]> git.proxmox.com Git - mirror_iproute2.git/blob - man/man8/ip-link.8.in
man: Fix formatting of vrf parameter of ip-link show command
[mirror_iproute2.git] / man / man8 / ip-link.8.in
1 .TH IP\-LINK 8 "13 Dec 2012" "iproute2" "Linux"
2 .SH "NAME"
3 ip-link \- network device configuration
4 .SH "SYNOPSIS"
5 .sp
6 .ad l
7 .in +8
8 .ti -8
9 .B ip link
10 .RI " { " COMMAND " | "
11 .BR help " }"
12 .sp
13
14 .ti -8
15 .BI "ip link add"
16 .RB "[ " link
17 .IR DEVICE " ]"
18 .RB "[ " name " ]"
19 .I NAME
20 .br
21 .RB "[ " txqueuelen
22 .IR PACKETS " ]"
23 .br
24 .RB "[ " address
25 .IR LLADDR " ]"
26 .RB "[ " broadcast
27 .IR LLADDR " ]"
28 .br
29 .RB "[ " mtu
30 .IR MTU " ]"
31 .RB "[ " index
32 .IR IDX " ]"
33 .br
34 .RB "[ " numtxqueues
35 .IR QUEUE_COUNT " ]"
36 .RB "[ " numrxqueues
37 .IR QUEUE_COUNT " ]"
38 .br
39 .BI type " TYPE"
40 .RI "[ " ARGS " ]"
41
42 .ti -8
43 .BR "ip link delete " {
44 .IR DEVICE " | "
45 .BI "group " GROUP
46 }
47 .BI type " TYPE"
48 .RI "[ " ARGS " ]"
49
50 .ti -8
51 .BR "ip link set " {
52 .IR DEVICE " | "
53 .BI "group " GROUP
54 }
55 .br
56 .RB "[ { " up " | " down " } ]"
57 .br
58 .RB "[ " type
59 .IR "ETYPE TYPE_ARGS" " ]"
60 .br
61 .RB "[ " arp " { " on " | " off " } ]"
62 .br
63 .RB "[ " dynamic " { " on " | " off " } ]"
64 .br
65 .RB "[ " multicast " { " on " | " off " } ]"
66 .br
67 .RB "[ " allmulticast " { " on " | " off " } ]"
68 .br
69 .RB "[ " promisc " { " on " | " off " } ]"
70 .br
71 .RB "[ " protodown " { " on " | " off " } ]"
72 .br
73 .RB "[ " trailers " { " on " | " off " } ]"
74 .br
75 .RB "[ " txqueuelen
76 .IR PACKETS " ]"
77 .br
78 .RB "[ " name
79 .IR NEWNAME " ]"
80 .br
81 .RB "[ " address
82 .IR LLADDR " ]"
83 .br
84 .RB "[ " broadcast
85 .IR LLADDR " ]"
86 .br
87 .RB "[ " mtu
88 .IR MTU " ]"
89 .br
90 .RB "[ " netns " {"
91 .IR PID " | " NETNSNAME " } ]"
92 .br
93 .RB "[ " link-netnsid
94 .IR ID " ]"
95 .br
96 .RB "[ " alias
97 .IR NAME " ]"
98 .br
99 .RB "[ " vf
100 .IR NUM " ["
101 .B mac
102 .IR LLADDR " ]"
103 .br
104 .in +9
105 .RI "[ " VFVLAN-LIST " ]"
106 .br
107 .RB "[ " rate
108 .IR TXRATE " ]"
109 .br
110 .RB "[ " max_tx_rate
111 .IR TXRATE " ]"
112 .br
113 .RB "[ " min_tx_rate
114 .IR TXRATE " ]"
115 .br
116 .RB "[ " spoofchk " { " on " | " off " } ]"
117 .br
118 .RB "[ " query_rss " { " on " | " off " } ]"
119 .br
120 .RB "[ " state " { " auto " | " enable " | " disable " } ]"
121 .br
122 .RB "[ " trust " { " on " | " off " } ]"
123 .br
124 .RB "[ " node_guid " eui64 ]"
125 .br
126 .RB "[ " port_guid " eui64 ] ]"
127 .br
128 .in -9
129 .RB "[ " xdp " { " off " | "
130 .br
131 .in +8
132 .BR object
133 .IR FILE
134 .RB "[ " section
135 .IR NAME " ]"
136 .RB "[ " verbose " ] |"
137 .br
138 .BR pinned
139 .IR FILE " } ]"
140 .br
141 .in -8
142 .RB "[ " master
143 .IR DEVICE " ]"
144 .br
145 .RB "[ " nomaster " ]"
146 .br
147 .RB "[ " vrf
148 .IR NAME " ]"
149 .br
150 .RB "[ " addrgenmode " { " eui64 " | " none " | " stable_secret " | " random " } ]"
151 .br
152 .RB "[ " macaddr " { " flush " | { " add " | " del " } "
153 .IR MACADDR " | set [ "
154 .IR MACADDR " [ "
155 .IR MACADDR " [ ... ] ] ] } ]"
156 .br
157
158 .ti -8
159 .B ip link show
160 .RI "[ " DEVICE " | "
161 .B group
162 .IR GROUP " ] ["
163 .BR up " ] ["
164 .B master
165 .IR DEVICE " ] ["
166 .B type
167 .IR ETYPE " ] ["
168 .B vrf
169 .IR NAME " ]"
170
171 .ti -8
172 .B ip link xstats
173 .BI type " TYPE"
174 .RI "[ " ARGS " ]"
175
176 .ti -8
177 .B ip link afstats
178 .RB "[ " dev
179 .IR DEVICE " ]"
180
181 .ti -8
182 .B ip link help
183 .RI "[ " TYPE " ]"
184
185 .ti -8
186 .IR TYPE " := [ "
187 .BR bridge " | "
188 .BR bond " | "
189 .BR can " | "
190 .BR dummy " | "
191 .BR hsr " | "
192 .BR ifb " | "
193 .BR ipoib " |"
194 .BR macvlan " | "
195 .BR macvtap " | "
196 .BR vcan " | "
197 .BR veth " | "
198 .BR vlan " | "
199 .BR vxlan " |"
200 .BR ip6tnl " |"
201 .BR ipip " |"
202 .BR sit " |"
203 .BR gre " |"
204 .BR gretap " |"
205 .BR ip6gre " |"
206 .BR ip6gretap " |"
207 .BR vti " |"
208 .BR nlmon " |"
209 .BR ipvlan " |"
210 .BR lowpan " |"
211 .BR geneve " |"
212 .BR vrf " |"
213 .BR macsec " ]"
214
215 .ti -8
216 .IR ETYPE " := [ " TYPE " |"
217 .BR bridge_slave " | " bond_slave " ]"
218
219 .ti -8
220 .IR VFVLAN-LIST " := [ " VFVLAN-LIST " ] " VFVLAN
221
222 .ti -8
223 .IR VFVLAN " := "
224 .RB "[ " vlan
225 .IR VLANID " [ "
226 .B qos
227 .IR VLAN-QOS " ] ["
228 .B proto
229 .IR VLAN-PROTO " ] ]"
230
231 .SH "DESCRIPTION"
232 .SS ip link add - add virtual link
233
234 .TP
235 .BI link " DEVICE "
236 specifies the physical device to act operate on.
