DLADM(8)             Maintenance Commands and Procedures            DLADM(8)
NAME
     dladm - administer data links
SYNOPSIS
     dladm help     dladm show-link [
-P] [
-s [
-i interval]] [[
-p] 
-o field[,...]] [
link]     
dladm rename-link [
-R root-dir] 
link new-link     dladm delete-phys phys-link     dladm show-phys [
-m | 
-H | 
-P] [[
-p] 
-o field[,...]] [
phys-link]     
dladm create-aggr [
-t] [
-R root-dir] [
-P policy] [
-L mode] [
-T time]
           [
-u address] 
-l ether-link [
-l ether-link]... 
aggr-link     dladm modify-aggr [
-t] [
-R root-dir] [
-P policy] [
-L mode] [
-T time]
           [
-u address] 
aggr-link     dladm delete-aggr [
-t] [
-R root-dir] 
aggr-link     dladm add-aggr [
-t] [
-R root-dir] 
-l ether-link [
-l ether-link]...           
aggr-link     dladm remove-aggr [
-t] [
-R root-dir] 
-l ether-link [
-l ether-link]...           
aggr-link     dladm show-aggr [
-PLx] [
-s [
-i interval]] [[
-p] 
-o field[,...]]
           [
aggr-link]     
dladm create-bridge [
-R root-dir] [
-P protect] [
-p priority]
           [
-m max-age] [
-h hello-time] [
-d forward-delay]
           [
-f force-protocol] [
-l link]... 
bridge-name     dladm modify-bridge [
-R root-dir] [
-P protect] [
-p priority]
           [
-m max-age] [
-h hello-time] [
-d forward-delay]
           [
-f force-protocol] 
bridge-name     dladm delete-bridge [
-R root-dir] 
bridge-name     dladm add-bridge [
-R root-dir] 
-l link [
-l link]... 
bridge-name     dladm remove-bridge [
-R root-dir] 
-l link [
-l link]... 
bridge-name     dladm show-bridge [
-flt] [
-s [
-i interval]] [[
-p] 
-o field[,...]]           
bridge-name     dladm create-vlan [
-ft] [
-R root-dir] 
-l ether-link -v vid [
vlan-link]     
dladm delete-vlan [
-t] [
-R root-dir] 
vlan-link     dladm show-vlan [
-P] [[
-p] 
-o field[,...]] [
vlan-link]     
dladm scan-wifi [[
-p] 
-o field[,...]] [
wifi-link]     
dladm connect-wifi [
-e essid] [
-i bssid] [
-k key,...]
           [
-s none|
wep|
wpa] [
-a open|
shared] [
-b bss|
ibss] [
-c] [
-m a|
b|
g]
           [
-T time] [
wifi-link]     
dladm disconnect-wifi [
-a] [
wifi-link]     
dladm show-wifi [[
-p] 
-o field[,...]] [
wifi-link]     
dladm show-ether [
-x] [[
-p] 
-o field[,...]] [
ether-link]     
dladm set-linkprop [
-t] [
-R root-dir] 
-p prop=value[,...] 
link     dladm reset-linkprop [
-t] [
-R root-dir] [
-p prop[,...]] 
link     dladm show-linkprop [
-P] [[
-c] 
-o field[,...]] [
-p prop[,...]] [
link]     
dladm create-secobj [
-t] [
-R root-dir] [
-f file] 
-c class secobj     dladm delete-secobj [
-t] [
-R root-dir] 
secobj[,...]     
dladm show-secobj [
-P] [[
-p] 
-o field[,...]] [
secobj[,...]]     
dladm create-vnic [
-t] [
-R root-dir] 
-l link [
-m value | 
auto |           
factory -n slot-identifier | 
random [
-r prefix]] [
-v vlan-id]
           [
-p prop=value[,...]] 
vnic-link     dladm delete-vnic [
-t] [
-R root-dir] 
vnic-link     dladm show-vnic [
-P] [[
-p] 
-o field[,...]] [
-s [
-i interval]] [
-l link]
           [
vnic-link]     
dladm create-etherstub [
-t] [
-R root-dir] 
etherstub     dladm delete-etherstub [
-t] [
-R root-dir] 
etherstub     dladm show-etherstub [
etherstub]     
dladm create-iptun [
-t] [
-R root-dir] 
-T type           [
-a {
local|
remote}
=addr[,...]] 
iptun-link     dladm modify-iptun [
-t] [
-R root-dir] [
-a {
local|
remote}
=addr[,...]]           
iptun-link     dladm delete-iptun [
-t] [
-R root-dir] 
iptun-link     dladm show-iptun [
-P] [[
-p] 
-o field[,...]] [
iptun-link]     
dladm create-overlay [
-t] 
-e encap -s search -v vnetid           [
-p prop=value[,...]] 
overlay     dladm delete-overlay [
-t] 
overlay     dladm modify-overlay -d mac | 
-f | 
-s mac=ip:port overlay     dladm show-overlay [
-f | 
-t] [[
-p] 
-o field[,...]] [
overlay]     
dladm show-usage [
-a] 
-f filename [
-p plotfile -F format] [
-s time]
           [
-e time] [
link]
DESCRIPTION
     The 
dladm command is used to administer data-links.  A data-link is
     represented in the system as a STREAMS DLPI (v2) interface which can be
     plumbed under protocol stacks such as TCP/IP.  Each data-link relies on
     either a single network device or an aggregation of devices to send
     packets to or receive packets from a network.
     Each 
dladm subcommand operates on one of the following objects:     
link       A datalink, identified by a name.  In general, the name can
                use any alphanumeric characters or underscore (_), but must
                start with an alphabetic character and end with a number.  A
                datalink name can be at most 31 characters, and the ending
                number must be between 0 and 4294967294 (inclusive).  The
                ending number must not begin with a zero.  Datalink names
                between 3 and 8 characters are recommended.
                Some subcommands operate only on certain types or classes of
                datalinks.  For those cases, the following object names are
                used:                
phys-link   A physical datalink.                
vlan-link   A VLAN datalink.                
aggr-link   An aggregation datalink (or a key; see 
NOTES).                
ether-link  A physical Ethernet datalink.                
wifi-link   A WiFi datalink.                
vnic-link   A virtual network interface created on a link,
                            an etherstub, or an overlay.  It is a pseudo
                            device that can be treated as if it were an
                            network interface card on a machine.                
iptun-link  An IP tunnel link.     
dev        A network device, identified by concatenation of a driver
                name and an instance number.     
etherstub  An Ethernet stub can be used instead of a physical NIC to
                create VNICs.  VNICs created on an etherstub will appear to
                be connected through a virtual switch, allowing complete
                virtual networks to be built without physical hardware.     
bridge     A bridge instance, identified by an administratively-chosen
                name.  The name may use any alphanumeric characters or the
                underscore, (_), but must start and end with an alphabetic
                character.  A bridge name can be at most 31 characters.  The
                name `default' is reserved, as are all names starting with
                `SUNW'.
                Note that appending a zero (0) to a bridge name produces a
                valid link name, used for observability.     
secobj     A secure object, identified by an administratively-chosen
                name.  The name can use any alphanumeric characters, as well
                as underscore (_), dot (.), and hyphen (-).  A secure object
                name can be at most 32 characters.     
overlay    An overlay instance, identified by an administratively-
                chosen name.  An overlay can be used to create or join an
                existing software defined network.  VNICs created on an
                overlay will appear to be connected by a local virtual
                switch and will also be connected to interfaces on matching
                overlays provided by other hosts.  For more information on
                overlay devices, see 
overlay(7).
   Options
     Each 
dladm subcommand has its own set of options.  However, many of the
     subcommands have the following as a common option:     
-R root-dir, 
--root-dir=root-dir           Specifies an alternate root directory where the operation -- such
           as creation, deletion, or renaming -- should apply.
   SUBCOMMANDS
     When invoked with no arguments, 
dladm shows the link configuration
     information, in the same way as 
dladm show-link.
     The following subcommands are supported:     
dladm help           Display brief command usage.     
dladm show-link [
-P] [
-s [
-i interval]] [[
-p] 
-o field[,...]] [
link]
           Show link configuration information (the default) or statistics,
           either for all datalinks or for the 
link.  By default, the system
           is configured with one datalink for each known network device.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  When not modified by the 
-s option (described
                 below), the field name must be one of the fields listed
                 below, or the special value 
all to display all fields.  By
                 default (without 
-o), 
show-link displays all fields.                 
LINK    The name of the datalink.                 
CLASS   The class of the datalink.  
dladm distinguishes
                         between the following classes:                         
phys       A physical datalink.  The 
show-phys                                    subcommand displays more detail for this
                                    class of datalink.                         
aggr       An IEEE 802.3ad link aggregation.  The                                    
show-aggr subcommand displays more
                                    detail for this class of datalink.                         
etherstub  An Ethernet stub.  The 
show-etherstub                                    subcommand displays more detail for this
                                    class of datalink.                         
overlay    An overlay.  The 
show-overlay subcommand
                                    displays more detail for this class of
                                    datalink.                         
vlan       A VLAN datalink.  The 
show-vlan                                    subcommand displays more detail for this
                                    class of datalink.                         
vnic       A virtual network interface.  The                                    
show-vnic subcommand displays more
                                    detail for this class of datalink.                         
misc       A generic datalink without any other
                                    class-specific properties.  Generally
                                    used to indicate a pseudo device that
                                    doesn't otherwise correspond to one of
                                    the above classes.                 
MTU     The maximum transmission unit size for the datalink
                         being displayed.                 
STATE   The link state of the datalink.  The state can be
                         `up', `down', or `unknown'.                 
BRIDGE  The name of the bridge to which this link is
                         assigned, if any.                 
OVER    The physical datalink(s) over which the datalink is
                         operating.  This applies to aggr, bridge, and vlan
                         classes ov datalinks.  A VLAN is created over a
                         single physical datalink, a bridge has multiple
                         attached links, and an aggregation is comprised of
                         one or more physical datalinks.
                 When the 
-o option is used in conjunction with the 
-s                 option, used to display link statistics, the field name
                 must be one of the fields listed below, or the special
                 value 
all to display all fields.                 
LINK      The name of the datalink.                 
IPACKETS  Number of packets received on this link.                 
RBYTES    Number of bytes received on this link.                 
IERRORS   Number of input errors.                 
OPACKETS  Number of packets sent on this link.                 
OBYTES    Number of bytes sent on this link.                 
OERRORS   Number of output errors.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-P, 
--persistent                 Display the persistent link configuration.           
-s, 
--statistics                 Display link statistics.           
