]> git.proxmox.com Git - mirror_iproute2.git/blob - man/man8/bridge.8
12c09a56563dcc749d5bcf055026d68c55ac9b0c
[mirror_iproute2.git] / man / man8 / bridge.8
1 .TH BRIDGE 8 "1 August 2012" "iproute2" "Linux"
2 .SH NAME
3 bridge \- show / manipulate bridge addresses and devices
4 .SH SYNOPSIS
5
6 .ad l
7 .in +8
8 .ti -8
9 .B bridge
10 .RI "[ " OPTIONS " ] " OBJECT " { " COMMAND " | "
11 .BR help " }"
12 .sp
13
14 .ti -8
15 .IR OBJECT " := { "
16 .BR link " | " fdb " | " mdb " | " vlan " | " monitor " }"
17 .sp
18
19 .ti -8
20 .IR OPTIONS " := { "
21 \fB\-V\fR[\fIersion\fR] |
22 \fB\-s\fR[\fItatistics\fR] |
23 \fB\-n\fR[\fIetns\fR] name |
24 \fB\-b\fR[\fIatch\fR] filename |
25 \fB\-c\fR[\folor\fR] |
26 \fB\-p\fR[\fIretty\fR] |
27 \fB\-j\fR[\fIson\fR] |
28 \fB\-o\fR[\fIneline\fr] }
29
30 .ti -8
31 .B "bridge link set"
32 .B dev
33 .IR DEV " [ "
34 .B cost
35 .IR COST " ] [ "
36 .B priority
37 .IR PRIO " ] [ "
38 .B state
39 .IR STATE " ] [ "
40 .BR guard " { " on " | " off " } ] [ "
41 .BR hairpin " { " on " | " off " } ] [ "
42 .BR fastleave " { " on " | " off " } ] [ "
43 .BR root_block " { " on " | " off " } ] [ "
44 .BR learning " { " on " | " off " } ] [ "
45 .BR learning_sync " { " on " | " off " } ] [ "
46 .BR flood " { " on " | " off " } ] [ "
47 .BR hwmode " { " vepa " | " veb " } ] [ "
48 .BR mcast_flood " { " on " | " off " } ] [ "
49 .BR mcast_to_unicast " { " on " | " off " } ] [ "
50 .BR neigh_suppress " { " on " | " off " } ] [ "
51 .BR vlan_tunnel " { " on " | " off " } ] [ "
52 .BR isolated " { " on " | " off " } ] [ "
53 .B backup_port
54 .IR DEVICE " ] ["
55 .BR nobackup_port " ] [ "
56 .BR self " ] [ " master " ]"
57
58 .ti -8
59 .BR "bridge link" " [ " show " ] [ "
60 .B dev
61 .IR DEV " ]"
62
63 .ti -8
64 .BR "bridge fdb" " { " add " | " append " | " del " | " replace " } "
65 .I LLADDR
66 .B dev
67 .IR DEV " { "
68 .BR local " | " static " | " dynamic " } [ "
69 .BR self " ] [ " master " ] [ " router " ] [ " use " ] [ " extern_learn " ] [ " sticky " ] [ "
70 .B src_vni
71 .IR VNI " ] { ["
72 .B dst
73 .IR IPADDR " ] [ "
74 .B vni
75 .IR VNI " ] ["
76 .B port
77 .IR PORT " ] ["
78 .B via
79 .IR DEVICE " ] | "
80 .B nhid
81 .IR NHID " } "
82
83 .ti -8
84 .BR "bridge fdb" " [ [ " show " ] [ "
85 .B br
86 .IR BRDEV " ] [ "
87 .B brport
88 .IR DEV " ] [ "
89 .B vlan
90 .IR VID " ] [ "
91 .B state
92 .IR STATE " ] ["
93 .B dynamic
94 .IR "] ]"
95
96 .ti -8
97 .BR "bridge fdb get" " ["
98 .B to
99 .IR "]"
100 .I LLADDR "[ "
101 .B br
102 .IR BRDEV " ]"
103 .B { brport | dev }
104 .IR DEV " [ "
105 .B vlan
106 .IR VID " ] [ "
107 .B vni
108 .IR VNI " ] ["
109 .BR self " ] [ " master " ] [ " dynamic " ]"
110
111 .ti -8
112 .BR "bridge mdb" " { " add " | " del " } "
113 .B dev
114 .I DEV
115 .B port
116 .I PORT
117 .B grp
118 .IR GROUP " [ "
119 .B src
120 .IR SOURCE " ] [ "
121 .BR permanent " | " temp " ] [ "
122 .B vid
123 .IR VID " ] "
124
125 .ti -8
126 .BR "bridge mdb show " [ "
127 .B dev
128 .IR DEV " ]"
129
130 .ti -8
131 .BR "bridge vlan" " { " add " | " del " } "
132 .B dev
133 .I DEV
134 .B vid
135 .IR VID " [ "
136 .B tunnel_info
137 .IR TUNNEL_ID " ] [ "
138 .BR pvid " ] [ " untagged " ] [ "
139 .BR self " ] [ " master " ] "
140
141 .ti -8
142 .BR "bridge vlan" " [ " show " | " tunnelshow " ] [ "
143 .B dev
144 .IR DEV " ]"
145
146 .ti -8
147 .BR "bridge monitor" " [ " all " | " neigh " | " link " | " mdb " ]"
148
149 .SH OPTIONS
150
151 .TP
152 .BR "\-V" , " -Version"
153 print the version of the
154 .B bridge
155 utility and exit.
