- systemd-networkd
- Contents
- Basic usage
- Required services and setup
- systemd-networkd-wait-online
- Configuration examples
- Wired adapter using DHCP
- Wired adapter using a static IP
- Wireless adapter
- Wired and wireless adapters on the same machine
- Renaming an interface
- Configuration files
- network files
- [Match]
- [Network]
- [Address]
- [Route]
- [DHCPServer]
- netdev files
- [Match] section
- [NetDev] section
- link files
- [Match] section
- [Link] section
- Usage with containers
- Network bridge with DHCP
- Bridge interface
- Bind Ethernet to bridge
- Bridge network
- Configure the container
- Result
- Notice
- Network bridge with static IP addresses
- Tips and tricks
- Interface and desktop integration
- Configuring static IP or DHCP based on SSID (location)
- Bonding a wired and wireless interface
- Speeding up TCP slow-start
systemd-networkd
systemd-networkd is a system daemon that manages network configurations. It detects and configures network devices as they appear; it can also create virtual network devices. This service can be especially useful to set up complex network configurations for a container managed by systemd-nspawn or for virtual machines. It also works fine on simple connections.
Contents
Basic usage
The systemd package is part of the default Arch installation and contains all needed files to operate a wired network. Wireless adapters, covered later in this article, can be set up by services, such as wpa_supplicant or iwd.
Required services and setup
To use systemd-networkd, start/enable systemd-networkd.service .
It is optional to also configure systemd-resolved, which is a network name resolution service to local applications, considering the following points:
- It is important to understand how resolv.conf and systemd-resolved interact to properly configure the DNS that will be used, some explanations are provided in systemd-resolved.
- systemd-resolved is required if DNS entries are specified in .network files.
- systemd-resolved is also required if you want to obtain DNS addresses from DHCP servers or IPv6 router advertisements.
(by setting ( DHCP= and/or IPv6AcceptRA= in the [Network] section, and UseDNS=yes (the default) in the corresponding section(s) [DHCPv4] , [DHCPv6] , [IPv6AcceptRA] , see systemd.network(5) ). - Note that systemd-resolved can also be used without systemd-networkd.
systemd-networkd-wait-online
Enabling systemd-networkd.service also enables systemd-networkd-wait-online.service , which is a oneshot system service that waits for the network to be configured. The latter has WantedBy=network-online.target , so it will be started only when network-online.target itself is enabled or pulled in by some other unit. See also systemd#Running services after the network is up.
By default, systemd-networkd-wait-online.service waits for all links it is aware of and which are managed by systemd-networkd to be fully configured or failed, and for at least one link to be online.
If your system has multiple network interfaces, but some are not expected to be connected all the time (e.g. if you have a dual-port Ethernet card, but only one cable plugged in), starting systemd-networkd-wait-online.service will fail after the default timeout of 2 minutes. This may cause an unwanted delay in the startup process. To change the behaviour to wait for any interface rather than all interfaces to become online, edit the service and add the —any parameter to the ExecStart line:
Other behaviour such as which specific interface(s) to wait for or the operational state can be configured as well. See systemd-networkd-wait-online(8) for the available parameters.
Configuration examples
All configurations in this section are stored as foo.network in /etc/systemd/network/ . For a full listing of options and processing order, see #Configuration files and systemd.network(5) .
systemd/udev automatically assigns predictable, stable network interface names for all local Ethernet, WLAN, and WWAN interfaces. Use networkctl list to list the devices on the system.
After making changes to a configuration file, restart systemd-networkd.service .
Wired adapter using DHCP
Wired adapter using a static IP
Address= can be used more than once to configure multiple IPv4 or IPv6 addresses. See #network files or systemd.network(5) for more options.
Wireless adapter
In order to connect to a wireless network with systemd-networkd, a wireless adapter configured with another application such as wpa_supplicant or iwd is required.
If the wireless adapter has a static IP address, the configuration is the same (except for the interface name) as in a wired adapter.
To authenticate to the wireless network, use e.g. wpa_supplicant or iwd.
Wired and wireless adapters on the same machine
This setup will enable a DHCP IP for both a wired and wireless connection making use of the metric directive to allow the kernel to decide on-the-fly which one to use. This way, no connection downtime is observed when the wired connection is unplugged.