-i interval, 
-interval= interval                 Used with the 
-s option to specify an interval, in seconds,
                 at which statistics should be displayed.  If this option is
                 not specified, statistics will be displayed only once.     
dladm rename-link [
-R root-dir] 
link new-link           Rename 
link to 
new-link.  This is used to give a link a
           meaningful name, or to associate existing link configuration such
           as link properties of a removed device with a new device.  See
           the 
EXAMPLES section for specific examples of how this subcommand
           is used.           
-R root-dir, 
-root-dir=root-dir                 See 
Options, above.     
dladm delete-phys phys-link           This command is used to delete the persistent configuration of a
           link associated with physical hardware which has been removed
           from the system.  See the 
EXAMPLES section.     
dladm show-phys [
-m | 
-H | 
-P] [[
-p] 
-o field[,...]] [
phys-link]
           Show the physical device and attributes of all physical links, or
           of the named physical link.  Without 
-P, only physical links that
           are available on the running system are displayed.           
-H    Show hardware resource usage, as returned by the NIC
                 driver.  Output from 
-H displays the following elements:                 
LINK       A physical device corresponding to a NIC driver.                 
RINGTYPE   RX or TX.  All rings in a group are of the same
                            group type.                 
RINGS      A hardware resource used by a data link, subject
                            to assignment by a driver to different groups.                 
CLIENTS    MAC clients that are using the rings within a
                            group.           
-m    Show MAC addresses and related information.  Output from 
-m                 displays the following elements:                 
LINK       A physical device corresponding to a NIC driver.                 
SLOT       When a given physical device has multiple
                            factory MAC addresses, this indicates the slot
                            of the corresponding MAC address which can be
                            used as part of a call to 
create-vnic.                 
ADDRESS    Displays the MAC address of the device.                 
INUSE      Displays whether or not a MAC Address is
                            actively being used.                 
CLIENT     MAC clients that are using the address.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all, to display all
                 fields.  Note that if either 
-H or 
-m are specified, then
                 the valid options are those described in their respective
                 sections.  For each link, the following fields can be
                 displayed:                 
LINK       The name of the datalink.                 
MEDIA      The media type provided by the physical
                            datalink.                 
STATE      The state of the link.  This can be `up',
                            `down', or `unknown'.                 
SPEED      The current speed of the link, in megabits per
                            second.                 
DUPLEX     For Ethernet links, the full/half duplex status
                            of the link is displayed if the link state is
                            up.  The duplex is displayed as unknown in all
                            other cases.                 
DEVICE     The name of the physical device under this link.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-P, 
--persistent                 This option displays persistent configuration for all
                 links, including those that have been removed from the
                 system.  The output provides a 
FLAGS column in which the 
r                 flag indicates that the physical device associated with a
                 physical link has been removed.  For such links,                 
delete-phys can be used to purge the link's configuration
                 from the system.     
dladm create-aggr [
-t] [
-R root-dir] [
-P policy] [
-L mode] [
-T time]
           [
-u address] 
-l ether-link [
-l -ether-link]... 
aggr-link           Combine a set of links into a single IEEE 802.3ad link
           aggregation named 
aggr-link.  The use of an integer 
key to
           generate a link name for the aggregation is also supported for
           backward compatibility.  Many of the 
-aggr subcommands below also
           support the use of a 
key to refer to a given aggregation, but use
           of the aggregation link name is preferred.  See the 
NOTES section
           for more information on keys.           
dladm supports a number of port selection policies for an
           aggregation of ports.  (See the description of the 
-P option,
           below).  If you do not specify a policy, 
create-aggr uses the L4
           policy, described under the 
-P option.           
-l ether-link, 
--link=ether-link                 Each Ethernet link (or port) in the aggregation is
                 specified using an 
-l option followed by the name of the
                 link to be included in the aggregation.  Multiple links are
                 included in the aggregation by specifying multiple 
-l                 options.  For backwards compatibility, the 
dladm command
                 also supports the using the 
-d option (or 
--dev) with a
                 device name to specify links by their underlying device
                 name.  The other 
-aggr subcommands that take 
-l options
                 also accept 
-d.           
-t, 
--temporary                 Specifies that the aggregation is temporary.  Temporary
                 aggregations last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-P policy, 
--policy=policy                 Specifies the port selection policy to use for load
                 spreading of outbound traffic.  The policy specifies which                 
dev object is used to send packets.  A policy is a list of
                 one or more layers specifiers separated by commas.  A layer
                 specifier is one of the following:                 
L2    Select outbound device according to source and
                       destination MAC addresses of the packet.                 
L3    Select outbound device according to source and
                       destination IP addresses of the packet.                 
L4    Select outbound device according to the upper layer
                       protocol information contained in the packet.  For
                       TCP and UDP this includes source and destination
                       ports.  For IPsec, this includes the SPI (Security
                       Parameters Index).
                 For example, to use upper layer protocol information, the
                 following policy can be used:
                       -P L4
                 Note that policy L4 is the default.
                 To use the source and destination MAC addresses as well as
                 the source and destination IP addresses, the following
                 policy can be used:
                       -P L2,L3           
-L mode, 
--lacp-mode=mode                 Specifies whether LACP should be used and, if used, the
                 mode in which it should operate.  Supported values are 
off,                 
active or 
passive.           
-T time, 
--lacp-timer=mode                 Specifies the LACP timer value.  The supported values are                 
short or 
long.           
-u address, 
--unicast=address                 Specifies a fixed unicast hardware address to be used for
                 the aggregation.  If this option is not specified, then an
                 address is automatically chosen from the set of addresses
                 of the component devices.     
dladm modify-aggr [
-t] [
-R root-dir] [
-P policy] [
-L mode] [
-T time]
           [
-u address] 
aggr-link           Modify the parameters of the specified aggregation.           
-t, 
--temporary                 Specifies that the modification is temporary.  Temporary
                 modifications last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-P policy, 
--policy=policy                 Specifies the port selection policy to use for load
                 spreading of outbound traffic.  See 
dladm create-aggr for a
                 description of valid policy values.           
-L mode, 
--lacp-mode=mode                 Specifies whether LACP should be used and, if used, the
                 mode in which it should operate.  Supported values are 
off,                 
active, or 
passive.           
-T time, 
--lacp-timer=time                 Specifies the LACP timer value.  The supported values are                 
short or 
long.           
-u address, 
--unicast=address                 Specifies a fixed unicast hardware address to be used for
                 the aggregation.  If this option is not specified, then an
                 address is automatically chosen from the set of addresses
                 of the component devices.     
dladm delete-aggr [
-t] [
-R root-dir] 
aggr-link           Deletes the specified aggregation.           
-t, 
--temporary                 Specifies that the deletion is temporary.  Temporary
                 deletions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm add-aggr [
-t] [
-R root-dir] 
-l ether-link [
-l ether-link]...           
aggr-link           Adds links to the specified aggregation.           
-l ether-link, 
--link=ether-link                 Specifies an Ethernet link to add to the aggregation.
                 Multiple links can be added by supplying multiple 
-l                 options.           
-t, 
--temporary                 Specifies that the additions are temporary.  Temporary
                 additions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm remove-aggr [
-t] [
-R root-dir] 
-l ether-link [
-l ether-link]...           
aggr-link           Removes links from the specified aggregation.           
-l ether-link, 
--link=ether-link                 Specifies an Ethernet link to remove from the aggregation.
                 Multiple links can be removed by supplying multiple 
-l                 options.           
-t, 
--temporary                 Specifies that the removals are temporary.  Temporary
                 removals last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm show-aggr [
-PLx] [
-s [
-i interval]] [[
-p] 
-o field[,...]]
           [
aggr-link]
           Show aggregation configuration (the default), LACP information,
           or statistics, either for all aggregations or for the specified
           aggregation.
           By default (with no options), the following fields can be
           displayed:           
LINK          The name of the aggregation link.           
POLICY        The LACP policy of the aggregation.  See the                         
create-aggr -P option for a description of the
                         possible values.           
ADDRPOLICY    Either `auto', if the aggregation is configured to
                         automatically configure its unicast MAC address
                         (the default if the 
-u option was not used to
                         create or modify the aggregation), or `fixed', if                         
-u was used to set a fixed MAC address.           
LACPACTIVITY  The LACP mode of the aggregation.  Possible values
                         are `off', `active', or `passive', as set by the 
-l                         option to 
create-aggr or 
modify-aggr.           
LACPTIMER     The LACP timer value of the aggregation as set by
                         the 
-T option of 
create-aggr or 
modify-aggr.           
FLAGS         A set of state flags associated with the
                         aggregation.  The only possible flag is `f', which
                         is displayed if the administrator forced the
                         creation the aggregation using the 
-f option to                         
create-aggr.  Other flags might be defined in the
                         future.
           The 
show-aggr command accepts the following options:           
-L, 
--lacp                 Displays detailed LACP information for the aggregation link
                 and each underlying port.  Most of the state information
                 displayed by this option is defined by IEEE 802.3.  With
                 this option, the following fields can be displayed:                 
LINK          The name of the aggregation link.                 
PORT          The name of one of the underlying aggregation
                               ports.                 
AGGREGATABLE  Whether the port can be added to the
                               aggregation.                 
SYNC          If `yes', the system considers the port to be
                               synchronized and part of the aggregation.                 
COLL          If `yes', collection of incoming frames is
                               enabled on the associated port.                 
DIST          If `yes', distribution of outgoing frames is
                               enabled on the associated port.                 
DEFAULTED     If `yes', the port is using defaulted partner
                               information (that is, has not received LACP
                               data from the LACP partner).                 
EXPIRED       If `yes', the receive state of the port is in
                               the EXPIRED state.           
-x, 
--extended                 Display additional aggregation information including
                 detailed information on each underlying port.  With 
-x, the
                 following fields can be displayed:                 
LINK          The name of the aggregation link.                 
PORT          The name of one of the underlying aggregation
                               ports.                 
SPEED         The speed of the link or port in megabits per
                               second.                 
DUPLEX        The full/half duplex status of the link or
                               port is displayed if the link state is `up'.
                               The duplex status is displayed as `unknown'
                               in all other cases.                 
STATE         The link state.  This can be `up', `down', or
                               `unknown'.                 
ADDRESS       The MAC address of the link or port.                 
PORTSTATE     This indicates whether the individual
                               aggregation port is in the `standby' or
                               `attached' state.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed above, or the special value 
all, to display all
                 fields.  The fields applicable to the 
-o option are limited
                 to those listed under each output mode.  For example, if
                 using 
-L, only the fields listed under 
-L, above, can be
                 used with 
-o.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-p, 
--persistent                 Display the persistent aggregation configuration rather
                 than the state of the running system.           
-s, 
--statistics                 Displays aggregation statistics.           