237
238 .I NAME
239 specifies the name of the new virtual device.
240
241 .I TYPE
242 specifies the type of the new device.
243 .sp
244 Link types:
245
246 .in +8
247 .B bridge
248 - Ethernet Bridge device
249 .sp
250 .B bond
251 - Bonding device
252 .B can
253 - Controller Area Network interface
254 .sp
255 .B dummy
256 - Dummy network interface
257 .sp
258 .B hsr
259 - High-availability Seamless Redundancy device
260 .sp
261 .B ifb
262 - Intermediate Functional Block device
263 .sp
264 .B ipoib
265 - IP over Infiniband device
266 .sp
267 .B macvlan
268 - Virtual interface base on link layer address (MAC)
269 .sp
270 .B macvtap
271 - Virtual interface based on link layer address (MAC) and TAP.
272 .sp
273 .B vcan
274 - Virtual Controller Area Network interface
275 .sp
276 .B veth
277 - Virtual ethernet interface
278 .sp
279 .BR vlan
280 - 802.1q tagged virtual LAN interface
281 .sp
282 .BR vxlan
283 - Virtual eXtended LAN
284 .sp
285 .BR ip6tnl
286 - Virtual tunnel interface IPv4|IPv6 over IPv6
287 .sp
288 .BR ipip
289 - Virtual tunnel interface IPv4 over IPv4
290 .sp
291 .BR sit
292 - Virtual tunnel interface IPv6 over IPv4
293 .sp
294 .BR gre
295 - Virtual tunnel interface GRE over IPv4
296 .sp
297 .BR gretap
298 - Virtual L2 tunnel interface GRE over IPv4
299 .sp
300 .BR ip6gre
301 - Virtual tunnel interface GRE over IPv6
302 .sp
303 .BR ip6gretap
304 - Virtual L2 tunnel interface GRE over IPv6
305 .sp
306 .BR vti
307 - Virtual tunnel interface
308 .sp
309 .BR nlmon
310 - Netlink monitoring device
311 .sp
312 .BR ipvlan
313 - Interface for L3 (IPv6/IPv4) based VLANs
314 .sp
315 .BR lowpan
316 - Interface for 6LoWPAN (IPv6) over IEEE 802.15.4 / Bluetooth
317 .sp
318 .BR geneve
319 - GEneric NEtwork Virtualization Encapsulation
320 .sp
321 .BR macsec
322 - Interface for IEEE 802.1AE MAC Security (MACsec)
323 .sp
324 .BR vrf
325 - Interface for L3 VRF domains
326 .in -8
327
328 .TP
329 .BI numtxqueues " QUEUE_COUNT "
330 specifies the number of transmit queues for new device.
331
332 .TP
333 .BI numrxqueues " QUEUE_COUNT "
334 specifies the number of receive queues for new device.
335
336 .TP
337 .BI index " IDX "
338 specifies the desired index of the new virtual device. The link creation fails, if the index is busy.
339
340 .TP
341 VLAN Type Support
342 For a link of type
343 .I VLAN
344 the following additional arguments are supported:
345
346 .BI "ip link add
347 .BI link " DEVICE "
348 .BI name " NAME "
349 .B "type vlan"
350 [
351 .BI protocol " VLAN_PROTO "
352 ]
353 .BI id " VLANID "
354 [
355 .BR reorder_hdr " { " on " | " off " } "
356 ]
357 [
358 .BR gvrp " { " on " | " off " } "
359 ]
360 [
361 .BR mvrp " { " on " | " off " } "
362 ]
363 [
364 .BR loose_binding " { " on " | " off " } "
365 ]
366 [
367 .BI ingress-qos-map " QOS-MAP "
368 ]
369 [
370 .BI egress-qos-map " QOS-MAP "
371 ]
372
373 .in +8
374 .sp
375 .BI protocol " VLAN_PROTO "
376 - either 802.1Q or 802.1ad.
377
378 .BI id " VLANID "
379 - specifies the VLAN Identifer to use. Note that numbers with a leading " 0 " or " 0x " are interpreted as octal or hexadeimal, respectively.
380
381 .BR reorder_hdr " { " on " | " off " } "
382 - specifies whether ethernet headers are reordered or not (default is
383 .BR on ")."
384
385 .in +4
386 If
387 .BR reorder_hdr " is " on
388 then VLAN header will be not inserted immediately but only before passing to the
389 physical device (if this device does not support VLAN offloading), the similar
390 on the RX direction - by default the packet will be untagged before being
391 received by VLAN device. Reordering allows to accelerate tagging on egress and
392 to hide VLAN header on ingress so the packet looks like regular Ethernet packet,
393 at the same time it might be confusing for packet capture as the VLAN header
394 does not exist within the packet.
395
396 VLAN offloading can be checked by
397 .BR ethtool "(8):"
398 .in +4
399 .sp
400 .B ethtool -k
401 <phy_dev> |
402 .RB grep " tx-vlan-offload"
403 .sp
404 .in -4
405 where <phy_dev> is the physical device to which VLAN device is bound.
406 .in -4
407
408 .BR gvrp " { " on " | " off " } "
409 - specifies whether this VLAN should be registered using GARP VLAN Registration Protocol.
410
411 .BR mvrp " { " on " | " off " } "
412 - specifies whether this VLAN should be registered using Multiple VLAN Registration Protocol.
413
414 .BR loose_binding " { " on " | " off " } "
415 - specifies whether the VLAN device state is bound to the physical device state.
416
417 .BI ingress-qos-map " QOS-MAP "
418 - defines a mapping of VLAN header prio field to the Linux internal packet
419 priority on incoming frames. The format is FROM:TO with multiple mappings
420 separated by spaces.
421
422 .BI egress-qos-map " QOS-MAP "
423 - defines a mapping of Linux internal packet priority to VLAN header prio field
424 but for outgoing frames. The format is the same as for ingress-qos-map.