156
157 .TP
158 .BR "\-s" , " \-stats", " \-statistics"
159 output more information. If this option
160 is given multiple times, the amount of information increases.
161 As a rule, the information is statistics or some time values.
162
163 .TP
164 .BR "\-d" , " \-details"
165 print detailed information about MDB router ports.
166
167 .TP
168 .BR "\-n" , " \-net" , " \-netns " <NETNS>
169 switches
170 .B bridge
171 to the specified network namespace
172 .IR NETNS .
173 Actually it just simplifies executing of:
174
175 .B ip netns exec
176 .I NETNS
177 .B bridge
178 .RI "[ " OPTIONS " ] " OBJECT " { " COMMAND " | "
179 .BR help " }"
180
181 to
182
183 .B bridge
184 .RI "-n[etns] " NETNS " [ " OPTIONS " ] " OBJECT " { " COMMAND " | "
185 .BR help " }"
186
187 .TP
188 .BR "\-b", " \-batch " <FILENAME>
189 Read commands from provided file or standard input and invoke them.
190 First failure will cause termination of bridge command.
191
192 .TP
193 .B "\-force"
194 Don't terminate bridge command on errors in batch mode.
195 If there were any errors during execution of the commands, the application
196 return code will be non zero.
197
198 .TP
199 .BR \-c [ color ][ = { always | auto | never }
200 Configure color output. If parameter is omitted or
201 .BR always ,
202 color output is enabled regardless of stdout state. If parameter is
203 .BR auto ,
204 stdout is checked to be a terminal before enabling color output. If parameter is
205 .BR never ,
206 color output is disabled. If specified multiple times, the last one takes
207 precedence. This flag is ignored if
208 .B \-json
209 is also given.
210
211 .TP
212 .BR "\-j", " \-json"
213 Output results in JavaScript Object Notation (JSON).
214
215 .TP
216 .BR "\-p", " \-pretty"
217 When combined with -j generate a pretty JSON output.
218
219 .TP
220 .BR "\-o", " \-oneline"
221 output each record on a single line, replacing line feeds
222 with the
223 .B '\e'
224 character. This is convenient when you want to count records
225 with
226 .BR wc (1)
227 or to
228 .BR grep (1)
229 the output.
230
231
232 .SH BRIDGE - COMMAND SYNTAX
233
234 .SS
235 .I OBJECT
236
237 .TP
238 .B link
239 - Bridge port.
240
241 .TP
242 .B fdb
243 - Forwarding Database entry.
244
245 .TP
246 .B mdb
247 - Multicast group database entry.
248
249 .TP
250 .B vlan
251 - VLAN filter list.
252
253 .SS
254 .I COMMAND
255
256 Specifies the action to perform on the object.
257 The set of possible actions depends on the object type.
258 As a rule, it is possible to
259 .BR "add" , " delete"
260 and
261 .B show
262 (or
263 .B list
264 ) objects, but some objects do not allow all of these operations
265 or have some additional commands. The
266 .B help
267 command is available for all objects. It prints
268 out a list of available commands and argument syntax conventions.
269 .sp
270 If no command is given, some default command is assumed.
271 Usually it is
272 .B list
273 or, if the objects of this class cannot be listed,
274 .BR "help" .
275
276 .SH bridge link - bridge port
277
278 .B link
279 objects correspond to the port devices of the bridge.
