]> git.proxmox.com Git - ovs.git/blob - utilities/ovs-ofctl.8.in
Support accepting and displaying port names in OVS tools.
[ovs.git] / utilities / ovs-ofctl.8.in
1 .\" -*- nroff -*-
2 .de IQ
3 . br
4 . ns
5 . IP "\\$1"
6 ..
7 .TH ovs\-ofctl 8 "@VERSION@" "Open vSwitch" "Open vSwitch Manual"
8 .ds PN ovs\-ofctl
9 .
10 .SH NAME
11 ovs\-ofctl \- administer OpenFlow switches
12 .
13 .SH SYNOPSIS
14 .B ovs\-ofctl
15 [\fIoptions\fR] \fIcommand \fR[\fIswitch\fR] [\fIargs\fR\&...]
16 .
17 .SH DESCRIPTION
18 The
19 .B ovs\-ofctl
20 program is a command line tool for monitoring and administering
21 OpenFlow switches. It can also show the current state of an OpenFlow
22 switch, including features, configuration, and table entries.
23 It should work with any OpenFlow switch, not just Open vSwitch.
24 .
25 .SS "OpenFlow Switch Management Commands"
26 .PP
27 These commands allow \fBovs\-ofctl\fR to monitor and administer an OpenFlow
28 switch. It is able to show the current state of a switch, including
29 features, configuration, and table entries.
30 .PP
31 Most of these commands take an argument that specifies the method for
32 connecting to an OpenFlow switch. The following connection methods
33 are supported:
34 .
35 .RS
36 .so lib/vconn-active.man
37 .
38 .IP "\fIfile\fR"
39 This is short for \fBunix:\fIfile\fR, as long as \fIfile\fR does not
40 contain a colon.
41 .
42 .IP \fIbridge\fR
43 This is short for \fBunix:@RUNDIR@/\fIbridge\fB.mgmt\fR, as long as
44 \fIbridge\fR does not contain a colon.
45 .
46 .IP [\fItype\fB@\fR]\fIdp\fR
47 Attempts to look up the bridge associated with \fIdp\fR and open as
48 above. If \fItype\fR is given, it specifies the datapath provider of
49 \fIdp\fR, otherwise the default provider \fBsystem\fR is assumed.
50 .RE
51 .
52 .TP
53 \fBshow \fIswitch\fR
54 Prints to the console information on \fIswitch\fR, including
55 information on its flow tables and ports.
56 .
57 .TP
58 \fBdump\-tables \fIswitch\fR
59 Prints to the console statistics for each of the flow tables used by
60 \fIswitch\fR.
61 .TP
62 \fBdump\-table\-features \fIswitch\fR
63 Prints to the console features for each of the flow tables used by
64 \fIswitch\fR.
65 .TP
66 \fBdump\-table\-desc \fIswitch\fR
67 Prints to the console configuration for each of the flow tables used
68 by \fIswitch\fR for OpenFlow 1.4+.
69 .IP "\fBmod\-table \fIswitch\fR \fItable_id\fR \fIsetting\fR"
70 This command configures flow table settings for OpenFlow table
71 \fItable_id\fR within \fIswitch\fR. The available settings depend on
72 the OpenFlow version in use. In OpenFlow 1.1 and 1.2 (which must be
73 enabled with the \fB\-O\fR option) only, \fBmod\-table\fR configures
74 behavior when no flow is found when a packet is looked up in a flow
75 table. The following \fIsetting\fR values are available:
76 .RS
77 .IP \fBdrop\fR
78 Drop the packet.
79 .IP \fBcontinue\fR
80 Continue to the next table in the pipeline. (This is how an OpenFlow
81 1.0 switch always handles packets that do not match any flow, in
82 tables other than the last one.)
83 .IP \fBcontroller\fR
84 Send to controller. (This is how an OpenFlow 1.0 switch always
85 handles packets that do not match any flow in the last table.)
86 .RE
87 .IP
88 In OpenFlow 1.4 and later (which must be enabled with the \fB\-O\fR
89 option) only, \fBmod\-table\fR configures the behavior when a
90 controller attempts to add a flow to a flow table that is full. The
91 following \fIsetting\fR values are available:
92 .RS
93 .IP \fBevict\fR
94 Delete some existing flow from the flow table, according to the
95 algorithm described for the \fBFlow_Table\fR table in
96 \fBovs-vswitchd.conf.db\fR(5).
97 .IP \fBnoevict\fR
98 Refuse to add the new flow. (Eviction might still be enabled through
99 the \fBoverflow_policy\fR column in the \fBFlow_Table\fR table
100 documented in \fBovs-vswitchd.conf.db\fR(5).)
101 .IP \fBvacancy:\fIlow\fB,\fIhigh\fR
102 Enables sending vacancy events to controllers using \fBTABLE_STATUS\fR
103 messages, based on percentage thresholds \fIlow\fR and \fIhigh\fR.
104 .IP \fBnovacancy\fR
105 Disables vacancy events.
106 .RE
107 .
108 .TP
109 \fBdump\-ports \fIswitch\fR [\fInetdev\fR]
110 Prints to the console statistics for network devices associated with
111 \fIswitch\fR. If \fInetdev\fR is specified, only the statistics
112 associated with that device will be printed. \fInetdev\fR can be an
113 OpenFlow assigned port number or device name, e.g. \fBeth0\fR.
114 .
115 .IP "\fBdump\-ports\-desc \fIswitch\fR [\fIport\fR]"
116 Prints to the console detailed information about network devices
117 associated with \fIswitch\fR. To dump only a specific port, specify
118 its number as \fIport\fR. Otherwise, if \fIport\fR is omitted, or if
119 it is specified as \fBANY\fR, then all ports are printed. This is a
120 subset of the information provided by the \fBshow\fR command.
121 .IP
122 If the connection to \fIswitch\fR negotiates OpenFlow 1.0, 1.2, or
123 1.2, this command uses an OpenFlow extension only implemented in Open
124 vSwitch (version 1.7 and later).
125 .IP
126 Only OpenFlow 1.5 and later support dumping a specific port. Earlier
127 versions of OpenFlow always dump all ports.
128 .
129 .IP "\fBmod\-port \fIswitch\fR \fIport\fR \fIaction\fR"
130 Modify characteristics of port \fBport\fR in \fIswitch\fR. \fIport\fR
131 may be an OpenFlow port number or name (unless \fB\-\-no\-names\fR is
132 specified) or the keyword \fBLOCAL\fR (the
133 preferred way to refer to the OpenFlow local port). The \fIaction\fR
134 may be any one of the following:
135 .
136 .RS
137 .IQ \fBup\fR
138 .IQ \fBdown\fR
139 Enable or disable the interface. This is equivalent to \fBifconfig
140 up\fR or \fBifconfig down\fR on a Unix system.
141 .
142 .IP \fBstp\fR
143 .IQ \fBno\-stp\fR
144 Enable or disable 802.1D spanning tree protocol (STP) on the
145 interface. OpenFlow implementations that don't support STP will
146 refuse to enable it.
147 .
148 .IP \fBreceive\fR
149 .IQ \fBno\-receive\fR
150 .IQ \fBreceive\-stp\fR
151 .IQ \fBno\-receive\-stp\fR
152 Enable or disable OpenFlow processing of packets received on this
153 interface. When packet processing is disabled, packets will be
154 dropped instead of being processed through the OpenFlow table. The
155 \fBreceive\fR or \fBno\-receive\fR setting applies to all packets
156 except 802.1D spanning tree packets, which are separately controlled
157 by \fBreceive\-stp\fR or \fBno\-receive\-stp\fR.
158 .
159 .IP \fBforward\fR
160 .IQ \fBno\-forward\fR
161 Allow or disallow forwarding of traffic to this interface. By
162 default, forwarding is enabled.
163 .
164 .IP \fBflood\fR
165 .IQ \fBno\-flood\fR
166 Controls whether an OpenFlow \fBflood\fR action will send traffic out
167 this interface. By default, flooding is enabled. Disabling flooding
168 is primarily useful to prevent loops when a spanning tree protocol is
169 not in use.
170 .
171 .IP \fBpacket\-in\fR
172 .IQ \fBno\-packet\-in\fR
173 Controls whether packets received on this interface that do not match
174 a flow table entry generate a ``packet in'' message to the OpenFlow
175 controller. By default, ``packet in'' messages are enabled.
176 .RE
177 .IP
178 The \fBshow\fR command displays (among other information) the
179 configuration that \fBmod\-port\fR changes.
180 .
181 .IP "\fBget\-frags \fIswitch\fR"
182 Prints \fIswitch\fR's fragment handling mode. See \fBset\-frags\fR,
183 below, for a description of each fragment handling mode.
184 .IP
185 The \fBshow\fR command also prints the fragment handling mode among
186 its other output.
187 .
188 .IP "\fBset\-frags \fIswitch frag_mode\fR"
189 Configures \fIswitch\fR's treatment of IPv4 and IPv6 fragments. The
190 choices for \fIfrag_mode\fR are:
191 .RS
192 .IP "\fBnormal\fR"
193 Fragments pass through the flow table like non-fragmented packets.
194 The TCP ports, UDP ports, and ICMP type and code fields are always set
195 to 0, even for fragments where that information would otherwise be
196 available (fragments with offset 0). This is the default fragment
197 handling mode for an OpenFlow switch.
198 .IP "\fBdrop\fR"
199 Fragments are dropped without passing through the flow table.
200 .IP "\fBreassemble\fR"
201 The switch reassembles fragments into full IP packets before passing
202 them through the flow table. Open vSwitch does not implement this
203 fragment handling mode.
204 .IP "\fBnx\-match\fR"
205 Fragments pass through the flow table like non-fragmented packets.
206 The TCP ports, UDP ports, and ICMP type and code fields are available
207 for matching for fragments with offset 0, and set to 0 in fragments
208 with nonzero offset. This mode is a Nicira extension.
209 .RE
210 .IP
211 See the description of \fBip_frag\fR, below, for a way to match on
212 whether a packet is a fragment and on its fragment offset.
213 .
214 .TP
215 \fBdump\-flows \fIswitch \fR[\fIflows\fR]
216 Prints to the console all flow entries in \fIswitch\fR's
217 tables that match \fIflows\fR. If \fIflows\fR is omitted, all flows
218 in the switch are retrieved. See \fBFlow Syntax\fR, below, for the
219 syntax of \fIflows\fR. The output format is described in
220 \fBTable Entry Output\fR.
221 .
222 .IP
223 By default, \fBovs\-ofctl\fR prints flow entries in the same order
224 that the switch sends them, which is unlikely to be intuitive or
225 consistent. See the description of \fB\-\-sort\fR and \fB\-\-rsort\fR,
226 under \fBOPTIONS\fR below, to influence the display order.
227 .
228 .TP
229 \fBdump\-aggregate \fIswitch \fR[\fIflows\fR]
230 Prints to the console aggregate statistics for flows in
231 \fIswitch\fR's tables that match \fIflows\fR. If \fIflows\fR is omitted,
232 the statistics are aggregated across all flows in the switch's flow
233 tables. See \fBFlow Syntax\fR, below, for the syntax of \fIflows\fR.
234 The output format is described in \fBTable Entry Output\fR.
235 .
236 .IP "\fBqueue\-stats \fIswitch \fR[\fIport \fR[\fIqueue\fR]]"
237 Prints to the console statistics for the specified \fIqueue\fR on
238 \fIport\fR within \fIswitch\fR. \fIport\fR can be an OpenFlow port
239 number or name, the keyword \fBLOCAL\fR (the preferred way to refer to
240 the OpenFlow local port), or the keyword \fBALL\fR. Either of
241 \fIport\fR or \fIqueue\fR or both may be omitted (or equivalently the
242 keyword \fBALL\fR). If both are omitted, statistics are printed for
243 all queues on all ports. If only \fIqueue\fR is omitted, then
244 statistics are printed for all queues on \fIport\fR; if only
245 \fIport\fR is omitted, then statistics are printed for \fIqueue\fR on
246 every port where it exists.
247 .
248 .IP "\fBqueue\-get\-config \fIswitch [\fIport \fR[\fIqueue\fR]]"
249 Prints to the console the configuration of \fIqueue\fR on \fIport\fR
250 in \fIswitch\fR. If \fIport\fR is omitted or \fBANY\fR, reports
251 queues for all port. If \fIqueue\fR is omitted or \fBANY\fR, reports
252 all queues. For OpenFlow 1.3 and earlier, the output always includes
253 all queues, ignoring \fIqueue\fR if specified.
254 .IP
255 This command has limited usefulness, because ports often have no
256 configured queues and because the OpenFlow protocol provides only very
257 limited information about the configuration of a queue.
258 .
259 .IP "\fBdump\-ipfix\-bridge \fIswitch\fR"
260 Prints to the console the statistics of bridge IPFIX for \fIswitch\fR.
261 If bridge IPFIX is configured on the \fIswitch\fR, IPFIX statistics
262 can be retrieved. Otherwise, error message will be printed.
263 .IP
264 This command uses an Open vSwitch extension that is only in Open
265 vSwitch 2.6 and later.
266 .
267 .IP "\fBdump\-ipfix\-flow \fIswitch\fR"
268 Prints to the console the statistics of flow-based IPFIX for
269 \fIswitch\fR. If flow-based IPFIX is configured on the \fIswitch\fR,
270 statistics of all the collector set ids on the \fIswitch\fR will be
271 printed. Otherwise, print error message.
272 .IP
273 Refer to \fBovs\-vswitchd.conf.db\fR(5) for more details on configuring
274 flow based IPFIX and collector set ids.
275 .IP
276 This command uses an Open vSwitch extension that is only in Open
277 vSwitch 2.6 and later.
278 .
279 .IP "\fBct\-flush\-zone \fIswitch zone\fR
280 Flushes the connection tracking entries in \fIzone\fR on \fIswitch\fR.
281 .IP
282 This command uses an Open vSwitch extension that is only in Open
283 vSwitch 2.6 and later.
284 .
285 .SS "OpenFlow 1.1+ Group Table Commands"
286 .
287 The following commands work only with switches that support OpenFlow
288 1.1 or later. Because support for OpenFlow 1.1 and later is still
289 experimental in Open vSwitch, it is necessary to explicitly enable
290 these protocol versions in \fBovs\-ofctl\fR (using \fB\-O\fR) and in
291 the switch itself (with the \fBprotocols\fR column in the \fBBridge\fR
292 table). For more information, see ``Q: What versions of OpenFlow does
293 Open vSwitch support?'' in the Open vSwitch FAQ.
294 .
295 .IP "\fBdump\-groups \fIswitch\fR [\fIgroup\fR]"
296 Prints group entries in \fIswitch\fR's tables to console. To dump
297 only a specific group, specify its number as \fIgroup\fR. Otherwise,
298 if \fIgroup\fR is omitted, or if it is specified as \fBALL\fR, then
299 all groups are printed. Each line of output is a group entry as
300 described in \fBGroup Syntax\fR below.
301 .IP
302 Only OpenFlow 1.5 and later support dumping a specific group. Earlier
303 versions of OpenFlow always dump all groups.
304 .
305 .IP "\fBdump\-group\-features \fIswitch"
306 Prints to the console the group features of the \fIswitch\fR.
307 .
308 .IP "\fBdump\-group-stats \fIswitch \fR[\fIgroups\fR]"
309 Prints to the console statistics for the specified \fIgroups in the
310 \fIswitch\fR's tables. If \fIgroups\fR is omitted then statistics for all
311 groups are printed. See \fBGroup Syntax\fR, below, for the syntax of
312 \fIgroups\fR.
313 .
314 .SS "OpenFlow 1.3+ Switch Meter Table Commands"
315 .
316 These commands manage the meter table in an OpenFlow switch. In each
317 case, \fImeter\fR specifies a meter entry in the format described in
318 \fBMeter Syntax\fR, below.
319 .
320 .PP
321 OpenFlow 1.3 introduced support for meters, so these commands only
322 work with switches that support OpenFlow 1.3 or later. The caveats
323 described for groups in the previous section also apply to meters.
324 .
325 .IP "\fBadd\-meter \fIswitch meter\fR"
326 Add a meter entry to \fIswitch\fR's tables. The \fImeter\fR syntax is
327 described in section \fBMeter Syntax\fR, below.
328 .
329 .IP "\fBmod\-meter \fIswitch meter\fR"
330 Modify an existing meter.
331 .
