]> git.proxmox.com Git - mirror_iproute2.git/blame - man/man8/bridge.8
bridge: mdb: add support for source address
[mirror_iproute2.git] / man / man8 / bridge.8
CommitLineData
d04bc300
SH
1.TH BRIDGE 8 "1 August 2012" "iproute2" "Linux"
2.SH NAME
3bridge \- show / manipulate bridge addresses and devices
4.SH SYNOPSIS
5
6.ad l
7.in +8
8.ti -8
9.B bridge
10.RI "[ " OPTIONS " ] " OBJECT " { " COMMAND " | "
11.BR help " }"
12.sp
13
14.ti -8
15.IR OBJECT " := { "
54e9c3a3 16.BR link " | " fdb " | " mdb " | " vlan " | " monitor " }"
d04bc300
SH
17.sp
18
19.ti -8
20.IR OPTIONS " := { "
21\fB\-V\fR[\fIersion\fR] |
527910c8 22\fB\-s\fR[\fItatistics\fR] |
db726379
RP
23\fB\-n\fR[\fIetns\fR] name |
24\fB\-b\fR[\fIatch\fR] filename |
3a1ca9a5 25\fB\-c\fR[\folor\fR] |
01842eb5 26\fB\-p\fR[\fIretty\fR] |
05758f5c
PS
27\fB\-j\fR[\fIson\fR] |
28\fB\-o\fR[\fIneline\fr] }
aa2f1335
VY
29
30.ti -8
57cfcc62 31.B "bridge link set"
fc31817d 32.B dev
57cfcc62 33.IR DEV " [ "
fc31817d 34.B cost
aa2f1335 35.IR COST " ] [ "
fc31817d
PS
36.B priority
37.IR PRIO " ] [ "
38.B state
d13d52d0 39.IR STATE " ] [ "
aa2f1335
VY
40.BR guard " { " on " | " off " } ] [ "
41.BR hairpin " { " on " | " off " } ] [ "
42.BR fastleave " { " on " | " off " } ] [ "
43.BR root_block " { " on " | " off " } ] [ "
f0f4ab60 44.BR learning " { " on " | " off " } ] [ "
674bb438 45.BR learning_sync " { " on " | " off " } ] [ "
f0f4ab60 46.BR flood " { " on " | " off " } ] [ "
22a98f51 47.BR hwmode " { " vepa " | " veb " } ] [ "
9208b4e7 48.BR mcast_flood " { " on " | " off " } ] [ "
b5a754b1 49.BR mcast_to_unicast " { " on " | " off " } ] [ "
8cfde5c9
RP
50.BR neigh_suppress " { " on " | " off " } ] [ "
51.BR vlan_tunnel " { " on " | " off " } ] [ "
05001bcf 52.BR isolated " { " on " | " off " } ] [ "
d13d52d0
NA
53.B backup_port
54.IR DEVICE " ] ["
55.BR nobackup_port " ] [ "
9208b4e7 56.BR self " ] [ " master " ]"
aa2f1335
VY
57
58.ti -8
59.BR "bridge link" " [ " show " ] [ "
fc31817d 60.B dev
aa2f1335 61.IR DEV " ]"
d04bc300
SH
62
63.ti -8
6e2e2cf0 64.BR "bridge fdb" " { " add " | " append " | " del " | " replace " } "
d04bc300 65.I LLADDR
fc31817d 66.B dev
d04bc300 67.IR DEV " { "
c6d0cfb5 68.BR local " | " static " | " dynamic " } [ "
c3ded6e4 69.BR self " ] [ " master " ] [ " router " ] [ " use " ] [ " extern_learn " ] [ " sticky " ] [ "
468f787f
RP
70.B src_vni
71.IR VNI " ] { ["
fc31817d 72.B dst
7578ae88
TR
73.IR IPADDR " ] [ "
74.B vni
75.IR VNI " ] ["
76.B port
77.IR PORT " ] ["
78.B via
468f787f
RP
79.IR DEVICE " ] | "
80.B nhid
81.IR NHID " } "
d04bc300
SH
82
83.ti -8
65c0c4d2 84.BR "bridge fdb" " [ [ " show " ] [ "
7f10090b
NA
85.B br
86.IR BRDEV " ] [ "
87.B brport
88.IR DEV " ] [ "
89.B vlan
90.IR VID " ] [ "
91.B state
65c0c4d2
AD
92.IR STATE " ] ["
93.B dynamic
94.IR "] ]"
d04bc300 95
4ed5ad7b 96.ti -8
65c0c4d2
AD
97.BR "bridge fdb get" " ["
98.B to
99.IR "]"
100.I LLADDR "[ "
4ed5ad7b 101.B br
65c0c4d2
AD
102.IR BRDEV " ]"
103.B { brport | dev }
104.IR DEV " [ "
4ed5ad7b 105.B vlan
65c0c4d2
AD
