1 .TH IP\-LINK 8 "13 Dec 2012" "iproute2" "Linux"
3 ip-link \- network device configuration
10 .RI " { " COMMAND " | "
48 .BR "ip link delete " {
61 .RB "[ { " up " | " down " } ]"
64 .IR "ETYPE TYPE_ARGS" " ]"
66 .RB "[ " arp " { " on " | " off " } ]"
68 .RB "[ " dynamic " { " on " | " off " } ]"
70 .RB "[ " multicast " { " on " | " off " } ]"
72 .RB "[ " allmulticast " { " on " | " off " } ]"
74 .RB "[ " promisc " { " on " | " off " } ]"
76 .RB "[ " protodown " { " on " | " off " } ]"
78 .RB "[ " trailers " { " on " | " off " } ]"
96 .IR PID " | " NETNSNAME " } ]"
110 .RI "[ " VFVLAN-LIST " ]"
121 .RB "[ " spoofchk " { " on " | " off " } ]"
123 .RB "[ " query_rss " { " on " | " off " } ]"
125 .RB "[ " state " { " auto " | " enable " | " disable " } ]"
127 .RB "[ " trust " { " on " | " off " } ]"
129 .RB "[ " node_guid " eui64 ]"
131 .RB "[ " port_guid " eui64 ] ]"
134 .RB "[ { " xdp " | " xdpgeneric " | " xdpdrv " | " xdpoffload " } { " off " | "
141 .RB "[ " verbose " ] |"
150 .RB "[ " nomaster " ]"
155 .RB "[ " addrgenmode " { " eui64 " | " none " | " stable_secret " | " random " } ]"
157 .RB "[ " macaddr " { " flush " | { " add " | " del " } "
158 .IR MACADDR " | set [ "
160 .IR MACADDR " [ ... ] ] ] } ]"
165 .RI "[ " DEVICE " | "
228 .IR ETYPE " := [ " TYPE " |"
229 .BR bridge_slave " | " bond_slave " ]"
232 .IR VFVLAN-LIST " := [ " VFVLAN-LIST " ] " VFVLAN
241 .IR VLAN-PROTO " ] ]"
244 .SS ip link add - add virtual link
248 specifies the physical device to act operate on.
251 specifies the name of the new virtual device.
254 specifies the type of the new device.
260 - Ethernet Bridge device
266 - Dummy network interface
269 - High-availability Seamless Redundancy device
272 - Intermediate Functional Block device
275 - IP over Infiniband device
278 - Virtual interface base on link layer address (MAC)
281 - Virtual interface based on link layer address (MAC) and TAP.
284 - Virtual Controller Area Network interface
287 - Virtual Controller Area Network tunnel interface
290 - Virtual ethernet interface
293 - 802.1q tagged virtual LAN interface
296 - Virtual eXtended LAN
299 - Virtual tunnel interface IPv4|IPv6 over IPv6
302 - Virtual tunnel interface IPv4 over IPv4
305 - Virtual tunnel interface IPv6 over IPv4
308 - Virtual tunnel interface GRE over IPv4
311 - Virtual L2 tunnel interface GRE over IPv4
314 - Encapsulated Remote SPAN over GRE and IPv4
317 - Virtual tunnel interface GRE over IPv6
320 - Virtual L2 tunnel interface GRE over IPv6
323 - Encapsulated Remote SPAN over GRE and IPv6
326 - Virtual tunnel interface
329 - Netlink monitoring device
332 - Interface for L3 (IPv6/IPv4) based VLANs
335 - Interface for L3 (IPv6/IPv4) based VLANs and TAP
338 - Interface for 6LoWPAN (IPv6) over IEEE 802.15.4 / Bluetooth
341 - GEneric NEtwork Virtualization Encapsulation
344 - Interface for IEEE 802.1AE MAC Security (MACsec)
347 - Interface for L3 VRF domains
350 - Interface for netdev API tests
353 - Qualcomm rmnet device
356 - Virtual xfrm interface
360 .BI numtxqueues " QUEUE_COUNT "
361 specifies the number of transmit queues for new device.
364 .BI numrxqueues " QUEUE_COUNT "
365 specifies the number of receive queues for new device.
368 .BI gso_max_size " BYTES "
369 specifies the recommended maximum size of a Generic Segment Offload
370 packet the new device should accept.
373 .BI gso_max_segs " SEGMENTS "
374 specifies the recommended maximum number of a Generic Segment Offload
375 segments the new device should accept.
379 specifies the desired index of the new virtual device. The link
380 creation fails, if the index is busy.
386 the following additional arguments are supported:
393 .BI protocol " VLAN_PROTO "
397 .BR reorder_hdr " { " on " | " off " } "
400 .BR gvrp " { " on " | " off " } "
403 .BR mvrp " { " on " | " off " } "
406 .BR loose_binding " { " on " | " off " } "
409 .BR bridge_binding " { " on " | " off " } "
412 .BI ingress-qos-map " QOS-MAP "
415 .BI egress-qos-map " QOS-MAP "
420 .BI protocol " VLAN_PROTO "
421 - either 802.1Q or 802.1ad.
424 - specifies the VLAN Identifer to use. Note that numbers with a leading " 0 " or " 0x " are interpreted as octal or hexadeimal, respectively.
426 .BR reorder_hdr " { " on " | " off " } "
427 - specifies whether ethernet headers are reordered or not (default is
432 .BR reorder_hdr " is " on
433 then VLAN header will be not inserted immediately but only before
434 passing to the physical device (if this device does not support VLAN
435 offloading), the similar on the RX direction - by default the packet
436 will be untagged before being received by VLAN device. Reordering
437 allows to accelerate tagging on egress and to hide VLAN header on
438 ingress so the packet looks like regular Ethernet packet, at the same
439 time it might be confusing for packet capture as the VLAN header does
440 not exist within the packet.
442 VLAN offloading can be checked by
448 .RB grep " tx-vlan-offload"
451 where <phy_dev> is the physical device to which VLAN device is bound.
454 .BR gvrp " { " on " | " off " } "
455 - specifies whether this VLAN should be registered using GARP VLAN
456 Registration Protocol.
458 .BR mvrp " { " on " | " off " } "
459 - specifies whether this VLAN should be registered using Multiple VLAN
460 Registration Protocol.
462 .BR loose_binding " { " on " | " off " } "
463 - specifies whether the VLAN device state is bound to the physical device state.
465 .BR bridge_binding " { " on " | " off " } "
466 - specifies whether the VLAN device link state tracks the state of bridge ports
467 that are members of the VLAN.
469 .BI ingress-qos-map " QOS-MAP "
470 - defines a mapping of VLAN header prio field to the Linux internal packet
471 priority on incoming frames. The format is FROM:TO with multiple mappings
474 .BI egress-qos-map " QOS-MAP "
475 - defines a mapping of Linux internal packet priority to VLAN header prio field
476 but for outgoing frames. The format is the same as for ingress-qos-map.