425 .in +4
426
427 Linux packet priority can be set by
428 .BR iptables "(8)":
429 .in +4
430 .sp
431 .B iptables
432 -t mangle -A POSTROUTING [...] -j CLASSIFY --set-class 0:4
433 .sp
434 .in -4
435 and this "4" priority can be used in the egress qos mapping to set VLAN prio "5":
436 .sp
437 .in +4
438 .B ip
439 link set veth0.10 type vlan egress 4:5
440 .in -4
441 .in -4
442 .in -8
443
444 .TP
445 VXLAN Type Support
446 For a link of type
447 .I VXLAN
448 the following additional arguments are supported:
449
450 .BI "ip link add " DEVICE
451 .BI type " vxlan " id " VNI"
452 [
453 .BI dev " PHYS_DEV "
454 .RB " ] [ { " group " | " remote " } "
455 .I IPADDR
456 ] [
457 .B local
458 .RI "{ "IPADDR " | "any " } "
459 ] [
460 .BI ttl " TTL "
461 ] [
462 .BI tos " TOS "
463 ] [
464 .BI flowlabel " FLOWLABEL "
465 ] [
466 .BI dstport " PORT "
467 ] [
468 .BI srcport " MIN MAX "
469 ] [
470 .RB [ no ] learning
471 ] [
472 .RB [ no ] proxy
473 ] [
474 .RB [ no ] rsc
475 ] [
476 .RB [ no ] l2miss
477 ] [
478 .RB [ no ] l3miss
479 ] [
480 .RB [ no ] udpcsum
481 ] [
482 .RB [ no ] udp6zerocsumtx
483 ] [
484 .RB [ no ] udp6zerocsumrx
485 ] [
486 .BI ageing " SECONDS "
487 ] [
488 .BI maxaddress " NUMBER "
489 ] [
490 .RB [ no ] external
491 ] [
492 .B gbp
493 ] [
494 .B gpe
495 ]
496
497 .in +8
498 .sp
499 .BI id " VNI "
500 - specifies the VXLAN Network Identifer (or VXLAN Segment
501 Identifier) to use.
502
503 .BI dev " PHYS_DEV"
504 - specifies the physical device to use for tunnel endpoint communication.
505
506 .sp
507 .BI group " IPADDR"
508 - specifies the multicast IP address to join.
509 This parameter cannot be specified with the
510 .B remote
511 parameter.
512
513 .sp
514 .BI remote " IPADDR"
515 - specifies the unicast destination IP address to use in outgoing packets
516 when the destination link layer address is not known in the VXLAN device
517 forwarding database. This parameter cannot be specified with the
518 .B group
519 parameter.
520
521 .sp
522 .BI local " IPADDR"
523 - specifies the source IP address to use in outgoing packets.
524
525 .sp
526 .BI ttl " TTL"
527 - specifies the TTL value to use in outgoing packets.
528
529 .sp
530 .BI tos " TOS"
531 - specifies the TOS value to use in outgoing packets.
532
533 .sp
534 .BI flowlabel " FLOWLABEL"
535 - specifies the flow label to use in outgoing packets.
536
537 .sp
538 .BI dstport " PORT"
539 - specifies the UDP destination port to communicate to the remote VXLAN tunnel endpoint.
540
541 .sp
542 .BI srcport " MIN MAX"
543 - specifies the range of port numbers to use as UDP
544 source ports to communicate to the remote VXLAN tunnel endpoint.
545
546 .sp
547 .RB [ no ] learning
548 - specifies if unknown source link layer addresses and IP addresses
549 are entered into the VXLAN device forwarding database.
550
551 .sp
552 .RB [ no ] rsc
553 - specifies if route short circuit is turned on.
554
555 .sp
556 .RB [ no ] proxy
557 - specifies ARP proxy is turned on.
558
559 .sp
560 .RB [ no ] l2miss
561 - specifies if netlink LLADDR miss notifications are generated.
562
563 .sp
564 .RB [ no ] l3miss
565 - specifies if netlink IP ADDR miss notifications are generated.
566
567 .sp
568 .RB [ no ] udpcsum
569 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
570
571 .sp
572 .RB [ no ] udp6zerocsumtx
573 - skip UDP checksum calculation for transmitted packets over IPv6.
574
575 .sp
576 .RB [ no ] udp6zerocsumrx
577 - allow incoming UDP packets over IPv6 with zero checksum field.
578
579 .sp
580 .BI ageing " SECONDS"
581 - specifies the lifetime in seconds of FDB entries learnt by the kernel.
582
583 .sp
584 .BI maxaddress " NUMBER"
585 - specifies the maximum number of FDB entries.
586
587 .sp
588 .RB [ no ] external
589 - specifies whether an external control plane
590 .RB "(e.g. " "ip route encap" )
591 or the internal FDB should be used.
592
593 .sp
594 .B gbp
595 - enables the Group Policy extension (VXLAN-GBP).
596
597 .in +4
598 Allows to transport group policy context across VXLAN network peers.
599 If enabled, includes the mark of a packet in the VXLAN header for outgoing
600 packets and fills the packet mark based on the information found in the
601 VXLAN header for incomming packets.
602
603 Format of upper 16 bits of packet mark (flags);
604
605 .in +2
606 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
607 .br
608 |-|-|-|-|-|-|-|-|-|D|-|-|A|-|-|-|
609 .br
610 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
611
612 .B D :=
613 Don't Learn bit. When set, this bit indicates that the egress
614 VTEP MUST NOT learn the source address of the encapsulated frame.
615
616 .B A :=
617 Indicates that the group policy has already been applied to
618 this packet. Policies MUST NOT be applied by devices when the A bit is set.
619 .in -2
620
621 Format of lower 16 bits of packet mark (policy ID):
622
623 .in +2
624 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
625 .br
626 | Group Policy ID |
627 .br
628 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
629 .in -2
630
631 Example:
632 iptables -A OUTPUT [...] -j MARK --set-mark 0x800FF
633
634 .in -4
635
636 .sp
637 .B gpe
638 - enables the Generic Protocol extension (VXLAN-GPE). Currently, this is
639 only supported together with the
640 .B external
641 keyword.
642
643 .in -8
644
645 .TP
646 GRE, IPIP, SIT Type Support
647 For a link of types
648 .I GRE/IPIP/SIT
649 the following additional arguments are supported:
650
651 .BI "ip link add " DEVICE
652 .BR type " { " gre " | " ipip " | " sit " }"
653 .BI " remote " ADDR " local " ADDR
654 [
655 .BR encap " { " fou " | " gue " | " none " }"
656 ] [
657 .BR encap-sport " { " \fIPORT " | " auto " }"
658 ] [
659 .BI "encap-dport " PORT
660 ] [
661 .RB [ no ] encap-csum
662 ] [
663 .RB [ no ] encap-remcsum
664 ]
665
666 .in +8
667 .sp
668 .BI remote " ADDR "
669 - specifies the remote address of the tunnel.
670
671 .sp
672 .BI local " ADDR "
673 - specifies the fixed local address for tunneled packets.
674 It must be an address on another interface on this host.
675
676 .sp
677 .BR encap " { " fou " | " gue " | " none " }"
678 - specifies type of secondary UDP encapsulation. "fou" indicates
679 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
680
681 .sp
682 .BR encap-sport " { " \fIPORT " | " auto " }"
683 - specifies the source port in UDP encapsulation.
