Psphinx.addnodesdocument)}( rawsourcechildren]( translations LanguagesNode)}(hhh](h pending_xref)}(hhh]docutils.nodesTextChinese (Simplified)}parenthsba attributes}(ids]classes]names]dupnames]backrefs] refdomainstdreftypedoc reftarget&/translations/zh_CN/networking/bondingmodnameN classnameN refexplicitutagnamehhh ubh)}(hhh]hChinese (Traditional)}hh2sbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget&/translations/zh_TW/networking/bondingmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hItalian}hhFsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget&/translations/it_IT/networking/bondingmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hJapanese}hhZsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget&/translations/ja_JP/networking/bondingmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hKorean}hhnsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget&/translations/ko_KR/networking/bondingmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hSpanish}hhsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget&/translations/sp_SP/networking/bondingmodnameN classnameN refexplicituh1hhh ubeh}(h]h ]h"]h$]h&]current_languageEnglishuh1h hh _documenthsourceNlineNubhcomment)}(h SPDX-License-Identifier: GPL-2.0h]h SPDX-License-Identifier: GPL-2.0}hhsbah}(h]h ]h"]h$]h&] xml:spacepreserveuh1hhhhhh@/var/lib/git/docbuild/linux/Documentation/networking/bonding.rsthKubhsection)}(hhh](htitle)}(h#Linux Ethernet Bonding Driver HOWTOh]h#Linux Ethernet Bonding Driver HOWTO}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhhhKubh paragraph)}(hLatest update: 27 April 2011h]hLatest update: 27 April 2011}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(h2Initial release: Thomas Davis h]h2Initial release: Thomas Davis }(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh)}(h*Corrections, HA extensions: 2000/10/03-15:h]h*Corrections, HA extensions: 2000/10/03-15:}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh block_quote)}(h- Willy Tarreau - Constantine Gavrilov - Chad N. Tindel - Janice Girouard - Jay Vosburgh h]h bullet_list)}(hhh](h list_item)}(h#Willy Tarreau h]h)}(hjh]h#Willy Tarreau }(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hjubah}(h]h ]h"]h$]h&]uh1jhhubj)}(h+Constantine Gavrilov h]h)}(hjh]h+Constantine Gavrilov }(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhhubj)}(h(Chad N. Tindel h]h)}(hj2h]h(Chad N. Tindel }(hj4hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj0ubah}(h]h ]h"]h$]h&]uh1jhhubj)}(h0Janice Girouard h]h)}(hjIh]h0Janice Girouard }(hjKhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjGubah}(h]h ]h"]h$]h&]uh1jhhubj)}(h+Jay Vosburgh h]h)}(h*Jay Vosburgh h]h*Jay Vosburgh }(hjbhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj^ubah}(h]h ]h"]h$]h&]uh1jhhubeh}(h]h ]h"]h$]h&]bullet-uh1hhhhK hhubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh)}(hTReorganized and updated Feb 2005 by Jay Vosburgh Added Sysfs information: 2006/04/24h]hTReorganized and updated Feb 2005 by Jay Vosburgh Added Sysfs information: 2006/04/24}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(h1- Mitch Williams h]h)}(hhh]j)}(h/Mitch Williams h]h)}(h.Mitch Williams h]h.Mitch Williams }(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjubah}(h]h ]h"]h$]h&]j|j}uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hhh](h)}(h Introductionh]h Introduction}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubh)}(hXHThe Linux bonding driver provides a method for aggregating multiple network interfaces into a single logical "bonded" interface. The behavior of the bonded interfaces depends upon the mode; generally speaking, modes provide either hot standby or load balancing services. Additionally, link integrity monitoring may be performed.h]hXLThe Linux bonding driver provides a method for aggregating multiple network interfaces into a single logical “bonded” interface. The behavior of the bonded interfaces depends upon the mode; generally speaking, modes provide either hot standby or load balancing services. Additionally, link integrity monitoring may be performed.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hThe bonding driver originally came from Donald Becker's beowulf patches for kernel 2.0. It has changed quite a bit since, and the original tools from extreme-linux and beowulf sites will not work with this version of the driver.h]hThe bonding driver originally came from Donald Becker’s beowulf patches for kernel 2.0. It has changed quite a bit since, and the original tools from extreme-linux and beowulf sites will not work with this version of the driver.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK!hjhhubh)}(hFor new versions of the driver, updated userspace tools, and who to ask for help, please follow the links at the end of this file.h]hFor new versions of the driver, updated userspace tools, and who to ask for help, please follow the links at the end of this file.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK&hjhhubh)}(hX<Table of Contents 1. Bonding Driver Installation 2. Bonding Driver Options 3. Configuring Bonding Devices 3.1 Configuration with Sysconfig Support 3.1.1 Using DHCP with Sysconfig 3.1.2 Configuring Multiple Bonds with Sysconfig 3.2 Configuration with Initscripts Support 3.2.1 Using DHCP with Initscripts 3.2.2 Configuring Multiple Bonds with Initscripts 3.3 Configuring Bonding Manually with Ifenslave 3.3.1 Configuring Multiple Bonds Manually 3.4 Configuring Bonding Manually via Sysfs 3.5 Configuration with Interfaces Support 3.6 Overriding Configuration for Special Cases 3.7 Configuring LACP for 802.3ad mode in a more secure way 4. Querying Bonding Configuration 4.1 Bonding Configuration 4.2 Network Configuration 5. Switch Configuration 6. 802.1q VLAN Support 7. Link Monitoring 7.1 ARP Monitor Operation 7.2 Configuring Multiple ARP Targets 7.3 MII Monitor Operation 8. Potential Trouble Sources 8.1 Adventures in Routing 8.2 Ethernet Device Renaming 8.3 Painfully Slow Or No Failed Link Detection By Miimon 9. SNMP agents 10. Promiscuous mode 11. Configuring Bonding for High Availability 11.1 High Availability in a Single Switch Topology 11.2 High Availability in a Multiple Switch Topology 11.2.1 HA Bonding Mode Selection for Multiple Switch Topology 11.2.2 HA Link Monitoring for Multiple Switch Topology 12. Configuring Bonding for Maximum Throughput 12.1 Maximum Throughput in a Single Switch Topology 12.1.1 MT Bonding Mode Selection for Single Switch Topology 12.1.2 MT Link Monitoring for Single Switch Topology 12.2 Maximum Throughput in a Multiple Switch Topology 12.2.1 MT Bonding Mode Selection for Multiple Switch Topology 12.2.2 MT Link Monitoring for Multiple Switch Topology 13. Switch Behavior Issues 13.1 Link Establishment and Failover Delays 13.2 Duplicated Incoming Packets 14. Hardware Specific Considerations 14.1 IBM BladeCenter 15. Frequently Asked Questions 16. Resources and Linksh]hX<Table of Contents 1. Bonding Driver Installation 2. Bonding Driver Options 3. Configuring Bonding Devices 3.1 Configuration with Sysconfig Support 3.1.1 Using DHCP with Sysconfig 3.1.2 Configuring Multiple Bonds with Sysconfig 3.2 Configuration with Initscripts Support 3.2.1 Using DHCP with Initscripts 3.2.2 Configuring Multiple Bonds with Initscripts 3.3 Configuring Bonding Manually with Ifenslave 3.3.1 Configuring Multiple Bonds Manually 3.4 Configuring Bonding Manually via Sysfs 3.5 Configuration with Interfaces Support 3.6 Overriding Configuration for Special Cases 3.7 Configuring LACP for 802.3ad mode in a more secure way 4. Querying Bonding Configuration 4.1 Bonding Configuration 4.2 Network Configuration 5. Switch Configuration 6. 802.1q VLAN Support 7. Link Monitoring 7.1 ARP Monitor Operation 7.2 Configuring Multiple ARP Targets 7.3 MII Monitor Operation 8. Potential Trouble Sources 8.1 Adventures in Routing 8.2 Ethernet Device Renaming 8.3 Painfully Slow Or No Failed Link Detection By Miimon 9. SNMP agents 10. Promiscuous mode 11. Configuring Bonding for High Availability 11.1 High Availability in a Single Switch Topology 11.2 High Availability in a Multiple Switch Topology 11.2.1 HA Bonding Mode Selection for Multiple Switch Topology 11.2.2 HA Link Monitoring for Multiple Switch Topology 12. Configuring Bonding for Maximum Throughput 12.1 Maximum Throughput in a Single Switch Topology 12.1.1 MT Bonding Mode Selection for Single Switch Topology 12.1.2 MT Link Monitoring for Single Switch Topology 12.2 Maximum Throughput in a Multiple Switch Topology 12.2.1 MT Bonding Mode Selection for Multiple Switch Topology 12.2.2 MT Link Monitoring for Multiple Switch Topology 13. Switch Behavior Issues 13.1 Link Establishment and Failover Delays 13.2 Duplicated Incoming Packets 14. Hardware Specific Considerations 14.1 IBM BladeCenter 15. Frequently Asked Questions 16. Resources and Links}hjsbah}(h]h ]h"]h$]h&]hhuh1hhjhhhhhKlubeh}(h] introductionah ]h"] introductionah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(h1. Bonding Driver Installationh]h1. Bonding Driver Installation}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKnubh)}(hXMost popular distro kernels ship with the bonding driver already available as a module. If your distro does not, or you have need to compile bonding from source (e.g., configuring and installing a mainline kernel from kernel.org), you'll need to perform the following steps:h]hXMost popular distro kernels ship with the bonding driver already available as a module. If your distro does not, or you have need to compile bonding from source (e.g., configuring and installing a mainline kernel from kernel.org), you’ll need to perform the following steps:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKphjhhubh)}(hhh](h)}(h/1.1 Configure and build the kernel with bondingh]h/1.1 Configure and build the kernel with bonding}(hj0hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj-hhhhhKwubh)}(hXThe current version of the bonding driver is available in the drivers/net/bonding subdirectory of the most recent kernel source (which is available on http://kernel.org). Most users "rolling their own" will want to use the most recent kernel from kernel.org.h](hThe current version of the bonding driver is available in the drivers/net/bonding subdirectory of the most recent kernel source (which is available on }(hj>hhhNhNubh reference)}(hhttp://kernel.orgh]hhttp://kernel.org}(hjHhhhNhNubah}(h]h ]h"]h$]h&]refurijJuh1jFhj>ubh_). Most users “rolling their own” will want to use the most recent kernel from kernel.org.}(hj>hhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhKyhj-hhubh)}(hXEConfigure kernel with "make menuconfig" (or "make xconfig" or "make config"), then select "Bonding driver support" in the "Network device support" section. It is recommended that you configure the driver as module since it is currently the only way to pass parameters to the driver or configure more than one bonding device.h]hXYConfigure kernel with “make menuconfig” (or “make xconfig” or “make config”), then select “Bonding driver support” in the “Network device support” section. It is recommended that you configure the driver as module since it is currently the only way to pass parameters to the driver or configure more than one bonding device.}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK~hj-hhubh)}(h-Build and install the new kernel and modules.h]h-Build and install the new kernel and modules.}(hjohhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj-hhubeh}(h]+configure-and-build-the-kernel-with-bondingah ]h"]/1.1 configure and build the kernel with bondingah$]h&]uh1hhjhhhhhKwubh)}(hhh](h)}(h1.2 Bonding Control Utilityh]h1.2 Bonding Control Utility}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubh)}(hvIt is recommended to configure bonding via iproute2 (netlink) or sysfs, the old ifenslave control utility is obsolete.h]hvIt is recommended to configure bonding via iproute2 (netlink) or sysfs, the old ifenslave control utility is obsolete.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubeh}(h]bonding-control-utilityah ]h"]1.2 bonding control utilityah$]h&]uh1hhjhhhhhKubeh}(h]bonding-driver-installationah ]h"]1. bonding driver installationah$]h&]uh1hhhhhhhhKnubh)}(hhh](h)}(h2. Bonding Driver Optionsh]h2. Bonding Driver Options}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKubh)}(hyOptions for the bonding driver are supplied as parameters to the bonding module at load time, or are specified via sysfs.h]hyOptions for the bonding driver are supplied as parameters to the bonding module at load time, or are specified via sysfs.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hX Module options may be given as command line arguments to the insmod or modprobe command, but are usually specified in either the ``/etc/modprobe.d/*.conf`` configuration files, or in a distro-specific configuration file (some of which are detailed in the next section).h](hModule options may be given as command line arguments to the insmod or modprobe command, but are usually specified in either the }(hjhhhNhNubhliteral)}(h``/etc/modprobe.d/*.conf``h]h/etc/modprobe.d/*.conf}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jhjubhr configuration files, or in a distro-specific configuration file (some of which are detailed in the next section).}(hjhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hpDetails on bonding support for sysfs is provided in the "Configuring Bonding Manually via Sysfs" section, below.h]htDetails on bonding support for sysfs is provided in the “Configuring Bonding Manually via Sysfs” section, below.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXThe available bonding driver parameters are listed below. If a parameter is not specified the default value is used. When initially configuring a bond, it is recommended "tail -f /var/log/messages" be run in a separate window to watch for bonding driver error messages.h]hXThe available bonding driver parameters are listed below. If a parameter is not specified the default value is used. When initially configuring a bond, it is recommended “tail -f /var/log/messages” be run in a separate window to watch for bonding driver error messages.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXIt is critical that either the miimon or arp_interval and arp_ip_target parameters be specified, otherwise serious network degradation will occur during link failures. Very few devices do not support at least miimon, so there is really no reason not to use it.h]hXIt is critical that either the miimon or arp_interval and arp_ip_target parameters be specified, otherwise serious network degradation will occur during link failures. Very few devices do not support at least miimon, so there is really no reason not to use it.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hOptions with textual values will accept either the text name or, for backwards compatibility, the option value. E.g., "mode=802.3ad" and "mode=4" set the same mode.h]hOptions with textual values will accept either the text name or, for backwards compatibility, the option value. E.g., “mode=802.3ad” and “mode=4” set the same mode.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hThe parameters are as follows:h]hThe parameters are as follows:}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(h active_slaveh]h active_slave}(hj;hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXSpecifies the new active slave for modes that support it (active-backup, balance-alb and balance-tlb). Possible values are the name of any currently enslaved interface, or an empty string. If a name is given, the slave and its link must be up in order to be selected as the new active slave. If an empty string is specified, the current active slave is cleared, and a new active slave is selected automatically. Note that this is only available through the sysfs interface. No module parameter by this name exists. The normal value of this option is the name of the currently active slave, or the empty string if there is no active slave or the current mode does not use an active slave. h](h)}(hXSpecifies the new active slave for modes that support it (active-backup, balance-alb and balance-tlb). Possible values are the name of any currently enslaved interface, or an empty string. If a name is given, the slave and its link must be up in order to be selected as the new active slave. If an empty string is specified, the current active slave is cleared, and a new active slave is selected automatically.h]hXSpecifies the new active slave for modes that support it (active-backup, balance-alb and balance-tlb). Possible values are the name of any currently enslaved interface, or an empty string. If a name is given, the slave and its link must be up in order to be selected as the new active slave. If an empty string is specified, the current active slave is cleared, and a new active slave is selected automatically.}(hjMhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjIubh)}(hfNote that this is only available through the sysfs interface. No module parameter by this name exists.h]hfNote that this is only available through the sysfs interface. No module parameter by this name exists.}(hj[hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjIubh)}(hThe normal value of this option is the name of the currently active slave, or the empty string if there is no active slave or the current mode does not use an active slave.h]hThe normal value of this option is the name of the currently active slave, or the empty string if there is no active slave or the current mode does not use an active slave.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjIubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(had_actor_sys_prioh]had_actor_sys_prio}(hj}hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hIn an AD system, this specifies the system priority. The allowed range is 1 - 65535. If the value is not specified, it takes 65535 as the default value. This parameter has effect only in 802.3ad mode and is available through SysFs interface. h](h)}(hIn an AD system, this specifies the system priority. The allowed range is 1 - 65535. If the value is not specified, it takes 65535 as the default value.h]hIn an AD system, this specifies the system priority. The allowed range is 1 - 65535. If the value is not specified, it takes 65535 as the default value.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hXThis parameter has effect only in 802.3ad mode and is available through SysFs interface.h]hXThis parameter has effect only in 802.3ad mode and is available through SysFs interface.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(had_actor_systemh]had_actor_system}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXIn an AD system, this specifies the mac-address for the actor in protocol packet exchanges (LACPDUs). The value cannot be a multicast address. If the all-zeroes MAC is specified, bonding will internally use the MAC of the bond itself. It is preferred to have the local-admin bit set for this mac but driver does not enforce it. If the value is not given then system defaults to using the masters' mac address as actors' system address. This parameter has effect only in 802.3ad mode and is available through SysFs interface. h](h)}(hXIn an AD system, this specifies the mac-address for the actor in protocol packet exchanges (LACPDUs). The value cannot be a multicast address. If the all-zeroes MAC is specified, bonding will internally use the MAC of the bond itself. It is preferred to have the local-admin bit set for this mac but driver does not enforce it. If the value is not given then system defaults to using the masters' mac address as actors' system address.h]hXIn an AD system, this specifies the mac-address for the actor in protocol packet exchanges (LACPDUs). The value cannot be a multicast address. If the all-zeroes MAC is specified, bonding will internally use the MAC of the bond itself. It is preferred to have the local-admin bit set for this mac but driver does not enforce it. If the value is not given then system defaults to using the masters’ mac address as actors’ system address.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hXThis parameter has effect only in 802.3ad mode and is available through SysFs interface.h]hXThis parameter has effect only in 802.3ad mode and is available through SysFs interface.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(h ad_selecth]h ad_select}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXSpecifies the 802.3ad aggregation selection logic to use. The possible values and their effects are: stable or 0 The active aggregator is chosen by largest aggregate bandwidth. Reselection of the active aggregator occurs only when all slaves of the active aggregator are down or the active aggregator has no slaves. This is the default value. bandwidth or 1 The active aggregator is chosen by largest aggregate bandwidth. Reselection occurs if: - A slave is added to or removed from the bond - Any slave's link state changes - Any slave's 802.3ad association state changes - The bond's administrative state changes to up count or 2 The active aggregator is chosen by the largest number of ports (slaves). Reselection occurs as described under the "bandwidth" setting, above. The bandwidth and count selection policies permit failover of 802.3ad aggregations when partial failure of the active aggregator occurs. This keeps the aggregator with the highest availability (either in bandwidth or in number of ports) active at all times. This option was added in bonding version 3.4.0. h](h)}(heSpecifies the 802.3ad aggregation selection logic to use. The possible values and their effects are:h]heSpecifies the 802.3ad aggregation selection logic to use. The possible values and their effects are:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(h stable or 0h]h stable or 0}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hThe active aggregator is chosen by largest aggregate bandwidth. Reselection of the active aggregator occurs only when all slaves of the active aggregator are down or the active aggregator has no slaves. This is the default value. h](h)}(h?The active aggregator is chosen by largest aggregate bandwidth.h]h?The active aggregator is chosen by largest aggregate bandwidth.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hReselection of the active aggregator occurs only when all slaves of the active aggregator are down or the active aggregator has no slaves.h]hReselection of the active aggregator occurs only when all slaves of the active aggregator are down or the active aggregator has no slaves.}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hThis is the default value.h]hThis is the default value.}(hj3hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hbandwidth or 1h]hbandwidth or 1}(hjGhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hX The active aggregator is chosen by largest aggregate bandwidth. Reselection occurs if: - A slave is added to or removed from the bond - Any slave's link state changes - Any slave's 802.3ad association state changes - The bond's administrative state changes to up h](h)}(hWThe active aggregator is chosen by largest aggregate bandwidth. Reselection occurs if:h]hWThe active aggregator is chosen by largest aggregate bandwidth. Reselection occurs if:}(hjYhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjUubh)}(hhh](j)}(h-A slave is added to or removed from the bond h]h)}(h,A slave is added to or removed from the bondh]h,A slave is added to or removed from the bond}(hjnhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjjubah}(h]h ]h"]h$]h&]uh1jhjgubj)}(hAny slave's link state changes h]h)}(hAny slave's link state changesh]h Any slave’s link state changes}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjgubj)}(h.Any slave's 802.3ad association state changes h]h)}(h-Any slave's 802.3ad association state changesh]h/Any slave’s 802.3ad association state changes}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjgubj)}(h.The bond's administrative state changes to up h]h)}(h-The bond's administrative state changes to uph]h/The bond’s administrative state changes to up}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjgubeh}(h]h ]h"]h$]h&]j|j}uh1hhhhKhjUubeh}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(h count or 2h]h count or 2}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hThe active aggregator is chosen by the largest number of ports (slaves). Reselection occurs as described under the "bandwidth" setting, above. h]h)}(hThe active aggregator is chosen by the largest number of ports (slaves). Reselection occurs as described under the "bandwidth" setting, above.h]hThe active aggregator is chosen by the largest number of ports (slaves). Reselection occurs as described under the “bandwidth” setting, above.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(hXThe bandwidth and count selection policies permit failover of 802.3ad aggregations when partial failure of the active aggregator occurs. This keeps the aggregator with the highest availability (either in bandwidth or in number of ports) active at all times.h]hXThe bandwidth and count selection policies permit failover of 802.3ad aggregations when partial failure of the active aggregator occurs. This keeps the aggregator with the highest availability (either in bandwidth or in number of ports) active at all times.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubh)}(h/This option was added in bonding version 3.4.0.h]h/This option was added in bonding version 3.4.0.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(had_user_port_keyh]had_user_port_key}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hXIn an AD system, the port-key has three parts as shown below - ===== ============ Bits Use ===== ============ 00 Duplex 01-05 Speed 06-15 User-defined ===== ============ This defines the upper 10 bits of the port key. The values can be from 0 - 1023. If not given, the system defaults to 0. This parameter has effect only in 802.3ad mode and is available through SysFs interface. h](h)}(h>In an AD system, the port-key has three parts as shown below -h]h>In an AD system, the port-key has three parts as shown below -}(hj0hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj,ubh)}(hv===== ============ Bits Use ===== ============ 00 Duplex 01-05 Speed 06-15 User-defined ===== ============ h]htable)}(hhh]htgroup)}(hhh](hcolspec)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jLhjIubjM)}(hhh]h}(h]h ]h"]h$]h&]colwidthK uh1jLhjIubhthead)}(hhh]hrow)}(hhh](hentry)}(hhh]h)}(hBitsh]hBits}(hjqhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnubah}(h]h ]h"]h$]h&]uh1jlhjiubjm)}(hhh]h)}(hUseh]hUse}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjiubeh}(h]h ]h"]h$]h&]uh1jghjdubah}(h]h ]h"]h$]h&]uh1jbhjIubhtbody)}(hhh](jh)}(hhh](jm)}(hhh]h)}(h00h]h00}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubjm)}(hhh]h)}(hDuplexh]hDuplex}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubeh}(h]h ]h"]h$]h&]uh1jghjubjh)}(hhh](jm)}(hhh]h)}(h01-05h]h01-05}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubjm)}(hhh]h)}(hSpeedh]hSpeed}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubeh}(h]h ]h"]h$]h&]uh1jghjubjh)}(hhh](jm)}(hhh]h)}(h06-15h]h06-15}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubjm)}(hhh]h)}(h User-definedh]h User-defined}(hj8hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj5ubah}(h]h ]h"]h$]h&]uh1jlhjubeh}(h]h ]h"]h$]h&]uh1jghjubeh}(h]h ]h"]h$]h&]uh1jhjIubeh}(h]h ]h"]h$]h&]colsKuh1jGhjDubah}(h]h ]h"]h$]h&]uh1jBhj>ubah}(h]h ]h"]h$]h&]uh1hhhhKhj,ubh)}(hxThis defines the upper 10 bits of the port key. The values can be from 0 - 1023. If not given, the system defaults to 0.h]hxThis defines the upper 10 bits of the port key. The values can be from 0 - 1023. If not given, the system defaults to 0.}(hjkhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj,ubh)}(hXThis parameter has effect only in 802.3ad mode and is available through SysFs interface.h]hXThis parameter has effect only in 802.3ad mode and is available through SysFs interface.}(hjyhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,ubeh}(h]h ]h"]h$]h&]uh1hhhhKhjhhubh)}(hall_slaves_activeh]hall_slaves_active}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjhhubh)}(hXoSpecifies that duplicate frames (received on inactive ports) should be dropped (0) or delivered (1). Normally, bonding will drop duplicate frames (received on inactive ports), which is desirable for most users. But there are some times it is nice to allow duplicate frames to be delivered. The default value is 0 (drop duplicate frames received on inactive ports). h](h)}(hdSpecifies that duplicate frames (received on inactive ports) should be dropped (0) or delivered (1).h]hdSpecifies that duplicate frames (received on inactive ports) should be dropped (0) or delivered (1).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hNormally, bonding will drop duplicate frames (received on inactive ports), which is desirable for most users. But there are some times it is nice to allow duplicate frames to be delivered.h]hNormally, bonding will drop duplicate frames (received on inactive ports), which is desirable for most users. But there are some times it is nice to allow duplicate frames to be delivered.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hJThe default value is 0 (drop duplicate frames received on inactive ports).h]hJThe default value is 0 (drop duplicate frames received on inactive ports).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h arp_intervalh]h arp_interval}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXSpecifies the ARP link monitoring frequency in milliseconds. The ARP monitor works by periodically checking the slave devices to determine whether they have sent or received traffic recently (the precise criteria depends upon the bonding mode, and the state of the slave). Regular traffic is generated via ARP probes issued for the addresses specified by the arp_ip_target option. This behavior can be modified by the arp_validate option, below. If ARP monitoring is used in an etherchannel compatible mode (modes 0 and 2), the switch should be configured in a mode that evenly distributes packets across all links. If the switch is configured to distribute the packets in an XOR fashion, all replies from the ARP targets will be received on the same link which could cause the other team members to fail. ARP monitoring should not be used in conjunction with miimon. A value of 0 disables ARP monitoring. The default value is 0. h](h)}(h 0. These are the targets of the ARP request sent to determine the health of the link to the targets. Specify these values in ddd.ddd.ddd.ddd format. Multiple IP addresses must be separated by a comma. At least one IP address must be given for ARP monitoring to function. The maximum number of targets that can be specified is 16. The default value is no IP addresses. h]h)}(hXSpecifies the IP addresses to use as ARP monitoring peers when arp_interval is > 0. These are the targets of the ARP request sent to determine the health of the link to the targets. Specify these values in ddd.ddd.ddd.ddd format. Multiple IP addresses must be separated by a comma. At least one IP address must be given for ARP monitoring to function. The maximum number of targets that can be specified is 16. The default value is no IP addresses.h]hXSpecifies the IP addresses to use as ARP monitoring peers when arp_interval is > 0. These are the targets of the ARP request sent to determine the health of the link to the targets. Specify these values in ddd.ddd.ddd.ddd format. Multiple IP addresses must be separated by a comma. At least one IP address must be given for ARP monitoring to function. The maximum number of targets that can be specified is 16. The default value is no IP addresses.}(hj1hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM3hj-ubah}(h]h ]h"]h$]h&]uh1hhhhM3hjhhubh)}(h ns_ip6_targeth]h ns_ip6_target}(hjEhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM<hjhhubh)}(hXSpecifies the IPv6 addresses to use as IPv6 monitoring peers when arp_interval is > 0. These are the targets of the NS request sent to determine the health of the link to the targets. Specify these values in ffff:ffff::ffff:ffff format. Multiple IPv6 addresses must be separated by a comma. At least one IPv6 address must be given for NS/NA monitoring to function. The maximum number of targets that can be specified is 16. The default value is no IPv6 addresses. h]h)}(hXSpecifies the IPv6 addresses to use as IPv6 monitoring peers when arp_interval is > 0. These are the targets of the NS request sent to determine the health of the link to the targets. Specify these values in ffff:ffff::ffff:ffff format. Multiple IPv6 addresses must be separated by a comma. At least one IPv6 address must be given for NS/NA monitoring to function. The maximum number of targets that can be specified is 16. The default value is no IPv6 addresses.h]hXSpecifies the IPv6 addresses to use as IPv6 monitoring peers when arp_interval is > 0. These are the targets of the NS request sent to determine the health of the link to the targets. Specify these values in ffff:ffff::ffff:ffff format. Multiple IPv6 addresses must be separated by a comma. At least one IPv6 address must be given for NS/NA monitoring to function. The maximum number of targets that can be specified is 16. The default value is no IPv6 addresses.}(hjWhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hjSubah}(h]h ]h"]h$]h&]uh1hhhhM>hjhhubh)}(h arp_validateh]h arp_validate}(hjkhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMGhjhhubh)}(hX Specifies whether or not ARP probes and replies should be validated in any mode that supports arp monitoring, or whether non-ARP traffic should be filtered (disregarded) for link monitoring purposes. Possible values are: none or 0 No validation or filtering is performed. active or 1 Validation is performed only for the active slave. backup or 2 Validation is performed only for backup slaves. all or 3 Validation is performed for all slaves. filter or 4 Filtering is applied to all slaves. No validation is performed. filter_active or 5 Filtering is applied to all slaves, validation is performed only for the active slave. filter_backup or 6 Filtering is applied to all slaves, validation is performed only for backup slaves. Validation: Enabling validation causes the ARP monitor to examine the incoming ARP requests and replies, and only consider a slave to be up if it is receiving the appropriate ARP traffic. For an active slave, the validation checks ARP replies to confirm that they were generated by an arp_ip_target. Since backup slaves do not typically receive these replies, the validation performed for backup slaves is on the broadcast ARP request sent out via the active slave. It is possible that some switch or network configurations may result in situations wherein the backup slaves do not receive the ARP requests; in such a situation, validation of backup slaves must be disabled. The validation of ARP requests on backup slaves is mainly helping bonding to decide which slaves are more likely to work in case of the active slave failure, it doesn't really guarantee that the backup slave will work if it's selected as the next active slave. Validation is useful in network configurations in which multiple bonding hosts are concurrently issuing ARPs to one or more targets beyond a common switch. Should the link between the switch and target fail (but not the switch itself), the probe traffic generated by the multiple bonding instances will fool the standard ARP monitor into considering the links as still up. Use of validation can resolve this, as the ARP monitor will only consider ARP requests and replies associated with its own instance of bonding. Filtering: Enabling filtering causes the ARP monitor to only use incoming ARP packets for link availability purposes. Arriving packets that are not ARPs are delivered normally, but do not count when determining if a slave is available. Filtering operates by only considering the reception of ARP packets (any ARP packet, regardless of source or destination) when determining if a slave has received traffic for link availability purposes. Filtering is useful in network configurations in which significant levels of third party broadcast traffic would fool the standard ARP monitor into considering the links as still up. Use of filtering can resolve this, as only ARP traffic is considered for link availability purposes. This option was added in bonding version 3.1.0. h](h)}(hSpecifies whether or not ARP probes and replies should be validated in any mode that supports arp monitoring, or whether non-ARP traffic should be filtered (disregarded) for link monitoring purposes.h]hSpecifies whether or not ARP probes and replies should be validated in any mode that supports arp monitoring, or whether non-ARP traffic should be filtered (disregarded) for link monitoring purposes.