1BRIDGE(8)                            Linux                           BRIDGE(8)
2
3
4

NAME

6       bridge - show / manipulate bridge addresses and devices
7

SYNOPSIS

9       bridge [ OPTIONS ] OBJECT { COMMAND | help }
10
11
12       OBJECT := { link | fdb | mdb | vlan | vni | monitor }
13
14
15       OPTIONS := { -V[ersion] | -s[tatistics] | -n[etns] name | -b[atch]
16               filename | -c[olor] | -p[retty] | -j[son] | -o[neline] }
17
18       bridge link set dev DEV [ cost COST ] [ priority PRIO ] [ state STATE ]
19               [ guard { on | off } ] [ hairpin { on | off } ] [ fastleave {
20               on | off } ] [ root_block { on | off } ] [ learning { on | off
21               } ] [ learning_sync { on | off } ] [ flood { on | off } ] [ hw‐
22               mode { vepa | veb } ] [ bcast_flood { on | off } ] [
23               mcast_flood { on | off } ] [ mcast_max_groups MAX_GROUPS ] [
24               mcast_router MULTICAST_ROUTER ] [ mcast_to_unicast { on | off }
25               ] [ neigh_suppress { on | off } ] [ neigh_vlan_suppress { on |
26               off } ] [ vlan_tunnel { on | off } ] [ isolated { on | off } ]
27               [ locked { on | off } ] [ mab { on | off } ] [ backup_port DE‐
28               VICE ] [ nobackup_port ] [ self ] [ master ]
29
30       bridge link [ show ] [ dev DEV ]
31
32       bridge fdb { add | append | del | replace } LLADDR dev DEV { local |
33               static | dynamic } [ self ] [ master ] [ router ] [ use ] [ ex‐
34               tern_learn ] [ sticky ] [ src_vni VNI ] { [ dst IPADDR ] [ vni
35               VNI ] [ port PORT ] [ via DEVICE ] | nhid NHID }
36
37       bridge fdb [ [ show ] [ br BRDEV ] [ brport DEV ] [ vlan VID ] [ state
38               STATE ] [ dynamic ] ]
39
40       bridge fdb get [ to ] LLADDR [ br BRDEV ] { brport | dev } DEV [ vlan
41               VID ] [ vni VNI ] [ self ] [ master ] [ dynamic ]
42
43       bridge fdb flush dev DEV [ brport DEV ] [ vlan VID ] [ self ] [ master
44               ] [ [no]permanent | [no]static | [no]dynamic ] [
45               [no]added_by_user ] [ [no]extern_learn ] [ [no]sticky ] [
46               [no]offloaded ]
47
48       bridge mdb { add | del | replace } dev DEV port PORT grp GROUP [ src
49               SOURCE ] [ permanent | temp ] [ vid VID ] [ filter_mode { in‐
50               clude | exclude } ] [ source_list SOURCE_LIST ] [ proto PROTO ]
51               [ dst IPADDR ] [ dst_port DST_PORT ] [ vni VNI ] [ src_vni
52               SRC_VNI ] [ via DEV ]
53
54       bridge mdb show [ dev DEV ]
55
56       bridge vlan { add | del } dev DEV vid VID [ tunnel_info TUNNEL_ID ] [
57               pvid ] [ untagged ] [ self ] [ master ]
58
59       bridge vlan set dev DEV vid VID [ state STP_STATE ] [ mcast_max_groups
60               MAX_GROUPS ] [ mcast_router MULTICAST_ROUTER ] [ neigh_suppress
61               { on | off } ]
62
63       bridge vlan [ show | tunnelshow ] [ dev DEV ]
64
65       bridge vlan global set dev DEV vid VID [ mcast_snooping MULTI‐
66               CAST_SNOOPING ] [ mcast_querier MULTICAST_QUERIER ] [
67               mcast_igmp_version IGMP_VERSION ] [ mcast_mld_version MLD_VER‐
68               SION ] [ mcast_last_member_count LAST_MEMBER_COUNT ] [
69               mcast_last_member_interval LAST_MEMBER_INTERVAL ] [
70               mcast_startup_query_count STARTUP_QUERY_COUNT ] [
71               mcast_startup_query_interval STARTUP_QUERY_INTERVAL ] [
72               mcast_membership_interval MEMBERSHIP_INTERVAL ] [
73               mcast_querier_interval QUERIER_INTERVAL ] [ mcast_query_inter‐
74               val QUERY_INTERVAL ] [ mcast_query_response_interval QUERY_RE‐
75               SPONSE_INTERVAL ]
76
77       bridge vlan global [ show ] [ dev DEV ] [ vid VID ]
78
79       bridge vlan show [ dev DEV ]
80
81       bridge vni { add | del } dev DEV vni VNI [ { group | remote } IPADDR ]
82
83       bridge vni show [ dev DEV ]
84
85       bridge monitor [ all | neigh | link | mdb | vlan ]
86
87