280
281 .P
282 The corresponding commands set and display port status and bridge specific
283 attributes.
284
285 .SS bridge link set - set bridge specific attributes on a port
286
287 .TP
288 .BI dev " NAME "
289 interface name of the bridge port
290
291 .TP
292 .BI cost " COST "
293 the STP path cost of the specified port.
294
295 .TP
296 .BI priority " PRIO "
297 the STP port priority. The priority value is an unsigned 8-bit quantity
298 (number between 0 and 255). This metric is used in the designated port an
299 droot port selection algorithms.
300
301 .TP
302 .BI state " STATE "
303 the operation state of the port. Except state 0 (disable STP or BPDU filter feature),
304 this is primarily used by user space STP/RSTP
305 implementation. One may enter port state name (case insensitive), or one of the
306 numbers below. Negative inputs are ignored, and unrecognized names return an
307 error.
308
309 .B 0
310 - port is in STP
311 .B DISABLED
312 state. Make this port completely inactive for STP. This is also called
313 BPDU filter and could be used to disable STP on an untrusted port, like
314 a leaf virtual devices.
315 .sp
316
317 .B 1
318 - port is in STP
319 .B LISTENING
320 state. Only valid if STP is enabled on the bridge. In this
321 state the port listens for STP BPDUs and drops all other traffic frames.
322 .sp
323
324 .B 2
325 - port is in STP
326 .B LEARNING
327 state. Only valid if STP is enabled on the bridge. In this
328 state the port will accept traffic only for the purpose of updating MAC
329 address tables.
330 .sp
331
332 .B 3
333 - port is in STP
334 .B FORWARDING
335 state. Port is fully active.
336 .sp
337
338 .B 4
339 - port is in STP
340 .B BLOCKING
341 state. Only valid if STP is enabled on the bridge. This state
342 is used during the STP election process. In this state, port will only process
343 STP BPDUs.
344 .sp
345
346 .TP
347 .BR "guard on " or " guard off "
348 Controls whether STP BPDUs will be processed by the bridge port. By default,
349 the flag is turned off allowed BPDU processing. Turning this flag on will
350 disables
351 the bridge port if a STP BPDU packet is received.
352
353 If running Spanning Tree on bridge, hostile devices on the network
354 may send BPDU on a port and cause network failure. Setting
355 .B guard on
356 will detect and stop this by disabling the port.
357 The port will be restarted if link is brought down, or
358 removed and reattached. For example if guard is enable on
359 eth0:
360
361 .B ip link set dev eth0 down; ip link set dev eth0 up
362
363 .TP
364 .BR "hairpin on " or " hairpin off "
365 Controls whether traffic may be send back out of the port on which it was
366 received. This option is also called reflective relay mode, and is used to support
367 basic VEPA (Virtual Ethernet Port Aggregator) capabilities.
368 By default, this flag is turned off and the bridge will not forward
369 traffic back out of the receiving port.
370
371 .TP
372 .BR "fastleave on " or " fastleave off "
373 This flag allows the bridge to immediately stop multicast traffic on a port
374 that receives IGMP Leave message. It is only used with IGMP snooping is
375 enabled on the bridge. By default the flag is off.
376
377 .TP
378 .BR "root_block on " or " root_block off "
379 Controls whether a given port is allowed to become root port or not. Only used
380 when STP is enabled on the bridge. By default the flag is off.
381
382 This feature is also called root port guard.
383 If BPDU is received from a leaf (edge) port, it should not
384 be elected as root port. This could be used if using STP on a bridge and the downstream bridges are not fully
385 trusted; this prevents a hostile guest from rerouting traffic.
386
387 .TP
388 .BR "learning on " or " learning off "
389 Controls whether a given port will learn MAC addresses from received traffic or
390 not. If learning if off, the bridge will end up flooding any traffic for which
391 it has no FDB entry. By default this flag is on.
392
393 .TP
394 .BR "learning_sync on " or " learning_sync off "
395 Controls whether a given port will sync MAC addresses learned on device port to
396 bridge FDB.
397
398 .TP
399 .BR "flood on " or " flood off "
400 Controls whether a given port will flood unicast traffic for which there is no FDB entry. By default this flag is on.
401
402 .TP
403 .B hwmode
404 Some network interface cards support HW bridge functionality and they may be
405 configured in different modes. Currently support modes are:
406
407 .B vepa
408 - Data sent between HW ports is sent on the wire to the external
409 switch.