}(hj}hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMIhjyubh)}(hPossible values are:h]hPossible values are:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMNhjyubh)}(h none or 0h]h none or 0}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMPhjyubh)}(h)No validation or filtering is performed. h]h)}(h(No validation or filtering is performed.h]h(No validation or filtering is performed.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMRhjubah}(h]h ]h"]h$]h&]uh1hhhhMRhjyubh)}(h active or 1h]h active or 1}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMThjyubh)}(h3Validation is performed only for the active slave. h]h)}(h2Validation is performed only for the active slave.h]h2Validation is performed only for the active slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMVhjubah}(h]h ]h"]h$]h&]uh1hhhhMVhjyubh)}(h backup or 2h]h backup or 2}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMXhjyubh)}(h0Validation is performed only for backup slaves. h]h)}(h/Validation is performed only for backup slaves.h]h/Validation is performed only for backup slaves.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMZhjubah}(h]h ]h"]h$]h&]uh1hhhhMZhjyubh)}(hall or 3h]hall or 3}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM\hjyubh)}(h(Validation is performed for all slaves. h]h)}(h'Validation is performed for all slaves.h]h'Validation is performed for all slaves.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM^hjubah}(h]h ]h"]h$]h&]uh1hhhhM^hjyubh)}(h filter or 4h]h filter or 4}(hj1hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM`hjyubh)}(h@Filtering is applied to all slaves. No validation is performed. h]h)}(h?Filtering is applied to all slaves. No validation is performed.h]h?Filtering is applied to all slaves. No validation is performed.}(hjChhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMbhj?ubah}(h]h ]h"]h$]h&]uh1hhhhMbhjyubh)}(hfilter_active or 5h]hfilter_active or 5}(hjWhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMehjyubh)}(hWFiltering is applied to all slaves, validation is performed only for the active slave. h]h)}(hVFiltering is applied to all slaves, validation is performed only for the active slave.h]hVFiltering is applied to all slaves, validation is performed only for the active slave.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMghjeubah}(h]h ]h"]h$]h&]uh1hhhhMghjyubh)}(hfilter_backup or 6h]hfilter_backup or 6}(hj}hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMjhjyubh)}(hTFiltering is applied to all slaves, validation is performed only for backup slaves. h]h)}(hSFiltering is applied to all slaves, validation is performed only for backup slaves.h]hSFiltering is applied to all slaves, validation is performed only for backup slaves.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMlhjubah}(h]h ]h"]h$]h&]uh1hhhhMlhjyubh)}(h Validation:h]h Validation:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMohjyubh)}(hEnabling validation causes the ARP monitor to examine the incoming ARP requests and replies, and only consider a slave to be up if it is receiving the appropriate ARP traffic.h]hEnabling validation causes the ARP monitor to examine the incoming ARP requests and replies, and only consider a slave to be up if it is receiving the appropriate ARP traffic.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMqhjyubh)}(hXFor an active slave, the validation checks ARP replies to confirm that they were generated by an arp_ip_target. Since backup slaves do not typically receive these replies, the validation performed for backup slaves is on the broadcast ARP request sent out via the active slave. It is possible that some switch or network configurations may result in situations wherein the backup slaves do not receive the ARP requests; in such a situation, validation of backup slaves must be disabled.h]hXFor an active slave, the validation checks ARP replies to confirm that they were generated by an arp_ip_target. Since backup slaves do not typically receive these replies, the validation performed for backup slaves is on the broadcast ARP request sent out via the active slave. It is possible that some switch or network configurations may result in situations wherein the backup slaves do not receive the ARP requests; in such a situation, validation of backup slaves must be disabled.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMuhjyubh)}(hXThe validation of ARP requests on backup slaves is mainly helping bonding to decide which slaves are more likely to work in case of the active slave failure, it doesn't really guarantee that the backup slave will work if it's selected as the next active slave.h]hXThe validation of ARP requests on backup slaves is mainly helping bonding to decide which slaves are more likely to work in case of the active slave failure, it doesn’t really guarantee that the backup slave will work if it’s selected as the next active slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM~hjyubh)}(hXValidation is useful in network configurations in which multiple bonding hosts are concurrently issuing ARPs to one or more targets beyond a common switch. Should the link between the switch and target fail (but not the switch itself), the probe traffic generated by the multiple bonding instances will fool the standard ARP monitor into considering the links as still up. Use of validation can resolve this, as the ARP monitor will only consider ARP requests and replies associated with its own instance of bonding.h]hXValidation is useful in network configurations in which multiple bonding hosts are concurrently issuing ARPs to one or more targets beyond a common switch. Should the link between the switch and target fail (but not the switch itself), the probe traffic generated by the multiple bonding instances will fool the standard ARP monitor into considering the links as still up. Use of validation can resolve this, as the ARP monitor will only consider ARP requests and replies associated with its own instance of bonding.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyubh)}(h Filtering:h]h Filtering:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyubh)}(hEnabling filtering causes the ARP monitor to only use incoming ARP packets for link availability purposes. Arriving packets that are not ARPs are delivered normally, but do not count when determining if a slave is available.h]hEnabling filtering causes the ARP monitor to only use incoming ARP packets for link availability purposes. Arriving packets that are not ARPs are delivered normally, but do not count when determining if a slave is available.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyubh)}(hFiltering operates by only considering the reception of ARP packets (any ARP packet, regardless of source or destination) when determining if a slave has received traffic for link availability purposes.h]hFiltering operates by only considering the reception of ARP packets (any ARP packet, regardless of source or destination) when determining if a slave has received traffic for link availability purposes.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyubh)}(hXFiltering is useful in network configurations in which significant levels of third party broadcast traffic would fool the standard ARP monitor into considering the links as still up. Use of filtering can resolve this, as only ARP traffic is considered for link availability purposes.h]hXFiltering is useful in network configurations in which significant levels of third party broadcast traffic would fool the standard ARP monitor into considering the links as still up. Use of filtering can resolve this, as only ARP traffic is considered for link availability purposes.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyubh)}(h/This option was added in bonding version 3.1.0.h]h/This option was added in bonding version 3.1.0.}(hj! hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyubeh}(h]h ]h"]h$]h&]uh1hhhhMIhjhhubh)}(harp_all_targetsh]harp_all_targets}(hj5 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXSpecifies the quantity of arp_ip_targets that must be reachable in order for the ARP monitor to consider a slave as being up. This option affects only active-backup mode for slaves with arp_validation enabled. Possible values are: any or 0 consider the slave up only when any of the arp_ip_targets is reachable all or 1 consider the slave up only when all of the arp_ip_targets are reachable h](h)}(hSpecifies the quantity of arp_ip_targets that must be reachable in order for the ARP monitor to consider a slave as being up. This option affects only active-backup mode for slaves with arp_validation enabled.h]hSpecifies the quantity of arp_ip_targets that must be reachable in order for the ARP monitor to consider a slave as being up. This option affects only active-backup mode for slaves with arp_validation enabled.}(hjG hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjC ubh)}(hPossible values are:h]hPossible values are:}(hjU hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjC ubh)}(hany or 0h]hany or 0}(hjc hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjC ubh)}(hGconsider the slave up only when any of the arp_ip_targets is reachable h]h)}(hFconsider the slave up only when any of the arp_ip_targets is reachableh]hFconsider the slave up only when any of the arp_ip_targets is reachable}(hju hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjq ubah}(h]h ]h"]h$]h&]uh1hhhhMhjC ubh)}(hall or 1h]hall or 1}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjC ubh)}(hHconsider the slave up only when all of the arp_ip_targets are reachable h]h)}(hGconsider the slave up only when all of the arp_ip_targets are reachableh]hGconsider the slave up only when all of the arp_ip_targets are reachable}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1hhhhMhjC ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(harp_missed_maxh]harp_missed_max}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXrSpecifies the number of arp_interval monitor checks that must fail in order for an interface to be marked down by the ARP monitor. In order to provide orderly failover semantics, backup interfaces are permitted an extra monitor check (i.e., they must fail arp_missed_max + 1 times before being marked down). The default value is 2, and the allowable range is 1 - 255. h](h)}(hSpecifies the number of arp_interval monitor checks that must fail in order for an interface to be marked down by the ARP monitor.h]hSpecifies the number of arp_interval monitor checks that must fail in order for an interface to be marked down by the ARP monitor.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hIn order to provide orderly failover semantics, backup interfaces are permitted an extra monitor check (i.e., they must fail arp_missed_max + 1 times before being marked down).h]hIn order to provide orderly failover semantics, backup interfaces are permitted an extra monitor check (i.e., they must fail arp_missed_max + 1 times before being marked down).}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(h;The default value is 2, and the allowable range is 1 - 255.h]h;The default value is 2, and the allowable range is 1 - 255.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hcoupled_controlh]hcoupled_control}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXSpecifies whether the LACP state machine's MUX in the 802.3ad mode should have separate Collecting and Distributing states. This is by implementing the independent control state machine per IEEE 802.1AX-2008 5.4.15 in addition to the existing coupled control state machine. The default value is 1. This setting does not separate the Collecting and Distributing states, maintaining the bond in coupled control. h](h)}(h{Specifies whether the LACP state machine's MUX in the 802.3ad mode should have separate Collecting and Distributing states.h]h}Specifies whether the LACP state machine’s MUX in the 802.3ad mode should have separate Collecting and Distributing states.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hThis is by implementing the independent control state machine per IEEE 802.1AX-2008 5.4.15 in addition to the existing coupled control state machine.h]hThis is by implementing the independent control state machine per IEEE 802.1AX-2008 5.4.15 in addition to the existing coupled control state machine.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hThe default value is 1. This setting does not separate the Collecting and Distributing states, maintaining the bond in coupled control.h]hThe default value is 1. This setting does not separate the Collecting and Distributing states, maintaining the bond in coupled control.}(hj% hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h downdelayh]h downdelay}(hj9 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hX7Specifies the time, in milliseconds, to wait before disabling a slave after a link failure has been detected. This option is only valid for the miimon link monitor. The downdelay value should be a multiple of the miimon value; if not, it will be rounded down to the nearest multiple. The default value is 0. h]h)}(hX6Specifies the time, in milliseconds, to wait before disabling a slave after a link failure has been detected. This option is only valid for the miimon link monitor. The downdelay value should be a multiple of the miimon value; if not, it will be rounded down to the nearest multiple. The default value is 0.h]hX6Specifies the time, in milliseconds, to wait before disabling a slave after a link failure has been detected. This option is only valid for the miimon link monitor. The downdelay value should be a multiple of the miimon value; if not, it will be rounded down to the nearest multiple. The default value is 0.}(hjK hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjG ubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h fail_over_mach]h fail_over_mac}(hj_ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hX Specifies whether active-backup mode should set all slaves to the same MAC address at enslavement (the traditional behavior), or, when enabled, perform special handling of the bond's MAC address in accordance with the selected policy. Possible values are: none or 0 This setting disables fail_over_mac, and causes bonding to set all slaves of an active-backup bond to the same MAC address at enslavement time. This is the default. active or 1 The "active" fail_over_mac policy indicates that the MAC address of the bond should always be the MAC address of the currently active slave. The MAC address of the slaves is not changed; instead, the MAC address of the bond changes during a failover. This policy is useful for devices that cannot ever alter their MAC address, or for devices that refuse incoming broadcasts with their own source MAC (which interferes with the ARP monitor). The down side of this policy is that every device on the network must be updated via gratuitous ARP, vs. just updating a switch or set of switches (which often takes place for any traffic, not just ARP traffic, if the switch snoops incoming traffic to update its tables) for the traditional method. If the gratuitous ARP is lost, communication may be disrupted. When this policy is used in conjunction with the mii monitor, devices which assert link up prior to being able to actually transmit and receive are particularly susceptible to loss of the gratuitous ARP, and an appropriate updelay setting may be required. follow or 2 The "follow" fail_over_mac policy causes the MAC address of the bond to be selected normally (normally the MAC address of the first slave added to the bond). However, the second and subsequent slaves are not set to this MAC address while they are in a backup role; a slave is programmed with the bond's MAC address at failover time (and the formerly active slave receives the newly active slave's MAC address). This policy is useful for multiport devices that either become confused or incur a performance penalty when multiple ports are programmed with the same MAC address. The default policy is none, unless the first slave cannot change its MAC address, in which case the active policy is selected by default. This option may be modified via sysfs only when no slaves are present in the bond. This option was added in bonding version 3.2.0. The "follow" policy was added in bonding version 3.3.0. h](h)}(hSpecifies whether active-backup mode should set all slaves to the same MAC address at enslavement (the traditional behavior), or, when enabled, perform special handling of the bond's MAC address in accordance with the selected policy.h]hSpecifies whether active-backup mode should set all slaves to the same MAC address at enslavement (the traditional behavior), or, when enabled, perform special handling of the bond’s MAC address in accordance with the selected policy.}(hjq hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hPossible values are:h]hPossible values are:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(h none or 0h]h none or 0}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hThis setting disables fail_over_mac, and causes bonding to set all slaves of an active-backup bond to the same MAC address at enslavement time. This is the default. h]h)}(hThis setting disables fail_over_mac, and causes bonding to set all slaves of an active-backup bond to the same MAC address at enslavement time. This is the default.h]hThis setting disables fail_over_mac, and causes bonding to set all slaves of an active-backup bond to the same MAC address at enslavement time. This is the default.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(h active or 1h]h active or 1}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hX(The "active" fail_over_mac policy indicates that the MAC address of the bond should always be the MAC address of the currently active slave. The MAC address of the slaves is not changed; instead, the MAC address of the bond changes during a failover. This policy is useful for devices that cannot ever alter their MAC address, or for devices that refuse incoming broadcasts with their own source MAC (which interferes with the ARP monitor). The down side of this policy is that every device on the network must be updated via gratuitous ARP, vs. just updating a switch or set of switches (which often takes place for any traffic, not just ARP traffic, if the switch snoops incoming traffic to update its tables) for the traditional method. If the gratuitous ARP is lost, communication may be disrupted. When this policy is used in conjunction with the mii monitor, devices which assert link up prior to being able to actually transmit and receive are particularly susceptible to loss of the gratuitous ARP, and an appropriate updelay setting may be required. h](h)}(hThe "active" fail_over_mac policy indicates that the MAC address of the bond should always be the MAC address of the currently active slave. The MAC address of the slaves is not changed; instead, the MAC address of the bond changes during a failover.h]hThe “active” fail_over_mac policy indicates that the MAC address of the bond should always be the MAC address of the currently active slave. The MAC address of the slaves is not changed; instead, the MAC address of the bond changes during a failover.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hThis policy is useful for devices that cannot ever alter their MAC address, or for devices that refuse incoming broadcasts with their own source MAC (which interferes with the ARP monitor).h]hThis policy is useful for devices that cannot ever alter their MAC address, or for devices that refuse incoming broadcasts with their own source MAC (which interferes with the ARP monitor).}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hXjThe down side of this policy is that every device on the network must be updated via gratuitous ARP, vs. just updating a switch or set of switches (which often takes place for any traffic, not just ARP traffic, if the switch snoops incoming traffic to update its tables) for the traditional method. If the gratuitous ARP is lost, communication may be disrupted.h]hXjThe down side of this policy is that every device on the network must be updated via gratuitous ARP, vs. just updating a switch or set of switches (which often takes place for any traffic, not just ARP traffic, if the switch snoops incoming traffic to update its tables) for the traditional method. If the gratuitous ARP is lost, communication may be disrupted.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hWhen this policy is used in conjunction with the mii monitor, devices which assert link up prior to being able to actually transmit and receive are particularly susceptible to loss of the gratuitous ARP, and an appropriate updelay setting may be required.h]hWhen this policy is used in conjunction with the mii monitor, devices which assert link up prior to being able to actually transmit and receive are particularly susceptible to loss of the gratuitous ARP, and an appropriate updelay setting may be required.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(h follow or 2h]h follow or 2}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hXBThe "follow" fail_over_mac policy causes the MAC address of the bond to be selected normally (normally the MAC address of the first slave added to the bond). However, the second and subsequent slaves are not set to this MAC address while they are in a backup role; a slave is programmed with the bond's MAC address at failover time (and the formerly active slave receives the newly active slave's MAC address). This policy is useful for multiport devices that either become confused or incur a performance penalty when multiple ports are programmed with the same MAC address. h](h)}(hXThe "follow" fail_over_mac policy causes the MAC address of the bond to be selected normally (normally the MAC address of the first slave added to the bond). However, the second and subsequent slaves are not set to this MAC address while they are in a backup role; a slave is programmed with the bond's MAC address at failover time (and the formerly active slave receives the newly active slave's MAC address).h]hXThe “follow” fail_over_mac policy causes the MAC address of the bond to be selected normally (normally the MAC address of the first slave added to the bond). However, the second and subsequent slaves are not set to this MAC address while they are in a backup role; a slave is programmed with the bond’s MAC address at failover time (and the formerly active slave receives the newly active slave’s MAC address).}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubh)}(hThis policy is useful for multiport devices that either become confused or incur a performance penalty when multiple ports are programmed with the same MAC address.h]hThis policy is useful for multiport devices that either become confused or incur a performance penalty when multiple ports are programmed with the same MAC address.}(hj# hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hThe default policy is none, unless the first slave cannot change its MAC address, in which case the active policy is selected by default.h]hThe default policy is none, unless the first slave cannot change its MAC address, in which case the active policy is selected by default.}(hj7 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hRThis option may be modified via sysfs only when no slaves are present in the bond.h]hRThis option may be modified via sysfs only when no slaves are present in the bond.}(hjE hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubh)}(hhThis option was added in bonding version 3.2.0. The "follow" policy was added in bonding version 3.3.0.h]hlThis option was added in bonding version 3.2.0. The “follow” policy was added in bonding version 3.3.0.}(hjS hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjm ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubhdefinition_list)}(hhh]hdefinition_list_item)}(hXlacp_active Option specifying whether to send LACPDU frames periodically. off or 0 LACPDU frames acts as "speak when spoken to". on or 1 LACPDU frames are sent along the configured links periodically. See lacp_rate for more details. The default is on. h](hterm)}(h lacp_activeh]h lacp_active}(hjt hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM%hjn ubh definition)}(hhh](h)}(h=Option specifying whether to send LACPDU frames periodically.h]h=Option specifying whether to send LACPDU frames periodically.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubjh )}(hhh](jm )}(h7off or 0 LACPDU frames acts as "speak when spoken to". h](js )}(hoff or 0h]hoff or 0}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhMhj ubj )}(hhh]h)}(h-LACPDU frames acts as "speak when spoken to".h]h1LACPDU frames acts as “speak when spoken to”.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1j hj ubeh}(h]h ]h"]h$]h&]uh1jl hhhMhj ubjm )}(hhon or 1 LACPDU frames are sent along the configured links periodically. See lacp_rate for more details. h](js )}(hon or 1h]hon or 1}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM#hj ubj )}(hhh]h)}(h_LACPDU frames are sent along the configured links periodically. See lacp_rate for more details.h]h_LACPDU frames are sent along the configured links periodically. See lacp_rate for more details.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hj ubah}(h]h ]h"]h$]h&]uh1j hj ubeh}(h]h ]h"]h$]h&]uh1jl hhhM#hj ubeh}(h]h ]h"]h$]h&]uh1jg hj ubh)}(hThe default is on.h]hThe default is on.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hj ubeh}(h]h ]h"]h$]h&]uh1j hjn ubeh}(h]h ]h"]h$]h&]uh1jl hhhM%hji ubah}(h]h ]h"]h$]h&]uh1jg hjhhhhhNubh)}(h lacp_rateh]h lacp_rate}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM'hjhhubh)}(hX%Option specifying the rate in which we'll ask our link partner to transmit LACPDU packets in 802.3ad mode. Possible values are: slow or 0 Request partner to transmit LACPDUs every 30 seconds fast or 1 Request partner to transmit LACPDUs every 1 second The default is slow. h](h)}(hOption specifying the rate in which we'll ask our link partner to transmit LACPDU packets in 802.3ad mode. Possible values are:h]hOption specifying the rate in which we’ll ask our link partner to transmit LACPDU packets in 802.3ad mode. Possible values are:}(hj. hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM)hj* ubjh )}(hhh](jm )}(h?slow or 0 Request partner to transmit LACPDUs every 30 seconds h](js )}(h slow or 0h]h slow or 0}(hjC hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM.hj? ubj )}(hhh]h)}(h4Request partner to transmit LACPDUs every 30 secondsh]h4Request partner to transmit LACPDUs every 30 seconds}(hjT hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM.hjQ ubah}(h]h ]h"]h$]h&]uh1j hj? ubeh}(h]h ]h"]h$]h&]uh1jl hhhM.hj< ubjm )}(h=fast or 1 Request partner to transmit LACPDUs every 1 second h](js )}(h fast or 1h]h fast or 1}(hjr hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM1hjn ubj )}(hhh]h)}(h2Request partner to transmit LACPDUs every 1 secondh]h2Request partner to transmit LACPDUs every 1 second}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM1hj ubah}(h]h ]h"]h$]h&]uh1j hjn ubeh}(h]h ]h"]h$]h&]uh1jl hhhM1hj< ubeh}(h]h ]h"]h$]h&]uh1jg hj* ubh)}(hThe default is slow.h]hThe default is slow.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM3hj* ubeh}(h]h ]h"]h$]h&]uh1hhhhM)hjhhubh)}(h max_bondsh]h max_bonds}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hjhhubh)}(hX6Specifies the number of bonding devices to create for this instance of the bonding driver. E.g., if max_bonds is 3, and the bonding driver is not already loaded, then bond0, bond1 and bond2 will be created. The default value is 1. Specifying a value of 0 will load bonding, but will not create any devices. h]h)}(hX5Specifies the number of bonding devices to create for this instance of the bonding driver. E.g., if max_bonds is 3, and the bonding driver is not already loaded, then bond0, bond1 and bond2 will be created. The default value is 1. Specifying a value of 0 will load bonding, but will not create any devices.h]hX5Specifies the number of bonding devices to create for this instance of the bonding driver. E.g., if max_bonds is 3, and the bonding driver is not already loaded, then bond0, bond1 and bond2 will be created. The default value is 1. Specifying a value of 0 will load bonding, but will not create any devices.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM7hj ubah}(h]h ]h"]h$]h&]uh1hhhhM7hjhhubh)}(hmiimonh]hmiimon}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hjhhubh)}(hXSpecifies the MII link monitoring frequency in milliseconds. This determines how often the link state of each slave is inspected for link failures. A value of zero disables MII link monitoring. A value of 100 is a good starting point. The use_carrier option, below, affects how the link state is determined. See the High Availability section for additional information. The default value is 100 if arp_interval is not set. h]h)}(hXSpecifies the MII link monitoring frequency in milliseconds. This determines how often the link state of each slave is inspected for link failures. A value of zero disables MII link monitoring. A value of 100 is a good starting point. The use_carrier option, below, affects how the link state is determined. See the High Availability section for additional information. The default value is 100 if arp_interval is not set.h]hXSpecifies the MII link monitoring frequency in milliseconds. This determines how often the link state of each slave is inspected for link failures. A value of zero disables MII link monitoring. A value of 100 is a good starting point. The use_carrier option, below, affects how the link state is determined. See the High Availability section for additional information. The default value is 100 if arp_interval is not set.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hj ubah}(h]h ]h"]h$]h&]uh1hhhhM?hjhhubh)}(h min_linksh]h min_links}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhjhhubh)}(hX/Specifies the minimum number of links that must be active before asserting carrier. It is similar to the Cisco EtherChannel min-links feature. This allows setting the minimum number of member ports that must be up (link-up state) before marking the bond device as up (carrier on). This is useful for situations where higher level services such as clustering want to ensure a minimum number of low bandwidth links are active before switchover. This option only affect 802.3ad mode. The default value is 0. This will cause carrier to be asserted (for 802.3ad mode) whenever there is an active aggregator, regardless of the number of available links in that aggregator. Note that, because an aggregator cannot be active without at least one available link, setting this option to 0 or to 1 has the exact same effect. h](h)}(hXSpecifies the minimum number of links that must be active before asserting carrier. It is similar to the Cisco EtherChannel min-links feature. This allows setting the minimum number of member ports that must be up (link-up state) before marking the bond device as up (carrier on). This is useful for situations where higher level services such as clustering want to ensure a minimum number of low bandwidth links are active before switchover. This option only affect 802.3ad mode.h]hXSpecifies the minimum number of links that must be active before asserting carrier. It is similar to the Cisco EtherChannel min-links feature. This allows setting the minimum number of member ports that must be up (link-up state) before marking the bond device as up (carrier on). This is useful for situations where higher level services such as clustering want to ensure a minimum number of low bandwidth links are active before switchover. This option only affect 802.3ad mode.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMJhj ubh)}(hXLThe default value is 0. This will cause carrier to be asserted (for 802.3ad mode) whenever there is an active aggregator, regardless of the number of available links in that aggregator. Note that, because an aggregator cannot be active without at least one available link, setting this option to 0 or to 1 has the exact same effect.h]hXLThe default value is 0. This will cause carrier to be asserted (for 802.3ad mode) whenever there is an active aggregator, regardless of the number of available links in that aggregator. Note that, because an aggregator cannot be active without at least one available link, setting this option to 0 or to 1 has the exact same effect.}(hj# hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMShj ubeh}(h]h ]h"]h$]h&]uh1hhhhMJhjhhubh)}(hmodeh]hmode}(hj7 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMYhjhhubh)}(hX<Specifies one of the bonding policies. The default is balance-rr (round robin). Possible values are: balance-rr or 0 Round-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance. active-backup or 1 Active-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The bond's MAC address is externally visible on only one port (network adapter) to avoid confusing the switch. In bonding version 2.6.2 or later, when a failover occurs in active-backup mode, bonding will issue one or more gratuitous ARPs on the newly active slave. One gratuitous ARP is issued for the bonding master interface and each VLAN interfaces configured above it, provided that the interface has at least one IP address configured. Gratuitous ARPs issued for VLAN interfaces are tagged with the appropriate VLAN id. This mode provides fault tolerance. The primary option, documented below, affects the behavior of this mode. balance-xor or 2 XOR policy: Transmit based on the selected transmit hash policy. The default policy is a simple [(source MAC address XOR'd with destination MAC address XOR packet type ID) modulo slave count]. Alternate transmit policies may be selected via the xmit_hash_policy option, described below. This mode provides load balancing and fault tolerance. broadcast or 3 Broadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance. 802.3ad or 4 IEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification. Slave selection for outgoing traffic is done according to the transmit hash policy, which may be changed from the default simple XOR policy via the xmit_hash_policy option, documented below. Note that not all transmit policies may be 802.3ad compliant, particularly in regards to the packet mis-ordering requirements of section 43.2.4 of the 802.3ad standard. Differing peer implementations will have varying tolerances for noncompliance. Prerequisites: 1. Ethtool support in the base drivers for retrieving the speed and duplex of each slave. 