]> git.proxmox.com Git - mirror_iproute2.git/blame - doc/ip-cref.tex
ip: Add label option to ip monitor
[mirror_iproute2.git] / doc / ip-cref.tex
CommitLineData
aba5acdf
SH
1\documentstyle[12pt,twoside]{article}
2\def\TITLE{IP Command Reference}
3\input preamble
4\begin{center}
5\Large\bf IP Command Reference.
6\end{center}
7
8
9\begin{center}
10{ \large Alexey~N.~Kuznetsov } \\
11\em Institute for Nuclear Research, Moscow \\
12\verb|kuznet@ms2.inr.ac.ru| \\
13\rm April 14, 1999
14\end{center}
15
16\vspace{5mm}
17
18\tableofcontents
19
20\newpage
21
22\section{About this document}
23
24This document presents a comprehensive description of the \verb|ip| utility
25from the \verb|iproute2| package. It is not a tutorial or user's guide.
26It is a {\em dictionary\/}, not explaining terms,
27but translating them into other terms, which may also be unknown to the reader.
28However, the document is self-contained and the reader, provided they have a
29basic networking background, will find enough information
30and examples to understand and configure Linux-2.2 IP and IPv6
31networking.
32
33This document is split into sections explaining \verb|ip| commands
34and options, decrypting \verb|ip| output and containing a few examples.
35More voluminous examples and some topics, which require more elaborate
36discussion, are in the appendix.
37
38The paragraphs beginning with NB contain side notes, warnings about
39bugs and design drawbacks. They may be skipped at the first reading.
40
41\section{{\tt ip} --- command syntax}
42
43The generic form of an \verb|ip| command is:
44\begin{verbatim}
45ip [ OPTIONS ] OBJECT [ COMMAND [ ARGUMENTS ]]
46\end{verbatim}
47where \verb|OPTIONS| is a set of optional modifiers affecting the
48general behaviour of the \verb|ip| utility or changing its output. All options
49begin with the character \verb|'-'| and may be used in either long or abbreviated
50forms. Currently, the following options are available:
51
52\begin{itemize}
53\item \verb|-V|, \verb|-Version|
54
55--- print the version of the \verb|ip| utility and exit.
56
57
58\item \verb|-s|, \verb|-stats|, \verb|-statistics|
59
60--- output more information. If the option
61appears twice or more, the amount of information increases.
62As a rule, the information is statistics or some time values.
63
64
65\item \verb|-f|, \verb|-family| followed by a protocol family
66identifier: \verb|inet|, \verb|inet6| or \verb|link|.
67
68--- enforce the protocol family to use. If the option is not present,
69the protocol family is guessed from other arguments. If the rest of the command
70line does not give enough information to guess the family, \verb|ip| falls back to the default
71one, usually \verb|inet| or \verb|any|. \verb|link| is a special family
72identifier meaning that no networking protocol is involved.
73
74\item \verb|-4|
75
76--- shortcut for \verb|-family inet|.
77
78\item \verb|-6|
79
80--- shortcut for \verb|-family inet6|.
81
82\item \verb|-0|
83
84--- shortcut for \verb|-family link|.
85
86
87\item \verb|-o|, \verb|-oneline|
88
89--- output each record on a single line, replacing line feeds
90with the \verb|'\'| character. This is convenient when you want to
91count records with \verb|wc| or to \verb|grep| the output. The trivial
92script \verb|rtpr| converts the output back into readable form.
93
94\item \verb|-r|, \verb|-resolve|
95
96--- use the system's name resolver to print DNS names instead of
97host addresses.
98
99\begin{NB}
100 Do not use this option when reporting bugs or asking for advice.
101\end{NB}
102\begin{NB}
103 \verb|ip| never uses DNS to resolve names to addresses.
104\end{NB}
105
106\end{itemize}
107
108\verb|OBJECT| is the object to manage or to get information about.
109The object types currently understood by \verb|ip| are:
110
111\begin{itemize}
112\item \verb|link| --- network device
113\item \verb|address| --- protocol (IP or IPv6) address on a device
114\item \verb|neighbour| --- ARP or NDISC cache entry
115\item \verb|route| --- routing table entry
116\item \verb|rule| --- rule in routing policy database
117\item \verb|maddress| --- multicast address
118\item \verb|mroute| --- multicast routing cache entry
119\item \verb|tunnel| --- tunnel over IP
120\end{itemize}
121
122Again, the names of all objects may be written in full or
123abbreviated form, f.e.\ \verb|address| is abbreviated as \verb|addr|
124or just \verb|a|.
125
126\verb|COMMAND| specifies the action to perform on the object.
127The set of possible actions depends on the object type.
128As a rule, it is possible to \verb|add|, \verb|delete| and
129\verb|show| (or \verb|list|) objects, but some objects
130do not allow all of these operations or have some additional commands.
131The \verb|help| command is available for all objects. It prints
132out a list of available commands and argument syntax conventions.
133
134If no command is given, some default command is assumed.
135Usually it is \verb|list| or, if the objects of this class
136cannot be listed, \verb|help|.
137
138\verb|ARGUMENTS| is a list of arguments to the command.
139The arguments depend on the command and object. There are two types of arguments:
140{\em flags\/}, consisting of a single keyword, and {\em parameters\/},
141consisting of a keyword followed by a value. For convenience,
142each command has some {\em default parameter\/}
143which may be omitted. F.e.\ parameter \verb|dev| is the default
144for the {\tt ip link} command, so {\tt ip link ls eth0} is equivalent
145to {\tt ip link ls dev eth0}.
146In the command descriptions below such parameters
147are distinguished with the marker: ``(default)''.
148
149Almost all keywords may be abbreviated with several first (or even single)
150letters. The shortcuts are convenient when \verb|ip| is used interactively,
151but they are not recommended in scripts or when reporting bugs
152or asking for advice. ``Officially'' allowed abbreviations are listed
153in the document body.
154
155
156
157\section{{\tt ip} --- error messages}
158
159\verb|ip| may fail for one of the following reasons:
160
161\begin{itemize}
162\item
163A syntax error on the command line: an unknown keyword, incorrectly formatted
164IP address {\em et al\/}. In this case \verb|ip| prints an error message
165and exits. As a rule, the error message will contain information
166about the reason for the failure. Sometimes it also prints a help page.
167
168\item
169The arguments did not pass verification for self-consistency.
170
171\item
172\verb|ip| failed to compile a kernel request from the arguments
173because the user didn't give enough information.
174
175\item
176The kernel returned an error to some syscall. In this case \verb|ip|
177prints the error message, as it is output with \verb|perror(3)|,
178prefixed with a comment and a syscall identifier.
179
180\item
181The kernel returned an error to some RTNETLINK request.
182In this case \verb|ip| prints the error message, as it is output
183with \verb|perror(3)| prefixed with ``RTNETLINK answers:''.
184
185\end{itemize}
186
187All the operations are atomic, i.e.\
188if the \verb|ip| utility fails, it does not change anything
189in the system. One harmful exception is \verb|ip link| command
190(Sec.\ref{IP-LINK}, p.\pageref{IP-LINK}),
191which may change only some of the device parameters given
192on command line.
193
194It is difficult to list all the error messages (especially
195syntax errors). However, as a rule, their meaning is clear
196from the context of the command.
197
198The most common mistakes are:
199
200\begin{enumerate}
201\item Netlink is not configured in the kernel. The message is:
202\begin{verbatim}
203Cannot open netlink socket: Invalid value
204\end{verbatim}
205
206\item RTNETLINK is not configured in the kernel. In this case
207one of the following messages may be printed, depending on the command:
208\begin{verbatim}
209Cannot talk to rtnetlink: Connection refused
210Cannot send dump request: Connection refused
211\end{verbatim}
212
213\item The \verb|CONFIG_IP_MULTIPLE_TABLES| option was not selected
214when configuring the kernel. In this case any attempt to use the
215\verb|ip| \verb|rule| command will fail, f.e.
216\begin{verbatim}
217kuznet@kaiser $ ip rule list
218RTNETLINK error: Invalid argument
219dump terminated
220\end{verbatim}
221
222\end{enumerate}
223
224
225\section{{\tt ip link} --- network device configuration}
226\label{IP-LINK}
227
228\paragraph{Object:} A \verb|link| is a network device and the corresponding
229commands display and change the state of devices.
230
231\paragraph{Commands:} \verb|set| and \verb|show| (or \verb|list|).
232
233\subsection{{\tt ip link set} --- change device attributes}
234
235\paragraph{Abbreviations:} \verb|set|, \verb|s|.
236
237\paragraph{Arguments:}
238
239\begin{itemize}
240\item \verb|dev NAME| (default)
241
242--- \verb|NAME| specifies the network device on which to operate.
243
244\item \verb|up| and \verb|down|
245
246--- change the state of the device to \verb|UP| or \verb|DOWN|.
247
248\item \verb|arp on| or \verb|arp off|
249
250--- change the \verb|NOARP| flag on the device.
251
252\begin{NB}
253This operation is {\em not allowed\/} if the device is in state \verb|UP|.
254Though neither the \verb|ip| utility nor the kernel check for this condition.
255You can get unpredictable results changing this flag while the
256device is running.
257\end{NB}
258
259\item \verb|multicast on| or \verb|multicast off|
260
261--- change the \verb|MULTICAST| flag on the device.
262
263\item \verb|dynamic on| or \verb|dynamic off|
264
265--- change the \verb|DYNAMIC| flag on the device.
266
267\item \verb|name NAME|
268
269--- change the name of the device. This operation is not
270recommended if the device is running or has some addresses
271already configured.
272
273\item \verb|txqueuelen NUMBER| or \verb|txqlen NUMBER|
274
275--- change the transmit queue length of the device.
276
277\item \verb|mtu NUMBER|
278
279--- change the MTU of the device.
280
281\item \verb|address LLADDRESS|
282
283--- change the station address of the interface.
284
285\item \verb|broadcast LLADDRESS|, \verb|brd LLADDRESS| or \verb|peer LLADDRESS|
286
287--- change the link layer broadcast address or the peer address when
288the interface is \verb|POINTOPOINT|.
289
290\vskip 1mm
291\begin{NB}
292For most devices (f.e.\ for Ethernet) changing the link layer
293broadcast address will break networking.
294Do not use it, if you do not understand what this operation really does.
295\end{NB}
296
e2613dc8
BT
297\item \verb|netns PID|
298
299--- move the device to the network namespace associated with the process PID.
300
aba5acdf
SH
301\end{itemize}
302
303\vskip 1mm
304\begin{NB}
e17b7337
TJ
305The \verb|PROMISC| and \verb|ALLMULTI| flags are considered
306obsolete and should not be changed administratively, though
307the {\tt ip} utility will allow that.
aba5acdf
SH
308\end{NB}
309
310\paragraph{Warning:} If multiple parameter changes are requested,
311\verb|ip| aborts immediately after any of the changes have failed.
312This is the only case when \verb|ip| can move the system to
313an unpredictable state. The solution is to avoid changing
314several parameters with one {\tt ip link set} call.
315
316\paragraph{Examples:}
317\begin{itemize}
318\item \verb|ip link set dummy address 00:00:00:00:00:01|
319
320--- change the station address of the interface \verb|dummy|.
321
322\item \verb|ip link set dummy up|
323
324--- start the interface \verb|dummy|.
325
326\end{itemize}
327
328
329\subsection{{\tt ip link show} --- display device attributes}
330\label{IP-LINK-SHOW}
331
332\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|lst|, \verb|sh|, \verb|ls|,
333\verb|l|.
334
335\paragraph{Arguments:}
336\begin{itemize}
337\item \verb|dev NAME| (default)
338
339--- \verb|NAME| specifies the network device to show.
340If this argument is omitted all devices are listed.
341
342\item \verb|up|
343
344--- only display running interfaces.
345
346\end{itemize}
347
348
349\paragraph{Output format:}
350
351\begin{verbatim}
352kuznet@alisa:~ $ ip link ls eth0
3533: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc cbq qlen 100
354 link/ether 00:a0:cc:66:18:78 brd ff:ff:ff:ff:ff:ff
355kuznet@alisa:~ $ ip link ls sit0
3565: sit0@NONE: <NOARP,UP> mtu 1480 qdisc noqueue
357 link/sit 0.0.0.0 brd 0.0.0.0
358kuznet@alisa:~ $ ip link ls dummy
3592: dummy: <BROADCAST,NOARP> mtu 1500 qdisc noop
360 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
361kuznet@alisa:~ $
362\end{verbatim}
363
364
365The number before each colon is an {\em interface index\/} or {\em ifindex\/}.
366This number uniquely identifies the interface. This is followed by the {\em interface name\/}
367(\verb|eth0|, \verb|sit0| etc.). The interface name is also
368unique at every given moment. However, the interface may disappear from the
369list (f.e.\ when the corresponding driver module is unloaded) and another
370one with the same name may be created later. Besides that,
371the administrator may change the name of any device with
372\verb|ip| \verb|link| \verb|set| \verb|name|
373to make it more intelligible.
374
375The interface name may have another name or \verb|NONE| appended
376after the \verb|@| sign. This means that this device is bound to some other
377device,
378i.e.\ packets send through it are encapsulated and sent via the ``master''
379device. If the name is \verb|NONE|, the master is unknown.
380
381Then we see the interface {\em mtu\/} (``maximal transfer unit''). This determines
382the maximal size of data which can be sent as a single packet over this interface.
383
384{\em qdisc\/} (``queuing discipline'') shows the queuing algorithm used
385on the interface. Particularly, \verb|noqueue| means that this interface
386does not queue anything and \verb|noop| means that the interface is in blackhole
387mode i.e.\ all packets sent to it are immediately discarded.
388{\em qlen\/} is the default transmit queue length of the device measured
389in packets.
390
391The interface flags are summarized in the angle brackets.
392
393\begin{itemize}
394\item \verb|UP| --- the device is turned on. It is ready to accept
395packets for transmission and it may inject into the kernel packets received
396from other nodes on the network.
397
398\item \verb|LOOPBACK| --- the interface does not communicate with other
399hosts. All packets sent through it will be returned
400and nothing but bounced packets can be received.
401
402\item \verb|BROADCAST| --- the device has the facility to send packets
403to all hosts sharing the same link. A typical example is an Ethernet link.
404
405\item \verb|POINTOPOINT| --- the link has only two ends with one node
406attached to each end. All packets sent to this link will reach the peer
407and all packets received by us came from this single peer.
408
409If neither \verb|LOOPBACK| nor \verb|BROADCAST| nor \verb|POINTOPOINT|
410are set, the interface is assumed to be NMBA (Non-Broadcast Multi-Access).
411This is the most generic type of device and the most complicated one, because
412the host attached to a NBMA link has no means to send to anyone
413without additionally configured information.
414
415\item \verb|MULTICAST| --- is an advisory flag indicating that the interface
416is aware of multicasting i.e.\ sending packets to some subset of neighbouring
417nodes. Broadcasting is a particular case of multicasting, where the multicast
418group consists of all nodes on the link. It is important to emphasize
419that software {\em must not\/} interpret the absence of this flag as the inability
420to use multicasting on this interface. Any \verb|POINTOPOINT| and
421\verb|BROADCAST| link is multicasting by definition, because we have
422direct access to all the neighbours and, hence, to any part of them.
423Certainly, the use of high bandwidth multicast transfers is not recommended
424on broadcast-only links because of high expense, but it is not strictly
425prohibited.
426
427\item \verb|PROMISC| --- the device listens to and feeds to the kernel all
428traffic on the link even if it is not destined for us, not broadcasted
429and not destined for a multicast group of which we are member. Usually
430this mode exists only on broadcast links and is used by bridges and for network
431monitoring.
432
433\item \verb|ALLMULTI| --- the device receives all multicast packets
434wandering on the link. This mode is used by multicast routers.
435
436\item \verb|NOARP| --- this flag is different from the other ones. It has
437no invariant value and its interpretation depends on the network protocols
438involved. As a rule, it indicates that the device needs no address
439resolution and that the software or hardware knows how to deliver packets
440without any help from the protocol stacks.
441
442\item \verb|DYNAMIC| --- is an advisory flag indicating that the interface is
443dynamically created and destroyed.
444
445\item \verb|SLAVE| --- this interface is bonded to some other interfaces
446to share link capacities.
447
448\end{itemize}
449
450\vskip 1mm
451\begin{NB}
452There are other flags but they are either obsolete (\verb|NOTRAILERS|)
453or not implemented (\verb|DEBUG|) or specific to some devices
454(\verb|MASTER|, \verb|AUTOMEDIA| and \verb|PORTSEL|). We do not discuss
455them here.
456\end{NB}
aba5acdf
SH
457
458
459The second line contains information on the link layer addresses
460associated with the device. The first word (\verb|ether|, \verb|sit|)
461defines the interface hardware type. This type determines the format and semantics
462of the addresses and is logically part of the address.
463The default format of the station address and the broadcast address
464(or the peer address for pointopoint links) is a
465sequence of hexadecimal bytes separated by colons, but some link
466types may have their natural address format, f.e.\ addresses
467of tunnels over IP are printed as dotted-quad IP addresses.