-i interval, 
--interval=interval                 Used with the 
-s option to specify an interval, in seconds,
                 at which statistics should be displayed.  If this option is
                 not specified, statistics will be displayed only once.     
dladm create-bridge [
-R root-dir] [
-P protect] [
-p priority] [
-m           max-age] [
-h hello-time] [
-d forward-delay] [
-f force-protocol]
           [
-l link]... 
bridge-name           Create an 802.1D bridge instance and optionally assign one or
           more network links to the new bridge.  By default, no bridge
           instances are present on the system.
           In order to bridge between links, you must create at least one
           bridge instance.  Each bridge instance is separate, and there is
           no forwarding connection between bridges.           
-P protect, 
--protect=protect                 Specifies a protection method.  The defined protection
                 methods are 
stp for the Spanning Tree Protocol and 
trill                 for TRILL, which is used on RBridges.  The default value is                 
stp.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-p priority, 
--priority=priority                 Specifies the Bridge Priority.  This sets the IEEE STP
                 priority value for determining the root bridge node in the
                 network.  The default value is 32768.  Valid values are 0
                 (highest priority) to 61440 (lowest priority), in
                 increments of 4096.
                 If a value not evenly divisible by 4096 is used, the system
                 silently rounds downwards to the next lower value that is
                 divisible by 4096.           
-m max-age, 
--max-age=max-age                 Specifies the maximum age for configuration information in
                 seconds.  This sets the STP Bridge Max Age parameter.  This
                 value is used for all nodes in the network if this node is
                 the root bridge.  Bridge link information older than this
                 time is discarded.  It defaults to 20 seconds.  Valid
                 values are from 6 to 40 seconds.  See the 
-d forward-delay                 parameter for additional constraints.           
-h hello-time, 
--hello-time=hello-time                 Specifies the STP Bridge Hello Time parameter.  When this
                 node is the root node, it sends Configuration BPDUs at this
                 interval throughout the network.  The default value is 2
                 seconds.  Valid values are from 1 to 10 seconds.  See the                 
-d forward-delay parameter for additional constraints.           
-d forward-delay, 
--forward-delay=forward-delay                 Specifies the STP Bridge Forward Delay parameter.  When
                 this node is the root node, then all bridges in the network
                 use this timer to sequence the link states when a port is
                 enabled.  The default value is 15 seconds.  Valid values
                 are from 4 to 30 seconds.
                 Bridges must obey the following two constraints:
                       2 * (
forward-delay - 1.0) >= 
max-age                       max-age >= 2 * (
hello-time + 1.0)
                 Any parameter setting that would violate those constraints
                 is treated as an error and causes the command to fail with
                 a diagnostic message.  The message provides valid
                 alternatives to the supplied values.           
-f force-protocol, 
--force-protocol=force-protocol                 Specifies the MSTP forced maximum supported protocol.  The
                 default value is 3.  Valid values are non-negative
                 integers.  The current implementation does not support RSTP
                 or MSTP, so this currently has no effect.  However, to
                 prevent MSTP from being used in the future, the parameter
                 may be set to 0 for STP only or 2 for STP and RSTP.           
-l link, 
--link=link                 Specifies one or more links to add to the newly-created
                 bridge.  This is similar to creating the bridge and then
                 adding one or more links, as with the 
add-bridge                 subcommand.  However, if any of the links cannot be added,
                 the entire command fails, and the new bridge itself is not
                 created.  To add multiple links on the same command line,
                 repeat this option for each link.  You are permitted to
                 create bridges without links.  For more information about
                 link assignments, see the 
add-bridge subcommand.
           Bridge creation and link assignment require the
           PRIV_SYS_DL_CONFIG privilege.  Bridge creation might fail if the
           optional bridging feature is not installed on the system.     
dladm modify-bridge [
-R root-dir] [
-P protect] [
-p priority] [
-m           max-age] [
-h hello-time] [
-d forward-delay] [
-f force-protocol]           
bridge-name           Modify the operational parameters of an existing bridge.  The
           options are the same as for the 
create-bridge subcommand, except
           that the 
-l option is not permitted.  To add links to an existing
           bridge, use the 
add-bridge subcommand.
           Bridge parameter modification requires the PRIV_SYS_DL_CONFIG
           privilege.     
dladm delete-bridge [
-R root-dir] 
bridge-name           Delete a bridge instance.  The bridge being deleted must not have
           any attached links.  Use the 
remove-bridge subcommand to
           deactivate links before deleting a bridge.
           Bridge deletion requires the PRIV_SYS_DL_CONFIG privilege.
           The 
-R (
--root-dir) option is the same as for the 
create-bridge           subcommand.     
dladm add-bridge [
-R root-dir] 
-l link [
-l link]... 
bridge-name           Add one or more links to an existing bridge.  If multiple links
           are specified, and adding any one of them results in an error,
           the command fails and no changes are made to the system.
           Link addition to a bridge requires the PRIV_SYS_DL_CONFIG
           privilege.
           A link may be a member of at most one bridge.  An error occurs
           when you attempt to add a link that already belongs to another
           bridge.  To move a link from one bridge instance to another,
           remove it from the current bridge before adding it to a new one.
           The links assigned to a bridge must not also be VLANs, VNICs, or
           tunnels.  Only physical Ethernet datalinks, aggregation
           datalinks, wireless links, and Ethernet stubs are permitted to be
           assigned to a bridge.
           Links assigned to a bridge must all have the same MTU.  This is
           checked when the link is assigned.  The link is added to the
           bridge in a deactivated form if it is not the first link on the
           bridge and it has a differing MTU.
           Note that systems using bridging should not set the 
eeprom(8)           local-mac-address? variable to false.
           The options are the same as for the 
create-bridge subcommand.     
dladm remove-bridge [
-R root-dir] 
-l link [
-l link]... 
bridge-name           Remove one or more links from a bridge instance.  If multiple
           links are specified, and removing any one of them would result in
           an error, the command fails and none are removed.
           Link removal from a bridge requires the PRIV_SYS_DL_CONFIG
           privilege.
           The options are the same as for the 
create-bridge subcommand.     
dladm show-bridge [
-flt] [
-s [
-i interval]] [[
-p] 
-o field[,...]]           
bridge-name           Show the running status and configuration of bridges, their
           attached links, learned forwarding entries, and TRILL nickname
           databases.  When showing overall bridge status and configuration,
           the bridge name can be omitted to show all bridges.  The other
           forms require a specified bridge.
           The show-bridge subcommand accepts the following options:           
-i interval, 
--interval=interval                 Used with the 
-s option to specify an interval, in seconds,
                 at which statistics should be displayed.  If this option is
                 not specified, statistics will be displayed only once.           
-s, 
--statistics                 Display statistics for the specified bridges or for a given
                 bridge's attached links.  This option cannot be used with
                 the 
-f and 
-t options.           
-p, 
--parsable                 Display using a stable machine-parsable format.  See                 
Parsable Output Format, below.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field names are described below.  The
                 special value 
all displays all fields.  Each set of fields
                 has its own default set to display when 
-o is not
                 specified.
           By default, the 
show-bridge subcommand shows bridge
           configuration.  The following fields can be shown:           
BRIDGE      The name of the bridge.           
ADDRESS     The Bridge Unique Identifier value (MAC address).           
PRIORITY    Configured priority value; set by 
-p with                       
create-bridge and 
modify-bridge.           
BMAXAGE     Configured bridge maximum age; set by 
-m with                       
create-bridge and 
modify-bridge.           
BHELLOTIME  Configured bridge hello time; set by 
-h with                       
create-bridge and 
modify-bridge.           
BFWDDELAY   Configured forwarding delay; set by 
-d with                       
create-bridge and 
modify-bridge.           
FORCEPROTO  Configured forced maximum protocol; set by 
-f with                       
create-bridge and 
modify-bridge.           
TCTIME      Time, in seconds, since last topology change.           
TCCOUNT     Count of the number of topology changes.           
TCHANGE     This indicates that a topology change was detected.           
DESROOT     Bridge Identifier of the root node.           
ROOTCOST    Cost of the path to the root node.           
ROOTPORT    Port number used to reach the root node.           
MAXAGE      Maximum age value from the root node.           
HELLOTIME   Hello time value from the root node.           
FWDDELAY    Forward delay value from the root node.           
HOLDTIME    Minimum BPDU interval.
           By default, when the 
-o option is not specified, only the 
BRIDGE,           
ADDRESS, 
PRIORITY, and 
DESROOT fields are shown.
           When the 
-s option is specified, the 
show-bridge subcommand shows
           bridge statistics.  The following fields can be shown:           
BRIDGE      Bridge name.           
DROPS       Number of packets dropped due to resource problems.           
FORWARDS    Number of packets forwarded from one link to another.           
MBCAST      Number of multicast and broadcast packets handled by
                       the bridge.           
RECV        Number of packets received on all attached links.           
SENT        Number of packets sent on all attached links.           
UNKNOWN     Number of packets handled that have an unknown
                       destination.  Such packets are sent to all links.
           By default, when the 
-o option is not specified, only the 
BRIDGE,           
DROPS, and 
FORWARDS fields are shown.
           The 
show-bridge subcommand also accepts the following options:           
-l, 
--link                 Displays link-related status and statistics information for
                 all links attached to a single bridge instance.  By using
                 this option and without the 
-s option, the following fields
                 can be displayed for each link:                 
LINK       The link name.                 
INDEX      Port (link) index number on the bridge.                 
STATE      State of the link.  The state can be `disabled',
                            `discarding', `learning', `forwarding',
                            `non-stp', or `bad-mtu'.                 
UPTIME     Number of seconds since the last reset or
                            initialization.                 
OPERCOST   Actual cost in use (1-65535).                 
OPERP2P    This indicates whether point-to-point (P2P) mode
                            been detected.                 
OPEREDGE   This indicates whether edge mode has been
                            detected.                 
DESROOT    The Root Bridge Identifier that has been seen on
                            this port.                 
DESCOST    Path cost to the network root node through the
                            designated port.                 
DESBRIDGE  Bridge Identifier for this port.                 
DESPORT    The ID and priority of the port used to transmit
                            configuration messages for this port.                 
TCACK      This indicates whether Topology Change
                            Acknowledge has been seen.
                 When the 
-l option is specified without the 
-o option, only
                 the 
LINK, 
STATE, 
UPTIME, and 
DESROOT fields are shown.
                 When the 
-l option is specified, the 
-s option can be used
                 to display the following fields for each link:                 
LINK       Link name.                 
CFGBPDU    Number of configuration BPDUs received.                 
TCNBPDU    Number of topology change BPDUs received.                 
RSTPBPDU   Number of Rapid Spanning Tree BPDUs received.                 
TXBPDU     Number of BPDUs transmitted.                 
