1
0
mirror of https://github.com/openbsd/src.git synced 2026-04-27 23:56:05 +00:00

tweak previous;

This commit is contained in:
jmc
2019-12-08 14:10:15 +00:00
parent 7c6b0e640e
commit 833d52a9c3

View File

@@ -1,4 +1,4 @@
.\" $OpenBSD: sysctl.2,v 1.35 2019/12/08 11:08:22 sashan Exp $
.\" $OpenBSD: sysctl.2,v 1.36 2019/12/08 14:10:15 jmc Exp $
.\"
.\" Copyright (c) 1993
.\" The Regents of the University of California. All rights reserved.
@@ -1459,16 +1459,16 @@ If the kernel has been compiled with the
option,
then debugging information will also be reported when this variable is set.
.It Li ip.forwarding Pq Va net.inet.ip.forwarding
If set to 0, then IP forwarding is disabled.
The IP stack also requires destination IP address of incoming packet
to match IP address of network interface, where packet is bound to.
If set to 1, then IP forwarding is enabled for the host,
If set to 0, IP forwarding is disabled.
The IP stack also requires the destination IP address of incoming packets
to match the IP address of the network interface the packet is bound to.
If set to 1, IP forwarding is enabled for the host,
indicating the host is acting as a router.
If set to 2, then IP forwarding is restricted to traffic that has been
If set to 2, IP forwarding is restricted to traffic that has been
IPsec encapsulated or decapsulated by the host.
Enabling packet forwarding (values either 1 or 2) relaxes requirement
on incoming packet such its destination address must match just any IP address
bound to host.
Enabling packet forwarding (values either 1 or 2) relaxes the requirements
on incoming packets, so that its destination address must match just any IP address
bound to the host.
The default value is 0.
.It Li ip.ipsec-allocs Pq Va net.inet.ip.ipsec-allocs
The number of IPsec flows that can use a security association before
@@ -1891,10 +1891,10 @@ and
cases quite differently, and changing this variable during operation
may cause serious trouble.
Hence, this variable should only be set at bootstrap time.
Similarly to IPv4: if forwarding is disabled, then destination address of
incoming packet must match IP address bound to interface.
If forwarding is enabled, then check is relaxed such destination IP address of
incoming packet must match just any address bound to host.
As with IPv4, if forwarding is disabled then the destination address of
incoming packets must match the IP address bound to the interface.
If forwarding is enabled, the check is relaxed so that the destination IP address of
incoming packets must match just any address bound to the host.
.Pp
.It Li ip6.hdrnestlimit Pq Va net.inet6.ip6.hdrnestlimit
The number of IPv6 extension headers permitted on incoming IPv6 packets.