1 .TH IP\-LINK 8 "13 Dec 2012" "iproute2" "Linux"
3 ip-link \- network device configuration
10 .RI " { " COMMAND " | "
48 .BR "ip link delete " {
61 .RB "[ { " up " | " down " } ]"
64 .IR "ETYPE TYPE_ARGS" " ]"
66 .RB "[ " arp " { " on " | " off " } ]"
68 .RB "[ " dynamic " { " on " | " off " } ]"
70 .RB "[ " multicast " { " on " | " off " } ]"
72 .RB "[ " allmulticast " { " on " | " off " } ]"
74 .RB "[ " promisc " { " on " | " off " } ]"
76 .RB "[ " protodown " { " on " | " off " } ]"
78 .RB "[ " trailers " { " on " | " off " } ]"
96 .IR PID " | " NETNSNAME " } ]"
110 .RI "[ " VFVLAN-LIST " ]"
121 .RB "[ " spoofchk " { " on " | " off " } ]"
123 .RB "[ " query_rss " { " on " | " off " } ]"
125 .RB "[ " state " { " auto " | " enable " | " disable " } ]"
127 .RB "[ " trust " { " on " | " off " } ]"
129 .RB "[ " node_guid " eui64 ]"
131 .RB "[ " port_guid " eui64 ] ]"
134 .RB "[ { " xdp " | " xdpgeneric " | " xdpdrv " | " xdpoffload " } { " off " | "
141 .RB "[ " verbose " ] |"
150 .RB "[ " nomaster " ]"
155 .RB "[ " addrgenmode " { " eui64 " | " none " | " stable_secret " | " random " } ]"
157 .RB "[ " macaddr " { " flush " | { " add " | " del " } "
158 .IR MACADDR " | set [ "
160 .IR MACADDR " [ ... ] ] ] } ]"
165 .RI "[ " DEVICE " | "
227 .IR ETYPE " := [ " TYPE " |"
228 .BR bridge_slave " | " bond_slave " ]"
231 .IR VFVLAN-LIST " := [ " VFVLAN-LIST " ] " VFVLAN
240 .IR VLAN-PROTO " ] ]"
243 .SS ip link add - add virtual link
247 specifies the physical device to act operate on.
250 specifies the name of the new virtual device.
253 specifies the type of the new device.
259 - Ethernet Bridge device
265 - Dummy network interface
268 - High-availability Seamless Redundancy device
271 - Intermediate Functional Block device
274 - IP over Infiniband device
277 - Virtual interface base on link layer address (MAC)
280 - Virtual interface based on link layer address (MAC) and TAP.
283 - Virtual Controller Area Network interface
286 - Virtual Controller Area Network tunnel interface
289 - Virtual ethernet interface
292 - 802.1q tagged virtual LAN interface
295 - Virtual eXtended LAN
298 - Virtual tunnel interface IPv4|IPv6 over IPv6
301 - Virtual tunnel interface IPv4 over IPv4
304 - Virtual tunnel interface IPv6 over IPv4
307 - Virtual tunnel interface GRE over IPv4
310 - Virtual L2 tunnel interface GRE over IPv4
313 - Encapsulated Remote SPAN over GRE and IPv4
316 - Virtual tunnel interface GRE over IPv6
319 - Virtual L2 tunnel interface GRE over IPv6
322 - Encapsulated Remote SPAN over GRE and IPv6
325 - Virtual tunnel interface
328 - Netlink monitoring device
331 - Interface for L3 (IPv6/IPv4) based VLANs
334 - Interface for L3 (IPv6/IPv4) based VLANs and TAP
337 - Interface for 6LoWPAN (IPv6) over IEEE 802.15.4 / Bluetooth
340 - GEneric NEtwork Virtualization Encapsulation
343 - Interface for IEEE 802.1AE MAC Security (MACsec)
346 - Interface for L3 VRF domains
349 - Interface for netdev API tests
352 - Qualcomm rmnet device
356 .BI numtxqueues " QUEUE_COUNT "
357 specifies the number of transmit queues for new device.
360 .BI numrxqueues " QUEUE_COUNT "
361 specifies the number of receive queues for new device.
364 .BI gso_max_size " BYTES "
365 specifies the recommended maximum size of a Generic Segment Offload packet the new device should accept.
368 .BI gso_max_segs " SEGMENTS "
369 specifies the recommended maximum number of a Generic Segment Offload segments the new device should accept.
373 specifies the desired index of the new virtual device. The link creation fails, if the index is busy.
379 the following additional arguments are supported:
386 .BI protocol " VLAN_PROTO "
390 .BR reorder_hdr " { " on " | " off " } "
393 .BR gvrp " { " on " | " off " } "
396 .BR mvrp " { " on " | " off " } "
399 .BR loose_binding " { " on " | " off " } "
402 .BI ingress-qos-map " QOS-MAP "
405 .BI egress-qos-map " QOS-MAP "
410 .BI protocol " VLAN_PROTO "
411 - either 802.1Q or 802.1ad.
414 - specifies the VLAN Identifer to use. Note that numbers with a leading " 0 " or " 0x " are interpreted as octal or hexadeimal, respectively.
416 .BR reorder_hdr " { " on " | " off " } "
417 - specifies whether ethernet headers are reordered or not (default is
422 .BR reorder_hdr " is " on
423 then VLAN header will be not inserted immediately but only before passing to the
424 physical device (if this device does not support VLAN offloading), the similar
425 on the RX direction - by default the packet will be untagged before being
426 received by VLAN device. Reordering allows to accelerate tagging on egress and
427 to hide VLAN header on ingress so the packet looks like regular Ethernet packet,
428 at the same time it might be confusing for packet capture as the VLAN header
429 does not exist within the packet.
431 VLAN offloading can be checked by
437 .RB grep " tx-vlan-offload"
440 where <phy_dev> is the physical device to which VLAN device is bound.
443 .BR gvrp " { " on " | " off " } "
444 - specifies whether this VLAN should be registered using GARP VLAN Registration Protocol.
446 .BR mvrp " { " on " | " off " } "
447 - specifies whether this VLAN should be registered using Multiple VLAN Registration Protocol.
449 .BR loose_binding " { " on " | " off " } "
450 - specifies whether the VLAN device state is bound to the physical device state.
452 .BI ingress-qos-map " QOS-MAP "
453 - defines a mapping of VLAN header prio field to the Linux internal packet
454 priority on incoming frames. The format is FROM:TO with multiple mappings
457 .BI egress-qos-map " QOS-MAP "
458 - defines a mapping of Linux internal packet priority to VLAN header prio field
459 but for outgoing frames. The format is the same as for ingress-qos-map.