2. A switch that supports IEEE 802.3ad Dynamic link aggregation. Most switches will require some type of configuration to enable 802.3ad mode. balance-tlb or 5 Adaptive transmit load balancing: channel bonding that does not require any special switch support. In tlb_dynamic_lb=1 mode; the outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave. In tlb_dynamic_lb=0 mode; the load balancing based on current load is disabled and the load is distributed only using the hash distribution. Incoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave. Prerequisite: Ethtool support in the base drivers for retrieving the speed of each slave. balance-alb or 6 Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special switch support. The receive load balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP Replies sent by the local system on their way out and overwrites the source hardware address with the unique hardware address of one of the slaves in the bond such that different peers use different hardware addresses for the server. Receive traffic from connections created by the server is also balanced. When the local system sends an ARP Request the bonding driver copies and saves the peer's IP information from the ARP packet. When the ARP Reply arrives from the peer, its hardware address is retrieved and the bonding driver initiates an ARP reply to this peer assigning it to one of the slaves in the bond. A problematic outcome of using ARP negotiation for balancing is that each time that an ARP request is broadcast it uses the hardware address of the bond. Hence, peers learn the hardware address of the bond and the balancing of receive traffic collapses to the current slave. This is handled by sending updates (ARP Replies) to all the peers with their individually assigned hardware address such that the traffic is redistributed. Receive traffic is also redistributed when a new slave is added to the bond and when an inactive slave is re-activated. The receive load is distributed sequentially (round robin) among the group of highest speed slaves in the bond. When a link is reconnected or a new slave joins the bond the receive traffic is redistributed among all active slaves in the bond by initiating ARP Replies with the selected MAC address to each of the clients. The updelay parameter (detailed below) must be set to a value equal or greater than the switch's forwarding delay so that the ARP Replies sent to the peers will not be blocked by the switch. Prerequisites: 1. Ethtool support in the base drivers for retrieving the speed of each slave. 2. Base driver support for setting the hardware address of a device while it is open. This is required so that there will always be one slave in the team using the bond hardware address (the curr_active_slave) while having a unique hardware address for each slave in the bond. If the curr_active_slave fails its hardware address is swapped with the new curr_active_slave that was chosen. h](h)}(heSpecifies one of the bonding policies. The default is balance-rr (round robin). Possible values are:h]heSpecifies one of the bonding policies. The default is balance-rr (round robin). Possible values are:}(hjI hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM[hjE ubh)}(hbalance-rr or 0h]hbalance-rr or 0}(hjW hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM^hjE ubh)}(hRound-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance. h]h)}(hRound-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance.h]hRound-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance.}(hji hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM`hje ubah}(h]h ]h"]h$]h&]uh1hhhhM`hjE ubh)}(hactive-backup or 1h]hactive-backup or 1}(hj} hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMehjE ubh)}(hXActive-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The bond's MAC address is externally visible on only one port (network adapter) to avoid confusing the switch. In bonding version 2.6.2 or later, when a failover occurs in active-backup mode, bonding will issue one or more gratuitous ARPs on the newly active slave. One gratuitous ARP is issued for the bonding master interface and each VLAN interfaces configured above it, provided that the interface has at least one IP address configured. Gratuitous ARPs issued for VLAN interfaces are tagged with the appropriate VLAN id. This mode provides fault tolerance. The primary option, documented below, affects the behavior of this mode. h](h)}(hActive-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The bond's MAC address is externally visible on only one port (network adapter) to avoid confusing the switch.h]hActive-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. The bond’s MAC address is externally visible on only one port (network adapter) to avoid confusing the switch.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMghj ubh)}(hXIn bonding version 2.6.2 or later, when a failover occurs in active-backup mode, bonding will issue one or more gratuitous ARPs on the newly active slave. One gratuitous ARP is issued for the bonding master interface and each VLAN interfaces configured above it, provided that the interface has at least one IP address configured. Gratuitous ARPs issued for VLAN interfaces are tagged with the appropriate VLAN id.h]hXIn bonding version 2.6.2 or later, when a failover occurs in active-backup mode, bonding will issue one or more gratuitous ARPs on the newly active slave. One gratuitous ARP is issued for the bonding master interface and each VLAN interfaces configured above it, provided that the interface has at least one IP address configured. Gratuitous ARPs issued for VLAN interfaces are tagged with the appropriate VLAN id.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMmhj ubh)}(hmThis mode provides fault tolerance. The primary option, documented below, affects the behavior of this mode.h]hmThis mode provides fault tolerance. The primary option, documented below, affects the behavior of this mode.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMvhj ubeh}(h]h ]h"]h$]h&]uh1hhhhMghjE ubh)}(hbalance-xor or 2h]hbalance-xor or 2}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhjE ubh)}(hXYXOR policy: Transmit based on the selected transmit hash policy. The default policy is a simple [(source MAC address XOR'd with destination MAC address XOR packet type ID) modulo slave count]. Alternate transmit policies may be selected via the xmit_hash_policy option, described below. This mode provides load balancing and fault tolerance. h](h)}(hX XOR policy: Transmit based on the selected transmit hash policy. The default policy is a simple [(source MAC address XOR'd with destination MAC address XOR packet type ID) modulo slave count]. Alternate transmit policies may be selected via the xmit_hash_policy option, described below.h]hX"XOR policy: Transmit based on the selected transmit hash policy. The default policy is a simple [(source MAC address XOR’d with destination MAC address XOR packet type ID) modulo slave count]. Alternate transmit policies may be selected via the xmit_hash_policy option, described below.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hj ubh)}(h6This mode provides load balancing and fault tolerance.h]h6This mode provides load balancing and fault tolerance.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubeh}(h]h ]h"]h$]h&]uh1hhhhM|hjE ubh)}(hbroadcast or 3h]hbroadcast or 3}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(heBroadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance. h]h)}(hdBroadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance.h]hdBroadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(h 802.3ad or 4h]h 802.3ad or 4}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(hX~IEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification. Slave selection for outgoing traffic is done according to the transmit hash policy, which may be changed from the default simple XOR policy via the xmit_hash_policy option, documented below. Note that not all transmit policies may be 802.3ad compliant, particularly in regards to the packet mis-ordering requirements of section 43.2.4 of the 802.3ad standard. Differing peer implementations will have varying tolerances for noncompliance. Prerequisites: 1. Ethtool support in the base drivers for retrieving the speed and duplex of each slave. 2. A switch that supports IEEE 802.3ad Dynamic link aggregation. Most switches will require some type of configuration to enable 802.3ad mode. h](h)}(hIEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification.h]hIEEE 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification.}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubh)}(hXSlave selection for outgoing traffic is done according to the transmit hash policy, which may be changed from the default simple XOR policy via the xmit_hash_policy option, documented below. Note that not all transmit policies may be 802.3ad compliant, particularly in regards to the packet mis-ordering requirements of section 43.2.4 of the 802.3ad standard. Differing peer implementations will have varying tolerances for noncompliance.h]hXSlave selection for outgoing traffic is done according to the transmit hash policy, which may be changed from the default simple XOR policy via the xmit_hash_policy option, documented below. Note that not all transmit policies may be 802.3ad compliant, particularly in regards to the packet mis-ordering requirements of section 43.2.4 of the 802.3ad standard. Differing peer implementations will have varying tolerances for noncompliance.}(hj9hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubh)}(hPrerequisites:h]hPrerequisites:}(hjGhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubh)}(hY1. Ethtool support in the base drivers for retrieving the speed and duplex of each slave.h]hY1. Ethtool support in the base drivers for retrieving the speed and duplex of each slave.}(hjUhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubh)}(h@2. A switch that supports IEEE 802.3ad Dynamic link aggregation.h]h@2. A switch that supports IEEE 802.3ad Dynamic link aggregation.}(hjchhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubh)}(hMMost switches will require some type of configuration to enable 802.3ad mode.h]hMMost switches will require some type of configuration to enable 802.3ad mode.}(hjqhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(hbalance-tlb or 5h]hbalance-tlb or 5}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(hXuAdaptive transmit load balancing: channel bonding that does not require any special switch support. In tlb_dynamic_lb=1 mode; the outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave. In tlb_dynamic_lb=0 mode; the load balancing based on current load is disabled and the load is distributed only using the hash distribution. Incoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave. Prerequisite: Ethtool support in the base drivers for retrieving the speed of each slave. h](h)}(hcAdaptive transmit load balancing: channel bonding that does not require any special switch support.h]hcAdaptive transmit load balancing: channel bonding that does not require any special switch support.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hIn tlb_dynamic_lb=1 mode; the outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave.h]hIn tlb_dynamic_lb=1 mode; the outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hIn tlb_dynamic_lb=0 mode; the load balancing based on current load is disabled and the load is distributed only using the hash distribution.h]hIn tlb_dynamic_lb=0 mode; the load balancing based on current load is disabled and the load is distributed only using the hash distribution.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hIncoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave.h]hIncoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(h Prerequisite:h]h Prerequisite:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hKEthtool support in the base drivers for retrieving the speed of each slave.h]hKEthtool support in the base drivers for retrieving the speed of each slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(hbalance-alb or 6h]hbalance-alb or 6}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjE ubh)}(hXt Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special switch support. The receive load balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP Replies sent by the local system on their way out and overwrites the source hardware address with the unique hardware address of one of the slaves in the bond such that different peers use different hardware addresses for the server. Receive traffic from connections created by the server is also balanced. When the local system sends an ARP Request the bonding driver copies and saves the peer's IP information from the ARP packet. When the ARP Reply arrives from the peer, its hardware address is retrieved and the bonding driver initiates an ARP reply to this peer assigning it to one of the slaves in the bond. A problematic outcome of using ARP negotiation for balancing is that each time that an ARP request is broadcast it uses the hardware address of the bond. Hence, peers learn the hardware address of the bond and the balancing of receive traffic collapses to the current slave. This is handled by sending updates (ARP Replies) to all the peers with their individually assigned hardware address such that the traffic is redistributed. Receive traffic is also redistributed when a new slave is added to the bond and when an inactive slave is re-activated. The receive load is distributed sequentially (round robin) among the group of highest speed slaves in the bond. When a link is reconnected or a new slave joins the bond the receive traffic is redistributed among all active slaves in the bond by initiating ARP Replies with the selected MAC address to each of the clients. The updelay parameter (detailed below) must be set to a value equal or greater than the switch's forwarding delay so that the ARP Replies sent to the peers will not be blocked by the switch. Prerequisites: 1. Ethtool support in the base drivers for retrieving the speed of each slave. 2. Base driver support for setting the hardware address of a device while it is open. This is required so that there will always be one slave in the team using the bond hardware address (the curr_active_slave) while having a unique hardware address for each slave in the bond. If the curr_active_slave fails its hardware address is swapped with the new curr_active_slave that was chosen. h](h)}(hXAdaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special switch support. The receive load balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP Replies sent by the local system on their way out and overwrites the source hardware address with the unique hardware address of one of the slaves in the bond such that different peers use different hardware addresses for the server.h]hXAdaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic, and does not require any special switch support. The receive load balancing is achieved by ARP negotiation. The bonding driver intercepts the ARP Replies sent by the local system on their way out and overwrites the source hardware address with the unique hardware address of one of the slaves in the bond such that different peers use different hardware addresses for the server.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hXReceive traffic from connections created by the server is also balanced. When the local system sends an ARP Request the bonding driver copies and saves the peer's IP information from the ARP packet. When the ARP Reply arrives from the peer, its hardware address is retrieved and the bonding driver initiates an ARP reply to this peer assigning it to one of the slaves in the bond. A problematic outcome of using ARP negotiation for balancing is that each time that an ARP request is broadcast it uses the hardware address of the bond. Hence, peers learn the hardware address of the bond and the balancing of receive traffic collapses to the current slave. This is handled by sending updates (ARP Replies) to all the peers with their individually assigned hardware address such that the traffic is redistributed. Receive traffic is also redistributed when a new slave is added to the bond and when an inactive slave is re-activated. The receive load is distributed sequentially (round robin) among the group of highest speed slaves in the bond.h]hXReceive traffic from connections created by the server is also balanced. When the local system sends an ARP Request the bonding driver copies and saves the peer’s IP information from the ARP packet. When the ARP Reply arrives from the peer, its hardware address is retrieved and the bonding driver initiates an ARP reply to this peer assigning it to one of the slaves in the bond. A problematic outcome of using ARP negotiation for balancing is that each time that an ARP request is broadcast it uses the hardware address of the bond. Hence, peers learn the hardware address of the bond and the balancing of receive traffic collapses to the current slave. This is handled by sending updates (ARP Replies) to all the peers with their individually assigned hardware address such that the traffic is redistributed. Receive traffic is also redistributed when a new slave is added to the bond and when an inactive slave is re-activated. The receive load is distributed sequentially (round robin) among the group of highest speed slaves in the bond.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hXWhen a link is reconnected or a new slave joins the bond the receive traffic is redistributed among all active slaves in the bond by initiating ARP Replies with the selected MAC address to each of the clients. The updelay parameter (detailed below) must be set to a value equal or greater than the switch's forwarding delay so that the ARP Replies sent to the peers will not be blocked by the switch.h]hXWhen a link is reconnected or a new slave joins the bond the receive traffic is redistributed among all active slaves in the bond by initiating ARP Replies with the selected MAC address to each of the clients. The updelay parameter (detailed below) must be set to a value equal or greater than the switch’s forwarding delay so that the ARP Replies sent to the peers will not be blocked by the switch.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hPrerequisites:h]hPrerequisites:}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hN1. Ethtool support in the base drivers for retrieving the speed of each slave.h]hN1. Ethtool support in the base drivers for retrieving the speed of each slave.}(hj;hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hX2. Base driver support for setting the hardware address of a device while it is open. This is required so that there will always be one slave in the team using the bond hardware address (the curr_active_slave) while having a unique hardware address for each slave in the bond. If the curr_active_slave fails its hardware address is swapped with the new curr_active_slave that was chosen.h]hX2. Base driver support for setting the hardware address of a device while it is open. This is required so that there will always be one slave in the team using the bond hardware address (the curr_active_slave) while having a unique hardware address for each slave in the bond. If the curr_active_slave fails its hardware address is swapped with the new curr_active_slave that was chosen.}(hjIhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjE ubeh}(h]h ]h"]h$]h&]uh1hhhhM[hjhhubh)}(hnum_grat_arp, num_unsol_nah]hnum_grat_arp, num_unsol_na}(hjchhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXSpecify the number of peer notifications (gratuitous ARPs and unsolicited IPv6 Neighbor Advertisements) to be issued after a failover event. As soon as the link is up on the new slave (possibly immediately) a peer notification is sent on the bonding device and each VLAN sub-device. This is repeated at the rate specified by peer_notif_delay if the number is greater than 1. The valid range is 0 - 255; the default value is 1. These options affect only the active-backup mode. These options were added for bonding versions 3.3.0 and 3.4.0 respectively. From Linux 3.0 and bonding version 3.7.1, these notifications are generated by the ipv4 and ipv6 code and the numbers of repetitions cannot be set independently. h](h)}(hXwSpecify the number of peer notifications (gratuitous ARPs and unsolicited IPv6 Neighbor Advertisements) to be issued after a failover event. As soon as the link is up on the new slave (possibly immediately) a peer notification is sent on the bonding device and each VLAN sub-device. This is repeated at the rate specified by peer_notif_delay if the number is greater than 1.h]hXwSpecify the number of peer notifications (gratuitous ARPs and unsolicited IPv6 Neighbor Advertisements) to be issued after a failover event. As soon as the link is up on the new slave (possibly immediately) a peer notification is sent on the bonding device and each VLAN sub-device. This is repeated at the rate specified by peer_notif_delay if the number is greater than 1.}(hjuhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjqubh)}(hThe valid range is 0 - 255; the default value is 1. These options affect only the active-backup mode. These options were added for bonding versions 3.3.0 and 3.4.0 respectively.h]hThe valid range is 0 - 255; the default value is 1. These options affect only the active-backup mode. These options were added for bonding versions 3.3.0 and 3.4.0 respectively.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjqubh)}(hFrom Linux 3.0 and bonding version 3.7.1, these notifications are generated by the ipv4 and ipv6 code and the numbers of repetitions cannot be set independently.h]hFrom Linux 3.0 and bonding version 3.7.1, these notifications are generated by the ipv4 and ipv6 code and the numbers of repetitions cannot be set independently.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjqubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hpackets_per_slaveh]hpackets_per_slave}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjhhubh)}(hSpecify the number of packets to transmit through a slave before moving to the next one. When set to 0 then a slave is chosen at random. The valid range is 0 - 65535; the default value is 1. This option has effect only in balance-rr mode. h](h)}(hSpecify the number of packets to transmit through a slave before moving to the next one. When set to 0 then a slave is chosen at random.h]hSpecify the number of packets to transmit through a slave before moving to the next one. When set to 0 then a slave is chosen at random.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjubh)}(heThe valid range is 0 - 65535; the default value is 1. This option has effect only in balance-rr mode.h]heThe valid range is 0 - 65535; the default value is 1. This option has effect only in balance-rr mode.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhM hjhhubh)}(hpeer_notif_delayh]hpeer_notif_delay}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXqSpecify the delay, in milliseconds, between each peer notification (gratuitous ARP and unsolicited IPv6 Neighbor Advertisement) when they are issued after a failover event. This delay should be a multiple of the MII link monitor interval (miimon). The valid range is 0 - 300000. The default value is 0, which means to match the value of the MII link monitor interval. h](h)}(hSpecify the delay, in milliseconds, between each peer notification (gratuitous ARP and unsolicited IPv6 Neighbor Advertisement) when they are issued after a failover event. This delay should be a multiple of the MII link monitor interval (miimon).h]hSpecify the delay, in milliseconds, between each peer notification (gratuitous ARP and unsolicited IPv6 Neighbor Advertisement) when they are issued after a failover event. This delay should be a multiple of the MII link monitor interval (miimon).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hwThe valid range is 0 - 300000. The default value is 0, which means to match the value of the MII link monitor interval.h]hwThe valid range is 0 - 300000. The default value is 0, which means to match the value of the MII link monitor interval.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubjh )}(hhh]jm )}(hXmprio Slave priority. A higher number means higher priority. The primary slave has the highest priority. This option also follows the primary_reselect rules. This option could only be configured via netlink, and is only valid for active-backup(1), balance-tlb (5) and balance-alb (6) mode. The valid value range is a signed 32 bit integer. The default value is 0. h](js )}(hprioh]hprio}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM&hjubj )}(hhh](h)}(hSlave priority. A higher number means higher priority. The primary slave has the highest priority. This option also follows the primary_reselect rules.h]hSlave priority. A higher number means higher priority. The primary slave has the highest priority. This option also follows the primary_reselect rules.}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"ubh)}(hThis option could only be configured via netlink, and is only valid for active-backup(1), balance-tlb (5) and balance-alb (6) mode. The valid value range is a signed 32 bit integer.h]hThis option could only be configured via netlink, and is only valid for active-backup(1), balance-tlb (5) and balance-alb (6) mode. The valid value range is a signed 32 bit integer.}(hj3hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hj"ubh)}(hThe default value is 0.h]hThe default value is 0.}(hjAhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hj"ubeh}(h]h ]h"]h$]h&]uh1j hjubeh}(h]h ]h"]h$]h&]uh1jl hhhM&hj ubah}(h]h ]h"]h$]h&]uh1jg hjhhhhhNubh)}(hprimaryh]hprimary}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM(hjhhubh)}(hXA string (eth0, eth2, etc) specifying which slave is the primary device. The specified device will always be the active slave while it is available. Only when the primary is off-line will alternate devices be used. This is useful when one slave is preferred over another, e.g., when one slave has higher throughput than another. The primary option is only valid for active-backup(1), balance-tlb (5) and balance-alb (6) mode. h](h)}(hXKA string (eth0, eth2, etc) specifying which slave is the primary device. The specified device will always be the active slave while it is available. Only when the primary is off-line will alternate devices be used. This is useful when one slave is preferred over another, e.g., when one slave has higher throughput than another.h]hXKA string (eth0, eth2, etc) specifying which slave is the primary device. The specified device will always be the active slave while it is available. Only when the primary is off-line will alternate devices be used. This is useful when one slave is preferred over another, e.g., when one slave has higher throughput than another.}(hjshhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hjoubh)}(h`The primary option is only valid for active-backup(1), balance-tlb (5) and balance-alb (6) mode.h]h`The primary option is only valid for active-backup(1), balance-tlb (5) and balance-alb (6) mode.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM1hjoubeh}(h]h ]h"]h$]h&]uh1hhhhM*hjhhubh)}(hprimary_reselecth]hprimary_reselect}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM4hjhhubh)}(hX%Specifies the reselection policy for the primary slave. This affects how the primary slave is chosen to become the active slave when failure of the active slave or recovery of the primary slave occurs. This option is designed to prevent flip-flopping between the primary slave and other slaves. Possible values are: always or 0 (default) The primary slave becomes the active slave whenever it comes back up. better or 1 The primary slave becomes the active slave when it comes back up, if the speed and duplex of the primary slave is better than the speed and duplex of the current active slave. failure or 2 The primary slave becomes the active slave only if the current active slave fails and the primary slave is up. The primary_reselect setting is ignored in two cases: If no slaves are active, the first slave to recover is made the active slave. When initially enslaved, the primary slave is always made the active slave. Changing the primary_reselect policy via sysfs will cause an immediate selection of the best active slave according to the new policy. This may or may not result in a change of the active slave, depending upon the circumstances. This option was added for bonding version 3.6.0. h](h)}(hX>Specifies the reselection policy for the primary slave. This affects how the primary slave is chosen to become the active slave when failure of the active slave or recovery of the primary slave occurs. This option is designed to prevent flip-flopping between the primary slave and other slaves. Possible values are:h]hX>Specifies the reselection policy for the primary slave. This affects how the primary slave is chosen to become the active slave when failure of the active slave or recovery of the primary slave occurs. This option is designed to prevent flip-flopping between the primary slave and other slaves. Possible values are:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM6hjubh)}(halways or 0 (default)h]halways or 0 (default)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM<hjubh)}(hFThe primary slave becomes the active slave whenever it comes back up. h]h)}(hEThe primary slave becomes the active slave whenever it comes back up.h]hEThe primary slave becomes the active slave whenever it comes back up.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hjubah}(h]h ]h"]h$]h&]uh1hhhhM>hjubh)}(h better or 1h]h better or 1}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMAhjubh)}(hThe primary slave becomes the active slave when it comes back up, if the speed and duplex of the primary slave is better than the speed and duplex of the current active slave. h]h)}(hThe primary slave becomes the active slave when it comes back up, if the speed and duplex of the primary slave is better than the speed and duplex of the current active slave.h]hThe primary slave becomes the active slave when it comes back up, if the speed and duplex of the primary slave is better than the speed and duplex of the current active slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMChjubah}(h]h ]h"]h$]h&]uh1hhhhMChjubh)}(h failure or 2h]h failure or 2}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhjubh)}(hoThe primary slave becomes the active slave only if the current active slave fails and the primary slave is up. h]h)}(hnThe primary slave becomes the active slave only if the current active slave fails and the primary slave is up.h]hnThe primary slave becomes the active slave only if the current active slave fails and the primary slave is up.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMJhjubah}(h]h ]h"]h$]h&]uh1hhhhMJhjubh)}(h5The primary_reselect setting is ignored in two cases:h]h5The primary_reselect setting is ignored in two cases:}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMMhjubh)}(hIf no slaves are active, the first slave to recover is made the active slave. When initially enslaved, the primary slave is always made the active slave. h](h)}(hMIf no slaves are active, the first slave to recover is made the active slave.h]hMIf no slaves are active, the first slave to recover is made the active slave.}(hj9hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMOhj5ubh)}(hKWhen initially enslaved, the primary slave is always made the active slave.h]hKWhen initially enslaved, the primary slave is always made the active slave.}(hjGhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMRhj5ubeh}(h]h ]h"]h$]h&]uh1hhhhMOhjubh)}(hChanging the primary_reselect policy via sysfs will cause an immediate selection of the best active slave according to the new policy. This may or may not result in a change of the active slave, depending upon the circumstances.h]hChanging the primary_reselect policy via sysfs will cause an immediate selection of the best active slave according to the new policy. This may or may not result in a change of the active slave, depending upon the circumstances.}(hj[hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMUhjubh)}(h0This option was added for bonding version 3.6.0.h]h0This option was added for bonding version 3.6.0.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMZhjubeh}(h]h ]h"]h$]h&]uh1hhhhM6hjhhubh)}(htlb_dynamic_lbh]htlb_dynamic_lb}(hj}hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM\hjhhubh)}(hXLSpecifies if dynamic shuffling of flows is enabled in tlb or alb mode. The value has no effect on any other modes. The default behavior of tlb mode is to shuffle active flows across slaves based on the load in that interval. This gives nice lb characteristics but can cause packet reordering. If re-ordering is a concern use this variable to disable flow shuffling and rely on load balancing provided solely by the hash distribution. xmit-hash-policy can be used to select the appropriate hashing for the setup. The sysfs entry can be used to change the setting per bond device and the initial value is derived from the module parameter. The sysfs entry is allowed to be changed only if the bond device is down. The default value is "1" that enables flow shuffling while value "0" disables it. This option was added in bonding driver 3.7.1 h](h)}(hrSpecifies if dynamic shuffling of flows is enabled in tlb or alb mode. The value has no effect on any other modes.h]hrSpecifies if dynamic shuffling of flows is enabled in tlb or alb mode. The value has no effect on any other modes.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM^hjubh)}(hXThe default behavior of tlb mode is to shuffle active flows across slaves based on the load in that interval. This gives nice lb characteristics but can cause packet reordering. If re-ordering is a concern use this variable to disable flow shuffling and rely on load balancing provided solely by the hash distribution. xmit-hash-policy can be used to select the appropriate hashing for the setup.h]hXThe default behavior of tlb mode is to shuffle active flows across slaves based on the load in that interval. This gives nice lb characteristics but can cause packet reordering. If re-ordering is a concern use this variable to disable flow shuffling and rely on load balancing provided solely by the hash distribution. xmit-hash-policy can be used to select the appropriate hashing for the setup.