106.IR VID " ] [ "
107.B vni
108.IR VNI " ] ["
109.BR self " ] [ " master " ] [ " dynamic " ]"
4ed5ad7b 110
54e9c3a3
PP
111.ti -8
112.BR "bridge mdb" " { " add " | " del " } "
fc31817d 113.B dev
57cfcc62 114.I DEV
54e9c3a3 115.B port
57cfcc62 116.I PORT
54e9c3a3
PP
117.B grp
118.IR GROUP " [ "
547b3197
NA
119.B src
120.IR SOURCE " ] [ "
6aac8617
NA
121.BR permanent " | " temp " ] [ "
122.B vid
123.IR VID " ] "
54e9c3a3
PP
124
125.ti -8
126.BR "bridge mdb show " [ "
fc31817d 127.B dev
54e9c3a3
PP
128.IR DEV " ]"
129
ab938710
VY
130.ti -8
131.BR "bridge vlan" " { " add " | " del " } "
fc31817d 132.B dev
57cfcc62 133.I DEV
fc31817d 134.B vid
ab938710 135.IR VID " [ "
57cfcc62 136.B tunnel_info
8652eeb3 137.IR TUNNEL_ID " ] [ "
fc31817d
PS
138.BR pvid " ] [ " untagged " ] [ "
139.BR self " ] [ " master " ] "
ab938710
VY
140
141.ti -8
8652eeb3 142.BR "bridge vlan" " [ " show " | " tunnelshow " ] [ "
fc31817d 143.B dev
ab938710
VY
144.IR DEV " ]"
145
d04bc300 146.ti -8
54e9c3a3 147.BR "bridge monitor" " [ " all " | " neigh " | " link " | " mdb " ]"
d04bc300
SH
148
149.SH OPTIONS
150
151.TP
152.BR "\-V" , " -Version"
153print the version of the
154.B bridge
155utility and exit.
156
157.TP
158.BR "\-s" , " \-stats", " \-statistics"
a89d5329 159output more information. If this option
49572501 160is given multiple times, the amount of information increases.
d04bc300
SH
161As a rule, the information is statistics or some time values.
162
ba037267
NA
163.TP
164.BR "\-d" , " \-details"
165print detailed information about MDB router ports.
166
527910c8
VK
167.TP
168.BR "\-n" , " \-net" , " \-netns " <NETNS>
169switches
170.B bridge
171to the specified network namespace
172.IR NETNS .
173Actually it just simplifies executing of:
174
175.B ip netns exec
57cfcc62 176.I NETNS
527910c8
VK
177.B bridge
178.RI "[ " OPTIONS " ] " OBJECT " { " COMMAND " | "
179.BR help " }"
180
181to
182
183.B bridge
184.RI "-n[etns] " NETNS " [ " OPTIONS " ] " OBJECT " { " COMMAND " | "
185.BR help " }"
186
9de8c6d9
WK
187.TP
188.BR "\-b", " \-batch " <FILENAME>
189Read commands from provided file or standard input and invoke them.
190First failure will cause termination of bridge command.
191
192.TP
57cfcc62 193.B "\-force"
9de8c6d9
WK
194Don't terminate bridge command on errors in batch mode.
195If there were any errors during execution of the commands, the application
196return code will be non zero.
d04bc300 197
db726379 198.TP
ff1ab8ed
PS
199.BR \-c [ color ][ = { always | auto | never }
200Configure color output. If parameter is omitted or
201.BR always ,
202color output is enabled regardless of stdout state. If parameter is
203.BR auto ,
204stdout is checked to be a terminal before enabling color output. If parameter is
205.BR never ,
206color output is disabled. If specified multiple times, the last one takes
207precedence. This flag is ignored if
208.B \-json
209is also given.
db726379 210
01842eb5 211.TP
3a1ca9a5
SH
212.BR "\-j", " \-json"
213Output results in JavaScript Object Notation (JSON).