332 .IP "\fBdel\-meters \fIswitch\fR"
333 .IQ "\fBdel\-meter \fIswitch\fR [\fImeter\fR]"
334 Delete entries from \fIswitch\fR's meter table. \fImeter\fR can specify
335 a single meter with syntax \fBmeter=\fIid\fR, or all meters with syntax
336 \fBmeter=all\fR.
337 .
338 .IP "\fBdump\-meters \fIswitch\fR"
339 .IQ "\fBdump\-meter \fIswitch\fR [\fImeter\fR]"
340 Print meter configuration. \fImeter\fR can specify a single meter with
341 syntax \fBmeter=\fIid\fR, or all meters with syntax \fBmeter=all\fR.
342 .
343 .IP "\fBmeter\-stats \fIswitch\fR [\fImeter\fR]"
344 Print meter statistics. \fImeter\fR can specify a single meter with
345 syntax \fBmeter=\fIid\fR, or all meters with syntax \fBmeter=all\fR.
346 .
347 .IP "\fBmeter\-features \fIswitch\fR"
348 Print meter features.
349 .
350 .SS "OpenFlow Switch Flow Table Commands"
351 .
352 These commands manage the flow table in an OpenFlow switch. In each
353 case, \fIflow\fR specifies a flow entry in the format described in
354 \fBFlow Syntax\fR, below, \fIfile\fR is a text file that contains zero
355 or more flows in the same syntax, one per line, and the optional
356 \fB\-\-bundle\fR option operates the command as a single atomic
357 transation, see option \fB\-\-bundle\fR, below.
358 .
359 .IP "[\fB\-\-bundle\fR] \fBadd\-flow \fIswitch flow\fR"
360 .IQ "[\fB\-\-bundle\fR] \fBadd\-flow \fIswitch \fB\- < \fIfile\fR"
361 .IQ "[\fB\-\-bundle\fR] \fBadd\-flows \fIswitch file\fR"
362 Add each flow entry to \fIswitch\fR's tables.
363 .
364 Each flow specification (e.g., each line in \fIfile\fR) may start with
365 \fBadd\fR, \fBmodify\fR, \fBdelete\fR, \fBmodify_strict\fR, or
366 \fBdelete_strict\fR keyword to specify whether a flow is to be added,
367 modified, or deleted, and whether the modify or delete is strict or
368 not. For backwards compatibility a flow specification without one of
369 these keywords is treated as a flow add. All flow mods are executed
370 in the order specified.
371 .
372 .IP "[\fB\-\-bundle\fR] [\fB\-\-strict\fR] \fBmod\-flows \fIswitch flow\fR"
373 .IQ "[\fB\-\-bundle\fR] [\fB\-\-strict\fR] \fBmod\-flows \fIswitch \fB\- < \fIfile\fR"
374 Modify the actions in entries from \fIswitch\fR's tables that match
375 the specified flows. With \fB\-\-strict\fR, wildcards are not treated
376 as active for matching purposes.
377 .
378 .IP "[\fB\-\-bundle\fR] \fBdel\-flows \fIswitch\fR"
379 .IQ "[\fB\-\-bundle\fR] [\fB\-\-strict\fR] \fBdel\-flows \fIswitch \fR[\fIflow\fR]"
380 .IQ "[\fB\-\-bundle\fR] [\fB\-\-strict\fR] \fBdel\-flows \fIswitch \fB\- < \fIfile\fR"
381 Deletes entries from \fIswitch\fR's flow table. With only a
382 \fIswitch\fR argument, deletes all flows. Otherwise, deletes flow
383 entries that match the specified flows. With \fB\-\-strict\fR,
384 wildcards are not treated as active for matching purposes.
385 .
386 .IP "[\fB\-\-bundle\fR] [\fB\-\-readd\fR] \fBreplace\-flows \fIswitch file\fR"
387 Reads flow entries from \fIfile\fR (or \fBstdin\fR if \fIfile\fR is
388 \fB\-\fR) and queries the flow table from \fIswitch\fR. Then it fixes
389 up any differences, adding flows from \fIflow\fR that are missing on
390 \fIswitch\fR, deleting flows from \fIswitch\fR that are not in
391 \fIfile\fR, and updating flows in \fIswitch\fR whose actions, cookie,
392 or timeouts differ in \fIfile\fR.
393 .
394 .IP
395 With \fB\-\-readd\fR, \fBovs\-ofctl\fR adds all the flows from
396 \fIfile\fR, even those that exist with the same actions, cookie, and
397 timeout in \fIswitch\fR. In OpenFlow 1.0 and 1.1, re-adding a flow
398 always resets the flow's packet and byte counters to 0, and in
399 OpenFlow 1.2 and later, it does so only if the \fBreset_counts\fR flag
400 is set.
401 .
402 .IP "\fBdiff\-flows \fIsource1 source2\fR"
403 Reads flow entries from \fIsource1\fR and \fIsource2\fR and prints the
404 differences. A flow that is in \fIsource1\fR but not in \fIsource2\fR
405 is printed preceded by a \fB\-\fR, and a flow that is in \fIsource2\fR
406 but not in \fIsource1\fR is printed preceded by a \fB+\fR. If a flow
407 exists in both \fIsource1\fR and \fIsource2\fR with different actions,
408 cookie, or timeouts, then both versions are printed preceded by
409 \fB\-\fR and \fB+\fR, respectively.
410 .IP
411 \fIsource1\fR and \fIsource2\fR may each name a file or a switch. If
412 a name begins with \fB/\fR or \fB.\fR, then it is considered to be a
413 file name. A name that contains \fB:\fR is considered to be a switch.
414 Otherwise, it is a file if a file by that name exists, a switch if
415 not.
416 .IP
417 For this command, an exit status of 0 means that no differences were
418 found, 1 means that an error occurred, and 2 means that some
419 differences were found.
420 .
421 .IP "\fBpacket\-out \fIswitch\fR \fIpacket-out\fR"
422 Connects to \fIswitch\fR and instructs it to execute the
423 \fIpacket-out\fR OpenFlow message, specified as defined in
424 \fBPacket\-Out Syntax\fR section.
425 .
426 .SS "OpenFlow Switch Group Table Commands"
427 .
428 These commands manage the group table in an OpenFlow switch. In each
429 case, \fIgroup\fR specifies a group entry in the format described in
430 \fBGroup Syntax\fR, below, and \fIfile\fR is a text file that contains
431 zero or more groups in the same syntax, one per line, and the optional
432 \fB\-\-bundle\fR option operates the command as a single atomic
433 transation, see option \fB\-\-bundle\fR, below.
434
435 .IP "[\fB\-\-bundle\fR] \fBadd\-group \fIswitch group\fR"
436 .IQ "[\fB\-\-bundle\fR] \fBadd\-group \fIswitch \fB\- < \fIfile\fR"
437 .IQ "[\fB\-\-bundle\fR] \fBadd\-groups \fIswitch file\fR"
438 Add each group entry to \fIswitch\fR's tables.
439 .
440 Each group specification (e.g., each line in \fIfile\fR) may start
441 with \fBadd\fR, \fBmodify\fR, \fBadd_or_mod\fR, \fBdelete\fR,
442 \fBinsert_bucket\fR, or \fBremove_bucket\fR keyword to specify whether
443 a flow is to be added, modified, or deleted, or whether a group bucket
444 is to be added or removed. For backwards compatibility a group
445 specification without one of these keywords is treated as a group add.
446 All group mods are executed in the order specified.
447 .
448 .IP "[\fB\-\-bundle\fR] [\fB\-\-may\-create\fR] \fBmod\-group \fIswitch group\fR"
449 .IQ "[\fB\-\-bundle\fR] [\fB\-\-may\-create\fR] \fBmod\-group \fIswitch \fB\- < \fIfile\fR"
450 Modify the action buckets in entries from \fIswitch\fR's tables for
451 each group entry. If a specified group does not already exist, then
452 without \fB\-\-may\-create\fR, this command has no effect; with
453 \fB\-\-may\-create\fR, it creates a new group. The
454 \fB\-\-may\-create\fR option uses an Open vSwitch extension to
455 OpenFlow only implemented in Open vSwitch 2.6 and later.
456 .
457 .IP "[\fB\-\-bundle\fR] \fBdel\-groups \fIswitch\fR"
458 .IQ "[\fB\-\-bundle\fR] \fBdel\-groups \fIswitch \fR[\fIgroup\fR]"
459 .IQ "[\fB\-\-bundle\fR] \fBdel\-groups \fIswitch \fB\- < \fIfile\fR"
460 Deletes entries from \fIswitch\fR's group table. With only a
461 \fIswitch\fR argument, deletes all groups. Otherwise, deletes the group
462 for each group entry.
463 .
464 .IP "[\fB\-\-bundle\fR] \fBinsert\-buckets \fIswitch group\fR"
465 .IQ "[\fB\-\-bundle\fR] \fBinsert\-buckets \fIswitch \fB\- < \fIfile\fR"
466 Add buckets to an existing group present in the \fIswitch\fR's group table.
467 If no \fIcommand_bucket_id\fR is present in the group specification then all
468 buckets of the group are removed.
469 .
470 .IP "[\fB\-\-bundle\fR] \fBremove\-buckets \fIswitch group\fR"
471 .IQ "[\fB\-\-bundle\fR] \fBremove\-buckets \fIswitch \fB\- < \fIfile\fR"
472 Remove buckets to an existing group present in the \fIswitch\fR's group table.
473 If no \fIcommand_bucket_id\fR is present in the group specification then all
474 buckets of the group are removed.
475 .
476 .SS OpenFlow Switch Bundle Command
477 .
478 Transactional updates to both flow and group tables can be made with
479 the \fBbundle\fR command. \fIfile\fR is a text file that contains
480 zero or more flow mods, group mods, or packet-outs in \fBFlow
481 Syntax\fR, \fBGroup Syntax\fR, or \fBPacket\-Out Syntax\fR, each line
482 preceded by \fBflow\fR, \fBgroup\fR, or \fBpacket\-out\fR keyword,
483 correspondingly. The \fBflow\fR keyword may be optionally followed by
484 one of the keywords \fBadd\fR, \fBmodify\fR, \fBmodify_strict\fR,
485 \fBdelete\fR, or \fBdelete_strict\fR, of which the \fBadd\fR is
486 assumed if a bare \fBflow\fR is given. Similarly, the \fBgroup\fR
487 keyword may be optionally followed by one of the keywords \fBadd\fR,
488 \fBmodify\fR, \fBadd_or_mod\fR, \fBdelete\fR, \fBinsert_bucket\fR, or
489 \fBremove_bucket\fR, of which the \fBadd\fR is assumed if a bare
490 \fBgroup\fR is given.
491 .
492 .IP "\fBbundle \fIswitch file\fR"
493 Execute all flow and group mods in \fIfile\fR as a single atomic
494 transaction against \fIswitch\fR's tables. All bundled mods are
495 executed in the order specified.
496 .
497 .SS "OpenFlow Switch Tunnel TLV Table Commands"
498 .
499 Open vSwitch maintains a mapping table between tunnel option TLVs (defined
500 by <class, type, length>) and NXM fields \fBtun_metadata\fIn\fR,
501 where \fIn\fR ranges from 0 to 63, that can be operated on for the
502 purposes of matches, actions, etc. This TLV table can be used for
503 Geneve option TLVs or other protocols with options in same TLV format
504 as Geneve options. This mapping must be explicitly specified by the user
505 through the following commands.
506
507 A TLV mapping is specified with the syntax
508 \fB{class=\fIclass\fB,type=\fItype\fB,len=\fIlength\fB}->tun_metadata\fIn\fR.
509 When an option mapping exists for a given \fBtun_metadata\fIn\fR,
510 matching on the defined field becomes possible, e.g.:
511
512 .RS
513 ovs-ofctl add-tlv-map br0 "{class=0xffff,type=0,len=4}->tun_metadata0"
514 .PP
515 ovs-ofctl add-flow br0 tun_metadata0=1234,actions=controller
516 .RE
517
518 A mapping should not be changed while it is in active
519 use by a flow. The result of doing so is undefined.
520
521 These commands are Nicira extensions to OpenFlow and require Open vSwitch
522 2.5 or later.
523
524 .IP "\fBadd\-tlv\-map \fIswitch option\fR[\fB,\fIoption\fR]..."
525 Add each \fIoption\fR to \fIswitch\fR's tables. Duplicate fields are
526 rejected.
527 .
528 .IP "\fBdel\-tlv\-map \fIswitch \fR[\fIoption\fR[\fB,\fIoption\fR]]..."
529 Delete each \fIoption\fR from \fIswitch\fR's table, or all option TLV
530 mapping if no \fIoption\fR is specified.
531 Fields that aren't mapped are ignored.
532 .
533 .IP "\fBdump\-tlv\-map \fIswitch\fR"
534 Show the currently mapped fields in the switch's option table as well
535 as switch capabilities.
536 .
537 .SS "OpenFlow Switch Monitoring Commands"
538 .
539 .IP "\fBsnoop \fIswitch\fR"
540 Connects to \fIswitch\fR and prints to the console all OpenFlow
541 messages received. Unlike other \fBovs\-ofctl\fR commands, if
542 \fIswitch\fR is the name of a bridge, then the \fBsnoop\fR command
543 connects to a Unix domain socket named
544 \fB@RUNDIR@/\fIswitch\fB.snoop\fR. \fBovs\-vswitchd\fR listens on
545 such a socket for each bridge and sends to it all of the OpenFlow
546 messages sent to or received from its configured OpenFlow controller.
547 Thus, this command can be used to view OpenFlow protocol activity
548 between a switch and its controller.
549 .IP
550 When a switch has more than one controller configured, only the
551 traffic to and from a single controller is output. If none of the
552 controllers is configured as a master or a slave (using a Nicira
553 extension to OpenFlow 1.0 or 1.1, or a standard request in OpenFlow
554 1.2 or later), then a controller is chosen arbitrarily among
555 them. If there is a master controller, it is chosen; otherwise, if
556 there are any controllers that are not masters or slaves, one is
557 chosen arbitrarily; otherwise, a slave controller is chosen
558 arbitrarily. This choice is made once at connection time and does not
559 change as controllers reconfigure their roles.
560 .IP
561 If a switch has no controller configured, or if
562 the configured controller is disconnected, no traffic is sent, so
563 monitoring will not show any traffic.
564 .
565 .IP "\fBmonitor \fIswitch\fR [\fImiss-len\fR] [\fBinvalid_ttl\fR] [\fBwatch:\fR[\fIspec\fR...]]"
566 Connects to \fIswitch\fR and prints to the console all OpenFlow
567 messages received. Usually, \fIswitch\fR should specify the name of a
568 bridge in the \fBovs\-vswitchd\fR database.
569 .IP
570 If \fImiss-len\fR is provided, \fBovs\-ofctl\fR sends an OpenFlow ``set
571 configuration'' message at connection setup time that requests
572 \fImiss-len\fR bytes of each packet that misses the flow table. Open vSwitch
573 does not send these and other asynchronous messages to an
574 \fBovs\-ofctl monitor\fR client connection unless a nonzero value is
575 specified on this argument. (Thus, if \fImiss\-len\fR is not
576 specified, very little traffic will ordinarily be printed.)
577 .IP
578 If \fBinvalid_ttl\fR is passed, \fBovs\-ofctl\fR sends an OpenFlow ``set
579 configuration'' message at connection setup time that requests
580 \fBINVALID_TTL_TO_CONTROLLER\fR, so that \fBovs\-ofctl monitor\fR can
581 receive ``packet-in'' messages when TTL reaches zero on \fBdec_ttl\fR action.
582 Only OpenFlow 1.1 and 1.2 support \fBinvalid_ttl\fR; Open vSwitch also
583 implements it for OpenFlow 1.0 as an extension.
584 .IP
585 \fBwatch:\fR[\fB\fIspec\fR...] causes \fBovs\-ofctl\fR to send a
586 ``monitor request'' Nicira extension message to the switch at
587 connection setup time. This message causes the switch to send
588 information about flow table changes as they occur. The following
589 comma-separated \fIspec\fR syntax is available:
590 .RS
591 .IP "\fB!initial\fR"
592 Do not report the switch's initial flow table contents.
593 .IP "\fB!add\fR"
594 Do not report newly added flows.
595 .IP "\fB!delete\fR"
596 Do not report deleted flows.
597 .IP "\fB!modify\fR"
598 Do not report modifications to existing flows.
599 .IP "\fB!own\fR"
600 Abbreviate changes made to the flow table by \fBovs\-ofctl\fR's own
601 connection to the switch. (These could only occur using the
602 \fBofctl/send\fR command described below under \fBRUNTIME MANAGEMENT
603 COMMANDS\fR.)
604 .IP "\fB!actions\fR"
605 Do not report actions as part of flow updates.
606 .IP "\fBtable=\fInumber\fR"
607 Limits the monitoring to the table with the given \fInumber\fR between
608 0 and 254. By default, all tables are monitored.