DROPS      Number of packets dropped due to resource
                            problems.                 
RECV       Number of packets received by the bridge.                 
XMIT       Number of packets sent by the bridge.
                 When the 
-o option is not specified, only the 
LINK, 
DROPS,                 
RECV, and 
XMIT fields are shown.           
-f, 
--forwarding                 Displays forwarding entries for a single bridge instance.
                 With this option, the following fields can be shown for
                 each forwarding entry:                 
DEST     Destination MAC address.                 
AGE      Age of entry in seconds and milliseconds.  Omitted
                          for local entries.                 
FLAGS    The 
L (local) flag is shown if the MAC address
                          belongs to an attached link or to a VNIC on one of
                          the attached links.                 
OUTPUT   For local entries, this is the name of the
                          attached link that has the MAC address.
                          Otherwise, for bridges that use Spanning Tree
                          Protocol, this is the output interface name.  For
                          RBridges, this is the output TRILL nickname.
                 When the 
-o option is not specified, the 
DEST, 
AGE, 
FLAGS,
                 and 
OUTPUT fields are shown.           
-t, 
--trill                 Displays TRILL nickname entries for a single bridge
                 instance.  With this option, the following fields can be
                 shown for each TRILL nickname entry:                 
NICK     TRILL nickname for this RBridge, which is a number
                          from 1 to 65535.                 
FLAGS    The 
L flag is shown if the nickname identifies the
                          local system.                 
LINK     Link name for output when sending messages to this
                          RBridge.                 
NEXTHOP  MAC address of the next hop RBridge that is used
                          to reach the RBridge with this nickname.
                 When the 
-o option is not specified, the 
NICK, 
FLAGS, 
LINK,
                 and 
NEXTHOP fields are shown.     
dladm create-vlan [
-ft] [
-R root-dir] 
-l ether-link -v vid [
vlan-link]
           Create a tagged VLAN link with an ID of 
vid over Ethernet link           
ether-link.  The name of the VLAN link can be specified as 
vlan-           
link.  If the name is not specified, a name will be automatically
           generated (assuming that 
ether-link is 
namePPA) as:                 
<name><1000 
* vid + PPA>           For example, if 
ether-link is 
bge1 and 
vid is 2, the name
           generated is 
bge2001.           
-f, 
--force                 Force the creation of the VLAN link.  Some devices do not
                 allow frame sizes large enough to include a VLAN header.
                 When creating a VLAN link over such a device, the 
-f option
                 is needed, and the MTU of the IP interfaces on the
                 resulting VLAN must be set to 1496 instead of 1500.           
-l ether-link                 Specifies Ethernet link over which VLAN is created.           
-t, 
--temporary                 Specifies that the VLAN link is temporary.  Temporary VLAN
                 links last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm delete-vlan [
-t] [
-R root-dir] 
vlan-link           Delete the VLAN link specified.
           The 
delete-vlan subcommand accepts the following options:           
-t, 
--temporary                 Specifies that the deletion is temporary.  Temporary
                 deletions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm show-vlan [
-P] [[
-p] 
-o field[,...]] [
vlan-link]
           Display VLAN configuration for all VLAN links or for the
           specified VLAN link.
           The 
show-vlan subcommand accepts the following options:           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all, to display all
                 fields.  For each VLAN link, the following fields can be
                 displayed:                 
LINK   The name of the VLAN link.                 
VID    The ID associated with the VLAN.                 
OVER   The name of the physical link over which this VLAN
                        is configured.                 
FLAGS  A set of flags associated with the VLAN link.
                        Possible flags are:                        
-f    The VLAN was created using the 
-f option to                              
create-vlan.                        
-i    The VLAN was implicitly created when the DLPI
                              link was opened.  These VLAN links are
                              automatically deleted on last close of the
                              DLPI link (for example, when the IP interface
                              associated with the VLAN link is unplumbed).
                        Additional flags may be defined in the future.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-P, 
--persistent                 Display the persistent VLAN configuration rather than the
                 state of the running system.     
dladm scan-wifi [[
-p] 
-o field[,...]] [
wifi-link]
           Scans for WiFi networks, either on all WiFi links, or just on the
           specified 
wifi-link.
           By default, currently all fields but 
BSSTYPE are displayed.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all to display all
                 fields.  For each WiFi network found, the following fields
                 can be displayed:                 
LINK      The name of the link the WiFi network is on.                 
ESSID     The ESSID (name) of the WiFi network.                 
BSSID     Either the hardware address of the WiFi network's
                           Access Point (for BSS networks), or the WiFi
                           network's randomly generated unique token (for
                           IBSS networks).                 
SEC       Either `none' for a WiFi network that uses no
                           security, `wep' for a WiFi network that requires
                           WEP (Wired Equivalent Privacy), or `wpa' for a
                           WiFi network that requires WPA (Wi-Fi Protected
                           Access).                 
MODE      The supported connection modes: one or more of
                           `a', `b', or `g'.                 
STRENGTH  The strength of the signal: one of `excellent',
                           `very good', `good', `weak', or `very weak'.                 
SPEED     The maximum speed of the WiFi network, in
                           megabits per second.                 
BSSTYPE   Either `bss' for `BSS' (infrastructure) networks,
                           or `ibss' for `IBSS' (ad-hoc) networks.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.     
dladm connect-wifi [
-e essid] [
-i bssid] [
-k key,...]
           [
-s none|
wep|
wpa] [
-a open|
shared] [
-b bss|
ibss] [
-c] [
-m a|
b|
g]
           [
-T time] [
wifi-link]
           Connects to a WiFi network.  This consists of four steps:           
discovery, 
filtration, 
prioritization, and 
association.  However,
           to enable connections to non-broadcast WiFi networks and to
           improve performance, if a BSSID or ESSID is specified using the           
-e or 
-i options, then the first three steps are skipped and           
connect-wifi immediately attempts to associate with a BSSID or
           ESSID that matches the rest of the provided parameters.  If this
           association fails, but there is a possibility that other networks
           matching the specified criteria exist, then the traditional
           discovery process begins as specified below.
           The discovery step finds all available WiFi networks on the
           specified WiFi link, which must not yet be connected.  For
           administrative convenience, if there is only one WiFi link on the
           system, 
wifi-link can be omitted.
           Once discovery is complete, the list of networks is filtered
           according to the value of the following options:           
-e essid, 
--essid=essid                 Networks that do not have the same 
essid are filtered out.           
-b bss|
ibss, 
--bsstype=bss|
ibss                 Networks that do not have the same bsstype are filtered
                 out.           
-m a|
b|
g, 
--mode=a|
b|
g                 Networks not appropriate for the specified 802.11 mode are
                 filtered out.           
-k key[,...], 
--key=key[,...]
                 Use the specified secobj named by the key to connect to the
                 network.  Networks not appropriate for the specified keys
                 are filtered out.           
-s none|
wep|
wpa, 
--sec=none|
wep|
wpa                 Networks not appropriate for the specified security mode
                 are filtered out.
           Next, the remaining networks are prioritized, first by signal
           strength, and then by maximum speed.  Finally, an attempt is made
           to associate with each network in the list, in order, until one
           succeeds or no networks remain.
           In addition to the options described above, the following options
           also control the behavior of 
connect-wifi:           
-a open|
shared, 
--auth=open|
shared                 Connect using the specified authentication mode.  By
                 default, 
open and 
shared are tried in order.           
-c, 
--create-ibss                 Used with 
-b ibss to create a new ad-hoc network if one
                 matching the specified ESSID cannot be found.  If no ESSID
                 is specified, then 
-c -b ibss always triggers the creation
                 of a new ad-hoc network.           
-T time, 
--timeout=time                 Specifies the number of seconds to wait for association to
                 succeed.  If 
time is 
forever, then the associate will wait
                 indefinitely.  The current default is ten seconds, but this
                 might change in the future.  Timeouts shorter than the
                 default might not succeed reliably.           
-k key[,...], 
--key=key[,...]
                 In addition to the filtering previously described, the
                 specified keys will be used to secure the association.  The
                 security mode to use will be based on the key class; if a
                 security mode was explicitly specified, it must be
                 compatible with the key class.  All keys must be of the
                 same class.
                 For security modes that support multiple key slots, the
                 slot to place the key will be specified by a colon followed
                 by an index.  Therefore, 
-k mykey:3 places 
mykey in slot 3.
                 By default, slot 1 is assumed.  For security modes that
                 support multiple keys, a comma-separated list can be
                 specified, with the first key being the active key.     
dladm disconnect-wifi [
-a] [
wifi-link]
           Disconnect from one or more WiFi networks.  If 
wifi-link           specifies a connected WiFi link, then it is disconnected.  For
           administrative convenience, if only one WiFi link is connected,           
wifi-link can be omitted.           
-a, 
--all-links                 Disconnects from all connected links.  This is primarily
                 intended for use by scripts.     
dladm show-wifi [[
-p] 
-o field[,...]] [
wifi-link]
           Shows WiFi configuration information either for all WiFi links or
           for the specified 
wifi-link.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all, to display all
                 fields.  For each WiFi link, the following fields can be
                 displayed:                 
LINK      The name of the link being displayed.                 
STATUS    Either `connected' if the link is connected, or
                           `disconnected' if it is not connected.  If the
                           link is disconnected, all remaining fields have
                           the value `--'.                 
ESSID     The ESSID (name) of the connected WiFi network.                 
BSSID     Either the hardware address of the WiFi network's
                           Access Point (for BSS networks), or the WiFi
                           network's randomly generated unique token (for
                           IBSS networks).                 
SEC       Either `none' for a WiFi network that uses no
                           security, `wep' for a WiFi network that requires
                           WEP, or `wpa' for a WiFi network that requires
                           WPA.                 
MODE      The supported connection modes: one or more of
                           `a', `b', or `g'.                 
STRENGTH  The connection strength: one of `excellent',
                           `very good', `good', `weak', or `very weak'.                 
SPEED     The connection speed, in megabits per second.                 
AUTH      Either `open' or `shared' (see 
connect-wifi).                 
BSSTYPE   Either `bss' for `BSS' (infrastructure) networks,
                           or `ibss' for `IBSS' (ad-hoc) networks.
                 By default, currently all fields but 
AUTH, 
BSSID, and                 
BSSTYPE are displayed.           
-p, 
--parsable                 Displays using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.     
dladm show-ether [
-x] [[
-p] 
-o field[,...]] [
ether-link]
           Shows state information either for all physical Ethernet links or
           for a specified physical Ethernet link.
           The 
show-ether subcommand accepts the following options:           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all to display all
                 fields.  For each link, the following fields can be
                 displayed:                 
LINK   The name of the link being displayed.                 
