diff options
Diffstat (limited to 'usr/src/man/man8/dladm.8')
| -rw-r--r-- | usr/src/man/man8/dladm.8 | 6184 |
1 files changed, 6184 insertions, 0 deletions
diff --git a/usr/src/man/man8/dladm.8 b/usr/src/man/man8/dladm.8 new file mode 100644 index 0000000000..694ff6fd9d --- /dev/null +++ b/usr/src/man/man8/dladm.8 @@ -0,0 +1,6184 @@ +.\" +.\" Sun Microsystems, Inc. gratefully acknowledges The Open Group for +.\" permission to reproduce portions of its copyrighted documentation. +.\" Original documentation from The Open Group can be obtained online at +.\" http://www.opengroup.org/bookstore/. +.\" +.\" The Institute of Electrical and Electronics Engineers and The Open +.\" Group, have given us permission to reprint portions of their +.\" documentation. +.\" +.\" In the following statement, the phrase ``this text'' refers to portions +.\" of the system documentation. +.\" +.\" Portions of this text are reprinted and reproduced in electronic form +.\" in the SunOS Reference Manual, from IEEE Std 1003.1, 2004 Edition, +.\" Standard for Information Technology -- Portable Operating System +.\" Interface (POSIX), The Open Group Base Specifications Issue 6, +.\" Copyright (C) 2001-2004 by the Institute of Electrical and Electronics +.\" Engineers, Inc and The Open Group. In the event of any discrepancy +.\" between these versions and the original IEEE and The Open Group +.\" Standard, the original IEEE and The Open Group Standard is the referee +.\" document. The original Standard can be obtained online at +.\" http://www.opengroup.org/unix/online.html. +.\" +.\" This notice shall appear on any product containing this material. +.\" +.\" The contents of this file are subject to the terms of the +.\" Common Development and Distribution License (the "License"). +.\" You may not use this file except in compliance with the License. +.\" +.\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE +.\" or http://www.opensolaris.org/os/licensing. +.\" See the License for the specific language governing permissions +.\" and limitations under the License. +.\" +.\" When distributing Covered Code, include this CDDL HEADER in each +.\" file and include the License file at usr/src/OPENSOLARIS.LICENSE. +.\" If applicable, add the following below this CDDL HEADER, with the +.\" fields enclosed by brackets "[]" replaced with your own identifying +.\" information: Portions Copyright [yyyy] [name of copyright owner] +.\" +.\" +.\" Copyright (c) 2008, Sun Microsystems, Inc. All Rights Reserved +.\" Copyright 2017 Joyent, Inc. +.\" Copyright 2020 RackTop Systems, Inc. +.\" Copyright 2021 OmniOS Community Edition (OmniOSce) Association. +.\" +.TH DLADM 8 "October 20, 2021" +.SH NAME +dladm \- administer data links +.SH SYNOPSIS +\fBdladm help\fR + +.LP +.nf +\fBdladm show-link\fR [\fB-P\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIlink\fR] +\fBdladm rename-link\fR [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] \fIlink\fR \fInew-link\fR +.fi + +.LP +.nf +\fBdladm delete-phys\fR \fIphys-link\fR +\fBdladm show-phys\fR [\fB-m\fR | \fB-H\fR | \fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIphys-link\fR] +.fi + +.LP +.nf +\fBdladm create-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-P\fR \fIpolicy\fR] [\fB-L\fR \fImode\fR] + [\fB-T\fR \fItime\fR] [\fB-u\fR \fIaddress\fR] \fB-l\fR \fIether-link1\fR [\fB-l\fR \fIether-link2\fR...] \fIaggr-link\fR +\fBdladm modify-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-P\fR \fIpolicy\fR] [\fB-L\fR \fImode\fR] + [\fB-T\fR \fItime\fR] [\fB-u\fR \fIaddress\fR] \fIaggr-link\fR +\fBdladm delete-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fIaggr-link\fR +\fBdladm add-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIether-link1\fR [\fB-l\fR \fIether-link2\fR...] + \fIaggr-link\fR +\fBdladm remove-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIether-link1\fR [\fB-l\fR \fIether-link2\fR...] + \fIaggr-link\fR +\fBdladm show-aggr\fR [\fB-PLx\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] + [\fIaggr-link\fR] +.fi + +.LP +.nf +\fBdladm create-bridge\fR [\fB-P\fR \fIprotect\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-p\fR \fIpriority\fR] + [\fB-m\fR \fImax-age\fR] [\fB-h\fR \fIhello-time\fR] [\fB-d\fR \fIforward-delay\fR] [\fB-f\fR \fIforce-protocol\fR] + [\fB-l\fR \fIlink\fR...] \fIbridge-name\fR +.fi + +.LP +.nf +\fBdladm modify-bridge\fR [\fB-P\fR \fIprotect\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-p\fR \fIpriority\fR] + [\fB-m\fR \fImax-age\fR] [\fB-h\fR \fIhello-time\fR] [\fB-d\fR \fIforward-delay\fR] [\fB-f\fR \fIforce-protocol\fR] + \fIbridge-name\fR +.fi + +.LP +.nf +\fBdladm delete-bridge\fR [\fB-R\fR \fIroot-dir\fR] \fIbridge-name\fR +.fi + +.LP +.nf +\fBdladm add-bridge\fR [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIlink\fR [\fB-l\fR \fIlink\fR...]\fIbridge-name\fR +.fi + +.LP +.nf +\fBdladm remove-bridge\fR [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIlink\fR [\fB-l\fR \fIlink\fR...] \fIbridge-name\fR +.fi + +.LP +.nf +\fBdladm show-bridge\fR [\fB-flt\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] [[\fB-p\fR] \fB-o\fR \fIfield\fR,...] + [\fIbridge-name\fR] +.fi + +.LP +.nf +\fBdladm create-vlan\fR [\fB-ft\fR] [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIether-link\fR \fB-v\fR \fIvid\fR [\fIvlan-link\fR] +\fBdladm delete-vlan\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fIvlan-link\fR +\fBdladm show-vlan\fR [\fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIvlan-link\fR] +.fi + +.LP +.nf +\fBdladm scan-wifi\fR [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIwifi-link\fR] +\fBdladm connect-wifi\fR [\fB-e\fR \fIessid\fR] [\fB-i\fR \fIbssid\fR] [\fB-k\fR \fIkey\fR,...] + [\fB-s\fR none | wep | wpa ] [\fB-a\fR open | shared] [\fB-b\fR bss | ibss] [\fB-c\fR] + [\fB-m\fR a | b | g] [\fB-T\fR \fItime\fR] [\fIwifi-link\fR] +\fBdladm disconnect-wifi\fR [\fB-a\fR] [\fIwifi-link\fR] +\fBdladm show-wifi\fR [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIwifi-link\fR] +.fi + +.LP +.nf +\fBdladm show-ether\fR [\fB-x\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIether-link\fR] +.fi + +.LP +.nf +\fBdladm set-linkprop\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] \fB-p\fR \fIprop\fR=\fIvalue\fR[,...] + \fIlink\fR +\fBdladm reset-linkprop\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] [\fB-p\fR \fIprop\fR[,...]] \fIlink\fR +\fBdladm show-linkprop\fR [\fB-P\fR] [\fB-z\fR \fIzonename\fR] [[\fB-c\fR] \fB-o\fR \fIfield\fR[,...]] + [\fB-p\fR \fIprop\fR[,...]] [\fIlink\fR] +.fi + +.LP +.nf +\fBdladm create-secobj\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-f\fR \fIfile\fR] \fB-c\fR \fIclass\fR \fIsecobj\fR +\fBdladm delete-secobj\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fIsecobj\fR[,...] +\fBdladm show-secobj\fR [\fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIsecobj\fR,...] +.fi + +.LP +.nf +\fBdladm create-vnic\fR [\fB-t\fR] \fB-l\fR \fIlink\fR [\fB-R\fR \fIroot-dir\fR] [\fB-m\fR \fIvalue\fR | auto | + {factory \fB-n\fR \fIslot-identifier\fR]} | {random [\fB-r\fR \fIprefix\fR]}] + [\fB-v\fR \fIvlan-id\fR] [\fB-p\fR \fIprop\fR=\fIvalue\fR[,...]] \fIvnic-link\fR +\fBdladm delete-vnic\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] \fIvnic-link\fR +\fBdladm show-vnic\fR [\fB-pP\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] [\fB-o\fR \fIfield\fR[,...]] + [\fB-l\fR \fIlink\fR] [\fB-z\fR \fIzonename\fR] [\fIvnic-link\fR] +.fi + +.LP +.nf +\fBdladm create-etherstub\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fIetherstub\fR +\fBdladm delete-etherstub\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fIetherstub\fR +\fBdladm show-etherstub\fR [\fIetherstub\fR] +.fi + +.LP +.nf +\fBdladm create-iptun\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fB-T\fR \fItype\fR + [-a {local|remote}=<addr>[,...]] \fIiptun-link\fR +\fBdladm modify-iptun\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [-a {local|remote}=<addr>[,...]] + \fIiptun-link\fR +\fBdladm delete-iptun\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fIiptun-link\fR +\fBdladm show-iptun\fR [\fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIiptun-link\fR] +.fi + +.LP +.nf +\fBdladm create-overlay\fR [\fB-t\fR] \fB-e\fR \fIencap\fR \fB-s\fR \fIsearch\fR \fB-v\fR \fIvnetid\fR [\fB-p\fR \fIprop\fR=\fIvalue\fR[,...]] \fIoverlay\fR +\fBdladm delete-overlay\fR \fIoverlay\fR +\fBdladm modify-overlay\fR \fB-d\fR \fImac\fR | \fB-f\fR | \fB-s\fR \fImac=ip:port\fR \fIoverlay\fR +\fBdladm show-overlay\fR [ \fB-f\fR | \fB-t\fR ] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIoverlay\fR] +.fi + +.LP +.nf +\fBdladm show-usage\fR [\fB-a\fR] \fB-f\fR \fIfilename\fR [\fB-p\fR \fIplotfile\fR \fB-F\fR \fIformat\fR] [\fB-s\fR \fItime\fR] + [\fB-e\fR \fItime\fR] [\fIlink\fR] +.fi + +.SH DESCRIPTION +The \fBdladm\fR command is used to administer data-links. A data-link is +represented in the system as a \fBSTREAMS DLPI\fR (v2) interface which can be +plumbed under protocol stacks such as \fBTCP/IP\fR. Each data-link relies on +either a single network device or an aggregation of devices to send packets to +or receive packets from a network. +.sp +.LP +Each \fBdladm\fR subcommand operates on one of the following objects: +.sp +.ne 2 +.na +\fB\fBlink\fR\fR +.ad +.sp .6 +.RS 4n +A datalink, identified by a name. In general, the name can use any alphanumeric +characters (or the underscore, \fB_\fR), but must start with an alphabetic +character and end with a number. A datalink name can be at most 31 characters, +and the ending number must be between 0 and 4294967294 (inclusive). The ending +number must not begin with a zero. Datalink names between 3 and 8 characters +are recommended. +.sp +Some subcommands operate only on certain types or classes of datalinks. For +those cases, the following object names are used: +.sp +.ne 2 +.na +\fB\fBphys-link\fR\fR +.ad +.sp .6 +.RS 4n +A physical datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBvlan-link\fR\fR +.ad +.sp .6 +.RS 4n +A VLAN datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBaggr-link\fR\fR +.ad +.sp .6 +.RS 4n +An aggregation datalink (or a key; see NOTES). +.RE + +.sp +.ne 2 +.na +\fB\fBether-link\fR\fR +.ad +.sp .6 +.RS 4n +A physical Ethernet datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBwifi-link\fR\fR +.ad +.sp .6 +.RS 4n +A WiFi datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBvnic-link\fR\fR +.ad +.sp .6 +.RS 4n +A virtual network interface created on a link, an \fBetherstub\fR, or \fBan +overlay\fR. It is a pseudo device that can be treated as if it were an network +interface card on a machine. +.RE + +.sp +.ne 2 +.na +\fB\fBiptun-link\fR\fR +.ad +.sp .6 +.RS 4n +An IP tunnel link. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdev\fR\fR +.ad +.sp .6 +.RS 4n +A network device, identified by concatenation of a driver name and an instance +number. +.RE + +.sp +.ne 2 +.na +\fB\fBetherstub\fR\fR +.ad +.sp .6 +.RS 4n +An Ethernet stub can be used instead of a physical NIC to create VNICs. VNICs +created on an \fBetherstub\fR will appear to be connected through a virtual +switch, allowing complete virtual networks to be built without physical +hardware. +.RE + +.sp +.ne 2 +.na +\fB\fBbridge\fR\fR +.ad +.sp .6 +.RS 4n +A bridge instance, identified by an administratively-chosen name. The name may +use any alphanumeric characters or the underscore, \fB_\fR, but must start and +end with an alphabetic character. A bridge name can be at most 31 characters. +The name \fBdefault\fR is reserved, as are all names starting with \fBSUNW\fR. +.sp +Note that appending a zero (\fB0\fR) to a bridge name produces a valid link +name, used for observability. +.RE + +.sp +.ne 2 +.na +\fB\fBsecobj\fR\fR +.ad +.sp .6 +.RS 4n +A secure object, identified by an administratively-chosen name. The name can +use any alphanumeric characters, as well as underscore (\fB_\fR), period +(\fB\&.\fR), and hyphen (\fB-\fR). A secure object name can be at most 32 +characters. +.RE + +.sp +.ne 2 +.na +.B overlay +.ad +.sp .6 +.RS 4n +An overlay instance, identified by an administratively-chosen name. An overlay +can be used to create or join an existing software defined network. +VNICs created on an overlay will appear to be connected by a local virtual +switch and will also be connected to interfaces on matching overlays provided by +other hosts. For more information on overlay devices, see \fBoverlay\fR(5). +.RE + +.SS "Options" +Each \fBdladm\fR subcommand has its own set of options. However, many of the +subcommands have the following as a common option: +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +Specifies an alternate root directory where the operation-such as creation, +deletion, or renaming-should apply. +.RE + +.SS "SUBCOMMANDS" +When invoked with no arguments, +\fBdladm\fR +shows the link configuration information, in the same way as +\fBdladm show-link\fR. +.sp +The following subcommands are supported: +.sp +.ne 2 +.na +\fBdladm help\fR +.ad +.sp .6 +.RS 4n +Display brief command usage. +.RE +.sp +.ne 2 +.na +\fB\fBdladm show-link\fR [\fB-P\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] +[[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]][\fIlink\fR]\fR +.ad +.sp .6 +.RS 4n +Show link configuration information (the default) or statistics, either for all +datalinks or for the specified link \fIlink\fR. By default, the system is +configured with one datalink for each known network device. +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. When not +modified by the \fB-s\fR option (described below), the field name must be one +of the fields listed below, or the special value \fBall\fR to display all +fields. By default (without \fB-o\fR), \fBshow-link\fR displays all fields. +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBCLASS\fR\fR +.ad +.sp .6 +.RS 4n +The class of the datalink. \fBdladm\fR distinguishes between the following +classes: +.sp +.ne 2 +.na +\fB\fBphys\fR\fR +.ad +.sp .6 +.RS 4n +A physical datalink. The \fBshow-phys\fR subcommand displays more detail for +this class of datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBaggr\fR\fR +.ad +.sp .6 +.RS 4n +An IEEE 802.3ad link aggregation. The \fBshow-aggr\fR subcommand displays more +detail for this class of datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBvlan\fR\fR +.ad +.sp .6 +.RS 4n +A VLAN datalink. The \fBshow-vlan\fR subcommand displays more detail for this +class of datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBvnic\fR\fR +.ad +.sp .6 +.RS 4n +A virtual network interface. The \fBshow-vnic\fR subcommand displays more +detail for this class of datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBoverlay\fR\fR +.ad +.sp .6 +.RS 4n +A virtual device that is used to create or join a software defined +network. The \fBshow-overlay\fR subcommand displays more detail for this +class of datalink. +.RE + + +.RE + +.sp +.ne 2 +.na +\fB\fBMTU\fR\fR +.ad +.sp .6 +.RS 4n +The maximum transmission unit size for the datalink being displayed. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATE\fR\fR +.ad +.sp .6 +.RS 4n +The link state of the datalink. The state can be \fBup\fR, \fBdown\fR, or +\fBunknown\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBBRIDGE\fR\fR +.ad +.sp .6 +.RS 4n +The name of the bridge to which this link is assigned, if any. +.RE + +.sp +.ne 2 +.na +\fB\fBOVER\fR\fR +.ad +.sp .6 +.RS 4n +The physical datalink(s) over which the datalink is operating. This applies to +\fBaggr\fR, \fBbridge\fR, and \fBvlan\fR classes of datalinks. A VLAN is +created over a single physical datalink, a bridge has multiple attached links, +and an aggregation is comprised of one or more physical datalinks. +.RE + +When the \fB-o\fR option is used in conjunction with the \fB-s\fR option, used +to display link statistics, the field name must be one of the fields listed +below, or the special value \fBall\fR to display all fields +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBIPACKETS\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets received on this link. +.RE + +.sp +.ne 2 +.na +\fB\fBRBYTES\fR\fR +.ad +.sp .6 +.RS 4n +Number of bytes received on this link. +.RE + +.sp +.ne 2 +.na +\fB\fBIERRORS\fR\fR +.ad +.sp .6 +.RS 4n +Number of input errors. +.RE + +.sp +.ne 2 +.na +\fB\fBOPACKETS\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets sent on this link. +.RE + +.sp +.ne 2 +.na +\fB\fBOBYTES\fR\fR +.ad +.sp .6 +.RS 4n +Number of bytes sent on this link. +.RE + +.sp +.ne 2 +.na +\fB\fBOERRORS\fR\fR +.ad +.sp .6 +.RS 4n +Number of output errors. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display the persistent link configuration. +.RE + +.sp +.ne 2 +.na +\fB\fB-s\fR, \fB--statistics\fR\fR +.ad +.sp .6 +.RS 4n +Display link statistics. +.RE + +.sp +.ne 2 +.na +\fB\fB-i\fR \fIinterval\fR, \fB--interval\fR=\fIinterval\fR\fR +.ad +.sp .6 +.RS 4n +Used with the \fB-s\fR option to specify an interval, in seconds, at which +statistics should be displayed. If this option is not specified, statistics +will be displayed only once. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm rename-link\fR [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] \fIlink\fR \fInew-link\fR\fR +.ad +.sp .6 +.RS 4n +Rename \fIlink\fR to \fInew-link\fR. This is used to give a link a meaningful +name, or to associate existing link configuration such as link properties of a +removed device with a new device. See the \fBEXAMPLES\fR section for specific +examples of how this subcommand is used. +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-z\fR \fIzonename\fR +.ad +.sp .6 +.RS 4n +A link assigned to a zone can only be renamed while the zone is in the ready state. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-phys\fR \fIphys-link\fR\fR +.ad +.sp .6 +.RS 4n +This command is used to delete the persistent configuration of a link +associated with physical hardware which has been removed from the system. See +the \fBEXAMPLES\fR section. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-phys\fR [\fB-m\fR | \fB-H\fR | \fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] +[\fIphys-link\fR]\fR +.ad +.sp .6 +.RS 4n +Show the physical device and attributes of all physical links, or of the named +physical link. Without \fB-P\fR, only physical links that are available on the +running system are displayed. +.sp +.ne 2 +.na +\fB\fB-H\fR\fR +.ad +.sp .6 +.RS 4n +Show hardware resource usage, as returned by the NIC driver. Output from +\fB-H\fR displays the following elements: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +A physical device corresponding to a NIC driver. +.RE + +.sp +.ne 2 +.na +\fB\fBGROUP\fR\fR +.ad +.sp .6 +.RS 4n +A collection of rings. +.RE + +.sp +.ne 2 +.na +\fB\fBGROUPTYPE\fR\fR +.ad +.sp .6 +.RS 4n +RX or TX. All rings in a group are of the same group type. +.RE + +.sp +.ne 2 +.na +\fB\fBRINGS\fR\fR +.ad +.sp .6 +.RS 4n +A hardware resource used by a data link, subject to assignment by a driver to +different groups. +.RE + +.sp +.ne 2 +.na +\fB\fBCLIENTS\fR\fR +.ad +.sp .6 +.RS 4n +MAC clients that are using the rings within a group. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-m\fR\fR +.ad +.sp .6 +.RS 4n +Show MAC addresses and related information. Output from \fB-m\fR +displays the following elements: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +A physical device corresponding to a NIC driver. +.RE +.sp +.ne 2 +.na +\fB\fBSLOT\fR\fR +.ad +.sp .6 +.RS 4n +When a given physical device has multiple factory MAC addresses, this +indicates the slot of the corresponding MAC address which can be used as +part of a call to \fBcreate-vnic\fR. +.RE +.sp +.ne 2 +.na +\fB\fBADDRESS\fR\fR +.ad +.sp .6 +.RS 4n +Displays the MAC address of the device. +.RE +.sp +.ne 2 +.na +\fB\fBINUSE\fR\fR +.ad +.sp .6 +.RS 4n +Displays whether or not a MAC Address is actively being used. +.RE +.sp +.ne 2 +.na +\fB\fBCLIENT\fR\fR +.ad +.sp .6 +.RS 4n +MAC clients that are using the address. +.RE +.RE +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR, \fB--output\fR=\fIfield\fR\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR, to +display all fields. Note that if either \fB-H\fR or \fB-m\fR are specified, then +the valid options are those described in their respective sections. For each +link, the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBMEDIA\fR\fR +.ad +.sp .6 +.RS 4n +The media type provided by the physical datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATE\fR\fR +.ad +.sp .6 +.RS 4n +The state of the link. This can be \fBup\fR, \fBdown\fR, or \fBunknown\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBSPEED\fR\fR +.ad +.sp .6 +.RS 4n +The current speed of the link, in megabits per second. +.RE + +.sp +.ne 2 +.na +\fB\fBDUPLEX\fR\fR +.ad +.sp .6 +.RS 4n +For Ethernet links, the full/half duplex status of the link is displayed if the +link state is \fBup\fR. The duplex is displayed as \fBunknown\fR in all other +cases. +.RE + +.sp +.ne 2 +.na +\fB\fBDEVICE\fR\fR +.ad +.sp .6 +.RS 4n +The name of the physical device under this link. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +This option displays persistent configuration for all links, including those +that have been removed from the system. The output provides a \fBFLAGS\fR +column in which the \fBr\fR flag indicates that the physical device associated +with a physical link has been removed. For such links, \fBdelete-phys\fR can be +used to purge the link's configuration from the system. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm create-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-P\fR +\fIpolicy\fR] [\fB-L\fR \fImode\fR] [\fB-T\fR \fItime\fR] [\fB-u\fR +\fIaddress\fR] \fB-l\fR \fIether-link1\fR [\fB-l\fR \fIether-link2\fR...] +\fIaggr-link\fR\fR +.ad +.sp .6 +.RS 4n +Combine a set of links into a single IEEE 802.3ad link aggregation named +\fIaggr-link\fR. The use of an integer \fIkey\fR to generate a link name for +the aggregation is also supported for backward compatibility. Many of the +\fB*\fR\fB-aggr\fR subcommands below also support the use of a \fIkey\fR to +refer to a given aggregation, but use of the aggregation link name is +preferred. See the \fBNOTES\fR section for more information on keys. +.sp +\fBdladm\fR supports a number of port selection policies for an aggregation of +ports. (See the description of the \fB-P\fR option, below.) If you do not +specify a policy, \fBcreate-aggr\fR uses the default, the L4 policy, described +under the \fB-P\fR option. +.sp +.ne 2 +.na +\fB\fB-l\fR \fIether-link\fR, \fB--link\fR=\fIether-link\fR\fR +.ad +.sp .6 +.RS 4n +Each Ethernet link (or port) in the aggregation is specified using an \fB-l\fR +option followed by the name of the link to be included in the aggregation. +Multiple links are included in the aggregation by specifying multiple \fB-l\fR +options. For backward compatibility with previous versions of Solaris, the +\fBdladm\fR command also supports the using the \fB-d\fR option (or +\fB--dev\fR) with a device name to specify links by their underlying device +name. The other \fB*\fR\fB-aggr\fR subcommands that take \fB-l\fR options also +accept \fB-d\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the aggregation is temporary. Temporary aggregations last until +the next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR \fIpolicy\fR, \fB--policy\fR=\fIpolicy\fR\fR +.ad +.br +.na +\fB\fR +.ad +.sp .6 +.RS 4n +Specifies the port selection policy to use for load spreading of outbound +traffic. The policy specifies which \fIdev\fR object is used to send packets. A +policy is a list of one or more layers specifiers separated by commas. A layer +specifier is one of the following: +.sp +.ne 2 +.na +\fB\fBL2\fR\fR +.ad +.sp .6 +.RS 4n +Select outbound device according to source and destination \fBMAC\fR addresses +of the packet. +.RE + +.sp +.ne 2 +.na +\fB\fBL3\fR\fR +.ad +.sp .6 +.RS 4n +Select outbound device according to source and destination \fBIP\fR addresses +of the packet. +.RE + +.sp +.ne 2 +.na +\fB\fBL4\fR\fR +.ad +.sp .6 +.RS 4n +Select outbound device according to the upper layer protocol information +contained in the packet. For \fBTCP\fR and \fBUDP\fR, this includes source and +destination ports. For IPsec, this includes the \fBSPI\fR (Security Parameters +Index). +.RE + +For example, to use upper layer protocol information, the following policy can +be used: +.sp +.in +2 +.nf +-P L4 +.fi +.in -2 +.sp + +Note that policy L4 is the default. +.sp +To use the source and destination \fBMAC\fR addresses as well as the source and +destination \fBIP\fR addresses, the following policy can be used: +.sp +.in +2 +.nf +-P L2,L3 +.fi +.in -2 +.sp + +.RE + +.sp +.ne 2 +.na +\fB\fB-L\fR \fImode\fR, \fB--lacp-mode\fR=\fImode\fR\fR +.ad +.sp .6 +.RS 4n +Specifies whether \fBLACP\fR should be used and, if used, the mode in which it +should operate. Supported values are \fBoff\fR, \fBactive\fR or \fBpassive\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-T\fR \fItime\fR, \fB--lacp-timer\fR=\fItime\fR\fR +.ad +.br +.na +\fB\fR +.ad +.sp .6 +.RS 4n +Specifies the \fBLACP\fR timer value. The supported values are \fBshort\fR or +\fBlong\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-u\fR \fIaddress\fR, \fB--unicast\fR=\fIaddress\fR\fR +.ad +.sp .6 +.RS 4n +Specifies a fixed unicast hardware address to be used for the aggregation. If +this option is not specified, then an address is automatically chosen from the +set of addresses of the component devices. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm modify-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-P\fR +\fIpolicy\fR] [\fB-L\fR \fImode\fR] [\fB-T\fR \fItime\fR] [\fB-u\fR +\fIaddress\fR] \fIaggr-link\fR\fR +.ad +.sp .6 +.RS 4n +Modify the parameters of the specified aggregation. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the modification is temporary. Temporary aggregations last until +the next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR \fIpolicy\fR, \fB--policy\fR=\fIpolicy\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the port selection policy to use for load spreading of outbound +traffic. See \fBdladm create-aggr\fR for a description of valid policy values. +.RE + +.sp +.ne 2 +.na +\fB\fB-L\fR \fImode\fR, \fB--lacp-mode\fR=\fImode\fR\fR +.ad +.sp .6 +.RS 4n +Specifies whether \fBLACP\fR should be used and, if used, the mode in which it +should operate. Supported values are \fBoff\fR, \fBactive\fR, or \fBpassive\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-T\fR \fItime\fR, \fB--lacp-timer\fR=\fItime\fR\fR +.ad +.br +.na +\fB\fR +.ad +.sp .6 +.RS 4n +Specifies the \fBLACP\fR timer value. The supported values are \fBshort\fR or +\fBlong\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-u\fR \fIaddress\fR, \fB--unicast\fR=\fIaddress\fR\fR +.ad +.sp .6 +.RS 4n +Specifies a fixed unicast hardware address to be used for the aggregation. If +this option is not specified, then an address is automatically chosen from the +set of addresses of the component devices. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +\fIaggr-link\fR\fR +.ad +.sp .6 +.RS 4n +Deletes the specified aggregation. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the deletion is temporary. Temporary deletions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm add-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fB-l\fR +\fIether-link1\fR [\fB--link\fR=\fIether-link2\fR...] \fIaggr-link\fR\fR +.ad +.sp .6 +.RS 4n +Adds links to the specified aggregation. +.sp +.ne 2 +.na +\fB\fB-l\fR \fIether-link\fR, \fB--link\fR=\fIether-link\fR\fR +.ad +.sp .6 +.RS 4n +Specifies an Ethernet link to add to the aggregation. Multiple links can be +added by supplying multiple \fB-l\fR options. +.RE + +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the additions are temporary. Temporary additions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm remove-aggr\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fB-l\fR +\fIether-link1\fR [\fB--l\fR=\fIether-link2\fR...] \fIaggr-link\fR\fR +.ad +.sp .6 +.RS 4n +Removes links from the specified aggregation. +.sp +.ne 2 +.na +\fB\fB-l\fR \fIether-link\fR, \fB--link\fR=\fIether-link\fR\fR +.ad +.sp .6 +.RS 4n +Specifies an Ethernet link to remove from the aggregation. Multiple links can +be added by supplying multiple \fB-l\fR options. +.RE + +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the removals are temporary. Temporary removal last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-aggr\fR [\fB-PLx\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] +[[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIaggr-link\fR]\fR +.ad +.sp .6 +.RS 4n +Show aggregation configuration (the default), \fBLACP\fR information, or +statistics, either for all aggregations or for the specified aggregation. +.sp +By default (with no options), the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the aggregation link. +.RE + +.sp +.ne 2 +.na +\fB\fBPOLICY\fR\fR +.ad +.sp .6 +.RS 4n +The LACP policy of the aggregation. See the \fBcreate-aggr\fR \fB-P\fR option +for a description of the possible values. +.RE + +.sp +.ne 2 +.na +\fB\fBADDRPOLICY\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBauto\fR, if the aggregation is configured to automatically configure +its unicast MAC address (the default if the \fB-u\fR option was not used to +create or modify the aggregation), or \fBfixed\fR, if \fB-u\fR was used to set +a fixed MAC address. +.RE + +.sp +.ne 2 +.na +\fB\fBLACPACTIVITY\fR\fR +.ad +.sp .6 +.RS 4n +The LACP mode of the aggregation. Possible values are \fBoff\fR, \fBactive\fR, +or \fBpassive\fR, as set by the \fB-l\fR option to \fBcreate-aggr\fR or +\fBmodify-aggr\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBLACPTIMER\fR\fR +.ad +.sp .6 +.RS 4n +The LACP timer value of the aggregation as set by the \fB-T\fR option of +\fBcreate-aggr\fR or \fBmodify-aggr\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBFLAGS\fR\fR +.ad +.sp .6 +.RS 4n +A set of state flags associated with the aggregation. The only possible flag is +\fBf\fR, which is displayed if the administrator forced the creation the +aggregation using the \fB-f\fR option to \fBcreate-aggr\fR. Other flags might +be defined in the future. +.RE + +The \fBshow-aggr\fR command accepts the following options: +.sp +.ne 2 +.na +\fB\fB-L\fR, \fB--lacp\fR\fR +.ad +.sp .6 +.RS 4n +Displays detailed \fBLACP\fR information for the aggregation link and each +underlying port. Most of the state information displayed by this option is +defined by IEEE 802.3. With this option, the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the aggregation link. +.RE + +.sp +.ne 2 +.na +\fB\fBPORT\fR\fR +.ad +.sp .6 +.RS 4n +The name of one of the underlying aggregation ports. +.RE + +.sp +.ne 2 +.na +\fB\fBAGGREGATABLE\fR\fR +.ad +.sp .6 +.RS 4n +Whether the port can be added to the aggregation. +.RE + +.sp +.ne 2 +.na +\fB\fBSYNC\fR\fR +.ad +.sp .6 +.RS 4n +If \fByes\fR, the system considers the port to be synchronized and part of the +aggregation. +.RE + +.sp +.ne 2 +.na +\fB\fBCOLL\fR\fR +.ad +.sp .6 +.RS 4n +If \fByes\fR, collection of incoming frames is enabled on the associated port. +.RE + +.sp +.ne 2 +.na +\fB\fBDIST\fR\fR +.ad +.sp .6 +.RS 4n +If \fByes\fR, distribution of outgoing frames is enabled on the associated +port. +.RE + +.sp +.ne 2 +.na +\fB\fBDEFAULTED\fR\fR +.ad +.sp .6 +.RS 4n +If \fByes\fR, the port is using defaulted partner information (that is, has not +received LACP data from the LACP partner). +.RE + +.sp +.ne 2 +.na +\fB\fBEXPIRED\fR\fR +.ad +.sp .6 +.RS 4n +If \fByes\fR, the receive state of the port is in the \fBEXPIRED\fR state. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-x\fR, \fB--extended\fR\fR +.ad +.sp .6 +.RS 4n +Display additional aggregation information including detailed information on +each underlying port. With \fB-x\fR, the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the aggregation link. +.RE + +.sp +.ne 2 +.na +\fB\fBPORT\fR\fR +.ad +.sp .6 +.RS 4n +The name of one of the underlying aggregation ports. +.RE + +.sp +.ne 2 +.na +\fB\fBSPEED\fR\fR +.ad +.sp .6 +.RS 4n +The speed of the link or port in megabits per second. +.RE + +.sp +.ne 2 +.na +\fB\fBDUPLEX\fR\fR +.ad +.sp .6 +.RS 4n +The full/half duplex status of the link or port is displayed if the link state +is \fBup\fR. The duplex status is displayed as \fBunknown\fR in all other +cases. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATE\fR\fR +.ad +.sp .6 +.RS 4n +The link state. This can be \fBup\fR, \fBdown\fR, or \fBunknown\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBADDRESS\fR\fR +.ad +.sp .6 +.RS 4n +The MAC address of the link or port. +.RE + +.sp +.ne 2 +.na +\fB\fBPORTSTATE\fR\fR +.ad +.sp .6 +.RS 4n +This indicates whether the individual aggregation port is in the \fBstandby\fR +or \fBattached\fR state. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed above, or the special value \fBall\fR, to +display all fields. The fields applicable to the \fB-o\fR option are limited to +those listed under each output mode. For example, if using \fB-L\fR, only the +fields listed under \fB-L\fR, above, can be used with \fB-o\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display the persistent aggregation configuration rather than the state of the +running system. +.RE + +.sp +.ne 2 +.na +\fB\fB-s\fR, \fB--statistics\fR\fR +.ad +.sp .6 +.RS 4n +Displays aggregation statistics. +.RE + +.sp +.ne 2 +.na +\fB\fB-i\fR \fIinterval\fR, \fB--interval\fR=\fIinterval\fR\fR +.ad +.sp .6 +.RS 4n +Used with the \fB-s\fR option to specify an interval, in seconds, at which +statistics should be displayed. If this option is not specified, statistics +will be displayed only once. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm create-bridge\fR [ \fB-P\fR \fIprotect\fR] [\fB-R\fR +\fIroot-dir\fR] [ \fB-p\fR \fIpriority\fR] [ \fB-m\fR \fImax-age\fR] [ \fB-h\fR +\fIhello-time\fR] [ \fB-d\fR \fIforward-delay\fR] [ \fB-f\fR +\fIforce-protocol\fR] [\fB-l\fR \fIlink\fR...] \fIbridge-name\fR\fR +.ad +.sp .6 +.RS 4n +Create an 802.1D bridge instance and optionally assign one or more network +links to the new bridge. By default, no bridge instances are present on the +system. +.sp +In order to bridge between links, you must create at least one bridge instance. +Each bridge instance is separate, and there is no forwarding connection between +bridges. +.sp +.ne 2 +.na +\fB\fB-P\fR \fIprotect\fR, \fB--protect\fR=\fIprotect\fR\fR +.ad +.sp .6 +.RS 4n +Specifies a protection method. The defined protection methods are \fBstp\fR for +the Spanning Tree Protocol and trill for \fBTRILL\fR, which is used on +RBridges. The default value is \fBstp\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIpriority\fR, \fB--priority\fR=\fIpriority\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the Bridge Priority. This sets the IEEE STP priority value for +determining the root bridge node in the network. The default value is +\fB32768\fR. Valid values are \fB0\fR (highest priority) to \fB61440\fR (lowest +priority), in increments of 4096. +.sp +If a value not evenly divisible by 4096 is used, the system silently rounds +downward to the next lower value that is divisible by 4096. +.RE + +.sp +.ne 2 +.na +\fB\fB-m\fR \fImax-age\fR, \fB--max-age\fR=\fImax-age\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the maximum age for configuration information in seconds. This sets +the STP Bridge Max Age parameter. This value is used for all nodes in the +network if this node is the root bridge. Bridge link information older than +this time is discarded. It defaults to 20 seconds. Valid values are from 6 to +40 seconds. See the \fB-d\fR \fIforward-delay\fR parameter for additional +constraints. +.RE + +.sp +.ne 2 +.na +\fB\fB-h\fR \fIhello-time\fR, \fB--hello-time\fR=\fIhello-time\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the STP Bridge Hello Time parameter. When this node is the root node, +it sends Configuration BPDUs at this interval throughout the network. The +default value is 2 seconds. Valid values are from 1 to 10 seconds. See the +\fB-d\fR \fIforward-delay\fR parameter for additional constraints. +.RE + +.sp +.ne 2 +.na +\fB\fB-d\fR \fIforward-delay\fR, \fB--forward-delay\fR=\fIforward-delay\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the STP Bridge Forward Delay parameter. When this node is the root +node, then all bridges in the network use this timer to sequence the link +states when a port is enabled. The default value is 15 seconds. Valid values +are from 4 to 30 seconds. +.sp +Bridges must obey the following two constraints: +.sp +.in +2 +.nf +2 * (\fIforward-delay\fR - 1.0) >= \fImax-age\fR + +\fImax-age\fR >= 2 * (\fIhello-time\fR + 1.0) +.fi +.in -2 +.sp + +Any parameter setting that would violate those constraints is treated as an +error and causes the command to fail with a diagnostic message. The message +provides valid alternatives to the supplied values. +.RE + +.sp +.ne 2 +.na +\fB\fB-f\fR \fIforce-protocol\fR, +\fB--force-protocol\fR=\fIforce-protocol\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the MSTP forced maximum supported protocol. The default value is 3. +Valid values are non-negative integers. The current implementation does not +support RSTP or MSTP, so this currently has no effect. However, to prevent MSTP +from being used in the future, the parameter may be set to \fB0\fR for STP only +or \fB2\fR for STP and RSTP. +.RE + +.sp +.ne 2 +.na +\fB\fB-l\fR \fIlink\fR, \fB--link\fR=\fIlink\fR\fR +.ad +.sp .6 +.RS 4n +Specifies one or more links to add to the newly-created bridge. This is similar +to creating the bridge and then adding one or more links, as with the +\fBadd-bridge\fR subcommand. However, if any of the links cannot be added, the +entire command fails, and the new bridge itself is not created. To add multiple +links on the same command line, repeat this option for each link. You are +permitted to create bridges without links. For more information about link +assignments, see the \fBadd-bridge\fR subcommand. +.RE + +Bridge creation and link assignment require the \fBPRIV_SYS_DL_CONFIG\fR +privilege. Bridge creation might fail if the optional bridging feature is not +installed on the system. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm modify-bridge\fR [ \fB-P\fR \fIprotect\fR] [\fB-R\fR +\fIroot-dir\fR] [ \fB-p\fR \fIpriority\fR] [ \fB-m\fR \fImax-age\fR] [ \fB-h\fR +\fIhello-time\fR] [ \fB-d\fR \fIforward-delay\fR] [ \fB-f\fR +\fIforce-protocol\fR] [\fB-l\fR \fIlink\fR...] \fIbridge-name\fR\fR +.ad +.sp .6 +.RS 4n +Modify the operational parameters of an existing bridge. The options are the +same as for the \fBcreate-bridge\fR subcommand, except that the \fB-l\fR option +is not permitted. To add links to an existing bridge, use the \fBadd-bridge\fR +subcommand. +.sp +Bridge parameter modification requires the \fBPRIV_SYS_DL_CONFIG\fR privilege. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-bridge\fR [\fB-R\fR \fIroot-dir\fR] \fIbridge-name\fR\fR +.ad +.sp .6 +.RS 4n +Delete a bridge instance. The bridge being deleted must not have any attached +links. Use the \fBremove-bridge\fR subcommand to deactivate links before +deleting a bridge. +.sp +Bridge deletion requires the \fBPRIV_SYS_DL_CONFIG\fR privilege. +.sp +The \fB-R\fR (\fB--root-dir\fR) option is the same as for the +\fBcreate-bridge\fR subcommand. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm add-bridge\fR [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIlink\fR +[\fB-l\fR \fIlink\fR...] \fIbridge-name\fR\fR +.ad +.sp .6 +.RS 4n +Add one or more links to an existing bridge. If multiple links are specified, +and adding any one of them results in an error, the command fails and no +changes are made to the system. +.sp +Link addition to a bridge requires the \fBPRIV_SYS_DL_CONFIG\fR privilege. +.sp +A link may be a member of at most one bridge. An error occurs when you attempt +to add a link that already belongs to another bridge. To move a link from one +bridge instance to another, remove it from the current bridge before adding it +to a new one. +.sp +The links assigned to a bridge must not also be VLANs, VNICs, or tunnels. Only +physical Ethernet datalinks, aggregation datalinks, wireless links, and +Ethernet stubs are permitted to be assigned to a bridge. +.sp +Links assigned to a bridge must all have the same MTU. This is checked when the +link is assigned. The link is added to the bridge in a deactivated form if it +is not the first link on the bridge and it has a differing MTU. +.sp +Note that systems using bridging should not set the \fBeeprom\fR(8) +\fBlocal-mac-address?\fR variable to false. +.sp +The options are the same as for the \fBcreate-bridge\fR subcommand. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm remove-bridge\fR [\fB-R\fR \fIroot-dir\fR] \fB-l\fR \fIlink\fR +[\fB-l\fR \fIlink\fR...] \fIbridge-name\fR\fR +.ad +.sp .6 +.RS 4n +Remove one or more links from a bridge instance. If multiple links are +specified, and removing any one of them would result in an error, the command +fails and none are removed. +.sp +Link removal from a bridge requires the \fBPRIV_SYS_DL_CONFIG\fR privilege. +.sp +The options are the same as for the \fBcreate-bridge\fR subcommand. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-bridge\fR [\fB-flt\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] +[[\fB-p\fR] \fB-o\fR \fIfield\fR,...] [\fIbridge-name\fR]\fR +.ad +.sp .6 +.RS 4n +Show the running status and configuration of bridges, their attached links, +learned forwarding entries, and \fBTRILL\fR nickname databases. When showing +overall bridge status and configuration, the bridge name can be omitted to show +all bridges. The other forms require a specified bridge. +.sp +The show-bridge subcommand accepts the following options: +.sp +.ne 2 +.na +\fB\fB-i\fR \fIinterval\fR, \fB--interval\fR=\fIinterval\fR\fR +.ad +.sp .6 +.RS 4n +Used with the \fB-s\fR option to specify an interval, in seconds, at which +statistics should be displayed. If this option is not specified, statistics +will be displayed only once. +.RE + +.sp +.ne 2 +.na +\fB\fB-s\fR, \fB--statistics\fR\fR +.ad +.sp .6 +.RS 4n +Display statistics for the specified bridges or for a given bridge's attached +links. This option cannot be used with the \fB-f\fR and \fB-t\fR options. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. See "Parsable Output Format," +below. +.RE + +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +names are described below. The special value all displays all fields. Each set +of fields has its own default set to display when \fB-o\fR is not specified. +.RE + +By default, the \fBshow-bridge\fR subcommand shows bridge configuration. The +following fields can be shown: +.sp +.ne 2 +.na +\fB\fBBRIDGE\fR\fR +.ad +.sp .6 +.RS 4n +The name of the bridge. +.RE + +.sp +.ne 2 +.na +\fB\fBADDRESS\fR\fR +.ad +.sp .6 +.RS 4n +The Bridge Unique Identifier value (MAC address). +.RE + +.sp +.ne 2 +.na +\fB\fBPRIORITY\fR\fR +.ad +.sp .6 +.RS 4n +Configured priority value; set by \fB-p\fR with \fBcreate-bridge\fR and +\fBmodify-bridge\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBBMAXAGE\fR\fR +.ad +.sp .6 +.RS 4n +Configured bridge maximum age; set by \fB-m\fR with \fBcreate-bridge\fR and +\fBmodify-bridge\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBBHELLOTIME\fR\fR +.ad +.sp .6 +.RS 4n +Configured bridge hello time; set by \fB-h\fR with \fBcreate-bridge\fR and +\fBmodify-bridge\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBBFWDDELAY\fR\fR +.ad +.sp .6 +.RS 4n +Configured forwarding delay; set by \fB-d\fR with \fBcreate-bridge\fR and +\fBmodify-bridge\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBFORCEPROTO\fR\fR +.ad +.sp .6 +.RS 4n +Configured forced maximum protocol; set by \fB-f\fR with \fBcreate-bridge\fR +and \fBmodify-bridge\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBTCTIME\fR\fR +.ad +.sp .6 +.RS 4n +Time, in seconds, since last topology change. +.RE + +.sp +.ne 2 +.na +\fB\fBTCCOUNT\fR\fR +.ad +.sp .6 +.RS 4n +Count of the number of topology changes. +.RE + +.sp +.ne 2 +.na +\fB\fBTCHANGE\fR\fR +.ad +.sp .6 +.RS 4n +This indicates that a topology change was detected. +.RE + +.sp +.ne 2 +.na +\fB\fBDESROOT\fR\fR +.ad +.sp .6 +.RS 4n +Bridge Identifier of the root node. +.RE + +.sp +.ne 2 +.na +\fB\fBROOTCOST\fR\fR +.ad +.sp .6 +.RS 4n +Cost of the path to the root node. +.RE + +.sp +.ne 2 +.na +\fB\fBROOTPORT\fR\fR +.ad +.sp .6 +.RS 4n +Port number used to reach the root node. +.RE + +.sp +.ne 2 +.na +\fB\fBMAXAGE\fR\fR +.ad +.sp .6 +.RS 4n +Maximum age value from the root node. +.RE + +.sp +.ne 2 +.na +\fB\fBHELLOTIME\fR\fR +.ad +.sp .6 +.RS 4n +Hello time value from the root node. +.RE + +.sp +.ne 2 +.na +\fB\fBFWDDELAY\fR\fR +.ad +.sp .6 +.RS 4n +Forward delay value from the root node. +.RE + +.sp +.ne 2 +.na +\fB\fBHOLDTIME\fR\fR +.ad +.sp .6 +.RS 4n +Minimum BPDU interval. +.RE + +By default, when the \fB-o\fR option is not specified, only the \fBBRIDGE\fR, +\fBADDRESS\fR, \fBPRIORITY\fR, and \fBDESROOT\fR fields are shown. +.sp +When the \fB-s\fR option is specified, the \fBshow-bridge\fR subcommand shows +bridge statistics. The following fields can be shown: +.sp +.ne 2 +.na +\fB\fBBRIDGE\fR\fR +.ad +.sp .6 +.RS 4n +Bridge name. +.RE + +.sp +.ne 2 +.na +\fB\fBDROPS\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets dropped due to resource problems. +.RE + +.sp +.ne 2 +.na +\fB\fBFORWARDS\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets forwarded from one link to another. +.RE + +.sp +.ne 2 +.na +\fB\fBMBCAST\fR\fR +.ad +.sp .6 +.RS 4n +Number of multicast and broadcast packets handled by the bridge. +.RE + +.sp +.ne 2 +.na +\fB\fBRECV\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets received on all attached links. +.RE + +.sp +.ne 2 +.na +\fB\fBSENT\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets sent on all attached links. +.RE + +.sp +.ne 2 +.na +\fB\fBUNKNOWN\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets handled that have an unknown destination. Such packets are +sent to all links. +.RE + +By default, when the \fB-o\fR option is not specified, only the \fBBRIDGE\fR, +\fBDROPS\fR, and \fBFORWARDS\fR fields are shown. +.sp +The \fBshow-bridge\fR subcommand also accepts the following options: +.sp +.ne 2 +.na +\fB\fB-l\fR, \fB--link\fR\fR +.ad +.sp .6 +.RS 4n +Displays link-related status and statistics information for all links attached +to a single bridge instance. By using this option and without the \fB-s\fR +option, the following fields can be displayed for each link: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The link name. +.RE + +.sp +.ne 2 +.na +\fB\fBINDEX\fR\fR +.ad +.sp .6 +.RS 4n +Port (link) index number on the bridge. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATE\fR\fR +.ad +.sp .6 +.RS 4n +State of the link. The state can be \fBdisabled\fR, \fBdiscarding\fR, +\fBlearning\fR, \fBforwarding\fR, \fBnon-stp\fR, or \fBbad-mtu\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBUPTIME\fR\fR +.ad +.sp .6 +.RS 4n +Number of seconds since the last reset or initialization. +.RE + +.sp +.ne 2 +.na +\fB\fBOPERCOST\fR\fR +.ad +.sp .6 +.RS 4n +Actual cost in use (1-65535). +.RE + +.sp +.ne 2 +.na +\fB\fBOPERP2P\fR\fR +.ad +.sp .6 +.RS 4n +This indicates whether point-to-point (\fBP2P\fR) mode been detected. +.RE + +.sp +.ne 2 +.na +\fB\fBOPEREDGE\fR\fR +.ad +.sp .6 +.RS 4n +This indicates whether edge mode has been detected. +.RE + +.sp +.ne 2 +.na +\fB\fBDESROOT\fR\fR +.ad +.sp .6 +.RS 4n +The Root Bridge Identifier that has been seen on this port. +.RE + +.sp +.ne 2 +.na +\fB\fBDESCOST\fR\fR +.ad +.sp .6 +.RS 4n +Path cost to the network root node through the designated port. +.RE + +.sp +.ne 2 +.na +\fB\fBDESBRIDGE\fR\fR +.ad +.sp .6 +.RS 4n +Bridge Identifier for this port. +.RE + +.sp +.ne 2 +.na +\fB\fBDESPORT\fR\fR +.ad +.sp .6 +.RS 4n +The ID and priority of the port used to transmit configuration messages for +this port. +.RE + +.sp +.ne 2 +.na +\fB\fBTCACK\fR\fR +.ad +.sp .6 +.RS 4n +This indicates whether Topology Change Acknowledge has been seen. +.RE + +When the \fB-l\fR option is specified without the \fB-o\fR option, only the +\fBLINK\fR, \fBSTATE\fR, \fBUPTIME\fR, and \fBDESROOT\fR fields are shown. +.sp +When the \fB-l\fR option is specified, the \fB-s\fR option can be used to +display the following fields for each link: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +Link name. +.RE + +.sp +.ne 2 +.na +\fB\fBCFGBPDU\fR\fR +.ad +.sp .6 +.RS 4n +Number of configuration BPDUs received. +.RE + +.sp +.ne 2 +.na +\fB\fBTCNBPDU\fR\fR +.ad +.sp .6 +.RS 4n +Number of topology change BPDUs received. +.RE + +.sp +.ne 2 +.na +\fB\fBRSTPBPDU\fR\fR +.ad +.sp .6 +.RS 4n +Number of Rapid Spanning Tree BPDUs received. +.RE + +.sp +.ne 2 +.na +\fB\fBTXBPDU\fR\fR +.ad +.sp .6 +.RS 4n +Number of BPDUs transmitted. +.RE + +.sp +.ne 2 +.na +\fB\fBDROPS\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets dropped due to resource problems. +.RE + +.sp +.ne 2 +.na +\fB\fBRECV\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets received by the bridge. +.RE + +.sp +.ne 2 +.na +\fB\fBXMIT\fR\fR +.ad +.sp .6 +.RS 4n +Number of packets sent by the bridge. +.RE + +When the \fB-o\fR option is not specified, only the \fBLINK\fR, \fBDROPS\fR, +\fBRECV\fR, and \fBXMIT\fR fields are shown. +.RE + +.sp +.ne 2 +.na +\fB\fB-f\fR, \fB--forwarding\fR\fR +.ad +.sp .6 +.RS 4n +Displays forwarding entries for a single bridge instance. With this option, the +following fields can be shown for each forwarding entry: +.sp +.ne 2 +.na +\fB\fBDEST\fR\fR +.ad +.sp .6 +.RS 4n +Destination MAC address. +.RE + +.sp +.ne 2 +.na +\fB\fBAGE\fR\fR +.ad +.sp .6 +.RS 4n +Age of entry in seconds and milliseconds. Omitted for local entries. +.RE + +.sp +.ne 2 +.na +\fB\fBFLAGS\fR\fR +.ad +.sp .6 +.RS 4n +The \fBL\fR (local) flag is shown if the MAC address belongs to an attached +link or to a VNIC on one of the attached links. +.RE + +.sp +.ne 2 +.na +\fB\fBOUTPUT\fR\fR +.ad +.sp .6 +.RS 4n +For local entries, this is the name of the attached link that has the MAC +address. Otherwise, for bridges that use Spanning Tree Protocol, this is the +output interface name. For RBridges, this is the output \fBTRILL\fR nickname. +.RE + +When the \fB-o\fR option is not specified, the \fBDEST\fR, \fBAGE\fR, +\fBFLAGS\fR, and \fBOUTPUT\fR fields are shown. +.RE + +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--trill\fR\fR +.ad +.sp .6 +.RS 4n +Displays \fBTRILL\fR nickname entries for a single bridge instance. With this +option, the following fields can be shown for each \fBTRILL\fR nickname entry: +.sp +.ne 2 +.na +\fB\fBNICK\fR\fR +.ad +.sp .6 +.RS 4n +\fBTRILL\fR nickname for this RBridge, which is a number from 1 to 65535. +.RE + +.sp +.ne 2 +.na +\fB\fBFLAGS\fR\fR +.ad +.sp .6 +.RS 4n +The \fBL\fR flag is shown if the nickname identifies the local system. +.RE + +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +Link name for output when sending messages to this RBridge. +.RE + +.sp +.ne 2 +.na +\fB\fBNEXTHOP\fR\fR +.ad +.sp .6 +.RS 4n +MAC address of the next hop RBridge that is used to reach the RBridge with this +nickname. +.RE + +When the \fB-o\fR option is not specified, the \fBNICK\fR, \fBFLAGS\fR, +\fBLINK\fR, and \fBNEXTHOP\fR fields are shown. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm create-vlan\fR [\fB-ft\fR] [\fB-R\fR \fIroot-dir\fR] \fB-l\fR +\fIether-link\fR \fB-v\fR \fIvid\fR [\fIvlan-link\fR]\fR +.ad +.sp .6 +.RS 4n +Create a tagged VLAN link with an ID of \fIvid\fR over Ethernet link +\fIether-link\fR. The name of the VLAN link can be specified as +\fIvlan\fR-\fIlink\fR. If the name is not specified, a name will be +automatically generated (assuming that \fIether-link\fR is \fIname\fR\fIPPA\fR) +as: +.sp +.in +2 +.nf +<\fIname\fR><1000 * \fIvlan-tag\fR + \fIPPA\fR> +.fi +.in -2 +.sp + +For example, if \fIether-link\fR is \fBbge1\fR and \fIvid\fR is 2, the name +generated is \fBbge2001\fR. +.sp +.ne 2 +.na +\fB\fB-f\fR, \fB--force\fR\fR +.ad +.sp .6 +.RS 4n +Force the creation of the VLAN link. Some devices do not allow frame sizes +large enough to include a VLAN header. When creating a VLAN link over such a +device, the \fB-f\fR option is needed, and the MTU of the IP interfaces on the +resulting VLAN must be set to 1496 instead of 1500. +.RE + +.sp +.ne 2 +.na +\fB\fB-l\fR \fIether-link\fR\fR +.ad +.sp .6 +.RS 4n +Specifies Ethernet link over which VLAN is created. +.RE + +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the VLAN link is temporary. Temporary VLAN links last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-vlan\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +\fIvlan-link\fR\fR +.ad +.sp .6 +.RS 4n +Delete the VLAN link specified. +.sp +The \fBdelete-vlan\fR subcommand accepts the following options: +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the deletion is temporary. Temporary deletions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-vlan\fR [\fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] +[\fIvlan-link\fR]\fR +.ad +.sp .6 +.RS 4n +Display VLAN configuration for all VLAN links or for the specified VLAN link. +.sp +The \fBshow-vlan\fR subcommand accepts the following options: +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR, to +display all fields. For each VLAN link, the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the VLAN link. +.RE + +.sp +.ne 2 +.na +\fB\fBVID\fR\fR +.ad +.sp .6 +.RS 4n +The ID associated with the VLAN. +.RE + +.sp +.ne 2 +.na +\fB\fBOVER\fR\fR +.ad +.sp .6 +.RS 4n +The name of the physical link over which this VLAN is configured. +.RE + +.sp +.ne 2 +.na +\fB\fBFLAGS\fR\fR +.ad +.sp .6 +.RS 4n +A set of flags associated with the VLAN link. Possible flags are: +.sp +.ne 2 +.na +\fB\fBf\fR\fR +.ad +.sp .6 +.RS 4n +The VLAN was created using the \fB-f\fR option to \fBcreate-vlan\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBi\fR\fR +.ad +.sp .6 +.RS 4n +The VLAN was implicitly created when the DLPI link was opened. These VLAN links +are automatically deleted on last close of the DLPI link (for example, when the +IP interface associated with the VLAN link is unplumbed). +.RE + +Additional flags might be defined in the future. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display the persistent VLAN configuration rather than the state of the running +system. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm scan-wifi\fR [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] +[\fIwifi-link\fR]\fR +.ad +.sp .6 +.RS 4n +Scans for \fBWiFi\fR networks, either on all \fBWiFi\fR links, or just on the +specified \fIwifi-link\fR. +.sp +By default, currently all fields but \fBBSSTYPE\fR are displayed. +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR to +display all fields. For each \fBWiFi\fR network found, the following fields can +be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the link the \fBWiFi\fR network is on. +.RE + +.sp +.ne 2 +.na +\fB\fBESSID\fR\fR +.ad +.sp .6 +.RS 4n +The \fBESSID\fR (name) of the \fBWiFi\fR network. +.RE + +.sp +.ne 2 +.na +\fB\fBBSSID\fR\fR +.ad +.sp .6 +.RS 4n +Either the hardware address of the \fBWiFi\fR network's Access Point (for +\fBBSS\fR networks), or the \fBWiFi\fR network's randomly generated unique +token (for \fBIBSS\fR networks). +.RE + +.sp +.ne 2 +.na +\fB\fBSEC\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBnone\fR for a \fBWiFi\fR network that uses no security, \fBwep\fR for +a \fBWiFi\fR network that requires WEP (Wired Equivalent Privacy), or \fBwpa\fR +for a WiFi network that requires WPA (Wi-Fi Protected Access). +.RE + +.sp +.ne 2 +.na +\fB\fBMODE\fR\fR +.ad +.sp .6 +.RS 4n +The supported connection modes: one or more of \fBa\fR, \fBb\fR, or \fBg\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBSTRENGTH\fR\fR +.ad +.sp .6 +.RS 4n +The strength of the signal: one of \fBexcellent\fR, \fBvery good\fR, +\fBgood\fR, \fBweak\fR, or \fBvery weak\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBSPEED\fR\fR +.ad +.sp .6 +.RS 4n +The maximum speed of the \fBWiFi\fR network, in megabits per second. +.RE + +.sp +.ne 2 +.na +\fB\fBBSSTYPE\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBbss\fR for \fBBSS\fR (infrastructure) networks, or \fBibss\fR for +\fBIBSS\fR (ad-hoc) networks. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm connect-wifi\fR [\fB-e\fR \fIessid\fR] [\fB-i\fR \fIbssid\fR] +[\fB-k\fR \fIkey\fR,...] [\fB-s\fR \fBnone\fR | \fBwep\fR | \fBwpa\fR] +[\fB-a\fR \fBopen\fR|\fBshared\fR] [\fB-b\fR \fBbss\fR|\fBibss\fR] [\fB-c\fR] +[\fB-m\fR \fBa\fR|\fBb\fR|\fBg\fR] [\fB-T\fR \fItime\fR] [\fIwifi-link\fR]\fR +.ad +.sp .6 +.RS 4n +Connects to a \fBWiFi\fR network. This consists of four steps: \fIdiscovery\fR, +\fIfiltration\fR, \fIprioritization\fR, and \fIassociation\fR. However, to +enable connections to non-broadcast \fBWiFi\fR networks and to improve +performance, if a \fBBSSID\fR or \fBESSID\fR is specified using the \fB-e\fR or +\fB-i\fR options, then the first three steps are skipped and \fBconnect-wifi\fR +immediately attempts to associate with a \fBBSSID\fR or \fBESSID\fR that +matches the rest of the provided parameters. If this association fails, but +there is a possibility that other networks matching the specified criteria +exist, then the traditional discovery process begins as specified below. +.sp +The discovery step finds all available \fBWiFi\fR networks on the specified +WiFi link, which must not yet be connected. For administrative convenience, if +there is only one \fBWiFi\fR link on the system, \fIwifi-link\fR can be +omitted. +.sp +Once discovery is complete, the list of networks is filtered according to the +value of the following options: +.sp +.ne 2 +.na +\fB\fB-e\fR \fIessid,\fR \fB--essid\fR=\fIessid\fR\fR +.ad +.sp .6 +.RS 4n +Networks that do not have the same \fIessid\fR are filtered out. +.RE + +.sp +.ne 2 +.na +\fB\fB-b\fR \fBbss\fR|\fBibss\fR, \fB--bsstype\fR=\fBbss\fR|\fBibss\fR\fR +.ad +.sp .6 +.RS 4n +Networks that do not have the same \fBbsstype\fR are filtered out. +.RE + +.sp +.ne 2 +.na +\fB\fB-m\fR \fBa\fR|\fBb\fR|\fBg\fR, \fB--mode\fR=\fBa\fR|\fBb\fR|\fBg\fR\fR +.ad +.sp .6 +.RS 4n +Networks not appropriate for the specified 802.11 mode are filtered out. +.RE + +.sp +.ne 2 +.na +\fB\fB-k\fR \fIkey,...\fR, \fB--key\fR=\fIkey, ...\fR\fR +.ad +.sp .6 +.RS 4n +Use the specified \fBsecobj\fR named by the key to connect to the network. +Networks not appropriate for the specified keys are filtered out. +.RE + +.sp +.ne 2 +.na +\fB\fB-s\fR \fBnone\fR|\fBwep\fR|\fBwpa\fR, +\fB--sec\fR=\fBnone\fR|\fBwep\fR|\fBwpa\fR\fR +.ad +.sp .6 +.RS 4n +Networks not appropriate for the specified security mode are filtered out. +.RE + +Next, the remaining networks are prioritized, first by signal strength, and +then by maximum speed. Finally, an attempt is made to associate with each +network in the list, in order, until one succeeds or no networks remain. +.sp +In addition to the options described above, the following options also control +the behavior of \fBconnect-wifi\fR: +.sp +.ne 2 +.na +\fB\fB-a\fR \fBopen\fR|\fBshared\fR, \fB--auth\fR=\fBopen\fR|\fBshared\fR\fR +.ad +.sp .6 +.RS 4n +Connect using the specified authentication mode. By default, \fBopen\fR and +\fBshared\fR are tried in order. +.RE + +.sp +.ne 2 +.na +\fB\fB-c\fR, \fB--create-ibss\fR\fR +.ad +.sp .6 +.RS 4n +Used with \fB-b ibss\fR to create a new ad-hoc network if one matching the +specified \fBESSID\fR cannot be found. If no \fBESSID\fR is specified, then +\fB-c -b ibss\fR always triggers the creation of a new ad-hoc network. +.RE + +.sp +.ne 2 +.na +\fB\fB-T\fR \fItime\fR, \fB--timeout\fR=\fItime\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the number of seconds to wait for association to succeed. If +\fItime\fR is \fBforever\fR, then the associate will wait indefinitely. The +current default is ten seconds, but this might change in the future. Timeouts +shorter than the default might not succeed reliably. +.RE + +.sp +.ne 2 +.na +\fB\fB-k\fR \fIkey,...\fR, \fB--key\fR=\fIkey,...\fR\fR +.ad +.sp .6 +.RS 4n +In addition to the filtering previously described, the specified keys will be +used to secure the association. The security mode to use will be based on the +key class; if a security mode was explicitly specified, it must be compatible +with the key class. All keys must be of the same class. +.sp +For security modes that support multiple key slots, the slot to place the key +will be specified by a colon followed by an index. Therefore, \fB-k mykey:3\fR +places \fBmykey\fR in slot 3. By default, slot 1 is assumed. For security modes +that support multiple keys, a comma-separated list can be specified, with the +first key being the active key. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm disconnect-wifi\fR [\fB-a\fR] [\fIwifi-link\fR]\fR +.ad +.sp .6 +.RS 4n +Disconnect from one or more \fBWiFi\fR networks. If \fIwifi-link\fR specifies a +connected \fBWiFi\fR link, then it is disconnected. For administrative +convenience, if only one \fBWiFi\fR link is connected, \fIwifi-link\fR can be +omitted. +.sp +.ne 2 +.na +\fB\fB-a\fR, \fB--all-links\fR\fR +.ad +.sp .6 +.RS 4n +Disconnects from all connected links. This is primarily intended for use by +scripts. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-wifi\fR [[\fB-p\fR] \fB-o\fR \fIfield\fR,...] +[\fIwifi-link\fR]\fR +.ad +.sp .6 +.RS 4n +Shows \fBWiFi\fR configuration information either for all \fBWiFi\fR links or +for the specified link \fIwifi-link\fR. +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield,...\fR, \fB--output\fR=\fIfield\fR\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR, to +display all fields. For each \fBWiFi\fR link, the following fields can be +displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the link being displayed. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATUS\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBconnected\fR if the link is connected, or \fBdisconnected\fR if it is +not connected. If the link is disconnected, all remaining fields have the value +\fB--\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBESSID\fR\fR +.ad +.sp .6 +.RS 4n +The \fBESSID\fR (name) of the connected \fBWiFi\fR network. +.RE + +.sp +.ne 2 +.na +\fB\fBBSSID\fR\fR +.ad +.sp .6 +.RS 4n +Either the hardware address of the \fBWiFi\fR network's Access Point (for +\fBBSS\fR networks), or the \fBWiFi\fR network's randomly generated unique +token (for \fBIBSS\fR networks). +.RE + +.sp +.ne 2 +.na +\fB\fBSEC\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBnone\fR for a \fBWiFi\fR network that uses no security, \fBwep\fR for +a \fBWiFi\fR network that requires WEP, or \fBwpa\fR for a WiFi network that +requires WPA. +.RE + +.sp +.ne 2 +.na +\fB\fBMODE\fR\fR +.ad +.sp .6 +.RS 4n +The supported connection modes: one or more of \fBa\fR, \fBb\fR, or \fBg\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBSTRENGTH\fR\fR +.ad +.sp .6 +.RS 4n +The connection strength: one of \fBexcellent\fR, \fBvery good\fR, \fBgood\fR, +\fBweak\fR, or \fBvery weak\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBSPEED\fR\fR +.ad +.sp .6 +.RS 4n +The connection speed, in megabits per second. +.RE + +.sp +.ne 2 +.na +\fB\fBAUTH\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBopen\fR or \fBshared\fR (see \fBconnect-wifi\fR). +.RE + +.sp +.ne 2 +.na +\fB\fBBSSTYPE\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBbss\fR for \fBBSS\fR (infrastructure) networks, or \fBibss\fR for +\fBIBSS\fR (ad-hoc) networks. +.RE + +By default, currently all fields but \fBAUTH\fR, \fBBSSID\fR, \fBBSSTYPE\fR are +displayed. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Displays using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-ether\fR [\fB-x\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR,...] +[\fIether-link\fR]\fR +.ad +.sp .6 +.RS 4n +Shows state information either for all physical Ethernet links or for a +specified physical Ethernet link. +.sp +The \fBshow-ether\fR subcommand accepts the following options: +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR,..., \fB--output\fR=\fIfield\fR\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR to +display all fields. For each link, the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the link being displayed. +.RE + +.sp +.ne 2 +.na +\fB\fBPTYPE\fR\fR +.ad +.sp .6 +.RS 4n +Parameter type, where \fBcurrent\fR indicates the negotiated state of the link, +\fBcapable\fR indicates capabilities supported by the device, \fBadv\fR +indicates the advertised capabilities, and \fBpeeradv\fR indicates the +capabilities advertised by the link-partner. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATE\fR\fR +.ad +.sp .6 +.RS 4n +The state of the link. +.RE + +.sp +.ne 2 +.na +\fB\fBAUTO\fR\fR +.ad +.sp .6 +.RS 4n +A \fByes\fR/\fBno\fR value indicating whether auto-negotiation is advertised. +.RE + +.sp +.ne 2 +.na +\fB\fBSPEED-DUPLEX\fR\fR +.ad +.sp .6 +.RS 4n +Combinations of speed and duplex values available. The units of speed are +encoded with a trailing suffix of \fBG\fR (Gigabits/s) or \fBM\fR (Mb/s). +Duplex values are encoded as \fBf\fR (full-duplex) or \fBh\fR (half-duplex). +.RE + +.sp +.ne 2 +.na +\fB\fBPAUSE\fR\fR +.ad +.sp .6 +.RS 4n +Flow control information. Can be \fBno\fR, indicating no flow control is +available; \fBtx\fR, indicating that the end-point can transmit pause frames, +but ignores any received pause frames; \fBrx\fR, indicating that the end-point +receives and acts upon received pause frames; or \fBbi\fR, indicating +bi-directional flow-control. +.RE + +.sp +.ne 2 +.na +\fB\fBREM_FAULT\fR\fR +.ad +.sp .6 +.RS 4n +Fault detection information. Valid values are \fBnone\fR or \fBfault\fR. +.RE + +By default, all fields except \fBREM_FAULT\fR are displayed for the "current" +\fBPTYPE\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Displays using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-x\fR, \fB--extended\fR\fR +.ad +.sp .6 +.RS 4n +Extended output is displayed for \fBPTYPE\fR values of \fBcurrent\fR, +\fBcapable\fR, \fBadv\fR and \fBpeeradv\fR. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm set-linkprop\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] \fB-p\fR \fIprop\fR=\fIvalue\fR[,...] \fIlink\fR\fR +.ad +.sp .6 +.RS 4n +Sets the values of one or more properties on the link specified. The list of +properties and their possible values depend on the link type, the network +device driver, and networking hardware. These properties can be retrieved using +\fBshow-linkprop\fR. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the changes are temporary. Temporary changes last until the next +reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-z\fR \fIzonename\fR +.ad +.sp .6 +.RS 4n +Operate on a link that has been delegated to the specified zone. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIprop\fR=\fIvalue\fR[,...], \fB--prop\fR +\fIprop\fR=\fIvalue\fR[,...]\fR +.ad +.br +.na +\fB\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of properties to set to the specified values. +.RE + +Note that when the persistent value is set, the temporary value changes to the +same value. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm reset-linkprop\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] [\fB-p\fR \fIprop\fR,...] \fIlink\fR\fR +.ad +.sp .6 +.RS 4n +Resets one or more properties to their values on the link specified. Properties +are reset to the values they had at startup. If no properties are specified, +all properties are reset. See \fBshow-linkprop\fR for a description of +properties. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the resets are temporary. Values are reset to default values. +Temporary resets last until the next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-z\fR \fIzonename\fR +.ad +.sp .6 +.RS 4n +Operate on a link that has been delegated to the specified zone. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIprop, ...\fR, \fB--prop\fR=\fIprop, ...\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of properties to reset. +.RE + +Note that when the persistent value is reset, the temporary value changes to +the same value. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-linkprop\fR [\fB-P\fR] [\fB-z\fR \fIzonename\fR] [[\fB-c\fR] \fB-o\fR \fIfield\fR[,...]][\fB-p\fR \fIprop\fR[,...]] [\fIlink\fR]\fR +.ad +.sp .6 +.RS 4n +Show the current or persistent values of one or more properties, either for all +datalinks or for the specified link. By default, current values are shown. If +no properties are specified, all available link properties are displayed. For +each property, the following fields are displayed: +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR to +display all fields. For each link, the following fields can be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the datalink. +.RE + +.sp +.ne 2 +.na +\fB\fBPROPERTY\fR\fR +.ad +.sp .6 +.RS 4n +The name of the property. +.RE + +.sp +.ne 2 +.na +\fB\fBPERM\fR\fR +.ad +.sp .6 +.RS 4n +The read/write permissions of the property. The value shown is one of \fBro\fR +or \fBrw\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBVALUE\fR\fR +.ad +.sp .6 +.RS 4n +The current (or persistent) property value. If the value is not set, it is +shown as \fB--\fR. If it is unknown, the value is shown as \fB?\fR. Persistent +values that are not set or have been reset will be shown as \fB--\fR and will +use the system \fBDEFAULT\fR value (if any). +.RE + +.sp +.ne 2 +.na +\fB\fBDEFAULT\fR\fR +.ad +.sp .6 +.RS 4n +The default value of the property. If the property has no default value, +\fB--\fR is shown. +.RE + +.sp +.ne 2 +.na +\fB\fBPOSSIBLE\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of the values the property can have. If the values span +a numeric range, \fImin\fR - \fImax\fR might be shown as shorthand. If the +possible values are unknown or unbounded, \fB--\fR is shown. +.RE + +The list of properties depends on the link type and network device driver, and +the available values for a given property further depends on the underlying +network hardware and its state. General link properties are documented in the +\fBLINK PROPERTIES\fR section. However, link properties that begin with +"\fB_\fR" (underbar) are specific to a given link or its underlying network +device and subject to change or removal. See the appropriate network device +driver man page for details. +.RE + +.sp +.ne 2 +.na +\fB\fB-c\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with this option. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display persistent link property information +.RE + +.sp +.ne 2 +.na +\fB\fB-z\fR \fIzonename\fR +.ad +.sp .6 +.RS 4n +Operate on a link that has been delegated to the specified zone. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIprop, ...\fR, \fB--prop\fR=\fIprop, ...\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of properties to show. See the sections on link +properties following subcommand descriptions. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm create-secobj\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-f\fR +\fIfile\fR] \fB-c\fR \fIclass\fR \fIsecobj\fR\fR +.ad +.sp .6 +.RS 4n +Create a secure object named \fIsecobj\fR in the specified \fIclass\fR to be +later used as a WEP or WPA key in connecting to an encrypted network. The value +of the secure object can either be provided interactively or read from a file. +The sequence of interactive prompts and the file format depends on the class of +the secure object. +.sp +Currently, the classes \fBwep\fR and \fBwpa\fR are supported. The \fBWEP\fR +(Wired Equivalent Privacy) key can be either 5 or 13 bytes long. It can be +provided either as an \fBASCII\fR or hexadecimal string -- thus, \fB12345\fR +and \fB0x3132333435\fR are equivalent 5-byte keys (the \fB0x\fR prefix can be +omitted). A file containing a \fBWEP\fR key must consist of a single line using +either \fBWEP\fR key format. The WPA (Wi-Fi Protected Access) key must be +provided as an ASCII string with a length between 8 and 63 bytes. +.sp +This subcommand is only usable by users or roles that belong to the "Network +Link Security" \fBRBAC\fR profile. +.sp +.ne 2 +.na +\fB\fB-c\fR \fIclass\fR, \fB--class\fR=\fIclass\fR\fR +.ad +.sp .6 +.RS 4n +\fIclass\fR can be \fBwep\fR or \fBwpa\fR. See preceding discussion. +.RE + +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the creation is temporary. Temporary creation last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-f\fR \fIfile\fR, \fB--file\fR=\fIfile\fR\fR +.ad +.sp .6 +.RS 4n +Specifies a file that should be used to obtain the secure object's value. The +format of this file depends on the secure object class. See the \fBEXAMPLES\fR +section for an example of using this option to set a \fBWEP\fR key. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-secobj\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +\fIsecobj\fR[,...]\fR +.ad +.sp .6 +.RS 4n +Delete one or more specified secure objects. This subcommand is only usable by +users or roles that belong to the "Network Link Security" \fBRBAC\fR profile. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the deletions are temporary. Temporary deletions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-secobj\fR [\fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] +[\fIsecobj\fR,...]\fR +.ad +.sp .6 +.RS 4n +Show current or persistent secure object information. If one or more secure +objects are specified, then information for each is displayed. Otherwise, all +current or persistent secure objects are displayed. +.sp +By default, current secure objects are displayed, which are all secure objects +that have either been persistently created and not temporarily deleted, or +temporarily created. +.sp +For security reasons, it is not possible to show the value of a secure object. +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...] , \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below. For displayed secure object, the +following fields can be shown: +.sp +.ne 2 +.na +\fB\fBOBJECT\fR\fR +.ad +.sp .6 +.RS 4n +The name of the secure object. +.RE + +.sp +.ne 2 +.na +\fB\fBCLASS\fR\fR +.ad +.sp .6 +.RS 4n +The class of the secure object. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display persistent secure object information +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm create-vnic\fR [\fB-t\fR] \fB-l\fR \fIlink\fR [\fB-R\fR +\fIroot-dir\fR] [\fB-m\fR \fIvalue\fR | auto | {factory [\fB-n\fR +\fIslot-identifier\fR]} | {random [\fB-r\fR \fIprefix\fR]}] [\fB-v\fR +\fIvlan-id\fR] [\fB-p\fR \fIprop\fR=\fIvalue\fR[,...]] \fIvnic-link\fR\fR +.ad +.sp .6 +.RS 4n +Create a VNIC with name \fIvnic-link\fR over the specified link. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the VNIC is temporary. Temporary VNICs last until the next +reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-l\fR \fIlink\fR, \fB--link\fR=\fIlink\fR\fR +.ad +.sp .6 +.RS 4n +\fIlink\fR can be a physical link or an \fBetherstub\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-m\fR \fIvalue\fR | \fIkeyword\fR, \fB--mac-address\fR=\fIvalue\fR | +\fIkeyword\fR\fR +.ad +.sp .6 +.RS 4n +Sets the VNIC's MAC address based on the specified value or keyword. If +\fIvalue\fR is not a keyword, it is interpreted as a unicast MAC address, which +must be valid for the underlying NIC. The following special keywords can be +used: +.sp +.ne 2 +.na +\fBfactory [\fB-n\fR \fIslot-identifier\fR],\fR +.ad +.br +.na +\fBfactory [\fB--slot\fR=\fIslot-identifier\fR]\fR +.ad +.sp .6 +.RS 4n +Assign a factory MAC address to the VNIC. When a factory MAC address is +requested, \fB-m\fR can be combined with the \fB-n\fR option to specify a MAC +address slot to be used. If \fB-n\fR is not specified, the system will choose +the next available factory MAC address. The \fB-m\fR option of the +\fBshow-phys\fR subcommand can be used to display the list of factory MAC +addresses, their slot identifiers, and their availability. +.RE + +.sp +.ne 2 +.na +\fB\fR +.ad +.br +.na +\fBrandom [\fB-r\fR \fIprefix\fR],\fR +.ad +.br +.na +\fBrandom [\fB--mac-prefix\fR=\fIprefix\fR]\fR +.ad +.sp .6 +.RS 4n +Assign a random MAC address to the VNIC. A default prefix consisting of a valid +IEEE OUI with the local bit set will be used. That prefix can be overridden +with the \fB-r\fR option. +.RE + +.sp +.ne 2 +.na +\fBauto\fR +.ad +.sp .6 +.RS 4n +Try and use a factory MAC address first. If none is available, assign a random +MAC address. \fBauto\fR is the default action if the \fB-m\fR option is not +specified. +.RE + +.sp +.ne 2 +.na +\fB\fB-v\fR \fIvlan-id\fR\fR +.ad +.sp .6 +.RS 4n +Enable VLAN tagging for this VNIC. The VLAN tag will have id \fIvlan-id\fR. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIprop\fR=\fIvalue\fR,..., \fB--prop\fR +\fIprop\fR=\fIvalue\fR,...\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of properties to set to the specified values. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-vnic\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] [\fB-z\fR \fIzonename\fR] \fIvnic-link\fR\fR +.ad +.sp .6 +.RS 4n +Deletes the specified VNIC. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the deletion is temporary. Temporary deletions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-z\fR \fIzonename\fR +.ad +.sp .6 +.RS 4n +Operate on a link that has been delegated to the specified zone. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-vnic\fR [\fB-pP\fR] [\fB-s\fR [\fB-i\fR \fIinterval\fR]] [\fB-o\fR \fIfield\fR[,...]] [\fB-l\fR \fIlink\fR] [\fB-z\fR \fIzonename\fR] [\fIvnic-link\fR]\fR +.ad +.sp .6 +.RS 4n +Show VNIC configuration information (the default) or statistics, for all VNICs, +all VNICs on a link, or only the specified \fIvnic-link\fR. +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...] , \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below. The field name must be one of the +fields listed below, or the special value \fBall\fR to display all fields. By +default (without \fB-o\fR), \fBshow-vnic\fR displays all fields. +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the VNIC. +.RE + +.sp +.ne 2 +.na +\fB\fBOVER\fR\fR +.ad +.sp .6 +.RS 4n +The name of the physical link over which this VNIC is configured. +.RE + +.sp +.ne 2 +.na +\fB\fBSPEED\fR\fR +.ad +.sp .6 +.RS 4n +The maximum speed of the VNIC, in megabits per second. +.RE + +.sp +.ne 2 +.na +\fB\fBMACADDRESS\fR\fR +.ad +.sp .6 +.RS 4n +MAC address of the VNIC. +.RE + +.sp +.ne 2 +.na +\fB\fBMACADDRTYPE\fR\fR +.ad +.sp .6 +.RS 4n +MAC address type of the VNIC. \fBdladm\fR distinguishes among the following MAC +address types: +.sp +.ne 2 +.na +\fB\fBrandom\fR\fR +.ad +.sp .6 +.RS 4n +A random address assigned to the VNIC. +.RE + +.sp +.ne 2 +.na +\fB\fBfactory\fR\fR +.ad +.sp .6 +.RS 4n +A factory MAC address used by the VNIC. +.RE + +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display the persistent VNIC configuration. +.RE + +.sp +.ne 2 +.na +\fB\fB-s\fR, \fB--statistics\fR\fR +.ad +.sp .6 +.RS 4n +Displays VNIC statistics. +.RE + +.sp +.ne 2 +.na +\fB\fB-i\fR \fIinterval\fR, \fB--interval\fR=\fIinterval\fR\fR +.ad +.sp .6 +.RS 4n +Used with the \fB-s\fR option to specify an interval, in seconds, at which +statistics should be displayed. If this option is not specified, statistics +will be displayed only once. +.RE + +.sp +.ne 2 +.na +\fB\fB-l\fR \fIlink\fR, \fB--link\fR=\fIlink\fR\fR +.ad +.sp .6 +.RS 4n +Display information for all VNICs on the named link. +.RE + +.sp +.ne 2 +.na +\fB\fB-z\fR \fIzonename\fR +.ad +.sp .6 +.RS 4n +Operate on a link that has been delegated to the specified zone. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fR +.ad +.br +.na +\fB\fBdladm create-etherstub\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +\fIetherstub\fR\fR +.ad +.sp .6 +.RS 4n +Create an etherstub with the specified name. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the etherstub is temporary. Temporary etherstubs do not persist +across reboots. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +VNICs can be created on top of etherstubs instead of physical NICs. As with +physical NICs, such a creation causes the stack to implicitly create a virtual +switch between the VNICs created on top of the same etherstub. +.RE + +.sp +.ne 2 +.na +\fB\fR +.ad +.br +.na +\fB\fBdladm delete-etherstub\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +\fIetherstub\fR\fR +.ad +.sp .6 +.RS 4n +Delete the specified etherstub. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the deletion is temporary. Temporary deletions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-etherstub\fR [\fIetherstub\fR]\fR +.ad +.sp .6 +.RS 4n +Show all configured etherstubs by default, or the specified etherstub if +\fIetherstub\fR is specified. +.RE + +.sp +.ne 2 +.na +\fB\fBdladm create-iptun\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] \fB-T\fR +\fItype\fR [-a {local|remote}=<addr>[,...]] \fIiptun-link\fR\fR +.ad +.sp .6 +.RS 4n +Create an IP tunnel link named \fIiptun-link\fR. Such links can additionally be +protected with IPsec using \fBipsecconf\fR(8). +.sp +An IP tunnel is conceptually comprised of two parts: a virtual link between two +or more IP nodes, and an IP interface above this link that allows the system to +transmit and receive IP packets encapsulated by the underlying link. This +subcommand creates a virtual link. The \fBifconfig\fR(8) command is used to +configure IP interfaces above the link. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the IP tunnel link is temporary. Temporary tunnels last until +the next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-T\fR \fItype\fR, \fB--tunnel-type\fR=\fItype\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the type of tunnel to be created. The type must be one of the +following: +.sp +.ne 2 +.na +\fB\fBipv4\fR\fR +.ad +.sp .6 +.RS 4n +A point-to-point, IP-over-IP tunnel between two IPv4 nodes. This type of tunnel +requires IPv4 source and destination addresses to function. IPv4 and IPv6 +interfaces can be plumbed above such a tunnel to create IPv4-over-IPv4 and +IPv6-over-IPv4 tunneling configurations. +.RE + +.sp +.ne 2 +.na +\fB\fBipv6\fR\fR +.ad +.sp .6 +.RS 4n +A point-to-point, IP-over-IP tunnel between two IPv6 nodes as defined in IETF +RFC 2473. This type of tunnel requires IPv6 source and destination addresses to +function. IPv4 and IPv6 interfaces can be plumbed above such a tunnel to create +IPv4-over-IPv6 and IPv6-over-IPv6 tunneling configurations. +.RE + +.sp +.ne 2 +.na +\fB\fB6to4\fR\fR +.ad +.sp .6 +.RS 4n +A 6to4, point-to-multipoint tunnel as defined in IETF RFC 3056. This type of +tunnel requires an IPv4 source address to function. An IPv6 interface is +plumbed on such a tunnel link to configure a 6to4 router. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fB-a\fR \fBlocal=\fR\fIaddr\fR +.ad +.sp .6 +.RS 4n +Literal IP address or hostname corresponding to the tunnel source. If a +hostname is specified, it will be resolved to IP addresses, and one of those IP +addresses will be used as the tunnel source. Because IP tunnels are created +before naming services have been brought online during the boot process, it is +important that any hostname used be included in \fB/etc/hosts\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-a\fR \fBremote=\fR\fIaddr\fR +.ad +.sp .6 +.RS 4n +Literal IP address or hostname corresponding to the tunnel destination. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm modify-iptun\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +[-a {local|remote}=<addr>[,...]] \fIiptun-link\fR\fR +.ad +.sp .6 +.RS 4n +Modify the parameters of the specified IP tunnel. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the modification is temporary. Temporary modifications last +until the next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.sp +.ne 2 +.na +\fB\fB-a\fR \fBlocal=\fR\fIaddr\fR +.ad +.sp .6 +.RS 4n +Specifies a new tunnel source address. See \fBcreate-iptun\fR for a +description. +.RE + +.sp +.ne 2 +.na +\fB\fB-a\fR \fBremote=\fR\fIaddr\fR +.ad +.sp .6 +.RS 4n +Specifies a new tunnel destination address. See \fBcreate-iptun\fR for a +description. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm delete-iptun\fR [\fB-t\fR] [\fB-R\fR \fIroot-dir\fR] +\fIiptun-link\fR\fR +.ad +.sp .6 +.RS 4n +Delete the specified IP tunnel link. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the deletion is temporary. Temporary deletions last until the +next reboot. +.RE + +.sp +.ne 2 +.na +\fB\fB-R\fR \fIroot-dir\fR, \fB--root-dir\fR=\fIroot-dir\fR\fR +.ad +.sp .6 +.RS 4n +See "Options," above. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-iptun\fR [\fB-P\fR] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] +[\fIiptun-link\fR]\fR +.ad +.sp .6 +.RS 4n +Show IP tunnel link configuration for a single IP tunnel or all IP tunnels. +.sp +.ne 2 +.na +\fB\fB-P\fR, \fB--persistent\fR\fR +.ad +.sp .6 +.RS 4n +Display the persistent IP tunnel configuration. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The -o option is required with +-p. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR[,...]\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed below, or the special value \fBall\fR, to +display all fields. By default (without \fB-o\fR), \fBshow-iptun\fR displays +all fields. +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the IP tunnel link. +.RE + +.sp +.ne 2 +.na +\fB\fBTYPE\fR\fR +.ad +.sp .6 +.RS 4n +Type of tunnel as specified by the \fB-T\fR option of \fBcreate-iptun\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBFLAGS\fR\fR +.ad +.sp .6 +.RS 4n +A set of flags associated with the IP tunnel link. Possible flags are: +.sp +.ne 2 +.na +\fB\fBs\fR\fR +.ad +.sp .6 +.RS 4n +The IP tunnel link is protected by IPsec policy. To display the IPsec policy +associated with the tunnel link, enter: +.sp +.in +2 +.nf +# \fBipsecconf -ln -i \fItunnel-link\fR\fR +.fi +.in -2 +.sp + +See \fBipsecconf\fR(8) for more details on how to configure IPsec policy. +.RE + +.sp +.ne 2 +.na +\fB\fBi\fR\fR +.ad +.sp .6 +.RS 4n +The IP tunnel link was implicitly created with \fBifconfig\fR(8), and will be +automatically deleted when it is no longer referenced (that is, when the last +IP interface over the tunnel is unplumbed). See \fBifconfig\fR(8) for details +on implicit tunnel creation. +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBSOURCE\fR\fR +.ad +.sp .6 +.RS 4n +The tunnel source address. +.RE + +.sp +.ne 2 +.na +\fB\fBDESTINATION\fR\fR +.ad +.sp .6 +.RS 4n +The tunnel destination address. +.RE + +.RE + +.RE + +.sp +.ne 2 +.na +\fBdladm create-overlay\fR \fB-e\fR \fIencap\fR \fB-s\fR \fIsearch\fR +\fB-v\fR \fIvnetid\fR [\fB-p\fR \fIprop\fR=\fIvalue\fR[,...]] \fIoverlay\fR +.ad +.sp .6 +.RS 4n +Create an overlay device named \fIoverlay\fR. +.sp +Overlay devices are similar to etherstubs. VNICs can be created on top +of them. However, unlike an etherstub which is local to the system, an +overlay device can be configured to communicate to remote hosts, +providing a means for network virtualization. The way in which it does +this is described by the encapsulation module and the search plugin. For +more information on these, see \fBoverlay\fR(5). +.sp +An overlay device has a series of required and optional properties. These +properties vary based upon the search and encapsulation modules and are fully +specified in \fBoverlay\fR(5). Not every property needs to be specified - some +have default values which will be used if nothing specific is specified. For +example, the default port for VXLAN comes from its IANA standard. If a +required property is missing, the command will fail and inform you of the +missing properties. +.sp +.ne 2 +.na +\fB\fB-t\fR, \fB--temporary\fR\fR +.ad +.sp .6 +.RS 4n +Specifies that the overlay is temporary. Temporary overlays last until +the next reboot. +.RE + +.sp +.ne 2 +.na +\fB-e\fR \fIencap\fR, \fB--encap\fR=\fIencap\fR +.ad +.sp .6 +.RS 4n +Use \fIencap\fR as the encapsulation plugin for the overlay device +\fIoverlay\fR. The encapsulation plugin determines how packets are transformed +before being put on the wire. +.RE + +.sp +.ne 2 +.na +\fB-s\fR \fIsearch\fR, \fB--search\fR=\fIsearch\fR +.ad +.sp .6 +.RS 4n +Use \fIsearch\fR as the search plugin for \fIoverlay\fR. The search plugin +determines how non-local targets are found and where packets are directed to. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIprop\fR=\fIvalue\fR,..., \fB--prop\fR +\fIprop\fR=\fIvalue\fR,...\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of properties to set to the specified values. +.RE + +.sp +.ne 2 +.na +\fB-v\fR \fIvnetid\fR, \fB--vnetid\fR=\fIvnetid\fR +.ad +.sp .6 +.RS 4n +Sets the virtual networking identifier to \fIvnetid\fR. A virtual network +identifier determines is similar to a VLAN identifier, in that it identifies a +unique virtual network. All overlay devices on the system share the same space +for the virtual network identifier. However, the valid range of identifiers is +determined by the encapsulation plugin specified by \fB-e\fR. +.RE + +.RE + +.sp +.ne 2 +.na +\fBdladm delete-overlay\fR \fIoverlay\fR +.ad +.sp .6 +.RS 4n +Delete the specified overlay. This will fail if there are VNICs on top of the +device. +.RE + +.sp +.ne 2 +.na +\fBdladm modify-overlay\fR \fB-d\fR \fImac\fR | \fB-f\fR | \fB-s\fR \fImac=ip:port\fR \fIoverlay\fR +.ad +.sp .6 +.RS 4n +Modifies the target tables for the specified overlay. +.sp +The different options allow for different ways of modifying the target table. +One of \fB-d\fR, \fB-f\fR, and \fB-s\fR is required. This is not applicable for +all kinds of overlay devices. For more information, see \fBoverlay\fR(5). +.sp +.ne 2 +.na +\fB-d\fR \fImac\fR, \fB--delete-entry\fR=\fImac\fR +.ad +.sp .6 +.RS 4n +Deletes the entry for \fImac\fR from the target table for \fIoverlay\fR. Note, +if a lookup is pending or outstanding, this does not cancel it or stop it from +updating the value. +.RE + +.sp +.ne 2 +.na +\fB-f\fR, \fB--flush-table\fR +.ad +.sp .6 +.RS 4n +Flushes all values in the target table for \fIoverlay\fR. +.RE + +.sp +.ne 2 +.na +\fB-s\fR \fImac\fR=\fIvalue\fR, \fB--set-entry\fR=\fImac\fR=\fIvalue\fR +.ad +.sp .6 +.RS 4n +Sets the value of \fIoverlay\fR's target table entry for \fImac\fR to the +specified value. The specified value varies upon the encapsulation plugin. The +value may be a combination of a MAC address, IP address, and port. Generally, +this looks like [\fImac\fR,][\fIIP\fR:][\fIport\fR]. If a component is the last +one, then there is no need for a separator. eg. if just the MAC address or IP +is needed, it would look like \fImac\fR and \fIIP\fR respectively. +.RE + +.RE + +.sp +.ne 2 +.na +\fBdladm show-overlay\fR [ \fB-f\fR | \fB-t\fR ] [[\fB-p\fR] \fB-o\fR \fIfield\fR[,...]] [\fIoverlay\fR] +.ad +.sp .6 +.RS 4n +Shows overlay configuration (the default), internal target tables (\fB-t\fR), or +the FMA state (\fB-f\fR), either for all overlays or the specified overlay. +.sp +By default (with neither \fB-f\fR or \fB-t\fR specified), the following fields +will be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the overlay. +.RE + +.sp +.ne 2 +.na +\fB\fBPROPERTY\fR\fR +.ad +.sp .6 +.RS 4n +The name of the property. +.RE + +.sp +.ne 2 +.na +\fB\fBPERM\fR\fR +.ad +.sp .6 +.RS 4n +The read/write permissions of the property. The value shown is one of \fBr-\fR +or \fBrw\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBVALUE\fR\fR +.ad +.sp .6 +.RS 4n +The current property value. If the value is not set, it is shown as \fB--\fR. +If it is unknown, the value is shown as \fB?\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBDEFAULT\fR\fR +.ad +.sp .6 +.RS 4n +The default value of the property. If the property has no default value, +\fB--\fR is shown. +.RE + +.sp +.ne 2 +.na +\fB\fBPOSSIBLE\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of the values the property can have. If the values span +a numeric range, \fImin\fR - \fImax\fR might be shown as shorthand. If the +possible values are unknown or unbounded, \fB--\fR is shown. +.RE + +.sp +When the \fB-f\fR option is displayed, the following fields will be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the overlay. +.RE + +.sp +.ne 2 +.na +\fB\fBSTATUS\fR\fR +.ad +.sp .6 +.RS 4n +Either \fBONLINE\fR or \fBDEGRADED\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBDETAILS\fR\fR +.ad +.sp .6 +.RS 4n +When the \fBoverlay\fR's status is \fBONLINE\fR, then this has the value +\fB--\fR. Otherwise, when it is \fBDEGRADED\fR, this field provides a more +detailed explanation as to why it's degraded. +.RE + +.sp +When the \fB-t\fR option is displayed, the following fields will be displayed: +.sp +.ne 2 +.na +\fB\fBLINK\fR\fR +.ad +.sp .6 +.RS 4n +The name of the overlay. +.RE + +.sp +.ne 2 +.na +\fB\fBTARGET\fR\fR +.ad +.sp .6 +.RS 4n +The target MAC address of a table entry. +.RE + +.sp +.ne 2 +.na +\fB\fBDESTINATION\fR\fR +.ad +.sp .6 +.RS 4n +The address that an encapsulated packet will be sent to when a packet has the +address specified by \fBTARGET\fR. +.RE + +The \fBshow-overlay\fR command supports the following options: + +.sp +.ne 2 +.na +\fB-f\fR, \fB--fma\fR +.ad +.sp .6 +.RS 4n +Displays information about an overlay device's FMA state. For more +information on the target table, see \fBoverlay\fR(5). +.RE + +.sp +.ne 2 +.na +\fB\fB-o\fR \fIfield\fR[,...], \fB--output\fR=\fIfield\fR\fR +.ad +.sp .6 +.RS 4n +A case-insensitive, comma-separated list of output fields to display. The field +name must be one of the fields listed above, or the special value \fBall\fR, to +display all fields. The fields applicable to the \fB-o\fR option are limited to +those listed under each output mode. For example, if using \fB-L\fR, only the +fields listed under \fB-L\fR, above, can be used with \fB-o\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR, \fB--parsable\fR\fR +.ad +.sp .6 +.RS 4n +Display using a stable machine-parsable format. The \fB-o\fR option is +required with \fB-p\fR. See "Parsable Output Format", below. +.RE + +.sp +.ne 2 +.na +\fB-t\fR, \fB--target\fR +.ad +.sp .6 +.RS 4n +Displays information about an overlay device's target table. For more +information on the target table, see \fBoverlay\fR(5). +.RE + +.RE + +.sp +.ne 2 +.na +\fB\fBdladm show-usage\fR [\fB-a\fR] \fB-f\fR \fIfilename\fR [\fB-p\fR +\fIplotfile\fR \fB-F\fR \fIformat\fR] [\fB-s\fR \fItime\fR] [\fB-e\fR +\fItime\fR] [\fIlink\fR]\fR +.ad +.sp .6 +.RS 4n +Show the historical network usage from a stored extended accounting file. +Configuration and enabling of network accounting through \fBacctadm\fR(8) is +required. The default output will be the summary of network usage for the +entire period of time in which