Provided by: ipvsadm_1.31-1build2_amd64 bug

NAME

       ipvsadm - Linux Virtual Server administration

SYNOPSIS

       ipvsadm -A|E virtual-service [-s scheduler]
               [-p [timeout]] [-M netmask] [-b sched-flags]
       ipvsadm -D virtual-service
       ipvsadm -C
       ipvsadm -R
       ipvsadm -S [-n]
       ipvsadm -a|e virtual-service -r server-address
               [-g|i|m] [-w weight] [-x upper] [-y lower]
       ipvsadm -d virtual-service -r server-address
       ipvsadm -L|l [virtual-service] [options]
       ipvsadm -Z [virtual-service]
       ipvsadm --set tcp tcpfin udp
       ipvsadm --start-daemon state [daemon-options]
               [--syncid syncid]
       ipvsadm --stop-daemon state
       ipvsadm -h

DESCRIPTION

       Ipvsadm(8) is used to set up, maintain or inspect the virtual server table in the Linux kernel. The Linux
       Virtual Server can be used to build scalable network services based on a cluster of two  or  more  nodes.
       The  active  node  of  the  cluster  redirects service requests to a collection of server hosts that will
       actually perform the services. Supported features include three protocols  (TCP,  UDP  and  SCTP),  three
       packet-forwarding  methods  (NAT,  tunneling,  and  direct  routing), and eight load balancing algorithms
       (round robin, weighted round robin, least-connection, weighted  least-connection,  locality-based  least-
       connection, locality-based least-connection with replication, destination-hashing, and source-hashing).

       The command has two basic formats for execution:

       ipvsadm COMMAND virtual-service
               [scheduling-method] [persistence options]

       ipvsadm command virtual-service
               server-address [packet-forwarding-method]
               [weight options]

       The  first  format manipulates a virtual service and the algorithm for assigning service requests to real
       servers. Optionally, a persistent timeout and network mask for the granularity of  a  persistent  service
       and a persistence engine may be specified. The second format manipulates a real server that is associated
       with an existing virtual service.  When specifying a real server, the packet-forwarding  method  and  the
       weight  of  the  real  server,  relative to other real servers for the virtual service, may be specified,
       otherwise defaults will be used.

   COMMANDS
       ipvsadm(8) recognises the commands described below. Upper-case commands maintain virtual services. Lower-
       case commands maintain real servers that are associated with a virtual service.

       -A, --add-service
              Add  a  virtual  service.  A  service  address  is uniquely defined by a triplet: IP address, port
              number, and protocol. Alternatively, a virtual service may be defined by a firewall-mark.

       -E, --edit-service
              Edit a virtual service.

       -D, --delete-service
              Delete a virtual service, along with any associated real servers.

       -C, --clear
              Clear the virtual server table.

       -R, --restore
              Restore Linux Virtual Server rules from stdin. Each line read from stdin will be  treated  as  the
              command  line  options  to  a separate invocation of ipvsadm. Lines read from stdin can optionally
              begin with "ipvsadm".  This option is  useful  to  avoid  executing  a  large  number  or  ipvsadm
              commands when constructing an extensive routing table.

       -S, --save
              Dump the Linux Virtual Server rules to stdout in a format that can be read by -R|--restore.

       -a, --add-server
              Add a real server to a virtual service.

       -e, --edit-server
              Edit a real server in a virtual service.

       -d, --delete-server
              Remove a real server from a virtual service.

       -L, -l, --list
              List  the virtual server table if no argument is specified. If a service-address is selected, list
              this service only. If the -c option is selected, then display  the  connection  table.  The  exact
              output is affected by the other arguments given.

       -Z, --zero
              Zero the packet, byte and rate counters in a service or all services.

       --set tcp tcpfin udp
              Change  the  timeout  values  used  for  IPVS connections. This command always takes 3 parameters,
              representing  the  timeout  values (in seconds) for TCP sessions, TCP sessions after  receiving  a
              FIN  packet,  and   UDP   packets, respectively.  A timeout value 0 means that the current timeout
              value of the  corresponding  entry  is preserved.

       --start-daemon state
              Start the connection synchronization daemon. The state is to indicate that the daemon  is  started
              as master or backup. The connection synchronization daemon is implemented inside the Linux kernel.
              The master daemon  running  at  the  primary  load  balancer  multicasts  changes  of  connections
              periodically,  and  the  backup  daemon  running  at  the backup load balancers receives multicast
              message and creates corresponding connections. Then, in case the primary load  balancer  fails,  a
              backup load balancer will takeover, and it has state of almost all connections, so that almost all
              established connections can continue to access the service.