PTYPE  Parameter type, where `current' indicates the
                        negotiated state of the link, `capable' indicates
                        capabilities supported by the device, `adv'
                        indicates the advertised capabilities, and `peeradv'
                        indicates the capabilities advertised by the link-
                        partner.                 
STATE  The state of the link.                 
AUTO   A yes/no value indicating whether auto-negotiation
                        is advertised.                 
SPEED-DUPLEX                        Combinations of speed and duplex values available.
                        The units of speed are encoded with a trailing
                        suffix of `G' (Gigabits/s) or `M' (Mb/s).  Duplex
                        values are encoded as `f' (full-duplex) or `h'
                        (half-duplex).                 
PAUSE  Flow control information.  Can be `no', indicating
                        no flow control is available; `tx', indicating that
                        the end-point can transmit pause frames, but ignores
                        any received pause frames; `rx', indicating that the
                        end-point receives and acts upon received pause
                        frames; or `bi', indicating bi-directional flow-
                        control.                 
REM_FAULT                        Fault detection information.  Valid values are
                        `none' or `fault'.
                 By default, all fields except 
REM_FAULT are displayed for
                 the "current" 
PTYPE.           
-p, 
--parsable                 Displays using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-x, 
--extended                 Extended output is displayed for 
PTYPE values of `current',
                 `capable', `adv' and `peeradv'.     
dladm set-linkprop [
-t] [
-R root-dir] 
-p prop=value[,...] 
link           Sets the values of one or more properties on the link specified.
           The list of properties and their possible values depend on the
           link type, the network device driver, and networking hardware.
           These properties can be retrieved using 
show-linkprop.           
-t, 
--temporary                 Specifies that the changes are temporary.  Temporary
                 changes last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-p prop=value[,...], 
--prop prop=value[,...]
                 A comma-separated list of properties to set to the
                 specified values.
           Note that when the persistent value is set, the temporary value
           changes to the same value.     
dladm reset-linkprop [
-t] [
-R root-dir] [
-p prop[,...]] 
link           Resets one or more properties to their values on the link
           specified.  Properties are reset to the values they had at
           startup.  If no properties are specified, all properties are
           reset.  See 
show-linkprop for a description of properties.           
-t, 
--temporary                 Specifies that the resets are temporary.  Values are reset
                 to default values.  Temporary resets last until the next
                 reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-p prop[,...], 
--prop=prop[,...]
                 A comma-separated list of properties to reset.
           Note that when the persistent value is reset, the temporary value
           changes to the same value.     
dladm show-linkprop [
-P] [[
-c] 
-o field[,...]] [
-p prop[,...]] [
link]
           Show the current or persistent values of one or more properties,
           either for all datalinks or for the specified link.  By default,
           current values are shown.  If no properties are specified, all
           available link properties are displayed.  For each property, the
           following fields are displayed:           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all to display all
                 fields.  For each link, the following fields can be
                 displayed:                 
LINK      The name of the datalink.                 
PROPERTY  The name of the property.                 
PERM      The read/write permissions of the property.  The
                           value shown is one of `ro' or `rw'.                 
VALUE     The current (or persistent) property value.  If
                           the value is not set, it is shown as `--'.  If it
                           is unknown, the value is shown as `'?.
                           Persistent values that are not set or have been
                           reset will be shown as `--' and will use the
                           system DEFAULT value (if any).                 
DEFAULT   The default value of the property.  If the
                           property has no default value, `--' is shown.                 
POSSIBLE  A comma-separated list of the values the property
                           can have.  If the values span a numeric range,
                           `min-max' might be shown as shorthand.  If the
                           possible values are unknown or unbounded, `--' is
                           shown.
                 The list of properties depends on the link type and network
                 device driver, and the available values for a given
                 property further depends on the underlying network hardware
                 and its state.  General link properties are documented in
                 the 
LINK PROPERTIES section.  However, link properties that
                 begin with underscore (_) are specific to a given link or
                 its underlying network device and subject to change or
                 removal.  See the appropriate network device driver man
                 page for details.           
-c, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with this option.  See 
Parsable Output                 Format, below.           
-P, 
--persistent                 Display persistent link property information.           
-p prop[,...], 
--prop=prop[,...]
                 A comma-separated list of properties to show.  See the
                 sections on link properties following subcommand
                 descriptions.     
dladm create-secobj [
-t] [
-R root-dir] [
-f file] 
-c class secobj           Create a secure object named 
secobj in the specified 
class to be
           later used as a WEP or WPA key in connecting to an encrypted
           network.  The value of the secure object can either be provided
           interactively or read from a file.  The sequence of interactive
           prompts and the file format depends on the class of the secure
           object.
           Currently, the classes `wep' and `wpa' are supported.  The `WEP'
           (Wired Equivalent Privacy) key can be either 5 or 13 bytes long.
           It can be provided either as an ASCII or hexadecimal string --
           thus, 12345 and 0x3132333435 are equivalent 5-byte keys (the 0x
           prefix can be omitted).  A file containing a `WEP' key must
           consist of a single line using either `WEP' key format.  The WPA
           (Wi-Fi Protected Access) key must be provided as an ASCII string
           with a length between 8 and 63 bytes.
           This subcommand is only usable by users or roles that belong to
           the "Network Link Security" RBAC profile.           
-c class, 
--class=class                 class can be `wep' or `wpa'.  See preceding discussion.           
-t, 
--temporary                 Specifies that the creation is temporary.  Temporary
                 creation lasts until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-f file, 
--file=file                 Specifies a file that should be used to obtain the secure
                 object's value.  The format of this file depends on the
                 secure object class.  See the 
EXAMPLES section for an
                 example of using this option to set a WEP key.     
dladm delete-secobj [
-t] [
-R root-dir] 
secobj[,...]
           Delete one or more specified secure objects.  This subcommand is
           only usable by users or roles that belong to the "Network Link
           Security" RBAC profile.           
-t, 
--temporary                 Specifies that the deletions are temporary.  Temporary
                 deletions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm show-secobj [
-P] [[
-p] 
-o field[,...]] [
secobj[,...]]
           Show current or persistent secure object information.  If one or
           more secure objects are specified, then information for each is
           displayed.  Otherwise, all current or persistent secure objects
           are displayed.
           By default, current secure objects are displayed, which are all
           secure objects that have either been persistently created and not
           temporarily deleted, or temporarily created.
           For security reasons, it is not possible to show the value of a
           secure object.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below.  For displayed secure object, the following
                 fields can be shown:                 
OBJECT  The name of the secure object.                 
CLASS   The class of the secure object.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-P, 
--persistent                 Display persistent secure object information     
dladm create-vnic [
-t] [
-R root-dir] 
-l link [
-m value | 
auto | 
factory           -n slot-identifier | 
random [
-r prefix]] [
-v vlan-id] [
-p           prop=value[,...]] 
vnic-link           Create a VNIC with name 
vnic-link over the specified link.           
-t, 
--temporary                 Specifies that the VNIC is temporary.  Temporary VNICs last
                 until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-l link, 
--link=link                 link can be a physical link, an etherstub or an overlay.           
-m value|
keyword, 
--mac-address=value|
keyword                 Sets the VNIC's MAC address based on the specified value or
                 keyword.  If 
value is not a keyword, it is interpreted as a
                 unicast MAC address, which must be valid for the underlying
                 NIC.  The following special keywords can be used:                 
factory [
-n slot-identifier]                 
factory [
--slot=slot-identifier]
                       Assign a factory MAC address to the VNIC.  When a
                       factory MAC address is requested, 
-m can be combined
                       with the 
-n option to specify a MAC address slot to
                       be used.  If 
-n is not specified, the system will
                       choose the next available factory MAC address.  The                       
-m option of the 
show-phys subcommand can be used to
                       display the list of factory MAC addresses, their slot
                       identifiers, and their availability.                 
random [
-r prefix]                 
random [
--mac-prefix=prefix]
                       Assign a random MAC address to the VNIC.  A default
                       prefix consisting of a valid IEEE OUI with the local
                       bit set will be used.  That prefix can be overridden
                       with the 
-r option.                 
auto  Try and use a factory MAC address first.  If none is
                       available, assign a random MAC address.  
auto is the
                       default action if the 
-m option is not specified.                 
-v vlan-id                       Enable VLAN tagging for this VNIC.  The VLAN tag will
                       have id 
vlan-id.           
-p prop[,...], 
--prop=prop[,...]
                 A comma-separated list of properties to set to the
                 specified values.     
dladm delete-vnic [
-t] [
-R root-dir] 
vnic-link           Deletes the specified VNIC.           
-t, 
--temporary                 Specifies that the deletion is temporary.  Temporary
                 deletions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm show-vnic [
-P] [[
-p] 
-o field[,...]] [
-s [
-i interval]] [
-l link]
           [
vnic-link]
           Show VNIC configuration information (the default) or statistics,
           for all VNICs, all VNICs on a link, or only the specified           
vnic-link.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below.  The field name must be one of the fields
                 listed below, or the special value 
all to display all
                 fields.  By default (without 
-o), 
show-vnic displays all
                 fields.                 
LINK         The name of the VNIC.                 
OVER         The name of the physical link over which this
                              VNIC is configured.                 
SPEED        The maximum speed of the VNIC, in megabits per
                              second.                 
MACADDRESS   MAC address of the VNIC.                 
MACADDRTYPE  MAC address type of the VNIC.  
dladm                              distinguishes among the following MAC address
                              types:                              
random   A random address assigned to the
                                       VNIC.                              
factory  A factory MAC address used by the
                                       VNIC.                 
VID          The VLAN ID for the VNIC.                 
ZONE         The zone to which the VNIC is currently
                              assigned.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-P, 
--persistent                 Display the persistent VNIC configuration.           
-s, 
--statistics                 Displays VNIC statistics.           
-i interval, 
--interval=interval                 Used with the 
-s option to specify an interval, in seconds,
                 at which statistics should be displayed.  If this option is
                 not specified, statistics will be displayed only once.           
-l link, 
--link=link                 Display information for all VNICs on the named link.     
dladm create-etherstub [
-t] [
-R root-dir] 
etherstub           Create an etherstub with the specified name.           
-t, 
--temporary                 Specifies that the etherstub is temporary.  Temporary
                 etherstubs do not persist across reboots.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.
           VNICs can be created on top of etherstubs instead of physical
           NICs.  As with physical NICs, such a creation causes the stack to
           implicitly create a virtual switch between the VNICs created on
           top of the same etherstub.     
dladm delete-etherstub [
-t] [
-R root-dir] 
etherstub           Delete the specified etherstub.           
