1 .\" Copyright (c) 1983, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" From: @(#)ifconfig.8 8.3 (Berkeley) 1/5/94
36 .Nd configure network interface parameters
39 .Op Fl f Ar type:format Ns Op Ar ,type:format
81 utility is used to assign an address
82 to a network interface and/or configure
83 network interface parameters.
86 utility must be used at boot time to define the network address
87 of each interface present on a machine; it may also be used at
88 a later time to redefine an interface's address
89 or other operating parameters.
91 The following options are available:
92 .Bl -tag -width indent
95 .Tn DARPA Ns -Internet
97 the address is either a host name present in the host name data
102 Internet address expressed in the Internet standard
105 It is also possible to use the CIDR notation (also known as the
106 slash notation) to include the netmask.
107 That is, one can specify an address like
112 family, it is also possible to specify the prefix length using the slash
117 parameter below for more information.
118 .\" For the Xerox Network Systems(tm) family,
120 .\" .Ar net:a.b.c.d.e.f ,
123 .\" is the assigned network number (in decimal),
124 .\" and each of the six bytes of the host number,
128 .\" are specified in hexadecimal.
129 .\" The host number may be omitted on IEEE 802 protocol
130 .\" (Ethernet, FDDI, and Token Ring) interfaces,
131 .\" which use the hardware physical address,
132 .\" and on interfaces other than the first.
135 .\" family, addresses are specified as a long hexadecimal string,
136 .\" as in the Xerox family.
137 .\" However, two consecutive dots imply a zero
138 .\" byte, and the dots are optional, if the user wishes to (carefully)
139 .\" count out long strings of digits in network byte order.
144 is specified as a series of colon-separated hex digits.
145 This can be used to, for example,
146 set a new MAC address on an Ethernet interface, though the
147 mechanism used is not Ethernet specific.
150 keyword to set a randomly generated MAC address.
151 A randomly-generated MAC address might be the same as one already in use
153 Such duplications are extremely unlikely.
154 If the interface is already
155 up when this option is used, it will be briefly brought down and
156 then brought back up again in order to ensure that the receive
157 filter in the underlying Ethernet hardware is properly reprogrammed.
158 .It Ar address_family
161 which affects interpretation of the remaining parameters.
162 Since an interface can receive transmissions in differing protocols
163 with different naming schemes, specifying the address family is recommended.
164 The address or protocol families currently
170 The default if available is
183 address family has special meaning and is no longer synonymous with
189 will list only Ethernet interfaces, excluding all other interface types,
190 including the loopback interface.
192 Specify the address of the correspondent on the other end
193 of a point to point link.
196 parameter is a string of the form
201 List the interfaces in the given group.
206 can be controlled using the
210 environment variable.
211 The format is specified as a comma separated list of
216 section for more information.
222 .Bl -tag -width ether
224 Adjust the display of inet and inet6 addresses
225 .Bl -tag -width default
227 Display inet and inet6 addresses in the default format,
230 Display inet and inet6 addresses as fully qualified domain names
233 Display inet and inet6 addresses as unqualified hostnames
235 Display inet and inet6 addresses in numeric format
238 Adjust the display of link-level ethernet (MAC) addresses
239 .Bl -tag -width default
241 Separate address segments with a colon
243 Separate address segments with a dash
245 Display ethernet addresses in the default format,
249 Adjust the display of inet address subnet masks:
250 .Bl -tag -width default
252 Display subnet masks in CIDR notation, for example:
254 10.0.0.0/8 or 203.0.113.224/26
256 Display subnet masks in the default format,
259 Display subnet masks in dotted quad notation, for example:
261 255.255.0.0 or 255.255.255.192
263 Display subnet masks in hexadecimal, for example:
265 0xffff0000 or 0xffffffc0
268 Adjust the display of inet6 address prefixes (subnet masks):
269 .Bl -tag -width default
271 Display subnet prefix in CIDR notation, for example:
273 ::1/128 or fe80::1%lo0/64
275 Display subnet prefix in the default format
278 Display subnet prefix in integer format, for example:
284 The following parameters may be set with
286 .Bl -tag -width indent
291 Introduced for compatibility
295 Establish an additional network address for this interface.
296 This is sometimes useful when changing network numbers, and
297 one wishes to accept packets addressed to the old interface.
298 If the address is on the same subnet as the first network address
299 for this interface, a non-conflicting netmask must be given.
304 Remove the network address specified.
305 This would be used if you incorrectly specified an alias, or it
306 was no longer needed.
307 If you have incorrectly set an NS address having the side effect
308 of specifying the host portion, removing all NS addresses will
309 allow you to respecify the host portion.
312 Specify that the address configured is an anycast address.
313 Based on the current specification,
314 only routers may configure anycast addresses.
315 Anycast address will not be used as source address of any of outgoing
318 Enable the use of the Address Resolution Protocol
321 between network level addresses and link level addresses (default).
322 This is currently implemented for mapping between
327 802 48-bit MAC addresses (Ethernet, FDDI, and Token Ring addresses).
329 Disable the use of the Address Resolution Protocol
332 If the Address Resolution Protocol is enabled,
333 the host will only reply to requests for its addresses,
334 and will never send any requests.
336 If the Address Resolution Protocol is enabled,
337 the host will perform normally,
338 sending out requests and listening for replies.
341 Specify the address to use to represent broadcasts to the
343 The default broadcast address is the address with a host part of all 1's.
345 Enable driver dependent debugging code; usually, this turns on
346 extra console error logging.
348 Disable driver dependent debugging code.
350 Put interface into permanently promiscuous mode.
352 Disable permanently promiscuous mode.
357 .It Cm description Ar value , Cm descr Ar value
358 Specify a description of the interface.
359 This can be used to label interfaces in situations where they may
360 otherwise be difficult to distinguish.
361 .It Cm -description , Cm -descr
362 Clear the interface description.
366 When an interface is marked
368 the system will not attempt to
369 transmit messages through that interface.
370 If possible, the interface will be reset to disable reception as well.
371 This action does not automatically disable routes using the interface.
372 .It Cm group Ar groupname
373 Assign the interface to a
375 Any interface can be in multiple groups.
377 Cloned interfaces are members of their interface family group by default.
378 For example, a PPP interface such as
380 is a member of the PPP interface family group,
382 .\" The interface(s) the default route(s) point to are members of the
385 .It Cm -group Ar groupname
386 Remove the interface from the given
391 (lowermost 64bit of an IPv6 address)
393 .It Cm fib Ar fib_number
394 Specify interface FIB.
397 is assigned to all frames or packets received on that interface.
398 The FIB is not inherited, e.g., vlans or other sub-interfaces will use
399 the default FIB (0) irrespective of the parent interface's FIB.
400 The kernel needs to be tuned to support more than the default FIB
403 kernel configuration option, or the
406 .It Cm tunnelfib Ar fib_number
410 is assigned to all packets encapsulated by tunnel interface, e.g.,
414 .It Cm maclabel Ar label
415 If Mandatory Access Control support is enabled in the kernel,
419 .\" .Xr maclabel 7 ) .
421 If the driver supports the media selection system, set the media type
424 Some interfaces support the mutually exclusive use of one of several
425 different physical media connectors.
426 For example, a 10Mbit/s Ethernet
427 interface might support the use of either
429 or twisted pair connectors.
430 Setting the media type to
432 would change the currently active connector to the AUI port.
435 would activate twisted pair.
436 Refer to the interfaces' driver
437 specific documentation or man page for a complete list of the
439 .It Cm mediaopt Ar opts
440 If the driver supports the media selection system, set the specified
441 media options on the interface.
445 is a comma delimited list of options to apply to the interface.
446 Refer to the interfaces' driver specific man page for a complete
447 list of available options.
448 .It Fl mediaopt Ar opts
449 If the driver supports the media selection system, disable the
450 specified media options on the interface.
452 If the driver supports the media selection system, set the specified
453 operating mode on the interface to
455 For IEEE 802.11 wireless interfaces that support multiple operating modes
456 this directive is used to select between 802.11a
464 Set if the driver supports TX rate limiting.
465 .It Cm inst Ar minst , Cm instance Ar minst
466 Set the media instance to
468 This is useful for devices which have multiple physical layer interfaces
471 Set the interface name to
473 .It Cm rxcsum , txcsum , rxcsum6 , txcsum6
474 If the driver supports user-configurable checksum offloading,
475 enable receive (or transmit) checksum offloading on the interface.
476 The feature can be turned on selectively per protocol family.
478 .Cm rxcsum6 , txcsum6
484 Some drivers may not be able to enable these flags independently
485 of each other, so setting one may also set the other.
486 The driver will offload as much checksum work as it can reliably
487 support, the exact level of offloading varies between drivers.
488 .It Fl rxcsum , txcsum , rxcsum6 , txcsum6
489 If the driver supports user-configurable checksum offloading,
490 disable receive (or transmit) checksum offloading on the interface.
491 The feature can be turned off selectively per protocol family.
493 .Fl rxcsum6 , txcsum6
499 These settings may not always be independent of each other.
501 If the driver supports
503 segmentation offloading, enable TSO on the interface.
504 Some drivers may not be able to support TSO for
508 packets, so they may enable only one of them.
510 If the driver supports
512 segmentation offloading, disable TSO on the interface.
513 It will always disable TSO for
518 If the driver supports
520 segmentation offloading for
524 use one of these to selectively enabled it only for one protocol family.
526 If the driver supports
528 segmentation offloading for
532 use one of these to selectively disable it only for one protocol family.
534 If the driver supports
536 large receive offloading, enable LRO on the interface.
538 If the driver supports
540 large receive offloading, disable LRO on the interface.
542 Transmit TLS offload encrypts Transport Layer Security (TLS) records and
543 segments the encrypted record into one or more
549 If the driver supports transmit TLS offload,
550 enable transmit TLS offload on the interface.
