1 .TH IP\-LINK 8 "13 Dec 2012" "iproute2" "Linux"
3 ip-link \- network device configuration
10 .RI " { " COMMAND " | "
48 .BR "ip link delete " {
61 .RB "[ { " up " | " down " } ]"
64 .IR "ETYPE TYPE_ARGS" " ]"
66 .RB "[ " arp " { " on " | " off " } ]"
68 .RB "[ " dynamic " { " on " | " off " } ]"
70 .RB "[ " multicast " { " on " | " off " } ]"
72 .RB "[ " allmulticast " { " on " | " off " } ]"
74 .RB "[ " promisc " { " on " | " off " } ]"
76 .RB "[ " protodown " { " on " | " off " } ]"
78 .RB "[ " trailers " { " on " | " off " } ]"
96 .IR PID " | " NETNSNAME " } ]"
110 .RI "[ " VFVLAN-LIST " ]"
121 .RB "[ " spoofchk " { " on " | " off " } ]"
123 .RB "[ " query_rss " { " on " | " off " } ]"
125 .RB "[ " state " { " auto " | " enable " | " disable " } ]"
127 .RB "[ " trust " { " on " | " off " } ]"
129 .RB "[ " node_guid " eui64 ]"
131 .RB "[ " port_guid " eui64 ] ]"
134 .RB "[ { " xdp " | " xdpgeneric " | " xdpdrv " | " xdpoffload " } { " off " | "
141 .RB "[ " verbose " ] |"
150 .RB "[ " nomaster " ]"
155 .RB "[ " addrgenmode " { " eui64 " | " none " | " stable_secret " | " random " } ]"
158 .RI "[ " MACADDR " ]"
161 .RB "[ { " flush " | " add " | " del " } "
170 .RI "[ " DEVICE " | "
233 .IR ETYPE " := [ " TYPE " |"
234 .BR bridge_slave " | " bond_slave " ]"
237 .IR VFVLAN-LIST " := [ " VFVLAN-LIST " ] " VFVLAN
246 .IR VLAN-PROTO " ] ]"
249 .SS ip link add - add virtual link
253 specifies the physical device to act operate on.
256 specifies the name of the new virtual device.
259 specifies the type of the new device.
265 - Ethernet Bridge device
271 - Dummy network interface
274 - High-availability Seamless Redundancy device
277 - Intermediate Functional Block device
280 - IP over Infiniband device
283 - Virtual interface base on link layer address (MAC)
286 - Virtual interface based on link layer address (MAC) and TAP.
289 - Virtual Controller Area Network interface
292 - Virtual Controller Area Network tunnel interface
295 - Virtual ethernet interface
298 - 802.1q tagged virtual LAN interface
301 - Virtual eXtended LAN
304 - Virtual tunnel interface IPv4|IPv6 over IPv6
307 - Virtual tunnel interface IPv4 over IPv4
310 - Virtual tunnel interface IPv6 over IPv4
313 - Virtual tunnel interface GRE over IPv4
316 - Virtual L2 tunnel interface GRE over IPv4
319 - Encapsulated Remote SPAN over GRE and IPv4
322 - Virtual tunnel interface GRE over IPv6
325 - Virtual L2 tunnel interface GRE over IPv6
328 - Encapsulated Remote SPAN over GRE and IPv6
331 - Virtual tunnel interface
334 - Netlink monitoring device
337 - Interface for L3 (IPv6/IPv4) based VLANs
340 - Interface for L3 (IPv6/IPv4) based VLANs and TAP
343 - Interface for 6LoWPAN (IPv6) over IEEE 802.15.4 / Bluetooth
346 - GEneric NEtwork Virtualization Encapsulation
349 - Interface for IEEE 802.1AE MAC Security (MACsec)
352 - Interface for L3 VRF domains
355 - Interface for netdev API tests
358 - Qualcomm rmnet device
361 - Virtual xfrm interface
365 .BI numtxqueues " QUEUE_COUNT "
366 specifies the number of transmit queues for new device.
369 .BI numrxqueues " QUEUE_COUNT "
370 specifies the number of receive queues for new device.
373 .BI gso_max_size " BYTES "
374 specifies the recommended maximum size of a Generic Segment Offload
375 packet the new device should accept.
378 .BI gso_max_segs " SEGMENTS "
379 specifies the recommended maximum number of a Generic Segment Offload
380 segments the new device should accept.
384 specifies the desired index of the new virtual device. The link
385 creation fails, if the index is busy.
391 the following additional arguments are supported:
398 .BI protocol " VLAN_PROTO "
402 .BR reorder_hdr " { " on " | " off " } "
405 .BR gvrp " { " on " | " off " } "
408 .BR mvrp " { " on " | " off " } "
411 .BR loose_binding " { " on " | " off " } "
414 .BR bridge_binding " { " on " | " off " } "
417 .BI ingress-qos-map " QOS-MAP "
420 .BI egress-qos-map " QOS-MAP "
425 .BI protocol " VLAN_PROTO "
426 - either 802.1Q or 802.1ad.
429 - specifies the VLAN Identifer to use. Note that numbers with a leading " 0 " or " 0x " are interpreted as octal or hexadeimal, respectively.
431 .BR reorder_hdr " { " on " | " off " } "
432 - specifies whether ethernet headers are reordered or not (default is
437 .BR reorder_hdr " is " on
438 then VLAN header will be not inserted immediately but only before
439 passing to the physical device (if this device does not support VLAN
440 offloading), the similar on the RX direction - by default the packet
441 will be untagged before being received by VLAN device. Reordering
442 allows to accelerate tagging on egress and to hide VLAN header on
443 ingress so the packet looks like regular Ethernet packet, at the same
444 time it might be confusing for packet capture as the VLAN header does
445 not exist within the packet.
447 VLAN offloading can be checked by
453 .RB grep " tx-vlan-offload"
456 where <phy_dev> is the physical device to which VLAN device is bound.
459 .BR gvrp " { " on " | " off " } "
460 - specifies whether this VLAN should be registered using GARP VLAN
461 Registration Protocol.
463 .BR mvrp " { " on " | " off " } "
464 - specifies whether this VLAN should be registered using Multiple VLAN
465 Registration Protocol.
467 .BR loose_binding " { " on " | " off " } "
468 - specifies whether the VLAN device state is bound to the physical device state.
470 .BR bridge_binding " { " on " | " off " } "
471 - specifies whether the VLAN device link state tracks the state of bridge ports
472 that are members of the VLAN.
474 .BI ingress-qos-map " QOS-MAP "
475 - defines a mapping of VLAN header prio field to the Linux internal packet
476 priority on incoming frames. The format is FROM:TO with multiple mappings
479 .BI egress-qos-map " QOS-MAP "
480 - defines a mapping of Linux internal packet priority to VLAN header prio field
481 but for outgoing frames. The format is the same as for ingress-qos-map.