462 Linux packet priority can be set by
467 -t mangle -A POSTROUTING [...] -j CLASSIFY --set-class 0:4
470 and this "4" priority can be used in the egress qos mapping to set VLAN prio "5":
474 link set veth0.10 type vlan egress 4:5
483 the following additional arguments are supported:
485 .BI "ip link add " DEVICE
486 .BI type " vxlan " id " VNI"
489 .RB " ] [ { " group " | " remote " } "
493 .RI "{ "IPADDR " | "any " } "
499 .BI flowlabel " FLOWLABEL "
503 .BI srcport " MIN MAX "
517 .RB [ no ] udp6zerocsumtx
519 .RB [ no ] udp6zerocsumrx
521 .BI ageing " SECONDS "
523 .BI maxaddress " NUMBER "
535 - specifies the VXLAN Network Identifer (or VXLAN Segment
539 - specifies the physical device to use for tunnel endpoint communication.
543 - specifies the multicast IP address to join.
544 This parameter cannot be specified with the
550 - specifies the unicast destination IP address to use in outgoing packets
551 when the destination link layer address is not known in the VXLAN device
552 forwarding database. This parameter cannot be specified with the
558 - specifies the source IP address to use in outgoing packets.
562 - specifies the TTL value to use in outgoing packets.
566 - specifies the TOS value to use in outgoing packets.
569 .BI flowlabel " FLOWLABEL"
570 - specifies the flow label to use in outgoing packets.
574 - specifies the UDP destination port to communicate to the remote VXLAN tunnel endpoint.
577 .BI srcport " MIN MAX"
578 - specifies the range of port numbers to use as UDP
579 source ports to communicate to the remote VXLAN tunnel endpoint.
583 - specifies if unknown source link layer addresses and IP addresses
584 are entered into the VXLAN device forwarding database.
588 - specifies if route short circuit is turned on.
592 - specifies ARP proxy is turned on.
596 - specifies if netlink LLADDR miss notifications are generated.
600 - specifies if netlink IP ADDR miss notifications are generated.
604 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
607 .RB [ no ] udp6zerocsumtx
608 - skip UDP checksum calculation for transmitted packets over IPv6.
611 .RB [ no ] udp6zerocsumrx
612 - allow incoming UDP packets over IPv6 with zero checksum field.
615 .BI ageing " SECONDS"
616 - specifies the lifetime in seconds of FDB entries learnt by the kernel.
619 .BI maxaddress " NUMBER"
620 - specifies the maximum number of FDB entries.
624 - specifies whether an external control plane
625 .RB "(e.g. " "ip route encap" )
626 or the internal FDB should be used.
630 - enables the Group Policy extension (VXLAN-GBP).
633 Allows to transport group policy context across VXLAN network peers.
634 If enabled, includes the mark of a packet in the VXLAN header for outgoing
635 packets and fills the packet mark based on the information found in the
636 VXLAN header for incomming packets.
638 Format of upper 16 bits of packet mark (flags);
641 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
643 |-|-|-|-|-|-|-|-|-|D|-|-|A|-|-|-|
645 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
648 Don't Learn bit. When set, this bit indicates that the egress
649 VTEP MUST NOT learn the source address of the encapsulated frame.
652 Indicates that the group policy has already been applied to
653 this packet. Policies MUST NOT be applied by devices when the A bit is set.
656 Format of lower 16 bits of packet mark (policy ID):
659 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
663 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
667 iptables -A OUTPUT [...] -j MARK --set-mark 0x800FF
673 - enables the Generic Protocol extension (VXLAN-GPE). Currently, this is
674 only supported together with the
681 VETH, VXCAN Type Support
684 the following additional arguments are supported:
686 .BI "ip link add " DEVICE
687 .BR type " { " veth " | " vxcan " }"
697 - specifies the virtual pair device name of the
704 IPIP, SIT Type Support
707 the following additional arguments are supported:
709 .BI "ip link add " DEVICE
710 .BR type " { " ipip " | " sit " }"
711 .BI " remote " ADDR " local " ADDR
713 .BR encap " { " fou " | " gue " | " none " }"
715 .BR encap-sport " { " \fIPORT " | " auto " }"
717 .BI "encap-dport " PORT
719 .RB [ no ] encap-csum
721 .I " [no]encap-remcsum "
723 .I " mode " { ip6ip | ipip | mplsip | any } "
731 - specifies the remote address of the tunnel.
735 - specifies the fixed local address for tunneled packets.
736 It must be an address on another interface on this host.
739 .BR encap " { " fou " | " gue " | " none " }"
740 - specifies type of secondary UDP encapsulation. "fou" indicates
741 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
744 .BR encap-sport " { " \fIPORT " | " auto " }"
745 - specifies the source port in UDP encapsulation.
747 indicates the port by number, "auto"
748 indicates that the port number should be chosen automatically
749 (the kernel picks a flow based on the flow hash of the
750 encapsulated packet).
753 .RB [ no ] encap-csum
754 - specifies if UDP checksums are enabled in the secondary
758 .RB [ no ] encap-remcsum
759 - specifies if Remote Checksum Offload is enabled. This is only
760 applicable for Generic UDP Encapsulation.
763 .BI mode " { ip6ip | ipip | mplsip | any } "
764 - specifies mode in which device should run. "ip6ip" indicates
765 IPv6-Over-IPv4, "ipip" indicates "IPv4-Over-IPv4", "mplsip" indicates
766 MPLS-Over-IPv4, "any" indicates IPv6, IPv4 or MPLS Over IPv4. Supported for
767 SIT where the default is "ip6ip" and IPIP where the default is "ipip".
768 IPv6-Over-IPv4 is not supported for IPIP.
772 - make this tunnel externally controlled
773 .RB "(e.g. " "ip route encap" ).
779 .IR GRE " or " GRETAP
780 the following additional arguments are supported:
782 .BI "ip link add " DEVICE
783 .BR type " { " gre " | " gretap " }"
784 .BI " remote " ADDR " local " ADDR
786 .RB [ no ] "" [ i | o ] seq
793 .RB [ no ] "" [ i | o ] csum
805 .BR encap " { " fou " | " gue " | " none " }"
807 .BR encap-sport " { " \fIPORT " | " auto " }"
809 .BI "encap-dport " PORT
811 .RB [ no ] encap-csum
813 .RB [ no ] encap-remcsum
821 - specifies the remote address of the tunnel.