609 .IP "\fBout_port=\fIport\fR"
610 If set, only flows that output to \fIport\fR are monitored. The
611 \fIport\fR may be an OpenFlow port number or keyword
612 (e.g. \fBLOCAL\fR).
613 .IP "\fIfield\fB=\fIvalue\fR"
614 Monitors only flows that have \fIfield\fR specified as the given
615 \fIvalue\fR. Any syntax valid for matching on \fBdump\-flows\fR may
616 be used.
617 .RE
618 .IP
619 This command may be useful for debugging switch or controller
620 implementations. With \fBwatch:\fR, it is particularly useful for
621 observing how a controller updates flow tables.
622 .
623 .SS "OpenFlow Switch and Controller Commands"
624 .
625 The following commands, like those in the previous section, may be
626 applied to OpenFlow switches, using any of the connection methods
627 described in that section. Unlike those commands, these may also be
628 applied to OpenFlow controllers.
629 .
630 .TP
631 \fBprobe \fItarget\fR
632 Sends a single OpenFlow echo-request message to \fItarget\fR and waits
633 for the response. With the \fB\-t\fR or \fB\-\-timeout\fR option, this
634 command can test whether an OpenFlow switch or controller is up and
635 running.
636 .
637 .TP
638 \fBping \fItarget \fR[\fIn\fR]
639 Sends a series of 10 echo request packets to \fItarget\fR and times
640 each reply. The echo request packets consist of an OpenFlow header
641 plus \fIn\fR bytes (default: 64) of randomly generated payload. This
642 measures the latency of individual requests.
643 .
644 .TP
645 \fBbenchmark \fItarget n count\fR
646 Sends \fIcount\fR echo request packets that each consist of an
647 OpenFlow header plus \fIn\fR bytes of payload and waits for each
648 response. Reports the total time required. This is a measure of the
649 maximum bandwidth to \fItarget\fR for round-trips of \fIn\fR-byte
650 messages.
651 .
652 .SS "Other Commands"
653 .
654 .IP "\fBofp\-parse\fR \fIfile\fR"
655 Reads \fIfile\fR (or \fBstdin\fR if \fIfile\fR is \fB\-\fR) as a
656 series of OpenFlow messages in the binary format used on an OpenFlow
657 connection, and prints them to the console. This can be useful for
658 printing OpenFlow messages captured from a TCP stream.
659 .
660 .IP "\fBofp\-parse\-pcap\fR \fIfile\fR [\fIport\fR...]"
661 Reads \fIfile\fR, which must be in the PCAP format used by network
662 capture tools such as \fBtcpdump\fR or \fBwireshark\fR, extracts all
663 the TCP streams for OpenFlow connections, and prints the OpenFlow
664 messages in those connections in human-readable format on
665 \fBstdout\fR.
666 .IP
667 OpenFlow connections are distinguished by TCP port number.
668 Non-OpenFlow packets are ignored. By default, data on TCP ports 6633
669 and 6653 are considered to be OpenFlow. Specify one or more
670 \fIport\fR arguments to override the default.
671 .IP
672 This command cannot usefully print SSL encrypted traffic. It does not
673 understand IPv6.
674 .
675 .SS "Flow Syntax"
676 .PP
677 Some \fBovs\-ofctl\fR commands accept an argument that describes a flow or
678 flows. Such flow descriptions comprise a series of
679 \fIfield\fB=\fIvalue\fR assignments, separated by commas or white
680 space. (Embedding spaces into a flow description normally requires
681 quoting to prevent the shell from breaking the description into
682 multiple arguments.)
683 .PP
684 Flow descriptions should be in \fBnormal form\fR. This means that a
685 flow may only specify a value for an L3 field if it also specifies a
686 particular L2 protocol, and that a flow may only specify an L4 field
687 if it also specifies particular L2 and L3 protocol types. For
688 example, if the L2 protocol type \fBdl_type\fR is wildcarded, then L3
689 fields \fBnw_src\fR, \fBnw_dst\fR, and \fBnw_proto\fR must also be
690 wildcarded. Similarly, if \fBdl_type\fR or \fBnw_proto\fR (the L3
691 protocol type) is wildcarded, so must be the L4 fields \fBtcp_dst\fR and
692 \fBtcp_src\fR. \fBovs\-ofctl\fR will warn about
693 flows not in normal form.
694 .PP
695 \fBovs\-fields\fR(7) describes the supported fields and how to match
696 them. In addition to match fields, commands that operate on flows
697 accept a few additional key-value pairs:
698 .
699 .IP \fBtable=\fInumber\fR
700 For flow dump commands, limits the flows dumped to those in the table
701 with the given \fInumber\fR between 0 and 254. If not specified (or if
702 255 is specified as \fInumber\fR), then flows in all tables are
703 dumped.
704 .
705 .IP
706 For flow table modification commands, behavior varies based on the
707 OpenFlow version used to connect to the switch:
708 .
709 .RS
710 .IP "OpenFlow 1.0"
711 OpenFlow 1.0 does not support \fBtable\fR for modifying flows.
712 \fBovs\-ofctl\fR will exit with an error if \fBtable\fR (other than
713 \fBtable=255\fR) is specified for a switch that only supports OpenFlow
714 1.0.
715 .IP
716 In OpenFlow 1.0, the switch chooses the table into which to insert a
717 new flow. The Open vSwitch software switch always chooses table 0.
718 Other Open vSwitch datapaths and other OpenFlow implementations may
719 choose different tables.
720 .IP
721 The OpenFlow 1.0 behavior in Open vSwitch for modifying or removing
722 flows depends on whether \fB\-\-strict\fR is used. Without
723 \fB\-\-strict\fR, the command applies to matching flows in all tables.
724 With \fB\-\-strict\fR, the command will operate on any single matching
725 flow in any table; it will do nothing if there are matches in more
726 than one table. (The distinction between these behaviors only matters
727 if non-OpenFlow 1.0 commands were also used, because OpenFlow 1.0
728 alone cannot add flows with the same matching criteria to multiple
729 tables.)
730 .
731 .IP "OpenFlow 1.0 with table_id extension"
732 Open vSwitch implements an OpenFlow extension that allows the
733 controller to specify the table on which to operate. \fBovs\-ofctl\fR
734 automatically enables the extension when \fBtable\fR is specified and
735 OpenFlow 1.0 is used. \fBovs\-ofctl\fR automatically detects whether
736 the switch supports the extension. As of this writing, this extension
737 is only known to be implemented by Open vSwitch.
738 .
739 .IP
740 With this extension, \fBovs\-ofctl\fR operates on the requested table
741 when \fBtable\fR is specified, and acts as described for OpenFlow 1.0
742 above when no \fBtable\fR is specified (or for \fBtable=255\fR).
743 .
744 .IP "OpenFlow 1.1"
745 OpenFlow 1.1 requires flow table modification commands to specify a
746 table. When \fBtable\fR is not specified (or \fBtable=255\fR is
747 specified), \fBovs\-ofctl\fR defaults to table 0.
748 .
749 .IP "OpenFlow 1.2 and later"
750 OpenFlow 1.2 and later allow flow deletion commands, but not other
751 flow table modification commands, to operate on all flow tables, with
752 the behavior described above for OpenFlow 1.0.
753 .RE
754 .IP "\fBduration=\fR..."
755 .IQ "\fBn_packet=\fR..."
756 .IQ "\fBn_bytes=\fR..."
757 \fBovs\-ofctl\fR ignores assignments to these ``fields'' to allow
758 output from the \fBdump\-flows\fR command to be used as input for
759 other commands that parse flows.
760 .
761 .PP
762 The \fBadd\-flow\fR, \fBadd\-flows\fR, and \fBmod\-flows\fR commands
763 require an additional field, which must be the final field specified:
764 .
765 .IP \fBactions=\fR[\fIaction\fR][\fB,\fIaction\fR...]\fR
766 Specifies a comma-separated list of actions to take on a packet when the
767 flow entry matches. If no \fIaction\fR is specified, then packets
768 matching the flow are dropped. The following forms of \fIaction\fR
769 are supported:
770 .
771 .RS
772 .IP \fIport\fR
773 .IQ \fBoutput:\fIport\fR
774 Outputs the packet to OpenFlow port number \fIport\fR. If \fIport\fR
775 is the packet's input port, the packet is not output.
776 .
777 .IP \fBoutput:\fIsrc\fB[\fIstart\fB..\fIend\fB]
778 Outputs the packet to the OpenFlow port number read from \fIsrc\fR,
779 which may be an NXM field name, as described above, or a match field name.
780 \fBoutput:reg0[16..31]\fR outputs to the OpenFlow port number
781 written in the upper half of register 0. If the port number is the
782 packet's input port, the packet is not output.
783 .IP
784 This form of \fBoutput\fR was added in Open vSwitch 1.3.0. This form
785 of \fBoutput\fR uses an OpenFlow extension that is not supported by
786 standard OpenFlow switches.
787 .
788 .IP \fBoutput(port=\fIport\fR\fB,max_len=\fInbytes\fR)
789 Outputs the packet to the OpenFlow port number read from \fIport\fR,
790 with maximum packet size set to \fInbytes\fR. \fIport\fR may be OpenFlow
791 port number, \fBlocal\fR, or \fBin_port\fR. Patch port is not supported.
792 Packets larger than \fInbytes\fR will be trimmed to \fInbytes\fR while
793 packets smaller than \fInbytes\fR remains the original size.
794 .
795 .IP \fBgroup:\fIgroup_id\fR
796 Outputs the packet to the OpenFlow group \fIgroup_id\fR. OpenFlow 1.1
797 introduced support for groups; Open vSwitch 2.6 and later also
798 supports output to groups as an extension to OpenFlow 1.0. See
799 \fBGroup Syntax\fR for more details.
800 .
801 .IP \fBnormal\fR
802 Subjects the packet to the device's normal L2/L3 processing. (This
803 action is not implemented by all OpenFlow switches.)
804 .
805 .IP \fBflood\fR
806 Outputs the packet on all switch physical ports other than the port on
807 which it was received and any ports on which flooding is disabled
808 (typically, these would be ports disabled by the IEEE 802.1D spanning
809 tree protocol).
810 .
811 .IP \fBall\fR
812 Outputs the packet on all switch physical ports other than the port on
813 which it was received.
814 .
815 .IP \fBlocal\fR
816 Outputs the packet on the ``local port,'' which corresponds to the
817 network device that has the same name as the bridge.
818 .
819 .IP \fBin_port\fR
820 Outputs the packet on the port from which it was received.
821 .
822 .IP \fBcontroller(\fIkey\fB=\fIvalue\fR...\fB)
823 Sends the packet and its metadata to the OpenFlow controller as a ``packet in''
824 message. The supported key-value pairs are:
825 .RS
826 .IP "\fBmax_len=\fInbytes\fR"
827 Limit to \fInbytes\fR the number of bytes of the packet to send to
828 the controller. By default the entire packet is sent.
829 .IP "\fBreason=\fIreason\fR"
830 Specify \fIreason\fR as the reason for sending the message in the
831 ``packet in'' message. The supported reasons are \fBaction\fR (the
832 default), \fBno_match\fR, and \fBinvalid_ttl\fR.
833 .IP "\fBid=\fIcontroller-id\fR"
834 Specify \fIcontroller-id\fR, a 16-bit integer, as the connection ID of
835 the OpenFlow controller or controllers to which the ``packet in''
836 message should be sent. The default is zero. Zero is also the
837 default connection ID for each controller connection, and a given
838 controller connection will only have a nonzero connection ID if its
839 controller uses the \fBNXT_SET_CONTROLLER_ID\fR Nicira extension to
840 OpenFlow.
841 .IP "\fBuserdata=\fIhh\fR...\fR"
842 Supplies the bytes represented as hex digits \fIhh\fR as additional
843 data to the controller in the packet-in message. Pairs of hex digits
844 may be separated by periods for readability.
845 .IP "\fBpause\fR"
846 Causes the switch to freeze the packet's trip through Open vSwitch
847 flow tables and serializes that state into the packet-in message as a
848 ``continuation,'' an additional property in the \fBNXT_PACKET_IN2\fR
849 message. The controller can later send the continuation back to the
850 switch in an \fBNXT_RESUME\fR message, which will restart the packet's
851 traversal from the point where it was interrupted. This permits an
852 OpenFlow controller to interpose on a packet midway through processing
853 in Open vSwitch.
854 .
855 .RE
856 .IP
857 If any \fIreason\fR other than \fBaction\fR or any nonzero
858 \fIcontroller-id\fR is supplied, Open vSwitch extension
859 \fBNXAST_CONTROLLER\fR, supported by Open vSwitch 1.6 and later, is
860 used. If \fBuserdata\fR is supplied, then \fBNXAST_CONTROLLER2\fR,
861 supported by Open vSwitch 2.6 and later, is used.
862 .
863 .IP \fBcontroller\fR
864 .IQ \fBcontroller\fR[\fB:\fInbytes\fR]
865 Shorthand for \fBcontroller()\fR or
866 \fBcontroller(max_len=\fInbytes\fB)\fR, respectively.
867 .
868 .IP \fBenqueue(\fIport\fB,\fIqueue\fB)\fR
869 Enqueues the packet on the specified \fIqueue\fR within port
870 \fIport\fR, which must be an OpenFlow port number or keyword
871 (e.g. \fBLOCAL\fR). The number of supported queues depends on the
872 switch; some OpenFlow implementations do not support queuing at all.
873 .
874 .IP \fBdrop\fR
875 Discards the packet, so no further processing or forwarding takes place.
876 If a drop action is used, no other actions may be specified.
877 .
878 .IP \fBmod_vlan_vid\fR:\fIvlan_vid\fR
879 Modifies the VLAN id on a packet. The VLAN tag is added or modified
880 as necessary to match the value specified. If the VLAN tag is added,
881 a priority of zero is used (see the \fBmod_vlan_pcp\fR action to set
882 this).
883 .
884 .IP \fBmod_vlan_pcp\fR:\fIvlan_pcp\fR
885 Modifies the VLAN priority on a packet. The VLAN tag is added or modified
886 as necessary to match the value specified. Valid values are between 0
887 (lowest) and 7 (highest). If the VLAN tag is added, a vid of zero is used
888 (see the \fBmod_vlan_vid\fR action to set this).
889 .
890 .IP \fBstrip_vlan\fR
891 Strips the VLAN tag from a packet if it is present.
892 .
893 .IP \fBpush_vlan\fR:\fIethertype\fR
894 Push a new VLAN tag onto the packet. Ethertype is used as the Ethertype
895 for the tag. Only ethertype 0x8100 should be used. (0x88a8 which the spec
896 allows isn't supported at the moment.)
897 A priority of zero and the tag of zero are used for the new tag.
898 .
899 .IP \fBpush_mpls\fR:\fIethertype\fR
900 Changes the packet's Ethertype to \fIethertype\fR, which must be either
901 \fB0x8847\fR or \fB0x8848\fR, and pushes an MPLS LSE.
902 .IP
903 If the packet does not already contain any MPLS labels then an initial
904 label stack entry is pushed. The label stack entry's label is 2 if the
905 packet contains IPv6 and 0 otherwise, its default traffic control value is
906 the low 3 bits of the packet's DSCP value (0 if the packet is not IP), and
907 its TTL is copied from the IP TTL (64 if the packet is not IP).
908 .IP
909 If the packet does already contain an MPLS label, pushes a new
910 outermost label as a copy of the existing outermost label.
911 .IP
912 A limitation of the implementation is that processing of actions will stop
913 if \fBpush_mpls\fR follows another \fBpush_mpls\fR unless there is a
914 \fBpop_mpls\fR in between.
915 .
916 .IP \fBpop_mpls\fR:\fIethertype\fR
917 Strips the outermost MPLS label stack entry.
918 Currently the implementation restricts \fIethertype\fR to a non-MPLS Ethertype
919 and thus \fBpop_mpls\fR should only be applied to packets with
920 an MPLS label stack depth of one. A further limitation is that processing of
921 actions will stop if \fBpop_mpls\fR follows another \fBpop_mpls\fR unless
922 there is a \fBpush_mpls\fR in between.