The kernel’s route metric (same as configured with ip) decides which route to use for outgoing packets, in cases when several match. This will be the case when both wireless and wired devices on the system have active connections. To break the tie, the kernel uses the metric. If one of the connections is terminated, the other automatically wins without there being a gap with nothing configured (ongoing transfers may still not deal with this nicely but that is at a different OSI layer).
Renaming an interface
Instead of editing udev rules, a .link file can be used to rename an interface. A useful example is to set a predictable interface name for a USB-to-Ethernet adapter based on its MAC address, as those adapters are usually given different names depending on which USB port they are plugged into.
Configuration files
Configuration files are located in /usr/lib/systemd/network/ , the volatile runtime network directory /run/systemd/network/ and the local administration network directory /etc/systemd/network/ . Files in /etc/systemd/network/ have the highest priority.
There are three types of configuration files. They all use a format similar to systemd unit files.
- .network files. They will apply a network configuration for a matching device
- .netdev files. They will create a virtual network device for a matching environment
- .link files. When a network device appears, udev will look for the first matching.link file
They all follow the same rules:
- If all conditions in the [Match] section are matched, the profile will be activated
- an empty [Match] section means the profile will apply in any case (can be compared to the * wildcard)
- all configuration files are collectively sorted and processed in lexical order, regardless of the directory in which they live
- files with identical name replace each other
network files
This section is being considered for removal.
These files are aimed at setting network configuration variables, especially for servers and containers.
.network files have the following sections: [Match] , [Link] , [Network] , [Address] , [Route] , and [DHCP] . Below are commonly configured keys for each section. See systemd.network(5) for more information and examples.
[Match]
Parameter | Description | Accepted Values | Default Value |
---|---|---|---|
Name= | Match device names, e.g. en* . By prefixing with ! , the list can be inverted. | white-space separated device names with globs, logical negation ( ! ) | |
MACAddress= | Match MAC addresses, e.g. MACAddress=01:23:45:67:89:ab 00-11-22-33-44-55 AABB.CCDD.EEFF | whitespace-separated MAC addresses in full colon-, hyphen- or dot-delimited hexadecimal | |
Host= | Match the hostname or machine ID of the host. | hostname string with globs, machine-id(5) | |
Virtualization= | Check whether the system is executed in a virtualized environment. Virtualization=false will only match your host machine, while Virtualization=true matches any container or VM. It is possible to check for a specific virtualization type or implementation, or for a user namespace (with private-users ). | boolean, logical negation ( ! ), type ( vm , container ), implementation ( qemu , kvm , zvm , vmware , microsoft , oracle , powervm , xen , bochs , uml , bhyve , qnx , openvz , lxc , lxc-libvirt , systemd-nspawn , docker , podman , rkt , wsl , proot , pouch , acrn ), private-users |
Parameter | Description | Accepted Values | Default Value |
---|---|---|---|
MACAddress= | Assign a hardware address to the device. Useful for MAC address spoofing. | full colon-, hyphen- or dot-delimited hexadecimal MAC addresses | |
MTUBytes= | Maximum transmission unit in bytes to set for the device. Note that if IPv6 is enabled on the interface, and the MTU is chosen below 1280 (the minimum MTU for IPv6) it will automatically be increased to this value. Setting a larger MTU value (e.g. when using jumbo frames) can significantly speed up your network transfers | integer (usual suffixes K, M, G, are supported and are understood to the base of 1024) | |
Multicast= | allows the usage of multicast | boolean | ? not documented ? |
[Network]
Parameter | Description | Accepted Values | Default Value |
---|---|---|---|
DHCP= | Controls DHCPv4 and/or DHCPv6 client support. | boolean, ipv4 , ipv6 | false |
DHCPServer= | If enabled, a DHCPv4 server will be started. | boolean | false |
MulticastDNS= | Enables multicast DNS support. When set to resolve , only resolution is enabled, but not host or service registration and announcement. | boolean, resolve | false |
DNSSEC= | Controls DNSSEC DNS validation support on the link. When set to allow-downgrade , compatibility with non-DNSSEC capable networks is increased, by automatically turning off DNSSEC in this case. | boolean, allow-downgrade | false |
DNS= | Configure static DNS addresses. May be specified more than once. | inet_pton(3) | |
Domains= | A list of domains which should be resolved using the DNS servers on this link. more information | domain name, optionally prefixed with a tilde ( |
)
[Address]
Parameter | Description | Accepted Values | Default Value |
---|---|---|---|
Address= | Specify this key more than once to configure several addresses. Mandatory unless DHCP is used. If the specified address is 0.0.0.0 (for IPv4) or :: (for IPv6), a new address range of the requested size is automatically allocated from a system-wide pool of unused ranges. | static IPv4 or IPv6 address and its prefix length (see inet_pton(3) ) |
[Route]
- Gateway= this option is mandatory unless DHCP is used
- Destination= the destination prefix of the route, possibly followed by a slash and the prefix length
If Destination is not present in [Route] section this section is treated as a default route.
