]> git.ipfire.org Git - thirdparty/systemd.git/blame - man/systemd.netdev.xml
architecture: Add support for the RISC-V architecture. (#4305)
[thirdparty/systemd.git] / man / systemd.netdev.xml
CommitLineData
eac684ef
TG
1<?xml version='1.0'?> <!--*-nxml-*-->
2<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
12b42c76 3 "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
eac684ef
TG
4
5<!--
6 This file is part of systemd.
7
8 Copyright 2013 Tom Gundersen
9
10 systemd is free software; you can redistribute it and/or modify it
11 under the terms of the GNU Lesser General Public License as published by
12 the Free Software Foundation; either version 2.1 of the License, or
13 (at your option) any later version.
14
15 systemd is distributed in the hope that it will be useful, but
16 WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 Lesser General Public License for more details.
19
20 You should have received a copy of the GNU Lesser General Public License
21 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22-->
23
24<refentry id="systemd.netdev" conditional='ENABLE_NETWORKD'>
25
798d3a52
ZJS
26 <refentryinfo>
27 <title>systemd.network</title>
28 <productname>systemd</productname>
29
30 <authorgroup>
31 <author>
32 <contrib>Developer</contrib>
33 <firstname>Tom</firstname>
34 <surname>Gundersen</surname>
35 <email>teg@jklm.no</email>
36 </author>
37 </authorgroup>
38 </refentryinfo>
39
40 <refmeta>
41 <refentrytitle>systemd.netdev</refentrytitle>
42 <manvolnum>5</manvolnum>
43 </refmeta>
44
45 <refnamediv>
46 <refname>systemd.netdev</refname>
47 <refpurpose>Virtual Network Device configuration</refpurpose>
48 </refnamediv>
49
50 <refsynopsisdiv>
51 <para><filename><replaceable>netdev</replaceable>.netdev</filename></para>
52 </refsynopsisdiv>
53
54 <refsect1>
55 <title>Description</title>
56
57 <para>Network setup is performed by
58 <citerefentry><refentrytitle>systemd-networkd</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
59 </para>
60
bac150e9
ZJS
61 <para>The main Virtual Network Device file must have the extension <filename>.netdev</filename>;
62 other extensions are ignored. Virtual network devices are created as soon as networkd is
63 started. If a netdev with the specified name already exists, networkd will use that as-is rather
64 than create its own. Note that the settings of the pre-existing netdev will not be changed by
798d3a52
ZJS
65 networkd.</para>
66
bac150e9
ZJS
67 <para>The <filename>.netdev</filename> files are read from the files located in the system
68 network directory <filename>/usr/lib/systemd/network</filename>, the volatile runtime network
69 directory <filename>/run/systemd/network</filename> and the local administration network
70 directory <filename>/etc/systemd/network</filename>. All configuration files are collectively
71 sorted and processed in lexical order, regardless of the directories in which they live.
72 However, files with identical filenames replace each other. Files in <filename>/etc</filename>
73 have the highest priority, files in <filename>/run</filename> take precedence over files with
74 the same name in <filename>/usr/lib</filename>. This can be used to override a system-supplied
75 configuration file with a local file if needed. As a special case, an empty file (file size 0)
76 or symlink with the same name pointing to <filename>/dev/null</filename> disables the
77 configuration file entirely (it is "masked").</para>
78
79 <para>Along with the netdev file <filename>foo.netdev</filename>, a "drop-in" directory
80 <filename>foo.netdev.d/</filename> may exist. All files with the suffix <literal>.conf</literal>
81 from this directory will be parsed after the file itself is parsed. This is useful to alter or
82 add configuration settings, without having to modify the main configuration file. Each drop-in
83 file must have appropriate section headers.</para>
84
85 <para>In addition to <filename>/etc/systemd/network</filename>, drop-in <literal>.d</literal>
86 directories can be placed in <filename>/usr/lib/systemd/network</filename> or
87 <filename>/run/systemd/network</filename> directories. Drop-in files in
88 <filename>/etc</filename> take precedence over those in <filename>/run</filename> which in turn
89 take precedence over those in <filename>/usr/lib</filename>. Drop-in files under any of these
90 directories take precedence over the main netdev file wherever located. (Of course, since
91 <filename>/run</filename> is temporary and <filename>/usr/lib</filename> is for vendors, it is
92 unlikely drop-ins should be used in either of those places.)</para>
798d3a52
ZJS
93 </refsect1>
94
95 <refsect1>
96 <title>Supported netdev kinds</title>
97
98 <para>The following kinds of virtual network devices may be
99 configured in <filename>.netdev</filename> files:</para>
100
101 <table>
102 <title>Supported kinds of virtual network devices</title>
103
104 <tgroup cols='2'>
105 <colspec colname='kind' />
106 <colspec colname='explanation' />
107 <thead><row>
108 <entry>Kind</entry>
109 <entry>Description</entry>
110 </row></thead>
111 <tbody>
112 <row><entry><varname>bond</varname></entry>
113 <entry>A bond device is an aggregation of all its slave devices. See <ulink url="https://www.kernel.org/doc/Documentation/networking/bonding.txt">Linux Ethernet Bonding Driver HOWTO</ulink> for details.Local configuration</entry></row>
114
115 <row><entry><varname>bridge</varname></entry>
a8eaaee7 116 <entry>A bridge device is a software switch, and each of its slave devices and the bridge itself are ports of the switch.</entry></row>
798d3a52
ZJS
117
118 <row><entry><varname>dummy</varname></entry>
119 <entry>A dummy device drops all packets sent to it.</entry></row>
120
121 <row><entry><varname>gre</varname></entry>
122 <entry>A Level 3 GRE tunnel over IPv4. See <ulink url="https://tools.ietf.org/html/rfc2784">RFC 2784</ulink> for details.</entry></row>
123
124 <row><entry><varname>gretap</varname></entry>
125 <entry>A Level 2 GRE tunnel over IPv4.</entry></row>
126
127 <row><entry><varname>ip6gre</varname></entry>
128 <entry>A Level 3 GRE tunnel over IPv6.</entry></row>
129
130 <row><entry><varname>ip6tnl</varname></entry>
