/proc/ppk/ifs
Description
Contains the list of interfaces that SecureXL uses.
Syntax for IPv4
|
|
Syntax for IPv6
|
|
Example for IPv4
Example for IPv6
Explanation about the configuration flags in the "F" and "SIM F" columns
The "F" column shows the internal configuration flags that Firewall set on these interfaces.
The "SIM F" column shows the internal configuration flags that SecureXL set on these interfaces.
Flag |
Description |
---|---|
0x001 |
If this flag is set, the SecureXL drops the packet at the end of the inbound inspection, if the packet is a "cut-through" packet. In outbound, SecureXL forwards all the packets to the network. |
0x002 |
If this flag is set, the SecureXL sends an applicable notification when a TCP state change occurs (connection is established or torn down). |
0x004 |
If this flag is set, the SecureXL it sets the UDP header's checksum field correctly when the SecureXL encapsulates an encrypted packet (UDP encapsulation). If this flag is not set, SecureXL sets the UDP header's checksum field to zero. It is safe to ignore this flag, if it is set to 0 (SecureXL continues to calculate the UDP packet's checksum). |
0x008 |
If this flag is set, the SecureXL does not create new connections that match a template, and SecureXL drops the packet that matches the template, when the number of entries in the Connections Table reaches the specified limit. If this flag is not set, the SecureXL forwards the packet to the Firewall. |
0x010 |
If this flag is set, the SecureXL forwards fragments to the Firewall. |
0x020 |
If this flag is set, the SecureXL does not create connections from TCP templates anymore. The Firewall offloads connections to SecureXL when necessary. This flag only disables the creation of TCP templates. |
0x040 |
If this flag is set, the SecureXL notifies the Firewall at intervals, so it refreshes the accelerated connections in the Firewall kernel tables. |
0x080 |
If this flag is set, the SecureXL does not create connections from non-TCP templates anymore. The Firewall offloads connections to SecureXL when necessary. This flag only disables the creation of non-TCP templates. |
0x100 |
If this flag is set, the SecureXL allows sequence verification violations for connections that did not complete the TCP 3-way handshake process. If this flag is not set, SecureXL must forward the violating packets to the Firewall. |
0x200 |
If this flag is set, the SecureXL allows sequence verification violations for connections that completed the TCP 3-way handshake process. If this flag is not set, SecureXL must forward the violating packets to the Firewall. |
0x400 |
If this flag is set, the SecureXL forwards TCP [RST] packets to the Firewall. |
0x0001 |
If this flag is set, the SecureXL notifies the Firewall about HitCount data. |
0x0002 |
If this flag is set, the VSX Virtual System works as a junction, rather than a regular Virtual System (only the local Virtual System flag is applicable). |
0x0004 |
If this flag is set, the SecureXL disables the reply counter of inbound encrypted traffic. At a result, SecureXL kernel module works in the same way as the VPN kernel module. |
0x0008 |
If this flag is set, the SecureXL enables the MSS Clamping. Refer to the kernel parameters " |
0x0010 |
If this flag is set, the SecureXL disables the "No Match Ranges" (NMR) Templates (see sk117755). |
0x0020 |
If this flag is set, the SecureXL disables the "No Match Time" (NMT) Templates (see sk117755). |
0x0040 |
If this flag is set, the SecureXL does not send Drop Templates notifications about dropped packets to the Firewall (to update the drop counters). For example, if you set the value of the kernel parameter " |
0x0080 |
If this flag is set, the SecureXL enables the MultiCore support for IPsec VPN (see sk118097). |
0x0100 |
If this flag is set, the SecureXL enables the support for CoreXL Dynamic Dispatcher (see sk105261). |
0x0800 |
If this flag is set, the SecureXL does not enforce the Path MTU Discovery for IP multicast packets. |
0x1000 |
If this flag is set, the SecureXL disables the SIM "drop_templates" feature. |
0x2000 |
If this flag is set, it indicates that an administrator enabled the Link Selection Load Sharing feature. |
0x4000 |
If this flag is set, the SecureXL disables the asynchronous notification feature. |
0x8000 |
If this flag is set, it indicates that the capacity of the Firewall Connections Table is unlimited. |
Examples:
Value |
Description |
---|---|
0x039 |
Means the sum of these flags:
|
0x00008a16 |
Means the sum of these flags:
|
0x00009a16 |
Means the sum of these flags:
|