OPTIONS

89       -V, -Version
90              print the version of the bridge utility and exit.
91
92
93       -s, -stats, -statistics
94              output more information. If this option is given multiple times,
95              the amount of information increases.  As a rule, the information
96              is statistics or some time values.
97
98
99       -d, -details
100              print detailed information about bridge vlan filter entries or
101              MDB router ports.
102
103
104       -n, -net, -netns <NETNS>
105              switches bridge to the specified network namespace NETNS.  Actu‐
106              ally it just simplifies executing of:
107
108              ip netns exec NETNS bridge [ OPTIONS ] OBJECT { COMMAND | help }
109
110              to
111
112              bridge -n[etns] NETNS [ OPTIONS ] OBJECT { COMMAND | help }
113
114
115       -b, -batch <FILENAME>
116              Read commands from provided file or standard input and invoke
117              them.  First failure will cause termination of bridge command.
118
119
120       -force Don't terminate bridge command on errors in batch mode.  If
121              there were any errors during execution of the commands, the ap‐
122              plication return code will be non zero.
123
124
125       -c[color][={always|auto|never}
126              Configure color output. If parameter is omitted or always, color
127              output is enabled regardless of stdout state. If parameter is
128              auto, stdout is checked to be a terminal before enabling color
129              output. If parameter is never, color output is disabled. If
130              specified multiple times, the last one takes precedence. This
131              flag is ignored if -json is also given.
132
133
134       -j, -json
135              Output results in JavaScript Object Notation (JSON).
136
137
138       -p, -pretty
139              When combined with -j generate a pretty JSON output.
140
141
142       -o, -oneline
143              output each record on a single line, replacing line feeds with
144              the '\' character. This is convenient when you want to count
145              records with wc(1) or to grep(1) the output.
146
147
148