479 Linux packet priority can be set by
484 -t mangle -A POSTROUTING [...] -j CLASSIFY --set-class 0:4
487 and this "4" priority can be used in the egress qos mapping to set
492 link set veth0.10 type vlan egress 4:5
501 the following additional arguments are supported:
503 .BI "ip link add " DEVICE
504 .BI type " vxlan " id " VNI"
507 .RB " ] [ { " group " | " remote " } "
511 .RI "{ "IPADDR " | "any " } "
519 .BI flowlabel " FLOWLABEL "
523 .BI srcport " MIN MAX "
537 .RB [ no ] udp6zerocsumtx
539 .RB [ no ] udp6zerocsumrx
541 .BI ageing " SECONDS "
543 .BI maxaddress " NUMBER "
555 - specifies the VXLAN Network Identifer (or VXLAN Segment
559 - specifies the physical device to use for tunnel endpoint communication.
563 - specifies the multicast IP address to join.
564 This parameter cannot be specified with the
570 - specifies the unicast destination IP address to use in outgoing packets
571 when the destination link layer address is not known in the VXLAN device
572 forwarding database. This parameter cannot be specified with the
578 - specifies the source IP address to use in outgoing packets.
582 - specifies the TTL value to use in outgoing packets.
586 - specifies the TOS value to use in outgoing packets.
590 - specifies the usage of the Don't Fragment flag (DF) bit in outgoing packets
591 with IPv4 headers. The value
593 causes the bit to be copied from the original IP header. The values
597 cause the bit to be always unset or always set, respectively. By default, the
601 .BI flowlabel " FLOWLABEL"
602 - specifies the flow label to use in outgoing packets.
606 - specifies the UDP destination port to communicate to the remote
607 VXLAN tunnel endpoint.
610 .BI srcport " MIN MAX"
611 - specifies the range of port numbers to use as UDP
612 source ports to communicate to the remote VXLAN tunnel endpoint.
616 - specifies if unknown source link layer addresses and IP addresses
617 are entered into the VXLAN device forwarding database.
621 - specifies if route short circuit is turned on.
625 - specifies ARP proxy is turned on.
629 - specifies if netlink LLADDR miss notifications are generated.
633 - specifies if netlink IP ADDR miss notifications are generated.
637 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
640 .RB [ no ] udp6zerocsumtx
641 - skip UDP checksum calculation for transmitted packets over IPv6.
644 .RB [ no ] udp6zerocsumrx
645 - allow incoming UDP packets over IPv6 with zero checksum field.
648 .BI ageing " SECONDS"
649 - specifies the lifetime in seconds of FDB entries learnt by the kernel.
652 .BI maxaddress " NUMBER"
653 - specifies the maximum number of FDB entries.
657 - specifies whether an external control plane
658 .RB "(e.g. " "ip route encap" )
659 or the internal FDB should be used.
663 - enables the Group Policy extension (VXLAN-GBP).
666 Allows to transport group policy context across VXLAN network peers.
667 If enabled, includes the mark of a packet in the VXLAN header for outgoing
668 packets and fills the packet mark based on the information found in the
669 VXLAN header for incoming packets.
671 Format of upper 16 bits of packet mark (flags);
674 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
676 |-|-|-|-|-|-|-|-|-|D|-|-|A|-|-|-|
678 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
681 Don't Learn bit. When set, this bit indicates that the egress
682 VTEP MUST NOT learn the source address of the encapsulated frame.
685 Indicates that the group policy has already been applied to
686 this packet. Policies MUST NOT be applied by devices when the A bit is set.
689 Format of lower 16 bits of packet mark (policy ID):
692 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
696 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
700 iptables -A OUTPUT [...] -j MARK --set-mark 0x800FF
706 - enables the Generic Protocol extension (VXLAN-GPE). Currently, this is
707 only supported together with the
714 VETH, VXCAN Type Support
717 the following additional arguments are supported:
719 .BI "ip link add " DEVICE
720 .BR type " { " veth " | " vxcan " }"
730 - specifies the virtual pair device name of the
737 IPIP, SIT Type Support
740 the following additional arguments are supported:
742 .BI "ip link add " DEVICE
743 .BR type " { " ipip " | " sit " }"
744 .BI " remote " ADDR " local " ADDR
746 .BR encap " { " fou " | " gue " | " none " }"
748 .BR encap-sport " { " \fIPORT " | " auto " }"
750 .BI "encap-dport " PORT
752 .RB [ no ] encap-csum
754 .I " [no]encap-remcsum "
756 .I " mode " { ip6ip | ipip | mplsip | any } "
764 - specifies the remote address of the tunnel.
768 - specifies the fixed local address for tunneled packets.
769 It must be an address on another interface on this host.
772 .BR encap " { " fou " | " gue " | " none " }"
773 - specifies type of secondary UDP encapsulation. "fou" indicates
774 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
777 .BR encap-sport " { " \fIPORT " | " auto " }"
778 - specifies the source port in UDP encapsulation.
780 indicates the port by number, "auto"
781 indicates that the port number should be chosen automatically
782 (the kernel picks a flow based on the flow hash of the
783 encapsulated packet).
786 .RB [ no ] encap-csum
787 - specifies if UDP checksums are enabled in the secondary
791 .RB [ no ] encap-remcsum
792 - specifies if Remote Checksum Offload is enabled. This is only
793 applicable for Generic UDP Encapsulation.
796 .BI mode " { ip6ip | ipip | mplsip | any } "
797 - specifies mode in which device should run. "ip6ip" indicates
798 IPv6-Over-IPv4, "ipip" indicates "IPv4-Over-IPv4", "mplsip" indicates
799 MPLS-Over-IPv4, "any" indicates IPv6, IPv4 or MPLS Over IPv4. Supported for
800 SIT where the default is "ip6ip" and IPIP where the default is "ipip".
801 IPv6-Over-IPv4 is not supported for IPIP.
805 - make this tunnel externally controlled
806 .RB "(e.g. " "ip route encap" ).
812 .IR GRE " or " GRETAP
813 the following additional arguments are supported:
815 .BI "ip link add " DEVICE
816 .BR type " { " gre " | " gretap " }"
817 .BI " remote " ADDR " local " ADDR
819 .RB [ no ] "" [ i | o ] seq
826 .RB [ no ] "" [ i | o ] csum
838 .BR encap " { " fou " | " gue " | " none " }"
840 .BR encap-sport " { " \fIPORT " | " auto " }"
842 .BI "encap-dport " PORT
844 .RB [ no ] encap-csum
846 .RB [ no ] encap-remcsum
854 - specifies the remote address of the tunnel.
858 - specifies the fixed local address for tunneled packets.
