           Legacy setting that used to help establishing PPP data sessions for
1650           GSM-based modems.
1651
1652           This property is deprecated since version 1.16. User-provided
1653           values for this setting are no longer used.
1654
1655           Format: string
1656
1657       password
1658           Alias: password
1659
1660           The password used to authenticate with the network, if required.
1661           Many providers do not require a password, or accept any password.
1662           But if a password is required, it is specified here.
1663
1664           Format: string
1665
1666       password-flags
1667           Flags indicating how to handle the "password" property.
1668
1669           Format: NMSettingSecretFlags (uint32)
1670
1671       pin
1672           If the SIM is locked with a PIN it must be unlocked before any
1673           other operations are requested. Specify the PIN here to allow
1674           operation of the device.
1675
1676           Format: string
1677
1678       pin-flags
1679           Flags indicating how to handle the "pin" property.
1680
1681           Format: NMSettingSecretFlags (uint32)
1682
1683       sim-id
1684           The SIM card unique identifier (as given by the WWAN management
1685           service) which this connection applies to. If given, the connection
1686           will apply to any device also allowed by "device-id" which contains
1687           a SIM card matching the given identifier.
1688
1689           Format: string
1690
1691       sim-operator-id
1692           A MCC/MNC string like "310260" or "21601" identifying the specific
1693           mobile network operator which this connection applies to. If given,
1694           the connection will apply to any device also allowed by "device-id"
1695           and "sim-id" which contains a SIM card provisioned by the given
1696           operator.
1697
1698           Format: string
1699
1700       username
1701           Alias: user
1702
1703           The username used to authenticate with the network, if required.
1704           Many providers do not require a username, or accept any username.
1705           But if a username is required, it is specified here.
1706
1707           Format: string
1708
1709   infiniband setting
1710       Infiniband Settings.
1711
1712       Properties:
1713
1714       mac-address
1715           Alias: mac
1716
1717           If specified, this connection will only apply to the IPoIB device
1718           whose permanent MAC address matches. This property does not change
1719           the MAC address of the device (i.e. MAC spoofing).
1720
1721           Format: byte array
1722
1723       mtu
1724           Alias: mtu
1725
1726           If non-zero, only transmit packets of the specified size or
1727           smaller, breaking larger packets up into multiple frames.
1728
1729           Format: uint32
1730
1731       p-key
1732           Alias: p-key
1733
1734           The InfiniBand p-key to use for this device. A value of -1 means to
1735           use the default p-key (aka "the p-key at index 0"). Otherwise, it
1736           is a 16-bit unsigned integer, whose high bit 0x8000 is set if it is
1737           a "full membership" p-key. The values 0 and 0x8000 are not allowed.
1738
1739           With the p-key set, the interface name is always "$parent.$p_key".
1740           Setting "connection.interface-name" to another name is not
1741           supported.
1742
1743           Note that kernel will internally always set the full membership
1744           bit, although the interface name does not reflect that. Usually the
1745           user would want to configure a full membership p-key with 0x8000
1746           flag set.
1747
1748           Format: int32
1749
1750       parent
1751           Alias: parent
1752
1753           The interface name of the parent device of this device. Normally
1754           NULL, but if the "p_key" property is set, then you must specify the
1755           base device by setting either this property or "mac-address".
1756
1757           Format: string
1758
1759       transport-mode
1760           Alias: transport-mode
1761
1762           The IP-over-InfiniBand transport mode. Either "datagram" or
1763           "connected".
1764
1765           Format: string
1766
1767   ipv4 setting
1768       IPv4 Settings.
1769
1770       Properties:
1771
1772       addresses
1773           Alias: ip4
1774
1775           Array of IP addresses.
1776
1777           Format: a comma separated list of addresses
1778
1779       auto-route-ext-gw
1780           VPN connections will default to add the route automatically unless
1781           this setting is set to FALSE.
1782
1783           For other connection types, adding such an automatic route is
1784           currently not supported and setting this to TRUE has no effect.
1785
1786           Format: NMTernary (int32)
1787
1788       dad-timeout
1789           Timeout in milliseconds used to check for the presence of duplicate
1790           IP addresses on the network. If an address conflict is detected,
1791           the activation will fail. A zero value means that no duplicate
1792           address detection is performed, -1 means the default value (either
1793           configuration ipvx.dad-timeout override or zero). A value greater
1794           than zero is a timeout in milliseconds.
1795
1796           The property is currently implemented only for IPv4.
1797
1798           Format: int32
1799
1800       dhcp-client-id
1801           A string sent to the DHCP server to identify the local machine
1802           which the DHCP server may use to customize the DHCP lease and
1803           options. When the property is a hex string ('aa:bb:cc') it is
1804           interpreted as a binary client ID, in which case the first byte is
1805           assumed to be the 'type' field as per RFC 2132 section 9.14 and the
1806           remaining bytes may be an hardware address (e.g.
1807           '01:xx:xx:xx:xx:xx:xx' where 1 is the Ethernet ARP type and the
1808           rest is a MAC address). If the property is not a hex string it is
1809           considered as a non-hardware-address client ID and the 'type' field
1810           is set to 0.
1811
1812           The special values "mac" and "perm-mac" are supported, which use
1813           the current or permanent MAC address of the device to generate a
1814           client identifier with type ethernet (01). Currently, these options
1815           only work for ethernet type of links.
1816
1817           The special value "ipv6-duid" uses the DUID from "ipv6.dhcp-duid"
1818           property as an RFC4361-compliant client identifier. As IAID it uses
1819           "ipv4.dhcp-iaid" and falls back to "ipv6.dhcp-iaid" if unset.
1820
1821           The special value "duid" generates a RFC4361-compliant client
1822           identifier based on "ipv4.dhcp-iaid" and uses a DUID generated by
1823           hashing /etc/machine-id.
1824
1825           The special value "stable" is supported to generate a type 0 client
1826           identifier based on the stable-id (see connection.stable-id) and a
1827           per-host key. If you set the stable-id, you may want to include the
1828           "${DEVICE}" or "${MAC}" specifier to get a per-device key.
1829
1830           If unset, a globally configured default is used. If still unset,
1831           the default depends on the DHCP plugin.
1832
1833           Format: string
1834
1835       dhcp-fqdn
1836           If the "dhcp-send-hostname" property is TRUE, then the specified
1837           FQDN will be sent to the DHCP server when acquiring a lease. This
1838           property and "dhcp-hostname" are mutually exclusive and cannot be
1839           set at the same time.
1840
1841           Format: string
1842
1843       dhcp-hostname
1844           If the "dhcp-send-hostname" property is TRUE, then the specified
1845           name will be sent to the DHCP server when acquiring a lease. This
1846           property and "dhcp-fqdn" are mutually exclusive and cannot be set
1847           at the same time.
1848
1849           Format: string
1850
1851       dhcp-hostname-flags
1852           Flags for the DHCP hostname and FQDN.
1853
1854           Currently, this property only includes flags to control the FQDN
1855           flags set in the DHCP FQDN option. Supported FQDN flags are
1856           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
1857           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) and
1858           NM_DHCP_HOSTNAME_FLAG_FQDN_NO_UPDATE (0x4). When no FQDN flag is
1859           set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is set, the
1860           DHCP FQDN option will contain no flag. Otherwise, if no FQDN flag
1861           is set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is not set,
1862           the standard FQDN flags are set in the request:
1863           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
1864           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) for IPv4 and
1865           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1) for IPv6.
1866
1867           When this property is set to the default value
1868           NM_DHCP_HOSTNAME_FLAG_NONE (0x0), a global default is looked up in
1869           NetworkManager configuration. If that value is unset or also
1870           NM_DHCP_HOSTNAME_FLAG_NONE (0x0), then the standard FQDN flags
1871           described above are sent in the DHCP requests.
1872
1873           Format: uint32
1874
1875       dhcp-iaid
1876           A string containing the "Identity Association Identifier" (IAID)
1877           used by the DHCP client. The string can be a 32-bit number (either
1878           decimal, hexadecimal or or as colon separated hexadecimal numbers).
1879           Alternatively it can be set to the special values "mac",
1880           "perm-mac", "ifname" or "stable". When set to "mac" (or
1881           "perm-mac"), the last 4 bytes of the current (or permanent) MAC
1882           address are used as IAID. When set to "ifname", the IAID is
1883           computed by hashing the interface name. The special value "stable"
1884           can be used to generate an IAID based on the stable-id (see
1885           connection.stable-id), a per-host key and the interface name. When
1886           the property is unset, the value from global configuration is used;
1887           if no global default is set then the IAID is assumed to be
1888           "ifname".
1889
1890           For DHCPv4, the IAID is only used with "ipv4.dhcp-client-id" values
1891           "duid" and "ipv6-duid" to generate the client-id.
1892
1893           For DHCPv6, note that at the moment this property is only supported
1894           by the "internal" DHCPv6 plugin. The "dhclient" DHCPv6 plugin
1895           always derives the IAID from the MAC address.
1896
1897           The actually used DHCPv6 IAID for a currently activated interface
1898           is exposed in the lease information of the device.
1899
1900           Format: string
1901
1902       dhcp-reject-servers
1903           Array of servers from which DHCP offers must be rejected. This
1904           property is useful to avoid getting a lease from misconfigured or
1905           rogue servers.
1906
1907           For DHCPv4, each element must be an IPv4 address, optionally
1908           followed by a slash and a prefix length (e.g. "192.168.122.0/24").
1909
1910           This property is currently not implemented for DHCPv6.
1911
1912           Format: array of string
1913
1914       dhcp-send-hostname
1915           If TRUE, a hostname is sent to the DHCP server when acquiring a
1916           lease. Some DHCP servers use this hostname to update DNS databases,
1917           essentially providing a static hostname for the computer. If the
1918           "dhcp-hostname" property is NULL and this property is TRUE, the
1919           current persistent hostname of the computer is sent.
1920
1921           Format: boolean
1922
1923       dhcp-timeout
1924           A timeout for a DHCP transaction in seconds. If zero (the default),
1925           a globally configured default is used. If still unspecified, a
1926           device specific timeout is used (usually 45 seconds).
1927
1928           Set to 2147483647 (MAXINT32) for infinity.
1929
1930           Format: int32
1931
1932       dhcp-vendor-class-identifier
1933           The Vendor Class Identifier DHCP option (60). Special characters in
1934           the data string may be escaped using C-style escapes, nevertheless
1935           this property cannot contain nul bytes. If the per-profile value is
1936           unspecified (the default), a global connection default gets
1937           consulted. If still unspecified, the DHCP option is not sent to the
1938           server.
1939
1940           Format: string
1941
1942       dns
1943           Array of IP addresses of DNS servers.
1944
1945           For DoT (DNS over TLS), the SNI server name can be specified by
1946           appending "#example.com" to the IP address of the DNS server. This
1947           currently only has effect when using systemd-resolved.
1948
1949           Format: array of uint32
1950
1951       dns-options
1952           Array of DNS options as described in man 5 resolv.conf.
1953
1954           NULL means that the options are unset and left at the default. In
1955           this case NetworkManager will use default options. This is distinct
1956           from an empty list of properties.
1957
1958           The currently supported options are "attempts", "debug", "edns0",
1959           "inet6", "ip6-bytestring", "ip6-dotint", "ndots", "no-aaaa",
1960           "no-check-names", "no-ip6-dotint", "no-reload", "no-tld-query",
1961           "rotate", "single-request", "single-request-reopen", "timeout",
1962           "trust-ad", "use-vc".
1963
1964           The "trust-ad" setting is only honored if the profile contributes
1965           name servers to resolv.conf, and if all contributing profiles have
1966           "trust-ad" enabled.
1967
1968           When using a caching DNS plugin (dnsmasq or systemd-resolved in
1969           NetworkManager.conf) then "edns0" and "trust-ad" are automatically
1970           added.
1971
1972           Format: array of string
1973
1974       dns-priority
1975           DNS servers priority.
1976
1977           The relative priority for DNS servers specified by this setting. A
1978           lower numerical value is better (higher priority).
1979
1980           Negative values have the special effect of excluding other
1981           configurations with a greater numerical priority value; so in
1982           presence of at least one negative priority, only DNS servers from
1983           connections with the lowest priority value will be used. To avoid
1984           all DNS leaks, set the priority of the profile that should be used
1985           to the most negative value of all active connections profiles.
1986
1987           Zero selects a globally configured default value. If the latter is
1988           missing or zero too, it defaults to 50 for VPNs (including
1989           WireGuard) and 100 for other connections.
1990
1991           Note that the priority is to order DNS settings for multiple active
1992           connections. It does not disambiguate multiple DNS servers within
1993           the same connection profile.
1994
1995           When multiple devices have configurations with the same priority,
1996           VPNs will be considered first, then devices with the best (lowest
1997           metric) default route and then all other devices.
1998
1999           When using dns=default, servers with higher priority will be on top
2000           of resolv.conf. To prioritize a given server over another one
2001           within the same connection, just specify them in the desired order.
2002           Note that commonly the resolver tries name servers in
2003           /etc/resolv.conf in the order listed, proceeding with the next
2004           server in the list on failure. See for example the "rotate" option
2005           of the dns-options setting. If there are any negative DNS
2006           priorities, then only name servers from the devices with that
2007           lowest priority will be considered.
2008
2009           When using a DNS resolver that supports Conditional Forwarding or
2010           Split DNS (with dns=dnsmasq or dns=systemd-resolved settings), each
2011           connection is used to query domains in its search list. The search
2012           domains determine which name servers to ask, and the DNS priority
2013           is used to prioritize name servers based on the domain. Queries for
2014           domains not present in any search list are routed through
2015           connections having the '~.' special wildcard domain, which is added
2016           automatically to connections with the default route (or can be
2017           added manually). When multiple connections specify the same domain,
2018           the one with the best priority (lowest numerical value) wins. If a
2019           sub domain is configured on another interface it will be accepted
2020           regardless the priority, unless parent domain on the other
2021           interface has a negative priority, which causes the sub domain to
2022           be shadowed. With Split DNS one can avoid undesired DNS leaks by
2023           properly configuring DNS priorities and the search domains, so that
2024           only name servers of the desired interface are configured.
2025
2026           Format: int32
2027
2028       dns-search
2029           List of DNS search domains. Domains starting with a tilde ('~') are
2030           considered 'routing' domains and are used only to decide the
2031           interface over which a query must be forwarded; they are not used
2032           to complete unqualified host names.
2033
2034           When using a DNS plugin that supports Conditional Forwarding or
2035           Split DNS, then the search domains specify which name servers to
2036           query. This makes the behavior different from running with plain
2037           /etc/resolv.conf. For more information see also the dns-priority
2038           setting.
2039
2040           When set on a profile that also enabled DHCP, the DNS search list
2041           received automatically (option 119 for DHCPv4 and option 24 for
2042           DHCPv6) gets merged with the manual list. This can be prevented by
2043           setting "ignore-auto-dns". Note that if no DNS searches are
2044           configured, the fallback will be derived from the domain from DHCP
2045           (option 15).
2046
2047           Format: array of string
2048
2049       gateway
2050           Alias: gw4
2051
2052           The gateway associated with this configuration. This is only
2053           meaningful if "addresses" is also set.