484 Linux packet priority can be set by
489 -t mangle -A POSTROUTING [...] -j CLASSIFY --set-class 0:4
492 and this "4" priority can be used in the egress qos mapping to set
497 link set veth0.10 type vlan egress 4:5
506 the following additional arguments are supported:
508 .BI "ip link add " DEVICE
509 .BI type " vxlan " id " VNI"
512 .RB " ] [ { " group " | " remote " } "
516 .RI "{ "IPADDR " | "any " } "
524 .BI flowlabel " FLOWLABEL "
528 .BI srcport " MIN MAX "
542 .RB [ no ] udp6zerocsumtx
544 .RB [ no ] udp6zerocsumrx
546 .BI ageing " SECONDS "
548 .BI maxaddress " NUMBER "
560 - specifies the VXLAN Network Identifer (or VXLAN Segment
564 - specifies the physical device to use for tunnel endpoint communication.
568 - specifies the multicast IP address to join.
569 This parameter cannot be specified with the
575 - specifies the unicast destination IP address to use in outgoing packets
576 when the destination link layer address is not known in the VXLAN device
577 forwarding database. This parameter cannot be specified with the
583 - specifies the source IP address to use in outgoing packets.
587 - specifies the TTL value to use in outgoing packets.
591 - specifies the TOS value to use in outgoing packets.
595 - specifies the usage of the Don't Fragment flag (DF) bit in outgoing packets
596 with IPv4 headers. The value
598 causes the bit to be copied from the original IP header. The values
602 cause the bit to be always unset or always set, respectively. By default, the
606 .BI flowlabel " FLOWLABEL"
607 - specifies the flow label to use in outgoing packets.
611 - specifies the UDP destination port to communicate to the remote
612 VXLAN tunnel endpoint.
615 .BI srcport " MIN MAX"
616 - specifies the range of port numbers to use as UDP
617 source ports to communicate to the remote VXLAN tunnel endpoint.
621 - specifies if unknown source link layer addresses and IP addresses
622 are entered into the VXLAN device forwarding database.
626 - specifies if route short circuit is turned on.
630 - specifies ARP proxy is turned on.
634 - specifies if netlink LLADDR miss notifications are generated.
638 - specifies if netlink IP ADDR miss notifications are generated.
642 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
645 .RB [ no ] udp6zerocsumtx
646 - skip UDP checksum calculation for transmitted packets over IPv6.
649 .RB [ no ] udp6zerocsumrx
650 - allow incoming UDP packets over IPv6 with zero checksum field.
653 .BI ageing " SECONDS"
654 - specifies the lifetime in seconds of FDB entries learnt by the kernel.
657 .BI maxaddress " NUMBER"
658 - specifies the maximum number of FDB entries.
662 - specifies whether an external control plane
663 .RB "(e.g. " "ip route encap" )
664 or the internal FDB should be used.
668 - enables the Group Policy extension (VXLAN-GBP).
671 Allows to transport group policy context across VXLAN network peers.
672 If enabled, includes the mark of a packet in the VXLAN header for outgoing
673 packets and fills the packet mark based on the information found in the
674 VXLAN header for incoming packets.
676 Format of upper 16 bits of packet mark (flags);
679 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
681 |-|-|-|-|-|-|-|-|-|D|-|-|A|-|-|-|
683 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
686 Don't Learn bit. When set, this bit indicates that the egress
687 VTEP MUST NOT learn the source address of the encapsulated frame.
690 Indicates that the group policy has already been applied to
691 this packet. Policies MUST NOT be applied by devices when the A bit is set.
694 Format of lower 16 bits of packet mark (policy ID):
697 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
701 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
705 iptables -A OUTPUT [...] -j MARK --set-mark 0x800FF
711 - enables the Generic Protocol extension (VXLAN-GPE). Currently, this is
712 only supported together with the
719 VETH, VXCAN Type Support
722 the following additional arguments are supported:
724 .BI "ip link add " DEVICE
725 .BR type " { " veth " | " vxcan " }"
735 - specifies the virtual pair device name of the
742 IPIP, SIT Type Support
745 the following additional arguments are supported:
747 .BI "ip link add " DEVICE
748 .BR type " { " ipip " | " sit " }"
749 .BI " remote " ADDR " local " ADDR
751 .BR encap " { " fou " | " gue " | " none " }"
753 .BR encap-sport " { " \fIPORT " | " auto " }"
755 .BI "encap-dport " PORT
757 .RB [ no ] encap-csum
759 .I " [no]encap-remcsum "
761 .I " mode " { ip6ip | ipip | mplsip | any } "
769 - specifies the remote address of the tunnel.
773 - specifies the fixed local address for tunneled packets.
774 It must be an address on another interface on this host.
777 .BR encap " { " fou " | " gue " | " none " }"
778 - specifies type of secondary UDP encapsulation. "fou" indicates
779 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
782 .BR encap-sport " { " \fIPORT " | " auto " }"
783 - specifies the source port in UDP encapsulation.
785 indicates the port by number, "auto"
786 indicates that the port number should be chosen automatically
787 (the kernel picks a flow based on the flow hash of the
788 encapsulated packet).
791 .RB [ no ] encap-csum
792 - specifies if UDP checksums are enabled in the secondary
796 .RB [ no ] encap-remcsum
797 - specifies if Remote Checksum Offload is enabled. This is only
798 applicable for Generic UDP Encapsulation.
801 .BI mode " { ip6ip | ipip | mplsip | any } "
802 - specifies mode in which device should run. "ip6ip" indicates
803 IPv6-Over-IPv4, "ipip" indicates "IPv4-Over-IPv4", "mplsip" indicates
804 MPLS-Over-IPv4, "any" indicates IPv6, IPv4 or MPLS Over IPv4. Supported for
805 SIT where the default is "ip6ip" and IPIP where the default is "ipip".
806 IPv6-Over-IPv4 is not supported for IPIP.
810 - make this tunnel externally controlled
811 .RB "(e.g. " "ip route encap" ).
817 .IR GRE " or " GRETAP
818 the following additional arguments are supported:
820 .BI "ip link add " DEVICE
821 .BR type " { " gre " | " gretap " }"
822 .BI " remote " ADDR " local " ADDR
824 .RB [ no ] "" [ i | o ] seq
831 .RB [ no ] "" [ i | o ] csum
843 .BR encap " { " fou " | " gue " | " none " }"
845 .BR encap-sport " { " \fIPORT " | " auto " }"
847 .BI "encap-dport " PORT
849 .RB [ no ] encap-csum
851 .RB [ no ] encap-remcsum
859 - specifies the remote address of the tunnel.
863 - specifies the fixed local address for tunneled packets.
864 It must be an address on another interface on this host.
867 .RB [ no ] "" [ i | o ] seq
871 flag enables sequencing of outgoing packets.
