ovs\-fields

Section: Open vSwitch Manual (7)
Updated: 2.13.0
Page Index

 

NAME

ovs-fields - protocol header fields in OpenFlow and Open vSwitch

 

INTRODUCTION

This document aims to comprehensively document all of the fields, both standard and non-standard, supported by OpenFlow or Open vSwitch, regardless of origin46  

Fields

A field is a property of a packet46 Most familiarly, data fields are fields that can be extracted from a packet46 Most data fields are copied directly from protocol headers, e46g46 at layer 2, the Ethernet source and destination addresses, or the VLAN ID; at layer 3, the IPv4 or IPv6 source and destination; and at layer 4, the TCP or UDP ports46 Other data fields are computed, e46g46 ip_frag describes whether a packet is a fragment but it is not copied directly from the IP header46

Data fields that are always present as a consequence of the basic networking technology in use are called called root fields46 Open vSwitch 2467 and earlier considered Ethernet fields to be root fields, and this remains the default mode of operation for Open vSwitch bridges46 When a packet is received from a non-Ethernet interfaces, such as a layer-3 LISP tunnel, Open vSwitch 2467 and earlier force-fit the packet to this Ethernet-centric point of view by pretending that an Ethernet header is present whose Ethernet type that indicates the packet's actual type (and whose source and destination addresses are all-zero)46

Open vSwitch 2468 and later implement the ``packet type-aware pipeline'' concept introduced in OpenFlow 146546 Such a pipeline does not have any root fields46 Instead, a new metadata field, packet_type, indicates the basic type of the packet, which can be Ethernet, IPv4, IPv6, or another type46 For backward compatibility, by default Open vSwitch 2468 imitates the behavior of Open vSwitch 2467 and earlier46 Later versions of Open vSwitch may change the default, and in the meantime controllers can turn off this legacy behavior, on a port-by-port basis, by setting options:packet_type to ptap in the Interface table46 This is significant only for ports that can handle non-Ethernet packets, which is currently just LISP, VXLAN-GPE, and GRE tunnel ports46 See ovs-vwitchd46conf46db(5) for more information46

Non-root data fields are not always present46 A packet contains ARP fields, for example, only when its packet type is ARP or when it is an Ethernet packet whose Ethernet header indicates the Ethertype for ARP, 0x080646 In this documentation, we say that a field is applicable when it is present in a packet, and inapplicable when it is not46 (These are not standard terms46) We refer to the conditions that determine whether a field is applicable as prerequisites46 Some VLAN-related fields are a special case: these fields are always applicable for Ethernet packets, but have a designated value or bit that indicates whether a VLAN header is present, with the remaining values or bits indicating the VLAN header's content (if it is present)46

An inapplicable field does not have a value, not even a nominal ``value'' such as all-zero-bits46 In many circumstances, OpenFlow and Open vSwitch allow references only to applicable fields46 For example, one may match (see Matching, below) a given field only if the match includes the field's prerequisite, e46g46 matching an ARP field is only allowed if one also matches on Ethertype 0x0806 or the packet_type for ARP in a packet type-aware bridge46

Sometimes a packet may contain multiple instances of a header46 For example, a packet may contain multiple VLAN or MPLS headers, and tunnels can cause any data field to recur46 OpenFlow and Open vSwitch do not address these cases uniformly46 For VLAN and MPLS headers, only the outermost header is accessible, so that inner headers may be accessed only by ``popping'' (removing) the outer header46 (Open vSwitch supports only a single VLAN header in any case46) For tunnels, e46g46 GRE or VXLAN, the outer header and inner headers are treated as different data fields46

Many network protocols are built in layers as a stack of concatenated headers46 Each header typically contains a ``next type'' field that indicates the type of the protocol header that follows, e46g46 Ethernet contains an Ethertype and IPv4 contains a IP protocol type46 The exceptional cases, where protocols are layered but an outer layer does not indicate the protocol type for the inner layer, or gives only an ambiguous indication, are troublesome46 An MPLS header, for example, only indicates whether another MPLS header or some other protocol follows, and in the latter case the inner protocol must be known from the context46 In these exceptional cases, OpenFlow and Open vSwitch cannot provide insight into the inner protocol data fields without additional context, and thus they treat all later data fields as inapplicable until an OpenFlow action explicitly specifies what protocol follows46 In the case of MPLS, the OpenFlow ``pop MPLS'' action that removes the last MPLS header from a packet provides this context, as the Ethertype of the payload46 See Layer 2465: MPLS for more information46

OpenFlow and Open vSwitch support some fields other than data fields46 Metadata fields relate to the origin or treatment of a packet, but they are not extracted from the packet data itself46 One example is the physical port on which a packet arrived at the switch46 Register fields act like variables: they give an OpenFlow switch space for temporary storage while processing a packet46 Existing metadata and register fields have no prerequisites46

A field's value consists of an integral number of bytes46 For data fields, sometimes those bytes are taken directly from the packet46 Other data fields are copied from a packet with padding (usually with zeros and in the most significant positions)46 The remaining data fields are transformed in other ways as they are copied from the packets, to make them more useful for matching46  

Matching

The most important use of fields in OpenFlow is matching, to determine whether particular field values agree with a set of constraints called a match46 A match consists of zero or more constraints on individual fields, all of which must be met to satisfy the match46 (A match that contains no constraints is always satisfied46) OpenFlow and Open vSwitch support a number of forms of matching on individual fields:

Exact match, e46g46 nw_src=10461462463
Only a particular value of the field is matched; for example, only one particular source IP address46 Exact matches are written as field=value46 The forms accepted for value depend on the field46
All fields support exact matches46
Bitwise match, e46g46 nw_src=10461460460/25546255460460
Specific bits in the field must have specified values; for example, only source IP addresses in a particular subnet46 Bitwise matches are written as field=value/mask, where value and mask take one of the forms accepted for an exact match on field46 Some fields accept other forms for bitwise matches; for example, nw_src=10461460460/25546255460460 may also be written nw_src=10461460460/1646
Most OpenFlow switches do not allow every bitwise matching on every field (and before OpenFlow 1462, the protocol did not even provide for the possibility for most fields)46 Even switches that do allow bitwise matching on a given field may restrict the masks that are allowed, e46g46 by allowing matches only on contiguous sets of bits starting from the most significant bit, that is, ``CIDR'' masks [RFC 4632]46 Open vSwitch does not allows bitwise matching on every field, but it allows arbitrary bitwise masks on any field that does support bitwise matching46 (Older versions had some restrictions, as documented in the descriptions of individual fields46)
Wildcard, e46g46 ``any nw_src''
The value of the field is not constrained46 Wildcarded fields may be written as field=*, although it is unusual to mention them at all46 (When specifying a wildcard explicitly in a command invocation, be sure to using quoting to protect against shell expansion46)
There is a tiny difference between wildcarding a field and not specifying any match on a field: wildcarding a field requires satisfying the field's prerequisites46

