Provided by: openvswitch-common_2.5.9-0ubuntu0.16.04.3_amd64 bug

NAME

       ovs-ofctl - administer OpenFlow switches

SYNOPSIS

       ovs-ofctl [options] command [switch] [args...]

DESCRIPTION

       The  ovs-ofctl program is a command line tool for monitoring and administering OpenFlow switches.  It can
       also show the current state of an OpenFlow switch, including features, configuration, and table  entries.
       It should work with any OpenFlow switch, not just Open vSwitch.

   OpenFlow Switch Management Commands
       These  commands  allow  ovs-ofctl  to  monitor and administer an OpenFlow switch.  It is able to show the
       current state of a switch, including features, configuration, and table entries.

       Most of these commands take an argument that specifies the method for connecting to an  OpenFlow  switch.
       The following connection methods are supported:

              ssl:ip[:port]
              tcp:ip[:port]
                     The  specified  port  on the host at the given ip, which must be expressed as an IP address
                     (not a DNS name) in IPv4 or IPv6 address format.  Wrap IPv6 addresses in  square  brackets,
                     e.g.  tcp:[::1]:6653.  For ssl, the --private-key, --certificate, and --ca-cert options are
                     mandatory.

                     If port is not specified, it defaults to 6653.

              unix:file
                     On POSIX, a Unix domain server socket named file.

                     On Windows, a localhost TCP port written in file.

              file   This is short for unix:file, as long as file does not contain a colon.

              bridge This is short for unix:/var/run/openvswitch/bridge.mgmt, as long as bridge does not contain
                     a colon.

              [type@]dp
                     Attempts  to look up the bridge associated with dp and open as above.  If type is given, it
                     specifies the datapath provider of dp, otherwise the default provider system is assumed.

       show switch
              Prints to the console information on switch, including information on its flow tables and ports.

       dump-tables switch
              Prints to the console statistics for each of the flow tables used by switch.

       dump-table-features switch
              Prints to the console features for each of the flow tables used by switch.

       dump-table-desc switch
              Prints to the console configuration for each of the flow tables used by switch for OpenFlow 1.4+.

       mod-table switch table_id setting
              This command configures flow table settings  for  OpenFlow  table  table_id  within  switch.   The
              available  settings depend on the OpenFlow version in use.  In OpenFlow 1.1 and 1.2 (which must be
              enabled with the -O option) only, mod-table configures behavior when  no  flow  is  found  when  a
              packet is looked up in a flow table.  The following setting values are available:

              drop   Drop the packet.

              continue
                     Continue  to  the  next  table in the pipeline.  (This is how an OpenFlow 1.0 switch always
                     handles packets that do not match any flow, in tables other than the last one.)

              controller
                     Send to controller.  (This is how an OpenFlow 1.0 switch always handles packets that do not
                     match any flow in the last table.)

              In  OpenFlow  1.4  and later (which must be enabled with the -O option) only, mod-table configures
              the behavior when a controller attempts to add a flow to a flow table that is full.  The following
              setting values are available:

              evict  Delete some existing flow from the flow table, according to the algorithm described for the
                     Flow_Table table in ovs-vswitchd.conf.db(5).

              noevict
                     Refuse to add the new flow.  (Eviction might still be enabled through  the  overflow_policy
                     column in the Flow_Table table documented in ovs-vswitchd.conf.db(5).)

              vacancy:low,high
                     Enables  sending  vacancy  events  to  controllers  using  TABLE_STATUS  messages, based on
                     percentage thresholds low and high.

              novacancy
                     Disables vacancy events.

       dump-ports switch [netdev]
              Prints to the console statistics for  network  devices  associated  with  switch.   If  netdev  is
              specified,  only  the  statistics  associated  with that device will be printed.  netdev can be an
              OpenFlow assigned port number or device name, e.g. eth0.

       dump-ports-desc switch [port]
              Prints to the console detailed information about network devices associated with switch.  To  dump
              only  a  specific  port,  specify  its number as port.  Otherwise, if port is omitted, or if it is
              specified as ANY, then all ports are printed.  This is a subset of the information provided by the
              show command.

              If  the  connection  to switch negotiates OpenFlow 1.0, 1.2, or 1.2, this command uses an OpenFlow
              extension only implemented in Open vSwitch (version 1.7 and later).

              Only OpenFlow 1.5 and later support dumping a specific port.  Earlier versions of OpenFlow  always
              dump all ports.

       mod-port switch port action
              Modify characteristics of port port in switch.  port may be an OpenFlow port number or name or the
              keyword LOCAL (the preferred way to refer to the OpenFlow local port).  The action may be any  one
              of the following:
              up
              down   Enable  or  disable the interface.  This is equivalent to ifconfig up or ifconfig down on a
                     Unix system.

              stp
              no-stp Enable or  disable  802.1D  spanning  tree  protocol  (STP)  on  the  interface.   OpenFlow
                     implementations that don't support STP will refuse to enable it.

              receive
              no-receive
              receive-stp
              no-receive-stp
                     Enable  or  disable OpenFlow processing of packets received on this interface.  When packet
                     processing is disabled, packets will be dropped instead  of  being  processed  through  the
                     OpenFlow  table.   The  receive  or no-receive setting applies to all packets except 802.1D
                     spanning tree packets, which are separately controlled by receive-stp or no-receive-stp.

              forward
              no-forward
                     Allow or disallow forwarding of traffic to  this  interface.   By  default,  forwarding  is
                     enabled.

              flood
              no-flood
                     Controls  whether  an  OpenFlow  flood  action  will  send  traffic out this interface.  By
                     default, flooding is enabled.  Disabling flooding is primarily useful to prevent loops when
                     a spanning tree protocol is not in use.

              packet-in
              no-packet-in
                     Controls  whether  packets  received on this interface that do not match a flow table entry
                     generate a ``packet in'' message to the OpenFlow controller.   By  default,  ``packet  in''
                     messages are enabled.

              The show command displays (among other information) the configuration that mod-port changes.

       get-frags switch
              Prints  switch's fragment handling mode.  See set-frags, below, for a description of each fragment
              handling mode.

              The show command also prints the fragment handling mode among its other output.

       set-frags switch frag_mode
              Configures switch's treatment of IPv4 and IPv6 fragments.  The choices for frag_mode are:

              normal Fragments pass through the flow table like non-fragmented  packets.   The  TCP  ports,  UDP
                     ports,  and  ICMP  type  and code fields are always set to 0, even for fragments where that
                     information would otherwise be available (fragments with offset 0).  This  is  the  default
                     fragment handling mode for an OpenFlow switch.

              drop   Fragments are dropped without passing through the flow table.

              reassemble
                     The  switch reassembles fragments into full IP packets before passing them through the flow
                     table.  Open vSwitch does not implement this fragment handling mode.

              nx-match
                     Fragments pass through the flow table like non-fragmented  packets.   The  TCP  ports,  UDP
                     ports,  and  ICMP type and code fields are available for matching for fragments with offset
                     0, and set to 0 in fragments with nonzero offset.  This mode is a Nicira extension.

              See the description of ip_frag, below, for a way to match on whether a packet is a fragment and on
              its fragment offset.

       dump-flows switch [flows]
              Prints  to the console all flow entries in switch's tables that match flows.  If flows is omitted,
              all flows in the switch are retrieved.  See Flow Syntax, below, for  the  syntax  of  flows.   The
              output format is described in Table Entry Output.

              By  default,  ovs-ofctl prints flow entries in the same order that the switch sends them, which is
              unlikely to be intuitive or consistent.  See the description of --sort and --rsort, under  OPTIONS
              below, to influence the display order.

       dump-aggregate switch [flows]
              Prints  to  the  console  aggregate  statistics for flows in switch's tables that match flows.  If
              flows is omitted, the statistics are aggregated across all flows in the switch's flow tables.  See
              Flow  Syntax,  below,  for  the  syntax  of  flows.  The output format is described in Table Entry
              Output.

       queue-stats switch [port [queue]]
              Prints to the console statistics for the specified queue on port within switch.  port  can  be  an
              OpenFlow  port number or name, the keyword LOCAL (the preferred way to refer to the OpenFlow local
              port), or the keyword ALL.  Either of port or queue or both may be omitted  (or  equivalently  the
              keyword  ALL).   If both are omitted, statistics are printed for all queues on all ports.  If only
              queue is omitted, then statistics are printed for all queues on port; if  only  port  is  omitted,
              then statistics are printed for queue on every port where it exists.

   OpenFlow 1.1+ Group Table Commands
       The  following  commands work only with switches that support OpenFlow 1.1 or later.  Because support for
       OpenFlow 1.1 and later is still experimental in Open vSwitch, it is necessary to explicitly enable  these
       protocol  versions  in  ovs-ofctl  (using  -O) and in the switch itself (with the protocols column in the
       Bridge table).  For more information, see ``Q: What versions of OpenFlow does Open vSwitch support?''  in
       the Open vSwitch FAQ.

       dump-groups switch [group]
              Prints  group  entries  in switch's tables to console.  To dump only a specific group, specify its
              number as group.  Otherwise, if group is omitted, or if it is specified as ALL,  then  all  groups
              are printed.  Each line of output is a group entry as described in Group Syntax below.

              Only OpenFlow 1.5 and later support dumping a specific group.  Earlier versions of OpenFlow always
              dump all groups.

       dump-group-features switch
              Prints to the console the group features of the switch.

       dump-group-stats switch [groups]
              Prints to the console statistics for the specified groups in the switch's tables.   If  groups  is
              omitted  then  statistics  for all groups are printed.  See Group Syntax, below, for the syntax of
              groups.

   OpenFlow 1.3+ Switch Meter Table Commands
       These commands manage the meter table in an OpenFlow switch.  In each case, meter specifies a meter entry
       in the format described in Meter Syntax, below.

       OpenFlow  1.3  introduced  support  for  meters,  so  these commands only work with switches that support
       OpenFlow 1.3 or later.  The caveats described for groups in the previous section also apply to meters.

       add-meter switch meter
              Add a meter entry to switch's tables. The meter syntax  is  described  in  section  Meter  Syntax,
              below.

       mod-meter switch meter
              Modify an existing meter.

       del-meters switch
       del-meter switch [meter]
              Delete  entries from switch's meter table.  meter can specify a single meter with syntax meter=id,
              or all meters with syntax meter=all.

       dump-meters switch
       dump-meter switch [meter]
              Print meter configuration.  meter can specify a single meter with syntax meter=id, or  all  meters
              with syntax meter=all.

       meter-stats switch [meter]
              Print meter statistics.  meter can specify a single meter with syntax meter=id, or all meters with
              syntax meter=all.

       meter-features switch
              Print meter features.

   OpenFlow Switch Flow Table Commands
       These commands manage the flow table in an OpenFlow switch.  In each case, flow specifies a flow entry in
       the  format  described in Flow Syntax, below, file is a text file that contains zero or more flows in the
       same syntax, one per line, and the optional --bundle option operates  the  command  as  a  single  atomic
       transation, see option --bundle, below.

       [--bundle] add-flow switch flow
       [--bundle] add-flow switch - < file
       [--bundle] add-flows switch file
              Add  each  flow  entry  to switch's tables.  Each flow specification (e.g., each line in file) may
              start with add, modify, delete, modify_strict, or delete_strict keyword to specify whether a  flow
              is  to  be  added,  modified,  or deleted, and whether the modify or delete is strict or not.  For
              backwards compatibility a flow specification without one of these keywords is treated  as  a  flow
              add.  All flow mods are executed in the order specified.

       [--bundle] [--strict] mod-flows switch flow
       [--bundle] [--strict] mod-flows switch - < file
              Modify the actions in entries from switch's tables that match the specified flows.  With --strict,
              wildcards are not treated as active for matching purposes.

       [--bundle] del-flows switch
       [--bundle] [--strict] del-flows switch [flow]
       [--bundle] [--strict] del-flows switch - < file
              Deletes entries from switch's flow table.   With  only  a  switch  argument,  deletes  all  flows.
              Otherwise,  deletes flow entries that match the specified flows.  With --strict, wildcards are not
              treated as active for matching purposes.

       [--bundle] [--readd] replace-flows switch file
              Reads flow entries from file (or stdin if file is -) and queries the flow table from switch.  Then
              it  fixes  up  any  differences, adding flows from flow that are missing on switch, deleting flows
              from switch that are not in file, and updating flows in switch whose actions, cookie, or  timeouts
              differ in file.

              With --readd, ovs-ofctl adds all the flows from file, even those that exist with the same actions,
              cookie, and timeout in switch.  This resets all the flow packet and byte counters to 0, which  can
              be useful for debugging.

       diff-flows source1 source2
              Reads flow entries from source1 and source2 and prints the differences.  A flow that is in source1
              but not in source2 is printed preceded by a -, and a flow that is in source2 but not in source1 is
              printed  preceded  by  a  +.  If a flow exists in both source1 and source2 with different actions,
              cookie, or timeouts, then both versions are printed preceded by - and +, respectively.

              source1 and source2 may each name a file or a switch.  If a name begins with / or .,  then  it  is
              considered to be a file name.  A name that contains : is considered to be a switch.  Otherwise, it
              is a file if a file by that name exists, a switch if not.

              For this command, an exit status of 0 means that no differences were found, 1 means that an  error
              occurred, and 2 means that some differences were found.

       packet-out switch in_port actions packet...
              Connects  to  switch and instructs it to execute the OpenFlow actions on each packet.  Each packet
              is specified as a series of hex digits.  For the purpose of executing the actions, the packets are
              considered  to  have arrived on in_port, which may be an OpenFlow port number or name (e.g. eth0),
              the keyword LOCAL (the preferred way to refer to the OpenFlow ``local'' port), or the keyword NONE
              to indicate that the packet was generated by the switch itself.

   OpenFlow Switch Group Table Commands
       These commands manage the group table in an OpenFlow switch.  In each case, group specifies a group entry
       in the format described in Group Syntax, below, and file is a text file that contains zero or more groups
       in the same syntax, one per line.

       add-group switch group
       add-group switch - < file
       add-groups switch file
              Add each group entry to switch's tables.

       mod-group switch group
       mod-group switch - < file
              Modify the action buckets in entries from switch's tables for each group entry.

       del-groups switch
       del-groups switch [group]
       del-groups switch - < file
              Deletes  entries  from  switch's  group  table.   With only a switch argument, deletes all groups.
              Otherwise, deletes the group for each group entry.

       insert-buckets switch group
       insert-buckets switch - < file
              Add buckets to an existing group present in the switch's group table.  If no command_bucket_id  is
              present in the group specification then all buckets of the group are removed.

       remove-buckets switch group
       remove-buckets switch - < file
              Remove  buckets to an existing group present in the switch's group table.  If no command_bucket_id
              is present in the group specification then all buckets of the group are removed.