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMahjubh)}(hThe sysfs entry can be used to change the setting per bond device and the initial value is derived from the module parameter. The sysfs entry is allowed to be changed only if the bond device is down.h]hThe sysfs entry can be used to change the setting per bond device and the initial value is derived from the module parameter. The sysfs entry is allowed to be changed only if the bond device is down.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMihjubh)}(hThe default value is "1" that enables flow shuffling while value "0" disables it. This option was added in bonding driver 3.7.1h]hThe default value is “1” that enables flow shuffling while value “0” disables it. This option was added in bonding driver 3.7.1}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMnhjubeh}(h]h ]h"]h$]h&]uh1hhhhM^hjhhubh)}(hupdelayh]hupdelay}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMrhjhhubh)}(hX5Specifies the time, in milliseconds, to wait before enabling a slave after a link recovery has been detected. This option is only valid for the miimon link monitor. The updelay value should be a multiple of the miimon value; if not, it will be rounded down to the nearest multiple. The default value is 0. h]h)}(hX4Specifies the time, in milliseconds, to wait before enabling a slave after a link recovery has been detected. This option is only valid for the miimon link monitor. The updelay value should be a multiple of the miimon value; if not, it will be rounded down to the nearest multiple. The default value is 0.h]hX4Specifies the time, in milliseconds, to wait before enabling a slave after a link recovery has been detected. This option is only valid for the miimon link monitor. The updelay value should be a multiple of the miimon value; if not, it will be rounded down to the nearest multiple. The default value is 0.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthjubah}(h]h ]h"]h$]h&]uh1hhhhMthjhhubh)}(h use_carrierh]h use_carrier}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhjhhubh)}(hXSpecifies whether or not miimon should use MII or ETHTOOL ioctls vs. netif_carrier_ok() to determine the link status. The MII or ETHTOOL ioctls are less efficient and utilize a deprecated calling sequence within the kernel. The netif_carrier_ok() relies on the device driver to maintain its state with netif_carrier_on/off; at this writing, most, but not all, device drivers support this facility. If bonding insists that the link is up when it should not be, it may be that your network device driver does not support netif_carrier_on/off. The default state for netif_carrier is "carrier on," so if a driver does not support netif_carrier, it will appear as if the link is always up. In this case, setting use_carrier to 0 will cause bonding to revert to the MII / ETHTOOL ioctl method to determine the link state. A value of 1 enables the use of netif_carrier_ok(), a value of 0 will use the deprecated MII / ETHTOOL ioctls. The default value is 1. h](h)}(hXSpecifies whether or not miimon should use MII or ETHTOOL ioctls vs. netif_carrier_ok() to determine the link status. The MII or ETHTOOL ioctls are less efficient and utilize a deprecated calling sequence within the kernel. The netif_carrier_ok() relies on the device driver to maintain its state with netif_carrier_on/off; at this writing, most, but not all, device drivers support this facility.h]hXSpecifies whether or not miimon should use MII or ETHTOOL ioctls vs. netif_carrier_ok() to determine the link status. The MII or ETHTOOL ioctls are less efficient and utilize a deprecated calling sequence within the kernel. The netif_carrier_ok() relies on the device driver to maintain its state with netif_carrier_on/off; at this writing, most, but not all, device drivers support this facility.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hjubh)}(hXIf bonding insists that the link is up when it should not be, it may be that your network device driver does not support netif_carrier_on/off. The default state for netif_carrier is "carrier on," so if a driver does not support netif_carrier, it will appear as if the link is always up. In this case, setting use_carrier to 0 will cause bonding to revert to the MII / ETHTOOL ioctl method to determine the link state.h]hXIf bonding insists that the link is up when it should not be, it may be that your network device driver does not support netif_carrier_on/off. The default state for netif_carrier is “carrier on,” so if a driver does not support netif_carrier, it will appear as if the link is always up. In this case, setting use_carrier to 0 will cause bonding to revert to the MII / ETHTOOL ioctl method to determine the link state.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hA value of 1 enables the use of netif_carrier_ok(), a value of 0 will use the deprecated MII / ETHTOOL ioctls. The default value is 1.h]hA value of 1 enables the use of netif_carrier_ok(), a value of 0 will use the deprecated MII / ETHTOOL ioctls. The default value is 1.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhM|hjhhubh)}(hxmit_hash_policyh]hxmit_hash_policy}(hj5hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hX<Selects the transmit hash policy to use for slave selection in balance-xor, 802.3ad, and tlb modes. Possible values are: layer2 Uses XOR of hardware MAC addresses and packet type ID field to generate the hash. The formula is hash = source MAC[5] XOR destination MAC[5] XOR packet type ID slave number = hash modulo slave count This algorithm will place all traffic to a particular network peer on the same slave. This algorithm is 802.3ad compliant. layer2+3 This policy uses a combination of layer2 and layer3 protocol information to generate the hash. Uses XOR of hardware MAC addresses and IP addresses to generate the hash. The formula is hash = source MAC[5] XOR destination MAC[5] XOR packet type ID hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) And then hash is reduced modulo slave count. If the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash. This algorithm will place all traffic to a particular network peer on the same slave. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy. This policy is intended to provide a more balanced distribution of traffic than layer2 alone, especially in environments where a layer3 gateway device is required to reach most destinations. This algorithm is 802.3ad compliant. layer3+4 This policy uses upper layer protocol information, when available, to generate the hash. This allows for traffic to a particular network peer to span multiple slaves, although a single connection will not span multiple slaves. The formula for unfragmented TCP and UDP packets is hash = source port, destination port (as in the header) hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) hash = hash RSHIFT 1 And then hash is reduced modulo slave count. If the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash. For fragmented TCP or UDP packets and all other IPv4 and IPv6 protocol traffic, the source and destination port information is omitted. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy. This algorithm is not fully 802.3ad compliant. A single TCP or UDP conversation containing both fragmented and unfragmented packets will see packets striped across two interfaces. This may result in out of order delivery. Most traffic types will not meet this criteria, as TCP rarely fragments traffic, and most UDP traffic is not involved in extended conversations. Other implementations of 802.3ad may or may not tolerate this noncompliance. encap2+3 This policy uses the same formula as layer2+3 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows. encap3+4 This policy uses the same formula as layer3+4 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows. vlan+srcmac This policy uses a very rudimentary vlan ID and source mac hash to load-balance traffic per-vlan, with failover should one leg fail. The intended use case is for a bond shared by multiple virtual machines, all configured to use their own vlan, to give lacp-like functionality without requiring lacp-capable switching hardware. The formula for the hash is simply hash = (vlan ID) XOR (source MAC vendor) XOR (source MAC dev) The default value is layer2. This option was added in bonding version 2.6.3. In earlier versions of bonding, this parameter does not exist, and the layer2 policy is the only policy. The layer2+3 value was added for bonding version 3.2.2. h](h)}(hySelects the transmit hash policy to use for slave selection in balance-xor, 802.3ad, and tlb modes. Possible values are:h]hySelects the transmit hash policy to use for slave selection in balance-xor, 802.3ad, and tlb modes. Possible values are:}(hjGhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hlayer2h]hlayer2}(hjUhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hXEUses XOR of hardware MAC addresses and packet type ID field to generate the hash. The formula is hash = source MAC[5] XOR destination MAC[5] XOR packet type ID slave number = hash modulo slave count This algorithm will place all traffic to a particular network peer on the same slave. This algorithm is 802.3ad compliant. h](h)}(h`Uses XOR of hardware MAC addresses and packet type ID field to generate the hash. The formula ish]h`Uses XOR of hardware MAC addresses and packet type ID field to generate the hash. The formula is}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjcubh)}(hehash = source MAC[5] XOR destination MAC[5] XOR packet type ID slave number = hash modulo slave counth]hehash = source MAC[5] XOR destination MAC[5] XOR packet type ID slave number = hash modulo slave count}(hjuhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjcubh)}(hUThis algorithm will place all traffic to a particular network peer on the same slave.h]hUThis algorithm will place all traffic to a particular network peer on the same slave.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjcubh)}(h$This algorithm is 802.3ad compliant.h]h$This algorithm is 802.3ad compliant.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjcubeh}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hlayer2+3h]hlayer2+3}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hXThis policy uses a combination of layer2 and layer3 protocol information to generate the hash. Uses XOR of hardware MAC addresses and IP addresses to generate the hash. The formula is hash = source MAC[5] XOR destination MAC[5] XOR packet type ID hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) And then hash is reduced modulo slave count. If the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash. This algorithm will place all traffic to a particular network peer on the same slave. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy. This policy is intended to provide a more balanced distribution of traffic than layer2 alone, especially in environments where a layer3 gateway device is required to reach most destinations. This algorithm is 802.3ad compliant. h](h)}(h^This policy uses a combination of layer2 and layer3 protocol information to generate the hash.h]h^This policy uses a combination of layer2 and layer3 protocol information to generate the hash.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hYUses XOR of hardware MAC addresses and IP addresses to generate the hash. The formula ish]hYUses XOR of hardware MAC addresses and IP addresses to generate the hash. The formula is}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hhash = source MAC[5] XOR destination MAC[5] XOR packet type ID hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) And then hash is reduced modulo slave count.h]hhash = source MAC[5] XOR destination MAC[5] XOR packet type ID hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) And then hash is reduced modulo slave count.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hhIf the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash.h]hhIf the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hThis algorithm will place all traffic to a particular network peer on the same slave. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy.h]hThis algorithm will place all traffic to a particular network peer on the same slave. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(hThis policy is intended to provide a more balanced distribution of traffic than layer2 alone, especially in environments where a layer3 gateway device is required to reach most destinations.h]hThis policy is intended to provide a more balanced distribution of traffic than layer2 alone, especially in environments where a layer3 gateway device is required to reach most destinations.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(h$This algorithm is 802.3ad compliant.h]h$This algorithm is 802.3ad compliant.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hlayer3+4h]hlayer3+4}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hX This policy uses upper layer protocol information, when available, to generate the hash. This allows for traffic to a particular network peer to span multiple slaves, although a single connection will not span multiple slaves. The formula for unfragmented TCP and UDP packets is hash = source port, destination port (as in the header) hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) hash = hash RSHIFT 1 And then hash is reduced modulo slave count. If the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash. For fragmented TCP or UDP packets and all other IPv4 and IPv6 protocol traffic, the source and destination port information is omitted. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy. This algorithm is not fully 802.3ad compliant. A single TCP or UDP conversation containing both fragmented and unfragmented packets will see packets striped across two interfaces. This may result in out of order delivery. Most traffic types will not meet this criteria, as TCP rarely fragments traffic, and most UDP traffic is not involved in extended conversations. Other implementations of 802.3ad may or may not tolerate this noncompliance. h](h)}(hThis policy uses upper layer protocol information, when available, to generate the hash. This allows for traffic to a particular network peer to span multiple slaves, although a single connection will not span multiple slaves.h]hThis policy uses upper layer protocol information, when available, to generate the hash. This allows for traffic to a particular network peer to span multiple slaves, although a single connection will not span multiple slaves.}(hj1hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj-ubh)}(h3The formula for unfragmented TCP and UDP packets ish]h3The formula for unfragmented TCP and UDP packets is}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj-ubh)}(hhash = source port, destination port (as in the header) hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) hash = hash RSHIFT 1 And then hash is reduced modulo slave count.h]hhash = source port, destination port (as in the header) hash = hash XOR source IP XOR destination IP hash = hash XOR (hash RSHIFT 16) hash = hash XOR (hash RSHIFT 8) hash = hash RSHIFT 1 And then hash is reduced modulo slave count.}(hjMhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj-ubh)}(hhIf the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash.h]hhIf the protocol is IPv6 then the source and destination addresses are first hashed using ipv6_addr_hash.}(hj[hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj-ubh)}(hFor fragmented TCP or UDP packets and all other IPv4 and IPv6 protocol traffic, the source and destination port information is omitted. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy.h]hFor fragmented TCP or UDP packets and all other IPv4 and IPv6 protocol traffic, the source and destination port information is omitted. For non-IP traffic, the formula is the same as for the layer2 transmit hash policy.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj-ubh)}(hXThis algorithm is not fully 802.3ad compliant. A single TCP or UDP conversation containing both fragmented and unfragmented packets will see packets striped across two interfaces. This may result in out of order delivery. Most traffic types will not meet this criteria, as TCP rarely fragments traffic, and most UDP traffic is not involved in extended conversations. Other implementations of 802.3ad may or may not tolerate this noncompliance.h]hXThis algorithm is not fully 802.3ad compliant. A single TCP or UDP conversation containing both fragmented and unfragmented packets will see packets striped across two interfaces. This may result in out of order delivery. Most traffic types will not meet this criteria, as TCP rarely fragments traffic, and most UDP traffic is not involved in extended conversations. Other implementations of 802.3ad may or may not tolerate this noncompliance.}(hjwhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj-ubeh}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hencap2+3h]hencap2+3}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hXMThis policy uses the same formula as layer2+3 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows. h]h)}(hXLThis policy uses the same formula as layer2+3 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows.h]hXLThis policy uses the same formula as layer2+3 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hencap3+4h]hencap3+4}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hXMThis policy uses the same formula as layer3+4 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows. h]h)}(hXLThis policy uses the same formula as layer3+4 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows.h]hXLThis policy uses the same formula as layer3+4 but it relies on skb_flow_dissect to obtain the header fields which might result in the use of inner headers if an encapsulation protocol is used. For example this will improve the performance for tunnel users because the packets will be distributed according to the encapsulated flows.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(h vlan+srcmach]h vlan+srcmac}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hXThis policy uses a very rudimentary vlan ID and source mac hash to load-balance traffic per-vlan, with failover should one leg fail. The intended use case is for a bond shared by multiple virtual machines, all configured to use their own vlan, to give lacp-like functionality without requiring lacp-capable switching hardware. The formula for the hash is simply hash = (vlan ID) XOR (source MAC vendor) XOR (source MAC dev) h](h)}(hXFThis policy uses a very rudimentary vlan ID and source mac hash to load-balance traffic per-vlan, with failover should one leg fail. The intended use case is for a bond shared by multiple virtual machines, all configured to use their own vlan, to give lacp-like functionality without requiring lacp-capable switching hardware.h]hXFThis policy uses a very rudimentary vlan ID and source mac hash to load-balance traffic per-vlan, with failover should one leg fail. The intended use case is for a bond shared by multiple virtual machines, all configured to use their own vlan, to give lacp-like functionality without requiring lacp-capable switching hardware.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(h"The formula for the hash is simplyh]h"The formula for the hash is simply}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(h=hash = (vlan ID) XOR (source MAC vendor) XOR (source MAC dev)h]h=hash = (vlan ID) XOR (source MAC vendor) XOR (source MAC dev)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjCubh)}(hThe default value is layer2. This option was added in bonding version 2.6.3. In earlier versions of bonding, this parameter does not exist, and the layer2 policy is the only policy. The layer2+3 value was added for bonding version 3.2.2.h]hThe default value is layer2. This option was added in bonding version 2.6.3. In earlier versions of bonding, this parameter does not exist, and the layer2 policy is the only policy. The layer2+3 value was added for bonding version 3.2.2.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjCubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h resend_igmph]h resend_igmp}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjhhubh)}(hXSpecifies the number of IGMP membership reports to be issued after a failover event. One membership report is issued immediately after the failover, subsequent packets are sent in each 200ms interval. The valid range is 0 - 255; the default value is 1. A value of 0 prevents the IGMP membership report from being issued in response to the failover event. This option is useful for bonding modes balance-rr (0), active-backup (1), balance-tlb (5) and balance-alb (6), in which a failover can switch the IGMP traffic from one slave to another. Therefore a fresh IGMP report must be issued to cause the switch to forward the incoming IGMP traffic over the newly selected slave. This option was added for bonding version 3.7.0. h](h)}(hSpecifies the number of IGMP membership reports to be issued after a failover event. One membership report is issued immediately after the failover, subsequent packets are sent in each 200ms interval.h]hSpecifies the number of IGMP membership reports to be issued after a failover event. One membership report is issued immediately after the failover, subsequent packets are sent in each 200ms interval.}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj;ubh)}(hThe valid range is 0 - 255; the default value is 1. A value of 0 prevents the IGMP membership report from being issued in response to the failover event.h]hThe valid range is 0 - 255; the default value is 1. A value of 0 prevents the IGMP membership report from being issued in response to the failover event.}(hjMhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj;ubh)}(hX@This option is useful for bonding modes balance-rr (0), active-backup (1), balance-tlb (5) and balance-alb (6), in which a failover can switch the IGMP traffic from one slave to another. Therefore a fresh IGMP report must be issued to cause the switch to forward the incoming IGMP traffic over the newly selected slave.h]hX@This option is useful for bonding modes balance-rr (0), active-backup (1), balance-tlb (5) and balance-alb (6), in which a failover can switch the IGMP traffic from one slave to another. Therefore a fresh IGMP report must be issued to cause the switch to forward the incoming IGMP traffic over the newly selected slave.}(hj[hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj;ubh)}(h0This option was added for bonding version 3.7.0.h]h0This option was added for bonding version 3.7.0.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj;ubeh}(h]h ]h"]h$]h&]uh1hhhhM hjhhubh)}(h lp_intervalh]h lp_interval}(hj}hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hSpecifies the number of seconds between instances where the bonding driver sends learning packets to each slaves peer switch. The valid range is 1 - 0x7fffffff; the default value is 1. This Option has effect only in balance-tlb and balance-alb modes. h](h)}(h}Specifies the number of seconds between instances where the bonding driver sends learning packets to each slaves peer switch.h]h}Specifies the number of seconds between instances where the bonding driver sends learning packets to each slaves peer switch.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh)}(h|The valid range is 1 - 0x7fffffff; the default value is 1. This Option has effect only in balance-tlb and balance-alb modes.h]h|The valid range is 1 - 0x7fffffff; the default value is 1. This Option has effect only in balance-tlb and balance-alb modes.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h]bonding-driver-optionsah ]h"]2. bonding driver optionsah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(h3. Configuring Bonding Devicesh]h3. Configuring Bonding Devices}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhM$ubh)}(hXbYou can configure bonding using either your distro's network initialization scripts, or manually using either iproute2 or the sysfs interface. Distros generally use one of three packages for the network initialization scripts: initscripts, sysconfig or interfaces. Recent versions of these packages have support for bonding, while older versions do not.h]hXdYou can configure bonding using either your distro’s network initialization scripts, or manually using either iproute2 or the sysfs interface. Distros generally use one of three packages for the network initialization scripts: initscripts, sysconfig or interfaces. Recent versions of these packages have support for bonding, while older versions do not.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hjhhubh)}(hXAWe will first describe the options for configuring bonding for distros using versions of initscripts, sysconfig and interfaces with full or partial support for bonding, then provide information on enabling bonding without support from the network initialization scripts (i.e., older versions of initscripts or sysconfig).h]hXAWe will first describe the options for configuring bonding for distros using versions of initscripts, sysconfig and interfaces with full or partial support for bonding, then provide information on enabling bonding without support from the network initialization scripts (i.e., older versions of initscripts or sysconfig).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM-hjhhubh)}(hIf you're unsure whether your distro uses sysconfig, initscripts or interfaces, or don't know if it's new enough, have no fear. Determining this is fairly straightforward.h]hIf you’re unsure whether your distro uses sysconfig, initscripts or interfaces, or don’t know if it’s new enough, have no fear. Determining this is fairly straightforward.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM3hjhhubh)}(hFirst, look for a file called interfaces in /etc/network directory. If this file is present in your system, then your system use interfaces. See Configuration with Interfaces Support.h]hFirst, look for a file called interfaces in /etc/network directory. If this file is present in your system, then your system use interfaces. See Configuration with Interfaces Support.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM7hjhhubh)}(hElse, issue the command::h]hElse, issue the command:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM;hjhhubh literal_block)}(h$ rpm -qf /sbin/ifuph]h$ rpm -qf /sbin/ifup}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhM=hjhhubh)}(hIt will respond with a line of text starting with either "initscripts" or "sysconfig," followed by some numbers. This is the package that provides your network initialization scripts.h]hIt will respond with a line of text starting with either “initscripts” or “sysconfig,” followed by some numbers. This is the package that provides your network initialization scripts.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hjhhubh)}(hMNext, to determine if your installation supports bonding, issue the command::h]hLNext, to determine if your installation supports bonding, issue the command:}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMChjhhubj)}(h$ grep ifenslave /sbin/ifuph]h$ grep ifenslave /sbin/ifup}hj<sbah}(h]h ]h"]h$]h&]hhuh1jhhhMFhjhhubh)}(hXIf this returns any matches, then your initscripts or sysconfig has support for bonding.h]hXIf this returns any matches, then your initscripts or sysconfig has support for bonding.}(hjJhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhjhhubh)}(hhh](h)}(h(3.1 Configuration with Sysconfig Supporth]h(3.1 Configuration with Sysconfig Support}(hj[hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjXhhhhhMLubh)}(hThis section applies to distros using a version of sysconfig with bonding support, for example, SuSE Linux Enterprise Server 9.h]hThis section applies to distros using a version of sysconfig with bonding support, for example, SuSE Linux Enterprise Server 9.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMNhjXhhubh)}(hSuSE SLES 9's networking configuration system does support bonding, however, at this writing, the YaST system configuration front end does not provide any means to work with bonding devices. Bonding devices can be managed by hand, however, as follows.h]hSuSE SLES 9’s networking configuration system does support bonding, however, at this writing, the YaST system configuration front end does not provide any means to work with bonding devices. Bonding devices can be managed by hand, however, as follows.}(hjwhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMQhjXhhubh)}(hXFirst, if they have not already been configured, configure the slave devices. On SLES 9, this is most easily done by running the yast2 sysconfig configuration utility. The goal is for to create an ifcfg-id file for each slave device. The simplest way to accomplish this is to configure the devices for DHCP (this is only to get the file ifcfg-id file created; see below for some issues with DHCP). The name of the configuration file for each device will be of the form::h]hXFirst, if they have not already been configured, configure the slave devices. On SLES 9, this is most easily done by running the yast2 sysconfig configuration utility. The goal is for to create an ifcfg-id file for each slave device. The simplest way to accomplish this is to configure the devices for DHCP (this is only to get the file ifcfg-id file created; see below for some issues with DHCP). The name of the configuration file for each device will be of the form:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMVhjXhhubj)}(hifcfg-id-xx:xx:xx:xx:xx:xxh]hifcfg-id-xx:xx:xx:xx:xx:xx}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhM^hjXhhubh)}(h`Where the "xx" portion will be replaced with the digits from the device's permanent MAC address.h]hfWhere the “xx” portion will be replaced with the digits from the device’s permanent MAC address.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM`hjXhhubh)}(hX Once the set of ifcfg-id-xx:xx:xx:xx:xx:xx files has been created, it is necessary to edit the configuration files for the slave devices (the MAC addresses correspond to those of the slave devices). Before editing, the file will contain multiple lines, and will look something like this::h]hXOnce the set of ifcfg-id-xx:xx:xx:xx:xx:xx files has been created, it is necessary to edit the configuration files for the slave devices (the MAC addresses correspond to those of the slave devices). Before editing, the file will contain multiple lines, and will look something like this:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMchjXhhubj)}(hfBOOTPROTO='dhcp' STARTMODE='on' USERCTL='no' UNIQUE='XNzu.WeZGOGF+4wE' _nm_name='bus-pci-0001:61:01.0'h]hfBOOTPROTO='dhcp' STARTMODE='on' USERCTL='no' UNIQUE='XNzu.WeZGOGF+4wE' _nm_name='bus-pci-0001:61:01.0'}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMihjXhhubh)}(h;Change the BOOTPROTO and STARTMODE lines to the following::h]h:Change the BOOTPROTO and STARTMODE lines to the following:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMohjXhhubj)}(h BOOTPROTO='none' STARTMODE='off'h]h BOOTPROTO='none' STARTMODE='off'}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMqhjXhhubh)}(hRDo not alter the UNIQUE or _nm_name lines. Remove any other lines (USERCTL, etc).h]hRDo not alter the UNIQUE or _nm_name lines. Remove any other lines (USERCTL, etc).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthjXhhubh)}(hXOnce the ifcfg-id-xx:xx:xx:xx:xx:xx files have been modified, it's time to create the configuration file for the bonding device itself. This file is named ifcfg-bondX, where X is the number of the bonding device to create, starting at 0. The first such file is ifcfg-bond0, the second is ifcfg-bond1, and so on. The sysconfig network configuration system will correctly start multiple instances of bonding.h]hXOnce the ifcfg-id-xx:xx:xx:xx:xx:xx files have been modified, it’s time to create the configuration file for the bonding device itself. This file is named ifcfg-bondX, where X is the number of the bonding device to create, starting at 0. The first such file is ifcfg-bond0, the second is ifcfg-bond1, and so on. The sysconfig network configuration system will correctly start multiple instances of bonding.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMwhjXhhubh)}(h4The contents of the ifcfg-bondX file is as follows::h]h3The contents of the ifcfg-bondX file is as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubj)}(hXBOOTPROTO="static" BROADCAST="10.0.2.255" IPADDR="10.0.2.10" NETMASK="255.255.0.0" NETWORK="10.0.2.0" REMOTE_IPADDR="" STARTMODE="onboot" BONDING_MASTER="yes" BONDING_MODULE_OPTS="mode=active-backup miimon=100" BONDING_SLAVE0="eth0" BONDING_SLAVE1="bus-pci-0000:06:08.1"h]hXBOOTPROTO="static" BROADCAST="10.0.2.255" IPADDR="10.0.2.10" NETMASK="255.255.0.0" NETWORK="10.0.2.0" REMOTE_IPADDR="" STARTMODE="onboot" BONDING_MASTER="yes" BONDING_MODULE_OPTS="mode=active-backup miimon=100" BONDING_SLAVE0="eth0" BONDING_SLAVE1="bus-pci-0000:06:08.1"}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjXhhubh)}(hnReplace the sample BROADCAST, IPADDR, NETMASK and NETWORK values with the appropriate values for your network.h]hnReplace the sample BROADCAST, IPADDR, NETMASK and NETWORK values with the appropriate values for your network.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hSThe STARTMODE specifies when the device is brought online. The possible values are:h]hSThe STARTMODE specifies when the device is brought online. The possible values are:}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hXb======== ====================================================== onboot The device is started at boot time. If you're not sure, this is probably what you want. manual The device is started only when ifup is called manually. Bonding devices may be configured this way if you do not wish them to start automatically at boot for some reason. hotplug The device is started by a hotplug event. This is not a valid choice for a bonding device. off or The device configuration is ignored. ignore ======== ====================================================== h]jC)}(hhh]jH)}(hhh](jM)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jLhjBubjM)}(hhh]h}(h]h ]h"]h$]h&]colwidthK6uh1jLhjBubj)}(hhh](jh)}(hhh](jm)}(hhh]h)}(honbooth]honboot}(hjbhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj_ubah}(h]h ]h"]h$]h&]uh1jlhj\ubjm)}(hhh]h)}(hXThe device is started at boot time. If you're not sure, this is probably what you want.h]hZThe device is started at boot time. If you’re not sure, this is probably what you want.}(hjyhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjvubah}(h]h ]h"]h$]h&]uh1jlhj\ubeh}(h]h ]h"]h$]h&]uh1jghjYubjh)}(hhh](jm)}(hhh]h)}(hmanualh]hmanual}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubjm)}(hhh]h)}(hThe device is started only when ifup is called manually. Bonding devices may be configured this way if you do not wish them to start automatically at boot for some reason.h]hThe device is started only when ifup is called manually. Bonding devices may be configured this way if you do not wish them to start automatically at boot for some reason.