214
215.TP
216.BR "\-p", " \-pretty"
01842eb5
SH
217When combined with -j generate a pretty JSON output.
218
05758f5c
PS
219.TP
220.BR "\-o", " \-oneline"
221output each record on a single line, replacing line feeds
222with the
223.B '\e'
224character. This is convenient when you want to count records
225with
226.BR wc (1)
227or to
228.BR grep (1)
229the output.
230
01842eb5 231
d04bc300
SH
232.SH BRIDGE - COMMAND SYNTAX
233
234.SS
235.I OBJECT
236
aa2f1335
VY
237.TP
238.B link
239- Bridge port.
240
d04bc300 241.TP
5699275b 242.B fdb
d04bc300
SH
243- Forwarding Database entry.
244
54e9c3a3
PP
245.TP
246.B mdb
247- Multicast group database entry.
248
ab938710
VY
249.TP
250.B vlan
251- VLAN filter list.
252
d04bc300
SH
253.SS
254.I COMMAND
255
256Specifies the action to perform on the object.
257The set of possible actions depends on the object type.
258As a rule, it is possible to
259.BR "add" , " delete"
260and
261.B show
262(or
263.B list
264) objects, but some objects do not allow all of these operations
a89d5329 265or have some additional commands. The
d04bc300 266.B help
a89d5329 267command is available for all objects. It prints
d04bc300
SH
268out a list of available commands and argument syntax conventions.
269.sp
270If no command is given, some default command is assumed.
271Usually it is
272.B list
273or, if the objects of this class cannot be listed,
274.BR "help" .
275
aa2f1335
VY
276.SH bridge link - bridge port
277
278.B link
279objects correspond to the port devices of the bridge.
280
281.P
282The corresponding commands set and display port status and bridge specific
283attributes.
284
285.SS bridge link set - set bridge specific attributes on a port
286
287.TP
288.BI dev " NAME "
289interface name of the bridge port
290
291.TP
292.BI cost " COST "
293the STP path cost of the specified port.
294
295.TP
296.BI priority " PRIO "
a89d5329
297the STP port priority. The priority value is an unsigned 8-bit quantity
298(number between 0 and 255). This metric is used in the designated port an
b831c5ff 299droot port selection algorithms.
aa2f1335
VY
300
301.TP
302.BI state " STATE "
8d5d91fd 303the operation state of the port. Except state 0 (disable STP or BPDU filter feature),
420febf9 304this is primarily used by user space STP/RSTP
8d5d91fd 305implementation. One may enter port state name (case insensitive), or one of the
a89d5329 306numbers below. Negative inputs are ignored, and unrecognized names return an
6b8c871d 307error.
aa2f1335
VY
308
309.B 0
8d5d91fd 310- port is in STP
420febf9 311.B DISABLED
8d5d91fd 312state. Make this port completely inactive for STP. This is also called
420febf9
BR
313BPDU filter and could be used to disable STP on an untrusted port, like
314a leaf virtual devices.
aa2f1335
VY
315.sp
316
317.B 1
8d5d91fd 318- port is in STP
420febf9
BR
319.B LISTENING
320state. Only valid if STP is enabled on the bridge. In this
3aa8f8cb 321state the port listens for STP BPDUs and drops all other traffic frames.
aa2f1335
VY
322.sp
323
324.B 2
8d5d91fd 325- port is in STP
420febf9
BR
326.B LEARNING
327state. Only valid if STP is enabled on the bridge. In this
aa2f1335 328state the port will accept traffic only for the purpose of updating MAC
ac0817ef 329address tables.
aa2f1335
VY
330.sp
331
332.B 3
8d5d91fd 333- port is in STP
420febf9
BR
334.B FORWARDING
335state. Port is fully active.
aa2f1335
VY
336.sp
337
338.B 4
8d5d91fd 339- port is in STP
420febf9
BR
340.B BLOCKING
341state. Only valid if STP is enabled on the bridge. This state
a89d5329 342is used during the STP election process. In this state, port will only process
aa2f1335
VY
343STP BPDUs.
344.sp
345
346.TP
347.BR "guard on " or " guard off "
400b5404 348Controls whether STP BPDUs will be processed by the bridge port. By default,
a89d5329 349the flag is turned off allowed BPDU processing. Turning this flag on will
19bbebc4
BR
350disables
351the bridge port if a STP BPDU packet is received.