   OpenFlow Switch Tunnel TLV Table Commands
       Open vSwitch maintains a mapping table between tunnel option TLVs (defined by <class, type, length>)  and
       NXM  fields  tun_metadatan,  where  n  ranges  from  0 to 63, that can be operated on for the purposes of
       matches, actions, etc. This TLV table can be used for Geneve option TLVs or other protocols with  options
       in  same  TLV format as Geneve options. This mapping must be explicitly specified by the user through the
       following commands.

       A TLV mapping is specified with the syntax  {class=class,type=type,len=length}->tun_metadatan.   When  an
       option mapping exists for a given tun_metadatan, matching on the defined field becomes possible, e.g.:

              ovs-ofctl add-tlv-map br0 "{class=0xffff,type=0,len=4}->tun_metadata0"

              ovs-ofctl add-flow br0 tun_metadata0=1234,actions=controller

       A mapping should not be changed while it is in active use by a flow. The result of doing so is undefined.

       Currently,  the  TLV  mapping  table  is shared between all OpenFlow switches in a given instance of Open
       vSwitch. This restriction will be lifted in the future to allow for easier management.

       These commands are Nicira extensions to OpenFlow and require Open vSwitch 2.5 or later.

       add-tlv-map switch option[,option]...
              Add each option to switch's tables. Duplicate fields are rejected.

       del-tlv-map switch [option[,option]]...
              Delete each option from switch's table, or all option TLV  mapping  if  no  option  is  specified.
              Fields that aren't mapped are ignored.

       dump-tlv-map switch
              Show the currently mapped fields in the switch's option table as well as switch capabilities.

   OpenFlow Switch Monitoring Commands
       snoop switch
              Connects  to  switch  and  prints  to  the  console  all OpenFlow messages received.  Unlike other
              ovs-ofctl commands, if switch is the name of a bridge, then the snoop command connects to  a  Unix
              domain  socket named /var/run/openvswitch/switch.snoop.  ovs-vswitchd listens on such a socket for
              each bridge and sends to it all of the OpenFlow messages sent to or received from  its  configured
              OpenFlow  controller.  Thus, this command can be used to view OpenFlow protocol activity between a
              switch and its controller.

              When a switch has more than one controller configured, only the  traffic  to  and  from  a  single
              controller  is  output.   If none of the controllers is configured as a master or a slave (using a
              Nicira extension to OpenFlow 1.0 or 1.1, or a standard request in OpenFlow 1.2 or later),  then  a
              controller  is  chosen  arbitrarily  among  them.   If there is a master controller, it is chosen;
              otherwise, if there are any controllers that are not masters or slaves, one is chosen arbitrarily;
              otherwise,  a slave controller is chosen arbitrarily.  This choice is made once at connection time
              and does not change as controllers reconfigure their roles.

              If a switch has no controller configured, or if the  configured  controller  is  disconnected,  no
              traffic is sent, so monitoring will not show any traffic.

       monitor switch [miss-len] [invalid_ttl] [watch:[spec...]]
              Connects  to  switch  and  prints  to the console all OpenFlow messages received.  Usually, switch
              should specify the name of a bridge in the ovs-vswitchd database.

              If miss-len is provided, ovs-ofctl sends an OpenFlow ``set configuration'' message  at  connection
              setup  time  that requests miss-len bytes of each packet that misses the flow table.  Open vSwitch
              does not send these and other asynchronous messages to  an  ovs-ofctl  monitor  client  connection
              unless  a  nonzero value is specified on this argument.  (Thus, if miss-len is not specified, very
              little traffic will ordinarily be printed.)

              If invalid_ttl is passed, ovs-ofctl sends an OpenFlow ``set configuration'' message at  connection
              setup  time  that  requests  INVALID_TTL_TO_CONTROLLER,  so  that  ovs-ofctl  monitor  can receive
              ``packet-in'' messages when TTL reaches zero on dec_ttl action.

              watch:[spec...] causes ovs-ofctl to send a ``monitor request'' Nicira  extension  message  to  the
              switch  at  connection  setup time.  This message causes the switch to send information about flow
              table changes as they occur.  The following comma-separated spec syntax is available:

              !initial
                     Do not report the switch's initial flow table contents.

              !add   Do not report newly added flows.

              !delete
                     Do not report deleted flows.

              !modify
                     Do not report modifications to existing flows.

              !own   Abbreviate changes made to the flow table by ovs-ofctl's  own  connection  to  the  switch.
                     (These  could  only  occur  using  the  ofctl/send  command  described  below under RUNTIME
                     MANAGEMENT COMMANDS.)

              !actions
                     Do not report actions as part of flow updates.

              table=number
                     Limits the monitoring to the table with the given number between 0 and  254.   By  default,
                     all tables are monitored.

              out_port=port
                     If  set,  only  flows  that output to port are monitored.  The port may be an OpenFlow port
                     number or keyword (e.g. LOCAL).

              field=value
                     Monitors only flows that have field specified as the given value.   Any  syntax  valid  for
                     matching on dump-flows may be used.

              This command may be useful for debugging switch or controller implementations.  With watch:, it is
              particularly useful for observing how a controller updates flow tables.

   OpenFlow Switch and Controller Commands
       The following commands, like those in the previous section, may be applied to  OpenFlow  switches,  using
       any  of  the  connection  methods  described  in  that section.  Unlike those commands, these may also be
       applied to OpenFlow controllers.

       probe target
              Sends a single OpenFlow echo-request message to target and waits for the response.  With the -t or
              --timeout  option,  this  command  can  test  whether  an  OpenFlow switch or controller is up and
              running.

       ping target [n]
              Sends a series of 10 echo request packets to target  and  times  each  reply.   The  echo  request
              packets  consist  of  an OpenFlow header plus n bytes (default: 64) of randomly generated payload.
              This measures the latency of individual requests.

       benchmark target n count
              Sends count echo request packets that each consist of an OpenFlow header plus n bytes  of  payload
              and  waits  for each response.  Reports the total time required.  This is a measure of the maximum
              bandwidth to target for round-trips of n-byte messages.

   Other Commands
       ofp-parse file
              Reads file (or stdin if file is -) as a series of OpenFlow messages in the binary format  used  on
              an  OpenFlow connection, and prints them to the console.  This can be useful for printing OpenFlow
              messages captured from a TCP stream.

       ofp-parse-pcap file [port...]
              Reads file, which must be in the PCAP format used by network capture  tools  such  as  tcpdump  or
              wireshark, extracts all the TCP streams for OpenFlow connections, and prints the OpenFlow messages
              in those connections in human-readable format on stdout.

              OpenFlow connections are distinguished by TCP port number.  Non-OpenFlow packets are ignored.   By
              default,  data on TCP ports 6633 and 6653 are considered to be OpenFlow.  Specify one or more port
              arguments to override the default.

              This command cannot usefully print SSL encrypted traffic.  It does not understand IPv6.

   Flow Syntax
       Some ovs-ofctl commands accept an argument that describes  a  flow  or  flows.   Such  flow  descriptions
       comprise  a series field=value assignments, separated by commas or white space.  (Embedding spaces into a
       flow description normally requires quoting to prevent  the  shell  from  breaking  the  description  into
       multiple arguments.)

       Flow  descriptions  should  be in normal form.  This means that a flow may only specify a value for an L3
       field if it also specifies a particular L2 protocol, and that a flow may only specify an L4 field  if  it
       also  specifies  particular  L2  and  L3 protocol types.  For example, if the L2 protocol type dl_type is
       wildcarded, then L3 fields nw_src, nw_dst, and nw_proto must also be wildcarded.  Similarly,  if  dl_type
       or  nw_proto  (the  L3  protocol  type)  is  wildcarded,  so  must  be the L4 fields tcp_dst and tcp_src.
       ovs-ofctl will warn about flows not in normal form.

       The following field assignments describe how a flow matches a packet.  If any  of  these  assignments  is
       omitted  from  the flow syntax, the field is treated as a wildcard; thus, if all of them are omitted, the
       resulting flow matches all packets.  The string * may be specified to explicitly mark any of these fields
       as a wildcard.  (* should be quoted to protect it from shell expansion.)

       in_port=port
              Matches  OpenFlow  port  port,  which  may  be  an  OpenFlow  port number or keyword (e.g. LOCAL).
              ovs-ofctl show.

              (The resubmit action can search OpenFlow flow tables with arbitrary in_port values, so flows  that
              match  port  numbers  that  do  not  exist  from  an OpenFlow perspective can still potentially be
              matched.)

       dl_vlan=vlan
              Matches IEEE 802.1q Virtual LAN tag vlan.  Specify 0xffff as vlan to match packets  that  are  not
              tagged  with  a  Virtual  LAN;  otherwise,  specify a number between 0 and 4095, inclusive, as the
              12-bit VLAN ID to match.

       dl_vlan_pcp=priority
              Matches IEEE 802.1q Priority Code Point (PCP) priority, which is specified as a  value  between  0
              and 7, inclusive.  A higher value indicates a higher frame priority level.

       dl_src=xx:xx:xx:xx:xx:xx
       dl_dst=xx:xx:xx:xx:xx:xx
              Matches  an  Ethernet  source  (or destination) address specified as 6 pairs of hexadecimal digits
              delimited by colons (e.g. 00:0A:E4:25:6B:B0).

       dl_src=xx:xx:xx:xx:xx:xx/xx:xx:xx:xx:xx:xx
       dl_dst=xx:xx:xx:xx:xx:xx/xx:xx:xx:xx:xx:xx
              Matches an Ethernet destination address specified as 6 pairs of hexadecimal  digits  delimited  by
              colons  (e.g.  00:0A:E4:25:6B:B0),  with a wildcard mask following the slash. Open vSwitch 1.8 and
              later support arbitrary masks for source and/or destination. Earlier versions only support masking
              the destination with the following masks:

              01:00:00:00:00:00
                     Match only the multicast bit.  Thus, dl_dst=01:00:00:00:00:00/01:00:00:00:00:00 matches all
                     multicast        (including        broadcast)         Ethernet         packets,         and
                     dl_dst=00:00:00:00:00:00/01:00:00:00:00:00 matches all unicast Ethernet packets.

              fe:ff:ff:ff:ff:ff
                     Match all bits except the multicast bit.  This is probably not useful.

              ff:ff:ff:ff:ff:ff
                     Exact match (equivalent to omitting the mask).

              00:00:00:00:00:00
                     Wildcard all bits (equivalent to dl_dst=*.)

       dl_type=ethertype
              Matches  Ethernet  protocol  type ethertype, which is specified as an integer between 0 and 65535,
              inclusive, either in decimal or as a hexadecimal number prefixed by 0x (e.g. 0x0806 to  match  ARP
              packets).

       nw_src=ip[/netmask]
       nw_dst=ip[/netmask]
              When  dl_type  is  0x0800  (possibly  via  shorthand,  e.g.  ip  or  tcp), matches IPv4 source (or
              destination) address ip, which may be specified as an IP address or host name (e.g. 192.168.1.1 or
              www.example.com).  The optional netmask allows restricting a match to an IPv4 address prefix.  The
              netmask may be specified as a dotted quad (e.g. 192.168.1.0/255.255.255.0)  or  as  a  CIDR  block
              (e.g.  192.168.1.0/24).   Open  vSwitch 1.8 and later support arbitrary dotted quad masks; earlier
              versions support only CIDR masks, that is, the dotted quads  that  are  equivalent  to  some  CIDR
              block.

              When  dl_type=0x0806 or arp is specified, matches the ar_spa or ar_tpa field, respectively, in ARP
              packets for IPv4 and Ethernet.

              When dl_type=0x8035 or rarp is specified, matches the ar_spa or  ar_tpa  field,  respectively,  in
              RARP packets for IPv4 and Ethernet.

              When  dl_type  is wildcarded or set to a value other than 0x0800, 0x0806, or 0x8035, the values of
              nw_src and nw_dst are ignored (see Flow Syntax above).

       nw_proto=proto
       ip_proto=proto
              When ip or dl_type=0x0800 is specified, matches IP protocol type proto, which is  specified  as  a
              decimal  number  between  0  and  255,  inclusive  (e.g. 1 to match ICMP packets or 6 to match TCP
              packets).

              When ipv6 or dl_type=0x86dd is specified, matches IPv6 header type proto, which is specified as  a
              decimal  number  between 0 and 255, inclusive (e.g. 58 to match ICMPv6 packets or 6 to match TCP).
              The header type is the terminal header as described in the DESIGN document.

              When arp or dl_type=0x0806 is specified, matches the lower 8 bits of the ARP opcode.  ARP  opcodes
              greater than 255 are treated as 0.

              When rarp or dl_type=0x8035 is specified, matches the lower 8 bits of the ARP opcode.  ARP opcodes
              greater than 255 are treated as 0.

              When dl_type is wildcarded or set to a value other than 0x0800,  0x0806,  0x8035  or  0x86dd,  the
              value of nw_proto is ignored (see Flow Syntax above).

       nw_tos=tos
              Matches  IP  ToS/DSCP  or  IPv6  traffic  class  field tos, which is specified as a decimal number
              between 0 and 255, inclusive.  Note that the two lower reserved  bits  are  ignored  for  matching
              purposes.

              When  dl_type  is wildcarded or set to a value other than 0x0800 or 0x86dd, the value of nw_tos is
              ignored (see Flow Syntax above).

       ip_dscp=dscp
              Matches IP ToS/DSCP or IPv6 traffic class field dscp, which  is  specified  as  a  decimal  number
              between 0 and 63, inclusive.

              When  dl_type is wildcarded or set to a value other than 0x0800 or 0x86dd, the value of ip_dscp is
              ignored (see Flow Syntax above).

       nw_ecn=ecn
       ip_ecn=ecn
              Matches ecn bits in IP ToS or IPv6 traffic class fields, which is specified as  a  decimal  number
              between 0 and 3, inclusive.

              When  dl_type  is wildcarded or set to a value other than 0x0800 or 0x86dd, the value of nw_ecn is
              ignored (see Flow Syntax above).

       nw_ttl=ttl
              Matches IP TTL or IPv6 hop limit value ttl, which is specified as a decimal number between  0  and
              255, inclusive.

              When  dl_type  is wildcarded or set to a value other than 0x0800 or 0x86dd, the value of nw_ttl is
              ignored (see Flow Syntax above).

       tcp_src=port
       tcp_dst=port
       udp_src=port
       udp_dst=port
       sctp_src=port
       sctp_dst=port
              Matches a TCP, UDP, or SCTP source or destination port port,  which  is  specified  as  a  decimal
              number between 0 and 65535, inclusive.

              When  dl_type  and  nw_proto  are  wildcarded or set to values that do not indicate an appropriate
              protocol, the values of these settings are ignored (see Flow Syntax above).

       tcp_src=port/mask
       tcp_dst=port/mask
       udp_src=port/mask
       udp_dst=port/mask
       sctp_src=port/mask
       sctp_dst=port/mask
              Bitwise match on TCP (or UDP or SCTP) source or destination port.  The port and  mask  are  16-bit
              numbers written in decimal or in hexadecimal prefixed by 0x.  Each 1-bit in mask requires that the
              corresponding bit in port must match.  Each 0-bit in mask  causes  the  corresponding  bit  to  be
              ignored.

