{"id":3113,"date":"2022-12-20T16:43:31","date_gmt":"2022-12-20T19:43:31","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/iptunnel-man8\/"},"modified":"2022-12-20T16:43:31","modified_gmt":"2022-12-20T19:43:31","slug":"iptunnel-man8","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/iptunnel-man8\/","title":{"rendered":"IP&minus;TUNNEL (man8)"},"content":{"rendered":"<h1 align=\"center\">IP\u2212TUNNEL<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a><br \/> <a href=\"#AUTHOR\">AUTHOR<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">ip-tunnel &#8211; tunnel configuration<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<p style=\"margin-left:23%; margin-top: 1em\"><b>ip tunnel help<\/b><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><b>ip<\/b> [ <i>OPTIONS<\/i> ] <b>tunnel<\/b> { <b>add<\/b> | <b>change<\/b> | <b>del<\/b> | <b>show<\/b> | <b>prl<\/b> | <b>6rd<\/b> } [ <i>NAME<\/i> ] <br \/> [ <b>mode<\/b> <i>MODE<\/i> ] [ <b>remote<\/b> <i>ADDR<\/i> ] [ <b>local<\/b> <i>ADDR<\/i> ] <br \/> [ [<b>i<\/b>|<b>o<\/b>]<b>seq<\/b> ] [ [<b>i<\/b>|<b>o<\/b>]<b>key<\/b> <i>KEY<\/i> ] [ [<b>i<\/b>|<b>o<\/b>]<b>csum<\/b> ] ] <br \/> [ <b>encaplimit<\/b> <i>ELIM<\/i> ] [ <b>ttl<\/b>|<b>hoplimit<\/b> <i>TTL<\/i> ] <br \/> [ <b>tos<\/b> <i>TOS<\/i> ] [ <b>flowlabel<\/b> <i>FLOWLABEL<\/i> ] <br \/> [ <b>prl-default<\/b> <i>ADDR<\/i> ] [ <b>prl-nodefault<\/b> <i>ADDR<\/i> ] [ <b>prl-delete<\/b> <i>ADDR<\/i> ] <br \/> [ <b>6rd-prefix<\/b> <i>ADDR<\/i> ] [ <b>6rd-relay_prefix<\/b> <i>ADDR<\/i> ] [ <b>6rd-reset<\/b> ] <br \/> [ [<b>no<\/b>]<b>pmtudisc<\/b> ] [ [<b>no<\/b>]<b>ignore-df<\/b> ] [ [<b>no<\/b>]<b>allow-localremote<\/b> ] <br \/> [ <b>dev<\/b> <i>PHYS_DEV<\/i> ]<\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><i>MODE<\/i> := { <b>ipip<\/b> | <b>gre<\/b> | <b>sit<\/b> | <b>isatap<\/b> | <b>vti<\/b> | <b>ip6ip6<\/b> | <b>ipip6<\/b> | <b>ip6gre<\/b> | <b>vti6<\/b> | <b>any<\/b> }<\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><i>ADDR<\/i> := { <i>IP_ADDRESS<\/i> | <b>any<\/b> }<\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><i>TOS<\/i> := { <i>STRING<\/i> | <i>00<\/i>..<i>ff<\/i> | <b>inherit<\/b> | <b>inherit\/<\/b><i>STRING<\/i> | <b>inherit\/<\/b><i>00<\/i><b>..<\/b><i>ff<\/i> }<\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><i>ELIM<\/i> := { <b>none<\/b> | <i>0<\/i>..<i>255<\/i> }<\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><i>TTL<\/i> := { <i>1<\/i>..<i>255<\/i> | <b>inherit<\/b> }<\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><i>KEY<\/i> := { <i>DOTTED_QUAD<\/i> | <i>NUMBER<\/i> }<\/p>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>tunnel<\/b> objects are tunnels, encapsulating packets in IP packets and then sending them over the IP infrastructure. The encapsulating (or outer) address family is specified by the <b>-f<\/b> option. The default is IPv4. <b><br \/> ip tunnel add<\/b><\/p>\n<p style=\"margin-left:22%;\">add a new tunnel<\/p>\n<p style=\"margin-left:11%;\"><b>ip tunnel change<\/b><\/p>\n<p style=\"margin-left:22%;\">change an existing tunnel<\/p>\n<p style=\"margin-left:11%;\"><b>ip tunnel delete<\/b><\/p>\n<p style=\"margin-left:22%;\">destroy a tunnel <b><br \/> name<\/b> <i>NAME<\/i> <b>(default)<\/b><\/p>\n<p style=\"margin-left:32%;\">select the tunnel device name.