684 .IR PORT
685 indicates the port by number, "auto"
686 indicates that the port number should be chosen automatically
687 (the kernel picks a flow based on the flow hash of the
688 encapsulated packet).
689
690 .sp
691 .RB [ no ] encap-csum
692 - specifies if UDP checksums are enabled in the secondary
693 encapsulation.
694
695 .sp
696 .RB [ no ] encap-remcsum
697 - specifies if Remote Checksum Offload is enabled. This is only
698 applicable for Generic UDP Encapsulation.
699
700 .in -8
701
702 .TP
703 IP6GRE/IP6GRETAP Type Support
704 For a link of type
705 .I IP6GRE/IP6GRETAP
706 the following additional arguments are supported:
707
708 .BI "ip link add " DEVICE
709 .BR type " { " ip6gre " | " ip6gretap " }"
710 .BI remote " ADDR " local " ADDR"
711 [
712 .RB [ i | o ] seq
713 ] [
714 .RB [ i | o ] key
715 .I KEY
716 ] [
717 .RB [ i | o ] csum
718 ] [
719 .BI hoplimit " TTL "
720 ] [
721 .BI encaplimit " ELIM "
722 ] [
723 .BI tclass " TCLASS "
724 ] [
725 .BI flowlabel " FLOWLABEL "
726 ] [
727 .BI "dscp inherit"
728 ] [
729 .BI dev " PHYS_DEV "
730 ]
731
732 .in +8
733 .sp
734 .BI remote " ADDR "
735 - specifies the remote IPv6 address of the tunnel.
736
737 .sp
738 .BI local " ADDR "
739 - specifies the fixed local IPv6 address for tunneled packets.
740 It must be an address on another interface on this host.
741
742 .sp
743 .RB [ i | o ] seq
744 - serialize packets.
745 The
746 .B oseq
747 flag enables sequencing of outgoing packets.
748 The
749 .B iseq
750 flag requires that all input packets are serialized.
751
752 .sp
753 .RB [ i | o ] key " \fIKEY"
754 - use keyed GRE with key
755 .IR KEY ". "KEY
756 is either a number or an IPv4 address-like dotted quad.
757 The
758 .B key
759 parameter specifies the same key to use in both directions.
760 The
761 .BR ikey " and " okey
762 parameters specify different keys for input and output.
763
764 .sp
765 .RB [ i | o ] csum
766 - generate/require checksums for tunneled packets.
767 The
768 .B ocsum
769 flag calculates checksums for outgoing packets.
770 The
771 .B icsum
772 flag requires that all input packets have the correct
773 checksum. The
774 .B csum
775 flag is equivalent to the combination
776 .BR "icsum ocsum" .
777
778 .sp
779 .BI hoplimit " TTL"
780 - specifies Hop Limit value to use in outgoing packets.
781
782 .sp
783 .BI encaplimit " ELIM"
784 - specifies a fixed encapsulation limit. Default is 4.
785
786 .sp
787 .BI flowlabel " FLOWLABEL"
788 - specifies a fixed flowlabel.
789
790 .sp
791 .BI tclass " TCLASS"
792 - specifies the traffic class field on
793 tunneled packets, which can be specified as either a two-digit
794 hex value (e.g. c0) or a predefined string (e.g. internet).
795 The value
796 .B inherit
797 causes the field to be copied from the original IP header. The
798 values
799 .BI "inherit/" STRING
800 or
801 .BI "inherit/" 00 ".." ff
802 will set the field to
803 .I STRING
804 or
805 .IR 00 ".." ff
806 when tunneling non-IP packets. The default value is 00.
807
808 .in -8
809
810 .TP
811 IPoIB Type Support
812 For a link of type
813 .I IPoIB
814 the following additional arguments are supported:
815
816 .BI "ip link add " DEVICE " name " NAME
817 .BR "type ipoib " [ " pkey \fIPKEY" " ] [ " mode " \fIMODE \fR]"
818
819 .in +8
820 .sp
821 .BI pkey " PKEY "
822 - specifies the IB P-Key to use.
823
824 .BI mode " MODE "
825 - specifies the mode (datagram or connected) to use.
826
827 .TP
828 GENEVE Type Support
829 For a link of type
830 .I GENEVE
831 the following additional arguments are supported:
832
833 .BI "ip link add " DEVICE
834 .BI type " geneve " id " VNI " remote " IPADDR"
835 [
836 .BI ttl " TTL "
837 ] [
838 .BI tos " TOS "
839 ] [
840 .BI flowlabel " FLOWLABEL "
841 ] [
842 .BI dstport " PORT"
843 ] [
844 .RB [ no ] external
845 ] [
846 .RB [ no ] udpcsum
847 ] [
848 .RB [ no ] udp6zerocsumtx
849 ] [
850 .RB [ no ] udp6zerocsumrx
851 ]
852
853 .in +8
854 .sp
855 .BI id " VNI "
856 - specifies the Virtual Network Identifer to use.
857
858 .sp
859 .BI remote " IPADDR"
860 - specifies the unicast destination IP address to use in outgoing packets.
861
862 .sp
863 .BI ttl " TTL"
864 - specifies the TTL value to use in outgoing packets.
865
866 .sp
867 .BI tos " TOS"
868 - specifies the TOS value to use in outgoing packets.
869
870 .sp
871 .BI flowlabel " FLOWLABEL"
872 - specifies the flow label to use in outgoing packets.
873
874 .sp
875 .BI dstport " PORT"
876 - select a destination port other than the default of 6081.
877
878 .sp
879 .RB [ no ] external
880 - make this tunnel externally controlled (or not, which is the default). This
881 flag is mutually exclusive with the
882 .BR id ,
883 .BR remote ,
884 .BR ttl ,
885 .BR tos " and " flowlabel
886 options.
887
888 .sp
889 .RB [ no ] udpcsum
890 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
891
892 .sp
893 .RB [ no ] udp6zerocsumtx
894 - skip UDP checksum calculation for transmitted packets over IPv6.
895
896 .sp
897 .RB [ no ] udp6zerocsumrx
898 - allow incoming UDP packets over IPv6 with zero checksum field.
899
900 .in -8
901
902 .TP
903 MACVLAN and MACVTAP Type Support
904 For a link of type
905 .I MACVLAN
906 or
907 .I MACVTAP
908 the following additional arguments are supported:
909
910 .BI "ip link add link " DEVICE " name " NAME
911 .BR type " { " macvlan " | " macvtap " } "
912 .BR mode " { " private " | " vepa " | " bridge " | " passthru
913 .RB " [ " nopromisc " ] | " source " } "
914
915 .in +8
916 .sp
917 .BR type " { " macvlan " | " macvtap " } "
918 - specifies the link type to use.
919 .BR macvlan " creates just a virtual interface, while "
920 .BR macvtap " in addition creates a character device "
921 .BR /dev/tapX " to be used just like a " tuntap " device."