131 <entry>An IPv4 or IPv6 tunnel over IPv6</entry></row>
132
133 <row><entry><varname>ip6gretap</varname></entry>
037a3ded 134 <entry>A Level 2 GRE tunnel over IPv6.</entry></row>
798d3a52
ZJS
135
136 <row><entry><varname>ipip</varname></entry>
137 <entry>An IPv4 over IPv4 tunnel.</entry></row>
138
139 <row><entry><varname>ipvlan</varname></entry>
140 <entry>An ipvlan device is a stacked device which receives packets from its underlying device based on IP address filtering.</entry></row>
141
142 <row><entry><varname>macvlan</varname></entry>
143 <entry>A macvlan device is a stacked device which receives packets from its underlying device based on MAC address filtering.</entry></row>
144
0371f2df
SS
145 <row><entry><varname>macvtap</varname></entry>
146 <entry>A macvtap device is a stacked device which receives packets from its underlying device based on MAC address filtering.</entry></row>
147
798d3a52
ZJS
148 <row><entry><varname>sit</varname></entry>
149 <entry>An IPv6 over IPv4 tunnel.</entry></row>
150
151 <row><entry><varname>tap</varname></entry>
152 <entry>A persistent Level 2 tunnel between a network device and a device node.</entry></row>
153
154 <row><entry><varname>tun</varname></entry>
155 <entry>A persistent Level 3 tunnel between a network device and a device node.</entry></row>
156
157 <row><entry><varname>veth</varname></entry>
a8eaaee7 158 <entry>An Ethernet tunnel between a pair of network devices.</entry></row>
798d3a52
ZJS
159
160 <row><entry><varname>vlan</varname></entry>
161 <entry>A VLAN is a stacked device which receives packets from its underlying device based on VLAN tagging. See <ulink url="http://www.ieee802.org/1/pages/802.1Q.html">IEEE 802.1Q</ulink> for details.</entry></row>
162
163 <row><entry><varname>vti</varname></entry>
164 <entry>An IPv4 over IPSec tunnel.</entry></row>
165
5cc0748e
SS
166 <row><entry><varname>vti6</varname></entry>
167 <entry>An IPv6 over IPSec tunnel.</entry></row>
168
798d3a52
ZJS
169 <row><entry><varname>vxlan</varname></entry>
170 <entry>A virtual extensible LAN (vxlan), for connecting Cloud computing deployments.</entry></row>
20897a0d
AR
171
172 <row><entry><varname>vrf</varname></entry>
92c918b0
SS
173 <entry>A Virtual Routing and Forwarding (<ulink url="https://www.kernel.org/doc/Documentation/networking/vrf.txt">VRF</ulink>) interface to create separate routing and forwarding domains.</entry></row>
174
175 <row><entry><varname>vcan</varname></entry>
ba9fa3bc 176 <entry>The virtual CAN driver (vcan). Similar to the network loopback devices, vcan offers a virtual local CAN interface.</entry></row>
20897a0d 177
798d3a52
ZJS
178 </tbody>
179 </tgroup>
180 </table>
181
182 </refsect1>
183
184 <refsect1>
185 <title>[Match] Section Options</title>
186
187 <para>A virtual network device is only created if the
188 <literal>[Match]</literal> section matches the current
189 environment, or if the section is empty. The following keys are
190 accepted:</para>
191
192 <variablelist class='network-directives'>
193 <varlistentry>
194 <term><varname>Host=</varname></term>
195 <listitem>
196 <para>Matches against the hostname or machine ID of the
197 host. See <literal>ConditionHost=</literal> in
198 <citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry>
199 for details.
200 </para>
201 </listitem>
202 </varlistentry>
203 <varlistentry>
204 <term><varname>Virtualization=</varname></term>
205 <listitem>
206 <para>Checks whether the system is executed in a virtualized
207 environment and optionally test whether it is a specific
208 implementation. See
209 <literal>ConditionVirtualization=</literal> in
210 <citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry>
211 for details.
212 </para>
213 </listitem>
214 </varlistentry>
215 <varlistentry>
216 <term><varname>KernelCommandLine=</varname></term>
217 <listitem>
218 <para>Checks whether a specific kernel command line option
219 is set (or if prefixed with the exclamation mark unset). See
220 <literal>ConditionKernelCommandLine=</literal> in
221 <citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry>
222 for details.
223 </para>
224 </listitem>
225 </varlistentry>
226 <varlistentry>
227 <term><varname>Architecture=</varname></term>
228 <listitem>
229 <para>Checks whether the system is running on a specific
230 architecture. See <literal>ConditionArchitecture=</literal> in
231 <citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry>
232 for details.
233 </para>
234 </listitem>
235 </varlistentry>
236 </variablelist>
237
238 </refsect1>
239
240 <refsect1>
241 <title>[NetDev] Section Options</title>
242
243 <para>The <literal>[NetDev]</literal> section accepts the
244 following keys:</para>
245
246 <variablelist class='network-directives'>
247 <varlistentry>
248 <term><varname>Description=</varname></term>
249 <listitem>
250 <para>A free-form description of the netdev.</para>
251 </listitem>
252 </varlistentry>
253 <varlistentry>
254 <term><varname>Name=</varname></term>
255 <listitem>
256 <para>The interface name used when creating the netdev.
257 This option is compulsory.</para>
258 </listitem>
259 </varlistentry>
260 <varlistentry>
261 <term><varname>Kind=</varname></term>
262 <listitem>
263 <para>The netdev kind. This option is compulsory. See the
264 <literal>Supported netdev kinds</literal> section for the
265 valid keys.</para>
266 </listitem>
267 </varlistentry>
268 <varlistentry>
269 <term><varname>MTUBytes=</varname></term>
270 <listitem>
271 <para>The maximum transmission unit in bytes to set for
272 the device. The usual suffixes K, M, G, are supported and
273 are understood to the base of 1024. This key is not
ff9b60f3 274 currently supported for <literal>tun</literal> or
798d3a52
ZJS
275 <literal>tap</literal> devices.
276 </para>
277 </listitem>
278 </varlistentry>
279 <varlistentry>
280 <term><varname>MACAddress=</varname></term>
281 <listitem>
282 <para>The MAC address to use for the device. If none is
283 given, one is generated based on the interface name and
284 the
285 <citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
ff9b60f3 286 This key is not currently supported for
798d3a52
ZJS
287 <literal>tun</literal> or <literal>tap</literal> devices.