859 It must be an address on another interface on this host.
862 .RB [ no ] "" [ i | o ] seq
866 flag enables sequencing of outgoing packets.
869 flag requires that all input packets are serialized.
876 - use keyed GRE with key
878 is either a number or an IPv4 address-like dotted quad.
881 parameter specifies the same key to use in both directions.
883 .BR ikey " and " okey
884 parameters specify different keys for input and output.
887 .RB [ no ] "" [ i | o ] csum
888 - generate/require checksums for tunneled packets.
891 flag calculates checksums for outgoing packets.
894 flag requires that all input packets have the correct
897 flag is equivalent to the combination
902 - specifies the TTL value to use in outgoing packets.
906 - specifies the TOS value to use in outgoing packets.
910 - enables/disables Path MTU Discovery on this tunnel.
911 It is enabled by default. Note that a fixed ttl is incompatible
912 with this option: tunneling with a fixed ttl always makes pmtu
917 - enables/disables IPv4 DF suppression on this tunnel.
918 Normally datagrams that exceed the MTU will be fragmented; the presence
919 of the DF flag inhibits this, resulting instead in an ICMP Unreachable
920 (Fragmentation Required) message. Enabling this attribute causes the
921 DF flag to be ignored.
925 - specifies the physical device to use for tunnel endpoint communication.
928 .BR encap " { " fou " | " gue " | " none " }"
929 - specifies type of secondary UDP encapsulation. "fou" indicates
930 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
933 .BR encap-sport " { " \fIPORT " | " auto " }"
934 - specifies the source port in UDP encapsulation.
936 indicates the port by number, "auto"
937 indicates that the port number should be chosen automatically
938 (the kernel picks a flow based on the flow hash of the
939 encapsulated packet).
942 .RB [ no ] encap-csum
943 - specifies if UDP checksums are enabled in the secondary
947 .RB [ no ] encap-remcsum
948 - specifies if Remote Checksum Offload is enabled. This is only
949 applicable for Generic UDP Encapsulation.
953 - make this tunnel externally controlled
954 .RB "(e.g. " "ip route encap" ).
959 IP6GRE/IP6GRETAP Type Support
962 the following additional arguments are supported:
964 .BI "ip link add " DEVICE
965 .BR type " { " ip6gre " | " ip6gretap " }"
966 .BI remote " ADDR " local " ADDR"
968 .RB [ no ] "" [ i | o ] seq
975 .RB [ no ] "" [ i | o ] csum
979 .BI encaplimit " ELIM "
981 .BI tclass " TCLASS "
983 .BI flowlabel " FLOWLABEL "
987 .BI "[no]allow-localremote"
997 - specifies the remote IPv6 address of the tunnel.
1001 - specifies the fixed local IPv6 address for tunneled packets.
1002 It must be an address on another interface on this host.
1005 .RB [ no ] "" [ i | o ] seq
1006 - serialize packets.
1009 flag enables sequencing of outgoing packets.
1012 flag requires that all input packets are serialized.
1018 .BR no [ i | o ] key
1019 - use keyed GRE with key
1021 is either a number or an IPv4 address-like dotted quad.
1024 parameter specifies the same key to use in both directions.
1026 .BR ikey " and " okey
1027 parameters specify different keys for input and output.
1030 .RB [ no ] "" [ i | o ] csum
1031 - generate/require checksums for tunneled packets.
1034 flag calculates checksums for outgoing packets.
1037 flag requires that all input packets have the correct
1040 flag is equivalent to the combination
1045 - specifies Hop Limit value to use in outgoing packets.
1048 .BI encaplimit " ELIM"
1049 - specifies a fixed encapsulation limit. Default is 4.
1052 .BI flowlabel " FLOWLABEL"
1053 - specifies a fixed flowlabel.
1056 .BI [no]allow-localremote
1057 - specifies whether to allow remote endpoint to have an address configured on
1061 .BI tclass " TCLASS"
1062 - specifies the traffic class field on
1063 tunneled packets, which can be specified as either a two-digit
1064 hex value (e.g. c0) or a predefined string (e.g. internet).
1067 causes the field to be copied from the original IP header. The
1069 .BI "inherit/" STRING
1071 .BI "inherit/" 00 ".." ff
1072 will set the field to
1076 when tunneling non-IP packets. The default value is 00.
1080 - make this tunnel externally controlled (or not, which is the default).
1081 In the kernel, this is referred to as collect metadata mode. This flag is
1082 mutually exclusive with the
1090 .BR flowlabel " and " tclass
1099 the following additional arguments are supported:
1101 .BI "ip link add " DEVICE " name " NAME
1102 .BR "type ipoib " [ " pkey \fIPKEY" " ] [ " mode " \fIMODE \fR]"
1107 - specifies the IB P-Key to use.
1110 - specifies the mode (datagram or connected) to use.
1116 the following additional arguments are supported:
1118 .BI "ip link add " DEVICE
1119 .BR type " { " erspan " | " ip6erspan " }"
1120 .BI remote " ADDR " local " ADDR " seq
1123 .BR erspan_ver " \fIversion "
1125 .BR erspan " \fIIDX "
1127 .BR erspan_dir " { " \fIingress " | " \fIegress " }"
1129 .BR erspan_hwid " \fIhwid "
1131 .BI "[no]allow-localremote"
1139 - specifies the remote address of the tunnel.
1143 - specifies the fixed local address for tunneled packets.
1144 It must be an address on another interface on this host.
1147 .BR erspan_ver " \fIversion "
1148 - specifies the ERSPAN version number.
1150 indicates the ERSPAN version to be created: 1 for version 1 (type II)
1151 or 2 for version 2 (type III).
1154 .BR erspan " \fIIDX "
1155 - specifies the ERSPAN v1 index field.
1157 indicates a 20 bit index/port number associated with the ERSPAN
1158 traffic's source port and direction.
1161 .BR erspan_dir " { " \fIingress " | " \fIegress " }"
1162 - specifies the ERSPAN v2 mirrored traffic's direction.
1165 .BR erspan_hwid " \fIhwid "
1166 - an unique identifier of an ERSPAN v2 engine within a system.
1168 is a 6-bit value for users to configure.
1171 .BI [no]allow-localremote
1172 - specifies whether to allow remote endpoint to have an address configured on
1177 - make this tunnel externally controlled (or not, which is the default).
1178 In the kernel, this is referred to as collect metadata mode. This flag is
1179 mutually exclusive with the
1184 .BR erspan_dir " and " erspan_hwid
1193 the following additional arguments are supported:
1195 .BI "ip link add " DEVICE
1196 .BI type " geneve " id " VNI " remote " IPADDR"
1204 .BI flowlabel " FLOWLABEL "
1212 .RB [ no ] udp6zerocsumtx
1214 .RB [ no ] udp6zerocsumrx
1220 - specifies the Virtual Network Identifer to use.