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubeh}(h]h ]h"]h$]h&]uh1jghjYubjh)}(hhh](jm)}(hhh]h)}(hhotplugh]hhotplug}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubjm)}(hhh]h)}(h[The device is started by a hotplug event. This is not a valid choice for a bonding device.h]h[The device is started by a hotplug event. This is not a valid choice for a bonding device.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubeh}(h]h ]h"]h$]h&]uh1jghjYubjh)}(hhh](jm)}(hhh]h)}(hoff orh]hoff or}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubjm)}(hhh]h)}(h$The device configuration is ignored.h]h$The device configuration is ignored.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jlhjubeh}(h]h ]h"]h$]h&]uh1jghjYubjh)}(hhh](jm)}(hhh]h)}(hignoreh]hignore}(hj>hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj;ubah}(h]h ]h"]h$]h&]uh1jlhj8ubjm)}(hhh]h}(h]h ]h"]h$]h&]uh1jlhj8ubeh}(h]h ]h"]h$]h&]uh1jghjYubeh}(h]h ]h"]h$]h&]uh1jhjBubeh}(h]h ]h"]h$]h&]colsKuh1jGhj?ubah}(h]h ]h"]h$]h&]uh1jBhj;ubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(htThe line BONDING_MASTER='yes' indicates that the device is a bonding master device. The only useful value is "yes."h]h|The line BONDING_MASTER=’yes’ indicates that the device is a bonding master device. The only useful value is “yes.”}(hjzhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hX5The contents of BONDING_MODULE_OPTS are supplied to the instance of the bonding module for this device. Specify the options for the bonding mode, link monitoring, and so on here. Do not include the max_bonds bonding parameter; this will confuse the configuration system if you have multiple bonding devices.h]hX5The contents of BONDING_MODULE_OPTS are supplied to the instance of the bonding module for this device. Specify the options for the bonding mode, link monitoring, and so on here. Do not include the max_bonds bonding parameter; this will confuse the configuration system if you have multiple bonding devices.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hXFinally, supply one BONDING_SLAVEn="slave device" for each slave. where "n" is an increasing value, one for each slave. The "slave device" is either an interface name, e.g., "eth0", or a device specifier for the network device. The interface name is easier to find, but the ethN names are subject to change at boot time if, e.g., a device early in the sequence has failed. The device specifiers (bus-pci-0000:06:08.1 in the example above) specify the physical network device, and will not change unless the device's bus location changes (for example, it is moved from one PCI slot to another). The example above uses one of each type for demonstration purposes; most configurations will choose one or the other for all slave devices.h]hXFinally, supply one BONDING_SLAVEn=”slave device” for each slave. where “n” is an increasing value, one for each slave. The “slave device” is either an interface name, e.g., “eth0”, or a device specifier for the network device. The interface name is easier to find, but the ethN names are subject to change at boot time if, e.g., a device early in the sequence has failed. The device specifiers (bus-pci-0000:06:08.1 in the example above) specify the physical network device, and will not change unless the device’s bus location changes (for example, it is moved from one PCI slot to another). The example above uses one of each type for demonstration purposes; most configurations will choose one or the other for all slave devices.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hWhen all configuration files have been modified or created, networking must be restarted for the configuration changes to take effect. This can be accomplished via the following::h]hWhen all configuration files have been modified or created, networking must be restarted for the configuration changes to take effect. This can be accomplished via the following:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubj)}(h# /etc/init.d/network restarth]h# /etc/init.d/network restart}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjXhhubh)}(hNote that the network control script (/sbin/ifdown) will remove the bonding module as part of the network shutdown processing, so it is not necessary to remove the module by hand if, e.g., the module parameters have changed.h]hNote that the network control script (/sbin/ifdown) will remove the bonding module as part of the network shutdown processing, so it is not necessary to remove the module by hand if, e.g., the module parameters have changed.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hAlso, at this writing, YaST/YaST2 will not manage bonding devices (they do not show bonding interfaces on its list of network devices). It is necessary to edit the configuration file by hand to change the bonding configuration.h]hAlso, at this writing, YaST/YaST2 will not manage bonding devices (they do not show bonding interfaces on its list of network devices). It is necessary to edit the configuration file by hand to change the bonding configuration.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubh)}(hpAdditional general options and details of the ifcfg file format can be found in an example ifcfg template file::h]hoAdditional general options and details of the ifcfg file format can be found in an example ifcfg template file:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubj)}(h%/etc/sysconfig/network/ifcfg.templateh]h%/etc/sysconfig/network/ifcfg.template}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjXhhubh)}(hNote that the template does not document the various ``BONDING_*`` settings described above, but does describe many of the other options.h](h5Note that the template does not document the various }(hjhhhNhNubj)}(h ``BONDING_*``h]h BONDING_*}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jhjubhG settings described above, but does describe many of the other options.}(hjhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhjXhhubeh}(h]$configuration-with-sysconfig-supportah ]h"](3.1 configuration with sysconfig supportah$]h&]uh1hhjhhhhhMLubh)}(hhh](h)}(h3.1.1 Using DHCP with Sysconfigh]h3.1.1 Using DHCP with Sysconfig}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj hhhhhMubh)}(hXaUnder sysconfig, configuring a device with BOOTPROTO='dhcp' will cause it to query DHCP for its IP address information. At this writing, this does not function for bonding devices; the scripts attempt to obtain the device address from DHCP prior to adding any of the slave devices. Without active slaves, the DHCP requests are not sent to the network.h]hXeUnder sysconfig, configuring a device with BOOTPROTO=’dhcp’ will cause it to query DHCP for its IP address information. At this writing, this does not function for bonding devices; the scripts attempt to obtain the device address from DHCP prior to adding any of the slave devices. Without active slaves, the DHCP requests are not sent to the network.}(hj1hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubeh}(h]using-dhcp-with-sysconfigah ]h"]3.1.1 using dhcp with sysconfigah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h/3.1.2 Configuring Multiple Bonds with Sysconfigh]h/3.1.2 Configuring Multiple Bonds with Sysconfig}(hjJhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjGhhhhhMubh)}(hXThe sysconfig network initialization system is capable of handling multiple bonding devices. All that is necessary is for each bonding instance to have an appropriately configured ifcfg-bondX file (as described above). Do not specify the "max_bonds" parameter to any instance of bonding, as this will confuse sysconfig. If you require multiple bonding devices with identical parameters, create multiple ifcfg-bondX files.h]hXThe sysconfig network initialization system is capable of handling multiple bonding devices. All that is necessary is for each bonding instance to have an appropriately configured ifcfg-bondX file (as described above). Do not specify the “max_bonds” parameter to any instance of bonding, as this will confuse sysconfig. If you require multiple bonding devices with identical parameters, create multiple ifcfg-bondX files.}(hjXhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjGhhubh)}(hBecause the sysconfig scripts supply the bonding module options in the ifcfg-bondX file, it is not necessary to add them to the system ``/etc/modules.d/*.conf`` configuration files.h](hBecause the sysconfig scripts supply the bonding module options in the ifcfg-bondX file, it is not necessary to add them to the system }(hjfhhhNhNubj)}(h``/etc/modules.d/*.conf``h]h/etc/modules.d/*.conf}(hjnhhhNhNubah}(h]h ]h"]h$]h&]uh1jhjfubh configuration files.}(hjfhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhjGhhubeh}(h])configuring-multiple-bonds-with-sysconfigah ]h"]/3.1.2 configuring multiple bonds with sysconfigah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h*3.2 Configuration with Initscripts Supporth]h*3.2 Configuration with Initscripts Support}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hXThis section applies to distros using a recent version of initscripts with bonding support, for example, Red Hat Enterprise Linux version 3 or later, Fedora, etc. On these systems, the network initialization scripts have knowledge of bonding, and can be configured to control bonding devices. Note that older versions of the initscripts package have lower levels of support for bonding; this will be noted where applicable.h]hXThis section applies to distros using a recent version of initscripts with bonding support, for example, Red Hat Enterprise Linux version 3 or later, Fedora, etc. On these systems, the network initialization scripts have knowledge of bonding, and can be configured to control bonding devices. Note that older versions of the initscripts package have lower levels of support for bonding; this will be noted where applicable.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXAThese distros will not automatically load the network adapter driver unless the ethX device is configured with an IP address. Because of this constraint, users must manually configure a network-script file for all physical adapters that will be members of a bondX link. Network script files are located in the directory:h]hXAThese distros will not automatically load the network adapter driver unless the ethX device is configured with an IP address. Because of this constraint, users must manually configure a network-script file for all physical adapters that will be members of a bondX link. Network script files are located in the directory:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h/etc/sysconfig/network-scriptsh]h/etc/sysconfig/network-scripts}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hThe file name must be prefixed with "ifcfg-eth" and suffixed with the adapter's physical adapter number. For example, the script for eth0 would be named /etc/sysconfig/network-scripts/ifcfg-eth0. Place the following text in the file::h]hThe file name must be prefixed with “ifcfg-eth” and suffixed with the adapter’s physical adapter number. For example, the script for eth0 would be named /etc/sysconfig/network-scripts/ifcfg-eth0. Place the following text in the file:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hGDEVICE=eth0 USERCTL=no ONBOOT=yes MASTER=bond0 SLAVE=yes BOOTPROTO=noneh]hGDEVICE=eth0 USERCTL=no ONBOOT=yes MASTER=bond0 SLAVE=yes BOOTPROTO=none}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(hXThe DEVICE= line will be different for every ethX device and must correspond with the name of the file, i.e., ifcfg-eth1 must have a device line of DEVICE=eth1. The setting of the MASTER= line will also depend on the final bonding interface name chosen for your bond. As with other network devices, these typically start at 0, and go up one for each device, i.e., the first bonding instance is bond0, the second is bond1, and so on.h]hXThe DEVICE= line will be different for every ethX device and must correspond with the name of the file, i.e., ifcfg-eth1 must have a device line of DEVICE=eth1. The setting of the MASTER= line will also depend on the final bonding interface name chosen for your bond. As with other network devices, these typically start at 0, and go up one for each device, i.e., the first bonding instance is bond0, the second is bond1, and so on.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hX"Next, create a bond network script. The file name for this script will be /etc/sysconfig/network-scripts/ifcfg-bondX where X is the number of the bond. For bond0 the file is named "ifcfg-bond0", for bond1 it is named "ifcfg-bond1", and so on. Within that file, place the following text::h]hX)Next, create a bond network script. The file name for this script will be /etc/sysconfig/network-scripts/ifcfg-bondX where X is the number of the bond. For bond0 the file is named “ifcfg-bond0”, for bond1 it is named “ifcfg-bond1”, and so on. Within that file, place the following text:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hDEVICE=bond0 IPADDR=192.168.1.1 NETMASK=255.255.255.0 NETWORK=192.168.1.0 BROADCAST=192.168.1.255 ONBOOT=yes BOOTPROTO=none USERCTL=noh]hDEVICE=bond0 IPADDR=192.168.1.1 NETMASK=255.255.255.0 NETWORK=192.168.1.0 BROADCAST=192.168.1.255 ONBOOT=yes BOOTPROTO=none USERCTL=no}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(h}Be sure to change the networking specific lines (IPADDR, NETMASK, NETWORK and BROADCAST) to match your network configuration.h]h}Be sure to change the networking specific lines (IPADDR, NETMASK, NETWORK and BROADCAST) to match your network configuration.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hFor later versions of initscripts, such as that found with Fedora 7 (or later) and Red Hat Enterprise Linux version 5 (or later), it is possible, and, indeed, preferable, to specify the bonding options in the ifcfg-bond0 file, e.g. a line of the format::h]hFor later versions of initscripts, such as that found with Fedora 7 (or later) and Red Hat Enterprise Linux version 5 (or later), it is possible, and, indeed, preferable, to specify the bonding options in the ifcfg-bond0 file, e.g. a line of the format:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hjhhubj)}(hMBONDING_OPTS="mode=active-backup arp_interval=60 arp_ip_target=192.168.1.254"h]hMBONDING_OPTS="mode=active-backup arp_interval=60 arp_ip_target=192.168.1.254"}hj+sbah}(h]h ]h"]h$]h&]hhuh1jhhhM'hjhhubh)}(hXwill configure the bond with the specified options. The options specified in BONDING_OPTS are identical to the bonding module parameters except for the arp_ip_target field when using versions of initscripts older than and 8.57 (Fedora 8) and 8.45.19 (Red Hat Enterprise Linux 5.2). When using older versions each target should be included as a separate option and should be preceded by a '+' to indicate it should be added to the list of queried targets, e.g.,::h]hXwill configure the bond with the specified options. The options specified in BONDING_OPTS are identical to the bonding module parameters except for the arp_ip_target field when using versions of initscripts older than and 8.57 (Fedora 8) and 8.45.19 (Red Hat Enterprise Linux 5.2). When using older versions each target should be included as a separate option and should be preceded by a ‘+’ to indicate it should be added to the list of queried targets, e.g.,:}(hj9hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM)hjhhubj)}(h5arp_ip_target=+192.168.1.1 arp_ip_target=+192.168.1.2h]h5arp_ip_target=+192.168.1.1 arp_ip_target=+192.168.1.2}hjGsbah}(h]h ]h"]h$]h&]hhuh1jhhhM1hjhhubh)}(his the proper syntax to specify multiple targets. When specifying options via BONDING_OPTS, it is not necessary to edit ``/etc/modprobe.d/*.conf``.h](hyis the proper syntax to specify multiple targets. When specifying options via BONDING_OPTS, it is not necessary to edit }(hjUhhhNhNubj)}(h``/etc/modprobe.d/*.conf``h]h/etc/modprobe.d/*.conf}(hj]hhhNhNubah}(h]h ]h"]h$]h&]uh1jhjUubh.}(hjUhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhM3hjhhubh)}(hXVFor even older versions of initscripts that do not support BONDING_OPTS, it is necessary to edit /etc/modprobe.d/*.conf, depending upon your distro) to load the bonding module with your desired options when the bond0 interface is brought up. The following lines in /etc/modprobe.d/*.conf will load the bonding module, and select its options:h](hqFor even older versions of initscripts that do not support BONDING_OPTS, it is necessary to edit /etc/modprobe.d/}(hjuhhhNhNubhemphasis)}(h*.conf, depending upon your distro) to load the bonding module with your desired options when the bond0 interface is brought up. The following lines in /etc/modprobe.d/*h]h.conf, depending upon your distro) to load the bonding module with your desired options when the bond0 interface is brought up. The following lines in /etc/modprobe.d/}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1j}hjuubh;.conf will load the bonding module, and select its options:}(hjuhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhM7hjhhubh)}(h>alias bond0 bonding options bond0 mode=balance-alb miimon=100 h]h)}(h=alias bond0 bonding options bond0 mode=balance-alb miimon=100h]h=alias bond0 bonding options bond0 mode=balance-alb miimon=100}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hjubah}(h]h ]h"]h$]h&]uh1hhhhM=hjhhubh)}(hYReplace the sample parameters with the appropriate set of options for your configuration.h]hYReplace the sample parameters with the appropriate set of options for your configuration.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM@hjhhubh)}(hFinally run "/etc/rc.d/init.d/network restart" as root. This will restart the networking subsystem and your bond link should be now up and running.h]hFinally run “/etc/rc.d/init.d/network restart” as root. This will restart the networking subsystem and your bond link should be now up and running.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMChjhhubeh}(h]&configuration-with-initscripts-supportah ]h"]*3.2 configuration with initscripts supportah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h!3.2.1 Using DHCP with Initscriptsh]h!3.2.1 Using DHCP with Initscripts}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMHubh)}(hRecent versions of initscripts (the versions supplied with Fedora Core 3 and Red Hat Enterprise Linux 4, or later versions, are reported to work) have support for assigning IP information to bonding devices via DHCP.h]hRecent versions of initscripts (the versions supplied with Fedora Core 3 and Red Hat Enterprise Linux 4, or later versions, are reported to work) have support for assigning IP information to bonding devices via DHCP.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMJhjhhubh)}(hTo configure bonding for DHCP, configure it as described above, except replace the line "BOOTPROTO=none" with "BOOTPROTO=dhcp" and add a line consisting of "TYPE=Bonding". Note that the TYPE value is case sensitive.h]hTo configure bonding for DHCP, configure it as described above, except replace the line “BOOTPROTO=none” with “BOOTPROTO=dhcp” and add a line consisting of “TYPE=Bonding”. Note that the TYPE value is case sensitive.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMOhjhhubeh}(h]using-dhcp-with-initscriptsah ]h"]!3.2.1 using dhcp with initscriptsah$]h&]uh1hhjhhhhhMHubh)}(hhh](h)}(h13.2.2 Configuring Multiple Bonds with Initscriptsh]h13.2.2 Configuring Multiple Bonds with Initscripts}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMUubh)}(hXInitscripts packages that are included with Fedora 7 and Red Hat Enterprise Linux 5 support multiple bonding interfaces by simply specifying the appropriate BONDING_OPTS= in ifcfg-bondX where X is the number of the bond. This support requires sysfs support in the kernel, and a bonding driver of version 3.0.0 or later. Other configurations may not support this method for specifying multiple bonding interfaces; for those instances, see the "Configuring Multiple Bonds Manually" section, below.h]hXInitscripts packages that are included with Fedora 7 and Red Hat Enterprise Linux 5 support multiple bonding interfaces by simply specifying the appropriate BONDING_OPTS= in ifcfg-bondX where X is the number of the bond. This support requires sysfs support in the kernel, and a bonding driver of version 3.0.0 or later. Other configurations may not support this method for specifying multiple bonding interfaces; for those instances, see the “Configuring Multiple Bonds Manually” section, below.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMWhjhhubeh}(h]+configuring-multiple-bonds-with-initscriptsah ]h"]13.2.2 configuring multiple bonds with initscriptsah$]h&]uh1hhjhhhhhMUubh)}(hhh](h)}(h.3.3 Configuring Bonding Manually with iproute2h]h.3.3 Configuring Bonding Manually with iproute2}(hj2hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj/hhhhhMaubh)}(hThis section applies to distros whose network initialization scripts (the sysconfig or initscripts package) do not have specific knowledge of bonding. One such distro is SuSE Linux Enterprise Server version 8.h]hThis section applies to distros whose network initialization scripts (the sysconfig or initscripts package) do not have specific knowledge of bonding. One such distro is SuSE Linux Enterprise Server version 8.}(hj@hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMchj/hhubh)}(hXwThe general method for these systems is to place the bonding module parameters into a config file in /etc/modprobe.d/ (as appropriate for the installed distro), then add modprobe and/or `ip link` commands to the system's global init script. The name of the global init script differs; for sysconfig, it is /etc/init.d/boot.local and for initscripts it is /etc/rc.d/rc.local.h](hThe general method for these systems is to place the bonding module parameters into a config file in /etc/modprobe.d/ (as appropriate for the installed distro), then add modprobe and/or }(hjNhhhNhNubhtitle_reference)}(h `ip link`h]hip link}(hjXhhhNhNubah}(h]h ]h"]h$]h&]uh1jVhjNubh commands to the system’s global init script. The name of the global init script differs; for sysconfig, it is /etc/init.d/boot.local and for initscripts it is /etc/rc.d/rc.local.}(hjNhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhhj/hhubh)}(hFor example, if you wanted to make a simple bond of two e100 devices (presumed to be eth0 and eth1), and have it persist across reboots, edit the appropriate file (/etc/init.d/boot.local or /etc/rc.d/rc.local), and add the following::h]hFor example, if you wanted to make a simple bond of two e100 devices (presumed to be eth0 and eth1), and have it persist across reboots, edit the appropriate file (/etc/init.d/boot.local or /etc/rc.d/rc.local), and add the following:}(hjphhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMohj/hhubj)}(hmodprobe bonding mode=balance-alb miimon=100 modprobe e100 ifconfig bond0 192.168.1.1 netmask 255.255.255.0 up ip link set eth0 master bond0 ip link set eth1 master bond0h]hmodprobe bonding mode=balance-alb miimon=100 modprobe e100 ifconfig bond0 192.168.1.1 netmask 255.255.255.0 up ip link set eth0 master bond0 ip link set eth1 master bond0}hj~sbah}(h]h ]h"]h$]h&]hhuh1jhhhMthj/hhubh)}(hReplace the example bonding module parameters and bond0 network configuration (IP address, netmask, etc) with the appropriate values for your configuration.h]hReplace the example bonding module parameters and bond0 network configuration (IP address, netmask, etc) with the appropriate values for your configuration.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhj/hhubh)}(hUnfortunately, this method will not provide support for the ifup and ifdown scripts on the bond devices. To reload the bonding configuration, it is necessary to run the initialization script, e.g.,::h]hUnfortunately, this method will not provide support for the ifup and ifdown scripts on the bond devices. To reload the bonding configuration, it is necessary to run the initialization script, e.g.,:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM~hj/hhubj)}(h# /etc/init.d/boot.localh]h# /etc/init.d/boot.local}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj/hhubh)}(hor::h]hor:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj/hhubj)}(h# /etc/rc.d/rc.localh]h# /etc/rc.d/rc.local}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj/hhubh)}(hXIt may be desirable in such a case to create a separate script which only initializes the bonding configuration, then call that separate script from within boot.local. This allows for bonding to be enabled without re-running the entire global init script.h]hXIt may be desirable in such a case to create a separate script which only initializes the bonding configuration, then call that separate script from within boot.local. This allows for bonding to be enabled without re-running the entire global init script.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj/hhubh)}(hTo shut down the bonding devices, it is necessary to first mark the bonding device itself as being down, then remove the appropriate device driver modules. For our example above, you can do the following::h]hTo shut down the bonding devices, it is necessary to first mark the bonding device itself as being down, then remove the appropriate device driver modules. For our example above, you can do the following:}(hjh'hhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj/hhubj)}(h2# ifconfig bond0 down # rmmod bonding # rmmod e100h]h2# ifconfig bond0 down # rmmod bonding # rmmod e100}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj/hhubh)}(hSAgain, for convenience, it may be desirable to create a script with these commands.h]hSAgain, for convenience, it may be desirable to create a script with these commands.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj/hhubeh}(h]*configuring-bonding-manually-with-iproute2ah ]h"].3.3 configuring bonding manually with iproute2ah$]h&]uh1hhjhhhhhMaubh)}(hhh](h)}(h)3.3.1 Configuring Multiple Bonds Manuallyh]h)3.3.1 Configuring Multiple Bonds Manually}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hThis section contains information on configuring multiple bonding devices with differing options for those systems whose network initialization scripts lack support for configuring multiple bonds.h]hThis section contains information on configuring multiple bonding devices with differing options for those systems whose network initialization scripts lack support for configuring multiple bonds.}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hIf you require multiple bonding devices, but all with the same options, you may wish to use the "max_bonds" module parameter, documented above.h]hIf you require multiple bonding devices, but all with the same options, you may wish to use the “max_bonds” module parameter, documented above.}(hj1hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hTo create multiple bonding devices with differing options, it is preferable to use bonding parameters exported by sysfs, documented in the section below.h]hTo create multiple bonding devices with differing options, it is preferable to use bonding parameters exported by sysfs, documented in the section below.}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXFor versions of bonding without sysfs support, the only means to provide multiple instances of bonding with differing options is to load the bonding driver multiple times. Note that current versions of the sysconfig network initialization scripts handle this automatically; if your distro uses these scripts, no special action is needed. See the section Configuring Bonding Devices, above, if you're not sure about your network initialization scripts.h]hXFor versions of bonding without sysfs support, the only means to provide multiple instances of bonding with differing options is to load the bonding driver multiple times. Note that current versions of the sysconfig network initialization scripts handle this automatically; if your distro uses these scripts, no special action is needed. See the section Configuring Bonding Devices, above, if you’re not sure about your network initialization scripts.}(hjMhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXWTo load multiple instances of the module, it is necessary to specify a different name for each instance (the module loading system requires that every loaded module, even multiple instances of the same module, have a unique name). This is accomplished by supplying multiple sets of bonding options in ``/etc/modprobe.d/*.conf``, for example::h](hX.To load multiple instances of the module, it is necessary to specify a different name for each instance (the module loading system requires that every loaded module, even multiple instances of the same module, have a unique name). This is accomplished by supplying multiple sets of bonding options in }(hj[hhhNhNubj)}(h``/etc/modprobe.d/*.conf``h]h/etc/modprobe.d/*.conf}(hjchhhNhNubah}(h]h ]h"]h$]h&]uh1jhj[ubh, for example:}(hj[hhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(halias bond0 bonding options bond0 -o bond0 mode=balance-rr miimon=100 alias bond1 bonding options bond1 -o bond1 mode=balance-alb miimon=50h]halias bond0 bonding options bond0 -o bond0 mode=balance-rr miimon=100 alias bond1 bonding options bond1 -o bond1 mode=balance-alb miimon=50}hj{sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(hXwill load the bonding module two times. The first instance is named "bond0" and creates the bond0 device in balance-rr mode with an miimon of 100. The second instance is named "bond1" and creates the bond1 device in balance-alb mode with an miimon of 50.h]hXwill load the bonding module two times. The first instance is named “bond0” and creates the bond0 device in balance-rr mode with an miimon of 100. The second instance is named “bond1” and creates the bond1 device in balance-alb mode with an miimon of 50.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hIn some circumstances (typically with older distributions), the above does not work, and the second bonding instance never sees its options. In that case, the second options line can be substituted as follows::h]hIn some circumstances (typically with older distributions), the above does not work, and the second bonding instance never sees its options. In that case, the second options line can be substituted as follows:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hxinstall bond1 /sbin/modprobe --ignore-install bonding -o bond1 \ mode=balance-alb miimon=50h]hxinstall bond1 /sbin/modprobe --ignore-install bonding -o bond1 \ mode=balance-alb miimon=50}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(hzThis may be repeated any number of times, specifying a new and unique name in place of bond1 for each subsequent instance.h]hzThis may be repeated any number of times, specifying a new and unique name in place of bond1 for each subsequent instance.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXIt has been observed that some Red Hat supplied kernels are unable to rename modules at load time (the "-o bond1" part). Attempts to pass that option to modprobe will produce an "Operation not permitted" error. This has been reported on some Fedora Core kernels, and has been seen on RHEL 4 as well. On kernels exhibiting this problem, it will be impossible to configure multiple bonds with differing parameters (as they are older kernels, and also lack sysfs support).h]hXIt has been observed that some Red Hat supplied kernels are unable to rename modules at load time (the “-o bond1” part). Attempts to pass that option to modprobe will produce an “Operation not permitted” error. This has been reported on some Fedora Core kernels, and has been seen on RHEL 4 as well. On kernels exhibiting this problem, it will be impossible to configure multiple bonds with differing parameters (as they are older kernels, and also lack sysfs support).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h]#configuring-multiple-bonds-manuallyah ]h"])3.3.1 configuring multiple bonds manuallyah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h*3.4 Configuring Bonding Manually via Sysfsh]h*3.4 Configuring Bonding Manually via Sysfs}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hX7Starting with version 3.0.0, Channel Bonding may be configured via the sysfs interface. This interface allows dynamic configuration of all bonds in the system without unloading the module. It also allows for adding and removing bonds at runtime. Ifenslave is no longer required, though it is still supported.h]hX7Starting with version 3.0.0, Channel Bonding may be configured via the sysfs interface. This interface allows dynamic configuration of all bonds in the system without unloading the module. It also allows for adding and removing bonds at runtime. Ifenslave is no longer required, though it is still supported.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hUse of the sysfs interface allows you to use multiple bonds with different configurations without having to reload the module. It also allows you to use multiple, differently configured bonds when bonding is compiled into the kernel.h]hUse of the sysfs interface allows you to use multiple bonds with different configurations without having to reload the module. It also allows you to use multiple, differently configured bonds when bonding is compiled into the kernel.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hXYou must have the sysfs filesystem mounted to configure bonding this way. The examples in this document assume that you are using the standard mount point for sysfs, e.g. /sys. If your sysfs filesystem is mounted elsewhere, you will need to adjust the example paths accordingly.h]hXYou must have the sysfs filesystem mounted to configure bonding this way. The examples in this document assume that you are using the standard mount point for sysfs, e.g. /sys. If your sysfs filesystem is mounted elsewhere, you will need to adjust the example paths accordingly.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h]&configuring-bonding-manually-via-sysfsah ]h"]*3.4 configuring bonding manually via sysfsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hCreating and Destroying Bondsh]hCreating and Destroying Bonds}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hTo add a new bond foo::h]hTo add a new bond foo:}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(h,# echo +foo > /sys/class/net/bonding_mastersh]h,# echo +foo > /sys/class/net/bonding_masters}hj9sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(h To remove an existing bond bar::h]hTo remove an existing bond bar:}(hjGhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(h,# echo -bar > /sys/class/net/bonding_mastersh]h,# echo -bar > /sys/class/net/bonding_masters}hjUsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(hTo show all existing bonds::h]hTo show all existing bonds:}(hjchhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(h$# cat /sys/class/net/bonding_mastersh]h$# cat /sys/class/net/bonding_masters}hjqsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubhnote)}(hdue to 4K size limitation of sysfs files, this list may be truncated if you have more than a few hundred bonds. This is unlikely to occur under normal operating conditions.h]h)}(hdue to 4K size limitation of sysfs files, this list may be truncated if you have more than a few hundred bonds. This is unlikely to occur under normal operating conditions.h]hdue to 4K size limitation of sysfs files, this list may be truncated if you have more than a few hundred bonds. This is unlikely to occur under normal operating conditions.