2054
2055           Setting the gateway causes NetworkManager to configure a standard
2056           default route with the gateway as next hop. This is ignored if
2057           "never-default" is set. An alternative is to configure the default
2058           route explicitly with a manual route and /0 as prefix length.
2059
2060           Note that the gateway usually conflicts with routing that
2061           NetworkManager configures for WireGuard interfaces, so usually it
2062           should not be set in that case. See "ip4-auto-default-route".
2063
2064           Format: string
2065
2066       ignore-auto-dns
2067           When "method" is set to "auto" and this property to TRUE,
2068           automatically configured name servers and search domains are
2069           ignored and only name servers and search domains specified in the
2070           "dns" and "dns-search" properties, if any, are used.
2071
2072           Format: boolean
2073
2074       ignore-auto-routes
2075           When "method" is set to "auto" and this property to TRUE,
2076           automatically configured routes are ignored and only routes
2077           specified in the "routes" property, if any, are used.
2078
2079           Format: boolean
2080
2081       link-local
2082           Enable and disable the IPv4 link-local configuration independently
2083           of the ipv4.method configuration. This allows a link-local address
2084           (169.254.x.y/16) to be obtained in addition to other addresses,
2085           such as those manually configured or obtained from a DHCP server.
2086
2087           When set to "auto", the value is dependent on "ipv4.method". When
2088           set to "default", it honors the global connection default, before
2089           falling back to "auto". Note that if "ipv4.method" is "disabled",
2090           then link local addressing is always disabled too. The default is
2091           "default".
2092
2093           Format: int32
2094
2095       may-fail
2096           If TRUE, allow overall network configuration to proceed even if the
2097           configuration specified by this property times out. Note that at
2098           least one IP configuration must succeed or overall network
2099           configuration will still fail. For example, in IPv6-only networks,
2100           setting this property to TRUE on the NMSettingIP4Config allows the
2101           overall network configuration to succeed if IPv4 configuration
2102           fails but IPv6 configuration completes successfully.
2103
2104           Format: boolean
2105
2106       method
2107           IP configuration method.
2108
2109           NMSettingIP4Config and NMSettingIP6Config both support "disabled",
2110           "auto", "manual", and "link-local". See the subclass-specific
2111           documentation for other values.
2112
2113           In general, for the "auto" method, properties such as "dns" and
2114           "routes" specify information that is added on to the information
2115           returned from automatic configuration. The "ignore-auto-routes" and
2116           "ignore-auto-dns" properties modify this behavior.
2117
2118           For methods that imply no upstream network, such as "shared" or
2119           "link-local", these properties must be empty.
2120
2121           For IPv4 method "shared", the IP subnet can be configured by adding
2122           one manual IPv4 address or otherwise 10.42.x.0/24 is chosen. Note
2123           that the shared method must be configured on the interface which
2124           shares the internet to a subnet, not on the uplink which is shared.
2125
2126           Format: string
2127
2128       never-default
2129           If TRUE, this connection will never be the default connection for
2130           this IP type, meaning it will never be assigned the default route
2131           by NetworkManager.
2132
2133           Format: boolean
2134
2135       replace-local-rule
2136           Connections will default to keep the autogenerated priority 0 local
2137           rule unless this setting is set to TRUE.
2138
2139           Format: NMTernary (int32)
2140
2141       required-timeout
2142           The minimum time interval in milliseconds for which dynamic IP
2143           configuration should be tried before the connection succeeds.
2144
2145           This property is useful for example if both IPv4 and IPv6 are
2146           enabled and are allowed to fail. Normally the connection succeeds
2147           as soon as one of the two address families completes; by setting a
2148           required timeout for e.g. IPv4, one can ensure that even if IP6
2149           succeeds earlier than IPv4, NetworkManager waits some time for IPv4
2150           before the connection becomes active.
2151
2152           Note that if "may-fail" is FALSE for the same address family, this
2153           property has no effect as NetworkManager needs to wait for the full
2154           DHCP timeout.
2155
2156           A zero value means that no required timeout is present, -1 means
2157           the default value (either configuration ipvx.required-timeout
2158           override or zero).
2159
2160           Format: int32
2161
2162       route-metric
2163           The default metric for routes that don't explicitly specify a
2164           metric. The default value -1 means that the metric is chosen
2165           automatically based on the device type. The metric applies to
2166           dynamic routes, manual (static) routes that don't have an explicit
2167           metric setting, address prefix routes, and the default route. Note
2168           that for IPv6, the kernel accepts zero (0) but coerces it to 1024
2169           (user default). Hence, setting this property to zero effectively
2170           mean setting it to 1024. For IPv4, zero is a regular value for the
2171           metric.
2172
2173           Format: int64
2174
2175       route-table
2176           Enable policy routing (source routing) and set the routing table
2177           used when adding routes.
2178
2179           This affects all routes, including device-routes, IPv4LL, DHCP,
2180           SLAAC, default-routes and static routes. But note that static
2181           routes can individually overwrite the setting by explicitly
2182           specifying a non-zero routing table.
2183
2184           If the table setting is left at zero, it is eligible to be
2185           overwritten via global configuration. If the property is zero even
2186           after applying the global configuration value, policy routing is
2187           disabled for the address family of this connection.
2188
2189           Policy routing disabled means that NetworkManager will add all
2190           routes to the main table (except static routes that explicitly
2191           configure a different table). Additionally, NetworkManager will not
2192           delete any extraneous routes from tables except the main table.
2193           This is to preserve backward compatibility for users who manage
2194           routing tables outside of NetworkManager.
2195
2196           Format: uint32
2197
2198       routes
2199           A list of IPv4 destination addresses, prefix length, optional IPv4
2200           next hop addresses, optional route metric, optional attribute. The
2201           valid syntax is: "ip[/prefix] [next-hop] [metric]
2202           [attribute=val]...[,ip[/prefix]...]". For example "192.0.2.0/24
2203           10.1.1.1 77, 198.51.100.0/24".
2204
2205           Various attributes are supported:
2206
2207           •   "advmss" - an unsigned 32 bit integer.
2208
2209           •   "cwnd" - an unsigned 32 bit integer.
2210
2211           •   "initcwnd" - an unsigned 32 bit integer.
2212
2213           •   "initrwnd" - an unsigned 32 bit integer.
2214
2215           •   "lock-advmss" - a boolean value.
2216
2217           •   "lock-cwnd" - a boolean value.
2218
2219           •   "lock-initcwnd" - a boolean value.
2220
2221           •   "lock-initrwnd" - a boolean value.
2222
2223           •   "lock-mtu" - a boolean value.
2224
2225           •   "lock-window" - a boolean value.
2226
2227           •   "mtu" - an unsigned 32 bit integer.
2228
2229           •   "onlink" - a boolean value. The onlink flag is ignored for IPv4
2230               routes without a gateway. That also means, with a positive
2231               "weight" the route cannot merge with ECMP routes which are
2232               onlink and have a gateway.
2233
2234           •   "quickack" - a boolean value.
2235
2236           •   "rto_min" - an unsigned 32 bit integer. The value is in
2237               milliseconds.
2238
2239           •   "scope" - an unsigned 8 bit integer. IPv4 only.
2240
2241           •   "src" - an IPv4 address.
2242
2243           •   "table" - an unsigned 32 bit integer. The default depends on
2244               ipv4.route-table.
2245
2246           •   "tos" - an unsigned 8 bit integer. IPv4 only.
2247
2248           •   "type" - one of unicast, local, blackhole, unreachable,
2249               prohibit, throw. The default is unicast.
2250
2251           •   "weight" - an unsigned 32 bit integer ranging from 0 to 256. A
2252               non-zero weight indicates that the IPv4 route is an ECMP IPv4
2253               route. NetworkManager will automatically merge compatible ECMP
2254               routes into multi-hop routes. Setting to zero or omitting the
2255               attribute configures single hop routes that won't get merged.
2256               If the route finds no merge partner, it is configured as single
2257               hop route.
2258
2259               Note that in NetworkManager, currently all nexthops of a ECMP
2260               route must share the same "onlink" flag in order to be
2261               mergable.
2262
2263           •   "window" - an unsigned 32 bit integer.
2264
2265           For details see also `man ip-route`.
2266
2267           Format: a comma separated list of routes
2268
2269       routing-rules
2270           A comma separated list of routing rules for policy routing. The
2271           format is based on ip rule add syntax and mostly compatible. One
2272           difference is that routing rules in NetworkManager always need a
2273           fixed priority.
2274
2275           Example: priority 5 from 192.167.4.0/24 table 45
2276
2277           Format: a comma separated list of routing rules
2278
2279   ipv6 setting
2280       IPv6 Settings.
2281
2282       Properties:
2283
2284       addr-gen-mode
2285           Configure method for creating the address for use with RFC4862 IPv6
2286           Stateless Address Autoconfiguration. The permitted values are:
2287           NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_EUI64 (0),
2288           NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_STABLE_PRIVACY (1).
2289           NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_DEFAULT_OR_EUI64 (2) or
2290           NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_DEFAULT (3).
2291
2292           If the property is set to EUI64, the addresses will be generated
2293           using the interface tokens derived from hardware address. This
2294           makes the host part of the address to stay constant, making it
2295           possible to track host's presence when it changes networks. The
2296           address changes when the interface hardware is replaced.
2297
2298           The value of stable-privacy enables use of cryptographically secure
2299           hash of a secret host-specific key along with the connection's
2300           stable-id and the network address as specified by RFC7217. This
2301           makes it impossible to use the address track host's presence, and
2302           makes the address stable when the network interface hardware is
2303           replaced.
2304
2305           The special values "default" and "default-or-eui64" will fallback
2306           to the global connection default in as documented in
2307           NetworkManager.conf(5) manual. If the global default is not
2308           specified, the fallback value is "stable-privacy" or "eui64",
2309           respectively.
2310
2311           For libnm, the property defaults to "default" since 1.40.
2312           Previously it defaulted to "stable-privacy". On D-Bus, the absence
2313           of an addr-gen-mode setting equals "default". For keyfile plugin,
2314           the absence of the setting on disk means "default-or-eui64" so that
2315           the property doesn't change on upgrade from older versions.
2316
2317           Note that this setting is distinct from the Privacy Extensions as
2318           configured by "ip6-privacy" property and it does not affect the
2319           temporary addresses configured with this option.
2320
2321           Format: int32
2322
2323       addresses
2324           Alias: ip6
2325
2326           Array of IP addresses.
2327
2328           Format: a comma separated list of addresses
2329
2330       auto-route-ext-gw
2331           VPN connections will default to add the route automatically unless
2332           this setting is set to FALSE.
2333
2334           For other connection types, adding such an automatic route is
2335           currently not supported and setting this to TRUE has no effect.
2336
2337           Format: NMTernary (int32)
2338
2339       dhcp-duid
2340           A string containing the DHCPv6 Unique Identifier (DUID) used by the
2341           dhcp client to identify itself to DHCPv6 servers (RFC 3315). The
2342           DUID is carried in the Client Identifier option. If the property is
2343           a hex string ('aa:bb:cc') it is interpreted as a binary DUID and
2344           filled as an opaque value in the Client Identifier option.
2345
2346           The special value "lease" will retrieve the DUID previously used
2347           from the lease file belonging to the connection. If no DUID is
2348           found and "dhclient" is the configured dhcp client, the DUID is
2349           searched in the system-wide dhclient lease file. If still no DUID
2350           is found, or another dhcp client is used, a global and permanent
2351           DUID-UUID (RFC 6355) will be generated based on the machine-id.
2352
2353           The special values "llt" and "ll" will generate a DUID of type LLT
2354           or LL (see RFC 3315) based on the current MAC address of the
2355           device. In order to try providing a stable DUID-LLT, the time field
2356           will contain a constant timestamp that is used globally (for all
2357           profiles) and persisted to disk.
2358
2359           The special values "stable-llt", "stable-ll" and "stable-uuid" will
2360           generate a DUID of the corresponding type, derived from the
2361           connection's stable-id and a per-host unique key. You may want to
2362           include the "${DEVICE}" or "${MAC}" specifier in the stable-id, in
2363           case this profile gets activated on multiple devices. So, the
2364           link-layer address of "stable-ll" and "stable-llt" will be a
2365           generated address derived from the stable id. The DUID-LLT time
2366           value in the "stable-llt" option will be picked among a static
2367           timespan of three years (the upper bound of the interval is the
2368           same constant timestamp used in "llt").
2369
2370           When the property is unset, the global value provided for
2371           "ipv6.dhcp-duid" is used. If no global value is provided, the
2372           default "lease" value is assumed.
2373
2374           Format: string
2375
2376       dhcp-hostname
2377           If the "dhcp-send-hostname" property is TRUE, then the specified
2378           name will be sent to the DHCP server when acquiring a lease. This
2379           property and "dhcp-fqdn" are mutually exclusive and cannot be set
2380           at the same time.
2381
2382           Format: string
2383
2384       dhcp-hostname-flags
2385           Flags for the DHCP hostname and FQDN.
2386
2387           Currently, this property only includes flags to control the FQDN
2388           flags set in the DHCP FQDN option. Supported FQDN flags are
2389           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
2390           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) and
2391           NM_DHCP_HOSTNAME_FLAG_FQDN_NO_UPDATE (0x4). When no FQDN flag is
2392           set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is set, the
2393           DHCP FQDN option will contain no flag. Otherwise, if no FQDN flag
2394           is set and NM_DHCP_HOSTNAME_FLAG_FQDN_CLEAR_FLAGS (0x8) is not set,
2395           the standard FQDN flags are set in the request:
2396           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1),
2397           NM_DHCP_HOSTNAME_FLAG_FQDN_ENCODED (0x2) for IPv4 and
2398           NM_DHCP_HOSTNAME_FLAG_FQDN_SERV_UPDATE (0x1) for IPv6.
2399
2400           When this property is set to the default value
2401           NM_DHCP_HOSTNAME_FLAG_NONE (0x0), a global default is looked up in
2402           NetworkManager configuration. If that value is unset or also
2403           NM_DHCP_HOSTNAME_FLAG_NONE (0x0), then the standard FQDN flags
2404           described above are sent in the DHCP requests.
2405
2406           Format: uint32
2407
2408       dhcp-iaid
2409           A string containing the "Identity Association Identifier" (IAID)
2410           used by the DHCP client. The string can be a 32-bit number (either
2411           decimal, hexadecimal or or as colon separated hexadecimal numbers).
2412           Alternatively it can be set to the special values "mac",
2413           "perm-mac", "ifname" or "stable". When set to "mac" (or
2414           "perm-mac"), the last 4 bytes of the current (or permanent) MAC
2415           address are used as IAID. When set to "ifname", the IAID is
2416           computed by hashing the interface name. The special value "stable"
2417           can be used to generate an IAID based on the stable-id (see
2418           connection.stable-id), a per-host key and the interface name. When
2419           the property is unset, the value from global configuration is used;
2420           if no global default is set then the IAID is assumed to be
2421           "ifname".
2422
2423           For DHCPv4, the IAID is only used with "ipv4.dhcp-client-id" values
2424           "duid" and "ipv6-duid" to generate the client-id.
2425
2426           For DHCPv6, note that at the moment this property is only supported
2427           by the "internal" DHCPv6 plugin. The "dhclient" DHCPv6 plugin
2428           always derives the IAID from the MAC address.
2429
2430           The actually used DHCPv6 IAID for a currently activated interface
2431           is exposed in the lease information of the device.