551 Some drivers may not be able to support transmit TLS offload for
555 packets, so they may enable only one of them.
557 If the driver supports transmit TLS offload,
558 disable transmit TLS offload on the interface.
559 It will always disable TLS for
564 If the driver supports unmapped network buffers,
565 enable them on the interface.
567 If the driver supports unmapped network buffers,
568 disable them on the interface.
569 .It Cm wol , wol_ucast , wol_mcast , wol_magic
570 Enable Wake On Lan (WOL) support, if available.
571 WOL is a facility whereby a machine in a low power state may be woken
572 in response to a received packet.
573 There are three types of packets that may wake a system:
574 ucast (directed solely to the machine's mac address),
575 mcast (directed to a broadcast or multicast address),
577 magic (unicast or multicast frames with a ``magic contents'').
578 Not all devices support WOL, those that do indicate the mechanisms
579 they support in their capabilities.
581 is a synonym for enabling all available WOL mechanisms.
584 .It Cm vlanmtu , vlanhwtag, vlanhwfilter, vlanhwcsum, vlanhwtso
585 If the driver offers user-configurable VLAN support, enable
586 reception of extended frames, tag processing in hardware,
587 frame filtering in hardware, checksum offloading, or TSO on VLAN,
589 Note that this must be issued on a physical interface associated with
594 .It Fl vlanmtu , vlanhwtag, vlanhwfilter, vlanhwtso
595 If the driver offers user-configurable VLAN support, disable
596 reception of extended frames, tag processing in hardware,
597 frame filtering in hardware, or TSO on VLAN,
600 Move the interface to the
602 specified by name or JID.
603 If the jail has a virtual network stack, the interface will disappear
604 from the current environment and become visible to the jail.
606 Reclaim the interface from the
608 specified by name or JID.
609 If the jail has a virtual network stack, the interface will disappear
610 from the jail, and become visible to the current network environment.
614 feature and disable interrupts on the interface, if driver supports
619 feature and enable interrupt mode on the interface.
621 Create the specified network pseudo-device.
622 If the interface is given without a unit number, try to create a new
623 device with an arbitrary unit number.
624 If creation of an arbitrary device is successful, the new device name is
625 printed to standard output unless the interface is renamed or destroyed
630 Destroy the specified network pseudo-device.
646 Set the routing metric of the interface to
649 The routing metric is used by the routing protocol
651 Higher metrics have the effect of making a route
652 less favorable; metrics are counted as additional hops
653 to the destination network or host.
655 Set the maximum transmission unit of the interface to
657 default is interface specific.
658 The MTU is used to limit the size of packets that are transmitted on an
660 Not all interfaces support setting the MTU, and some interfaces have
662 .It Cm netmask Ar mask
665 Specify how much of the address to reserve for subdividing
666 networks into sub-networks.
667 The mask includes the network part of the local address
668 and the subnet part, which is taken from the host field of the address.
669 The mask can be specified as a single hexadecimal number
672 with a dot-notation Internet address,
673 or with a pseudo-network name listed in the network table
675 The mask contains 1's for the bit positions in the 32-bit address
676 which are to be used for the network and subnet parts,
677 and 0's for the host part.
678 The mask should contain at least the standard network portion,
679 and the subnet field should be contiguous with the network
682 The netmask can also be specified in CIDR notation after the address.
685 option above for more information.
686 .It Cm prefixlen Ar len
690 bits are reserved for subdividing networks into sub-networks.
693 must be integer, and for syntactical reason it must be between 0 to 128.
694 It is almost always 64 under the current IPv6 assignment rule.
695 If the parameter is omitted, 64 is used.
697 The prefix can also be specified using the slash notation after the address.
700 option above for more information.
705 Introduced for compatibility
709 .It Cm link Op Cm 0 No - Cm 2
711 Enable special processing of the link level of the interface.
712 These three options are interface specific in actual effect, however,
713 they are in general used to select special modes of operation.
715 of this is to enable SLIP compression, or to select the connector type
716 for some Ethernet cards.
717 Refer to the man page for the specific driver
718 for more information.
720 .It Fl link Op Cm 0 No - Cm 2
722 Disable special processing at the link level with the specified interface.
724 Put the interface in monitor mode.
725 No packets are transmitted, and received packets are discarded after
729 Take the interface out of monitor mode.
730 .It Cm pcp Ar priority_code_point
733 is an 3-bit field which refers to the IEEE 802.1p
734 class of service and maps to the frame priority level.
736 Stop tagging packets on the interface w/ the priority code point.
740 This may be used to enable an interface after an
742 It happens automatically when setting the first address on an interface.
743 If the interface was reset when previously marked down,
744 the hardware will be re-initialized.
747 The following parameters are for ICMPv6 Neighbor Discovery Protocol.
748 Note that the address family keyword
751 .Bl -tag -width indent
753 Set a flag to enable accepting ICMPv6 Router Advertisement messages.
757 .Va net.inet6.ip6.accept_rtadv
758 controls whether this flag is set by default or not.
763 Set a flag to control whether routers from which the system accepts
764 Router Advertisement messages will be added to the Default Router List
768 flag is disabled, this flag has no effect.
772 .Va net.inet6.ip6.no_radr
773 controls whether this flag is set by default or not.
777 .It Cm auto_linklocal
778 Set a flag to perform automatic link-local address configuration when
779 the interface becomes available.
783 .Va net.inet6.ip6.auto_linklocal
784 controls whether this flag is set by default or not.
785 .It Cm -auto_linklocal
789 Set the specified interface as the default route when there is no
795 Set a flag to disable all of IPv6 network communications on the
797 Note that if there are already configured IPv6
798 addresses on that interface, all of them are marked as
800 and DAD will be performed when this flag is cleared.
804 When this flag is cleared and
806 flag is enabled, automatic configuration of a link-local address is
809 Set a flag to enable Neighbor Unreachability Detection.
813 .It Cm no_prefer_iface
814 Set a flag to not honor rule 5 of source address selection in RFC 3484.
815 In practice this means the address on the outgoing interface will not be
816 preferred, effectively yielding the decision to the address selection
817 policy table, configurable with
819 .It Cm -no_prefer_iface
821 .Cm no_prefer_iface .
823 Set a flag to disable Duplicate Address Detection.
829 The following parameters are specific for IPv6 addresses.
830 Note that the address family keyword
833 .Bl -tag -width indent
835 Set the IPv6 autoconfigured address bit.
837 Clear the IPv6 autoconfigured address bit.
839 Set the IPv6 deprecated address bit.
841 Clear the IPv6 deprecated address bit.
843 Set preferred lifetime for the address.
845 Set a flag to prefer address as a candidate of the source address for
847 .It Cm -prefer_source
851 Set valid lifetime for the address.
854 The following parameters are specific to cloning
855 IEEE 802.11 wireless interfaces with the
858 .Bl -tag -width indent
859 .It Cm wlandev Ar device
862 as the parent for the cloned device.
863 .It Cm wlanmode Ar mode
864 Specify the operating mode for this cloned device.
882 The operating mode of a cloned interface cannot be changed.
885 mode is actually implemented as an
887 interface with special properties.
888 .It Cm wlanbssid Ar bssid
889 The 802.11 mac address to use for the bssid.
890 This must be specified at create time for a legacy
893 .It Cm wlanaddr Ar address
894 The local mac address.
895 If this is not specified then a mac address will automatically be assigned
896 to the cloned device.
897 Typically this address is the same as the address of the parent device
900 parameter is specified then the driver will craft a unique address for
901 the device (if supported).
905 device as operating in ``legacy mode''.
908 devices have a fixed peer relationship and do not, for example, roam
909 if their peer stops communicating.
910 For completeness a Dynamic WDS (DWDS) interface may marked as
913 Request a unique local mac address for the cloned device.
914 This is only possible if the device supports multiple mac addresses.
915 To force use of the parent's mac address use
918 Mark the cloned interface as depending on hardware support to
919 track received beacons.
920 To have beacons tracked in software use
926 can also be used to indicate no beacons should
927 be transmitted; this can be useful when creating a WDS configuration but
929 interfaces can only be created as companions to an access point.
932 The following parameters are specific to IEEE 802.11 wireless interfaces
936 .Bl -tag -width indent
938 Enable sending and receiving AMPDU frames when using 802.11n (default).
939 The 802.11n specification states a compliant station must be capable
940 of receiving AMPDU frames but transmission is optional.
943 to disable all use of AMPDU with 802.11n.
944 For testing and/or to work around interoperability problems one can use
948 to control use of AMPDU in one direction.
949 .It Cm ampdudensity Ar density
950 Set the AMPDU density parameter used when operating with 802.11n.
951 This parameter controls the inter-packet gap for AMPDU frames.
952 The sending device normally controls this setting but a receiving station
953 may request wider gaps.
956 are 0, .25, .5, 1, 2, 4, 8, and 16 (microseconds).
959 is treated the same as 0.
960 .It Cm ampdulimit Ar limit
961 Set the limit on packet size for receiving AMPDU frames when operating
965 are 8192, 16384, 32768, and 65536 but one can also specify
966 just the unique prefix: 8, 16, 32, 64.
967 Note the sender may limit the size of AMPDU frames to be less
968 than the maximum specified by the receiving station.
970 Enable sending and receiving AMSDU frames when using 802.11n.
971 By default AMSDU is received but not transmitted.
974 to disable all use of AMSDU with 802.11n.
975 For testing and/or to work around interoperability problems one can use
979 to control use of AMSDU in one direction.
980 .It Cm amsdulimit Ar limit
981 Set the limit on packet size for sending and receiving AMSDU frames
982 when operating with 802.11n.
985 are 7935 and 3839 (bytes).
986 Note the sender may limit the size of AMSDU frames to be less
987 than the maximum specified by the receiving station.