288 </para>
289 </listitem>
290 </varlistentry>
291 </variablelist>
292 </refsect1>
293
3428fe07
SS
294 <refsect1>
295 <title>[Bridge] Section Options</title>
296
297 <para>The <literal>[Bridge]</literal> section only applies for
298 netdevs of kind <literal>bridge</literal>, and accepts the
a8eaaee7 299 following keys:</para>
3428fe07
SS
300
301 <variablelist class='network-directives'>
302 <varlistentry>
303 <term><varname>HelloTimeSec=</varname></term>
304 <listitem>
a8eaaee7 305 <para>HelloTimeSec specifies the number of seconds between two hello packets
3428fe07
SS
306 sent out by the root bridge and the designated bridges. Hello packets are
307 used to communicate information about the topology throughout the entire
308 bridged local area network.</para>
309 </listitem>
310 </varlistentry>
311 <varlistentry>
312 <term><varname>MaxAgeSec=</varname></term>
313 <listitem>
314 <para>MaxAgeSec specifies the number of seconds of maximum message age.
315 If the last seen (received) hello packet is more than this number of
316 seconds old, the bridge in question will start the takeover procedure
317 in attempt to become the Root Bridge itself.</para>
318 </listitem>
319 </varlistentry>
320 <varlistentry>
321 <term><varname>ForwardDelaySec=</varname></term>
322 <listitem>
323 <para>ForwardDelaySec specifies the number of seconds spent in each
324 of the Listening and Learning states before the Forwarding state is entered.</para>
325 </listitem>
326 </varlistentry>
c7440e74
TJ
327 <varlistentry>
328 <term><varname>AgeingTimeSec=</varname></term>
329 <listitem>
330 <para>This specifies the number of seconds a MAC Address will be kept in
d23a0044 331 the forwarding database after having a packet received from this MAC Address.</para>
c7440e74
TJ
332 </listitem>
333 </varlistentry>
334 <varlistentry>
335 <term><varname>Priority=</varname></term>
336 <listitem>
337 <para>The priority of the bridge. An integer between 0 and 65535. A lower value
338 means higher priority. The bridge having the lowest priority will be elected as root bridge.</para>
339 </listitem>
340 </varlistentry>
341 <varlistentry>
342 <term><varname>DefaultPVID=</varname></term>
343 <listitem>
344 <para>This specifies the default port VLAN ID of a newly attached bridge port.</para>
345 </listitem>
346 </varlistentry>
3fef7a3f
SS
347 <varlistentry>
348 <term><varname>MulticastQuerier=</varname></term>
349 <listitem>
350 <para>A boolean. This setting controls the IFLA_BR_MCAST_QUERIER option in the kernel.
351 If enabled, the kernel will send general ICMP queries from a zero source address.
352 This feature should allow faster convergence on startup, but it causes some
353 multicast-aware switches to misbehave and disrupt forwarding of multicast packets.
354 When unset, the kernel's default setting applies.
355 </para>
356 </listitem>
357 </varlistentry>
6df6d898
SS
358 <varlistentry>
359 <term><varname>MulticastSnooping=</varname></term>
360 <listitem>
361 <para>A boolean. This setting controls the IFLA_BR_MCAST_SNOOPING option in the kernel.
362 If enabled, IGMP snooping monitors the Internet Group Management Protocol (IGMP) traffic
363 between hosts and multicast routers. When unset, the kernel's default setting applies.
364 </para>
365 </listitem>
366 </varlistentry>
c6f8d17d
TJ
367 <varlistentry>
368 <term><varname>VLANFiltering=</varname></term>
369 <listitem>
370 <para>A boolean. This setting controls the IFLA_BR_VLAN_FILTERING option in the kernel.
371 If enabled, the bridge will be started in VLAN-filtering mode. When unset, the kernel's
372 default setting applies.
373 </para>
374 </listitem>
375 </varlistentry>
b760a9af
SS
376 <varlistentry>
377 <term><varname>STP=</varname></term>
378 <listitem>
379 <para>A boolean. This enables the bridge's Spanning Tree Protocol (STP). When unset,
380 the kernel's default setting applies.
381 </para>
382 </listitem>
383 </varlistentry>
3428fe07 384 </variablelist>
3428fe07
SS
385 </refsect1>
386
798d3a52
ZJS
387 <refsect1>
388 <title>[VLAN] Section Options</title>
389
390 <para>The <literal>[VLAN]</literal> section only applies for
391 netdevs of kind <literal>vlan</literal>, and accepts the
392 following key:</para>
393
394 <variablelist class='network-directives'>
395 <varlistentry>
396 <term><varname>Id=</varname></term>
397 <listitem>
398 <para>The VLAN ID to use. An integer in the range 0–4094.
399 This option is compulsory.</para>
400 </listitem>
401 </varlistentry>
402 </variablelist>
403
404 </refsect1>
405
406 <refsect1>
407 <title>[MACVLAN] Section Options</title>
408
409 <para>The <literal>[MACVLAN]</literal> section only applies for
410 netdevs of kind <literal>macvlan</literal>, and accepts the
411 following key:</para>
412
413 <variablelist class='network-directives'>
414 <varlistentry>
415 <term><varname>Mode=</varname></term>
416 <listitem>
417 <para>The MACVLAN mode to use. The supported options are
418 <literal>private</literal>,
419 <literal>vepa</literal>,
420 <literal>bridge</literal>, and
421 <literal>passthru</literal>.
422 </para>
423 </listitem>
424 </varlistentry>
425 </variablelist>
426
427 </refsect1>
428
0371f2df
SS
429 <refsect1>
430 <title>[MACVTAP] Section Options</title>
431
432 <para>The <literal>[MACVTAP]</literal> section applies for
433 netdevs of kind <literal>macvtap</literal> and accepts the
96d49011 434 same key as <literal>[MACVLAN]</literal>.</para>
0371f2df
SS
435
436 </refsect1>
437
798d3a52
ZJS
438 <refsect1>
439 <title>[IPVLAN] Section Options</title>
440
441 <para>The <literal>[IPVLAN]</literal> section only applies for
442 netdevs of kind <literal>ipvlan</literal>, and accepts the
443 following key:</para>
444
445 <variablelist class='network-directives'>
446 <varlistentry>
447 <term><varname>Mode=</varname></term>
448 <listitem>
449 <para>The IPVLAN mode to use. The supported options are
450 <literal>L2</literal> and <literal>L3</literal>.