2432
2433           Format: string
2434
2435       dhcp-send-hostname
2436           If TRUE, a hostname is sent to the DHCP server when acquiring a
2437           lease. Some DHCP servers use this hostname to update DNS databases,
2438           essentially providing a static hostname for the computer. If the
2439           "dhcp-hostname" property is NULL and this property is TRUE, the
2440           current persistent hostname of the computer is sent.
2441
2442           Format: boolean
2443
2444       dhcp-timeout
2445           A timeout for a DHCP transaction in seconds. If zero (the default),
2446           a globally configured default is used. If still unspecified, a
2447           device specific timeout is used (usually 45 seconds).
2448
2449           Set to 2147483647 (MAXINT32) for infinity.
2450
2451           Format: int32
2452
2453       dns
2454           Array of IP addresses of DNS servers.
2455
2456           For DoT (DNS over TLS), the SNI server name can be specified by
2457           appending "#example.com" to the IP address of the DNS server. This
2458           currently only has effect when using systemd-resolved.
2459
2460           Format: array of byte array
2461
2462       dns-options
2463           Array of DNS options as described in man 5 resolv.conf.
2464
2465           NULL means that the options are unset and left at the default. In
2466           this case NetworkManager will use default options. This is distinct
2467           from an empty list of properties.
2468
2469           The currently supported options are "attempts", "debug", "edns0",
2470           "inet6", "ip6-bytestring", "ip6-dotint", "ndots", "no-aaaa",
2471           "no-check-names", "no-ip6-dotint", "no-reload", "no-tld-query",
2472           "rotate", "single-request", "single-request-reopen", "timeout",
2473           "trust-ad", "use-vc".
2474
2475           The "trust-ad" setting is only honored if the profile contributes
2476           name servers to resolv.conf, and if all contributing profiles have
2477           "trust-ad" enabled.
2478
2479           When using a caching DNS plugin (dnsmasq or systemd-resolved in
2480           NetworkManager.conf) then "edns0" and "trust-ad" are automatically
2481           added.
2482
2483           Format: array of string
2484
2485       dns-priority
2486           DNS servers priority.
2487
2488           The relative priority for DNS servers specified by this setting. A
2489           lower numerical value is better (higher priority).
2490
2491           Negative values have the special effect of excluding other
2492           configurations with a greater numerical priority value; so in
2493           presence of at least one negative priority, only DNS servers from
2494           connections with the lowest priority value will be used. To avoid
2495           all DNS leaks, set the priority of the profile that should be used
2496           to the most negative value of all active connections profiles.
2497
2498           Zero selects a globally configured default value. If the latter is
2499           missing or zero too, it defaults to 50 for VPNs (including
2500           WireGuard) and 100 for other connections.
2501
2502           Note that the priority is to order DNS settings for multiple active
2503           connections. It does not disambiguate multiple DNS servers within
2504           the same connection profile.
2505
2506           When multiple devices have configurations with the same priority,
2507           VPNs will be considered first, then devices with the best (lowest
2508           metric) default route and then all other devices.
2509
2510           When using dns=default, servers with higher priority will be on top
2511           of resolv.conf. To prioritize a given server over another one
2512           within the same connection, just specify them in the desired order.
2513           Note that commonly the resolver tries name servers in
2514           /etc/resolv.conf in the order listed, proceeding with the next
2515           server in the list on failure. See for example the "rotate" option
2516           of the dns-options setting. If there are any negative DNS
2517           priorities, then only name servers from the devices with that
2518           lowest priority will be considered.
2519
2520           When using a DNS resolver that supports Conditional Forwarding or
2521           Split DNS (with dns=dnsmasq or dns=systemd-resolved settings), each
2522           connection is used to query domains in its search list. The search
2523           domains determine which name servers to ask, and the DNS priority
2524           is used to prioritize name servers based on the domain. Queries for
2525           domains not present in any search list are routed through
2526           connections having the '~.' special wildcard domain, which is added
2527           automatically to connections with the default route (or can be
2528           added manually). When multiple connections specify the same domain,
2529           the one with the best priority (lowest numerical value) wins. If a
2530           sub domain is configured on another interface it will be accepted
2531           regardless the priority, unless parent domain on the other
2532           interface has a negative priority, which causes the sub domain to
2533           be shadowed. With Split DNS one can avoid undesired DNS leaks by
2534           properly configuring DNS priorities and the search domains, so that
2535           only name servers of the desired interface are configured.
2536
2537           Format: int32
2538
2539       dns-search
2540           List of DNS search domains. Domains starting with a tilde ('~') are
2541           considered 'routing' domains and are used only to decide the
2542           interface over which a query must be forwarded; they are not used
2543           to complete unqualified host names.
2544
2545           When using a DNS plugin that supports Conditional Forwarding or
2546           Split DNS, then the search domains specify which name servers to
2547           query. This makes the behavior different from running with plain
2548           /etc/resolv.conf. For more information see also the dns-priority
2549           setting.
2550
2551           When set on a profile that also enabled DHCP, the DNS search list
2552           received automatically (option 119 for DHCPv4 and option 24 for
2553           DHCPv6) gets merged with the manual list. This can be prevented by
2554           setting "ignore-auto-dns". Note that if no DNS searches are
2555           configured, the fallback will be derived from the domain from DHCP
2556           (option 15).
2557
2558           Format: array of string
2559
2560       gateway
2561           Alias: gw6
2562
2563           The gateway associated with this configuration. This is only
2564           meaningful if "addresses" is also set.
2565
2566           Setting the gateway causes NetworkManager to configure a standard
2567           default route with the gateway as next hop. This is ignored if
2568           "never-default" is set. An alternative is to configure the default
2569           route explicitly with a manual route and /0 as prefix length.
2570
2571           Note that the gateway usually conflicts with routing that
2572           NetworkManager configures for WireGuard interfaces, so usually it
2573           should not be set in that case. See "ip4-auto-default-route".
2574
2575           Format: string
2576
2577       ignore-auto-dns
2578           When "method" is set to "auto" and this property to TRUE,
2579           automatically configured name servers and search domains are
2580           ignored and only name servers and search domains specified in the
2581           "dns" and "dns-search" properties, if any, are used.
2582
2583           Format: boolean
2584
2585       ignore-auto-routes
2586           When "method" is set to "auto" and this property to TRUE,
2587           automatically configured routes are ignored and only routes
2588           specified in the "routes" property, if any, are used.
2589
2590           Format: boolean
2591
2592       ip6-privacy
2593           Configure IPv6 Privacy Extensions for SLAAC, described in RFC4941.
2594           If enabled, it makes the kernel generate a temporary IPv6 address
2595           in addition to the public one generated from MAC address via
2596           modified EUI-64. This enhances privacy, but could cause problems in
2597           some applications, on the other hand. The permitted values are: -1:
2598           unknown, 0: disabled, 1: enabled (prefer public address), 2:
2599           enabled (prefer temporary addresses).
2600
2601           Having a per-connection setting set to "-1" (unknown) means
2602           fallback to global configuration "ipv6.ip6-privacy".
2603
2604           If also global configuration is unspecified or set to "-1",
2605           fallback to read "/proc/sys/net/ipv6/conf/default/use_tempaddr".
2606
2607           Note that this setting is distinct from the Stable Privacy
2608           addresses that can be enabled with the "addr-gen-mode" property's
2609           "stable-privacy" setting as another way of avoiding host tracking
2610           with IPv6 addresses.
2611
2612           Format: NMSettingIP6ConfigPrivacy (int32)
2613
2614       may-fail
2615           If TRUE, allow overall network configuration to proceed even if the
2616           configuration specified by this property times out. Note that at
2617           least one IP configuration must succeed or overall network
2618           configuration will still fail. For example, in IPv6-only networks,
2619           setting this property to TRUE on the NMSettingIP4Config allows the
2620           overall network configuration to succeed if IPv4 configuration
2621           fails but IPv6 configuration completes successfully.
2622
2623           Format: boolean
2624
2625       method
2626           IP configuration method.
2627
2628           NMSettingIP4Config and NMSettingIP6Config both support "disabled",
2629           "auto", "manual", and "link-local". See the subclass-specific
2630           documentation for other values.
2631
2632           In general, for the "auto" method, properties such as "dns" and
2633           "routes" specify information that is added on to the information
2634           returned from automatic configuration. The "ignore-auto-routes" and
2635           "ignore-auto-dns" properties modify this behavior.
2636
2637           For methods that imply no upstream network, such as "shared" or
2638           "link-local", these properties must be empty.
2639
2640           For IPv4 method "shared", the IP subnet can be configured by adding
2641           one manual IPv4 address or otherwise 10.42.x.0/24 is chosen. Note
2642           that the shared method must be configured on the interface which
2643           shares the internet to a subnet, not on the uplink which is shared.
2644
2645           Format: string
2646
2647       mtu
2648           Maximum transmission unit size, in bytes. If zero (the default),
2649           the MTU is set automatically from router advertisements or is left
2650           equal to the link-layer MTU. If greater than the link-layer MTU, or
2651           greater than zero but less than the minimum IPv6 MTU of 1280, this
2652           value has no effect.
2653
2654           Format: uint32
2655
2656       never-default
2657           If TRUE, this connection will never be the default connection for
2658           this IP type, meaning it will never be assigned the default route
2659           by NetworkManager.
2660
2661           Format: boolean
2662
2663       ra-timeout
2664           A timeout for waiting Router Advertisements in seconds. If zero
2665           (the default), a globally configured default is used. If still
2666           unspecified, the timeout depends on the sysctl settings of the
2667           device.
2668
2669           Set to 2147483647 (MAXINT32) for infinity.
2670
2671           Format: int32
2672
2673       replace-local-rule
2674           Connections will default to keep the autogenerated priority 0 local
2675           rule unless this setting is set to TRUE.
2676
2677           Format: NMTernary (int32)
2678
2679       required-timeout
2680           The minimum time interval in milliseconds for which dynamic IP
2681           configuration should be tried before the connection succeeds.
2682
2683           This property is useful for example if both IPv4 and IPv6 are
2684           enabled and are allowed to fail. Normally the connection succeeds
2685           as soon as one of the two address families completes; by setting a
2686           required timeout for e.g. IPv4, one can ensure that even if IP6
2687           succeeds earlier than IPv4, NetworkManager waits some time for IPv4
2688           before the connection becomes active.
2689
2690           Note that if "may-fail" is FALSE for the same address family, this
2691           property has no effect as NetworkManager needs to wait for the full
2692           DHCP timeout.
2693
2694           A zero value means that no required timeout is present, -1 means
2695           the default value (either configuration ipvx.required-timeout
2696           override or zero).
2697
2698           Format: int32
2699
2700       route-metric
2701           The default metric for routes that don't explicitly specify a
2702           metric. The default value -1 means that the metric is chosen
2703           automatically based on the device type. The metric applies to
2704           dynamic routes, manual (static) routes that don't have an explicit
2705           metric setting, address prefix routes, and the default route. Note
2706           that for IPv6, the kernel accepts zero (0) but coerces it to 1024
2707           (user default). Hence, setting this property to zero effectively
2708           mean setting it to 1024. For IPv4, zero is a regular value for the
2709           metric.
2710
2711           Format: int64
2712
2713       route-table
2714           Enable policy routing (source routing) and set the routing table
2715           used when adding routes.
2716
2717           This affects all routes, including device-routes, IPv4LL, DHCP,
2718           SLAAC, default-routes and static routes. But note that static
2719           routes can individually overwrite the setting by explicitly
2720           specifying a non-zero routing table.
2721
2722           If the table setting is left at zero, it is eligible to be
2723           overwritten via global configuration. If the property is zero even
2724           after applying the global configuration value, policy routing is
2725           disabled for the address family of this connection.
2726
2727           Policy routing disabled means that NetworkManager will add all
2728           routes to the main table (except static routes that explicitly
2729           configure a different table). Additionally, NetworkManager will not
2730           delete any extraneous routes from tables except the main table.
2731           This is to preserve backward compatibility for users who manage
2732           routing tables outside of NetworkManager.
2733
2734           Format: uint32
2735
2736       routes
2737           A list of IPv6 destination addresses, prefix length, optional IPv6
2738           next hop addresses, optional route metric, optional attribute. The
2739           valid syntax is: "ip[/prefix] [next-hop] [metric]
2740           [attribute=val]...[,ip[/prefix]...]".
2741
2742           Various attributes are supported:
2743
2744           •   "advmss" - an unsigned 32 bit integer.
2745
2746           •   "cwnd" - an unsigned 32 bit integer.
2747
2748           •   "from" - an IPv6 address with optional prefix. IPv6 only.
2749
2750           •   "initcwnd" - an unsigned 32 bit integer.
2751
2752           •   "initrwnd" - an unsigned 32 bit integer.
2753
2754           •   "lock-advmss" - a boolean value.
2755
2756           •   "lock-cwnd" - a boolean value.
2757
2758           •   "lock-initcwnd" - a boolean value.
2759
2760           •   "lock-initrwnd" - a boolean value.
2761
2762           •   "lock-mtu" - a boolean value.
2763
2764           •   "lock-window" - a boolean value.
2765
2766           •   "mtu" - an unsigned 32 bit integer.
2767
2768           •   "onlink" - a boolean value.
2769
2770           •   "quickack" - a boolean value.
2771
2772           •   "rto_min" - an unsigned 32 bit integer. The value is in
2773               milliseconds.
2774
2775           •   "src" - an IPv6 address.
2776
2777           •   "table" - an unsigned 32 bit integer. The default depends on
2778               ipv6.route-table.
2779
2780           •   "type" - one of unicast, local, blackhole, unreachable,
2781               prohibit, throw. The default is unicast.
2782
2783           •   "window" - an unsigned 32 bit integer.
2784
2785           For details see also `man ip-route`.
2786
2787           Format: a comma separated list of routes
2788
2789       routing-rules
2790           A comma separated list of routing rules for policy routing. The
2791           format is based on ip rule add syntax and mostly compatible. One
2792           difference is that routing rules in NetworkManager always need a
2793           fixed priority.
2794
2795           Example: priority 5 from 1:2:3::5/128 table 45
2796
2797           Format: a comma separated list of routing rules
2798
2799       token
2800           Configure the token for
2801           draft-chown-6man-tokenised-ipv6-identifiers-02 IPv6 tokenized
2802           interface identifiers. Useful with eui64 addr-gen-mode.
2803
2804           Format: string
2805
2806   ip-tunnel setting
2807       IP Tunneling Settings.
2808
2809       Properties:
2810
2811       encapsulation-limit
2812           How many additional levels of encapsulation are permitted to be
2813           prepended to packets. This property applies only to IPv6 tunnels.
2814           To disable this option, add NM_IP_TUNNEL_FLAG_IP6_IGN_ENCAP_LIMIT
2815           (0x1) to ip-tunnel flags.
2816
2817           Format: uint32
2818
2819       flags
2820           Tunnel flags. Currently, the following values are supported:
2821           NM_IP_TUNNEL_FLAG_IP6_IGN_ENCAP_LIMIT (0x1),
2822           NM_IP_TUNNEL_FLAG_IP6_USE_ORIG_TCLASS (0x2),
2823           NM_IP_TUNNEL_FLAG_IP6_USE_ORIG_FLOWLABEL (0x4),
2824           NM_IP_TUNNEL_FLAG_IP6_MIP6_DEV (0x8),
2825           NM_IP_TUNNEL_FLAG_IP6_RCV_DSCP_COPY (0x10),
2826           NM_IP_TUNNEL_FLAG_IP6_USE_ORIG_FWMARK (0x20). They are valid only
2827           for IPv6 tunnels.
