nm-settings-dbusnm-settings-dbus — Description of settings and properties of NetworkManager connection profiles on the D-Bus API |
NetworkManager is based on a concept of connection profiles, sometimes referred to as connections only. These connection profiles contain a network configuration. When NetworkManager activates a connection profile on a network device the configuration will be applied and an active network connection will be established. Users are free to create as many connection profiles as they see fit. Thus they are flexible in having various network configurations for different networking needs. The connection profiles are handled by NetworkManager via settings service and are exported on D-Bus (/org/freedesktop/NetworkManager/Settings/<num> objects). The conceptual objects can be described as follows:
Connection (profile) |
A specific, encapsulated, independent group of settings describing all the configuration required to connect to a specific network. It is referred to by a unique identifier called the UUID. A connection is tied to a one specific device type, but not necessarily a specific hardware device. It is composed of one or more Settings objects. |
Setting |
A group of related key/value pairs describing a specific piece of a
Connection (profile). Settings keys and allowed values are
described in the tables below. Keys are also referred to as properties.
Developers can find the setting objects and their properties in the libnm-core
sources. Look for the |
The settings and properties shown in tables below list all available connection configuration options. However, note that not all settings are applicable to all connection types. NetworkManager provides a command-line tool nmcli that allows direct configuration of the settings and properties according to a connection profile type. nmcli connection editor has also a built-in describe command that can display description of particular settings and properties of this page.
General Connection Profile Settings.
IEEE 802.1x Authentication Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
altsubject-matches | array of string | List of strings to be matched against the altSubjectName of the certificate presented by the authentication server. If the list is empty, no verification of the server certificate's altSubjectName is performed. | |
anonymous-identity | string | Anonymous identity string for EAP authentication methods. Used as the unencrypted identity with EAP types that support different tunneled identity like EAP-TTLS. | |
auth-timeout | int32 | 0 | A timeout for the authentication. Zero means the global default; if the global default is not set, the authentication timeout is 25 seconds. |
ca-cert | byte array | Contains the CA certificate if used by the EAP method specified in the "eap" property. Certificate data is specified using a "scheme"; three are currently supported: blob, path and pkcs#11 URL. When using the blob scheme this property should be set to the certificate's DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string "file://" and ending with a terminating NUL byte. This property can be unset even if the EAP method supports CA certificates, but this allows man-in-the-middle attacks and is NOT recommended. Note that enabling NMSetting8021x:system-ca-certs will override this setting to use the built-in path, if the built-in path is not a directory. | |
ca-cert-password | string | The password used to access the CA certificate stored in "ca-cert" property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login. | |
ca-cert-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "ca-cert-password" property. (see the section called “Secret flag types:” for flag values) | |
ca-path | string | UTF-8 encoded path to a directory containing PEM or DER formatted certificates to be added to the verification chain in addition to the certificate specified in the "ca-cert" property. If NMSetting8021x:system-ca-certs is enabled and the built-in CA path is an existing directory, then this setting is ignored. | |
client-cert | byte array | Contains the client certificate if used by the EAP method specified in the "eap" property. Certificate data is specified using a "scheme"; two are currently supported: blob and path. When using the blob scheme (which is backwards compatible with NM 0.7.x) this property should be set to the certificate's DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string "file://" and ending with a terminating NUL byte. | |
client-cert-password | string | The password used to access the client certificate stored in "client-cert" property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login. | |
client-cert-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "client-cert-password" property. (see the section called “Secret flag types:” for flag values) | |
domain-match | string | Constraint for server domain name. If set, this list of FQDNs is used as a match requirement for dNSName element(s) of the certificate presented by the authentication server. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using the same comparison. Multiple valid FQDNs can be passed as a ";" delimited list. | |
domain-suffix-match | string | Constraint for server domain name. If set, this FQDN is used as a suffix match requirement for dNSName element(s) of the certificate presented by the authentication server. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using same suffix match comparison. Since version 1.24, multiple valid FQDNs can be passed as a ";" delimited list. | |