              Bitwise matches on transport ports are rarely useful in isolation, but a group of them can be used
              to reduce the number of flows required to match on a  range  of  transport  ports.   For  example,
              suppose  that the goal is to match TCP source ports 1000 to 1999, inclusive.  One way is to insert
              1000 flows, each of which matches on a single source port.  Another way is to look at  the  binary
              representations of 1000 and 1999, as follows:
              01111101000
              11111001111
              and then to transform those into a series of bitwise matches that accomplish the same results:
              01111101xxx
              0111111xxxx
              10xxxxxxxxx
              110xxxxxxxx
              1110xxxxxxx
              11110xxxxxx
              1111100xxxx
              which become the following when written in the syntax required by ovs-ofctl:
              tcp,tcp_src=0x03e8/0xfff8
              tcp,tcp_src=0x03f0/0xfff0
              tcp,tcp_src=0x0400/0xfe00
              tcp,tcp_src=0x0600/0xff00
              tcp,tcp_src=0x0700/0xff80
              tcp,tcp_src=0x0780/0xffc0
              tcp,tcp_src=0x07c0/0xfff0

              Only Open vSwitch 1.6 and later supports bitwise matching on transport ports.

              Like  the  exact-match  forms described above, the bitwise match forms apply only when dl_type and
              nw_proto specify TCP or UDP or SCTP.

       tp_src=port
       tp_dst=port
              These are deprecated generic forms of L4 port matches.  In new code, please use the TCP-, UDP-, or
              SCTP-specific forms described above.

       tcp_flags=flags/mask
       tcp_flags=[+flag...][-flag...]
              Bitwise  match  on  TCP  flags.   The  flags  and mask are 16-bit numbers written in decimal or in
              hexadecimal prefixed by 0x.  Each 1-bit in mask requires that the corresponding bit in flags  must
              match.  Each 0-bit in mask causes the corresponding bit to be ignored.

              Alternatively, the flags can be specified by their symbolic names (listed below), each preceded by
              either + for a flag that must be set, or - for a flag  that  must  be  unset,  without  any  other
              delimiters   between   the   flags.    Flags   not   mentioned   are   wildcarded.   For  example,
              tcp,tcp_flags=+syn-ack matches TCP SYNs that are not ACKs.

              TCP protocol currently defines  9  flag  bits,  and  additional  3  bits  are  reserved  (must  be
              transmitted  as  zero), see RFCs 793, 3168, and 3540.  The flag bits are, numbering from the least
              significant bit:

              0: fin No more data from sender.

              1: syn Synchronize sequence numbers.

              2: rst Reset the connection.

              3: psh Push function.

              4: ack Acknowledgement field significant.

              5: urg Urgent pointer field significant.

              6: ece ECN Echo.

              7: cwr Congestion Windows Reduced.

              8: ns  Nonce Sum.

              9-11:  Reserved.

              12-15: Not matchable, must be zero.

       icmp_type=type
       icmp_code=code
              When dl_type and nw_proto specify ICMP or ICMPv6, type matches the ICMP type and code matches  the
              ICMP code.  Each is specified as a decimal number between 0 and 255, inclusive.

              When  dl_type  and  nw_proto take other values, the values of these settings are ignored (see Flow
              Syntax above).

       table=number
              For flow dump commands, limits the flows dumped to those  in  the  table  with  the  given  number
              between  0 and 254.  If not specified (or if 255 is specified as number), then flows in all tables
              are dumped.

              For flow table modification commands, behavior varies  based  on  the  OpenFlow  version  used  to
              connect to the switch:

              OpenFlow 1.0
                     OpenFlow 1.0 does not support table for modifying flows.  ovs-ofctl will exit with an error
                     if table (other than table=255) is specified for a switch that only supports OpenFlow 1.0.

                     In OpenFlow 1.0, the switch chooses the table into which to insert a new  flow.   The  Open
                     vSwitch  software  switch  always  chooses table 0.  Other Open vSwitch datapaths and other
                     OpenFlow implementations may choose different tables.

                     The OpenFlow 1.0 behavior in Open vSwitch  for  modifying  or  removing  flows  depends  on
                     whether  --strict  is used.  Without --strict, the command applies to matching flows in all
                     tables.  With --strict, the command will operate on any single matching flow in any  table;
                     it  will  do nothing if there are matches in more than one table.  (The distinction between
                     these behaviors only matters if non-OpenFlow 1.0 commands were also used, because  OpenFlow
                     1.0 alone cannot add flows with the same matching criteria to multiple tables.)

              OpenFlow 1.0 with table_id extension
                     Open  vSwitch  implements  an  OpenFlow extension that allows the controller to specify the
                     table on which to operate.  ovs-ofctl automatically enables the  extension  when  table  is
                     specified  and  OpenFlow  1.0  is used.  ovs-ofctl automatically detects whether the switch
                     supports the extension.  As of this writing, this extension is only known to be implemented
                     by Open vSwitch.

                     With this extension, ovs-ofctl operates on the requested table when table is specified, and
                     acts as described for OpenFlow 1.0 above when no table is specified (or for table=255).

              OpenFlow 1.1
                     OpenFlow 1.1 requires flow table modification commands to specify a table.  When  table  is
                     not specified (or table=255 is specified), ovs-ofctl defaults to table 0.

              OpenFlow 1.2 and later
                     OpenFlow  1.2 and later allow flow deletion commands, but not other flow table modification
                     commands, to operate on all flow tables, with the behavior  described  above  for  OpenFlow
                     1.0.

       metadata=value[/mask]
              Matches  value  either  exactly  or  with  optional mask in the metadata field. value and mask are
              64-bit integers, by default in decimal (use a 0x prefix to specify  hexadecimal).  Arbitrary  mask
              values  are  allowed:  a  1-bit  in  mask indicates that the corresponding bit in value must match
              exactly, and a 0-bit wildcards that bit. Matching on metadata was added in Open vSwitch 1.8.

       The following shorthand notations are also available:

       ip     Same as dl_type=0x0800.

       ipv6   Same as dl_type=0x86dd.

       icmp   Same as dl_type=0x0800,nw_proto=1.

       icmp6  Same as dl_type=0x86dd,nw_proto=58.

       tcp    Same as dl_type=0x0800,nw_proto=6.

       tcp6   Same as dl_type=0x86dd,nw_proto=6.

       udp    Same as dl_type=0x0800,nw_proto=17.

       udp6   Same as dl_type=0x86dd,nw_proto=17.

       sctp   Same as dl_type=0x0800,nw_proto=132.

       sctp6  Same as dl_type=0x86dd,nw_proto=132.

       arp    Same as dl_type=0x0806.

       rarp   Same as dl_type=0x8035.

       mpls   Same as dl_type=0x8847.

       mplsm  Same as dl_type=0x8848.

       The following field assignments require  support  for  the  NXM  (Nicira  Extended  Match)  extension  to
       OpenFlow.   When one of these is specified, ovs-ofctl will automatically attempt to negotiate use of this
       extension.  If the switch does not support NXM, then ovs-ofctl will report a fatal error.

       vlan_tci=tci[/mask]
              Matches modified VLAN TCI tci.  If mask is omitted, tci is the exact VLAN TCI to match; if mask is
              specified,  then  a  1-bit in mask indicates that the corresponding bit in tci must match exactly,
              and a 0-bit wildcards that bit.  Both tci and mask are 16-bit values that are decimal by  default;
              use a 0x prefix to specify them in hexadecimal.

              The  value  that vlan_tci matches against is 0 for a packet that has no 802.1Q header.  Otherwise,
              it is the TCI value from the 802.1Q header with the CFI bit (with value 0x1000) forced to 1.

              Examples:

              vlan_tci=0
                     Match only packets without an 802.1Q header.

              vlan_tci=0xf123
                     Match packets tagged with priority 7 in VLAN 0x123.

              vlan_tci=0x1123/0x1fff
                     Match packets tagged with VLAN 0x123 (and any priority).

              vlan_tci=0x5000/0xf000
                     Match packets tagged with priority 2 (in any VLAN).

              vlan_tci=0/0xfff
                     Match packets with no 802.1Q header or tagged with VLAN 0 (and any priority).

              vlan_tci=0x5000/0xe000
                     Match packets with no 802.1Q header or tagged with priority 2 (in any VLAN).

              vlan_tci=0/0xefff
                     Match packets with no 802.1Q header or tagged with VLAN 0 and priority 0.

              Some of these matching possibilities can also be achieved with dl_vlan and dl_vlan_pcp.

       ip_frag=frag_type
              When dl_type specifies IP or IPv6, frag_type specifies what kind of IP fragments or  non-fragments
              to match.  The following values of frag_type are supported:

              no     Matches only non-fragmented packets.

              yes    Matches all fragments.

              first  Matches only fragments with offset 0.

              later  Matches only fragments with nonzero offset.

              not_later
                     Matches non-fragmented packets and fragments with zero offset.

              The  ip_frag  match type is likely to be most useful in nx-match mode.  See the description of the
              set-frags command, above, for more details.

       arp_spa=ip[/netmask]
       arp_tpa=ip[/netmask]
              When dl_type specifies either ARP or RARP, arp_spa and arp_tpa match the source  and  target  IPv4
              address,  respectively.   An  address  may  be  specified  as  an  IP  address  or host name (e.g.
              192.168.1.1 or www.example.com).  The optional netmask allows  restricting  a  match  to  an  IPv4
              address prefix.  The netmask may be specified as a dotted quad (e.g. 192.168.1.0/255.255.255.0) or
              as a CIDR block (e.g. 192.168.1.0/24).

       arp_sha=xx:xx:xx:xx:xx:xx
       arp_tha=xx:xx:xx:xx:xx:xx
              When dl_type specifies either ARP or RARP,  arp_sha  and  arp_tha  match  the  source  and  target
              hardware  address,  respectively.   An  address  is  specified  as  6  pairs of hexadecimal digits
              delimited by colons (e.g. 00:0A:E4:25:6B:B0).

       arp_sha=xx:xx:xx:xx:xx:xx/xx:xx:xx:xx:xx:xx
       arp_tha=xx:xx:xx:xx:xx:xx/xx:xx:xx:xx:xx:xx
              When dl_type specifies either ARP or RARP,  arp_sha  and  arp_tha  match  the  source  and  target
              hardware  address,  respectively.   An  address  is  specified  as  6  pairs of hexadecimal digits
              delimited by colons (e.g. 00:0A:E4:25:6B:B0), with a wildcard mask following the slash.

       arp_op=opcode
              When dl_type specifies either ARP or RARP, arp_op  matches  the  ARP  opcode.   Only  ARP  opcodes
              between 1 and 255 should be specified for matching.

       ipv6_src=ipv6[/netmask]
       ipv6_dst=ipv6[/netmask]
              When  dl_type  is  0x86dd  (possibly  via  shorthand, e.g., ipv6 or tcp6), matches IPv6 source (or
              destination) address ipv6, which may be specified as defined in RFC 2373.  The preferred format is
              x:x:x:x:x:x:x:x,  where x are the hexadecimal values of the eight 16-bit pieces of the address.  A
              single instance of :: may be used to indicate multiple groups of 16-bits of zeros.   The  optional
              netmask  allows  restricting a match to an IPv6 address prefix.  A netmask is specified as an IPv6
              address    (e.g.    2001:db8:3c4d:1::/ffff:ffff:ffff:ffff::)    or    a    CIDR    block     (e.g.
              2001:db8:3c4d:1::/64).   Open  vSwitch  1.8  and  later  support arbitrary masks; earlier versions
              support only CIDR masks, that is, CIDR block and  IPv6  addresses  that  are  equivalent  to  CIDR
              blocks.

       ipv6_label=label
              When  dl_type  is  0x86dd  (possibly  via  shorthand, e.g., ipv6 or tcp6), matches IPv6 flow label
              label.

       nd_target=ipv6[/netmask]
              When dl_type, nw_proto, and icmp_type specify IPv6 Neighbor Discovery (ICMPv6 type  135  or  136),
              matches  the  target  address ipv6.  ipv6 is in the same format described earlier for the ipv6_src
              and ipv6_dst fields.

       nd_sll=xx:xx:xx:xx:xx:xx
              When dl_type, nw_proto, and icmp_type  specify  IPv6  Neighbor  Solicitation  (ICMPv6  type  135),
              matches  the  source link-layer address option.  An address is specified as 6 pairs of hexadecimal
              digits delimited by colons.

       nd_tll=xx:xx:xx:xx:xx:xx
              When dl_type, nw_proto, and icmp_type specify  IPv6  Neighbor  Advertisement  (ICMPv6  type  136),
              matches  the  target link-layer address option.  An address is specified as 6 pairs of hexadecimal
              digits delimited by colons.

       mpls_bos=bos
              When dl_type is 0x8847 or 0x8848 (possibly via shorthand e.g., mpls or mplsm), matches the bottom-
              of-stack bit of the outer-most MPLS label stack entry. Valid values are 0 and 1.

              If  1 then for a packet with a well-formed MPLS label stack the bottom-of-stack bit indicates that
              the outer label stack entry is also the inner-most label stack entry and thus that is  that  there
              is only one label stack entry present.  Conversely, if 0 then for a packet with a well-formed MPLS
              label stack the bottom-of-stack bit indicates that the outer label stack entry is not  the  inner-
              most label stack entry and thus there is more than one label stack entry present.

       mpls_label=label
              When  dl_type  is 0x8847 or 0x8848 (possibly via shorthand e.g., mpls or mplsm), matches the label
              of the outer MPLS label stack entry. The label is a 20-bit value that is decimal by default; use a
              0x prefix to specify them in hexadecimal.

       mpls_tc=tc
              When  dl_type  is  0x8847  or  0x8848  (possibly  via  shorthand e.g., mpls or mplsm), matches the
              traffic-class of the outer MPLS label stack entry. Valid values  are  between  0  (lowest)  and  7
              (highest).

       tun_id=tunnel-id[/mask]
       tunnel_id=tunnel-id[/mask]
              Matches  tunnel  identifier  tunnel-id.  Only packets that arrive over a tunnel that carries a key
              (e.g. GRE with the RFC 2890 key extension and a nonzero key value) will have a nonzero tunnel  ID.
              If  mask is omitted, tunnel-id is the exact tunnel ID to match; if mask is specified, then a 1-bit
              in mask indicates that the corresponding  bit  in  tunnel-id  must  match  exactly,  and  a  0-bit
              wildcards that bit.

       tun_flags=flags
              Matches flags indicating various aspects of the tunnel encapsulation. Currently, there is only one
              flag defined:

              oam: The tunnel protocol indicated that this is an OAM control packet.

              Flags can be prefixed by + or - to indicate that the flag should be matched as either  present  or
              not present, respectively. In addition, flags can be specified without a prefix and separated by |
              to indicate an exact match.