922
923 .B mode private
924 - Do not allow communication between
925 .B macvlan
926 instances on the same physical interface, even if the external switch supports
927 hairpin mode.
928
929 .B mode vepa
930 - Virtual Ethernet Port Aggregator mode. Data from one
931 .B macvlan
932 instance to the other on the same physical interface is transmitted over the
933 physical interface. Either the attached switch needs to support hairpin mode,
934 or there must be a TCP/IP router forwarding the packets in order to allow
935 communication. This is the default mode.
936
937 .B mode bridge
938 - In bridge mode, all endpoints are directly connected to each other,
939 communication is not redirected through the physical interface's peer.
940
941 .BR mode " " passthru " [ " nopromisc " ] "
942 - This mode gives more power to a single endpoint, usually in
943 .BR macvtap " mode. It is not allowed for more than one endpoint on the same "
944 physical interface. All traffic will be forwarded to this endpoint, allowing
945 virtio guests to change MAC address or set promiscuous mode in order to bridge
946 the interface or create vlan interfaces on top of it. By default, this mode
947 forces the underlying interface into promiscuous mode. Passing the
948 .BR nopromisc " flag prevents this, so the promisc flag may be controlled "
949 using standard tools.
950
951 .B mode source
952 - allows one to set a list of allowed mac address, which is used to match
953 against source mac address from received frames on underlying interface. This
954 allows creating mac based VLAN associations, instead of standard port or tag
955 based. The feature is useful to deploy 802.1x mac based behavior,
956 where drivers of underlying interfaces doesn't allows that.
957 .in -8
958
959 .TP
960 High-availability Seamless Redundancy (HSR) Support
961 For a link of type
962 .I HSR
963 the following additional arguments are supported:
964
965 .BI "ip link add link " DEVICE " name " NAME " type hsr"
966 .BI slave1 " SLAVE1-IF " slave2 " SLAVE2-IF "
967 .RB [ " supervision"
968 .IR ADDR-BYTE " ] ["
969 .BR version " { " 0 " | " 1 " } ]"
970
971 .in +8
972 .sp
973 .BR type " hsr "
974 - specifies the link type to use, here HSR.
975
976 .BI slave1 " SLAVE1-IF "
977 - Specifies the physical device used for the first of the two ring ports.
978
979 .BI slave2 " SLAVE2-IF "
980 - Specifies the physical device used for the second of the two ring ports.
981
982 .BI supervision " ADDR-BYTE"
983 - The last byte of the multicast address used for HSR supervision frames.
984 Default option is "0", possible values 0-255.
985
986 .BR version " { " 0 " | " 1 " }"
987 - Selects the protocol version of the interface. Default option is "0", which
988 corresponds to the 2010 version of the HSR standard. Option "1" activates the
989 2012 version.
990 .in -8
991
992 .TP
993 MACsec Type Support
994 For a link of type
995 .I MACsec
996 the following additional arguments are supported:
997
998 .BI "ip link add link " DEVICE " name " NAME " type macsec"
999 [ [
1000 .BI address " <lladdr>"
1001 ]
1002 .BI port " PORT"
1003 |
1004 .BI sci " SCI"
1005 ] [
1006 .BI cipher " CIPHER_SUITE"
1007 ] [
1008 .BR icvlen " { "
1009 .IR 8..16 " } ] ["
1010 .BR encrypt " {"
1011 .BR on " | " off " } ] [ "
1012 .BR send_sci " { " on " | " off " } ] ["
1013 .BR end_station " { " on " | " off " } ] ["
1014 .BR scb " { " on " | " off " } ] ["
1015 .BR protect " { " on " | " off " } ] ["
1016 .BR replay " { " on " | " off " }"
1017 .BR window " { "
1018 .IR 0..2^32-1 " } ] ["
1019 .BR validate " { " strict " | " check " | " disabled " } ] ["
1020 .BR encodingsa " { "
1021 .IR 0..3 " } ]"
1022
1023 .in +8
1024 .sp
1025 .BI address " <lladdr> "
1026 - sets the system identifier component of secure channel for this MACsec device.
1027
1028 .sp
1029 .BI port " PORT "
1030 - sets the port number component of secure channel for this MACsec device, in a
1031 range from 1 to 65535 inclusive. Numbers with a leading " 0 " or " 0x " are
1032 interpreted as octal and hexadecimal, respectively.
1033
1034 .sp
1035 .BI sci " SCI "
1036 - sets the secure channel identifier for this MACsec device.
1037 .I SCI
1038 is a 64bit wide number in hexadecimal format.
1039
1040 .sp
1041 .BI cipher " CIPHER_SUITE "
1042 - defines the cipher suite to use.
1043
1044 .sp
1045 .BI icvlen " LENGTH "
1046 - sets the length of the Integrity Check Value (ICV).
1047
1048 .sp
1049 .BR "encrypt on " or " encrypt off"
1050 - switches between authenticated encryption, or authenticity mode only.
1051
1052 .sp
1053 .BR "send_sci on " or " send_sci off"
1054 - specifies whether the SCI is included in every packet, or only when it is necessary.
1055
1056 .sp
1057 .BR "end_station on " or " end_station off"
1058 - sets the End Station bit.
1059
1060 .sp
1061 .BR "scb on " or " scb off"
1062 - sets the Single Copy Broadcast bit.
1063
1064 .sp
1065 .BR "protect on " or " protect off"
1066 - enables MACsec protection on the device.
1067
1068 .sp
1069 .BR "replay on " or " replay off"
1070 - enables replay protection on the device.
1071
1072 .in +8
1073
1074 .sp
1075 .BI window " SIZE "
1076 - sets the size of the replay window.
1077
1078 .in -8
1079
1080 .sp
1081 .BR "validate strict " or " validate check " or " validate disabled"
1082 - sets the validation mode on the device.
1083
1084 .sp
1085 .BI encodingsa " AN "
1086 - sets the active secure association for transmission.
1087
1088 .in -8
1089
1090 .TP
1091 VRF Type Support
1092 For a link of type
1093 .I VRF
1094 the following additional arguments are supported:
1095
1096 .BI "ip link add " DEVICE " type vrf table " TABLE
1097
1098 .in +8
1099 .sp
1100 .BR table " table id associated with VRF device"
1101
1102 .in -8
1103
1104 .SS ip link delete - delete virtual link
1105
1106 .TP
1107 .BI dev " DEVICE "
1108 specifies the virtual device to act operate on.
1109
1110 .TP
1111 .BI group " GROUP "
1112 specifies the group of virtual links to delete. Group 0 is not allowed to be
1113 deleted since it is the default group.
1114
1115 .TP
1116 .BI type " TYPE "
1117 specifies the type of the device.
1118
1119 .SS ip link set - change device attributes
1120
1121 .PP
1122 .B Warning:
1123 If multiple parameter changes are requested,
1124 .B ip
1125 aborts immediately after any of the changes have failed.