extended accounting was enabled. +.sp +.ne 2 +.na +\fB\fB-a\fR\fR +.ad +.sp .6 +.RS 4n +Display all historical network usage for the specified period of time during +which extended accounting is enabled. This includes the usage information for +the links that have already been deleted. +.RE + +.sp +.ne 2 +.na +\fB\fB-f\fR \fIfilename\fR, \fB--file\fR=\fIfilename\fR\fR +.ad +.sp .6 +.RS 4n +Read extended accounting records of network usage from \fIfilename\fR. +.RE + +.sp +.ne 2 +.na +\fB\fB-F\fR \fIformat\fR, \fB--format\fR=\fIformat\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the format of \fIplotfile\fR that is specified by the \fB-p\fR +option. As of this release, \fBgnuplot\fR is the only supported format. +.RE + +.sp +.ne 2 +.na +\fB\fB-p\fR \fIplotfile\fR, \fB--plot\fR=\fIplotfile\fR\fR +.ad +.sp .6 +.RS 4n +Write network usage data to a file of the format specified by the \fB-F\fR +option, which is required. +.RE + +.sp +.ne 2 +.na +\fB\fB-s\fR \fItime\fR, \fB--start\fR=\fItime\fR\fR +.ad +.br +.na +\fB\fB-e\fR \fItime\fR, \fB--stop\fR=\fItime\fR\fR +.ad +.sp .6 +.RS 4n +Start and stop times for data display. Time is in the format +\fIMM\fR/\fIDD\fR/\fIYYYY\fR,\fIhh\fR:\fImm\fR:\fIss\fR. +.RE + +.sp +.ne 2 +.na +\fB\fIlink\fR\fR +.ad +.sp .6 +.RS 4n +If specified, display the network usage only for the named link. Otherwise, +display network usage for all links. +.RE + +.RE + +.SS "Parsable Output Format" +Many \fBdladm\fR subcommands have an option that displays output in a +machine-parsable format. The output format is one or more lines of colon +(\fB:\fR) delimited fields. The fields displayed are specific to the subcommand +used and are listed under the entry for the \fB-o\fR option for a given +subcommand. Output includes only those fields requested by means of the +\fB-o\fR option, in the order requested. +.sp +.LP +When you request multiple fields, any literal colon characters are escaped by a +backslash (\fB\e\fR) before being output. Similarly, literal backslash +characters will also be escaped (\fB\e\e\fR). This escape format is parsable +by using shell \fBread\fR(1) functions with the environment variable +\fBIFS=:\fR (see \fBEXAMPLES\fR, below). Note that escaping is not done when +you request only a single field. +.SS "General Link Properties" +The following general link properties are supported: +.sp +.ne 2 +.na +\fB\fBallow-all-dhcp-cids\fR\fR +.ad +.sp .6 +.RS 4n +One of \fBtrue\fR or \fBfalse\fR, to indicate whether or not all DHCP Client +Identifiers should be permitted on this interface when DHCP spoofing protection +is being used. This can be useful in cases where a DHCP client is using RFC +4361-style Client Identifiers, which are based on a value that is opaque to the +Global Zone, but enforcement of MAC addresses in DHCP packets is still desired. +.RE + +.sp +.ne 2 +.na +\fB\fBallowed-dhcp-cids\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of DHCP Client Identifiers that are allowed on the +interface. +.sp +Client identifiers can be written in three different formats: a string of +hexadecimal characters prefixed by \fB0x\fR, indicating the exact bytes used in +the Client Identifier; an RFC 3315 DUID of the form +"1.<hardware\ type>.<time>.<link-layer\ address>" (DUID-LLT), +"2.<enterprise\ number>.<hex\ string>" (DUID-EN), or +"3.<hardware\ type>.<link-layer\ address>" (DUID-LL); or a string of characters +whose byte values should be used as the Client Identifier. +.sp +When specifying a string of hexadecimal characters prefixed by \fB0x\fR or as +part of a DUID-EN string, an even number of hexadecimal characters must be +provided in order to fully specify each byte. +.RE + +.sp +.ne 2 +.na +\fB\fBallowed-ips\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of IP addresses that are allowed on the interface. +.sp +An address in CIDR format with no host address specified is used to indicate +that any address on that subnet is allowed (e.g. 192.168.10.0/24 means any +address in the range 192.168.10.0 - 192.168.10.255 is allowed). +.RE + +.sp +.ne 2 +.na +\fB\fBautopush\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the set of STREAMS modules to push on the stream associated with a +link when its DLPI device is opened. It is a space-delimited list of modules. +.sp +The optional special character sequence \fB[anchor]\fR indicates that a STREAMS +anchor should be placed on the stream at the module previously specified in the +list. It is an error to specify more than one anchor or to have an anchor first +in the list. +.sp +The \fBautopush\fR property is preferred over the more general +\fBautopush\fR(8) command. +.RE + +.sp +.ne 2 +.na +\fB\fBcpus\fR\fR +.ad +.sp .6 +.RS 4n +Bind the processing of packets for a given data link to a processor or a set of +processors. The value can be a comma-separated list of one or more processor +ids. If the list consists of more than one processor, the processing will +spread out to all the processors. Connection to processor affinity and packet +ordering for any individual connection will be maintained. +.sp +The processor or set of processors are not exclusively reserved for the link. +Only the kernel threads and interrupts associated with processing of the link +are bound to the processor or the set of processors specified. In case it is +desired that processors be dedicated to the link, \fBpsrset\fR(8) can be used +to create a processor set and then specifying the processors from the processor +set to bind the link to. +.sp +If the link was already bound to processor or set of processors due to a +previous operation, the binding will be removed and the new set of processors +will be used instead. +.sp +The default is no CPU binding, which is to say that the processing of packets +is not bound to any specific processor or processor set. +.RE + +.sp +.ne 2 +.na +\fB\fBdynamic-methods\fR\fR +.ad +.sp .6 +.RS 4n +When using IP spoofing protection (see \fBprotection\fR), addresses can be +learned dynamically by monitoring certain network traffic, like DHCP +transactions or IPv6 Stateless Address Autoconfiguration (SLAAC). By default, +all learning methods are permitted, but if \fBallowed-ips\fR contains any +addresses, then all methods are disabled, and any packets sent from addresses +previously learned will be dropped. This property allows selecting which ones +are re-enabled, where valid options are \fBdhcpv4\fR, \fBdhcpv6\fR, and +\fBslaac\fR. \fBaddrconf\fR is available as an alias for enabling both +\fBdhcpv6\fR and \fBslaac\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBlearn_limit\fR\fR +.ad +.sp .6 +.RS 4n +Limits the number of new or changed MAC sources to be learned over a bridge +link. When the number exceeds this value, learning on that link is temporarily +disabled. Only non-VLAN, non-VNIC type links have this property. +.sp +The default value is \fB1000\fR. Valid values are greater or equal to 0. +.RE + +.sp +.ne 2 +.na +\fB\fBlearn_decay\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the decay rate for source changes limited by \fBlearn_limit\fR. This +number is subtracted from the counter for a bridge link every 5 seconds. Only +non-VLAN, non-VNIC type links have this property. +.sp +The default value is \fB200\fR. Valid values are greater or equal to 0. +.RE + +.sp +.ne 2 +.na +\fB\fBmaxbw\fR\fR +.ad +.sp .6 +.RS 4n +Sets the full duplex bandwidth for the link. The bandwidth is specified as an +integer with one of the scale suffixes (\fBK\fR, \fBM\fR, or \fBG\fR for Kbps, +Mbps, and Gbps). If no units are specified, the input value will be read as +Mbps. The default is no bandwidth limit. +.RE + +.sp +.ne 2 +.na +\fB\fBpriority\fR\fR +.ad +.sp .6 +.RS 4n +Sets the relative priority for the link. The value can be given as one of the +tokens \fBhigh\fR, \fBmedium\fR, or \fBlow\fR. The default is \fBhigh\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBprotection\fR\fR +.ad +.sp .6 +.RS 4n +This property enables various forms of link protections, which prevent sending +applicable traffic out of this link. Note that since this enforcement happens +late in the networking stack, some observability tools like \fBsnoop\fR(1M) may +still see dropped outbound packets. + +This property should be set to a comma-separated list of protections to enable +on this link, where available protections are: +.sp +.ne 2 +.na +\fBip-nospoof\fR +.ad +.sp .6 +.RS 4n +Prevents sending from IPv4 and IPv6 addresses that have not been permitted +over the NIC. Addresses can be learned dynamically (see \fBdynamic-methods\fR) +or specified explicitly (see \fBallowed-ips\fR). +.RE +.sp +.ne 2 +.na +\fBdhcp-nospoof\fR +.ad +.sp .6 +.RS 4n +Prevents sending DHCP packets whose client hardware address +(CHADDR) field differs from the link-layer address, or from using a Client +Identifier whose value cannot be confirmed to be derived from the link-layer +address. Additional Client Identifiers can be permitted through the +\fBallowed-dhcp-cids\fR and \fBallow-all-dhcp-cids\fR link properties. +.RE +.sp +.ne 2 +.na +\fBmac-nospoof\fR +.ad +.sp .6 +.RS 4n +Prevents sending packets with a link-layer address that differs from the one +associated with the NIC. Additional addresses to allow can be added using the +\fBseconday-macs\fR property. +.RE +.sp +.ne 2 +.na +\fBrestricted\fR +.ad +.sp .6 +.RS 4n +Prevents using a VLAN ID not associated with the NIC and sending packets that +are not IPv4, IPv6 or ARP. +.RE +.RE + +.sp +.ne 2 +.na +\fB\fBstp\fR\fR +.ad +.sp .6 +.RS 4n +Enables or disables Spanning Tree Protocol on a bridge link. Setting this value +to \fB0\fR disables Spanning Tree, and puts the link into forwarding mode with +BPDU guarding enabled. This mode is appropriate for point-to-point links +connected only to end nodes. Only non-VLAN, non-VNIC type links have this +property. The default value is \fB1\fR, to enable STP. +.RE + +.sp +.ne 2 +.na +\fB\fBforward\fR\fR +.ad +.sp .6 +.RS 4n +Enables or disables forwarding for a VLAN. Setting this value to \fB0\fR +disables bridge forwarding for a VLAN link. Disabling bridge forwarding removes +that VLAN from the "allowed set" for the bridge. The default value is \fB1\fR, +to enable bridge forwarding for configured VLANs. +.RE + +.sp +.ne 2 +.na +\fB\fBdefault_tag\fR\fR +.ad +.sp .6 +.RS 4n +Sets the default VLAN ID that is assumed for untagged packets sent to and +received from this link. Only non-VLAN, non-VNIC type links have this property. +Setting this value to \fB0\fR disables the bridge forwarding of untagged +packets to and from the port. The default value is \fBVLAN ID 1\fR. Valid +values values are from 0 to 4094. +.RE + +.sp +.ne 2 +.na +\fB\fBpromisc-filtered\fR\fR +.ad +.sp .6 +.RS 4n +Enables or disables the default filtering of promiscuous mode for certain +classes of links. By default, VNICs will only see unicast traffic destined for it +in promiscuous mode. Not all the unicast traffic from the underlying device +makes it to the VNIC. Disabling this would cause a VNIC, for example, to be able +to see all unicast traffic from the device it is created over. The default value +is on. +.RE + +.sp +.ne 2 +.na +\fB\fBstp_priority\fR\fR +.ad +.sp .6 +.RS 4n +Sets the STP and RSTP Port Priority value, which is used to determine the +preferred root port on a bridge. Lower numerical values are higher priority. +The default value is \fB128\fR. Valid values range from 0 to 255. +.RE + +.sp +.ne 2 +.na +\fB\fBstp_cost\fR\fR +.ad +.sp .6 +.RS 4n +Sets the STP and RSTP cost for using the link. The default value is \fBauto\fR, +which sets the cost based on link speed, using \fB100\fR for 10Mbps, \fB19\fR +for 100Mbps, \fB4\fR for 1Gbps, and \fB2\fR for 10Gbps. Valid values range from +1 to 65535. +.RE + +.sp +.ne 2 +.na +\fB\fBstp_edge\fR\fR +.ad +.sp .6 +.RS 4n +Enables or disables bridge edge port detection. If set to \fB0\fR (false), the +system assumes that the port is connected to other bridges even if no bridge +PDUs of any type are seen. The default value is \fB1\fR, which detects edge +ports automatically. +.RE + +.sp +.ne 2 +.na +\fB\fBstp_p2p\fR\fR +.ad +.sp .6 +.RS 4n +Sets bridge point-to-point operation mode. Possible values are \fBtrue\fR, +\fBfalse\fR, and \fBauto\fR. When set to \fBauto\fR, point-to-point connections +are automatically discovered. When set to \fBtrue\fR, the port mode is forced +to use point-to-point. When set to \fBfalse\fR, the port mode is forced to use +normal multipoint mode. The default value is \fBauto\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBstp_mcheck\fR\fR +.ad +.sp .6 +.RS 4n +Triggers the system to run the RSTP \fBForce BPDU Migration Check\fR procedure +on this link. The procedure is triggered by setting the property value to +\fB1\fR. The property is automatically reset back to \fB0\fR. This value cannot +be set unless the following are true: +.RS +4 +.TP +.ie t \(bu +.el o +The link is bridged +.RE +.RS +4 +.TP +.ie t \(bu +.el o +The bridge is protected by Spanning Tree +.RE +.RS +4 +.TP +.ie t \(bu +.el o +The bridge \fBforce-protocol\fR value is at least 2 (RSTP) +.RE +The default value is 0. +.RE + +.sp +.ne 2 +.na +\fB\fBzone\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the zone to which the link belongs. This property can be modified +only temporarily through \fBdladm\fR, and thus the \fB-t\fR option must be +specified. To modify the zone assignment such that it persists across reboots, +please use \fBzonecfg\fR(8). Possible values consist of any exclusive-IP zone +currently running on the system. By default, the zone binding is as per +\fBzonecfg\fR(8). +.RE + +.SS "Wifi Link Properties" +The following \fBWiFi\fR link properties are supported. Note that the ability +to set a given property to a given value depends on the driver and hardware. +.sp +.ne 2 +.na +\fB\fBchannel\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the channel to use. This property can be modified only by certain +\fBWiFi\fR links when in \fBIBSS\fR mode. The default value and allowed range +of values varies by regulatory domain. +.RE + +.sp +.ne 2 +.na +\fB\fBpowermode\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the power management mode of the \fBWiFi\fR link. Possible values are +\fBoff\fR (disable power management), \fBmax\fR (maximum power savings), and +\fBfast\fR (performance-sensitive power management). Default is \fBoff\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBradio\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the radio mode of the \fBWiFi\fR link. Possible values are \fBon\fR +or \fBoff\fR. Default is \fBon\fR. +.RE + +.sp +.ne 2 +.na +\fB\fBspeed\fR\fR +.ad +.sp .6 +.RS 4n +Specifies a fixed speed for the \fBWiFi\fR link, in megabits per second. The +set of possible values depends on the driver and hardware (but is shown by +\fBshow-linkprop\fR); common speeds include 1, 2, 11, and 54. By default, there +is no fixed speed. +.RE + +.SS "Ethernet Link Properties" +The following MII Properties, as documented in \fBieee802.3\fR(7), are +supported in read-only mode: +.RS +4 +.TP +.ie t \(bu +.el o +\fBduplex\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBstate\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_autoneg_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_10gfdx_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_1000fdx_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_1000hdx_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_100fdx_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_100hdx_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_10fdx_cap\fR +.RE +.RS +4 +.TP +.ie t \(bu +.el o +\fBadv_10hdx_cap\fR +.RE +.sp +.LP +Each \fBadv_\fR property (for example, \fBadv_10fdx_cap\fR) also has a +read/write counterpart \fBen_\fR property (for example, \fBen_10fdx_cap\fR) +controlling parameters used at auto-negotiation. In