874 flag requires that all input packets are serialized.
881 - use keyed GRE with key
883 is either a number or an IPv4 address-like dotted quad.
886 parameter specifies the same key to use in both directions.
888 .BR ikey " and " okey
889 parameters specify different keys for input and output.
892 .RB [ no ] "" [ i | o ] csum
893 - generate/require checksums for tunneled packets.
896 flag calculates checksums for outgoing packets.
899 flag requires that all input packets have the correct
902 flag is equivalent to the combination
907 - specifies the TTL value to use in outgoing packets.
911 - specifies the TOS value to use in outgoing packets.
915 - enables/disables Path MTU Discovery on this tunnel.
916 It is enabled by default. Note that a fixed ttl is incompatible
917 with this option: tunneling with a fixed ttl always makes pmtu
922 - enables/disables IPv4 DF suppression on this tunnel.
923 Normally datagrams that exceed the MTU will be fragmented; the presence
924 of the DF flag inhibits this, resulting instead in an ICMP Unreachable
925 (Fragmentation Required) message. Enabling this attribute causes the
926 DF flag to be ignored.
930 - specifies the physical device to use for tunnel endpoint communication.
933 .BR encap " { " fou " | " gue " | " none " }"
934 - specifies type of secondary UDP encapsulation. "fou" indicates
935 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
938 .BR encap-sport " { " \fIPORT " | " auto " }"
939 - specifies the source port in UDP encapsulation.
941 indicates the port by number, "auto"
942 indicates that the port number should be chosen automatically
943 (the kernel picks a flow based on the flow hash of the
944 encapsulated packet).
947 .RB [ no ] encap-csum
948 - specifies if UDP checksums are enabled in the secondary
952 .RB [ no ] encap-remcsum
953 - specifies if Remote Checksum Offload is enabled. This is only
954 applicable for Generic UDP Encapsulation.
958 - make this tunnel externally controlled
959 .RB "(e.g. " "ip route encap" ).
964 IP6GRE/IP6GRETAP Type Support
967 the following additional arguments are supported:
969 .BI "ip link add " DEVICE
970 .BR type " { " ip6gre " | " ip6gretap " }"
971 .BI remote " ADDR " local " ADDR"
973 .RB [ no ] "" [ i | o ] seq
980 .RB [ no ] "" [ i | o ] csum
984 .BI encaplimit " ELIM "
986 .BI tclass " TCLASS "
988 .BI flowlabel " FLOWLABEL "
992 .BI "[no]allow-localremote"
1002 - specifies the remote IPv6 address of the tunnel.
1006 - specifies the fixed local IPv6 address for tunneled packets.
1007 It must be an address on another interface on this host.
1010 .RB [ no ] "" [ i | o ] seq
1011 - serialize packets.
1014 flag enables sequencing of outgoing packets.
1017 flag requires that all input packets are serialized.
1023 .BR no [ i | o ] key
1024 - use keyed GRE with key
1026 is either a number or an IPv4 address-like dotted quad.
1029 parameter specifies the same key to use in both directions.
1031 .BR ikey " and " okey
1032 parameters specify different keys for input and output.
1035 .RB [ no ] "" [ i | o ] csum
1036 - generate/require checksums for tunneled packets.
1039 flag calculates checksums for outgoing packets.
1042 flag requires that all input packets have the correct
1045 flag is equivalent to the combination
1050 - specifies Hop Limit value to use in outgoing packets.
1053 .BI encaplimit " ELIM"
1054 - specifies a fixed encapsulation limit. Default is 4.
1057 .BI flowlabel " FLOWLABEL"
1058 - specifies a fixed flowlabel.
1061 .BI [no]allow-localremote
1062 - specifies whether to allow remote endpoint to have an address configured on
1066 .BI tclass " TCLASS"
1067 - specifies the traffic class field on
1068 tunneled packets, which can be specified as either a two-digit
1069 hex value (e.g. c0) or a predefined string (e.g. internet).
1072 causes the field to be copied from the original IP header. The
1074 .BI "inherit/" STRING
1076 .BI "inherit/" 00 ".." ff
1077 will set the field to
1081 when tunneling non-IP packets. The default value is 00.
1085 - make this tunnel externally controlled (or not, which is the default).
1086 In the kernel, this is referred to as collect metadata mode. This flag is
1087 mutually exclusive with the
1095 .BR flowlabel " and " tclass
1104 the following additional arguments are supported:
1106 .BI "ip link add " DEVICE " name " NAME
1107 .BR "type ipoib " [ " pkey \fIPKEY" " ] [ " mode " \fIMODE \fR]"
1112 - specifies the IB P-Key to use.
1115 - specifies the mode (datagram or connected) to use.
1121 the following additional arguments are supported:
1123 .BI "ip link add " DEVICE
1124 .BR type " { " erspan " | " ip6erspan " }"
1125 .BI remote " ADDR " local " ADDR " seq
1128 .BR erspan_ver " \fIversion "
1130 .BR erspan " \fIIDX "
1132 .BR erspan_dir " { " \fIingress " | " \fIegress " }"
1134 .BR erspan_hwid " \fIhwid "
1136 .BI "[no]allow-localremote"
1144 - specifies the remote address of the tunnel.
1148 - specifies the fixed local address for tunneled packets.
1149 It must be an address on another interface on this host.
1152 .BR erspan_ver " \fIversion "
1153 - specifies the ERSPAN version number.
1155 indicates the ERSPAN version to be created: 1 for version 1 (type II)
1156 or 2 for version 2 (type III).
1159 .BR erspan " \fIIDX "
1160 - specifies the ERSPAN v1 index field.
1162 indicates a 20 bit index/port number associated with the ERSPAN
1163 traffic's source port and direction.
1166 .BR erspan_dir " { " \fIingress " | " \fIegress " }"
1167 - specifies the ERSPAN v2 mirrored traffic's direction.
1170 .BR erspan_hwid " \fIhwid "
1171 - an unique identifier of an ERSPAN v2 engine within a system.
1173 is a 6-bit value for users to configure.
1176 .BI [no]allow-localremote
1177 - specifies whether to allow remote endpoint to have an address configured on
1182 - make this tunnel externally controlled (or not, which is the default).
1183 In the kernel, this is referred to as collect metadata mode. This flag is
1184 mutually exclusive with the
1189 .BR erspan_dir " and " erspan_hwid
1198 the following additional arguments are supported:
1200 .BI "ip link add " DEVICE
1201 .BI type " geneve " id " VNI " remote " IPADDR"
1209 .BI flowlabel " FLOWLABEL "
1217 .RB [ no ] udp6zerocsumtx
1219 .RB [ no ] udp6zerocsumrx
1225 - specifies the Virtual Network Identifer to use.