410
411 .B veb
412 - bridging happens in hardware.
413
414 .TP
415 .BR "mcast_flood on " or " mcast_flood off "
416 Controls whether a given port will flood multicast traffic for which
417 there is no MDB entry. By default this flag is on.
418
419 .TP
420 .BR "mcast_to_unicast on " or " mcast_to_unicast off "
421 Controls whether a given port will replicate packets using unicast
422 instead of multicast. By default this flag is off.
423
424 This is done by copying the packet per host and
425 changing the multicast destination MAC to a unicast one accordingly.
426
427 .B mcast_to_unicast
428 works on top of the multicast snooping feature of
429 the bridge. Which means unicast copies are only delivered to hosts which
430 are interested in it and signalized this via IGMP/MLD reports
431 previously.
432
433 This feature is intended for interface types which have a more reliable
434 and/or efficient way to deliver unicast packets than broadcast ones
435 (e.g. WiFi).
436
437 However, it should only be enabled on interfaces where no IGMPv2/MLDv1
438 report suppression takes place. IGMP/MLD report suppression issue is usually
439 overcome by the network daemon (supplicant) enabling AP isolation and
440 by that separating all STAs.
441
442 Delivery of STA-to-STA IP multicast is made possible again by
443 enabling and utilizing the bridge hairpin mode, which considers the
444 incoming port as a potential outgoing port, too (see
445 .B hairpin
446 option).
447 Hairpin mode is performed after multicast snooping, therefore leading to
448 only deliver reports to STAs running a multicast router.
449
450 .TP
451 .BR "neigh_suppress on " or " neigh_suppress off "
452 Controls whether neigh discovery (arp and nd) proxy and suppression is
453 enabled on the port. By default this flag is off.
454
455 .TP
456 .BR "vlan_tunnel on " or " vlan_tunnel off "
457 Controls whether vlan to tunnel mapping is enabled on the port. By
458 default this flag is off.
459
460 .TP
461 .BR "isolated on " or " isolated off "
462 Controls whether a given port will be isolated, which means it will be
463 able to communicate with non-isolated ports only. By default this
464 flag is off.
465
466 .TP
467 .BI backup_port " DEVICE"
468 If the port loses carrier all traffic will be redirected to the
469 configured backup port
470
471 .TP
472 .B nobackup_port
473 Removes the currently configured backup port
474
475 .TP
476 .B self
477 link setting is configured on specified physical device
478
479 .TP
480 .B master
481 link setting is configured on the software bridge (default)
482
483 .TP
484 .BR "\-t" , " \-timestamp"
485 display current time when using monitor option.
486
487 .SS bridge link show - list ports configuration for all bridges.
488
489 This command displays port configuration and flags for all bridges.
490
491 To display port configuration and flags for a specific bridge, use the
492 "ip link show master <bridge_device>" command.
493
494 .SH bridge fdb - forwarding database management
495
496 .B fdb
497 objects contain known Ethernet addresses on a link.
498
499 .P
500 The corresponding commands display fdb entries, add new entries,
501 append entries,
502 and delete old ones.
503
504 .SS bridge fdb add - add a new fdb entry
505
506 This command creates a new fdb entry.
507
508 .TP
509 .B LLADDR
510 the Ethernet MAC address.
511
512 .TP
513 .BI dev " DEV"
514 the interface to which this address is associated.
515
516 .B local
517 - is a local permanent fdb entry
518 .sp
519
520 .B permanent
521 - this is a synonym for "local"
522 .sp
523
524 .B static
525 - is a static (no arp) fdb entry
526 .sp
527
528 .B dynamic
529 - is a dynamic reachable age-able fdb entry
530 .sp
531
532 .B self
533 - the address is associated with the port drivers fdb. Usually hardware.
534 .sp
535
536 .B master
537 - the address is associated with master devices fdb. Usually software (default).
538 .sp
539
540 .B router
541 - the destination address is associated with a router.
542 Valid if the referenced device is a VXLAN type device and has
543 route short circuit enabled.
544 .sp
545
546 .B use
547 - the address is in use. User space can use this option to
548 indicate to the kernel that the fdb entry is in use.
549 .sp
550
551 .B extern_learn
552 - this entry was learned externally. This option can be used to
553 indicate to the kernel that an entry was hardware or user-space
554 controller learnt dynamic entry. Kernel will not age such an entry.
555 .sp
556
557 .B sticky
558 - this entry will not change its port due to learning.