<\/p>\n<p style=\"margin-left:22%;\"><b>mode<\/b> <i>MODE<\/i><\/p>\n<p style=\"margin-left:32%;\">set the tunnel mode. Available modes depend on the encapsulating address family. <br \/> Modes for IPv4 encapsulation available: <b>ipip<\/b>, <b>sit<\/b>, <b>isatap<\/b>, <b>vti<\/b>, and <b>gre<\/b>. <br \/> Modes for IPv6 encapsulation available: <b>ip6ip6<\/b>, <b>ipip6<\/b>, <b>ip6gre<\/b>, <b>vti6<\/b>, and <b>any<\/b>.<\/p>\n<p style=\"margin-left:22%;\"><b>remote<\/b> <i>ADDRESS<\/i><\/p>\n<p style=\"margin-left:32%;\">set the remote endpoint of the tunnel.<\/p>\n<p style=\"margin-left:22%;\"><b>local<\/b> <i>ADDRESS<\/i><\/p>\n<p style=\"margin-left:32%;\">set the fixed local address for tunneled packets. It must be an address on another interface of this host.<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"7%\">\n<p><b>ttl<\/b> <i>N<\/i><\/p>\n<\/td>\n<td width=\"71%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\"><b>hoplimit<\/b> <i>N<\/i><\/p>\n<p style=\"margin-left:32%;\">set a fixed TTL (IPv4) or hoplimit (IPv6) <i>N<\/i> on tunneled packets. <i>N<\/i> is a number in the range 1&#8211;255. 0 is a special value meaning that packets inherit the TTL value. The default value for IPv4 tunnels is: <b>inherit<\/b>. The default value for IPv6 tunnels is: <b>64<\/b>.<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"7%\">\n<p><b>tos<\/b> <i>T<\/i><\/p>\n<\/td>\n<td width=\"71%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\"><b>dsfield<\/b> <i>T<\/i> <b><br \/> tclass<\/b> <i>T<\/i><\/p>\n<p style=\"margin-left:32%;\">set the type of service (IPv4) or traffic class (IPv6) field on tunneled packets, which can be specified as either a two-digit hex value (e.g. c0) or a predefined string (e.g. internet). The value <b>inherit<\/b> causes the field to be copied from the original IP header. The values <b>inherit\/<\/b><i>STRING<\/i> or <b>inherit\/<\/b><i>00<\/i><b>..<\/b><i>ff<\/i> will set the field to <i>STRING<\/i> or <i>00<\/i>..<i>ff<\/i> when tunneling non-IP packets. The default value is 00.<\/p>\n<p style=\"margin-left:22%;\"><b>dev<\/b> <i>NAME<\/i><\/p>\n<p style=\"margin-left:32%;\">bind the tunnel to the device <i>NAME<\/i> so that tunneled packets will only be routed via this device and will not be able to escape to another device when the route to endpoint changes.<\/p>\n<p style=\"margin-left:22%;\"><b>nopmtudisc<\/b><\/p>\n<p style=\"margin-left:32%;\">disable Path MTU Discovery on this tunnel. It is enabled by default. Note that a fixed ttl is incompatible with this option: tunneling with a fixed ttl always makes pmtu discovery.<\/p>\n<p style=\"margin-left:22%;\"><b>ignore-df<\/b><\/p>\n<p style=\"margin-left:32%;\">enable IPv4 DF suppression on this tunnel. Normally datagrams that exceed the MTU will be fragmented; the presence of the DF flag inhibits this, resulting instead in an ICMP Unreachable (Fragmentation Required) message. Enabling this attribute causes the DF flag to be ignored.