451 </para>
452 </listitem>
453 </varlistentry>
454 </variablelist>
455
456 </refsect1>
457
458 <refsect1>
459 <title>[VXLAN] Section Options</title>
460 <para>The <literal>[VXLAN]</literal> section only applies for
461 netdevs of kind <literal>vxlan</literal>, and accepts the
462 following keys:</para>
463
464 <variablelist class='network-directives'>
465 <varlistentry>
466 <term><varname>Id=</varname></term>
467 <listitem>
468 <para>The VXLAN ID to use.</para>
469 </listitem>
470 </varlistentry>
471 <varlistentry>
472 <term><varname>Group=</varname></term>
473 <listitem>
474 <para>An assigned multicast group IP address.</para>
475 </listitem>
476 </varlistentry>
477 <varlistentry>
478 <term><varname>TOS=</varname></term>
479 <listitem>
480 <para>The Type Of Service byte value for a vxlan interface.</para>
481 </listitem>
482 </varlistentry>
483 <varlistentry>
484 <term><varname>TTL=</varname></term>
485 <listitem>
486 <para>A fixed Time To Live N on Virtual eXtensible Local
b938cb90 487 Area Network packets. N is a number in the range 1–255. 0
798d3a52
ZJS
488 is a special value meaning that packets inherit the TTL
489 value.</para>
490 </listitem>
491 </varlistentry>
492 <varlistentry>
493 <term><varname>MacLearning=</varname></term>
494 <listitem>
495 <para>A boolean. When true, enables dynamic MAC learning
496 to discover remote MAC addresses.</para>
497 </listitem>
498 </varlistentry>
499 <varlistentry>
500 <term><varname>FDBAgeingSec=</varname></term>
501 <listitem>
502 <para>The lifetime of Forwarding Database entry learnt by
b938cb90 503 the kernel, in seconds.</para>
798d3a52
ZJS
504 </listitem>
505 </varlistentry>
506 <varlistentry>
3d276dd2
SS
507 <term><varname>MaximumFDBEntries=</varname></term>
508 <listitem>
509 <para>Configures maximum number of FDB entries.</para>
510 </listitem>
511 </varlistentry>
798d3a52
ZJS
512 <varlistentry>
513 <term><varname>ARPProxy=</varname></term>
514 <listitem>
a8eaaee7 515 <para>A boolean. When true, enables ARP proxying.</para>
798d3a52
ZJS
516 </listitem>
517 </varlistentry>
518 <varlistentry>
519 <term><varname>L2MissNotification=</varname></term>
520 <listitem>
521 <para>A boolean. When true, enables netlink LLADDR miss
522 notifications.</para>
523 </listitem>
524 </varlistentry>
525 <varlistentry>
526 <term><varname>L3MissNotification=</varname></term>
527 <listitem>
a8eaaee7 528 <para>A boolean. When true, enables netlink IP address miss
798d3a52
ZJS
529 notifications.</para>
530 </listitem>
531 </varlistentry>
532 <varlistentry>
533 <term><varname>RouteShortCircuit=</varname></term>
534 <listitem>
a8eaaee7 535 <para>A boolean. When true, route short circuiting is turned
798d3a52
ZJS
536 on.</para>
537 </listitem>
538 </varlistentry>
cffacc74
SS
539 <varlistentry>
540 <term><varname>UDPCheckSum=</varname></term>
541 <listitem>
b938cb90 542 <para>A boolean. When true, transmitting UDP checksums when doing VXLAN/IPv4 is turned on.</para>
cffacc74
SS
543 </listitem>
544 </varlistentry>
545 <varlistentry>
546 <term><varname>UDP6ZeroChecksumTx=</varname></term>
547 <listitem>
b938cb90 548 <para>A boolean. When true, sending zero checksums in VXLAN/IPv6 is turned on.</para>
cffacc74
SS
549 </listitem>
550 </varlistentry>
551 <varlistentry>
552 <term><varname>UDP6ZeroCheckSumRx=</varname></term>
553 <listitem>
b938cb90 554 <para>A boolean. When true, receiving zero checksums in VXLAN/IPv6 is turned on.</para>
cffacc74
SS
555 </listitem>
556 </varlistentry>
8b414e52
SS
557 <varlistentry>
558 <term><varname>GroupPolicyExtension=</varname></term>
559 <listitem>
b938cb90
JE
560 <para>A boolean. When true, it enables Group Policy VXLAN extension security label mechanism
561 across network peers based on VXLAN. For details about the Group Policy VXLAN, see the
8b414e52
SS
562 <ulink url="https://tools.ietf.org/html/draft-smith-vxlan-group-policy">
563 VXLAN Group Policy </ulink> document. Defaults to false.</para>
564 </listitem>
565 </varlistentry>
ea0288d1
SS
566 <varlistentry>
567 <term><varname>DestinationPort=</varname></term>
568 <listitem>
569 <para>Configures the default destination UDP port on a per-device basis.
570 If destination port is not specified then Linux kernel default will be used.
571 Set destination port 4789 to get the IANA assigned value,
572 and destination port 0 to get default values.</para>
573 </listitem>
574 </varlistentry>
575 <varlistentry>
576 <term><varname>PortRange=</varname></term>
577 <listitem>
578 <para>Configures VXLAN port range. VXLAN bases source
579 UDP port based on flow to help the receiver to be able
580 to load balance based on outer header flow. It
581 restricts the port range to the normal UDP local
582 ports, and allows overriding via configuration.</para>
583 </listitem>
584 </varlistentry>
798d3a52
ZJS
585 </variablelist>
586 </refsect1>
587 <refsect1>
588 <title>[Tunnel] Section Options</title>
589
590 <para>The <literal>[Tunnel]</literal> section only applies for
591 netdevs of kind
592 <literal>ipip</literal>,
593 <literal>sit</literal>,
594 <literal>gre</literal>,
595 <literal>gretap</literal>,
596 <literal>ip6gre</literal>,
597 <literal>ip6gretap</literal>,
5cc0748e
SS
598 <literal>vti</literal>,
599 <literal>vti6</literal>, and
798d3a52
ZJS
600 <literal>ip6tnl</literal> and accepts
601 the following keys:</para>
602
603 <variablelist class='network-directives'>
604 <varlistentry>
605 <term><varname>Local=</varname></term>
606 <listitem>
607 <para>A static local address for tunneled packets. It must
608 be an address on another interface of this host.</para>
609 </listitem>
610 </varlistentry>
611 <varlistentry>
612 <term><varname>Remote=</varname></term>
613 <listitem>
614 <para>The remote endpoint of the tunnel.</para>
615 </listitem>
616 </varlistentry>
617 <varlistentry>
618 <term><varname>TOS=</varname></term>
619 <listitem>
620 <para>The Type Of Service byte value for a tunnel interface.