468
469\vskip 1mm
470\begin{NB}
471 NBMA links have no well-defined broadcast or peer address,
472 however this field may contain useful information, f.e.\
473 about the address of broadcast relay or about the address of the ARP server.
474\end{NB}
475\begin{NB}
476Multicast addresses are not shown by this command, see
477\verb|ip maddr ls| in~Sec.\ref{IP-MADDR} (p.\pageref{IP-MADDR} of this
478document).
479\end{NB}
480
481
482\paragraph{Statistics:} With the \verb|-statistics| option, \verb|ip| also
483prints interface statistics:
484
485\begin{verbatim}
486kuznet@alisa:~ $ ip -s link ls eth0
4873: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc cbq qlen 100
488 link/ether 00:a0:cc:66:18:78 brd ff:ff:ff:ff:ff:ff
489 RX: bytes packets errors dropped overrun mcast
490 2449949362 2786187 0 0 0 0
491 TX: bytes packets errors dropped carrier collsns
492 178558497 1783945 332 0 332 35172
493kuznet@alisa:~ $
494\end{verbatim}
495\verb|RX:| and \verb|TX:| lines summarize receiver and transmitter
496statistics. They contain:
497\begin{itemize}
498\item \verb|bytes| --- the total number of bytes received or transmitted
499on the interface. This number wraps when the maximal length of the data type
500natural for the architecture is exceeded, so continuous monitoring requires
501a user level daemon snapping it periodically.
502\item \verb|packets| --- the total number of packets received or transmitted
503on the interface.
504\item \verb|errors| --- the total number of receiver or transmitter errors.
505\item \verb|dropped| --- the total number of packets dropped due to lack
506of resources.
507\item \verb|overrun| --- the total number of receiver overruns resulting
508in dropped packets. As a rule, if the interface is overrun, it means
509serious problems in the kernel or that your machine is too slow
510for this interface.
511\item \verb|mcast| --- the total number of received multicast packets. This option
512is only supported by a few devices.
513\item \verb|carrier| --- total number of link media failures f.e.\ because
514of lost carrier.
515\item \verb|collsns| --- the total number of collision events
516on Ethernet-like media. This number may have a different sense on other
517link types.
518\item \verb|compressed| --- the total number of compressed packets. This is
519available only for links using VJ header compression.
520\end{itemize}
521
522
523If the \verb|-s| option is entered twice or more,
524\verb|ip| prints more detailed statistics on receiver
525and transmitter errors.
526
527\begin{verbatim}
528kuznet@alisa:~ $ ip -s -s link ls eth0
5293: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc cbq qlen 100
530 link/ether 00:a0:cc:66:18:78 brd ff:ff:ff:ff:ff:ff
531 RX: bytes packets errors dropped overrun mcast
532 2449949362 2786187 0 0 0 0
533 RX errors: length crc frame fifo missed
534 0 0 0 0 0
535 TX: bytes packets errors dropped carrier collsns
536 178558497 1783945 332 0 332 35172
537 TX errors: aborted fifo window heartbeat
538 0 0 0 332
539kuznet@alisa:~ $
540\end{verbatim}
541These error names are pure Ethernetisms. Other devices
542may have non zero values in these fields but they may be
543interpreted differently.
544
545
546\section{{\tt ip address} --- protocol address management}
547
548\paragraph{Abbreviations:} \verb|address|, \verb|addr|, \verb|a|.
549
550\paragraph{Object:} The \verb|address| is a protocol (IP or IPv6) address attached
551to a network device. Each device must have at least one address
552to use the corresponding protocol. It is possible to have several
553different addresses attached to one device. These addresses are not
554discriminated, so that the term {\em alias\/} is not quite appropriate
555for them and we do not use it in this document.
556
557The \verb|ip addr| command displays addresses and their properties,
558adds new addresses and deletes old ones.
559
560\paragraph{Commands:} \verb|add|, \verb|delete|, \verb|flush| and \verb|show|
561(or \verb|list|).
562
563
564\subsection{{\tt ip address add} --- add a new protocol address}
565\label{IP-ADDR-ADD}
566
567\paragraph{Abbreviations:} \verb|add|, \verb|a|.
568
569\paragraph{Arguments:}
570
571\begin{itemize}
572\item \verb|dev NAME|
573
574\noindent--- the name of the device to add the address to.
575
576\item \verb|local ADDRESS| (default)
577
578--- the address of the interface. The format of the address depends
579on the protocol. It is a dotted quad for IP and a sequence of hexadecimal halfwords
580separated by colons for IPv6. The \verb|ADDRESS| may be followed by
581a slash and a decimal number which encodes the network prefix length.
582
583
584\item \verb|peer ADDRESS|
585
586--- the address of the remote endpoint for pointopoint interfaces.
587Again, the \verb|ADDRESS| may be followed by a slash and a decimal number,
588encoding the network prefix length. If a peer address is specified,
589the local address {\em cannot\/} have a prefix length. The network prefix is associated
590with the peer rather than with the local address.
591
592
593\item \verb|broadcast ADDRESS|
594
595--- the broadcast address on the interface.
596
597It is possible to use the special symbols \verb|'+'| and \verb|'-'|
598instead of the broadcast address. In this case, the broadcast address
599is derived by setting/resetting the host bits of the interface prefix.
600
601\vskip 1mm
602\begin{NB}
603Unlike \verb|ifconfig|, the \verb|ip| utility {\em does not\/} set any broadcast
604address unless explicitly requested.
605\end{NB}
606
607
608\item \verb|label NAME|
609
610--- Each address may be tagged with a label string.
611In order to preserve compatibility with Linux-2.0 net aliases,
612this string must coincide with the name of the device or must be prefixed
613with the device name followed by colon.
614
615
616\item \verb|scope SCOPE_VALUE|
617
618--- the scope of the area where this address is valid.
619The available scopes are listed in file \verb|/etc/iproute2/rt_scopes|.
620Predefined scope values are:
621
622 \begin{itemize}
623 \item \verb|global| --- the address is globally valid.
624 \item \verb|site| --- (IPv6 only) the address is site local,
625 i.e.\ it is valid inside this site.
626 \item \verb|link| --- the address is link local, i.e.\
627 it is valid only on this device.
628 \item \verb|host| --- the address is valid only inside this host.
629 \end{itemize}
630
631Appendix~\ref{ADDR-SEL} (p.\pageref{ADDR-SEL} of this document)
632contains more details on address scopes.
633
634\end{itemize}
635
636\paragraph{Examples:}
637\begin{itemize}
638\item \verb|ip addr add 127.0.0.1/8 dev lo brd + scope host|
639
640--- add the usual loopback address to the loopback device.
641
642\item \verb|ip addr add 10.0.0.1/24 brd + dev eth0 label eth0:Alias|
643
644--- add the address 10.0.0.1 with prefix length 24 (i.e.\ netmask
645\verb|255.255.255.0|), standard broadcast and label \verb|eth0:Alias|
646to the interface \verb|eth0|.
647\end{itemize}
648
649
650\subsection{{\tt ip address delete} --- delete a protocol address}
651
652\paragraph{Abbreviations:} \verb|delete|, \verb|del|, \verb|d|.
653
654\paragraph{Arguments:} coincide with the arguments of \verb|ip addr add|.
655The device name is a required argument. The rest are optional.
656If no arguments are given, the first address is deleted.
657
658\paragraph{Examples:}
659\begin{itemize}
660\item \verb|ip addr del 127.0.0.1/8 dev lo|
661
662--- deletes the loopback address from the loopback device.
663It would be best not to repeat this experiment.
664
665\item Disable IP on the interface \verb|eth0|:
666\begin{verbatim}
667 while ip -f inet addr del dev eth0; do
668 : nothing
669 done
670\end{verbatim}
671Another method to disable IP on an interface using {\tt ip addr flush}
672may be found in sec.\ref{IP-ADDR-FLUSH}, p.\pageref{IP-ADDR-FLUSH}.
673
674\end{itemize}
675
676
677\subsection{{\tt ip address show} --- display protocol addresses}
678
679\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|lst|, \verb|sh|, \verb|ls|,
680\verb|l|.
681
682\paragraph{Arguments:}
683
684\begin{itemize}
685\item \verb|dev NAME| (default)
686
687--- the name of the device.
688
689\item \verb|scope SCOPE_VAL|
690
691--- only list addresses with this scope.
692
693\item \verb|to PREFIX|
694
695--- only list addresses matching this prefix.
696
697\item \verb|label PATTERN|
698
699--- only list addresses with labels matching the \verb|PATTERN|.
700\verb|PATTERN| is a usual shell style pattern.
701
702
703\item \verb|dynamic| and \verb|permanent|
704
705--- (IPv6 only) only list addresses installed due to stateless
706address configuration or only list permanent (not dynamic) addresses.
707
708\item \verb|tentative|
709
710--- (IPv6 only) only list addresses which did not pass duplicate
711address detection.
712
713\item \verb|deprecated|
714
715--- (IPv6 only) only list deprecated addresses.
716
717
718\item \verb|primary| and \verb|secondary|
719
720--- only list primary (or secondary) addresses.
721
722\end{itemize}
723
724
725\paragraph{Output format:}
726
727\begin{verbatim}
728kuznet@alisa:~ $ ip addr ls eth0
7293: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc cbq qlen 100
730 link/ether 00:a0:cc:66:18:78 brd ff:ff:ff:ff:ff:ff
731 inet 193.233.7.90/24 brd 193.233.7.255 scope global eth0
732 inet6 3ffe:2400:0:1:2a0:ccff:fe66:1878/64 scope global dynamic
733 valid_lft forever preferred_lft 604746sec
734 inet6 fe80::2a0:ccff:fe66:1878/10 scope link
735kuznet@alisa:~ $
736\end{verbatim}
737
738The first two lines coincide with the output of \verb|ip link ls|.
739It is natural to interpret link layer addresses
740as addresses of the protocol family \verb|AF_PACKET|.
741
742Then the list of IP and IPv6 addresses follows, accompanied by
743additional address attributes: scope value (see Sec.\ref{IP-ADDR-ADD},
744p.\pageref{IP-ADDR-ADD} above), flags and the address label.
745
746Address flags are set by the kernel and cannot be changed
747administratively. Currently, the following flags are defined:
748
749\begin{enumerate}
750\item \verb|secondary|
751
752--- the address is not used when selecting the default source address
753of outgoing packets (Cf.\ Appendix~\ref{ADDR-SEL}, p.\pageref{ADDR-SEL}.).
754An IP address becomes secondary if another address with the same
755prefix bits already exists. The first address is primary.
756It is the leader of the group of all secondary addresses. When the leader
757is deleted, all secondaries are purged too.
3a9e4821
AH
758There is a tweak in \verb|/proc/sys/net/ipv4/conf/<dev>/promote_secondaries|
759which activate secondaries promotion when a primary is deleted.
760To permanently enable this feature on all devices add
761\verb|net.ipv4.conf.all.promote_secondaries=1| to \verb|/etc/sysctl.conf|.
762This tweak is available in linux 2.6.15 and later.
aba5acdf
SH
763
764
765\item \verb|dynamic|
766
767--- the address was created due to stateless autoconfiguration~\cite{RFC-ADDRCONF}.
768In this case the output also contains information on times, when
769the address is still valid. After \verb|preferred_lft| expires the address is
770moved to the deprecated state. After \verb|valid_lft| expires the address
771is finally invalidated.
772
773\item \verb|deprecated|
774
775--- the address is deprecated, i.e.\ it is still valid, but cannot
776be used by newly created connections.
777
778\item \verb|tentative|
779
780--- the address is not used because duplicate address detection~\cite{RFC-ADDRCONF}
781is still not complete or failed.
782
783\end{enumerate}
784
785
786\subsection{{\tt ip address flush} --- flush protocol addresses}
787\label{IP-ADDR-FLUSH}
788
789\paragraph{Abbreviations:} \verb|flush|, \verb|f|.
790
791\paragraph{Description:}This command flushes the protocol addresses
792selected by some criteria.
793
794\paragraph{Arguments:} This command has the same arguments as \verb|show|.
795The difference is that it does not run when no arguments are given.
796
797\paragraph{Warning:} This command (and other \verb|flush| commands
798described below) is pretty dangerous. If you make a mistake, it will
799not forgive it, but will cruelly purge all the addresses.
800
801\paragraph{Statistics:} With the \verb|-statistics| option, the command
802becomes verbose. It prints out the number of deleted addresses and the number
803of rounds made to flush the address list. If this option is given
804twice, \verb|ip addr flush| also dumps all the deleted addresses
805in the format described in the previous subsection.
806
807\paragraph{Example:} Delete all the addresses from the private network
80810.0.0.0/8:
809\begin{verbatim}
810netadm@amber:~ # ip -s -s a f to 10/8
8112: dummy inet 10.7.7.7/16 brd 10.7.255.255 scope global dummy
8123: eth0 inet 10.10.7.7/16 brd 10.10.255.255 scope global eth0
8134: eth1 inet 10.8.7.7/16 brd 10.8.255.255 scope global eth1
814
815*** Round 1, deleting 3 addresses ***
816*** Flush is complete after 1 round ***
817netadm@amber:~ #
818\end{verbatim}
819Another instructive example is disabling IP on all the Ethernets:
820\begin{verbatim}
821netadm@amber:~ # ip -4 addr flush label "eth*"
822\end{verbatim}
823And the last example shows how to flush all the IPv6 addresses
824acquired by the host from stateless address autoconfiguration
825after you enabled forwarding or disabled autoconfiguration.
826\begin{verbatim}
827netadm@amber:~ # ip -6 addr flush dynamic
828\end{verbatim}
829
830
831
832\section{{\tt ip neighbour} --- neighbour/arp tables management}
833
834\paragraph{Abbreviations:} \verb|neighbour|, \verb|neighbor|, \verb|neigh|,
835\verb|n|.
836
837\paragraph{Object:} \verb|neighbour| objects establish bindings between protocol
838addresses and link layer addresses for hosts sharing the same link.
839Neighbour entries are organized into tables. The IPv4 neighbour table
840is known by another name --- the ARP table.
841
842The corresponding commands display neighbour bindings
843and their properties, add new neighbour entries and delete old ones.
844
845\paragraph{Commands:} \verb|add|, \verb|change|, \verb|replace|,
846\verb|delete|, \verb|flush| and \verb|show| (or \verb|list|).
847
848\paragraph{See also:} Appendix~\ref{PROXY-NEIGH}, p.\pageref{PROXY-NEIGH}
849describes how to manage proxy ARP/NDISC with the \verb|ip| utility.
850
851
852\subsection{{\tt ip neighbour add} --- add a new neighbour entry\\
853 {\tt ip neighbour change} --- change an existing entry\\
854 {\tt ip neighbour replace} --- add a new entry or change an existing one}
855
856\paragraph{Abbreviations:} \verb|add|, \verb|a|; \verb|change|, \verb|chg|;
857\verb|replace|, \verb|repl|.
858
859\paragraph{Description:} These commands create new neighbour records
860or update existing ones.
861
862\paragraph{Arguments:}
863
864\begin{itemize}
865\item \verb|to ADDRESS| (default)
866
867--- the protocol address of the neighbour. It is either an IPv4 or IPv6 address.
868
869\item \verb|dev NAME|
870
871--- the interface to which this neighbour is attached.
872
873
874\item \verb|lladdr LLADDRESS|
875
876--- the link layer address of the neighbour. \verb|LLADDRESS| can also be
877\verb|null|.
878
879\item \verb|nud NUD_STATE|
880
881--- the state of the neighbour entry. \verb|nud| is an abbreviation for ``Neighbour
882Unreachability Detection''. The state can take one of the following values:
883
884\begin{enumerate}
885\item \verb|permanent| --- the neighbour entry is valid forever and can be only be removed
886administratively.
887\item \verb|noarp| --- the neighbour entry is valid. No attempts to validate
888this entry will be made but it can be removed when its lifetime expires.
889\item \verb|reachable| --- the neighbour entry is valid until the reachability
890timeout expires.
891\item \verb|stale| --- the neighbour entry is valid but suspicious.
892This option to \verb|ip neigh| does not change the neighbour state if
893it was valid and the address is not changed by this command.
894\end{enumerate}
895
896\end{itemize}
897
898\paragraph{Examples:}
899\begin{itemize}
900\item \verb|ip neigh add 10.0.0.3 lladdr 0:0:0:0:0:1 dev eth0 nud perm|
901
902--- add a permanent ARP entry for the neighbour 10.0.0.3 on the device \verb|eth0|.
903
904\item \verb|ip neigh chg 10.0.0.3 dev eth0 nud reachable|
905
906--- change its state to \verb|reachable|.
907\end{itemize}
908
909
910\subsection{{\tt ip neighbour delete} --- delete a neighbour entry}
911
912\paragraph{Abbreviations:} \verb|delete|, \verb|del|, \verb|d|.
913
914\paragraph{Description:} This command invalidates a neighbour entry.
915
916\paragraph{Arguments:} The arguments are the same as with \verb|ip neigh add|,
917except that \verb|lladdr| and \verb|nud| are ignored.
918
919
920\paragraph{Example:}
921\begin{itemize}
922\item \verb|ip neigh del 10.0.0.3 dev eth0|
923
924--- invalidate an ARP entry for the neighbour 10.0.0.3 on the device \verb|eth0|.