BRIDGE - COMMAND SYNTAX

150   OBJECT
151       link   - Bridge port.
152
153
154       fdb    - Forwarding Database entry.
155
156
157       mdb    - Multicast group database entry.
158
159
160       vlan   - VLAN filter list.
161
162
163       vni    - VNI filter list.
164
165
166   COMMAND
167       Specifies the action to perform on the object.  The set of possible ac‐
168       tions depends on the object type.  As a rule, it is possible to add,
169       delete and show (or list ) objects, but some objects do not allow all
170       of these operations or have some additional commands. The help command
171       is available for all objects. It prints out a list of available com‐
172       mands and argument syntax conventions.
173
174       If no command is given, some default command is assumed.  Usually it is
175       list or, if the objects of this class cannot be listed, help.
176
177
179       link objects correspond to the port devices of the bridge.
180
181
182       The corresponding commands set and display port status and bridge spe‐
183       cific attributes.
184
185
186   bridge link set - set bridge specific attributes on a port
187       dev NAME
188              interface name of the bridge port
189
190
191       cost COST
192              the STP path cost of the specified port.
193
194
195       priority PRIO
196              the STP port priority. The priority value is an unsigned 8-bit
197              quantity (number between 0 and 255). This metric is used in the
198              designated port an droot port selection algorithms.
199
200
201       state STATE
202              the operation state of the port. Except state 0 (disable STP or
203              BPDU filter feature), this is primarily used by user space
204              STP/RSTP implementation. One may enter port state name (case in‐
205              sensitive), or one of the numbers below. Negative inputs are ig‐
206              nored, and unrecognized names return an error.
207
208              0 - port is in STP DISABLED state. Make this port completely in‐
209              active for STP. This is also called BPDU filter and could be
210              used to disable STP on an untrusted port, like a leaf virtual
211              devices.
212
213
214              1 - port is in STP LISTENING state. Only valid if STP is enabled
215              on the bridge. In this state the port listens for STP BPDUs and
216              drops all other traffic frames.
217
218
219              2 - port is in STP LEARNING state. Only valid if STP is enabled
220              on the bridge. In this state the port will accept traffic only
221              for the purpose of updating MAC address tables.
222
223
224              3 - port is in STP FORWARDING state. Port is fully active.
225
226
227              4 - port is in STP BLOCKING state. Only valid if STP is enabled
228              on the bridge. This state is used during the STP election
229              process. In this state, port will only process STP BPDUs.
230
231
232
233       guard on or guard off
234              Controls whether STP BPDUs will be processed by the bridge port.
235              By default, the flag is turned off allowed BPDU processing.
236              Turning this flag on will disables the bridge port if a STP BPDU
237              packet is received.
238
239              If running Spanning Tree on bridge, hostile devices on the net‐
240              work may send BPDU on a port and cause network failure. Setting
241              guard on will detect and stop this by disabling the port.  The
242              port will be restarted if link is brought down, or removed and
243              reattached.  For example if guard is enable on eth0:
244
245              ip link set dev eth0 down; ip link set dev eth0 up
246
247
248       hairpin on or hairpin off
249              Controls whether traffic may be send back out of the port on
250              which it was received. This option is also called reflective re‐
251              lay mode, and is used to support basic VEPA (Virtual Ethernet
252              Port Aggregator) capabilities.  By default, this flag is turned
253              off and the bridge will not forward traffic back out of the re‐
254              ceiving port.
255
256
257       fastleave on or fastleave off
258              This flag allows the bridge to immediately stop multicast traf‐
259              fic on a port that receives IGMP Leave message. It is only used
260              with IGMP snooping is enabled on the bridge. By default the flag
261              is off.
262
263
264       root_block on or root_block off
265              Controls whether a given port is allowed to become root port or
266              not. Only used when STP is enabled on the bridge. By default the
267              flag is off.
268
269              This feature is also called root port guard.  If BPDU is re‐
270              ceived from a leaf (edge) port, it should not be elected as root
271              port. This could be used if using STP on a bridge and the down‐
272              stream bridges are not fully trusted; this prevents a hostile
273              guest from rerouting traffic.
274
275
276       learning on or learning off
277              Controls whether a given port will learn MAC addresses from re‐
278              ceived traffic or not. If learning if off, the bridge will end
279              up flooding any traffic for which it has no FDB entry. By de‐
280              fault this flag is on.
281
282
283       learning_sync on or learning_sync off
284              Controls whether a given port will sync MAC addresses learned on
285              device port to bridge FDB.
286
287
288       flood on or flood off
289              Controls whether unicast traffic for which there is no FDB entry
290              will be flooded towards this given port. By default this flag is
291              on.
292
293
294       hwmode Some network interface cards support HW bridge functionality and
295              they may be configured in different modes. Currently support
296              modes are:
297
298              vepa - Data sent between HW ports is sent on the wire to the ex‐
299              ternal switch.
300
301              veb - bridging happens in hardware.
302
303
304       bcast_flood on or bcast_flood off
305              Controls flooding of broadcast traffic on the given port.  By
306              default this flag is on.
307
308
309       mcast_flood on or mcast_flood off
310              Controls whether multicast traffic for which there is no MDB en‐
311              try will be flooded towards this given port. By default this
312              flag is on.
313
314
315       mcast_max_groups MAX_GROUPS
316              Sets the maximum number of MDB entries that can be registered