Some types of matches on individual fields cannot be expressed directly with OpenFlow and Open vSwitch46 These can be expressed indirectly:

Set match, e46g46 ``tcp_dst mo {80, 443, 8080}''
The value of a field is one of a specified set of values; for example, the TCP destination port is 80, 443, or 808046
For matches used in flows (see Flows, below), multiple flows can simulate set matches46
Range match, e46g46 ``1000 ≤ tcp_dst ≤ 1999''
The value of the field must lie within a numerical range, for example, TCP destination ports between 1000 and 199946
Range matches can be expressed as a collection of bitwise matches46 For example, suppose that the goal is to match TCP source ports 1000 to 1999, inclusive46 The binary representations of 1000 and 1999 are:


01111101000
11111001111
The following series of bitwise matches will match 1000 and 1999 and all the values in between:


01111101xxx
0111111xxxx
10xxxxxxxxx
110xxxxxxxx
1110xxxxxxx
11110xxxxxx
1111100xxxx
which can be written as the following matches:


tcp,tp_src=0x03e8/0xfff8
tcp,tp_src=0x03f0/0xfff0
tcp,tp_src=0x0400/0xfe00
tcp,tp_src=0x0600/0xff00
tcp,tp_src=0x0700/0xff80
tcp,tp_src=0x0780/0xffc0
tcp,tp_src=0x07c0/0xfff0
Inequality match, e46g46 ``tcp_dst ≠ 80''
The value of the field differs from a specified value, for example, all TCP destination ports except 8046
An inequality match on an n-bit field can be expressed as a disjunction of n 1-bit matches46 For example, the inequality match ``vlan_pcp ≠ 5'' can be expressed as ``vlan_pcp = 0/4 or vlan_pcp = 2/2 or vlan_pcp = 0/146'' For matches used in flows (see Flows, below), sometimes one can more compactly express inequality as a higher-priority flow that matches the exceptional case paired with a lower-priority flow that matches the general case46
Alternatively, an inequality match may be converted to a pair of range matches, e46g46 tcp_src ≠ 80 may be expressed as ``0 ≤ tcp_src < 80 or 80 < tcp_src ≤ 65535'', and then each range match may in turn be converted to a bitwise match46
Conjunctive match, e46g46 ``tcp_src mo {80, 443, 8080} and tcp_dst mo {80, 443, 8080}''
As an OpenFlow extension, Open vSwitch supports matching on conditions on conjunctions of the previously mentioned forms of matching46 See the documentation for conj_id for more information46

All of these supported forms of matching are special cases of bitwise matching46 In some cases this influences the design of field values46 ip_frag is the most prominent example: it is designed to make all of the practically useful checks for IP fragmentation possible as a single bitwise match46

Shorthands

Some matches are very commonly used, so Open vSwitch accepts shorthand notations46 In some cases, Open vSwitch also uses shorthand notations when it displays matches46 The following shorthands are defined, with their long forms shown on the right side:

eth
packet_type=(0,0) (Open vSwitch 2468 and later)
ip
eth_type=0x0800
ipv6
eth_type=0x86dd
icmp
eth_type=0x0800,ip_proto=1
icmp6
eth_type=0x86dd,ip_proto=58
tcp
eth_type=0x0800,ip_proto=6
tcp6
eth_type=0x86dd,ip_proto=6
udp
eth_type=0x0800,ip_proto=17
udp6
eth_type=0x86dd,ip_proto=17
sctp
eth_type=0x0800,ip_proto=132
sctp6
eth_type=0x86dd,ip_proto=132
arp
eth_type=0x0806
rarp
eth_type=0x8035
mpls
eth_type=0x8847
mplsm
eth_type=0x8848
 

Evolution of OpenFlow Fields

The discussion so far applies to all OpenFlow and Open vSwitch versions46 This section starts to draw in specific information by explaining, in broad terms, the treatment of fields and matches in each OpenFlow version46

OpenFlow 1460

OpenFlow 1460 defined the OpenFlow protocol format of a match as a fixed-length data structure that could match on the following fields:

Ingress port46
Ethernet source and destination MAC46
Ethertype (with a special value to match frames that lack an Ethertype)46
VLAN ID and priority46
IPv4 source, destination, protocol, and DSCP46
TCP source and destination port46
UDP source and destination port46
ICMPv4 type and code46
ARP IPv4 addresses (SPA and TPA) and opcode46

Each supported field corresponded to some member of the data structure46 Some members represented multiple fields, in the case of the TCP, UDP, ICMPv4, and ARP fields whose presence is mutually exclusive46 This also meant that some members were poor fits for their fields: only the low 8 bits of the 16-bit ARP opcode could be represented, and the ICMPv4 type and code were padded with 8 bits of zeros to fit in the 16-bit members primarily meant for TCP and UDP ports46 An additional bitmap member indicated, for each member, whether its field should be an ``exact'' or ``wildcarded'' match (see Matching), with additional support for CIDR prefix matching on the IPv4 source and destination fields46

Simplicity was recognized early on as the main virtue of this approach46 Obviously, any fixed-length data structure cannot support matching new protocols that do not fit46 There was no room, for example, for matching IPv6 fields, which was not a priority at the time46 Lack of room to support matching the Ethernet addresses inside ARP packets actually caused more of a design problem later, leading to an Open vSwitch extension action specialized for dropping ``spoofed'' ARP packets in which the frame and ARP Ethernet source addressed differed46 (This extension was never standardized46 Open vSwitch dropped support for it a few releases after it added support for full ARP matching46)

The design of the OpenFlow fixed-length matches also illustrates compromises, in both directions, between the strengths and weaknesses of software and hardware that have always influenced the design of OpenFlow46 Support for matching ARP fields that do fit in the data structure was only added late in the design process (and remained optional in OpenFlow 1460), for example, because common switch ASICs did not support matching these fields46

The compromises in favor of software occurred for more complicated reasons46 The OpenFlow designers did not know how to implement matching in software that was fast, dynamic, and general46 (A way was later found [Srinivasan]46) Thus, the designers sought to support dynamic, general matching that would be fast in realistic special cases, in particular when all of the matches were microflows, that is, matches that specify every field present in a packet, because such matches can be implemented as a single hash table lookup46 Contemporary research supported the feasibility of this approach: the number of microflows in a campus network had been measured to peak at about 10,000 [Casado, section 3462]46 (Calculations show that this can only be true in a lightly loaded network [Pepelnjak]46)