-t, 
--temporary                 Specifies that the deletion is temporary.  Temporary
                 deletions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm show-etherstub [
etherstub]
           Show all configured etherstubs by default, or the specified
           etherstub if 
etherstub is specified.     
dladm create-iptun [
-t] [
-R root-dir] 
-T type           [
-a {
local|
remote}
=addr[,...]] 
iptun-link           Create an IP tunnel link named 
iptun-link.  Such links can
           additionally be protected with IPsec using 
ipsecconf(8).
           An IP tunnel is conceptually comprised of two parts: a virtual
           link between two or more IP nodes, and an IP interface above this
           link that allows the system to transmit and receive IP packets
           encapsulated by the underlying link.  This subcommand creates a
           virtual link.  The 
ifconfig(8) command is used to configure IP
           interfaces above the link.           
-t, 
--temporary                 Specifies that the IP tunnel link is temporary.  Temporary
                 tunnels last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-T type, 
--tunnel-type=type                 Specifies the type of tunnel to be created.  The type must
                 be one of the following:                 
ipv4  A point-to-point, IP-over-IP tunnel between two IPv4
                       nodes.  This type of tunnel requires IPv4 source and
                       destination addresses to function.  IPv4 and IPv6
                       interfaces can be plumbed above such a tunnel to
                       create IPv4-over-IPv4 and IPv6-over-IPv4 tunneling
                       configurations.                 
ipv6  A point-to-point, IP-over-IP tunnel between two IPv6
                       nodes as defined in IETF RFC 2473.  This type of
                       tunnel requires IPv6 source and destination addresses
                       to function.  IPv4 and IPv6 interfaces can be plumbed
                       above such a tunnel to create IPv4-over-IPv6 and
                       IPv6-over-IPv6 tunneling configurations.                 
6to4  A 6to4, point-to-multipoint tunnel as defined in IETF
                       RFC 3056.  This type of tunnel requires an IPv4
                       source address to function.  An IPv6 interface is
                       plumbed on such a tunnel link to configure a 6to4
                       router.           
-a local=addr                 Literal IP address or hostname corresponding to the tunnel
                 source.  If a hostname is specified, it will be resolved to
                 IP addresses, and one of those IP addresses will be used as
                 the tunnel source.  As IP tunnels are created before naming
                 services have been brought online during the boot process,
                 it is important that any hostname used be included in                 
/etc/inet/hosts.  
-a remote=addr Literal IP address or
                 hostname corresponding to the tunnel destination.     
dladm modify-iptun [
-t] [
-R root-dir] [
-a {
local|
remote}
=addr[,...]]           
iptun-link           Modify the parameters of the specified IP tunnel.           
-t, 
--temporary                 Specifies that the modification is temporary.  Temporary
                 modifications last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.           
-a local=addr                 Specifies a new tunnel source address.  See 
create-iptun                 for a description.           
-a remote=addr                 Specifies a new tunnel destination address.  See                 
create-iptun for a description.     
delete-iptun [
-t] [
-R root-dir] 
iptun-link           Delete the specified IP tunnel link.           
-t, 
--temporary                 Specifies that the deletion is temporary.  Temporary
                 deletions last until the next reboot.           
-R root-dir, 
--root-dir=root-dir                 See 
Options, above.     
dladm show-iptun [
-P] [[
-p] 
-o field[,...]] [
iptun-link]
           Show IP tunnel link configuration for a single IP tunnel or all
           IP tunnels.           
-P, 
--persistent                 Display the persistent IP tunnel configuration.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed below, or the special value 
all, to display all
                 fields.  By default (without 
-o), 
show-iptun displays all
                 fields.                 
LINK    The name of the IP tunnel link.                 
TYPE    Type of tunnel as specified by the 
-T option of                         
create-iptun.                 
FLAGS   A set of flags associated with the IP tunnel link.
                         Possible flags are:                         
s     The IP tunnel link is protected by IPsec
                               policy.  To display the IPsec policy
                               associated with the tunnel link, enter:
                                     ipsecconf -ln -i tunnel-link
                               See 
ipsecconf(8) for more details on how to
                               configure IPsec policy.                         
i     The IP tunnel link was implicitly created
                               with 
ifconfig(8), and will be automatically
                               deleted when it is no longer referenced (that
                               is, when the last IP interface over the
                               tunnel is unplumbed).  See 
ifconfig(8) for
                               details on implicit tunnel creation.                 
LOCAL   The tunnel source address on the local system.                 
REMOTE  The tunnel destination address on the remote
                         system.     
dladm create-overlay [
-t] 
-e encap -s search -v vnetid           [
-p prop=value[,...]] 
overlay           Create an overlay device named 
overlay.
           Overlay devices are similar to etherstubs.  VNICs can be created
           on top of them.  However, unlike an etherstub which is local to
           the system, an overlay device can be configured to communicate to
           remote hosts, providing a means for network virtualization.  The
           way in which it does this is described by the encapsulation
           module and the search plugin.  For more information on these, see           
overlay(7).
           An overlay device has a series of required and optional
           properties.  These properties vary based upon the search and
           encapsulation modules and are fully specified in 
overlay(7).  Not
           every property needs to be specified -- some have default values
           which will be used if nothing specific is specified.  For
           example, the default port for VXLAN comes from its IANA standard.
           If a required property is missing, the command will fail and
           inform you of the missing properties.           
-t, 
--temporary                 Specifies that the overlay is temporary.  Temporary
                 overlays last until the next reboot.           
-e encap, 
--encap=encap                 Use 
encap as the encapsulation plugin for the overlay
                 device 
overlay.  The encapsulation plugin determines how
                 packets are transformed before being put on the wire.           
-s search, 
--search=search                 Use 
search as the search plugin for 
overlay.  The search
                 plugin determines how non-local targets are found and where
                 packets are directed to.           
-p prop=value[,...], 
--prop prop=value[,...]
                 A comma-separated list of properties to set to the
                 specified values.           
-v vnetid, 
--vnetid=vnetid                 Sets the virtual networking identifier to 
vnetid.  A
                 virtual network identifier determines is similar to a VLAN
                 identifier, in that it identifies a unique virtual network.
                 All overlay devices on the system share the same space for
                 the virtual network identifier.  However, the valid range
                 of identifiers is determined by the encapsulation plugin
                 specified by 
-e.     
dladm delete-overlay [
-t] 
overlay           Delete the specified overlay.  This will fail if there are VNICs
           on top of the device.           
-t, 
--temporary                 Specifies that the deletion is temporary.  Temporary
                 deletions last until the next reboot.     
dladm modify-overlay -d mac | 
-f | 
-s mac=ip:port overlay           Modifies the target tables for the specified overlay.
           The different options allow for different ways of modifying the
           target table.  One of 
-d, 
-f, and 
-s is required.  This is not
           applicable for all kinds of overlay devices.  For more
           information, see 
overlay(7).           
-d mac, 
--delete-entry=mac                 Deletes the entry for 
mac from the target table for                 
overlay.  Note, if a lookup is pending or outstanding, this
                 does not cancel it or stop it from updating the value.           
-f, 
--flush-table                 Flushes all values in the target table for 
overlay.           
-s mac=value, 
--set-entry=mac=value                 Sets the value of 
overlay's target table entry for 
mac to
                 the specified value.  The specified value varies upon the
                 encapsulation plugin.  The value may be a combination of a
                 MAC address, IP address, and port.  Generally, this looks
                 like [
mac,][
IP:][
port].  If a component is the last one,
                 then there is no need for a separator.  eg.  if just the
                 MAC address or IP is needed, it would look like 
mac and 
IP                 respectively.     
dladm show-overlay [
-f | 
-t] [[
-p] 
-o field[,...]] [
overlay]
           Shows overlay configuration (the default), internal target tables
           (
-t), or the FMA state (
-f), either for all overlays or the
           specified overlay.
           By default (with neither 
-f or 
-t specified), the following
           fields will be displayed:           
LINK      The name of the overlay.           
PROPERTY  The name of the property.           
PERM      The read/write permissions of the property.  The value
                     shown is one of `r-' or `rw'.           
VALUE     The current property value.  If the value is not set,
                     it is shown as `--'.  If it is unknown, the value is
                     shown as `?'.           
DEFAULT   The default value of the property.  If the property has
                     no default value, `--' is shown.           
POSSIBLE  A comma-separated list of the values the property can
                     have.  If the values span a numeric range, `min-max' If
                     the possible values are unknown or unbounded, `--' is
                     shown.
           When the 
-f option is used, the following fields will be
           displayed:           
LINK      The name of the overlay.           
STATUS    Either `ONLINE' or `DEGRADED'.           
DETAILS   When the overlay's status is `ONLINE', then this has
                     the value `--'.  Otherwise, when it is `DEGRADED', this
                     field provides a more detailed explanation as to why
                     it's degraded.
           When the 
-t option is used, the following fields will be
           displayed:           
LINK      The name of the overlay.           
TARGET    The target MAC address of a table entry.           
DESTINATION                     The address that an encapsulated packet will be sent to
                     when a packet has the address specified by `TARGET'.
           The 
show-overlay command supports the following options:           
-f, 
--fma                 Displays information about an overlay device's FMA state.           
-o field[,...], 
--output=field[,...]
                 A case-insensitive, comma-separated list of output fields
                 to display.  The field name must be one of the fields
                 listed above, or the special value 
all, to display all
                 fields.  The fields applicable to the 
-o option are limited
                 to those listed under each output mode.  For example, if
                 using 
-L, only the fields listed under 
-L, above, can be
                 used with 
-o.           
-p, 
--parsable                 Display using a stable machine-parsable format.  The 
-o                 option is required with 
-p.  See 
Parsable Output Format,
                 below.           
-t, 
--target                 Displays information about an overlay device's target
                 table.  For more information on the target table, see                 
overlay(7).     
dladm show-usage [
-a] 
-f filename [
-p plotfile -F format]
           [
-s time ][
-e time] [
link]
           Show the historical network usage from a stored extended
           accounting file.  Configuration and enabling of network
           accounting through 
acctadm(8) is required.  The default output
           will be the summary of network usage for the entire period of
           time in which extended accounting was enabled.           
-a    Display all historical network usage for the specified
                 period of time during which extended accounting is enabled.
                 This includes the usage information for the links that have
                 already been deleted.           
-f filename, 
--file=filename                 Read extended accounting records of network usage from                 
filename.           
-F format, 
--format=format                 Specifies the format of 
plotfile that is specified by the                 
-p option.  
gnuplot is the only currently supported format.           
-p plotfile, 
--plot=plotfile                 Write network usage data to a file of the format specified
                 by the 
-F option, which is required.           
-s time, 
--start=time           -e time, 
--stop=time                 Start and stop times for data display.  Time is in the
                 format MM/DD/YYYY,hh:mm:ss           
link  If specified, display the network usage only for the named
                 link.  Otherwise, display network usage for all links.