2828
2829           Format: uint32
2830
2831       flow-label
2832           The flow label to assign to tunnel packets. This property applies
2833           only to IPv6 tunnels.
2834
2835           Format: uint32
2836
2837       fwmark
2838           The fwmark value to assign to tunnel packets. This property can be
2839           set to a non zero value only on VTI and VTI6 tunnels.
2840
2841           Format: uint32
2842
2843       input-key
2844           The key used for tunnel input packets; the property is valid only
2845           for certain tunnel modes (GRE, IP6GRE). If empty, no key is used.
2846
2847           Format: string
2848
2849       local
2850           Alias: local
2851
2852           The local endpoint of the tunnel; the value can be empty, otherwise
2853           it must contain an IPv4 or IPv6 address.
2854
2855           Format: string
2856
2857       mode
2858           Alias: mode
2859
2860           The tunneling mode, for example NM_IP_TUNNEL_MODE_IPIP (1) or
2861           NM_IP_TUNNEL_MODE_GRE (2).
2862
2863           Format: uint32
2864
2865       mtu
2866           If non-zero, only transmit packets of the specified size or
2867           smaller, breaking larger packets up into multiple fragments.
2868
2869           Format: uint32
2870
2871       output-key
2872           The key used for tunnel output packets; the property is valid only
2873           for certain tunnel modes (GRE, IP6GRE). If empty, no key is used.
2874
2875           Format: string
2876
2877       parent
2878           Alias: dev
2879
2880           If given, specifies the parent interface name or parent connection
2881           UUID the new device will be bound to so that tunneled packets will
2882           only be routed via that interface.
2883
2884           Format: string
2885
2886       path-mtu-discovery
2887           Whether to enable Path MTU Discovery on this tunnel.
2888
2889           Format: boolean
2890
2891       remote
2892           Alias: remote
2893
2894           The remote endpoint of the tunnel; the value must contain an IPv4
2895           or IPv6 address.
2896
2897           Format: string
2898
2899       tos
2900           The type of service (IPv4) or traffic class (IPv6) field to be set
2901           on tunneled packets.
2902
2903           Format: uint32
2904
2905       ttl
2906           The TTL to assign to tunneled packets. 0 is a special value meaning
2907           that packets inherit the TTL value.
2908
2909           Format: uint32
2910
2911   macsec setting
2912       MACSec Settings.
2913
2914       Properties:
2915
2916       encrypt
2917           Alias: encrypt
2918
2919           Whether the transmitted traffic must be encrypted.
2920
2921           Format: boolean
2922
2923       mka-cak
2924           Alias: cak
2925
2926           The pre-shared CAK (Connectivity Association Key) for MACsec Key
2927           Agreement. Must be a string of 32 hexadecimal characters.
2928
2929           Format: string
2930
2931       mka-cak-flags
2932           Flags indicating how to handle the "mka-cak" property.
2933
2934           Format: NMSettingSecretFlags (uint32)
2935
2936       mka-ckn
2937           Alias: ckn
2938
2939           The pre-shared CKN (Connectivity-association Key Name) for MACsec
2940           Key Agreement. Must be a string of hexadecimal characters with a
2941           even length between 2 and 64.
2942
2943           Format: string
2944
2945       mode
2946           Alias: mode
2947
2948           Specifies how the CAK (Connectivity Association Key) for MKA
2949           (MACsec Key Agreement) is obtained.
2950
2951           Format: int32
2952
2953       parent
2954           Alias: dev
2955
2956           If given, specifies the parent interface name or parent connection
2957           UUID from which this MACSEC interface should be created. If this
2958           property is not specified, the connection must contain an
2959           "802-3-ethernet" setting with a "mac-address" property.
2960
2961           Format: string
2962
2963       port
2964           Alias: port
2965
2966           The port component of the SCI (Secure Channel Identifier), between
2967           1 and 65534.
2968
2969           Format: int32
2970
2971       send-sci
2972           Specifies whether the SCI (Secure Channel Identifier) is included
2973           in every packet.
2974
2975           Format: boolean
2976
2977       validation
2978           Specifies the validation mode for incoming frames.
2979
2980           Format: int32
2981
2982   macvlan setting
2983       MAC VLAN Settings.
2984
2985       Properties:
2986
2987       mode
2988           Alias: mode
2989
2990           The macvlan mode, which specifies the communication mechanism
2991           between multiple macvlans on the same lower device.
2992
2993           Format: uint32
2994
2995       parent
2996           Alias: dev
2997
2998           If given, specifies the parent interface name or parent connection
2999           UUID from which this MAC-VLAN interface should be created. If this
3000           property is not specified, the connection must contain an
3001           "802-3-ethernet" setting with a "mac-address" property.
3002
3003           Format: string
3004
3005       promiscuous
3006           Whether the interface should be put in promiscuous mode.
3007
3008           Format: boolean
3009
3010       tap
3011           Alias: tap
3012
3013           Whether the interface should be a MACVTAP.
3014
3015           Format: boolean
3016
3017   match setting
3018       Match settings.
3019
3020       Properties:
3021
3022       driver
3023           A list of driver names to match. Each element is a shell wildcard
3024           pattern.
3025
3026           See NMSettingMatch:interface-name for how special characters '|',
3027           '&', '!' and '\\' are used for optional and mandatory matches and
3028           inverting the pattern.
3029
3030           Format: array of string
3031
3032       interface-name
3033           A list of interface names to match. Each element is a shell
3034           wildcard pattern.
3035
3036           An element can be prefixed with a pipe symbol (|) or an ampersand
3037           (&). The former means that the element is optional and the latter
3038           means that it is mandatory. If there are any optional elements,
3039           than the match evaluates to true if at least one of the optional
3040           element matches (logical OR). If there are any mandatory elements,
3041           then they all must match (logical AND). By default, an element is
3042           optional. This means that an element "foo" behaves the same as
3043           "|foo". An element can also be inverted with exclamation mark (!)
3044           between the pipe symbol (or the ampersand) and before the pattern.
3045           Note that "!foo" is a shortcut for the mandatory match "&!foo".
3046           Finally, a backslash can be used at the beginning of the element
3047           (after the optional special characters) to escape the start of the
3048           pattern. For example, "&\\!a" is an mandatory match for literally
3049           "!a".
3050
3051           Format: array of string
3052
3053       kernel-command-line
3054           A list of kernel command line arguments to match. This may be used
3055           to check whether a specific kernel command line option is set (or
3056           unset, if prefixed with the exclamation mark). The argument must
3057           either be a single word, or an assignment (i.e. two words, joined
3058           by "="). In the former case the kernel command line is searched for
3059           the word appearing as is, or as left hand side of an assignment. In
3060           the latter case, the exact assignment is looked for with right and
3061           left hand side matching. Wildcard patterns are not supported.
3062
3063           See NMSettingMatch:interface-name for how special characters '|',
3064           '&', '!' and '\\' are used for optional and mandatory matches and
3065           inverting the match.
3066
3067           Format: array of string
3068
3069       path
3070           A list of paths to match against the ID_PATH udev property of
3071           devices. ID_PATH represents the topological persistent path of a
3072           device. It typically contains a subsystem string (pci, usb,
3073           platform, etc.) and a subsystem-specific identifier.
3074
3075           For PCI devices the path has the form
3076           "pci-$domain:$bus:$device.$function", where each variable is an
3077           hexadecimal value; for example "pci-0000:0a:00.0".
3078
3079           The path of a device can be obtained with "udevadm info
3080           /sys/class/net/$dev | grep ID_PATH=" or by looking at the "path"
3081           property exported by NetworkManager ("nmcli -f general.path device
3082           show $dev").
3083
3084           Each element of the list is a shell wildcard pattern.
3085
3086           See NMSettingMatch:interface-name for how special characters '|',
3087           '&', '!' and '\\' are used for optional and mandatory matches and
3088           inverting the pattern.
3089
3090           Format: array of string
3091
3092   802-11-olpc-mesh setting
3093       Alias: olpc-mesh
3094
3095       OLPC Wireless Mesh Settings.
3096
3097       Properties:
3098
3099       channel
3100           Alias: channel
3101
3102           Channel on which the mesh network to join is located.
3103
3104           Format: uint32
3105
3106       dhcp-anycast-address
3107           Alias: dhcp-anycast
3108
3109           Anycast DHCP MAC address used when requesting an IP address via
3110           DHCP. The specific anycast address used determines which DHCP
3111           server class answers the request.
3112
3113           This is currently only implemented by dhclient DHCP plugin.
3114
3115           Format: byte array
3116
3117       ssid
3118           Alias: ssid
3119
3120           SSID of the mesh network to join.
3121
3122           Format: byte array
3123
3124   ovs-bridge setting
3125       OvsBridge Link Settings.
3126
3127       Properties:
3128
3129       datapath-type
3130           The data path type. One of "system", "netdev" or empty.
3131
3132           Format: string
3133
3134       fail-mode
3135           The bridge failure mode. One of "secure", "standalone" or empty.
3136
3137           Format: string
3138
3139       mcast-snooping-enable
3140           Enable or disable multicast snooping.
3141
3142           Format: boolean
3143
3144       rstp-enable
3145           Enable or disable RSTP.
3146
3147           Format: boolean
3148
3149       stp-enable
3150           Enable or disable STP.
3151
3152           Format: boolean
3153
3154   ovs-dpdk setting
3155       OvsDpdk Link Settings.
3156
3157       Properties:
3158
3159       devargs
3160           Open vSwitch DPDK device arguments.
3161
3162           Format: string
3163
3164       n-rxq
3165           Open vSwitch DPDK number of rx queues. Defaults to zero which means
3166           to leave the parameter in OVS unspecified and effectively
3167           configures one queue.
3168
3169           Format: uint32
3170
3171       n-rxq-desc
3172           The rx queue size (number of rx descriptors) for DPDK ports. Must
3173           be zero or a power of 2 between 1 and 4096, and supported by the
3174           hardware. Defaults to zero which means to leave the parameter in
3175           OVS unspecified and effectively configures 2048 descriptors.
3176
3177           Format: uint32
3178
3179       n-txq-desc
3180           The tx queue size (number of tx descriptors) for DPDK ports. Must
3181           be zero or a power of 2 between 1 and 4096, and supported by the
3182           hardware. Defaults to zero which means to leave the parameter in
3183           OVS unspecified and effectively configures 2048 descriptors.
3184
3185           Format: uint32
3186
3187   ovs-interface setting
3188       Open vSwitch Interface Settings.
3189
3190       Properties:
3191
3192       ofport-request
3193           Open vSwitch openflow port number. Defaults to zero which means
3194           that port number will not be specified and it will be chosen
3195           randomly by ovs. OpenFlow ports are the network interfaces for
3196           passing packets between OpenFlow processing and the rest of the
3197           network. OpenFlow switches connect logically to each other via
3198           their OpenFlow ports.
3199
3200           Format: uint32
3201
3202       type
3203           The interface type. Either "internal", "system", "patch", "dpdk",
3204           or empty.
3205
3206           Format: string
3207
3208   ovs-patch setting
3209       OvsPatch Link Settings.
3210
3211       Properties:
3212
3213       peer
3214           Specifies the name of the interface for the other side of the
3215           patch. The patch on the other side must also set this interface as
3216           peer.
3217
3218           Format: string
3219
3220   ovs-port setting
3221       OvsPort Link Settings.
3222
3223       Properties:
3224
3225       bond-downdelay
3226           The time port must be inactive in order to be considered down.
3227
3228           Format: uint32
3229
3230       bond-mode
3231           Bonding mode. One of "active-backup", "balance-slb", or
3232           "balance-tcp".
3233
3234           Format: string
3235
3236       bond-updelay
3237           The time port must be active before it starts forwarding traffic.
3238
3239           Format: uint32
3240
3241       lacp
3242           LACP mode. One of "active", "off", or "passive".
3243
3244           Format: string
3245
3246       tag
3247           The VLAN tag in the range 0-4095.
3248
3249           Format: uint32
3250
3251       trunks
3252           A list of VLAN ranges that this port trunks.
3253
3254           The property is valid only for ports with mode "trunk",
3255           "native-tagged", or "native-untagged port". If it is empty, the
3256           port trunks all VLANs.
3257
3258           Format: array of vardict
3259
3260       vlan-mode
3261           The VLAN mode. One of "access", "native-tagged", "native-untagged",
3262           "trunk", "dot1q-tunnel" or unset.
3263
3264           Format: string
3265
3266   ppp setting
3267       Point-to-Point Protocol Settings.
3268
3269       Properties:
3270
3271       baud
3272           If non-zero, instruct pppd to set the serial port to the specified
3273           baudrate. This value should normally be left as 0 to automatically
3274           choose the speed.
3275
3276           Format: uint32
3277
3278       crtscts
3279           If TRUE, specify that pppd should set the serial port to use
3280           hardware flow control with RTS and CTS signals. This value should
3281           normally be set to FALSE.
3282
3283           Format: boolean
3284
3285       lcp-echo-failure
3286           If non-zero, instruct pppd to presume the connection to the peer
3287           has failed if the specified number of LCP echo-requests go
3288           unanswered by the peer. The "lcp-echo-interval" property must also
3289           be set to a non-zero value if this property is used.
3290
3291           Format: uint32
3292
3293       lcp-echo-interval
3294           If non-zero, instruct pppd to send an LCP echo-request frame to the
3295           peer every n seconds (where n is the specified value). Note that
3296           some PPP peers will respond to echo requests and some will not, and
3297           it is not possible to autodetect this.
3298
3299           Format: uint32
3300
3301       mppe-stateful
3302           If TRUE, stateful MPPE is used. See pppd documentation for more
3303           information on stateful MPPE.
3304
3305           Format: boolean
3306
3307       mru
3308           If non-zero, instruct pppd to request that the peer send packets no
3309           larger than the specified size. If non-zero, the MRU should be
3310           between 128 and 16384.
3311
3312           Format: uint32
3313
3314       mtu
3315           If non-zero, instruct pppd to send packets no larger than the
3316           specified size.
3317
3318           Format: uint32
3319
3320       no-vj-comp
3321           If TRUE, Van Jacobsen TCP header compression will not be requested.
3322
3323           Format: boolean
3324
3325       noauth
3326           If TRUE, do not require the other side (usually the PPP server) to
3327           authenticate itself to the client. If FALSE, require authentication
3328           from the remote side. In almost all cases, this should be TRUE.
3329
3330           Format: boolean
3331
3332       nobsdcomp
3333           If TRUE, BSD compression will not be requested.
3334
3335           Format: boolean
3336
3337       nodeflate
3338           If TRUE, "deflate" compression will not be requested.
3339
3340           Format: boolean
3341
3342       refuse-chap
3343           If TRUE, the CHAP authentication method will not be used.
3344
3345           Format: boolean
3346
3347       refuse-eap
3348           If TRUE, the EAP authentication method will not be used.
3349
3350           Format: boolean
3351
3352       refuse-mschap
3353           If TRUE, the MSCHAP authentication method will not be used.
3354
3355           Format: boolean
3356
3357       refuse-mschapv2
3358           If TRUE, the MSCHAPv2 authentication method will not be used.
3359
3360           Format: boolean
3361
3362       refuse-pap
3363           If TRUE, the PAP authentication method will not be used.
3364
3365           Format: boolean
3366
3367       require-mppe
3368           If TRUE, MPPE (Microsoft Point-to-Point Encryption) will be
3369           required for the PPP session. If either 64-bit or 128-bit MPPE is
3370           not available the session will fail. Note that MPPE is not used on
3371           mobile broadband connections.
