6c2a295245
A year of testing in the cerowrt project shows not using timestamps to be a very bad idea in nearly any TCP at speeds above a few Mbit. Lastly sack/dsack help on recovery from larger amounts of packet loss. SVN-Revision: 32513
33 lines
1.0 KiB
Plaintext
33 lines
1.0 KiB
Plaintext
kernel.panic=3
|
|
net.ipv4.conf.default.arp_ignore=1
|
|
net.ipv4.conf.all.arp_ignore=1
|
|
net.ipv4.ip_forward=1
|
|
net.ipv4.icmp_echo_ignore_broadcasts=1
|
|
net.ipv4.icmp_ignore_bogus_error_responses=1
|
|
net.ipv4.tcp_ecn=0
|
|
net.ipv4.tcp_fin_timeout=30
|
|
net.ipv4.tcp_keepalive_time=120
|
|
net.ipv4.tcp_syncookies=1
|
|
net.ipv4.tcp_timestamps=1
|
|
net.ipv4.tcp_sack=1
|
|
net.ipv4.tcp_dsack=1
|
|
|
|
net.ipv4.netfilter.ip_conntrack_checksum=0
|
|
net.ipv4.netfilter.ip_conntrack_max=16384
|
|
net.ipv4.netfilter.ip_conntrack_tcp_timeout_established=3600
|
|
net.ipv4.netfilter.ip_conntrack_udp_timeout=60
|
|
net.ipv4.netfilter.ip_conntrack_udp_timeout_stream=180
|
|
net.ipv6.conf.all.forwarding=1
|
|
|
|
net.netfilter.nf_conntrack_acct=1
|
|
net.netfilter.nf_conntrack_checksum=0
|
|
net.netfilter.nf_conntrack_max=16384
|
|
net.netfilter.nf_conntrack_tcp_timeout_established=3600
|
|
net.netfilter.nf_conntrack_udp_timeout=60
|
|
net.netfilter.nf_conntrack_udp_timeout_stream=180
|
|
|
|
# disable bridge firewalling by default
|
|
net.bridge.bridge-nf-call-arptables=0
|
|
net.bridge.bridge-nf-call-ip6tables=0
|
|
net.bridge.bridge-nf-call-iptables=0
|