As a result, OpenFlow 1460 required switches to treat microflow matches as the highest possible priority46 This let software switches perform the microflow hash table lookup first46 Only on failure to match a microflow did the switch need to fall back to checking the more general and presumed slower matches46 Also, the OpenFlow 1460 flow match was minimally flexible, with no support for general bitwise matching, partly on the basis that this seemed more likely amenable to relatively efficient software implementation46 (CIDR masking for IPv4 addresses was added relatively late in the OpenFlow 1460 design process46)

Microflow matching was later discovered to aid some hardware implementations46 The TCAM chips used for matching in hardware do not support priority in the same way as OpenFlow but instead tie priority to ordering [Pagiamtzis]46 Thus, adding a new match with a priority between the priorities of existing matches can require reordering an arbitrary number of TCAM entries46 On the other hand, when microflows are highest priority, they can be managed as a set-aside portion of the TCAM entries46

The emphasis on matching microflows also led designers to carefully consider the bandwidth requirements between switch and controller: to maximize the number of microflow setups per second, one must minimize the size of each flow's description46 This favored the fixed-length format in use, because it expressed common TCP and UDP microflows in fewer bytes than more flexible ``type-length-value'' (TLV) formats46 (Early versions of OpenFlow also avoided TLVs in general to head off protocol fragmentation46)

Inapplicable Fields

OpenFlow 1460 does not clearly specify how to treat inapplicable fields46 The members for inapplicable fields are always present in the match data structure, as are the bits that indicate whether the fields are matched, and the ``correct'' member and bit values for inapplicable fields is unclear46 OpenFlow 1460 implementations changed their behavior over time as priorities shifted46 The early OpenFlow reference implementation, motivated to make every flow a microflow to enable hashing, treated inapplicable fields as exact matches on a value of 046 Initially, this behavior was implemented in the reference controller only46

Later, the reference switch was also changed to actually force any wildcarded inapplicable fields into exact matches on 046 The latter behavior sometimes caused problems, because the modified flow was the one reported back to the controller later when it queried the flow table, and the modifications sometimes meant that the controller could not properly recognize the flow that it had added46 In retrospect, perhaps this problem should have alerted the designers to a design error, but the ability to use a single hash table was held to be more important than almost every other consideration at the time46

When more flexible match formats were introduced much later, they disallowed any mention of inapplicable fields as part of a match46 This raised the question of how to translate between this new format and the OpenFlow 1460 fixed format46 It seemed somewhat inconsistent and backward to treat fields as exact-match in one format and forbid matching them in the other, so instead the treatment of inapplicable fields in the fixed-length format was changed from exact match on 0 to wildcarding46 (A better classifier had by now eliminated software performance problems with wildcards46)

The OpenFlow 1460461 errata (released only in 2012) added some additional explanation [OpenFlow 1460461, section 3464], but it did not mandate specific behavior because of variation among implementations46

OpenFlow 1461

The OpenFlow 1461 protocol match format was designed as a type/length/value (TLV) format to allow for future flexibility46 The specification standardized only a single type OFPMT_STANDARD (0) with a fixed-size payload, described here46 The additional fields and bitwise masks in OpenFlow 1461 cause this match structure to be over twice as large as in OpenFlow 1460, 88 bytes versus 4046

OpenFlow 1461 added support for the following fields:

SCTP source and destination port46
MPLS label and traffic control (TC) fields46
One 64-bit register (named ``metadata'')46

OpenFlow 1461 increased the width of the ingress port number field (and all other port numbers in the protocol) from 16 bits to 32 bits46

OpenFlow 1461 increased matching flexibility by introducing arbitrary bitwise matching on Ethernet and IPv4 address fields and on the new ``metadata'' register field46 Switches were not required to support all possible masks [OpenFlow 1461, section 4463]46

By a strict reading of the specification, OpenFlow 1461 removed support for matching ICMPv4 type and code [OpenFlow 1461, section A462463], but this is likely an editing error because ICMP matching is described elsewhere [OpenFlow 1461, Table 3, Table 4, Figure 4]46 Open vSwitch does support ICMPv4 type and code matching with OpenFlow 146146

OpenFlow 1461 avoided the pitfalls of inapplicable fields that OpenFlow 1460 encountered, by requiring the switch to ignore the specified field values [OpenFlow 1461, section A462463]46 It also implied that the switch should ignore the bits that indicate whether to match inapplicable fields46

Physical Ingress Port

OpenFlow 1461 introduced a new pseudo-field, the physical ingress port46 The physical ingress port is only a pseudo-field because it cannot be used for matching46 It appears only one place in the protocol, in the ``packet-in'' message that passes a packet received at the switch to an OpenFlow controller46

A packet's ingress port and physical ingress port are identical except for packets processed by a switch feature such as bonding or tunneling that makes a packet appear to arrive on a ``virtual'' port associated with the bond or the tunnel46 For such packets, the ingress port is the virtual port and the physical ingress port is, naturally, the physical port46 Open vSwitch implements both bonding and tunneling, but its bonding implementation does not use virtual ports and its tunnels are typically not on the same OpenFlow switch as their physical ingress ports (which need not be part of any switch), so the ingress port and physical ingress port are always the same in Open vSwitch46

OpenFlow 1462

OpenFlow 1462 abandoned the fixed-length approach to matching46 One reason was size, since adding support for IPv6 address matching (now seen as important), with bitwise masks, would have added 64 bytes to the match length, increasing it from 88 bytes in OpenFlow 1461 to over 150 bytes46 Extensibility had also become important as controller writers increasingly wanted support for new fields without having to change messages throughout the OpenFlow protocol46 The challenges of carefully defining fixed-length matches to avoid problems with inapplicable fields had also become clear over time46

Therefore, OpenFlow 1462 adopted a flow format using a flexible type-length-value (TLV) representation, in which each TLV expresses a match on one field46 These TLVs were in turn encapsulated inside the outer TLV wrapper introduced in OpenFlow 1461 with the new identifier OFPMT_OXM (1)46 (This wrapper fulfilled its intended purpose of reducing the amount of churn in the protocol when changing match formats; some messages that included matches remained unchanged from OpenFlow 1461 to 1462 and later versions46)

OpenFlow 1462 added support for the following fields:

ARP hardware addresses (SHA and THA)46
IPv4 ECN46
IPv6 source and destination addresses, flow label, DSCP, ECN, and protocol46
TCP, UDP, and SCTP port numbers when encapsulated inside IPv646
ICMPv6 type and code46
ICMPv6 Neighbor Discovery target address and source and target Ethernet addresses46

The OpenFlow 1462 format, called OXM (OpenFlow Extensible Match), was modeled closely on an extension to OpenFlow 1460 introduced in Open vSwitch 1461 called NXM (Nicira Extended Match)46 Each OXM or NXM TLV has the following format:


        type

<---------------->
16 7 1 8 length bytes
+------------+-----+--+------+ +------------+
|vendor/class|field|HM|length| | body |
+------------+-----+--+------+ +------------+