317              for a given port. Attempts to register more MDB entries at the
318              port than this limit allows will be rejected, whether they are
319              done through netlink (e.g. the bridge tool), or IGMP or MLD mem‐
320              bership reports. Setting a limit to 0 has the effect of dis‐
321              abling the limit. The default value is 0. See also the ip link
322              option mcast_hash_max.
323
324
325       mcast_router MULTICAST_ROUTER
326              This flag is almost the same as the per-VLAN flag, see below,
327              except its value can only be set in the range 0-2.  The default
328              is 1 where the bridge figures out automatically where an
329              IGMP/MLD querier, MRDISC capable device, or PIM router, is lo‐
330              cated.  Setting this flag to 2 is useful in cases where the mul‐
331              ticast router does not indicate its presence in any meaningful
332              way (e.g. older versions of SMCRoute, or mrouted), or when there
333              is a need for forwarding both known and unknown IP multicast to
334              a secondary/backup router.
335
336
337       mcast_to_unicast on or mcast_to_unicast off
338              Controls whether a given port will replicate packets using uni‐
339              cast instead of multicast. By default this flag is off.
340
341              This is done by copying the packet per host and changing the
342              multicast destination MAC to a unicast one accordingly.
343
344              mcast_to_unicast works on top of the multicast snooping feature
345              of the bridge. Which means unicast copies are only delivered to
346              hosts which are interested in it and signalized this via
347              IGMP/MLD reports previously.
348
349              This feature is intended for interface types which have a more
350              reliable and/or efficient way to deliver unicast packets than
351              broadcast ones (e.g. WiFi).
352
353              However, it should only be enabled on interfaces where no
354              IGMPv2/MLDv1 report suppression takes place. IGMP/MLD report
355              suppression issue is usually overcome by the network daemon
356              (supplicant) enabling AP isolation and by that separating all
357              STAs.
358
359              Delivery of STA-to-STA IP multicast is made possible again by
360              enabling and utilizing the bridge hairpin mode, which considers
361              the incoming port as a potential outgoing port, too (see hairpin
362              option).  Hairpin mode is performed after multicast snooping,
363              therefore leading to only deliver reports to STAs running a mul‐
364              ticast router.
365
366
367       neigh_suppress on or neigh_suppress off
368              Controls whether neigh discovery (arp and nd) proxy and suppres‐
369              sion is enabled on the port. By default this flag is off.
370
371
372       neigh_vlan_suppress on or neigh_vlan_suppress off
373              Controls whether per-VLAN neigh discovery (arp and nd) proxy and
374              suppression is enabled on the port. When on, the bridge link op‐
375              tion neigh_suppress has no effect and the per-VLAN state is set
376              using the bridge vlan option neigh_suppress. By default this
377              flag is off.
378
379
380       vlan_tunnel on or vlan_tunnel off
381              Controls whether vlan to tunnel mapping is enabled on the port.
382              By default this flag is off.
383
384
385       isolated on or isolated off
386              Controls whether a given port will be isolated, which means it
387              will be able to communicate with non-isolated ports only.  By
388              default this flag is off.
389
390
391       locked on or locked off
392              Controls whether a port is locked or not. When locked, non-link-
393              local frames received through the port are dropped unless an FDB
394              entry with the MAC source address points to the port. The common
395              use case is IEEE 802.1X where hosts can authenticate themselves
396              by exchanging EAPOL frames with an authenticator. After authen‐
397              tication is complete, the user space control plane can install a
398              matching FDB entry to allow traffic from the host to be for‐
399              warded by the bridge. When learning is enabled on a locked port,
400              the no_linklocal_learn bridge option needs to be on to prevent
401              the bridge from learning from received EAPOL frames. By default
402              this flag is off.
403
404
405       mab on or mab off
406              Controls whether MAC Authentication Bypass (MAB) is enabled on
407              the port or not.  MAB can only be enabled on a locked port that
408              has learning enabled. When enabled, FDB entries are learned from
409              received traffic and have the "locked" FDB flag set. The flag
410              can only be set by the kernel and it indicates that the FDB en‐
411              try cannot be used to authenticate the corresponding host. User
412              space can decide to authenticate the host by replacing the FDB
413              entry and clearing the "locked" FDB flag. Locked FDB entries can
414              roam to unlocked (authorized) ports in which case the "locked"
415              flag is cleared. FDB entries cannot roam to locked ports regard‐
416              less of MAB being enabled or not. Therefore, locked FDB entries
417              are only created if an FDB entry with the given {MAC, VID} does
418              not already exist.  This behavior prevents unauthenticated hosts
419              from disrupting traffic destined to already authenticated hosts.
420              Locked FDB entries act like regular dynamic entries with respect
421              to forwarding and aging. By default this flag is off.
422
423
424       backup_port DEVICE
425              If the port loses carrier all traffic will be redirected to the
426              configured backup port
427
428
429       nobackup_port
430              Removes the currently configured backup port
431
432
433       self   link setting is configured on specified physical device
434
435
436       master link setting is configured on the software bridge (default)
437
438
439       -t, -timestamp
440              display current time when using monitor option.
441
442
443   bridge link show - list ports configuration for all bridges.
444       This command displays port configuration and flags for all bridges.
445
446       To display port configuration and flags for a specific bridge, use the
447       "ip link show master <bridge_device>" command.
448
449