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]creating-and-destroying-bondsah ]h"]creating and destroying bondsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hAdding and Removing Slavesh]hAdding and Removing Slaves}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hInterfaces may be enslaved to a bond using the file /sys/class/net//bonding/slaves. The semantics for this file are the same as for the bonding_masters file.h]hInterfaces may be enslaved to a bond using the file /sys/class/net//bonding/slaves. The semantics for this file are the same as for the bonding_masters file.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h)To enslave interface eth0 to bond bond0::h]h(To enslave interface eth0 to bond bond0:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hF# ifconfig bond0 up # echo +eth0 > /sys/class/net/bond0/bonding/slavesh]hF# ifconfig bond0 up # echo +eth0 > /sys/class/net/bond0/bonding/slaves}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(h$To free slave eth0 from bond bond0::h]h#To free slave eth0 from bond bond0:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(h2# echo -eth0 > /sys/class/net/bond0/bonding/slavesh]h2# echo -eth0 > /sys/class/net/bond0/bonding/slaves}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhM hjhhubh)}(hXWhen an interface is enslaved to a bond, symlinks between the two are created in the sysfs filesystem. In this case, you would get /sys/class/net/bond0/slave_eth0 pointing to /sys/class/net/eth0, and /sys/class/net/eth0/master pointing to /sys/class/net/bond0.h]hXWhen an interface is enslaved to a bond, symlinks between the two are created in the sysfs filesystem. In this case, you would get /sys/class/net/bond0/slave_eth0 pointing to /sys/class/net/eth0, and /sys/class/net/eth0/master pointing to /sys/class/net/bond0.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjhhubh)}(hXThis means that you can tell quickly whether or not an interface is enslaved by looking for the master symlink. Thus: # echo -eth0 > /sys/class/net/eth0/master/bonding/slaves will free eth0 from whatever bond it is enslaved to, regardless of the name of the bond interface.h]hXThis means that you can tell quickly whether or not an interface is enslaved by looking for the master symlink. Thus: # echo -eth0 > /sys/class/net/eth0/master/bonding/slaves will free eth0 from whatever bond it is enslaved to, regardless of the name of the bond interface.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h]adding-and-removing-slavesah ]h"]adding and removing slavesah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hChanging a Bond's Configurationh]h!Changing a Bond’s Configuration}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hpEach bond may be configured individually by manipulating the files located in /sys/class/net//bondingh]hpEach bond may be configured individually by manipulating the files located in /sys/class/net//bonding}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hThe names of these files correspond directly with the command- line parameters described elsewhere in this file, and, with the exception of arp_ip_target, they accept the same values. To see the current setting, simply cat the appropriate file.h]hThe names of these files correspond directly with the command- line parameters described elsewhere in this file, and, with the exception of arp_ip_target, they accept the same values. To see the current setting, simply cat the appropriate file.}(hj;hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hA few examples will be given here; for specific usage guidelines for each parameter, see the appropriate section in this document.h]hA few examples will be given here; for specific usage guidelines for each parameter, see the appropriate section in this document.}(hjIhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hjhhubh)}(h)To configure bond0 for balance-alb mode::h]h(To configure bond0 for balance-alb mode:}(hjWhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hjhhubj)}(h# ifconfig bond0 down # echo 6 > /sys/class/net/bond0/bonding/mode - or - # echo balance-alb > /sys/class/net/bond0/bonding/modeh]h# ifconfig bond0 down # echo 6 > /sys/class/net/bond0/bonding/mode - or - # echo balance-alb > /sys/class/net/bond0/bonding/mode}hjesbah}(h]h ]h"]h$]h&]hhuh1jhhhM'hjhhubj)}(h?The bond interface must be down before the mode can be changed.h]h)}(hjuh]h?The bond interface must be down before the mode can be changed.}(hjwhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM.hjsubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubh)}(h /sys/class/net/bond0/bonding/miimonh]h1# echo 1000 > /sys/class/net/bond0/bonding/miimon}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhM2hjhhubj)}(h^If ARP monitoring is enabled, it will disabled when MII monitoring is enabled, and vice-versa.h]h)}(h^If ARP monitoring is enabled, it will disabled when MII monitoring is enabled, and vice-versa.h]h^If ARP monitoring is enabled, it will disabled when MII monitoring is enabled, and vice-versa.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM6hjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubh)}(hTo add ARP targets::h]hTo add ARP targets:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM9hjhhubj)}(h# echo +192.168.0.100 > /sys/class/net/bond0/bonding/arp_ip_target # echo +192.168.0.101 > /sys/class/net/bond0/bonding/arp_ip_targeth]h# echo +192.168.0.100 > /sys/class/net/bond0/bonding/arp_ip_target # echo +192.168.0.101 > /sys/class/net/bond0/bonding/arp_ip_target}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhM;hjhhubj)}(h+up to 16 target addresses may be specified.h]h)}(hjh]h+up to 16 target addresses may be specified.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM@hjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubh)}(hTo remove an ARP target::h]hTo remove an ARP target:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMBhjhhubj)}(hB# echo -192.168.0.100 > /sys/class/net/bond0/bonding/arp_ip_targeth]hB# echo -192.168.0.100 > /sys/class/net/bond0/bonding/arp_ip_target}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMDhjhhubh)}(h=To configure the interval between learning packet transmits::h]h /sys/class/net/bond0/bonding/lp_intervalh]h4# echo 12 > /sys/class/net/bond0/bonding/lp_interval}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMHhjhhubj)}(hthe lp_interval is the number of seconds between instances where the bonding driver sends learning packets to each slaves peer switch. The default interval is 1 second.h]h)}(hthe lp_interval is the number of seconds between instances where the bonding driver sends learning packets to each slaves peer switch. The default interval is 1 second.h]hthe lp_interval is the number of seconds between instances where the bonding driver sends learning packets to each slaves peer switch. The default interval is 1 second.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMLhj)ubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]changing-a-bond-s-configurationah ]h"]changing a bond's configurationah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hExample Configurationh]hExample Configuration}(hjLhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjIhhhhhMQubh)}(hnWe begin with the same example that is shown in section 3.3, executed with sysfs, and without using ifenslave.h]hnWe begin with the same example that is shown in section 3.3, executed with sysfs, and without using ifenslave.}(hjZhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMRhjIhhubh)}(hTo make a simple bond of two e100 devices (presumed to be eth0 and eth1), and have it persist across reboots, edit the appropriate file (/etc/init.d/boot.local or /etc/rc.d/rc.local), and add the following::h]hTo make a simple bond of two e100 devices (presumed to be eth0 and eth1), and have it persist across reboots, edit the appropriate file (/etc/init.d/boot.local or /etc/rc.d/rc.local), and add the following:}(hjhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMUhjIhhubj)}(hXmodprobe bonding modprobe e100 echo balance-alb > /sys/class/net/bond0/bonding/mode ifconfig bond0 192.168.1.1 netmask 255.255.255.0 up echo 100 > /sys/class/net/bond0/bonding/miimon echo +eth0 > /sys/class/net/bond0/bonding/slaves echo +eth1 > /sys/class/net/bond0/bonding/slavesh]hXmodprobe bonding modprobe e100 echo balance-alb > /sys/class/net/bond0/bonding/mode ifconfig bond0 192.168.1.1 netmask 255.255.255.0 up echo 100 > /sys/class/net/bond0/bonding/miimon echo +eth0 > /sys/class/net/bond0/bonding/slaves echo +eth1 > /sys/class/net/bond0/bonding/slaves}hjvsbah}(h]h ]h"]h$]h&]hhuh1jhhhMZhjIhhubh)}(hTo add a second bond, with two e1000 interfaces in active-backup mode, using ARP monitoring, add the following lines to your init script::h]hTo add a second bond, with two e1000 interfaces in active-backup mode, using ARP monitoring, add the following lines to your init script:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMbhjIhhubj)}(hX}modprobe e1000 echo +bond1 > /sys/class/net/bonding_masters echo active-backup > /sys/class/net/bond1/bonding/mode ifconfig bond1 192.168.2.1 netmask 255.255.255.0 up echo +192.168.2.100 /sys/class/net/bond1/bonding/arp_ip_target echo 2000 > /sys/class/net/bond1/bonding/arp_interval echo +eth2 > /sys/class/net/bond1/bonding/slaves echo +eth3 > /sys/class/net/bond1/bonding/slavesh]hX}modprobe e1000 echo +bond1 > /sys/class/net/bonding_masters echo active-backup > /sys/class/net/bond1/bonding/mode ifconfig bond1 192.168.2.1 netmask 255.255.255.0 up echo +192.168.2.100 /sys/class/net/bond1/bonding/arp_ip_target echo 2000 > /sys/class/net/bond1/bonding/arp_interval echo +eth2 > /sys/class/net/bond1/bonding/slaves echo +eth3 > /sys/class/net/bond1/bonding/slaves}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMfhjIhhubeh}(h]example-configurationah ]h"]example configurationah$]h&]uh1hhjhhhhhMQubh)}(hhh](h)}(h)3.5 Configuration with Interfaces Supporth]h)3.5 Configuration with Interfaces Support}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMpubh)}(hThis section applies to distros which use /etc/network/interfaces file to describe network interface configuration, most notably Debian and its derivatives.h]hThis section applies to distros which use /etc/network/interfaces file to describe network interface configuration, most notably Debian and its derivatives.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMrhjhhubh)}(hThe ifup and ifdown commands on Debian don't support bonding out of the box. The ifenslave-2.6 package should be installed to provide bonding support. Once installed, this package will provide ``bond-*`` options to be used into /etc/network/interfaces.h](hThe ifup and ifdown commands on Debian don’t support bonding out of the box. The ifenslave-2.6 package should be installed to provide bonding support. Once installed, this package will provide }(hjhhhNhNubj)}(h ``bond-*``h]hbond-*}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jhjubh1 options to be used into /etc/network/interfaces.}(hjhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMvhjhhubh)}(hlNote that ifenslave-2.6 package will load the bonding module and use the ifenslave command when appropriate.h]hlNote that ifenslave-2.6 package will load the bonding module and use the ifenslave command when appropriate.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM{hjhhubeh}(h]%configuration-with-interfaces-supportah ]h"])3.5 configuration with interfaces supportah$]h&]uh1hhjhhhhhMpubh)}(hhh](h)}(hExample Configurationsh]hExample Configurations}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(h|In /etc/network/interfaces, the following stanza will configure bond0, in active-backup mode, with eth0 and eth1 as slaves::h]h{In /etc/network/interfaces, the following stanza will configure bond0, in active-backup mode, with eth0 and eth1 as slaves:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hauto bond0 iface bond0 inet dhcp bond-slaves eth0 eth1 bond-mode active-backup bond-miimon 100 bond-primary eth0 eth1h]hauto bond0 iface bond0 inet dhcp bond-slaves eth0 eth1 bond-mode active-backup bond-miimon 100 bond-primary eth0 eth1}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(hIf the above configuration doesn't work, you might have a system using upstart for system startup. This is most notably true for recent Ubuntu versions. The following stanza in /etc/network/interfaces will produce the same result on those systems::h]hIf the above configuration doesn’t work, you might have a system using upstart for system startup. This is most notably true for recent Ubuntu versions. The following stanza in /etc/network/interfaces will produce the same result on those systems:}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj)}(hX'auto bond0 iface bond0 inet dhcp bond-slaves none bond-mode active-backup bond-miimon 100 auto eth0 iface eth0 inet manual bond-master bond0 bond-primary eth0 eth1 auto eth1 iface eth1 inet manual bond-master bond0 bond-primary eth0 eth1h]hX'auto bond0 iface bond0 inet dhcp bond-slaves none bond-mode active-backup bond-miimon 100 auto eth0 iface eth0 inet manual bond-master bond0 bond-primary eth0 eth1 auto eth1 iface eth1 inet manual bond-master bond0 bond-primary eth0 eth1}hj8sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjhhubh)}(hFor a full list of ``bond-*`` supported options in /etc/network/interfaces and some more advanced examples tailored to you particular distros, see the files in /usr/share/doc/ifenslave-2.6.h](hFor a full list of }(hjFhhhNhNubj)}(h ``bond-*``h]hbond-*}(hjNhhhNhNubah}(h]h ]h"]h$]h&]uh1jhjFubh supported options in /etc/network/interfaces and some more advanced examples tailored to you particular distros, see the files in /usr/share/doc/ifenslave-2.6.}(hjFhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h]example-configurationsah ]h"]example configurationsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h.3.6 Overriding Configuration for Special Casesh]h.3.6 Overriding Configuration for Special Cases}(hjqhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjnhhhhhMubh)}(hX=When using the bonding driver, the physical port which transmits a frame is typically selected by the bonding driver, and is not relevant to the user or system administrator. The output port is simply selected using the policies of the selected bonding mode. On occasion however, it is helpful to direct certain classes of traffic to certain physical interfaces on output to implement slightly more complex policies. For example, to reach a web server over a bonded interface in which eth0 connects to a private network, while eth1 connects via a public network, it may be desirous to bias the bond to send said traffic over eth0 first, using eth1 only as a fall back, while all other traffic can safely be sent over either interface. Such configurations may be achieved using the traffic control utilities inherent in linux.h]hX=When using the bonding driver, the physical port which transmits a frame is typically selected by the bonding driver, and is not relevant to the user or system administrator. The output port is simply selected using the policies of the selected bonding mode. On occasion however, it is helpful to direct certain classes of traffic to certain physical interfaces on output to implement slightly more complex policies. For example, to reach a web server over a bonded interface in which eth0 connects to a private network, while eth1 connects via a public network, it may be desirous to bias the bond to send said traffic over eth0 first, using eth1 only as a fall back, while all other traffic can safely be sent over either interface. Such configurations may be achieved using the traffic control utilities inherent in linux.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubh)}(hX]By default the bonding driver is multiqueue aware and 16 queues are created when the driver initializes (see Documentation/networking/multiqueue.rst for details). If more or less queues are desired the module parameter tx_queues can be used to change this value. There is no sysfs parameter available as the allocation is done at module init time.h]hX]By default the bonding driver is multiqueue aware and 16 queues are created when the driver initializes (see Documentation/networking/multiqueue.rst for details). If more or less queues are desired the module parameter tx_queues can be used to change this value. There is no sysfs parameter available as the allocation is done at module init time.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubh)}(hqThe output of the file /proc/net/bonding/bondX has changed so the output Queue ID is now printed for each slave::h]hpThe output of the file /proc/net/bonding/bondX has changed so the output Queue ID is now printed for each slave:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubj)}(hXBonding Mode: fault-tolerance (active-backup) Primary Slave: None Currently Active Slave: eth0 MII Status: up MII Polling Interval (ms): 0 Up Delay (ms): 0 Down Delay (ms): 0 Slave Interface: eth0 MII Status: up Link Failure Count: 0 Permanent HW addr: 00:1a:a0:12:8f:cb Slave queue ID: 0 Slave Interface: eth1 MII Status: up Link Failure Count: 0 Permanent HW addr: 00:1a:a0:12:8f:cc Slave queue ID: 2h]hXBonding Mode: fault-tolerance (active-backup) Primary Slave: None Currently Active Slave: eth0 MII Status: up MII Polling Interval (ms): 0 Up Delay (ms): 0 Down Delay (ms): 0 Slave Interface: eth0 MII Status: up Link Failure Count: 0 Permanent HW addr: 00:1a:a0:12:8f:cb Slave queue ID: 0 Slave Interface: eth1 MII Status: up Link Failure Count: 0 Permanent HW addr: 00:1a:a0:12:8f:cc Slave queue ID: 2}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjnhhubh)}(h7The queue_id for a slave can be set using the command::h]h6The queue_id for a slave can be set using the command:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubj)}(h7# echo "eth1:2" > /sys/class/net/bond0/bonding/queue_idh]h7# echo "eth1:2" > /sys/class/net/bond0/bonding/queue_id}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjnhhubh)}(hX'Any interface that needs a queue_id set should set it with multiple calls like the one above until proper priorities are set for all interfaces. On distributions that allow configuration via initscripts, multiple 'queue_id' arguments can be added to BONDING_OPTS to set all needed slave queues.h]hX+Any interface that needs a queue_id set should set it with multiple calls like the one above until proper priorities are set for all interfaces. On distributions that allow configuration via initscripts, multiple ‘queue_id’ arguments can be added to BONDING_OPTS to set all needed slave queues.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubh)}(hXkThese queue id's can be used in conjunction with the tc utility to configure a multiqueue qdisc and filters to bias certain traffic to transmit on certain slave devices. For instance, say we wanted, in the above configuration to force all traffic bound to 192.168.1.100 to use eth1 in the bond as its output device. The following commands would accomplish this::h]hXlThese queue id’s can be used in conjunction with the tc utility to configure a multiqueue qdisc and filters to bias certain traffic to transmit on certain slave devices. For instance, say we wanted, in the above configuration to force all traffic bound to 192.168.1.100 to use eth1 in the bond as its output device. The following commands would accomplish this:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubj)}(h# tc qdisc add dev bond0 handle 1 root multiq # tc filter add dev bond0 protocol ip parent 1: prio 1 u32 match ip \ dst 192.168.1.100 action skbedit queue_mapping 2h]h# tc qdisc add dev bond0 handle 1 root multiq # tc filter add dev bond0 protocol ip parent 1: prio 1 u32 match ip \ dst 192.168.1.100 action skbedit queue_mapping 2}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjnhhubh)}(hXThese commands tell the kernel to attach a multiqueue queue discipline to the bond0 interface and filter traffic enqueued to it, such that packets with a dst ip of 192.168.1.100 have their output queue mapping value overwritten to 2. This value is then passed into the driver, causing the normal output path selection policy to be overridden, selecting instead qid 2, which maps to eth1.h]hXThese commands tell the kernel to attach a multiqueue queue discipline to the bond0 interface and filter traffic enqueued to it, such that packets with a dst ip of 192.168.1.100 have their output queue mapping value overwritten to 2. This value is then passed into the driver, causing the normal output path selection policy to be overridden, selecting instead qid 2, which maps to eth1.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubh)}(hXNote that qid values begin at 1. Qid 0 is reserved to initiate to the driver that normal output policy selection should take place. One benefit to simply leaving the qid for a slave to 0 is the multiqueue awareness in the bonding driver that is now present. This awareness allows tc filters to be placed on slave devices as well as bond devices and the bonding driver will simply act as a pass-through for selecting output queues on the slave device rather than output port selection.h]hXNote that qid values begin at 1. Qid 0 is reserved to initiate to the driver that normal output policy selection should take place. One benefit to simply leaving the qid for a slave to 0 is the multiqueue awareness in the bonding driver that is now present. This awareness allows tc filters to be placed on slave devices as well as bond devices and the bonding driver will simply act as a pass-through for selecting output queues on the slave device rather than output port selection.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubh)}(hThis feature first appeared in bonding driver version 3.7.0 and support for output slave selection was limited to round-robin and active-backup modes.h]hThis feature first appeared in bonding driver version 3.7.0 and support for output slave selection was limited to round-robin and active-backup modes.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjnhhubeh}(h]*overriding-configuration-for-special-casesah ]h"].3.6 overriding configuration for special casesah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h:3.7 Configuring LACP for 802.3ad mode in a more secure wayh]h:3.7 Configuring LACP for 802.3ad mode in a more secure way}(hj2 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj/ hhhhhMubh)}(hX~When using 802.3ad bonding mode, the Actor (host) and Partner (switch) exchange LACPDUs. These LACPDUs cannot be sniffed, because they are destined to link local mac addresses (which switches/bridges are not supposed to forward). However, most of the values are easily predictable or are simply the machine's MAC address (which is trivially known to all other hosts in the same L2). This implies that other machines in the L2 domain can spoof LACPDU packets from other hosts to the switch and potentially cause mayhem by joining (from the point of view of the switch) another machine's aggregate, thus receiving a portion of that hosts incoming traffic and / or spoofing traffic from that machine themselves (potentially even successfully terminating some portion of flows). Though this is not a likely scenario, one could avoid this possibility by simply configuring few bonding parameters:h]hXWhen using 802.3ad bonding mode, the Actor (host) and Partner (switch) exchange LACPDUs. These LACPDUs cannot be sniffed, because they are destined to link local mac addresses (which switches/bridges are not supposed to forward). However, most of the values are easily predictable or are simply the machine’s MAC address (which is trivially known to all other hosts in the same L2). This implies that other machines in the L2 domain can spoof LACPDU packets from other hosts to the switch and potentially cause mayhem by joining (from the point of view of the switch) another machine’s aggregate, thus receiving a portion of that hosts incoming traffic and / or spoofing traffic from that machine themselves (potentially even successfully terminating some portion of flows). Though this is not a likely scenario, one could avoid this possibility by simply configuring few bonding parameters:}(hj@ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj/ hhubh)}(hX(a) ad_actor_system : You can set a random mac-address that can be used for these LACPDU exchanges. The value can not be either NULL or Multicast. Also it's preferable to set the local-admin bit. Following shell code generates a random mac-address as described above:: # sys_mac_addr=$(printf '%02x:%02x:%02x:%02x:%02x:%02x' \ $(( (RANDOM & 0xFE) | 0x02 )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF ))) # echo $sys_mac_addr > /sys/class/net/bond0/bonding/ad_actor_system (b) ad_actor_sys_prio : Randomize the system priority. The default value is 65535, but system can take the value from 1 - 65535. Following shell code generates random priority and sets it:: # sys_prio=$(( 1 + RANDOM + RANDOM )) # echo $sys_prio > /sys/class/net/bond0/bonding/ad_actor_sys_prio (c) ad_user_port_key : Use the user portion of the port-key. The default keeps this empty. These are the upper 10 bits of the port-key and value ranges from 0 - 1023. Following shell code generates these 10 bits and sets it:: # usr_port_key=$(( RANDOM & 0x3FF )) # echo $usr_port_key > /sys/class/net/bond0/bonding/ad_user_port_key h]henumerated_list)}(hhh](j)}(hXad_actor_system : You can set a random mac-address that can be used for these LACPDU exchanges. The value can not be either NULL or Multicast. Also it's preferable to set the local-admin bit. Following shell code generates a random mac-address as described above:: # sys_mac_addr=$(printf '%02x:%02x:%02x:%02x:%02x:%02x' \ $(( (RANDOM & 0xFE) | 0x02 )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF ))) # echo $sys_mac_addr > /sys/class/net/bond0/bonding/ad_actor_system h](h)}(hXad_actor_system : You can set a random mac-address that can be used for these LACPDU exchanges. The value can not be either NULL or Multicast. Also it's preferable to set the local-admin bit. Following shell code generates a random mac-address as described above::h]hX ad_actor_system : You can set a random mac-address that can be used for these LACPDU exchanges. The value can not be either NULL or Multicast. Also it’s preferable to set the local-admin bit. Following shell code generates a random mac-address as described above:}(hj[ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjW ubj)}(hX# sys_mac_addr=$(printf '%02x:%02x:%02x:%02x:%02x:%02x' \ $(( (RANDOM & 0xFE) | 0x02 )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF ))) # echo $sys_mac_addr > /sys/class/net/bond0/bonding/ad_actor_systemh]hX# sys_mac_addr=$(printf '%02x:%02x:%02x:%02x:%02x:%02x' \ $(( (RANDOM & 0xFE) | 0x02 )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF )) \ $(( RANDOM & 0xFF ))) # echo $sys_mac_addr > /sys/class/net/bond0/bonding/ad_actor_system}hji sbah}(h]h ]h"]h$]h&]hhuh1jhhhM hjW ubeh}(h]h ]h"]h$]h&]uh1jhjT ubj)}(hX-ad_actor_sys_prio : Randomize the system priority. The default value is 65535, but system can take the value from 1 - 65535. Following shell code generates random priority and sets it:: # sys_prio=$(( 1 + RANDOM + RANDOM )) # echo $sys_prio > /sys/class/net/bond0/bonding/ad_actor_sys_prio h](h)}(had_actor_sys_prio : Randomize the system priority. The default value is 65535, but system can take the value from 1 - 65535. Following shell code generates random priority and sets it::h]had_actor_sys_prio : Randomize the system priority. The default value is 65535, but system can take the value from 1 - 65535. Following shell code generates random priority and sets it:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj} ubj)}(hg# sys_prio=$(( 1 + RANDOM + RANDOM )) # echo $sys_prio > /sys/class/net/bond0/bonding/ad_actor_sys_prioh]hg# sys_prio=$(( 1 + RANDOM + RANDOM )) # echo $sys_prio > /sys/class/net/bond0/bonding/ad_actor_sys_prio}hj sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj} ubeh}(h]h ]h"]h$]h&]uh1jhjT ubj)}(hXTad_user_port_key : Use the user portion of the port-key. The default keeps this empty. These are the upper 10 bits of the port-key and value ranges from 0 - 1023. Following shell code generates these 10 bits and sets it:: # usr_port_key=$(( RANDOM & 0x3FF )) # echo $usr_port_key > /sys/class/net/bond0/bonding/ad_user_port_key h](h)}(had_user_port_key : Use the user portion of the port-key. The default keeps this empty. These are the upper 10 bits of the port-key and value ranges from 0 - 1023. Following shell code generates these 10 bits and sets it::h]had_user_port_key : Use the user portion of the port-key. The default keeps this empty. These are the upper 10 bits of the port-key and value ranges from 0 - 1023. Following shell code generates these 10 bits and sets it:}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubj)}(hi# usr_port_key=$(( RANDOM & 0x3FF )) # echo $usr_port_key > /sys/class/net/bond0/bonding/ad_user_port_keyh]hi# usr_port_key=$(( RANDOM & 0x3FF )) # echo $usr_port_key > /sys/class/net/bond0/bonding/ad_user_port_key}hj sbah}(h]h ]h"]h$]h&]hhuh1jhhhM hj ubeh}(h]h ]h"]h$]h&]uh1jhjT ubeh}(h]h ]h"]h$]h&]enumtype loweralphaprefix(suffix)uh1jR hjN ubah}(h]h ]h"]h$]h&]uh1hhhhMhj/ hhubeh}(h]6configuring-lacp-for-802-3ad-mode-in-a-more-secure-wayah ]h"]:3.7 configuring lacp for 802.3ad mode in a more secure wayah$]h&]uh1hhjhhhhhMubeh}(h]configuring-bonding-devicesah ]h"]3. configuring bonding devicesah$]h&]uh1hhhhhhhhM$ubh)}(hhh](h)}(h 4 Querying Bonding Configurationh]h 4 Querying Bonding Configuration}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj hhhhhM%ubh)}(hhh](h)}(h4.1 Bonding Configurationh]h4.1 Bonding Configuration}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj hhhhhM(ubh)}(hEach bonding device has a read-only file residing in the /proc/net/bonding directory. The file contents include information about the bonding configuration, options and state of each slave.h]hEach bonding device has a read-only file residing in the /proc/net/bonding directory. The file contents include information about the bonding configuration, options and state of each slave.}(hj !hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hj hhubh)}(hFor example, the contents of /proc/net/bonding/bond0 after the driver is loaded with parameters of mode=0 and miimon=1000 is generally as follows::h]hFor example, the contents of /proc/net/bonding/bond0 after the driver is loaded with parameters of mode=0 and miimon=1000 is generally as follows:}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM.hj hhubj)}(hXLEthernet Channel Bonding Driver: 2.6.1 (October 29, 2004) Bonding Mode: load balancing (round-robin) Currently Active Slave: eth0 MII Status: up MII Polling Interval (ms): 1000 Up Delay (ms): 0 Down Delay (ms): 0 Slave Interface: eth1 MII Status: up Link Failure Count: 1 Slave Interface: eth0 MII Status: up Link Failure Count: 1h]hXLEthernet Channel Bonding Driver: 2.6.1 (October 29, 2004) Bonding Mode: load balancing (round-robin) Currently Active Slave: eth0 MII Status: up MII Polling Interval (ms): 1000 Up Delay (ms): 0 Down Delay (ms): 0 Slave Interface: eth1 MII Status: up Link Failure Count: 1 Slave Interface: eth0 MII Status: up Link Failure Count: 1}hj)!sbah}(h]h ]h"]h$]h&]hhuh1jhhhM2hj hhubh)}(hThe precise format and contents will change depending upon the bonding configuration, state, and version of the bonding driver.h]hThe precise format and contents will change depending upon the bonding configuration, state, and version of the bonding driver.}(hj7!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMBhj hhubeh}(h]bonding-configurationah ]h"]4.1 bonding configurationah$]h&]uh1hhj hhhhhM(ubh)}(hhh](h)}(h4.2 Network configurationh]h4.2 Network configuration}(hjP!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjM!hhhhhMFubh)}(hXThe network configuration can be inspected using the ifconfig command. Bonding devices will have the MASTER flag set; Bonding slave devices will have the SLAVE flag set. The ifconfig output does not contain information on which slaves are associated with which masters.h]hXThe network configuration can be inspected using the ifconfig command. Bonding devices will have the MASTER flag set; Bonding slave devices will have the SLAVE flag set. The ifconfig output does not contain information on which slaves are associated with which masters.}(hj^!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhjM!hhubh)}(hXIn the example below, the bond0 interface is the master (MASTER) while eth0 and eth1 are slaves (SLAVE). Notice all slaves of bond0 have the same MAC address (HWaddr) as bond0 for all modes except TLB and ALB that require a unique MAC address for each slave::h]hXIn the example below, the bond0 interface is the master (MASTER) while eth0 and eth1 are slaves (SLAVE). Notice all slaves of bond0 have the same MAC address (HWaddr) as bond0 for all modes except TLB and ALB that require a unique MAC address for each slave:}(hjl!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMMhjM!hhubj)}(hX0# /sbin/ifconfig bond0 Link encap:Ethernet HWaddr 00:C0:F0:1F:37:B4 inet addr:XXX.XXX.XXX.YYY Bcast:XXX.XXX.XXX.255 Mask:255.255.252.0 UP BROADCAST RUNNING MASTER MULTICAST MTU:1500 Metric:1 RX packets:7224794 errors:0 dropped:0 overruns:0 frame:0 TX packets:3286647 errors:1 dropped:0 overruns:1 carrier:0 collisions:0 txqueuelen:0 eth0 Link encap:Ethernet HWaddr 00:C0:F0:1F:37:B4 UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1 RX packets:3573025 errors:0 dropped:0 overruns:0 frame:0 TX packets:1643167 errors:1 dropped:0 overruns:1 carrier:0 collisions:0 txqueuelen:100 Interrupt:10 Base address:0x1080 eth1 Link encap:Ethernet HWaddr 00:C0:F0:1F:37:B4 UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1 RX packets:3651769 errors:0 dropped:0 overruns:0 frame:0 TX packets:1643480 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 Interrupt:9 Base address:0x1400h]hX0# /sbin/ifconfig bond0 Link encap:Ethernet HWaddr 00:C0:F0:1F:37:B4 inet addr:XXX.XXX.XXX.YYY Bcast:XXX.XXX.XXX.255 Mask:255.255.252.0 UP BROADCAST RUNNING MASTER MULTICAST MTU:1500 Metric:1 RX packets:7224794 errors:0 dropped:0 overruns:0 frame:0 TX packets:3286647 errors:1 dropped:0 overruns:1 carrier:0 collisions:0 txqueuelen:0 eth0 Link encap:Ethernet HWaddr 00:C0:F0:1F:37:B4 UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1 RX packets:3573025 errors:0 dropped:0 overruns:0 frame:0 TX packets:1643167 errors:1 dropped:0 overruns:1 carrier:0 collisions:0 txqueuelen:100 Interrupt:10 Base address:0x1080 eth1 Link encap:Ethernet HWaddr 00:C0:F0:1F:37:B4 UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1 RX packets:3651769 errors:0 dropped:0 overruns:0 frame:0 TX packets:1643480 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 Interrupt:9 Base address:0x1400}hjz!sbah}(h]h ]h"]h$]h&]hhuh1jhhhMRhjM!hhubeh}(h]network-configurationah ]h"]4.2 network configurationah$]h&]uh1hhj hhhhhMFubeh}(h]querying-bonding-configurationah ]h"] 4 querying bonding configurationah$]h&]uh1hhhhhhhhM%ubh)}(hhh](h)}(h5. Switch Configurationh]h5. Switch Configuration}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj!hhhhhMiubh)}(hXFor this section, "switch" refers to whatever system the bonded devices are directly connected to (i.e., where the other end of the cable plugs into). This may be an actual dedicated switch device, or it may be another regular system (e.g., another computer running Linux),h]hXFor this section, “switch” refers to whatever system the bonded devices are directly connected to (i.e., where the other end of the cable plugs into). This may be an actual dedicated switch device, or it may be another regular system (e.g., another computer running Linux),}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMkhj!hhubh)}(hmThe active-backup, balance-tlb and balance-alb modes do not require any specific configuration of the switch.h]hmThe active-backup, balance-tlb and balance-alb modes do not require any specific configuration of the switch.