352
353If running Spanning Tree on bridge, hostile devices on the network
354may send BPDU on a port and cause network failure. Setting
355.B guard on
356will detect and stop this by disabling the port.
357The port will be restarted if link is brought down, or
358removed and reattached. For example if guard is enable on
359eth0:
360
361.B ip link set dev eth0 down; ip link set dev eth0 up
aa2f1335
VY
362
363.TP
364.BR "hairpin on " or " hairpin off "
365Controls whether traffic may be send back out of the port on which it was
1cad8f8d
BR
366received. This option is also called reflective relay mode, and is used to support
367basic VEPA (Virtual Ethernet Port Aggregator) capabilities.
368By default, this flag is turned off and the bridge will not forward
aa2f1335
VY
369traffic back out of the receiving port.
370
371.TP
372.BR "fastleave on " or " fastleave off "
373This flag allows the bridge to immediately stop multicast traffic on a port
a89d5329
374that receives IGMP Leave message. It is only used with IGMP snooping is
375enabled on the bridge. By default the flag is off.
aa2f1335
VY
376
377.TP
378.BR "root_block on " or " root_block off "
a89d5329
379Controls whether a given port is allowed to become root port or not. Only used
380when STP is enabled on the bridge. By default the flag is off.
aa2f1335 381
498883a0
BR
382This feature is also called root port guard.
383If BPDU is received from a leaf (edge) port, it should not
384be elected as root port. This could be used if using STP on a bridge and the downstream bridges are not fully
385trusted; this prevents a hostile guest from rerouting traffic.
386
f0f4ab60
VY
387.TP
388.BR "learning on " or " learning off "
389Controls whether a given port will learn MAC addresses from received traffic or
a89d5329
390not. If learning if off, the bridge will end up flooding any traffic for which
391it has no FDB entry. By default this flag is on.
f0f4ab60 392
674bb438
SF
393.TP
394.BR "learning_sync on " or " learning_sync off "
395Controls whether a given port will sync MAC addresses learned on device port to
396bridge FDB.
397
f0f4ab60 398.TP
02723cf2 399.BR "flood on " or " flood off "
a89d5329 400Controls whether a given port will flood unicast traffic for which there is no FDB entry. By default this flag is on.
f0f4ab60 401
aa2f1335 402.TP
57cfcc62 403.B hwmode
aa2f1335 404Some network interface cards support HW bridge functionality and they may be
a89d5329 405configured in different modes. Currently support modes are:
aa2f1335
VY
406
407.B vepa
408- Data sent between HW ports is sent on the wire to the external
409switch.
410
411.B veb
412- bridging happens in hardware.
413
9208b4e7
NA
414.TP
415.BR "mcast_flood on " or " mcast_flood off "
f76ad635
SH
416Controls whether a given port will flood multicast traffic for which
417there is no MDB entry. By default this flag is on.
9208b4e7 418
b5a754b1
TJ
419.TP
420.BR "mcast_to_unicast on " or " mcast_to_unicast off "
f76ad635
SH
421Controls whether a given port will replicate packets using unicast
422instead of multicast. By default this flag is off.
b5a754b1 423
706f7d35
BR
424This is done by copying the packet per host and
425changing the multicast destination MAC to a unicast one accordingly.
426
57cfcc62 427.B mcast_to_unicast
706f7d35
BR
428works on top of the multicast snooping feature of
429the bridge. Which means unicast copies are only delivered to hosts which
430are interested in it and signalized this via IGMP/MLD reports
431previously.
432
433This feature is intended for interface types which have a more reliable
434and/or efficient way to deliver unicast packets than broadcast ones
435(e.g. WiFi).
436
437However, it should only be enabled on interfaces where no IGMPv2/MLDv1
438report suppression takes place. IGMP/MLD report suppression issue is usually
439overcome by the network daemon (supplicant) enabling AP isolation and
440by that separating all STAs.
441
b831c5ff 442Delivery of STA-to-STA IP multicast is made possible again by
706f7d35
BR
443enabling and utilizing the bridge hairpin mode, which considers the
444incoming port as a potential outgoing port, too (see
445.B hairpin
446option).
447Hairpin mode is performed after multicast snooping, therefore leading to
448only deliver reports to STAs running a multicast router.