559 .sp
560
561 .in -8
562 The next command line parameters apply only
563 when the specified device
564 .I DEV
565 is of type VXLAN.
566 .TP
567 .BI dst " IPADDR"
568 the IP address of the destination
569 VXLAN tunnel endpoint where the Ethernet MAC ADDRESS resides.
570
571 .TP
572 .BI src_vni " VNI"
573 the src VNI Network Identifier (or VXLAN Segment ID)
574 this entry belongs to. Used only when the vxlan device is in
575 external or collect metadata mode. If omitted the value specified at
576 vxlan device creation will be used.
577
578 .TP
579 .BI vni " VNI"
580 the VXLAN VNI Network Identifier (or VXLAN Segment ID)
581 to use to connect to the remote VXLAN tunnel endpoint.
582 If omitted the value specified at vxlan device creation
583 will be used.
584
585 .TP
586 .BI port " PORT"
587 the UDP destination PORT number to use to connect to the
588 remote VXLAN tunnel endpoint.
589 If omitted the default value is used.
590
591 .TP
592 .BI via " DEVICE"
593 device name of the outgoing interface for the
594 VXLAN device driver to reach the
595 remote VXLAN tunnel endpoint.
596
597 .TP
598 .BI nhid " NHID "
599 ecmp nexthop group for the VXLAN device driver
600 to reach remote VXLAN tunnel endpoints.
601
602 .SS bridge fdb append - append a forwarding database entry
603 This command adds a new fdb entry with an already known
604 .IR LLADDR .
605 Valid only for multicast link layer addresses.
606 The command adds support for broadcast and multicast
607 Ethernet MAC addresses.
608 The Ethernet MAC address is added multiple times into
609 the forwarding database and the vxlan device driver
610 sends a copy of the data packet to each entry found.
611
612 .PP
613 The arguments are the same as with
614 .BR "bridge fdb add" .
615
616 .SS bridge fdb delete - delete a forwarding database entry
617 This command removes an existing fdb entry.
618
619 .PP
620 The arguments are the same as with
621 .BR "bridge fdb add" .
622
623 .SS bridge fdb replace - replace a forwarding database entry
624 If no matching entry is found, a new one will be created instead.
625
626 .PP
627 The arguments are the same as with
628 .BR "bridge fdb add" .
629
630 .SS bridge fdb show - list forwarding entries.
631
632 This command displays the current forwarding table.
633
634 .PP
635 With the
636 .B -statistics
637 option, the command becomes verbose. It prints out the last updated
638 and last used time for each entry.
639
640 .SS bridge fdb get - get bridge forwarding entry.
641
642 lookup a bridge forwarding table entry.
643
644 .TP
645 .B LLADDR
646 the Ethernet MAC address.
647
648 .TP
649 .BI dev " DEV"
650 the interface to which this address is associated.
651
652 .TP
653 .BI brport " DEV"
654 the bridge port to which this address is associated. same as dev above.
655
656 .TP
657 .BI br " DEV"
658 the bridge to which this address is associated.
659
660 .TP
661 .B self
662 - the address is associated with the port drivers fdb. Usually hardware.
663
664 .TP
665 .B master
666 - the address is associated with master devices fdb. Usually software (default).
667 .sp
668
669 .SH bridge mdb - multicast group database management
670
671 .B mdb
672 objects contain known IP or L2 multicast group addresses on a link.
673
674 .P
675 The corresponding commands display mdb entries, add new entries,
676 and delete old ones.
677
678 .SS bridge mdb add - add a new multicast group database entry
679
680 This command creates a new mdb entry.
681
682 .TP
683 .BI dev " DEV"
684 the interface where this group address is associated.
685
686 .TP
687 .BI port " PORT"
688 the port whose link is known to have members of this multicast group.
689
690 .TP
691 .BI grp " GROUP"
692 the multicast group address (IPv4, IPv6 or L2 multicast) whose members reside
693 on the link connected to the port.
694
695 .B permanent
696 - the mdb entry is permanent. Optional for IPv4 and IPv6, mandatory for L2.
697 .sp
698
699 .B temp
700 - the mdb entry is temporary (default)
701 .sp
702
703 .TP
704 .BI src " SOURCE"
705 optional source IP address of a sender for this multicast group. If IGMPv3 for IPv4, or
706 MLDv2 for IPv6 respectively, are enabled it will be included in the lookup when
707 forwarding multicast traffic.