825 - specifies the fixed local address for tunneled packets.
826 It must be an address on another interface on this host.
829 .RB [ no ] "" [ i | o ] seq
833 flag enables sequencing of outgoing packets.
836 flag requires that all input packets are serialized.
843 - use keyed GRE with key
845 is either a number or an IPv4 address-like dotted quad.
848 parameter specifies the same key to use in both directions.
850 .BR ikey " and " okey
851 parameters specify different keys for input and output.
854 .RB [ no ] "" [ i | o ] csum
855 - generate/require checksums for tunneled packets.
858 flag calculates checksums for outgoing packets.
861 flag requires that all input packets have the correct
864 flag is equivalent to the combination
869 - specifies the TTL value to use in outgoing packets.
873 - specifies the TOS value to use in outgoing packets.
877 - enables/disables Path MTU Discovery on this tunnel.
878 It is enabled by default. Note that a fixed ttl is incompatible
879 with this option: tunneling with a fixed ttl always makes pmtu
884 - enables/disables IPv4 DF suppression on this tunnel.
885 Normally datagrams that exceed the MTU will be fragmented; the presence
886 of the DF flag inhibits this, resulting instead in an ICMP Unreachable
887 (Fragmentation Required) message. Enabling this attribute casues the
888 DF flag to be ignored.
892 - specifies the physical device to use for tunnel endpoint communication.
895 .BR encap " { " fou " | " gue " | " none " }"
896 - specifies type of secondary UDP encapsulation. "fou" indicates
897 Foo-Over-UDP, "gue" indicates Generic UDP Encapsulation.
900 .BR encap-sport " { " \fIPORT " | " auto " }"
901 - specifies the source port in UDP encapsulation.
903 indicates the port by number, "auto"
904 indicates that the port number should be chosen automatically
905 (the kernel picks a flow based on the flow hash of the
906 encapsulated packet).
909 .RB [ no ] encap-csum
910 - specifies if UDP checksums are enabled in the secondary
914 .RB [ no ] encap-remcsum
915 - specifies if Remote Checksum Offload is enabled. This is only
916 applicable for Generic UDP Encapsulation.
920 - make this tunnel externally controlled
921 .RB "(e.g. " "ip route encap" ).
926 IP6GRE/IP6GRETAP Type Support
929 the following additional arguments are supported:
931 .BI "ip link add " DEVICE
932 .BR type " { " ip6gre " | " ip6gretap " }"
933 .BI remote " ADDR " local " ADDR"
935 .RB [ no ] "" [ i | o ] seq
942 .RB [ no ] "" [ i | o ] csum
946 .BI encaplimit " ELIM "
948 .BI tclass " TCLASS "
950 .BI flowlabel " FLOWLABEL "
954 .BI "[no]allow-localremote"
964 - specifies the remote IPv6 address of the tunnel.
968 - specifies the fixed local IPv6 address for tunneled packets.
969 It must be an address on another interface on this host.
972 .RB [ no ] "" [ i | o ] seq
976 flag enables sequencing of outgoing packets.
979 flag requires that all input packets are serialized.
986 - use keyed GRE with key
988 is either a number or an IPv4 address-like dotted quad.
991 parameter specifies the same key to use in both directions.
993 .BR ikey " and " okey
994 parameters specify different keys for input and output.
997 .RB [ no ] "" [ i | o ] csum
998 - generate/require checksums for tunneled packets.
1001 flag calculates checksums for outgoing packets.
1004 flag requires that all input packets have the correct
1007 flag is equivalent to the combination
1012 - specifies Hop Limit value to use in outgoing packets.
1015 .BI encaplimit " ELIM"
1016 - specifies a fixed encapsulation limit. Default is 4.
1019 .BI flowlabel " FLOWLABEL"
1020 - specifies a fixed flowlabel.
1023 .BI [no]allow-localremote
1024 - specifies whether to allow remote endpoint to have an address configured on
1028 .BI tclass " TCLASS"
1029 - specifies the traffic class field on
1030 tunneled packets, which can be specified as either a two-digit
1031 hex value (e.g. c0) or a predefined string (e.g. internet).
1034 causes the field to be copied from the original IP header. The
1036 .BI "inherit/" STRING
1038 .BI "inherit/" 00 ".." ff
1039 will set the field to
1043 when tunneling non-IP packets. The default value is 00.
1047 - make this tunnel externally controlled (or not, which is the default).
1048 In the kernel, this is referred to as collect metadata mode. This flag is
1049 mutually exclusive with the
1057 .BR flowlabel " and " tclass
1066 the following additional arguments are supported:
1068 .BI "ip link add " DEVICE " name " NAME
1069 .BR "type ipoib " [ " pkey \fIPKEY" " ] [ " mode " \fIMODE \fR]"
1074 - specifies the IB P-Key to use.
1077 - specifies the mode (datagram or connected) to use.
1083 the following additional arguments are supported:
1085 .BI "ip link add " DEVICE
1086 .BR type " { " erspan " | " ip6erspan " }"
1087 .BI remote " ADDR " local " ADDR " seq
1090 .BR erspan_ver " \fIversion "
1092 .BR erspan " \fIIDX "
1094 .BR erspan_dir " { " \fIingress " | " \fIegress " }"
1096 .BR erspan_hwid " \fIhwid "
1098 .BI "[no]allow-localremote"
1106 - specifies the remote address of the tunnel.
1110 - specifies the fixed local address for tunneled packets.
1111 It must be an address on another interface on this host.
1114 .BR erspan_ver " \fIversion "
1115 - specifies the ERSPAN version number.
1117 indicates the ERSPAN version to be created: 1 for version 1 (type II)
1118 or 2 for version 2 (type III).
1121 .BR erspan " \fIIDX "
1122 - specifies the ERSPAN v1 index field.
1124 indicates a 20 bit index/port number associated with the ERSPAN
1125 traffic's source port and direction.
1128 .BR erspan_dir " { " \fIingress " | " \fIegress " }"
1129 - specifies the ERSPAN v2 mirrored traffic's direction.
1132 .BR erspan_hwid " \fIhwid "
1133 - an unique identifier of an ERSPAN v2 engine within a system.
1135 is a 6-bit value for users to configure.
1138 .BI [no]allow-localremote
1139 - specifies whether to allow remote endpoint to have an address configured on
1144 - make this tunnel externally controlled (or not, which is the default).