925
926\end{itemize}
927
928\begin{NB}
929 The deleted neighbour entry will not disappear from the tables
930 immediately. If it is in use it cannot be deleted until the last
931 client releases it. Otherwise it will be destroyed during
932 the next garbage collection.
933\end{NB}
934
935
936\paragraph{Warning:} Attempts to delete or manually change
937a \verb|noarp| entry created by the kernel may result in unpredictable behaviour.
938Particularly, the kernel may try to resolve this address even
939on a \verb|NOARP| interface or if the address is multicast or broadcast.
940
941
942\subsection{{\tt ip neighbour show} --- list neighbour entries}
943
944\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|sh|, \verb|ls|.
945
946\paragraph{Description:}This commands displays neighbour tables.
947
948\paragraph{Arguments:}
949
950\begin{itemize}
951
952\item \verb|to ADDRESS| (default)
953
954--- the prefix selecting the neighbours to list.
955
956\item \verb|dev NAME|
957
958--- only list the neighbours attached to this device.
959
960\item \verb|unused|
961
962--- only list neighbours which are not currently in use.
963
964\item \verb|nud NUD_STATE|
965
966--- only list neighbour entries in this state. \verb|NUD_STATE| takes
967values listed below or the special value \verb|all| which means all states.
968This option may occur more than once. If this option is absent, \verb|ip|
969lists all entries except for \verb|none| and \verb|noarp|.
970
971\end{itemize}
972
973
974\paragraph{Output format:}
975
976\begin{verbatim}
977kuznet@alisa:~ $ ip neigh ls
978:: dev lo lladdr 00:00:00:00:00:00 nud noarp
979fe80::200:cff:fe76:3f85 dev eth0 lladdr 00:00:0c:76:3f:85 router \
980 nud stale
9810.0.0.0 dev lo lladdr 00:00:00:00:00:00 nud noarp
982193.233.7.254 dev eth0 lladdr 00:00:0c:76:3f:85 nud reachable
983193.233.7.85 dev eth0 lladdr 00:e0:1e:63:39:00 nud stale
984kuznet@alisa:~ $
985\end{verbatim}
986
987The first word of each line is the protocol address of the neighbour.
988Then the device name follows. The rest of the line describes the contents of
989the neighbour entry identified by the pair (device, address).
990
991\verb|lladdr| is the link layer address of the neighbour.
992
993\verb|nud| is the state of the ``neighbour unreachability detection'' machine
994for this entry. The detailed description of the neighbour
995state machine can be found in~\cite{RFC-NDISC}. Here is the full list
996of the states with short descriptions:
997
998\begin{enumerate}
999\item\verb|none| --- the state of the neighbour is void.
1000\item\verb|incomplete| --- the neighbour is in the process of resolution.
1001\item\verb|reachable| --- the neighbour is valid and apparently reachable.
1002\item\verb|stale| --- the neighbour is valid, but is probably already
1003unreachable, so the kernel will try to check it at the first transmission.
1004\item\verb|delay| --- a packet has been sent to the stale neighbour and the kernel is waiting
1005for confirmation.
1006\item\verb|probe| --- the delay timer expired but no confirmation was received.
1007The kernel has started to probe the neighbour with ARP/NDISC messages.
1008\item\verb|failed| --- resolution has failed.
1009\item\verb|noarp| --- the neighbour is valid. No attempts to check the entry
1010will be made.
1011\item\verb|permanent| --- it is a \verb|noarp| entry, but only the administrator
1012may remove the entry from the neighbour table.
1013\end{enumerate}
1014
1015The link layer address is valid in all states except for \verb|none|,
1016\verb|failed| and \verb|incomplete|.
1017
1018IPv6 neighbours can be marked with the additional flag \verb|router|
1019which means that the neighbour introduced itself as an IPv6 router~\cite{RFC-NDISC}.
1020
1021\paragraph{Statistics:} The \verb|-statistics| option displays some usage
1022statistics, f.e.\
1023
1024\begin{verbatim}
1025kuznet@alisa:~ $ ip -s n ls 193.233.7.254
1026193.233.7.254 dev eth0 lladdr 00:00:0c:76:3f:85 ref 5 used 12/13/20 \
1027 nud reachable
1028kuznet@alisa:~ $
1029\end{verbatim}
1030
1031Here \verb|ref| is the number of users of this entry
1032and \verb|used| is a triplet of time intervals in seconds
1033separated by slashes. In this case they show that:
1034
1035\begin{enumerate}
1036\item the entry was used 12 seconds ago.
1037\item the entry was confirmed 13 seconds ago.
1038\item the entry was updated 20 seconds ago.
1039\end{enumerate}
1040
1041\subsection{{\tt ip neighbour flush} --- flush neighbour entries}
1042
1043\paragraph{Abbreviations:} \verb|flush|, \verb|f|.
1044
1045\paragraph{Description:}This command flushes neighbour tables, selecting
1046entries to flush by some criteria.
1047
1048\paragraph{Arguments:} This command has the same arguments as \verb|show|.
1049The differences are that it does not run when no arguments are given,
1050and that the default neighbour states to be flushed do not include
1051\verb|permanent| and \verb|noarp|.
1052
1053
1054\paragraph{Statistics:} With the \verb|-statistics| option, the command
1055becomes verbose. It prints out the number of deleted neighbours and the number
1056of rounds made to flush the neighbour table. If the option is given
1057twice, \verb|ip neigh flush| also dumps all the deleted neighbours
1058in the format described in the previous subsection.
1059
1060\paragraph{Example:}
1061\begin{verbatim}
1062netadm@alisa:~ # ip -s -s n f 193.233.7.254
1063193.233.7.254 dev eth0 lladdr 00:00:0c:76:3f:85 ref 5 used 12/13/20 \
1064 nud reachable
1065
1066*** Round 1, deleting 1 entries ***
1067*** Flush is complete after 1 round ***
1068netadm@alisa:~ #
1069\end{verbatim}
1070
1071
1072\section{{\tt ip route} --- routing table management}
1073\label{IP-ROUTE}
1074
1075\paragraph{Abbreviations:} \verb|route|, \verb|ro|, \verb|r|.
1076
1077\paragraph{Object:} \verb|route| entries in the kernel routing tables keep
1078information about paths to other networked nodes.
1079
1080Each route entry has a {\em key\/} consisting of a {\em prefix\/}
1081(i.e.\ a pair containing a network address and the length of its mask) and,
1082optionally, the TOS value. An IP packet matches the route if the highest
1083bits of its destination address are equal to the route prefix at least
1084up to the prefix length and if the TOS of the route is zero or equal to
1085the TOS of the packet.
1086
1087If several routes match the packet, the following pruning rules
1088are used to select the best one (see~\cite{RFC1812}):
1089\begin{enumerate}
1090\item The longest matching prefix is selected. All shorter ones
1091are dropped.
1092
1093\item If the TOS of some route with the longest prefix is equal to the TOS
1094of the packet, the routes with different TOS are dropped.
1095
1096If no exact TOS match was found and routes with TOS=0 exist,
1097the rest of routes are pruned.
1098
1099Otherwise, the route lookup fails.
1100
1101\item If several routes remain after the previous steps, then
1102the routes with the best preference values are selected.
1103
1104\item If we still have several routes, then the {\em first\/} of them
1105is selected.
1106
1107\begin{NB}
1108 Note the ambiguity of the last step. Unfortunately, Linux
1109 historically allows such a bizarre situation. The sense of the
1110word ``first'' depends on the order of route additions and it is practically
1111impossible to maintain a bundle of such routes in this order.
1112\end{NB}
1113
1114For simplicity we will limit ourselves to the case where such a situation
1115is impossible and routes are uniquely identified by the triplet
1116\{prefix, tos, preference\}. Actually, it is impossible to create
1117non-unique routes with \verb|ip| commands described in this section.
1118
1119One useful exception to this rule is the default route on non-forwarding
1120hosts. It is ``officially'' allowed to have several fallback routes
1121when several routers are present on directly connected networks.
1122In this case, Linux-2.2 makes ``dead gateway detection''~\cite{RFC1122}
1123controlled by neighbour unreachability detection and by advice
1124from transport protocols to select a working router, so the order
1125of the routes is not essential. However, in this case,
1126fiddling with default routes manually is not recommended. Use the Router Discovery
1127protocol (see Appendix~\ref{EXAMPLE-SETUP}, p.\pageref{EXAMPLE-SETUP})
1128instead. Actually, Linux-2.2 IPv6 does not give user level applications
1129any access to default routes.
1130\end{enumerate}
1131
1132Certainly, the steps above are not performed exactly
1133in this sequence. Instead, the routing table in the kernel is kept
1134in some data structure to achieve the final result
1135with minimal cost. However, not depending on a particular
1136routing algorithm implemented in the kernel, we can summarize
1137the statements above as: a route is identified by the triplet
1138\{prefix, tos, preference\}. This {\em key\/} lets us locate
1139the route in the routing table.
1140
1141\paragraph{Route attributes:} Each route key refers to a routing
1142information record containing
1143the data required to deliver IP packets (f.e.\ output device and
1144next hop router) and some optional attributes (f.e. the path MTU or
1145the preferred source address when communicating with this destination).
1146These attributes are described in the following subsection.
1147
1148\paragraph{Route types:} \label{IP-ROUTE-TYPES}
1149It is important that the set
1150of required and optional attributes depend on the route {\em type\/}.
1151The most important route type
1152is \verb|unicast|. It describes real paths to other hosts.
1153As a rule, common routing tables contain only such routes. However,
1154there are other types of routes with different semantics. The
1155full list of types understood by Linux-2.2 is:
1156\begin{itemize}
1157\item \verb|unicast| --- the route entry describes real paths to the
1158destinations covered by the route prefix.
1159\item \verb|unreachable| --- these destinations are unreachable. Packets
1160are discarded and the ICMP message {\em host unreachable\/} is generated.
1161The local senders get an \verb|EHOSTUNREACH| error.
1162\item \verb|blackhole| --- these destinations are unreachable. Packets
1163are discarded silently. The local senders get an \verb|EINVAL| error.
1164\item \verb|prohibit| --- these destinations are unreachable. Packets
1165are discarded and the ICMP message {\em communication administratively
1166prohibited\/} is generated. The local senders get an \verb|EACCES| error.
1167\item \verb|local| --- the destinations are assigned to this
1168host. The packets are looped back and delivered locally.
1169\item \verb|broadcast| --- the destinations are broadcast addresses.
1170The packets are sent as link broadcasts.
1171\item \verb|throw| --- a special control route used together with policy
1172rules (see sec.\ref{IP-RULE}, p.\pageref{IP-RULE}). If such a route is selected, lookup
1173in this table is terminated pretending that no route was found.
1174Without policy routing it is equivalent to the absence of the route in the routing
1175table. The packets are dropped and the ICMP message {\em net unreachable\/}
1176is generated. The local senders get an \verb|ENETUNREACH| error.
1177\item \verb|nat| --- a special NAT route. Destinations covered by the prefix
1178are considered to be dummy (or external) addresses which require translation
1179to real (or internal) ones before forwarding. The addresses to translate to
1180are selected with the attribute \verb|via|. More about NAT is
1181in Appendix~\ref{ROUTE-NAT}, p.\pageref{ROUTE-NAT}.
1182\item \verb|anycast| --- ({\em not implemented\/}) the destinations are
1183{\em anycast\/} addresses assigned to this host. They are mainly equivalent
1184to \verb|local| with one difference: such addresses are invalid when used
1185as the source address of any packet.
1186\item \verb|multicast| --- a special type used for multicast routing.
1187It is not present in normal routing tables.
1188\end{itemize}
1189
1190\paragraph{Route tables:} Linux-2.2 can pack routes into several routing
1191tables identified by a number in the range from 1 to 255 or by
1192name from the file \verb|/etc/iproute2/rt_tables|. By default all normal
1193routes are inserted into the \verb|main| table (ID 254) and the kernel only uses
1194this table when calculating routes.
1195
1196Actually, one other table always exists, which is invisible but
1197even more important. It is the \verb|local| table (ID 255). This table
1198consists of routes for local and broadcast addresses. The kernel maintains
1199this table automatically and the administrator usually need not modify it
1200or even look at it.
1201
1202The multiple routing tables enter the game when {\em policy routing\/}
1203is used. See sec.\ref{IP-RULE}, p.\pageref{IP-RULE}.
1204In this case, the table identifier effectively becomes
1205one more parameter, which should be added to the triplet
1206\{prefix, tos, preference\} to uniquely identify the route.
1207
1208
1209\subsection{{\tt ip route add} --- add a new route\\
1210 {\tt ip route change} --- change a route\\
1211 {\tt ip route replace} --- change a route or add a new one}
1212\label{IP-ROUTE-ADD}
1213
1214\paragraph{Abbreviations:} \verb|add|, \verb|a|; \verb|change|, \verb|chg|;
1215 \verb|replace|, \verb|repl|.
1216
1217
1218\paragraph{Arguments:}
1219\begin{itemize}
1220\item \verb|to PREFIX| or \verb|to TYPE PREFIX| (default)
1221
1222--- the destination prefix of the route. If \verb|TYPE| is omitted,
1223\verb|ip| assumes type \verb|unicast|. Other values of \verb|TYPE|
1224are listed above. \verb|PREFIX| is an IP or IPv6 address optionally followed
1225by a slash and the prefix length. If the length of the prefix is missing,
1226\verb|ip| assumes a full-length host route. There is also a special
1227\verb|PREFIX| --- \verb|default| --- which is equivalent to IP \verb|0/0| or
1228to IPv6 \verb|::/0|.
1229
1230\item \verb|tos TOS| or \verb|dsfield TOS|
1231
1232--- the Type Of Service (TOS) key. This key has no associated mask and
1233the longest match is understood as: First, compare the TOS
1234of the route and of the packet. If they are not equal, then the packet
1235may still match a route with a zero TOS. \verb|TOS| is either an 8 bit hexadecimal
1236number or an identifier from {\tt /etc/iproute2/rt\_dsfield}.
1237
1238
1239\item \verb|metric NUMBER| or \verb|preference NUMBER|
1240
1241--- the preference value of the route. \verb|NUMBER| is an arbitrary 32bit number.
1242
1243\item \verb|table TABLEID|
1244
1245--- the table to add this route to.
1246\verb|TABLEID| may be a number or a string from the file
1247\verb|/etc/iproute2/rt_tables|. If this parameter is omitted,
1248\verb|ip| assumes the \verb|main| table, with the exception of
1249\verb|local|, \verb|broadcast| and \verb|nat| routes, which are
1250put into the \verb|local| table by default.
1251
1252\item \verb|dev NAME|
1253
1254--- the output device name.
1255
1256\item \verb|via ADDRESS|
1257
1258--- the address of the nexthop router. Actually, the sense of this field depends
1259on the route type. For normal \verb|unicast| routes it is either the true nexthop
1260router or, if it is a direct route installed in BSD compatibility mode,
1261it can be a local address of the interface.
1262For NAT routes it is the first address of the block of translated IP destinations.
1263
1264\item \verb|src ADDRESS|
1265
1266--- the source address to prefer when sending to the destinations
1267covered by the route prefix.
1268
1269\item \verb|realm REALMID|
1270
1271--- the realm to which this route is assigned.
1272\verb|REALMID| may be a number or a string from the file
1273\verb|/etc/iproute2/rt_realms|. Sec.\ref{RT-REALMS} (p.\pageref{RT-REALMS})
1274contains more information on realms.
1275
1276\item \verb|mtu MTU| or \verb|mtu lock MTU|
1277
1278--- the MTU along the path to the destination. If the modifier \verb|lock| is
1279not used, the MTU may be updated by the kernel due to Path MTU Discovery.
1280If the modifier \verb|lock| is used, no path MTU discovery will be tried,
1281all packets will be sent without the DF bit in IPv4 case
1282or fragmented to MTU for IPv6.
1283
1284\item \verb|window NUMBER|
1285
1286--- the maximal window for TCP to advertise to these destinations,
1287measured in bytes. It limits maximal data bursts that our TCP
1288peers are allowed to send to us.
1289
1290\item \verb|rtt NUMBER|
1291
1292--- the initial RTT (``Round Trip Time'') estimate.
1293
1294
1295\item \verb|rttvar NUMBER|
1296
1297--- \threeonly the initial RTT variance estimate.
1298
1299
1300\item \verb|ssthresh NUMBER|
1301
1302--- \threeonly an estimate for the initial slow start threshold.
1303
1304
1305\item \verb|cwnd NUMBER|
1306
1307--- \threeonly the clamp for congestion window. It is ignored if the \verb|lock|
1308 flag is not used.
1309
1310
1311\item \verb|advmss NUMBER|
1312
1313--- \threeonly the MSS (``Maximal Segment Size'') to advertise to these
1314 destinations when establishing TCP connections. If it is not given,
1315 Linux uses a default value calculated from the first hop device MTU.
1316
1317\begin{NB}
1318 If the path to these destination is asymmetric, this guess may be wrong.
1319\end{NB}
1320
1321\item \verb|reordering NUMBER|
1322
1323--- \threeonly Maximal reordering on the path to this destination.
