routeros.IpSettings
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as routeros from "@pulumi/routeros";
const settings = new routeros.IpSettings("settings", {ipv4MultipathHashPolicy: "l3-inner"});
import pulumi
import pulumi_routeros as routeros
settings = routeros.IpSettings("settings", ipv4_multipath_hash_policy="l3-inner")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/routeros/routeros"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := routeros.NewIpSettings(ctx, "settings", &routeros.IpSettingsArgs{
Ipv4MultipathHashPolicy: pulumi.String("l3-inner"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Routeros = Pulumi.Routeros;
return await Deployment.RunAsync(() =>
{
var settings = new Routeros.IpSettings("settings", new()
{
Ipv4MultipathHashPolicy = "l3-inner",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.routeros.IpSettings;
import com.pulumi.routeros.IpSettingsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var settings = new IpSettings("settings", IpSettingsArgs.builder()
.ipv4MultipathHashPolicy("l3-inner")
.build());
}
}
resources:
settings:
type: routeros:IpSettings
properties:
ipv4MultipathHashPolicy: l3-inner
Create IpSettings Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new IpSettings(name: string, args?: IpSettingsArgs, opts?: CustomResourceOptions);
@overload
def IpSettings(resource_name: str,
args: Optional[IpSettingsArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def IpSettings(resource_name: str,
opts: Optional[ResourceOptions] = None,
___id_: Optional[float] = None,
___path_: Optional[str] = None,
___skip_: Optional[str] = None,
accept_redirects: Optional[bool] = None,
accept_source_route: Optional[bool] = None,
allow_fast_path: Optional[bool] = None,
arp_timeout: Optional[str] = None,
icmp_errors_use_inbound_interface_address: Optional[bool] = None,
icmp_rate_limit: Optional[float] = None,
icmp_rate_mask: Optional[str] = None,
ip_forward: Optional[bool] = None,
ip_settings_id: Optional[str] = None,
ipv4_multipath_hash_policy: Optional[str] = None,
max_neighbor_entries: Optional[float] = None,
route_cache: Optional[bool] = None,
rp_filter: Optional[str] = None,
secure_redirects: Optional[bool] = None,
send_redirects: Optional[bool] = None,
tcp_syncookies: Optional[bool] = None,
tcp_timestamps: Optional[str] = None)
func NewIpSettings(ctx *Context, name string, args *IpSettingsArgs, opts ...ResourceOption) (*IpSettings, error)
public IpSettings(string name, IpSettingsArgs? args = null, CustomResourceOptions? opts = null)
public IpSettings(String name, IpSettingsArgs args)
public IpSettings(String name, IpSettingsArgs args, CustomResourceOptions options)
type: routeros:IpSettings
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args IpSettingsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args IpSettingsArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args IpSettingsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args IpSettingsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args IpSettingsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
IpSettings Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The IpSettings resource accepts the following input properties:
- Accept
Redirects bool - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- Accept
Source boolRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- Allow
Fast boolPath - Allows Fast Path.
- Arp
Timeout string - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- Icmp
Errors boolUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- Icmp
Rate doubleLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - Icmp
Rate stringMask - Mask made of ICMP types for which rates are being limited.
- Ip
Forward bool - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- Ip
Settings stringId - Ipv4Multipath
Hash stringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - Max
Neighbor doubleEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - Route
Cache bool - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- Rp
Filter string - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - Secure
Redirects bool - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- Send
Redirects bool - Whether to send ICMP redirects. Recommended to be enabled on routers.
- bool
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- Tcp
Timestamps string - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- Accept
Redirects bool - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- Accept
Source boolRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- Allow
Fast boolPath - Allows Fast Path.
- Arp
Timeout string - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- Icmp
Errors boolUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- Icmp
Rate float64Limit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - Icmp
Rate stringMask - Mask made of ICMP types for which rates are being limited.
- Ip
Forward bool - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- Ip
Settings stringId - Ipv4Multipath
Hash stringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - Max
Neighbor float64Entries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - Route
Cache bool - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- Rp
Filter string - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - Secure
Redirects bool - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- Send
Redirects bool - Whether to send ICMP redirects. Recommended to be enabled on routers.