1223 .BI remote " IPADDR"
1224 - specifies the unicast destination IP address to use in outgoing packets.
1228 - specifies the TTL value to use in outgoing packets. "0" or "auto" means
1229 use whatever default value, "inherit" means inherit the inner protocol's
1230 ttl. Default option is "0".
1234 - specifies the TOS value to use in outgoing packets.
1238 - specifies the usage of the Don't Fragment flag (DF) bit in outgoing packets
1239 with IPv4 headers. The value
1241 causes the bit to be copied from the original IP header. The values
1245 cause the bit to be always unset or always set, respectively. By default, the
1249 .BI flowlabel " FLOWLABEL"
1250 - specifies the flow label to use in outgoing packets.
1254 - select a destination port other than the default of 6081.
1258 - make this tunnel externally controlled (or not, which is the default). This
1259 flag is mutually exclusive with the
1263 .BR tos " and " flowlabel
1268 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
1271 .RB [ no ] udp6zerocsumtx
1272 - skip UDP checksum calculation for transmitted packets over IPv6.
1275 .RB [ no ] udp6zerocsumrx
1276 - allow incoming UDP packets over IPv6 with zero checksum field.
1281 MACVLAN and MACVTAP Type Support
1286 the following additional arguments are supported:
1288 .BI "ip link add link " DEVICE " name " NAME
1289 .BR type " { " macvlan " | " macvtap " } "
1290 .BR mode " { " private " | " vepa " | " bridge " | " passthru
1291 .RB " [ " nopromisc " ] | " source " } "
1295 .BR type " { " macvlan " | " macvtap " } "
1296 - specifies the link type to use.
1297 .BR macvlan " creates just a virtual interface, while "
1298 .BR macvtap " in addition creates a character device "
1299 .BR /dev/tapX " to be used just like a " tuntap " device."
1302 - Do not allow communication between
1304 instances on the same physical interface, even if the external switch supports
1308 - Virtual Ethernet Port Aggregator mode. Data from one
1310 instance to the other on the same physical interface is transmitted over the
1311 physical interface. Either the attached switch needs to support hairpin mode,
1312 or there must be a TCP/IP router forwarding the packets in order to allow
1313 communication. This is the default mode.
1316 - In bridge mode, all endpoints are directly connected to each other,
1317 communication is not redirected through the physical interface's peer.
1319 .BR mode " " passthru " [ " nopromisc " ] "
1320 - This mode gives more power to a single endpoint, usually in
1321 .BR macvtap " mode. It is not allowed for more than one endpoint on the same "
1322 physical interface. All traffic will be forwarded to this endpoint, allowing
1323 virtio guests to change MAC address or set promiscuous mode in order to bridge
1324 the interface or create vlan interfaces on top of it. By default, this mode
1325 forces the underlying interface into promiscuous mode. Passing the
1326 .BR nopromisc " flag prevents this, so the promisc flag may be controlled "
1327 using standard tools.
1330 - allows one to set a list of allowed mac address, which is used to match
1331 against source mac address from received frames on underlying interface. This
1332 allows creating mac based VLAN associations, instead of standard port or tag
1333 based. The feature is useful to deploy 802.1x mac based behavior,
1334 where drivers of underlying interfaces doesn't allows that.
1338 High-availability Seamless Redundancy (HSR) Support
1341 the following additional arguments are supported:
1343 .BI "ip link add link " DEVICE " name " NAME " type hsr"
1344 .BI slave1 " SLAVE1-IF " slave2 " SLAVE2-IF "
1345 .RB [ " supervision"
1346 .IR ADDR-BYTE " ] ["
1347 .BR version " { " 0 " | " 1 " } ]"
1352 - specifies the link type to use, here HSR.
1354 .BI slave1 " SLAVE1-IF "
1355 - Specifies the physical device used for the first of the two ring ports.
1357 .BI slave2 " SLAVE2-IF "
1358 - Specifies the physical device used for the second of the two ring ports.
1360 .BI supervision " ADDR-BYTE"
1361 - The last byte of the multicast address used for HSR supervision frames.
1362 Default option is "0", possible values 0-255.
1364 .BR version " { " 0 " | " 1 " }"
1365 - Selects the protocol version of the interface. Default option is "0", which
1366 corresponds to the 2010 version of the HSR standard. Option "1" activates the
1374 the following additional arguments are supported:
1376 .BI "ip link add " DEVICE " type bridge "
1378 .BI ageing_time " AGEING_TIME "
1380 .BI group_fwd_mask " MASK "
1382 .BI group_address " ADDRESS "
1384 .BI forward_delay " FORWARD_DELAY "
1386 .BI hello_time " HELLO_TIME "
1388 .BI max_age " MAX_AGE "
1390 .BI stp_state " STP_STATE "
1392 .BI priority " PRIORITY "
1394 .BI vlan_filtering " VLAN_FILTERING "
1396 .BI vlan_protocol " VLAN_PROTOCOL "
1398 .BI vlan_default_pvid " VLAN_DEFAULT_PVID "
1400 .BI vlan_stats_enabled " VLAN_STATS_ENABLED "
1402 .BI vlan_stats_per_port " VLAN_STATS_PER_PORT "
1404 .BI mcast_snooping " MULTICAST_SNOOPING "
1406 .BI mcast_router " MULTICAST_ROUTER "
1408 .BI mcast_query_use_ifaddr " MCAST_QUERY_USE_IFADDR "
1410 .BI mcast_querier " MULTICAST_QUERIER "
1412 .BI mcast_hash_elasticity " HASH_ELASTICITY "
1414 .BI mcast_hash_max " HASH_MAX "
1416 .BI mcast_last_member_count " LAST_MEMBER_COUNT "
1418 .BI mcast_startup_query_count " STARTUP_QUERY_COUNT "
1420 .BI mcast_last_member_interval " LAST_MEMBER_INTERVAL "
1422 .BI mcast_membership_interval " MEMBERSHIP_INTERVAL "
1424 .BI mcast_querier_interval " QUERIER_INTERVAL "
1426 .BI mcast_query_interval " QUERY_INTERVAL "
1428 .BI mcast_query_response_interval " QUERY_RESPONSE_INTERVAL "
1430 .BI mcast_startup_query_interval " STARTUP_QUERY_INTERVAL "
1432 .BI mcast_stats_enabled " MCAST_STATS_ENABLED "
1434 .BI mcast_igmp_version " IGMP_VERSION "
1436 .BI mcast_mld_version " MLD_VERSION "
1438 .BI nf_call_iptables " NF_CALL_IPTABLES "
1440 .BI nf_call_ip6tables " NF_CALL_IP6TABLES "
1442 .BI nf_call_arptables " NF_CALL_ARPTABLES "
1447 .BI ageing_time " AGEING_TIME "
1448 - configure the bridge's FDB entries ageing time, ie the number of
1449 seconds a MAC address will be kept in the FDB after a packet has been
1450 received from that address. after this time has passed, entries are
1453 .BI group_fwd_mask " MASK "
1454 - set the group forward mask. This is the bitmask that is applied to
1455 decide whether to forward incoming frames destined to link-local
1456 addresses, ie addresses of the form 01:80:C2:00:00:0X (defaults to 0,
1457 ie the bridge does not forward any link-local frames).