bridge fdb - forwarding database management

451       fdb objects contain known Ethernet addresses on a link.
452
453
454       The corresponding commands display fdb entries, add new entries, append
455       entries, and delete old ones.
456
457
458   bridge fdb add - add a new fdb entry
459       This command creates a new fdb entry.
460
461
462       LLADDR the Ethernet MAC address.
463
464
465       dev DEV
466              the interface to which this address is associated.
467
468              local - is a local permanent fdb entry, which means that the
469              bridge will not forward frames with this destination MAC address
470              and VLAN ID, but terminate them locally. This flag is default
471              unless "static" or "dynamic" are explicitly specified.
472
473
474              permanent - this is a synonym for "local"
475
476
477              static - is a static (no arp) fdb entry
478
479
480              dynamic - is a dynamic reachable age-able fdb entry
481
482
483              self - the operation is fulfilled directly by the driver for the
484              specified network device. If the network device belongs to a
485              master like a bridge, then the bridge is bypassed and not noti‐
486              fied of this operation (and if the device does notify the
487              bridge, it is driver-specific behavior and not mandated by this
488              flag, check the driver for more details). The "bridge fdb add"
489              command can also be used on the bridge device itself, and in
490              this case, the added fdb entries will be locally terminated (not
491              forwarded). In the latter case, the "self" flag is mandatory.
492              The flag is set by default if "master" is not specified.
493
494
495              master - if the specified network device is a port that belongs
496              to a master device such as a bridge, the operation is fulfilled
497              by the master device's driver, which may in turn notify the port
498              driver too of the address. If the specified device is a master
499              itself, such as a bridge, this flag is invalid.
500
501
502              router - the destination address is associated with a router.
503              Valid if the referenced device is a VXLAN type device and has
504              route short circuit enabled.
505
506
507              use - the address is in use. User space can use this option to
508              indicate to the kernel that the fdb entry is in use.
509
510
511              extern_learn - this entry was learned externally. This option
512              can be used to indicate to the kernel that an entry was hardware
513              or user-space controller learnt dynamic entry. Kernel will not
514              age such an entry.
515
516
517              sticky - this entry will not change its port due to learning.
518
519
520      The next command line parameters apply only when the specified device
521      DEV is of type VXLAN.
522
523       dst IPADDR
524              the IP address of the destination VXLAN tunnel endpoint where
525              the Ethernet MAC ADDRESS resides.
526
527
528       src_vni VNI
529              the src VNI Network Identifier (or VXLAN Segment ID) this entry
530              belongs to. Used only when the vxlan device is in external or
531              collect metadata mode. If omitted the value specified at vxlan
532              device creation will be used.
533
534
535       vni VNI
536              the VXLAN VNI Network Identifier (or VXLAN Segment ID) to use to
537              connect to the remote VXLAN tunnel endpoint.  If omitted the
538              value specified at vxlan device creation will be used.
539
540
541       port PORT
542              the UDP destination PORT number to use to connect to the remote
543              VXLAN tunnel endpoint.  If omitted the default value is used.
544
545
546       via DEVICE
547              device name of the outgoing interface for the VXLAN device
548              driver to reach the remote VXLAN tunnel endpoint.
549
550
551       nhid NHID
552              ecmp nexthop group for the VXLAN device driver to reach remote
553              VXLAN tunnel endpoints.
554
555
556   bridge fdb append - append a forwarding database entry
557       This command adds a new fdb entry with an already known LLADDR.  Valid
558       only for multicast link layer addresses.  The command adds support for
559       broadcast and multicast Ethernet MAC addresses.  The Ethernet MAC ad‐
560       dress is added multiple times into the forwarding database and the
561       vxlan device driver sends a copy of the data packet to each entry
562       found.
563
564
565       The arguments are the same as with bridge fdb add.
566
567
568   bridge fdb delete - delete a forwarding database entry
569       This command removes an existing fdb entry.
570
571
572       The arguments are the same as with bridge fdb add.
573
574
575   bridge fdb replace - replace a forwarding database entry
576       If no matching entry is found, a new one will be created instead.
577
578
579       The arguments are the same as with bridge fdb add.
580
581
582   bridge fdb show - list forwarding entries.
583       This command displays the current forwarding table.
584
585
586       With the -statistics option, the command becomes verbose. It prints out
587       the last updated and last used time for each entry.
588
589
590   bridge fdb get - get bridge forwarding entry.
591       lookup a bridge forwarding table entry.
592
593
594       LLADDR the Ethernet MAC address.
595
596
597       dev DEV
598              the interface to which this address is associated.
599
600
601       brport DEV
602              the bridge port to which this address is associated. same as dev
603              above.
604
605
606       br DEV the bridge to which this address is associated.
607
608
609       self   - the address is associated with the port drivers fdb. Usually
610              hardware.
611
612
613       master - the address is associated with master devices fdb. Usually
614              software (default).
615
616
617   bridge fdb flush - flush bridge forwarding table entries.
618       flush the matching bridge forwarding table entries. Some options below
619       have a negated form when "no" is prepended to them (e.g. permanent and
620       nopermanent).
621
622
623       dev DEV
624              the target device for the operation. If the device is a bridge
625              port and "master" is set then the operation will be fulfilled by
626              its master device's driver and all entries pointing to that port
627              will be deleted.
628
629
630       brport DEV
631              the target bridge port for the operation. If the bridge device
632              is specified then only entries pointing to the bridge itself
633              will be deleted. Note that the target device specified by this
634              option will override the one specified by dev above.
635
636
637       vlan VID
638              the target VLAN ID for the operation. Match forwarding table en‐
639              tries only with the specified VLAN ID.
640
641
642       self   the operation is fulfilled directly by the driver for the speci‐
643              fied network device. If the network device belongs to a master
644              like a bridge, then the bridge is bypassed and not notified of
645              this operation. The "bridge fdb flush" command can also be used
646              on the bridge device itself. The flag is set by default if "mas‐
647              ter" is not specified.
648
649
650       master if the specified network device is a port that belongs to a mas‐
651              ter device such as a bridge, the operation is fulfilled by the
652              master device's driver.
653
654
655       [no]permanent
656              if specified then only permanent entries will be deleted or re‐
657              spectively if "no" is prepended then only non-permanent entries
658              will be deleted.
659
660
661       [no]static
662              if specified then only static entries will be deleted or respec‐
663              tively if "no" is prepended then only non-static entries will be
664              deleted.
665
666
667       [no]dynamic
668              if specified then only dynamic entries will be deleted or re‐
669              spectively if "no" is prepended then only non-dynamic (static or
670              permanent) entries will be deleted.
671
672
673       [no]added_by_user
674              if specified then only entries with added_by_user flag will be
675              deleted or respectively if "no" is prepended then only entries
676              without added_by_user flag will be deleted.
677
678
679       [no]extern_learn
680              if specified then only entries with extern_learn flag will be
681              deleted or respectively if "no" is prepended then only entries
682              without extern_learn flag will be deleted.
683
684
685       [no]sticky
686              if specified then only entries with sticky flag will be deleted
687              or respectively if "no" is prepended then only entries without
688              sticky flag will be deleted.
689
690
691       [no]offloaded
692              if specified then only entries with offloaded flag will be
693              deleted or respectively if "no" is prepended then only entries
694              without offloaded flag will be deleted.
695
696
697