1228 .BI remote " IPADDR"
1229 - specifies the unicast destination IP address to use in outgoing packets.
1233 - specifies the TTL value to use in outgoing packets. "0" or "auto" means
1234 use whatever default value, "inherit" means inherit the inner protocol's
1235 ttl. Default option is "0".
1239 - specifies the TOS value to use in outgoing packets.
1243 - specifies the usage of the Don't Fragment flag (DF) bit in outgoing packets
1244 with IPv4 headers. The value
1246 causes the bit to be copied from the original IP header. The values
1250 cause the bit to be always unset or always set, respectively. By default, the
1254 .BI flowlabel " FLOWLABEL"
1255 - specifies the flow label to use in outgoing packets.
1259 - select a destination port other than the default of 6081.
1263 - make this tunnel externally controlled (or not, which is the default). This
1264 flag is mutually exclusive with the
1268 .BR tos " and " flowlabel
1273 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
1276 .RB [ no ] udp6zerocsumtx
1277 - skip UDP checksum calculation for transmitted packets over IPv6.
1280 .RB [ no ] udp6zerocsumrx
1281 - allow incoming UDP packets over IPv6 with zero checksum field.
1286 MACVLAN and MACVTAP Type Support
1291 the following additional arguments are supported:
1293 .BI "ip link add link " DEVICE " name " NAME
1294 .BR type " { " macvlan " | " macvtap " } "
1295 .BR mode " { " private " | " vepa " | " bridge " | " passthru
1296 .RB " [ " nopromisc " ] | " source " } "
1300 .BR type " { " macvlan " | " macvtap " } "
1301 - specifies the link type to use.
1302 .BR macvlan " creates just a virtual interface, while "
1303 .BR macvtap " in addition creates a character device "
1304 .BR /dev/tapX " to be used just like a " tuntap " device."
1307 - Do not allow communication between
1309 instances on the same physical interface, even if the external switch supports
1313 - Virtual Ethernet Port Aggregator mode. Data from one
1315 instance to the other on the same physical interface is transmitted over the
1316 physical interface. Either the attached switch needs to support hairpin mode,
1317 or there must be a TCP/IP router forwarding the packets in order to allow
1318 communication. This is the default mode.
1321 - In bridge mode, all endpoints are directly connected to each other,
1322 communication is not redirected through the physical interface's peer.
1324 .BR mode " " passthru " [ " nopromisc " ] "
1325 - This mode gives more power to a single endpoint, usually in
1326 .BR macvtap " mode. It is not allowed for more than one endpoint on the same "
1327 physical interface. All traffic will be forwarded to this endpoint, allowing
1328 virtio guests to change MAC address or set promiscuous mode in order to bridge
1329 the interface or create vlan interfaces on top of it. By default, this mode
1330 forces the underlying interface into promiscuous mode. Passing the
1331 .BR nopromisc " flag prevents this, so the promisc flag may be controlled "
1332 using standard tools.
1335 - allows one to set a list of allowed mac address, which is used to match
1336 against source mac address from received frames on underlying interface. This
1337 allows creating mac based VLAN associations, instead of standard port or tag
1338 based. The feature is useful to deploy 802.1x mac based behavior,
1339 where drivers of underlying interfaces doesn't allows that.
1343 High-availability Seamless Redundancy (HSR) Support
1346 the following additional arguments are supported:
1348 .BI "ip link add link " DEVICE " name " NAME " type hsr"
1349 .BI slave1 " SLAVE1-IF " slave2 " SLAVE2-IF "
1350 .RB [ " supervision"
1351 .IR ADDR-BYTE " ] ["
1352 .BR version " { " 0 " | " 1 " } ]"
1357 - specifies the link type to use, here HSR.
1359 .BI slave1 " SLAVE1-IF "
1360 - Specifies the physical device used for the first of the two ring ports.
1362 .BI slave2 " SLAVE2-IF "
1363 - Specifies the physical device used for the second of the two ring ports.
1365 .BI supervision " ADDR-BYTE"
1366 - The last byte of the multicast address used for HSR supervision frames.
1367 Default option is "0", possible values 0-255.
1369 .BR version " { " 0 " | " 1 " }"
1370 - Selects the protocol version of the interface. Default option is "0", which
1371 corresponds to the 2010 version of the HSR standard. Option "1" activates the
1379 the following additional arguments are supported:
1381 .BI "ip link add " DEVICE " type bridge "
1383 .BI ageing_time " AGEING_TIME "
1385 .BI group_fwd_mask " MASK "
1387 .BI group_address " ADDRESS "
1389 .BI forward_delay " FORWARD_DELAY "
1391 .BI hello_time " HELLO_TIME "
1393 .BI max_age " MAX_AGE "
1395 .BI stp_state " STP_STATE "
1397 .BI priority " PRIORITY "
1399 .BI vlan_filtering " VLAN_FILTERING "
1401 .BI vlan_protocol " VLAN_PROTOCOL "
1403 .BI vlan_default_pvid " VLAN_DEFAULT_PVID "
1405 .BI vlan_stats_enabled " VLAN_STATS_ENABLED "
1407 .BI vlan_stats_per_port " VLAN_STATS_PER_PORT "
1409 .BI mcast_snooping " MULTICAST_SNOOPING "
1411 .BI mcast_router " MULTICAST_ROUTER "
1413 .BI mcast_query_use_ifaddr " MCAST_QUERY_USE_IFADDR "
1415 .BI mcast_querier " MULTICAST_QUERIER "
1417 .BI mcast_hash_elasticity " HASH_ELASTICITY "
1419 .BI mcast_hash_max " HASH_MAX "
1421 .BI mcast_last_member_count " LAST_MEMBER_COUNT "
1423 .BI mcast_startup_query_count " STARTUP_QUERY_COUNT "
1425 .BI mcast_last_member_interval " LAST_MEMBER_INTERVAL "
1427 .BI mcast_membership_interval " MEMBERSHIP_INTERVAL "
1429 .BI mcast_querier_interval " QUERIER_INTERVAL "
1431 .BI mcast_query_interval " QUERY_INTERVAL "
1433 .BI mcast_query_response_interval " QUERY_RESPONSE_INTERVAL "
1435 .BI mcast_startup_query_interval " STARTUP_QUERY_INTERVAL "
1437 .BI mcast_stats_enabled " MCAST_STATS_ENABLED "
1439 .BI mcast_igmp_version " IGMP_VERSION "
1441 .BI mcast_mld_version " MLD_VERSION "
1443 .BI nf_call_iptables " NF_CALL_IPTABLES "
1445 .BI nf_call_ip6tables " NF_CALL_IP6TABLES "
1447 .BI nf_call_arptables " NF_CALL_ARPTABLES "
1452 .BI ageing_time " AGEING_TIME "
1453 - configure the bridge's FDB entries ageing time, ie the number of
1454 seconds a MAC address will be kept in the FDB after a packet has been
1455 received from that address. after this time has passed, entries are
1458 .BI group_fwd_mask " MASK "
1459 - set the group forward mask. This is the bitmask that is applied to
1460 decide whether to forward incoming frames destined to link-local
1461 addresses, ie addresses of the form 01:80:C2:00:00:0X (defaults to 0,
1462 ie the bridge does not forward any link-local frames).
