# Defaults are configured in /etc/sysctl.d/* and can be customized in this file ### TUNING NETWORK PERFORMANCE ### # Increase the maximum number of skb-heads to be cached from 128 # net.core.hot_list_length=256 # increase from 300 to 1024 net.core.netdev_max_backlog=1024 #increase TCP Re-Ordering value in kernel from 3 to 5 net.ipv4.tcp_reordering=5 # Default Socket Receive Buffer net.core.rmem_default = 262144 # Maximum Socket Receive Buffer net.core.rmem_max = 4194304 # Default Socket Send Buffer net.core.wmem_default = 262144 # Maximum Socket Send Buffer net.core.wmem_max = 4194304 # Increase number of incoming connections #net.core.somaxconn = 4096 # Increase number of incoming connections backlog net.core.netdev_max_backlog = 65536 # Protect Against TCP Time-Wait # From Kernel Source: tcp_rfc1337 - BOOLEAN # If set, the TCP stack behaves conforming to RFC1337. If unset, # we are not conforming to RFC, but prevent TCP TIME_WAIT # assassination. # Default: 0 net.ipv4.tcp_rfc1337 = 0 # Increase the maximum total buffer-space allocatable # This is measured in units of pages (4096 bytes) net.ipv4.tcp_mem = 65536 131072 262144 net.ipv4.udp_mem = 65536 131072 262144 # Increase the read-buffer space allocatable net.ipv4.tcp_rmem = 65535 131072 4194304 net.ipv4.udp_rmem_min = 16384 # Increase the write-buffer-space allocatable net.ipv4.tcp_wmem = 65535 131072 194304 net.ipv4.udp_wmem_min = 16384 # Increase the tcp-time-wait buckets pool size to prevent simple DOS attacks net.ipv4.tcp_max_tw_buckets = 1440000 #net.ipv4.tcp_tw_recycle = 1 net.ipv4.tcp_tw_reuse = 1 net.ipv4.tcp_keepalive_time = 300 net.ipv4.tcp_keepalive_probes = 5 net.ipv4.tcp_keepalive_intvl = 15 # Decrease the time default value for tcp_fin_timeout connection net.ipv4.tcp_fin_timeout = 15 net.ipv4.tcp_window_scaling=1 net.ipv4.tcp_mtu_probing=1 net.ipv4.tcp_timestamps=0 net.ipv4.tcp_sack=0 net.ipv4.tcp_low_latency=1 vm.swappiness = 0