The most significant 16 bits of the NXM or OXM header, called vendor by NXM and class by OXM, identify an organization permitted to allocate identifiers for fields46 NXM allocates only two vendors, 0x0000 for fields supported by OpenFlow 1460 and 0x0001 for fields implemented as an Open vSwitch extension46 OXM assigns classes as follows:

0x0000 (OFPXMC_NXM_0)46

0x0001 (OFPXMC_NXM_1)46 Reserved for NXM compatibility46
0x0002 to 0x7fff
Reserved for allocation to ONF members, but none yet assigned46
0x8000 (OFPXMC_OPENFLOW_BASIC)
Used for most standard OpenFlow fields46
0x8001 (OFPXMC_PACKET_REGS)
Used for packet register fields in OpenFlow 1465 and later46
0x8002 to 0xfffe
Reserved for the OpenFlow specification46
0xffff (OFPXMC_EXPERIMENTER)
Experimental use46

When class is 0xffff, the OXM header is extended to 64 bits by using the first 32 bits of the body as an experimenter field whose most significant byte is zero and whose remaining bytes are an Organizationally Unique Identifier (OUI) assigned by the IEEE [IEEE OUI], as shown below46


     type                 experimenter

<----------> <---------->
16 7 1 8 8 24 (length - 4) bytes
+------+-----+--+------+ +------+-----+ +------------------+
|class |field|HM|length| | zero | OUI | | body |
+------+-----+--+------+ +------+-----+ +------------------+
0xffff 0x00

OpenFlow says that support for experimenter fields is optional46 Open vSwitch 2464 and later does support them, so that it can support the following experimenter classes:

0x4f4e4600 (ONFOXM_ET)
Used by official Open Networking Foundation extensions in OpenFlow 1463 and later46 e46g46 [TCP Flags Match Field Extension]46
0x005ad650 (NXOXM_NSH)
Used by Open vSwitch for NSH extensions, in the absence of an official ONF-assigned class46 (This OUI is randomly generated46)

Taken as a unit, class (or vendor), field, and experimenter (when present) uniquely identify a particular field46

When hasmask (abbreviated HM above) is 0, the OXM is an exact match on an entire field46 In this case, the body (excluding the experimenter field, if present) is a single value to be matched46

When hasmask is 1, the OXM is a bitwise match46 The body (excluding the experimenter field) consists of a value to match, followed by the bitwise mask to apply46 A 1-bit in the mask indicates that the corresponding bit in the value should be matched and a 0-bit that it should be ignored46 For example, for an IP address field, a value of 19246168460460 followed by a mask of 25546255460460 would match addresses in the 19646168460460/16 subnet46

Some fields might not support masking at all, and some fields that do support masking might restrict it to certain patterns46 For example, fields that have IP address values might be restricted to CIDR masks46 The descriptions of individual fields note these restrictions46
An OXM TLV with a mask that is all zeros is not useful (although it is not forbidden), because it is has the same effect as omitting the TLV entirely46
It is not meaningful to pair a 0-bit in an OXM mask with a 1-bit in its value, and Open vSwitch rejects such an OXM with the error OFPBMC_BAD_WILDCARDS, as required by OpenFlow 1463 and later46

The length identifies the number of bytes in the body, including the 4-byte experimenter header, if it is present46 Each OXM TLV has a fixed length; that is, given class, field, experimenter (if present), and hasmask, length is a constant46 The length is included explicitly to allow software to minimally parse OXM TLVs of unknown types46

OXM TLVs must be ordered so that a field's prerequisites are satisfied before it is parsed46 For example, an OXM TLV that matches on the IPv4 source address field is only allowed following an OXM TLV that matches on the Ethertype for IPv446 Similarly, an OXM TLV that matches on the TCP source port must follow a TLV that matches an Ethertype of IPv4 or IPv6 and one that matches an IP protocol of TCP (in that order)46 The order of OXM TLVs is not otherwise restricted; no canonical ordering is defined46

A given field may be matched only once in a series of OXM TLVs46

OpenFlow 1463

OpenFlow 1463 showed OXM to be largely successful, by adding new fields without making any changes to how flow matches otherwise worked46 It added OXMs for the following fields supported by Open vSwitch:

Tunnel ID for ports associated with e46g46 VXLAN or keyed GRE46
MPLS ``bottom of stack'' (BOS) bit46

OpenFlow 1463 also added OXMs for the following fields not documented here and not yet implemented by Open vSwitch:

IPv6 extension header handling46
PBB I-SID46

OpenFlow 1464

OpenFlow 1464 added OXMs for the following fields not documented here and not yet implemented by Open vSwitch:

PBB UCA46

OpenFlow 1465

OpenFlow 1465 added OXMs for the following fields supported by Open vSwitch:

Packet type46
TCP flags46
Packet registers46
The output port in the OpenFlow action set46
 

FIELDS REFERENCE

The following sections document the fields that Open vSwitch supports46 Each section provides introductory material on a group of related fields, followed by information on each individual field46 In addition to field-specific information, each field begins with a table with entries for the following important properties:

Name
The field's name, used for parsing and formatting the field, e46g46 in ovs-ofctl commands46 For historical reasons, some fields have an additional name that is accepted as an alternative in parsing46 This name, when there is one, is listed as well, e46g46 ``tun (aka tunnel_id)46''
Width
The field's width, always a multiple of 8 bits46 Some fields don't use all of the bits, so this may be accompanied by an explanation46 For example, OpenFlow embeds the 2-bit IP ECN field as as the low bits in an 8-bit byte, and so its width is expressed as ``8 bits (only the least-significant 2 bits may be nonzero)46''
Format
How a value for the field is formatted or parsed by, e46g46, ovs-ofctl46 Some possibilities are generic:
decimal
Formats as a decimal number46 On input, accepts decimal numbers or hexadecimal numbers prefixed by 0x46
hexadecimal
Formats as a hexadecimal number prefixed by 0x46 On input, accepts decimal numbers or hexadecimal numbers prefixed by 0x46 (The default for parsing is not hexadecimal: only a 0x prefix causes input to be treated as hexadecimal46)
Ethernet
Formats and accepts the common Ethernet address format xx:xx:xx:xx:xx:xx46
IPv4
Formats and accepts the dotted-quad format a46b46c46d46 For bitwise matches, formats and accepts address/length CIDR notation in addition to address/mask46
IPv6
Formats and accepts the common IPv6 address formats, plus CIDR notation for bitwise matches46
OpenFlow 1460 port
Accepts 16-bit port numbers in decimal, plus OpenFlow well-known port names (e46g46 IN_PORT) in uppercase or lowercase46
OpenFlow 1461+ port
Same syntax as OpenFlow 1460 ports but for 32-bit OpenFlow 1461+ port number fields46
Other, field-specific formats are explained along with their fields46
Masking
For most fields, this says ``arbitrary bitwise masks,'' meaning that a flow may match any combination of bits in the field46 Some fields instead say ``exact match only,'' which means that a flow that matches on this field must match on the whole field instead of just certain bits46 Either way, this reports masking support for the latest version of Open vSwitch using OXM or NXM (that is, either OpenFlow 1462+ or OpenFlow 1460 plus Open vSwitch NXM extensions)46 In particular, OpenFlow 1460 (without NXM) and 1461 don't always support masking even if Open vSwitch itself does; refer to the OpenFlow 1460 and OpenFlow 1461 rows to learn about masking with these protocol versions46
Prerequisites
Requirements that must be met to match on this field46 For example, ip_src has IPv4 as a prerequisite, meaning that a match must include eth_type=0x0800 to match on the IPv4 source address46 The following prerequisites, with their requirements, are currently in use:
none
(no requirements)
VLAN VID
vlan_tci=0x1000/0x1000 (i46e46 a VLAN header is present)
ARP
eth_type=0x0806 (ARP) or eth_type=0x8035 (RARP)
IPv4
eth_type=0x0800
IPv6
eth_type=0x86dd
IPv4/IPv6
IPv4 or IPv6
MPLS
eth_type=0x8847 or eth_type=0x8848
TCP
IPv4/IPv6 and ip_proto=6
UDP
IPv4/IPv6 and ip_proto=17
SCTP
IPv4/IPv6 and ip_proto=132
ICMPv4
IPv4 and ip_proto=1
ICMPv6
IPv6 and ip_proto=58
ND solicit
ICMPv6 and icmp_type=135 and icmp_code=0
ND advert
ICMPv6 and icmp_type=136 and icmp_code=0
ND
ND solicit or ND advert
The TCP, UDP, and SCTP prerequisites also have the special requirement that nw_frag is not being used to select ``later fragments46'' This is because only the first fragment of a fragmented IPv4 or IPv6 datagram contains the TCP or UDP header46
Access
Most fields are ``read/write,'' which means that common OpenFlow actions like set_field can modify them46 Fields that are ``read-only'' cannot be modified in these general-purpose ways, although there may be other ways that actions can modify them46
OpenFlow 1460

OpenFlow 1461 These rows report the level of support that OpenFlow 1460 or OpenFlow 1461, respectively, has for a field46 For OpenFlow 1460, supported fields are reported as either ``yes (exact match only)'' for fields that do not support any bitwise masking or ``yes (CIDR match only)'' for fields that support CIDR masking46 OpenFlow 1461 supported fields report either ``yes (exact match only)'' or simply ``yes'' for fields that do support arbitrary masks46 These OpenFlow versions supported a fixed collection of fields that cannot be extended, so many more fields are reported as ``not supported46''
OXM

NXM These rows report the OXM and NXM code points that correspond to a given field46 Either or both may be ``none46''
A field that has only an OXM code point is usually one that was standardized before it was added to Open vSwitch46 A field that has only an NXM code point is usually one that is not yet standardized46 When a field has both OXM and NXM code points, it usually indicates that it was introduced as an Open vSwitch extension under the NXM code point, then later standardized under the OXM code point46 A field can have more than one OXM code point if it was standardized in OpenFlow 1464 or later and additionally introduced as an official ONF extension for OpenFlow 146346 (A field that has neither OXM nor NXM code point is typically an obsolete field that is supported in some other form using OXM or NXM46)
Each code point in these rows is described in the form ``NAME (number) since OpenFlow spec and Open vSwitch version,'' e46g46 ``OXM_OF_ETH_TYPE (5) since OpenFlow 1462 and Open vSwitch 146746'' First, NAME, which specifies a name for the code point, starts with a prefix that designates a class and, in some cases, a vendor, as listed in the following table:
PrefixVendorClass



NXM_OF(none)0x0000
NXM_NX(none)0x0001
ERICOXM_OF(none)0x1000
OXM_OF(none)0x8000
OXM_OF_PKT_REG(none)0x8001
NXOXM_ET0x000023200xffff
NXOXM_NSH0x005ad6500xffff
ONFOXM_ET0x4f4e46000xffff
For more information on OXM/NXM classes and vendors, refer back to OpenFlow 1462 under Evolution of OpenFlow Fields46 The number is the field number within the class and vendor46 The OpenFlow spec is the version of OpenFlow that standardized the code point46 It is omitted for NXM code points because they are nonstandard46 The version is the version of Open vSwitch that first supported the code point46
 

CONJUNCTIVE MATCH FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







conj_id4nonononeOVS 2.4+

An individual OpenFlow flow can match only a single value for each field46 However, situations often arise where one wants to match one of a set of values within a field or fields46 For matching a single field against a set, it is straightforward and efficient to add multiple flows to the flow table, one for each value in the set46 For example, one might use the following flows to send packets with IP source address a, b, c, or d to the OpenFlow controller:



ip,ip_src=
a actions=controller
ip,ip_src=b actions=controller
ip,ip_src=c actions=controller
ip,ip_src=d actions=controller

Similarly, these flows send packets with IP destination address e, f, g, or h to the OpenFlow controller:



ip,ip_dst=
e actions=controller
ip,ip_dst=f actions=controller
ip,ip_dst=g actions=controller
ip,ip_dst=h actions=controller

Installing all of the above flows in a single flow table yields a disjunctive effect: a packet is sent to the controller if ip_src mo {a,b,c,d} or ip_dst mo {e,f,g,h} (or both)46 (Pedantically, if both of the above sets of flows are present in the flow table, they should have different priorities, because OpenFlow says that the results are undefined when two flows with same priority can both match a single packet46)

Suppose, on the other hand, one wishes to match conjunctively, that is, to send a packet to the controller only if both ip_src mo {a,b,c,d} and ip_dst mo {e,f,g,h}46 This requires 4 × 4 = 16 flows, one for each possible pairing of ip_src and ip_dst46 That is acceptable for our small example, but it does not gracefully extend to larger sets or greater numbers of dimensions46

The conjunction action is a solution for conjunctive matches that is built into Open vSwitch46 A conjunction action ties groups of individual OpenFlow flows into higher-level ``conjunctive flows''46 Each group corresponds to one dimension, and each flow within the group matches one possible value for the dimension46 A packet that matches one flow from each group matches the conjunctive flow46

To implement a conjunctive flow with conjunction, assign the conjunctive flow a 32-bit id, which must be unique within an OpenFlow table46 Assign each of the n ≥ 2 dimensions a unique number from 1 to n; the ordering is unimportant46 Add one flow to the OpenFlow flow table for each possible value of each dimension with conjunction(id, k/n) as the flow's actions, where k is the number assigned to the flow's dimension46 Together, these flows specify the conjunctive flow's match condition46 When the conjunctive match condition is met, Open vSwitch looks up one more flow that specifies the conjunctive flow's actions and receives its statistics46 This flow is found by setting conj_id to the specified id and then again searching the flow table46