449
41973a47
RP
450.TP
451.BR "neigh_suppress on " or " neigh_suppress off "
f76ad635
SH
452Controls whether neigh discovery (arp and nd) proxy and suppression is
453enabled on the port. By default this flag is off.
41973a47 454
8cfde5c9
RP
455.TP
456.BR "vlan_tunnel on " or " vlan_tunnel off "
f76ad635
SH
457Controls whether vlan to tunnel mapping is enabled on the port. By
458default this flag is off.
8cfde5c9 459
05001bcf
NA
460.TP
461.BR "isolated on " or " isolated off "
f76ad635
SH
462Controls whether a given port will be isolated, which means it will be
463able to communicate with non-isolated ports only. By default this
464flag is off.
05001bcf 465
d13d52d0
NA
466.TP
467.BI backup_port " DEVICE"
f76ad635
SH
468If the port loses carrier all traffic will be redirected to the
469configured backup port
d13d52d0
NA
470
471.TP
57cfcc62 472.B nobackup_port
d13d52d0
NA
473Removes the currently configured backup port
474
22a98f51 475.TP
57cfcc62 476.B self
22a98f51
RP
477link setting is configured on specified physical device
478
479.TP
57cfcc62 480.B master
22a98f51
RP
481link setting is configured on the software bridge (default)
482
25bc3d3d
SA
483.TP
484.BR "\-t" , " \-timestamp"
485display current time when using monitor option.
22a98f51 486
0641bed8 487.SS bridge link show - list ports configuration for all bridges.
aa2f1335 488
0641bed8
AC
489This command displays port configuration and flags for all bridges.
490
491To display port configuration and flags for a specific bridge, use the
492"ip link show master <bridge_device>" command.
aa2f1335 493
d04bc300
SH
494.SH bridge fdb - forwarding database management
495
496.B fdb
fc31817d 497objects contain known Ethernet addresses on a link.
d04bc300
SH
498
499.P
500The corresponding commands display fdb entries, add new entries,
7578ae88 501append entries,
d04bc300
SH
502and delete old ones.
503
d611682a 504.SS bridge fdb add - add a new fdb entry
d04bc300 505
d611682a 506This command creates a new fdb entry.
d04bc300
SH
507
508.TP
57cfcc62 509.B LLADDR
d04bc300
SH
510the Ethernet MAC address.
511
512.TP
7578ae88 513.BI dev " DEV"
d04bc300
SH
514the interface to which this address is associated.
515
c6d0cfb5
RP
516.B local
517- is a local permanent fdb entry
518.sp
519
520.B static
521- is a static (no arp) fdb entry
522.sp
523
524.B dynamic
525- is a dynamic reachable age-able fdb entry
526.sp
527
d611682a 528.B self
cd8df30b
RP
529- the address is associated with the port drivers fdb. Usually hardware.
530.sp
531
532.B master
533- the address is associated with master devices fdb. Usually software (default).
d611682a
JF
534.sp
535
7578ae88
TR
536.B router
537- the destination address is associated with a router.
538Valid if the referenced device is a VXLAN type device and has
b831c5ff 539route short circuit enabled.
7578ae88
TR
540.sp
541
cd8df30b
RP
542.B use
543- the address is in use. User space can use this option to
544indicate to the kernel that the fdb entry is in use.
545.sp
546
b4f84bf8
RP
547.B extern_learn
548- this entry was learned externally. This option can be used to
549indicate to the kernel that an entry was hardware or user-space
550controller learnt dynamic entry. Kernel will not age such an entry.
551.sp
552
c3ded6e4
NA
553.B sticky
554- this entry will not change its port due to learning.
555.sp
556
d04bc300 557.in -8
7578ae88
TR
558The next command line parameters apply only
559when the specified device
560.I DEV
561is of type VXLAN.
562.TP
563.BI dst " IPADDR"
564the IP address of the destination
565VXLAN tunnel endpoint where the Ethernet MAC ADDRESS resides.
566
c5b176e5 567.TP
df126215 568.BI src_vni " VNI"
c5b176e5
RP
569the src VNI Network Identifier (or VXLAN Segment ID)
570this entry belongs to. Used only when the vxlan device is in
571external or collect metadata mode. If omitted the value specified at
572vxlan device creation will be used.
573
7578ae88
TR
574.TP
575.BI vni " VNI"
576the VXLAN VNI Network Identifier (or VXLAN Segment ID)
577to use to connect to the remote VXLAN tunnel endpoint.
