Lines Matching +full:per +full:- +full:port +full:- +full:set

3 .\" Copyright (c) 2010-2011 The FreeBSD Foundation
50 protocol provides reliable, flow-controlled, two-way
52 It is a byte-stream protocol used to
58 Internet address format and, in addition, provides a per-host
60 .Dq "port addresses" .
65 port on the host identifying the peer entity.
105 port may still be specified
106 at this time; if the port is not specified, the system will assign one.
115 supports a number of socket options which can be set with
119 .Bl -tag -width ".Dv TCP_FUNCTION_BLK"
122 by passing the read-only option
136 bandwidth-controlled window space.
154 This option can be set on the socket either before or after the
157 Clearing this option on a listen socket after it has been set has no effect on
161 For passively-created sockets, the
167 but that fall back to using a non-TFO
171 socket option set.
174 pre-shared key (PSK) mode of operation in which the TFO server requires the
184 requires the client-supplied cookie to equal
185 .Bd -literal -offset left
186 SipHash24(key=\fI16-byte-psk\fP, msg=\fIcookie-sent-to-client\fP)
189 Multiple concurrent valid pre-shared keys are supported so that time-based
191 The default number of concurrent pre-shared keys is 2.
197 Select or query the set of functions that TCP will use for this connection.
204 TCP sockets are FIB-aware.
218 tunable is set to 0, a listening socket will only accept connections
222 listening socket for the destination address and port.
224 the same address and port so long as they belong to different FIBs, similar to
228 If the tunable is set to 0, all sockets added to a load-balancing group created
242 option accepts a per-socket timeout argument of
244 in seconds, for new, non-established
260 If set on a listening socket, the value is inherited by the newly created
273 to set the per-socket interval, in seconds, between keepalive probes sent
275 If set on a listening socket, the value is inherited by the newly created
288 and allows a per-socket tuning of the number of probes sent, with no response,
290 If set on a listening socket, the value is inherited by the newly created
313 By default, a sender- and
314 .No receiver- Ns Tn TCP
326 to set the per-socket interval, in seconds, in which the connection must
328 the set time period. If a connection fails to make progress, then the
342 option use on a per-connection basis.
345 .No sender- Ns Tn TCP
346 will set the
353 When this option is set to a non-zero value,
358 This option enables the use of MD5 digests (also known as TCP-MD5)
372 administrator to add a tcp-md5 key entry to the system's security
376 This entry can only be specified on a per-host basis at this time.
380 However, during connection negotiation, a non-signed segment will be accepted if
382 When a non-signed segment is accepted, the established connection is not
391 Enable in-kernel Transport Layer Security (TLS) for data written to this
397 The integer argument can be used to get or set the current TLS transmit mode
403 Enable in-kernel TLS for data read from this socket.
413 .Bl -tag -width "Dv TCP_REUSPORT_LB_NUMA"
423 Set and get the remote UDP encapsulation port.
424 It can only be set on a closed TCP socket.
444 Incoming connection requests that are source-routed are noted,
463 .Bl -tag -width ".Va v6pmtud_blackhole_mss"
466 the number of challenge ACKs sent per TCP connection to
478 is set on all
485 to a port where there is no socket accepting connections.
519 Drop TCP packets with both SYN and FIN set.
524 .Bl -tag -compact
558 When non-zero, all client-supplied TFO cookies will be considered to be valid.
563 are non-zero, a new key will be automatically generated after this specified
576 Read-only.
585 Read-only.
595 Read-only.
598 Read-only,
600 The maximum number of pre-shared keys supported.
601 Read-only.
604 Read-only.
606 The current number of pre-shared keys installed.
607 Read-only.
612 will be forced to be non-TFO for this many seconds.
620 When non-zero, pre-shared key (PSK) mode is enabled for all TFO servers.
621 On the transition from enabled to disabled, all installed pre-shared keys are
626 On the transition from enabled to disabled, all installed keys and pre-shared
630 is non-zero and there are no keys installed, a new key will be generated
640 Install a new pre-shared key by writing
677 .Bl -tag -compact
701 Any non-zero setting will be reset to zero, once the purge
703 .Bl -tag -compact
712 Immediately purge all entries once set to any value.
718 .Tn SYN-SENT
728 Start with small values for lower-capacity links.
743 By default, this variable is set to zero, indicating that
757 Timeout, in milliseconds, for new, non-established
798 That prevents self-inflicted packet losses once the application starts to
815 (read-only).
823 A CSV list of template_spec=percent key-value pairs which controls the per
840 it will be set to this value, otherwise,
841 the MSS will be set to the default values
847 .Bl -tag -compact
866 the system-calculated automatic limit and the user-specified
890 A new connection starts with timer set to
897 (smoothed round-trip time)
909 For this reason, we use 200ms of slop and a near-0
922 .Bl -tag -compact
937 Enable support for RFC 3390, which allows for a variable-sized
941 particularly affects short transfers and high-bandwidth large
942 propagation-delay connections.
951 Maximum number of SACK holes per system, across all connections.
954 Enable Lost Retransmission Detection for SACK-enabled sessions, enabled by
957 mandatory Retransmission Timeout (RTO), followed by slow-start.
958 LRD will try to resend the repeatedly lost packet, preventing the time-consuming
959 RTO and performance reducing slow-start or purge of the SACK scoreboard.
961 Maximum number of SACK holes per connection.
973 SACKed - even if no traditional duplicate ACKs were observed.
1001 .Tn SYN-ACK
1015 control-block hash table
1016 (read-only).
1035 When initializing the TCP timestamps, use a per connection offset instead of a
1037 Default is to use per connection offsets as recommended in RFC 7323.
1047 The local UDP encapsulation port.
1061 .Bl -tag -width Er
1077 no process is listening to the port);
1080 is made to create a socket with a port which has already been
1144 .%T "Improving TCP's Robustness to Blind In-Window Attacks"