bridge mdb - multicast group database management

699       mdb objects contain known IP or L2 multicast group addresses on a link.
700
701
702       The corresponding commands display mdb entries, add new entries, re‐
703       place entries and delete old ones.
704
705
706   bridge mdb add - add a new multicast group database entry
707       This command creates a new mdb entry.
708
709
710       dev DEV
711              the interface where this group address is associated.
712
713
714       port PORT
715              the port whose link is known to have members of this multicast
716              group.
717
718
719       grp GROUP
720              the multicast group address (IPv4, IPv6 or L2 multicast) whose
721              members reside on the link connected to the port.
722
723              permanent - the mdb entry is permanent. Optional for IPv4 and
724              IPv6, mandatory for L2.
725
726
727              temp - the mdb entry is temporary (default)
728
729
730
731       src SOURCE
732              optional source IP address of a sender for this multicast group.
733              If IGMPv3 for IPv4, or MLDv2 for IPv6 respectively, are enabled
734              it will be included in the lookup when forwarding multicast
735              traffic.
736
737
738       vid VID
739              the VLAN ID which is known to have members of this multicast
740              group.
741
742
743       filter_mode include or filter_mode exclude
744              controls whether the sources in the entry's source list are in
745              INCLUDE or EXCLUDE mode. Can only be set for (*, G) entries.
746
747
748       source_list SOURCE_LIST
749              optional list of source IP addresses of senders for this multi‐
750              cast group, separated by a ','.  Whether the entry forwards
751              packets from these senders or not is determined by the entry's
752              filter mode, which becomes a mandatory argument. Can only be set
753              for (*, G) entries.
754
755
756       proto PROTO
757              the routing protocol identifier of this mdb entry. Can be a num‐
758              ber or a string from the file /etc/iproute2/rt_protos. If the
759              routing protocol is not given, then static is assumed.
760
761      The next command line parameters apply only when the specified device
762      DEV is of type VXLAN.
763
764
765       dst IPADDR
766              the IP address of the destination VXLAN tunnel endpoint where
767              the multicast receivers reside.
768
769
770       dst_port DST_PORT
771              the UDP destination port number to use to connect to the remote
772              VXLAN tunnel endpoint. If omitted, the value specified at VXLAN
773              device creation will be used.
774
775
776       vni VNI
777              the VXLAN VNI Network Identifier to use to connect to the remote
778              VXLAN tunnel endpoint. If omitted, the value specified at VXLAN
779              device creation will be used or the source VNI when the VXLAN
780              device is in external mode.
781
782
783       src_vni SRC_VNI
784              the source VNI Network Identifier this entry belongs to. Used
785              only when the VXLAN device is in external mode. If omitted, the
786              value specified at VXLAN device creation will be used.
787
788
789       via DEV
790              device name of the outgoing interface for the VXLAN device to
791              reach the remote VXLAN tunnel endpoint.
792
793      The 0.0.0.0 and :: MDB entries are special catchall entries used to
794      flood IPv4 and IPv6 unregistered multicast packets, respectively. There‐
795      fore, when these entries are programmed, the catchall 00:00:00:00:00:00
796      FDB entry will only flood broadcast, unknown unicast and link-local mul‐
797      ticast.
798
799
800   bridge mdb delete - delete a multicast group database entry
801       This command removes an existing mdb entry.
802
803
804       The arguments are the same as with bridge mdb add.
805
806
807   bridge mdb replace - replace a multicast group database entry
808       If no matching entry is found, a new one will be created instead.
809
810
811       The arguments are the same as with bridge mdb add.
812
813
814   bridge mdb show - list multicast group database entries
815       This command displays the current multicast group membership table. The
816       table is populated by IGMP and MLD snooping in the bridge driver auto‐
817       matically. It can be altered by bridge mdb add and bridge mdb del com‐
818       mands manually too.
819
820
821       dev DEV
822              the interface only whose entries should be listed. Default is to
823              list all bridge interfaces.
824
825
826       With the -details option, the command becomes verbose. It prints out
827       the ports known to have a connected router.
828
829
830       With the -statistics option, the command displays timer values for mdb
831       and router port entries.
832
833