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMqhj!hhubh)}(hXThe 802.3ad mode requires that the switch have the appropriate ports configured as an 802.3ad aggregation. The precise method used to configure this varies from switch to switch, but, for example, a Cisco 3550 series switch requires that the appropriate ports first be grouped together in a single etherchannel instance, then that etherchannel is set to mode "lacp" to enable 802.3ad (instead of standard EtherChannel).h]hXThe 802.3ad mode requires that the switch have the appropriate ports configured as an 802.3ad aggregation. The precise method used to configure this varies from switch to switch, but, for example, a Cisco 3550 series switch requires that the appropriate ports first be grouped together in a single etherchannel instance, then that etherchannel is set to mode “lacp” to enable 802.3ad (instead of standard EtherChannel).}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthj!hhubh)}(hXThe balance-rr, balance-xor and broadcast modes generally require that the switch have the appropriate ports grouped together. The nomenclature for such a group differs between switches, it may be called an "etherchannel" (as in the Cisco example, above), a "trunk group" or some other similar variation. For these modes, each switch will also have its own configuration options for the switch's transmit policy to the bond. Typical choices include XOR of either the MAC or IP addresses. The transmit policy of the two peers does not need to match. For these three modes, the bonding mode really selects a transmit policy for an EtherChannel group; all three will interoperate with another EtherChannel group.h]hXThe balance-rr, balance-xor and broadcast modes generally require that the switch have the appropriate ports grouped together. The nomenclature for such a group differs between switches, it may be called an “etherchannel” (as in the Cisco example, above), a “trunk group” or some other similar variation. For these modes, each switch will also have its own configuration options for the switch’s transmit policy to the bond. Typical choices include XOR of either the MAC or IP addresses. The transmit policy of the two peers does not need to match. For these three modes, the bonding mode really selects a transmit policy for an EtherChannel group; all three will interoperate with another EtherChannel group.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hj!hhubeh}(h]switch-configurationah ]h"]5. switch configurationah$]h&]uh1hhhhhhhhMiubh)}(hhh](h)}(h6. 802.1q VLAN Supporth]h6. 802.1q VLAN Support}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj!hhhhhMubh)}(hXIt is possible to configure VLAN devices over a bond interface using the 8021q driver. However, only packets coming from the 8021q driver and passing through bonding will be tagged by default. Self generated packets, for example, bonding's learning packets or ARP packets generated by either ALB mode or the ARP monitor mechanism, are tagged internally by bonding itself. As a result, bonding must "learn" the VLAN IDs configured above it, and use those IDs to tag self generated packets.h]hXIt is possible to configure VLAN devices over a bond interface using the 8021q driver. However, only packets coming from the 8021q driver and passing through bonding will be tagged by default. Self generated packets, for example, bonding’s learning packets or ARP packets generated by either ALB mode or the ARP monitor mechanism, are tagged internally by bonding itself. As a result, bonding must “learn” the VLAN IDs configured above it, and use those IDs to tag self generated packets.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hXFor reasons of simplicity, and to support the use of adapters that can do VLAN hardware acceleration offloading, the bonding interface declares itself as fully hardware offloading capable, it gets the add_vid/kill_vid notifications to gather the necessary information, and it propagates those actions to the slaves. In case of mixed adapter types, hardware accelerated tagged packets that should go through an adapter that is not offloading capable are "un-accelerated" by the bonding driver so the VLAN tag sits in the regular location.h]hXFor reasons of simplicity, and to support the use of adapters that can do VLAN hardware acceleration offloading, the bonding interface declares itself as fully hardware offloading capable, it gets the add_vid/kill_vid notifications to gather the necessary information, and it propagates those actions to the slaves. In case of mixed adapter types, hardware accelerated tagged packets that should go through an adapter that is not offloading capable are “un-accelerated” by the bonding driver so the VLAN tag sits in the regular location.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hXVLAN interfaces *must* be added on top of a bonding interface only after enslaving at least one slave. The bonding interface has a hardware address of 00:00:00:00:00:00 until the first slave is added. If the VLAN interface is created prior to the first enslavement, it would pick up the all-zeroes hardware address. Once the first slave is attached to the bond, the bond device itself will pick up the slave's hardware address, which is then available for the VLAN device.h](hVLAN interfaces }(hj"hhhNhNubj~)}(h*must*h]hmust}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1j}hj"ubhX be added on top of a bonding interface only after enslaving at least one slave. The bonding interface has a hardware address of 00:00:00:00:00:00 until the first slave is added. If the VLAN interface is created prior to the first enslavement, it would pick up the all-zeroes hardware address. Once the first slave is attached to the bond, the bond device itself will pick up the slave’s hardware address, which is then available for the VLAN device.}(hj"hhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hXoAlso, be aware that a similar problem can occur if all slaves are released from a bond that still has one or more VLAN interfaces on top of it. When a new slave is added, the bonding interface will obtain its hardware address from the first slave, which might not match the hardware address of the VLAN interfaces (which was ultimately copied from an earlier slave).h]hXoAlso, be aware that a similar problem can occur if all slaves are released from a bond that still has one or more VLAN interfaces on top of it. When a new slave is added, the bonding interface will obtain its hardware address from the first slave, which might not match the hardware address of the VLAN interfaces (which was ultimately copied from an earlier slave).}(hj6"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hThere are two methods to ensure that the VLAN device operates with the correct hardware address if all slaves are removed from a bond interface:h]hThere are two methods to ensure that the VLAN device operates with the correct hardware address if all slaves are removed from a bond interface:}(hjD"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubjS )}(hhh]j)}(h.Remove all VLAN interfaces then recreate them h]h)}(h-Remove all VLAN interfaces then recreate themh]h-Remove all VLAN interfaces then recreate them}(hjY"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjU"ubah}(h]h ]h"]h$]h&]uh1jhjR"hhhhhNubah}(h]h ]h"]h$]h&]j arabicj hj .uh1jR hj!hhhhhMubh)}(ho2. Set the bonding interface's hardware address so that it matches the hardware address of the VLAN interfaces.h]hq2. Set the bonding interface’s hardware address so that it matches the hardware address of the VLAN interfaces.}(hju"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hNote that changing a VLAN interface's HW address would set the underlying device -- i.e. the bonding interface -- to promiscuous mode, which might not be what you want.h]hNote that changing a VLAN interface’s HW address would set the underlying device -- i.e. the bonding interface -- to promiscuous mode, which might not be what you want.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubeh}(h]q-vlan-supportah ]h"]6. 802.1q vlan supportah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(h7. Link Monitoringh]h7. Link Monitoring}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj"hhhhhMubh)}(hThe bonding driver at present supports two schemes for monitoring a slave device's link state: the ARP monitor and the MII monitor.h]hThe bonding driver at present supports two schemes for monitoring a slave device’s link state: the ARP monitor and the MII monitor.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubh)}(hAt the present time, due to implementation restrictions in the bonding driver itself, it is not possible to enable both ARP and MII monitoring simultaneously.h]hAt the present time, due to implementation restrictions in the bonding driver itself, it is not possible to enable both ARP and MII monitoring simultaneously.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubh)}(hhh](h)}(h7.1 ARP Monitor Operationh]h7.1 ARP Monitor Operation}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj"hhhhhMubh)}(hX-The ARP monitor operates as its name suggests: it sends ARP queries to one or more designated peer systems on the network, and uses the response as an indication that the link is operating. This gives some assurance that traffic is actually flowing to and from one or more peers on the local network.h]hX-The ARP monitor operates as its name suggests: it sends ARP queries to one or more designated peer systems on the network, and uses the response as an indication that the link is operating. This gives some assurance that traffic is actually flowing to and from one or more peers on the local network.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubeh}(h]arp-monitor-operationah ]h"]7.1 arp monitor operationah$]h&]uh1hhj"hhhhhMubh)}(hhh](h)}(h$7.2 Configuring Multiple ARP Targetsh]h$7.2 Configuring Multiple ARP Targets}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj"hhhhhMubh)}(hX\While ARP monitoring can be done with just one target, it can be useful in a High Availability setup to have several targets to monitor. In the case of just one target, the target itself may go down or have a problem making it unresponsive to ARP requests. Having an additional target (or several) increases the reliability of the ARP monitoring.h]hX\While ARP monitoring can be done with just one target, it can be useful in a High Availability setup to have several targets to monitor. In the case of just one target, the target itself may go down or have a problem making it unresponsive to ARP requests. Having an additional target (or several) increases the reliability of the ARP monitoring.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubh)}(h=Multiple ARP targets must be separated by commas as follows::h]h | +---------------------+ | Hosts B and C are out | |eth1 port2| | here somewhere +----------+ +----------+h]hX^+----------+ +----------+ | |eth0 port1| | to other networks | Host A +---------------------+ router +-------------------> | +---------------------+ | Hosts B and C are out | |eth1 port2| | here somewhere +----------+ +----------+}hj'sbah}(h]h ]h"]h$]h&]hhuh1jhhhM7 hjj'hhubh)}(hXThe router may be a dedicated router device, or another host acting as a gateway. For our discussion, the important point is that the majority of traffic from Host A will pass through the router to some other network before reaching its final destination.h]hXThe router may be a dedicated router device, or another host acting as a gateway. For our discussion, the important point is that the majority of traffic from Host A will pass through the router to some other network before reaching its final destination.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM> hjj'hhubh)}(hIn a gatewayed network configuration, although Host A may communicate with many other systems, all of its traffic will be sent and received via one other peer on the local network, the router.h]hIn a gatewayed network configuration, although Host A may communicate with many other systems, all of its traffic will be sent and received via one other peer on the local network, the router.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMC hjj'hhubh)}(hXNote that the case of two systems connected directly via multiple physical links is, for purposes of configuring bonding, the same as a gatewayed configuration. In that case, it happens that all traffic is destined for the "gateway" itself, not some other network beyond the gateway.h]hX Note that the case of two systems connected directly via multiple physical links is, for purposes of configuring bonding, the same as a gatewayed configuration. In that case, it happens that all traffic is destined for the “gateway” itself, not some other network beyond the gateway.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMG hjj'hhubh)}(hIn a local configuration, the "switch" is acting primarily as a switch, and the majority of traffic passes through this switch to reach other stations on the same network. An example would be the following::h]hIn a local configuration, the “switch” is acting primarily as a switch, and the majority of traffic passes through this switch to reach other stations on the same network. An example would be the following:}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMM hjj'hhubj)}(hXd+----------+ +----------+ +--------+ | |eth0 port1| +-------+ Host B | | Host A +------------+ switch |port3 +--------+ | +------------+ | +--------+ | |eth1 port2| +------------------+ Host C | +----------+ +----------+port4 +--------+h]hXd+----------+ +----------+ +--------+ | |eth0 port1| +-------+ Host B | | Host A +------------+ switch |port3 +--------+ | +------------+ | +--------+ | |eth1 port2| +------------------+ Host C | +----------+ +----------+port4 +--------+}hj'sbah}(h]h ]h"]h$]h&]hhuh1jhhhMR hjj'hhubh)}(hX Again, the switch may be a dedicated switch device, or another host acting as a gateway. For our discussion, the important point is that the majority of traffic from Host A is destined for other hosts on the same local network (Hosts B and C in the above example).h]hX Again, the switch may be a dedicated switch device, or another host acting as a gateway. For our discussion, the important point is that the majority of traffic from Host A is destined for other hosts on the same local network (Hosts B and C in the above example).}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMZ hjj'hhubh)}(hXIn summary, in a gatewayed configuration, traffic to and from the bonded device will be to the same MAC level peer on the network (the gateway itself, i.e., the router), regardless of its final destination. In a local configuration, traffic flows directly to and from the final destinations, thus, each destination (Host B, Host C) will be addressed directly by their individual MAC addresses.h]hXIn summary, in a gatewayed configuration, traffic to and from the bonded device will be to the same MAC level peer on the network (the gateway itself, i.e., the router), regardless of its final destination. In a local configuration, traffic flows directly to and from the final destinations, thus, each destination (Host B, Host C) will be addressed directly by their individual MAC addresses.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM_ hjj'hhubh)}(hXThis distinction between a gatewayed and a local network configuration is important because many of the load balancing modes available use the MAC addresses of the local network source and destination to make load balancing decisions. The behavior of each mode is described below.h]hXThis distinction between a gatewayed and a local network configuration is important because many of the load balancing modes available use the MAC addresses of the local network source and destination to make load balancing decisions. The behavior of each mode is described below.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMf hjj'hhubeh}(h]1maximizing-throughput-in-a-single-switch-topologyah ]h"]612.1 maximizing throughput in a single switch topologyah$]h&]uh1hhjY'hhhhhM' ubh)}(hhh](h)}(h;12.1.1 MT Bonding Mode Selection for Single Switch Topologyh]h;12.1.1 MT Bonding Mode Selection for Single Switch Topology}(hj.(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj+(hhhhhMn ubh)}(hThis configuration is the easiest to set up and to understand, although you will have to decide which bonding mode best suits your needs. The trade offs for each mode are detailed below:h]hThis configuration is the easiest to set up and to understand, although you will have to decide which bonding mode best suits your needs. The trade offs for each mode are detailed below:}(hj<(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMp hj+(hhubjh )}(hhh](jm )}(hX-balance-rr: This mode is the only mode that will permit a single TCP/IP connection to stripe traffic across multiple interfaces. It is therefore the only mode that will allow a single TCP/IP stream to utilize more than one interface's worth of throughput. This comes at a cost, however: the striping generally results in peer systems receiving packets out of order, causing TCP/IP's congestion control system to kick in, often by retransmitting segments. It is possible to adjust TCP/IP's congestion limits by altering the net.ipv4.tcp_reordering sysctl parameter. The usual default value is 3. But keep in mind TCP stack is able to automatically increase this when it detects reorders. Note that the fraction of packets that will be delivered out of order is highly variable, and is unlikely to be zero. The level of reordering depends upon a variety of factors, including the networking interfaces, the switch, and the topology of the configuration. Speaking in general terms, higher speed network cards produce more reordering (due to factors such as packet coalescing), and a "many to many" topology will reorder at a higher rate than a "many slow to one fast" configuration. Many switches do not support any modes that stripe traffic (instead choosing a port based upon IP or MAC level addresses); for those devices, traffic for a particular connection flowing through the switch to a balance-rr bond will not utilize greater than one interface's worth of bandwidth. If you are utilizing protocols other than TCP/IP, UDP for example, and your application can tolerate out of order delivery, then this mode can allow for single stream datagram performance that scales near linearly as interfaces are added to the bond. This mode requires the switch to have the appropriate ports configured for "etherchannel" or "trunking." h](js )}(h balance-rr:h]h balance-rr:}(hjQ(hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hjM(ubj )}(hhh](h)}(hXThis mode is the only mode that will permit a single TCP/IP connection to stripe traffic across multiple interfaces. It is therefore the only mode that will allow a single TCP/IP stream to utilize more than one interface's worth of throughput. This comes at a cost, however: the striping generally results in peer systems receiving packets out of order, causing TCP/IP's congestion control system to kick in, often by retransmitting segments.h]hXThis mode is the only mode that will permit a single TCP/IP connection to stripe traffic across multiple interfaces. It is therefore the only mode that will allow a single TCP/IP stream to utilize more than one interface’s worth of throughput. This comes at a cost, however: the striping generally results in peer systems receiving packets out of order, causing TCP/IP’s congestion control system to kick in, often by retransmitting segments.}(hjb(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMu hj_(ubh)}(hIt is possible to adjust TCP/IP's congestion limits by altering the net.ipv4.tcp_reordering sysctl parameter. The usual default value is 3. But keep in mind TCP stack is able to automatically increase this when it detects reorders.h]hIt is possible to adjust TCP/IP’s congestion limits by altering the net.ipv4.tcp_reordering sysctl parameter. The usual default value is 3. But keep in mind TCP stack is able to automatically increase this when it detects reorders.}(hjp(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM~ hj_(ubh)}(hXNote that the fraction of packets that will be delivered out of order is highly variable, and is unlikely to be zero. The level of reordering depends upon a variety of factors, including the networking interfaces, the switch, and the topology of the configuration. Speaking in general terms, higher speed network cards produce more reordering (due to factors such as packet coalescing), and a "many to many" topology will reorder at a higher rate than a "many slow to one fast" configuration.h]hXNote that the fraction of packets that will be delivered out of order is highly variable, and is unlikely to be zero. The level of reordering depends upon a variety of factors, including the networking interfaces, the switch, and the topology of the configuration. Speaking in general terms, higher speed network cards produce more reordering (due to factors such as packet coalescing), and a “many to many” topology will reorder at a higher rate than a “many slow to one fast” configuration.}(hj~(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj_(ubh)}(hX#Many switches do not support any modes that stripe traffic (instead choosing a port based upon IP or MAC level addresses); for those devices, traffic for a particular connection flowing through the switch to a balance-rr bond will not utilize greater than one interface's worth of bandwidth.h]hX%Many switches do not support any modes that stripe traffic (instead choosing a port based upon IP or MAC level addresses); for those devices, traffic for a particular connection flowing through the switch to a balance-rr bond will not utilize greater than one interface’s worth of bandwidth.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj_(ubh)}(hIf you are utilizing protocols other than TCP/IP, UDP for example, and your application can tolerate out of order delivery, then this mode can allow for single stream datagram performance that scales near linearly as interfaces are added to the bond.h]hIf you are utilizing protocols other than TCP/IP, UDP for example, and your application can tolerate out of order delivery, then this mode can allow for single stream datagram performance that scales near linearly as interfaces are added to the bond.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj_(ubh)}(hhThis mode requires the switch to have the appropriate ports configured for "etherchannel" or "trunking."h]hpThis mode requires the switch to have the appropriate ports configured for “etherchannel” or “trunking.”}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj_(ubeh}(h]h ]h"]h$]h&]uh1j hjM(ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(ubjm )}(hXactive-backup: There is not much advantage in this network topology to the active-backup mode, as the inactive backup devices are all connected to the same peer as the primary. In this case, a load balancing mode (with link monitoring) will provide the same level of network availability, but with increased available bandwidth. On the plus side, active-backup mode does not require any configuration of the switch, so it may have value if the hardware available does not support any of the load balance modes. h](js )}(hactive-backup:h]hactive-backup:}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hj(ubj )}(hhh]h)}(hXThere is not much advantage in this network topology to the active-backup mode, as the inactive backup devices are all connected to the same peer as the primary. In this case, a load balancing mode (with link monitoring) will provide the same level of network availability, but with increased available bandwidth. On the plus side, active-backup mode does not require any configuration of the switch, so it may have value if the hardware available does not support any of the load balance modes.h]hXThere is not much advantage in this network topology to the active-backup mode, as the inactive backup devices are all connected to the same peer as the primary. In this case, a load balancing mode (with link monitoring) will provide the same level of network availability, but with increased available bandwidth. On the plus side, active-backup mode does not require any configuration of the switch, so it may have value if the hardware available does not support any of the load balance modes.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj(ubah}(h]h ]h"]h$]h&]uh1j hj(ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(hhubjm )}(hXCbalance-xor: This mode will limit traffic such that packets destined for specific peers will always be sent over the same interface. Since the destination is determined by the MAC addresses involved, this mode works best in a "local" network configuration (as described above), with destinations all on the same local network. This mode is likely to be suboptimal if all your traffic is passed through a single router (i.e., a "gatewayed" network configuration, as described above). As with balance-rr, the switch ports need to be configured for "etherchannel" or "trunking." h](js )}(h balance-xor:h]h balance-xor:}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hj(ubj )}(hhh](h)}(hXThis mode will limit traffic such that packets destined for specific peers will always be sent over the same interface. Since the destination is determined by the MAC addresses involved, this mode works best in a "local" network configuration (as described above), with destinations all on the same local network. This mode is likely to be suboptimal if all your traffic is passed through a single router (i.e., a "gatewayed" network configuration, as described above).h]hXThis mode will limit traffic such that packets destined for specific peers will always be sent over the same interface. Since the destination is determined by the MAC addresses involved, this mode works best in a “local” network configuration (as described above), with destinations all on the same local network. This mode is likely to be suboptimal if all your traffic is passed through a single router (i.e., a “gatewayed” network configuration, as described above).}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj)ubh)}(h\As with balance-rr, the switch ports need to be configured for "etherchannel" or "trunking."h]hdAs with balance-rr, the switch ports need to be configured for “etherchannel” or “trunking.”}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj)ubeh}(h]h ]h"]h$]h&]uh1j hj(ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(hhubjm )}(hjbroadcast: Like active-backup, there is not much advantage to this mode in this type of network topology. h](js )}(h broadcast:h]h broadcast:}(hj2)hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hj.)ubj )}(hhh]h)}(h^Like active-backup, there is not much advantage to this mode in this type of network topology.h]h^Like active-backup, there is not much advantage to this mode in this type of network topology.}(hjC)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj@)ubah}(h]h ]h"]h$]h&]uh1j hj.)ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(hhubjm )}(hX802.3ad: This mode can be a good choice for this type of network topology. The 802.3ad mode is an IEEE standard, so all peers that implement 802.3ad should interoperate well. The 802.3ad protocol includes automatic configuration of the aggregates, so minimal manual configuration of the switch is needed (typically only to designate that some set of devices is available for 802.3ad). The 802.3ad standard also mandates that frames be delivered in order (within certain limits), so in general single connections will not see misordering of packets. The 802.3ad mode does have some drawbacks: the standard mandates that all devices in the aggregate operate at the same speed and duplex. Also, as with all bonding load balance modes other than balance-rr, no single connection will be able to utilize more than a single interface's worth of bandwidth. Additionally, the linux bonding 802.3ad implementation distributes traffic by peer (using an XOR of MAC addresses and packet type ID), so in a "gatewayed" configuration, all outgoing traffic will generally use the same device. Incoming traffic may also end up on a single device, but that is dependent upon the balancing policy of the peer's 802.3ad implementation. In a "local" configuration, traffic will be distributed across the devices in the bond. Finally, the 802.3ad mode mandates the use of the MII monitor, therefore, the ARP monitor is not available in this mode. h](js )}(h802.3ad:h]h802.3ad:}(hja)hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hj])ubj )}(hhh](h)}(hXMThis mode can be a good choice for this type of network topology. The 802.3ad mode is an IEEE standard, so all peers that implement 802.3ad should interoperate well. The 802.3ad protocol includes automatic configuration of the aggregates, so minimal manual configuration of the switch is needed (typically only to designate that some set of devices is available for 802.3ad). The 802.3ad standard also mandates that frames be delivered in order (within certain limits), so in general single connections will not see misordering of packets. The 802.3ad mode does have some drawbacks: the standard mandates that all devices in the aggregate operate at the same speed and duplex. Also, as with all bonding load balance modes other than balance-rr, no single connection will be able to utilize more than a single interface's worth of bandwidth.h]hXOThis mode can be a good choice for this type of network topology. The 802.3ad mode is an IEEE standard, so all peers that implement 802.3ad should interoperate well. The 802.3ad protocol includes automatic configuration of the aggregates, so minimal manual configuration of the switch is needed (typically only to designate that some set of devices is available for 802.3ad). The 802.3ad standard also mandates that frames be delivered in order (within certain limits), so in general single connections will not see misordering of packets. The 802.3ad mode does have some drawbacks: the standard mandates that all devices in the aggregate operate at the same speed and duplex. Also, as with all bonding load balance modes other than balance-rr, no single connection will be able to utilize more than a single interface’s worth of bandwidth.}(hjr)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjo)ubh)}(hXAdditionally, the linux bonding 802.3ad implementation distributes traffic by peer (using an XOR of MAC addresses and packet type ID), so in a "gatewayed" configuration, all outgoing traffic will generally use the same device. Incoming traffic may also end up on a single device, but that is dependent upon the balancing policy of the peer's 802.3ad implementation. In a "local" configuration, traffic will be distributed across the devices in the bond.h]hXAdditionally, the linux bonding 802.3ad implementation distributes traffic by peer (using an XOR of MAC addresses and packet type ID), so in a “gatewayed” configuration, all outgoing traffic will generally use the same device. Incoming traffic may also end up on a single device, but that is dependent upon the balancing policy of the peer’s 802.3ad implementation. In a “local” configuration, traffic will be distributed across the devices in the bond.}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjo)ubh)}(hxFinally, the 802.3ad mode mandates the use of the MII monitor, therefore, the ARP monitor is not available in this mode.h]hxFinally, the 802.3ad mode mandates the use of the MII monitor, therefore, the ARP monitor is not available in this mode.}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjo)ubeh}(h]h ]h"]h$]h&]uh1j hj])ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(hhubjm )}(hXubalance-tlb: The balance-tlb mode balances outgoing traffic by peer. Since the balancing is done according to MAC address, in a "gatewayed" configuration (as described above), this mode will send all traffic across a single device. However, in a "local" network configuration, this mode balances multiple local network peers across devices in a vaguely intelligent manner (not a simple XOR as in balance-xor or 802.3ad mode), so that mathematically unlucky MAC addresses (i.e., ones that XOR to the same value) will not all "bunch up" on a single interface. Unlike 802.3ad, interfaces may be of differing speeds, and no special switch configuration is required. On the down side, in this mode all incoming traffic arrives over a single interface, this mode requires certain ethtool support in the network device driver of the slave interfaces, and the ARP monitor is not available. h](js )}(h balance-tlb:h]h balance-tlb:}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hj)ubj )}(hhh](h)}(hX!The balance-tlb mode balances outgoing traffic by peer. Since the balancing is done according to MAC address, in a "gatewayed" configuration (as described above), this mode will send all traffic across a single device. However, in a "local" network configuration, this mode balances multiple local network peers across devices in a vaguely intelligent manner (not a simple XOR as in balance-xor or 802.3ad mode), so that mathematically unlucky MAC addresses (i.e., ones that XOR to the same value) will not all "bunch up" on a single interface.h]hX-The balance-tlb mode balances outgoing traffic by peer. Since the balancing is done according to MAC address, in a “gatewayed” configuration (as described above), this mode will send all traffic across a single device. However, in a “local” network configuration, this mode balances multiple local network peers across devices in a vaguely intelligent manner (not a simple XOR as in balance-xor or 802.3ad mode), so that mathematically unlucky MAC addresses (i.e., ones that XOR to the same value) will not all “bunch up” on a single interface.}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj)ubh)}(hXDUnlike 802.3ad, interfaces may be of differing speeds, and no special switch configuration is required. On the down side, in this mode all incoming traffic arrives over a single interface, this mode requires certain ethtool support in the network device driver of the slave interfaces, and the ARP monitor is not available.h]hXDUnlike 802.3ad, interfaces may be of differing speeds, and no special switch configuration is required. On the down side, in this mode all incoming traffic arrives over a single interface, this mode requires certain ethtool support in the network device driver of the slave interfaces, and the ARP monitor is not available.