eap | array of string | The allowed EAP method to be used when authenticating to the network with 802.1x. Valid methods are: "leap", "md5", "tls", "peap", "ttls", "pwd", and "fast". Each method requires different configuration using the properties of this setting; refer to wpa_supplicant documentation for the allowed combinations. | |
identity | string | Identity string for EAP authentication methods. Often the user's user or login name. | |
optional | boolean | FALSE | Whether the 802.1X authentication is optional. If TRUE, the activation will continue even after a timeout or an authentication failure. Setting the property to TRUE is currently allowed only for Ethernet connections. If set to FALSE, the activation can continue only after a successful authentication. |
pac-file | string | UTF-8 encoded file path containing PAC for EAP-FAST. | |
password | string | UTF-8 encoded password used for EAP authentication methods. If both the "password" property and the "password-raw" property are specified, "password" is preferred. | |
password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "password" property. (see the section called “Secret flag types:” for flag values) | |
password-raw | byte array | Password used for EAP authentication methods, given as a byte array to allow passwords in other encodings than UTF-8 to be used. If both the "password" property and the "password-raw" property are specified, "password" is preferred. | |
password-raw-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "password-raw" property. (see the section called “Secret flag types:” for flag values) | |
phase1-auth-flags | uint32 | 0 | Specifies authentication flags to use in "phase 1" outer authentication using NMSetting8021xAuthFlags options. The individual TLS versions can be explicitly disabled. If a certain TLS disable flag is not set, it is up to the supplicant to allow or forbid it. The TLS options map to tls_disable_tlsv1_x settings. See the wpa_supplicant documentation for more details. |
phase1-fast-provisioning | string | Enables or disables in-line provisioning of EAP-FAST credentials when FAST is specified as the EAP method in the "eap" property. Recognized values are "0" (disabled), "1" (allow unauthenticated provisioning), "2" (allow authenticated provisioning), and "3" (allow both authenticated and unauthenticated provisioning). See the wpa_supplicant documentation for more details. | |
phase1-peaplabel | string | Forces use of the new PEAP label during key derivation. Some RADIUS servers may require forcing the new PEAP label to interoperate with PEAPv1. Set to "1" to force use of the new PEAP label. See the wpa_supplicant documentation for more details. | |
phase1-peapver | string | Forces which PEAP version is used when PEAP is set as the EAP method in the "eap" property. When unset, the version reported by the server will be used. Sometimes when using older RADIUS servers, it is necessary to force the client to use a particular PEAP version. To do so, this property may be set to "0" or "1" to force that specific PEAP version. | |
phase2-altsubject-matches | array of string | List of strings to be matched against the altSubjectName of the certificate presented by the authentication server during the inner "phase 2" authentication. If the list is empty, no verification of the server certificate's altSubjectName is performed. | |
phase2-auth | string | Specifies the allowed "phase 2" inner authentication method when an EAP method that uses an inner TLS tunnel is specified in the "eap" property. For TTLS this property selects one of the supported non-EAP inner methods: "pap", "chap", "mschap", "mschapv2" while "phase2-autheap" selects an EAP inner method. For PEAP this selects an inner EAP method, one of: "gtc", "otp", "md5" and "tls". Each "phase 2" inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details. Both "phase2-auth" and "phase2-autheap" cannot be specified. | |
phase2-autheap | string | Specifies the allowed "phase 2" inner EAP-based authentication method when TTLS is specified in the "eap" property. Recognized EAP-based "phase 2" methods are "md5", "mschapv2", "otp", "gtc", and "tls". Each "phase 2" inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details. | |
phase2-ca-cert | byte array | Contains the "phase 2" CA certificate if used by the EAP method specified in the "phase2-auth" or "phase2-autheap" properties. Certificate data is specified using a "scheme"; three are currently supported: blob, path and pkcs#11 URL. When using the blob scheme this property should be set to the certificate's DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string "file://" and ending with a terminating NUL byte. This property can be unset even if the EAP method supports CA certificates, but this allows man-in-the-middle attacks and is NOT recommended. Note that enabling NMSetting8021x:system-ca-certs will override this setting to use the built-in path, if the built-in path is not a directory. | |
phase2-ca-cert-password | string | The password used to access the "phase2" CA certificate stored in "phase2-ca-cert" property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login. | |
phase2-ca-cert-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "phase2-ca-cert-password" property. (see the section called “Secret flag types:” for flag values) | |
phase2-ca-path | string | UTF-8 encoded path to a directory containing PEM or DER formatted certificates to be added to the verification chain in addition to the certificate specified in the "phase2-ca-cert" property. If NMSetting8021x:system-ca-certs is enabled and the built-in CA path is an existing directory, then this setting is ignored. | |