b938cb90 621 For details about the TOS, see the
798d3a52
ZJS
622 <ulink url="http://tools.ietf.org/html/rfc1349"> Type of
623 Service in the Internet Protocol Suite </ulink> document.
624 </para>
625 </listitem>
626 </varlistentry>
627 <varlistentry>
628 <term><varname>TTL=</varname></term>
629 <listitem>
630 <para>A fixed Time To Live N on tunneled packets. N is a
b938cb90 631 number in the range 1–255. 0 is a special value meaning that
798d3a52 632 packets inherit the TTL value. The default value for IPv4
b938cb90 633 tunnels is: inherit. The default value for IPv6 tunnels is
798d3a52
ZJS
634 64.</para>
635 </listitem>
636 </varlistentry>
637 <varlistentry>
638 <term><varname>DiscoverPathMTU=</varname></term>
639 <listitem>
640 <para>A boolean. When true, enables Path MTU Discovery on
641 the tunnel.</para>
642 </listitem>
643 </varlistentry>
276de526
SS
644 <varlistentry>
645 <term><varname>IPv6FlowLabel=</varname></term>
646 <listitem>
a8eaaee7 647 <para>Configures the 20-bit flow label (see <ulink url="https://tools.ietf.org/html/rfc6437">
276de526 648 RFC 6437</ulink>) field in the IPv6 header (see <ulink url="https://tools.ietf.org/html/rfc2460">
a8eaaee7
JE
649 RFC 2460</ulink>), which is used by a node to label packets of a flow.
650 It is only used for IPv6 tunnels.
651 A flow label of zero is used to indicate packets that have
652 not been labeled.
653 It can be configured to a value in the range 0–0xFFFFF, or be
654 set to <literal>inherit</literal>, in which case the original flowlabel is used.</para>
276de526
SS
655 </listitem>
656 </varlistentry>
9b0ca30a 657 <varlistentry>
a9b70f9d 658 <term><varname>CopyDSCP=</varname></term>
9b0ca30a 659 <listitem>
3cf4bcab
ZJS
660 <para>A boolean. When true, the Differentiated Service Code
661 Point (DSCP) field will be copied to the inner header from
a9b70f9d 662 outer header during the decapsulation of an IPv6 tunnel
3cf4bcab
ZJS
663 packet. DSCP is a field in an IP packet that enables different
664 levels of service to be assigned to network traffic.
665 Defaults to <literal>no</literal>.
9b0ca30a
SS
666 </para>
667 </listitem>
668 </varlistentry>
dae398a8
SS
669 <varlistentry>
670 <term><varname>EncapsulationLimit=</varname></term>
671 <listitem>
672 <para>The Tunnel Encapsulation Limit option specifies how many additional
673 levels of encapsulation are permitted to be prepended to the packet.
674 For example, a Tunnel Encapsulation Limit option containing a limit
675 value of zero means that a packet carrying that option may not enter
676 another tunnel before exiting the current tunnel.
677 (see <ulink url="https://tools.ietf.org/html/rfc2473#section-4.1.1"> RFC 2473</ulink>).
b938cb90 678 The valid range is 0–255 and <literal>none</literal>. Defaults to 4.
dae398a8
SS
679 </para>
680 </listitem>
681 </varlistentry>
1d710029
SS
682 <varlistentry>
683 <term><varname>Key=</varname></term>
684 <listitem>
685 <para>The <varname>Key=</varname> parameter specifies the same key to use in
686 both directions (<varname>InputKey=</varname> and <varname>OutputKey=</varname>).
687 The <varname>Key=</varname> is either a number or an IPv4 address-like dotted quad.
688 It is used as mark-configured SAD/SPD entry as part of the lookup key (both in data
689 and control path) in ip xfrm (framework used to implement IPsec protocol).
690 See <ulink url="http://man7.org/linux/man-pages/man8/ip-xfrm.8.html">
e306f2df 691 ip-xfrm — transform configuration</ulink> for details. It is only used for VTI/VTI6
1d710029
SS
692 tunnels.</para>
693 </listitem>
694 </varlistentry>
695 <varlistentry>
696 <term><varname>InputKey=</varname></term>
697 <listitem>
698 <para>The <varname>InputKey=</varname> parameter specifies the key to use for input.
699 The format is same as <varname>Key=</varname>. It is only used for VTI/VTI6 tunnels.</para>
700 </listitem>
701 </varlistentry>
702 <varlistentry>
703 <term><varname>OutputKey=</varname></term>
704 <listitem>
705 <para>The <varname>OutputKey=</varname> parameter specifies the key to use for output.
706 The format is same as <varname>Key=</varname>. It is only used for VTI/VTI6 tunnels.</para>
707 </listitem>
708 </varlistentry>
798d3a52
ZJS
709 <varlistentry>
710 <term><varname>Mode=</varname></term>
711 <listitem>
a8eaaee7 712 <para>An <literal>ip6tnl</literal> tunnel can be in one of three
798d3a52
ZJS
713 modes
714 <literal>ip6ip6</literal> for IPv6 over IPv6,
715 <literal>ipip6</literal> for IPv4 over IPv6 or
716 <literal>any</literal> for either.
717 </para>
718 </listitem>
719 </varlistentry>
720 </variablelist>
721 </refsect1>
722 <refsect1>
723 <title>[Peer] Section Options</title>
724
725 <para>The <literal>[Peer]</literal> section only applies for
726 netdevs of kind <literal>veth</literal> and accepts the
a8eaaee7 727 following keys:</para>
798d3a52
ZJS
728
729 <variablelist class='network-directives'>
730 <varlistentry>
731 <term><varname>Name=</varname></term>
732 <listitem>
733 <para>The interface name used when creating the netdev.