988 Note also that devices are not required to support the 7935 limit,
989 only 3839 is required by the specification and the larger value
990 may require more memory to be dedicated to support functionality
993 When operating as an access point, pass packets between
994 wireless clients directly (default).
995 To instead let them pass up through the
996 system and be forwarded using some other mechanism, use
998 Disabling the internal bridging
999 is useful when traffic is to be processed with
1001 .It Cm authmode Ar mode
1002 Set the desired authentication mode in infrastructure mode.
1003 Not all adapters support all modes.
1006 .Cm none , open , shared
1012 (IEEE WPA/WPA2/802.11i).
1017 modes are only useful when using an authentication service
1018 (a supplicant for client operation or an authenticator when
1019 operating as an access point).
1020 Modes are case insensitive.
1022 Enable background scanning when operating as a station.
1023 Background scanning is a technique whereby a station associated to
1024 an access point will temporarily leave the channel to scan for
1025 neighboring stations.
1026 This allows a station to maintain a cache of nearby access points
1027 so that roaming between access points can be done without
1028 a lengthy scan operation.
1029 Background scanning is done only when a station is not busy and
1030 any outbound traffic will cancel a scan operation.
1031 Background scanning should never cause packets to be lost though
1032 there may be some small latency if outbound traffic interrupts a
1034 By default background scanning is enabled if the device is capable.
1035 To disable background scanning, use
1037 Background scanning is controlled by the
1042 Background scanning must be enabled for roaming; this is an artifact
1043 of the current implementation and may not be required in the future.
1044 .It Cm bgscanidle Ar idletime
1045 Set the minimum time a station must be idle (not transmitting or
1046 receiving frames) before a background scan is initiated.
1049 parameter is specified in milliseconds.
1050 By default a station must be idle at least 250 milliseconds before
1051 a background scan is initiated.
1052 The idle time may not be set to less than 100 milliseconds.
1053 .It Cm bgscanintvl Ar interval
1054 Set the interval at which background scanning is attempted.
1057 parameter is specified in seconds.
1058 By default a background scan is considered every 300 seconds (5 minutes).
1061 may not be set to less than 15 seconds.
1062 .It Cm bintval Ar interval
1063 Set the interval at which beacon frames are sent when operating in
1067 parameter is specified in TU's (1024 usecs).
1068 By default beacon frames are transmitted every 100 TU's.
1069 .It Cm bmissthreshold Ar count
1070 Set the number of consecutive missed beacons at which the station
1071 will attempt to roam (i.e., search for a new access point).
1074 parameter must be in the range 1 to 255; though the
1075 upper bound may be reduced according to device capabilities.
1076 The default threshold is 7 consecutive missed beacons; but
1077 this may be overridden by the device driver.
1078 Another name for the
1082 .It Cm bssid Ar address
1083 Specify the MAC address of the access point to use when operating
1084 as a station in a BSS network.
1085 This overrides any automatic selection done by the system.
1086 To disable a previously selected access point, supply
1091 This option is useful when more than one access point uses the same SSID.
1092 Another name for the
1097 Enable packet bursting.
1098 Packet bursting is a transmission technique whereby the wireless
1099 medium is acquired once to send multiple frames and the interframe
1101 This technique can significantly increase throughput by reducing
1102 transmission overhead.
1103 Packet bursting is supported by the 802.11e QoS specification
1104 and some devices that do not support QoS may still be capable.
1105 By default packet bursting is enabled if a device is capable
1107 To disable packet bursting, use
1109 .It Cm chanlist Ar channels
1110 Set the desired channels to use when scanning for access
1111 points, neighbors in an IBSS network, or looking for unoccupied
1112 channels when operating as an access point.
1113 The set of channels is specified as a comma-separated list with
1114 each element in the list representing either a single channel number or a range
1117 Channel numbers must be in the range 1 to 255 and be permissible
1118 according to the operating characteristics of the device.
1119 .It Cm channel Ar number
1120 Set a single desired channel.
1121 Channels range from 1 to 255, but the exact selection available
1122 depends on the region your adaptor was manufactured for.
1128 will clear any desired channel and, if the device is marked up,
1129 force a scan for a channel to operate on.
1130 Alternatively the frequency, in megahertz, may be specified
1131 instead of the channel number.
1133 When there are several ways to use a channel the channel
1134 number/frequency may be appended with attributes to clarify.
1135 For example, if a device is capable of operating on channel 6
1136 with 802.11n and 802.11g then one can specify that g-only use
1137 should be used by specifying ``6:g''.
1138 Similarly the channel width can be specified by appending it
1139 with ``/''; e.g., ``6/40'' specifies a 40MHz wide channel,
1140 These attributes can be combined as in: ``6:ht/40''.
1141 The full set of flags specified following a ``:'' are:
1147 (Atheros Dynamic Turbo mode),
1155 (Atheros Static Turbo mode),
1158 (Atheros Dynamic Turbo mode, or appended to ``st'' and ``dt'').
1159 The full set of channel widths following a '/' are:
1161 (5MHz aka quarter-rate channel),
1163 (10MHz aka half-rate channel),
1165 (20MHz mostly for use in specifying ht20),
1168 (40MHz mostly for use in specifying ht40).
1170 a 40MHz HT channel specification may include the location
1171 of the extension channel by appending ``+'' or ``-'' for above and below,
1172 respectively; e.g., ``2437:ht/40+'' specifies 40MHz wide HT operation
1173 with the center channel at frequency 2437 and the extension channel above.
1174 .It Cm country Ar name
1175 Set the country code to use in calculating the regulatory constraints
1177 In particular the set of available channels, how the wireless device
1178 will operation on the channels, and the maximum transmit power that
1179 can be used on a channel are defined by this setting.
1180 Country/Region codes are specified as a 2-character abbreviation
1181 defined by ISO 3166 or using a longer, but possibly ambiguous, spelling;
1182 e.g., "ES" and "Spain".
1183 The set of country codes are taken from
1184 .Pa /etc/regdomain.xml
1186 be viewed with the ``list countries'' request.
1187 Note that not all devices support changing the country code from a default
1188 setting; typically stored in EEPROM.
1196 Enable Dynamic Frequency Selection (DFS) as specified in 802.11h.
1197 DFS embodies several facilities including detection of overlapping
1198 radar signals, dynamic transmit power control, and channel selection
1199 according to a least-congested criteria.
1200 DFS support is mandatory for some 5GHz frequencies in certain
1201 locales (e.g., ETSI).
1202 By default DFS is enabled according to the regulatory definitions
1204 .Pa /etc/regdomain.xml
1205 and the current country code, regdomain,
1207 Note the underlying device (and driver) must support radar detection
1208 for full DFS support to work.
1209 To be fully compliant with the local regulatory agency frequencies that
1210 require DFS should not be used unless it is fully supported.
1213 to disable this functionality for testing.
1215 Enable support for the 802.11d specification (default).
1216 When this support is enabled in station mode, beacon frames that advertise
1217 a country code different than the currently configured country code will
1218 cause an event to be dispatched to user applications.
1219 This event can be used by the station to adopt that country code and
1220 operate according to the associated regulatory constraints.
1221 When operating as an access point with 802.11d enabled the beacon and
1222 probe response frames transmitted will advertise the current regulatory
1224 To disable 802.11d use
1227 Enable 802.11h support including spectrum management.
1228 When 802.11h is enabled beacon and probe response frames will have
1229 the SpectrumMgt bit set in the capabilities field and
1230 country and power constraint information elements will be present.
1231 802.11h support also includes handling Channel Switch Announcements (CSA)
1232 which are a mechanism to coordinate channel changes by an access point.
1233 By default 802.11h is enabled if the device is capable.
1234 To disable 802.11h use
1236 .It Cm deftxkey Ar index
1237 Set the default key to use for transmission.
1238 Typically this is only set when using WEP encryption.
1239 Note that you must set a default transmit key
1240 for the system to know which key to use in encrypting outbound traffic.
1243 is an alias for this request; it is provided for backwards compatibility.
1244 .It Cm dtimperiod Ar period
1247 period for transmitting buffered multicast data frames when
1248 operating in ap mode.
1251 specifies the number of beacon intervals between DTIM
1252 and must be in the range 1 to 15.
1253 By default DTIM is 1 (i.e., DTIM occurs at each beacon).
1255 Enable the use of quiet IE.
1256 Hostap will use this to silence other
1257 stations to reduce interference for radar detection when
1258 operating on 5GHz frequency and doth support is enabled.
1261 to disable this functionality.
1262 .It Cm quiet_period Ar period
1265 to the number of beacon intervals between the start of regularly
1266 scheduled quiet intervals defined by Quiet element.
1267 .It Cm quiet_count Ar count
1270 to the number of TBTTs until the beacon interval during which the
1271 next quiet interval shall start.
1272 A value of 1 indicates the quiet
1273 interval will start during the beacon interval starting at the next
1275 A value 0 is reserved.
1276 .It Cm quiet_offset Ar offset
1279 to the offset of the start of the quiet interval from the TBTT
1280 specified by the Quiet count, expressed in TUs.
1283 shall be less than one beacon interval.
1284 .It Cm quiet_duration Ar dur
1287 to the duration of the Quiet interval, expressed in TUs.
1288 The value should be less than beacon interval.
1290 Enable the use of Atheros Dynamic Turbo mode when communicating with
1291 another Dynamic Turbo-capable station.
1292 Dynamic Turbo mode is an Atheros-specific mechanism by which
1293 stations switch between normal 802.11 operation and a ``boosted''
1294 mode in which a 40MHz wide channel is used for communication.
1295 Stations using Dynamic Turbo mode operate boosted only when the
1296 channel is free of non-dturbo stations; when a non-dturbo station
1297 is identified on the channel all stations will automatically drop
1298 back to normal operation.
1299 By default, Dynamic Turbo mode is not enabled, even if the device is capable.
1300 Note that turbo mode (dynamic or static) is only allowed on some
1301 channels depending on the regulatory constraints; use the
1303 command to identify the channels where turbo mode may be used.