       The sync daemon supports IPv4 and IPv6 connections.

       --stop-daemon
              Stop the connection synchronization daemon.

       -h, --help
              Display a description of the command syntax.

   virtual-service
       Specifies the virtual service based on protocol/addr/port or firewall mark.

       -t, --tcp-service service-address
              Use TCP service. The service-address is of the form host[:port].  Host may be one of  a  plain  IP
              address  or  a  hostname.  Port may be either a plain port number or the service name of port. The
              Port may be omitted, in which case zero will be used. A Port  of zero is only valid if the service
              is  persistent  as  the  -p|--persistent  option,  in  which  case it is a wild-card port, that is
              connections will be accepted to any port.

       -u, --udp-service service-address
              Use UDP service. See the -t|--tcp-service for the description of  the service-address.

       --sctp-service service-address
              Use SCTP service. See the -t|--tcp-service for the description of the service-address.

       -f, --fwmark-service integer
              Use a firewall-mark, an integer value greater than zero, to denote a virtual service instead of an
              address,  port  and  protocol  (UDP,  TCP or SCTP). The marking of packets with a firewall-mark is
              configured using the -m|--mark option to iptables(8), the meta mark set value option to nft(8)  or
              via  an  eBPF  program.  It  can  be used to build a virtual service associated with the same real
              servers, covering multiple IP address, port and protocol triplets. If IPv6 addresses are used, the
              -6 option must be used.

              Using  firewall-mark  virtual services provides a convenient method of grouping together different
              IP addresses, ports and protocols  into  a  single  virtual  service.  This  is  useful  for  both
              simplifying  configuration  if  a  large  number  of  virtual  services  are required and grouping
              persistence across what would otherwise be multiple virtual services.

   PARAMETERS
       The commands above accept or require zero or more of the following parameters.

       -s, --scheduler scheduling-method
              scheduling-method  Algorithm for allocating TCP connections and UDP  datagrams  to  real  servers.
              Scheduling  algorithms  are  implemented as kernel modules. Ten are shipped with the Linux Virtual
              Server:

              rr - Round Robin: distributes jobs equally amongst the available real servers.

              wrr - Weighted Round Robin: assigns jobs to real servers proportionally  to  there  real  servers'
              weight.  Servers  with  higher  weights receive new jobs first and get more jobs than servers with
              lower weights. Servers with equal weights get an equal distribution of new jobs.

              lc - Least-Connection: assigns more jobs to real servers with fewer active jobs.

              wlc - Weighted Least-Connection: assigns more jobs to servers with fewer jobs and relative to  the
              real servers' weight (Ci/Wi). This is the default.

              lblc  - Locality-Based Least-Connection: assigns jobs destined for the same IP address to the same
              server if the server is not overloaded and available; otherwise assign jobs to servers with  fewer
              jobs, and keep it for future assignment.

              lblcr  -  Locality-Based  Least-Connection with Replication: assigns jobs destined for the same IP
              address to the least-connection node in the server set for the IP address. If all the node in  the
              server  set  are over loaded, it picks up a node with fewer jobs in the cluster and adds it in the
              sever set for the target. If the server set has not been modified for the specified time, the most
              loaded node is removed from the server set, in order to avoid high degree of replication.

              dh  -  Destination  Hashing: assigns jobs to servers through looking up a statically assigned hash
              table by their destination IP addresses.

              sh - Source Hashing: assigns jobs to servers through looking up a statically assigned  hash  table
              by  their  source IP addresses.  This scheduler has two flags: sh-fallback, which enables fallback
              to a different server if the selected server was unavailable, and sh-port, which adds  the  source
              port number to the hash computation.

              sed  -  Shortest  Expected Delay: assigns an incoming job to the server with the shortest expected
              delay. The expected delay that the job will experience is (Ci + 1)  /  Ui  if   sent  to  the  ith
              server,  in  which Ci is the number of jobs on the the ith server and Ui is the fixed service rate
              (weight) of the ith server.

              nq - Never Queue: assigns an incoming job to an idle server if there is, instead of waiting for  a
              fast  one; if all the servers are busy, it adopts the Shortest Expected Delay policy to assign the
              job.