923 .
924 .IP \fBmod_dl_src\fB:\fImac\fR
925 Sets the source Ethernet address to \fImac\fR.
926 .
927 .IP \fBmod_dl_dst\fB:\fImac\fR
928 Sets the destination Ethernet address to \fImac\fR.
929 .
930 .IP \fBmod_nw_src\fB:\fIip\fR
931 Sets the IPv4 source address to \fIip\fR.
932 .
933 .IP \fBmod_nw_dst\fB:\fIip\fR
934 Sets the IPv4 destination address to \fIip\fR.
935 .
936 .IP \fBmod_tp_src\fB:\fIport\fR
937 Sets the TCP or UDP or SCTP source port to \fIport\fR.
938 .
939 .IP \fBmod_tp_dst\fB:\fIport\fR
940 Sets the TCP or UDP or SCTP destination port to \fIport\fR.
941 .
942 .IP \fBmod_nw_tos\fB:\fItos\fR
943 Sets the DSCP bits in the IPv4 ToS/DSCP or IPv6 traffic class field to
944 \fItos\fR, which must be a multiple of 4 between 0 and 255. This action
945 does not modify the two least significant bits of the ToS field (the ECN bits).
946 .
947 .IP \fBmod_nw_ecn\fB:\fIecn\fR
948 Sets the ECN bits in the IPv4 ToS or IPv6 traffic class field to \fIecn\fR,
949 which must be a value between 0 and 3, inclusive. This action does not modify
950 the six most significant bits of the field (the DSCP bits).
951 .IP
952 Requires OpenFlow 1.1 or later.
953 .
954 .IP \fBmod_nw_ttl\fB:\fIttl\fR
955 Sets the IPv4 TTL or IPv6 hop limit field to \fIttl\fR, which is specified as
956 a decimal number between 0 and 255, inclusive. Switch behavior when setting
957 \fIttl\fR to zero is not well specified, though.
958 .IP
959 Requires OpenFlow 1.1 or later.
960 .RE
961 .IP
962 The following actions are Nicira vendor extensions that, as of this writing, are
963 only known to be implemented by Open vSwitch:
964 .
965 .RS
966 .
967 .IP \fBresubmit\fB:\fIport\fR
968 .IQ \fBresubmit\fB(\fR[\fIport\fR]\fB,\fR[\fItable\fR]\fB)
969 .IQ \fBresubmit\fB(\fR[\fIport\fR]\fB,\fR[\fItable\fR]\fB,ct)
970 Re-searches this OpenFlow flow table (or the table whose number is
971 specified by \fItable\fR) with the \fBin_port\fR field replaced by
972 \fIport\fR (if \fIport\fR is specified) and the packet 5-tuple fields
973 swapped with the corresponding conntrack original direction tuple
974 fields (if \fBct\fR is specified, see \fBct_nw_src\fR above), and
975 executes the actions found, if any, in addition to any other actions
976 in this flow entry. The \fBin_port\fR and swapped 5-tuple fields are
977 restored immediately after the search, before any actions are
978 executed.
979 .IP
980 The \fBct\fR option requires a valid connection tracking state as a
981 match prerequisite in the flow where this action is placed. Examples
982 of valid connection tracking state matches include
983 \fBct_state=+new\fR, \fBct_state=+est\fR, \fBct_state=+rel\fR, and
984 \fBct_state=+trk-inv\fR.
985 .IP
986 Recursive \fBresubmit\fR actions are obeyed up to
987 implementation-defined limits:
988 .RS
989 .IP \(bu
990 Open vSwitch 1.0.1 and earlier did not support recursion.
991 .IP \(bu
992 Open vSwitch 1.0.2 and 1.0.3 limited recursion to 8 levels.
993 .IP \(bu
994 Open vSwitch 1.1 and 1.2 limited recursion to 16 levels.
995 .IP \(bu
996 Open vSwitch 1.2 through 1.8 limited recursion to 32 levels.
997 .IP \(bu
998 Open vSwitch 1.9 through 2.0 limited recursion to 64 levels.
999 .IP \(bu
1000 Open vSwitch 2.1 through 2.5 limited recursion to 64 levels and impose
1001 a total limit of 4,096 resubmits per flow translation (earlier versions
1002 did not impose any total limit).
1003 .IP \(bu
1004 Open vSwitch 2.6 and later imposes the same limits as 2.5, with one
1005 exception: \fBresubmit\fR from table \fIx\fR to any table \fIy\fR >
1006 \fIx\fR does not count against the recursion limit.
1007 .RE
1008 .IP
1009 Open vSwitch before 1.2.90 did not support \fItable\fR. Open vSwitch
1010 before 2.7 did not support \fBct\fR.
1011 .
1012 .IP \fBset_tunnel\fB:\fIid\fR
1013 .IQ \fBset_tunnel64\fB:\fIid\fR
1014 If outputting to a port that encapsulates the packet in a tunnel and
1015 supports an identifier (such as GRE), sets the identifier to \fIid\fR.
1016 If the \fBset_tunnel\fR form is used and \fIid\fR fits in 32 bits,
1017 then this uses an action extension that is supported by Open vSwitch
1018 1.0 and later. Otherwise, if \fIid\fR is a 64-bit value, it requires
1019 Open vSwitch 1.1 or later.
1020 .
1021 .IP \fBset_queue\fB:\fIqueue\fR
1022 Sets the queue that should be used to \fIqueue\fR when packets are
1023 output. The number of supported queues depends on the switch; some
1024 OpenFlow implementations do not support queuing at all.
1025 .
1026 .IP \fBpop_queue\fR
1027 Restores the queue to the value it was before any \fBset_queue\fR
1028 actions were applied.
1029 .
1030 .IP \fBct\fR
1031 .IQ \fBct\fB(\fR[\fIargument\fR][\fB,\fIargument\fR...]\fB)
1032 Send the packet through the connection tracker. Refer to the \fBct_state\fR
1033 documentation above for possible packet and connection states. The following
1034 arguments are supported:
1035
1036 .RS
1037 .IP \fBcommit\fR
1038 .RS
1039 Commit the connection to the connection tracking module. Information about the
1040 connection will be stored beyond the lifetime of the packet in the pipeline.
1041 Some \fBct_state\fR flags are only available for committed connections.
1042 .RE
1043 .IP \fBforce\fR
1044 .RS
1045 A committed connection always has the directionality of the packet
1046 that caused the connection to be committed in the first place. This
1047 is the ``original direction'' of the connection, and the opposite
1048 direction is the ``reply direction''. If a connection is already
1049 committed, but it is in the wrong direction, \fBforce\fR flag may be
1050 used in addition to \fBcommit\fR flag to effectively terminate the
1051 existing connection and start a new one in the current direction.
1052 This flag has no effect if the original direction of the connection is
1053 already the same as that of the current packet.
1054 .RE
1055 .IP \fBtable=\fInumber\fR
1056 Fork pipeline processing in two. The original instance of the packet will
1057 continue processing the current actions list as an untracked packet. An
1058 additional instance of the packet will be sent to the connection tracker, which
1059 will be re-injected into the OpenFlow pipeline to resume processing in table
1060 \fInumber\fR, with the \fBct_state\fR and other ct match fields set. If the
1061 \fBtable\fR is not specified, then the packet which is submitted to the
1062 connection tracker is not re-injected into the OpenFlow pipeline. It is
1063 strongly recommended to specify a table later than the current table to prevent
1064 loops.
1065 .IP \fBzone=\fIvalue\fR
1066 .IQ \fBzone=\fIsrc\fB[\fIstart\fB..\fIend\fB]\fR
1067 A 16-bit context id that can be used to isolate connections into separate
1068 domains, allowing overlapping network addresses in different zones. If a zone
1069 is not provided, then the default is to use zone zero. The \fBzone\fR may be
1070 specified either as an immediate 16-bit \fIvalue\fR, or may be provided from an
1071 NXM field \fIsrc\fR. The \fIstart\fR and \fIend\fR pair are inclusive, and must
1072 specify a 16-bit range within the field. This value is copied to the
1073 \fBct_zone\fR match field for packets which are re-injected into the pipeline
1074 using the \fBtable\fR option.
1075 .IP \fBexec\fB(\fR[\fIaction\fR][\fB,\fIaction\fR...]\fB)\fR
1076 Perform actions within the context of connection tracking. This is a restricted
1077 set of actions which are in the same format as their specifications as part
1078 of a flow. Only actions which modify the \fBct_mark\fR or \fBct_label\fR
1079 fields are accepted within the \fBexec\fR action, and these fields may only be
1080 modified with this option. For example:
1081 .
1082 .RS
1083 .IP \fBset_field:\fIvalue\fR[\fB/\fImask\fR]->ct_mark\fR
1084 Store a 32-bit metadata value with the connection. Subsequent lookups
1085 for packets in this connection will populate the \fBct_mark\fR flow
1086 field when the packet is sent to the connection tracker with the
1087 \fBtable\fR specified.
1088 .IP \fBset_field:\fIvalue\fR[\fB/\fImask\fR]->ct_label\fR
1089 Store a 128-bit metadata value with the connection. Subsequent
1090 lookups for packets in this connection will populate the
1091 \fBct_label\fR flow field when the packet is sent to the connection
1092 tracker with the \fBtable\fR specified.
1093 .RE
1094 .IP
1095 The \fBcommit\fR parameter must be specified to use \fBexec(...)\fR.
1096 .
1097 .IP \fBalg=\fIalg\fR
1098 Specify application layer gateway \fIalg\fR to track specific connection
1099 types. If subsequent related connections are sent through the \fBct\fR
1100 action, then the \fBrel\fR flag in the \fBct_state\fR field will be set.
1101 Supported types include:
1102 .RS
1103 .IP \fBftp\fR
1104 Look for negotiation of FTP data connections. Specify this option for FTP
1105 control connections to detect related data connections and populate the
1106 \fBrel\fR flag for the data connections.
1107 .
1108 .IP \fBtftp\fR
1109 Look for negotiation of TFTP data connections. Specify this option for TFTP
1110 control connections to detect related data connections and populate the
1111 \fBrel\fR flag for the data connections.
1112 .RE
1113 .
1114 .IP
1115 The \fBcommit\fR parameter must be specified to use \fBalg=\fIalg\fR.
1116 .
1117 .IP
1118 When committing related connections, the \fBct_mark\fR for that connection is
1119 inherited from the current \fBct_mark\fR stored with the original connection
1120 (ie, the connection created by \fBct(alg=...)\fR).
1121 .
1122 .IP
1123 Note that with the Linux datapath, global sysctl options affect the usage of
1124 the \fBct\fR action. In particular, if \fBnet.netfilter.nf_conntrack_helper\fR
1125 is enabled then application layer gateway helpers may be executed even if the
1126 \fBalg\fR option is not specified. This is the default setting until Linux 4.7.
1127 For security reasons, the netfilter team recommends users to disable this
1128 option. See this blog post for further details:
1129 .
1130 http://www.netfilter.org/news.html#2012-04-03
1131 .
1132 .IP \fBnat\fR[\fB(\fR(\fBsrc\fR|\fBdst\fR)\fB=\fIaddr1\fR[\fB-\fIaddr2\fR][\fB:\fIport1\fR[\fB-\fIport2\fR]][\fB,\fIflags\fR]\fB)\fR]
1133 .
1134 Specify address and port translation for the connection being tracked.
1135 For new connections either \fBsrc\fR or \fBdst\fR argument must be
1136 provided to set up either source address/port translation (SNAT) or
1137 destination address/port translation (DNAT), respectively. Setting up
1138 address translation for a new connection takes effect only if the
1139 \fBcommit\fR flag is also provided for the enclosing \fBct\fR action.
1140 A bare \fBnat\fR action will only translate the packet being processed
1141 in the way the connection has been set up with an earlier \fBct\fR
1142 action. Also a \fBnat\fR action with \fBsrc\fR or \fBdst\fR, when
1143 applied to a packet belonging to an established (rather than new)
1144 connection, will behave the same as a bare \fBnat\fR.
1145 .IP
1146 \fBsrc\fR and \fBdst\fR options take the following arguments:
1147 .RS
1148 .IP \fIaddr1\fR[\fB-\fIaddr2\fR]
1149 The address range from which the translated address should be
1150 selected. If only one address is given, then that address will always
1151 be selected, otherwise the address selection can be informed by the
1152 optional \fBpersistent\fR flag as described below. Either IPv4 or
1153 IPv6 addresses can be provided, but both addresses must be of the same
1154 type, and the datapath behavior is undefined in case of providing IPv4
1155 address range for an IPv6 packet, or IPv6 address range for an IPv4
1156 packet. IPv6 addresses must be bracketed with '[' and ']' if a port
1157 range is also given.
1158 .RE
1159 .
1160 .RS
1161 .IP \fIport1\fR[\fB-\fIport2\fR]
1162 The port range from which the translated port should be selected. If
1163 only one port number is provided, then that should be selected. In
1164 case of a mapping conflict the datapath may choose any other
1165 non-conflicting port number instead, even when no port range is
1166 specified. The port number selection can be informed by the optional
1167 \fBrandom\fR and \fBhash\fR flags as described below.
1168 .RE
1169 .IP
1170 The optional flags are:
1171 .RS
1172 .IP \fBrandom\fR
1173 The selection of the port from the given range should be done using a
1174 fresh random number. This flag is mutually exclusive with \fBhash\fR.
1175 .RE
1176 .
1177 .RS
1178 .IP \fBhash\fR
1179 The selection of the port from the given range should be done using a
1180 datapath specific hash of the packet's IP addresses and the other,
1181 non-mapped port number. This flag is mutually exclusive with
1182 \fBrandom\fR.
1183 .RE
1184 .
1185 .RS
1186 .IP \fBpersistent\fR
1187 The selection of the IP address from the given range should be done so
1188 that the same mapping can be provided after the system restarts.
1189 .RE
1190 .IP
1191 If an \fBalg\fR is specified for the committing \fBct\fR action that
1192 also includes \fBnat\fR with a \fBsrc\fR or \fBdst\fR attribute,
1193 then the datapath tries to set up the helper to be NAT aware. This
1194 functionality is datapath specific and may not be supported by all
1195 datapaths.
1196 .IP
1197 \fBnat\fR was introduced in Open vSwitch 2.6. The first datapath that
1198 implements \fBct nat\fR support is the one that ships with Linux 4.6.
1199 .RE
1200 .IP
1201 The \fBct\fR action may be used as a primitive to construct stateful firewalls
1202 by selectively committing some traffic, then matching the \fBct_state\fR to
1203 allow established connections while denying new connections. The following
1204 flows provide an example of how to implement a simple firewall that allows new
1205 connections from port 1 to port 2, and only allows established connections to
1206 send traffic from port 2 to port 1:
1207 \fBtable=0,priority=1,action=drop
1208 table=0,priority=10,arp,action=normal
1209 table=0,priority=100,ip,ct_state=-trk,action=ct(table=1)
1210 table=1,in_port=1,ip,ct_state=+trk+new,action=ct(commit),2
1211 table=1,in_port=1,ip,ct_state=+trk+est,action=2
1212 table=1,in_port=2,ip,ct_state=+trk+new,action=drop
1213 table=1,in_port=2,ip,ct_state=+trk+est,action=1\fR
1214 .IP
1215 If \fBct\fR is executed on IP (or IPv6) fragments, then the message is
1216 implicitly reassembled before sending to the connection tracker and
1217 refragmented upon \fBoutput\fR, to the original maximum received fragment size.
1218 Reassembly occurs within the context of the \fBzone\fR, meaning that IP
1219 fragments in different zones are not assembled together. Pipeline processing
1220 for the initial fragments is halted; When the final fragment is received, the
1221 message is assembled and pipeline processing will continue for that flow.
1222 Because packet ordering is not guaranteed by IP protocols, it is not possible
1223 to determine which IP fragment will cause message reassembly (and therefore
1224 continue pipeline processing). As such, it is strongly recommended that
1225 multiple flows should not execute \fBct\fR to reassemble fragments from the
1226 same IP message.
1227 .IP
1228 Currently, connection tracking is only available on Linux kernels with the
1229 nf_conntrack module loaded. The \fBct\fR action was introduced in Open vSwitch
1230 2.5.
1231 .
1232 .IP \fBct_clear\fR
1233 Clears connection tracking state from the flow, zeroing
1234 \fBct_state\fR, \fBct_zone\fR, \fBct_mark\fR, and \fBct_label\fR.