3372
3373           Format: boolean
3374
3375       require-mppe-128
3376           If TRUE, 128-bit MPPE (Microsoft Point-to-Point Encryption) will be
3377           required for the PPP session, and the "require-mppe" property must
3378           also be set to TRUE. If 128-bit MPPE is not available the session
3379           will fail.
3380
3381           Format: boolean
3382
3383   pppoe setting
3384       PPP-over-Ethernet Settings.
3385
3386       Properties:
3387
3388       parent
3389           Alias: parent
3390
3391           If given, specifies the parent interface name on which this PPPoE
3392           connection should be created. If this property is not specified,
3393           the connection is activated on the interface specified in
3394           "interface-name" of NMSettingConnection.
3395
3396           Format: string
3397
3398       password
3399           Alias: password
3400
3401           Password used to authenticate with the PPPoE service.
3402
3403           Format: string
3404
3405       password-flags
3406           Flags indicating how to handle the "password" property.
3407
3408           Format: NMSettingSecretFlags (uint32)
3409
3410       service
3411           Alias: service
3412
3413           If specified, instruct PPPoE to only initiate sessions with access
3414           concentrators that provide the specified service. For most
3415           providers, this should be left blank. It is only required if there
3416           are multiple access concentrators or a specific service is known to
3417           be required.
3418
3419           Format: string
3420
3421       username
3422           Alias: username
3423
3424           Username used to authenticate with the PPPoE service.
3425
3426           Format: string
3427
3428   proxy setting
3429       WWW Proxy Settings.
3430
3431       Properties:
3432
3433       browser-only
3434           Alias: browser-only
3435
3436           Whether the proxy configuration is for browser only.
3437
3438           Format: boolean
3439
3440       method
3441           Alias: method
3442
3443           Method for proxy configuration, Default is
3444           NM_SETTING_PROXY_METHOD_NONE (0)
3445
3446           Format: int32
3447
3448       pac-script
3449           Alias: pac-script
3450
3451           PAC script for the connection. This is an UTF-8 encoded javascript
3452           code that defines a FindProxyForURL() function.
3453
3454           Format: string
3455
3456       pac-url
3457           Alias: pac-url
3458
3459           PAC URL for obtaining PAC file.
3460
3461           Format: string
3462
3463   serial setting
3464       Serial Link Settings.
3465
3466       Properties:
3467
3468       baud
3469           Speed to use for communication over the serial port. Note that this
3470           value usually has no effect for mobile broadband modems as they
3471           generally ignore speed settings and use the highest available
3472           speed.
3473
3474           Format: uint32
3475
3476       bits
3477           Byte-width of the serial communication. The 8 in "8n1" for example.
3478
3479           Format: uint32
3480
3481       parity
3482           Parity setting of the serial port.
3483
3484           Format: NMSettingSerialParity (byte)
3485
3486       send-delay
3487           Time to delay between each byte sent to the modem, in microseconds.
3488
3489           Format: uint64
3490
3491       stopbits
3492           Number of stop bits for communication on the serial port. Either 1
3493           or 2. The 1 in "8n1" for example.
3494
3495           Format: uint32
3496
3497   sriov setting
3498       SR-IOV settings.
3499
3500       Properties:
3501
3502       autoprobe-drivers
3503           Whether to autoprobe virtual functions by a compatible driver.
3504
3505           If set to NM_TERNARY_TRUE (1), the kernel will try to bind VFs to a
3506           compatible driver and if this succeeds a new network interface will
3507           be instantiated for each VF.
3508
3509           If set to NM_TERNARY_FALSE (0), VFs will not be claimed and no
3510           network interfaces will be created for them.
3511
3512           When set to NM_TERNARY_DEFAULT (-1), the global default is used; in
3513           case the global default is unspecified it is assumed to be
3514           NM_TERNARY_TRUE (1).
3515
3516           Format: NMTernary (int32)
3517
3518       total-vfs
3519           The total number of virtual functions to create.
3520
3521           Note that when the sriov setting is present NetworkManager enforces
3522           the number of virtual functions on the interface (also when it is
3523           zero) during activation and resets it upon deactivation. To prevent
3524           any changes to SR-IOV parameters don't add a sriov setting to the
3525           connection.
3526
3527           Format: uint32
3528
3529       vfs
3530           Array of virtual function descriptors.
3531
3532           Each VF descriptor is a dictionary mapping attribute names to
3533           GVariant values. The 'index' entry is mandatory for each VF.
3534
3535           When represented as string a VF is in the form:
3536
3537           "INDEX [ATTR=VALUE[ ATTR=VALUE]...]".
3538
3539           for example:
3540
3541           "2 mac=00:11:22:33:44:55 spoof-check=true".
3542
3543           Multiple VFs can be specified using a comma as separator.
3544           Currently, the following attributes are supported: mac,
3545           spoof-check, trust, min-tx-rate, max-tx-rate, vlans.
3546
3547           The "vlans" attribute is represented as a semicolon-separated list
3548           of VLAN descriptors, where each descriptor has the form
3549
3550           "ID[.PRIORITY[.PROTO]]".
3551
3552           PROTO can be either 'q' for 802.1Q (the default) or 'ad' for
3553           802.1ad.
3554
3555           Format: array of vardict
3556
3557   tc setting
3558       Linux Traffic Control Settings.
3559
3560       Properties:
3561
3562       qdiscs
3563           Array of TC queueing disciplines. qdisc is a basic block in the
3564           Linux traffic control subsystem
3565
3566           Each qdisc can be specified by the following attributes:
3567
3568           handle HANDLE
3569               specifies the qdisc handle. A qdisc, which potentially can have
3570               children, gets assigned a major number, called a 'handle',
3571               leaving the minor number namespace available for classes. The
3572               handle is expressed as '10:'. It is customary to explicitly
3573               assign a handle to qdiscs expected to have children.
3574
3575           parent HANDLE
3576               specifies the handle of the parent qdisc the current qdisc must
3577               be attached to.
3578
3579           root
3580               specifies that the qdisc is attached to the root of device.
3581
3582           KIND
3583               this is the qdisc kind. NetworkManager currently supports the
3584               following kinds: fq_codel, sfq, tbf. Each qdisc kind has a
3585               different set of parameters, described below. There are also
3586               some kinds like pfifo, pfifo_fast, prio supported by
3587               NetworkManager but their parameters are not supported by
3588               NetworkManager.
3589
3590           Parameters for 'fq_codel':
3591
3592           limit U32
3593               the hard limit on the real queue size. When this limit is
3594               reached, incoming packets are dropped. Default is 10240
3595               packets.
3596
3597           memory_limit U32
3598               sets a limit on the total number of bytes that can be queued in
3599               this FQ-CoDel instance. The lower of the packet limit of the
3600               limit parameter and the memory limit will be enforced. Default
3601               is 32 MB.
3602
3603           flows U32
3604               the number of flows into which the incoming packets are
3605               classified. Due to the stochastic nature of hashing, multiple
3606               flows may end up being hashed into the same slot. Newer flows
3607               have priority over older ones. This parameter can be set only
3608               at load time since memory has to be allocated for the hash
3609               table. Default value is 1024.
3610
3611           target U32
3612               the acceptable minimum standing/persistent queue delay. This
3613               minimum delay is identified by tracking the local minimum queue
3614               delay that packets experience. The unit of measurement is
3615               microsecond(us). Default value is 5ms.
3616
3617           interval U32
3618               used to ensure that the measured minimum delay does not become
3619               too stale. The minimum delay must be experienced in the last
3620               epoch of length .B interval. It should be set on the order of
3621               the worst-case RTT through the bottleneck to give endpoints
3622               sufficient time to react. Default value is 100ms.
3623
3624           quantum U32
3625               the number of bytes used as 'deficit' in the fair queuing
3626               algorithm. Default is set to 1514 bytes which corresponds to
3627               the Ethernet MTU plus the hardware header length of 14 bytes.
3628
3629           ecn BOOL
3630               can be used to mark packets instead of dropping them. ecn is
3631               turned on by default.
3632
3633           ce_threshold U32
3634               sets a threshold above which all packets are marked with ECN
3635               Congestion Experienced. This is useful for DCTCP-style
3636               congestion control algorithms that require marking at very
3637               shallow queueing thresholds.
3638
3639           Parameters for 'sfq':
3640
3641           divisor U32
3642               can be used to set a different hash table size, available from
3643               kernel 2.6.39 onwards. The specified divisor must be a power of
3644               two and cannot be larger than 65536. Default value: 1024.
3645
3646           limit U32
3647               Upper limit of the SFQ. Can be used to reduce the default
3648               length of 127 packets.
3649
3650           depth U32
3651               Limit of packets per flow. Default to 127 and can be lowered.
3652
3653           perturb_period U32
3654               Interval in seconds for queue algorithm perturbation. Defaults
3655               to 0, which means that no perturbation occurs. Do not set too
3656               low for each perturbation may cause some packet reordering or
3657               losses. Advised value: 60 This value has no effect when
3658               external flow classification is used. Its better to increase
3659               divisor value to lower risk of hash collisions.
3660
3661           quantum U32
3662               Amount of bytes a flow is allowed to dequeue during a round of
3663               the round robin process. Defaults to the MTU of the interface
3664               which is also the advised value and the minimum value.
3665
3666           flows U32
3667               Default value is 127.
3668
3669           Parameters for 'tbf':
3670
3671           rate U64
3672               Bandwidth or rate. These parameters accept a floating point
3673               number, possibly followed by either a unit (both SI and IEC
3674               units supported), or a float followed by a percent character to
3675               specify the rate as a percentage of the device's speed.
3676
3677           burst U32
3678               Also known as buffer or maxburst. Size of the bucket, in bytes.
3679               This is the maximum amount of bytes that tokens can be
3680               available for instantaneously. In general, larger shaping rates
3681               require a larger buffer. For 10mbit/s on Intel, you need at
3682               least 10kbyte buffer if you want to reach your configured rate!
3683
3684               If your buffer is too small, packets may be dropped because
3685               more tokens arrive per timer tick than fit in your bucket. The
3686               minimum buffer size can be calculated by dividing the rate by
3687               HZ.
3688
3689               Token usage calculations are performed using a table which by
3690               default has a resolution of 8 packets. This resolution can be
3691               changed by specifying the cell size with the burst. For
3692               example, to specify a 6000 byte buffer with a 16 byte cell
3693               size, set a burst of 6000/16. You will probably never have to
3694               set this. Must be an integral power of 2.
3695
3696           limit U32
3697               Limit is the number of bytes that can be queued waiting for
3698               tokens to become available.
3699
3700           latency U32
3701               specifies the maximum amount of time a packet can sit in the
3702               TBF. The latency calculation takes into account the size of the
3703               bucket, the rate and possibly the peakrate (if set). The
3704               latency and limit are mutually exclusive.
3705
3706           Format: GPtrArray(NMTCQdisc)
3707
3708       tfilters
3709           Array of TC traffic filters. Traffic control can manage the packet
3710           content during classification by using filters.
3711
3712           Each tfilters can be specified by the following attributes:
3713
3714           handle HANDLE
3715               specifies the tfilters handle. A filter is used by a classful
3716               qdisc to determine in which class a packet will be enqueued. It
3717               is important to notice that filters reside within qdiscs.
3718               Therefore, see qdiscs handle for detailed information.
3719
3720           parent HANDLE
3721               specifies the handle of the parent qdisc the current qdisc must
3722               be attached to.
3723
3724           root
3725               specifies that the qdisc is attached to the root of device.
3726
3727           KIND
3728               this is the tfilters kind. NetworkManager currently supports
3729               following kinds: mirred, simple. Each filter kind has a
3730               different set of actions, described below. There are also some
3731               other kinds like matchall, basic, u32 supported by
3732               NetworkManager.
3733
3734           Actions for 'mirred':
3735
3736           egress bool
3737               Define whether the packet should exit from the interface.
3738
3739           ingress bool
3740               Define whether the packet should come into the interface.
3741
3742           mirror bool
3743               Define whether the packet should be copied to the destination
3744               space.
3745
3746           redirect bool
3747               Define whether the packet should be moved to the destination
3748               space.
3749
3750           Action for 'simple':
3751
3752           sdata char[32]
3753               The actual string to print.
3754
3755           Format: GPtrArray(NMTCTfilter)
3756
3757   team setting
3758       Teaming Settings.
3759
3760       Properties:
3761
3762       config
3763           Alias: config
3764
3765           The JSON configuration for the team network interface. The property
3766           should contain raw JSON configuration data suitable for teamd,
3767           because the value is passed directly to teamd. If not specified,
3768           the default configuration is used. See man teamd.conf for the
3769           format details.
3770
3771           Format: string
3772
3773       link-watchers
3774           Link watchers configuration for the connection: each link watcher
3775           is defined by a dictionary, whose keys depend upon the selected
3776           link watcher. Available link watchers are 'ethtool', 'nsna_ping'
3777           and 'arp_ping' and it is specified in the dictionary with the key
3778           'name'. Available keys are: ethtool: 'delay-up', 'delay-down',
3779           'init-wait'; nsna_ping: 'init-wait', 'interval', 'missed-max',
3780           'target-host'; arp_ping: all the ones in nsna_ping and
3781           'source-host', 'validate-active', 'validate-inactive',
3782           'send-always'. See teamd.conf man for more details.
3783
3784           Format: array of vardict
3785
3786       mcast-rejoin-count
3787           Corresponds to the teamd mcast_rejoin.count.
3788
3789           Format: int32
3790
3791       mcast-rejoin-interval
3792           Corresponds to the teamd mcast_rejoin.interval.
3793
3794           Format: int32
3795
3796       notify-peers-count
3797           Corresponds to the teamd notify_peers.count.
3798
3799           Format: int32
3800
3801       notify-peers-interval
3802           Corresponds to the teamd notify_peers.interval.
3803
3804           Format: int32
3805
3806       runner
3807           Corresponds to the teamd runner.name. Permitted values are:
3808           "roundrobin", "broadcast", "activebackup", "loadbalance", "lacp",
3809           "random".