1459 .BI group_address " ADDRESS "
1460 - set the MAC address of the multicast group this bridge uses for STP.
1461 The address must be a link-local address in standard Ethernet MAC
1462 address format, ie an address of the form 01:80:C2:00:00:0X, with X
1465 .BI forward_delay " FORWARD_DELAY "
1466 - set the forwarding delay in seconds, ie the time spent in LISTENING
1467 state (before moving to LEARNING) and in LEARNING state (before
1468 moving to FORWARDING). Only relevant if STP is enabled. Valid values
1469 are between 2 and 30.
1471 .BI hello_time " HELLO_TIME "
1472 - set the time in seconds between hello packets sent by the bridge,
1473 when it is a root bridge or a designated bridges.
1474 Only relevant if STP is enabled. Valid values are between 1 and 10.
1476 .BI max_age " MAX_AGE "
1477 - set the hello packet timeout, ie the time in seconds until another
1478 bridge in the spanning tree is assumed to be dead, after reception of
1479 its last hello message. Only relevant if STP is enabled. Valid values
1480 are between 6 and 40.
1482 .BI stp_state " STP_STATE "
1483 - turn spanning tree protocol on
1484 .RI ( STP_STATE " > 0) "
1486 .RI ( STP_STATE " == 0). "
1489 .BI priority " PRIORITY "
1490 - set this bridge's spanning tree priority, used during STP root
1493 is a 16bit unsigned integer.
1495 .BI vlan_filtering " VLAN_FILTERING "
1496 - turn VLAN filtering on
1497 .RI ( VLAN_FILTERING " > 0) "
1499 .RI ( VLAN_FILTERING " == 0). "
1500 When disabled, the bridge will not consider the VLAN tag when handling packets.
1502 .BR vlan_protocol " { " 802.1Q " | " 802.1ad " } "
1503 - set the protocol used for VLAN filtering.
1505 .BI vlan_default_pvid " VLAN_DEFAULT_PVID "
1506 - set the default PVID (native/untagged VLAN ID) for this bridge.
1508 .BI vlan_stats_enabled " VLAN_STATS_ENABLED "
1510 .RI ( VLAN_STATS_ENABLED " == 1) "
1512 .RI ( VLAN_STATS_ENABLED " == 0) "
1513 per-VLAN stats accounting.
1515 .BI vlan_stats_per_port " VLAN_STATS_PER_PORT "
1517 .RI ( VLAN_STATS_PER_PORT " == 1) "
1519 .RI ( VLAN_STATS_PER_PORT " == 0) "
1520 per-VLAN per-port stats accounting. Can be changed only when there are no port VLANs configured.
1522 .BI mcast_snooping " MULTICAST_SNOOPING "
1523 - turn multicast snooping on
1524 .RI ( MULTICAST_SNOOPING " > 0) "
1526 .RI ( MULTICAST_SNOOPING " == 0). "
1528 .BI mcast_router " MULTICAST_ROUTER "
1529 - set bridge's multicast router if IGMP snooping is enabled.
1531 is an integer value having the following meaning:
1538 - automatic (queried).
1541 - permanently enabled.
1544 .BI mcast_query_use_ifaddr " MCAST_QUERY_USE_IFADDR "
1545 - whether to use the bridge's own IP address as source address for IGMP queries
1546 .RI ( MCAST_QUERY_USE_IFADDR " > 0) "
1547 or the default of 0.0.0.0
1548 .RI ( MCAST_QUERY_USE_IFADDR " == 0). "
1550 .BI mcast_querier " MULTICAST_QUERIER "
1552 .RI ( MULTICAST_QUERIER " > 0) "
1554 .RI ( MULTICAST_QUERIER " == 0) "
1555 IGMP querier, ie sending of multicast queries by the bridge (default: disabled).
1557 .BI mcast_querier_interval " QUERIER_INTERVAL "
1558 - interval between queries sent by other routers. if no queries are seen
1559 after this delay has passed, the bridge will start to send its own queries
1564 .BI mcast_hash_elasticity " HASH_ELASTICITY "
1565 - set multicast database hash elasticity, ie the maximum chain length
1566 in the multicast hash table (defaults to 4).
1568 .BI mcast_hash_max " HASH_MAX "
1569 - set maximum size of multicast hash table (defaults to 512,
1570 value must be a power of 2).
1572 .BI mcast_last_member_count " LAST_MEMBER_COUNT "
1573 - set multicast last member count, ie the number of queries the bridge
1574 will send before stopping forwarding a multicast group after a "leave"
1575 message has been received (defaults to 2).
1577 .BI mcast_last_member_interval " LAST_MEMBER_INTERVAL "
1578 - interval between queries to find remaining members of a group,
1579 after a "leave" message is received.
1581 .BI mcast_startup_query_count " STARTUP_QUERY_COUNT "
1582 - set the number of IGMP queries to send during startup phase (defaults to 2).
1584 .BI mcast_startup_query_interval " STARTUP_QUERY_INTERVAL "
1585 - interval between queries in the startup phase.
1587 .BI mcast_query_interval " QUERY_INTERVAL "
1588 - interval between queries sent by the bridge after the end of the
1591 .BI mcast_query_response_interval " QUERY_RESPONSE_INTERVAL "
1592 - set the Max Response Time/Maximum Response Delay for IGMP/MLD
1593 queries sent by the bridge.
1595 .BI mcast_membership_interval " MEMBERSHIP_INTERVAL "
1596 - delay after which the bridge will leave a group,
1597 if no membership reports for this group are received.
1599 .BI mcast_stats_enabled " MCAST_STATS_ENABLED "
1601 .RI ( MCAST_STATS_ENABLED " > 0) "
1603 .RI ( MCAST_STATS_ENABLED " == 0) "
1604 multicast (IGMP/MLD) stats accounting.
1606 .BI mcast_igmp_version " IGMP_VERSION "
1607 - set the IGMP version.
1609 .BI mcast_mld_version " MLD_VERSION "
1610 - set the MLD version.
1612 .BI nf_call_iptables " NF_CALL_IPTABLES "
1614 .RI ( NF_CALL_IPTABLES " > 0) "
1616 .RI ( NF_CALL_IPTABLES " == 0) "
1617 iptables hooks on the bridge.
1619 .BI nf_call_ip6tables " NF_CALL_IP6TABLES "
1621 .RI ( NF_CALL_IP6TABLES " > 0) "
1623 .RI ( NF_CALL_IP6TABLES " == 0) "
1624 ip6tables hooks on the bridge.