bridge vlan - VLAN filter list

835       vlan objects contain known VLAN IDs for a link.
836
837
838       The corresponding commands display vlan filter entries, add new en‐
839       tries, and delete old ones.
840
841
842   bridge vlan add - add a new vlan filter entry
843       This command creates a new vlan filter entry.
844
845
846       dev NAME
847              the interface with which this vlan is associated.
848
849
850       vid VID
851              the VLAN ID that identifies the vlan.
852
853
854       tunnel_info TUNNEL_ID
855              the TUNNEL ID that maps to this vlan. The tunnel id is set in
856              dst_metadata for every packet that belongs to this vlan (appli‐
857              cable to bridge ports with vlan_tunnel flag set).
858
859
860       pvid   the vlan specified is to be considered a PVID at ingress.  Any
861              untagged frames will be assigned to this VLAN.
862
863
864       untagged
865              the vlan specified is to be treated as untagged on egress.
866
867
868       self   the vlan is configured on the specified physical device. Re‐
869              quired if the device is the bridge device.
870
871
872       master the vlan is configured on the software bridge (default).
873
874
875   bridge vlan delete - delete a vlan filter entry
876       This command removes an existing vlan filter entry.
877
878
879       The arguments are the same as with bridge vlan add.  The pvid and un‐
880       tagged flags are ignored.
881
882
883   bridge vlan set - change vlan filter entry's options
884       This command changes vlan filter entry's options.
885
886
887       dev NAME
888              the interface with which this vlan is associated.
889
890
891       vid VID
892              the VLAN ID that identifies the vlan.
893
894
895       state STP_STATE
896              the operation state of the vlan. One may enter STP state name
897              (case insensitive), or one of the numbers below. Negative inputs
898              are ignored, and unrecognized names return an error. Note that
899              the state is set only for the vlan of the specified device, e.g.
900              if it is a bridge port then the state will be set only for the
901              vlan of the port.
902
903              0 - vlan is in STP DISABLED state. Make this vlan completely in‐
904              active for STP. This is also called BPDU filter and could be
905              used to disable STP on an untrusted vlan.
906
907
908              1 - vlan is in STP LISTENING state. Only valid if STP is enabled
909              on the bridge. In this state the vlan listens for STP BPDUs and
910              drops all other traffic frames.
911
912
913              2 - vlan is in STP LEARNING state. Only valid if STP is enabled
914              on the bridge. In this state the vlan will accept traffic only
915              for the purpose of updating MAC address tables.
916
917
918              3 - vlan is in STP FORWARDING state. This is the default vlan
919              state.
920
921
922              4 - vlan is in STP BLOCKING state. Only valid if STP is enabled
923              on the bridge. This state is used during the STP election
924              process. In this state, the vlan will only process STP BPDUs.
925
926
927
928       mcast_max_groups MAX_GROUPS
929              Sets the maximum number of MDB entries that can be registered
930              for a given VLAN on a given port. A VLAN-specific equivalent of
931              the per-port option of the same name, see above for details.
932
933              Note that this option is only available when ip link option
934              mcast_vlan_snooping is enabled.
935
936
937       mcast_router MULTICAST_ROUTER
938              configure this vlan and interface's multicast router mode, note
939              that only modes 0 - 2 are available for bridge devices.  A vlan
940              and interface with a multicast router will receive all multicast
941              traffic.  MULTICAST_ROUTER may be either
942
943              0 - to disable multicast router.
944
945
946              1 - to let the system detect the presence of routers (default).
947
948
949              2 - to permanently enable multicast traffic forwarding on this
950              vlan and interface.
951
952
953              3 - to temporarily mark this vlan and port as having a multicast
954              router, i.e.  enable multicast traffic forwarding. This mode is
955              available only for ports.
956
957
958
959       neigh_suppress on or neigh_suppress off
960              Controls whether neigh discovery (arp and nd) proxy and suppres‐
961              sion is enabled for a given VLAN on a given port. By default
962              this flag is off.
963
964              Note that this option only takes effect when bridge link option
965              neigh_vlan_suppress is enabled for a given port.
966
967
968   bridge vlan show - list vlan configuration.
969       This command displays the current VLAN filter table.
970
971
972       With the -details option, the command becomes verbose. It displays the
973       per-vlan options.
974
975
976       With the -statistics option, the command displays per-vlan traffic sta‐
977       tistics.
978
979
980   bridge vlan tunnelshow - list vlan tunnel mapping.
981       This command displays the current vlan tunnel info mapping.
982
983
984   bridge vlan global set - change vlan filter entry's global options
985       This command changes vlan filter entry's global options.
986
987
988       dev NAME
989              the interface with which this vlan is associated. Only bridge
990              devices are supported for global options.
991
992
993       vid VID
994              the VLAN ID that identifies the vlan.
995
996
997       mcast_snooping MULTICAST_SNOOPING
998              turn multicast snooping for VLAN entry with VLAN ID on (MULTI‐
999              CAST_SNOOPING > 0) or off (MULTICAST_SNOOPING == 0). Default is
1000              on.
1001
1002
1003       mcast_querier MULTICAST_QUERIER
1004              enable (MULTICAST_QUERIER > 0) or disable (MULTICAST_QUERIER ==
1005              0) IGMP/MLD querier, ie sending of multicast queries by the
1006              bridge. Default is disabled.
1007
1008
1009       mcast_igmp_version IGMP_VERSION
1010              set the IGMP version. Default is 2.
1011
1012
1013       mcast_mld_version MLD_VERSION
1014              set the MLD version. Default is 1.
1015
1016
1017       mcast_last_member_count LAST_MEMBER_COUNT
1018              set multicast last member count, ie the number of queries the
1019              bridge will send before stopping forwarding a multicast group
1020              after a "leave" message has been received. Default is 2.
1021
1022
1023       mcast_last_member_interval LAST_MEMBER_INTERVAL
1024              interval between queries to find remaining members of a group,
1025              after a "leave" message is received.
1026
1027
1028       mcast_startup_query_count STARTUP_QUERY_COUNT
1029              set the number of queries to send during startup phase. Default
1030              is 2.
1031
1032
1033       mcast_startup_query_interval STARTUP_QUERY_INTERVAL
1034              interval between queries in the startup phase.
1035
1036
1037       mcast_membership_interval MEMBERSHIP_INTERVAL
1038              delay after which the bridge will leave a group, if no member‐
1039              ship reports for this group are received.
1040
1041
1042       mcast_querier_interval QUERIER_INTERVAL
1043              interval between queries sent by other routers. If no queries
1044              are seen after this delay has passed, the bridge will start to
1045              send its own queries (as if mcast_querier was enabled).
1046
1047
1048       mcast_query_interval QUERY_INTERVAL
1049              interval between queries sent by the bridge after the end of the
1050              startup phase.
1051
1052
1053       mcast_query_response_interval QUERY_RESPONSE_INTERVAL
1054              set the Max Response Time/Maximum Response Delay for IGMP/MLD
1055              queries sent by the bridge.
1056
1057
1058   bridge vlan global show - list global vlan options.
1059       This command displays the global VLAN options for each VLAN entry.
1060
1061
1062       dev DEV
1063              the interface only whose VLAN global options should be listed.
1064              Default is to list all bridge interfaces.
1065
1066
1067       vid VID
1068              the VLAN ID only whose global options should be listed. Default
1069              is to list all vlans.
1070
1071