phase2-client-cert | byte array | Contains the "phase 2" client certificate if used by the EAP method specified in the "phase2-auth" or "phase2-autheap" properties. Certificate data is specified using a "scheme"; two are currently supported: blob and path. When using the blob scheme (which is backwards compatible with NM 0.7.x) this property should be set to the certificate's DER encoded data. When using the path scheme, this property should be set to the full UTF-8 encoded path of the certificate, prefixed with the string "file://" and ending with a terminating NUL byte. This property can be unset even if the EAP method supports CA certificates, but this allows man-in-the-middle attacks and is NOT recommended. | |
phase2-client-cert-password | string | The password used to access the "phase2" client certificate stored in "phase2-client-cert" property. Only makes sense if the certificate is stored on a PKCS#11 token that requires a login. | |
phase2-client-cert-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "phase2-client-cert-password" property. (see the section called “Secret flag types:” for flag values) | |
phase2-domain-match | string | Constraint for server domain name. If set, this list of FQDNs is used as a match requirement for dNSName element(s) of the certificate presented by the authentication server during the inner "phase 2" authentication. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using the same comparison. Multiple valid FQDNs can be passed as a ";" delimited list. | |
phase2-domain-suffix-match | string | Constraint for server domain name. If set, this FQDN is used as a suffix match requirement for dNSName element(s) of the certificate presented by the authentication server during the inner "phase 2" authentication. If a matching dNSName is found, this constraint is met. If no dNSName values are present, this constraint is matched against SubjectName CN using same suffix match comparison. Since version 1.24, multiple valid FQDNs can be passed as a ";" delimited list. | |
phase2-private-key | byte array | Contains the "phase 2" inner private key when the "phase2-auth" or "phase2-autheap" property is set to "tls". Key data is specified using a "scheme"; two are currently supported: blob and path. When using the blob scheme and private keys, this property should be set to the key's encrypted PEM encoded data. When using private keys with the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string "file://" and ending with a terminating NUL byte. When using PKCS#12 format private keys and the blob scheme, this property should be set to the PKCS#12 data and the "phase2-private-key-password" property must be set to password used to decrypt the PKCS#12 certificate and key. When using PKCS#12 files and the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string "file://" and ending with a terminating NUL byte, and as with the blob scheme the "phase2-private-key-password" property must be set to the password used to decode the PKCS#12 private key and certificate. | |
phase2-private-key-password | string | The password used to decrypt the "phase 2" private key specified in the "phase2-private-key" property when the private key either uses the path scheme, or is a PKCS#12 format key. | |
phase2-private-key-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "phase2-private-key-password" property. (see the section called “Secret flag types:” for flag values) | |
phase2-subject-match | string | Substring to be matched against the subject of the certificate presented by the authentication server during the inner "phase 2" authentication. When unset, no verification of the authentication server certificate's subject is performed. This property provides little security, if any, and its use is deprecated in favor of NMSetting8021x:phase2-domain-suffix-match. | |
pin | string | PIN used for EAP authentication methods. | |
pin-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "pin" property. (see the section called “Secret flag types:” for flag values) | |
private-key | byte array | Contains the private key when the "eap" property is set to "tls". Key data is specified using a "scheme"; two are currently supported: blob and path. When using the blob scheme and private keys, this property should be set to the key's encrypted PEM encoded data. When using private keys with the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string "file://" and ending with a terminating NUL byte. When using PKCS#12 format private keys and the blob scheme, this property should be set to the PKCS#12 data and the "private-key-password" property must be set to password used to decrypt the PKCS#12 certificate and key. When using PKCS#12 files and the path scheme, this property should be set to the full UTF-8 encoded path of the key, prefixed with the string "file://" and ending with a terminating NUL byte, and as with the blob scheme the "private-key-password" property must be set to the password used to decode the PKCS#12 private key and certificate. WARNING: "private-key" is not a "secret" property, and thus unencrypted private key data using the BLOB scheme may be readable by unprivileged users. Private keys should always be encrypted with a private key password to prevent unauthorized access to unencrypted private key data. | |
private-key-password | string | The password used to decrypt the private key specified in the "private-key" property when the private key either uses the path scheme, or if the private key is a PKCS#12 format key. | |
private-key-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "private-key-password" property. (see the section called “Secret flag types:” for flag values) | |