   Parsable Output Format
     Many 
dladm subcommands have an option that displays output in a
     machine-parsable format.  The output format is one or more lines of
     colon (:) delimited fields.  The fields displayed are specific to the
     subcommand used and are listed under the entry for the 
-o option for a
     given subcommand.  Output includes only those fields requested by means
     of the 
-o option, in the order requested.
     When you request multiple fields, any literal colon characters are
     escaped by a backslash (\) before being output.  Similarly, literal
     backslash characters will also be escaped (\\).  This escape format is
     parsable by using shell 
read(1) functions with the environment variable     
IFS=: (see 
EXAMPLES, below).  Note that escaping is not done when you
     request only a single field.
   General Link Properties
     The following general link properties are supported:     
allowed-ips           A comma-separated list of IP addresses that are allowed on the
           interface.
           An address in CIDR format with no host address specified is used
           to indicate that any address on that subnet is allowed (e.g.
           192.168.10.0/24 means any address in the range 192.168.10.0 -
           192.168.10.255 is allowed).     
autopush           Specifies the set of STREAMS modules to push on the stream
           associated with a link when its DLPI device is opened.  It is a
           space-delimited list of modules.
           The optional special character sequence `[anchor]' indicates that
           a STREAMS anchor should be placed on the stream at the module
           previously specified in the list.  It is an error to specify more
           than one anchor or to have an anchor first in the list.
           The autopush property is preferred over the more general           
autopush(8) command.     
cpus  Bind the processing of packets for a given data link to a
           processor or a set of processors.  The value can be a comma-
           separated list of one or more processor ids.  If the list
           consists of more than one processor, the processing will spread
           out to all the processors.  Connection to processor affinity and
           packet ordering for any individual connection will be maintained.
           The processor or set of processors are not exclusively reserved
           for the link.  Only the kernel threads and interrupts associated
           with processing of the link are bound to the processor or the set
           of processors specified.  In case it is desired that processors
           be dedicated to the link, 
psrset(8) can be used to create a
           processor set and then specifying the processors from the
           processor set to bind the link to.
           If the link was already bound to processor or set of processors
           due to a previous operation, the binding will be removed and the
           new set of processors will be used instead.
           The default is no CPU binding, which is to say that the
           processing of packets is not bound to any specific processor or
           processor set.     
learn_limit           Limits the number of new or changed MAC sources to be learned
           over a bridge link.  When the number exceeds this value, learning
           on that link is temporarily disabled.  Only non-VLAN, non-VNIC
           type links have this property.
           The default value is 1000.  Valid values are greater or equal to
           0.     
learn_decay           Specifies the decay rate for source changes limited by           
learn_limit.  This number is subtracted from the counter for a
           bridge link every 5 seconds.  Only non-VLAN, non-VNIC type links
           have this property.
           The default value is 200.  Valid values are greater or equal to
           0.     
maxbw           Sets the full duplex bandwidth for the link.  The bandwidth is
           specified as an integer with one of the scale suffixes (
K, 
M, or           
G for Kbps, Mbps, and Gbps).  If no units are specified, the
           input value will be read as Mbps.  The default is no bandwidth
           limit.     
priority           Sets the relative priority for the link.  The value can be given
           as one of the tokens 
high, 
medium, or 
low.  The default is 
high.     
stp   Enables or disables Spanning Tree Protocol on a bridge link.
           Setting this value to `0' disables Spanning Tree, and puts the
           link into forwarding mode with BPDU guarding enabled.  This mode
           is appropriate for point-to-point links connected only to end
           nodes.  Only non-VLAN, non-VNIC type links have this property.
           The default value is `1', to enable STP.     
forward           Enables or disables forwarding for a VLAN.  Setting this value to
           `0' disables bridge forwarding for a VLAN link.  Disabling bridge
           forwarding removes that VLAN from the "allowed set" for the
           bridge.  The default value is `1', to enable bridge forwarding
           for configured VLANs.     
default_tag           Sets the default VLAN ID that is assumed for untagged packets
           sent to and received from this link.  Only non-VLAN, non-VNIC
           type links have this property.  Setting this value to `0'
           disables the bridge forwarding of untagged packets to and from
           the port.  The default value is `1'.  Valid values values are
           from 0 to 4094.     
promisc-filtered           Enables or disables the default filtering of promiscuous mode for
           certain classes of links.  By default, VNICs will only see
           unicast traffic destined for it in promiscuous mode.  Not all the
           unicast traffic from the underlying device makes it to the VNIC.
           Disabling this would cause a VNIC, for example, to be able to see
           all unicast traffic from the device it is created over.  The
           default value is on.     
stp_priority           Sets the STP and RSTP Port Priority value, which is used to
           determine the preferred root port on a bridge.  Lower numerical
           values are higher priority.  The default value is 128.  Valid
           values range from 0 to 255.     
stp_cost           Sets the STP and RSTP cost for using the link.  The default value
           is 
auto, which sets the cost based on link speed, using `100' for
           10Mbps, `19' for 100Mbps, `4' for 1Gbps, and `2' for 10Gbps.
           Valid values range from 1 to 65535.     
stp_edge           Enables or disables bridge edge port detection.  If set to `0'
           (false), the system assumes that the port is connected to other
           bridges even if no bridge PDUs of any type are seen.  The default
           value is `1', which detects edge ports automatically.     
stp_p2p           Sets bridge point-to-point operation mode.  Possible values are           
true, 
false, and 
auto.  When set to 
auto, point-to-point
           connections are automatically discovered.  When set to 
true, the
           port mode is forced to use point-to-point.  When set to 
false,
           the port mode is forced to use normal multipoint mode.  The
           default value is 
auto.     
stp_mcheck           Triggers the system to run the RSTP 
Force BPDU Migration Check           procedure on this link.  The procedure is triggered by setting
           the property value to `1'.  The property is automatically reset
           back to `0'.  This value cannot be set unless the following are
           true:           
+o   The link is bridged           
+o   The bridge is protected by Spanning Tree           
+o   The bridge force-protocol value is at least 2 (RSTP)
           The default value is 0.     
zone  Specifies the zone to which the link belongs.  This property can
           be modified only temporarily through 
dladm, and thus the 
-t           option must be specified.  To modify the zone assignment such
           that it persists across reboots, use 
zonecfg(8).  Possible values
           consist of any exclusive-IP zone currently running on the system.
           By default, the zone binding is as per 
zonecfg(8).
   Wifi Link Properties
     The following WiFi link properties are supported.  Note that the
     ability to set a given property to a given value depends on the driver
     and hardware.     
channel           Specifies the channel to use.  This property can be modified only
           by certain WiFi links when in IBSS mode.  The default value and
           allowed range of values varies by regulatory domain.     
powermode           Specifies the power management mode of the WiFi link.  Possible
           values are 
off disable power management, 
max maximum power           savings, and 
fast (performance-sensitive power management).
           Default is 
off.     
radio           Specifies the radio mode of the WiFi link.  Possible values are           
on or 
off.  Default is 
on.     
speed           Specifies a fixed speed for the WiFi link, in megabits per
           second.  The set of possible values depends on the driver and
           hardware (but is shown by 
show-linkprop); common speeds include
           1, 2, 11, and 54.  By default, there is no fixed speed.
   Ethernet Link Properties
     The following MII Properties, as documented in 
ieee802.3(7), are
     supported in read-only mode:         
+o   duplex         
+o   state         
+o   adv_autoneg_cap         
+o   adv_10gfdx_cap         
+o   adv_1000fdx_cap         
+o   adv_1000hdx_cap         
+o   adv_100fdx_cap         
+o   adv_100hdx_cap         
+o   adv_10fdx_cap         
+o   adv_10hdx_cap
     Each `adv_' property (for example, `adv_10fdx_cap') also has a
     read/write counterpart `en_' property (for example, `en_10fdx_cap')
     controlling parameters used at auto-negotiation.  In the absence of
     Power Management, the `adv_*' speed/duplex parameters provide the
     values that are both negotiated and currently effective in hardware.
     However, with Power Management enabled, the speed/duplex capabilities
     currently exposed in hardware might be a subset of the set of bits that
     were used in initial link parameter negotiation.  Thus the MII `adv_*'
     parameters are marked read-only, with an additional set of `en_*'
     parameters for configuring speed and duplex properties at initial
     negotiation.
     Note that the `adv_autoneg_cap' does not have an `en_autoneg_cap'
     counterpart: the `adv_autoneg_cap' is a 0/1 switch that turns off/on
     auto-negotiation itself, and therefore cannot be impacted by Power
     Management.
     In addition, the following Ethernet properties are reported:     
speed           (read-only) The operating speed of the device, in Mbps.     
mtu   The maximum client SDU (Send Data Unit) supported by the device.
           Valid range is 68-65536.     
flowctrl           Establishes flow-control modes that will be advertised by the
           device.  Valid input is one of:           
no    No flow control enabled.           
rx    Receive, and act upon incoming pause frames.           
tx    Transmit pause frames to the peer when congestion occurs,
                 but ignore received pause frames.           
bi    Bidirectional flow control.
           Note that the actual settings for this value are constrained by
           the capabilities allowed by the device and the link partner.     
en_fec_cap           Sets the Forward Error Correct (FEC) code(s) to be advertised by
           the device.  Valid values are:           
none  Allow the device not to use FEC.           
auto  The device will automatically decide which FEC code to use.           
rs    Allow Reed-Solomon FEC code.           
base-r                 Allow Base-R (also known as FireCode) code.
           Valid input is either 
auto as a single value, or a comma
           separated combination of 
none, 
rs and 
base-r.  The default value
           is 
auto.
           Note the actual FEC settings and combinations are constrained by
           the capabilities allowed by the device and the link partner.     
adv_fec_cap           (read-only) The current negotiated Forward Error Correction code.     
secondary-macs           A comma-separated list of additional MAC addresses that are
           allowed on the interface.     
tagmode           This link property controls the conditions in which 802.1Q VLAN
           tags will be inserted in packets being transmitted on the link.
           Two mode values can be assigned to this property:           
normal                 Insert a VLAN tag in outgoing packets under the following
                 conditions:                     
+o   The packet belongs to a VLAN.                     
+o   The user requested priority tagging.           
vlanonly                 Insert a VLAN tag only when the outgoing packet belongs to
                 a VLAN.  If a tag is being inserted in this mode and the
                 user has also requested a non-zero priority, the priority
                 is honored and included in the VLAN tag.
           The default value is 
vlanonly.     
media           (read-only) The current type of media that the Ethernet link is
           using, if known.  For example, this would be something like
           1000BASE-T, 25GBASE-CR, 100GBASE-KR4, etc.