1304 To disable Dynamic Turbo mode use
1307 Enable Dynamic WDS (DWDS) support.
1308 DWDS is a facility by which 4-address traffic can be carried between
1309 stations operating in infrastructure mode.
1310 A station first associates to an access point and authenticates using
1311 normal procedures (e.g., WPA).
1312 Then 4-address frames are passed to carry traffic for stations
1313 operating on either side of the wireless link.
1314 DWDS extends the normal WDS mechanism by leveraging existing security
1315 protocols and eliminating static binding.
1317 When DWDS is enabled on an access point 4-address frames received from
1318 an authorized station will generate a ``DWDS discovery'' event to user
1320 This event should be used to create a WDS interface that is bound
1321 to the remote station (and usually plumbed into a bridge).
1322 Once the WDS interface is up and running 4-address traffic then logically
1323 flows through that interface.
1325 When DWDS is enabled on a station, traffic with a destination address
1326 different from the peer station are encapsulated in a 4-address frame
1327 and transmitted to the peer.
1328 All 4-address traffic uses the security information of the stations
1329 (e.g., cryptographic keys).
1330 A station is associated using 802.11n facilities may transport
1331 4-address traffic using these same mechanisms; this depends on available
1332 resources and capabilities of the device.
1333 The DWDS implementation guards against layer 2 routing loops of
1336 Enable the use of Atheros Fast Frames when communicating with
1337 another Fast Frames-capable station.
1338 Fast Frames are an encapsulation technique by which two 802.3
1339 frames are transmitted in a single 802.11 frame.
1340 This can noticeably improve throughput but requires that the
1341 receiving station understand how to decapsulate the frame.
1342 Fast frame use is negotiated using the Atheros 802.11 vendor-specific
1343 protocol extension so enabling use is safe when communicating with
1344 non-Atheros devices.
1345 By default, use of fast frames is enabled if the device is capable.
1346 To explicitly disable fast frames, use
1348 .It Cm fragthreshold Ar length
1349 Set the threshold for which transmitted frames are broken into fragments.
1352 argument is the frame size in bytes and must be in the range 256 to 2346.
1360 disables transmit fragmentation.
1361 Not all adapters honor the fragmentation threshold.
1363 When operating as an access point, do not broadcast the SSID
1364 in beacon frames or respond to probe request frames unless
1365 they are directed to the ap (i.e., they include the ap's SSID).
1366 By default, the SSID is included in beacon frames and
1367 undirected probe request frames are answered.
1368 To re-enable the broadcast of the SSID etc., use
1371 Enable use of High Throughput (HT) when using 802.11n (default).
1372 The 802.11n specification includes mechanisms for operation
1373 on 20MHz and 40MHz wide channels using different signalling mechanisms
1374 than specified in 802.11b, 802.11g, and 802.11a.
1375 Stations negotiate use of these facilities, termed HT20 and HT40,
1376 when they associate.
1377 To disable all use of 802.11n use
1379 To disable use of HT20 (e.g., to force only HT40 use) use
1381 To disable use of HT40 use
1384 HT configuration is used to ``auto promote'' operation
1385 when several choices are available.
1386 For example, if a station associates to an 11n-capable access point
1387 it controls whether the station uses legacy operation, HT20, or HT40.
1388 When an 11n-capable device is setup as an access point and
1389 Auto Channel Selection is used to locate a channel to operate on,
1390 HT configuration controls whether legacy, HT20, or HT40 operation is setup
1391 on the selected channel.
1392 If a fixed channel is specified for a station then HT configuration can
1393 be given as part of the channel specification; e.g., 6:ht/20 to setup
1394 HT20 operation on channel 6.
1396 Enable use of compatibility support for pre-802.11n devices (default).
1397 The 802.11n protocol specification went through several incompatible iterations.
1398 Some vendors implemented 11n support to older specifications that
1399 will not interoperate with a purely 11n-compliant station.
1400 In particular the information elements included in management frames
1401 for old devices are different.
1402 When compatibility support is enabled both standard and compatible data
1404 Stations that associate using the compatibility mechanisms are flagged
1406 To disable compatibility support use
1408 .It Cm htprotmode Ar technique
1409 For interfaces operating in 802.11n, use the specified
1411 for protecting HT frames in a mixed legacy/HT network.
1412 The set of valid techniques is
1417 Technique names are case insensitive.
1419 Enable inactivity processing for stations associated to an
1420 access point (default).
1421 When operating as an access point the 802.11 layer monitors
1422 the activity of each associated station.
1423 When a station is inactive for 5 minutes it will send several
1424 ``probe frames'' to see if the station is still present.
1425 If no response is received then the station is deauthenticated.
1426 Applications that prefer to handle this work can disable this
1430 Set the location to use in calculating regulatory constraints.
1431 The location is also advertised in beacon and probe response frames
1432 when 802.11d is enabled with
1441 Display the list of channels available for use taking into account
1442 any restrictions set with the
1445 See the description of
1447 for more information.
1449 Display the adaptor's capabilities, including the operating
1452 Display the list of channels available for use.
1453 Channels are shown with their IEEE channel number, equivalent
1454 frequency, and usage modes.
1455 Channels identified as
1460 Channels identified as
1462 may be used only for Atheros' Static Turbo mode
1464 . Cm mediaopt turbo ) .
1465 Channels marked with a
1467 have a regulatory constraint that they be passively scanned.
1468 This means a station is not permitted to transmit on the channel until
1469 it identifies the channel is being used for 802.11 communication;
1470 typically by hearing a beacon frame from an access point operating
1473 is another way of requesting this information.
1474 By default a compacted list of channels is displayed; if the
1476 option is specified then all channels are shown.
1477 .It Cm list countries
1478 Display the set of country codes and regulatory domains that can be
1479 used in regulatory configuration.
1481 Display the current MAC Access Control List state.
1482 Each address is prefixed with a character that indicates the
1483 current policy applied to it:
1485 indicates the address is allowed access,
1487 indicates the address is denied access,
1489 indicates the address is present but the current policy open
1490 (so the ACL is not consulted).
1492 Displays the mesh routing table, used for forwarding packets on a mesh
1494 .It Cm list regdomain
1495 Display the current regulatory settings including the available channels
1496 and transmit power caps.
1498 Display the parameters that govern roaming operation.
1500 Display the parameters that govern transmit operation.
1502 Display the transmit power caps for each channel.
1504 Display the access points and/or ad-hoc neighbors
1505 located in the vicinity.
1506 This information may be updated automatically by the adapter
1509 request or through background scanning.
1510 Depending on the capabilities of the stations the following
1511 flags can be included in the output:
1518 Poll request capability.
1520 DSSS/OFDM capability.
1522 Extended Service Set (ESS).
1524 Independent Basic Service Set (IBSS).
1527 The station requires authentication.
1529 Robust Secure Network (RSN).
1532 Indicates that the station is doing short preamble to optionally
1533 improve throughput performance with 802.11g and 802.11b.
1535 Pollable capability.
1537 Short slot time capability.
1540 By default interesting information elements captured from the neighboring
1541 stations are displayed at the end of each row.
1542 Possible elements include:
1544 (station supports WME),
1546 (station supports WPA),
1548 (station supports WPS),
1550 (station supports 802.11i/RSN),
1552 (station supports 802.11n/HT communication),
1554 (station supports Atheros protocol extensions),
1556 (station supports unknown vendor-specific extensions).
1559 flag is used all the information elements and their
1560 contents will be shown.
1563 flag also enables display of long SSIDs.
1566 command is another way of requesting this information.
1568 When operating as an access point display the stations that are
1569 currently associated.
1570 When operating in ad-hoc mode display stations identified as
1571 neighbors in the IBSS.
1572 When operating in mesh mode display stations identified as
1573 neighbors in the MBSS.
1574 When operating in station mode display the access point.
1575 Capabilities advertised by the stations are described under
1579 The following flags can be included in the output:
1583 Indicates that the station is permitted to send/receive data frames.
1585 Extended Rate Phy (ERP).
1586 Indicates that the station is operating in an 802.11g network
1587 using extended transmit rates.
1589 High Throughput (HT).
1590 Indicates that the station is using HT transmit rates.
1593 follows immediately after then the station associated
1594 using deprecated mechanisms supported only when
1599 Indicates that the station is operating in power save mode.
1601 Quality of Service (QoS).
1602 Indicates that the station is using QoS encapsulation for
1604 QoS encapsulation is enabled only when WME mode is enabled.
1606 Short GI in HT 40MHz mode enabled.
1609 follows immediately after then short GI in HT 20MHz mode is enabled as well.
1611 Transitional Security Network (TSN).
1612 Indicates that the station associated using TSN; see also
1616 Wi-Fi Protected Setup (WPS).
1617 Indicates that the station associated using WPS.
1619 Short GI in HT 20MHz mode enabled.
1622 By default information elements received from associated stations
1623 are displayed in a short form; the
1625 flag causes this information to be displayed symbolically.
1627 Display the current channel parameters to use when operating in WME mode.
1630 option is specified then both channel and BSS parameters are displayed
1631 for each AC (first channel, then BSS).
1632 When WME mode is enabled for an adaptor this information will be
1633 displayed with the regular status; this command is mostly useful
1634 for examining parameters when WME mode is disabled.
1635 See the description of the
1637 directive for information on the various parameters.