The following flows provide an example46 Whenever the IP source is one of the values in the flows that match on the IP source (dimension 1 of 2), and the IP destination is one of the values in the flows that match on IP destination (dimension 2 of 2), Open vSwitch searches for a flow that matches conj_id against the conjunction ID (1234), finding the first flow listed below46



conj_id=1234 actions=controller
ip,ip_src=10460460461 actions=conjunction(1234, 1/2)
ip,ip_src=10460460464 actions=conjunction(1234, 1/2)
ip,ip_src=10460460466 actions=conjunction(1234, 1/2)
ip,ip_src=10460460467 actions=conjunction(1234, 1/2)
ip,ip_dst=10460460462 actions=conjunction(1234, 2/2)
ip,ip_dst=10460460465 actions=conjunction(1234, 2/2)
ip,ip_dst=10460460467 actions=conjunction(1234, 2/2)
ip,ip_dst=10460460468 actions=conjunction(1234, 2/2)

Many subtleties exist:

In the example above, every flow in a single dimension has the same form, that is, dimension 1 matches on ip_src and dimension 2 on ip_dst, but this is not a requirement46 Different flows within a dimension may match on different bits within a field (e46g46 IP network prefixes of different lengths, or TCP/UDP port ranges as bitwise matches), or even on entirely different fields (e46g46 to match packets for TCP source port 80 or TCP destination port 80)46
The flows within a dimension can vary their matches across more than one field, e46g46 to match only specific pairs of IP source and destination addresses or L4 port numbers46
A flow may have multiple conjunction actions, with different id values46 This is useful for multiple conjunctive flows with overlapping sets46 If one conjunctive flow matches packets with both ip_src mo {a,b} and ip_dst mo {d,e} and a second conjunctive flow matches ip_src mo {b,c} and ip_dst mo {f,g}, for example, then the flow that matches ip_src=b would have two conjunction actions, one for each conjunctive flow46 The order of conjunction actions within a list of actions is not significant46
A flow with conjunction actions may also include note actions for annotations, but not any other kind of actions46 (They would not be useful because they would never be executed46)
All of the flows that constitute a conjunctive flow with a given id must have the same priority46 (Flows with the same id but different priorities are currently treated as different conjunctive flows, that is, currently id values need only be unique within an OpenFlow table at a given priority46 This behavior isn't guaranteed to stay the same in later releases, so please use id values unique within an OpenFlow table46)
Conjunctive flows must not overlap with each other, at a given priority, that is, any given packet must be able to match at most one conjunctive flow at a given priority46 Overlapping conjunctive flows yield unpredictable results46
Following a conjunctive flow match, the search for the flow with conj_id=id is done in the same general-purpose way as other flow table searches, so one can use flows with conj_id=id to act differently depending on circumstances46 (One exception is that the search for the conj_id=id flow itself ignores conjunctive flows, to avoid recursion46) If the search with conj_id=id fails, Open vSwitch acts as if the conjunctive flow had not matched at all, and continues searching the flow table for other matching flows46
OpenFlow prerequisite checking occurs for the flow with conj_id=id in the same way as any other flow, e46g46 in an OpenFlow 1461+ context, putting a mod_nw_src action into the example above would require adding an ip match, like this:


conj_id=1234,ip actions=mod_nw_src:1462463464,controller
OpenFlow prerequisite checking also occurs for the individual flows that comprise a conjunctive match in the same way as any other flow46
The flows that constitute a conjunctive flow do not have useful statistics46 They are never updated with byte or packet counts, and so on46 (For such a flow, therefore, the idle and hard timeouts work much the same way46)
Sometimes there is a choice of which flows include a particular match46 For example, suppose that we added an extra constraint to our example, to match on ip_src mo {a,b,c,d} and ip_dst mo {e,f,g,h} and tcp_dst = i46 One way to implement this is to add the new constraint to the conj_id flow, like this:


conj_id=1234,tcp,tcp_dst=
i actions=mod_nw_src:1462463464,controller
but this is not recommended because of the cost of the extra flow table lookup46 Instead, add the constraint to the individual flows, either in one of the dimensions or (slightly better) all of them46
A conjunctive match must have n ≥ 2 dimensions (otherwise a conjunctive match is not necessary)46 Open vSwitch enforces this46
Each dimension within a conjunctive match should ordinarily have more than one flow46 Open vSwitch does not enforce this46

Conjunction ID Field

Name:conj_id
Width:32 bits
Format:decimal
Masking:not maskable
Prerequisites:none
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CONJ_ID (37) since Open vSwitch 2.4