              Note that it is possible for newer version of Open vSwitch  to  introduce  additional  flags  with
              varying  meaning.  It  is  therefore not recommended to use an exact match on this field since the
              behavior of these new flags is unknown and should be ignored.

              For non-tunneled packets, the value is 0.

              This field was introduced in Open vSwitch 2.5.

       tun_src=ip[/netmask]
       tun_dst=ip[/netmask]
              Matches tunnel IPv4 source (or destination) address ip. Only packets that  arrive  over  a  tunnel
              will  have  nonzero  tunnel addresses.  The address may be specified as an IP address or host name
              (e.g. 192.168.1.1 or www.example.com).  The optional netmask  allows  restricting  a  match  to  a
              masked    IPv4   address.    The   netmask   may   be   specified   as   a   dotted   quad   (e.g.
              192.168.1.0/255.255.255.0) or as a CIDR block (e.g. 192.168.1.0/24).

       tun_gbp_id=value[/mask]
       tun_gbp_flags=value[/mask]
              Matches the group policy identifier and flags in the VXLAN header. Only packets that arrive over a
              VXLAN  tunnel  with  the  "gbp"  extension enabled can have this field set. The fields may also be
              referred to by NXM_NX_TUN_GBP_ID[] (16 bits) and NXM_NX_TUN_GBP_FLAGS[] (8 bits) in the context of
              field  manipulation  actions.  If  these  fields  are  set  and  the packet matched by the flow is
              encapsulated in a VXLAN-GBP tunnel, then the policy identifier and flags are  transmitted  to  the
              destination VXLAN tunnel endpoint.

              The tun_gbp_flags field has the following format:

                +-+-+-+-+-+-+-+-+
                |-|D|-|-|A|-|-|-|
                +-+-+-+-+-+-+-+-+

                D  :=  Don't  Learn  bit.  When set, this bit indicates that the egress tunnel endpoint MUST NOT
                learn the source address of the encapsulated frame.

                A := Indicates that the group policy has already been applied to this packet. Policies MUST  NOT
                be applied by devices when the A bit is set.

              For  more information, please see the corresponding IETF draft: https://tools.ietf.org/html/draft-
              smith-vxlan-group-policy

       tun_metadataidx[=value[/mask]]
              Matches value either exactly or with optional mask in tunnel metadata field number  idx  (numbered
              from  0  to  63).  The act of specifying a field implies a match on the existence of that field in
              the packet in addition to the masked value. As a shorthand, it is possible  to  specify  only  the
              field name to simply match on an option being present.

              Tunnel  metadata  fields can be dynamically assigned onto the data contained in the option TLVs of
              packets (e.g. Geneve variable options stores zero  or  more  options  in  TLV  format  and  tunnel
              metadata  can  be  assigned  onto  these  option TLVs) using the commands described in the section
              OpenFlow Switch Tunnel TLV Table Commands. Once assigned, the length  of  the  field  is  variable
              according  to  the  size  of the option. Before updating a mapping in the option table, flows with
              references to it should be removed, otherwise the result is non-deterministic.

              These fields were introduced in Open vSwitch 2.5.

       regidx=value[/mask]
              Matches value either exactly or with optional mask in register number idx.  The valid range of idx
              depends on the switch.  value and mask are 32-bit integers, by default in decimal (use a 0x prefix
              to specify hexadecimal).  Arbitrary mask values are allowed: a 1-bit in mask  indicates  that  the
              corresponding bit in value must match exactly, and a 0-bit wildcards that bit.

              When a packet enters an OpenFlow switch, all of the registers are set to 0.  Only explicit actions
              change register values.

       xregidx=value[/mask]
              Matches value either exactly or with optional mask in 64-bit  ``extended  register''  number  idx.
              Each  of  the  64-bit extended registers overlays two of the 32-bit registers: xreg0 overlays reg0
              and reg1, with reg0 supplying the most-significant bits of xreg0 and reg1  the  least-significant.
              xreg1 similarly overlays reg2 and reg3, and so on.

              These  fields  were  added  in  Open  vSwitch  2.3 to conform with the OpenFlow 1.5 specification.
              OpenFlow 1.5 calls these fields just the ``packet registers,'' but Open vSwitch already had 32-bit
              registers  by  that name, which is why Open vSwitch refers to the standard registers as ``extended
              registers''.

       pkt_mark=value[/mask]
              Matches packet metadata mark value either exactly or with optional mask. The  mark  is  associated
              data  that  may  be passed into other system components in order to facilitate interaction between
              subsystems.  On Linux this corresponds to the skb mark but the exact implementation  is  platform-
              dependent.

       actset_output=port
              Matches  the  output port currently in the OpenFlow action set, where port may be an OpenFlow port
              number or keyword (e.g. LOCAL).  If there is no output port in the OpenFlow action set, or if  the
              output  port  will  be ignored (e.g. because there is an output group in the OpenFlow action set),
              then the value will be UNSET.

              This field was introduced in Open vSwitch 2.4 to conform with the OpenFlow 1.5 specification.

       conj_id=value
              Matches the given 32-bit value against the conjunction ID.  This is used only with the conjunction
              action (see below).

              This field was introduced in Open vSwitch 2.4.

       ct_state=flags/mask
       ct_state=[+flag...][-flag...]
              Bitwise match on connection state flags. This is used with the ct action (see below).

              The  ct_state  field  provides information from a connection tracking module. It describes whether
              the packet has previously traversed the connection tracker (tracked, or trk) and, if it  has  been
              tracked,  any  additional  information  that  the connection tracker was able to provide about the
              connection that the current packet belongs to.

              Individual packets may be in one of two states: Untracked  or  tracked.  When  the  ct  action  is
              executed  on  a  packet, it becomes tracked for the the remainder of OpenFlow pipeline processing.
              Once a packet has become tracked, the state of its corresponding  connection  may  be  determined.
              Note that the ct_state is only significant for the current ct_zone.

              Connections  may be in one of two states: uncommitted or committed. Connections are uncommitted by
              default. To determine ongoing information about a  connection,  like  whether  the  connection  is
              established  or  not, the connection must be committed. When the ct action is executed on a packet
              with the commit parameter, the connection will become committed and  will  remain  in  this  state
              until  the  end of the connection. Committed connections store state beyond the duration of packet
              processing.

              The flags and mask are 32-bit numbers written in decimal or in hexadecimal prefixed by  0x.   Each
              1-bit  in mask requires that the corresponding bit in flags must match.  Each 0-bit in mask causes
              the corresponding bit to be ignored.

              Alternatively, the flags can be specified by their symbolic names (listed below), each preceded by
              either  +  for  a  flag  that  must  be set, or - for a flag that must be unset, without any other
              delimiters  between  the   flags.    Flags   not   mentioned   are   wildcarded.    For   example,
              tcp,ct_state=+trk-new matches TCP packets that have been run through the connection tracker and do
              not establish a new connection.

              The following flags describe the state of the tracking:

              0x01: new
                     This is the beginning of a new connection. This flag may only be  present  for  uncommitted
                     connections.

              0x02: est
                     This is part of an already existing connection. This flag may only be present for committed
                     connections.

              0x04: rel
                     This is a connection  that  is  related  to  an  existing  connection,  for  instance  ICMP
                     "destination  unreachable"  messages or FTP data connections. This flag may only be present
                     for committed connections.

              0x08: rpl
                     The flow is in the reply direction, meaning it did not initiate the connection.  This  flag
                     may only be present for committed connections.

              0x10: inv
                     The state is invalid, meaning that the connection tracker couldn't identify the connection.
                     This flag is a catch-all for any  problems  that  the  connection  tracker  may  have,  for
                     example:

                     -  L3/L4  protocol  handler is not loaded/unavailable. With the Linux kernel datapath, this
                     may mean that the "nf_conntrack_ipv4" or "nf_conntrack_ipv6" modules are not loaded.

                     - L3/L4 protocol handler determines that the packet is malformed.

                     - Packets are unexpected length for protocol.

              0x20: trk
                     This packet is tracked, meaning that it has previously traversed the connection tracker. If
                     this flag is not set, then no other flags will be set. If this flag is set, then the packet
                     is tracked and other flags may also be set.

              This field was introduced in Open vSwitch 2.5.

       The following fields are associated with the connection tracker and will only be  populated  for  tracked
       packets. The ct action will populate these fields, and allows modification of some of the below fields.

       ct_zone=zone
              Matches  the  given  16-bit  connection  zone  exactly. This represents the most recent connection
              tracking context that ct was executed in. Each zone is an independent connection tracking context,
              so  if  you  wish  to  track  the same packet in multiple contexts then you must use the ct action
              multiple times. Introduced in Open vSwitch 2.5.

       ct_mark=value[/mask]
              Matches the given 32-bit connection  mark  value  either  exactly  or  with  optional  mask.  This
              represents  metadata associated with the connection that the current packet is part of. Introduced
              in Open vSwitch 2.5.

       ct_label=value[/mask]
              Matches the given 128-bit connection labels value either  exactly  or  with  optional  mask.  This
              represents  metadata associated with the connection that the current packet is part of. Introduced
              in Open vSwitch 2.5.

       Defining IPv6 flows (those with dl_type equal  to  0x86dd)  requires  support  for  NXM.   The  following
       shorthand notations are available for IPv6-related flows:

       ipv6   Same as dl_type=0x86dd.

       tcp6   Same as dl_type=0x86dd,nw_proto=6.

       udp6   Same as dl_type=0x86dd,nw_proto=17.

       sctp6  Same as dl_type=0x86dd,nw_proto=132.

       icmp6  Same as dl_type=0x86dd,nw_proto=58.

       Finally,  field  assignments  to  duration,  n_packets,  or  n_bytes are ignored to allow output from the
       dump-flows command to be used as input for other commands that parse flows.

       The add-flow, add-flows, and mod-flows commands require an additional field,  which  must  be  the  final
       field specified:

       actions=[action][,action...]
              Specifies  a  comma-separated list of actions to take on a packet when the flow entry matches.  If
              no action is specified, then packets matching the flow are dropped.  The following forms of action
              are supported:

              port
              output:port
                     Outputs  the  packet to OpenFlow port number port.  If port is the packet's input port, the
                     packet is not output.

              output:src[start..end]
                     Outputs the packet to the OpenFlow port number read from src, which must be an NXM field as
                     described  above.   For  example,  output:NXM_NX_REG0[16..31]  outputs to the OpenFlow port
                     number written in the upper half of register 0.  If the port number is the  packet's  input
                     port, the packet is not output.

                     This  form of output was added in Open vSwitch 1.3.0.  This form of output uses an OpenFlow
                     extension that is not supported by standard OpenFlow switches.

              group:group_id
                     Outputs the packet to the OpenFlow group group_id.  Group  tables  are  only  supported  in
                     OpenFlow 1.1+. See Group Syntax for more details.

              normal Subjects  the  packet  to  the  device's  normal  L2/L3  processing.   (This  action is not
                     implemented by all OpenFlow switches.)

              flood  Outputs the packet on all switch physical ports  other  than  the  port  on  which  it  was
                     received  and  any  ports  on  which  flooding is disabled (typically, these would be ports
                     disabled by the IEEE 802.1D spanning tree protocol).

              all    Outputs the packet on all switch physical ports  other  than  the  port  on  which  it  was
                     received.

              local  Outputs  the packet on the ``local port,'' which corresponds to the network device that has
                     the same name as the bridge.

              in_port
                     Outputs the packet on the port from which it was received.

              controller(key=value...)
                     Sends the packet to the OpenFlow controller as a ``packet in'' message.  The supported key-
                     value pairs are:

                     max_len=nbytes
                            Limit  to  nbytes  the  number of bytes of the packet to send to the controller.  By
                            default the entire packet is sent.

                     reason=reason
                            Specify reason as the reason for sending the message in the ``packet  in''  message.
                            The supported reasons are action (the default), no_match, and invalid_ttl.

                     id=controller-id
                            Specify  controller-id,  a  16-bit  integer,  as  the  connection ID of the OpenFlow
                            controller or controllers to which the ``packet in'' message should  be  sent.   The
                            default  is  zero.   Zero  is  also  the  default  connection ID for each controller
                            connection, and a given controller connection will only have a nonzero connection ID
                            if its controller uses the NXT_SET_CONTROLLER_ID Nicira extension to OpenFlow.

                     Any  reason  other than action and any nonzero controller-id uses a Nicira vendor extension
                     that, as of this writing, is only known to be implemented by Open vSwitch (version  1.6  or
                     later).

              controller
              controller[:nbytes]
                     Shorthand for controller() or controller(max_len=nbytes), respectively.

              enqueue(port,queue)
                     Enqueues the packet on the specified queue within port port, which must be an OpenFlow port
                     number or keyword (e.g. LOCAL).  The number of supported queues depends on the switch; some
                     OpenFlow implementations do not support queuing at all.

              drop   Discards  the packet, so no further processing or forwarding takes place.  If a drop action
                     is used, no other actions may be specified.

              mod_vlan_vid:vlan_vid
                     Modifies the VLAN id on a packet.  The VLAN tag is added or modified as necessary to  match
                     the  value  specified.   If  the  VLAN  tag  is  added, a priority of zero is used (see the
                     mod_vlan_pcp action to set this).

              mod_vlan_pcp:vlan_pcp
                     Modifies the VLAN priority on a packet.  The VLAN tag is added or modified as necessary  to
                     match  the  value  specified.  Valid values are between 0 (lowest) and 7 (highest).  If the
                     VLAN tag is added, a vid of zero is used (see the mod_vlan_vid action to set this).

              strip_vlan
                     Strips the VLAN tag from a packet if it is present.

              push_vlan:ethertype
                     Push a new VLAN tag onto the packet.  Ethertype is used as the Ethertype for the tag.  Only
                     ethertype  0x8100  should  be  used.  (0x88a8  which the spec allows isn't supported at the
                     moment.)  A priority of zero and the tag of zero are used for the new tag.

              push_mpls:ethertype
                     Changes the packet's Ethertype to ethertype, which must be either  0x8847  or  0x8848,  and
                     pushes an MPLS LSE.

                     If the packet does not already contain any MPLS labels then an initial label stack entry is
                     pushed.  The label stack entry's label is 2 if the packet contains IPv6  and  0  otherwise,
                     its  default  traffic  control value is the low 3 bits of the packet's DSCP value (0 if the
                     packet is not IP), and its TTL is copied from the IP TTL (64 if the packet is not IP).

                     If the packet does already contain an MPLS label, pushes a new outermost label as a copy of
                     the existing outermost label.