1235 .IP
1236 This action was introduced in Open vSwitch 2.6.90.
1237 .
1238 .IP \fBdec_ttl\fR
1239 .IQ \fBdec_ttl(\fIid1\fR[\fB,\fIid2\fR]...\fB)\fR
1240 Decrement TTL of IPv4 packet or hop limit of IPv6 packet. If the
1241 TTL or hop limit is initially zero or decrementing would make it so, no
1242 decrement occurs, as packets reaching TTL zero must be rejected. Instead,
1243 a ``packet-in'' message with reason code \fBOFPR_INVALID_TTL\fR is
1244 sent to each connected controller that has enabled receiving them,
1245 if any. Processing the current set of actions then stops. However,
1246 if the current set of actions was reached through ``resubmit'' then
1247 remaining actions in outer levels resume processing.
1248 .IP
1249 This action also optionally supports the ability to specify a list of
1250 valid controller ids. Each of the controllers in the list will receive
1251 the ``packet_in'' message only if they have registered to receive the
1252 invalid ttl packets. If controller ids are not specified, the
1253 ``packet_in'' message will be sent only to the controllers having
1254 controller id zero which have registered for the invalid ttl packets.
1255 .
1256 .IP \fBset_mpls_label\fR:\fIlabel\fR
1257 Set the label of the outer MPLS label stack entry of a packet.
1258 \fIlabel\fR should be a 20-bit value that is decimal by default;
1259 use a \fB0x\fR prefix to specify them in hexadecimal.
1260 .
1261 .IP \fBset_mpls_tc\fR:\fItc\fR
1262 Set the traffic-class of the outer MPLS label stack entry of a packet.
1263 \fItc\fR should be a in the range 0 to 7 inclusive.
1264 .
1265 .IP \fBset_mpls_ttl\fR:\fIttl\fR
1266 Set the TTL of the outer MPLS label stack entry of a packet.
1267 \fIttl\fR should be in the range 0 to 255 inclusive.
1268 .
1269 .IP \fBdec_mpls_ttl\fR
1270 Decrement TTL of the outer MPLS label stack entry of a packet. If the TTL
1271 is initially zero or decrementing would make it so, no decrement occurs.
1272 Instead, a ``packet-in'' message with reason code \fBOFPR_INVALID_TTL\fR
1273 is sent to the main controller (id zero), if it has enabled receiving them.
1274 Processing the current set of actions then stops. However, if the current
1275 set of actions was reached through ``resubmit'' then remaining actions in
1276 outer levels resume processing.
1277 .
1278 .IP \fBnote:\fR[\fIhh\fR]...
1279 Does nothing at all. Any number of bytes represented as hex digits
1280 \fIhh\fR may be included. Pairs of hex digits may be separated by
1281 periods for readability.
1282 The \fBnote\fR action's format doesn't include an exact length for its
1283 payload, so the provided bytes will be padded on the right by enough
1284 bytes with value 0 to make the total number 6 more than a multiple of
1285 8.
1286 .
1287 .IP "\fBmove:\fIsrc\fB[\fIstart\fB..\fIend\fB]\->\fIdst\fB[\fIstart\fB..\fIend\fB]\fR"
1288 Copies the named bits from field \fIsrc\fR to field \fIdst\fR.
1289 \fIsrc\fR and \fIdst\fR may be NXM field names as defined in
1290 \fBnicira\-ext.h\fR, e.g. \fBNXM_OF_UDP_SRC\fR or \fBNXM_NX_REG0\fR,
1291 or a match field name, e.g. \fBreg0\fR. Each
1292 \fIstart\fR and \fIend\fR pair, which are inclusive, must specify the
1293 same number of bits and must fit within its respective field.
1294 Shorthands for \fB[\fIstart\fB..\fIend\fB]\fR exist: use
1295 \fB[\fIbit\fB]\fR to specify a single bit or \fB[]\fR to specify an
1296 entire field (in the latter case the brackets can also be left off).
1297 .IP
1298 Examples: \fBmove:NXM_NX_REG0[0..5]\->NXM_NX_REG1[26..31]\fR copies the
1299 six bits numbered 0 through 5, inclusive, in register 0 into bits 26
1300 through 31, inclusive;
1301 \fBmove:reg0[0..15]\->vlan_tci\fR copies the least
1302 significant 16 bits of register 0 into the VLAN TCI field.
1303 .IP
1304 In OpenFlow 1.0 through 1.4, \fBmove\fR ordinarily uses an Open
1305 vSwitch extension to OpenFlow. In OpenFlow 1.5, \fBmove\fR uses the
1306 OpenFlow 1.5 standard \fBcopy_field\fR action. The ONF has
1307 also made \fBcopy_field\fR available as an extension to OpenFlow 1.3.
1308 Open vSwitch 2.4 and later understands this extension and uses it if a
1309 controller uses it, but for backward compatibility with older versions
1310 of Open vSwitch, \fBovs\-ofctl\fR does not use it.
1311 .
1312 .IP "\fBset_field:\fIvalue\fR[/\fImask\fR]\fB\->\fIdst"
1313 .IQ "\fBload:\fIvalue\fB\->\fIdst\fB[\fIstart\fB..\fIend\fB]"
1314 Loads a literal value into a field or part of a field. With
1315 \fBset_field\fR, \fBvalue\fR and the optional \fBmask\fR are given in
1316 the customary syntax for field \fIdst\fR, which is expressed as a
1317 field name. For example, \fBset_field:00:11:22:33:44:55->eth_src\fR
1318 sets the Ethernet source address to 00:11:22:33:44:55. With
1319 \fBload\fR, \fIvalue\fR must be an integer value (in decimal or
1320 prefixed by \fB0x\fR for hexadecimal) and \fIdst\fR can also be the
1321 NXM or OXM name for the field. For example,
1322 \fBload:0x001122334455->OXM_OF_ETH_SRC[]\fR has the same effect as the
1323 prior \fBset_field\fR example.
1324 .IP
1325 The two forms exist for historical reasons. Open vSwitch 1.1
1326 introduced \fBNXAST_REG_LOAD\fR as a Nicira extension to OpenFlow 1.0
1327 and used \fBload\fR to express it. Later, OpenFlow 1.2 introduced a
1328 standard \fBOFPAT_SET_FIELD\fR action that was restricted to loading
1329 entire fields, so Open vSwitch added the form \fBset_field\fR with
1330 this restriction. OpenFlow 1.5 extended \fBOFPAT_SET_FIELD\fR to the
1331 point that it became a superset of \fBNXAST_REG_LOAD\fR. Open vSwitch
1332 translates either syntax as necessary for the OpenFlow version in use:
1333 in OpenFlow 1.0 and 1.1, \fBNXAST_REG_LOAD\fR; in OpenFlow 1.2, 1.3,
1334 and 1.4, \fBNXAST_REG_LOAD\fR for \fBload\fR or for loading a
1335 subfield, \fBOFPAT_SET_FIELD\fR otherwise; and OpenFlow 1.5 and later,
1336 \fBOFPAT_SET_FIELD\fR.
1337 .
1338 .IP "\fBpush:\fIsrc\fB[\fIstart\fB..\fIend\fB]"
1339 Pushes \fIstart\fR to \fIend\fR bits inclusive, in fields
1340 on top of the stack.
1341 .IP
1342 Example: \fBpush:NXM_NX_REG2[0..5]\fR or \fBpush:reg2[0..5]\fR push
1343 the value stored in register 2 bits 0 through 5, inclusive, on to the
1344 internal stack.
1345 .
1346 .IP "\fBpop:\fIdst\fB[\fIstart\fB..\fIend\fB]"
1347 Pops from the top of the stack, retrieves the \fIstart\fR to \fIend\fR bits
1348 inclusive, from the value popped and store them into the corresponding
1349 bits in \fIdst\fR.
1350 .
1351 .IP
1352 Example: \fBpop:NXM_NX_REG2[0..5]\fR or \fBpop:reg2[0..5]\fR pops the
1353 value from top of the stack. Set register 2 bits 0 through 5,
1354 inclusive, based on bits 0 through 5 from the value just popped.
1355 .
1356 .
1357 .IP "\fBmultipath(\fIfields\fB, \fIbasis\fB, \fIalgorithm\fB, \fIn_links\fB, \fIarg\fB, \fIdst\fB[\fIstart\fB..\fIend\fB])\fR"
1358 Hashes \fIfields\fR using \fIbasis\fR as a universal hash parameter,
1359 then the applies multipath link selection \fIalgorithm\fR (with
1360 parameter \fIarg\fR) to choose one of \fIn_links\fR output links
1361 numbered 0 through \fIn_links\fR minus 1, and stores the link into
1362 \fIdst\fB[\fIstart\fB..\fIend\fB]\fR, which must be an NXM field as
1363 described above.
1364 .IP
1365 \fIfields\fR must be one of the following:
1366 .RS
1367 .IP \fBeth_src\fR
1368 Hashes Ethernet source address only.
1369 .IP \fBsymmetric_l4\fR
1370 Hashes Ethernet source, destination, and type, VLAN ID, IPv4/IPv6
1371 source, destination, and protocol, and TCP or SCTP (but not UDP)
1372 ports. The hash is computed so that pairs of corresponding flows in
1373 each direction hash to the same value, in environments where L2 paths
1374 are the same in each direction. UDP ports are not included in the
1375 hash to support protocols such as VXLAN that use asymmetric ports in
1376 each direction.
1377 .IP \fBsymmetric_l3l4\fR
1378 Hashes IPv4/IPv6 source, destination, and protocol, and TCP or SCTP
1379 (but not UDP) ports. Like \fBsymmetric_l4\fR, this is a symmetric
1380 hash, but by excluding L2 headers it is more effective in environments
1381 with asymmetric L2 paths (e.g. paths involving VRRP IP addresses on a
1382 router). Not an effective hash function for protocols other than IPv4
1383 and IPv6, which hash to a constant zero.
1384 .IP \fBsymmetric_l3l4+udp\fR
1385 Like \fBsymmetric_l3l4+udp\fR, but UDP ports are included in the hash.
1386 This is a more effective hash when asymmetric UDP protocols such as
1387 VXLAN are not a consideration.
1388 .IP \fBnw_src\fR
1389 Hashes Network source address only.
1390 .IP \fBnw_dst\fR
1391 Hashes Network destination address only.
1392 .RE
1393 .IP
1394 \fIalgorithm\fR must be one of \fBmodulo_n\fR,
1395 \fBhash_threshold\fR, \fBhrw\fR, and \fBiter_hash\fR. Only
1396 the \fBiter_hash\fR algorithm uses \fIarg\fR.
1397 .IP
1398 Refer to \fBnicira\-ext.h\fR for more details.
1399 .
1400 .IP "\fBbundle(\fIfields\fB, \fIbasis\fB, \fIalgorithm\fB, \fIslave_type\fB, slaves:[\fIs1\fB, \fIs2\fB, ...])\fR"
1401 Hashes \fIfields\fR using \fIbasis\fR as a universal hash parameter, then
1402 applies the bundle link selection \fIalgorithm\fR to choose one of the listed
1403 slaves represented as \fIslave_type\fR. Currently the only supported
1404 \fIslave_type\fR is \fBofport\fR. Thus, each \fIs1\fR through \fIsN\fR should
1405 be an OpenFlow port number. Outputs to the selected slave.
1406 .IP
1407 Currently, \fIfields\fR must be either \fBeth_src\fR, \fBsymmetric_l4\fR, \fBsymmetric_l3l4\fR, \fBsymmetric_l3l4+udp\fR,
1408 \fBnw_src\fR, or \fBnw_dst\fR, and \fIalgorithm\fR must be one of \fBhrw\fR and \fBactive_backup\fR.
1409 .IP
1410 Example: \fBbundle(eth_src,0,hrw,ofport,slaves:4,8)\fR uses an Ethernet source
1411 hash with basis 0, to select between OpenFlow ports 4 and 8 using the Highest
1412 Random Weight algorithm.
1413 .IP
1414 Refer to \fBnicira\-ext.h\fR for more details.
1415 .
1416 .IP "\fBbundle_load(\fIfields\fB, \fIbasis\fB, \fIalgorithm\fB, \fIslave_type\fB, \fIdst\fB[\fIstart\fB..\fIend\fB], slaves:[\fIs1\fB, \fIs2\fB, ...])\fR"
1417 Has the same behavior as the \fBbundle\fR action, with one exception. Instead
1418 of outputting to the selected slave, it writes its selection to
1419 \fIdst\fB[\fIstart\fB..\fIend\fB]\fR, which must be an NXM field as described
1420 above.
1421 .IP
1422 Example: \fBbundle_load(eth_src, 0, hrw, ofport, NXM_NX_REG0[],
1423 slaves:4, 8)\fR uses an Ethernet source hash with basis 0, to select
1424 between OpenFlow ports 4 and 8 using the Highest Random Weight
1425 algorithm, and writes the selection to \fBNXM_NX_REG0[]\fR. Also the
1426 match field name can be used, for example, instead of 'NXM_NX_REG0'
1427 the name 'reg0' can be used. When the while field is indicated the
1428 empty brackets can also be left off.
1429 .IP
1430 Refer to \fBnicira\-ext.h\fR for more details.
1431 .
1432 .IP "\fBlearn(\fIargument\fR[\fB,\fIargument\fR]...\fB)\fR"
1433 This action adds or modifies a flow in an OpenFlow table, similar to
1434 \fBovs\-ofctl \-\-strict mod\-flows\fR. The arguments specify the
1435 flow's match fields, actions, and other properties, as follows. At
1436 least one match criterion and one action argument should ordinarily be
1437 specified.
1438 .RS
1439 .IP \fBidle_timeout=\fIseconds\fR
1440 .IQ \fBhard_timeout=\fIseconds\fR
1441 .IQ \fBpriority=\fIvalue\fR
1442 .IQ \fBcookie=\fIvalue\fR
1443 .IQ \fBsend_flow_rem\fR
1444 These arguments have the same meaning as in the usual \fBovs\-ofctl\fR
1445 flow syntax.
1446 .
1447 .IP \fBfin_idle_timeout=\fIseconds\fR
1448 .IQ \fBfin_hard_timeout=\fIseconds\fR
1449 Adds a \fBfin_timeout\fR action with the specified arguments to the
1450 new flow. This feature was added in Open vSwitch 1.5.90.
1451 .
1452 .IP \fBtable=\fInumber\fR
1453 The table in which the new flow should be inserted. Specify a decimal
1454 number between 0 and 254. The default, if \fBtable\fR is unspecified,
1455 is table 1.
1456 .
1457 .IP \fBdelete_learned\fR
1458 This flag enables deletion of the learned flows when the flow with the
1459 \fBlearn\fR action is removed. Specifically, when the last
1460 \fBlearn\fR action with this flag and particular \fBtable\fR and
1461 \fBcookie\fR values is removed, the switch deletes all of the flows in
1462 the specified table with the specified cookie.
1463 .
1464 .IP
1465 This flag was added in Open vSwitch 2.4.
1466 .
1467 .IP \fBlimit=\fInumber\fR
1468 If the number of flows in table \fBtable\fR with cookie id \fBcookie\fR exceeds
1469 \fInumber\fR, a new flow will not be learned by this action. By default
1470 there's no limit. limit=0 is a long-hand for no limit.
1471 .
1472 .IP
1473 This flag was added in Open vSwitch 2.8.
1474 .
1475 .IP \fBresult_dst=\fIfield\fB[\fIbit\fB]\fR
1476 If learning failed (because the number of flows exceeds \fBlimit\fR),
1477 the action sets \fIfield\fB[\fIbit\fB]\fR to 0, otherwise it will be set to 1.
1478 \fIfield\fB[\fIbit\fB]\fR must be a single bit.
1479 .
1480 .IP
1481 This flag was added in Open vSwitch 2.8.
1482 .
1483 .IP \fIfield\fB=\fIvalue\fR
1484 .IQ \fIfield\fB[\fIstart\fB..\fIend\fB]=\fIsrc\fB[\fIstart\fB..\fIend\fB]\fR
1485 .IQ \fIfield\fB[\fIstart\fB..\fIend\fB]\fR
1486 Adds a match criterion to the new flow.
1487 .IP
1488 The first form specifies that \fIfield\fR must match the literal
1489 \fIvalue\fR, e.g. \fBdl_type=0x0800\fR. All of the fields and values
1490 for \fBovs\-ofctl\fR flow syntax are available with their usual
1491 meanings. Shorthand notation matchers (e.g. \fBip\fR in place of
1492 \fBdl_type=0x0800\fR) are not currently implemented.