1145 In the kernel, this is referred to as collect metadata mode. This flag is
1146 mutually exclusive with the
1151 .BR erspan_dir " and " erspan_hwid
1160 the following additional arguments are supported:
1162 .BI "ip link add " DEVICE
1163 .BI type " geneve " id " VNI " remote " IPADDR"
1169 .BI flowlabel " FLOWLABEL "
1177 .RB [ no ] udp6zerocsumtx
1179 .RB [ no ] udp6zerocsumrx
1185 - specifies the Virtual Network Identifer to use.
1188 .BI remote " IPADDR"
1189 - specifies the unicast destination IP address to use in outgoing packets.
1193 - specifies the TTL value to use in outgoing packets.
1197 - specifies the TOS value to use in outgoing packets.
1200 .BI flowlabel " FLOWLABEL"
1201 - specifies the flow label to use in outgoing packets.
1205 - select a destination port other than the default of 6081.
1209 - make this tunnel externally controlled (or not, which is the default). This
1210 flag is mutually exclusive with the
1214 .BR tos " and " flowlabel
1219 - specifies if UDP checksum is calculated for transmitted packets over IPv4.
1222 .RB [ no ] udp6zerocsumtx
1223 - skip UDP checksum calculation for transmitted packets over IPv6.
1226 .RB [ no ] udp6zerocsumrx
1227 - allow incoming UDP packets over IPv6 with zero checksum field.
1232 MACVLAN and MACVTAP Type Support
1237 the following additional arguments are supported:
1239 .BI "ip link add link " DEVICE " name " NAME
1240 .BR type " { " macvlan " | " macvtap " } "
1241 .BR mode " { " private " | " vepa " | " bridge " | " passthru
1242 .RB " [ " nopromisc " ] | " source " } "
1246 .BR type " { " macvlan " | " macvtap " } "
1247 - specifies the link type to use.
1248 .BR macvlan " creates just a virtual interface, while "
1249 .BR macvtap " in addition creates a character device "
1250 .BR /dev/tapX " to be used just like a " tuntap " device."
1253 - Do not allow communication between
1255 instances on the same physical interface, even if the external switch supports
1259 - Virtual Ethernet Port Aggregator mode. Data from one
1261 instance to the other on the same physical interface is transmitted over the
1262 physical interface. Either the attached switch needs to support hairpin mode,
1263 or there must be a TCP/IP router forwarding the packets in order to allow
1264 communication. This is the default mode.
1267 - In bridge mode, all endpoints are directly connected to each other,
1268 communication is not redirected through the physical interface's peer.
1270 .BR mode " " passthru " [ " nopromisc " ] "
1271 - This mode gives more power to a single endpoint, usually in
1272 .BR macvtap " mode. It is not allowed for more than one endpoint on the same "
1273 physical interface. All traffic will be forwarded to this endpoint, allowing
1274 virtio guests to change MAC address or set promiscuous mode in order to bridge
1275 the interface or create vlan interfaces on top of it. By default, this mode
1276 forces the underlying interface into promiscuous mode. Passing the
1277 .BR nopromisc " flag prevents this, so the promisc flag may be controlled "
1278 using standard tools.
1281 - allows one to set a list of allowed mac address, which is used to match
1282 against source mac address from received frames on underlying interface. This
1283 allows creating mac based VLAN associations, instead of standard port or tag
1284 based. The feature is useful to deploy 802.1x mac based behavior,
1285 where drivers of underlying interfaces doesn't allows that.
1289 High-availability Seamless Redundancy (HSR) Support
1292 the following additional arguments are supported:
1294 .BI "ip link add link " DEVICE " name " NAME " type hsr"
1295 .BI slave1 " SLAVE1-IF " slave2 " SLAVE2-IF "
1296 .RB [ " supervision"
1297 .IR ADDR-BYTE " ] ["
1298 .BR version " { " 0 " | " 1 " } ]"
1303 - specifies the link type to use, here HSR.
1305 .BI slave1 " SLAVE1-IF "
1306 - Specifies the physical device used for the first of the two ring ports.
1308 .BI slave2 " SLAVE2-IF "
1309 - Specifies the physical device used for the second of the two ring ports.
1311 .BI supervision " ADDR-BYTE"
1312 - The last byte of the multicast address used for HSR supervision frames.
1313 Default option is "0", possible values 0-255.
1315 .BR version " { " 0 " | " 1 " }"
1316 - Selects the protocol version of the interface. Default option is "0", which
1317 corresponds to the 2010 version of the HSR standard. Option "1" activates the
1325 the following additional arguments are supported:
1327 .BI "ip link add " DEVICE " type bridge "
1329 .BI ageing_time " AGEING_TIME "
1331 .BI group_fwd_mask " MASK "
1333 .BI group_address " ADDRESS "
1335 .BI forward_delay " FORWARD_DELAY "
1337 .BI hello_time " HELLO_TIME "
1339 .BI max_age " MAX_AGE "
1341 .BI stp_state " STP_STATE "
1343 .BI priority " PRIORITY "
1345 .BI vlan_filtering " VLAN_FILTERING "
1347 .BI vlan_protocol " VLAN_PROTOCOL "
1349 .BI vlan_default_pvid " VLAN_DEFAULT_PVID "
1351 .BI vlan_stats_enabled " VLAN_STATS_ENABLED "
1353 .BI mcast_snooping " MULTICAST_SNOOPING "
1355 .BI mcast_router " MULTICAST_ROUTER "
1357 .BI mcast_query_use_ifaddr " MCAST_QUERY_USE_IFADDR "
1359 .BI mcast_querier " MULTICAST_QUERIER "
1361 .BI mcast_hash_elasticity " HASH_ELASTICITY "
1363 .BI mcast_hash_max " HASH_MAX "
1365 .BI mcast_last_member_count " LAST_MEMBER_COUNT "
1367 .BI mcast_startup_query_count " STARTUP_QUERY_COUNT "
1369 .BI mcast_last_member_interval " LAST_MEMBER_INTERVAL "
1371 .BI mcast_membership_interval " MEMBERSHIP_INTERVAL "
1373 .BI mcast_querier_interval " QUERIER_INTERVAL "
1375 .BI mcast_query_interval " QUERY_INTERVAL "
1377 .BI mcast_query_response_interval " QUERY_RESPONSE_INTERVAL "
1379 .BI mcast_startup_query_interval " STARTUP_QUERY_INTERVAL "
1381 .BI mcast_stats_enabled " MCAST_STATS_ENABLED "
1383 .BI mcast_igmp_version " IGMP_VERSION "
1385 .BI mcast_mld_version " MLD_VERSION "
1387 .BI nf_call_iptables " NF_CALL_IPTABLES "
1389 .BI nf_call_ip6tables " NF_CALL_IP6TABLES "
1391 .BI nf_call_arptables " NF_CALL_ARPTABLES "
1396 .BI ageing_time " AGEING_TIME "
1397 - configure the bridge's FDB entries ageing time, ie the number of seconds a MAC address will be kept in the FDB after a packet has been received from that address. after this time has passed, entries are cleaned up.