1324 If it is not given, Linux uses the value selected with \verb|sysctl|
1325 variable \verb|net/ipv4/tcp_reordering|.
1326
71e58151 1327\item \verb|hoplimit NUMBER|
aba5acdf 1328
71e58151
GBY
1329--- [2.5.74+ only] Maximum number of hops on the path to this destination.
1330 The default is the value selected with the \verb|sysctl| variable
1331 \verb|net/ipv4/ip_default_ttl|.
1332
1333\item \verb|initcwnd NUMBER|
1334--- [2.5.70+ only] Initial congestion window size for connections to
1335 this destination. Actual window size is this value multiplied by the
1336 MSS (``Maximal Segment Size'') for same connection. The default is
1337 zero, meaning to use the values specified in~\cite{RFC2414}.
aba5acdf 1338
f5fd8003 1339+\item \verb|initrwnd NUMBER|
1340
1341+--- [2.6.33+ only] Initial receive window size for connections to
1342+ this destination. The actual window size is this value multiplied
1343+ by the MSS (''Maximal Segment Size'') of the connection. The default
1344+ value is zero, meaning to use Slow Start value.
1345
aba5acdf
SH
1346\item \verb|nexthop NEXTHOP|
1347
1348--- the nexthop of a multipath route. \verb|NEXTHOP| is a complex value
1349with its own syntax similar to the top level argument lists:
1350\begin{itemize}
1351\item \verb|via ADDRESS| is the nexthop router.
1352\item \verb|dev NAME| is the output device.
1353\item \verb|weight NUMBER| is a weight for this element of a multipath
1354route reflecting its relative bandwidth or quality.
1355\end{itemize}
1356
1357\item \verb|scope SCOPE_VAL|
1358
1359--- the scope of the destinations covered by the route prefix.
1360\verb|SCOPE_VAL| may be a number or a string from the file
1361\verb|/etc/iproute2/rt_scopes|.
1362If this parameter is omitted,
1363\verb|ip| assumes scope \verb|global| for all gatewayed \verb|unicast|
1364routes, scope \verb|link| for direct \verb|unicast| and \verb|broadcast| routes
1365and scope \verb|host| for \verb|local| routes.
1366
1367\item \verb|protocol RTPROTO|
1368
1369--- the routing protocol identifier of this route.
1370\verb|RTPROTO| may be a number or a string from the file
1371\verb|/etc/iproute2/rt_protos|. If the routing protocol ID is
1372not given, \verb|ip| assumes protocol \verb|boot| (i.e.\
1373it assumes the route was added by someone who doesn't
1374understand what they are doing). Several protocol values have a fixed interpretation.
1375Namely:
1376\begin{itemize}
1377\item \verb|redirect| --- the route was installed due to an ICMP redirect.
1378\item \verb|kernel| --- the route was installed by the kernel during
1379autoconfiguration.
1380\item \verb|boot| --- the route was installed during the bootup sequence.
1381If a routing daemon starts, it will purge all of them.
1382\item \verb|static| --- the route was installed by the administrator
1383to override dynamic routing. Routing daemon will respect them
1384and, probably, even advertise them to its peers.
1385\item \verb|ra| --- the route was installed by Router Discovery protocol.
1386\end{itemize}
1387The rest of the values are not reserved and the administrator is free
1388to assign (or not to assign) protocol tags. At least, routing
1389daemons should take care of setting some unique protocol values,
1390f.e.\ as they are assigned in \verb|rtnetlink.h| or in \verb|rt_protos|
1391database.
1392
1393
1394\item \verb|onlink|
1395
1396--- pretend that the nexthop is directly attached to this link,
1397even if it does not match any interface prefix. One application of this
1398option may be found in~\cite{IP-TUNNELS}.
1399
aba5acdf
SH
1400\end{itemize}
1401
1402
1403\begin{NB}
1404 Actually there are more commands: \verb|prepend| does the same
1405 thing as classic \verb|route add|, i.e.\ adds a route, even if another
1406 route to the same destination exists. Its opposite case is \verb|append|,
1407 which adds the route to the end of the list. Avoid these
1408 features.
1409\end{NB}
1410\begin{NB}
1411 More sad news, IPv6 only understands the \verb|append| command correctly.
1412 All the others are translated into \verb|append| commands. Certainly,
1413 this will change in the future.
1414\end{NB}
1415
1416\paragraph{Examples:}
1417\begin{itemize}
1418\item add a plain route to network 10.0.0/24 via gateway 193.233.7.65
1419\begin{verbatim}
1420 ip route add 10.0.0/24 via 193.233.7.65
1421\end{verbatim}
1422\item change it to a direct route via the \verb|dummy| device
1423\begin{verbatim}
1424 ip ro chg 10.0.0/24 dev dummy
1425\end{verbatim}
1426\item add a default multipath route splitting the load between \verb|ppp0|
1427and \verb|ppp1|
1428\begin{verbatim}
1429 ip route add default scope global nexthop dev ppp0 \
1430 nexthop dev ppp1
1431\end{verbatim}
1432Note the scope value. It is not necessary but it informs the kernel
1433that this route is gatewayed rather than direct. Actually, if you
1434know the addresses of remote endpoints it would be better to use the
1435\verb|via| parameter.
1436\item announce that the address 192.203.80.144 is not a real one, but
1437should be translated to 193.233.7.83 before forwarding
1438\begin{verbatim}
1439 ip route add nat 192.203.80.144 via 193.233.7.83
1440\end{verbatim}
1441Backward translation is setup with policy rules described
1442in the following section (sec.\ref{IP-RULE}, p.\pageref{IP-RULE}).
1443\end{itemize}
1444
1445\subsection{{\tt ip route delete} --- delete a route}
1446
1447\paragraph{Abbreviations:} \verb|delete|, \verb|del|, \verb|d|.
1448
1449\paragraph{Arguments:} \verb|ip route del| has the same arguments as
1450\verb|ip route add|, but their semantics are a bit different.
1451
1452Key values (\verb|to|, \verb|tos|, \verb|preference| and \verb|table|)
1453select the route to delete. If optional attributes are present, \verb|ip|
1454verifies that they coincide with the attributes of the route to delete.
1455If no route with the given key and attributes was found, \verb|ip route del|
1456fails.
1457\begin{NB}
1458Linux-2.0 had the option to delete a route selected only by prefix address,
1459ignoring its length (i.e.\ netmask). This option no longer exists
1460because it was ambiguous. However, look at {\tt ip route flush}
1461(sec.\ref{IP-ROUTE-FLUSH}, p.\pageref{IP-ROUTE-FLUSH}) which
1462provides similar and even richer functionality.
1463\end{NB}
1464
1465\paragraph{Example:}
1466\begin{itemize}
1467\item delete the multipath route created by the command in previous subsection
1468\begin{verbatim}
1469 ip route del default scope global nexthop dev ppp0 \
1470 nexthop dev ppp1
1471\end{verbatim}
1472\end{itemize}
1473
1474
1475
1476\subsection{{\tt ip route show} --- list routes}
1477
1478\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|sh|, \verb|ls|, \verb|l|.
1479
1480\paragraph{Description:} the command displays the contents of the routing tables
1481or the route(s) selected by some criteria.
1482
1483
1484\paragraph{Arguments:}
1485\begin{itemize}
1486\item \verb|to SELECTOR| (default)
1487
1488--- only select routes from the given range of destinations. \verb|SELECTOR|
1489consists of an optional modifier (\verb|root|, \verb|match| or \verb|exact|)
1490and a prefix. \verb|root PREFIX| selects routes with prefixes not shorter
1491than \verb|PREFIX|. F.e.\ \verb|root 0/0| selects the entire routing table.
1492\verb|match PREFIX| selects routes with prefixes not longer than
1493\verb|PREFIX|. F.e.\ \verb|match 10.0/16| selects \verb|10.0/16|,
1494\verb|10/8| and \verb|0/0|, but it does not select \verb|10.1/16| and
1495\verb|10.0.0/24|. And \verb|exact PREFIX| (or just \verb|PREFIX|)
1496selects routes with this exact prefix. If neither of these options
1497are present, \verb|ip| assumes \verb|root 0/0| i.e.\ it lists the entire table.
1498
1499
1500\item \verb|tos TOS| or \verb|dsfield TOS|
1501
1502 --- only select routes with the given TOS.
1503
1504
1505\item \verb|table TABLEID|
1506
1507 --- show the routes from this table(s). The default setting is to show
1508\verb|table| \verb|main|. \verb|TABLEID| may either be the ID of a real table
1509or one of the special values:
1510 \begin{itemize}
1511 \item \verb|all| --- list all of the tables.
1512 \item \verb|cache| --- dump the routing cache.
1513 \end{itemize}
1514\begin{NB}
1515 IPv6 has a single table. However, splitting it into \verb|main|, \verb|local|
1516 and \verb|cache| is emulated by the \verb|ip| utility.
1517\end{NB}
1518
1519\item \verb|cloned| or \verb|cached|
1520
1521--- list cloned routes i.e.\ routes which were dynamically forked from
1522other routes because some route attribute (f.e.\ MTU) was updated.
1523Actually, it is equivalent to \verb|table cache|.
1524
1525\item \verb|from SELECTOR|
1526
1527--- the same syntax as for \verb|to|, but it binds the source address range
1528rather than destinations. Note that the \verb|from| option only works with
1529cloned routes.
1530
1531\item \verb|protocol RTPROTO|
1532
1533--- only list routes of this protocol.
1534
1535
1536\item \verb|scope SCOPE_VAL|
1537
1538--- only list routes with this scope.
1539
1540\item \verb|type TYPE|
1541
1542--- only list routes of this type.
1543
1544\item \verb|dev NAME|
1545
1546--- only list routes going via this device.
1547
1548\item \verb|via PREFIX|
1549
1550--- only list routes going via the nexthop routers selected by \verb|PREFIX|.
1551
1552\item \verb|src PREFIX|
1553
1554--- only list routes with preferred source addresses selected
1555by \verb|PREFIX|.
1556
1557\item \verb|realm REALMID| or \verb|realms FROMREALM/TOREALM|
1558
1559--- only list routes with these realms.
1560
1561\end{itemize}
1562
1563\paragraph{Examples:} Let us count routes of protocol \verb|gated/bgp|
1564on a router:
1565\begin{verbatim}
1566kuznet@amber:~ $ ip ro ls proto gated/bgp | wc
1567 1413 9891 79010
1568kuznet@amber:~ $
1569\end{verbatim}
1570To count the size of the routing cache, we have to use the \verb|-o| option
1571because cached attributes can take more than one line of output:
1572\begin{verbatim}
1573kuznet@amber:~ $ ip -o ro ls cloned | wc
1574 159 2543 18707
1575kuznet@amber:~ $
1576\end{verbatim}
1577
1578
1579\paragraph{Output format:} The output of this command consists
1580of per route records separated by line feeds.
1581However, some records may consist
1582of more than one line: particularly, this is the case when the route
1583is cloned or you requested additional statistics. If the
1584\verb|-o| option was given, then line feeds separating lines inside
1585records are replaced with the backslash sign.
1586
1587The output has the same syntax as arguments given to {\tt ip route add},
1588so that it can be understood easily. F.e.\
1589\begin{verbatim}
1590kuznet@amber:~ $ ip ro ls 193.233.7/24
1591193.233.7.0/24 dev eth0 proto gated/conn scope link \
1592 src 193.233.7.65 realms inr.ac
1593kuznet@amber:~ $
1594\end{verbatim}
1595
1596If you list cloned entries, the output contains other attributes which
1597are evaluated during route calculation and updated during route
1598lifetime. An example of the output is:
1599\begin{verbatim}
1600kuznet@amber:~ $ ip ro ls 193.233.7.82 tab cache
1601193.233.7.82 from 193.233.7.82 dev eth0 src 193.233.7.65 \
1602 realms inr.ac/inr.ac
1603 cache <src-direct,redirect> mtu 1500 rtt 300 iif eth0
1604193.233.7.82 dev eth0 src 193.233.7.65 realms inr.ac
1605 cache mtu 1500 rtt 300
1606kuznet@amber:~ $
1607\end{verbatim}
1608\begin{NB}
1609 \label{NB-strange-route}
1610 The route looks a bit strange, doesn't it? Did you notice that
1611 it is a path from 193.233.7.82 back to 193.233.82? Well, you will
1612 see in the section on \verb|ip route get| (p.\pageref{NB-nature-of-strangeness})
1613 how it appeared.
1614\end{NB}
1615The second line, starting with the word \verb|cache|, shows
1616additional attributes which normal routes do not possess.
1617Cached flags are summarized in angle brackets:
1618\begin{itemize}
1619\item \verb|local| --- packets are delivered locally.
1620It stands for loopback unicast routes, for broadcast routes
1621and for multicast routes, if this host is a member of the corresponding
1622group.
1623
1624\item \verb|reject| --- the path is bad. Any attempt to use it results
1625in an error. See attribute \verb|error| below (p.\pageref{IP-ROUTE-GET-error}).
1626
1627\item \verb|mc| --- the destination is multicast.
1628
1629\item \verb|brd| --- the destination is broadcast.
1630
1631\item \verb|src-direct| --- the source is on a directly connected
1632interface.
1633
1634\item \verb|redirected| --- the route was created by an ICMP Redirect.
1635
1636\item \verb|redirect| --- packets going via this route will
1637trigger an ICMP redirect.
1638
1639\item \verb|fastroute| --- the route is eligible to be used for fastroute.
1640
1641\item \verb|equalize| --- make packet by packet randomization
1642along this path.
1643
1644\item \verb|dst-nat| --- the destination address requires translation.
1645
1646\item \verb|src-nat| --- the source address requires translation.
1647
1648\item \verb|masq| --- the source address requires masquerading.
1649This feature disappeared in linux-2.4.
1650
1651\item \verb|notify| --- ({\em not implemented}) change/deletion
1652of this route will trigger RTNETLINK notification.
1653\end{itemize}
1654
1655Then some optional attributes follow:
1656\begin{itemize}
1657\item \verb|error| --- on \verb|reject| routes it is error code
1658returned to local senders when they try to use this route.
1659These error codes are translated into ICMP error codes, sent to remote
1660senders, according to the rules described above in the subsection
1661devoted to route types (p.\pageref{IP-ROUTE-TYPES}).
1662\label{IP-ROUTE-GET-error}
1663
1664\item \verb|expires| --- this entry will expire after this timeout.
1665
1666\item \verb|iif| --- the packets for this path are expected to arrive
1667on this interface.
1668\end{itemize}
1669
1670\paragraph{Statistics:} With the \verb|-statistics| option, more
1671information about this route is shown:
1672\begin{itemize}
1673\item \verb|users| --- the number of users of this entry.
1674\item \verb|age| --- shows when this route was last used.
1675\item \verb|used| --- the number of lookups of this route since its creation.
1676\end{itemize}
1677
f4ff11e3
DS
1678\subsection{{\tt ip route save} -- save routing tables}
1679\label{IP-ROUTE-SAVE}
1680
1681\paragraph{Description:} this command saves the contents of the routing
1682tables or the route(s) selected by some criteria to standard output.
1683
1684\paragraph{Arguments:} \verb|ip route save| has the same arguments as
1685\verb|ip route show|.
1686
1687\paragraph{Example:} This saves all the routes to the {\tt saved\_routes}
1688file:
1689\begin{verbatim}
1690dan@caffeine:~ # ip route save > saved_routes
1691\end{verbatim}
1692
1693\paragraph{Output format:} The format of the data stream provided by
1694\verb|ip route save| is that of \verb|rtnetlink|. See
1695\verb|rtnetlink(7)| for more information.
1696
1697\subsection{{\tt ip route restore} -- restore routing tables}
1698\label{IP-ROUTE-RESTORE}
1699
1700\paragraph{Description:} this command restores the contents of the routing
1701tables according to a data stream as provided by \verb|ip route save| via
1702standard input. Note that any routes already in the table are left unchanged.
1703Any routes in the input stream that already exist in the tables are ignored.
1704
1705\paragraph{Arguments:} This command takes no arguments.
1706
1707\paragraph{Example:} This restores all routes that were saved to the
1708{\tt saved\_routes} file:
1709
1710\begin{verbatim}
1711dan@caffeine:~ # ip route restore < saved_routes
1712\end{verbatim}
aba5acdf
SH
1713
1714\subsection{{\tt ip route flush} --- flush routing tables}
1715\label{IP-ROUTE-FLUSH}
1716
1717\paragraph{Abbreviations:} \verb|flush|, \verb|f|.
1718
1719\paragraph{Description:} this command flushes routes selected
1720by some criteria.
1721
1722\paragraph{Arguments:} the arguments have the same syntax and semantics
1723as the arguments of \verb|ip route show|, but routing tables are not
1724listed but purged. The only difference is the default action: \verb|show|
1725dumps all the IP main routing table but \verb|flush| prints the helper page.
1726The reason for this difference does not require any explanation, does it?
1727
1728
1729\paragraph{Statistics:} With the \verb|-statistics| option, the command
1730becomes verbose. It prints out the number of deleted routes and the number
1731of rounds made to flush the routing table. If the option is given
1732twice, \verb|ip route flush| also dumps all the deleted routes
1733in the format described in the previous subsection.