3810
3811           Format: string
3812
3813       runner-active
3814           Corresponds to the teamd runner.active.
3815
3816           Format: boolean
3817
3818       runner-agg-select-policy
3819           Corresponds to the teamd runner.agg_select_policy.
3820
3821           Format: string
3822
3823       runner-fast-rate
3824           Corresponds to the teamd runner.fast_rate.
3825
3826           Format: boolean
3827
3828       runner-hwaddr-policy
3829           Corresponds to the teamd runner.hwaddr_policy.
3830
3831           Format: string
3832
3833       runner-min-ports
3834           Corresponds to the teamd runner.min_ports.
3835
3836           Format: int32
3837
3838       runner-sys-prio
3839           Corresponds to the teamd runner.sys_prio.
3840
3841           Format: int32
3842
3843       runner-tx-balancer
3844           Corresponds to the teamd runner.tx_balancer.name.
3845
3846           Format: string
3847
3848       runner-tx-balancer-interval
3849           Corresponds to the teamd runner.tx_balancer.interval.
3850
3851           Format: int32
3852
3853       runner-tx-hash
3854           Corresponds to the teamd runner.tx_hash.
3855
3856           Format: array of string
3857
3858   team-port setting
3859       Team Port Settings.
3860
3861       Properties:
3862
3863       config
3864           Alias: config
3865
3866           The JSON configuration for the team port. The property should
3867           contain raw JSON configuration data suitable for teamd, because the
3868           value is passed directly to teamd. If not specified, the default
3869           configuration is used. See man teamd.conf for the format details.
3870
3871           Format: string
3872
3873       lacp-key
3874           Corresponds to the teamd ports.PORTIFNAME.lacp_key.
3875
3876           Format: int32
3877
3878       lacp-prio
3879           Corresponds to the teamd ports.PORTIFNAME.lacp_prio.
3880
3881           Format: int32
3882
3883       link-watchers
3884           Link watchers configuration for the connection: each link watcher
3885           is defined by a dictionary, whose keys depend upon the selected
3886           link watcher. Available link watchers are 'ethtool', 'nsna_ping'
3887           and 'arp_ping' and it is specified in the dictionary with the key
3888           'name'. Available keys are: ethtool: 'delay-up', 'delay-down',
3889           'init-wait'; nsna_ping: 'init-wait', 'interval', 'missed-max',
3890           'target-host'; arp_ping: all the ones in nsna_ping and
3891           'source-host', 'validate-active', 'validate-inactive',
3892           'send-always'. See teamd.conf man for more details.
3893
3894           Format: array of vardict
3895
3896       prio
3897           Corresponds to the teamd ports.PORTIFNAME.prio.
3898
3899           Format: int32
3900
3901       queue-id
3902           Corresponds to the teamd ports.PORTIFNAME.queue_id. When set to -1
3903           means the parameter is skipped from the json config.
3904
3905           Format: int32
3906
3907       sticky
3908           Corresponds to the teamd ports.PORTIFNAME.sticky.
3909
3910           Format: boolean
3911
3912   tun setting
3913       Tunnel Settings.
3914
3915       Properties:
3916
3917       group
3918           Alias: group
3919
3920           The group ID which will own the device. If set to NULL everyone
3921           will be able to use the device.
3922
3923           Format: string
3924
3925       mode
3926           Alias: mode
3927
3928           The operating mode of the virtual device. Allowed values are
3929           NM_SETTING_TUN_MODE_TUN (1) to create a layer 3 device and
3930           NM_SETTING_TUN_MODE_TAP (2) to create an Ethernet-like layer 2 one.
3931
3932           Format: uint32
3933
3934       multi-queue
3935           Alias: multi-queue
3936
3937           If the property is set to TRUE, the interface will support multiple
3938           file descriptors (queues) to parallelize packet sending or
3939           receiving. Otherwise, the interface will only support a single
3940           queue.
3941
3942           Format: boolean
3943
3944       owner
3945           Alias: owner
3946
3947           The user ID which will own the device. If set to NULL everyone will
3948           be able to use the device.
3949
3950           Format: string
3951
3952       pi
3953           Alias: pi
3954
3955           If TRUE the interface will prepend a 4 byte header describing the
3956           physical interface to the packets.
3957
3958           Format: boolean
3959
3960       vnet-hdr
3961           Alias: vnet-hdr
3962
3963           If TRUE the IFF_VNET_HDR the tunnel packets will include a virtio
3964           network header.
3965
3966           Format: boolean
3967
3968   vlan setting
3969       VLAN Settings.
3970
3971       Properties:
3972
3973       egress-priority-map
3974           Alias: egress
3975
3976           For outgoing packets, a list of mappings from Linux SKB priorities
3977           to 802.1p priorities. The mapping is given in the format "from:to"
3978           where both "from" and "to" are unsigned integers, ie "7:3".
3979
3980           Format: array of string
3981
3982       flags
3983           Alias: flags
3984
3985           One or more flags which control the behavior and features of the
3986           VLAN interface. Flags include NM_VLAN_FLAG_REORDER_HEADERS (0x1)
3987           (reordering of output packet headers), NM_VLAN_FLAG_GVRP (0x2) (use
3988           of the GVRP protocol), and NM_VLAN_FLAG_LOOSE_BINDING (0x4) (loose
3989           binding of the interface to its master device's operating state).
3990           NM_VLAN_FLAG_MVRP (0x8) (use of the MVRP protocol).
3991
3992           The default value of this property is NM_VLAN_FLAG_REORDER_HEADERS,
3993           but it used to be 0. To preserve backward compatibility, the
3994           default-value in the D-Bus API continues to be 0 and a missing
3995           property on D-Bus is still considered as 0.
3996
3997           Format: NMVlanFlags (uint32)
3998
3999       id
4000           Alias: id
4001
4002           The VLAN identifier that the interface created by this connection
4003           should be assigned. The valid range is from 0 to 4094, without the
4004           reserved id 4095.
4005
4006           Format: uint32
4007
4008       ingress-priority-map
4009           Alias: ingress
4010
4011           For incoming packets, a list of mappings from 802.1p priorities to
4012           Linux SKB priorities. The mapping is given in the format "from:to"
4013           where both "from" and "to" are unsigned integers, ie "7:3".
4014
4015           Format: array of string
4016
4017       parent
4018           Alias: dev
4019
4020           If given, specifies the parent interface name or parent connection
4021           UUID from which this VLAN interface should be created. If this
4022           property is not specified, the connection must contain an
4023           "802-3-ethernet" setting with a "mac-address" property.
4024
4025           Format: string
4026
4027       protocol
4028           Specifies the VLAN protocol to use for encapsulation.
4029
4030           Supported values are: '802.1Q', '802.1ad'. If not specified the
4031           default value is '802.1Q'.
4032
4033           Format: string
4034
4035   vpn setting
4036       VPN Settings.
4037
4038       Properties:
4039
4040       data
4041           Dictionary of key/value pairs of VPN plugin specific data. Both
4042           keys and values must be strings.
4043
4044           Format: dict of string to string
4045
4046       persistent
4047           If the VPN service supports persistence, and this property is TRUE,
4048           the VPN will attempt to stay connected across link changes and
4049           outages, until explicitly disconnected.
4050
4051           Format: boolean
4052
4053       secrets
4054           Dictionary of key/value pairs of VPN plugin specific secrets like
4055           passwords or private keys. Both keys and values must be strings.
4056
4057           Format: dict of string to string
4058
4059       service-type
4060           Alias: vpn-type
4061
4062           D-Bus service name of the VPN plugin that this setting uses to
4063           connect to its network. i.e. org.freedesktop.NetworkManager.vpnc
4064           for the vpnc plugin.
4065
4066           Format: string
4067
4068       timeout
4069           Timeout for the VPN service to establish the connection. Some
4070           services may take quite a long time to connect. Value of 0 means a
4071           default timeout, which is 60 seconds (unless overridden by
4072           vpn.timeout in configuration file). Values greater than zero mean
4073           timeout in seconds.
4074
4075           Format: uint32
4076
4077       user-name
4078           Alias: user
4079
4080           If the VPN connection requires a user name for authentication, that
4081           name should be provided here. If the connection is available to
4082           more than one user, and the VPN requires each user to supply a
4083           different name, then leave this property empty. If this property is
4084           empty, NetworkManager will automatically supply the username of the
4085           user which requested the VPN connection.
4086
4087           Format: string
4088
4089   vrf setting
4090       VRF settings.
4091
4092       Properties:
4093
4094       table
4095           Alias: table
4096
4097           The routing table for this VRF.
4098
4099           Format: uint32
4100
4101   vxlan setting
4102       VXLAN Settings.
4103
4104       Properties:
4105
4106       ageing
4107           Specifies the lifetime in seconds of FDB entries learnt by the
4108           kernel.
4109
4110           Format: uint32
4111
4112       destination-port
4113           Alias: destination-port
4114
4115           Specifies the UDP destination port to communicate to the remote
4116           VXLAN tunnel endpoint.
4117
4118           Format: uint32
4119
4120       id
4121           Alias: id
4122
4123           Specifies the VXLAN Network Identifier (or VXLAN Segment
4124           Identifier) to use.
4125
4126           Format: uint32
4127
4128       l2-miss
4129           Specifies whether netlink LL ADDR miss notifications are generated.
4130
4131           Format: boolean
4132
4133       l3-miss
4134           Specifies whether netlink IP ADDR miss notifications are generated.
4135
4136           Format: boolean
4137
4138       learning
4139           Specifies whether unknown source link layer addresses and IP
4140           addresses are entered into the VXLAN device forwarding database.
4141
4142           Format: boolean
4143
4144       limit
4145           Specifies the maximum number of FDB entries. A value of zero means
4146           that the kernel will store unlimited entries.
4147
4148           Format: uint32
4149
4150       local
4151           Alias: local
4152
4153           If given, specifies the source IP address to use in outgoing
4154           packets.
4155
4156           Format: string
4157
4158       parent
4159           Alias: dev
4160
4161           If given, specifies the parent interface name or parent connection
4162           UUID.
4163
4164           Format: string
4165
4166       proxy
4167           Specifies whether ARP proxy is turned on.
4168
4169           Format: boolean
4170
4171       remote
4172           Alias: remote
4173
4174           Specifies the unicast destination IP address to use in outgoing
4175           packets when the destination link layer address is not known in the
4176           VXLAN device forwarding database, or the multicast IP address to
4177           join.
4178
4179           Format: string
4180
4181       rsc
4182           Specifies whether route short circuit is turned on.
4183
4184           Format: boolean
4185
4186       source-port-max
4187           Alias: source-port-max
4188
4189           Specifies the maximum UDP source port to communicate to the remote
4190           VXLAN tunnel endpoint.
4191
4192           Format: uint32
4193
4194       source-port-min
4195           Alias: source-port-min
4196
4197           Specifies the minimum UDP source port to communicate to the remote
4198           VXLAN tunnel endpoint.
4199
4200           Format: uint32
4201
4202       tos
4203           Specifies the TOS value to use in outgoing packets.
4204
4205           Format: uint32
4206
4207       ttl
4208           Specifies the time-to-live value to use in outgoing packets.
4209
4210           Format: uint32
4211
4212   wifi-p2p setting
4213       Wi-Fi P2P Settings.
4214
4215       Properties:
4216
4217       peer
4218           Alias: peer
4219
4220           The P2P device that should be connected to. Currently, this is the
4221           only way to create or join a group.
4222
4223           Format: string
4224
4225       wfd-ies
4226           The Wi-Fi Display (WFD) Information Elements (IEs) to set.
4227
4228           Wi-Fi Display requires a protocol specific information element to
4229           be set in certain Wi-Fi frames. These can be specified here for the
4230           purpose of establishing a connection. This setting is only useful
4231           when implementing a Wi-Fi Display client.
4232
4233           Format: byte array
4234
4235       wps-method
4236           Flags indicating which mode of WPS is to be used.
4237
4238           There's little point in changing the default setting as
4239           NetworkManager will automatically determine the best method to use.
4240
4241           Format: uint32
4242
4243   wimax setting
4244       WiMax Settings.
4245
4246       Properties:
4247
4248       mac-address
4249           Alias: mac
4250
4251           If specified, this connection will only apply to the WiMAX device
4252           whose MAC address matches. This property does not change the MAC
4253           address of the device (known as MAC spoofing).
4254
4255           This property is deprecated since version 1.2. WiMAX is no longer
4256           supported.
4257
4258           Format: byte array
4259
4260       network-name
4261           Alias: nsp
4262
4263           Network Service Provider (NSP) name of the WiMAX network this
4264           connection should use.
4265
4266           This property is deprecated since version 1.2. WiMAX is no longer
4267           supported.
4268
4269           Format: string
4270
4271   802-3-ethernet setting
4272       Alias: ethernet
4273
4274       Wired Ethernet Settings.
4275
4276       Properties:
4277
4278       accept-all-mac-addresses
4279           When TRUE, setup the interface to accept packets for all MAC
4280           addresses. This is enabling the kernel interface flag IFF_PROMISC.
4281           When FALSE, the interface will only accept the packets with the
4282           interface destination mac address or broadcast.
4283
4284           Format: NMTernary (int32)
4285
4286       auto-negotiate
4287           When TRUE, enforce auto-negotiation of speed and duplex mode. If
4288           "speed" and "duplex" properties are both specified, only that
4289           single mode will be advertised and accepted during the link
4290           auto-negotiation process: this works only for BASE-T 802.3
4291           specifications and is useful for enforcing gigabits modes, as in
4292           these cases link negotiation is mandatory. When FALSE, "speed" and
4293           "duplex" properties should be both set or link configuration will
4294           be skipped.
4295
4296           Format: boolean
4297
4298       cloned-mac-address
4299           Alias: cloned-mac
4300
4301           If specified, request that the device use this MAC address instead.
4302           This is known as MAC cloning or spoofing.
4303
4304           Beside explicitly specifying a MAC address, the special values
4305           "preserve", "permanent", "random" and "stable" are supported.
4306           "preserve" means not to touch the MAC address on activation.
4307           "permanent" means to use the permanent hardware address if the
4308           device has one (otherwise this is treated as "preserve"). "random"
4309           creates a random MAC address on each connect. "stable" creates a
4310           hashed MAC address based on connection.stable-id and a machine
4311           dependent key.
4312
4313           If unspecified, the value can be overwritten via global defaults,
4314           see manual of NetworkManager.conf. If still unspecified, it
4315           defaults to "preserve" (older versions of NetworkManager may use a
4316           different default value).
4317
4318           On D-Bus, this field is expressed as "assigned-mac-address" or the
4319           deprecated "cloned-mac-address".
4320
4321           Format: byte array
4322
4323       duplex
4324           When a value is set, either "half" or "full", configures the device
4325           to use the specified duplex mode. If "auto-negotiate" is "yes" the
4326           specified duplex mode will be the only one advertised during link
4327           negotiation: this works only for BASE-T 802.3 specifications and is
4328           useful for enforcing gigabits modes, as in these cases link
4329           negotiation is mandatory. If the value is unset (the default), the
4330           link configuration will be either skipped (if "auto-negotiate" is
4331           "no", the default) or will be auto-negotiated (if "auto-negotiate"
4332           is "yes") and the local device will advertise all the supported
4333           duplex modes. Must be set together with the "speed" property if
4334           specified. Before specifying a duplex mode be sure your device
4335           supports it.
4336
4337           Format: string
4338
4339       generate-mac-address-mask
4340           With "cloned-mac-address" setting "random" or "stable", by default
4341           all bits of the MAC address are scrambled and a
4342           locally-administered, unicast MAC address is created. This property
4343           allows to specify that certain bits are fixed. Note that the least
4344           significant bit of the first MAC address will always be unset to
4345           create a unicast MAC address.