Used for conjunctive matching46 See above for more information46  

TUNNEL FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







tun_id aka tunnel_id8yesyesnoneOF 1.3+ and OVS 1.1+
tun_src4yesyesnoneOVS 2.0+
tun_dst4yesyesnoneOVS 2.0+
tun_ipv6_src16yesyesnoneOVS 2.5+
tun_ipv6_dst16yesyesnoneOVS 2.5+
tun_gbp_id2yesyesnoneOVS 2.4+
tun_gbp_flags1yesyesnoneOVS 2.4+
tun_erspan_ver1 (low 4 bits)yesyesnoneOVS 2.10+
tun_erspan_idx4 (low 20 bits)yesyesnoneOVS 2.10+
tun_erspan_dir1 (low 1 bits)yesyesnoneOVS 2.10+
tun_erspan_hwid1 (low 6 bits)yesyesnoneOVS 2.10+
tun_metadata0124yesyesnoneOVS 2.5+
tun_metadata1124yesyesnoneOVS 2.5+
tun_metadata2124yesyesnoneOVS 2.5+
tun_metadata3124yesyesnoneOVS 2.5+
tun_metadata4124yesyesnoneOVS 2.5+
tun_metadata5124yesyesnoneOVS 2.5+
tun_metadata6124yesyesnoneOVS 2.5+
tun_metadata7124yesyesnoneOVS 2.5+
tun_metadata8124yesyesnoneOVS 2.5+
tun_metadata9124yesyesnoneOVS 2.5+
tun_metadata10124yesyesnoneOVS 2.5+
tun_metadata11124yesyesnoneOVS 2.5+
tun_metadata12124yesyesnoneOVS 2.5+
tun_metadata13124yesyesnoneOVS 2.5+
tun_metadata14124yesyesnoneOVS 2.5+
tun_metadata15124yesyesnoneOVS 2.5+
tun_metadata16124yesyesnoneOVS 2.5+
tun_metadata17124yesyesnoneOVS 2.5+
tun_metadata18124yesyesnoneOVS 2.5+
tun_metadata19124yesyesnoneOVS 2.5+
tun_metadata20124yesyesnoneOVS 2.5+
tun_metadata21124yesyesnoneOVS 2.5+
tun_metadata22124yesyesnoneOVS 2.5+
tun_metadata23124yesyesnoneOVS 2.5+
tun_metadata24124yesyesnoneOVS 2.5+
tun_metadata25124yesyesnoneOVS 2.5+
tun_metadata26124yesyesnoneOVS 2.5+
tun_metadata27124yesyesnoneOVS 2.5+
tun_metadata28124yesyesnoneOVS 2.5+
tun_metadata29124yesyesnoneOVS 2.5+
tun_metadata30124yesyesnoneOVS 2.5+
tun_metadata31124yesyesnoneOVS 2.5+
tun_metadata32124yesyesnoneOVS 2.5+
tun_metadata33124yesyesnoneOVS 2.5+
tun_metadata34124yesyesnoneOVS 2.5+
tun_metadata35124yesyesnoneOVS 2.5+
tun_metadata36124yesyesnoneOVS 2.5+
tun_metadata37124yesyesnoneOVS 2.5+
tun_metadata38124yesyesnoneOVS 2.5+
tun_metadata39124yesyesnoneOVS 2.5+
tun_metadata40124yesyesnoneOVS 2.5+
tun_metadata41124yesyesnoneOVS 2.5+
tun_metadata42124yesyesnoneOVS 2.5+
tun_metadata43124yesyesnoneOVS 2.5+
tun_metadata44124yesyesnoneOVS 2.5+
tun_metadata45124yesyesnoneOVS 2.5+
tun_metadata46124yesyesnoneOVS 2.5+
tun_metadata47124yesyesnoneOVS 2.5+
tun_metadata48124yesyesnoneOVS 2.5+
tun_metadata49124yesyesnoneOVS 2.5+
tun_metadata50124yesyesnoneOVS 2.5+
tun_metadata51124yesyesnoneOVS 2.5+
tun_metadata52124yesyesnoneOVS 2.5+
tun_metadata53124yesyesnoneOVS 2.5+
tun_metadata54124yesyesnoneOVS 2.5+
tun_metadata55124yesyesnoneOVS 2.5+
tun_metadata56124yesyesnoneOVS 2.5+
tun_metadata57124yesyesnoneOVS 2.5+
tun_metadata58124yesyesnoneOVS 2.5+
tun_metadata59124yesyesnoneOVS 2.5+
tun_metadata60124yesyesnoneOVS 2.5+
tun_metadata61124yesyesnoneOVS 2.5+
tun_metadata62124yesyesnoneOVS 2.5+
tun_metadata63124yesyesnoneOVS 2.5+
tun_flags2 (low 1 bits)yesyesnoneOVS 2.5+

The fields in this group relate to tunnels, which Open vSwitch supports in several forms (GRE, VXLAN, and so on)46 Most of these fields do appear in the wire format of a packet, so they are data fields from that point of view, but they are metadata from an OpenFlow flow table point of view because they do not appear in packets that are forwarded to the controller or to ordinary (non-tunnel) output ports46

Open vSwitch supports a spectrum of usage models for mapping tunnels to OpenFlow ports:

``Port-based'' tunnels
In this model, an OpenFlow port represents one tunnel: it matches a particular type of tunnel traffic between two IP endpoints, with a particular tunnel key (if keys are in use)46 In this situation, in_port suffices to distinguish one tunnel from another, so the tunnel header fields have little importance for OpenFlow processing46 (They are still populated and may be used if it is convenient46) The tunnel header fields play no role in sending packets out such an OpenFlow port, either, because the OpenFlow port itself fully specifies the tunnel headers46
The following Open vSwitch commands create a bridge br-int, add port tap0 to the bridge as OpenFlow port 1, establish a port-based GRE tunnel between the local host and remote IP 19246168461461 using GRE key 5001 as OpenFlow port 2, and arranges to forward all traffic from tap0 to the tunnel and vice versa:


ovs-vsctl add-br br-int
ovs-vsctl add-port br-int tap0 -- set interface tap0 ofport_request=1
ovs-vsctl add-port br-int gre0 -- \
set interface gre0 ofport_request=2 type=gre \
options:remote_ip=19246168461461 options:key=5001
ovs-ofctl add-flow br-int in_port=1,actions=2
ovs-ofctl add-flow br-int in_port=2,actions=1
``Flow-based'' tunnels
In this model, one OpenFlow port represents all possible tunnels of a given type with an endpoint on the current host, for example, all GRE tunnels46 In this situation, in_port only indicates that traffic was received on the particular kind of tunnel46 This is where the tunnel header fields are most important: they allow the OpenFlow tables to discriminate among tunnels based on their IP endpoints or keys46 Tunnel header fields also determine the IP endpoints and keys of packets sent out such a tunnel port46
The following Open vSwitch commands create a bridge br-int, add port tap0 to the bridge as OpenFlow port 1, establish a flow-based GRE tunnel port 3, and arranges to forward all traffic from tap0 to remote IP 19246168461461 over a GRE tunnel with key 5001 and vice versa:


ovs-vsctl add-br br-int
ovs-vsctl add-port br-int tap0 -- set interface tap0 ofport_request=1
ovs-vsctl add-port br-int allgre -- \
set interface allgre ofport_request=3 type=gre \
options:remote_ip=flow options:key=flow
ovs-ofctl add-flow br-int \
'in_port=1 actions=set_tunnel:5001,set_field:19246168461461->tun_dst,3'
ovs-ofctl add-flow br-int 'in_port=3,tun_src=19246168461461,tun_id=5001 actions=1'
Mixed models46
One may define both flow-based and port-based tunnels at the same time46 For example, it is valid and possibly useful to create and configure both gre0 and allgre tunnel ports described above46
Traffic is attributed on ingress to the most specific matching tunnel46 For example, gre0 is more specific than allgre46 Therefore, if both exist, then gre0 will be the ingress port for any GRE traffic received from 19246168461461 with key 500146
On egress, traffic may be directed to any appropriate tunnel port46 If both gre0 and allgre are configured as already described, then the actions 2 and set_tunnel:5001,set_field:19246168461461->tun_dst,3 send the same tunnel traffic46
Intermediate models46
Ports may be configured as partially flow-based46 For example, one may define an OpenFlow port that represents tunnels between a pair of endpoints but leaves the flow table to discriminate on the flow key46

ovs-vswitchd46conf46db(5) describes all the details of tunnel configuration46

These fields do not have any prerequisites, which means that a flow may match on any or all of them, in any combination46

These fields are zeros for packets that did not arrive on a tunnel46

Tunnel ID Field

Name:tun_id (aka tunnel_id)
Width:64 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_TUNNEL_ID (38) since OpenFlow 1.3 and Open vSwitch 1.10
NXM: NXM_NX_TUN_ID (16) since Open vSwitch 1.1