1734
1735\paragraph{Examples:} The first example flushes all the
1736gatewayed routes from the main table (f.e.\ after a routing daemon crash).
1737\begin{verbatim}
1738netadm@amber:~ # ip -4 ro flush scope global type unicast
1739\end{verbatim}
1740This option deserves to be put into a scriptlet \verb|routef|.
1741\begin{NB}
1742This option was described in the \verb|route(8)| man page borrowed
1743from BSD, but was never implemented in Linux.
1744\end{NB}
1745
1746The second example flushes all IPv6 cloned routes:
1747\begin{verbatim}
1748netadm@amber:~ # ip -6 -s -s ro flush cache
17493ffe:2400::220:afff:fef4:c5d1 via 3ffe:2400::220:afff:fef4:c5d1 \
1750 dev eth0 metric 0
1751 cache used 2 age 12sec mtu 1500 rtt 300
17523ffe:2400::280:adff:feb7:8034 via 3ffe:2400::280:adff:feb7:8034 \
1753 dev eth0 metric 0
1754 cache used 2 age 15sec mtu 1500 rtt 300
17553ffe:2400::280:c8ff:fe59:5bcc via 3ffe:2400::280:c8ff:fe59:5bcc \
1756 dev eth0 metric 0
1757 cache users 1 used 1 age 23sec mtu 1500 rtt 300
17583ffe:2400:0:1:2a0:ccff:fe66:1878 via 3ffe:2400:0:1:2a0:ccff:fe66:1878 \
1759 dev eth1 metric 0
1760 cache used 2 age 20sec mtu 1500 rtt 300
17613ffe:2400:0:1:a00:20ff:fe71:fb30 via 3ffe:2400:0:1:a00:20ff:fe71:fb30 \
1762 dev eth1 metric 0
1763 cache used 2 age 33sec mtu 1500 rtt 300
1764ff02::1 via ff02::1 dev eth1 metric 0
1765 cache users 1 used 1 age 45sec mtu 1500 rtt 300
1766
1767*** Round 1, deleting 6 entries ***
1768*** Flush is complete after 1 round ***
1769netadm@amber:~ # ip -6 -s -s ro flush cache
1770Nothing to flush.
1771netadm@amber:~ #
1772\end{verbatim}
1773
1774The third example flushes BGP routing tables after a \verb|gated|
1775death.
1776\begin{verbatim}
1777netadm@amber:~ # ip ro ls proto gated/bgp | wc
1778 1408 9856 78730
1779netadm@amber:~ # ip -s ro f proto gated/bgp
1780
1781*** Round 1, deleting 1408 entries ***
1782*** Flush is complete after 1 round ***
1783netadm@amber:~ # ip ro f proto gated/bgp
1784Nothing to flush.
1785netadm@amber:~ # ip ro ls proto gated/bgp
1786netadm@amber:~ #
1787\end{verbatim}
1788
1789
1790\subsection{{\tt ip route get} --- get a single route}
1791\label{IP-ROUTE-GET}
1792
1793\paragraph{Abbreviations:} \verb|get|, \verb|g|.
1794
1795\paragraph{Description:} this command gets a single route to a destination
1796and prints its contents exactly as the kernel sees it.
1797
1798\paragraph{Arguments:}
1799\begin{itemize}
1800\item \verb|to ADDRESS| (default)
1801
1802--- the destination address.
1803
1804\item \verb|from ADDRESS|
1805
1806--- the source address.
1807
1808\item \verb|tos TOS| or \verb|dsfield TOS|
1809
1810--- the Type Of Service.
1811
1812\item \verb|iif NAME|
1813
1814--- the device from which this packet is expected to arrive.
1815
1816\item \verb|oif NAME|
1817
1818--- force the output device on which this packet will be routed.
1819
1820\item \verb|connected|
1821
1822--- if no source address (option \verb|from|) was given, relookup
1823the route with the source set to the preferred address received from the first lookup.
1824If policy routing is used, it may be a different route.
1825
1826\end{itemize}
1827
1828Note that this operation is not equivalent to \verb|ip route show|.
1829\verb|show| shows existing routes. \verb|get| resolves them and
1830creates new clones if necessary. Essentially, \verb|get|
1831is equivalent to sending a packet along this path.
1832If the \verb|iif| argument is not given, the kernel creates a route
1833to output packets towards the requested destination.
1834This is equivalent to pinging the destination
1835with a subsequent {\tt ip route ls cache}, however, no packets are
1836actually sent. With the \verb|iif| argument, the kernel pretends
1837that a packet arrived from this interface and searches for
1838a path to forward the packet.
1839
1840\paragraph{Output format:} This command outputs routes in the same
1841format as \verb|ip route ls|.
1842
1843\paragraph{Examples:}
1844\begin{itemize}
1845\item Find a route to output packets to 193.233.7.82:
1846\begin{verbatim}
1847kuznet@amber:~ $ ip route get 193.233.7.82
1848193.233.7.82 dev eth0 src 193.233.7.65 realms inr.ac
1849 cache mtu 1500 rtt 300
1850kuznet@amber:~ $
1851\end{verbatim}
1852
1853\item Find a route to forward packets arriving on \verb|eth0|
1854from 193.233.7.82 and destined for 193.233.7.82:
1855\begin{verbatim}
1856kuznet@amber:~ $ ip r g 193.233.7.82 from 193.233.7.82 iif eth0
1857193.233.7.82 from 193.233.7.82 dev eth0 src 193.233.7.65 \
1858 realms inr.ac/inr.ac
1859 cache <src-direct,redirect> mtu 1500 rtt 300 iif eth0
1860kuznet@amber:~ $
1861\end{verbatim}
1862\begin{NB}
1863 \label{NB-nature-of-strangeness}
1864 This is the command that created the funny route from 193.233.7.82
1865 looped back to 193.233.7.82 (cf.\ NB on~p.\pageref{NB-strange-route}).
1866 Note the \verb|redirect| flag on it.
1867\end{NB}
1868
1869\item Find a multicast route for packets arriving on \verb|eth0|
1870from host 193.233.7.82 and destined for multicast group 224.2.127.254
1871(it is assumed that a multicast routing daemon is running.
1872In this case, it is \verb|pimd|)
1873\begin{verbatim}
1874kuznet@amber:~ $ ip r g 224.2.127.254 from 193.233.7.82 iif eth0
1875multicast 224.2.127.254 from 193.233.7.82 dev lo \
1876 src 193.233.7.65 realms inr.ac/cosmos
1877 cache <mc> iif eth0 Oifs: eth1 pimreg
1878kuznet@amber:~ $
1879\end{verbatim}
1880This route differs from the ones seen before. It contains a ``normal'' part
1881and a ``multicast'' part. The normal part is used to deliver (or not to
1882deliver) the packet to local IP listeners. In this case the router
1883is not a member
1884of this group, so that route has no \verb|local| flag and only
1885forwards packets. The output device for such entries is always loopback.
1886The multicast part consists of an additional \verb|Oifs:| list showing
1887the output interfaces.
1888\end{itemize}
1889
1890
1891It is time for a more complicated example. Let us add an invalid
1892gatewayed route for a destination which is really directly connected:
1893\begin{verbatim}
1894netadm@alisa:~ # ip route add 193.233.7.98 via 193.233.7.254
1895netadm@alisa:~ # ip route get 193.233.7.98
1896193.233.7.98 via 193.233.7.254 dev eth0 src 193.233.7.90
1897 cache mtu 1500 rtt 3072
1898netadm@alisa:~ #
1899\end{verbatim}
1900and probe it with ping:
1901\begin{verbatim}
1902netadm@alisa:~ # ping -n 193.233.7.98
1903PING 193.233.7.98 (193.233.7.98) from 193.233.7.90 : 56 data bytes
1904From 193.233.7.254: Redirect Host(New nexthop: 193.233.7.98)
190564 bytes from 193.233.7.98: icmp_seq=0 ttl=255 time=3.5 ms
1906From 193.233.7.254: Redirect Host(New nexthop: 193.233.7.98)
190764 bytes from 193.233.7.98: icmp_seq=1 ttl=255 time=2.2 ms
190864 bytes from 193.233.7.98: icmp_seq=2 ttl=255 time=0.4 ms
190964 bytes from 193.233.7.98: icmp_seq=3 ttl=255 time=0.4 ms
191064 bytes from 193.233.7.98: icmp_seq=4 ttl=255 time=0.4 ms
1911^C
1912--- 193.233.7.98 ping statistics ---
19135 packets transmitted, 5 packets received, 0% packet loss
1914round-trip min/avg/max = 0.4/1.3/3.5 ms
1915netadm@alisa:~ #
1916\end{verbatim}
1917What happened? Router 193.233.7.254 understood that we have a much
1918better path to the destination and sent us an ICMP redirect message.
1919We may retry \verb|ip route get| to see what we have in the routing
1920tables now:
1921\begin{verbatim}
1922netadm@alisa:~ # ip route get 193.233.7.98
1923193.233.7.98 dev eth0 src 193.233.7.90
1924 cache <redirected> mtu 1500 rtt 3072
1925netadm@alisa:~ #
1926\end{verbatim}
1927
1928
1929
1930\section{{\tt ip rule} --- routing policy database management}
1931\label{IP-RULE}
1932
1933\paragraph{Abbreviations:} \verb|rule|, \verb|ru|.
1934
1935\paragraph{Object:} \verb|rule|s in the routing policy database control
1936the route selection algorithm.
1937
1938Classic routing algorithms used in the Internet make routing decisions
1939based only on the destination address of packets (and in theory,
1940but not in practice, on the TOS field). The seminal review of classic
1941routing algorithms and their modifications can be found in~\cite{RFC1812}.
1942
1943In some circumstances we want to route packets differently depending not only
1944on destination addresses, but also on other packet fields: source address,
1945IP protocol, transport protocol ports or even packet payload.
1946This task is called ``policy routing''.
1947
1948\begin{NB}
1949 ``policy routing'' $\neq$ ``routing policy''.
1950
1951\noindent ``policy routing'' $=$ ``cunning routing''.
1952
1953\noindent ``routing policy'' $=$ ``routing tactics'' or ``routing plan''.
1954\end{NB}
1955
1956To solve this task, the conventional destination based routing table, ordered
1957according to the longest match rule, is replaced with a ``routing policy
1958database'' (or RPDB), which selects routes
1959by executing some set of rules. The rules may have lots of keys of different
1960natures and therefore they have no natural ordering, but one imposed
1961by the administrator. Linux-2.2 RPDB is a linear list of rules
1962ordered by numeric priority value.
1963RPDB explicitly allows matching a few packet fields:
1964
1965\begin{itemize}
1966\item packet source address.
1967\item packet destination address.
1968\item TOS.
1969\item incoming interface (which is packet metadata, rather than a packet field).
1970\end{itemize}
1971
1972Matching IP protocols and transport ports is also possible,
1973indirectly, via \verb|ipchains|, by exploiting their ability
1974to mark some classes of packets with \verb|fwmark|. Therefore,
1975\verb|fwmark| is also included in the set of keys checked by rules.
1976
1977Each policy routing rule consists of a {\em selector\/} and an {\em action\/}
1978predicate. The RPDB is scanned in the order of increasing priority. The selector
1979of each rule is applied to \{source address, destination address, incoming
1980interface, tos, fwmark\} and, if the selector matches the packet,
1981the action is performed. The action predicate may return with success.
1982In this case, it will either give a route or failure indication
1983and the RPDB lookup is terminated. Otherwise, the RPDB program
1984continues on the next rule.
1985
1986What is the action, semantically? The natural action is to select the
1987nexthop and the output device. This is what
1988Cisco IOS~\cite{IOS} does. Let us call it ``match \& set''.
1989The Linux-2.2 approach is more flexible. The action includes
1990lookups in destination-based routing tables and selecting
1991a route from these tables according to the classic longest match algorithm.
1992The ``match \& set'' approach is the simplest case of the Linux one. It is realized
1993when a second level routing table contains a single default route.
1994Recall that Linux-2.2 supports multiple tables
1995managed with the \verb|ip route| command, described in the previous section.
1996
1997At startup time the kernel configures the default RPDB consisting of three
1998rules:
1999
2000\begin{enumerate}
2001\item Priority: 0, Selector: match anything, Action: lookup routing
2002table \verb|local| (ID 255).
2003The \verb|local| table is a special routing table containing
2004high priority control routes for local and broadcast addresses.
2005
2006Rule 0 is special. It cannot be deleted or overridden.
2007
2008
2009\item Priority: 32766, Selector: match anything, Action: lookup routing
2010table \verb|main| (ID 254).
2011The \verb|main| table is the normal routing table containing all non-policy
2012routes. This rule may be deleted and/or overridden with other
2013ones by the administrator.
2014
2015\item Priority: 32767, Selector: match anything, Action: lookup routing
2016table \verb|default| (ID 253).
2017The \verb|default| table is empty. It is reserved for some
2018post-processing if no previous default rules selected the packet.
2019This rule may also be deleted.
2020
2021\end{enumerate}
2022
2023Do not confuse routing tables with rules: rules point to routing tables,
2024several rules may refer to one routing table and some routing tables
2025may have no rules pointing to them. If the administrator deletes all the rules
2026referring to a table, the table is not used, but it still exists
2027and will disappear only after all the routes contained in it are deleted.
2028
2029
2030\paragraph{Rule attributes:} Each RPDB entry has additional
2031attributes. F.e.\ each rule has a pointer to some routing
2032table. NAT and masquerading rules have an attribute to select new IP
2033address to translate/masquerade. Besides that, rules have some
2034optional attributes, which routes have, namely \verb|realms|.
2035These values do not override those contained in the routing tables. They
2036are only used if the route did not select any attributes.
2037
2038
2039\paragraph{Rule types:} The RPDB may contain rules of the following
2040types:
2041\begin{itemize}
2042\item \verb|unicast| --- the rule prescribes to return the route found
2043in the routing table referenced by the rule.
2044\item \verb|blackhole| --- the rule prescribes to silently drop the packet.
2045\item \verb|unreachable| --- the rule prescribes to generate a ``Network
2046is unreachable'' error.
2047\item \verb|prohibit| --- the rule prescribes to generate
2048``Communication is administratively prohibited'' error.
2049\item \verb|nat| --- the rule prescribes to translate the source address
2050of the IP packet into some other value. More about NAT is
2051in Appendix~\ref{ROUTE-NAT}, p.\pageref{ROUTE-NAT}.
2052\end{itemize}
2053
2054
2055\paragraph{Commands:} \verb|add|, \verb|delete| and \verb|show|
2056(or \verb|list|).
2057
2058\subsection{{\tt ip rule add} --- insert a new rule\\
2059 {\tt ip rule delete} --- delete a rule}
2060\label{IP-RULE-ADD}
2061
2062\paragraph{Abbreviations:} \verb|add|, \verb|a|; \verb|delete|, \verb|del|,
2063 \verb|d|.
2064
2065\paragraph{Arguments:}
2066
2067\begin{itemize}
2068\item \verb|type TYPE| (default)
2069
2070--- the type of this rule. The list of valid types was given in the previous
2071subsection.
2072
2073\item \verb|from PREFIX|
2074
2075--- select the source prefix to match.
2076
2077\item \verb|to PREFIX|
2078
2079--- select the destination prefix to match.
2080
2081\item \verb|iif NAME|
2082
2083--- select the incoming device to match. If the interface is loopback,
2084the rule only matches packets originating from this host. This means that you
2085may create separate routing tables for forwarded and local packets and,
2086hence, completely segregate them.
2087
2088\item \verb|tos TOS| or \verb|dsfield TOS|
2089
2090--- select the TOS value to match.
2091
2092\item \verb|fwmark MARK|
2093
2094--- select the \verb|fwmark| value to match.
2095
2096\item \verb|priority PREFERENCE|
2097
2098--- the priority of this rule. Each rule should have an explicitly
2099set {\em unique\/} priority value.
2100\begin{NB}
2101 Really, for historical reasons \verb|ip rule add| does not require a
2102 priority value and allows them to be non-unique.
2103 If the user does not supplied a priority, it is selected by the kernel.
2104 If the user creates a rule with a priority value that
2105 already exists, the kernel does not reject the request. It adds
2106 the new rule before all old rules of the same priority.
2107
2108 It is mistake in design, no more. And it will be fixed one day,
2109 so do not rely on this feature. Use explicit priorities.
2110\end{NB}
2111
2112
2113\item \verb|table TABLEID|
2114
2115--- the routing table identifier to lookup if the rule selector matches.
2116
2117\item \verb|realms FROM/TO|
2118
2119--- Realms to select if the rule matched and the routing table lookup
2120succeeded. Realm \verb|TO| is only used if the route did not select
2121any realm.
2122
2123\item \verb|nat ADDRESS|
2124
2125--- The base of the IP address block to translate (for source addresses).
2126The \verb|ADDRESS| may be either the start of the block of NAT addresses
2127(selected by NAT routes) or in linux-2.2 a local host address (or even zero).
2128In the last case the router does not translate the packets,
2129but masquerades them to this address; this feature disappered in 2.4.