1399 .BI group_fwd_mask " MASK "
1400 - set the group forward mask. This is the bitmask that is applied to decide whether to forward incoming frames destined to link-local addresses, ie addresses of the form 01:80:C2:00:00:0X (defaults to 0, ie the bridge does not forward any link-local frames).
1402 .BI group_address " ADDRESS "
1403 - set the MAC address of the multicast group this bridge uses for STP. The address must be a link-local address in standard Ethernet MAC address format, ie an address of the form 01:80:C2:00:00:0X, with X in [0, 4..f].
1405 .BI forward_delay " FORWARD_DELAY "
1406 - set the forwarding delay in seconds, ie the time spent in LISTENING state (before moving to LEARNING) and in LEARNING state (before moving to FORWARDING). Only relevant if STP is enabled. Valid values are between 2 and 30.
1408 .BI hello_time " HELLO_TIME "
1409 - set the time in seconds between hello packets sent by the bridge, when it is a root bridge or a designated bridges. Only relevant if STP is enabled. Valid values are between 1 and 10.
1411 .BI max_age " MAX_AGE "
1412 - set the hello packet timeout, ie the time in seconds until another bridge in the spanning tree is assumed to be dead, after reception of its last hello message. Only relevant if STP is enabled. Valid values are between 6 and 40.
1414 .BI stp_state " STP_STATE "
1415 - turn spanning tree protocol on
1416 .RI ( STP_STATE " > 0) "
1418 .RI ( STP_STATE " == 0). "
1421 .BI priority " PRIORITY "
1422 - set this bridge's spanning tree priority, used during STP root bridge election.
1424 is a 16bit unsigned integer.
1426 .BI vlan_filtering " VLAN_FILTERING "
1427 - turn VLAN filtering on
1428 .RI ( VLAN_FILTERING " > 0) "
1430 .RI ( VLAN_FILTERING " == 0). "
1431 When disabled, the bridge will not consider the VLAN tag when handling packets.
1433 .BR vlan_protocol " { " 802.1Q " | " 802.1ad " } "
1434 - set the protocol used for VLAN filtering.
1436 .BI vlan_default_pvid " VLAN_DEFAULT_PVID "
1437 - set the default PVID (native/untagged VLAN ID) for this bridge.
1439 .BI vlan_stats_enabled " VLAN_STATS_ENABLED "
1441 .RI ( VLAN_STATS_ENABLED " == 1) "
1443 .RI ( VLAN_STATS_ENABLED " == 0) "
1444 per-VLAN stats accounting.
1446 .BI mcast_snooping " MULTICAST_SNOOPING "
1447 - turn multicast snooping on
1448 .RI ( MULTICAST_SNOOPING " > 0) "
1450 .RI ( MULTICAST_SNOOPING " == 0). "
1452 .BI mcast_router " MULTICAST_ROUTER "
1453 - set bridge's multicast router if IGMP snooping is enabled.
1455 is an integer value having the following meaning:
1462 - automatic (queried).
1465 - permanently enabled.
1468 .BI mcast_query_use_ifaddr " MCAST_QUERY_USE_IFADDR "
1469 - whether to use the bridge's own IP address as source address for IGMP queries
1470 .RI ( MCAST_QUERY_USE_IFADDR " > 0) "
1471 or the default of 0.0.0.0
1472 .RI ( MCAST_QUERY_USE_IFADDR " == 0). "
1474 .BI mcast_querier " MULTICAST_QUERIER "
1476 .RI ( MULTICAST_QUERIER " > 0) "
1478 .RI ( MULTICAST_QUERIER " == 0) "
1479 IGMP querier, ie sending of multicast queries by the bridge (default: disabled).
1481 .BI mcast_querier_interval " QUERIER_INTERVAL "
1482 - interval between queries sent by other routers. if no queries are seen after this delay has passed, the bridge will start to send its own queries (as if
1486 .BI mcast_hash_elasticity " HASH_ELASTICITY "
1487 - set multicast database hash elasticity, ie the maximum chain length in the multicast hash table (defaults to 4).
1489 .BI mcast_hash_max " HASH_MAX "
1490 - set maximum size of multicast hash table (defaults to 512, value must be a power of 2).
1492 .BI mcast_last_member_count " LAST_MEMBER_COUNT "
1493 - set multicast last member count, ie the number of queries the bridge will send before stopping forwarding a multicast group after a "leave" message has been received (defaults to 2).
1495 .BI mcast_last_member_interval " LAST_MEMBER_INTERVAL "
1496 - interval between queries to find remaining members of a group, after a "leave" message is received.
1498 .BI mcast_startup_query_count " STARTUP_QUERY_COUNT "
1499 - set the number of IGMP queries to send during startup phase (defaults to 2).
1501 .BI mcast_startup_query_interval " STARTUP_QUERY_INTERVAL "
1502 - interval between queries in the startup phase.
1504 .BI mcast_query_interval " QUERY_INTERVAL "
1505 - interval between queries sent by the bridge after the end of the startup phase.
1507 .BI mcast_query_response_interval " QUERY_RESPONSE_INTERVAL "
1508 - set the Max Response Time/Maximum Response Delay for IGMP/MLD queries sent by the bridge.
1510 .BI mcast_membership_interval " MEMBERSHIP_INTERVAL "
1511 - delay after which the bridge will leave a group, if no membership reports for this group are received.
1513 .BI mcast_stats_enabled " MCAST_STATS_ENABLED "
1515 .RI ( MCAST_STATS_ENABLED " > 0) "
1517 .RI ( MCAST_STATS_ENABLED " == 0) "
1518 multicast (IGMP/MLD) stats accounting.
1520 .BI mcast_igmp_version " IGMP_VERSION "
1521 - set the IGMP version.
1523 .BI mcast_mld_version " MLD_VERSION "
1524 - set the MLD version.
1526 .BI nf_call_iptables " NF_CALL_IPTABLES "
1528 .RI ( NF_CALL_IPTABLES " > 0) "
1530 .RI ( NF_CALL_IPTABLES " == 0) "
1531 iptables hooks on the bridge.