This article or section is out of date.
Parameter | Description | Accepted Values | Default Value |
---|---|---|---|
UseDNS= | controls whether the DNS servers advertised by the DHCP server are used | boolean | true |
Anonymize= | when true, the options sent to the DHCP server will follow the RFC:7844 (Anonymity Profiles for DHCP Clients) to minimize disclosure of identifying information | boolean | false |
UseDomains= | controls whether the domain name received from the DHCP server will be used as DNS search domain. If set to route , the domain name received from the DHCP server will be used for routing DNS queries only, but not for searching. This option can sometimes fix local name resolving when using systemd-resolved | boolean, route | false |
[DHCPServer]
This is an example of a DHCP server configuration which works well with hostapd to create a wireless hotspot. IPMasquerade adds the firewall rules for NAT and implies IPForward=ipv4 to enable packet forwarding.
The factual accuracy of this article or section is disputed.
netdev files
This section is being considered for removal.
These files will create virtual network devices. They have two sections: [Match] and [NetDev] . Below are commonly configured keys for each section. See systemd.netdev(5) for more information and examples.
[Match] section
- Host= the hostname
- Virtualization= check if the system is running in a virtualized environment
[NetDev] section
Most common keys are:
- Name= the interface name. mandatory
- Kind= e.g. bridge, bond, vlan, veth, sit, etc. mandatory
link files
This section is being considered for removal.
These files are an alternative to custom udev rules and will be applied by udev as the device appears. They have two sections: [Match] and [Link] . Below are commonly configured keys for each section. See systemd.link(5) for more information and examples.
[Match] section
- MACAddress= the MAC address
- Host= the host name
- Virtualization=
- Type= the device type e.g. vlan
[Link] section
- MACAddressPolicy= persistent or random addresses, or
- MACAddress= a specific address
- NamePolicy= list of policies by which the interface name should be set, e.g. kernel, keep
Usage with containers
systemd-networkd can provide fully automatic configuration of networking for systemd-nspawn containers when it is used on the host system as well as inside the container. See systemd-nspawn#Networking for a comprehensive overview.
For the examples below,
- we will limit the output of the ip a command to the concerned interfaces.
- we assume the host is your main OS you are booting to and the container is your guest virtual machine.
- all interface names and IP addresses are only examples.
Network bridge with DHCP
Bridge interface
First, create a virtual bridge interface. We tell systemd to create a device named br0 that functions as an ethernet bridge.
Restart systemd-networkd.service to have systemd create the bridge.
To see the newly created bridge on the host and on the container, type:
Note that the interface br0 is listed but is still DOWN at this stage.
Bind Ethernet to bridge
The next step is to add to the newly created bridge a network interface. In the example below, we add any interface that matches the name en* into the bridge br0.
The Ethernet interface must not have DHCP or an IP address associated as the bridge requires an interface to bind to with no IP: modify the corresponding /etc/systemd/network/MyEth.network accordingly to remove the addressing.
Bridge network
Now that the bridge has been created and has been bound to an existing network interface, the IP configuration of the bridge interface must be specified. This is defined in a third .network file, the example below uses DHCP.
Configure the container
Use the —network-bridge=br0 option when starting the container. See systemd-nspawn#Use a network bridge for details.