              fo - Weighted Failover: assigns an incoming job to the server with  the  highest  weight  that  is
              currently available.

              ovf  -  Weighted  Overflow:  assigns an incoming job to the server with the highest weight that is
              currently available and overflows to the next when active connections exceed  the  node's  weight.
              Note that this scheduler might not be suitable for UDP because it only uses active connections.

              mh  -  Maglev Hashing: assigns incoming jobs based on Google's Maglev hashing algorithm, providing
              an almost equal share of jobs to each real server and provides minimal disruption. When the set of
              real  servers  changes, a connection will likely be sent to the same real server as it was before.
              This scheduler has two flags: mh-fallback, which enables fallback to a  different  server  if  the
              selected  server  was  unavailable,  and  mh-port,  which  adds the source port number to the hash
              computation.

       -p, --persistent [timeout]
              Specify that a virtual service is persistent. If this option is specified, multiple requests  from
              a  client  are redirected to the same real server selected for the first request.  Optionally, the
              timeout of persistent sessions may be specified given in seconds, otherwise  the  default  of  300
              seconds  will  be  used.  This option may be used in conjunction with protocols such as SSL or FTP
              where it is important that clients consistently connect with the same real server.

              Note: If a virtual service is to handle FTP connections then  persistence  must  be  set  for  the
              virtual  service  if  Direct  Routing  or  Tunnelling  is  used  as  the  forwarding mechanism. If
              Masquerading is used in conjunction with an FTP service than persistence is not necessary, but the
              ip_vs_ftp  kernel module must be used.  This module may be manually inserted into the kernel using
              insmod(8).

       -M, --netmask netmask
              Specify the granularity with which clients are  grouped  for  persistent  virtual  services.   The
              source  address of the request is masked with this netmask to direct all clients from a network to
              the same real server. The default is 255.255.255.255, that is, the persistence granularity is  per
              client  host.  Less  specific  netmasks  may be used to resolve problems with non-persistent cache
              clusters on the client side.  IPv6 netmasks should be specified as a prefix length between  1  and
              128.  The default prefix length is 128.

       --pe persistence-engine
              Specify  an  alternative persistence engine to be used. Currently the only alternative persistence
              engine available is sip.

       -b, --sched-flags sched-flags
              Set scheduler flags for this virtual server.  sched-flags is a comma-separated list of flags.  See
              the scheduler descriptions for valid scheduler flags.

       -r, --real-server server-address
              Real  server that an associated request for service may be assigned to.  The server-address is the
              host address of a real server, and may plus port. Host can be either  a  plain  IP  address  or  a
              hostname.  Port can be either a plain port number or the service name of port.  In the case of the
              masquerading method, the host address is usually an RFC 1918 private IP address, and the port  can
              be  different  from that of the associated service. With the tunneling and direct routing methods,
              port must be equal to that of the service address. For normal services, the port specified  in the
              service  address  will be used if port is not specified. For fwmark services, port may be omitted,
              in which case  the destination port on the real server will be the destination port of the request
              sent to the virtual service.

       [packet-forwarding-method]

              -g, --gatewaying  Use gatewaying (direct routing). This is the default.

              -i, --ipip  Use ipip encapsulation (tunneling).

                      --tun-type tun-type
                              tun-type is one of ipip|gue|gre.  The default value of tun-type is ipip.

                      --tun-port tun-port
                              tun-port  is  an integer specifying the destination port.  Only valid for tun-type
              gue.

                      --tun-nocsum
                              Specify that tunnel checksums are disabled. This is the default.  Only  valid  for
              tun-type gue and gre.

                      --tun-csum
                              Specify that tunnel checksums are enabled.  Only valid for tun-type gue and gre.

                      --tun-remcsum
                              Specify that Remote Checksum Offload is enabled.  Only valid for tun-type gue.

              -m, --masquerading  Use masquerading (network access translation, or NAT).

              Note:   Regardless  of  the  packet-forwarding mechanism specified, real servers for addresses for
              which there are interfaces on the local node will be use the local forwarding method, then packets
              for  the  servers  will  be  passed  to upper layer on the local node. This cannot be specified by
              ipvsadm, rather it set by the kernel as real servers are added or modified.