subject-match | string | Substring to be matched against the subject of the certificate presented by the authentication server. When unset, no verification of the authentication server certificate's subject is performed. This property provides little security, if any, and its use is deprecated in favor of NMSetting8021x:domain-suffix-match. | |
system-ca-certs | boolean | FALSE | When TRUE, overrides the "ca-path" and "phase2-ca-path" properties using the system CA directory specified at configure time with the --system-ca-path switch. The certificates in this directory are added to the verification chain in addition to any certificates specified by the "ca-cert" and "phase2-ca-cert" properties. If the path provided with --system-ca-path is rather a file name (bundle of trusted CA certificates), it overrides "ca-cert" and "phase2-ca-cert" properties instead (sets ca_cert/ca_cert2 options for wpa_supplicant). |
ADSL Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
encapsulation | string | Encapsulation of ADSL connection. Can be "vcmux" or "llc". | |
password | string | Password used to authenticate with the ADSL service. | |
password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "password" property. (see the section called “Secret flag types:” for flag values) | |
protocol | string | ADSL connection protocol. Can be "pppoa", "pppoe" or "ipoatm". | |
username | string | Username used to authenticate with the ADSL service. | |
vci | uint32 | 0 | VCI of ADSL connection |
vpi | uint32 | 0 | VPI of ADSL connection |
Bonding Settings.
Bridging Settings.
Bridge Port Settings.
CDMA-based Mobile Broadband Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
mtu | uint32 | 0 | If non-zero, only transmit packets of the specified size or smaller, breaking larger packets up into multiple frames. |
number | string | The number to dial to establish the connection to the CDMA-based mobile broadband network, if any. If not specified, the default number (#777) is used when required. | |
password | string | The password used to authenticate with the network, if required. Many providers do not require a password, or accept any password. But if a password is required, it is specified here. | |
password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "password" property. (see the section called “Secret flag types:” for flag values) | |
username | string | The username used to authenticate with the network, if required. Many providers do not require a username, or accept any username. But if a username is required, it is specified here. |
Data Center Bridging Settings.
GSM-based Mobile Broadband Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
apn | string | The GPRS Access Point Name specifying the APN used when establishing a data session with the GSM-based network. The APN often determines how the user will be billed for their network usage and whether the user has access to the Internet or just a provider-specific walled-garden, so it is important to use the correct APN for the user's mobile broadband plan. The APN may only be composed of the characters a-z, 0-9, ., and - per GSM 03.60 Section 14.9. | |
auto-config | boolean | FALSE | When TRUE, the settings such as APN, username, or password will default to values that match the network the modem will register to in the Mobile Broadband Provider database. |
device-id | string | The device unique identifier (as given by the WWAN management service) which this connection applies to. If given, the connection will only apply to the specified device. | |
home-only | boolean | FALSE | When TRUE, only connections to the home network will be allowed. Connections to roaming networks will not be made. |
mtu | uint32 | 0 | If non-zero, only transmit packets of the specified size or smaller, breaking larger packets up into multiple frames. |
network-id | string | The Network ID (GSM LAI format, ie MCC-MNC) to force specific network registration. If the Network ID is specified, NetworkManager will attempt to force the device to register only on the specified network. This can be used to ensure that the device does not roam when direct roaming control of the device is not otherwise possible. | |
number | string | Legacy setting that used to help establishing PPP data sessions for GSM-based modems. Deprecated: 1 | |
password | string | The password used to authenticate with the network, if required. Many providers do not require a password, or accept any password. But if a password is required, it is specified here. | |
password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "password" property. (see the section called “Secret flag types:” for flag values) | |
pin | string | If the SIM is locked with a PIN it must be unlocked before any other operations are requested. Specify the PIN here to allow operation of the device. | |
pin-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "pin" property. (see the section called “Secret flag types:” for flag values) | |
sim-id | string | The SIM card unique identifier (as given by the WWAN management service) which this connection applies to. If given, the connection will apply to any device also allowed by "device-id" which contains a SIM card matching the given identifier. | |
sim-operator-id | string | A MCC/MNC string like "310260" or "21601" identifying the specific mobile network operator which this connection applies to. If given, the connection will apply to any device also allowed by "device-id" and "sim-id" which contains a SIM card provisioned by the given operator. | |
username | string | The username used to authenticate with the network, if required. Many providers do not require a username, or accept any username. But if a username is required, it is specified here. |
Infiniband Settings.