1464 .BI group_address " ADDRESS "
1465 - set the MAC address of the multicast group this bridge uses for STP.
1466 The address must be a link-local address in standard Ethernet MAC
1467 address format, ie an address of the form 01:80:C2:00:00:0X, with X
1470 .BI forward_delay " FORWARD_DELAY "
1471 - set the forwarding delay in seconds, ie the time spent in LISTENING
1472 state (before moving to LEARNING) and in LEARNING state (before
1473 moving to FORWARDING). Only relevant if STP is enabled. Valid values
1474 are between 2 and 30.
1476 .BI hello_time " HELLO_TIME "
1477 - set the time in seconds between hello packets sent by the bridge,
1478 when it is a root bridge or a designated bridges.
1479 Only relevant if STP is enabled. Valid values are between 1 and 10.
1481 .BI max_age " MAX_AGE "
1482 - set the hello packet timeout, ie the time in seconds until another
1483 bridge in the spanning tree is assumed to be dead, after reception of
1484 its last hello message. Only relevant if STP is enabled. Valid values
1485 are between 6 and 40.
1487 .BI stp_state " STP_STATE "
1488 - turn spanning tree protocol on
1489 .RI ( STP_STATE " > 0) "
1491 .RI ( STP_STATE " == 0). "
1494 .BI priority " PRIORITY "
1495 - set this bridge's spanning tree priority, used during STP root
1498 is a 16bit unsigned integer.
1500 .BI vlan_filtering " VLAN_FILTERING "
1501 - turn VLAN filtering on
1502 .RI ( VLAN_FILTERING " > 0) "
1504 .RI ( VLAN_FILTERING " == 0). "
1505 When disabled, the bridge will not consider the VLAN tag when handling packets.
1507 .BR vlan_protocol " { " 802.1Q " | " 802.1ad " } "
1508 - set the protocol used for VLAN filtering.
1510 .BI vlan_default_pvid " VLAN_DEFAULT_PVID "
1511 - set the default PVID (native/untagged VLAN ID) for this bridge.
1513 .BI vlan_stats_enabled " VLAN_STATS_ENABLED "
1515 .RI ( VLAN_STATS_ENABLED " == 1) "
1517 .RI ( VLAN_STATS_ENABLED " == 0) "
1518 per-VLAN stats accounting.
1520 .BI vlan_stats_per_port " VLAN_STATS_PER_PORT "
1522 .RI ( VLAN_STATS_PER_PORT " == 1) "
1524 .RI ( VLAN_STATS_PER_PORT " == 0) "
1525 per-VLAN per-port stats accounting. Can be changed only when there are no port VLANs configured.
1527 .BI mcast_snooping " MULTICAST_SNOOPING "
1528 - turn multicast snooping on
1529 .RI ( MULTICAST_SNOOPING " > 0) "
1531 .RI ( MULTICAST_SNOOPING " == 0). "
1533 .BI mcast_router " MULTICAST_ROUTER "
1534 - set bridge's multicast router if IGMP snooping is enabled.
1536 is an integer value having the following meaning:
1543 - automatic (queried).
1546 - permanently enabled.
1549 .BI mcast_query_use_ifaddr " MCAST_QUERY_USE_IFADDR "
1550 - whether to use the bridge's own IP address as source address for IGMP queries
1551 .RI ( MCAST_QUERY_USE_IFADDR " > 0) "
1552 or the default of 0.0.0.0
1553 .RI ( MCAST_QUERY_USE_IFADDR " == 0). "
1555 .BI mcast_querier " MULTICAST_QUERIER "
1557 .RI ( MULTICAST_QUERIER " > 0) "
1559 .RI ( MULTICAST_QUERIER " == 0) "
1560 IGMP querier, ie sending of multicast queries by the bridge (default: disabled).
1562 .BI mcast_querier_interval " QUERIER_INTERVAL "
1563 - interval between queries sent by other routers. if no queries are seen
1564 after this delay has passed, the bridge will start to send its own queries
1569 .BI mcast_hash_elasticity " HASH_ELASTICITY "
1570 - set multicast database hash elasticity, ie the maximum chain length
1571 in the multicast hash table (defaults to 4).
1573 .BI mcast_hash_max " HASH_MAX "
1574 - set maximum size of multicast hash table (defaults to 512,
1575 value must be a power of 2).
1577 .BI mcast_last_member_count " LAST_MEMBER_COUNT "
1578 - set multicast last member count, ie the number of queries the bridge
1579 will send before stopping forwarding a multicast group after a "leave"
1580 message has been received (defaults to 2).
1582 .BI mcast_last_member_interval " LAST_MEMBER_INTERVAL "
1583 - interval between queries to find remaining members of a group,
1584 after a "leave" message is received.
1586 .BI mcast_startup_query_count " STARTUP_QUERY_COUNT "
1587 - set the number of IGMP queries to send during startup phase (defaults to 2).
1589 .BI mcast_startup_query_interval " STARTUP_QUERY_INTERVAL "
1590 - interval between queries in the startup phase.
1592 .BI mcast_query_interval " QUERY_INTERVAL "
1593 - interval between queries sent by the bridge after the end of the
1596 .BI mcast_query_response_interval " QUERY_RESPONSE_INTERVAL "
1597 - set the Max Response Time/Maximum Response Delay for IGMP/MLD
1598 queries sent by the bridge.
1600 .BI mcast_membership_interval " MEMBERSHIP_INTERVAL "
1601 - delay after which the bridge will leave a group,
1602 if no membership reports for this group are received.
1604 .BI mcast_stats_enabled " MCAST_STATS_ENABLED "
1606 .RI ( MCAST_STATS_ENABLED " > 0) "
1608 .RI ( MCAST_STATS_ENABLED " == 0) "
1609 multicast (IGMP/MLD) stats accounting.
1611 .BI mcast_igmp_version " IGMP_VERSION "
1612 - set the IGMP version.
1614 .BI mcast_mld_version " MLD_VERSION "
1615 - set the MLD version.
1617 .BI nf_call_iptables " NF_CALL_IPTABLES "
1619 .RI ( NF_CALL_IPTABLES " > 0) "
1621 .RI ( NF_CALL_IPTABLES " == 0) "
1622 iptables hooks on the bridge.
1624 .BI nf_call_ip6tables " NF_CALL_IP6TABLES "
1626 .RI ( NF_CALL_IP6TABLES " > 0) "
1628 .RI ( NF_CALL_IP6TABLES " == 0) "
1629 ip6tables hooks on the bridge.