   IP Tunnel Link Properties
     The following IP tunnel link properties are supported.     
hoplimit           Specifies the IPv4 TTL or IPv6 hop limit for the encapsulating
           outer IP header of a tunnel link.  This property exists for all
           tunnel types.  The default value is 64.     
encaplimit           Specifies the IPv6 encapsulation limit for an IPv6 tunnel as
           defined in RFC 2473.  This value is the tunnel nesting limit for
           a given tunneled packet.  The default value is 4.  A value of 0
           disables the encapsulation limit.
EXAMPLES
     Example 1 Configuring an Aggregation
     To configure a data-link over an aggregation of devices 
bge0 and 
bge1     with key 1, enter the following command:
           # dladm create-aggr -d bge0 -d bge1 1     
Example 2 Connecting to a WiFi Link
     To connect to the most optimal available unsecured network on a system
     with a single WiFi link (as per the prioritization rules specified for     
connect-wifi), enter the following command:
           # dladm connect-wifi     
Example 3 Creating a WiFi Key
     To interactively create the WEP key `mykey', enter the following
     command:
           # dladm create-secobj -c wep mykey
     Alternatively, to non-interactively create the WEP key `mykey' using
     the contents of a file:
           # umask 077
           # cat >/tmp/mykey.$$ <<EOF
           12345
           EOF
           # dladm create-secobj -c wep -f /tmp/mykey.$$ mykey
           # rm /tmp/mykey.$$     
Example 4 Connecting to a Specified Encrypted WiFi Link
     To use key `mykey' to connect to ESSID `wlan' on link `ath0', enter the
     following command:
           # dladm connect-wifi -k mykey -e wlan ath0     
Example 5 Changing a Link Property
     To set powermode to the value `fast' on link `pcwl0', enter the
     following command:
           # dladm set-linkprop -p powermode=fast pcwl0     
Example 6 Connecting to a WPA-Protected WiFi Link
     Create a WPA key `psk' and enter the following command:
           # dladm create-secobj -c wpa psk
     To then use key `psk' to connect to ESSID `wlan' on link `ath0', enter
     the following command:
           # dladm connect-wifi -k psk -e wlan ath0     
Example 7 Renaming a Link
     To rename the `bge0' link to `mgmt0', enter the following command:
           # dladm rename-link bge0 mgmt0     
Example 8 Replacing a Network Card
     Consider that the bge0 device, whose link was named mgmt0 as shown in
     the previous example, needs to be replaced with a ce0 device because of
     a hardware failure.  The bge0 NIC is physically removed, and replaced
     with a new ce0 NIC.  To associate the newly added ce0 device with the
     mgmt0 configuration previously associated with bge0, enter the
     following command:
           # dladm rename-link ce0 mgmt0     
Example 9 Removing a Network Card
     Suppose that in the previous example, the intent is not to replace the
     bge0 NIC with another NIC, but rather to remove and not replace the
     hardware.  In that case, the mgmt0 datalink configuration is not slated
     to be associated with a different physical device as shown in the
     previous example, but needs to be deleted.  Enter the following command
     to delete the datalink configuration associated with the mgmt0
     datalink, whose physical hardware (bge0 in this case) has been removed:
           # dladm delete-phys mgmt0     
Example 10 Using Parsable Output to Capture a Single Field
     The following assignment saves the MTU of link net0 to a variable named
     `mtu'.
           # mtu=`dladm show-link -p -o mtu net0`     
Example 11 Using Parsable Output to Iterate over Links
     The following script displays the state of each link on the system.
           # dladm show-link -p -o link,state | \
               while IFS=: read link state; do
                   print "Link $link is in state $state"
           done     
Example 12 Configuring VNICs
     Create two VNICs with names `hello0' and `test1' over a single physical
     link `bge0':
           # dladm create-vnic -l bge0 hello0
           # dladm create-vnic -l bge0 test1     
Example 13 Configuring VNICs and Allocating Bandwidth and Priority
     Create two VNICs with names `hello0' and `test1' over a single physical
     link `bge0' and make `hello0' a high priority VNIC with a factory-
     assigned MAC address with a maximum bandwidth of 50 Mbps.  Make `test1'
     a low priority VNIC with a random MAC address and a maximum bandwidth
     of 100Mbps.
           # dladm create-vnic -l bge0 -m factory \
               -p maxbw=50,priority=high hello0
           # dladm create-vnic -l bge0 -m random \
               -p maxbw=100M,priority=low test1     
Example 14 Configuring a VNIC with a Factory MAC Address
     First, list the available factory MAC addresses and choose one of them:
           # dladm show-phys -m bge0
           LINK            SLOT         ADDRESS              INUSE    CLIENT
           bge0            primary      0:e0:81:27:d4:47     yes      bge0
           bge0            1            8:0:20:fe:4e:a5      no
           bge0            2            8:0:20:fe:4e:a6      no
           bge0            3            8:0:20:fe:4e:a7      no
     Create a VNIC named `hello0' and use slot 1's address:
           # dladm create-vnic -l bge0 -m factory -n 1 hello0
           # dladm show-phys -m bge0
           LINK            SLOT         ADDRESS              INUSE    CLIENT
           bge0            primary      0:e0:81:27:d4:47     yes      bge0
           bge0            1            8:0:20:fe:4e:a5      yes      hello0
           bge0            2            8:0:20:fe:4e:a6      no
           bge0            3            8:0:20:fe:4e:a7      no     
Example 15 Creating a VNIC with User-Specified MAC Address, Binding it
     to Set of Processors
     Create a VNIC with name `hello0', with a user specified MAC address,
     and a processor binding 0, 1, 2, 3.
           # dladm create-vnic -l bge0 -m 8:0:20:fe:4e:b8 \
               -p cpus=0,1,2,3 hello0     
Example 16 Creating a Virtual Network Without a Physical NIC
     First, create an etherstub with name `stub1':
           # dladm create-etherstub stub1
     Create two VNICs with names `hello0' and `test1' on the etherstub.
     This operation implicitly creates a virtual switch connecting `hello0'
     and `test1'.
           # dladm create-vnic -l stub1 hello0
           # dladm create-vnic -l stub1 test1     
Example 17 Showing Network Usage
     Network usage statistics can be stored using the extended accounting
     facility, 
acctadm(8).
           # acctadm -e basic -f /var/log/net.log net
           # acctadm net
           Network accounting: active
           Network accounting file: /var/log/net.log
           Tracked Network resources: basic
           Untracked Network resources: src_ip,dst_ip,src_port,dst_port,...
     The saved historical data can be retrieved in summary form using the     
show-usage subcommand:
           # dladm show-usage -f /var/log/net.log
           LINK      DURATION  IPACKETS RBYTES   OPACKETS OBYTES  BANDWIDTH
           e1000g0   80        1031     546908   0        0       2.44 Kbps     
Example 18 Displaying Bridge Information
     The following commands use the 
show-bridge subcommand with no and
     various options.
           # dladm show-bridge
           BRIDGE    PROTECT ADDRESS           PRIORITY DESROOT
           foo       stp     32768/8:0:20:bf:f 32768    8192/0:d0:0:76:14:38
           bar       stp     32768/8:0:20:e5:8 32768    8192/0:d0:0:76:14:38
           # dladm show-bridge -l foo
           LINK      STATE        UPTIME   DESROOT
           hme0      forwarding   117      8192/0:d0:0:76:14:38
           qfe1      forwarding   117      8192/0:d0:0:76:14:38
           # dladm show-bridge -s foo
           BRIDGE    DROPS        FORWARDS
           foo       0            302
           # dladm show-bridge -ls foo
           LINK      DROPS     RECV      XMIT
           hme0      0         360832    31797
           qfe1      0         322311    356852
           # dladm show-bridge -f foo
           DEST              AGE     FLAGS  OUTPUT
           8:0:20:bc:a7:dc   10.860  --     hme0
           8:0:20:bf:f9:69   --      L      hme0
           8:0:20:c0:20:26   17.420  --     hme0
           8:0:20:e5:86:11   --      L      qfe1     
Example 19 Creating an IPv4 Tunnel
     The following sequence of commands creates and then displays a
     persistent IPv4 tunnel link named `mytunnel0' between 66.1.2.3 and
     192.4.5.6:
           # dladm create-iptun -T ipv4 -s 66.1.2.3 -d 192.4.5.6 mytunnel0
           # dladm show-iptun mytunnel0
           LINK            TYPE  FLAGS  SOURCE              DESTINATION
           mytunnel0       ipv4  --     66.1.2.3            192.4.5.6
     A point-to-point IP interface can then be created over this tunnel
     link:
           # ifconfig mytunnel0 plumb 10.1.0.1 10.1.0.2 up
     As with any other IP interface, configuration persistence for this IP
     interface is achieved by placing the desired 
ifconfig(8) commands (in
     this case, the command for 10.1.0.1 10.1.0.2) into     
/etc/hostname.mytunnel0.     
Example 20 Creating a 6to4 Tunnel
     The following command creates a 6to4 tunnel link.  The IPv4 address of
     the 6to4 router is 75.10.11.12.
           # dladm create-iptun -T 6to4 -s 75.10.11.12 sitetunnel0
           # dladm show-iptun sitetunnel0
           LINK            TYPE  FLAGS  SOURCE              DESTINATION
           sitetunnel0     6to4  --     75.10.11.12         --
     The following command plumbs an IPv6 interface on this tunnel:
           # ifconfig sitetunnel0 inet6 plumb up
           # ifconfig sitetunnel0 inet6
           sitetunnel0: flags=2200041 <UP,RUNNING,NONUD,IPv6> mtu 65515 index 3
           inet tunnel src 75.10.11.12
           tunnel hop limit 64
           inet6 2002:4b0a:b0c::1/16
     Note that the system automatically configures the IPv6 address on the
     6to4 IP interface.  See 
ifconfig(8) for a description of how IPv6
     addresses are configured on 6to4 tunnel links.
INTERFACE STABILITY
     The command line interface of 
dladm is 
Committed.  The output of 
dladm     is 
CommittedSEE ALSO
     read(1), 
dlpi(4P), 
attributes(7), 
ieee802.3(7), 
overlay(7), 
acctadm(8),     
autopush(8), 
eeprom(8), 
ifconfig(8), 
ipadm(8), 
ipsecconf(8), 
ndd(8),     
psrset(8), 
wpad(8), 
zonecfg(8)NOTES
     The preferred method of referring to an aggregation in the aggregation
     subcommands is by its link name.  Referring to an aggregation by its
     integer 
key is supported for backward compatibility, but is not
     necessary.  When creating an aggregation, if a 
key is specified instead
     of a link name, the aggregation's link name will be automatically
     generated by 
dladm as 
aggrkey.
illumos                      September 15, 2024                      illumos