708
709 .TP
710 .BI vid " VID"
711 the VLAN ID which is known to have members of this multicast group.
712
713 .in -8
714 .SS bridge mdb delete - delete a multicast group database entry
715 This command removes an existing mdb entry.
716
717 .PP
718 The arguments are the same as with
719 .BR "bridge mdb add" .
720
721 .SS bridge mdb show - list multicast group database entries
722
723 This command displays the current multicast group membership table. The table
724 is populated by IGMP and MLD snooping in the bridge driver automatically. It
725 can be altered by
726 .B bridge mdb add
727 and
728 .B bridge mdb del
729 commands manually too.
730
731 .TP
732 .BI dev " DEV"
733 the interface only whose entries should be listed. Default is to list all
734 bridge interfaces.
735
736 .PP
737 With the
738 .B -details
739 option, the command becomes verbose. It prints out the ports known to have
740 a connected router.
741
742 .PP
743 With the
744 .B -statistics
745 option, the command displays timer values for mdb and router port entries.
746
747 .SH bridge vlan - VLAN filter list
748
749 .B vlan
750 objects contain known VLAN IDs for a link.
751
752 .P
753 The corresponding commands display vlan filter entries, add new entries,
754 and delete old ones.
755
756 .SS bridge vlan add - add a new vlan filter entry
757
758 This command creates a new vlan filter entry.
759
760 .TP
761 .BI dev " NAME"
762 the interface with which this vlan is associated.
763
764 .TP
765 .BI vid " VID"
766 the VLAN ID that identifies the vlan.
767
768 .TP
769 .BI tunnel_info " TUNNEL_ID"
770 the TUNNEL ID that maps to this vlan. The tunnel id is set in
771 dst_metadata for every packet that belongs to this vlan (applicable to
772 bridge ports with vlan_tunnel flag set).
773
774 .TP
775 .B pvid
776 the vlan specified is to be considered a PVID at ingress.
777 Any untagged frames will be assigned to this VLAN.
778
779 .TP
780 .B untagged
781 the vlan specified is to be treated as untagged on egress.
782
783 .TP
784 .B self
785 the vlan is configured on the specified physical device. Required if the
786 device is the bridge device.
787
788 .TP
789 .B master
790 the vlan is configured on the software bridge (default).
791
792 .SS bridge vlan delete - delete a vlan filter entry
793 This command removes an existing vlan filter entry.
794
795 .PP
796 The arguments are the same as with
797 .BR "bridge vlan add".
798 The
799 .BR "pvid " and " untagged"
800 flags are ignored.
801
802 .SS bridge vlan show - list vlan configuration.
803
804 This command displays the current VLAN filter table.
805
806 .PP
807 With the
808 .B -statistics
809 option, the command displays per-vlan traffic statistics.
810
811 .SS bridge vlan tunnelshow - list vlan tunnel mapping.
812
813 This command displays the current vlan tunnel info mapping.
814
815 .SH bridge monitor - state monitoring
816
817 The
818 .B bridge
819 utility can monitor the state of devices and addresses
820 continuously. This option has a slightly different format.
821 Namely, the
822 .B monitor
823 command is the first in the command line and then the object list follows:
824
825 .BR "bridge monitor" " [ " all " |"
826 .IR OBJECT-LIST " ]"
827
828 .I OBJECT-LIST
829 is the list of object types that we want to monitor.
830 It may contain
831 .BR link ", " fdb ", and " mdb "."
832 If no
833 .B file
834 argument is given,
835 .B bridge
836 opens RTNETLINK, listens on it and dumps state changes in the format
837 described in previous sections.
838
839 .P
840 If a file name is given, it does not listen on RTNETLINK,
841 but opens the file containing RTNETLINK messages saved in binary format
842 and dumps them.
843
844 .SH NOTES
845 This command uses facilities added in Linux 3.0.
846
847 Although the forwarding table is maintained on a per-bridge device basis
848 the bridge device is not part of the syntax. This is a limitation of the
849 underlying netlink neighbour message protocol. When displaying the
850 forwarding table, entries for all bridges are displayed.
851 Add/delete/modify commands determine the underlying bridge device
852 based on the bridge to which the corresponding ethernet device is attached.
853
854
855 .SH SEE ALSO
856 .BR ip (8)
857 .SH BUGS
858 .RB "Please direct bugreports and patches to: " <netdev@vger.kernel.org>
859
860 .SH AUTHOR
861 Original Manpage by Stephen Hemminger