1631 .BI nf_call_arptables " NF_CALL_ARPTABLES "
1633 .RI ( NF_CALL_ARPTABLES " > 0) "
1635 .RI ( NF_CALL_ARPTABLES " == 0) "
1636 arptables hooks on the bridge.
1645 the following additional arguments are supported:
1647 .BI "ip link add link " DEVICE " name " NAME " type macsec"
1649 .BI address " <lladdr>"
1655 .BI cipher " CIPHER_SUITE"
1660 .BR on " | " off " } ] [ "
1661 .BR send_sci " { " on " | " off " } ] ["
1662 .BR end_station " { " on " | " off " } ] ["
1663 .BR scb " { " on " | " off " } ] ["
1664 .BR protect " { " on " | " off " } ] ["
1665 .BR replay " { " on " | " off " }"
1667 .IR 0..2^32-1 " } ] ["
1668 .BR validate " { " strict " | " check " | " disabled " } ] ["
1669 .BR encodingsa " { "
1674 .BI address " <lladdr> "
1675 - sets the system identifier component of secure channel for this MACsec device.
1679 - sets the port number component of secure channel for this MACsec
1680 device, in a range from 1 to 65535 inclusive. Numbers with a leading "
1681 0 " or " 0x " are interpreted as octal and hexadecimal, respectively.
1685 - sets the secure channel identifier for this MACsec device.
1687 is a 64bit wide number in hexadecimal format.
1690 .BI cipher " CIPHER_SUITE "
1691 - defines the cipher suite to use.
1694 .BI icvlen " LENGTH "
1695 - sets the length of the Integrity Check Value (ICV).
1698 .BR "encrypt on " or " encrypt off"
1699 - switches between authenticated encryption, or authenticity mode only.
1702 .BR "send_sci on " or " send_sci off"
1703 - specifies whether the SCI is included in every packet,
1704 or only when it is necessary.
1707 .BR "end_station on " or " end_station off"
1708 - sets the End Station bit.
1711 .BR "scb on " or " scb off"
1712 - sets the Single Copy Broadcast bit.
1715 .BR "protect on " or " protect off"
1716 - enables MACsec protection on the device.
1719 .BR "replay on " or " replay off"
1720 - enables replay protection on the device.
1726 - sets the size of the replay window.
1731 .BR "validate strict " or " validate check " or " validate disabled"
1732 - sets the validation mode on the device.
1735 .BI encodingsa " AN "
1736 - sets the active secure association for transmission.
1744 the following additional arguments are supported:
1746 .BI "ip link add " DEVICE " type vrf table " TABLE
1750 .BR table " table id associated with VRF device"
1758 the following additional arguments are supported:
1760 .BI "ip link add link " DEVICE " name " NAME " type rmnet mux_id " MUXID
1764 .BI mux_id " MUXID "
1765 - specifies the mux identifier for the rmnet device, possible values 1-254.
1773 the following additional arguments are supported:
1775 .BI "ip link add " DEVICE " type xfrm dev " PHYS_DEV " [ if_id " IF_ID " ]"
1779 .BI dev " PHYS_DEV "
1780 - specifies the underlying physical interface from which transform traffic is sent and received.
1784 - specifies the hexadecimal lookup key used to send traffic to and from specific xfrm
1785 policies. Policies must be configured with the same key. If not set, the key defaults to
1786 0 and will match any policies which similarly do not have a lookup key configuration.
1790 .SS ip link delete - delete virtual link
1794 specifies the virtual device to act operate on.
1798 specifies the group of virtual links to delete. Group 0 is not allowed to be
1799 deleted since it is the default group.
1803 specifies the type of the device.
1805 .SS ip link set - change device attributes
1809 If multiple parameter changes are requested,
1811 aborts immediately after any of the changes have failed.
1812 This is the only case when
1814 can move the system to an unpredictable state. The solution
1815 is to avoid changing several parameters with one
1822 specifies network device to operate on. When configuring SR-IOV
1823 Virtual Function (VF) devices, this keyword should specify the
1824 associated Physical Function (PF) device.
1829 has a dual role: If both group and dev are present, then move the device to the
1830 specified group. If only a group is specified, then the command operates on
1831 all devices in that group.
1835 change the state of the device to
1841 .BR "arp on " or " arp off"
1847 .BR "multicast on " or " multicast off"
1853 .BR "protodown on " or " protodown off"
1856 state on the device. Indicates that a protocol error has been detected
1857 on the port. Switch drivers can react to this error by doing a phys
1858 down on the switch port.
1861 .BR "dynamic on " or " dynamic off"
1864 flag on the device. Indicates that address can change when interface
1865 goes down (currently
1871 change the name of the device. This operation is not
1872 recommended if the device is running or has some addresses
1876 .BI txqueuelen " NUMBER"
1878 .BI txqlen " NUMBER"
1879 change the transmit queue length of the device.
1888 .BI address " LLADDRESS"
1889 change the station address of the interface.
1892 .BI broadcast " LLADDRESS"
1894 .BI brd " LLADDRESS"
1896 .BI peer " LLADDRESS"
1897 change the link layer broadcast address or the peer address when
1902 .BI netns " NETNSNAME " \fR| " PID"
1903 move the device to the network namespace associated with name
1907 Some devices are not allowed to change network namespace: loopback, bridge,
1908 ppp, wireless. These are network namespace local devices. In such case
1910 tool will return "Invalid argument" error. It is possible to find out
1911 if device is local to a single network namespace by checking
1913 flag in the output of the
1921 To change network namespace for wireless devices the
1923 tool can be used. But it allows to change network namespace only for
1924 physical devices and by process
1929 give the device a symbolic name for easy reference.
1933 specify the group the device belongs to.
1934 The available groups are listed in file
1935 .BR "@SYSCONFDIR@/group" .
1939 specify a Virtual Function device to be configured. The associated PF device
1940 must be specified using the
1945 .BI mac " LLADDRESS"
1946 - change the station address for the specified VF. The
1948 parameter must be specified.
1952 - change the assigned VLAN for the specified VF. When specified, all traffic
1953 sent from the VF will be tagged with the specified VLAN ID. Incoming traffic
1954 will be filtered for the specified VLAN ID, and will have all VLAN tags
1955 stripped before being passed to the VF. Setting this parameter to 0 disables
1956 VLAN tagging and filtering. The
1958 parameter must be specified.
1962 - assign VLAN QOS (priority) bits for the VLAN tag. When specified, all VLAN
1963 tags transmitted by the VF will include the specified priority bits in the
1964 VLAN tag. If not specified, the value is assumed to be 0. Both the
1968 parameters must be specified. Setting both
1972 as 0 disables VLAN tagging and filtering for the VF.