Result
Notice
- we have now one IP address for br0 on the host, and one for host0 in the container
- two new interfaces have appeared: vb-MyContainer in the host and host0 in the container. This comes as a result of the —network-bridge=br0 option as explained in systemd-nspawn#Use a network bridge for details.
- the DHCP address on host0 comes from the system /usr/lib/systemd/network/80-container-host0.network file.
- on host
This article or section is out of date.
the above command output confirms we have a bridge with two interfaces binded to.
the above command outputs confirm we have activated br0 and host0 interfaces with an IP address and Gateway 192.168.1.254. The gateway address has been automatically grabbed by systemd-networkd.
Network bridge with static IP addresses
Setting a static IP address for each device can be helpful in case of deployed web services (e.g FTP, http, SSH). Each device will keep the same MAC address across reboots if your system /usr/lib/systemd/network/99-default.link file has the MACAddressPolicy=persistent option (it has by default). Thus, you will easily route any service on your Gateway to the desired device.
The following configuration needs to be done for this setup:
The configuration is very similar to the #Network bridge with DHCP section. First, a virtual bridge interface needs to be created and the main physical interface needs to be bound to it. This task can be accomplished with the following two files, with contents equal to those available in the DHCP section.
Next, you need to configure the IP and DNS of the newly created virtual bridge interface. For example:
To get configure a static IP address on the container, we need to override the system /usr/lib/systemd/network/80-container-host0.network file, which provides a DHCP configuration for the host0 network interface of the container. This can be done by placing the configuration into /etc/systemd/network/80-container-host0.network . For example:
Make sure that systemd-networkd.service is enabled in the container.
Tips and tricks
Interface and desktop integration
systemd-networkd does not have a proper interactive management interface neither via command-line shell nor graphical.
Still, some tools are available to either display the current state of the network, receive notifications or interact with the wireless configuration:
- networkctl (via CLI) offers a simple dump of the network interface states.
- When networkd is configured with wpa_supplicant, both wpa_cli and wpa_gui offer the ability to associate and configure WLAN interfaces dynamically.
- networkd-notify-gitAUR can generate simple notifications in response to network interface state changes (such as connection/disconnection and re-association).
- The networkd-dispatcherAUR daemon allows executing scripts in response to network interface state changes, similar to NetworkManager-dispatcher.
- As for the DNS resolver systemd-resolved, information about current DNS servers can be visualized with resolvectl status .
Configuring static IP or DHCP based on SSID (location)
Often there is a situation where your home wireless network uses DHCP and office wireless network uses static IP. This mixed setup can be configured as follows:
Bonding a wired and wireless interface
Bonding allows connection sharing through multiple interfaces, so if e.g. the wired interface is unplugged, the wireless is still connected and the network connectivity remains up seamlessly.
Create a bond interface. In this case the mode is active-backup, which means packets are routed through a secondary interface if the primary interface goes down.
Set the wired interface as the primary:
Set the wireless as the secondary:
Configure the bond interface as you would a normal interface:
Now if the wired network is unplugged, the connection should remain through the wireless:
Speeding up TCP slow-start
On a higher bandwidth link with moderate latency (typically a home Internet connection that is above 10 Mbit/s) the default settings for the TCP Slow Start algorithm are somewhat conservative. This issue exhibits as downloads starting slowly and taking a number of seconds to speed up before they reach the connection’s full bandwidth. It is particularly noticeable with a pacman upgrade, where each package downloaded starts off slowly and often finishes before it has reached the connection’s full speed.
These settings can be adjusted to make TCP connections start with larger window sizes than the defaults, avoiding the time it takes for them to automatically increase on each new TCP connection[1]. While this will usually decrease performance on slow connections (or if the values are increased too far) due to having to retransmit a larger number of lost packets, they can substantially increase performance on connections with sufficient bandwidth.
It is important to benchmark before and after changing these values to ensure it is improving network speed and not reducing it. If you are not seeing downloads begin slowly and gradually speed up, then there is no need to change these values as they are already optimal for your connection speed. When benchmarking, be sure to test against both a high speed and low speed remote server to ensure you are not speeding up access to fast machines at the expense of making access to slow servers even slower.
To adjust these values, edit the .network file for the connection:
Источник