                     A  limitation  of  the  implementation is that processing of actions will stop if push_mpls
                     follows another push_mpls unless there is a pop_mpls in between.

              pop_mpls:ethertype
                     Strips the outermost MPLS  label  stack  entry.   Currently  the  implementation  restricts
                     ethertype  to a non-MPLS Ethertype and thus pop_mpls should only be applied to packets with
                     an MPLS label stack depth of one. A further limitation is that processing of  actions  will
                     stop if pop_mpls follows another pop_mpls unless there is a push_mpls in between.

              mod_dl_src:mac
                     Sets the source Ethernet address to mac.

              mod_dl_dst:mac
                     Sets the destination Ethernet address to mac.

              mod_nw_src:ip
                     Sets the IPv4 source address to ip.

              mod_nw_dst:ip
                     Sets the IPv4 destination address to ip.

              mod_tp_src:port
                     Sets the TCP or UDP or SCTP source port to port.

              mod_tp_dst:port
                     Sets the TCP or UDP or SCTP destination port to port.

              mod_nw_tos:tos
                     Sets the DSCP bits in the IPv4 ToS/DSCP or IPv6 traffic class field to tos, which must be a
                     multiple of 4 between 0 and 255.  This action does not modify  the  two  least  significant
                     bits of the ToS field (the ECN bits).

              mod_nw_ecn:ecn
                     Sets the ECN bits in the IPv4 ToS or IPv6 traffic class field to ecn, which must be a value
                     between 0 and 3, inclusive.  This action does not modify the six most significant  bits  of
                     the field (the DSCP bits).

                     Requires OpenFlow 1.1 or later.

              mod_nw_ttl:ttl
                     Sets  the  IPv4  TTL or IPv6 hop limit field to ttl, which is specified as a decimal number
                     between 0 and 255, inclusive.  Switch behavior  when  setting  ttl  to  zero  is  not  well
                     specified, though.

                     Requires OpenFlow 1.1 or later.

              The  following actions are Nicira vendor extensions that, as of this writing, are only known to be
              implemented by Open vSwitch:

              resubmit:port
              resubmit([port],[table])
                     Re-searches this OpenFlow flow table (or the table whose number is specified by table) with
                     the  in_port  field replaced by port (if port is specified) and executes the actions found,
                     if any, in addition to any other actions in this flow entry.

                     Recursive resubmit actions are obeyed up to an implementation-defined maximum depth.   Open
                     vSwitch  1.0.1  and  earlier  did not support recursion; Open vSwitch before 1.2.90 did not
                     support table.

              set_tunnel:id
              set_tunnel64:id
                     If outputting to a port that encapsulates the packet in a tunnel and supports an identifier
                     (such as GRE), sets the identifier to id.  If the set_tunnel form is used and id fits in 32
                     bits, then this uses an action extension that is supported by Open vSwitch 1.0  and  later.
                     Otherwise, if id is a 64-bit value, it requires Open vSwitch 1.1 or later.

              set_queue:queue
                     Sets  the  queue  that  should  be  used  to  queue when packets are output.  The number of
                     supported queues depends on the  switch;  some  OpenFlow  implementations  do  not  support
                     queuing at all.

              pop_queue
                     Restores the queue to the value it was before any set_queue actions were applied.

              ct
              ct([argument][,argument...])
                     Send  the packet through the connection tracker.  Refer to the ct_state documentation above
                     for possible packet and connection states. The following arguments are supported:

                     commit
                            Commit the connection to the  connection  tracking  module.  Information  about  the
                            connection  will  be stored beyond the lifetime of the packet in the pipeline.  Some
                            ct_state flags are only available for committed connections.

                     table=number
                            Fork pipeline processing in two. The original instance of the packet  will  continue
                            processing  the  current actions list as an untracked packet. An additional instance
                            of the packet will be sent to the connection tracker, which will be re-injected into
                            the  OpenFlow  pipeline  to resume processing in table number, with the ct_state and
                            other ct match fields set. If the table is not specified, then the packet  which  is
                            submitted  to  the connection tracker is not re-injected into the OpenFlow pipeline.
                            It is strongly recommended to specify a  table  later  than  the  current  table  to
                            prevent loops.

                     zone=value
                     zone=src[start..end]
                            A  16-bit  context id that can be used to isolate connections into separate domains,
                            allowing overlapping network  addresses  in  different  zones.  If  a  zone  is  not
                            provided,  then the default is to use zone zero. The zone may be specified either as
                            an immediate 16-bit value, or may be provided from an NXM field src. The  start  and
                            end pair are inclusive, and must specify a 16-bit range within the field. This value
                            is copied to the ct_zone match field for packets  which  are  re-injected  into  the
                            pipeline using the table option.

                     exec([action][,action...])
                            Perform  actions within the context of connection tracking. This is a restricted set
                            of actions which are in the same format as their specifications as part of  a  flow.
                            Only  actions  which  modify  the ct_mark or ct_label fields are accepted within the
                            exec action, and these fields may only be modified with this option. For example:

                            set_field:value[/mask]->ct_mark
                                   Store a 32-bit metadata value with  the  connection.  If  the  connection  is
                                   committed,  then  subsequent  lookups  for  packets  in  this connection will
                                   populate the ct_mark flow field when the packet is  sent  to  the  connection
                                   tracker with the table specified.

                            set_field:value[/mask]->ct_label
                                   Store  a  128-bit  metadata  value with the connection.  If the connection is
                                   committed, then subsequent  lookups  for  packets  in  this  connection  will
                                   populate  the  ct_label  flow field when the packet is sent to the connection
                                   tracker with the table specified.

                            The commit parameter should be specified to use exec(...).

                     alg=alg
                            Specify application layer gateway alg to track specific connection types.  Supported
                            types include:

                            ftp    Look  for  negotiation  of  FTP  data  connections.  If a subsequent FTP data
                                   connection arrives which is related, the ct action will set the rel  flag  in
                                   the ct_state field for packets sent through ct.

                            When  committing  related  connections, the ct_mark for that connection is inherited
                            from the current ct_mark stored with the original  connection  (ie,  the  connection
                            created by ct(alg=...)).

                     The  ct  action  may  be used as a primitive to construct stateful firewalls by selectively
                     committing some traffic, then matching the ct_state to allow established connections  while
                     denying  new  connections.  The  following  flows  provide an example of how to implement a
                     simple firewall that allows new connections  from  port  1  to  port  2,  and  only  allows
                     established connections to send traffic from port 2 to port 1:
                         table=0,priority=1,action=drop
                         table=0,priority=10,arp,action=normal
                         table=0,priority=100,ip,ct_state=-trk,action=ct(table=1)
                         table=1,in_port=1,ip,ct_state=+trk+new,action=ct(commit),2
                         table=1,in_port=1,ip,ct_state=+trk+est,action=2
                         table=1,in_port=2,ip,ct_state=+trk+new,action=drop
                         table=1,in_port=2,ip,ct_state=+trk+est,action=1

                     If  ct  is  executed  on IP (or IPv6) fragments, then the message is implicitly reassembled
                     before sending to the connection tracker and refragmented  upon  output,  to  the  original
                     maximum  received fragment size.  Reassembly occurs within the context of the zone, meaning
                     that IP fragments in different zones are not assembled together.  Pipeline  processing  for
                     the  initial  fragments  is  halted;  When  the  final fragment is received, the message is
                     assembled and pipeline processing will continue for that flow.  Because packet ordering  is
                     not  guaranteed  by  IP  protocols,  it is not possible to determine which IP fragment will
                     cause message reassembly (and therefore continue  pipeline  processing).  As  such,  it  is
                     strongly recommended that multiple flows should not execute ct to reassemble fragments from
                     the same IP message.

                     Currently, connection tracking is only available on Linux  kernels  with  the  nf_conntrack
                     module loaded. The ct action was introduced in Open vSwitch 2.5.

              dec_ttl
              dec_ttl(id1[,id2]...)
                     Decrement  TTL  of  IPv4  packet  or  hop limit of IPv6 packet.  If the TTL or hop limit is
                     initially zero or decrementing would make it so, no decrement occurs, as  packets  reaching
                     TTL   zero   must   be  rejected.   Instead,  a  ``packet-in''  message  with  reason  code
                     OFPR_INVALID_TTL is sent to each connected controller that has enabled receiving  them,  if
                     any.   Processing  the  current  set of actions then stops.  However, if the current set of
                     actions was reached through ``resubmit'' then remaining  actions  in  outer  levels  resume
                     processing.

                     This action also optionally supports the ability to specify a list of valid controller ids.
                     Each of the controllers in the list will receive the ``packet_in''  message  only  if  they
                     have  registered  to receive the invalid ttl packets.  If controller ids are not specified,
                     the ``packet_in'' message will be sent only to the controllers having  controller  id  zero
                     which have registered for the invalid ttl packets.

              set_mpls_label:label
                     Set  the  label  of the outer MPLS label stack entry of a packet.  label should be a 20-bit
                     value that is decimal by default; use a 0x prefix to specify them in hexadecimal.

              set_mpls_tc:tc
                     Set the traffic-class of the outer MPLS label stack entry of a packet.  tc should be  a  in
                     the range 0 to 7 inclusive.

              set_mpls_ttl:ttl
                     Set  the TTL of the outer MPLS label stack entry of a packet.  ttl should be in the range 0
                     to 255 inclusive.

              dec_mpls_ttl
                     Decrement TTL of the outer MPLS label stack entry of a packet.  If  the  TTL  is  initially
                     zero  or  decrementing  would  make  it  so, no decrement occurs.  Instead, a ``packet-in''
                     message with reason code OFPR_INVALID_TTL is sent to the main controller (id zero),  if  it
                     has enabled receiving them.  Processing the current set of actions then stops.  However, if
                     the current set of actions was reached through ``resubmit'' then remaining actions in outer
                     levels resume processing.

              note:[hh]...
                     Does  nothing  at  all.   Any number of bytes represented as hex digits hh may be included.
                     Pairs of hex digits may be separated by periods for readability.  The note action's  format
                     doesn't  include  an  exact length for its payload, so the provided bytes will be padded on
                     the right by enough bytes with value 0 to make the total number 6 more than a  multiple  of
                     8.

              move:src[start..end]->dst[start..end]
                     Copies  the named bits from field src to field dst.  src and dst must be NXM field names as
                     defined in nicira-ext.h, e.g. NXM_OF_UDP_SRC or NXM_NX_REG0.   Each  start  and  end  pair,
                     which  are  inclusive,  must  specify  the  same  number  of  bits  and must fit within its
                     respective field.  Shorthands for [start..end] exist: use [bit] to specify a single bit  or
                     [] to specify an entire field.

                     Examples:  move:NXM_NX_REG0[0..5]->NXM_NX_REG1[26..31]  copies  the  six  bits  numbered  0
                     through  5,  inclusive,   in   register   0   into   bits   26   through   31,   inclusive;
                     move:NXM_NX_REG0[0..15]->NXM_OF_VLAN_TCI[] copies the least significant 16 bits of register
                     0 into the VLAN TCI field.

                     In OpenFlow 1.0 through 1.4, move ordinarily uses an Open vSwitch  extension  to  OpenFlow.
                     In  OpenFlow  1.5, move uses the OpenFlow 1.5 standard copy_field action.  The ONF has also
                     made copy_field available as an extension to OpenFlow 1.3.   Open  vSwitch  2.4  and  later
                     understands  this  extension  and  uses  it  if  a  controller  uses  it,  but for backward
                     compatibility with older versions of Open vSwitch, ovs-ofctl does not use it.

              set_field:value[/mask]->dst
              load:value->dst[start..end]
                     Loads a literal value into a field or part of a  field.   With  set_field,  value  and  the
                     optional  mask  are  given  in  the customary syntax for field dst, which is expressed as a
                     field name.  For example, set_field:00:11:22:33:44:55->eth_src  sets  the  Ethernet  source
                     address  to  00:11:22:33:44:55.   With  load, value must be an integer value (in decimal or
                     prefixed by 0x for hexadecimal) and dst is the NXM or OXM name for the field.  For example,
                     load:0x001122334455->OXM_OF_ETH_DST[] has the same effect as the prior set_field example.

                     The  two forms exist for historical reasons.  Open vSwitch 1.1 introduced NXAST_REG_LOAD as
                     a Nicira extension to OpenFlow 1.0 and used  load  to  express  it.   Later,  OpenFlow  1.2
                     introduced  a standard OFPAT_SET_FIELD action that was restricted to loading entire fields,
                     so Open vSwitch added the form set_field with  this  restriction.   OpenFlow  1.5  extended
                     OFPAT_SET_FIELD  to  the  point  that it became a superset of NXAST_REG_LOAD.  Open vSwitch
                     translates either syntax as necessary for the OpenFlow version in use: in OpenFlow 1.0  and
                     1.1,  NXAST_REG_LOAD; in OpenFlow 1.2, 1.3, and 1.4, NXAST_REG_LOAD for load or for loading
                     a subfield, OFPAT_SET_FIELD otherwise; and OpenFlow 1.5 and later, OFPAT_SET_FIELD.

              push:src[start..end]
                     Pushes start to end bits inclusive, in fields on top of the stack.

                     Example: push:NXM_NX_REG2[0..5] push the value stored in  register  2  bits  0  through  5,
                     inclusive, on to the internal stack.

              pop:dst[start..end]
                     Pops  from  the top of the stack, retrieves the start to end bits inclusive, from the value
                     popped and store them into the corresponding bits in dst.

                     Example: pop:NXM_NX_REG2[0..5] pops the value from top of the stack.  Set register 2 bits 0
                     through 5, inclusive, based on bits 0 through 5 from the value just popped.

              multipath(fields, basis, algorithm, n_links, arg, dst[start..end])
                     Hashes  fields  using  basis as a universal hash parameter, then the applies multipath link
                     selection algorithm (with parameter arg) to choose one of n_links output links  numbered  0
                     through  n_links  minus  1,  and stores the link into dst[start..end], which must be an NXM
                     field as described above.

                     fields must be one of the following:

                     eth_src
                            Hashes Ethernet source address only.

                     symmetric_l4
                            Hashes  Ethernet  source,  destination,  and  type,  VLAN  ID,   IPv4/IPv6   source,
                            destination,  and  protocol,  and  TCP  or  SCTP  (but  not UDP) ports.  The hash is
                            computed so that pairs of corresponding flows in each direction  hash  to  the  same
                            value, in environments where L2 paths are the same in each direction.  UDP ports are
                            not included in the hash to support protocols such  as  VXLAN  that  use  asymmetric
                            ports in each direction.

                     symmetric_l3l4
                            Hashes  IPv4/IPv6  source,  destination, and protocol, and TCP or SCTP (but not UDP)
                            ports.  Like symmetric_l4, this is a symmetric hash, but by excluding L2 headers  it
                            is  more  effective  in  environments with asymmetric L2 paths (e.g. paths involving
                            VRRP IP addresses on a router).  Not an effective hash function for protocols  other
                            than IPv4 and IPv6, which hash to a constant zero.

                     symmetric_l3l4+udp
                            Like  symmetric_l3l4+udp,  but  UDP  ports are included in the hash.  This is a more
                            effective hash when asymmetric UDP protocols such as VXLAN are not a consideration.

                     algorithm must be one of modulo_n, hash_threshold, hrw, and iter_hash.  Only the  iter_hash
                     algorithm uses arg.