2130More about NAT is in Appendix~\ref{ROUTE-NAT},
2131p.\pageref{ROUTE-NAT}.
2132
2133\end{itemize}
2134
2135\paragraph{Warning:} Changes to the RPDB made with these commands
2136do not become active immediately. It is assumed that after
2137a script finishes a batch of updates, it flushes the routing cache
2138with \verb|ip route flush cache|.
2139
2140\paragraph{Examples:}
2141\begin{itemize}
2142\item Route packets with source addresses from 192.203.80/24
2143according to routing table \verb|inr.ruhep|:
2144\begin{verbatim}
2145ip ru add from 192.203.80.0/24 table inr.ruhep prio 220
2146\end{verbatim}
2147
2148\item Translate packet source address 193.233.7.83 into 192.203.80.144
2149and route it according to table \#1 (actually, it is \verb|inr.ruhep|):
2150\begin{verbatim}
2151ip ru add from 193.233.7.83 nat 192.203.80.144 table 1 prio 320
2152\end{verbatim}
2153
2154\item Delete the unused default rule:
2155\begin{verbatim}
2156ip ru del prio 32767
2157\end{verbatim}
2158
2159\end{itemize}
2160
2161
2162
2163\subsection{{\tt ip rule show} --- list rules}
2164\label{IP-RULE-SHOW}
2165
2166\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|sh|, \verb|ls|, \verb|l|.
2167
2168
2169\paragraph{Arguments:} Good news, this is one command that has no arguments.
2170
2171\paragraph{Output format:}
2172
2173\begin{verbatim}
2174kuznet@amber:~ $ ip ru ls
21750: from all lookup local
2176200: from 192.203.80.0/24 to 193.233.7.0/24 lookup main
2177210: from 192.203.80.0/24 to 192.203.80.0/24 lookup main
2178220: from 192.203.80.0/24 lookup inr.ruhep realms inr.ruhep/radio-msu
2179300: from 193.233.7.83 to 193.233.7.0/24 lookup main
2180310: from 193.233.7.83 to 192.203.80.0/24 lookup main
2181320: from 193.233.7.83 lookup inr.ruhep map-to 192.203.80.144
218232766: from all lookup main
2183kuznet@amber:~ $
2184\end{verbatim}
2185
2186In the first column is the rule priority value followed
2187by a colon. Then the selectors follow. Each key is prefixed
2188with the same keyword that was used to create the rule.
2189
2190The keyword \verb|lookup| is followed by a routing table identifier,
2191as it is recorded in the file \verb|/etc/iproute2/rt_tables|.
2192
2193If the rule does NAT (f.e.\ rule \#320), it is shown by the keyword
2194\verb|map-to| followed by the start of the block of addresses to map.
2195
2196The sense of this example is pretty simple. The prefixes
2197192.203.80.0/24 and 193.233.7.0/24 form the internal network, but
2198they are routed differently when the packets leave it.
2199Besides that, the host 193.233.7.83 is translated into
2200another prefix to look like 192.203.80.144 when talking
2201to the outer world.
2202
2203
2204
2205\section{{\tt ip maddress} --- multicast addresses management}
2206\label{IP-MADDR}
2207
2208\paragraph{Object:} \verb|maddress| objects are multicast addresses.
2209
2210\paragraph{Commands:} \verb|add|, \verb|delete|, \verb|show| (or \verb|list|).
2211
2212\subsection{{\tt ip maddress show} --- list multicast addresses}
2213
2214\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|sh|, \verb|ls|, \verb|l|.
2215
2216\paragraph{Arguments:}
2217
2218\begin{itemize}
2219
2220\item \verb|dev NAME| (default)
2221
2222--- the device name.
2223
2224\end{itemize}
2225
2226\paragraph{Output format:}
2227
2228\begin{verbatim}
2229kuznet@alisa:~ $ ip maddr ls dummy
22302: dummy
2231 link 33:33:00:00:00:01
2232 link 01:00:5e:00:00:01
2233 inet 224.0.0.1 users 2
2234 inet6 ff02::1
2235kuznet@alisa:~ $
2236\end{verbatim}
2237
2238The first line of the output shows the interface index and its name.
2239Then the multicast address list follows. Each line starts with the
2240protocol identifier. The word \verb|link| denotes a link layer
2241multicast addresses.
2242
2243If a multicast address has more than one user, the number
2244of users is shown after the \verb|users| keyword.
2245
2246One additional feature not present in the example above
2247is the \verb|static| flag, which indicates that the address was joined
2248with \verb|ip maddr add|. See the following subsection.
2249
2250
2251
2252\subsection{{\tt ip maddress add} --- add a multicast address\\
2253 {\tt ip maddress delete} --- delete a multicast address}
2254
2255\paragraph{Abbreviations:} \verb|add|, \verb|a|; \verb|delete|, \verb|del|, \verb|d|.
2256
2257\paragraph{Description:} these commands attach/detach
2258a static link layer multicast address to listen on the interface.
2259Note that it is impossible to join protocol multicast groups
2260statically. This command only manages link layer addresses.
2261
2262
2263\paragraph{Arguments:}
2264
2265\begin{itemize}
2266\item \verb|address LLADDRESS| (default)
2267
2268--- the link layer multicast address.
2269
2270\item \verb|dev NAME|
2271
2272--- the device to join/leave this multicast address.
2273
2274\end{itemize}
2275
2276
2277\paragraph{Example:} Let us continue with the example from the previous subsection.
2278
2279\begin{verbatim}
2280netadm@alisa:~ # ip maddr add 33:33:00:00:00:01 dev dummy
2281netadm@alisa:~ # ip -0 maddr ls dummy
22822: dummy
2283 link 33:33:00:00:00:01 users 2 static
2284 link 01:00:5e:00:00:01
2285netadm@alisa:~ # ip maddr del 33:33:00:00:00:01 dev dummy
2286\end{verbatim}
2287
2288\begin{NB}
2289 Neither \verb|ip| nor the kernel check for multicast address validity.
2290 Particularly, this means that you can try to load a unicast address
2291 instead of a multicast address. Most drivers will ignore such addresses,
2292 but several (f.e.\ Tulip) will intern it to their on-board filter.
2293 The effects may be strange. Namely, the addresses become additional
2294 local link addresses and, if you loaded the address of another host
2295 to the router, wait for duplicated packets on the wire.
2296 It is not a bug, but rather a hole in the API and intra-kernel interfaces.
2297 This feature is really more useful for traffic monitoring, but using it
2298 with Linux-2.2 you {\em have to\/} be sure that the host is not
2299 a router and, especially, that it is not a transparent proxy or masquerading
2300 agent.
2301\end{NB}
2302
2303
2304
2305\section{{\tt ip mroute} --- multicast routing cache management}
2306\label{IP-MROUTE}
2307
2308\paragraph{Abbreviations:} \verb|mroute|, \verb|mr|.
2309
2310\paragraph{Object:} \verb|mroute| objects are multicast routing cache
2311entries created by a user level mrouting daemon
2312(f.e.\ \verb|pimd| or \verb|mrouted|).
2313
2314Due to the limitations of the current interface to the multicast routing
2315engine, it is impossible to change \verb|mroute| objects administratively,
2316so we may only display them. This limitation will be removed
2317in the future.
2318
2319\paragraph{Commands:} \verb|show| (or \verb|list|).
2320
2321
2322\subsection{{\tt ip mroute show} --- list mroute cache entries}
2323
2324\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|sh|, \verb|ls|, \verb|l|.
2325
2326\paragraph{Arguments:}
2327
2328\begin{itemize}
2329\item \verb|to PREFIX| (default)
2330
2331--- the prefix selecting the destination multicast addresses to list.
2332
2333
2334\item \verb|iif NAME|
2335
2336--- the interface on which multicast packets are received.
2337
2338
2339\item \verb|from PREFIX|
2340
2341--- the prefix selecting the IP source addresses of the multicast route.
2342
2343
2344\end{itemize}
2345
2346\paragraph{Output format:}
2347
2348\begin{verbatim}
2349kuznet@amber:~ $ ip mroute ls
2350(193.232.127.6, 224.0.1.39) Iif: unresolved
2351(193.232.244.34, 224.0.1.40) Iif: unresolved
2352(193.233.7.65, 224.66.66.66) Iif: eth0 Oifs: pimreg
2353kuznet@amber:~ $
2354\end{verbatim}
2355
2356Each line shows one (S,G) entry in the multicast routing cache,
2357where S is the source address and G is the multicast group. \verb|Iif| is
2358the interface on which multicast packets are expected to arrive.
2359If the word \verb|unresolved| is there instead of the interface name,
2360it means that the routing daemon still hasn't resolved this entry.
2361The keyword \verb|oifs| is followed by a list of output interfaces, separated
2362by spaces. If a multicast routing entry is created with non-trivial
2363TTL scope, administrative distances are appended to the device names
2364in the \verb|oifs| list.
2365
2366\paragraph{Statistics:} The \verb|-statistics| option also prints the
2367number of packets and bytes forwarded along this route and
2368the number of packets that arrived on the wrong interface, if this number is not zero.
2369
2370\begin{verbatim}
2371kuznet@amber:~ $ ip -s mr ls 224.66/16
2372(193.233.7.65, 224.66.66.66) Iif: eth0 Oifs: pimreg
2373 9383 packets, 300256 bytes
2374kuznet@amber:~ $
2375\end{verbatim}
2376
2377
2378\section{{\tt ip tunnel} --- tunnel configuration}
2379\label{IP-TUNNEL}
2380
2381\paragraph{Abbreviations:} \verb|tunnel|, \verb|tunl|.
2382
2383\paragraph{Object:} \verb|tunnel| objects are tunnels, encapsulating
2384packets in IPv4 packets and then sending them over the IP infrastructure.
2385
2386\paragraph{Commands:} \verb|add|, \verb|delete|, \verb|change|, \verb|show|
2387(or \verb|list|).
2388
2389\paragraph{See also:} A more informal discussion of tunneling
2390over IP and the \verb|ip tunnel| command can be found in~\cite{IP-TUNNELS}.
2391
2392\subsection{{\tt ip tunnel add} --- add a new tunnel\\
2393 {\tt ip tunnel change} --- change an existing tunnel\\
2394 {\tt ip tunnel delete} --- destroy a tunnel}
2395
2396\paragraph{Abbreviations:} \verb|add|, \verb|a|; \verb|change|, \verb|chg|;
2397\verb|delete|, \verb|del|, \verb|d|.
2398
2399
2400\paragraph{Arguments:}
2401
2402\begin{itemize}
2403
2404\item \verb|name NAME| (default)
2405
2406--- select the tunnel device name.
2407
2408\item \verb|mode MODE|
2409
2410--- set the tunnel mode. Three modes are currently available:
2411 \verb|ipip|, \verb|sit| and \verb|gre|.
2412
2413\item \verb|remote ADDRESS|
2414
2415--- set the remote endpoint of the tunnel.
2416
2417\item \verb|local ADDRESS|
2418
2419--- set the fixed local address for tunneled packets.
2420It must be an address on another interface of this host.
2421
2422\item \verb|ttl N|
2423
2424--- set a fixed TTL \verb|N| on tunneled packets.
2425 \verb|N| is a number in the range 1--255. 0 is a special value
2426 meaning that packets inherit the TTL value.
2427 The default value is: \verb|inherit|.
2428
2429\item \verb|tos T| or \verb|dsfield T|
2430
2431--- set a fixed TOS \verb|T| on tunneled packets.
2432 The default value is: \verb|inherit|.
2433
2434
2435
2436\item \verb|dev NAME|
2437
2438--- bind the tunnel to the device \verb|NAME| so that
2439 tunneled packets will only be routed via this device and will
2440 not be able to escape to another device when the route to endpoint changes.
2441
2442\item \verb|nopmtudisc|
2443
2444--- disable Path MTU Discovery on this tunnel.
2445 It is enabled by default. Note that a fixed ttl is incompatible
2446 with this option: tunnelling with a fixed ttl always makes pmtu discovery.
2447
2448\item \verb|key K|, \verb|ikey K|, \verb|okey K|
2449
2450--- (only GRE tunnels) use keyed GRE with key \verb|K|. \verb|K| is
2451 either a number or an IP address-like dotted quad.
2452 The \verb|key| parameter sets the key to use in both directions.
2453 The \verb|ikey| and \verb|okey| parameters set different keys for input and output.
2454
2455
2456\item \verb|csum|, \verb|icsum|, \verb|ocsum|
2457
2458--- (only GRE tunnels) generate/require checksums for tunneled packets.
2459 The \verb|ocsum| flag calculates checksums for outgoing packets.
2460 The \verb|icsum| flag requires that all input packets have the correct
2461 checksum. The \verb|csum| flag is equivalent to the combination
2462 ``\verb|icsum| \verb|ocsum|''.
2463
2464\item \verb|seq|, \verb|iseq|, \verb|oseq|
2465
2466--- (only GRE tunnels) serialize packets.
2467 The \verb|oseq| flag enables sequencing of outgoing packets.
2468 The \verb|iseq| flag requires that all input packets are serialized.
2469 The \verb|seq| flag is equivalent to the combination ``\verb|iseq| \verb|oseq|''.
2470
2471\begin{NB}
2472 I think this option does not
2473 work. At least, I did not test it, did not debug it and
2474 do not even understand how it is supposed to work or for what
2475 purpose Cisco planned to use it. Do not use it.
2476\end{NB}
2477
2478
2479\end{itemize}
2480
2481\paragraph{Example:} Create a pointopoint IPv6 tunnel with maximal TTL of 32.
2482\begin{verbatim}
2483netadm@amber:~ # ip tunl add Cisco mode sit remote 192.31.7.104 \
2484 local 192.203.80.142 ttl 32
2485\end{verbatim}
2486
2487\subsection{{\tt ip tunnel show} --- list tunnels}
2488
2489\paragraph{Abbreviations:} \verb|show|, \verb|list|, \verb|sh|, \verb|ls|, \verb|l|.
2490
2491
2492\paragraph{Arguments:} None.
2493
2494\paragraph{Output format:}
2495\begin{verbatim}
2496kuznet@amber:~ $ ip tunl ls Cisco
2497Cisco: ipv6/ip remote 192.31.7.104 local 192.203.80.142 ttl 32
2498kuznet@amber:~ $
2499\end{verbatim}
2500The line starts with the tunnel device name followed by a colon.
2501Then the tunnel mode follows. The parameters of the tunnel are listed
2502with the same keywords that were used when creating the tunnel.
2503
2504\paragraph{Statistics:}
2505
2506\begin{verbatim}
2507kuznet@amber:~ $ ip -s tunl ls Cisco
2508Cisco: ipv6/ip remote 192.31.7.104 local 192.203.80.142 ttl 32
2509RX: Packets Bytes Errors CsumErrs OutOfSeq Mcasts
2510 12566 1707516 0 0 0 0
2511TX: Packets Bytes Errors DeadLoop NoRoute NoBufs
2512 13445 1879677 0 0 0 0
2513kuznet@amber:~ $
2514\end{verbatim}
2515Essentially, these numbers are the same as the numbers
2516printed with {\tt ip -s link show}
2517(sec.\ref{IP-LINK-SHOW}, p.\pageref{IP-LINK-SHOW}) but the tags are different
2518to reflect that they are tunnel specific.
2519\begin{itemize}
2520\item \verb|CsumErrs| --- the total number of packets dropped
2521because of checksum failures for a GRE tunnel with checksumming enabled.
2522\item \verb|OutOfSeq| --- the total number of packets dropped
2523because they arrived out of sequence for a GRE tunnel with
2524serialization enabled.
2525\item \verb|Mcasts| --- the total number of multicast packets
2526received on a broadcast GRE tunnel.
2527\item \verb|DeadLoop| --- the total number of packets which were not
2528transmitted because the tunnel is looped back to itself.
2529\item \verb|NoRoute| --- the total number of packets which were not
2530transmitted because there is no IP route to the remote endpoint.
2531\item \verb|NoBufs| --- the total number of packets which were not
2532transmitted because the kernel failed to allocate a buffer.
2533\end{itemize}
2534
2535
2536\section{{\tt ip monitor} and {\tt rtmon} --- state monitoring}
2537\label{IP-MONITOR}
2538
2539The \verb|ip| utility can monitor the state of devices, addresses
2540and routes continuously. This option has a slightly different format.
2541Namely,
2542the \verb|monitor| command is the first in the command line and then
2543the object list follows:
2544\begin{verbatim}
488c41d2 2545 ip monitor [ file FILE ] [ all | OBJECT-LIST ] [ label ]
aba5acdf 2546\end{verbatim}
488c41d2
MS
2547\verb|OBJECT-LIST| is the list of object types that we want to
2548monitor. It may contain \verb|link|, \verb|address| and \verb|route|.
2549Specifying \verb|label| indicates that output lines should be labelled
2550with the type of object being printed --- this happens by default if
2551\verb|all| is specified. If no \verb|file| argument is given,
2552\verb|ip| opens RTNETLINK, listens on it and dumps state changes in
2553the format described in previous sections.
aba5acdf
SH
2554
2555If a file name is given, it does not listen on RTNETLINK,
2556but opens the file containing RTNETLINK messages saved in binary format
2557and dumps them. Such a history file can be generated with the
2558\verb|rtmon| utility. This utility has a command line syntax similar to
2559\verb|ip monitor|.