4346
4347           If the property is NULL, it is eligible to be overwritten by a
4348           default connection setting. If the value is still NULL or an empty
4349           string, the default is to create a locally-administered, unicast
4350           MAC address.
4351
4352           If the value contains one MAC address, this address is used as
4353           mask. The set bits of the mask are to be filled with the current
4354           MAC address of the device, while the unset bits are subject to
4355           randomization. Setting "FE:FF:FF:00:00:00" means to preserve the
4356           OUI of the current MAC address and only randomize the lower 3 bytes
4357           using the "random" or "stable" algorithm.
4358
4359           If the value contains one additional MAC address after the mask,
4360           this address is used instead of the current MAC address to fill the
4361           bits that shall not be randomized. For example, a value of
4362           "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set the OUI of the MAC
4363           address to 68:F7:28, while the lower bits are randomized. A value
4364           of "02:00:00:00:00:00 00:00:00:00:00:00" will create a fully
4365           scrambled globally-administered, burned-in MAC address.
4366
4367           If the value contains more than one additional MAC addresses, one
4368           of them is chosen randomly. For example, "02:00:00:00:00:00
4369           00:00:00:00:00:00 02:00:00:00:00:00" will create a fully scrambled
4370           MAC address, randomly locally or globally administered.
4371
4372           Format: string
4373
4374       mac-address
4375           Alias: mac
4376
4377           If specified, this connection will only apply to the Ethernet
4378           device whose permanent MAC address matches. This property does not
4379           change the MAC address of the device (i.e. MAC spoofing).
4380
4381           Format: byte array
4382
4383       mac-address-blacklist
4384           If specified, this connection will never apply to the Ethernet
4385           device whose permanent MAC address matches an address in the list.
4386           Each MAC address is in the standard hex-digits-and-colons notation
4387           (00:11:22:33:44:55).
4388
4389           Format: array of string
4390
4391       mtu
4392           Alias: mtu
4393
4394           If non-zero, only transmit packets of the specified size or
4395           smaller, breaking larger packets up into multiple Ethernet frames.
4396
4397           Format: uint32
4398
4399       port
4400           Specific port type to use if the device supports multiple
4401           attachment methods. One of "tp" (Twisted Pair), "aui" (Attachment
4402           Unit Interface), "bnc" (Thin Ethernet) or "mii" (Media Independent
4403           Interface). If the device supports only one port type, this setting
4404           is ignored.
4405
4406           Format: string
4407
4408       s390-nettype
4409           s390 network device type; one of "qeth", "lcs", or "ctc",
4410           representing the different types of virtual network devices
4411           available on s390 systems.
4412
4413           Format: string
4414
4415       s390-options
4416           Dictionary of key/value pairs of s390-specific device options. Both
4417           keys and values must be strings. Allowed keys include "portno",
4418           "layer2", "portname", "protocol", among others. Key names must
4419           contain only alphanumeric characters (ie, [a-zA-Z0-9]).
4420
4421           Currently, NetworkManager itself does nothing with this
4422           information. However, s390utils ships a udev rule which parses this
4423           information and applies it to the interface.
4424
4425           Format: dict of string to string
4426
4427       s390-subchannels
4428           Identifies specific subchannels that this network device uses for
4429           communication with z/VM or s390 host. Like the "mac-address"
4430           property for non-z/VM devices, this property can be used to ensure
4431           this connection only applies to the network device that uses these
4432           subchannels. The list should contain exactly 3 strings, and each
4433           string may only be composed of hexadecimal characters and the
4434           period (.) character.
4435
4436           Format: array of string
4437
4438       speed
4439           When a value greater than 0 is set, configures the device to use
4440           the specified speed. If "auto-negotiate" is "yes" the specified
4441           speed will be the only one advertised during link negotiation: this
4442           works only for BASE-T 802.3 specifications and is useful for
4443           enforcing gigabit speeds, as in this case link negotiation is
4444           mandatory. If the value is unset (0, the default), the link
4445           configuration will be either skipped (if "auto-negotiate" is "no",
4446           the default) or will be auto-negotiated (if "auto-negotiate" is
4447           "yes") and the local device will advertise all the supported
4448           speeds. In Mbit/s, ie 100 == 100Mbit/s. Must be set together with
4449           the "duplex" property when non-zero. Before specifying a speed
4450           value be sure your device supports it.
4451
4452           Format: uint32
4453
4454       wake-on-lan
4455           The NMSettingWiredWakeOnLan options to enable. Not all devices
4456           support all options. May be any combination of
4457           NM_SETTING_WIRED_WAKE_ON_LAN_PHY (0x2),
4458           NM_SETTING_WIRED_WAKE_ON_LAN_UNICAST (0x4),
4459           NM_SETTING_WIRED_WAKE_ON_LAN_MULTICAST (0x8),
4460           NM_SETTING_WIRED_WAKE_ON_LAN_BROADCAST (0x10),
4461           NM_SETTING_WIRED_WAKE_ON_LAN_ARP (0x20),
4462           NM_SETTING_WIRED_WAKE_ON_LAN_MAGIC (0x40) or the special values
4463           NM_SETTING_WIRED_WAKE_ON_LAN_DEFAULT (0x1) (to use global settings)
4464           and NM_SETTING_WIRED_WAKE_ON_LAN_IGNORE (0x8000) (to disable
4465           management of Wake-on-LAN in NetworkManager).
4466
4467           Format: uint32
4468
4469       wake-on-lan-password
4470           If specified, the password used with magic-packet-based
4471           Wake-on-LAN, represented as an Ethernet MAC address. If NULL, no
4472           password will be required.
4473
4474           Format: string
4475
4476   wireguard setting
4477       WireGuard Settings.
4478
4479       Properties:
4480
4481       fwmark
4482           The use of fwmark is optional and is by default off. Setting it to
4483           0 disables it. Otherwise, it is a 32-bit fwmark for outgoing
4484           packets.
4485
4486           Note that "ip4-auto-default-route" or "ip6-auto-default-route"
4487           enabled, implies to automatically choose a fwmark.
4488
4489           Format: uint32
4490
4491       ip4-auto-default-route
4492           Whether to enable special handling of the IPv4 default route. If
4493           enabled, the IPv4 default route from wireguard.peer-routes will be
4494           placed to a dedicated routing-table and two policy routing rules
4495           will be added. The fwmark number is also used as routing-table for
4496           the default-route, and if fwmark is zero, an unused fwmark/table is
4497           chosen automatically. This corresponds to what wg-quick does with
4498           Table=auto and what WireGuard calls "Improved Rule-based Routing".
4499
4500           Note that for this automatism to work, you usually don't want to
4501           set ipv4.gateway, because that will result in a conflicting default
4502           route.
4503
4504           Leaving this at the default will enable this option automatically
4505           if ipv4.never-default is not set and there are any peers that use a
4506           default-route as allowed-ips. Since this automatism only makes
4507           sense if you also have a peer with an /0 allowed-ips, it is usually
4508           not necessary to enable this explicitly. However, you can disable
4509           it if you want to configure your own routing and rules.
4510
4511           Format: NMTernary (int32)
4512
4513       ip6-auto-default-route
4514           Like ip4-auto-default-route, but for the IPv6 default route.
4515
4516           Format: NMTernary (int32)
4517
4518       listen-port
4519           The listen-port. If listen-port is not specified, the port will be
4520           chosen randomly when the interface comes up.
4521
4522           Format: uint32
4523
4524       mtu
4525           If non-zero, only transmit packets of the specified size or
4526           smaller, breaking larger packets up into multiple fragments.
4527
4528           If zero a default MTU is used. Note that contrary to wg-quick's MTU
4529           setting, this does not take into account the current routes at the
4530           time of activation.
4531
4532           Format: uint32
4533
4534       peer-routes
4535           Whether to automatically add routes for the AllowedIPs ranges of
4536           the peers. If TRUE (the default), NetworkManager will automatically
4537           add routes in the routing tables according to ipv4.route-table and
4538           ipv6.route-table. Usually you want this automatism enabled. If
4539           FALSE, no such routes are added automatically. In this case, the
4540           user may want to configure static routes in ipv4.routes and
4541           ipv6.routes, respectively.
4542
4543           Note that if the peer's AllowedIPs is "0.0.0.0/0" or "::/0" and the
4544           profile's ipv4.never-default or ipv6.never-default setting is
4545           enabled, the peer route for this peer won't be added automatically.
4546
4547           Format: boolean
4548
4549       private-key
4550           The 256 bit private-key in base64 encoding.
4551
4552           Format: string
4553
4554       private-key-flags
4555           Flags indicating how to handle the "private-key" property.
4556
4557           Format: NMSettingSecretFlags (uint32)
4558
4559   802-11-wireless setting
4560       Alias: wifi
4561
4562       Wi-Fi Settings.
4563
4564       Properties:
4565
4566       ap-isolation
4567           Configures AP isolation, which prevents communication between
4568           wireless devices connected to this AP. This property can be set to
4569           a value different from NM_TERNARY_DEFAULT (-1) only when the
4570           interface is configured in AP mode.
4571
4572           If set to NM_TERNARY_TRUE (1), devices are not able to communicate
4573           with each other. This increases security because it protects
4574           devices against attacks from other clients in the network. At the
4575           same time, it prevents devices to access resources on the same
4576           wireless networks as file shares, printers, etc.
4577
4578           If set to NM_TERNARY_FALSE (0), devices can talk to each other.
4579
4580           When set to NM_TERNARY_DEFAULT (-1), the global default is used; in
4581           case the global default is unspecified it is assumed to be
4582           NM_TERNARY_FALSE (0).
4583
4584           Format: NMTernary (int32)
4585
4586       band
4587           802.11 frequency band of the network. One of "a" for 5GHz 802.11a
4588           or "bg" for 2.4GHz 802.11. This will lock associations to the Wi-Fi
4589           network to the specific band, i.e. if "a" is specified, the device
4590           will not associate with the same network in the 2.4GHz band even if
4591           the network's settings are compatible. This setting depends on
4592           specific driver capability and may not work with all drivers.
4593
4594           Format: string
4595
4596       bssid
4597           If specified, directs the device to only associate with the given
4598           access point. This capability is highly driver dependent and not
4599           supported by all devices. Note: this property does not control the
4600           BSSID used when creating an Ad-Hoc network and is unlikely to in
4601           the future.
4602
4603           Locking a client profile to a certain BSSID will prevent roaming
4604           and also disable background scanning. That can be useful, if there
4605           is only one access point for the SSID.
4606
4607           Format: byte array
4608
4609       channel
4610           Wireless channel to use for the Wi-Fi connection. The device will
4611           only join (or create for Ad-Hoc networks) a Wi-Fi network on the
4612           specified channel. Because channel numbers overlap between bands,
4613           this property also requires the "band" property to be set.
4614
4615           Format: uint32
4616
4617       cloned-mac-address
4618           Alias: cloned-mac
4619
4620           If specified, request that the device use this MAC address instead.
4621           This is known as MAC cloning or spoofing.
4622
4623           Beside explicitly specifying a MAC address, the special values
4624           "preserve", "permanent", "random" and "stable" are supported.
4625           "preserve" means not to touch the MAC address on activation.
4626           "permanent" means to use the permanent hardware address of the
4627           device. "random" creates a random MAC address on each connect.
4628           "stable" creates a hashed MAC address based on connection.stable-id
4629           and a machine dependent key.
4630
4631           If unspecified, the value can be overwritten via global defaults,
4632           see manual of NetworkManager.conf. If still unspecified, it
4633           defaults to "preserve" (older versions of NetworkManager may use a
4634           different default value).
4635
4636           On D-Bus, this field is expressed as "assigned-mac-address" or the
4637           deprecated "cloned-mac-address".
4638
4639           Format: byte array
4640
4641       generate-mac-address-mask
4642           With "cloned-mac-address" setting "random" or "stable", by default
4643           all bits of the MAC address are scrambled and a
4644           locally-administered, unicast MAC address is created. This property
4645           allows to specify that certain bits are fixed. Note that the least
4646           significant bit of the first MAC address will always be unset to
4647           create a unicast MAC address.
4648
4649           If the property is NULL, it is eligible to be overwritten by a
4650           default connection setting. If the value is still NULL or an empty
4651           string, the default is to create a locally-administered, unicast
4652           MAC address.
4653
4654           If the value contains one MAC address, this address is used as
4655           mask. The set bits of the mask are to be filled with the current
4656           MAC address of the device, while the unset bits are subject to
4657           randomization. Setting "FE:FF:FF:00:00:00" means to preserve the
4658           OUI of the current MAC address and only randomize the lower 3 bytes
4659           using the "random" or "stable" algorithm.
4660
4661           If the value contains one additional MAC address after the mask,
4662           this address is used instead of the current MAC address to fill the
4663           bits that shall not be randomized. For example, a value of
4664           "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set the OUI of the MAC
4665           address to 68:F7:28, while the lower bits are randomized. A value
4666           of "02:00:00:00:00:00 00:00:00:00:00:00" will create a fully
4667           scrambled globally-administered, burned-in MAC address.
4668
4669           If the value contains more than one additional MAC addresses, one
4670           of them is chosen randomly. For example, "02:00:00:00:00:00
4671           00:00:00:00:00:00 02:00:00:00:00:00" will create a fully scrambled
4672           MAC address, randomly locally or globally administered.
4673
4674           Format: string
4675
4676       hidden
4677           If TRUE, indicates that the network is a non-broadcasting network
4678           that hides its SSID. This works both in infrastructure and AP mode.
4679
4680           In infrastructure mode, various workarounds are used for a more
4681           reliable discovery of hidden networks, such as probe-scanning the
4682           SSID. However, these workarounds expose inherent insecurities with
4683           hidden SSID networks, and thus hidden SSID networks should be used
4684           with caution.
4685
4686           In AP mode, the created network does not broadcast its SSID.
4687
4688           Note that marking the network as hidden may be a privacy issue for
4689           you (in infrastructure mode) or client stations (in AP mode), as
4690           the explicit probe-scans are distinctly recognizable on the air.
4691
4692           Format: boolean
4693
4694       mac-address
4695           Alias: mac
4696
4697           If specified, this connection will only apply to the Wi-Fi device
4698           whose permanent MAC address matches. This property does not change
4699           the MAC address of the device (i.e. MAC spoofing).
4700
4701           Format: byte array
4702
4703       mac-address-blacklist
4704           A list of permanent MAC addresses of Wi-Fi devices to which this
4705           connection should never apply. Each MAC address should be given in
4706           the standard hex-digits-and-colons notation (eg
4707           "00:11:22:33:44:55").
4708
4709           Format: array of string
4710
4711       mac-address-randomization
4712           One of NM_SETTING_MAC_RANDOMIZATION_DEFAULT (0) (never randomize
4713           unless the user has set a global default to randomize and the
4714           supplicant supports randomization),
4715           NM_SETTING_MAC_RANDOMIZATION_NEVER (1) (never randomize the MAC
4716           address), or NM_SETTING_MAC_RANDOMIZATION_ALWAYS (2) (always
4717           randomize the MAC address).
4718
4719           This property is deprecated since version 1.4. Use the
4720           "cloned-mac-address" property instead.
4721
4722           Format: uint32
4723
4724       mode
4725           Alias: mode
4726
4727           Wi-Fi network mode; one of "infrastructure", "mesh", "adhoc" or
4728           "ap". If blank, infrastructure is assumed.
4729
4730           Format: string
4731
4732       mtu
4733           Alias: mtu
4734
4735           If non-zero, only transmit packets of the specified size or
4736           smaller, breaking larger packets up into multiple Ethernet frames.