734 This option is compulsory.</para>
735 </listitem>
736 </varlistentry>
737 <varlistentry>
738 <term><varname>MACAddress=</varname></term>
739 <listitem>
b938cb90 740 <para>The peer MACAddress, if not set, it is generated in
798d3a52
ZJS
741 the same way as the MAC address of the main
742 interface.</para>
743 </listitem>
744 </varlistentry>
745 </variablelist>
746 </refsect1>
747 <refsect1>
748 <title>[Tun] Section Options</title>
749
750 <para>The <literal>[Tun]</literal> section only applies for
751 netdevs of kind <literal>tun</literal>, and accepts the following
752 keys:</para>
753
754 <variablelist class='network-directives'>
755 <varlistentry>
756 <term><varname>OneQueue=</varname></term>
757 <listitem><para>Takes a boolean argument. Configures whether
758 all packets are queued at the device (enabled), or a fixed
759 number of packets are queued at the device and the rest at the
760 <literal>qdisc</literal>. Defaults to
761 <literal>no</literal>.</para>
762 </listitem>
763 </varlistentry>
764 <varlistentry>
765 <term><varname>MultiQueue=</varname></term>
766 <listitem><para>Takes a boolean argument. Configures whether
767 to use multiple file descriptors (queues) to parallelize
768 packets sending and receiving. Defaults to
769 <literal>no</literal>.</para>
770 </listitem>
771 </varlistentry>
772 <varlistentry>
773 <term><varname>PacketInfo=</varname></term>
774 <listitem><para>Takes a boolean argument. Configures whether
ff9b60f3 775 packets should be prepended with four extra bytes (two flag
b938cb90 776 bytes and two protocol bytes). If disabled, it indicates that
798d3a52
ZJS
777 the packets will be pure IP packets. Defaults to
778 <literal>no</literal>.</para>
779 </listitem>
780 </varlistentry>
43f78da4 781 <varlistentry>
2aba142e 782 <term><varname>VNetHeader=</varname></term>
43f78da4
SS
783 <listitem><para>Takes a boolean argument. Configures
784 IFF_VNET_HDR flag for a tap device. It allows sending
785 and receiving larger Generic Segmentation Offload (GSO)
786 packets. This may increase throughput significantly.
787 Defaults to
788 <literal>no</literal>.</para>
789 </listitem>
790 </varlistentry>
798d3a52
ZJS
791 <varlistentry>
792 <term><varname>User=</varname></term>
793 <listitem><para>User to grant access to the
794 <filename>/dev/net/tun</filename> device.</para>
795 </listitem>
796 </varlistentry>
797 <varlistentry>
798 <term><varname>Group=</varname></term>
799 <listitem><para>Group to grant access to the
800 <filename>/dev/net/tun</filename> device.</para>
801 </listitem>
802 </varlistentry>
803
804 </variablelist>
805
806 </refsect1>
807
808 <refsect1>
809 <title>[Tap] Section Options</title>
810
811 <para>The <literal>[Tap]</literal> section only applies for
812 netdevs of kind <literal>tap</literal>, and accepts the same keys
813 as the <literal>[Tun]</literal> section.</para>
814 </refsect1>
815
816 <refsect1>
817 <title>[Bond] Section Options</title>
818
819 <para>The <literal>[Bond]</literal> section accepts the following
820 key:</para>
821
822 <variablelist class='network-directives'>
823 <varlistentry>
824 <term><varname>Mode=</varname></term>
825 <listitem>
826 <para>Specifies one of the bonding policies. The default is
827 <literal>balance-rr</literal> (round robin). Possible values are
828 <literal>balance-rr</literal>,
829 <literal>active-backup</literal>,
830 <literal>balance-xor</literal>,
831 <literal>broadcast</literal>,
832 <literal>802.3ad</literal>,
833 <literal>balance-tlb</literal>, and
834 <literal>balance-alb</literal>.
835 </para>
836 </listitem>
837 </varlistentry>
838
839 <varlistentry>
840 <term><varname>TransmitHashPolicy=</varname></term>
841 <listitem>
842 <para>Selects the transmit hash policy to use for slave
843 selection in balance-xor, 802.3ad, and tlb modes. Possible
844 values are
845 <literal>layer2</literal>,
846 <literal>layer3+4</literal>,
847 <literal>layer2+3</literal>,
4d89618a 848 <literal>encap2+3</literal>, and
798d3a52
ZJS
849 <literal>encap3+4</literal>.
850 </para>
851 </listitem>
852 </varlistentry>
853
854 <varlistentry>
855 <term><varname>LACPTransmitRate=</varname></term>
856 <listitem>
857 <para>Specifies the rate with which link partner transmits
858 Link Aggregation Control Protocol Data Unit packets in
859 802.3ad mode. Possible values are <literal>slow</literal>,
860 which requests partner to transmit LACPDUs every 30 seconds,
861 and <literal>fast</literal>, which requests partner to
862 transmit LACPDUs every second. The default value is
863 <literal>slow</literal>.</para>
864 </listitem>
865 </varlistentry>
866
867 <varlistentry>
868 <term><varname>MIIMonitorSec=</varname></term>
869 <listitem>
870 <para>Specifies the frequency that Media Independent
871 Interface link monitoring will occur. A value of zero
dd2b607b 872 disables MII link monitoring. This value is rounded down to
798d3a52
ZJS
873 the nearest millisecond. The default value is 0.</para>
874 </listitem>
875 </varlistentry>
876
877 <varlistentry>
878 <term><varname>UpDelaySec=</varname></term>
879 <listitem>
880 <para>Specifies the delay before a link is enabled after a
881 link up status has been detected. This value is rounded down
882 to a multiple of MIIMonitorSec. The default value is
883 0.</para>
884 </listitem>
885 </varlistentry>
886
887 <varlistentry>
888 <term><varname>DownDelaySec=</varname></term>
889 <listitem>
890 <para>Specifies the delay before a link is disabled after a
891 link down status has been detected. This value is rounded
892 down to a multiple of MIIMonitorSec. The default value is
893 0.</para>
894 </listitem>
895 </varlistentry>
896
81bd37a8 897 <varlistentry>
38422da7 898 <term><varname>LearnPacketIntervalSec=</varname></term>
81bd37a8
SS
899 <listitem>
900 <para>Specifies the number of seconds between instances where the bonding
a8eaaee7
JE
901 driver sends learning packets to each slave peer switch.