2560Ideally, \verb|rtmon| should be started before
2561the first network configuration command is issued. F.e.\ if
2562you insert:
2563\begin{verbatim}
2564 rtmon file /var/log/rtmon.log
2565\end{verbatim}
2566in a startup script, you will be able to view the full history
2567later.
2568
2569Certainly, it is possible to start \verb|rtmon| at any time.
2570It prepends the history with the state snapshot dumped at the moment
2571of starting.
2572
2573
2574\section{Route realms and policy propagation, {\tt rtacct}}
2575\label{RT-REALMS}
2576
2577On routers using OSPF ASE or, especially, the BGP protocol, routing
2578tables may be huge. If we want to classify or to account for the packets
2579per route, we will have to keep lots of information. Even worse, if we
2580want to distinguish the packets not only by their destination, but
2581also by their source, the task gets quadratic complexity and its solution
2582is physically impossible.
2583
2584One approach to propagating the policy from routing protocols
2585to the forwarding engine has been proposed in~\cite{IOS-BGP-PP}.
2586Essentially, Cisco Policy Propagation via BGP is based on the fact
2587that dedicated routers all have the RIB (Routing Information Base)
2588close to the forwarding engine, so policy routing rules can
2589check all the route attributes, including ASPATH information
2590and community strings.
2591
2592The Linux architecture, splitting the RIB (maintained by a user level
2593daemon) and the kernel based FIB (Forwarding Information Base),
2594does not allow such a simple approach.
2595
2596It is to our fortune because there is another solution
2597which allows even more flexible policy and richer semantics.
2598
2599Namely, routes can be clustered together in user space, based on their
2600attributes. F.e.\ a BGP router knows route ASPATH, its community;
2601an OSPF router knows the route tag or its area. The administrator, when adding
2602routes manually, also knows their nature. Providing that the number of such
2603aggregates (we call them {\em realms\/}) is low, the task of full
2604classification both by source and destination becomes quite manageable.
2605
2606So each route may be assigned to a realm. It is assumed that
2607this identification is made by a routing daemon, but static routes
2608can also be handled manually with \verb|ip route| (see sec.\ref{IP-ROUTE},
2609p.\pageref{IP-ROUTE}).
2610\begin{NB}
2611 There is a patch to \verb|gated|, allowing classification of routes
2612 to realms with all the set of policy rules implemented in \verb|gated|:
2613 by prefix, by ASPATH, by origin, by tag etc.
2614\end{NB}
2615
2616To facilitate the construction (f.e.\ in case the routing
2617daemon is not aware of realms), missing realms may be completed
2618with routing policy rules, see sec.~\ref{IP-RULE}, p.\pageref{IP-RULE}.
2619
2620For each packet the kernel calculates a tuple of realms: source realm
2621and destination realm, using the following algorithm:
2622
2623\begin{enumerate}
2624\item If the route has a realm, the destination realm of the packet is set to it.
2625\item If the rule has a source realm, the source realm of the packet is set to it.
2626If the destination realm was not inherited from the route and the rule has a destination realm,
2627it is also set.
2628\item If at least one of the realms is still unknown, the kernel finds
2629the reversed route to the source of the packet.
2630\item If the source realm is still unknown, get it from the reversed route.
2631\item If one of the realms is still unknown, swap the realms of reversed
2632routes and apply step 2 again.
2633\end{enumerate}
2634
2635After this procedure is completed we know what realm the packet
2636arrived from and the realm where it is going to propagate to.
2637If some of the realms are unknown, they are initialized to zero
2638(or realm \verb|unknown|).
2639
2640The main application of realms is the TC \verb|route| classifier~\cite{TC-CREF},
2641where they are used to help assign packets to traffic classes,
2642to account, police and schedule them according to this
2643classification.
2644
2645A much simpler but still very useful application is incoming packet
2646accounting by realms. The kernel gathers a packet statistics summary
2647which can be viewed with the \verb|rtacct| utility.
2648\begin{verbatim}
2649kuznet@amber:~ $ rtacct russia
2650Realm BytesTo PktsTo BytesFrom PktsFrom
2651russia 20576778 169176 47080168 153805
2652kuznet@amber:~ $
2653\end{verbatim}
2654This shows that this router received 153805 packets from
2655the realm \verb|russia| and forwarded 169176 packets to \verb|russia|.
2656The realm \verb|russia| consists of routes with ASPATHs not leaving
2657Russia.
2658
2659Note that locally originating packets are not accounted here,
2660\verb|rtacct| shows incoming packets only. Using the \verb|route|
2661classifier (see~\cite{TC-CREF}) you can get even more detailed
2662accounting information about outgoing packets, optionally
2663summarizing traffic not only by source or destination, but
2664by any pair of source and destination realms.
2665
2666
2667\begin{thebibliography}{99}
2668\addcontentsline{toc}{section}{References}
2669\bibitem{RFC-NDISC} T.~Narten, E.~Nordmark, W.~Simpson.
2670``Neighbor Discovery for IP Version 6 (IPv6)'', RFC-2461.
2671
2672\bibitem{RFC-ADDRCONF} S.~Thomson, T.~Narten.
2673``IPv6 Stateless Address Autoconfiguration'', RFC-2462.
2674
2675\bibitem{RFC1812} F.~Baker.
2676``Requirements for IP Version 4 Routers'', RFC-1812.
2677
2678\bibitem{RFC1122} R.~T.~Braden.
2679``Requirements for Internet hosts --- communication layers'', RFC-1122.
2680
2681\bibitem{IOS} ``Cisco IOS Release 12.0 Network Protocols
2682Command Reference, Part 1'' and
2683``Cisco IOS Release 12.0 Quality of Service Solutions
2684Configuration Guide: Configuring Policy-Based Routing'',\\
2685http://www.cisco.com/univercd/cc/td/doc/product/software/ios120.
2686
2687\bibitem{IP-TUNNELS} A.~N.~Kuznetsov.
2688``Tunnels over IP in Linux-2.2'', \\
2689In: {\tt ftp://ftp.inr.ac.ru/ip-routing/iproute2-current.tar.gz}.
2690
2691\bibitem{TC-CREF} A.~N.~Kuznetsov. ``TC Command Reference'',\\
2692In: {\tt ftp://ftp.inr.ac.ru/ip-routing/iproute2-current.tar.gz}.
2693
2694\bibitem{IOS-BGP-PP} ``Cisco IOS Release 12.0 Quality of Service Solutions
2695Configuration Guide: Configuring QoS Policy Propagation via
2696Border Gateway Protocol'',\\
2697http://www.cisco.com/univercd/cc/td/doc/product/software/ios120.
2698
2699\bibitem{RFC-DHCP} R.~Droms.
2700``Dynamic Host Configuration Protocol.'', RFC-2131
2701
71e58151
GBY
2702\bibitem{RFC2414} M.~Allman, S.~Floyd, C.~Partridge.
2703``Increasing TCP's Initial Window'', RFC-2414.
2704
aba5acdf
SH
2705\end{thebibliography}
2706
2707
2708
2709
2710\appendix
2711\addcontentsline{toc}{section}{Appendix}
2712
2713\section{Source address selection}
2714\label{ADDR-SEL}
2715
2716When a host creates an IP packet, it must select some source
2717address. Correct source address selection is a critical procedure,
2718because it gives the receiver the information needed to deliver a
2719reply. If the source is selected incorrectly, in the best case,
2720the backward path may appear different to the forward one which
2721is harmful for performance. In the worst case, when the addresses
2722are administratively scoped, the reply may be lost entirely.
2723
2724Linux-2.2 selects source addresses using the following algorithm:
2725
2726\begin{itemize}
2727\item
2728The application may select a source address explicitly with \verb|bind(2)|
2729syscall or supplying it to \verb|sendmsg(2)| via the ancillary data object
2730\verb|IP_PKTINFO|. In this case the kernel only checks the validity
2731of the address and never tries to ``improve'' an incorrect user choice,
2732generating an error instead.
2733\begin{NB}
2734 Never say ``Never''. The sysctl option \verb|ip_dynaddr| breaks
2735 this axiom. It has been made deliberately with the purpose
2736 of automatically reselecting the address on hosts with dynamic dial-out interfaces.
2737 However, this hack {\em must not\/} be used on multihomed hosts
2738 and especially on routers: it would break them.
2739\end{NB}
2740
2741
2742\item Otherwise, IP routing tables can contain an explicit source
2743address hint for this destination. The hint is set with the \verb|src| parameter
2744to the \verb|ip route| command, sec.\ref{IP-ROUTE}, p.\pageref{IP-ROUTE}.
2745
2746
2747\item Otherwise, the kernel searches through the list of addresses
2748attached to the interface through which the packets will be routed.
2749The search strategies are different for IP and IPv6. Namely:
2750
2751\begin{itemize}
2752\item IPv6 searches for the first valid, not deprecated address
2753with the same scope as the destination.
2754
2755\item IP searches for the first valid address with a scope wider
2756than the scope of the destination but it prefers addresses
2757which fall to the same subnet as the nexthop of the route
2758to the destination. Unlike IPv6, the scopes of IPv4 destinations
2759are not encoded in their addresses but are supplied
2760in routing tables instead (the \verb|scope| parameter to the \verb|ip route| command,
2761sec.\ref{IP-ROUTE}, p.\pageref{IP-ROUTE}).
2762
2763\end{itemize}
2764
2765
2766\item Otherwise, if the scope of the destination is \verb|link| or \verb|host|,
2767the algorithm fails and returns a zero source address.
2768
2769\item Otherwise, all interfaces are scanned to search for an address
2770with an appropriate scope. The loopback device \verb|lo| is always the first
2771in the search list, so that if an address with global scope (not 127.0.0.1!)
2772is configured on loopback, it is always preferred.
2773
2774\end{itemize}
2775
2776
2777\section{Proxy ARP/NDISC}
2778\label{PROXY-NEIGH}
2779
2780Routers may answer ARP/NDISC solicitations on behalf of other hosts.
2781In Linux-2.2 proxy ARP on an interface may be enabled
2782by setting the kernel \verb|sysctl| variable
2783\verb|/proc/sys/net/ipv4/conf/<dev>/proxy_arp| to 1. After this, the router
2784starts to answer ARP requests on the interface \verb|<dev>|, provided
2785the route to the requested destination does {\em not\/} go back via the same
2786device.
2787
2788The variable \verb|/proc/sys/net/ipv4/conf/all/proxy_arp| enables proxy
2789ARP on all the IP devices.
2790
2791However, this approach fails in the case of IPv6 because the router
2792must join the solicited node multicast address to listen for the corresponding
2793NDISC queries. It means that proxy NDISC is possible only on a per destination
2794basis.
2795
2796Logically, proxy ARP/NDISC is not a kernel task. It can easily be implemented
2797in user space. However, similar functionality was present in BSD kernels
2798and in Linux-2.0, so we have to preserve it at least to the extent that
2799is standardized in BSD.
2800\begin{NB}
2801 Linux-2.0 ARP had a feature called {\em subnet\/} proxy ARP.
2802 It is replaced with the sysctl flag in Linux-2.2.
2803\end{NB}
2804
2805
2806The \verb|ip| utility provides a way to manage proxy ARP/NDISC
2807with the \verb|ip neigh| command, namely:
2808\begin{verbatim}
2809 ip neigh add proxy ADDRESS [ dev NAME ]
2810\end{verbatim}
2811adds a new proxy ARP/NDISC record and
2812\begin{verbatim}
2813 ip neigh del proxy ADDRESS [ dev NAME ]
2814\end{verbatim}
2815deletes it.
2816
2817If the name of the device is not given, the router will answer solicitations
2818for address \verb|ADDRESS| on all devices, otherwise it will only serve
2819the device \verb|NAME|. Even if the proxy entry is created with
2820\verb|ip neigh|, the router {\em will not\/} answer a query if the route
2821to the destination goes back via the interface from which the solicitation
2822was received.
2823
2824It is important to emphasize that proxy entries have {\em no\/}
2825parameters other than these (IP/IPv6 address and optional device).
2826Particularly, the entry does not store any link layer address.
2827It always advertises the station address of the interface
2828on which it sends advertisements (i.e. it's own station address).
2829
2830\section{Route NAT status}
2831\label{ROUTE-NAT}
2832
2833NAT (or ``Network Address Translation'') remaps some parts
2834of the IP address space into other ones. Linux-2.2 route NAT is supposed
2835to be used to facilitate policy routing by rewriting addresses
2836to other routing domains or to help while renumbering sites
2837to another prefix.
2838
2839\paragraph{What it is not:}
2840It is necessary to emphasize that {\em it is not supposed\/}
2841to be used to compress address space or to split load.
2842This is not missing functionality but a design principle.
2843Route NAT is {\em stateless\/}. It does not hold any state
2844about translated sessions. This means that it handles any number
2845of sessions flawlessly. But it also means that it is {\em static\/}.
2846It cannot detect the moment when the last TCP client stops
2847using an address. For the same reason, it will not help to split
2848load between several servers.
2849\begin{NB}
2850It is a pretty commonly held belief that it is useful to split load between
2851several servers with NAT. This is a mistake. All you get from this
2852is the requirement that the router keep the state of all the TCP connections
2853going via it. Well, if the router is so powerful, run apache on it. 8)
2854\end{NB}
2855
2856The second feature: it does not touch packet payload,
2857does not try to ``improve'' broken protocols by looking
2858through its data and mangling it. It mangles IP addresses,
2859only IP addresses and nothing but IP addresses.
2860This also, is not missing any functionality.
2861
2862To resume: if you need to compress address space or keep
2863active FTP clients happy, your choice is not route NAT but masquerading,
2864port forwarding, NAPT etc.
2865\begin{NB}
2866By the way, you may also want to look at
2867http://www.suse.com/\~mha/HyperNews/get/linux-ip-nat.html
2868\end{NB}
2869
2870
2871\paragraph{How it works.}
2872Some part of the address space is reserved for dummy addresses
2873which will look for all the world like some host addresses
2874inside your network. No other hosts may use these addresses,
2875however other routers may also be configured to translate them.
2876\begin{NB}
2877A great advantage of route NAT is that it may be used not
2878only in stub networks but in environments with arbitrarily complicated
2879structure. It does not firewall, it {\em forwards.}
2880\end{NB}
2881These addresses are selected by the \verb|ip route| command
2882(sec.\ref{IP-ROUTE-ADD}, p.\pageref{IP-ROUTE-ADD}). F.e.\
2883\begin{verbatim}
2884 ip route add nat 192.203.80.144 via 193.233.7.83
2885\end{verbatim}
2886states that the single address 192.203.80.144 is a dummy NAT address.
2887For all the world it looks like a host address inside our network.
2888For neighbouring hosts and routers it looks like the local address
2889of the translating router. The router answers ARP for it, advertises
2890this address as routed via it, {\em et al\/}. When the router
2891receives a packet destined for 192.203.80.144, it replaces
2892this address with 193.233.7.83 which is the address of some real
2893host and forwards the packet. If you need to remap
2894blocks of addresses, you may use a command like:
2895\begin{verbatim}
2896 ip route add nat 192.203.80.192/26 via 193.233.7.64
2897\end{verbatim}
2898This command will map a block of 63 addresses 192.203.80.192-255 to
2899193.233.7.64-127.
2900
2901When an internal host (193.233.7.83 in the example above)
2902sends something to the outer world and these packets are forwarded
2903by our router, it should translate the source address 193.233.7.83
2904into 192.203.80.144. This task is solved by setting a special
2905policy rule (sec.\ref{IP-RULE-ADD}, p.\pageref{IP-RULE-ADD}):
2906\begin{verbatim}
2907 ip rule add prio 320 from 193.233.7.83 nat 192.203.80.144
2908\end{verbatim}
2909This rule says that the source address 193.233.7.83
2910should be translated into 192.203.80.144 before forwarding.
2911It is important that the address after the \verb|nat| keyword
2912is some NAT address, declared by {\tt ip route add nat}.
2913If it is just a random address the router will not map to it.
2914\begin{NB}
2915The exception is when the address is a local address of this
2916router (or 0.0.0.0) and masquerading is configured in the linux-2.2
2917kernel. In this case the router will masquerade the packets as this address.
2918If 0.0.0.0 is selected, the result is equivalent to one
2919obtained with firewalling rules. Otherwise, you have the way
2920to order Linux to masquerade to this fixed address.
2921NAT mechanism used in linux-2.4 is more flexible than
2922masquerading, so that this feature has lost meaning and disabled.
2923\end{NB}
2924
2925If the network has non-trivial internal structure, it is
2926useful and even necessary to add rules disabling translation
2927when a packet does not leave this network. Let us return to the
2928example from sec.\ref{IP-RULE-SHOW} (p.\pageref{IP-RULE-SHOW}).