IPv4 Settings.
IPv6 Settings.
IP Tunneling Settings.
MACSec Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
encrypt | boolean | TRUE | Whether the transmitted traffic must be encrypted. |
mka-cak | string | The pre-shared CAK (Connectivity Association Key) for MACsec Key Agreement. | |
mka-cak-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "mka-cak" property. (see the section called “Secret flag types:” for flag values) | |
mka-ckn | string | The pre-shared CKN (Connectivity-association Key Name) for MACsec Key Agreement. | |
mode | int32 | 0 | Specifies how the CAK (Connectivity Association Key) for MKA (MACsec Key Agreement) is obtained. |
parent | string | If given, specifies the parent interface name or parent connection UUID from which this MACSEC interface should be created. If this property is not specified, the connection must contain an "802-3-ethernet" setting with a "mac-address" property. | |
port | int32 | 1 | The port component of the SCI (Secure Channel Identifier), between 1 and 65534. |
send-sci | boolean | TRUE | Specifies whether the SCI (Secure Channel Identifier) is included in every packet. |
validation | int32 | 2 | Specifies the validation mode for incoming frames. |
MAC VLAN Settings.
Match settings.
OLPC Wireless Mesh Settings.
OvsBridge Link Settings.
OvsPort Link Settings.
Point-to-Point Protocol Settings.
PPP-over-Ethernet Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
parent | string | If given, specifies the parent interface name on which this PPPoE connection should be created. If this property is not specified, the connection is activated on the interface specified in "interface-name" of NMSettingConnection. | |
password | string | Password used to authenticate with the PPPoE service. | |
password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "password" property. (see the section called “Secret flag types:” for flag values) | |
service | string | If specified, instruct PPPoE to only initiate sessions with access concentrators that provide the specified service. For most providers, this should be left blank. It is only required if there are multiple access concentrators or a specific service is known to be required. | |
username | string | Username used to authenticate with the PPPoE service. |
WWW Proxy Settings.
Serial Link Settings.
SR-IOV settings.
Linux Traffic Control Settings.
Teaming Settings.
Team Port Settings.
Tunnel Settings.
General User Profile Settings.
VLAN Settings.
VPN Settings.
VXLAN Settings.
Wi-Fi P2P Settings.
WiMax Settings.
Wired Ethernet Settings.