- bool
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- Tcp
Timestamps string - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ float64 - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- ___
id_ Double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept
Redirects Boolean - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept
Source BooleanRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow
Fast BooleanPath - Allows Fast Path.
- arp
Timeout String - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp
Errors BooleanUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp
Rate DoubleLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp
Rate StringMask - Mask made of ICMP types for which rates are being limited.
- ip
Forward Boolean - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip
Settings StringId - ipv4Multipath
Hash StringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max
Neighbor DoubleEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route
Cache Boolean - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp
Filter String - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure
Redirects Boolean - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send
Redirects Boolean - Whether to send ICMP redirects. Recommended to be enabled on routers.
- Boolean
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp
Timestamps String - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept
Redirects boolean - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept
Source booleanRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow
Fast booleanPath - Allows Fast Path.
- arp
Timeout string - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp
Errors booleanUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp
Rate numberLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp
Rate stringMask - Mask made of ICMP types for which rates are being limited.
- ip
Forward boolean - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip
Settings stringId - ipv4Multipath
Hash stringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max
Neighbor numberEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route
Cache boolean - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp
Filter string - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure
Redirects boolean - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send
Redirects boolean - Whether to send ICMP redirects. Recommended to be enabled on routers.
- boolean
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp
Timestamps string - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ float - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ str - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ str - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept_
redirects bool - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept_
source_ boolroute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow_
fast_ boolpath - Allows Fast Path.
- arp_
timeout str - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp_
errors_ booluse_ inbound_ interface_ address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp_
rate_ floatlimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp_
rate_ strmask - Mask made of ICMP types for which rates are being limited.
- ip_
forward bool - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip_
settings_ strid - ipv4_
multipath_ strhash_ policy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max_
neighbor_ floatentries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route_
cache bool - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp_
filter str - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure_
redirects bool - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send_
redirects bool - Whether to send ICMP redirects. Recommended to be enabled on routers.
- bool
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp_
timestamps str - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ Number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept
Redirects Boolean - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept
Source BooleanRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow
Fast BooleanPath - Allows Fast Path.
- arp
Timeout String - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp
Errors BooleanUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp
Rate NumberLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp
Rate StringMask - Mask made of ICMP types for which rates are being limited.
- ip
Forward Boolean - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip
Settings StringId - ipv4Multipath
Hash StringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max
Neighbor NumberEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route
Cache Boolean - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp
Filter String - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure
Redirects Boolean - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send
Redirects Boolean - Whether to send ICMP redirects. Recommended to be enabled on routers.
- Boolean
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp
Timestamps String - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
Outputs
All input properties are implicitly available as output properties. Additionally, the IpSettings resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing IpSettings Resource
Get an existing IpSettings resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: IpSettingsState, opts?: CustomResourceOptions): IpSettings
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
___id_: Optional[float] = None,
___path_: Optional[str] = None,
___skip_: Optional[str] = None,
accept_redirects: Optional[bool] = None,
accept_source_route: Optional[bool] = None,
allow_fast_path: Optional[bool] = None,
arp_timeout: Optional[str] = None,
icmp_errors_use_inbound_interface_address: Optional[bool] = None,
icmp_rate_limit: Optional[float] = None,
icmp_rate_mask: Optional[str] = None,
ip_forward: Optional[bool] = None,
ip_settings_id: Optional[str] = None,
ipv4_multipath_hash_policy: Optional[str] = None,
max_neighbor_entries: Optional[float] = None,
route_cache: Optional[bool] = None,
rp_filter: Optional[str] = None,
secure_redirects: Optional[bool] = None,
send_redirects: Optional[bool] = None,
tcp_syncookies: Optional[bool] = None,
tcp_timestamps: Optional[str] = None) -> IpSettings
func GetIpSettings(ctx *Context, name string, id IDInput, state *IpSettingsState, opts ...ResourceOption) (*IpSettings, error)
public static IpSettings Get(string name, Input<string> id, IpSettingsState? state, CustomResourceOptions? opts = null)
public static IpSettings get(String name, Output<String> id, IpSettingsState state, CustomResourceOptions options)
resources: _: type: routeros:IpSettings get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Accept
Redirects bool - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- Accept
Source boolRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- Allow
Fast boolPath - Allows Fast Path.