1126 This is the only case when
1127 .B ip
1128 can move the system to an unpredictable state. The solution
1129 is to avoid changing several parameters with one
1130 .B ip link set
1131 call.
1132
1133 .TP
1134 .BI dev " DEVICE "
1135 .I DEVICE
1136 specifies network device to operate on. When configuring SR-IOV Virtual Function
1137 (VF) devices, this keyword should specify the associated Physical Function (PF)
1138 device.
1139
1140 .TP
1141 .BI group " GROUP "
1142 .I GROUP
1143 has a dual role: If both group and dev are present, then move the device to the
1144 specified group. If only a group is specified, then the command operates on
1145 all devices in that group.
1146
1147 .TP
1148 .BR up " and " down
1149 change the state of the device to
1150 .B UP
1151 or
1152 .BR "DOWN" .
1153
1154 .TP
1155 .BR "arp on " or " arp off"
1156 change the
1157 .B NOARP
1158 flag on the device.
1159
1160 .TP
1161 .BR "multicast on " or " multicast off"
1162 change the
1163 .B MULTICAST
1164 flag on the device.
1165
1166 .TP
1167 .BR "protodown on " or " protodown off"
1168 change the
1169 .B PROTODOWN
1170 state on the device. Indicates that a protocol error has been detected on the port. Switch drivers can react to this error by doing a phys down on the switch port.
1171
1172 .TP
1173 .BR "dynamic on " or " dynamic off"
1174 change the
1175 .B DYNAMIC
1176 flag on the device. Indicates that address can change when interface goes down (currently
1177 .B NOT
1178 used by the Linux).
1179
1180 .TP
1181 .BI name " NAME"
1182 change the name of the device. This operation is not
1183 recommended if the device is running or has some addresses
1184 already configured.
1185
1186 .TP
1187 .BI txqueuelen " NUMBER"
1188 .TP
1189 .BI txqlen " NUMBER"
1190 change the transmit queue length of the device.
1191
1192 .TP
1193 .BI mtu " NUMBER"
1194 change the
1195 .I MTU
1196 of the device.
1197
1198 .TP
1199 .BI address " LLADDRESS"
1200 change the station address of the interface.
1201
1202 .TP
1203 .BI broadcast " LLADDRESS"
1204 .TP
1205 .BI brd " LLADDRESS"
1206 .TP
1207 .BI peer " LLADDRESS"
1208 change the link layer broadcast address or the peer address when
1209 the interface is
1210 .IR "POINTOPOINT" .
1211
1212 .TP
1213 .BI netns " NETNSNAME " \fR| " PID"
1214 move the device to the network namespace associated with name
1215 .IR "NETNSNAME " or
1216 .RI process " PID".
1217
1218 Some devices are not allowed to change network namespace: loopback, bridge,
1219 ppp, wireless. These are network namespace local devices. In such case
1220 .B ip
1221 tool will return "Invalid argument" error. It is possible to find out if device is local
1222 to a single network namespace by checking
1223 .B netns-local
1224 flag in the output of the
1225 .BR ethtool ":"
1226
1227 .in +8
1228 .B ethtool -k
1229 .I DEVICE
1230 .in -8
1231
1232 To change network namespace for wireless devices the
1233 .B iw
1234 tool can be used. But it allows to change network namespace only for physical devices and by process
1235 .IR PID .
1236
1237 .TP
1238 .BI alias " NAME"
1239 give the device a symbolic name for easy reference.
1240
1241 .TP
1242 .BI group " GROUP"
1243 specify the group the device belongs to.
1244 The available groups are listed in file
1245 .BR "@SYSCONFDIR@/group" .
1246
1247 .TP
1248 .BI vf " NUM"
1249 specify a Virtual Function device to be configured. The associated PF device
1250 must be specified using the
1251 .B dev
1252 parameter.
1253
1254 .in +8
1255 .BI mac " LLADDRESS"
1256 - change the station address for the specified VF. The
1257 .B vf
1258 parameter must be specified.
1259
1260 .sp
1261 .BI vlan " VLANID"
1262 - change the assigned VLAN for the specified VF. When specified, all traffic
1263 sent from the VF will be tagged with the specified VLAN ID. Incoming traffic
1264 will be filtered for the specified VLAN ID, and will have all VLAN tags
1265 stripped before being passed to the VF. Setting this parameter to 0 disables
1266 VLAN tagging and filtering. The
1267 .B vf
1268 parameter must be specified.
1269
1270 .sp
1271 .BI qos " VLAN-QOS"
1272 - assign VLAN QOS (priority) bits for the VLAN tag. When specified, all VLAN
1273 tags transmitted by the VF will include the specified priority bits in the
1274 VLAN tag. If not specified, the value is assumed to be 0. Both the
1275 .B vf
1276 and
1277 .B vlan
1278 parameters must be specified. Setting both
1279 .B vlan
1280 and
1281 .B qos
1282 as 0 disables VLAN tagging and filtering for the VF.
1283
1284 .sp
1285 .BI proto " VLAN-PROTO"
1286 - assign VLAN PROTOCOL for the VLAN tag, either 802.1Q or 802.1ad.
1287 Setting to 802.1ad, all traffic sent from the VF will be tagged with VLAN S-Tag.
1288 Incoming traffic will have VLAN S-Tags stripped before being passed to the VF.
1289 Setting to 802.1ad also enables an option to concatenate another VLAN tag, so both
1290 S-TAG and C-TAG will be inserted/stripped for outgoing/incoming traffic, respectively.
1291 If not specified, the value is assumed to be 802.1Q. Both the
1292 .B vf
1293 and
1294 .B vlan
1295 parameters must be specified.
1296
1297 .sp
1298 .BI rate " TXRATE"
1299 -- change the allowed transmit bandwidth, in Mbps, for the specified VF.
1300 Setting this parameter to 0 disables rate limiting.
1301 .B vf
1302 parameter must be specified.
1303 Please use new API
1304 .B "max_tx_rate"
1305 option instead.
1306
1307 .sp
1308 .BI max_tx_rate " TXRATE"
1309 - change the allowed maximum transmit bandwidth, in Mbps, for the specified VF.
1310 .B vf
1311 parameter must be specified.
1312
1313 .sp
1314 .BI min_tx_rate " TXRATE"
1315 - change the allowed minimum transmit bandwidth, in Mbps, for the specified VF.
1316 Minimum TXRATE should be always <= Maximum TXRATE.
1317 .B vf
1318 parameter must be specified.
1319
1320 .sp
1321 .BI spoofchk " on|off"
1322 - turn packet spoof checking on or off for the specified VF.
1323 .sp
1324 .BI query_rss " on|off"
1325 - toggle the ability of querying the RSS configuration of a specific VF. VF RSS information like RSS hash key may be considered sensitive on some devices where this information is shared between VF and PF and thus its querying may be prohibited by default.
