X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=utilities%2Fovs-ofctl.8.in;h=9923715904235ef754267dadea811e09ae92342e;hb=0ef165ecb57943e17a8ee8270df68ffb8d032e29;hp=411ad6479962f61b87b84dc6b9325e67242dab8d;hpb=912c19381faa71daa27148ff58f09ee758420fb5;p=sliver-openvswitch.git diff --git a/utilities/ovs-ofctl.8.in b/utilities/ovs-ofctl.8.in index 411ad6479..992371590 100644 --- a/utilities/ovs-ofctl.8.in +++ b/utilities/ovs-ofctl.8.in @@ -58,6 +58,10 @@ information on its flow tables and ports. \fBdump\-tables \fIswitch\fR Prints to the console statistics for each of the flow tables used by \fIswitch\fR. +.TP +\fBdump\-table\-features \fIswitch\fR +Prints to the console features for each of the flow tables used by +\fIswitch\fR. . .TP \fBdump\-ports \fIswitch\fR [\fInetdev\fR] @@ -487,6 +491,21 @@ series of OpenFlow messages in the binary format used on an OpenFlow connection, and prints them to the console. This can be useful for printing OpenFlow messages captured from a TCP stream. . +.IP "\fBofp\-parse\-pcap\fR \fIfile\fR [\fIport\fR...]" +Reads \fIfile\fR, which must be in the PCAP format used by network +capture tools such as \fBtcpdump\fR or \fBwireshark\fR, extracts all +the TCP streams for OpenFlow connections, and prints the OpenFlow +messages in those connections in human-readable format on +\fBstdout\fR. +.IP +OpenFlow connections are distinguished by TCP port number. +Non-OpenFlow packets are ignored. By default, data on TCP ports 6633 +and 6653 are considered to be OpenFlow. Specify one or more +\fIport\fR arguments to override the default. +.IP +This command cannot usefully print SSL encrypted traffic. It does not +understand IPv6. +. .SS "Flow Syntax" .PP Some \fBovs\-ofctl\fR commands accept an argument that describes a flow or @@ -934,7 +953,7 @@ command, above, for more details. .IP \fBarp_spa=\fIip\fR[\fB/\fInetmask\fR] .IQ \fBarp_tpa=\fIip\fR[\fB/\fInetmask\fR] When \fBdl_type\fR specifies either ARP or RARP, \fBarp_spa\fR and -\fBarp_tha\fR match the source and target IPv4 address, respectively. +\fBarp_tpa\fR match the source and target IPv4 address, respectively. An address may be specified as an IP address or host name (e.g. \fB192.168.1.1\fR or \fBwww.example.com\fR). The optional \fInetmask\fR allows restricting a match to an IPv4 address prefix. @@ -1960,6 +1979,11 @@ format. .IQ "\fBOXM-OpenFlow13\fR" These are the standard OXM (OpenFlow Extensible Match) flow format in OpenFlow 1.2 and 1.3, respectively. +.IP "\fBOXM-OpenFlow14\fR" +The standard OXM (OpenFlow Extensible Match) flow format in OpenFlow +1.4. OpenFlow 1.4 is not yet well supported; in particular, the +implementation is unsafe, such that sending an unsupported message in +OpenFlow 1.4 to \fBovs\-vswitchd\fR can cause it to crash. .RE . .IP @@ -1967,13 +1991,15 @@ OpenFlow 1.2 and 1.3, respectively. collections of flow formats: .RS .IP "\fBany\fR" -Any supported flow format. +Any supported flow format except \fBOXM-OpenFlow14\fR, which is not +yet well supported (see above). .IP "\fBOpenFlow10\fR" \fBOpenFlow10\-table_id\fR or \fBOpenFlow10+table_id\fR. .IP "\fBNXM\fR" \fBNXM\-table_id\fR or \fBNXM+table_id\fR. .IP "\fBOXM\fR" -\fBOXM-OpenFlow12\fR or \fBOXM-OpenFlow13\fR. +\fBOXM-OpenFlow12\fR or \fBOXM-OpenFlow13\fR. \fBOXM-OpenFlow14\fR is +not included because it is not yet well supported (see above). .RE . .IP @@ -2011,7 +2037,8 @@ affects the \fBmonitor\fR command. . .IP "\fB\-\-timestamp\fR" Print a timestamp before each received packet. This option only -affects the \fBmonitor\fR and \fBsnoop\fR commands. +affects the \fBmonitor\fR, \fBsnoop\fR, and \fBofp\-parse\-pcap\fR +commands. . .IP "\fB\-m\fR" .IQ "\fB\-\-more\fR"