                     Refer to nicira-ext.h for more details.

              bundle(fields, basis, algorithm, slave_type, slaves:[s1, s2, ...])
                     Hashes  fields  using  basis  as  a  universal hash parameter, then applies the bundle link
                     selection algorithm  to  choose  one  of  the  listed  slaves  represented  as  slave_type.
                     Currently  the  only supported slave_type is ofport.  Thus, each s1 through sN should be an
                     OpenFlow port number. Outputs to the selected slave.

                     Currently,   fields   must   be   either   eth_src,   symmetric_l4,   symmetric_l3l4,    or
                     symmetric_l3l4+udp, and algorithm must be one of hrw and active_backup.

                     Example: bundle(eth_src,0,hrw,ofport,slaves:4,8) uses an Ethernet source hash with basis 0,
                     to select between OpenFlow ports 4 and 8 using the Highest Random Weight algorithm.

                     Refer to nicira-ext.h for more details.

              bundle_load(fields, basis, algorithm, slave_type, dst[start..end], slaves:[s1, s2, ...])
                     Has the same behavior as the bundle action, with one exception.  Instead of  outputting  to
                     the  selected slave, it writes its selection to dst[start..end], which must be an NXM field
                     as described above.

                     Example: bundle_load(eth_src, 0, hrw, ofport, NXM_NX_REG0[], slaves:4, 8) uses an  Ethernet
                     source hash with basis 0, to select between OpenFlow ports 4 and 8 using the Highest Random
                     Weight algorithm, and writes the selection to NXM_NX_REG0[].

                     Refer to nicira-ext.h for more details.

              learn(argument[,argument]...)
                     This action adds or modifies a flow in an OpenFlow table,  similar  to  ovs-ofctl  --strict
                     mod-flows.   The  arguments specify the flow's match fields, actions, and other properties,
                     as follows.  At least one match criterion and one  action  argument  should  ordinarily  be
                     specified.

                     idle_timeout=seconds
                     hard_timeout=seconds
                     priority=value
                     cookie=value
                     send_flow_rem
                            These arguments have the same meaning as in the usual ovs-ofctl flow syntax.

                     fin_idle_timeout=seconds
                     fin_hard_timeout=seconds
                            Adds  a  fin_timeout  action  with  the  specified  arguments to the new flow.  This
                            feature was added in Open vSwitch 1.5.90.

                     table=number
                            The table in which the new flow  should  be  inserted.   Specify  a  decimal  number
                            between 0 and 254.  The default, if table is unspecified, is table 1.

                     delete_learned
                            This  flag enables deletion of the learned flows when the flow with the learn action
                            is removed.  Specifically, when the last learn action with this flag and  particular
                            table  and  cookie  values  is  removed,  the switch deletes all of the flows in the
                            specified table with the specified cookie.

                            This flag was added in Open vSwitch 2.4.

                     field=value
                     field[start..end]=src[start..end]
                     field[start..end]
                            Adds a match criterion to the new flow.

                            The  first  form  specifies  that  field  must  match  the   literal   value,   e.g.
                            dl_type=0x0800.   All  of  the  fields  and  values  for  ovs-ofctl  flow syntax are
                            available with their usual meanings.

                            The second form  specifies  that  field[start..end]  in  the  new  flow  must  match
                            src[start..end] taken from the flow currently being processed.

                            The   third   form   is  a  shorthand  for  the  second  form.   It  specifies  that
                            field[start..end] in the new flow must match field[start..end] taken from  the  flow
                            currently being processed.

                     load:value->dst[start..end]
                     load:src[start..end]->dst[start..end]
                            Adds a load action to the new flow.

                            The  first  form  loads the literal value into bits start through end, inclusive, in
                            field dst.  Its syntax is the same as the load  action  described  earlier  in  this
                            section.

                            The  second  form  loads  src[start..end],  a  value  from  the flow currently being
                            processed, into bits start through end, inclusive, in field dst.

                     output:field[start..end]
                            Add an output action to the new flow's actions, that outputs to  the  OpenFlow  port
                            taken from field[start..end], which must be an NXM field as described above.

                     For best performance, segregate learned flows into a table (using table=number) that is not
                     used for any other flows except possibly for a lowest-priority ``catch-all'' flow, that is,
                     a  flow  with  no match criteria.  (This is why the default table is 1, to keep the learned
                     flows separate from the primary flow table 0.)

              clear_actions
                     Clears all the actions in the action set immediately.

              write_actions([action][,action...])
                     Add the specific actions to the action set.  The syntax of actions is the same  as  in  the
                     actions= field.  The action set is carried between flow tables and then executed at the end
                     of the pipeline.

                     The actions in the action set are applied in  the  following  order,  as  required  by  the
                     OpenFlow specification, regardless of the order in which they were added to the action set.
                     Except as specified otherwise below, the action set only holds at most a single  action  of
                     each  type.   When  more than one action of a single type is written to the action set, the
                     one written later replaces the earlier action:

                     1.     strip_vlan
                            pop_mpls

                     2.     push_mpls

                     3.     push_vlan

                     4.     dec_ttl
                            dec_mpls_ttl

                     5.     load
                            move
                            mod_dl_dst
                            mod_dl_src
                            mod_nw_dst
                            mod_nw_src
                            mod_nw_tos
                            mod_nw_ecn
                            mod_nw_ttl
                            mod_tp_dst
                            mod_tp_src
                            mod_vlan_pcp
                            mod_vlan_vid
                            set_field
                            set_tunnel
                            set_tunnel64
                            The action set can contain any number of these actions, with cumulative effect. They
                            will  be  applied  in the order as added.  That is, when multiple actions modify the
                            same part of a field, the later modification takes  effect,  and  when  they  modify
                            different  parts  of  a  field  (or  different  fields), then both modifications are
                            applied.

                     6.     set_queue

                     7.     group
                            output
                            resubmit
                            If more than one of these actions is present, then the one listed earliest above  is
                            executed  and  the  others  are  ignored, regardless of the order in which they were
                            added to the action set.  (If none of these actions is present, the action  set  has
                            no  real  effect,  because  the  modified  packet  is not sent anywhere and thus the
                            modifications are not visible.)

                     Only the actions listed above may be written to the action set.

              write_metadata:value[/mask]
                     Updates the metadata field for the flow. If mask is omitted,  the  metadata  field  is  set
                     exactly  to  value;  if  mask  is  specified,  then  a  1-bit  in  mask  indicates that the
                     corresponding bit in the metadata field will be replaced with the  corresponding  bit  from
                     value.  Both  value and mask are 64-bit values that are decimal by default; use a 0x prefix
                     to specify them in hexadecimal.

              meter:meter_id
                     Apply the meter_id before any other actions. If a meter band rate is exceeded,  the  packet
                     may  be  dropped, or modified, depending on the meter band type. See the description of the
                     Meter Table Commands, above, for more details.

              goto_table:table
                     Indicates the next table in the process pipeline.

              fin_timeout(argument[,argument])
                     This action changes the idle timeout or hard timeout, or both, of this OpenFlow  rule  when
                     the  rule  matches  a TCP packet with the FIN or RST flag.  When such a packet is observed,
                     the action reduces the rule's timeouts to those specified on the  action.   If  the  rule's
                     existing  timeout  is  already  shorter  than  the one that the action specifies, then that
                     timeout is unaffected.

                     argument takes the following forms:

                     idle_timeout=seconds
                            Causes the flow to expire after the given number of seconds of inactivity.

                     hard_timeout=seconds
                            Causes the flow to expire after the given number of seconds, regardless of activity.
                            (seconds  specifies time since the flow's creation, not since the receipt of the FIN
                            or RST.)

                     This action was added in Open vSwitch 1.5.90.

              sample(argument[,argument]...)
                     Samples packets and sends one sample for every sampled packet.

                     argument takes the following forms:

                     probability=packets
                            The number of sampled packets out of 65535.  Must be greater or equal to 1.

                     collector_set_id=id
                            The unsigned 32-bit integer identifier of the  set  of  sample  collectors  to  send
                            sampled packets to.  Defaults to 0.

                     obs_domain_id=id
                            When  sending  samples  to IPFIX collectors, the unsigned 32-bit integer Observation
                            Domain ID sent in every IPFIX flow record.  Defaults to 0.

                     obs_point_id=id
                            When sending samples to IPFIX collectors, the unsigned  32-bit  integer  Observation
                            Point ID sent in every IPFIX flow record.  Defaults to 0.

                     Refer to ovs-vswitchd.conf.db(8) for more details on configuring sample collector sets.

                     This action was added in Open vSwitch 1.10.90.

              exit   This  action  causes  Open vSwitch to immediately halt execution of further actions.  Those
                     actions which have already been executed are unaffected.  Any  further  actions,  including
                     those  which  may  be  in other tables, or different levels of the resubmit call stack, are
                     ignored.  Actions in the action set is still executed (specify clear_actions before exit to
                     discard them).

              conjunction(id, k/n)
                     An  individual  OpenFlow  flow  can  match  only  a  single value for each field.  However,
                     situations often arise where one wants to match one of a set of values within  a  field  or
                     fields.   For matching a single field against a set, it is straightforward and efficient to
                     add multiple flows to the flow table, one for each value in  the  set.   For  example,  one
                     might  use  the following flows to send packets with IP source address a, b, c, or d to the
                     OpenFlow controller:
                        ip,ip_src=a actions=controller
                        ip,ip_src=b actions=controller
                        ip,ip_src=c actions=controller
                        ip,ip_src=d actions=controller

                     Similarly, these flows send packets with IP destination address  e,  f,  g,  or  h  to  the
                     OpenFlow controller:
                        ip,ip_dst=e actions=controller
                        ip,ip_dst=f actions=controller
                        ip,ip_dst=g actions=controller
                        ip,ip_dst=h actions=controller

                     Installing  all  of  the  above flows in a single flow table yields a disjunctive effect: a
                     packet is sent to the controller if ip_src ∈ {a,b,c,d} or ip_dst  ∈  {e,f,g,h}  (or  both).
                     (Pedantically,  if  both  of  the  above  sets of flows are present in the flow table, they
                     should have different priorities, because OpenFlow says that the results are undefined when
                     two flows with same priority can both match a single packet.)

                     Suppose, on the other hand, one wishes to match conjunctively, that is, to send a packet to
                     the controller only if both ip_src ∈ {a,b,c,d} and ip_dst ∈ {e,f,g,h}.  This requires 4 × 4
                     = 16 flows, one for each possible pairing of ip_src and ip_dst.  That is acceptable for our
                     small example, but it does not gracefully extend to  larger  sets  or  greater  numbers  of
                     dimensions.

                     The  conjunction  action  is  a  solution  for  conjunctive matches that is built into Open
                     vSwitch.  A conjunction action ties groups of individual OpenFlow flows  into  higher-level
                     ``conjunctive  flows''.   Each group corresponds to one dimension, and each flow within the
                     group matches one possible value for the dimension.  A packet that matches  one  flow  from
                     each group matches the conjunctive flow.

                     To  implement a conjunctive flow with conjunction, assign the conjunctive flow a 32-bit id,
                     which must be unique within an OpenFlow table.  Assign each of  the  n  ≥  2  dimensions  a
                     unique  number from 1 to n; the ordering is unimportant.  Add one flow to the OpenFlow flow
                     table for each possible value of each dimension with conjunction(id,  k/n)  as  the  flow's
                     actions,  where  k  is  the number assigned to the flow's dimension.  Together, these flows
                     specify the conjunctive flow's match condition.  When the conjunctive  match  condition  is
                     met,  Open vSwitch looks up one more flow that specifies the conjunctive flow's actions and
                     receives its statistics.  This flow is found by setting conj_id to  the  specified  id  and
                     then again searching the flow table.

                     The following flows provide an example.  Whenever the IP source is one of the values in the
                     flows that match on the IP source (dimension 1 of 2), and the IP destination is one of  the
                     values  in the flows that match on IP destination (dimension 2 of 2), Open vSwitch searches
                     for a flow that matches conj_id against the conjunction ID (1234), finding the  first  flow
                     listed below.
                        conj_id=1234 actions=controller
                        ip,ip_src=10.0.0.1 actions=conjunction(1234, 1/2)
                        ip,ip_src=10.0.0.4 actions=conjunction(1234, 1/2)
                        ip,ip_src=10.0.0.6 actions=conjunction(1234, 1/2)
                        ip,ip_src=10.0.0.7 actions=conjunction(1234, 1/2)
                        ip,ip_dst=10.0.0.2 actions=conjunction(1234, 2/2)
                        ip,ip_dst=10.0.0.5 actions=conjunction(1234, 2/2)
                        ip,ip_dst=10.0.0.7 actions=conjunction(1234, 2/2)
                        ip,ip_dst=10.0.0.8 actions=conjunction(1234, 2/2)

                     Many subtleties exist:

                     •      In  the  example above, every flow in a single dimension has the same form, that is,
                            dimension 1 matches on ip_src, dimension 2 on ip_dst, but this is not a requirement.
                            Different  flows within a dimension may match on different bits within a field (e.g.
                            IP network prefixes  of  different  lengths,  or  TCP/UDP  port  ranges  as  bitwise
                            matches), or even on entirely different fields (e.g. to match packets for TCP source
                            port 80 or TCP destination port 80).

                     •      The flows within a dimension can vary their matches across more than one field, e.g.
                            to  match  only  specific  pairs  of  IP source and destination addresses or L4 port
                            numbers.

                     •      A flow may have multiple conjunction actions, with different  id  values.   This  is
                            useful  for  multiple  conjunctive  flows with overlapping sets.  If one conjunctive
                            flow matches packets with both ip_src ∈ {a,b}  and  ip_dst  ∈  {d,e}  and  a  second
                            conjunctive  flow  matches  ip_src ∈ {b,c} and ip_dst ∈ {f,g}, for example, then the
                            flow that matches  ip_src=b  would  have  two  conjunction  actions,  one  for  each
                            conjunctive  flow.  The order of conjunction actions within a list of actions is not
                            significant.

                     •      A flow with conjunction actions may also include note actions for  annotations,  but
                            not  any  other kind of actions.  (They would not be useful because they would never
                            be executed.)

                     •      All of the flows that constitute a conjunctive flow with a given id  must  have  the
                            same  priority.   (Flows  with  the  same  id but different priorities are currently
                            treated as different conjunctive flows, that is, currently id values  need  only  be
                            unique within an OpenFlow table at a given priority.  This behavior isn't guaranteed
                            to stay the same in later releases,  so  please  use  id  values  unique  within  an
                            OpenFlow table.)

                     •      Conjunctive  flows  must  not overlap with each other, at a given priority, that is,
                            any given packet must be able to match at most  one  conjunctive  flow  at  a  given
                            priority.  Overlapping conjunctive flows yield unpredictable results.

                     •      Following  a conjunctive flow match, the search for the flow with conj_id=id is done
                            in the same general-purpose way as other flow table searches, so one can  use  flows
                            with  conj_id=id  to  act differently depending on circumstances.  (One exception is
                            that the search for the conj_id=id flow itself ignores conjunctive flows,  to  avoid
                            recursion.)  If  the  search  with  conj_id=id  fails,  Open  vSwitch acts as if the
                            conjunctive flow had not matched at all, and continues searching the flow table  for
                            other matching flows.