4737
4738           Format: uint32
4739
4740       powersave
4741           One of NM_SETTING_WIRELESS_POWERSAVE_DISABLE (2) (disable Wi-Fi
4742           power saving), NM_SETTING_WIRELESS_POWERSAVE_ENABLE (3) (enable
4743           Wi-Fi power saving), NM_SETTING_WIRELESS_POWERSAVE_IGNORE (1)
4744           (don't touch currently configure setting) or
4745           NM_SETTING_WIRELESS_POWERSAVE_DEFAULT (0) (use the globally
4746           configured value). All other values are reserved.
4747
4748           Format: uint32
4749
4750       rate
4751           If non-zero, directs the device to only use the specified bitrate
4752           for communication with the access point. Units are in Kb/s, ie 5500
4753           = 5.5 Mbit/s. This property is highly driver dependent and not all
4754           devices support setting a static bitrate.
4755
4756           Format: uint32
4757
4758       seen-bssids
4759           A list of BSSIDs (each BSSID formatted as a MAC address like
4760           "00:11:22:33:44:55") that have been detected as part of the Wi-Fi
4761           network. NetworkManager internally tracks previously seen BSSIDs.
4762           The property is only meant for reading and reflects the BSSID list
4763           of NetworkManager. The changes you make to this property will not
4764           be preserved.
4765
4766           Format: array of string
4767
4768       ssid
4769           Alias: ssid
4770
4771           SSID of the Wi-Fi network. Must be specified.
4772
4773           Format: byte array
4774
4775       tx-power
4776           If non-zero, directs the device to use the specified transmit
4777           power. Units are dBm. This property is highly driver dependent and
4778           not all devices support setting a static transmit power.
4779
4780           Format: uint32
4781
4782       wake-on-wlan
4783           The NMSettingWirelessWakeOnWLan options to enable. Not all devices
4784           support all options. May be any combination of
4785           NM_SETTING_WIRELESS_WAKE_ON_WLAN_ANY (0x2),
4786           NM_SETTING_WIRELESS_WAKE_ON_WLAN_DISCONNECT (0x4),
4787           NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC (0x8),
4788           NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE (0x10),
4789           NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST (0x20),
4790           NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE (0x40),
4791           NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE (0x80),
4792           NM_SETTING_WIRELESS_WAKE_ON_WLAN_TCP (0x100) or the special values
4793           NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT (0x1) (to use global
4794           settings) and NM_SETTING_WIRELESS_WAKE_ON_WLAN_IGNORE (0x8000) (to
4795           disable management of Wake-on-LAN in NetworkManager).
4796
4797           Format: uint32
4798
4799   802-11-wireless-security setting
4800       Alias: wifi-sec
4801
4802       Wi-Fi Security Settings.
4803
4804       Properties:
4805
4806       auth-alg
4807           When WEP is used (ie, key-mgmt = "none" or "ieee8021x") indicate
4808           the 802.11 authentication algorithm required by the AP here. One of
4809           "open" for Open System, "shared" for Shared Key, or "leap" for
4810           Cisco LEAP. When using Cisco LEAP (ie, key-mgmt = "ieee8021x" and
4811           auth-alg = "leap") the "leap-username" and "leap-password"
4812           properties must be specified.
4813
4814           Format: string
4815
4816       fils
4817           Indicates whether Fast Initial Link Setup (802.11ai) must be
4818           enabled for the connection. One of
4819           NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) (use global default
4820           value), NM_SETTING_WIRELESS_SECURITY_FILS_DISABLE (1) (disable
4821           FILS), NM_SETTING_WIRELESS_SECURITY_FILS_OPTIONAL (2) (enable FILS
4822           if the supplicant and the access point support it) or
4823           NM_SETTING_WIRELESS_SECURITY_FILS_REQUIRED (3) (enable FILS and
4824           fail if not supported). When set to
4825           NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) and no global default
4826           is set, FILS will be optionally enabled.
4827
4828           Format: int32
4829
4830       group
4831           A list of group/broadcast encryption algorithms which prevents
4832           connections to Wi-Fi networks that do not utilize one of the
4833           algorithms in the list. For maximum compatibility leave this
4834           property empty. Each list element may be one of "wep40", "wep104",
4835           "tkip", or "ccmp".
4836
4837           Format: array of string
4838
4839       key-mgmt
4840           Key management used for the connection. One of "none" (WEP or no
4841           password protection), "ieee8021x" (Dynamic WEP), "owe"
4842           (Opportunistic Wireless Encryption), "wpa-psk" (WPA2 + WPA3
4843           personal), "sae" (WPA3 personal only), "wpa-eap" (WPA2 + WPA3
4844           enterprise) or "wpa-eap-suite-b-192" (WPA3 enterprise only).
4845
4846           This property must be set for any Wi-Fi connection that uses
4847           security.
4848
4849           Format: string
4850
4851       leap-password
4852           The login password for legacy LEAP connections (ie, key-mgmt =
4853           "ieee8021x" and auth-alg = "leap").
4854
4855           Format: string
4856
4857       leap-password-flags
4858           Flags indicating how to handle the "leap-password" property.
4859
4860           Format: NMSettingSecretFlags (uint32)
4861
4862       leap-username
4863           The login username for legacy LEAP connections (ie, key-mgmt =
4864           "ieee8021x" and auth-alg = "leap").
4865
4866           Format: string
4867
4868       pairwise
4869           A list of pairwise encryption algorithms which prevents connections
4870           to Wi-Fi networks that do not utilize one of the algorithms in the
4871           list. For maximum compatibility leave this property empty. Each
4872           list element may be one of "tkip" or "ccmp".
4873
4874           Format: array of string
4875
4876       pmf
4877           Indicates whether Protected Management Frames (802.11w) must be
4878           enabled for the connection. One of
4879           NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) (use global default
4880           value), NM_SETTING_WIRELESS_SECURITY_PMF_DISABLE (1) (disable PMF),
4881           NM_SETTING_WIRELESS_SECURITY_PMF_OPTIONAL (2) (enable PMF if the
4882           supplicant and the access point support it) or
4883           NM_SETTING_WIRELESS_SECURITY_PMF_REQUIRED (3) (enable PMF and fail
4884           if not supported). When set to
4885           NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) and no global default
4886           is set, PMF will be optionally enabled.
4887
4888           Format: int32
4889
4890       proto
4891           List of strings specifying the allowed WPA protocol versions to
4892           use. Each element may be one "wpa" (allow WPA) or "rsn" (allow
4893           WPA2/RSN). If not specified, both WPA and RSN connections are
4894           allowed.
4895
4896           Format: array of string
4897
4898       psk
4899           Pre-Shared-Key for WPA networks. For WPA-PSK, it's either an ASCII
4900           passphrase of 8 to 63 characters that is (as specified in the
4901           802.11i standard) hashed to derive the actual key, or the key in
4902           form of 64 hexadecimal character. The WPA3-Personal networks use a
4903           passphrase of any length for SAE authentication.
4904
4905           Format: string
4906
4907       psk-flags
4908           Flags indicating how to handle the "psk" property.
4909
4910           Format: NMSettingSecretFlags (uint32)
4911
4912       wep-key-flags
4913           Flags indicating how to handle the "wep-key0", "wep-key1",
4914           "wep-key2", and "wep-key3" properties.
4915
4916           Format: NMSettingSecretFlags (uint32)
4917
4918       wep-key-type
4919           Controls the interpretation of WEP keys. Allowed values are
4920           NM_WEP_KEY_TYPE_KEY (1), in which case the key is either a 10- or
4921           26-character hexadecimal string, or a 5- or 13-character ASCII
4922           password; or NM_WEP_KEY_TYPE_PASSPHRASE (2), in which case the
4923           passphrase is provided as a string and will be hashed using the
4924           de-facto MD5 method to derive the actual WEP key.
4925
4926           Format: NMWepKeyType (uint32)
4927
4928       wep-key0
4929           Index 0 WEP key. This is the WEP key used in most networks. See the
4930           "wep-key-type" property for a description of how this key is
4931           interpreted.
4932
4933           Format: string
4934
4935       wep-key1
4936           Index 1 WEP key. This WEP index is not used by most networks. See
4937           the "wep-key-type" property for a description of how this key is
4938           interpreted.
4939
4940           Format: string
4941
4942       wep-key2
4943           Index 2 WEP key. This WEP index is not used by most networks. See
4944           the "wep-key-type" property for a description of how this key is
4945           interpreted.
4946
4947           Format: string
4948
4949       wep-key3
4950           Index 3 WEP key. This WEP index is not used by most networks. See
4951           the "wep-key-type" property for a description of how this key is
4952           interpreted.
4953
4954           Format: string
4955
4956       wep-tx-keyidx
4957           When static WEP is used (ie, key-mgmt = "none") and a non-default
4958           WEP key index is used by the AP, put that WEP key index here. Valid
4959           values are 0 (default key) through 3. Note that some consumer
4960           access points (like the Linksys WRT54G) number the keys 1 - 4.
4961
4962           Format: uint32
4963
4964       wps-method
4965           Flags indicating which mode of WPS is to be used if any.
4966
4967           There's little point in changing the default setting as
4968           NetworkManager will automatically determine whether it's feasible
4969           to start WPS enrollment from the Access Point capabilities.
4970
4971           WPS can be disabled by setting this property to a value of 1.
4972
4973           Format: uint32
4974
4975   wpan setting
4976       IEEE 802.15.4 (WPAN) MAC Settings.
4977
4978       Properties:
4979
4980       channel
4981           Alias: channel
4982
4983           IEEE 802.15.4 channel. A positive integer or -1, meaning "do not
4984           set, use whatever the device is already set to".
4985
4986           Format: int32
4987
4988       mac-address
4989           Alias: mac
4990
4991           If specified, this connection will only apply to the IEEE 802.15.4
4992           (WPAN) MAC layer device whose permanent MAC address matches.
4993
4994           Format: string
4995
4996       page
4997           Alias: page
4998
4999           IEEE 802.15.4 channel page. A positive integer or -1, meaning "do
5000           not set, use whatever the device is already set to".
5001
5002           Format: int32
5003
5004       pan-id
5005           Alias: pan-id
5006
5007           IEEE 802.15.4 Personal Area Network (PAN) identifier.
5008
5009           Format: uint32
5010
5011       short-address
5012           Alias: short-addr
5013
5014           Short IEEE 802.15.4 address to be used within a restricted
5015           environment.
5016
5017           Format: uint32
5018
5019   bond-port setting
5020       Bond Port Settings.
5021
5022       Properties:
5023
5024       prio
5025           Alias: prio
5026
5027           The port priority for bond active port re-selection during
5028           failover. A higher number means a higher priority in selection. The
5029           primary port has the highest priority. This option is only
5030           compatible with active-backup, balance-tlb and balance-alb modes.
5031
5032           Format: int32
5033
5034       queue-id
5035           Alias: queue-id
5036
5037           The queue ID of this bond port. The maximum value of queue ID is
5038           the number of TX queues currently active in device.
5039
5040           Format: uint32
5041
5042   hostname setting
5043       Hostname settings.
5044
5045       Properties:
5046
5047       from-dhcp
5048           Whether the system hostname can be determined from DHCP on this
5049           connection.
5050
5051           When set to NM_TERNARY_DEFAULT (-1), the value from global
5052           configuration is used. If the property doesn't have a value in the
5053           global configuration, NetworkManager assumes the value to be
5054           NM_TERNARY_TRUE (1).
5055
5056           Format: NMTernary (int32)
5057
5058       from-dns-lookup
5059           Whether the system hostname can be determined from reverse DNS
5060           lookup of addresses on this device.
5061
5062           When set to NM_TERNARY_DEFAULT (-1), the value from global
5063           configuration is used. If the property doesn't have a value in the
5064           global configuration, NetworkManager assumes the value to be
5065           NM_TERNARY_TRUE (1).
5066
5067           Format: NMTernary (int32)
5068
5069       only-from-default
5070           If set to NM_TERNARY_TRUE (1), NetworkManager attempts to get the
5071           hostname via DHCPv4/DHCPv6 or reverse DNS lookup on this device
5072           only when the device has the default route for the given address
5073           family (IPv4/IPv6).
5074
5075           If set to NM_TERNARY_FALSE (0), the hostname can be set from this
5076           device even if it doesn't have the default route.
5077
5078           When set to NM_TERNARY_DEFAULT (-1), the value from global
5079           configuration is used. If the property doesn't have a value in the
5080           global configuration, NetworkManager assumes the value to be
5081           NM_TERNARY_FALSE (0).
5082
5083           Format: NMTernary (int32)
5084
5085       priority
5086           The relative priority of this connection to determine the system
5087           hostname. A lower numerical value is better (higher priority). A
5088           connection with higher priority is considered before connections
5089           with lower priority.
5090
5091           If the value is zero, it can be overridden by a global value from
5092           NetworkManager configuration. If the property doesn't have a value
5093           in the global configuration, the value is assumed to be 100.
5094
5095           Negative values have the special effect of excluding other
5096           connections with a greater numerical priority value; so in presence
5097           of at least one negative priority, only connections with the lowest
5098           priority value will be used to determine the hostname.
5099
5100           Format: int32
5101
5102   loopback setting
5103       Loopback Link Settings.
5104
5105       Properties:
5106
5107       mtu
5108           Alias: mtu
5109
5110           If non-zero, only transmit packets of the specified size or
5111           smaller, breaking larger packets up into multiple Ethernet frames.
5112
5113           Format: uint32
5114
5115   veth setting
5116       Veth Settings.
5117
5118       Properties:
5119
5120       peer
5121           Alias: peer
5122
5123           This property specifies the peer interface name of the veth. This
5124           property is mandatory.
5125
5126           Format: string
5127
5128   Secret flag types:
5129       Each password or secret property in a setting has an associated flags
5130       property that describes how to handle that secret. The flags property
5131       is a bitfield that contains zero or more of the following values
5132       logically OR-ed together.
5133
5134       •   0x0 (none) - the system is responsible for providing and storing
5135           this secret. This may be required so that secrets are already
5136           available before the user logs in. It also commonly means that the
5137           secret will be stored in plain text on disk, accessible to root
5138           only. For example via the keyfile settings plugin as described in
5139           the "PLUGINS" section in NetworkManager.conf(5).
5140
5141       •   0x1 (agent-owned) - a user-session secret agent is responsible for
5142           providing and storing this secret; when it is required, agents will
5143           be asked to provide it.
5144
5145       •   0x2 (not-saved) - this secret should not be saved but should be
5146           requested from the user each time it is required. This flag should
5147           be used for One-Time-Pad secrets, PIN codes from hardware tokens,
5148           or if the user simply does not want to save the secret.
5149
5150       •   0x4 (not-required) - in some situations it cannot be automatically
5151           determined that a secret is required or not. This flag hints that
5152           the secret is not required and should not be requested from the
5153           user.
5154

FILES

5156       /etc/NetworkManager/system-connections or distro plugin-specific
5157       location
5158

SEE ALSO

5160       nmcli(1), nmcli-examples(7), NetworkManager(8), nm-settings-dbus(5),
5161       nm-settings-keyfile(5), NetworkManager.conf(5)
5162
5163
5164
5165NetworkManager 1.42.8                                     NM-SETTINGS-NMCLI(5)
Impressum