578If omitted the value specified at vxlan device creation
579will be used.
580
581.TP
582.BI port " PORT"
583the UDP destination PORT number to use to connect to the
584remote VXLAN tunnel endpoint.
585If omitted the default value is used.
586
587.TP
588.BI via " DEVICE"
589device name of the outgoing interface for the
590VXLAN device driver to reach the
5699275b 591remote VXLAN tunnel endpoint.
7578ae88 592
468f787f
RP
593.TP
594.BI nhid " NHID "
595ecmp nexthop group for the VXLAN device driver
596to reach remote VXLAN tunnel endpoints.
597
7578ae88
TR
598.SS bridge fdb append - append a forwarding database entry
599This command adds a new fdb entry with an already known
600.IR LLADDR .
601Valid only for multicast link layer addresses.
602The command adds support for broadcast and multicast
603Ethernet MAC addresses.
604The Ethernet MAC address is added multiple times into
605the forwarding database and the vxlan device driver
606sends a copy of the data packet to each entry found.
607
608.PP
609The arguments are the same as with
fc31817d 610.BR "bridge fdb add" .
d04bc300
SH
611
612.SS bridge fdb delete - delete a forwarding database entry
613This command removes an existing fdb entry.
614
615.PP
616The arguments are the same as with
fc31817d 617.BR "bridge fdb add" .
d04bc300 618
6e2e2cf0
PS
619.SS bridge fdb replace - replace a forwarding database entry
620If no matching entry is found, a new one will be created instead.
621
622.PP
623The arguments are the same as with
fc31817d 624.BR "bridge fdb add" .
6e2e2cf0 625
d04bc300
SH
626.SS bridge fdb show - list forwarding entries.
627
49572501 628This command displays the current forwarding table.
d04bc300
SH
629
630.PP
631With the
632.B -statistics
a89d5329 633option, the command becomes verbose. It prints out the last updated
d04bc300
SH
634and last used time for each entry.
635
4ed5ad7b
RP
636.SS bridge fdb get - get bridge forwarding entry.
637
638lookup a bridge forwarding table entry.
639
640.TP
57cfcc62 641.B LLADDR
4ed5ad7b
RP
642the Ethernet MAC address.
643
644.TP
645.BI dev " DEV"
646the interface to which this address is associated.
647
648.TP
649.BI brport " DEV"
650the bridge port to which this address is associated. same as dev above.
651
652.TP
653.BI br " DEV"
654the bridge to which this address is associated.
655
656.TP
657.B self
658- the address is associated with the port drivers fdb. Usually hardware.
659
660.TP
661.B master
662- the address is associated with master devices fdb. Usually software (default).
663.sp
664
54e9c3a3
PP
665.SH bridge mdb - multicast group database management
666
667.B mdb
668objects contain known IP multicast group addresses on a link.
669
670.P
671The corresponding commands display mdb entries, add new entries,
672and delete old ones.
673
674.SS bridge mdb add - add a new multicast group database entry
675
676This command creates a new mdb entry.
677
678.TP
679.BI dev " DEV"
680the interface where this group address is associated.
681
682.TP
683.BI port " PORT"
684the port whose link is known to have members of this multicast group.
685
686.TP
687.BI grp " GROUP"
688the IP multicast group address whose members reside on the link connected to
689the port.
690
691.B permanent
692- the mdb entry is permanent
693.sp
694
695.B temp
696- the mdb entry is temporary (default)
697.sp
698
547b3197
NA
699.TP
700.BI src " SOURCE"
701optional source IP address of a sender for this multicast group. If IGMPv3 for IPv4, or
702MLDv2 for IPv6 respectively, are enabled it will be included in the lookup when
703forwarding multicast traffic.
704
6aac8617
NA
705.TP
706.BI vid " VID"
707the VLAN ID which is known to have members of this multicast group.
708
54e9c3a3
PP
709.in -8
710.SS bridge mdb delete - delete a multicast group database entry
711This command removes an existing mdb entry.
712
713.PP
714The arguments are the same as with
715.BR "bridge mdb add" .
716
717.SS bridge mdb show - list multicast group database entries
718
719This command displays the current multicast group membership table. The table
720is populated by IGMP and MLD snooping in the bridge driver automatically. It
721can be altered by
722.B bridge mdb add
723and
724.B bridge mdb del
725commands manually too.