                     •      OpenFlow  prerequisite  checking occurs for the flow with conj_id=id in the same way
                            as any other flow, e.g. in an OpenFlow 1.1+ context,  putting  a  mod_nw_src  action
                            into the example above would require adding an ip match, like this:
                               conj_id=1234,ip actions=mod_nw_src:1.2.3.4,controller

                     •      OpenFlow  prerequisite checking also occurs for the individual flows that comprise a
                            conjunctive match in the same way as any other flow.

                     •      The flows that constitute a conjunctive flow do not have  useful  statistics.   They
                            are  never  updated  with  byte  or  packet  counts,  and  so on.  (For such a flow,
                            therefore, the idle and hard timeouts work much the same way.)

                     •      Conjunctive flows can be a useful building block for negation, that  is,  inequality
                            matches  like  tcp_src ≠ 80.  To implement an inequality match, convert it to a pair
                            of range matches, e.g. 0 ≤ tcp_src < 80 and 80 < tcp_src ≤ 65535, then convert  each
                            of  the range matches into a collection of bitwise matches as explained above in the
                            description of tcp_src.

                     •      Sometimes there is a choice of which flows include a particular match.  For example,
                            suppose  that  we  added  an  extra  constraint to our example, to match on ip_src ∈
                            {a,b,c,d} and ip_dst ∈ {e,f,g,h} and tcp_dst = i.  One way to implement this  is  to
                            add the new constraint to the conj_id flow, like this:
                               conj_id=1234,tcp,tcp_dst=i actions=mod_nw_src:1.2.3.4,controller

                            but  this  is  not  recommended  because of the cost of the extra flow table lookup.
                            Instead, add the constraint to the individual flows, either in one of the dimensions
                            or (slightly better) all of them.

                     •      A conjunctive match must have n ≥ 2 dimensions (otherwise a conjunctive match is not
                            necessary).  Open vSwitch enforces this.

                     •      Each dimension within a conjunctive match should ordinarily have more than one flow.
                            Open vSwitch does not enforce this.

                     The conjunction action and conj_id field were introduced in Open vSwitch 2.4.

       An opaque identifier called a cookie can be used as a handle to identify a set of flows:

       cookie=value
              A  cookie  can  be  associated  with a flow using the add-flow, add-flows, and mod-flows commands.
              value can be any 64-bit number and need not be unique among flows.  If this field  is  omitted,  a
              default cookie value of 0 is used.

       cookie=value/mask
              When  using  NXM,  the cookie can be used as a handle for querying, modifying, and deleting flows.
              value and mask may be supplied  for  the  del-flows,  mod-flows,  dump-flows,  and  dump-aggregate
              commands  to  limit  matching  cookies.   A  1-bit in mask indicates that the corresponding bit in
              cookie must match exactly, and a 0-bit wildcards that bit.  A mask of -1 may be  used  to  exactly
              match a cookie.

              The mod-flows command can update the cookies of flows that match a cookie by specifying the cookie
              field twice (once with a mask for matching and once without to indicate the new value):

              ovs-ofctl mod-flows br0 cookie=1,actions=normal
                     Change all flows' cookies to 1 and change their actions to normal.

              ovs-ofctl mod-flows br0 cookie=1/-1,cookie=2,actions=normal
                     Update cookies with a value of 1 to 2 and change their actions to normal.

              The ability to match on cookies was added in Open vSwitch 1.5.0.

       The following additional field sets the priority for flows added by the add-flow and add-flows  commands.
       For  mod-flows  and  del-flows when --strict is specified, priority must match along with the rest of the
       flow specification.  For mod-flows without --strict, priority is only significant if the command  creates
       a  new flow, that is, non-strict mod-flows does not match on priority and will not change the priority of
       existing flows.  Other commands do not allow priority to be specified.

       priority=value
              The priority at which a wildcarded entry will match in comparison to others.  value  is  a  number
              between  0  and  65535,  inclusive.  A higher value will match before a lower one.  An exact-match
              entry will always have priority over an entry containing wildcards, so it has an implicit priority
              value  of  65535.   When  adding  a  flow, if the field is not specified, the flow's priority will
              default to 32768.

              OpenFlow leaves behavior undefined when two or more flows with  the  same  priority  can  match  a
              single  packet.   Some  users  expect  ``sensible''  behavior,  such as more specific flows taking
              precedence over less specific flows, but OpenFlow does not specify this and Open vSwitch does  not
              implement it.  Users should therefore take care to use priorities to ensure the behavior that they
              expect.

       The add-flow, add-flows, and mod-flows commands support the following additional options.  These  options
       affect  only  new flows.  Thus, for add-flow and add-flows, these options are always significant, but for
       mod-flows they are significant only if the command creates a new flow,  that  is,  their  values  do  not
       update or affect existing flows.

       idle_timeout=seconds
              Causes  the  flow  to  expire  after the given number of seconds of inactivity.  A value of 0 (the
              default) prevents a flow from expiring due to inactivity.

       hard_timeout=seconds
              Causes the flow to expire after the given number of seconds, regardless of activity.  A value of 0
              (the default) gives the flow no hard expiration deadline.

       importance=value
              Sets  the  importance of a flow.  The flow entry eviction mechanism can use importance as a factor
              in deciding which flow to evict.  A value of 0 (the default) makes the flow non-evictable  on  the
              basis of importance.  Specify a value between 0 and 65535.

              Only OpenFlow 1.4 and later support importance.

       send_flow_rem
              Marks  the flow with a flag that causes the switch to generate a ``flow removed'' message and send
              it to interested controllers when the flow later expires or is removed.

       check_overlap
              Forces the switch to check that the flow match does not overlap that of any  different  flow  with
              the same priority in the same table.  (This check is expensive so it is best to avoid it.)

       The dump-flows, dump-aggregate, del-flow and del-flows commands support these additional optional fields:

       out_port=port
              If  set,  a  matching  flow  must include an output action to port, which must be an OpenFlow port
              number or name (e.g. local).

       out_group=port
              If set, a matching flow must include an group action naming group, which must be an OpenFlow group
              number.  This field is supported in Open vSwitch 2.5 and later and requires OpenFlow 1.1 or later.

   Table Entry Output
       The  dump-tables  and dump-aggregate commands print information about the entries in a datapath's tables.
       Each line of output is a flow entry as described in Flow Syntax, above, plus some additional fields:

       duration=secs
              The time, in seconds, that the entry has been in the table.  secs includes as  much  precision  as
              the switch provides, possibly to nanosecond resolution.

       n_packets
              The number of packets that have matched the entry.

       n_bytes
              The total number of bytes from packets that have matched the entry.

       The  following additional fields are included only if the switch is Open vSwitch 1.6 or later and the NXM
       flow format is used to dump the flow (see the description of the --flow-format option below).  The values
       of  these  additional  fields  are  approximations  only and in particular idle_age will sometimes become
       nonzero even for busy flows.

       hard_age=secs
              The integer number of seconds since the flow was added or modified.  hard_age is displayed only if
              it  differs  from the integer part of duration.  (This is separate from duration because mod-flows
              restarts the hard_timeout timer without zeroing duration.)

       idle_age=secs
              The integer number of seconds that have passed without any packets passing through the flow.

   Group Syntax
       Some ovs-ofctl commands accept an argument that describes a group  or  groups.   Such  flow  descriptions
       comprise  a series field=value assignments, separated by commas or white space.  (Embedding spaces into a
       group description normally requires quoting to prevent the  shell  from  breaking  the  description  into
       multiple arguments.). Unless noted otherwise only the last instance of each field is honoured.

       group_id=id
              The  integer  group  id  of group.  When this field is specified in del-groups or dump-groups, the
              keyword "all" may be used to designate all groups.  This field is required.

       type=type
              The type of the group.  The add-group, add-groups and mod-groups commands require this field.   It
              is prohibited for other commands. The following keywords designated the allowed types:

              all    Execute all buckets in the group.

              select Execute  one  bucket  in the group.  The switch should select the bucket in such a way that
                     should implement equal load sharing is achieved.  The  switch  may  optionally  select  the
                     bucket based on bucket weights.

              indirect
                     Executes the one bucket in the group.

              ff
              fast_failover
                     Executes the first live bucket in the group which is associated with a live port or group.

       command_bucket_id=id
              The  bucket to operate on.  The insert-buckets and remove-buckets commands require this field.  It
              is prohibited for other commands.  id may be an integer or one of the following keywords:

              all    Operate on all buckets in the group.  Only valid when used with the remove-buckets  command
                     in which case the effect is to remove all buckets from the group.

              first  Operate  on  the  first  bucket  present  in  the group.  In the case of the insert-buckets
                     command the effect is to insert new bucets just before the first bucket already present  in
                     the  group;  or to replace the buckets of the group if there are no buckets already present
                     in the group.  In the case of the remove-buckets command the effect is to remove the  first
                     bucket of the group; or do nothing if there are no buckets present in the group.

              last   Operate on the last bucket present in the group.  In the case of the insert-buckets command
                     the effect is to insert new bucets just after the last bucket already present in the group;
                     or  to  replace  the  buckets  of  the group if there are no buckets already present in the
                     group.  In the case of the remove-buckets command the effect is to remove the  last  bucket
                     of the group; or do nothing if there are no buckets present in the group.

              If  id  is an integer then it should correspond to the bucket_id of a bucket present in the group.
              In case of the insert-buckets command the effect is to insert buckets just before  the  bucket  in
              the  group  whose bucket_id is id.  In case of the iremove-buckets command the effect is to remove
              the in the group whose bucket_id is id.  It is an error if there is no  bucket  persent  group  in
              whose bucket_id is id.

       selection_method=method
              The  selection  method  used  to  select a bucket for a select group.  This is a string of 1 to 15
              bytes in length known to lower layers.  This field  is  optional  for  add-group,  add-groups  and
              mod-group  commands on groups of type select. Prohibited otherwise. The default value is the empty
              string.

              Other than the empty string, hash is currently the only defined selection method.

              This option will use a Netronome OpenFlow extension  which  is  only  supported  when  using  Open
              vSwitch 2.4 and later with OpenFlow 1.5 and later.

       selection_method_param=param
              64-bit  integer  parameter  to  the  selection method selected by the selection_method field.  The
              parameter's use is defined by  the  lower-layer  that  implements  the  selection_method.   It  is
              optional  if the selection_method field is specified as a non-empty string.  Prohibited otherwise.
              The default value is zero.

              This option will use a Netronome OpenFlow extension  which  is  only  supported  when  using  Open
              vSwitch 2.4 and later with OpenFlow 1.5 and later.

       fields=field
       fields(field[=mask]...)
              The  field  parameters  to selection method selected by the selection_method field.  The syntax is
              described in Flow Syntax with the additional restrictions that  if  a  value  is  provided  it  is
              treated as a wildcard mask and wildcard masks following a slash are prohibited. The pre-requisites
              of fields must be provided by any flows that output to the group. The use of the fields is defined
              by   the   lower-layer   that   implements   the  selection_method.   They  are  optional  if  the
              selection_method field is specified as a non-empty string.  Prohibited otherwise. The  default  is
              no fields.

              This  option  will  use  a  Netronome  OpenFlow  extension which is only supported when using Open
              vSwitch 2.4 and later with OpenFlow 1.5 and later.

       bucket=bucket_parameters
              The add-group, add-groups and mod-group commands require at least one bucket field. Bucket  fields
              must  appear  after  all  other  fields.  Multiple bucket fields to specify multiple buckets.  The
              order in which buckets are specified corresponds to their order in the group. If the type  of  the
              group is "indirect" then only one group may be specified.  bucket_parameters consists of a list of
              field=value assignments, separated by commas or white space followed by a comma-separated list  of
              actions.  The fields for bucket_parameters are:

              bucket_id=id
                     The  32-bit  integer  group id of the bucket.  Values greater than 0xffffff00 are reserved.
                     This field was added in Open vSwitch 2.4 to conform with the OpenFlow 1.5 specification. It
                     is  not  supported  when  earlier  versions  of  OpenFlow  are  used.   Open  vSwitch  will
                     automatically allocate bucket ids when they are not specified.

              actions=[action][,action...]
                     The syntax of actions are identical to the actions= field described in Flow  Syntax  above.
                     Specyfing  actions=  is  optional,  any  unknown bucket parameter will be interpreted as an
                     action.

              weight=value
                     The relative weight of the bucket as an integer. This may be  used  by  the  switch  during
                     bucket select for groups whose type is select.

              watch_port=port
                     Port  used  to  determine liveness of group.  This or the watch_group field is required for
                     groups whose type is ff or fast_failover.

              watch_group=group_id
                     Group identifier of group used to determine liveness of  group.   This  or  the  watch_port
                     field is required for groups whose type is ff or fast_failover.

   Meter Syntax
       The  meter  table commands accept an argument that describes a meter.  Such meter descriptions comprise a
       series field=value assignments, separated by commas or white  space.   (Embedding  spaces  into  a  group
       description  normally  requires  quoting to prevent the shell from breaking the description into multiple
       arguments.). Unless noted otherwise only the last instance of each field is honoured.

       meter=id
              The integer meter id of the meter.  When this field is  specified  in  del-meter,  dump-meter,  or
              meter-stats, the keyword "all" may be used to designate all meters.  This field is required, exept
              for meter-stats, which dumps all stats when this field is not specified.

       kbps
       pktps  The unit for the meter band rate parameters, either kilobits per second, or  packets  per  second,
              respectively.   One  of these must be specified.  The burst size unit corresponds to the rate unit
              by dropping the "per second", i.e., burst is in units of kilobits or packets, respectively.

       burst  Specify burst size for all bands, or none of them, if this flag is not given.

       stats  Collect meter and band statistics.

       bands=band_parameters
              The add-meter and mod-meter commands require at least one band specification.  Bands  must  appear
              after all other fields.

              type=type
                     The  type  of  the  meter  band.   This keyword starts a new band specification.  Each band
                     specifies a rate above which the band is to take some action. The  action  depends  on  the
                     band  type.  If multiple bands' rate is exceeded, then the band with the highest rate among
                     the exceeded bands is selected.  The following keywords designate the  allowed  meter  band
                     types:

                     drop   Drop packets exceeding the band's rate limit.

              The other band_parameters are:

              rate=value
                     The  relative  rate  limit  for  this  band,  in kilobits per second or packets per second,
                     depending on the meter flags defined above.

              burst_size=size
                     The maximum burst allowed for the band.  If pktps is  specified,  then  size  is  a  packet
                     count,  otherwise  it  is  in  kilobits.  If unspecified, the switch is free to select some
                     reasonable value depending on its configuration.

OPTIONS

       --strict
              Uses strict matching when running flow modification commands.

       --bundle
              Execute flow mods as an OpenFlow 1.4 atomic bundle transaction.