the absence of Power +Management, the \fBadv\fR* speed/duplex parameters provide the values that are +both negotiated and currently effective in hardware. However, with Power +Management enabled, the speed/duplex capabilities currently exposed in hardware +might be a subset of the set of bits that were used in initial link parameter +negotiation. Thus the MII \fBadv_\fR* parameters are marked read-only, with an +additional set of \fBen_\fR* parameters for configuring speed and duplex +properties at initial negotiation. +.sp +.LP +Note that the \fBadv_autoneg_cap\fR does not have an \fBen_autoneg_cap\fR +counterpart: the \fBadv_autoneg_cap\fR is a 0/1 switch that turns off/on +auto-negotiation itself, and therefore cannot be impacted by Power Management. +.sp +.LP +In addition, the following Ethernet properties are reported: +.sp +.ne 2 +.na +\fB\fBspeed\fR\fR +.ad +.sp .6 +.RS 4n +(read-only) The operating speed of the device, in Mbps. +.RE + +.sp +.ne 2 +.na +\fB\fBmtu\fR\fR +.ad +.sp .6 +.RS 4n +The maximum client SDU (Send Data Unit) supported by the device. Valid range is +68-65536. +.RE + +.sp +.ne 2 +.na +\fB\fBflowctrl\fR\fR +.ad +.sp .6 +.RS 4n +Establishes flow-control modes that will be advertised by the device. Valid +input is one of: +.sp +.ne 2 +.na +\fB\fBno\fR\fR +.ad +.sp .6 +.RS 4n +No flow control enabled. +.RE + +.sp +.ne 2 +.na +\fB\fBrx\fR\fR +.ad +.sp .6 +.RS 4n +Receive, and act upon incoming pause frames. +.RE + +.sp +.ne 2 +.na +\fB\fBtx\fR\fR +.ad +.sp .6 +.RS 4n +Transmit pause frames to the peer when congestion occurs, but ignore received +pause frames. +.RE + +.sp +.ne 2 +.na +\fB\fBbi\fR\fR +.ad +.sp .6 +.RS 4n +Bidirectional flow control. +.RE + +Note that the actual settings for this value are constrained by the +capabilities allowed by the device and the link partner. +.RE + +.sp +.ne 2 +.na +\fB\fBen_fec_cap\fR\fR +.ad +.sp .6 +.RS 4n +Sets the Forward Error Correct (FEC) code(s) to be advertised by the +device. +Valid values are: +.sp +.ne 2 +.na +\fB\fBnone\fR\fR +.ad +.sp .6 +.RS 4n +Allow the device not to use FEC. +.RE + +.sp +.ne 2 +.na +\fB\fBauto\fR\fR +.ad +.sp .6 +.RS 4n +The device will automatically decide which FEC code to use. +.RE + +.sp +.ne 2 +.na +\fB\fBrs\fR\fR +.ad +.sp .6 +.RS 4n +Allow Reed-Solomon FEC code. +.RE + +.sp +.ne 2 +.na +\fB\fBbase-r\fR\fR +.ad +.sp .6 +.RS 4n +Allow Base-R (also known as FireCode) code. +.RE + +Valid input is either \fBauto\fR as a single value, or a comma separated +combination of \fBnone\fR, \fBrs\fR and \fBbase-r\fR. +The default value is \fBauto\fR. +.sp +.LP +Note the actual FEC settings and combinations are constrained by the +capabilities allowed by the device and the link partner. +.RE + +.sp +.ne 2 +.na +\fB\fBadv_fec_cap\fR\fR +.ad +.sp .6 +.RS 4n +(read only) The current negotiated Forward Error Correction code. +.RE + +.sp +.ne 2 +.na +\fB\fBsecondary-macs\fR\fR +.ad +.sp .6 +.RS 4n +A comma-separated list of additional MAC addresses that are allowed on the +interface. +.RE + +.sp +.ne 2 +.na +\fB\fBtagmode\fR\fR +.ad +.sp .6 +.RS 4n +This link property controls the conditions in which 802.1Q VLAN tags will be +inserted in packets being transmitted on the link. Two mode values can be +assigned to this property: +.sp +.ne 2 +.na +\fB\fBnormal\fR\fR +.ad +.RS 12n +Insert a VLAN tag in outgoing packets under the following conditions: +.RS +4 +.TP +.ie t \(bu +.el o +The packet belongs to a VLAN. +.RE +.RS +4 +.TP +.ie t \(bu +.el o +The user requested priority tagging. +.RE +.RE + +.sp +.ne 2 +.na +\fB\fBvlanonly\fR\fR +.ad +.RS 12n +Insert a VLAN tag only when the outgoing packet belongs to a VLAN. If a tag is +being inserted in this mode and the user has also requested a non-zero +priority, the priority is honored and included in the VLAN tag. +.RE + +The default value is \fBvlanonly\fR. +.RE + +.SS "IP Tunnel Link Properties" +The following IP tunnel link properties are supported. +.sp +.ne 2 +.na +\fB\fBhoplimit\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the IPv4 TTL or IPv6 hop limit for the encapsulating outer IP header +of a tunnel link. This property exists for all tunnel types. The default value +is 64. +.RE + +.sp +.ne 2 +.na +\fB\fBencaplimit\fR\fR +.ad +.sp .6 +.RS 4n +Specifies the IPv6 encapsulation limit for an IPv6 tunnel as defined in RFC +2473. This value is the tunnel nesting limit for a given tunneled packet. The +default value is 4. A value of 0 disables the encapsulation limit. +.RE + +.SH EXAMPLES +\fBExample 1 \fRConfiguring an Aggregation +.sp +.LP +To configure a data-link over an aggregation of devices \fBbge0\fR and +\fBbge1\fR with key 1, enter the following command: + +.sp +.in +2 +.nf +# \fBdladm create-aggr -d bge0 -d bge1 1\fR +.fi +.in -2 +.sp + +.LP +\fBExample 2 \fRConnecting to a WiFi Link +.sp +.LP +To connect to the most optimal available unsecured network on a system with a +single \fBWiFi\fR link (as per the prioritization rules specified for +\fBconnect-wifi\fR), enter the following command: + +.sp +.in +2 +.nf +# \fBdladm connect-wifi\fR +.fi +.in -2 +.sp + +.LP +\fBExample 3 \fRCreating a WiFi Key +.sp +.LP +To interactively create the \fBWEP\fR key \fBmykey\fR, enter the following +command: + +.sp +.in +2 +.nf +# \fBdladm create-secobj -c wep mykey\fR +.fi +.in -2 +.sp + +.sp +.LP +Alternatively, to non-interactively create the \fBWEP\fR key \fBmykey\fR using +the contents of a file: + +.sp +.in +2 +.nf +# \fBumask 077\fR + # \fBcat >/tmp/mykey.$$ <<EOF\fR + \fB12345\fR + \fBEOF\fR + # \fBdladm create-secobj -c wep -f /tmp/mykey.$$ mykey\fR + # \fBrm /tmp/mykey.$$\fR +.fi +.in -2 +.sp + +.LP +\fBExample 4 \fRConnecting to a Specified Encrypted WiFi Link +.sp +.LP +To use key \fBmykey\fR to connect to \fBESSID\fR \fBwlan\fR on link \fBath0\fR, +enter the following command: + +.sp +.in +2 +.nf +# \fBdladm connect-wifi -k mykey -e wlan ath0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 5 \fRChanging a Link Property +.sp +.LP +To set \fBpowermode\fR to the value \fBfast\fR on link \fBpcwl0\fR, enter the +following command: + +.sp +.in +2 +.nf +# \fBdladm set-linkprop -p powermode=fast pcwl0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 6 \fRConnecting to a WPA-Protected WiFi Link +.sp +.LP +Create a WPA key \fBpsk\fR and enter the following command: + +.sp +.in +2 +.nf +# \fBdladm create-secobj -c wpa psk\fR +.fi +.in -2 +.sp + +.sp +.LP +To then use key \fBpsk\fR to connect to ESSID \fBwlan\fR on link \fBath0\fR, +enter the following command: + +.sp +.in +2 +.nf +# \fBdladm connect-wifi -k psk -e wlan ath0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 7 \fRRenaming a Link +.sp +.LP +To rename the \fBbge0\fR link to \fBmgmt0\fR, enter the following command: + +.sp +.in +2 +.nf +# \fBdladm rename-link bge0 mgmt0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 8 \fRReplacing a Network Card +.sp +.LP +Consider that the \fBbge0\fR device, whose link was named \fBmgmt0\fR as shown +in the previous example, needs to be replaced with a \fBce0\fR device because +of a hardware failure. The \fBbge0\fR NIC is physically removed, and replaced +with a new \fBce0\fR NIC. To associate the newly added \fBce0\fR device with +the \fBmgmt0\fR configuration previously associated with \fBbge0\fR, enter the +following command: + +.sp +.in +2 +.nf +# \fBdladm rename-link ce0 mgmt0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 9 \fRRemoving a Network Card +.sp +.LP +Suppose that in the previous example, the intent is not to replace the +\fBbge0\fR NIC with another NIC, but rather to remove and not replace the +hardware. In that case, the \fBmgmt0\fR datalink configuration is not slated to +be associated with a different physical device as shown in the previous +example, but needs to be deleted. Enter the following command to delete the +datalink configuration associated with the \fBmgmt0\fR datalink, whose physical +hardware (\fBbge0\fR in this case) has been removed: + +.sp +.in +2 +.nf +# \fBdladm delete-phys mgmt0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 10 \fRUsing Parsable Output to Capture a Single Field +.sp +.LP +The following assignment saves the MTU of link \fBnet0\fR to a variable named +\fBmtu\fR. + +.sp +.in +2 +.nf +# \fBmtu=`dladm show-link -p -o mtu net0`\fR +.fi +.in -2 +.sp + +.LP +\fBExample 11 \fRUsing Parsable Output to Iterate over Links +.sp +.LP +The following script displays the state of each link on the system. + +.sp +.in +2 +.nf +# \fBdladm show-link -p -o link,state | while IFS=: read link state; do + print "Link $link is in state $state" + done\fR +.fi +.in -2 +.sp + +.LP +\fBExample 12 \fRConfiguring VNICs +.sp +.LP +Create two VNICs with names \fBhello0\fR and \fBtest1\fR over a single physical +link \fBbge0\fR: + +.sp +.in +2 +.nf +# \fBdladm create-vnic -l bge0 hello0\fR +# \fBdladm create-vnic -l bge0 test1\fR +.fi +.in -2 +.sp + +.LP +\fBExample 13 \fRConfiguring VNICs and Allocating Bandwidth and Priority +.sp +.LP +Create two VNICs with names \fBhello0\fR and \fBtest1\fR over a single physical +link \fBbge0\fR and make \fBhello0\fR a high priority VNIC with a +factory-assigned MAC address with a maximum bandwidth of 50 Mbps. Make +\fBtest1\fR a low priority VNIC with a random MAC address and a maximum +bandwidth of 100Mbps. + +.sp +.in +2 +.nf +# \fBdladm create-vnic -l bge0 -m factory -p maxbw=50,priority=high hello0\fR +# \fBdladm create-vnic -l bge0 -m random -p maxbw=100M,priority=low test1\fR +.fi +.in -2 +.sp + +.LP +\fBExample 14 \fRConfiguring a VNIC with a Factory MAC Address +.sp +.LP +First, list the available factory MAC addresses and choose one of them: + +.sp +.in +2 +.nf +# \fBdladm show-phys -m bge0\fR +LINK SLOT ADDRESS INUSE CLIENT +bge0 primary 0:e0:81:27:d4:47 yes bge0 +bge0 1 8:0:20:fe:4e:a5 no +bge0 2 8:0:20:fe:4e:a6 no +bge0 3 8:0:20:fe:4e:a7 no +.fi +.in -2 +.sp + +.sp +.LP +Create a VNIC named \fBhello0\fR and use slot 1's address: + +.sp +.in +2 +.nf +# \fBdladm create-vnic -l bge0 -m factory -n 1 hello0\fR +# \fBdladm show-phys -m bge0\fR +LINK SLOT ADDRESS INUSE CLIENT +bge0 primary 0:e0:81:27:d4:47 yes bge0 +bge0 1 8:0:20:fe:4e:a5 yes hello0 +bge0 2 8:0:20:fe:4e:a6 no +bge0 3 8:0:20:fe:4e:a7 no +.fi +.in -2 +.sp + +.LP +\fBExample 15 \fRCreating a VNIC with User-Specified MAC Address, Binding it to +Set of Processors +.sp +.LP +Create a VNIC with name \fBhello0\fR, with a user specified MAC address, and a +processor binding \fB0, 1, 2, 3\fR. + +.sp +.in +2 +.nf +# \fBdladm create-vnic -l bge0 -m 8:0:20:fe:4e:b8 -p cpus=0,1,2,3 hello0\fR +.fi +.in -2 +.sp + +.LP +\fBExample 16 \fRCreating a Virtual Network Without a Physical NIC +.sp +.LP +First, create an etherstub with name \fBstub1\fR: + +.sp +.in +2 +.nf +# \fBdladm create-etherstub stub1\fR +.fi +.in -2 +.sp + +.sp +.LP +Create two VNICs with names \fBhello0\fR and \fBtest1\fR on the etherstub. This +operation implicitly creates a virtual switch connecting \fBhello0\fR and +\fBtest1\fR. + +.sp +.in +2 +.nf +# \fBdladm create-vnic -l stub1 hello0\fR +# \fBdladm create-vnic -l stub1 test1\fR +.fi +.in -2 +.sp + +.LP +\fBExample 17 \fRShowing Network Usage +.sp +.LP +Network usage statistics can be stored using the extended accounting facility, +\fBacctadm\fR(8). + +.sp +.in +2 +.nf +# \fBacctadm -e basic -f /var/log/net.log net\fR +# \fBacctadm net\fR + Network accounting: active + Network accounting file: /var/log/net.log + Tracked Network resources: basic + Untracked Network resources: src_ip,dst_ip,src_port,dst_port,protocol, + dsfield +.fi +.in -2 +.sp + +.sp +.LP +The saved historical data can be retrieved in summary form using the +\fBshow-usage\fR subcommand: + +.sp +.in +2 +.nf +# \fBdladm show-usage -f /var/log/net.log\fR +LINK DURATION IPACKETS RBYTES OPACKETS OBYTES BANDWIDTH +e1000g0 80 1031 546908 0 0 2.44 Kbps +.fi +.in -2 +.sp + +.LP +\fBExample 18 \fRDisplaying Bridge Information +.sp +.LP +The following commands use the \fBshow-bridge\fR subcommand with no and various +options. + +.sp +.in +2 +.nf +# \fBdladm show-bridge\fR +BRIDGE PROTECT ADDRESS PRIORITY DESROOT +foo stp 32768/8:0:20:bf:f 32768 8192/0:d0:0:76:14:38 +bar stp 32768/8:0:20:e5:8 32768 8192/0:d0:0:76:14:38 + +# \fBdladm show-bridge -l foo\fR +LINK STATE UPTIME DESROOT +hme0 forwarding 117 8192/0:d0:0:76:14:38 +qfe1 forwarding 117 8192/0:d0:0:76:14:38 + +# \fBdladm show-bridge -s foo\fR +BRIDGE DROPS FORWARDS +foo 0 302 + +# \fBdladm show-bridge -ls foo\fR +LINK DROPS RECV XMIT +hme0 0 360832 31797 +qfe1 0 322311 356852 + +# \fBdladm show-bridge -f foo\fR +DEST AGE FLAGS OUTPUT +8:0:20:bc:a7:dc 10.860 -- hme0 +8:0:20:bf:f9:69 -- L hme0 +8:0:20:c0:20:26 17.420 -- hme0 +8:0:20:e5:86:11 -- L qfe1 +.fi +.in -2 +.sp + +.LP +\fBExample 19 \fRCreating an IPv4 Tunnel +.sp +.LP +The following sequence of commands creates and then displays a persistent IPv4 +tunnel link named \fBmytunnel0\fR between 66.1.2.3 and 192.4.5.6: + +.sp +.in +2 +.nf +# \fBdladm create-iptun -T ipv4 -s 66.1.2.3 -d 192.4.5.6 mytunnel0\fR +# \fBdladm show-iptun mytunnel0\fR +LINK TYPE FLAGS SOURCE DESTINATION +mytunnel0 ipv4 -- 66.1.2.3 192.4.5.6 +.fi +.in -2 +.sp + +.sp +.LP +A point-to-point IP interface can then be created over this tunnel link: + +.sp +.in +2 +.nf +# \fBifconfig mytunnel0 plumb 10.1.0.1 10.1.0.2 up\fR +.fi +.in -2 +.sp + +.sp +.LP +As with any other IP interface, configuration persistence for this IP interface +is achieved by placing the desired \fBifconfig\fR commands (in this case, the +command for "\fB10.1.0.1 10.1.0.2\fR") into \fB/etc/hostname.mytunnel0\fR. + +.LP +\fBExample 20 \fRCreating a 6to4 Tunnel +.sp +.LP +The following command creates a 6to4 tunnel link. The IPv4 address of the 6to4 +router is 75.10.11.12. + +.sp +.in +2 +.nf +# \fBdladm create-iptun -T 6to4 -s 75.10.11.12 sitetunnel0\fR +# \fBdladm show-iptun sitetunnel0\fR +LINK TYPE FLAGS SOURCE DESTINATION +sitetunnel0 6to4 -- 75.10.11.12 -- +.fi +.in -2 +.sp + +.sp +.LP +The following command plumbs an IPv6 interface on this tunnel: + +.sp +.in +2 +.nf +# \fBifconfig sitetunnel0 inet6 plumb up\fR +# \fBifconfig sitetunnel0 inet6\fR +sitetunnel0: flags=2200041 <UP,RUNNING,NONUD,IPv6> mtu 65515 index 3 + inet tunnel src 75.10.11.12 + tunnel hop limit 64 + inet6 2002:4b0a:b0c::1/16 +.fi +.in -2 +.sp + +.sp +.LP +Note that the system automatically configures the IPv6 address on the 6to4 IP +interface. See \fBifconfig\fR(8) for a description of how IPv6 addresses are +configured on 6to4 tunnel links. + +.SH ATTRIBUTES +See \fBattributes\fR(7) for descriptions of the following attributes: +.sp +.LP +\fB/usr/sbin\fR +.sp + +.sp +.TS +box; +c | c +l | l . +ATTRIBUTE TYPE ATTRIBUTE VALUE +_ +Interface Stability Committed +.TE + +.sp +.LP +\fB/sbin\fR +.sp + +.sp +.TS +box; +c | c +l | l . +ATTRIBUTE TYPE ATTRIBUTE VALUE +_ +Interface Stability Committed +.TE + +.SH SEE ALSO +.BR dlpi (4P), +.BR attributes (7), +.BR ieee802.3 (7), +.BR overlay (7), +.BR acctadm (8), +.BR autopush (8), +.BR ifconfig (8), +.BR ipsecconf (8), +.BR ndd (8), +.BR psrset (8), +.BR wpad (8), +.BR zonecfg (8) +.sp +.LP +R. Droms, Ed., J. Bound, B. Volz, T. Lemon, C. Perkins, M. Carney. \fIRFC 3315: +Dynamic Host Configuration Protocol for IPv6 (DHCPv6)\fR. The Internet Society. +July 2003. +.sp +.LP +T. Lemon, B. Sommerfeld. February 2006. \fIRFC 4361: Node-specific Client +Identifiers for Dynamic Host Configuration Protocol Version Four (DHCPv4)\fR. +The Internet Society. January 2006. +.SH NOTES +The preferred method of referring to an aggregation in the aggregation +subcommands is by its link name. Referring to an aggregation by its integer +\fIkey\fR is supported for backward compatibility, but is not necessary. When +creating an aggregation, if a \fIkey\fR is specified instead of a link name, +the aggregation's link name will be automatically generated by \fBdladm\fR as +\fBaggr\fR\fIkey\fR. |