- Arp
Timeout string - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- Icmp
Errors boolUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- Icmp
Rate doubleLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - Icmp
Rate stringMask - Mask made of ICMP types for which rates are being limited.
- Ip
Forward bool - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- Ip
Settings stringId - Ipv4Multipath
Hash stringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - Max
Neighbor doubleEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - Route
Cache bool - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- Rp
Filter string - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - Secure
Redirects bool - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- Send
Redirects bool - Whether to send ICMP redirects. Recommended to be enabled on routers.
- bool
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- Tcp
Timestamps string - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- Accept
Redirects bool - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- Accept
Source boolRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- Allow
Fast boolPath - Allows Fast Path.
- Arp
Timeout string - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- Icmp
Errors boolUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- Icmp
Rate float64Limit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - Icmp
Rate stringMask - Mask made of ICMP types for which rates are being limited.
- Ip
Forward bool - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- Ip
Settings stringId - Ipv4Multipath
Hash stringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - Max
Neighbor float64Entries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - Route
Cache bool - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- Rp
Filter string - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - Secure
Redirects bool - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- Send
Redirects bool - Whether to send ICMP redirects. Recommended to be enabled on routers.
- bool
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- Tcp
Timestamps string - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ float64 - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- ___
id_ Double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept
Redirects Boolean - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept
Source BooleanRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow
Fast BooleanPath - Allows Fast Path.
- arp
Timeout String - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp
Errors BooleanUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp
Rate DoubleLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp
Rate StringMask - Mask made of ICMP types for which rates are being limited.
- ip
Forward Boolean - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip
Settings StringId - ipv4Multipath
Hash StringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max
Neighbor DoubleEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route
Cache Boolean - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp
Filter String - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure
Redirects Boolean - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send
Redirects Boolean - Whether to send ICMP redirects. Recommended to be enabled on routers.
- Boolean
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp
Timestamps String - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept
Redirects boolean - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept
Source booleanRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow
Fast booleanPath - Allows Fast Path.
- arp
Timeout string - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp
Errors booleanUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp
Rate numberLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp
Rate stringMask - Mask made of ICMP types for which rates are being limited.
- ip
Forward boolean - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip
Settings stringId - ipv4Multipath
Hash stringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max
Neighbor numberEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route
Cache boolean - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp
Filter string - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure
Redirects boolean - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send
Redirects boolean - Whether to send ICMP redirects. Recommended to be enabled on routers.
- boolean
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp
Timestamps string - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ float - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ str - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ str - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept_
redirects bool - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept_
source_ boolroute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow_
fast_ boolpath - Allows Fast Path.
- arp_
timeout str - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp_
errors_ booluse_ inbound_ interface_ address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp_
rate_ floatlimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp_
rate_ strmask - Mask made of ICMP types for which rates are being limited.
- ip_
forward bool - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip_
settings_ strid - ipv4_
multipath_ strhash_ policy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max_
neighbor_ floatentries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route_
cache bool - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp_
filter str - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure_
redirects bool - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send_
redirects bool - Whether to send ICMP redirects. Recommended to be enabled on routers.
- bool
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp_
timestamps str - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
- ___
id_ Number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- accept
Redirects Boolean - Whether to accept ICMP redirect messages. Typically should be enabled on the host and disabled on routers.
- accept
Source BooleanRoute - Whether to accept packets with the SRR option. Typically should be enabled on the router.
- allow
Fast BooleanPath - Allows Fast Path.