1638 .It Cm maxretry Ar count
1639 Set the maximum number of tries to use in sending unicast frames.
1640 The default setting is 6 but drivers may override this with a value
1642 .It Cm mcastrate Ar rate
1643 Set the rate for transmitting multicast/broadcast frames.
1644 Rates are specified as megabits/second in decimal; e.g.,\& 5.5 for 5.5 Mb/s.
1645 This rate should be valid for the current operating conditions;
1646 if an invalid rate is specified drivers are free to chose an
1648 .It Cm mgtrate Ar rate
1649 Set the rate for transmitting management and/or control frames.
1650 Rates are specified as megabits/second in decimal; e.g.,\& 5.5 for 5.5 Mb/s.
1652 Set the location to use in calculating regulatory constraints.
1653 The location is also advertised in beacon and probe response frames
1654 when 802.11d is enabled with
1663 Enable powersave operation.
1664 When operating as a client, the station will conserve power by
1665 periodically turning off the radio and listening for
1666 messages from the access point telling it there are packets waiting.
1667 The station must then retrieve the packets.
1668 Not all devices support power save operation as a client.
1669 The 802.11 specification requires that all access points support
1670 power save but some drivers do not.
1673 to disable powersave operation when operating as a client.
1674 .It Cm powersavesleep Ar sleep
1675 Set the desired max powersave sleep time in TU's (1024 usecs).
1676 By default the max powersave sleep time is 100 TU's.
1677 .It Cm protmode Ar technique
1678 For interfaces operating in 802.11g, use the specified
1680 for protecting OFDM frames in a mixed 11b/11g network.
1681 The set of valid techniques is
1687 Technique names are case insensitive.
1688 Not all devices support
1690 as a protection technique.
1692 When operating as an access point in 802.11g mode allow only
1693 11g-capable stations to associate (11b-only stations are not
1694 permitted to associate).
1695 To allow both 11g and 11b-only stations to associate, use
1698 When operating as an access point in 802.11n mode allow only
1699 HT-capable stations to associate (legacy stations are not
1700 permitted to associate).
1701 To allow both HT and legacy stations to associate, use
1703 .It Cm regdomain Ar sku
1704 Set the regulatory domain to use in calculating the regulatory constraints
1706 In particular the set of available channels, how the wireless device
1707 will operation on the channels, and the maximum transmit power that
1708 can be used on a channel are defined by this setting.
1709 Regdomain codes (SKU's) are taken from
1710 .Pa /etc/regdomain.xml
1712 be viewed with the ``list countries'' request.
1713 Note that not all devices support changing the regdomain from a default
1714 setting; typically stored in EEPROM.
1722 Enable use of Reduced InterFrame Spacing (RIFS) when operating in 802.11n
1724 Note that RIFS must be supported by both the station and access point
1728 .It Cm roam:rate Ar rate
1729 Set the threshold for controlling roaming when operating in a BSS.
1732 parameter specifies the transmit rate in megabits
1733 at which roaming should be considered.
1734 If the current transmit rate drops below this setting and background scanning
1735 is enabled, then the system will check if a more desirable access point is
1736 available and switch over to it.
1737 The current scan cache contents are used if they are considered
1738 valid according to the
1740 parameter; otherwise a background scan operation is triggered before
1741 any selection occurs.
1742 Each channel type has a separate rate threshold; the default values are:
1743 12 Mb/s (11a), 2 Mb/s (11b), 2 Mb/s (11g), MCS 1 (11na, 11ng).
1744 .It Cm roam:rssi Ar rssi
1745 Set the threshold for controlling roaming when operating in a BSS.
1748 parameter specifies the receive signal strength in dBm units
1749 at which roaming should be considered.
1750 If the current rssi drops below this setting and background scanning
1751 is enabled, then the system will check if a more desirable access point is
1752 available and switch over to it.
1753 The current scan cache contents are used if they are considered
1754 valid according to the
1756 parameter; otherwise a background scan operation is triggered before
1757 any selection occurs.
1758 Each channel type has a separate rssi threshold; the default values are
1760 .It Cm roaming Ar mode
1761 When operating as a station, control how the system will
1762 behave when communication with the current access point
1766 argument may be one of
1768 (leave it to the hardware device to decide),
1770 (handle either in the device or the operating system\[em]as appropriate),
1772 (do nothing until explicitly instructed).
1773 By default, the device is left to handle this if it is
1774 capable; otherwise, the operating system will automatically
1775 attempt to reestablish communication.
1776 Manual mode is used by applications such as
1777 .Xr wpa_supplicant 8
1778 that want to control the selection of an access point.
1779 .It Cm rtsthreshold Ar length
1780 Set the threshold for which
1781 transmitted frames are preceded by transmission of an
1787 is the frame size in bytes and must be in the range 1 to 2346.
1795 disables transmission of RTS frames.
1796 Not all adapters support setting the RTS threshold.
1798 Initiate a scan of neighboring stations, wait for it to complete, and
1799 display all stations found.
1800 Only the super-user can initiate a scan.
1803 for information on the display.
1804 By default a background scan is done; otherwise a foreground
1805 scan is done and the station may roam to a different access point.
1808 request can be used to show recent scan results without
1809 initiating a new scan.
1810 .It Cm scanvalid Ar threshold
1811 Set the maximum time the scan cache contents are considered valid;
1812 i.e., will be used without first triggering a scan operation to
1816 parameter is specified in seconds and defaults to 60 seconds.
1817 The minimum setting for
1820 One should take care setting this threshold; if it is set too low
1821 then attempts to roam to another access point may trigger unnecessary
1822 background scan operations.
1824 Enable use of Short Guard Interval when operating in 802.11n
1826 NB: this currently enables Short GI on both HT40 and HT20 channels.
1827 To disable Short GI use
1830 Enable use of Static Spatial Multiplexing Power Save (SMPS)
1831 when operating in 802.11n.
1832 A station operating with Static SMPS maintains only a single
1833 receive chain active (this can significantly reduce power consumption).
1837 Enable use of Dynamic Spatial Multiplexing Power Save (SMPS)
1838 when operating in 802.11n.
1839 A station operating with Dynamic SMPS maintains only a single
1840 receive chain active but switches to multiple receive chains when it
1841 receives an RTS frame (this can significantly reduce power consumption).
1842 Note that stations cannot distinguish between RTS/CTS intended to
1843 enable multiple receive chains and those used for other purposes.
1847 Set the desired Service Set Identifier (aka network name).
1848 The SSID is a string up to 32 characters
1849 in length and may be specified as either a normal string or in
1850 hexadecimal when preceded by
1852 Additionally, the SSID may be cleared by setting it to
1854 .It Cm tdmaslot Ar slot
1855 When operating with TDMA, use the specified
1860 is a number between 0 and the maximum number of slots in the BSS.
1861 Note that a station configured as slot 0 is a master and
1862 will broadcast beacon frames advertising the BSS;
1863 stations configured to use other slots will always
1864 scan to locate a master before they ever transmit.
1868 .It Cm tdmaslotcnt Ar cnt
1869 When operating with TDMA, setup a BSS with
1872 The slot count may be at most 8.
1873 The current implementation is only tested with two stations
1874 (i.e., point to point applications).
1875 This setting is only meaningful when a station is configured as slot 0;
1876 other stations adopt this setting from the BSS they join.
1880 .It Cm tdmaslotlen Ar len
1881 When operating with TDMA, setup a BSS such that each station has a slot
1884 The slot length must be at least 150 microseconds (1/8 TU)
1885 and no more than 65 milliseconds.
1886 Note that setting too small a slot length may result in poor channel
1887 bandwidth utilization due to factors such as timer granularity and
1889 This setting is only meaningful when a station is configured as slot 0;
1890 other stations adopt this setting from the BSS they join.
1893 is set to 10 milliseconds.
1894 .It Cm tdmabintval Ar intval
1895 When operating with TDMA, setup a BSS such that beacons are transmitted every
1897 superframes to synchronize the TDMA slot timing.
1898 A superframe is defined as the number of slots times the slot length; e.g.,
1899 a BSS with two slots of 10 milliseconds has a 20 millisecond superframe.
1900 The beacon interval may not be zero.
1903 causes the timers to be resynchronized more often; this can be help if
1904 significant timer drift is observed.
1909 When operating as an access point with WPA/802.11i allow legacy
1910 stations to associate using static key WEP and open authentication.
1911 To disallow legacy station use of WEP, use
1913 .It Cm txpower Ar power
1914 Set the power used to transmit frames.
1917 argument is specified in .5 dBm units.
1918 Out of range values are truncated.
1919 Typically only a few discreet power settings are available and
1920 the driver will use the setting closest to the specified value.
1921 Not all adapters support changing the transmit power.
1922 .It Cm ucastrate Ar rate
1923 Set a fixed rate for transmitting unicast frames.
1924 Rates are specified as megabits/second in decimal; e.g.,\& 5.5 for 5.5 Mb/s.
1925 This rate should be valid for the current operating conditions;
1926 if an invalid rate is specified drivers are free to chose an
1928 .It Cm wepmode Ar mode
1929 Set the desired WEP mode.
1930 Not all adapters support all modes.
1931 The set of valid modes is
1937 mode explicitly tells the adaptor to allow association with access
1938 points which allow both encrypted and unencrypted traffic.
1941 means that the access point must only allow encrypted connections.
1944 is generally another name for
1946 Modes are case insensitive.
1947 .It Cm weptxkey Ar index
1948 Set the WEP key to be used for transmission.
1949 This is the same as setting the default transmission key with
1951 .It Cm wepkey Ar key Ns | Ns Ar index : Ns Ar key
1952 Set the selected WEP key.
1955 is not given, key 1 is set.
1956 A WEP key will be either 5 or 13
1957 characters (40 or 104 bits) depending on the local network and the
1958 capabilities of the adaptor.
1959 It may be specified either as a plain
1960 string or as a string of hexadecimal digits preceded by
1962 For maximum portability, hex keys are recommended;
1963 the mapping of text keys to WEP encryption is usually driver-specific.
1966 drivers do this mapping differently to
1968 A key may be cleared by setting it to
1970 If WEP is supported then there are at least four keys.
1971 Some adapters support more than four keys.
1972 If that is the case, then the first four keys
1973 (1-4) will be the standard temporary keys and any others will be adaptor
1974 specific keys such as permanent keys stored in NVRAM.