>}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj)ubeh}(h]h ]h"]h$]h&]uh1j hj)ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(hhubjm )}(hXbalance-alb: This mode is everything that balance-tlb is, and more. It has all of the features (and restrictions) of balance-tlb, and will also balance incoming traffic from local network peers (as described in the Bonding Module Options section, above). The only additional down side to this mode is that the network device driver must support changing the hardware address while the device is open. h](js )}(h balance-alb:h]h balance-alb:}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1jr hhhM hj)ubj )}(hhh](h)}(hThis mode is everything that balance-tlb is, and more. It has all of the features (and restrictions) of balance-tlb, and will also balance incoming traffic from local network peers (as described in the Bonding Module Options section, above).h]hThis mode is everything that balance-tlb is, and more. It has all of the features (and restrictions) of balance-tlb, and will also balance incoming traffic from local network peers (as described in the Bonding Module Options section, above).}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj)ubh)}(hThe only additional down side to this mode is that the network device driver must support changing the hardware address while the device is open.h]hThe only additional down side to this mode is that the network device driver must support changing the hardware address while the device is open.}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj)ubeh}(h]h ]h"]h$]h&]uh1j hj)ubeh}(h]h ]h"]h$]h&]uh1jl hhhM hjJ(hhubeh}(h]h ]h"]h$]h&]uh1jg hj+(hhhhhNubeh}(h]4mt-bonding-mode-selection-for-single-switch-topologyah ]h"];12.1.1 mt bonding mode selection for single switch topologyah$]h&]uh1hhjY'hhhhhMn ubh)}(hhh](h)}(h412.1.2 MT Link Monitoring for Single Switch Topologyh]h412.1.2 MT Link Monitoring for Single Switch Topology}(hj3*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj0*hhhhhM ubh)}(hX,The choice of link monitoring may largely depend upon which mode you choose to use. The more advanced load balancing modes do not support the use of the ARP monitor, and are thus restricted to using the MII monitor (which does not provide as high a level of end to end assurance as the ARP monitor).h]hX,The choice of link monitoring may largely depend upon which mode you choose to use. The more advanced load balancing modes do not support the use of the ARP monitor, and are thus restricted to using the MII monitor (which does not provide as high a level of end to end assurance as the ARP monitor).}(hjA*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj0*hhubeh}(h]-mt-link-monitoring-for-single-switch-topologyah ]h"]412.1.2 mt link monitoring for single switch topologyah$]h&]uh1hhjY'hhhhhM ubh)}(hhh](h)}(h512.2 Maximum Throughput in a Multiple Switch Topologyh]h512.2 Maximum Throughput in a Multiple Switch Topology}(hjZ*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjW*hhhhhM ubh)}(hMultiple switches may be utilized to optimize for throughput when they are configured in parallel as part of an isolated network between two or more systems, for example::h]hMultiple switches may be utilized to optimize for throughput when they are configured in parallel as part of an isolated network between two or more systems, for example:}(hjh*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjW*hhubj)}(hX +-----------+ | Host A | +-+---+---+-+ | | | +--------+ | +---------+ | | | +------+---+ +-----+----+ +-----+----+ | Switch A | | Switch B | | Switch C | +------+---+ +-----+----+ +-----+----+ | | | +--------+ | +---------+ | | | +-+---+---+-+ | Host B | +-----------+h]hX +-----------+ | Host A | +-+---+---+-+ | | | +--------+ | +---------+ | | | +------+---+ +-----+----+ +-----+----+ | Switch A | | Switch B | | Switch C | +------+---+ +-----+----+ +-----+----+ | | | +--------+ | +---------+ | | | +-+---+---+-+ | Host B | +-----------+}hjv*sbah}(h]h ]h"]h$]h&]hhuh1jhhhM hjW*hhubh)}(hXIn this configuration, the switches are isolated from one another. One reason to employ a topology such as this is for an isolated network with many hosts (a cluster configured for high performance, for example), using multiple smaller switches can be more cost effective than a single larger switch, e.g., on a network with 24 hosts, three 24 port switches can be significantly less expensive than a single 72 port switch.h]hXIn this configuration, the switches are isolated from one another. One reason to employ a topology such as this is for an isolated network with many hosts (a cluster configured for high performance, for example), using multiple smaller switches can be more cost effective than a single larger switch, e.g., on a network with 24 hosts, three 24 port switches can be significantly less expensive than a single 72 port switch.}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjW*hhubh)}(hIf access beyond the network is required, an individual host can be equipped with an additional network device connected to an external network; this host then additionally acts as a gateway.h]hIf access beyond the network is required, an individual host can be equipped with an additional network device connected to an external network; this host then additionally acts as a gateway.}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjW*hhubeh}(h]0maximum-throughput-in-a-multiple-switch-topologyah ]h"]512.2 maximum throughput in a multiple switch topologyah$]h&]uh1hhjY'hhhhhM ubh)}(hhh](h)}(h=12.2.1 MT Bonding Mode Selection for Multiple Switch Topologyh]h=12.2.1 MT Bonding Mode Selection for Multiple Switch Topology}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj*hhhhhM ubh)}(hX@In actual practice, the bonding mode typically employed in configurations of this type is balance-rr. Historically, in this network configuration, the usual caveats about out of order packet delivery are mitigated by the use of network adapters that do not do any kind of packet coalescing (via the use of NAPI, or because the device itself does not generate interrupts until some number of packets has arrived). When employed in this fashion, the balance-rr mode allows individual connections between two hosts to effectively utilize greater than one interface's bandwidth.h]hXBIn actual practice, the bonding mode typically employed in configurations of this type is balance-rr. Historically, in this network configuration, the usual caveats about out of order packet delivery are mitigated by the use of network adapters that do not do any kind of packet coalescing (via the use of NAPI, or because the device itself does not generate interrupts until some number of packets has arrived). When employed in this fashion, the balance-rr mode allows individual connections between two hosts to effectively utilize greater than one interface’s bandwidth.}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM! hj*hhubeh}(h]6mt-bonding-mode-selection-for-multiple-switch-topologyah ]h"]=12.2.1 mt bonding mode selection for multiple switch topologyah$]h&]uh1hhjY'hhhhhM ubh)}(hhh](h)}(h612.2.2 MT Link Monitoring for Multiple Switch Topologyh]h612.2.2 MT Link Monitoring for Multiple Switch Topology}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj*hhhhhM, ubh)}(hX}Again, in actual practice, the MII monitor is most often used in this configuration, as performance is given preference over availability. The ARP monitor will function in this topology, but its advantages over the MII monitor are mitigated by the volume of probes needed as the number of systems involved grows (remember that each host in the network is configured with bonding).h]hX}Again, in actual practice, the MII monitor is most often used in this configuration, as performance is given preference over availability. The ARP monitor will function in this topology, but its advantages over the MII monitor are mitigated by the volume of probes needed as the number of systems involved grows (remember that each host in the network is configured with bonding).}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM. hj*hhubeh}(h]/mt-link-monitoring-for-multiple-switch-topologyah ]h"]612.2.2 mt link monitoring for multiple switch topologyah$]h&]uh1hhjY'hhhhhM, ubeh}(h]*configuring-bonding-for-maximum-throughputah ]h"].12. configuring bonding for maximum throughputah$]h&]uh1hhhhhhhhM$ ubh)}(hhh](h)}(h13. Switch Behavior Issuesh]h13. Switch Behavior Issues}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj*hhhhhM6 ubh)}(hhh](h)}(h+13.1 Link Establishment and Failover Delaysh]h+13.1 Link Establishment and Failover Delays}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj+hhhhhM9 ubh)}(hqSome switches exhibit undesirable behavior with regard to the timing of link up and down reporting by the switch.h]hqSome switches exhibit undesirable behavior with regard to the timing of link up and down reporting by the switch.}(hj +hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM; hj+hhubh)}(hXFirst, when a link comes up, some switches may indicate that the link is up (carrier available), but not pass traffic over the interface for some period of time. This delay is typically due to some type of autonegotiation or routing protocol, but may also occur during switch initialization (e.g., during recovery after a switch failure). If you find this to be a problem, specify an appropriate value to the updelay bonding module option to delay the use of the relevant interface(s).h]hXFirst, when a link comes up, some switches may indicate that the link is up (carrier available), but not pass traffic over the interface for some period of time. This delay is typically due to some type of autonegotiation or routing protocol, but may also occur during switch initialization (e.g., during recovery after a switch failure). If you find this to be a problem, specify an appropriate value to the updelay bonding module option to delay the use of the relevant interface(s).}(hj.+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM> hj+hhubh)}(hSecond, some switches may "bounce" the link state one or more times while a link is changing state. This occurs most commonly while the switch is initializing. Again, an appropriate updelay value may help.h]hSecond, some switches may “bounce” the link state one or more times while a link is changing state. This occurs most commonly while the switch is initializing. Again, an appropriate updelay value may help.}(hj<+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMG hj+hhubh)}(hX,Note that when a bonding interface has no active links, the driver will immediately reuse the first link that goes up, even if the updelay parameter has been specified (the updelay is ignored in this case). If there are slave interfaces waiting for the updelay timeout to expire, the interface that first went into that state will be immediately reused. This reduces down time of the network if the value of updelay has been overestimated, and since this occurs only in cases with no connectivity, there is no additional penalty for ignoring the updelay.h]hX,Note that when a bonding interface has no active links, the driver will immediately reuse the first link that goes up, even if the updelay parameter has been specified (the updelay is ignored in this case). If there are slave interfaces waiting for the updelay timeout to expire, the interface that first went into that state will be immediately reused. This reduces down time of the network if the value of updelay has been overestimated, and since this occurs only in cases with no connectivity, there is no additional penalty for ignoring the updelay.}(hjJ+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhML hj+hhubh)}(hXIn addition to the concerns about switch timings, if your switches take a long time to go into backup mode, it may be desirable to not activate a backup interface immediately after a link goes down. Failover may be delayed via the downdelay bonding module option.h]hXIn addition to the concerns about switch timings, if your switches take a long time to go into backup mode, it may be desirable to not activate a backup interface immediately after a link goes down. Failover may be delayed via the downdelay bonding module option.}(hjX+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMV hj+hhubeh}(h]&link-establishment-and-failover-delaysah ]h"]+13.1 link establishment and failover delaysah$]h&]uh1hhj*hhhhhM9 ubh)}(hhh](h)}(h 13.2 Duplicated Incoming Packetsh]h 13.2 Duplicated Incoming Packets}(hjq+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjn+hhhhhM\ ubh)}(hNOTE: Starting with version 3.0.2, the bonding driver has logic to suppress duplicate packets, which should largely eliminate this problem. The following description is kept for reference.h]hNOTE: Starting with version 3.0.2, the bonding driver has logic to suppress duplicate packets, which should largely eliminate this problem. The following description is kept for reference.}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM^ hjn+hhubh)}(hXCIt is not uncommon to observe a short burst of duplicated traffic when the bonding device is first used, or after it has been idle for some period of time. This is most easily observed by issuing a "ping" to some other host on the network, and noticing that the output from ping flags duplicates (typically one per slave).h]hXGIt is not uncommon to observe a short burst of duplicated traffic when the bonding device is first used, or after it has been idle for some period of time. This is most easily observed by issuing a “ping” to some other host on the network, and noticing that the output from ping flags duplicates (typically one per slave).}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMb hjn+hhubh)}(h}For example, on a bond in active-backup mode with five slaves all connected to one switch, the output may appear as follows::h]h|For example, on a bond in active-backup mode with five slaves all connected to one switch, the output may appear as follows:}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMh hjn+hhubj)}(hX)# ping -n 10.0.4.2 PING 10.0.4.2 (10.0.4.2) from 10.0.3.10 : 56(84) bytes of data. 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.7 ms 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=2 ttl=64 time=0.216 ms 64 bytes from 10.0.4.2: icmp_seq=3 ttl=64 time=0.267 ms 64 bytes from 10.0.4.2: icmp_seq=4 ttl=64 time=0.222 msh]hX)# ping -n 10.0.4.2 PING 10.0.4.2 (10.0.4.2) from 10.0.3.10 : 56(84) bytes of data. 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.7 ms 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=1 ttl=64 time=13.8 ms (DUP!) 64 bytes from 10.0.4.2: icmp_seq=2 ttl=64 time=0.216 ms 64 bytes from 10.0.4.2: icmp_seq=3 ttl=64 time=0.267 ms 64 bytes from 10.0.4.2: icmp_seq=4 ttl=64 time=0.222 ms}hj+sbah}(h]h ]h"]h$]h&]hhuh1jhhhMk hjn+hhubh)}(hX1This is not due to an error in the bonding driver, rather, it is a side effect of how many switches update their MAC forwarding tables. Initially, the switch does not associate the MAC address in the packet with a particular switch port, and so it may send the traffic to all ports until its MAC forwarding table is updated. Since the interfaces attached to the bond may occupy multiple ports on a single switch, when the switch (temporarily) floods the traffic to all ports, the bond device receives multiple copies of the same packet (one per slave device).h]hX1This is not due to an error in the bonding driver, rather, it is a side effect of how many switches update their MAC forwarding tables. Initially, the switch does not associate the MAC address in the packet with a particular switch port, and so it may send the traffic to all ports until its MAC forwarding table is updated. Since the interfaces attached to the bond may occupy multiple ports on a single switch, when the switch (temporarily) floods the traffic to all ports, the bond device receives multiple copies of the same packet (one per slave device).}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMv hjn+hhubh)}(hX)The duplicated packet behavior is switch dependent, some switches exhibit this, and some do not. On switches that display this behavior, it can be induced by clearing the MAC forwarding table (on most Cisco switches, the privileged command "clear mac address-table dynamic" will accomplish this).h]hX-The duplicated packet behavior is switch dependent, some switches exhibit this, and some do not. On switches that display this behavior, it can be induced by clearing the MAC forwarding table (on most Cisco switches, the privileged command “clear mac address-table dynamic” will accomplish this).}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjn+hhubeh}(h]duplicated-incoming-packetsah ]h"] 13.2 duplicated incoming packetsah$]h&]uh1hhj*hhhhhM\ ubeh}(h]switch-behavior-issuesah ]h"]13. switch behavior issuesah$]h&]uh1hhhhhhhhM6 ubh)}(hhh](h)}(h$14. Hardware Specific Considerationsh]h$14. Hardware Specific Considerations}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj+hhhhhM ubh)}(hThis section contains additional information for configuring bonding on specific hardware platforms, or for interfacing bonding with particular switches or other devices.h]hThis section contains additional information for configuring bonding on specific hardware platforms, or for interfacing bonding with particular switches or other devices.}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj+hhubh)}(hhh](h)}(h14.1 IBM BladeCenterh]h14.1 IBM BladeCenter}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj,hhhhhM ubh)}(h-This applies to the JS20 and similar systems.h]h-This applies to the JS20 and similar systems.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,hhubh)}(hOn the JS20 blades, the bonding driver supports only balance-rr, active-backup, balance-tlb and balance-alb modes. This is largely due to the network topology inside the BladeCenter, detailed below.h]hOn the JS20 blades, the bonding driver supports only balance-rr, active-backup, balance-tlb and balance-alb modes. This is largely due to the network topology inside the BladeCenter, detailed below.}(hj!,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,hhubeh}(h]ibm-bladecenterah ]h"]14.1 ibm bladecenterah$]h&]uh1hhj+hhhhhM ubh)}(hhh](h)}(h JS20 network adapter informationh]h JS20 network adapter information}(hj:,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj7,hhhhhM ubh)}(hXAll JS20s come with two Broadcom Gigabit Ethernet ports integrated on the planar (that's "motherboard" in IBM-speak). In the BladeCenter chassis, the eth0 port of all JS20 blades is hard wired to I/O Module #1; similarly, all eth1 ports are wired to I/O Module #2. An add-on Broadcom daughter card can be installed on a JS20 to provide two more Gigabit Ethernet ports. These ports, eth2 and eth3, are wired to I/O Modules 3 and 4, respectively.h]hXAll JS20s come with two Broadcom Gigabit Ethernet ports integrated on the planar (that’s “motherboard” in IBM-speak). In the BladeCenter chassis, the eth0 port of all JS20 blades is hard wired to I/O Module #1; similarly, all eth1 ports are wired to I/O Module #2. An add-on Broadcom daughter card can be installed on a JS20 to provide two more Gigabit Ethernet ports. These ports, eth2 and eth3, are wired to I/O Modules 3 and 4, respectively.}(hjH,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj7,hhubh)}(hXEach I/O Module may contain either a switch or a passthrough module (which allows ports to be directly connected to an external switch). Some bonding modes require a specific BladeCenter internal network topology in order to function; these are detailed below.h]hXEach I/O Module may contain either a switch or a passthrough module (which allows ports to be directly connected to an external switch). Some bonding modes require a specific BladeCenter internal network topology in order to function; these are detailed below.}(hjV,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj7,hhubh)}(hoAdditional BladeCenter-specific networking information can be found in two IBM Redbooks (www.ibm.com/redbooks):h]hoAdditional BladeCenter-specific networking information can be found in two IBM Redbooks (www.ibm.com/redbooks):}(hjd,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj7,hhubh)}(hhh](j)}(h,"IBM eServer BladeCenter Networking Options"h]h)}(hjw,h]h0“IBM eServer BladeCenter Networking Options”}(hjy,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hju,ubah}(h]h ]h"]h$]h&]uh1jhjr,hhhhhNubj)}(h6"IBM eServer BladeCenter Layer 2-7 Network Switching" h]h)}(h5"IBM eServer BladeCenter Layer 2-7 Network Switching"h]h9“IBM eServer BladeCenter Layer 2-7 Network Switching”}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,ubah}(h]h ]h"]h$]h&]uh1jhjr,hhhhhNubeh}(h]h ]h"]h$]h&]j|j}uh1hhhhM hj7,hhubeh}(h] js20-network-adapter-informationah ]h"] js20 network adapter informationah$]h&]uh1hhj+hhhhhM ubh)}(hhh](h)}(h$BladeCenter networking configurationh]h$BladeCenter networking configuration}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj,hhhhhM ubh)}(hBecause a BladeCenter can be configured in a very large number of ways, this discussion will be confined to describing basic configurations.h]hBecause a BladeCenter can be configured in a very large number of ways, this discussion will be confined to describing basic configurations.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,hhubh)}(hNormally, Ethernet Switch Modules (ESMs) are used in I/O modules 1 and 2. In this configuration, the eth0 and eth1 ports of a JS20 will be connected to different internal switches (in the respective I/O modules).h]hNormally, Ethernet Switch Modules (ESMs) are used in I/O modules 1 and 2. In this configuration, the eth0 and eth1 ports of a JS20 will be connected to different internal switches (in the respective I/O modules).}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,hhubh)}(hX A passthrough module (OPM or CPM, optical or copper, passthrough module) connects the I/O module directly to an external switch. By using PMs in I/O module #1 and #2, the eth0 and eth1 interfaces of a JS20 can be redirected to the outside world and connected to a common external switch.h]hX A passthrough module (OPM or CPM, optical or copper, passthrough module) connects the I/O module directly to an external switch. By using PMs in I/O module #1 and #2, the eth0 and eth1 interfaces of a JS20 can be redirected to the outside world and connected to a common external switch.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,hhubh)}(hX]Depending upon the mix of ESMs and PMs, the network will appear to bonding as either a single switch topology (all PMs) or as a multiple switch topology (one or more ESMs, zero or more PMs). It is also possible to connect ESMs together, resulting in a configuration much like the example in "High Availability in a Multiple Switch Topology," above.h]hXaDepending upon the mix of ESMs and PMs, the network will appear to bonding as either a single switch topology (all PMs) or as a multiple switch topology (one or more ESMs, zero or more PMs). It is also possible to connect ESMs together, resulting in a configuration much like the example in “High Availability in a Multiple Switch Topology,” above.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj,hhubeh}(h]$bladecenter-networking-configurationah ]h"]$bladecenter networking configurationah$]h&]uh1hhj+hhhhhM ubh)}(hhh](h)}(hRequirements for specific modesh]hRequirements for specific modes}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj-hhhhhM ubh)}(hThe balance-rr mode requires the use of passthrough modules for devices in the bond, all connected to an common external switch. That switch must be configured for "etherchannel" or "trunking" on the appropriate ports, as is usual for balance-rr.h]hThe balance-rr mode requires the use of passthrough modules for devices in the bond, all connected to an common external switch. That switch must be configured for “etherchannel” or “trunking” on the appropriate ports, as is usual for balance-rr.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj-hhubh)}(hXXThe balance-alb and balance-tlb modes will function with either switch modules or passthrough modules (or a mix). The only specific requirement for these modes is that all network interfaces must be able to reach all destinations for traffic sent over the bonding device (i.e., the network must converge at some point outside the BladeCenter).h]hXXThe balance-alb and balance-tlb modes will function with either switch modules or passthrough modules (or a mix). The only specific requirement for these modes is that all network interfaces must be able to reach all destinations for traffic sent over the bonding device (i.e., the network must converge at some point outside the BladeCenter).}(hj"-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj-hhubh)}(h6The active-backup mode has no additional requirements.h]h6The active-backup mode has no additional requirements.}(hj0-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj-hhubeh}(h]requirements-for-specific-modesah ]h"]requirements for specific modesah$]h&]uh1hhj+hhhhhM ubh)}(hhh](h)}(hLink monitoring issuesh]hLink monitoring issues}(hjI-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjF-hhhhhM ubh)}(hXWhen an Ethernet Switch Module is in place, only the ARP monitor will reliably detect link loss to an external switch. This is nothing unusual, but examination of the BladeCenter cabinet would suggest that the "external" network ports are the ethernet ports for the system, when it fact there is a switch between these "external" ports and the devices on the JS20 system itself. The MII monitor is only able to detect link failures between the ESM and the JS20 system.h]hXWhen an Ethernet Switch Module is in place, only the ARP monitor will reliably detect link loss to an external switch. This is nothing unusual, but examination of the BladeCenter cabinet would suggest that the “external” network ports are the ethernet ports for the system, when it fact there is a switch between these “external” ports and the devices on the JS20 system itself. The MII monitor is only able to detect link failures between the ESM and the JS20 system.}(hjW-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjF-hhubh)}(hWhen a passthrough module is in place, the MII monitor does detect failures to the "external" port, which is then directly connected to the JS20 system.h]hWhen a passthrough module is in place, the MII monitor does detect failures to the “external” port, which is then directly connected to the JS20 system.}(hje-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjF-hhubeh}(h]link-monitoring-issuesah ]h"]link monitoring issuesah$]h&]uh1hhj+hhhhhM ubh)}(hhh](h)}(hOther concernsh]hOther concerns}(hj~-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj{-hhhhhM ubh)}(hXThe Serial Over LAN (SoL) link is established over the primary ethernet (eth0) only, therefore, any loss of link to eth0 will result in losing your SoL connection. It will not fail over with other network traffic, as the SoL system is beyond the control of the bonding driver.h]hXThe Serial Over LAN (SoL) link is established over the primary ethernet (eth0) only, therefore, any loss of link to eth0 will result in losing your SoL connection. It will not fail over with other network traffic, as the SoL system is beyond the control of the bonding driver.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj{-hhubh)}(hIt may be desirable to disable spanning tree on the switch (either the internal Ethernet Switch Module, or an external switch) to avoid fail-over delay issues when using bonding.h]hIt may be desirable to disable spanning tree on the switch (either the internal Ethernet Switch Module, or an external switch) to avoid fail-over delay issues when using bonding.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj{-hhubeh}(h]other-concernsah ]h"]other concernsah$]h&]uh1hhj+hhhhhM ubeh}(h] hardware-specific-considerationsah ]h"]$14. hardware specific considerationsah$]h&]uh1hhhhhhhhM ubh)}(hhh](h)}(h15. Frequently Asked Questionsh]h15. Frequently Asked Questions}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj-hhhhhM ubh)}(hhh](h)}(h1. Is it SMP safe?h]h1. Is it SMP safe?}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj-hhhhhM ubh)}(hvYes. The old 2.0.xx channel bonding patch was not SMP safe. The new driver was designed to be SMP safe from the start.h]hvYes. The old 2.0.xx channel bonding patch was not SMP safe. The new driver was designed to be SMP safe from the start.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj-hhubeh}(h]is-it-smp-safeah ]h"]1. is it smp safe?ah$]h&]uh1hhj-hhhhhM ubh)}(hhh](h)}(h)2. What type of cards will work with it?h]h)2. What type of cards will work with it?}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj-hhhhhM ubh)}(hAny Ethernet type cards (you can even mix cards - a Intel EtherExpress PRO/100 and a 3com 3c905b, for example). For most modes, devices need not be of the same speed.h]hAny Ethernet type cards (you can even mix cards - a Intel EtherExpress PRO/100 and a 3com 3c905b, for example). For most modes, devices need not be of the same speed.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj-hhubh)}(h[Starting with version 3.2.1, bonding also supports Infiniband slaves in active-backup mode.h]h[Starting with version 3.2.1, bonding also supports Infiniband slaves in active-backup mode.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj-hhubeh}(h]$what-type-of-cards-will-work-with-itah ]h"](2. what type of cards will work with it?ah$]h&]uh1hhj-hhhhhM ubh)}(hhh](h)}(h(3. How many bonding devices can I have?h]h(3. How many bonding devices can I have?}(hj(.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj%.hhhhhM ubh)}(hThere is no limit.h]hThere is no limit.}(hj6.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj%.hhubeh}(h]#how-many-bonding-devices-can-i-haveah ]h"]'3. how many bonding devices can i have?ah$]h&]uh1hhj-hhhhhM ubh)}(hhh](h)}(h.4. How many slaves can a bonding device have?h]h.4. How many slaves can a bonding device have?}(hjO.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjL.hhhhhM ubh)}(hThis is limited only by the number of network interfaces Linux supports and/or the number of network cards you can place in your system.h]hThis is limited only by the number of network interfaces Linux supports and/or the number of network cards you can place in your system.}(hj].hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjL.hhubeh}(h])how-many-slaves-can-a-bonding-device-haveah ]h"]-4. how many slaves can a bonding device have?ah$]h&]uh1hhj-hhhhhM ubh)}(hhh](h)}(h(5. What happens when a slave link dies?h]h(5. What happens when a slave link dies?}(hjv.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjs.hhhhhM ubh)}(hXIf link monitoring is enabled, then the failing device will be disabled. The active-backup mode will fail over to a backup link, and other modes will ignore the failed link. The link will continue to be monitored, and should it recover, it will rejoin the bond (in whatever manner is appropriate for the mode). See the sections on High Availability and the documentation for each mode for additional information.h]hXIf link monitoring is enabled, then the failing device will be disabled. The active-backup mode will fail over to a backup link, and other modes will ignore the failed link. The link will continue to be monitored, and should it recover, it will rejoin the bond (in whatever manner is appropriate for the mode). See the sections on High Availability and the documentation for each mode for additional information.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjs.hhubh)}(hX>Link monitoring can be enabled via either the miimon or arp_interval parameters (described in the module parameters section, above). In general, miimon monitors the carrier state as sensed by the underlying network device, and the arp monitor (arp_interval) monitors connectivity to another host on the local network.h]hX>Link monitoring can be enabled via either the miimon or arp_interval parameters (described in the module parameters section, above). In general, miimon monitors the carrier state as sensed by the underlying network device, and the arp monitor (arp_interval) monitors connectivity to another host on the local network.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjs.hhubh)}(hXAIf no link monitoring is configured, the bonding driver will be unable to detect link failures, and will assume that all links are always available. This will likely result in lost packets, and a resulting degradation of performance. The precise performance loss depends upon the bonding mode and network configuration.h]hXAIf no link monitoring is configured, the bonding driver will be unable to detect link failures, and will assume that all links are always available. This will likely result in lost packets, and a resulting degradation of performance. The precise performance loss depends upon the bonding mode and network configuration.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM$ hjs.hhubeh}(h]#what-happens-when-a-slave-link-diesah ]h"]'5. what happens when a slave link dies?ah$]h&]uh1hhj-hhhhhM ubh)}(hhh](h)}(h.6. Can bonding be used for High Availability?h]h.6. Can bonding be used for High Availability?}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj.hhhhhM+ ubh)}(h7Yes. See the section on High Availability for details.h]h7Yes. See the section on High Availability for details.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM- hj.hhubeh}(h])can-bonding-be-used-for-high-availabilityah ]h"]-6. can bonding be used for high availability?ah$]h&]uh1hhj-hhhhhM+ ubh)}(hhh](h)}(h-7. Which switches/systems does it work with?h]h-7. Which switches/systems does it work with?}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj.hhhhhM0 ubh)}(h6The full answer to this depends upon the desired mode.h]h6The full answer to this depends upon the desired mode.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM2 hj.hhubh)}(hIn the basic balance modes (balance-rr and balance-xor), it works with any system that supports etherchannel (also called trunking). Most managed switches currently available have such support, and many unmanaged switches as well.h]hIn the basic balance modes (balance-rr and balance-xor), it works with any system that supports etherchannel (also called trunking). Most managed switches currently available have such support, and many unmanaged switches as well.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM4 hj.hhubh)}(hThe advanced balance modes (balance-tlb and balance-alb) do not have special switch requirements, but do need device drivers that support specific features (described in the appropriate section under module parameters, above).h]hThe advanced balance modes (balance-tlb and balance-alb) do not have special switch requirements, but do need device drivers that support specific features (described in the appropriate section under module parameters, above).}(hj /hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM9 hj.hhubh)}(hIn 802.3ad mode, it works with systems that support IEEE 802.3ad Dynamic Link Aggregation. Most managed and many unmanaged switches currently available support 802.3ad.h]hIn 802.3ad mode, it works with systems that support IEEE 802.3ad Dynamic Link Aggregation. Most managed and many unmanaged switches currently available support 802.3ad.}(hj/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM> hj.hhubh)}(h