902 The valid range is 1–0x7fffffff; the default value is 1. This option
903 has an effect only for the balance-tlb and balance-alb modes.</para>
81bd37a8
SS
904 </listitem>
905 </varlistentry>
906
907 <varlistentry>
908 <term><varname>AdSelect=</varname></term>
909 <listitem>
910 <para>Specifies the 802.3ad aggregation selection logic to use. Possible values are
911 <literal>stable</literal>,
a8eaaee7
JE
912 <literal>bandwidth</literal> and
913 <literal>count</literal>.
81bd37a8
SS
914 </para>
915 </listitem>
916 </varlistentry>
917
918 <varlistentry>
38422da7 919 <term><varname>FailOverMACPolicy=</varname></term>
81bd37a8 920 <listitem>
a8eaaee7
JE
921 <para>Specifies whether the active-backup mode should set all slaves to
922 the same MAC address at the time of enslavement or, when enabled, to perform special handling of the
81bd37a8
SS
923 bond's MAC address in accordance with the selected policy. The default policy is none.
924 Possible values are
925 <literal>none</literal>,
a8eaaee7
JE
926 <literal>active</literal> and
927 <literal>follow</literal>.
81bd37a8
SS
928 </para>
929 </listitem>
930 </varlistentry>
931
932 <varlistentry>
38422da7 933 <term><varname>ARPValidate=</varname></term>
81bd37a8
SS
934 <listitem>
935 <para>Specifies whether or not ARP probes and replies should be
38422da7 936 validated in any mode that supports ARP monitoring, or whether
81bd37a8
SS
937 non-ARP traffic should be filtered (disregarded) for link
938 monitoring purposes. Possible values are
939 <literal>none</literal>,
940 <literal>active</literal>,
a8eaaee7
JE
941 <literal>backup</literal> and
942 <literal>all</literal>.
81bd37a8
SS
943 </para>
944 </listitem>
945 </varlistentry>
946
947 <varlistentry>
38422da7 948 <term><varname>ARPIntervalSec=</varname></term>
81bd37a8
SS
949 <listitem>
950 <para>Specifies the ARP link monitoring frequency in milliseconds.
951 A value of 0 disables ARP monitoring. The default value is 0.
952 </para>
953 </listitem>
954 </varlistentry>
955
956 <varlistentry>
38422da7 957 <term><varname>ARPIPTargets=</varname></term>
81bd37a8
SS
958 <listitem>
959 <para>Specifies the IP addresses to use as ARP monitoring peers when
38422da7 960 ARPIntervalSec is greater than 0. These are the targets of the ARP request
81bd37a8 961 sent to determine the health of the link to the targets.
a8eaaee7 962 Specify these values in IPv4 dotted decimal format. At least one IP
81bd37a8
SS
963 address must be given for ARP monitoring to function. The
964 maximum number of targets that can be specified is 16. The
965 default value is no IP addresses.
966 </para>
967 </listitem>
968 </varlistentry>
969
970 <varlistentry>
38422da7 971 <term><varname>ARPAllTargets=</varname></term>
81bd37a8 972 <listitem>
38422da7 973 <para>Specifies the quantity of ARPIPTargets that must be reachable
81bd37a8
SS
974 in order for the ARP monitor to consider a slave as being up.
975 This option affects only active-backup mode for slaves with
38422da7 976 ARPValidate enabled. Possible values are
a8eaaee7
JE
977 <literal>any</literal> and
978 <literal>all</literal>.
81bd37a8
SS
979 </para>
980 </listitem>
981 </varlistentry>
982
983 <varlistentry>
38422da7 984 <term><varname>PrimaryReselectPolicy=</varname></term>
81bd37a8
SS
985 <listitem>
986 <para>Specifies the reselection policy for the primary slave. This
987 affects how the primary slave is chosen to become the active slave
988 when failure of the active slave or recovery of the primary slave
989 occurs. This option is designed to prevent flip-flopping between
990 the primary slave and other slaves. Possible values are
991 <literal>always</literal>,
a8eaaee7
JE
992 <literal>better</literal> and
993 <literal>failure</literal>.
81bd37a8
SS
994 </para>
995 </listitem>
996 </varlistentry>
997
998 <varlistentry>
999 <term><varname>ResendIGMP=</varname></term>
1000 <listitem>
1001 <para>Specifies the number of IGMP membership reports to be issued after
1002 a failover event. One membership report is issued immediately after
1003 the failover, subsequent packets are sent in each 200ms interval.
b938cb90 1004 The valid range is 0–255. Defaults to 1. A value of 0
81bd37a8
SS
1005 prevents the IGMP membership report from being issued in response
1006 to the failover event.
1007 </para>
1008 </listitem>
1009 </varlistentry>
1010
1011 <varlistentry>
1012 <term><varname>PacketsPerSlave=</varname></term>
1013 <listitem>
b938cb90
JE
1014 <para>Specify the number of packets to transmit through a slave before
1015 moving to the next one. When set to 0, then a slave is chosen at
1016 random. The valid range is 0–65535. Defaults to 1. This option
a8eaaee7 1017 only has effect when in balance-rr mode.
81bd37a8
SS
1018 </para>
1019 </listitem>
1020 </varlistentry>
1021
1022 <varlistentry>
38422da7 1023 <term><varname>GratuitousARP=</varname></term>
81bd37a8
SS
1024 <listitem>
1025 <para>Specify the number of peer notifications (gratuitous ARPs and
1026 unsolicited IPv6 Neighbor Advertisements) to be issued after a
b938cb90 1027 failover event. As soon as the link is up on the new slave,
81bd37a8
SS
1028 a peer notification is sent on the bonding device and each
1029 VLAN sub-device. This is repeated at each link monitor interval
38422da7 1030 (ARPIntervalSec or MIIMonitorSec, whichever is active) if the number is
a8eaaee7 1031 greater than 1. The valid range is 0–255. The default value is 1.
38422da7 1032 These options affect only the active-backup mode.