1326 .sp
1327 .BI state " auto|enable|disable"
1328 - set the virtual link state as seen by the specified VF. Setting to auto means a
1329 reflection of the PF link state, enable lets the VF to communicate with other VFs on
1330 this host even if the PF link state is down, disable causes the HW to drop any packets
1331 sent by the VF.
1332 .sp
1333 .BI trust " on|off"
1334 - trust the specified VF user. This enables that VF user can set a specific feature
1335 which may impact security and/or performance. (e.g. VF multicast promiscuous mode)
1336 .sp
1337 .BI node_guid " eui64"
1338 - configure node GUID for the VF.
1339 .sp
1340 .BI port_guid " eui64"
1341 - configure port GUID for the VF.
1342 .in -8
1343
1344 .TP
1345 .B xdp object "|" pinned "|" off
1346 set (or unset) a XDP ("express data path") BPF program to run on every
1347 packet at driver level.
1348
1349 .B off
1350 (or
1351 .B none
1352 )
1353 - Detaches any currently attached XDP/BPF program from the given device.
1354
1355 .BI object " FILE "
1356 - Attaches a XDP/BPF program to the given device. The
1357 .I FILE
1358 points to a BPF ELF file (f.e. generated by LLVM) that contains the BPF
1359 program code, map specifications, etc. If a XDP/BPF program is already
1360 attached to the given device, an error will be thrown. If no XDP/BPF
1361 program is currently attached, the device supports XDP and the program
1362 from the BPF ELF file passes the kernel verifier, then it will be attached
1363 to the device. If the option
1364 .I -force
1365 is passed to
1366 .B ip
1367 then any prior attached XDP/BPF program will be atomically overridden and
1368 no error will be thrown in this case. If no
1369 .B section
1370 option is passed, then the default section name ("prog") will be assumed,
1371 otherwise the provided section name will be used. If no
1372 .B verbose
1373 option is passed, then a verifier log will only be dumped on load error.
1374 See also
1375 .B EXAMPLES
1376 section for usage examples.
1377
1378 .BI section " NAME "
1379 - Specifies a section name that contains the BPF program code. If no section
1380 name is specified, the default one ("prog") will be used. This option is
1381 to be passed with the
1382 .B object
1383 option.
1384
1385 .BI verbose
1386 - Act in verbose mode. For example, even in case of success, this will
1387 print the verifier log in case a program was loaded from a BPF ELF file.
1388
1389 .BI pinned " FILE "
1390 - Attaches a XDP/BPF program to the given device. The
1391 .I FILE
1392 points to an already pinned BPF program in the BPF file system. The option
1393 .B section
1394 doesn't apply here, but otherwise semantics are the same as with the option
1395 .B object
1396 described already.
1397
1398 .TP
1399 .BI master " DEVICE"
1400 set master device of the device (enslave device).
1401
1402 .TP
1403 .BI nomaster
1404 unset master device of the device (release device).
1405
1406 .TP
1407 .BI addrgenmode " eui64|none|stable_secret|random"
1408 set the IPv6 address generation mode
1409
1410 .I eui64
1411 - use a Modified EUI-64 format interface identifier
1412
1413 .I none
1414 - disable automatic address generation
1415
1416 .I stable_secret
1417 - generate the interface identifier based on a preset /proc/sys/net/ipv6/conf/{default,DEVICE}/stable_secret
1418
1419 .I random
1420 - like stable_secret, but auto-generate a new random secret if none is set
1421
1422 .TP
1423 .BR "link-netnsid "
1424 set peer netnsid for a cross-netns interface
1425
1426 .TP
1427 .BI type " ETYPE TYPE_ARGS"
1428 Change type-specific settings. For a list of supported types and arguments refer
1429 to the description of
1430 .B "ip link add"
1431 above. In addition to that, it is possible to manipulate settings to slave
1432 devices:
1433
1434 .TP
1435 Bridge Slave Support
1436 For a link with master
1437 .B bridge
1438 the following additional arguments are supported:
1439
1440 .B "ip link set type bridge_slave"
1441 [
1442 .B fdb_flush
1443 ] [
1444 .BI state " STATE"
1445 ] [
1446 .BI priority " PRIO"
1447 ] [
1448 .BI cost " COST"
1449 ] [
1450 .BR guard " { " on " | " off " }"
1451 ] [
1452 .BR hairpin " { " on " | " off " }"
1453 ] [
1454 .BR fastleave " { " on " | " off " }"
1455 ] [
1456 .BR root_block " { " on " | " off " }"
1457 ] [
1458 .BR learning " { " on " | " off " }"
1459 ] [
1460 .BR flood " { " on " | " off " }"
1461 ] [
1462 .BR proxy_arp " { " on " | " off " }"
1463 ] [
1464 .BR proxy_arp_wifi " { " on " | " off " }"
1465 ] [
1466 .BI mcast_router " MULTICAST_ROUTER"
1467 ] [
1468 .BR mcast_fast_leave " { " on " | " off "}"
1469 ] [
1470 .BR mcast_flood " { " on " | " off " } ]"
1471
1472 .in +8
1473 .sp
1474 .B fdb_flush
1475 - flush bridge slave's fdb dynamic entries.
1476
1477 .BI state " STATE"
1478 - Set port state.
1479 .I STATE
1480 is a number representing the following states:
1481 .BR 0 " (disabled),"
1482 .BR 1 " (listening),"
1483 .BR 2 " (learning),"
1484 .BR 3 " (forwarding),"
1485 .BR 4 " (blocking)."
1486
1487 .BI priority " PRIO"
1488 - set port priority (a 16bit unsigned value).
1489
1490 .BI cost " COST"
1491 - set port cost (a 32bit unsigned value).
1492
1493 .BR guard " { " on " | " off " }"
1494 - block incoming BPDU packets on this port.
1495
1496 .BR hairpin " { " on " | " off " }"
1497 - enable hairpin mode on this port. This will allow incoming packets on this
1498 port to be reflected back.
1499
1500 .BR fastleave " { " on " | " off " }"
1501 - enable multicast fast leave on this port.
1502
1503 .BR root_block " { " on " | " off " }"
1504 - block this port from becoming the bridge's root port.
1505
1506 .BR learning " { " on " | " off " }"
1507 - allow MAC address learning on this port.
1508
1509 .BR flood " { " on " | " off " }"
1510 - open the flood gates on this port, i.e. forward all unicast frames to this
1511 port also. Requires
1512 .BR proxy_arp " and " proxy_arp_wifi
1513 to be turned off.
1514
1515 .BR proxy_arp " { " on " | " off " }"
1516 - enable proxy ARP on this port.
1517
1518 .BR proxy_arp_wifi " { " on " | " off " }"
1519 - enable proxy ARP on this port which meets extended requirements by IEEE
1520 802.11 and Hotspot 2.0 specifications.
1521
1522 .BI mcast_router " MULTICAST_ROUTER"
1523 - configure this port for having multicast routers attached. A port with a
1524 multicast router will receive all multicast traffic.