       -w, --weight weight
              Weight is an integer specifying the capacity  of a server relative to the others in the pool.  The
              valid  values  of  weight  are  0  through  to 2147483647. The default is 1. Quiescent servers are
              specified with a weight of zero. A quiescent server will receive no new jobs but still  serve  the
              existing  jobs, for all scheduling algorithms distributed with the Linux Virtual Server. Setting a
              quiescent server may be useful if the server is overloaded or needs to be taken out of service for
              maintenance.

       -x, --u-threshold uthreshold
              uthreshold  is  an integer specifying the upper connection threshold of a server. The valid values
              of uthreshold are 0 through to 65535. The default is 0, which means the upper connection threshold
              is  not set. If uthreshold is set with other values, no new connections will be sent to the server
              when the number of its connections exceeds its upper connection threshold.

       -y, --l-threshold lthreshold
              lthreshold is an integer specifying the lower connection threshold of a server. The  valid  values
              of lthreshold are 0 through to 65535. The default is 0, which means the lower connection threshold
              is not set. If lthreshold is set with other values, the server will receive new  connections  when
              the number of its connections drops below its lower connection threshold. If lthreshold is not set
              but uthreshold is set, the server will receive new connections when the number of its  connections
              drops below three forth of its upper connection threshold.

       -c, --connection
              Connection output. The list command with this option will list current IPVS connections.

       --timeout
              Timeout  output.  The  list command with this option will display the  timeout values (in seconds)
              for TCP sessions, TCP sessions after receiving a FIN packet, and UDP packets.

       --daemon
              Daemon information output. The list command with this option will display the  daemon  status  and
              its multicast interface.

       --stats
              Output  of  statistics  information. The list command with this option will display the statistics
              information of services and their servers.

       --rate Output of rate information. The list command with this option will display  the  rate  information
              (such as connections/second, bytes/second and packets/second) of services and their servers.

       --thresholds
              Output  of  thresholds information. The list command with this option will display the upper/lower
              connection threshold information of each server in service listing.

       --persistent-conn
              Output of persistent connection information. The list command with this option  will  display  the
              persistent  connection  counter  information  of  each  server  in service listing. The persistent
              connection is used to forward the actual connections from the  same  client/network  to  the  same
              server.

              The  list command with the -c, --connection option and this option will include persistence engine
              data, if any is present, when listing connections.

       --tun-info
              Output of tunneling information. The list command with this  option  will  display  the  tunneling
              information of services and their servers.

       --sort Sort  the  list  of  virtual  services and real servers. The virtual service entries are sorted in
              ascending order by <protocol, address, port>. The real server  entries  are  sorted  in  ascending
              order by <address, port>. (default)

       --nosort
              Do not sort the list of virtual services and real servers.

       -n, --numeric
              Numeric output.  IP addresses and port numbers will be printed in numeric format rather than as as
              host names and services respectively, which is the  default.

       --exact
              Expand numbers.  Display the exact value of the packet and  byte counters,  instead  of  only  the
              rounded  number  in K's (multiples of 1000) M's (multiples of 1000K) or G's (multiples  of 1000M).
              This option is only relevant for the -L command.

       -6, --ipv6
              Use with -f to signify fwmark rule uses IPv6 addresses.

       -o, --ops
              One-packet scheduling.  Used in conjunction with a UDP virtual service or a fwmark virtual service
              that  handles  only  UDP  packets.   All  connections are created such that they only schedule one
              packet.

   PARAMETERS FOR SYNCHRONIZATION DAEMON
       The --start-daemon requires zero or more of the following parameters.

       --syncid syncid
              Specify the syncid that the sync master daemon fills in the SyncID header while sending  multicast
              messages,  or  the  sync  backup daemon uses to filter out multicast messages not matched with the
              SyncID value. The valid values of syncid are 0 through to 255. The default is 0,  which  means  no
              filtering at all.

       --sync-maxlen length
              Specify the desired length of sync messages (UDP payload size).  It is expected that backup server
              will use value not less than the used value in master server.  The valid values of length  are  in
              the  1 .. (65535 - 20 - 8) range but the kernel ensures a space for at least one sync message.  If
              value is lower than MTU the sync messages will be fragmented by IP layer.  The  default  value  is
              derived  from  the  MTU  value  when daemon is started but master daemon will not default to value
              above 1500 for compatibility reasons.

       --mcast-interface interface
              Specify the multicast interface that the sync master daemon sends outgoing multicasts through,  or
              the sync backup daemon listens to for multicasts.