- arp
Timeout String - Sets Linux base_reachable_time (base_reachable_time_ms) on all interfaces that use ARP. The initial validity of the ARP entry is picked from the interval [timeout/2 - 3*timeout/2] (default from 15s to 45s) after the neighbor was found. Can use postfix ms, s, m, h, d for milliseconds, seconds, minutes, hours, or days. if no postfix is set then seconds (s) are used. The parameter means how long a valid ARP record will be considered complete if no one communicates with the specific MAC/IP during this time. The parameter does not represent a time when an ARP entry is removed from the ARP cache (see max-neighbor-entries setting).
- icmp
Errors BooleanUse Inbound Interface Address - If enabled, the ICMP error message reply will be sent with the source address equal to primary address of the receiving interface that caused the error . This feature can be useful for complex network debugging.
- icmp
Rate NumberLimit - Limit the maximum rates for sending ICMP packets whose type matches icmp-rate-mask to specific targets.
0
disables any limiting, other values indicate the minimum space between responses in milliseconds. - icmp
Rate StringMask - Mask made of ICMP types for which rates are being limited.
- ip
Forward Boolean - Enable/disable packet forwarding between interfaces. Resets all configuration parameters to defaults according to RFC1812 for routers.
- ip
Settings StringId - ipv4Multipath
Hash StringPolicy - IPv4 Hash policy used for ECMP routing in
/ip/settings
menu * l3 -- layer-3 hashing of src IP, dst IP * l3-inner -- layer-3 hashing or inner layer-3 hashing if available * l4 -- layer-4 hashing of src IP, dst IP, IP protocol, src port, dst port - max
Neighbor NumberEntries - Sets Linux gc_thresh3. A maximum number of allowed neighbors in the ARP table. Since
RouterOS version 7.1
, the default value depends on the installed amount of RAM. It is possible to set a higher value than the default, but it increases the risk of out-of-memory condition. The default values for certain RAM sizes: * 2048 for 64 MB, * 4096 for 128 MB, * 8192 for 256 MB, * 16384 for 512 MB or higher. The ARP cache stores ARP entries, and if some of these entries are incomplete, they can stay in the cache for an indefinite period of time. This will only happen if the number of entries in the cache is less than one-fourth of the maximum number allowed. The reason for this is to prevent the unnecessary running of the garbage-collector when the ARP table is not close to being full. - route
Cache Boolean - Disable or enable the Linux route cache. Note that disabling the route cache, will also disable the fast path.
- rp
Filter String - Disables or enables source validation. * no - No source validation. * strict - Strict mode as defined in RFC3704 Strict
Reverse Path. Each incoming packet is tested against the FIB and if the interface is not the best reverse path the
packet check will fail. By default failed packets are discarded. * loose - Loose mode as defined in RFC3704 Loose
Reverse Path. Each incoming packet's source address is also tested against the FIB and if the source address is not
reachable via any interface the packet check will fail. The current recommended practice in RFC3704 is to enable strict
mode to prevent IP spoofing from DDoS attacks. If using asymmetric routing or other complicated routing or VRRP, then
the loose mode is recommended.
Warning
: strict mode does not work with routing tables - secure
Redirects Boolean - Accept ICMP redirect messages only for gateways, listed in the default gateway list.
- send
Redirects Boolean - Whether to send ICMP redirects. Recommended to be enabled on routers.
- Boolean
- end out syncookies when the syn backlog queue of a socket overflows. This is to prevent the common 'SYN flood attack'. syncookies seriously violate TCP protocol, and disallow the use of TCP extensions, which can result in serious degradation of some services (f.e. SMTP relaying), visible not by you, but to your clients and relays, contacting you.
- tcp
Timestamps String - Parameter allows to enable/disable TCP timestamps or add random offset to TCP timestamp (default behavior). Disabling timestamps completely may help to reduce spikes of performance drops.
Import
$ pulumi import routeros:index/ipSettings:IpSettings settings .
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- routeros terraform-routeros/terraform-provider-routeros
- License
- Notes
- This Pulumi package is based on the
routeros
Terraform Provider.