1525 .I MULTICAST_ROUTER
1526 may be either
1527 .B 0
1528 to disable multicast routers on this port,
1529 .B 1
1530 to let the system detect the presence of of routers (this is the default),
1531 .B 2
1532 to permanently enable multicast traffic forwarding on this port or
1533 .B 3
1534 to enable multicast routers temporarily on this port, not depending on incoming
1535 queries.
1536
1537 .BR mcast_fast_leave " { " on " | " off " }"
1538 - this is a synonym to the
1539 .B fastleave
1540 option above.
1541
1542 .BR mcast_flood " { " on " | " off " }"
1543 - controls whether a given port will be flooded with multicast traffic for which there is no MDB entry.
1544
1545 .in -8
1546
1547 .TP
1548 Bonding Slave Support
1549 For a link with master
1550 .B bond
1551 the following additional arguments are supported:
1552
1553 .B "ip link set type bond_slave"
1554 [
1555 .BI queue_id " ID"
1556 ]
1557
1558 .in +8
1559 .sp
1560 .BI queue_id " ID"
1561 - set the slave's queue ID (a 16bit unsigned value).
1562
1563 .in -8
1564
1565 .TP
1566 MACVLAN and MACVTAP Support
1567 Modify list of allowed macaddr for link in source mode.
1568
1569 .B "ip link set type { macvlan | macvap } "
1570 [
1571 .BI macaddr " " "" COMMAND " " MACADDR " ..."
1572 ]
1573
1574 Commands:
1575 .in +8
1576 .B add
1577 - add MACADDR to allowed list
1578 .sp
1579 .B set
1580 - replace allowed list
1581 .sp
1582 .B del
1583 - remove MACADDR from allowed list
1584 .sp
1585 .B flush
1586 - flush whole allowed list
1587 .sp
1588 .in -8
1589
1590
1591 .SS ip link show - display device attributes
1592
1593 .TP
1594 .BI dev " NAME " (default)
1595 .I NAME
1596 specifies the network device to show.
1597 If this argument is omitted all devices in the default group are listed.
1598
1599 .TP
1600 .BI group " GROUP "
1601 .I GROUP
1602 specifies what group of devices to show.
1603
1604 .TP
1605 .B up
1606 only display running interfaces.
1607
1608 .TP
1609 .BI master " DEVICE "
1610 .I DEVICE
1611 specifies the master device which enslaves devices to show.
1612
1613 .TP
1614 .BI vrf " NAME "
1615 .I NAME
1616 speficies the VRF which enslaves devices to show.
1617
1618 .TP
1619 .BI type " TYPE "
1620 .I TYPE
1621 specifies the type of devices to show.
1622
1623 Note that the type name is not checked against the list of supported types -
1624 instead it is sent as-is to the kernel. Later it is used to filter the returned
1625 interface list by comparing it with the relevant attribute in case the kernel
1626 didn't filter already. Therefore any string is accepted, but may lead to empty
1627 output.
1628
1629 .SS ip link xstats - display extended statistics
1630
1631 .TP
1632 .BI type " TYPE "
1633 .I TYPE
1634 specifies the type of devices to display extended statistics for.
1635
1636 .SS ip link afstats - display address-family specific statistics
1637
1638 .TP
1639 .BI dev " DEVICE "
1640 .I DEVICE
1641 specifies the device to display address-family statistics for.
1642
1643 .SS ip link help - display help
1644
1645 .PP
1646 .I "TYPE"
1647 specifies which help of link type to dislpay.
1648
1649 .SS
1650 .I GROUP
1651 may be a number or a string from the file
1652 .B @SYSCONFDIR@/group
1653 which can be manually filled.
1654
1655 .SH "EXAMPLES"
1656 .PP
1657 ip link show
1658 .RS 4
1659 Shows the state of all network interfaces on the system.
1660 .RE
1661 .PP
1662 ip link show type bridge
1663 .RS 4
1664 Shows the bridge devices.
1665 .RE
1666 .PP
1667 ip link show type vlan
1668 .RS 4
1669 Shows the vlan devices.
1670 .RE
1671 .PP
1672 ip link show master br0
1673 .RS 4
1674 Shows devices enslaved by br0
1675 .RE
1676 .PP
1677 ip link set dev ppp0 mtu 1400
1678 .RS 4
1679 Change the MTU the ppp0 device.
1680 .RE
1681 .PP
1682 ip link add link eth0 name eth0.10 type vlan id 10
1683 .RS 4
1684 Creates a new vlan device eth0.10 on device eth0.
1685 .RE
1686 .PP
1687 ip link delete dev eth0.10
1688 .RS 4
1689 Removes vlan device.
1690 .RE
1691
1692 ip link help gre
1693 .RS 4
1694 Display help for the gre link type.
1695 .RE
1696 .PP
1697 ip link add name tun1 type ipip remote 192.168.1.1
1698 local 192.168.1.2 ttl 225 encap gue encap-sport auto
1699 encap-dport 5555 encap-csum encap-remcsum
1700 .RS 4
1701 Creates an IPIP that is encapsulated with Generic UDP Encapsulation,
1702 and the outer UDP checksum and remote checksum offload are enabled.
1703 .RE
1704 .PP
1705 ip link set dev eth0 xdp obj prog.o
1706 .RS 4
1707 Attaches a XDP/BPF program to device eth0, where the program is
1708 located in prog.o, section "prog" (default section). In case a
1709 XDP/BPF program is already attached, throw an error.
1710 .RE
1711 .PP
1712 ip -force link set dev eth0 xdp obj prog.o sec foo
1713 .RS 4
1714 Attaches a XDP/BPF program to device eth0, where the program is
1715 located in prog.o, section "foo". In case a XDP/BPF program is
1716 already attached, it will be overridden by the new one.
1717 .RE
1718 .PP
1719 ip -force link set dev eth0 xdp pinned /sys/fs/bpf/foo
1720 .RS 4
1721 Attaches a XDP/BPF program to device eth0, where the program was
1722 previously pinned as an object node into BPF file system under
1723 name foo.
1724 .RE
1725 .PP
1726 ip link set dev eth0 xdp off
1727 .RS 4
1728 If a XDP/BPF program is attached on device eth0, detach it and
1729 effectively turn off XDP for device eth0.
1730 .RE
1731 .PP
1732 ip link add link wpan0 lowpan0 type lowpan
1733 .RS 4
1734 Creates a 6LoWPAN interface named lowpan0 on the underlying
1735 IEEE 802.15.4 device wpan0.
1736 .RE
1737
1738 .SH SEE ALSO
1739 .br
1740 .BR ip (8),
1741 .BR ip-netns (8),
1742 .BR ethtool (8),
1743 .BR iptables (8)
1744
1745 .SH AUTHOR
1746 Original Manpage by Michail Litvak <mci@owl.openwall.com>