1626 .BI nf_call_arptables " NF_CALL_ARPTABLES "
1628 .RI ( NF_CALL_ARPTABLES " > 0) "
1630 .RI ( NF_CALL_ARPTABLES " == 0) "
1631 arptables hooks on the bridge.
1640 the following additional arguments are supported:
1642 .BI "ip link add link " DEVICE " name " NAME " type macsec"
1644 .BI address " <lladdr>"
1650 .BI cipher " CIPHER_SUITE"
1655 .BR on " | " off " } ] [ "
1656 .BR send_sci " { " on " | " off " } ] ["
1657 .BR end_station " { " on " | " off " } ] ["
1658 .BR scb " { " on " | " off " } ] ["
1659 .BR protect " { " on " | " off " } ] ["
1660 .BR replay " { " on " | " off " }"
1662 .IR 0..2^32-1 " } ] ["
1663 .BR validate " { " strict " | " check " | " disabled " } ] ["
1664 .BR encodingsa " { "
1669 .BI address " <lladdr> "
1670 - sets the system identifier component of secure channel for this MACsec device.
1674 - sets the port number component of secure channel for this MACsec
1675 device, in a range from 1 to 65535 inclusive. Numbers with a leading "
1676 0 " or " 0x " are interpreted as octal and hexadecimal, respectively.
1680 - sets the secure channel identifier for this MACsec device.
1682 is a 64bit wide number in hexadecimal format.
1685 .BI cipher " CIPHER_SUITE "
1686 - defines the cipher suite to use.
1689 .BI icvlen " LENGTH "
1690 - sets the length of the Integrity Check Value (ICV).
1693 .BR "encrypt on " or " encrypt off"
1694 - switches between authenticated encryption, or authenticity mode only.
1697 .BR "send_sci on " or " send_sci off"
1698 - specifies whether the SCI is included in every packet,
1699 or only when it is necessary.
1702 .BR "end_station on " or " end_station off"
1703 - sets the End Station bit.
1706 .BR "scb on " or " scb off"
1707 - sets the Single Copy Broadcast bit.
1710 .BR "protect on " or " protect off"
1711 - enables MACsec protection on the device.
1714 .BR "replay on " or " replay off"
1715 - enables replay protection on the device.
1721 - sets the size of the replay window.
1726 .BR "validate strict " or " validate check " or " validate disabled"
1727 - sets the validation mode on the device.
1730 .BI encodingsa " AN "
1731 - sets the active secure association for transmission.
1739 the following additional arguments are supported:
1741 .BI "ip link add " DEVICE " type vrf table " TABLE
1745 .BR table " table id associated with VRF device"
1753 the following additional arguments are supported:
1755 .BI "ip link add link " DEVICE " name " NAME " type rmnet mux_id " MUXID
1759 .BI mux_id " MUXID "
1760 - specifies the mux identifier for the rmnet device, possible values 1-254.
1768 the following additional arguments are supported:
1770 .BI "ip link add " DEVICE " type xfrm dev " PHYS_DEV " [ if_id " IF_ID " ]"
1774 .BI dev " PHYS_DEV "
1775 - specifies the underlying physical interface from which transform traffic is sent and received.
1779 - specifies the hexadecimal lookup key used to send traffic to and from specific xfrm
1780 policies. Policies must be configured with the same key. If not set, the key defaults to
1781 0 and will match any policies which similarly do not have a lookup key configuration.
1785 .SS ip link delete - delete virtual link
1789 specifies the virtual device to act operate on.
1793 specifies the group of virtual links to delete. Group 0 is not allowed to be
1794 deleted since it is the default group.
1798 specifies the type of the device.
1800 .SS ip link set - change device attributes
1804 If multiple parameter changes are requested,
1806 aborts immediately after any of the changes have failed.
1807 This is the only case when
1809 can move the system to an unpredictable state. The solution
1810 is to avoid changing several parameters with one
1817 specifies network device to operate on. When configuring SR-IOV
1818 Virtual Function (VF) devices, this keyword should specify the
1819 associated Physical Function (PF) device.
1824 has a dual role: If both group and dev are present, then move the device to the
1825 specified group. If only a group is specified, then the command operates on
1826 all devices in that group.
1830 change the state of the device to
1836 .BR "arp on " or " arp off"
1842 .BR "multicast on " or " multicast off"
1848 .BR "protodown on " or " protodown off"
1851 state on the device. Indicates that a protocol error has been detected
1852 on the port. Switch drivers can react to this error by doing a phys
1853 down on the switch port.
1856 .BR "dynamic on " or " dynamic off"
1859 flag on the device. Indicates that address can change when interface
1860 goes down (currently
1866 change the name of the device. This operation is not
1867 recommended if the device is running or has some addresses
1871 .BI txqueuelen " NUMBER"
1873 .BI txqlen " NUMBER"
1874 change the transmit queue length of the device.
1883 .BI address " LLADDRESS"
1884 change the station address of the interface.
1887 .BI broadcast " LLADDRESS"
1889 .BI brd " LLADDRESS"
1891 .BI peer " LLADDRESS"
1892 change the link layer broadcast address or the peer address when
1897 .BI netns " NETNSNAME " \fR| " PID"
1898 move the device to the network namespace associated with name
1902 Some devices are not allowed to change network namespace: loopback, bridge,
1903 ppp, wireless. These are network namespace local devices. In such case
1905 tool will return "Invalid argument" error. It is possible to find out
1906 if device is local to a single network namespace by checking
1908 flag in the output of the
1916 To change network namespace for wireless devices the
1918 tool can be used. But it allows to change network namespace only for
1919 physical devices and by process
1924 give the device a symbolic name for easy reference.
1928 specify the group the device belongs to.
1929 The available groups are listed in file
1930 .BR "@SYSCONFDIR@/group" .
1934 specify a Virtual Function device to be configured. The associated PF device
1935 must be specified using the
1940 .BI mac " LLADDRESS"
1941 - change the station address for the specified VF. The
1943 parameter must be specified.
1947 - change the assigned VLAN for the specified VF. When specified, all traffic
1948 sent from the VF will be tagged with the specified VLAN ID. Incoming traffic
1949 will be filtered for the specified VLAN ID, and will have all VLAN tags
1950 stripped before being passed to the VF. Setting this parameter to 0 disables
1951 VLAN tagging and filtering. The
1953 parameter must be specified.
1957 - assign VLAN QOS (priority) bits for the VLAN tag. When specified, all VLAN
1958 tags transmitted by the VF will include the specified priority bits in the
1959 VLAN tag. If not specified, the value is assumed to be 0. Both the
1963 parameters must be specified. Setting both
1967 as 0 disables VLAN tagging and filtering for the VF.