1493 .IP
1494 The second form specifies that \fIfield\fB[\fIstart\fB..\fIend\fB]\fR
1495 in the new flow must match \fIsrc\fB[\fIstart\fB..\fIend\fB]\fR taken
1496 from the flow currently being processed.
1497 For example, \fINXM_OF_UDP_DST\fB[]\fR=\fINXM_OF_UDP_SRC\fB[]\fR on a
1498 TCP packet for which the UDP src port is \fB53\fR, creates a flow which
1499 matches \fINXM_OF_UDP_DST\fB[]\fR=\fB53\fR.
1500 .IP
1501 The third form is a shorthand for the second form. It specifies that
1502 \fIfield\fB[\fIstart\fB..\fIend\fB]\fR in the new flow must match the same
1503 \fIfield\fB[\fIstart\fB..\fIend\fB]\fR taken from the flow currently
1504 being processed.
1505 For example, \fINXM_OF_TCP_DST\fB[]\fR on a TCP packet
1506 for which the TCP dst port is \fB80\fR, creates a flow which
1507 matches \fINXM_OF_TCP_DST\fB[]\fR=\fB80\fR.
1508 .
1509 .IP \fBload:\fIvalue\fB\->\fIdst\fB[\fIstart\fB..\fIend\fB]
1510 .IQ \fBload:\fIsrc\fB[\fIstart\fB..\fIend\fB]\->\fIdst\fB[\fIstart\fB..\fIend\fB]
1511 .
1512 Adds a \fBload\fR action to the new flow.
1513 .IP
1514 The first form loads the literal \fIvalue\fR into bits \fIstart\fR
1515 through \fIend\fR, inclusive, in field \fIdst\fR. Its syntax is the
1516 same as the \fBload\fR action described earlier in this section.
1517 .IP
1518 The second form loads \fIsrc\fB[\fIstart\fB..\fIend\fB]\fR, a value
1519 from the flow currently being processed, into bits \fIstart\fR
1520 through \fIend\fR, inclusive, in field \fIdst\fR.
1521 .
1522 .IP \fBoutput:\fIfield\fB[\fIstart\fB..\fIend\fB]\fR
1523 Add an \fBoutput\fR action to the new flow's actions, that outputs to
1524 the OpenFlow port taken from \fIfield\fB[\fIstart\fB..\fIend\fB]\fR,
1525 which must be an NXM field as described above.
1526 .RE
1527 .IP
1528 For best performance, segregate learned flows into a table (using
1529 \fBtable=\fInumber\fR) that is not used for any other flows except
1530 possibly for a lowest-priority ``catch-all'' flow, that is, a flow
1531 with no match criteria. (This is why the default \fBtable\fR is 1, to
1532 keep the learned flows separate from the primary flow table 0.)
1533 .RE
1534 .
1535 .RS
1536 .
1537 .IP \fBclear_actions\fR
1538 Clears all the actions in the action set immediately.
1539 .
1540 .IP \fBwrite_actions(\fR[\fIaction\fR][\fB,\fIaction\fR...]\fB)
1541 Add the specific actions to the action set. The syntax of
1542 \fIactions\fR is the same as in the \fBactions=\fR field. The action
1543 set is carried between flow tables and then executed at the end of the
1544 pipeline.
1545 .
1546 .IP
1547 The actions in the action set are applied in the following order, as
1548 required by the OpenFlow specification, regardless of the order in
1549 which they were added to the action set. Except as specified
1550 otherwise below, the action set only holds at most a single action of
1551 each type. When more than one action of a single type is written to
1552 the action set, the one written later replaces the earlier action:
1553 .
1554 .RS
1555 .IP 1.
1556 \fBstrip_vlan\fR
1557 .IQ
1558 \fBpop_mpls\fR
1559 .
1560 .IP 2.
1561 \fBpush_mpls\fR
1562 .
1563 .IP 3.
1564 \fBpush_vlan\fR
1565 .
1566 .IP 4.
1567 \fBdec_ttl\fR
1568 .IQ
1569 \fBdec_mpls_ttl\fR
1570 .
1571 .IP 5.
1572 \fBload\fR
1573 .IQ
1574 \fBmove\fR
1575 .IQ
1576 \fBmod_dl_dst\fR
1577 .IQ
1578 \fBmod_dl_src\fR
1579 .IQ
1580 \fBmod_nw_dst\fR
1581 .IQ
1582 \fBmod_nw_src\fR
1583 .IQ
1584 \fBmod_nw_tos\fR
1585 .IQ
1586 \fBmod_nw_ecn\fR
1587 .IQ
1588 \fBmod_nw_ttl\fR
1589 .IQ
1590 \fBmod_tp_dst\fR
1591 .IQ
1592 \fBmod_tp_src\fR
1593 .IQ
1594 \fBmod_vlan_pcp\fR
1595 .IQ
1596 \fBmod_vlan_vid\fR
1597 .IQ
1598 \fBset_field\fR
1599 .IQ
1600 \fBset_tunnel\fR
1601 .IQ
1602 \fBset_tunnel64\fR
1603 .IQ
1604 The action set can contain any number of these actions, with
1605 cumulative effect. They will be applied in the order as added.
1606 That is, when multiple actions modify the same part of a field,
1607 the later modification takes effect, and when they modify
1608 different parts of a field (or different fields), then both
1609 modifications are applied.
1610 .
1611 .IP 6.
1612 \fBset_queue\fR
1613 .
1614 .IP 7.
1615 \fBgroup\fR
1616 .IQ
1617 \fBoutput\fR
1618 .IQ
1619 \fBresubmit\fR
1620 .IQ
1621 If more than one of these actions is present, then the one listed
1622 earliest above is executed and the others are ignored, regardless of
1623 the order in which they were added to the action set. (If none of these
1624 actions is present, the action set has no real effect, because the
1625 modified packet is not sent anywhere and thus the modifications are
1626 not visible.)
1627 .RE
1628 .IP
1629 Only the actions listed above may be written to the action set.
1630 .
1631 .IP \fBwrite_metadata\fB:\fIvalue\fR[/\fImask\fR]
1632 Updates the metadata field for the flow. If \fImask\fR is omitted, the
1633 metadata field is set exactly to \fIvalue\fR; if \fImask\fR is specified, then
1634 a 1-bit in \fImask\fR indicates that the corresponding bit in the metadata
1635 field will be replaced with the corresponding bit from \fIvalue\fR. Both
1636 \fIvalue\fR and \fImask\fR are 64-bit values that are decimal by default; use
1637 a \fB0x\fR prefix to specify them in hexadecimal.
1638 .
1639 .IP \fBmeter\fR:\fImeter_id\fR
1640 Apply the \fImeter_id\fR before any other actions. If a meter band rate is
1641 exceeded, the packet may be dropped, or modified, depending on the meter
1642 band type. See the description of the \fBMeter Table Commands\fR, above,
1643 for more details.
1644 .
1645 .IP \fBgoto_table\fR:\fItable\fR
1646 Indicates the next table in the process pipeline.
1647 .
1648 .IP "\fBfin_timeout(\fIargument\fR[\fB,\fIargument\fR]\fB)"
1649 This action changes the idle timeout or hard timeout, or both, of this
1650 OpenFlow rule when the rule matches a TCP packet with the FIN or RST
1651 flag. When such a packet is observed, the action reduces the rule's
1652 timeouts to those specified on the action. If the rule's existing
1653 timeout is already shorter than the one that the action specifies,
1654 then that timeout is unaffected.
1655 .IP
1656 \fIargument\fR takes the following forms:
1657 .RS
1658 .IP "\fBidle_timeout=\fIseconds\fR"
1659 Causes the flow to expire after the given number of seconds of
1660 inactivity.
1661 .
1662 .IP "\fBhard_timeout=\fIseconds\fR"
1663 Causes the flow to expire after the given number of seconds,
1664 regardless of activity. (\fIseconds\fR specifies time since the
1665 flow's creation, not since the receipt of the FIN or RST.)
1666 .RE
1667 .IP
1668 This action was added in Open vSwitch 1.5.90.
1669 .
1670 .IP "\fBsample(\fIargument\fR[\fB,\fIargument\fR]...\fB)\fR"
1671 Samples packets and sends one sample for every sampled packet.
1672 .IP
1673 \fIargument\fR takes the following forms:
1674 .RS
1675 .IP "\fBprobability=\fIpackets\fR"
1676 The number of sampled packets out of 65535. Must be greater or equal to 1.
1677 .IP "\fBcollector_set_id=\fIid\fR"
1678 The unsigned 32-bit integer identifier of the set of sample collectors
1679 to send sampled packets to. Defaults to 0.
1680 .IP "\fBobs_domain_id=\fIid\fR"
1681 When sending samples to IPFIX collectors, the unsigned 32-bit integer
1682 Observation Domain ID sent in every IPFIX flow record. Defaults to 0.
1683 .IP "\fBobs_point_id=\fIid\fR"
1684 When sending samples to IPFIX collectors, the unsigned 32-bit integer
1685 Observation Point ID sent in every IPFIX flow record. Defaults to 0.
1686 .IP "\fBsampling_port=\fIport\fR"
1687 Sample packets on \fIport\fR, which should be the ingress or egress
1688 port. This option, which was added in Open vSwitch 2.5.90, allows the
1689 IPFIX implementation to export egress tunnel information.
1690 .IP "\fBingress\fR"
1691 .IQ "\fBegress\fR"
1692 Specifies explicitly that the packet is being sampled on ingress to or
1693 egress from the switch. IPFIX reports sent by Open vSwitch before
1694 version 2.5.90 did not include a direction. From 2.5.90 until 2.6.90,
1695 IPFIX reports inferred a direction from \fBsampling_port\fR: if it was
1696 the packet's output port, then the direction was reported as egress,
1697 otherwise as ingress. Open vSwitch 2.6.90 introduced these options,
1698 which allow the inferred direction to be overridden. This is
1699 particularly useful when the ingress (or egress) port is not a tunnel.
1700 .RE
1701 .IP
1702 Refer to \fBovs\-vswitchd.conf.db\fR(5) for more details on
1703 configuring sample collector sets.
1704 .IP
1705 This action was added in Open vSwitch 1.10.90.
1706 .
1707 .IP "\fBexit\fR"
1708 This action causes Open vSwitch to immediately halt execution of
1709 further actions. Those actions which have already been executed are
1710 unaffected. Any further actions, including those which may be in
1711 other tables, or different levels of the \fBresubmit\fR call stack,
1712 are ignored. Actions in the action set is still executed (specify
1713 \fBclear_actions\fR before \fBexit\fR to discard them).
1714 .
1715 .IP "\fBconjunction(\fIid\fB, \fIk\fB/\fIn\fR\fB)\fR"
1716 This action allows for sophisticated ``conjunctive match'' flows.
1717 Refer to \fBCONJUNCTIVE MATCH FIELDS\fR in \fBovs\-fields\fR(7) for details.
1718 .IP
1719 The \fBconjunction\fR action and \fBconj_id\fR field were introduced
1720 in Open vSwitch 2.4.
1721 .
1722 .IP "\fBclone(\fR[\fIaction\fR][\fB,\fIaction\fR...]\fB)\fR"
1723 Executes each nested \fIaction\fR, saving much of the packet and
1724 pipeline state beforehand and then restoring it afterward. The state
1725 that is saved and restored includes all flow data and metadata
1726 (including, for example, \fBct_state\fR), the stack accessed by
1727 \fBpush\fR and \fBpop\fR actions, and the OpenFlow action set.
1728 .IP
1729 This action was added in Open vSwitch 2.6.90.
1730 .RE
1731 .
1732 .PP
1733 An opaque identifier called a cookie can be used as a handle to identify
1734 a set of flows:
1735 .
1736 .IP \fBcookie=\fIvalue\fR
1737 .
1738 A cookie can be associated with a flow using the \fBadd\-flow\fR,
1739 \fBadd\-flows\fR, and \fBmod\-flows\fR commands. \fIvalue\fR can be any
1740 64-bit number and need not be unique among flows. If this field is
1741 omitted, a default cookie value of 0 is used.
1742 .
1743 .IP \fBcookie=\fIvalue\fR\fB/\fImask\fR
1744 .
1745 When using NXM, the cookie can be used as a handle for querying,
1746 modifying, and deleting flows. \fIvalue\fR and \fImask\fR may be
1747 supplied for the \fBdel\-flows\fR, \fBmod\-flows\fR, \fBdump\-flows\fR, and
1748 \fBdump\-aggregate\fR commands to limit matching cookies. A 1-bit in
1749 \fImask\fR indicates that the corresponding bit in \fIcookie\fR must
1750 match exactly, and a 0-bit wildcards that bit. A mask of \-1 may be used
1751 to exactly match a cookie.
1752 .IP
1753 The \fBmod\-flows\fR command can update the cookies of flows that
1754 match a cookie by specifying the \fIcookie\fR field twice (once with a
1755 mask for matching and once without to indicate the new value):
1756 .RS
1757 .IP "\fBovs\-ofctl mod\-flows br0 cookie=1,actions=normal\fR"
1758 Change all flows' cookies to 1 and change their actions to \fBnormal\fR.
1759 .IP "\fBovs\-ofctl mod\-flows br0 cookie=1/\-1,cookie=2,actions=normal\fR"
1760 Update cookies with a value of 1 to 2 and change their actions to
1761 \fBnormal\fR.
1762 .RE
1763 .IP
1764 The ability to match on cookies was added in Open vSwitch 1.5.0.
1765 .
1766 .PP
1767 The following additional field sets the priority for flows added by
1768 the \fBadd\-flow\fR and \fBadd\-flows\fR commands. For
1769 \fBmod\-flows\fR and \fBdel\-flows\fR when \fB\-\-strict\fR is
1770 specified, priority must match along with the rest of the flow
1771 specification. For \fBmod-flows\fR without \fB\-\-strict\fR,
1772 priority is only significant if the command creates a new flow, that
1773 is, non-strict \fBmod\-flows\fR does not match on priority and will
1774 not change the priority of existing flows. Other commands do not
1775 allow priority to be specified.
1776 .
1777 .IP \fBpriority=\fIvalue\fR
1778 The priority at which a wildcarded entry will match in comparison to
1779 others. \fIvalue\fR is a number between 0 and 65535, inclusive. A higher
1780 \fIvalue\fR will match before a lower one. An exact-match entry will always
1781 have priority over an entry containing wildcards, so it has an implicit
1782 priority value of 65535. When adding a flow, if the field is not specified,
1783 the flow's priority will default to 32768.
1784 .IP
1785 OpenFlow leaves behavior undefined when two or more flows with the
1786 same priority can match a single packet. Some users expect
1787 ``sensible'' behavior, such as more specific flows taking precedence
1788 over less specific flows, but OpenFlow does not specify this and Open
1789 vSwitch does not implement it. Users should therefore take care to
1790 use priorities to ensure the behavior that they expect.
1791 .
1792 .PP
1793 The \fBadd\-flow\fR, \fBadd\-flows\fR, and \fBmod\-flows\fR commands
1794 support the following additional options. These options affect only
1795 new flows. Thus, for \fBadd\-flow\fR and \fBadd\-flows\fR, these
1796 options are always significant, but for \fBmod\-flows\fR they are
1797 significant only if the command creates a new flow, that is, their
1798 values do not update or affect existing flows.
1799 .
1800 .IP "\fBidle_timeout=\fIseconds\fR"
1801 Causes the flow to expire after the given number of seconds of
1802 inactivity. A value of 0 (the default) prevents a flow from expiring
1803 due to inactivity.
1804 .
1805 .IP \fBhard_timeout=\fIseconds\fR
1806 Causes the flow to expire after the given number of seconds,
1807 regardless of activity. A value of 0 (the default) gives the flow no
1808 hard expiration deadline.
1809 .
1810 .IP "\fBimportance=\fIvalue\fR"
1811 Sets the importance of a flow. The flow entry eviction mechanism can
1812 use importance as a factor in deciding which flow to evict. A value
1813 of 0 (the default) makes the flow non-evictable on the basis of
1814 importance. Specify a value between 0 and 65535.
1815 .IP
1816 Only OpenFlow 1.4 and later support \fBimportance\fR.
1817 .
1818 .IP "\fBsend_flow_rem\fR"
1819 Marks the flow with a flag that causes the switch to generate a ``flow
1820 removed'' message and send it to interested controllers when the flow
1821 later expires or is removed.
1822 .