1976 Note that you must set a default transmit key with
1978 for the system to know which key to use in encrypting outbound traffic.
1980 Enable Wireless Multimedia Extensions (WME) support, if available,
1981 for the specified interface.
1982 WME is a subset of the IEEE 802.11e standard to support the
1983 efficient communication of realtime and multimedia data.
1984 To disable WME support, use
1986 Another name for this parameter is
1989 The following parameters are meaningful only when WME support is in use.
1990 Parameters are specified per-AC (Access Category) and
1991 split into those that are used by a station when acting
1992 as an access point and those for client stations in the BSS.
1993 The latter are received from the access point and may not be changed
1995 The following Access Categories are recognized:
1997 .Bl -tag -width ".Cm AC_BK" -compact
2001 best effort delivery,
2016 AC parameters are case-insensitive.
2017 Traffic classification is done in the operating system using the
2018 vlan priority associated with data frames or the
2019 ToS (Type of Service) indication in IP-encapsulated frames.
2020 If neither information is present, traffic is assigned to the
2021 Best Effort (BE) category.
2022 .Bl -tag -width indent
2024 Set the ACK policy for QoS transmissions by the local station;
2025 this controls whether or not data frames transmitted by a station
2026 require an ACK response from the receiving station.
2027 To disable waiting for an ACK use
2029 This parameter is applied only to the local station.
2031 Enable the Admission Control Mandatory (ACM) mechanism
2032 for transmissions by the local station.
2033 To disable the ACM use
2035 On stations in a BSS this parameter is read-only and indicates
2036 the setting received from the access point.
2037 NB: ACM is not supported right now.
2038 .It Cm aifs Ar ac Ar count
2039 Set the Arbitration Inter Frame Spacing (AIFS)
2040 channel access parameter to use for transmissions
2041 by the local station.
2042 On stations in a BSS this parameter is read-only and indicates
2043 the setting received from the access point.
2044 .It Cm cwmin Ar ac Ar count
2045 Set the CWmin channel access parameter to use for transmissions
2046 by the local station.
2047 On stations in a BSS this parameter is read-only and indicates
2048 the setting received from the access point.
2049 .It Cm cwmax Ar ac Ar count
2050 Set the CWmax channel access parameter to use for transmissions
2051 by the local station.
2052 On stations in a BSS this parameter is read-only and indicates
2053 the setting received from the access point.
2054 .It Cm txoplimit Ar ac Ar limit
2055 Set the Transmission Opportunity Limit channel access parameter
2056 to use for transmissions by the local station.
2057 This parameter defines an interval of time when a WME station
2058 has the right to initiate transmissions onto the wireless medium.
2059 On stations in a BSS this parameter is read-only and indicates
2060 the setting received from the access point.
2061 .It Cm bss:aifs Ar ac Ar count
2062 Set the AIFS channel access parameter to send to stations in a BSS.
2063 This parameter is meaningful only when operating in ap mode.
2064 .It Cm bss:cwmin Ar ac Ar count
2065 Set the CWmin channel access parameter to send to stations in a BSS.
2066 This parameter is meaningful only when operating in ap mode.
2067 .It Cm bss:cwmax Ar ac Ar count
2068 Set the CWmax channel access parameter to send to stations in a BSS.
2069 This parameter is meaningful only when operating in ap mode.
2070 .It Cm bss:txoplimit Ar ac Ar limit
2071 Set the TxOpLimit channel access parameter to send to stations in a BSS.
2072 This parameter is meaningful only when operating in ap mode.
2075 Enable Wireless Privacy Subscriber support.
2076 Note that WPS support requires a WPS-capable supplicant.
2077 To disable this function use
2081 The following parameters support an optional access control list
2082 feature available with some adapters when operating in ap mode; see
2084 This facility allows an access point to accept/deny association
2085 requests based on the MAC address of the station.
2086 Note that this feature does not significantly enhance security
2087 as MAC address spoofing is easy to do.
2088 .Bl -tag -width indent
2089 .It Cm mac:add Ar address
2090 Add the specified MAC address to the database.
2091 Depending on the policy setting association requests from the
2092 specified station will be allowed or denied.
2094 Set the ACL policy to permit association only by
2095 stations registered in the database.
2096 .It Cm mac:del Ar address
2097 Delete the specified MAC address from the database.
2099 Set the ACL policy to deny association only by
2100 stations registered in the database.
2101 .It Cm mac:kick Ar address
2102 Force the specified station to be deauthenticated.
2103 This typically is done to block a station after updating the
2106 Set the ACL policy to allow all stations to associate.
2108 Delete all entries in the database.
2110 Set the ACL policy to permit association only by
2111 stations approved by a RADIUS server.
2112 Note that this feature requires the
2114 program be configured to do the right thing
2115 as it handles the RADIUS processing
2116 (and marks stations as authorized).
2119 The following parameters are related to a wireless interface operating in mesh
2121 .Bl -tag -width indent
2122 .It Cm meshid Ar meshid
2123 Set the desired Mesh Identifier.
2124 The Mesh ID is a string up to 32 characters in length.
2125 A mesh interface must have a Mesh Identifier specified
2126 to reach an operational state.
2127 .It Cm meshttl Ar ttl
2128 Set the desired ``time to live'' for mesh forwarded packets;
2129 this is the number of hops a packet may be forwarded before
2131 The default setting for
2135 Enable or disable peering with neighbor mesh stations.
2136 Stations must peer before any data packets can be exchanged.
2141 Enable or disable forwarding packets by a mesh interface.
2146 This attribute specifies whether or not the mesh STA activates mesh gate
2151 .It Cm meshmetric Ar protocol
2154 as the link metric protocol used on a mesh network.
2155 The default protocol is called
2157 The mesh interface will restart after changing this setting.
2158 .It Cm meshpath Ar protocol
2161 as the path selection protocol used on a mesh network.
2162 The only available protocol at the moment is called
2164 (Hybrid Wireless Mesh Protocol).
2165 The mesh interface will restart after changing this setting.
2166 .It Cm hwmprootmode Ar mode
2167 Stations on a mesh network can operate as ``root nodes.''
2168 Root nodes try to find paths to all mesh nodes and advertise themselves
2170 When there is a root mesh node on a network, other mesh nodes can setup
2171 paths between themselves faster because they can use the root node
2172 to find the destination.
2173 This path may not be the best, but on-demand
2174 routing will eventually find the best path.
2175 The following modes are recognized:
2177 .Bl -tag -width ".Cm PROACTIVE" -compact
2181 Send broadcast path requests every two seconds.
2182 Nodes on the mesh without a path to this root mesh station with try to
2183 discover a path to us.
2185 Send broadcast path requests every two seconds and every node must reply
2186 with a path reply even if it already has a path to this root mesh station.
2188 Send broadcast root announcement (RANN) frames.
2189 Nodes on the mesh without a path to this root mesh station with try to
2190 discover a path to us.
2196 .It Cm hwmpmaxhops Ar cnt
2197 Set the maximum number of hops allowed in an HMWP path to
2199 The default setting for
2204 The following parameters are for compatibility with other systems:
2205 .Bl -tag -width indent
2207 Another name for the
2213 .It Cm stationname Ar name
2214 Set the name of this station.
2215 The station name is not part of the IEEE 802.11
2216 protocol though some interfaces support it.
2218 seems to be meaningful to identical or virtually identical equipment.
2219 Setting the station name is identical in syntax to setting the SSID.
2226 Another way of saying
2232 Another way of saying
2238 Another way of saying:
2239 .Dq Li "wepmode on weptxkey 1 wepkey 1:key wepkey 2:- wepkey 3:- wepkey 4:-" .
2245 .Ar n : k1 , k2 , k3 , k4
2248 Another way of saying
2249 .Dq Li "wepmode on weptxkey n wepkey 1:k1 wepkey 2:k2 wepkey 3:k3 wepkey 4:k4" .
2254 Another way of saying
2261 The following parameters are specific to bridge interfaces:
2262 .Bl -tag -width indent
2263 .It Cm addm Ar interface
2264 Add the interface named by
2266 as a member of the bridge.
2267 The interface is put into promiscuous mode
2268 so that it can receive every packet sent on the network.
2269 .It Cm deletem Ar interface
2270 Remove the interface named by
2273 Promiscuous mode is disabled on the interface when
2274 it is removed from the bridge.
2275 .It Cm maxaddr Ar size
2276 Set the size of the bridge address cache to
2278 The default is 2000 entries.
2279 .It Cm timeout Ar seconds
2280 Set the timeout of address cache entries to
2285 is zero, then address cache entries will not be expired.
2286 The default is 1200 seconds.
2288 Display the addresses that have been learned by the bridge.
2289 .It Cm static Ar interface-name Ar address
2290 Add a static entry into the address cache pointing to
2291 .Ar interface-name .
2292 Static entries are never aged out of the cache or re-placed, even if the
2293 address is seen on a different interface.
2294 .It Cm deladdr Ar address
2297 from the address cache.
2299 Delete all dynamically-learned addresses from the address cache.
2301 Delete all addresses, including static addresses, from the address cache.
2302 .It Cm discover Ar interface
2303 Mark an interface as a
2306 When the bridge has no address cache entry
2307 (either dynamic or static)
2308 for the destination address of a packet,
2309 the bridge will forward the packet to all
2310 member interfaces marked as
2312 This is the default for all interfaces added to a bridge.
2313 .It Cm -discover Ar interface
2316 attribute on a member interface.
2317 For packets without the
2319 attribute, the only packets forwarded on the interface are broadcast
2320 or multicast packets and packets for which the destination address
2321 is known to be on the interface's segment.
2322 .It Cm learn Ar interface
2323 Mark an interface as a
2326 When a packet arrives on such an interface, the source
2327 address of the packet is entered into the address cache as being a
2328 destination address on the interface's segment.