1975 .BI proto " VLAN-PROTO"
1976 - assign VLAN PROTOCOL for the VLAN tag, either 802.1Q or 802.1ad.
1977 Setting to 802.1ad, all traffic sent from the VF will be tagged with
1978 VLAN S-Tag. Incoming traffic will have VLAN S-Tags stripped before
1979 being passed to the VF. Setting to 802.1ad also enables an option to
1980 concatenate another VLAN tag, so both S-TAG and C-TAG will be
1981 inserted/stripped for outgoing/incoming traffic, respectively. If not
1982 specified, the value is assumed to be 802.1Q. Both the
1986 parameters must be specified.
1990 -- change the allowed transmit bandwidth, in Mbps, for the specified VF.
1991 Setting this parameter to 0 disables rate limiting.
1993 parameter must be specified.
1999 .BI max_tx_rate " TXRATE"
2000 - change the allowed maximum transmit bandwidth, in Mbps, for the
2001 specified VF. Setting this parameter to 0 disables rate limiting.
2003 parameter must be specified.
2006 .BI min_tx_rate " TXRATE"
2007 - change the allowed minimum transmit bandwidth, in Mbps, for the specified VF.
2008 Minimum TXRATE should be always <= Maximum TXRATE.
2009 Setting this parameter to 0 disables rate limiting.
2011 parameter must be specified.
2014 .BI spoofchk " on|off"
2015 - turn packet spoof checking on or off for the specified VF.
2017 .BI query_rss " on|off"
2018 - toggle the ability of querying the RSS configuration of a specific
2019 VF. VF RSS information like RSS hash key may be considered sensitive
2020 on some devices where this information is shared between VF and PF
2021 and thus its querying may be prohibited by default.
2023 .BI state " auto|enable|disable"
2024 - set the virtual link state as seen by the specified VF. Setting to
2025 auto means a reflection of the PF link state, enable lets the VF to
2026 communicate with other VFs on this host even if the PF link state is
2027 down, disable causes the HW to drop any packets sent by the VF.
2030 - trust the specified VF user. This enables that VF user can set a
2031 specific feature which may impact security and/or
2032 performance. (e.g. VF multicast promiscuous mode)
2034 .BI node_guid " eui64"
2035 - configure node GUID for Infiniband VFs.
2037 .BI port_guid " eui64"
2038 - configure port GUID for Infiniband VFs.
2042 .B xdp object "|" pinned "|" off
2043 set (or unset) a XDP ("eXpress Data Path") BPF program to run on every
2044 packet at driver level.
2046 output will indicate a
2048 flag for the networking device. If the driver does not have native XDP
2049 support, the kernel will fall back to a slower, driver-independent "generic"
2052 output will in that case indicate
2056 only. If the driver does have native XDP support, but the program is
2058 .B xdpgeneric object "|" pinned
2059 then the kernel will use the generic XDP variant instead of the native one.
2061 has the opposite effect of requestsing that the automatic fallback to the
2062 generic XDP variant be disabled and in case driver is not XDP-capable error
2065 also disables hardware offloads.
2067 in ip link output indicates that the program has been offloaded to hardware
2068 and can also be used to request the "offload" mode, much like
2070 it forces program to be installed specifically in HW/FW of the apater.
2076 - Detaches any currently attached XDP/BPF program from the given device.
2079 - Attaches a XDP/BPF program to the given device. The
2081 points to a BPF ELF file (f.e. generated by LLVM) that contains the BPF
2082 program code, map specifications, etc. If a XDP/BPF program is already
2083 attached to the given device, an error will be thrown. If no XDP/BPF
2084 program is currently attached, the device supports XDP and the program
2085 from the BPF ELF file passes the kernel verifier, then it will be attached
2086 to the device. If the option
2090 then any prior attached XDP/BPF program will be atomically overridden and
2091 no error will be thrown in this case. If no
2093 option is passed, then the default section name ("prog") will be assumed,
2094 otherwise the provided section name will be used. If no
2096 option is passed, then a verifier log will only be dumped on load error.
2099 section for usage examples.
2101 .BI section " NAME "
2102 - Specifies a section name that contains the BPF program code. If no section
2103 name is specified, the default one ("prog") will be used. This option is
2104 to be passed with the
2109 - Act in verbose mode. For example, even in case of success, this will
2110 print the verifier log in case a program was loaded from a BPF ELF file.
2113 - Attaches a XDP/BPF program to the given device. The
2115 points to an already pinned BPF program in the BPF file system. The option
2117 doesn't apply here, but otherwise semantics are the same as with the option
2122 .BI master " DEVICE"
2123 set master device of the device (enslave device).
2127 unset master device of the device (release device).
2130 .BI addrgenmode " eui64|none|stable_secret|random"
2131 set the IPv6 address generation mode
2134 - use a Modified EUI-64 format interface identifier
2137 - disable automatic address generation
2140 - generate the interface identifier based on a preset
2141 /proc/sys/net/ipv6/conf/{default,DEVICE}/stable_secret
2144 - like stable_secret, but auto-generate a new random secret if none is set
2148 set peer netnsid for a cross-netns interface
2151 .BI type " ETYPE TYPE_ARGS"
2152 Change type-specific settings. For a list of supported types and arguments refer
2153 to the description of
2155 above. In addition to that, it is possible to manipulate settings to slave
2159 Bridge Slave Support
2160 For a link with master
2162 the following additional arguments are supported:
2164 .B "ip link set type bridge_slave"
2170 .BI priority " PRIO"
2174 .BR guard " { " on " | " off " }"
2176 .BR hairpin " { " on " | " off " }"
2178 .BR fastleave " { " on " | " off " }"
2180 .BR root_block " { " on " | " off " }"
2182 .BR learning " { " on " | " off " }"
2184 .BR flood " { " on " | " off " }"
2186 .BR proxy_arp " { " on " | " off " }"
2188 .BR proxy_arp_wifi " { " on " | " off " }"
2190 .BI mcast_router " MULTICAST_ROUTER"
2192 .BR mcast_fast_leave " { " on " | " off "}"
2194 .BR mcast_flood " { " on " | " off " }"
2196 .BR mcast_to_unicast " { " on " | " off " }"
2198 .BR group_fwd_mask " MASK"
2200 .BR neigh_suppress " { " on " | " off " }"
2202 .BR vlan_tunnel " { " on " | " off " }"
2204 .BR isolated " { " on " | " off " }"
2206 .BR backup_port " DEVICE"
2208 .BR nobackup_port " ]"
2213 - flush bridge slave's fdb dynamic entries.
2218 is a number representing the following states:
2219 .BR 0 " (disabled),"
2220 .BR 1 " (listening),"
2221 .BR 2 " (learning),"
2222 .BR 3 " (forwarding),"
2223 .BR 4 " (blocking)."
2225 .BI priority " PRIO"
2226 - set port priority (allowed values are between 0 and 63, inclusively).