1970 .BI proto " VLAN-PROTO"
1971 - assign VLAN PROTOCOL for the VLAN tag, either 802.1Q or 802.1ad.
1972 Setting to 802.1ad, all traffic sent from the VF will be tagged with
1973 VLAN S-Tag. Incoming traffic will have VLAN S-Tags stripped before
1974 being passed to the VF. Setting to 802.1ad also enables an option to
1975 concatenate another VLAN tag, so both S-TAG and C-TAG will be
1976 inserted/stripped for outgoing/incoming traffic, respectively. If not
1977 specified, the value is assumed to be 802.1Q. Both the
1981 parameters must be specified.
1985 -- change the allowed transmit bandwidth, in Mbps, for the specified VF.
1986 Setting this parameter to 0 disables rate limiting.
1988 parameter must be specified.
1994 .BI max_tx_rate " TXRATE"
1995 - change the allowed maximum transmit bandwidth, in Mbps, for the
1996 specified VF. Setting this parameter to 0 disables rate limiting.
1998 parameter must be specified.
2001 .BI min_tx_rate " TXRATE"
2002 - change the allowed minimum transmit bandwidth, in Mbps, for the specified VF.
2003 Minimum TXRATE should be always <= Maximum TXRATE.
2004 Setting this parameter to 0 disables rate limiting.
2006 parameter must be specified.
2009 .BI spoofchk " on|off"
2010 - turn packet spoof checking on or off for the specified VF.
2012 .BI query_rss " on|off"
2013 - toggle the ability of querying the RSS configuration of a specific
2014 VF. VF RSS information like RSS hash key may be considered sensitive
2015 on some devices where this information is shared between VF and PF
2016 and thus its querying may be prohibited by default.
2018 .BI state " auto|enable|disable"
2019 - set the virtual link state as seen by the specified VF. Setting to
2020 auto means a reflection of the PF link state, enable lets the VF to
2021 communicate with other VFs on this host even if the PF link state is
2022 down, disable causes the HW to drop any packets sent by the VF.
2025 - trust the specified VF user. This enables that VF user can set a
2026 specific feature which may impact security and/or
2027 performance. (e.g. VF multicast promiscuous mode)
2029 .BI node_guid " eui64"
2030 - configure node GUID for Infiniband VFs.
2032 .BI port_guid " eui64"
2033 - configure port GUID for Infiniband VFs.
2037 .B xdp object "|" pinned "|" off
2038 set (or unset) a XDP ("eXpress Data Path") BPF program to run on every
2039 packet at driver level.
2041 output will indicate a
2043 flag for the networking device. If the driver does not have native XDP
2044 support, the kernel will fall back to a slower, driver-independent "generic"
2047 output will in that case indicate
2051 only. If the driver does have native XDP support, but the program is
2053 .B xdpgeneric object "|" pinned
2054 then the kernel will use the generic XDP variant instead of the native one.
2056 has the opposite effect of requestsing that the automatic fallback to the
2057 generic XDP variant be disabled and in case driver is not XDP-capable error
2060 also disables hardware offloads.
2062 in ip link output indicates that the program has been offloaded to hardware
2063 and can also be used to request the "offload" mode, much like
2065 it forces program to be installed specifically in HW/FW of the apater.
2071 - Detaches any currently attached XDP/BPF program from the given device.
2074 - Attaches a XDP/BPF program to the given device. The
2076 points to a BPF ELF file (f.e. generated by LLVM) that contains the BPF
2077 program code, map specifications, etc. If a XDP/BPF program is already
2078 attached to the given device, an error will be thrown. If no XDP/BPF
2079 program is currently attached, the device supports XDP and the program
2080 from the BPF ELF file passes the kernel verifier, then it will be attached
2081 to the device. If the option
2085 then any prior attached XDP/BPF program will be atomically overridden and
2086 no error will be thrown in this case. If no
2088 option is passed, then the default section name ("prog") will be assumed,
2089 otherwise the provided section name will be used. If no
2091 option is passed, then a verifier log will only be dumped on load error.
2094 section for usage examples.
2096 .BI section " NAME "
2097 - Specifies a section name that contains the BPF program code. If no section
2098 name is specified, the default one ("prog") will be used. This option is
2099 to be passed with the
2104 - Act in verbose mode. For example, even in case of success, this will
2105 print the verifier log in case a program was loaded from a BPF ELF file.
2108 - Attaches a XDP/BPF program to the given device. The
2110 points to an already pinned BPF program in the BPF file system. The option
2112 doesn't apply here, but otherwise semantics are the same as with the option
2117 .BI master " DEVICE"
2118 set master device of the device (enslave device).
2122 unset master device of the device (release device).
2125 .BI addrgenmode " eui64|none|stable_secret|random"
2126 set the IPv6 address generation mode
2129 - use a Modified EUI-64 format interface identifier
2132 - disable automatic address generation
2135 - generate the interface identifier based on a preset
2136 /proc/sys/net/ipv6/conf/{default,DEVICE}/stable_secret
2139 - like stable_secret, but auto-generate a new random secret if none is set
2143 set peer netnsid for a cross-netns interface
2146 .BI type " ETYPE TYPE_ARGS"
2147 Change type-specific settings. For a list of supported types and arguments refer
2148 to the description of
2150 above. In addition to that, it is possible to manipulate settings to slave
2154 Bridge Slave Support
2155 For a link with master
2157 the following additional arguments are supported:
2159 .B "ip link set type bridge_slave"
2165 .BI priority " PRIO"
2169 .BR guard " { " on " | " off " }"
2171 .BR hairpin " { " on " | " off " }"
2173 .BR fastleave " { " on " | " off " }"
2175 .BR root_block " { " on " | " off " }"
2177 .BR learning " { " on " | " off " }"
2179 .BR flood " { " on " | " off " }"
2181 .BR proxy_arp " { " on " | " off " }"
2183 .BR proxy_arp_wifi " { " on " | " off " }"
2185 .BI mcast_router " MULTICAST_ROUTER"
2187 .BR mcast_fast_leave " { " on " | " off "}"
2189 .BR mcast_flood " { " on " | " off " }"
2191 .BR mcast_to_unicast " { " on " | " off " }"
2193 .BR group_fwd_mask " MASK"
2195 .BR neigh_suppress " { " on " | " off " }"
2197 .BR vlan_tunnel " { " on " | " off " }"
2199 .BR isolated " { " on " | " off " }"
2201 .BR backup_port " DEVICE"
2203 .BR nobackup_port " ]"
2208 - flush bridge slave's fdb dynamic entries.
2213 is a number representing the following states:
2214 .BR 0 " (disabled),"
2215 .BR 1 " (listening),"
2216 .BR 2 " (learning),"
2217 .BR 3 " (forwarding),"
2218 .BR 4 " (blocking)."
2220 .BI priority " PRIO"
2221 - set port priority (allowed values are between 0 and 63, inclusively).