       --mcast-group address
              Specify IPv4 or IPv6 multicast address for the sync messages.  The default value is 224.0.0.81.

       --mcast-port port
              Specify the UDP port for sync messages.  The default value is 8848.

       --mcast-ttl ttl
              Specify the TTL value for sync messages (1 .. 255).  The default value is 1.

EXAMPLE 1 - Simple Virtual Service

       The following commands configure a Linux Director to distribute incoming requests addressed to port 80 on
       207.175.44.110 equally to port 80 on five real servers. The forwarding method used  in  this  example  is
       NAT, with each of the real servers being masqueraded by the Linux Director.

       ipvsadm -A -t 207.175.44.110:80 -s rr
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.1:80 -m
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.2:80 -m
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.3:80 -m
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.4:80 -m
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.5:80 -m

       Alternatively, this could be achieved in a single ipvsadm command.

       echo "
       -A -t 207.175.44.110:80 -s rr
       -a -t 207.175.44.110:80 -r 192.168.10.1:80 -m
       -a -t 207.175.44.110:80 -r 192.168.10.2:80 -m
       -a -t 207.175.44.110:80 -r 192.168.10.3:80 -m
       -a -t 207.175.44.110:80 -r 192.168.10.4:80 -m
       -a -t 207.175.44.110:80 -r 192.168.10.5:80 -m
       " | ipvsadm -R

       As  masquerading  is  used  as  the  forwarding  mechanism in this example, the default route of the real
       servers must be set to the linux director, which will need to be configured  to  forward  and  masquerade
       packets. This can be achieved using the following commands:

       echo "1" > /proc/sys/net/ipv4/ip_forward

EXAMPLE 2 - Firewall-Mark Virtual Service

       The  following  commands configure a Linux Director to distribute incoming requests addressed to any port
       on 207.175.44.110 or 207.175.44.111 equally to the corresponding port on five real servers.  As  per  the
       previous  example, the forwarding method used in this example is NAT, with each of the real servers being
       masqueraded by the Linux Director.

       ipvsadm -A -f 1  -s rr
       ipvsadm -a -f 1 -r 192.168.10.1:0 -m
       ipvsadm -a -f 1 -r 192.168.10.2:0 -m
       ipvsadm -a -f 1 -r 192.168.10.3:0 -m
       ipvsadm -a -f 1 -r 192.168.10.4:0 -m
       ipvsadm -a -f 1 -r 192.168.10.5:0 -m

       As masquerading is used as the forwarding mechanism in this  example,  the  default  route  of  the  real
       servers  must  be  set  to the linux director, which will need to be configured to forward and masquerade
       packets. The real server should also be configured to mark incoming packets  addressed  to  any  port  on
       207.175.44.110  and  207.175.44.111 with firewall-mark 1. If FTP traffic is to be handled by this virtual
       service, then the ip_vs_ftp kernel module needs to be inserted into the kernel.  These operations can  be
       achieved using the following commands:

       echo "1" > /proc/sys/net/ipv4/ip_forward
       modprobe ip_tables
       iptables  -A PREROUTING -t mangle -d 207.175.44.110/31 -j MARK --set-mark 1
       modprobe ip_vs_ftp

EXAMPLE 3 - Virtual Service with GUE Tunneling

       The following commands configure a Linux Director to distribute incoming requests addressed to port 80 on
       207.175.44.110 equally to port 80 on five real servers. The forwarding method used  in  this  example  is
       tunneling with gue encapsulation.

       ipvsadm -A -t 207.175.44.110:80 -s rr
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.1:80 -i --tun-type gue --tun-port 6080 --tun-nocsum
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.2:80 -i --tun-type gue --tun-port 6080 --tun-csum
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.3:80 -i --tun-type gue --tun-port 6080 --tun-remcsum
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.4:80 -i --tun-type gue --tun-port 6078
       ipvsadm -a -t 207.175.44.110:80 -r 192.168.10.5:80 -i --tun-type gue --tun-port 6079

       Alternatively, this could be achieved in a single ipvsadm command.