2929\begin{verbatim}
2930300: from 193.233.7.83 to 193.233.7.0/24 lookup main
2931310: from 193.233.7.83 to 192.203.80.0/24 lookup main
2932320: from 193.233.7.83 lookup inr.ruhep map-to 192.203.80.144
2933\end{verbatim}
2934This block of rules causes normal forwarding when
2935packets from 193.233.7.83 do not leave networks 193.233.7/24
2936and 192.203.80/24. Also, if the \verb|inr.ruhep| table does not
2937contain a route to the destination (which means that the routing
2938domain owning addresses from 192.203.80/24 is dead), no translation
2939will occur. Otherwise, the packets are translated.
2940
2941\paragraph{How to only translate selected ports:}
2942If you only want to translate selected ports (f.e.\ http)
2943and leave the rest intact, you may use \verb|ipchains|
2944to \verb|fwmark| a class of packets.
2945Suppose you did and all the packets from 193.233.7.83
2946destined for port 80 are marked with marker 0x1234 in input fwchain.
2947In this case you may replace rule \#320 with:
2948\begin{verbatim}
2949320: from 193.233.7.83 fwmark 1234 lookup main map-to 192.203.80.144
2950\end{verbatim}
2951and translation will only be enabled for outgoing http requests.
2952
2953\section{Example: minimal host setup}
2954\label{EXAMPLE-SETUP}
2955
2956The following script gives an example of a fault safe
2957setup of IP (and IPv6, if it is compiled into the kernel)
2958in the common case of a node attached to a single broadcast
2959network. A more advanced script, which may be used both on multihomed
2960hosts and on routers, is described in the following
2961section.
2962
2963The utilities used in the script may be found in the
2964directory ftp://ftp.inr.ac.ru/ip-routing/:
2965\begin{enumerate}
2966\item \verb|ip| --- package \verb|iproute2|.
2967\item \verb|arping| --- package \verb|iputils|.
2968\item \verb|rdisc| --- package \verb|iputils|.
2969\end{enumerate}
2970\begin{NB}
2971It also refers to a DHCP client, \verb|dhcpcd|. I should refrain from
2972recommending a good DHCP client to use. All that I can
2973say is that ISC \verb|dhcp-2.0b1pl6| patched with the patch that
2974can be found in the \verb|dhcp.bootp.rarp| subdirectory of
2975the same ftp site {\em does\/} work,
2976at least on Ethernet and Token Ring.
2977\end{NB}
2978
2979\begin{verbatim}
2980#! /bin/bash
2981\end{verbatim}
2982\begin{flushleft}
2983\# {\bf Usage: \verb|ifone ADDRESS[/PREFIX-LENGTH] [DEVICE]|}\\
2984\# {\bf Parameters:}\\
2985\# \$1 --- Static IP address, optionally followed by prefix length.\\
2986\# \$2 --- Device name. If it is missing, \verb|eth0| is asssumed.\\
2987\# F.e. \verb|ifone 193.233.7.90|
2988\end{flushleft}
2989\begin{verbatim}
2990dev=$2
2991: ${dev:=eth0}
2992ipaddr=
2993\end{verbatim}
2994\# Parse IP address, splitting prefix length.
2995\begin{verbatim}
2996if [ "$1" != "" ]; then
2997 ipaddr=${1%/*}
2998 if [ "$1" != "$ipaddr" ]; then
2999 pfxlen=${1#*/}
3000 fi
3001 : ${pfxlen:=24}
3002fi
3003pfx="${ipaddr}/${pfxlen}"
3004\end{verbatim}
3005
3006\begin{flushleft}
3007\# {\bf Step 0} --- enable loopback.\\
3008\#\\
3009\# This step is necessary on any networked box before attempt\\
3010\# to configure any other device.\\
3011\end{flushleft}
3012\begin{verbatim}
3013ip link set up dev lo
3014ip addr add 127.0.0.1/8 dev lo brd + scope host
3015\end{verbatim}
3016\begin{flushleft}
3017\# IPv6 autoconfigure themself on loopback.\\
3018\#\\
3019\# If user gave loopback as device, we add the address as alias and exit.
3020\end{flushleft}
3021\begin{verbatim}
3022if [ "$dev" = "lo" ]; then
3023 if [ "$ipaddr" != "" -a "$ipaddr" != "127.0.0.1" ]; then
3024 ip address add $ipaddr dev $dev
3025 exit $?
3026 fi
3027 exit 0
3028fi
3029\end{verbatim}
3030
3031\noindent\# {\bf Step 1} --- enable device \verb|$dev|
3032
3033\begin{verbatim}
3034if ! ip link set up dev $dev ; then
3035 echo "Cannot enable interface $dev. Aborting." 1>&2
3036 exit 1
3037fi
3038\end{verbatim}
3039\begin{flushleft}
3040\# The interface is \verb|UP|. IPv6 started stateless autoconfiguration itself,\\
3041\# and its configuration finishes here. However,\\
3042\# IP still needs some static preconfigured address.
3043\end{flushleft}
3044\begin{verbatim}
3045if [ "$ipaddr" = "" ]; then
3046 echo "No address for $dev is configured, trying DHCP..." 1>&2
3047 dhcpcd
3048 exit $?
3049fi
3050\end{verbatim}
3051
3052\begin{flushleft}
3053\# {\bf Step 2} --- IP Duplicate Address Detection~\cite{RFC-DHCP}.\\
3054\# Send two probes and wait for result for 3 seconds.\\
3055\# If the interface opens slower f.e.\ due to long media detection,\\
3056\# you want to increase the timeout.\\
3057\end{flushleft}
3058\begin{verbatim}
3059if ! arping -q -c 2 -w 3 -D -I $dev $ipaddr ; then
3060 echo "Address $ipaddr is busy, trying DHCP..." 1>&2
3061 dhcpcd
3062 exit $?
3063fi
3064\end{verbatim}
3065\begin{flushleft}
3066\# OK, the address is unique, we may add it on the interface.\\
3067\#\\
3068\# {\bf Step 3} --- Configure the address on the interface.
3069\end{flushleft}
3070
3071\begin{verbatim}
3072if ! ip address add $pfx brd + dev $dev; then
3073 echo "Failed to add $pfx on $dev, trying DHCP..." 1>&2
3074 dhcpcd
3075 exit $?
3076fi
3077\end{verbatim}
3078
3079\noindent\# {\bf Step 4} --- Announce our presence on the link.
3080\begin{verbatim}
3081arping -A -c 1 -I $dev $ipaddr
3082noarp=$?
3083( sleep 2;
3084 arping -U -c 1 -I $dev $ipaddr ) >& /dev/null </dev/null &
3085\end{verbatim}
3086
3087\begin{flushleft}
3088\# {\bf Step 5} (optional) --- Add some control routes.\\
3089\#\\
3090\# 1. Prohibit link local multicast addresses.\\
3091\# 2. Prohibit link local (alias, limited) broadcast.\\
3092\# 3. Add default multicast route.
3093\end{flushleft}
3094\begin{verbatim}
3095ip route add unreachable 224.0.0.0/24
3096ip route add unreachable 255.255.255.255
3097if [ `ip link ls $dev | grep -c MULTICAST` -ge 1 ]; then
3098 ip route add 224.0.0.0/4 dev $dev scope global
3099fi
3100\end{verbatim}
3101
3102\begin{flushleft}
3103\# {\bf Step 6} --- Add fallback default route with huge metric.\\
3104\# If a proxy ARP server is present on the interface, we will be\\
3105\# able to talk to all the Internet without further configuration.\\
3106\# It is not so cheap though and we still hope that this route\\
3107\# will be overridden by more correct one by rdisc.\\
3108\# Do not make this step if the device is not ARPable,\\
3109\# because dead nexthop detection does not work on them.
3110\end{flushleft}
3111\begin{verbatim}
3112if [ "$noarp" = "0" ]; then
3113 ip ro add default dev $dev metric 30000 scope global
3114fi
3115\end{verbatim}
3116
3117\begin{flushleft}
3118\# {\bf Step 7} --- Restart router discovery and exit.
3119\end{flushleft}
3120\begin{verbatim}
3121killall -HUP rdisc || rdisc -fs
3122exit 0
3123\end{verbatim}
3124
3125
3126\section{Example: {\protect\tt ifcfg} --- interface address management}
3127\label{EXAMPLE-IFCFG}
3128
3129This is a simplistic script replacing one option of \verb|ifconfig|,
3130namely, IP address management. It not only adds
3131addresses, but also carries out Duplicate Address Detection~\cite{RFC-DHCP},
3132sends unsolicited ARP to update the caches of other hosts sharing
3133the interface, adds some control routes and restarts Router Discovery
3134when it is necessary.
3135
3136I strongly recommend using it {\em instead\/} of \verb|ifconfig| both
3137on hosts and on routers.
3138
3139\begin{verbatim}
3140#! /bin/bash
3141\end{verbatim}
3142\begin{flushleft}
3143\# {\bf Usage: \verb?ifcfg DEVICE[:ALIAS] [add|del] ADDRESS[/LENGTH] [PEER]?}\\
3144\# {\bf Parameters:}\\
3145\# ---Device name. It may have alias suffix, separated by colon.\\
3146\# ---Command: add, delete or stop.\\
3147\# ---IP address, optionally followed by prefix length.\\
3148\# ---Optional peer address for pointopoint interfaces.\\
3149\# F.e. \verb|ifcfg eth0 193.233.7.90/24|
3150
3151\noindent\# This function determines, whether it is router or host.\\
3152\# It returns 0, if the host is apparently not router.
3153\end{flushleft}
3154\begin{verbatim}
3155CheckForwarding () {
3156 local sbase fwd
3157 sbase=/proc/sys/net/ipv4/conf
3158 fwd=0
3159 if [ -d $sbase ]; then
3160 for dir in $sbase/*/forwarding; do
3161 fwd=$[$fwd + `cat $dir`]
3162 done
3163 else
3164 fwd=2
3165 fi
3166 return $fwd
3167}
3168\end{verbatim}
3169\begin{flushleft}
3170\# This function restarts Router Discovery.\\
3171\end{flushleft}
3172\begin{verbatim}
3173RestartRDISC () {
3174 killall -HUP rdisc || rdisc -fs
3175}
3176\end{verbatim}
3177\begin{flushleft}
3178\# Calculate ABC "natural" mask length\\
3179\# Arg: \$1 = dotquad address
3180\end{flushleft}
3181\begin{verbatim}
3182ABCMaskLen () {
3183 local class;
3184 class=${1%%.*}
3185 if [ $class -eq 0 -o $class -ge 224 ]; then return 0
3186 elif [ $class -ge 192 ]; then return 24
3187 elif [ $class -ge 128 ]; then return 16
3188 else return 8 ; fi
3189}
3190\end{verbatim}
3191
3192
3193\begin{flushleft}
3194\# {\bf MAIN()}\\
3195\#\\
3196\# Strip alias suffix separated by colon.
3197\end{flushleft}
3198\begin{verbatim}
3199label="label $1"
3200ldev=$1
3201dev=${1%:*}
3202if [ "$dev" = "" -o "$1" = "help" ]; then
3203 echo "Usage: ifcfg DEV [[add|del [ADDR[/LEN]] [PEER] | stop]" 1>&2
3204 echo " add - add new address" 1>&2
3205 echo " del - delete address" 1>&2
3206 echo " stop - completely disable IP" 1>&2
3207 exit 1
3208fi
3209shift
3210
3211CheckForwarding
3212fwd=$?
3213\end{verbatim}
3214\begin{flushleft}
3215\# Parse command. If it is ``stop'', flush and exit.
3216\end{flushleft}
3217\begin{verbatim}
3218deleting=0
3219case "$1" in
3220add) shift ;;
3221stop)
3222 if [ "$ldev" != "$dev" ]; then
3223 echo "Cannot stop alias $ldev" 1>&2
3224 exit 1;
3225 fi
3226 ip -4 addr flush dev $dev $label || exit 1
3227 if [ $fwd -eq 0 ]; then RestartRDISC; fi
3228 exit 0 ;;
3229del*)
3230 deleting=1; shift ;;
3231*)
3232esac
3233\end{verbatim}
3234\begin{flushleft}
3235\# Parse prefix, split prefix length, separated by slash.
3236\end{flushleft}
3237\begin{verbatim}
3238ipaddr=
3239pfxlen=
3240if [ "$1" != "" ]; then
3241 ipaddr=${1%/*}
3242 if [ "$1" != "$ipaddr" ]; then
3243 pfxlen=${1#*/}
3244 fi
3245 if [ "$ipaddr" = "" ]; then
3246 echo "$1 is bad IP address." 1>&2
3247 exit 1
3248 fi
3249fi
3250shift
3251\end{verbatim}
3252\begin{flushleft}
3253\# If peer address is present, prefix length is 32.\\
3254\# Otherwise, if prefix length was not given, guess it.
3255\end{flushleft}
3256\begin{verbatim}
3257peer=$1
3258if [ "$peer" != "" ]; then
3259 if [ "$pfxlen" != "" -a "$pfxlen" != "32" ]; then
3260 echo "Peer address with non-trivial netmask." 1>&2
3261 exit 1
3262 fi
3263 pfx="$ipaddr peer $peer"
3264else
3265 if [ "$pfxlen" = "" ]; then
3266 ABCMaskLen $ipaddr
3267 pfxlen=$?
3268 fi
3269 pfx="$ipaddr/$pfxlen"
3270fi
3271if [ "$ldev" = "$dev" -a "$ipaddr" != "" ]; then
3272 label=
3273fi
3274\end{verbatim}
3275\begin{flushleft}
3276\# If deletion was requested, delete the address and restart RDISC
3277\end{flushleft}
3278\begin{verbatim}
3279if [ $deleting -ne 0 ]; then
3280 ip addr del $pfx dev $dev $label || exit 1
3281 if [ $fwd -eq 0 ]; then RestartRDISC; fi
3282 exit 0
3283fi
3284\end{verbatim}
3285\begin{flushleft}
3286\# Start interface initialization.\\
3287\#\\
3288\# {\bf Step 0} --- enable device \verb|$dev|
3289\end{flushleft}
3290\begin{verbatim}
3291if ! ip link set up dev $dev ; then
3292 echo "Error: cannot enable interface $dev." 1>&2
3293 exit 1
3294fi
3295if [ "$ipaddr" = "" ]; then exit 0; fi
3296\end{verbatim}
3297\begin{flushleft}
3298\# {\bf Step 1} --- IP Duplicate Address Detection~\cite{RFC-DHCP}.\\
3299\# Send two probes and wait for result for 3 seconds.\\
3300\# If the interface opens slower f.e.\ due to long media detection,\\
3301\# you want to increase the timeout.\\
3302\end{flushleft}
3303\begin{verbatim}
3304if ! arping -q -c 2 -w 3 -D -I $dev $ipaddr ; then
3305 echo "Error: some host already uses address $ipaddr on $dev." 1>&2
3306 exit 1
3307fi
3308\end{verbatim}
3309\begin{flushleft}
3310\# OK, the address is unique. We may add it to the interface.\\
3311\#\\
3312\# {\bf Step 2} --- Configure the address on the interface.
3313\end{flushleft}
3314\begin{verbatim}
3315if ! ip address add $pfx brd + dev $dev $label; then
3316 echo "Error: failed to add $pfx on $dev." 1>&2
3317 exit 1
3318fi
3319\end{verbatim}
3320\noindent\# {\bf Step 3} --- Announce our presence on the link
3321\begin{verbatim}
3322arping -q -A -c 1 -I $dev $ipaddr
3323noarp=$?
3324( sleep 2 ;
3325 arping -q -U -c 1 -I $dev $ipaddr ) >& /dev/null </dev/null &
3326\end{verbatim}
3327\begin{flushleft}
3328\# {\bf Step 4} (optional) --- Add some control routes.\\
3329\#\\
3330\# 1. Prohibit link local multicast addresses.\\
3331\# 2. Prohibit link local (alias, limited) broadcast.\\
3332\# 3. Add default multicast route.
3333\end{flushleft}
3334\begin{verbatim}
3335ip route add unreachable 224.0.0.0/24 >& /dev/null
3336ip route add unreachable 255.255.255.255 >& /dev/null
3337if [ `ip link ls $dev | grep -c MULTICAST` -ge 1 ]; then
3338 ip route add 224.0.0.0/4 dev $dev scope global >& /dev/null
3339fi
3340\end{verbatim}
3341\begin{flushleft}
3342\# {\bf Step 5} --- Add fallback default route with huge metric.\\
3343\# If a proxy ARP server is present on the interface, we will be\\
3344\# able to talk to all the Internet without further configuration.\\
3345\# Do not make this step on router or if the device is not ARPable.\\
3346\# because dead nexthop detection does not work on them.
3347\end{flushleft}
3348\begin{verbatim}
3349if [ $fwd -eq 0 ]; then
3350 if [ $noarp -eq 0 ]; then
3351 ip ro append default dev $dev metric 30000 scope global
3352 elif [ "$peer" != "" ]; then
3353 if ping -q -c 2 -w 4 $peer ; then
3354 ip ro append default via $peer dev $dev metric 30001
3355 fi
3356 fi
3357 RestartRDISC
3358fi
3359
3360exit 0
3361\end{verbatim}
3362\begin{flushleft}
3363\# End of {\bf MAIN()}
3364\end{flushleft}
3365
3366
3367\end{document}