<\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"9%\">\n<p><b>key<\/b> <i>K<\/i><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td width=\"68%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"9%\">\n<p><b>ikey<\/b> <i>K<\/i><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td width=\"68%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"22%\"><\/td>\n<td width=\"9%\">\n<p><b>okey<\/b> <i>K<\/i><\/p>\n<\/td>\n<td width=\"1%\"><\/td>\n<td width=\"68%\">\n<p>( <b>only GRE tunnels<\/b> ) use keyed GRE with key <i>K<\/i>. <i>K<\/i> is either a number or an IP address-like dotted quad. The <b>key<\/b> parameter sets the key to use in both directions. The <b>ikey<\/b> and <b>okey<\/b> parameters set different keys for input and output.<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:22%;\"><b>csum<\/b>, <b>icsum<\/b>, <b>ocsum<\/b><\/p>\n<p style=\"margin-left:32%;\">( <b>only GRE tunnels<\/b> ) generate\/require checksums for tunneled packets. The <b>ocsum<\/b> flag calculates checksums for outgoing packets. The <b>icsum<\/b> flag requires that all input packets have the correct checksum. The <b>csum<\/b> flag is equivalent to the combination <b>icsum ocsum<\/b>.<\/p>\n<p style=\"margin-left:22%;\"><b>seq<\/b>, <b>iseq<\/b>, <b>oseq<\/b><\/p>\n<p style=\"margin-left:32%;\">( <b>only GRE tunnels<\/b> ) serialize packets. The <b>oseq<\/b> flag enables sequencing of outgoing packets. The <b>iseq<\/b> flag requires that all input packets are serialized. The <b>seq<\/b> flag is equivalent to the combination <b>iseq oseq<\/b>. <b>It doesn\u2019t work. Don\u2019t use it.<\/b><\/p>\n<p style=\"margin-left:22%;\"><b>encaplimit<\/b> <i>ELIM<\/i><\/p>\n<p style=\"margin-left:32%;\">( <b>only IPv6 tunnels<\/b> ) set a fixed encapsulation limit. Default is 4.<\/p>\n<p style=\"margin-left:22%;\"><b>flowlabel<\/b> <i>FLOWLABEL<\/i><\/p>\n<p style=\"margin-left:32%;\">( <b>only IPv6 tunnels<\/b> ) set a fixed flowlabel.<\/p>\n<p style=\"margin-left:22%;\"><b>allow-localremote<\/b><\/p>\n<p style=\"margin-left:32%;\">( <b>only IPv6 tunnels<\/b> ) allow remote endpoint on the local host.<\/p>\n<p style=\"margin-left:11%;\"><b>ip tunnel prl<\/b><\/p>\n<p style=\"margin-left:22%;\">potential router list (ISATAP only) <b><br \/> dev<\/b> <i>NAME<\/i><\/p>\n<p style=\"margin-left:32%;\">mandatory device name.<\/p>\n<p style=\"margin-left:22%;\"><b>prl-default<\/b> <i>ADDR<\/i> <b><br \/> prl-nodefault<\/b> <i>ADDR<\/i> <b><br \/> prl-delete<\/b> <i>ADDR<\/i><\/p>\n<p style=\"margin-left:32%;\">Add or delete <b>ADDR<\/b> as a potential router or default router.<\/p>\n<p style=\"margin-left:11%;\"><b>ip tunnel show<\/b><\/p>\n<p style=\"margin-left:22%;\">list tunnels This command has no arguments.<\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ip<\/b>(8)<\/p>\n<h2>AUTHOR <a name=\"AUTHOR\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">Original Manpage by Michail Litvak <mci@owl.openwall.com><\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  ip-tunnel &#8211; tunnel configuration <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[5,52,261,4],"class_list":["post-3113","post","type-post","status-publish","format-standard","hentry","category-8-administracion-del-sistema","tag-5","tag-administracion","tag-ip-tunnel","tag-man8"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/3113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=3113"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/3113\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=3113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=3113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=3113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}