726
727.TP
728.BI dev " DEV"
729the interface only whose entries should be listed. Default is to list all
730bridge interfaces.
731
732.PP
733With the
734.B -details
a89d5329 735option, the command becomes verbose. It prints out the ports known to have
54e9c3a3
PP
736a connected router.
737
05d4f64d
NA
738.PP
739With the
740.B -statistics
ba037267 741option, the command displays timer values for mdb and router port entries.
05d4f64d 742
ab938710
VY
743.SH bridge vlan - VLAN filter list
744
745.B vlan
746objects contain known VLAN IDs for a link.
747
748.P
749The corresponding commands display vlan filter entries, add new entries,
750and delete old ones.
751
752.SS bridge vlan add - add a new vlan filter entry
753
754This command creates a new vlan filter entry.
755
756.TP
757.BI dev " NAME"
758the interface with which this vlan is associated.
759
760.TP
761.BI vid " VID"
762the VLAN ID that identifies the vlan.
763
8652eeb3
RP
764.TP
765.BI tunnel_info " TUNNEL_ID"
f76ad635
SH
766the TUNNEL ID that maps to this vlan. The tunnel id is set in
767dst_metadata for every packet that belongs to this vlan (applicable to
768bridge ports with vlan_tunnel flag set).
8652eeb3 769
ab938710 770.TP
57cfcc62 771.B pvid
ab938710
VY
772the vlan specified is to be considered a PVID at ingress.
773Any untagged frames will be assigned to this VLAN.
774
775.TP
57cfcc62 776.B untagged
ab938710
VY
777the vlan specified is to be treated as untagged on egress.
778
779.TP
57cfcc62 780.B self
a89d5329 781the vlan is configured on the specified physical device. Required if the
ab938710
VY
782device is the bridge device.
783
784.TP
57cfcc62 785.B master
6274b0b7 786the vlan is configured on the software bridge (default).
ab938710 787
296cee6f
VD
788.SS bridge vlan delete - delete a vlan filter entry
789This command removes an existing vlan filter entry.
ab938710
VY
790
791.PP
792The arguments are the same as with
793.BR "bridge vlan add".
794The
795.BR "pvid " and " untagged"
796flags are ignored.
797
798.SS bridge vlan show - list vlan configuration.
799
800This command displays the current VLAN filter table.
801
7abf5de6
NA
802.PP
803With the
804.B -statistics
805option, the command displays per-vlan traffic statistics.
806
8652eeb3
RP
807.SS bridge vlan tunnelshow - list vlan tunnel mapping.
808
809This command displays the current vlan tunnel info mapping.
810
d04bc300
SH
811.SH bridge monitor - state monitoring
812
813The
814.B bridge
fc31817d 815utility can monitor the state of devices and addresses
a89d5329 816continuously. This option has a slightly different format.
d04bc300
SH
817Namely, the
818.B monitor
819command is the first in the command line and then the object list follows:
820
821.BR "bridge monitor" " [ " all " |"
49572501 822.IR OBJECT-LIST " ]"
d04bc300
SH
823
824.I OBJECT-LIST
825is the list of object types that we want to monitor.
826It may contain
fc31817d 827.BR link ", " fdb ", and " mdb "."
d04bc300
SH
828If no
829.B file
830argument is given,
831.B bridge
832opens RTNETLINK, listens on it and dumps state changes in the format
833described in previous sections.
834
835.P
836If a file name is given, it does not listen on RTNETLINK,
837but opens the file containing RTNETLINK messages saved in binary format
efb16971 838and dumps them.
d04bc300
SH
839
840.SH NOTES
841This command uses facilities added in Linux 3.0.
842
843Although the forwarding table is maintained on a per-bridge device basis
844the bridge device is not part of the syntax. This is a limitation of the
845underlying netlink neighbour message protocol. When displaying the
846forwarding table, entries for all bridges are displayed.
847Add/delete/modify commands determine the underlying bridge device
6274b0b7 848based on the bridge to which the corresponding ethernet device is attached.
d04bc300
SH
849
850
851.SH SEE ALSO
852.BR ip (8)
49572501 853.SH BUGS
d04bc300
SH
854.RB "Please direct bugreports and patches to: " <netdev@vger.kernel.org>
855
856.SH AUTHOR
857Original Manpage by Stephen Hemminger