bridge vni - VNI filter list

1073       vni objects contain known VNI IDs for a dst metadata vxlan link.
1074
1075
1076       The corresponding commands display vni filter entries, add new entries,
1077       and delete old ones.
1078
1079
1080   bridge vni add - add a new vni filter entry
1081       This command creates a new vni filter entry.
1082
1083
1084       dev NAME
1085              the interface with which this vni is associated.
1086
1087
1088       vni VNI
1089              the VNI ID that identifies the vni.
1090
1091
1092       remote IPADDR
1093              specifies the unicast destination IP address to use in outgoing
1094              packets when the destination link layer address is not known in
1095              the VXLAN device forwarding database. This parameter cannot be
1096              specified with the group.
1097
1098
1099       group IPADDR
1100              specifies the multicast IP address to join for this VNI
1101
1102
1103   bridge vni del - delete a new vni filter entry
1104       This command removes an existing vni filter entry.
1105
1106
1107       The arguments are the same as with bridge vni add.
1108
1109
1110   bridge vni show - list vni filtering configuration.
1111       This command displays the current vni filter table.
1112
1113
1114       With the -statistics option, the command displays per-vni traffic sta‐
1115       tistics.
1116
1117
1118       dev NAME
1119              shows vni filtering table associated with the vxlan device
1120
1121

bridge monitor - state monitoring

1123       The bridge utility can monitor the state of devices and addresses con‐
1124       tinuously. This option has a slightly different format.  Namely, the
1125       monitor command is the first in the command line and then the object
1126       list follows:
1127
1128       bridge monitor [ all | OBJECT-LIST ]
1129
1130       OBJECT-LIST is the list of object types that we want to monitor.  It
1131       may contain link, fdb, vlan and mdb.  If no file argument is given,
1132       bridge opens RTNETLINK, listens on it and dumps state changes in the
1133       format described in previous sections.
1134
1135
1136       If a file name is given, it does not listen on RTNETLINK, but opens the
1137       file containing RTNETLINK messages saved in binary format and dumps
1138       them.
1139
1140

NOTES

1142       This command uses facilities added in Linux 3.0.
1143
1144       Although the forwarding table is maintained on a per-bridge device ba‐
1145       sis the bridge device is not part of the syntax. This is a limitation
1146       of the underlying netlink neighbour message protocol. When displaying
1147       the forwarding table, entries for all bridges are displayed.
1148       Add/delete/modify commands determine the underlying bridge device based
1149       on the bridge to which the corresponding ethernet device is attached.
1150
1151
1152

SEE ALSO

1154       ip(8)
1155

BUGS

1157       Please direct bugreports and patches to: <netdev@vger.kernel.org>
1158
1159

AUTHOR

1161       Original Manpage by Stephen Hemminger
1162
1163
1164
1165iproute2                         1 August 2012                       BRIDGE(8)
Impressum