1533 .BI nf_call_ip6tables " NF_CALL_IP6TABLES "
1535 .RI ( NF_CALL_IP6TABLES " > 0) "
1537 .RI ( NF_CALL_IP6TABLES " == 0) "
1538 ip6tables hooks on the bridge.
1540 .BI nf_call_arptables " NF_CALL_ARPTABLES "
1542 .RI ( NF_CALL_ARPTABLES " > 0) "
1544 .RI ( NF_CALL_ARPTABLES " == 0) "
1545 arptables hooks on the bridge.
1554 the following additional arguments are supported:
1556 .BI "ip link add link " DEVICE " name " NAME " type macsec"
1558 .BI address " <lladdr>"
1564 .BI cipher " CIPHER_SUITE"
1569 .BR on " | " off " } ] [ "
1570 .BR send_sci " { " on " | " off " } ] ["
1571 .BR end_station " { " on " | " off " } ] ["
1572 .BR scb " { " on " | " off " } ] ["
1573 .BR protect " { " on " | " off " } ] ["
1574 .BR replay " { " on " | " off " }"
1576 .IR 0..2^32-1 " } ] ["
1577 .BR validate " { " strict " | " check " | " disabled " } ] ["
1578 .BR encodingsa " { "
1583 .BI address " <lladdr> "
1584 - sets the system identifier component of secure channel for this MACsec device.
1588 - sets the port number component of secure channel for this MACsec device, in a
1589 range from 1 to 65535 inclusive. Numbers with a leading " 0 " or " 0x " are
1590 interpreted as octal and hexadecimal, respectively.
1594 - sets the secure channel identifier for this MACsec device.
1596 is a 64bit wide number in hexadecimal format.
1599 .BI cipher " CIPHER_SUITE "
1600 - defines the cipher suite to use.
1603 .BI icvlen " LENGTH "
1604 - sets the length of the Integrity Check Value (ICV).
1607 .BR "encrypt on " or " encrypt off"
1608 - switches between authenticated encryption, or authenticity mode only.
1611 .BR "send_sci on " or " send_sci off"
1612 - specifies whether the SCI is included in every packet, or only when it is necessary.
1615 .BR "end_station on " or " end_station off"
1616 - sets the End Station bit.
1619 .BR "scb on " or " scb off"
1620 - sets the Single Copy Broadcast bit.
1623 .BR "protect on " or " protect off"
1624 - enables MACsec protection on the device.
1627 .BR "replay on " or " replay off"
1628 - enables replay protection on the device.
1634 - sets the size of the replay window.
1639 .BR "validate strict " or " validate check " or " validate disabled"
1640 - sets the validation mode on the device.
1643 .BI encodingsa " AN "
1644 - sets the active secure association for transmission.
1652 the following additional arguments are supported:
1654 .BI "ip link add " DEVICE " type vrf table " TABLE
1658 .BR table " table id associated with VRF device"
1666 the following additional arguments are supported:
1668 .BI "ip link add link " DEVICE " name " NAME " type rmnet mux_id " MUXID
1672 .BI mux_id " MUXID "
1673 - specifies the mux identifier for the rmnet device, possible values 1-254.
1677 .SS ip link delete - delete virtual link
1681 specifies the virtual device to act operate on.
1685 specifies the group of virtual links to delete. Group 0 is not allowed to be
1686 deleted since it is the default group.
1690 specifies the type of the device.
1692 .SS ip link set - change device attributes
1696 If multiple parameter changes are requested,
1698 aborts immediately after any of the changes have failed.
1699 This is the only case when
1701 can move the system to an unpredictable state. The solution
1702 is to avoid changing several parameters with one
1709 specifies network device to operate on. When configuring SR-IOV Virtual Function
1710 (VF) devices, this keyword should specify the associated Physical Function (PF)
1716 has a dual role: If both group and dev are present, then move the device to the
1717 specified group. If only a group is specified, then the command operates on
1718 all devices in that group.
1722 change the state of the device to
1728 .BR "arp on " or " arp off"
1734 .BR "multicast on " or " multicast off"
1740 .BR "protodown on " or " protodown off"
1743 state on the device. Indicates that a protocol error has been detected on the port. Switch drivers can react to this error by doing a phys down on the switch port.
1746 .BR "dynamic on " or " dynamic off"
1749 flag on the device. Indicates that address can change when interface goes down (currently
1755 change the name of the device. This operation is not
1756 recommended if the device is running or has some addresses
1760 .BI txqueuelen " NUMBER"
1762 .BI txqlen " NUMBER"
1763 change the transmit queue length of the device.
1772 .BI address " LLADDRESS"
1773 change the station address of the interface.
1776 .BI broadcast " LLADDRESS"
1778 .BI brd " LLADDRESS"
1780 .BI peer " LLADDRESS"
1781 change the link layer broadcast address or the peer address when
1786 .BI netns " NETNSNAME " \fR| " PID"
1787 move the device to the network namespace associated with name
1791 Some devices are not allowed to change network namespace: loopback, bridge,
1792 ppp, wireless. These are network namespace local devices. In such case
1794 tool will return "Invalid argument" error. It is possible to find out if device is local
1795 to a single network namespace by checking
1797 flag in the output of the
1805 To change network namespace for wireless devices the
1807 tool can be used. But it allows to change network namespace only for physical devices and by process
1812 give the device a symbolic name for easy reference.
1816 specify the group the device belongs to.
1817 The available groups are listed in file
1818 .BR "@SYSCONFDIR@/group" .
1822 specify a Virtual Function device to be configured. The associated PF device
1823 must be specified using the
1828 .BI mac " LLADDRESS"
1829 - change the station address for the specified VF. The
1831 parameter must be specified.
1835 - change the assigned VLAN for the specified VF. When specified, all traffic
1836 sent from the VF will be tagged with the specified VLAN ID. Incoming traffic
1837 will be filtered for the specified VLAN ID, and will have all VLAN tags
1838 stripped before being passed to the VF. Setting this parameter to 0 disables
1839 VLAN tagging and filtering. The
1841 parameter must be specified.
1845 - assign VLAN QOS (priority) bits for the VLAN tag. When specified, all VLAN
1846 tags transmitted by the VF will include the specified priority bits in the
1847 VLAN tag. If not specified, the value is assumed to be 0. Both the
1851 parameters must be specified. Setting both
1855 as 0 disables VLAN tagging and filtering for the VF.
1858 .BI proto " VLAN-PROTO"
1859 - assign VLAN PROTOCOL for the VLAN tag, either 802.1Q or 802.1ad.