       echo "
       -A -t 207.175.44.110:80 -s rr
       -a -t 207.175.44.110:80 -r 192.168.10.1:80 -i --tun-type gue --tun-port 6080 --tun-nocsum
       -a -t 207.175.44.110:80 -r 192.168.10.2:80 -i --tun-type gue --tun-port 6080 --tun-csum
       -a -t 207.175.44.110:80 -r 192.168.10.3:80 -i --tun-type gue --tun-port 6080 --tun-remcsum
       -a -t 207.175.44.110:80 -r 192.168.10.4:80 -i --tun-type gue --tun-port 6078
       -a -t 207.175.44.110:80 -r 192.168.10.5:80 -i --tun-type gue --tun-port 6079
       " | ipvsadm -R

EXAMPLE 4 - Virtual Service with GRE Tunneling

       The following commands configure a Linux Director to use GRE encapsulation.

       ipvsadm -A -t 10.0.0.1:80 -s rr
       ipvsadm -a -t 10.0.0.1:80 -r 192.168.11.1:80 -i --tun-type gre --tun-csum

IPv6

       IPv6 addresses should be surrounded by square brackets ([ and ]).

       ipvsadm -A -t [2001:db8::80]:80 -s rr
       ipvsadm -a -t [2001:db8::80]:80 -r [2001:db8::a0a0]:80 -m

       fwmark IPv6 services require the -6 option.

NOTES

       The  Linux  Virtual  Server  implements  three defense strategies against some types of denial of service
       (DoS) attacks. The Linux Director creates an entry for each connection in order to keep  its  state,  and
       each entry occupies 128 bytes effective memory. LVS's vulnerability to a DoS attack lies in the potential
       to increase the number entries as much as possible until the linux director runs out of memory. The three
       defense  strategies  against the attack are: Randomly drop some entries in the table. Drop 1/rate packets
       before forwarding them. And use secure tcp state transition table and short timeouts. The strategies  are
       controlled by sysctl variables and corresponding entries in the /proc filesystem:

       /proc/sys/net/ipv4/vs/drop_entry /proc/sys/net/ipv4/vs/drop_packet /proc/sys/net/ipv4/vs/secure_tcp

       Valid  values for each variable are 0 through to 3. The default value is 0, which disables the respective
       defense strategy. 1 and 2 are automatic modes - when there is no enough available memory, the  respective
       strategy  will  be enabled and the variable is automatically set to 2, otherwise the strategy is disabled
       and the variable is set to 1. A value of 3 denotes that the respective strategy is always  enabled.   The
       available  memory  threshold  and  secure  TCP  timeouts  can  be  tuned  using  the sysctl variables and
       corresponding entries in the /proc filesystem:

       /proc/sys/net/ipv4/vs/amemthresh /proc/sys/net/ipv4/vs/timeout_*

FILES

       /proc/net/ip_vs
       /proc/net/ip_vs_app
       /proc/net/ip_vs_conn
       /proc/net/ip_vs_stats
       /proc/sys/net/ipv4/vs/am_droprate
       /proc/sys/net/ipv4/vs/amemthresh
       /proc/sys/net/ipv4/vs/drop_entry
       /proc/sys/net/ipv4/vs/drop_packet
       /proc/sys/net/ipv4/vs/secure_tcp
       /proc/sys/net/ipv4/vs/timeout_close
       /proc/sys/net/ipv4/vs/timeout_closewait
       /proc/sys/net/ipv4/vs/timeout_established
       /proc/sys/net/ipv4/vs/timeout_finwait
       /proc/sys/net/ipv4/vs/timeout_icmp
       /proc/sys/net/ipv4/vs/timeout_lastack
       /proc/sys/net/ipv4/vs/timeout_listen
       /proc/sys/net/ipv4/vs/timeout_synack
       /proc/sys/net/ipv4/vs/timeout_synrecv
       /proc/sys/net/ipv4/vs/timeout_synsent
       /proc/sys/net/ipv4/vs/timeout_timewait
       /proc/sys/net/ipv4/vs/timeout_udp

SEE ALSO

       The LVS web site (http://www.linuxvirtualserver.org/) for more documentation about LVS.

       ipvsadm-save(8), ipvsadm-restore(8), iptables(8),
       insmod(8), modprobe(8)

AUTHORS

       ipvsadm - Wensong Zhang <wensong@linuxvirtualserver.org>
              Peter Kese <peter.kese@ijs.si>
       man page - Mike Wangsmo <wanger@redhat.com>
               Wensong Zhang <wensong@linuxvirtualserver.org>
               Horms <horms@verge.net.au>