WireGuard Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
fwmark | uint32 | 0 | The use of fwmark is optional and is by default off. Setting it to 0 disables it. Otherwise, it is a 32-bit fwmark for outgoing packets. Note that "ip4-auto-default-route" or "ip6-auto-default-route" enabled, implies to automatically choose a fwmark. |
ip4-auto-default-route | NMTernary (int32) | Whether to enable special handling of the IPv4 default route. If enabled, the IPv4 default route from wireguard.peer-routes will be placed to a dedicated routing-table and two policy routing rules will be added. The fwmark number is also used as routing-table for the default-route, and if fwmark is zero, an unused fwmark/table is chosen automatically. This corresponds to what wg-quick does with Table=auto and what WireGuard calls "Improved Rule-based Routing". Note that for this automatism to work, you usually don't want to set ipv4.gateway, because that will result in a conflicting default route. Leaving this at the default will enable this option automatically if ipv4.never-default is not set and there are any peers that use a default-route as allowed-ips. | |
ip6-auto-default-route | NMTernary (int32) | Like ip4-auto-default-route, but for the IPv6 default route. | |
listen-port | uint32 | 0 | The listen-port. If listen-port is not specified, the port will be chosen randomly when the interface comes up. |
mtu | uint32 | 0 | If non-zero, only transmit packets of the specified size or smaller, breaking larger packets up into multiple fragments. If zero a default MTU is used. Note that contrary to wg-quick's MTU setting, this does not take into account the current routes at the time of activation. |
peer-routes | boolean | TRUE | Whether to automatically add routes for the AllowedIPs ranges of the peers. If TRUE (the default), NetworkManager will automatically add routes in the routing tables according to ipv4.route-table and ipv6.route-table. Usually you want this automatism enabled. If FALSE, no such routes are added automatically. In this case, the user may want to configure static routes in ipv4.routes and ipv6.routes, respectively. Note that if the peer's AllowedIPs is "0.0.0.0/0" or "::/0" and the profile's ipv4.never-default or ipv6.never-default setting is enabled, the peer route for this peer won't be added automatically. |
peers | array of 'a{sv}' | Array of dictionaries for the WireGuard peers. | |
private-key | string | The 256 bit private-key in base64 encoding. | |
private-key-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "private-key" property. (see the section called “Secret flag types:” for flag values) |
Wi-Fi Settings.
Wi-Fi Security Settings.
Key Name | Value Type | Default Value | Value Description |
---|---|---|---|
auth-alg | string | When WEP is used (ie, key-mgmt = "none" or "ieee8021x") indicate the 802.11 authentication algorithm required by the AP here. One of "open" for Open System, "shared" for Shared Key, or "leap" for Cisco LEAP. When using Cisco LEAP (ie, key-mgmt = "ieee8021x" and auth-alg = "leap") the "leap-username" and "leap-password" properties must be specified. | |
fils | int32 | 0 | Indicates whether Fast Initial Link Setup (802.11ai) must be enabled for the connection. One of NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) (use global default value), NM_SETTING_WIRELESS_SECURITY_FILS_DISABLE (1) (disable FILS), NM_SETTING_WIRELESS_SECURITY_FILS_OPTIONAL (2) (enable FILS if the supplicant and the access point support it) or NM_SETTING_WIRELESS_SECURITY_FILS_REQUIRED (3) (enable FILS and fail if not supported). When set to NM_SETTING_WIRELESS_SECURITY_FILS_DEFAULT (0) and no global default is set, FILS will be optionally enabled. |
group | array of string | A list of group/broadcast encryption algorithms which prevents connections to Wi-Fi networks that do not utilize one of the algorithms in the list. For maximum compatibility leave this property empty. Each list element may be one of "wep40", "wep104", "tkip", or "ccmp". | |
key-mgmt | string | Key management used for the connection. One of "none" (WEP or no password protection), "ieee8021x" (Dynamic WEP), "owe" (Opportunistic Wireless Encryption), "wpa-psk" (WPA2 + WPA3 personal), "sae" (WPA3 personal only), "wpa-eap" (WPA2 + WPA3 enterprise) or "wpa-eap-suite-b-192" (WPA3 enterprise only). This property must be set for any Wi-Fi connection that uses security. | |
leap-password | string | The login password for legacy LEAP connections (ie, key-mgmt = "ieee8021x" and auth-alg = "leap"). | |
leap-password-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "leap-password" property. (see the section called “Secret flag types:” for flag values) | |
leap-username | string | The login username for legacy LEAP connections (ie, key-mgmt = "ieee8021x" and auth-alg = "leap"). | |