1860 Setting to 802.1ad, all traffic sent from the VF will be tagged with VLAN S-Tag.
1861 Incoming traffic will have VLAN S-Tags stripped before being passed to the VF.
1862 Setting to 802.1ad also enables an option to concatenate another VLAN tag, so both
1863 S-TAG and C-TAG will be inserted/stripped for outgoing/incoming traffic, respectively.
1864 If not specified, the value is assumed to be 802.1Q. Both the
1868 parameters must be specified.
1872 -- change the allowed transmit bandwidth, in Mbps, for the specified VF.
1873 Setting this parameter to 0 disables rate limiting.
1875 parameter must be specified.
1881 .BI max_tx_rate " TXRATE"
1882 - change the allowed maximum transmit bandwidth, in Mbps, for the specified VF.
1883 Setting this parameter to 0 disables rate limiting.
1885 parameter must be specified.
1888 .BI min_tx_rate " TXRATE"
1889 - change the allowed minimum transmit bandwidth, in Mbps, for the specified VF.
1890 Minimum TXRATE should be always <= Maximum TXRATE.
1891 Setting this parameter to 0 disables rate limiting.
1893 parameter must be specified.
1896 .BI spoofchk " on|off"
1897 - turn packet spoof checking on or off for the specified VF.
1899 .BI query_rss " on|off"
1900 - toggle the ability of querying the RSS configuration of a specific VF. VF RSS information like RSS hash key may be considered sensitive on some devices where this information is shared between VF and PF and thus its querying may be prohibited by default.
1902 .BI state " auto|enable|disable"
1903 - set the virtual link state as seen by the specified VF. Setting to auto means a
1904 reflection of the PF link state, enable lets the VF to communicate with other VFs on
1905 this host even if the PF link state is down, disable causes the HW to drop any packets
1909 - trust the specified VF user. This enables that VF user can set a specific feature
1910 which may impact security and/or performance. (e.g. VF multicast promiscuous mode)
1912 .BI node_guid " eui64"
1913 - configure node GUID for Infiniband VFs.
1915 .BI port_guid " eui64"
1916 - configure port GUID for Infiniband VFs.
1920 .B xdp object "|" pinned "|" off
1921 set (or unset) a XDP ("eXpress Data Path") BPF program to run on every
1922 packet at driver level.
1924 output will indicate a
1926 flag for the networking device. If the driver does not have native XDP
1927 support, the kernel will fall back to a slower, driver-independent "generic"
1930 output will in that case indicate
1934 only. If the driver does have native XDP support, but the program is
1936 .B xdpgeneric object "|" pinned
1937 then the kernel will use the generic XDP variant instead of the native one.
1939 has the opposite effect of requestsing that the automatic fallback to the
1940 generic XDP variant be disabled and in case driver is not XDP-capable error
1943 also disables hardware offloads.
1945 in ip link output indicates that the program has been offloaded to hardware
1946 and can also be used to request the "offload" mode, much like
1948 it forces program to be installed specifically in HW/FW of the apater.
1954 - Detaches any currently attached XDP/BPF program from the given device.
1957 - Attaches a XDP/BPF program to the given device. The
1959 points to a BPF ELF file (f.e. generated by LLVM) that contains the BPF
1960 program code, map specifications, etc. If a XDP/BPF program is already
1961 attached to the given device, an error will be thrown. If no XDP/BPF
1962 program is currently attached, the device supports XDP and the program
1963 from the BPF ELF file passes the kernel verifier, then it will be attached
1964 to the device. If the option
1968 then any prior attached XDP/BPF program will be atomically overridden and
1969 no error will be thrown in this case. If no
1971 option is passed, then the default section name ("prog") will be assumed,
1972 otherwise the provided section name will be used. If no
1974 option is passed, then a verifier log will only be dumped on load error.
1977 section for usage examples.
1979 .BI section " NAME "
1980 - Specifies a section name that contains the BPF program code. If no section
1981 name is specified, the default one ("prog") will be used. This option is
1982 to be passed with the
1987 - Act in verbose mode. For example, even in case of success, this will
1988 print the verifier log in case a program was loaded from a BPF ELF file.
1991 - Attaches a XDP/BPF program to the given device. The
1993 points to an already pinned BPF program in the BPF file system. The option
1995 doesn't apply here, but otherwise semantics are the same as with the option
2000 .BI master " DEVICE"
2001 set master device of the device (enslave device).
2005 unset master device of the device (release device).
2008 .BI addrgenmode " eui64|none|stable_secret|random"
2009 set the IPv6 address generation mode
2012 - use a Modified EUI-64 format interface identifier
2015 - disable automatic address generation
2018 - generate the interface identifier based on a preset /proc/sys/net/ipv6/conf/{default,DEVICE}/stable_secret
2021 - like stable_secret, but auto-generate a new random secret if none is set
2025 set peer netnsid for a cross-netns interface
2028 .BI type " ETYPE TYPE_ARGS"
2029 Change type-specific settings. For a list of supported types and arguments refer
2030 to the description of
2032 above. In addition to that, it is possible to manipulate settings to slave
2036 Bridge Slave Support
2037 For a link with master
2039 the following additional arguments are supported:
2041 .B "ip link set type bridge_slave"
2047 .BI priority " PRIO"
2051 .BR guard " { " on " | " off " }"
2053 .BR hairpin " { " on " | " off " }"
2055 .BR fastleave " { " on " | " off " }"
2057 .BR root_block " { " on " | " off " }"
2059 .BR learning " { " on " | " off " }"
2061 .BR flood " { " on " | " off " }"
2063 .BR proxy_arp " { " on " | " off " }"
2065 .BR proxy_arp_wifi " { " on " | " off " }"
2067 .BI mcast_router " MULTICAST_ROUTER"
2069 .BR mcast_fast_leave " { " on " | " off "}"
2071 .BR mcast_flood " { " on " | " off " }"
2073 .BR group_fwd_mask " MASK"
2075 .BR neigh_suppress " { " on " | " off " }"
2077 .BR vlan_tunnel " { " on " | " off " }"
2079 .BR isolated " { " on " | " off " }"
2081 .BR backup_port " DEVICE"
2083 .BR nobackup_port " ]"
2088 - flush bridge slave's fdb dynamic entries.
2093 is a number representing the following states:
2094 .BR 0 " (disabled),"
2095 .BR 1 " (listening),"
2096 .BR 2 " (learning),"
2097 .BR 3 " (forwarding),"
2098 .BR 4 " (blocking)."
2100 .BI priority " PRIO"
2101 - set port priority (allowed values are between 0 and 63, inclusively).