2329 This is the default for all interfaces added to a bridge.
2330 .It Cm -learn Ar interface
2333 attribute on a member interface.
2334 .It Cm sticky Ar interface
2335 Mark an interface as a
2338 Dynamically learned address entries are treated at static once entered into
2340 Sticky entries are never aged out of the cache or replaced, even if the
2341 address is seen on a different interface.
2342 .It Cm -sticky Ar interface
2345 attribute on a member interface.
2346 .It Cm private Ar interface
2347 Mark an interface as a
2350 A private interface does not forward any traffic to any other port that is also
2351 a private interface.
2352 .It Cm -private Ar interface
2355 attribute on a member interface.
2356 .It Cm span Ar interface
2357 Add the interface named by
2359 as a span port on the bridge.
2360 Span ports transmit a copy of every frame received by the bridge.
2361 This is most useful for snooping a bridged network passively on
2362 another host connected to one of the span ports of the bridge.
2363 .It Cm -span Ar interface
2364 Delete the interface named by
2366 from the list of span ports of the bridge.
2367 .It Cm stp Ar interface
2368 Enable Spanning Tree protocol on
2372 driver has support for the IEEE 802.1D Spanning Tree protocol (STP).
2373 Spanning Tree is used to detect and remove loops in a network topology.
2374 .It Cm -stp Ar interface
2375 Disable Spanning Tree protocol on
2377 This is the default for all interfaces added to a bridge.
2378 .It Cm edge Ar interface
2382 An edge port connects directly to end stations cannot create bridging
2383 loops in the network, this allows it to transition straight to forwarding.
2384 .It Cm -edge Ar interface
2385 Disable edge status on
2387 .It Cm autoedge Ar interface
2390 to automatically detect edge status.
2391 This is the default for all interfaces added to a bridge.
2392 .It Cm -autoedge Ar interface
2393 Disable automatic edge status on
2395 .It Cm ptp Ar interface
2398 as a point to point link.
2399 This is required for straight transitions to forwarding and
2400 should be enabled on a direct link to another RSTP capable switch.
2401 .It Cm -ptp Ar interface
2402 Disable point to point link status on
2404 This should be disabled for a half duplex link and for an interface
2405 connected to a shared network segment,
2406 like a hub or a wireless network.
2407 .It Cm autoptp Ar interface
2408 Automatically detect the point to point status on
2410 by checking the full duplex link status.
2411 This is the default for interfaces added to the bridge.
2412 .It Cm -autoptp Ar interface
2413 Disable automatic point to point link detection on
2415 .It Cm maxage Ar seconds
2416 Set the time that a Spanning Tree protocol configuration is valid.
2417 The default is 20 seconds.
2418 The minimum is 6 seconds and the maximum is 40 seconds.
2419 .It Cm fwddelay Ar seconds
2420 Set the time that must pass before an interface begins forwarding
2421 packets when Spanning Tree is enabled.
2422 The default is 15 seconds.
2423 The minimum is 4 seconds and the maximum is 30 seconds.
2424 .It Cm hellotime Ar seconds
2425 Set the time between broadcasting of Spanning Tree protocol
2426 configuration messages.
2427 The hello time may only be changed when operating in legacy stp mode.
2428 The default is 2 seconds.
2429 The minimum is 1 second and the maximum is 2 seconds.
2430 .It Cm priority Ar value
2431 Set the bridge priority for Spanning Tree.
2432 The default is 32768.
2433 The minimum is 0 and the maximum is 61440.
2434 .It Cm proto Ar value
2435 Set the Spanning Tree protocol.
2436 The default is rstp.
2437 The available options are stp and rstp.
2438 .It Cm holdcnt Ar value
2439 Set the transmit hold count for Spanning Tree.
2440 This is the number of packets transmitted before being rate limited.
2442 The minimum is 1 and the maximum is 10.
2443 .It Cm ifpriority Ar interface Ar value
2444 Set the Spanning Tree priority of
2449 The minimum is 0 and the maximum is 240.
2450 .It Cm ifpathcost Ar interface Ar value
2451 Set the Spanning Tree path cost of
2455 The default is calculated from the link speed.
2456 To change a previously selected path cost back to automatic, set the
2458 The minimum is 1 and the maximum is 200000000.
2459 .It Cm ifmaxaddr Ar interface Ar size
2460 Set the maximum number of hosts allowed from an interface, packets with unknown
2461 source addresses are dropped until an existing host cache entry expires or is
2463 Set to 0 to disable.
2466 The following parameters are specific to lagg interfaces:
2467 .Bl -tag -width indent
2468 .It Cm laggport Ar interface
2469 Add the interface named by
2471 as a port of the aggregation interface.
2472 .It Cm -laggport Ar interface
2473 Remove the interface named by
2475 from the aggregation interface.
2476 .It Cm laggproto Ar proto
2477 Set the aggregation protocol.
2480 The available options are
2488 .It Cm lagghash Ar option Ns Oo , Ns Ar option Oc
2489 Set the packet layers to hash for aggregation protocols which load balance.
2492 The options can be combined using commas.
2494 .Bl -tag -width ".Cm l2" -compact
2496 src/dst mac address and optional vlan number.
2498 src/dst address for IPv4 or IPv6.
2500 src/dst port for TCP/UDP/SCTP.
2503 Enable local hash computation for RSS hash on the interface.
2508 modes will use the RSS hash from the network card if available
2509 to avoid computing one, this may give poor traffic distribution
2510 if the hash is invalid or uses less of the protocol header information.
2512 disables use of RSS hash from the network card.
2513 The default value can be set via the
2514 .Va net.link.lagg.default_use_flowid
2525 Use the RSS hash from the network card if available.
2526 .It Cm flowid_shift Ar number
2527 Set a shift parameter for RSS local hash computation.
2528 Hash is calculated by using flowid bits in a packet header mbuf
2529 which are shifted by the number of this parameter.
2531 Enable selection of egress ports based on the native
2533 domain for the packets being transmitted.
2534 This is currently only implemented for lacp mode.
2537 hardware, running a kernel compiled with the
2539 option, and when interfaces from multiple
2541 domains are ports of the aggregation interface.
2543 Disable selection of egress ports based on the native
2545 domain for the packets being transmitted.
2546 .It Cm lacp_fast_timeout
2547 Enable lacp fast-timeout on the interface.
2548 .It Cm -lacp_fast_timeout
2549 Disable lacp fast-timeout on the interface.
2551 Enable lacp strict compliance on the interface.
2552 The default value can be set via the
2553 .Va net.link.lagg.lacp.default_strict_mode
2564 Disable lacp strict compliance on the interface.
2565 .It Cm rr_limit Ar number
2566 Configure a stride for an interface in round-robin mode.
2567 The default stride is 1.
2570 The following parameters apply to IP tunnel interfaces,
2572 .Bl -tag -width indent
2573 .It Cm tunnel Ar src_addr dest_addr
2574 Configure the physical source and destination address for IP tunnel
2580 are interpreted as the outer source/destination for the encapsulating
2583 Unconfigure the physical source and destination address for IP tunnel
2584 interfaces previously configured with
2587 Another name for the
2590 .It Cm accept_rev_ethip_ver
2591 Set a flag to accept both correct EtherIP packets and ones
2592 with reversed version field.
2594 This is for backward compatibility with
2596 6.2, 6.3, 7.0, and 7.1.
2597 .It Cm -accept_rev_ethip_ver
2599 .Cm accept_rev_ethip_ver .
2600 .It Cm ignore_source
2601 Set a flag to accept encapsulated packets destined to this host
2602 independently from source address.
2603 This may be useful for hosts, that receive encapsulated packets
2604 from the load balancers.
2605 .It Cm -ignore_source
2608 .It Cm send_rev_ethip_ver
2609 Set a flag to send EtherIP packets with reversed version
2610 field intentionally.
2611 Disabled by default.
2612 This is for backward compatibility with
2614 6.2, 6.3, 7.0, and 7.1.
2615 .It Cm -send_rev_ethip_ver
2617 .Cm send_rev_ethip_ver .
2620 The following parameters apply to GRE tunnel interfaces,
2622 .Bl -tag -width indent
2623 .It Cm tunnel Ar src_addr dest_addr
2624 Configure the physical source and destination address for GRE tunnel
2630 are interpreted as the outer source/destination for the encapsulating
2633 Unconfigure the physical source and destination address for GRE tunnel
2634 interfaces previously configured with
2637 Another name for the
2640 .It Cm grekey Ar key
2641 Configure the GRE key to be used for outgoing packets.
2643 .Xr gre 4 will always accept GRE packets with invalid or absent keys.
2644 This command will result in a four byte MTU reduction on the interface.
2647 The following parameters are specific to
2650 .Bl -tag -width indent
2651 .It Cm syncdev Ar iface
2652 Use the specified interface
2653 to send and receive pfsync state synchronisation messages.
2655 Stop sending pfsync state synchronisation messages over the network.
2656 .It Cm syncpeer Ar peer_address
2657 Make the pfsync link point-to-point rather than using
2658 multicast to broadcast the state synchronisation messages.
2659 The peer_address is the IP address of the other host taking part in
2662 Broadcast the packets using multicast.
2664 Set the maximum number of updates for a single state which
2665 can be collapsed into one.
2666 This is an 8-bit number; the default value is 128.
2668 Defer transmission of the first packet in a state until a peer has
2669 acknowledged that the associated state has been inserted.
2671 Do not defer the first packet in a state.
2672 This is the default.
2675 The following parameters are specific to
2678 .Bl -tag -width indent
2679 .It Cm vlan Ar vlan_tag
2680 Set the VLAN tag value to
2682 This value is a 12-bit VLAN Identifier (VID) which is used to create an 802.1Q
2683 VLAN header for packets sent from the
2690 must both be set at the same time.
2691 .It Cm vlanpcp Ar priority_code_point
2694 is an 3-bit field which refers to the IEEE 802.1p
2695 class of service and maps to the frame priority level.