1823 .IP "\fBcheck_overlap\fR"
1824 Forces the switch to check that the flow match does not overlap that
1825 of any different flow with the same priority in the same table. (This
1826 check is expensive so it is best to avoid it.)
1827 .
1828 .IP "\fBreset_counts\fR"
1829 When this flag is specified on a flow being added to a switch, and the
1830 switch already has a flow with an identical match, an OpenFlow 1.2 (or
1831 later) switch resets the flow's packet and byte counters to 0.
1832 Without the flag, the packet and byte counters are preserved.
1833 .IP
1834 OpenFlow 1.0 and 1.1 switches always reset counters in this situation,
1835 as if \fBreset_counts\fR were always specified.
1836 .IP
1837 Open vSwitch 1.10 added support for \fBreset_counts\fR.
1838 .
1839 .IP "\fBno_packet_counts\fR"
1840 .IQ "\fBno_byte_counts\fR"
1841 Adding these flags to a flow advises an OpenFlow 1.3 (or later) switch
1842 that the controller does not need packet or byte counters,
1843 respectively, for the flow. Some switch implementations might achieve
1844 higher performance or reduce resource consumption when these flags are
1845 used. These flags provide no benefit to the Open vSwitch software
1846 switch implementation.
1847 .IP
1848 OpenFlow 1.2 and earlier do not support these flags.
1849 .IP
1850 Open vSwitch 1.10 added support for \fBno_packet_counts\fR and
1851 \fBno_byte_counts\fR.
1852 .
1853 .PP
1854 The \fBdump\-flows\fR, \fBdump\-aggregate\fR, \fBdel\-flow\fR
1855 and \fBdel\-flows\fR commands support these additional optional fields:
1856 .
1857 .TP
1858 \fBout_port=\fIport\fR
1859 If set, a matching flow must include an output action to \fIport\fR,
1860 which must be an OpenFlow port number or name (e.g. \fBlocal\fR).
1861 .
1862 .TP
1863 \fBout_group=\fIport\fR
1864 If set, a matching flow must include an \fBgroup\fR action naming
1865 \fIgroup\fR, which must be an OpenFlow group number. This field
1866 is supported in Open vSwitch 2.5 and later and requires OpenFlow 1.1
1867 or later.
1868 .
1869 .SS "Table Entry Output"
1870 .
1871 The \fBdump\-tables\fR and \fBdump\-aggregate\fR commands print information
1872 about the entries in a datapath's tables. Each line of output is a
1873 flow entry as described in \fBFlow Syntax\fR, above, plus some
1874 additional fields:
1875 .
1876 .IP \fBduration=\fIsecs\fR
1877 The time, in seconds, that the entry has been in the table.
1878 \fIsecs\fR includes as much precision as the switch provides, possibly
1879 to nanosecond resolution.
1880 .
1881 .IP \fBn_packets\fR
1882 The number of packets that have matched the entry.
1883 .
1884 .IP \fBn_bytes\fR
1885 The total number of bytes from packets that have matched the entry.
1886 .
1887 .PP
1888 The following additional fields are included only if the switch is
1889 Open vSwitch 1.6 or later and the NXM flow format is used to dump the
1890 flow (see the description of the \fB\-\-flow-format\fR option below).
1891 The values of these additional fields are approximations only and in
1892 particular \fBidle_age\fR will sometimes become nonzero even for busy
1893 flows.
1894 .
1895 .IP \fBhard_age=\fIsecs\fR
1896 The integer number of seconds since the flow was added or modified.
1897 \fBhard_age\fR is displayed only if it differs from the integer part
1898 of \fBduration\fR. (This is separate from \fBduration\fR because
1899 \fBmod\-flows\fR restarts the \fBhard_timeout\fR timer without zeroing
1900 \fBduration\fR.)
1901 .
1902 .IP \fBidle_age=\fIsecs\fR
1903 The integer number of seconds that have passed without any packets
1904 passing through the flow.
1905 .
1906 .SS "Packet\-Out Syntax"
1907 .PP
1908 \fBovs\-ofctl bundle\fR command accepts packet-outs to be specified in
1909 the bundle file. Each packet-out comprises of a series of
1910 \fIfield\fB=\fIvalue\fR assignments, separated by commas or white
1911 space. (Embedding spaces into a packet-out description normally
1912 requires quoting to prevent the shell from breaking the description
1913 into multiple arguments.). Unless noted otherwise only the last
1914 instance of each field is honoured. This same syntax is also
1915 supported by the \fBovs\-ofctl packet-out\fR command.
1916 .PP
1917 .IP \fBin_port=\fIport\fR
1918 The port number to be considered the in_port when processing actions.
1919 This can be any valid OpenFlow port number, or any of the \fBLOCAL\fR,
1920 \fBCONTROLLER\fR, or \fBNONE\fR.
1921 .
1922 This field is required.
1923
1924 .IP \fIpipeline_field\fR=\fIvalue\fR
1925 Optionally, user can specify a list of pipeline fields for a packet-out
1926 message. The supported pipeline fields includes \fBtunnel fields\fR and
1927 \fBregister fields\fR as defined in \fBovs\-fields\fR(7).
1928
1929 .IP \fBpacket=\fIhex-string\fR
1930 The actual packet to send, expressed as a string of hexadecimal bytes.
1931 .
1932 This field is required.
1933
1934 .IP \fBactions=\fR[\fIaction\fR][\fB,\fIaction\fR...]\fR
1935 The syntax of actions are identical to the \fBactions=\fR field
1936 described in \fBFlow Syntax\fR above. Specifying \fBactions=\fR is
1937 optional, but omitting actions is interpreted as a drop, so the packet
1938 will not be sent anywhere from the switch.
1939 .
1940 \fBactions\fR must be specified at the end of each line, like for flow mods.
1941 .RE
1942 .
1943 .SS "Group Syntax"
1944 .PP
1945 Some \fBovs\-ofctl\fR commands accept an argument that describes a group or
1946 groups. Such flow descriptions comprise a series
1947 \fIfield\fB=\fIvalue\fR assignments, separated by commas or white
1948 space. (Embedding spaces into a group description normally requires
1949 quoting to prevent the shell from breaking the description into
1950 multiple arguments.). Unless noted otherwise only the last instance
1951 of each field is honoured.
1952 .PP
1953 .IP \fBgroup_id=\fIid\fR
1954 The integer group id of group.
1955 When this field is specified in \fBdel\-groups\fR or \fBdump\-groups\fR,
1956 the keyword "all" may be used to designate all groups.
1957 .
1958 This field is required.
1959
1960
1961 .IP \fBtype=\fItype\fR
1962 The type of the group. The \fBadd-group\fR, \fBadd-groups\fR and
1963 \fBmod-groups\fR commands require this field. It is prohibited for
1964 other commands. The following keywords designated the allowed types:
1965 .RS
1966 .IP \fBall\fR
1967 Execute all buckets in the group.
1968 .IP \fBselect\fR
1969 Execute one bucket in the group, balancing across the buckets
1970 according to their weights. To select a bucket, for each live bucket,
1971 Open vSwitch hashes flow data with the bucket ID and multiplies by the
1972 bucket weight to obtain a ``score,'' and then selects the bucket with
1973 the highest score. Use \fBselection_method\fR to control the flow
1974 data used for selection.
1975 .IP \fBindirect\fR
1976 Executes the one bucket in the group.
1977 .IP \fBff\fR
1978 .IQ \fBfast_failover\fR
1979 Executes the first live bucket in the group which is associated with
1980 a live port or group.
1981 .RE
1982
1983 .IP \fBcommand_bucket_id=\fIid\fR
1984 The bucket to operate on. The \fBinsert-buckets\fR and \fBremove-buckets\fR
1985 commands require this field. It is prohibited for other commands.
1986 \fIid\fR may be an integer or one of the following keywords:
1987 .RS
1988 .IP \fBall\fR
1989 Operate on all buckets in the group.
1990 Only valid when used with the \fBremove-buckets\fR command in which
1991 case the effect is to remove all buckets from the group.
1992 .IP \fBfirst\fR
1993 Operate on the first bucket present in the group.
1994 In the case of the \fBinsert-buckets\fR command the effect is to
1995 insert new bucets just before the first bucket already present in the group;
1996 or to replace the buckets of the group if there are no buckets already present
1997 in the group.
1998 In the case of the \fBremove-buckets\fR command the effect is to
1999 remove the first bucket of the group; or do nothing if there are no
2000 buckets present in the group.
2001 .IP \fBlast\fR
2002 Operate on the last bucket present in the group.
2003 In the case of the \fBinsert-buckets\fR command the effect is to
2004 insert new bucets just after the last bucket already present in the group;
2005 or to replace the buckets of the group if there are no buckets already present
2006 in the group.
2007 In the case of the \fBremove-buckets\fR command the effect is to
2008 remove the last bucket of the group; or do nothing if there are no
2009 buckets present in the group.
2010 .RE
2011 .IP
2012 If \fIid\fR is an integer then it should correspond to the \fBbucket_id\fR
2013 of a bucket present in the group.
2014 In case of the \fBinsert-buckets\fR command the effect is to
2015 insert buckets just before the bucket in the group whose \fBbucket_id\fR is
2016 \fIid\fR.
2017 In case of the \fBiremove-buckets\fR command the effect is to
2018 remove the in the group whose \fBbucket_id\fR is \fIid\fR.
2019 It is an error if there is no bucket persent group in whose \fBbucket_id\fR is
2020 \fIid\fR.
2021
2022 .IP \fBselection_method\fR=\fImethod\fR
2023 The selection method used to select a bucket for a select group.
2024 This is a string of 1 to 15 bytes in length known to lower layers.
2025 This field is optional for \fBadd\-group\fR, \fBadd\-groups\fR and
2026 \fBmod\-group\fR commands on groups of type \fBselect\fR. Prohibited
2027 otherwise. The default value is the empty string.
2028 .RS
2029 .IP \fBhash\fR
2030 Use a hash computed over the fields specified with the \fBfields\fR
2031 option, see below. \fBhash\fR uses the \fBselection_method_param\fR
2032 as the hash basis.
2033 .IP
2034 Note that the hashed fields become exact matched by the datapath
2035 flows. For example, if the TCP source port is hashed, the created
2036 datapath flows will match the specific TCP source port value present
2037 in the packet received. Since each TCP connection generally has a
2038 different source port value, a separate datapath flow will be need to
2039 be inserted for each TCP connection thus hashed to a select group
2040 bucket.
2041 .IP \fBdp_hash\fR
2042 Use a datapath computed hash value. The hash algorithm varies accross
2043 different datapath implementations. \fBdp_hash\fR uses the upper 32
2044 bits of the \fBselection_method_param\fR as the datapath hash
2045 algorithm selector, which currently must always be 0, corresponding to
2046 hash computation over the IP 5-tuple (selecting specific fields with
2047 the \fBfields\fR option is not allowed with \fBdp_hash\fR). The lower
2048 32 bits are used as the hash basis.
2049 .IP
2050 Using \fBdp_hash\fR has the advantage that it does not require the
2051 generated datapath flows to exact match any additional packet header
2052 fields. For example, even if multiple TCP connections thus hashed to
2053 different select group buckets have different source port numbers,
2054 generally all of them would be handled with a small set of already
2055 established datapath flows, resulting in less latency for TCP SYN
2056 packets. The downside is that the shared datapath flows must match
2057 each packet twice, as the datapath hash value calculation happens only
2058 when needed, and a second match is required to match some bits of its
2059 value. This double-matching incurs a small additional latency cost
2060 for each packet, but this latency is orders of magnitude less than the
2061 latency of creating new datapath flows for new TCP connections.
2062 .RE
2063 .IP
2064 This option will use a Netronome OpenFlow extension which is only supported
2065 when using Open vSwitch 2.4 and later with OpenFlow 1.5 and later.
2066
2067 .IP \fBselection_method_param\fR=\fIparam\fR
2068 64-bit integer parameter to the selection method selected by the
2069 \fBselection_method\fR field. The parameter's use is defined by the
2070 lower-layer that implements the \fBselection_method\fR. It is optional if
2071 the \fBselection_method\fR field is specified as a non-empty string.
2072 Prohibited otherwise. The default value is zero.
2073 .IP
2074 This option will use a Netronome OpenFlow extension which is only supported
2075 when using Open vSwitch 2.4 and later with OpenFlow 1.5 and later.
2076
2077 .IP \fBfields\fR=\fIfield\fR
2078 .IQ \fBfields(\fIfield\fR[\fB=\fImask\fR]\fR...\fB)\fR
2079 The field parameters to selection method selected by the
2080 \fBselection_method\fR field. The syntax is described in \fBFlow
2081 Syntax\fR with the additional restrictions that if a value is provided
2082 it is treated as a wildcard mask and wildcard masks following a slash
2083 are prohibited. The pre-requisites of fields must be provided by any
2084 flows that output to the group. The use of the fields is defined by
2085 the lower-layer that implements the \fBselection_method\fR. They are
2086 optional if the \fBselection_method\fR field is specified as ``hash',
2087 prohibited otherwise. The default is no fields.
2088 .IP
2089 This option will use a Netronome OpenFlow extension which is only supported
2090 when using Open vSwitch 2.4 and later with OpenFlow 1.5 and later.
2091
2092 .IP \fBbucket\fR=\fIbucket_parameters\fR
2093 The \fBadd-group\fR, \fBadd-groups\fR and \fBmod-group\fR commands
2094 require at least one bucket field. Bucket fields must appear after
2095 all other fields.
2096 .
2097 Multiple bucket fields to specify multiple buckets.
2098 The order in which buckets are specified corresponds to their order in
2099 the group. If the type of the group is "indirect" then only one group may
2100 be specified.
2101 .
2102 \fIbucket_parameters\fR consists of a list of \fIfield\fB=\fIvalue\fR
2103 assignments, separated by commas or white space followed by a
2104 comma-separated list of actions.
2105 The fields for \fIbucket_parameters\fR are:
2106 .
2107 .RS
2108 .IP \fBbucket_id=\fIid\fR
2109 The 32-bit integer group id of the bucket. Values greater than
2110 0xffffff00 are reserved.
2111 .
2112 This field was added in Open vSwitch 2.4 to conform with the OpenFlow
2113 1.5 specification. It is not supported when earlier versions
2114 of OpenFlow are used. Open vSwitch will automatically allocate bucket
2115 ids when they are not specified.
2116 .IP \fBactions=\fR[\fIaction\fR][\fB,\fIaction\fR...]\fR
2117 The syntax of actions are identical to the \fBactions=\fR field described in
2118 \fBFlow Syntax\fR above. Specifying \fBactions=\fR is optional, any unknown
2119 bucket parameter will be interpreted as an action.
2120 .IP \fBweight=\fIvalue\fR
2121 The relative weight of the bucket as an integer. This may be used by the switch
2122 during bucket select for groups whose \fBtype\fR is \fBselect\fR.
2123 .IP \fBwatch_port=\fIport\fR
2124 Port used to determine liveness of group.
2125 This or the \fBwatch_group\fR field is required
2126 for groups whose \fBtype\fR is \fBff\fR or \fBfast_failover\fR.
2127 .IP \fBwatch_group=\fIgroup_id\fR
2128 Group identifier of group used to determine liveness of group.
2129 This or the \fBwatch_port\fR field is required
2130 for groups whose \fBtype\fR is \fBff\fR or \fBfast_failover\fR.
2131 .RE
2132 .
2133 .SS "Meter Syntax"
2134 .PP
2135 The meter table commands accept an argument that describes a meter.
2136 Such meter descriptions comprise a series \fIfield\fB=\fIvalue\fR
2137 assignments, separated by commas or white space.
2138 (Embedding spaces into a group description normally requires
2139 quoting to prevent the shell from breaking the description into
2140 multiple arguments.). Unless noted otherwise only the last instance
2141 of each field is honoured.
2142 .PP
2143 .IP \fBmeter=\fIid\fR
2144 The integer meter id of the meter.
2145 When this field is specified in \fBdel-meter\fR, \fBdump-meter\fR, or
2146 \fBmeter-stats\fR, the keyword "all" may be used to designate all meters.
2147 .
2148 This field is required, exept for \fBmeter-stats\fR, which dumps all stats
2149 when this field is not specified.
2150
2151 .IP \fBkbps\fR
2152 .IQ \fBpktps\fR
2153 The unit for the meter band rate parameters, either kilobits per second, or
2154 packets per second, respectively. One of these must be specified. The burst
2155 size unit corresponds to the rate unit by dropping the "per second", i.e.,
2156 burst is in units of kilobits or packets, respectively.