pairwise | array of string | A list of pairwise encryption algorithms which prevents connections to Wi-Fi networks that do not utilize one of the algorithms in the list. For maximum compatibility leave this property empty. Each list element may be one of "tkip" or "ccmp". | |
pmf | int32 | 0 | Indicates whether Protected Management Frames (802.11w) must be enabled for the connection. One of NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) (use global default value), NM_SETTING_WIRELESS_SECURITY_PMF_DISABLE (1) (disable PMF), NM_SETTING_WIRELESS_SECURITY_PMF_OPTIONAL (2) (enable PMF if the supplicant and the access point support it) or NM_SETTING_WIRELESS_SECURITY_PMF_REQUIRED (3) (enable PMF and fail if not supported). When set to NM_SETTING_WIRELESS_SECURITY_PMF_DEFAULT (0) and no global default is set, PMF will be optionally enabled. |
proto | array of string | List of strings specifying the allowed WPA protocol versions to use. Each element may be one "wpa" (allow WPA) or "rsn" (allow WPA2/RSN). If not specified, both WPA and RSN connections are allowed. | |
psk | string | Pre-Shared-Key for WPA networks. For WPA-PSK, it's either an ASCII passphrase of 8 to 63 characters that is (as specified in the 802.11i standard) hashed to derive the actual key, or the key in form of 64 hexadecimal character. The WPA3-Personal networks use a passphrase of any length for SAE authentication. | |
psk-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "psk" property. (see the section called “Secret flag types:” for flag values) | |
wep-key-flags | NMSettingSecretFlags (uint32) | Flags indicating how to handle the "wep-key0", "wep-key1", "wep-key2", and "wep-key3" properties. (see the section called “Secret flag types:” for flag values) | |
wep-key-type | NMWepKeyType (uint32) | Controls the interpretation of WEP keys. Allowed values are NM_WEP_KEY_TYPE_KEY (1), in which case the key is either a 10- or 26-character hexadecimal string, or a 5- or 13-character ASCII password; or NM_WEP_KEY_TYPE_PASSPHRASE (2), in which case the passphrase is provided as a string and will be hashed using the de-facto MD5 method to derive the actual WEP key. | |
wep-key0 | string | Index 0 WEP key. This is the WEP key used in most networks. See the "wep-key-type" property for a description of how this key is interpreted. | |
wep-key1 | string | Index 1 WEP key. This WEP index is not used by most networks. See the "wep-key-type" property for a description of how this key is interpreted. | |
wep-key2 | string | Index 2 WEP key. This WEP index is not used by most networks. See the "wep-key-type" property for a description of how this key is interpreted. | |
wep-key3 | string | Index 3 WEP key. This WEP index is not used by most networks. See the "wep-key-type" property for a description of how this key is interpreted. | |
wep-tx-keyidx | uint32 | 0 | When static WEP is used (ie, key-mgmt = "none") and a non-default WEP key index is used by the AP, put that WEP key index here. Valid values are 0 (default key) through 3. Note that some consumer access points (like the Linksys WRT54G) number the keys 1 - 4. |
wps-method | uint32 | 0 | Flags indicating which mode of WPS is to be used if any. There's little point in changing the default setting as NetworkManager will automatically determine whether it's feasible to start WPS enrollment from the Access Point capabilities. WPS can be disabled by setting this property to a value of 1. |
IEEE 802.15.4 (WPAN) MAC Settings.
Hostname settings.
Each password or secret property in a setting has an associated flags property that describes how to handle that secret. The flags property is a bitfield that contains zero or more of the following values logically OR-ed together.
0x0 (none) - the system is responsible for providing and storing this secret. This may be required so that secrets are already available before the user logs in. It also commonly means that the secret will be stored in plain text on disk, accessible to root only. For example via the keyfile settings plugin as described in the "PLUGINS" section in NetworkManager.conf(5).
0x1 (agent-owned) - a user-session secret agent is responsible for providing and storing this secret; when it is required, agents will be asked to provide it.
0x2 (not-saved) - this secret should not be saved but should be requested from the user each time it is required. This flag should be used for One-Time-Pad secrets, PIN codes from hardware tokens, or if the user simply does not want to save the secret.
0x4 (not-required) - in some situations it cannot be automatically determined that a secret is required or not. This flag hints that the secret is not required and should not be requested from the user.