              •      Within a bundle, all flow mods are processed in the order  they  appear  and  as  a  single
                     atomic transaction, meaning that if one of them fails, the whole transaction fails and none
                     of the changes are made to the switch's flow table, and that  each  given  datapath  packet
                     traversing  the  OpenFlow  tables sees the flow tables either as before the transaction, or
                     after all the flow mods in the bundle have been successfully applied.

              •      The beginning and the end of the flow table modification commands in a bundle are delimited
                     with  OpenFlow  1.4 bundle control messages, which makes it possible to stream the included
                     commands without explicit OpenFlow barriers, which are otherwise used after each flow table
                     modification command.  This may make large modifications execute faster as a bundle.

              •      Bundles  require  OpenFlow  1.4 or higher.  An explicit -O OpenFlow14 option is not needed,
                     but you may need to enable OpenFlow 1.4 support for OVS  by  setting  the  OVSDB  protocols
                     column in the bridge table.

       -O [version[,version]...]
       --protocols=[version[,version]...]
              Sets the OpenFlow protocol versions that are allowed when establishing an OpenFlow session.

              The  following  versions  are considered to be ready for general use.  These protocol versions are
              enabled by default:

              •      OpenFlow10, for OpenFlow 1.0.

              Support for the following protocol versions is provided  for  testing  and  development  purposes.
              They are not enabled by default:

              •      OpenFlow11, for OpenFlow 1.1.

              •      OpenFlow12, for OpenFlow 1.2.

              •      OpenFlow13, for OpenFlow 1.3.

       -F format[,format...]
       --flow-format=format[,format...]
              ovs-ofctl  supports  the  following  individual flow formats, any number of which may be listed as
              format:

              OpenFlow10-table_id
                     This is the standard OpenFlow 1.0 flow format.  All OpenFlow switches and all  versions  of
                     Open vSwitch support this flow format.

              OpenFlow10+table_id
                     This is the standard OpenFlow 1.0 flow format plus a Nicira extension that allows ovs-ofctl
                     to specify the flow table in which a particular flow should be placed.   Open  vSwitch  1.2
                     and later supports this flow format.

              NXM-table_id (Nicira Extended Match)
                     This  Nicira  extension  to  OpenFlow  is  flexible and extensible.  It supports all of the
                     Nicira flow extensions, such as tun_id and registers.  Open vSwitch 1.1 and later  supports
                     this flow format.

              NXM+table_id (Nicira Extended Match)
                     This  combines  Nicira Extended match with the ability to place a flow in a specific table.
                     Open vSwitch 1.2 and later supports this flow format.

              OXM-OpenFlow12
              OXM-OpenFlow13
              OXM-OpenFlow14
                     These are the standard OXM (OpenFlow Extensible Match) flow format in  OpenFlow  1.2,  1.3,
                     and 1.4, respectively.

              ovs-ofctl also supports the following abbreviations for collections of flow formats:

              any    Any supported flow format.

              OpenFlow10
                     OpenFlow10-table_id or OpenFlow10+table_id.

              NXM    NXM-table_id or NXM+table_id.

              OXM    OXM-OpenFlow12, OXM-OpenFlow13, or OXM-OpenFlow14.

              For commands that modify the flow table, ovs-ofctl by default negotiates the most widely supported
              flow format that supports the flows  being  added.   For  commands  that  query  the  flow  table,
              ovs-ofctl by default uses the most advanced format supported by the switch.

              This  option,  where  format is a comma-separated list of one or more of the formats listed above,
              limits ovs-ofctl's choice of flow format.  If a command cannot work as requested using one of  the
              specified flow formats, ovs-ofctl will report a fatal error.

       -P format
       --packet-in-format=format
              ovs-ofctl supports the following packet_in formats, in order of increasing capability:

              openflow10
                     This  is the standard OpenFlow 1.0 packet in format. It should be supported by all OpenFlow
                     switches.

              nxm (Nicira Extended Match)
                     This packet_in format includes flow metadata encoded using the NXM format.

              Usually, ovs-ofctl prefers the nxm packet_in format, but will  allow  the  switch  to  choose  its
              default  if  nxm  is  unsupported.   When  format is one of the formats listed in the above table,
              ovs-ofctl will insist on the selected format.  If  the  switch  does  not  support  the  requested
              format, ovs-ofctl will report a fatal error.  This option only affects the monitor command.

       --timestamp
              Print  a  timestamp before each received packet.  This option only affects the monitor, snoop, and
              ofp-parse-pcap commands.

       -m
       --more Increases the verbosity of OpenFlow messages printed and logged by  ovs-ofctl  commands.   Specify
              this option more than once to increase verbosity further.

       --sort[=field]
       --rsort[=field]
              Display  output  sorted  by  flow field in ascending (--sort) or descending (--rsort) order, where
              field is any of the fields that are allowed for matching or priority to sort  by  priority.   When
              field  is omitted, the output is sorted by priority.  Specify these options multiple times to sort
              by multiple fields.

              Any given flow will not necessarily specify a value for a  given  field.   This  requires  special
              treatement:

              •      A  flow  that does not specify any part of a field that is used for sorting is sorted after
                     all the flows that do specify the field.  For example, --sort=tcp_src  will  sort  all  the
                     flows  that specify a TCP source port in ascending order, followed by the flows that do not
                     specify a TCP source port at all.

              •      A flow that only specifies some bits in a field is sorted as if the  wildcarded  bits  were
                     zero.   For  example,  --sort=nw_src would sort a flow that specifies nw_src=192.168.0.0/24
                     the same as nw_src=192.168.0.0.

              These options currently affect only dump-flows output.  The following options are valid  on  POSIX
              based platforms.

       --pidfile[=pidfile]
              Causes a file (by default, ovs-ofctl.pid) to be created indicating the PID of the running process.
              If the pidfile argument is not specified, or if it does not begin with /, then it  is  created  in
              /var/run/openvswitch.

              If --pidfile is not specified, no pidfile is created.

       --overwrite-pidfile
              By  default, when --pidfile is specified and the specified pidfile already exists and is locked by
              a running process, ovs-ofctl refuses to start.  Specify --overwrite-pidfile to cause it to instead
              overwrite the pidfile.

              When --pidfile is not specified, this option has no effect.

       --detach
              Runs  ovs-ofctl  as  a  background  process.   The process forks, and in the child it starts a new
              session, closes the standard file descriptors (which has the side effect of disabling  logging  to
              the  console),  and  changes  its  current directory to the root (unless --no-chdir is specified).
              After the child completes its initialization, the parent  exits.   ovs-ofctl  detaches  only  when
              executing the monitor or snoop commands.

       --monitor
              Creates an additional process to monitor the ovs-ofctl daemon.  If the daemon dies due to a signal
              that indicates a programming error (SIGABRT, SIGALRM, SIGBUS, SIGFPE,  SIGILL,  SIGPIPE,  SIGSEGV,
              SIGXCPU,  or  SIGXFSZ)  then  the  monitor process starts a new copy of it.  If the daemon dies or
              exits for another reason, the monitor process exits.

              This option is normally used with --detach, but it also functions without it.

       --no-chdir
              By default, when --detach is specified, ovs-ofctl changes its current  working  directory  to  the
              root  directory  after  it  detaches.   Otherwise,  invoking  ovs-ofctl  from  a carelessly chosen
              directory would prevent the  administrator  from  unmounting  the  file  system  that  holds  that
              directory.

              Specifying  --no-chdir  suppresses  this  behavior, preventing ovs-ofctl from changing its current
              working directory.  This may be useful for collecting core files, since it is common  behavior  to
              write core dumps into the current working directory and the root directory is not a good directory
              to use.

              This option has no effect when --detach is not specified.

       --user Causes ovs-ofctl to run as a different user specified in "user:group", thus dropping most  of  the
              root  privileges. Short forms "user" and ":group" are also allowed, with current user or group are
              assumed respectively. Only daemons started by the root user accepts this argument.

              On Linux, daemons will be granted CAP_IPC_LOCK  and  CAP_NET_BIND_SERVICES  before  dropping  root
              privileges.  Daemons  interact with datapath, such as ovs-vswitchd, will be granted two additional
              capabilities, namely CAP_NET_ADMIN and CAP_NET_RAW. The capability change will apply even  if  new
              user is "root".

              On  Windows,  this option is not currently supported. For security reasons, specifying this option
              will cause the daemon process not to start.

       --unixctl=socket
              Sets the name of the control socket on which ovs-ofctl listens  for  runtime  management  commands
              (see  RUNTIME  MANAGEMENT COMMANDS, below).  If socket does not begin with /, it is interpreted as
              relative to /var/run/openvswitch.  If --unixctl  is  not  used  at  all,  the  default  socket  is
              /var/run/openvswitch/ovs-ofctl.pid.ctl, where pid is ovs-ofctl's process ID.

              On  Windows,  uses  a  kernel  chosen  TCP  port on the localhost to listen for runtime management
              commands.  The kernel chosen TCP port value is written in a file whose absolute path is pointed by
              socket.  If  --unixctl  is not used at all, the file is created as ovs-ofctl.ctl in the configured
              OVS_RUNDIR directory.

              Specifying none for socket disables the control socket feature.

   Public Key Infrastructure Options
       -p privkey.pem
       --private-key=privkey.pem
              Specifies a PEM file containing the private key used as  ovs-ofctl's  identity  for  outgoing  SSL
              connections.

       -c cert.pem
       --certificate=cert.pem
              Specifies  a  PEM  file containing a certificate that certifies the private key specified on -p or
              --private-key to be trustworthy.  The certificate must be signed by the certificate authority (CA)
              that the peer in SSL connections will use to verify it.

       -C cacert.pem
       --ca-cert=cacert.pem
              Specifies  a  PEM  file  containing  the  CA  certificate  that  ovs-ofctl  should  use  to verify
              certificates presented to it by SSL peers.  (This may be the same certificate that SSL  peers  use
              to  verify  the  certificate  specified  on  -c  or  --certificate,  or it may be a different one,
              depending on the PKI design in use.)

       -C none
       --ca-cert=none
              Disables verification of certificates presented by SSL peers.  This introduces  a  security  risk,
              because it means that certificates cannot be verified to be those of known trusted hosts.

       -v[spec]
       --verbose=[spec]
              Sets  logging  levels.   Without  any spec, sets the log level for every module and destination to
              dbg.  Otherwise, spec is a list of words separated by spaces or commas or colons, up to  one  from
              each category below:

              •      A valid module name, as displayed by the vlog/list command on ovs-appctl(8), limits the log
                     level change to the specified module.

              •      syslog, console, or file, to limit the log level change to only to the system log,  to  the
                     console,  or  to  a  file,  respectively.   (If --detach is specified, ovs-ofctl closes its
                     standard file descriptors, so logging to the console will have no effect.)

                     On Windows platform, syslog is accepted as a  word  and  is  only  useful  along  with  the
                     --syslog-target option (the word has no effect otherwise).

              •      off,  emer,  err,  warn,  info,  or  dbg,  to control the log level.  Messages of the given
                     severity or higher will be logged, and messages of lower severity  will  be  filtered  out.
                     off filters out all messages.  See ovs-appctl(8) for a definition of each log level.

              Case is not significant within spec.

              Regardless of the log levels set for file, logging to a file will not take place unless --log-file
              is also specified (see below).

              For compatibility with older versions of OVS, any is accepted as a word but has no effect.

       -v
       --verbose
              Sets the maximum logging verbosity level, equivalent to --verbose=dbg.

       -vPATTERN:destination:pattern
       --verbose=PATTERN:destination:pattern
              Sets the log pattern for destination to pattern.  Refer to ovs-appctl(8) for a description of  the
              valid syntax for pattern.

       -vFACILITY:facility
       --verbose=FACILITY:facility
              Sets  the  RFC5424  facility  of the log message. facility can be one of kern, user, mail, daemon,
              auth, syslog, lpr, news, uucp, clock, ftp, ntp, audit,  alert,  clock2,  local0,  local1,  local2,
              local3,  local4,  local5, local6 or local7. If this option is not specified, daemon is used as the
              default for the local system syslog and local0 is used while  sending  a  message  to  the  target
              provided via the --syslog-target option.

       --log-file[=file]
              Enables  logging  to  a file.  If file is specified, then it is used as the exact name for the log
              file.  The default log file name used if file is omitted is /var/log/openvswitch/ovs-ofctl.log.

       --syslog-target=host:port
              Send syslog messages to UDP port on host, in addition to the system syslog.  The host  must  be  a
              numerical IP address, not a hostname.

       --syslog-method=method
              Specify  method  how  syslog  messages  should  be  sent  to  syslog  daemon.  Following forms are
              supported:

              •      libc, use libc syslog() function.  This is the default behavior.  Downside  of  using  this
                     options  is  that libc adds fixed prefix to every message before it is actually sent to the
                     syslog daemon over /dev/log UNIX domain socket.

              •      unix:file, use UNIX domain socket directly.  It is possible to  specify  arbitrary  message
                     format  with  this  option.  However, rsyslogd 8.9 and older versions use hard coded parser
                     function anyway that limits UNIX domain socket use.  If you want to use  arbitrary  message
                     format with older rsyslogd versions, then use UDP socket to localhost IP address instead.

              •      udp:ip:port,  use  UDP  socket.   With  this method it is possible to use arbitrary message
                     format also with older rsyslogd.  When  sending  syslog  messages  over  UDP  socket  extra
                     precaution  needs  to  be  taken  into  account,  for  example,  syslog  daemon needs to be
                     configured to listen on  the  specified  UDP  port,  accidental  iptables  rules  could  be
                     interfering with local syslog traffic and there are some security considerations that apply
                     to UDP sockets, but do not apply to UNIX domain sockets.

       -h
       --help Prints a brief help message to the console.

       -V
       --version
              Prints version information to the console.

RUNTIME MANAGEMENT COMMANDS

       ovs-appctl(8) can send commands to a running ovs-ofctl process.  The supported commands are listed below.

       exit   Causes ovs-ofctl to gracefully terminate.  This command applies only when executing the monitor or
              snoop commands.

       ofctl/set-output-file file
              Causes  all  subsequent  output  to  go to file instead of stderr.  This command applies only when
              executing the monitor or snoop commands.

       ofctl/send ofmsg...
              Sends each ofmsg, specified as a sequence of hex digits that express an OpenFlow message,  on  the
              OpenFlow connection.  This command is useful only when executing the monitor command.

       ofctl/barrier
              Sends  an OpenFlow barrier request on the OpenFlow connection and waits for a reply.  This command
              is useful only for the monitor command.

EXAMPLES

       The following examples assume that ovs-vswitchd has a bridge named br0 configured.

       ovs-ofctl dump-tables br0
              Prints out the switch's table stats.  (This is more interesting  after  some  traffic  has  passed
              through.)

       ovs-ofctl dump-flows br0
              Prints the flow entries in the switch.

SEE ALSO

       ovs-appctl(8), ovs-vswitchd(8) ovs-vswitchd.conf.db(8)