2157
2158 .IP \fBburst\fR
2159 Specify burst size for all bands, or none of them, if this flag is not given.
2160
2161 .IP \fBstats\fR
2162 Collect meter and band statistics.
2163
2164 .IP \fBbands\fR=\fIband_parameters\fR
2165 The \fBadd-meter\fR and \fBmod-meter\fR commands require at least one
2166 band specification. Bands must appear after all other fields.
2167 .RS
2168 .IP \fBtype=\fItype\fR
2169 The type of the meter band. This keyword starts a new band specification.
2170 Each band specifies a rate above which the band is to take some action. The
2171 action depends on the band type. If multiple bands' rate is exceeded, then
2172 the band with the highest rate among the exceeded bands is selected.
2173 The following keywords designate the allowed
2174 meter band types:
2175 .RS
2176 .IP \fBdrop\fR
2177 Drop packets exceeding the band's rate limit.
2178 .RE
2179 .
2180 .IP "The other \fIband_parameters\fR are:"
2181 .IP \fBrate=\fIvalue\fR
2182 The relative rate limit for this band, in kilobits per second or packets per
2183 second, depending on the meter flags defined above.
2184 .IP \fBburst_size=\fIsize\fR
2185 The maximum burst allowed for the band. If \fBpktps\fR is specified,
2186 then \fIsize\fR is a packet count, otherwise it is in kilobits. If
2187 unspecified, the switch is free to select some reasonable value
2188 depending on its configuration.
2189 .RE
2190 .
2191 .SH OPTIONS
2192 .TP
2193 \fB\-\-strict\fR
2194 Uses strict matching when running flow modification commands.
2195 .
2196 .IP "\fB\-\-names\fR"
2197 .IQ "\fB\-\-no\-names\fR"
2198 Every OpenFlow port has a name and a number. By default,
2199 \fBovs\-ofctl\fR commands accept both port names and numbers, and they
2200 display port names if \fBovs\-ofctl\fR is running on an interactive
2201 console, port numbers otherwise. With \fB\-\-names\fR,
2202 \fBovs\-ofctl\fR commands both accept and display port names; with
2203 \fB\-\-no\-names\fR, commands neither accept nor display port names.
2204 .IP
2205 If a port name contains special characters or might be confused with a
2206 keyword within a flow, it may be enclosed in double quotes (escaped
2207 from the shell). If necessary, JSON-style escape sequences may be
2208 used inside quotes, as specified in RFC 7159. When it displays port
2209 names, \fBovs\-ofctl\fR quotes any name that does not start with a
2210 letter followed by letters or digits.
2211 .IP
2212 These options are new in Open vSwitch 2.8. Earlier versions always
2213 behaved as if \fB\-\-no\-names\fR were specified.
2214 .IP
2215 Open vSwitch does not place its own limit on the length of port names,
2216 but OpenFlow 1.0 to 1.5 limit port names to 15 bytes and OpenFlow 1.6
2217 limits them to 63 bytes. Because \fRovs\-ofctl\fR uses OpenFlow to
2218 retrieve the mapping between port names and numbers, names longer than
2219 this limit will be truncated for both display and acceptance.
2220 Truncation can also cause long names that are different to appear to
2221 be the same; when a switch has two ports with the same (truncated)
2222 name, \fBovs\-ofctl\fR refuses to display or accept the name, using
2223 the number instead.
2224 .
2225 .IP "\fB\-\-read-only\fR"
2226 Do not execute read/write commands.
2227 .
2228 .IP "\fB\-\-bundle\fR"
2229 Execute flow mods as an OpenFlow 1.4 atomic bundle transaction.
2230 .RS
2231 .IP \(bu
2232 Within a bundle, all flow mods are processed in the order they appear
2233 and as a single atomic transaction, meaning that if one of them fails,
2234 the whole transaction fails and none of the changes are made to the
2235 \fIswitch\fR's flow table, and that each given datapath packet
2236 traversing the OpenFlow tables sees the flow tables either as before
2237 the transaction, or after all the flow mods in the bundle have been
2238 successfully applied.
2239 .IP \(bu
2240 The beginning and the end of the flow table modification commands in a
2241 bundle are delimited with OpenFlow 1.4 bundle control messages, which
2242 makes it possible to stream the included commands without explicit
2243 OpenFlow barriers, which are otherwise used after each flow table
2244 modification command. This may make large modifications execute
2245 faster as a bundle.
2246 .IP \(bu
2247 Bundles require OpenFlow 1.4 or higher. An explicit \fB-O
2248 OpenFlow14\fR option is not needed, but you may need to enable
2249 OpenFlow 1.4 support for OVS by setting the OVSDB \fIprotocols\fR
2250 column in the \fIbridge\fR table.
2251 .RE
2252 .
2253 .so lib/ofp-version.man
2254 .
2255 .IP "\fB\-F \fIformat\fR[\fB,\fIformat\fR...]"
2256 .IQ "\fB\-\-flow\-format=\fIformat\fR[\fB,\fIformat\fR...]"
2257 \fBovs\-ofctl\fR supports the following individual flow formats, any
2258 number of which may be listed as \fIformat\fR:
2259 .RS
2260 .IP "\fBOpenFlow10\-table_id\fR"
2261 This is the standard OpenFlow 1.0 flow format. All OpenFlow switches
2262 and all versions of Open vSwitch support this flow format.
2263 .
2264 .IP "\fBOpenFlow10+table_id\fR"
2265 This is the standard OpenFlow 1.0 flow format plus a Nicira extension
2266 that allows \fBovs\-ofctl\fR to specify the flow table in which a
2267 particular flow should be placed. Open vSwitch 1.2 and later supports
2268 this flow format.
2269 .
2270 .IP "\fBNXM\-table_id\fR (Nicira Extended Match)"
2271 This Nicira extension to OpenFlow is flexible and extensible. It
2272 supports all of the Nicira flow extensions, such as \fBtun_id\fR and
2273 registers. Open vSwitch 1.1 and later supports this flow format.
2274 .
2275 .IP "\fBNXM+table_id\fR (Nicira Extended Match)"
2276 This combines Nicira Extended match with the ability to place a flow
2277 in a specific table. Open vSwitch 1.2 and later supports this flow
2278 format.
2279 .
2280 .IP "\fBOXM-OpenFlow12\fR"
2281 .IQ "\fBOXM-OpenFlow13\fR"
2282 .IQ "\fBOXM-OpenFlow14\fR"
2283 .IQ "\fBOXM-OpenFlow15\fR"
2284 .IQ "\fBOXM-OpenFlow16\fR"
2285 These are the standard OXM (OpenFlow Extensible Match) flow format in
2286 OpenFlow 1.2 and later.
2287 .RE
2288 .
2289 .IP
2290 \fBovs\-ofctl\fR also supports the following abbreviations for
2291 collections of flow formats:
2292 .RS
2293 .IP "\fBany\fR"
2294 Any supported flow format.
2295 .IP "\fBOpenFlow10\fR"
2296 \fBOpenFlow10\-table_id\fR or \fBOpenFlow10+table_id\fR.
2297 .IP "\fBNXM\fR"
2298 \fBNXM\-table_id\fR or \fBNXM+table_id\fR.
2299 .IP "\fBOXM\fR"
2300 \fBOXM-OpenFlow12\fR, \fBOXM-OpenFlow13\fR, or \fBOXM-OpenFlow14\fR.
2301 .RE
2302 .
2303 .IP
2304 For commands that modify the flow table, \fBovs\-ofctl\fR by default
2305 negotiates the most widely supported flow format that supports the
2306 flows being added. For commands that query the flow table,
2307 \fBovs\-ofctl\fR by default uses the most advanced format supported by
2308 the switch.
2309 .IP
2310 This option, where \fIformat\fR is a comma-separated list of one or
2311 more of the formats listed above, limits \fBovs\-ofctl\fR's choice of
2312 flow format. If a command cannot work as requested using one of the
2313 specified flow formats, \fBovs\-ofctl\fR will report a fatal error.
2314 .
2315 .IP "\fB\-P \fIformat\fR"
2316 .IQ "\fB\-\-packet\-in\-format=\fIformat\fR"
2317 \fBovs\-ofctl\fR supports the following ``packet-in'' formats, in order of
2318 increasing capability:
2319 .RS
2320 .IP "\fBstandard\fR"
2321 This uses the \fBOFPT_PACKET_IN\fR message, the standard ``packet-in''
2322 message for any given OpenFlow version. Every OpenFlow switch that
2323 supports a given OpenFlow version supports this format.
2324 .
2325 .IP "\fBnxt_packet_in\fR"
2326 This uses the \fBNXT_PACKET_IN\fR message, which adds many of the
2327 capabilities of the OpenFlow 1.1 and later ``packet-in'' messages
2328 before those OpenFlow versions were available in Open vSwitch. Open
2329 vSwitch 1.1 and later support this format. Only Open vSwitch 2.6 and
2330 later, however, support it for OpenFlow 1.1 and later (but there is
2331 little reason to use it with those versions of OpenFlow).
2332 .
2333 .IP "\fBnxt_packet_in2\fR"
2334 This uses the \fBNXT_PACKET_IN2\fR message, which is extensible and
2335 should avoid the need to define new formats later. In particular,
2336 this format supports passing arbitrary user-provided data to a
2337 controller using the \fBuserdata\fB option on the \fBcontroller\fR
2338 action. Open vSwitch 2.6 and later support this format.
2339 .
2340 .RE
2341 .IP
2342 Without this option, \fBovs\-ofctl\fR prefers \fBnxt_packet_in2\fR if
2343 the switch supports it. Otherwise, if OpenFlow 1.0 is in use,
2344 \fBovs\-ofctl\fR prefers \fBnxt_packet_in\fR if the switch supports
2345 it. Otherwise, \fBovs\-ofctl\fR falls back to the \fBstandard\fR
2346 packet-in format. When this option is specified, \fBovs\-ofctl\fR
2347 insists on the selected format. If the switch does not support the
2348 requested format, \fBovs\-ofctl\fR will report a fatal error.
2349 .IP
2350 Before version 2.6, Open vSwitch called \fBstandard\fR format
2351 \fBopenflow10\fR and \fBnxt_packet_in\fR format \fBnxm\fR, and
2352 \fBovs\-ofctl\fR still accepts these names as synonyms. (The name
2353 \fBopenflow10\fR was a misnomer because this format actually varies
2354 from one OpenFlow version to another; it is not consistently OpenFlow
2355 1.0 format. Similarly, when \fBnxt_packet_in2\fR was introduced, the
2356 name \fBnxm\fR became confusing because it also uses OXM/NXM.)
2357 .
2358 .IP
2359 This option affects only the \fBmonitor\fR command.
2360 .
2361 .IP "\fB\-\-timestamp\fR"
2362 Print a timestamp before each received packet. This option only
2363 affects the \fBmonitor\fR, \fBsnoop\fR, and \fBofp\-parse\-pcap\fR
2364 commands.
2365 .
2366 .IP "\fB\-m\fR"
2367 .IQ "\fB\-\-more\fR"
2368 Increases the verbosity of OpenFlow messages printed and logged by
2369 \fBovs\-ofctl\fR commands. Specify this option more than once to
2370 increase verbosity further.
2371 .
2372 .IP \fB\-\-sort\fR[\fB=\fIfield\fR]
2373 .IQ \fB\-\-rsort\fR[\fB=\fIfield\fR]
2374 Display output sorted by flow \fIfield\fR in ascending
2375 (\fB\-\-sort\fR) or descending (\fB\-\-rsort\fR) order, where
2376 \fIfield\fR is any of the fields that are allowed for matching or
2377 \fBpriority\fR to sort by priority. When \fIfield\fR is omitted, the
2378 output is sorted by priority. Specify these options multiple times to
2379 sort by multiple fields.
2380 .IP
2381 Any given flow will not necessarily specify a value for a given
2382 field. This requires special treatement:
2383 .RS
2384 .IP \(bu
2385 A flow that does not specify any part of a field that is used for sorting is
2386 sorted after all the flows that do specify the field. For example,
2387 \fB\-\-sort=tcp_src\fR will sort all the flows that specify a TCP
2388 source port in ascending order, followed by the flows that do not
2389 specify a TCP source port at all.
2390 .IP \(bu
2391 A flow that only specifies some bits in a field is sorted as if the
2392 wildcarded bits were zero. For example, \fB\-\-sort=nw_src\fR would
2393 sort a flow that specifies \fBnw_src=192.168.0.0/24\fR the same as
2394 \fBnw_src=192.168.0.0\fR.
2395 .RE
2396 .IP
2397 These options currently affect only \fBdump\-flows\fR output.
2398 .
2399 .SS "Daemon Options"
2400 .ds DD \
2401 \fBovs\-ofctl\fR detaches only when executing the \fBmonitor\fR or \
2402 \fBsnoop\fR commands.
2403 .so lib/daemon.man
2404 .so lib/unixctl.man
2405 .SS "Public Key Infrastructure Options"
2406 .so lib/ssl.man
2407 .so lib/vlog.man
2408 .so lib/colors.man
2409 .so lib/common.man
2410 .
2411 .SH "RUNTIME MANAGEMENT COMMANDS"
2412 \fBovs\-appctl\fR(8) can send commands to a running \fBovs\-ofctl\fR
2413 process. The supported commands are listed below.
2414 .
2415 .IP "\fBexit\fR"
2416 Causes \fBovs\-ofctl\fR to gracefully terminate. This command applies
2417 only when executing the \fBmonitor\fR or \fBsnoop\fR commands.
2418 .
2419 .IP "\fBofctl/set\-output\-file \fIfile\fR"
2420 Causes all subsequent output to go to \fIfile\fR instead of stderr.
2421 This command applies only when executing the \fBmonitor\fR or
2422 \fBsnoop\fR commands.
2423 .
2424 .IP "\fBofctl/send \fIofmsg\fR..."
2425 Sends each \fIofmsg\fR, specified as a sequence of hex digits that
2426 express an OpenFlow message, on the OpenFlow connection. This command
2427 is useful only when executing the \fBmonitor\fR command.
2428 .
2429 .IP "\fBofctl/packet\-out \fIpacket-out\fR"
2430 Sends an OpenFlow PACKET_OUT message specified in \fBPacket\-Out
2431 Syntax\fR, on the OpenFlow connection. See \fBPacket\-Out Syntax\fR
2432 section for more information. This command is useful only when
2433 executing the \fBmonitor\fR command.
2434 .
2435 .IP "\fBofctl/barrier\fR"
2436 Sends an OpenFlow barrier request on the OpenFlow connection and waits
2437 for a reply. This command is useful only for the \fBmonitor\fR
2438 command.
2439 .
2440 .SH EXAMPLES
2441 .
2442 The following examples assume that \fBovs\-vswitchd\fR has a bridge
2443 named \fBbr0\fR configured.
2444 .
2445 .TP
2446 \fBovs\-ofctl dump\-tables br0\fR
2447 Prints out the switch's table stats. (This is more interesting after
2448 some traffic has passed through.)
2449 .
2450 .TP
2451 \fBovs\-ofctl dump\-flows br0\fR
2452 Prints the flow entries in the switch.
2453 .
2454 .TP
2455 \fBovs\-ofctl add\-flow table=0 actions=learn(table=1,hard_timeout=10, NXM_OF_VLAN_TCI[0..11],output:NXM_OF_IN_PORT[]), resubmit(,1)\fR
2456 \fBovs\-ofctl add\-flow table=1 priority=0 actions=flood\fR
2457 Implements a level 2 MAC learning switch using the learn.
2458 .
2459 .TP
2460 \fBovs\-ofctl add\-flow br0 'table=0,priority=0 actions=load:3->NXM_NX_REG0[0..15],learn(table=0,priority=1,idle_timeout=10,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2\fR
2461 In this use of a learn action, the first packet from each source MAC
2462 will be sent to port 2. Subsequent packets will be output to port 3,
2463 with an idle timeout of 10 seconds. NXM field names and match field
2464 names are both accepted, e.g. \fBNXM_NX_REG0\fR or \fBreg0\fR for the
2465 first register, and empty brackets may be omitted.
2466 .IP
2467 Additional examples may be found documented as part of related sections.
2468 .
2469 .SH "SEE ALSO"
2470 .
2471 .BR ovs\-fields (7),
2472 .BR ovs\-appctl (8),
2473 .BR ovs\-vswitchd (8),
2474 .BR ovs\-vswitchd.conf.db (8)