2224 - set port cost (allowed values are between 1 and 65535, inclusively).
2226 .BR guard " { " on " | " off " }"
2227 - block incoming BPDU packets on this port.
2229 .BR hairpin " { " on " | " off " }"
2230 - enable hairpin mode on this port. This will allow incoming packets on this
2231 port to be reflected back.
2233 .BR fastleave " { " on " | " off " }"
2234 - enable multicast fast leave on this port.
2236 .BR root_block " { " on " | " off " }"
2237 - block this port from becoming the bridge's root port.
2239 .BR learning " { " on " | " off " }"
2240 - allow MAC address learning on this port.
2242 .BR flood " { " on " | " off " }"
2243 - open the flood gates on this port, i.e. forward all unicast frames to this
2245 .BR proxy_arp " and " proxy_arp_wifi
2248 .BR proxy_arp " { " on " | " off " }"
2249 - enable proxy ARP on this port.
2251 .BR proxy_arp_wifi " { " on " | " off " }"
2252 - enable proxy ARP on this port which meets extended requirements by IEEE
2253 802.11 and Hotspot 2.0 specifications.
2255 .BI mcast_router " MULTICAST_ROUTER"
2256 - configure this port for having multicast routers attached. A port with a
2257 multicast router will receive all multicast traffic.
2261 to disable multicast routers on this port,
2263 to let the system detect the presence of of routers (this is the default),
2265 to permanently enable multicast traffic forwarding on this port or
2267 to enable multicast routers temporarily on this port, not depending on incoming
2270 .BR mcast_fast_leave " { " on " | " off " }"
2271 - this is a synonym to the
2275 .BR mcast_flood " { " on " | " off " }"
2276 - controls whether a given port will flood multicast traffic for which
2277 there is no MDB entry.
2279 .BR mcast_to_unicast " { " on " | " off " }"
2280 - controls whether a given port will replicate packets using unicast
2281 instead of multicast. By default this flag is off.
2283 .BI group_fwd_mask " MASK "
2284 - set the group forward mask. This is the bitmask that is applied to
2285 decide whether to forward incoming frames destined to link-local
2286 addresses, ie addresses of the form 01:80:C2:00:00:0X (defaults to
2287 0, ie the bridge does not forward any link-local frames coming on
2290 .BR neigh_suppress " { " on " | " off " }"
2291 - controls whether neigh discovery (arp and nd) proxy and suppression
2292 is enabled on the port. By default this flag is off.
2294 .BR vlan_tunnel " { " on " | " off " }"
2295 - controls whether vlan to tunnel mapping is enabled on the port. By
2296 default this flag is off.
2298 .BI backup_port " DEVICE"
2299 - if the port loses carrier all traffic will be redirected to the
2300 configured backup port
2303 - removes the currently configured backup port
2308 Bonding Slave Support
2309 For a link with master
2311 the following additional arguments are supported:
2313 .B "ip link set type bond_slave"
2321 - set the slave's queue ID (a 16bit unsigned value).
2326 MACVLAN and MACVTAP Support
2327 Modify list of allowed macaddr for link in source mode.
2329 .B "ip link set type { macvlan | macvap } "
2331 .BI macaddr " " "" COMMAND " " MACADDR " ..."
2337 - add MACADDR to allowed list
2340 - replace allowed list
2343 - remove MACADDR from allowed list
2346 - flush whole allowed list
2351 .SS ip link show - display device attributes
2354 .BI dev " NAME " (default)
2356 specifies the network device to show.
2357 If this argument is omitted all devices in the default group are listed.
2362 specifies what group of devices to show.
2366 only display running interfaces.
2369 .BI master " DEVICE "
2371 specifies the master device which enslaves devices to show.
2376 speficies the VRF which enslaves devices to show.
2381 specifies the type of devices to show.
2383 Note that the type name is not checked against the list of supported types -
2384 instead it is sent as-is to the kernel. Later it is used to filter the returned
2385 interface list by comparing it with the relevant attribute in case the kernel
2386 didn't filter already. Therefore any string is accepted, but may lead to empty
2389 .SS ip link xstats - display extended statistics
2394 specifies the type of devices to display extended statistics for.
2396 .SS ip link afstats - display address-family specific statistics
2401 specifies the device to display address-family statistics for.
2403 .SS ip link help - display help
2407 specifies which help of link type to dislpay.
2411 may be a number or a string from the file
2412 .B @SYSCONFDIR@/group
2413 which can be manually filled.
2419 Shows the state of all network interfaces on the system.
2422 ip link show type bridge
2424 Shows the bridge devices.
2427 ip link show type vlan
2429 Shows the vlan devices.
2432 ip link show master br0
2434 Shows devices enslaved by br0
2437 ip link set dev ppp0 mtu 1400
2439 Change the MTU the ppp0 device.
2442 ip link add link eth0 name eth0.10 type vlan id 10
2444 Creates a new vlan device eth0.10 on device eth0.
2447 ip link delete dev eth0.10
2449 Removes vlan device.
2454 Display help for the gre link type.
2457 ip link add name tun1 type ipip remote 192.168.1.1
2458 local 192.168.1.2 ttl 225 encap gue encap-sport auto
2459 encap-dport 5555 encap-csum encap-remcsum
2461 Creates an IPIP that is encapsulated with Generic UDP Encapsulation,
2462 and the outer UDP checksum and remote checksum offload are enabled.
2465 ip link set dev eth0 xdp obj prog.o
2467 Attaches a XDP/BPF program to device eth0, where the program is
2468 located in prog.o, section "prog" (default section). In case a
2469 XDP/BPF program is already attached, throw an error.
2472 ip -force link set dev eth0 xdp obj prog.o sec foo
2474 Attaches a XDP/BPF program to device eth0, where the program is
2475 located in prog.o, section "foo". In case a XDP/BPF program is
2476 already attached, it will be overridden by the new one.
2479 ip -force link set dev eth0 xdp pinned /sys/fs/bpf/foo
2481 Attaches a XDP/BPF program to device eth0, where the program was
2482 previously pinned as an object node into BPF file system under
2486 ip link set dev eth0 xdp off
2488 If a XDP/BPF program is attached on device eth0, detach it and
2489 effectively turn off XDP for device eth0.
2492 ip link add link wpan0 lowpan0 type lowpan
2494 Creates a 6LoWPAN interface named lowpan0 on the underlying
2495 IEEE 802.15.4 device wpan0.
2498 ip link add dev ip6erspan11 type ip6erspan seq key 102
2499 local fc00:100::2 remote fc00:100::1
2500 erspan_ver 2 erspan_dir ingress erspan_hwid 17
2502 Creates a IP6ERSPAN version 2 interface named ip6erspan00.
2513 Original Manpage by Michail Litvak <mci@owl.openwall.com>