2104 - set port cost (allowed values are between 1 and 65535, inclusively).
2106 .BR guard " { " on " | " off " }"
2107 - block incoming BPDU packets on this port.
2109 .BR hairpin " { " on " | " off " }"
2110 - enable hairpin mode on this port. This will allow incoming packets on this
2111 port to be reflected back.
2113 .BR fastleave " { " on " | " off " }"
2114 - enable multicast fast leave on this port.
2116 .BR root_block " { " on " | " off " }"
2117 - block this port from becoming the bridge's root port.
2119 .BR learning " { " on " | " off " }"
2120 - allow MAC address learning on this port.
2122 .BR flood " { " on " | " off " }"
2123 - open the flood gates on this port, i.e. forward all unicast frames to this
2125 .BR proxy_arp " and " proxy_arp_wifi
2128 .BR proxy_arp " { " on " | " off " }"
2129 - enable proxy ARP on this port.
2131 .BR proxy_arp_wifi " { " on " | " off " }"
2132 - enable proxy ARP on this port which meets extended requirements by IEEE
2133 802.11 and Hotspot 2.0 specifications.
2135 .BI mcast_router " MULTICAST_ROUTER"
2136 - configure this port for having multicast routers attached. A port with a
2137 multicast router will receive all multicast traffic.
2141 to disable multicast routers on this port,
2143 to let the system detect the presence of of routers (this is the default),
2145 to permanently enable multicast traffic forwarding on this port or
2147 to enable multicast routers temporarily on this port, not depending on incoming
2150 .BR mcast_fast_leave " { " on " | " off " }"
2151 - this is a synonym to the
2155 .BR mcast_flood " { " on " | " off " }"
2156 - controls whether a given port will be flooded with multicast traffic for which there is no MDB entry.
2158 .BI group_fwd_mask " MASK "
2159 - set the group forward mask. This is the bitmask that is applied to decide whether to forward incoming frames destined to link-local addresses, ie addresses of the form 01:80:C2:00:00:0X (defaults to 0, ie the bridge does not forward any link-local frames coming on this port).
2161 .BR neigh_suppress " { " on " | " off " }"
2162 - controls whether neigh discovery (arp and nd) proxy and suppression is enabled on the port. By default this flag is off.
2164 .BR vlan_tunnel " { " on " | " off " }"
2165 - controls whether vlan to tunnel mapping is enabled on the port. By default this flag is off.
2167 .BI backup_port " DEVICE"
2168 - if the port loses carrier all traffic will be redirected to the configured backup port
2171 - removes the currently configured backup port
2176 Bonding Slave Support
2177 For a link with master
2179 the following additional arguments are supported:
2181 .B "ip link set type bond_slave"
2189 - set the slave's queue ID (a 16bit unsigned value).
2194 MACVLAN and MACVTAP Support
2195 Modify list of allowed macaddr for link in source mode.
2197 .B "ip link set type { macvlan | macvap } "
2199 .BI macaddr " " "" COMMAND " " MACADDR " ..."
2205 - add MACADDR to allowed list
2208 - replace allowed list
2211 - remove MACADDR from allowed list
2214 - flush whole allowed list
2219 .SS ip link show - display device attributes
2222 .BI dev " NAME " (default)
2224 specifies the network device to show.
2225 If this argument is omitted all devices in the default group are listed.
2230 specifies what group of devices to show.
2234 only display running interfaces.
2237 .BI master " DEVICE "
2239 specifies the master device which enslaves devices to show.
2244 speficies the VRF which enslaves devices to show.
2249 specifies the type of devices to show.
2251 Note that the type name is not checked against the list of supported types -
2252 instead it is sent as-is to the kernel. Later it is used to filter the returned
2253 interface list by comparing it with the relevant attribute in case the kernel
2254 didn't filter already. Therefore any string is accepted, but may lead to empty
2257 .SS ip link xstats - display extended statistics
2262 specifies the type of devices to display extended statistics for.
2264 .SS ip link afstats - display address-family specific statistics
2269 specifies the device to display address-family statistics for.
2271 .SS ip link help - display help
2275 specifies which help of link type to dislpay.
2279 may be a number or a string from the file
2280 .B @SYSCONFDIR@/group
2281 which can be manually filled.
2287 Shows the state of all network interfaces on the system.
2290 ip link show type bridge
2292 Shows the bridge devices.
2295 ip link show type vlan
2297 Shows the vlan devices.
2300 ip link show master br0
2302 Shows devices enslaved by br0
2305 ip link set dev ppp0 mtu 1400
2307 Change the MTU the ppp0 device.
2310 ip link add link eth0 name eth0.10 type vlan id 10
2312 Creates a new vlan device eth0.10 on device eth0.
2315 ip link delete dev eth0.10
2317 Removes vlan device.
2322 Display help for the gre link type.
2325 ip link add name tun1 type ipip remote 192.168.1.1
2326 local 192.168.1.2 ttl 225 encap gue encap-sport auto
2327 encap-dport 5555 encap-csum encap-remcsum
2329 Creates an IPIP that is encapsulated with Generic UDP Encapsulation,
2330 and the outer UDP checksum and remote checksum offload are enabled.
2333 ip link set dev eth0 xdp obj prog.o
2335 Attaches a XDP/BPF program to device eth0, where the program is
2336 located in prog.o, section "prog" (default section). In case a
2337 XDP/BPF program is already attached, throw an error.
2340 ip -force link set dev eth0 xdp obj prog.o sec foo
2342 Attaches a XDP/BPF program to device eth0, where the program is
2343 located in prog.o, section "foo". In case a XDP/BPF program is
2344 already attached, it will be overridden by the new one.
2347 ip -force link set dev eth0 xdp pinned /sys/fs/bpf/foo
2349 Attaches a XDP/BPF program to device eth0, where the program was
2350 previously pinned as an object node into BPF file system under
2354 ip link set dev eth0 xdp off
2356 If a XDP/BPF program is attached on device eth0, detach it and
2357 effectively turn off XDP for device eth0.
2360 ip link add link wpan0 lowpan0 type lowpan
2362 Creates a 6LoWPAN interface named lowpan0 on the underlying
2363 IEEE 802.15.4 device wpan0.
2366 ip link add dev ip6erspan11 type ip6erspan seq key 102
2367 local fc00:100::2 remote fc00:100::1
2368 erspan_ver 2 erspan_dir ingress erspan_hwid 17
2370 Creates a IP6ERSPAN version 2 interface named ip6erspan00.
2381 Original Manpage by Michail Litvak <mci@owl.openwall.com>