1 .\" Copyright (c) 1983, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)route.8 8.3 (Berkeley) 3/19/94
33 .\" $FreeBSD: src/sbin/route/route.8,v 1.17.2.9 2003/02/24 00:56:43 trhodes Exp $
34 .\" $DragonFly: src/sbin/route/route.8,v 1.7 2008/07/19 13:43:03 swildner Exp $
41 .Nd manually manipulate the routing tables
54 utility is used to manually manipulate the network
55 routing tables. It normally is not needed, as a
56 system routing table management daemon such as
58 should tend to this task.
62 utility supports a limited number of general options,
63 but a rich command language, enabling the user to specify
64 any arbitrary request that could be delivered via the
65 programmatic interface discussed in
68 The following options are available:
69 .Bl -tag -width indent
71 On SMP systems the route table is replicated. This option allows the
72 route table for a specific cpu to be accessed and exists primarily
73 for debugging purposes.
75 Bypass attempts to print host and network names symbolically
76 when reporting actions. (The process of translating between symbolic
77 names and numerical equivalents can be quite time consuming, and
78 may require correct operation of the network; thus it may be expedient
79 to forget this, especially when attempting to repair networking operations).
81 (verbose) Print additional details.
83 Suppress all output from the
89 Print the full width of the data being represented even if it would overflow
95 utility provides six commands:
97 .Bl -tag -width Fl -compact
103 Delete a specific route.
105 Change aspects of a route (such as its gateway).
107 Lookup and display the route for a destination.
109 Print out the route table similar to "netstat \-r" (see
112 Continuously report any changes to the routing information base,
113 routing lookup misses, or suspected network partitionings.
116 The monitor command has the syntax:
118 .Bd -ragged -offset indent -compact
124 The flush command has the syntax:
126 .Bd -ragged -offset indent -compact
135 command is specified,
137 will ``flush'' the routing tables of all gateway entries.
138 When the address family may is specified by any of the
145 modifiers, only routes having destinations with addresses in the
146 delineated family will be deleted.
148 The other commands have the following syntax:
150 .Bd -ragged -offset indent -compact
154 .Op Fl net No \&| Fl host
155 .Ar destination gateway
161 is the destination host or network,
163 is the next-hop intermediary via which packets should be routed.
164 Routes to a particular host may be distinguished from those to
165 a network by interpreting the Internet address specified as the
168 The optional modifiers
172 force the destination to be interpreted as a network or a host, respectively.
176 .Dq local address part
182 is the symbolic name of a network, then the route is
183 assumed to be to a network; otherwise, it is presumed to be a
187 could also be specified in the
188 .Ar net Ns / Ns Ar bits
194 .Fl host Li 128.0.0.32 ;
197 .Fl host Li 128.32.0.130 ;
201 .Fl net Li 128.32.130
207 .Fl net Li 192.168.64 Fl netmask Li 255.255.240.0 .
215 which is the default route.
217 If the destination is directly reachable
218 via an interface requiring
219 no intermediary system to act as a gateway, the
221 modifier should be specified;
222 the gateway given is the address of this host on the common network,
223 indicating the interface to be used for transmission.
224 Alternately, if the interface is point to point the name of the interface
225 itself may be given, in which case the route remains valid even
226 if the local or remote addresses change.
228 The optional modifiers
235 specify that all subsequent addresses are in the
242 or are specified as link-level addresses,
243 and the names must be numeric specifications rather than
249 to achieve the effect of an
252 redirect with the netmask option,
253 or to manually add subnet routes with
254 netmasks different from that of the implied network interface
255 (as would otherwise be communicated using the OSPF or ISIS routing protocols).
256 One specifies an additional ensuing address parameter
257 (to be interpreted as a network mask).
258 The implicit network mask generated in the AF_INET case
259 can be overridden by making sure this option follows the destination parameter.
266 is available instead of the
268 qualifier because non-continuous masks are not allowed in IPv6.
271 specifies network mask of
272 .Li ffff:ffff:0000:0000:0000:0000:0000:0000
274 The default value of prefixlen is 64 to get along with
275 the aggregatable address.
279 Note that the qualifier works only for
283 Routes have associated flags which influence operation of the protocols
284 when sending to destinations matched by the routes.
285 These flags may be set (or sometimes cleared)
286 by indicating the following corresponding modifiers:
288 -cloning RTF_CLONING - generates a new route on use
289 -xresolve RTF_XRESOLVE - emit mesg on use (for external lookup)
290 -iface ~RTF_GATEWAY - destination is directly reachable
291 -static RTF_STATIC - manually added route
292 -nostatic ~RTF_STATIC - pretend route added by kernel or daemon
293 -reject RTF_REJECT - emit an ICMP unreachable when matched
294 -blackhole RTF_BLACKHOLE - silently discard pkts (during updates)
295 -proto1 RTF_PROTO1 - set protocol specific routing flag #1
296 -proto2 RTF_PROTO2 - set protocol specific routing flag #2
297 -llinfo RTF_LLINFO - validly translates proto addr to link addr
300 The optional modifiers
310 provide initial values to quantities maintained in the routing entry
311 by transport level protocols, such as TCP or TP4.
312 These may be individually locked by preceding each such modifier to
316 meta-modifier, or one can
317 specify that all ensuing metrics may be locked by the
325 command where the destination and gateway are not sufficient to specify
328 case where several interfaces may have the
333 modifiers may be used to determine the interface or interface address.
337 modifier specifies that the
339 routing table entry is the
340 .Dq published (proxy-only)
342 entry, as reported by
345 All symbolic names specified for a
349 are looked up first as a host name using
350 .Xr gethostbyname 3 .
351 If this lookup fails,
353 is then used to interpret the name as that of a network.
360 modifiers may be used to specify the desired mpls label
361 operations for the route. Each route may have up to 3
362 label operations assigned to it. The label operations
363 may be combined between them, but specifically the
367 operations may be repeated if the intent is to push or pop
368 more than one label at once. The
370 operation always swaps the outer label and may not be
372 Here are some MPLS route examples:
374 Add an normal inet route, but push an mpls
378 .Bd -ragged -offset indent -compact
381 .Ar destination gateway
386 Add an normal inet route, but double-push an mpls
392 .Bd -ragged -offset indent -compact
395 .Ar destination gateway
402 Add an mpls route for an
406 and swap that label with
409 .Bd -ragged -offset indent -compact
422 utility uses a routing socket and the new message types
423 .Dv RTM_ADD , RTM_DELETE , RTM_GET ,
426 As such, only the super-user may modify
430 .It "add [host \&| network ] %s: gateway %s flags %x"
431 The specified route is being added to the tables. The
432 values printed are from the routing table entry supplied
436 If the gateway address used was not the primary address of the gateway
437 (the first one returned by
438 .Xr gethostbyname 3 ) ,
439 the gateway address is printed numerically as well as symbolically.
440 .It "delete [ host \&| network ] %s: gateway %s flags %x"
441 As above, but when deleting an entry.
445 command is specified, each routing table entry deleted
446 is indicated with a message of this form.
447 .It "Network is unreachable"
448 An attempt to add a route failed because the gateway listed was not
449 on a directly-connected network.
450 The next-hop gateway must be given.
452 A delete operation was attempted for an entry which
453 wasn't present in the tables.
454 .It "routing table overflow"
455 An add operation was attempted, but the system was
456 low on resources and was unable to allocate memory
457 to create the new entry.
458 .It "gateway uses the same route"
461 operation resulted in a route whose gateway uses the
462 same route as the one being changed.
463 The next-hop gateway should be reachable through a different route.
481 The first paragraph may have slightly exaggerated