81bd37a8
SS
1033 </para>
1034 </listitem>
1035 </varlistentry>
1036
1037 <varlistentry>
1038 <term><varname>AllSlavesActive=</varname></term>
1039 <listitem>
a8eaaee7
JE
1040 <para>A boolean. Specifies that duplicate frames (received on inactive ports)
1041 should be dropped when false, or delivered when true. Normally, bonding will drop
81bd37a8
SS
1042 duplicate frames (received on inactive ports), which is desirable for
1043 most users. But there are some times it is nice to allow duplicate
1044 frames to be delivered. The default value is false (drop duplicate frames
1045 received on inactive ports).
1046 </para>
1047 </listitem>
1048 </varlistentry>
1049
1050 <varlistentry>
1051 <term><varname>MinLinks=</varname></term>
1052 <listitem>
1053 <para>Specifies the minimum number of links that must be active before
1054 asserting carrier. The default value is 0.
1055 </para>
1056 </listitem>
1057 </varlistentry>
1058
798d3a52 1059 </variablelist>
81bd37a8
SS
1060
1061 <para>For more detail information see
1062 <ulink url="https://www.kernel.org/doc/Documentation/networking/bonding.txt">
1063 Linux Ethernet Bonding Driver HOWTO</ulink></para>
1064
798d3a52
ZJS
1065 </refsect1>
1066
1067 <refsect1>
1068 <title>Example</title>
1069 <example>
6c1695be 1070 <title>/etc/systemd/network/25-bridge.netdev</title>
798d3a52
ZJS
1071
1072 <programlisting>[NetDev]
eac684ef
TG
1073Name=bridge0
1074Kind=bridge</programlisting>
798d3a52 1075 </example>
eac684ef 1076
798d3a52 1077 <example>
6c1695be 1078 <title>/etc/systemd/network/25-vlan1.netdev</title>
eac684ef 1079
798d3a52 1080 <programlisting>[Match]
eac684ef
TG
1081Virtualization=no
1082
1083[NetDev]
1084Name=vlan1
1085Kind=vlan
1086
1087[VLAN]
1088Id=1</programlisting>
798d3a52
ZJS
1089 </example>
1090 <example>
6c1695be 1091 <title>/etc/systemd/network/25-ipip.netdev</title>
798d3a52 1092 <programlisting>[NetDev]
b35a2909
TG
1093Name=ipip-tun
1094Kind=ipip
1095MTUBytes=1480
1096
1097[Tunnel]
1098Local=192.168.223.238
1099Remote=192.169.224.239
1100TTL=64</programlisting>
798d3a52
ZJS
1101 </example>
1102 <example>
6c1695be 1103 <title>/etc/systemd/network/25-tap.netdev</title>
798d3a52 1104 <programlisting>[NetDev]
30ae9dfd
SS
1105Name=tap-test
1106Kind=tap
1107
1108[Tap]
1109MultiQueue=true
1110PacketInfo=true</programlisting> </example>
eac684ef 1111
798d3a52 1112 <example>
6c1695be 1113 <title>/etc/systemd/network/25-sit.netdev</title>
798d3a52 1114 <programlisting>[NetDev]
b35a2909
TG
1115Name=sit-tun
1116Kind=sit
1117MTUBytes=1480
1118
1119[Tunnel]
1120Local=10.65.223.238
1121Remote=10.65.223.239</programlisting>
798d3a52 1122 </example>
eac684ef 1123
798d3a52 1124 <example>
6c1695be 1125 <title>/etc/systemd/network/25-gre.netdev</title>
798d3a52 1126 <programlisting>[NetDev]
b35a2909
TG
1127Name=gre-tun
1128Kind=gre
1129MTUBytes=1480
1130
1131[Tunnel]
1132Local=10.65.223.238
1133Remote=10.65.223.239</programlisting>
798d3a52 1134 </example>
b35a2909 1135
798d3a52 1136 <example>
6c1695be 1137 <title>/etc/systemd/network/25-vti.netdev</title>
b35a2909 1138
798d3a52 1139 <programlisting>[NetDev]
b35a2909
TG
1140Name=vti-tun
1141Kind=vti
1142MTUBytes=1480
1143
1144[Tunnel]
1145Local=10.65.223.238
1146Remote=10.65.223.239</programlisting>
798d3a52 1147 </example>
b35a2909 1148
798d3a52 1149 <example>
6c1695be 1150 <title>/etc/systemd/network/25-veth.netdev</title>
798d3a52 1151 <programlisting>[NetDev]
b35a2909
TG
1152Name=veth-test
1153Kind=veth
1154
1155[Peer]
1156Name=veth-peer</programlisting>
798d3a52 1157 </example>
b35a2909 1158
d94facdc 1159 <example>
6c1695be 1160 <title>/etc/systemd/network/25-bond.netdev</title>
d94facdc
MH
1161 <programlisting>[NetDev]
1162Name=bond1
1163Kind=bond
1164
1165[Bond]
1166Mode=802.3ad
1167TransmitHashPolicy=layer3+4
1168MIIMonitorSec=1s
1169LACPTransmitRate=fast
1170</programlisting>
1171 </example>
1172
798d3a52 1173 <example>
6c1695be 1174 <title>/etc/systemd/network/25-dummy.netdev</title>
798d3a52 1175 <programlisting>[NetDev]
9e358851
TG
1176Name=dummy-test
1177Kind=dummy
1178MACAddress=12:34:56:78:9a:bc</programlisting>
798d3a52 1179 </example>
20897a0d
AR
1180 <example>
1181 <title>/etc/systemd/network/25-vrf.netdev</title>
037a3ded 1182 <para>Create a VRF interface with table 42.</para>
20897a0d
AR
1183 <programlisting>[NetDev]
1184Name=vrf-test
1185Kind=vrf
798d3a52 1186
20897a0d
AR
1187[VRF]
1188TableId=42</programlisting>
1189 </example>
798d3a52
ZJS
1190 </refsect1>
1191 <refsect1>
1192 <title>See Also</title>
1193 <para>
1194 <citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
1195 <citerefentry><refentrytitle>systemd-networkd</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
1196 <citerefentry><refentrytitle>systemd.link</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
1197 <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry>
1198 </para>
1199 </refsect1>
eac684ef
TG
1200
1201</refentry>