2229 - set port cost (allowed values are between 1 and 65535, inclusively).
2231 .BR guard " { " on " | " off " }"
2232 - block incoming BPDU packets on this port.
2234 .BR hairpin " { " on " | " off " }"
2235 - enable hairpin mode on this port. This will allow incoming packets on this
2236 port to be reflected back.
2238 .BR fastleave " { " on " | " off " }"
2239 - enable multicast fast leave on this port.
2241 .BR root_block " { " on " | " off " }"
2242 - block this port from becoming the bridge's root port.
2244 .BR learning " { " on " | " off " }"
2245 - allow MAC address learning on this port.
2247 .BR flood " { " on " | " off " }"
2248 - open the flood gates on this port, i.e. forward all unicast frames to this
2250 .BR proxy_arp " and " proxy_arp_wifi
2253 .BR proxy_arp " { " on " | " off " }"
2254 - enable proxy ARP on this port.
2256 .BR proxy_arp_wifi " { " on " | " off " }"
2257 - enable proxy ARP on this port which meets extended requirements by IEEE
2258 802.11 and Hotspot 2.0 specifications.
2260 .BI mcast_router " MULTICAST_ROUTER"
2261 - configure this port for having multicast routers attached. A port with a
2262 multicast router will receive all multicast traffic.
2266 to disable multicast routers on this port,
2268 to let the system detect the presence of of routers (this is the default),
2270 to permanently enable multicast traffic forwarding on this port or
2272 to enable multicast routers temporarily on this port, not depending on incoming
2275 .BR mcast_fast_leave " { " on " | " off " }"
2276 - this is a synonym to the
2280 .BR mcast_flood " { " on " | " off " }"
2281 - controls whether a given port will flood multicast traffic for which
2282 there is no MDB entry.
2284 .BR mcast_to_unicast " { " on " | " off " }"
2285 - controls whether a given port will replicate packets using unicast
2286 instead of multicast. By default this flag is off.
2288 .BI group_fwd_mask " MASK "
2289 - set the group forward mask. This is the bitmask that is applied to
2290 decide whether to forward incoming frames destined to link-local
2291 addresses, ie addresses of the form 01:80:C2:00:00:0X (defaults to
2292 0, ie the bridge does not forward any link-local frames coming on
2295 .BR neigh_suppress " { " on " | " off " }"
2296 - controls whether neigh discovery (arp and nd) proxy and suppression
2297 is enabled on the port. By default this flag is off.
2299 .BR vlan_tunnel " { " on " | " off " }"
2300 - controls whether vlan to tunnel mapping is enabled on the port. By
2301 default this flag is off.
2303 .BI backup_port " DEVICE"
2304 - if the port loses carrier all traffic will be redirected to the
2305 configured backup port
2308 - removes the currently configured backup port
2313 Bonding Slave Support
2314 For a link with master
2316 the following additional arguments are supported:
2318 .B "ip link set type bond_slave"
2326 - set the slave's queue ID (a 16bit unsigned value).
2331 MACVLAN and MACVTAP Support
2332 Modify list of allowed macaddr for link in source mode.
2334 .B "ip link set type { macvlan | macvap } "
2336 .BI macaddr " " "" COMMAND " " MACADDR " ..."
2342 - add MACADDR to allowed list
2345 - replace allowed list
2348 - remove MACADDR from allowed list
2351 - flush whole allowed list
2356 .SS ip link show - display device attributes
2359 .BI dev " NAME " (default)
2361 specifies the network device to show.
2362 If this argument is omitted all devices in the default group are listed.
2367 specifies what group of devices to show.
2371 only display running interfaces.
2374 .BI master " DEVICE "
2376 specifies the master device which enslaves devices to show.
2381 speficies the VRF which enslaves devices to show.
2386 specifies the type of devices to show.
2388 Note that the type name is not checked against the list of supported types -
2389 instead it is sent as-is to the kernel. Later it is used to filter the returned
2390 interface list by comparing it with the relevant attribute in case the kernel
2391 didn't filter already. Therefore any string is accepted, but may lead to empty
2394 .SS ip link xstats - display extended statistics
2399 specifies the type of devices to display extended statistics for.
2401 .SS ip link afstats - display address-family specific statistics
2406 specifies the device to display address-family statistics for.
2408 .SS ip link help - display help
2412 specifies which help of link type to dislpay.
2416 may be a number or a string from the file
2417 .B @SYSCONFDIR@/group
2418 which can be manually filled.
2424 Shows the state of all network interfaces on the system.
2427 ip link show type bridge
2429 Shows the bridge devices.
2432 ip link show type vlan
2434 Shows the vlan devices.
2437 ip link show master br0
2439 Shows devices enslaved by br0
2442 ip link set dev ppp0 mtu 1400
2444 Change the MTU the ppp0 device.
2447 ip link add link eth0 name eth0.10 type vlan id 10
2449 Creates a new vlan device eth0.10 on device eth0.
2452 ip link delete dev eth0.10
2454 Removes vlan device.
2459 Display help for the gre link type.
2462 ip link add name tun1 type ipip remote 192.168.1.1
2463 local 192.168.1.2 ttl 225 encap gue encap-sport auto
2464 encap-dport 5555 encap-csum encap-remcsum
2466 Creates an IPIP that is encapsulated with Generic UDP Encapsulation,
2467 and the outer UDP checksum and remote checksum offload are enabled.
2470 ip link set dev eth0 xdp obj prog.o
2472 Attaches a XDP/BPF program to device eth0, where the program is
2473 located in prog.o, section "prog" (default section). In case a
2474 XDP/BPF program is already attached, throw an error.
2477 ip -force link set dev eth0 xdp obj prog.o sec foo
2479 Attaches a XDP/BPF program to device eth0, where the program is
2480 located in prog.o, section "foo". In case a XDP/BPF program is
2481 already attached, it will be overridden by the new one.
2484 ip -force link set dev eth0 xdp pinned /sys/fs/bpf/foo
2486 Attaches a XDP/BPF program to device eth0, where the program was
2487 previously pinned as an object node into BPF file system under
2491 ip link set dev eth0 xdp off
2493 If a XDP/BPF program is attached on device eth0, detach it and
2494 effectively turn off XDP for device eth0.
2497 ip link add link wpan0 lowpan0 type lowpan
2499 Creates a 6LoWPAN interface named lowpan0 on the underlying
2500 IEEE 802.15.4 device wpan0.
2503 ip link add dev ip6erspan11 type ip6erspan seq key 102
2504 local fc00:100::2 remote fc00:100::1
2505 erspan_ver 2 erspan_dir ingress erspan_hwid 17
2507 Creates a IP6ERSPAN version 2 interface named ip6erspan00.
2518 Original Manpage by Michail Litvak <mci@owl.openwall.com>