2697 Values in order of priority are:
2699 .Pq Dv Background (lowest) ,
2701 .Pq Dv Best effort (default) ,
2703 .Pq Dv Excellent effort ,
2705 .Pq Dv Critical applications ,
2707 .Pq Dv Video, < 100ms latency ,
2709 .Pq Dv Video, < 10ms latency ,
2711 .Pq Dv Internetwork control ,
2713 .Pq Dv Network control (highest) .
2714 .It Cm vlandev Ar iface
2715 Associate the physical interface
2720 Packets transmitted through the
2723 diverted to the specified physical interface
2725 with 802.1Q VLAN encapsulation.
2726 Packets with 802.1Q encapsulation received
2727 by the parent interface with the correct VLAN Identifier will be diverted to
2733 interface is assigned a
2734 copy of the parent interface's flags and the parent's Ethernet address.
2739 must both be set at the same time.
2742 interface already has
2743 a physical interface associated with it, this command will fail.
2745 change the association to another physical interface, the existing
2746 association must be cleared first.
2748 Note: if the hardware tagging capability
2749 is set on the parent interface, the
2752 interface's behavior changes:
2755 interface recognizes that the
2756 parent interface supports insertion and extraction of VLAN tags on its
2757 own (usually in firmware) and that it should pass packets to and from
2758 the parent unaltered.
2759 .It Fl vlandev Op Ar iface
2762 pseudo device, disassociate the parent interface from it.
2763 This breaks the link between the
2765 interface and its parent,
2766 clears its VLAN Identifier, flags and its link address and shuts the interface
2770 argument is useless and hence deprecated.
2773 The following parameters are used to configure
2776 .Bl -tag -width indent
2777 .It Cm vxlanid Ar identifier
2778 This value is a 24-bit VXLAN Network Identifier (VNI) that identifies the
2779 virtual network segment membership of the interface.
2780 .It Cm vxlanlocal Ar address
2781 The source address used in the encapsulating IPv4/IPv6 header.
2782 The address should already be assigned to an existing interface.
2783 When the interface is configured in unicast mode, the listening socket
2784 is bound to this address.
2785 .It Cm vxlanremote Ar address
2786 The interface can be configured in a unicast, or point-to-point, mode
2787 to create a tunnel between two hosts.
2788 This is the IP address of the remote end of the tunnel.
2789 .It Cm vxlangroup Ar address
2790 The interface can be configured in a multicast mode
2791 to create a virtual network of hosts.
2792 This is the IP multicast group address the interface will join.
2793 .It Cm vxlanlocalport Ar port
2794 The port number the interface will listen on.
2795 The default port number is 4789.
2796 .It Cm vxlanremoteport Ar port
2797 The destination port number used in the encapsulating IPv4/IPv6 header.
2798 The remote host should be listening on this port.
2799 The default port number is 4789.
2800 Note some other implementations, such as Linux,
2801 do not default to the IANA assigned port,
2802 but instead listen on port 8472.
2803 .It Cm vxlanportrange Ar low high
2804 The range of source ports used in the encapsulating IPv4/IPv6 header.
2805 The port selected within the range is based on a hash of the inner frame.
2806 A range is useful to provide entropy within the outer IP header
2807 for more effective load balancing.
2808 The default range is between the
2811 .Va net.inet.ip.portrange.first
2813 .Va net.inet.ip.portrange.last
2814 .It Cm vxlantimeout Ar timeout
2815 The maximum time, in seconds, before an entry in the forwarding table
2817 The default is 1200 seconds (20 minutes).
2818 .It Cm vxlanmaxaddr Ar max
2819 The maximum number of entries in the forwarding table.
2820 The default is 2000.
2821 .It Cm vxlandev Ar dev
2822 When the interface is configured in multicast mode, the
2824 interface is used to transmit IP multicast packets.
2825 .It Cm vxlanttl Ar ttl
2826 The TTL used in the encapsulating IPv4/IPv6 header.
2829 The source IP address and inner source Ethernet MAC address of
2830 received packets are used to dynamically populate the forwarding table.
2831 When in multicast mode, an entry in the forwarding table allows the
2832 interface to send the frame directly to the remote host instead of
2833 broadcasting the frame to the multicast group.
2834 This is the default.
2836 The forwarding table is not populated by received packets.
2838 Delete all dynamically-learned addresses from the forwarding table.
2839 .It Cm vxlanflushall
2840 Delete all addresses, including static addresses, from the forwarding table.
2843 The following parameters are used to configure
2845 protocol on an interface:
2846 .Bl -tag -width indent
2848 Set the virtual host ID.
2849 This is a required setting to initiate
2851 If the virtual host ID does not exist yet, it is created and attached to the
2852 interface, otherwise configuration of an existing vhid is adjusted.
2855 keyword is supplied along with an
2859 address, then this address is configured to be run under control of the
2861 Whenever a last address that refers to a particular vhid is removed from an
2862 interface, the vhid is automatically removed from interface and destroyed.
2863 Any other configuration parameters for the
2865 protocol should be supplied along with the
2868 Acceptable values for vhid are 1 to 255.
2869 .It Cm advbase Ar seconds
2870 Specifies the base of the advertisement interval in seconds.
2871 The acceptable values are 1 to 255.
2872 The default value is 1.
2873 .It Cm advskew Ar interval
2874 Specifies the skew to add to the base advertisement interval to
2875 make one host advertise slower than another host.
2876 It is specified in 1/256 of seconds.
2877 The acceptable values are 1 to 254.
2878 The default value is 0.
2879 .It Cm pass Ar phrase
2880 Set the authentication key to
2882 .It Cm state Ar MASTER|BACKUP
2883 Forcibly change state of a given vhid.
2888 utility displays the current configuration for a network interface
2889 when no optional parameters are supplied.
2890 If a protocol family is specified,
2892 will report only the details specific to that protocol family.
2896 flag is passed before an interface name,
2898 will display the capability list and all
2899 of the supported media for the specified interface.
2902 flag is supplied, address lifetime is displayed for IPv6 addresses,
2903 as time offset string.
2907 flag may be used instead of an interface name.
2910 to display information about all interfaces in the system.
2913 flag limits this to interfaces that are down, and
2915 limits this to interfaces that are up.
2916 When no arguments are given,
2922 flag may be used to list all available interfaces on the system, with
2923 no other additional information.
2926 is specified, only interfaces of that type will be listed.
2928 will list only Ethernet adapters, excluding the loopback interface.
2929 Use of this flag is mutually exclusive
2930 with all other flags and commands, except for
2932 (only list interfaces that are down)
2935 (only list interfaces that are up).
2939 flag may be used to get more verbose status for an interface.
2943 flag may be used to list all of the interface cloners available on
2944 the system, with no additional information.
2945 Use of this flag is mutually exclusive with all other flags and commands.
2949 flag causes keying information for the interface, if available, to be
2951 For example, the values of 802.11 WEP keys and
2953 passphrases will be printed, if accessible to the current user.
2954 This information is not printed by default, as it may be considered
2957 If the network interface driver is not present in the kernel then
2959 will attempt to load it.
2962 flag disables this behavior.
2964 Only the super-user may modify the configuration of a network interface.
2966 Assign the IPv4 address
2968 with a network mask of
2972 .Dl # ifconfig em0 inet 192.0.2.10 netmask 255.255.255.0
2974 Add the IPv4 address
2976 with the CIDR network prefix
2982 as a synonym for the canonical form of the option
2984 .Dl # ifconfig em0 inet 192.0.2.45/28 add
2986 Remove the IPv4 address
2990 .Dl # ifconfig em0 inet 192.0.2.45 -alias
2992 Enable IPv6 functionality of the interface:
2993 .Dl # ifconfig em0 inet6 -ifdisabled
2995 Add the IPv6 address
2996 .Li 2001:DB8:DBDB::123/48
2999 .Dl # ifconfig em0 inet6 2001:db8:bdbd::123 prefixlen 48 alias
3000 Note that lower case hexadecimal IPv6 addresses are acceptable.
3002 Remove the IPv6 address added in the above example,
3005 character as shorthand for the network prefix,
3008 as a synonym for the canonical form of the option
3010 .Dl # ifconfig em0 inet6 2001:db8:bdbd::123/48 delete
3012 Configure a single CARP redundant address on igb0, and then switch it
3014 .Dl # ifconfig igb0 vhid 1 10.0.0.1/24 pass foobar up
3015 .Dl # ifconfig igb0 vhid 1 state master
3017 Configure the interface
3019 to use 100baseTX, full duplex Ethernet media options:
3020 .Dl # ifconfig xl0 media 100baseTX mediaopt full-duplex
3022 Label the em0 interface as an uplink:
3023 .Dl # ifconfig em0 description \&"Uplink to Gigabit Switch 2\&"
3025 Create the software network interface
3027 .Dl # ifconfig gif1 create
3029 Destroy the software network interface
3031 .Dl # ifconfig gif1 destroy
3033 Display available wireless networks using
3035 .Dl # ifconfig wlan0 list scan
3037 Display inet and inet6 address subnet masks in CIDR notation
3038 .Dl # ifconfig -f inet:cidr,inet6:cidr
3040 Messages indicating the specified interface does not exist, the
3041 requested address is unknown, or the user is not privileged and
3042 tried to alter an interface's configuration.
3065 Basic IPv6 node operation requires a link-local address on each
3066 interface configured for IPv6.
3067 Normally, such an address is automatically configured by the
3068 kernel on each interface added to the system or enabled; this behavior may
3069 be disabled by setting per-interface flag
3070 .Cm -auto_linklocal .
3071 The default value of this flag is 1 and can be disabled by using the sysctl
3073 .Va net.inet6.ip6.auto_linklocal .
3075 Do not configure IPv6 addresses with no link-local address by using
3077 It can result in unexpected behaviors of the kernel.