Many kinds of tunnels support a tunnel ID:

VXLAN and Geneve have a 24-bit virtual network identifier (VNI)46
LISP has a 24-bit instance ID46
GRE has an optional 32-bit key46
STT has a 64-bit key46
ERSPAN has a 10-bit key (Session ID)46

When a packet is received from a tunnel, this field holds the tunnel ID in its least significant bits, zero-extended to fit46 This field is zero if the tunnel does not support an ID, or if no ID is in use for a tunnel type that has an optional ID, or if an ID of zero received, or if the packet was not received over a tunnel46

When a packet is output to a tunnel port, the tunnel configuration determines whether the tunnel ID is taken from this field or bound to a fixed value46 See the earlier description of ``port-based'' and ``flow-based'' tunnels for more information46

The following diagram shows the origin of this field in a typical keyed GRE tunnel:


   Ethernet            IPv4               GRE           Ethernet

<-----------> <---------------> <------------> <---------->
48 48 16 8 32 32 16 16 32 48 48 16
+---+---+-----+ +---+-----+---+---+ +---+------+---+ +---+---+----+
|dst|src|type | |...|proto|src|dst| |...| type |key| |dst|src|type| ...
+---+---+-----+ +---+-----+---+---+ +---+------+---+ +---+---+----+
0x800 47 0x6558

Tunnel IPv4 Source Field

Name:tun_src
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_IPV4_SRC (31) since Open vSwitch 2.0

When a packet is received from a tunnel, this field is the source address in the outer IP header of the tunneled packet46 This field is zero if the packet was not received over a tunnel46

When a packet is output to a flow-based tunnel port, this field influences the IPv4 source address used to send the packet46 If it is zero, then the kernel chooses an appropriate IP address based using the routing table46

The following diagram shows the origin of this field in a typical keyed GRE tunnel:


   Ethernet            IPv4               GRE           Ethernet

<-----------> <---------------> <------------> <---------->
48 48 16 8 32 32 16 16 32 48 48 16
+---+---+-----+ +---+-----+---+---+ +---+------+---+ +---+---+----+
|dst|src|type | |...|proto|src|dst| |...| type |key| |dst|src|type| ...
+---+---+-----+ +---+-----+---+---+ +---+------+---+ +---+---+----+
0x800 47 0x6558

Tunnel IPv4 Destination Field

Name:tun_dst
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_IPV4_DST (32) since Open vSwitch 2.0

When a packet is received from a tunnel, this field is the destination address in the outer IP header of the tunneled packet46 This field is zero if the packet was not received over a tunnel46

When a packet is output to a flow-based tunnel port, this field specifies the destination to which the tunnel packet is sent46

The following diagram shows the origin of this field in a typical keyed GRE tunnel:


   Ethernet            IPv4               GRE           Ethernet

<-----------> <---------------> <------------> <---------->
48 48 16 8 32 32 16 16 32 48 48 16
+---+---+-----+ +---+-----+---+---+ +---+------+---+ +---+---+----+
|dst|src|type | |...|proto|src|dst| |...| type |key| |dst|src|type| ...
+---+---+-----+ +---+-----+---+---+ +---+------+---+ +---+---+----+
0x800 47 0x6558

Tunnel IPv6 Source Field

Name:tun_ipv6_src
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_IPV6_SRC (109) since Open vSwitch 2.5

Similar to tun_src, but for tunnels over IPv646

Tunnel IPv6 Destination Field

Name:tun_ipv6_dst
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_IPV6_DST (110) since Open vSwitch 2.5

Similar to tun_dst, but for tunnels over IPv646

 

VXLAN Group-Based Policy Fields

The VXLAN header is defined as follows [RFC 7348], where the I bit must be set to 1, unlabeled bits or those labeled reserved must be set to 0, and Open vSwitch makes the VNI available via tun_id:


   VXLAN flags

<------------->
1 1 1 1 1 1 1 1 24 24 8
+-+-+-+-+-+-+-+-+--------+---+--------+
| | | | |I| | | |reserved|VNI|reserved|
+-+-+-+-+-+-+-+-+--------+---+--------+

VXLAN Group-Based Policy [VXLAN Group Policy Option] adds new interpretations to existing bits in the VXLAN header, reinterpreting it as follows, with changes highlighted:


    GBP flags

<------------->
1 1 1 1 1 1 1 1 24 24 8
+-+-+-+-+-+-+-+-+---------------+---+--------+
| |D| | |A| | | |group policy ID|VNI|reserved|
+-+-+-+-+-+-+-+-+---------------+---+--------+

Open vSwitch makes GBP fields and flags available through the following fields46 Only packets that arrive over a VXLAN tunnel with the GBP extension enabled have these fields set46 In other packets they are zero on receive and ignored on transmit46

VXLAN Group-Based Policy ID Field

Name:tun_gbp_id
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_GBP_ID (38) since Open vSwitch 2.4

For a packet tunneled over VXLAN with the Group-Based Policy (GBP) extension, this field represents the GBP policy ID, as shown above46

VXLAN Group-Based Policy Flags Field

Name:tun_gbp_flags
Width:8 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_GBP_FLAGS (39) since Open vSwitch 2.4

For a packet tunneled over VXLAN with the Group-Based Policy (GBP) extension, this field represents the GBP policy flags, as shown above46

The field has the format shown below:


    GBP Flags

<------------->
1 1 1 1 1 1 1 1
+-+-+-+-+-+-+-+-+
| |D| | |A| | | |
+-+-+-+-+-+-+-+-+

Unlabeled bits are reserved and must be transmitted as 046 The VXLAN GBP draft defines the other bits' meanings as:

D (Don't Learn)
When set, this bit indicates that the egress tunnel endpoint must not learn the source address of the encapsulated frame46
A (Applied)
When set, indicates that the group policy has already been applied to this packet46 Devices must not apply policies when the A bit is set46

 

ERSPAN Metadata Fields

These fields provide access to features in the ERSPAN tunneling protocol [ERSPAN], which has two major versions: version 1 (aka type II) and version 2 (aka type III)46

Regardless of version, ERSPAN is encapsulated within a fixed 8-byte GRE header that consists of a 4-byte GRE base header and a 4-byte sequence number46 The ERSPAN version 1 header format is:


      GRE                ERSPAN v1            Ethernet

<------------> <---------------------> <---------->
16 16 32 4 18 10 12 20 48 48 16
+---+------+---+ +---+---+-------+---+---+ +---+---+----+
|...| type |seq| |ver|...|session|...|idx| |dst|src|type| ...
+---+------+---+ +---+---+-------+---+---+ +---+---+----+
0x88be 1 tun_id

The ERSPAN version 2 header format is:


      GRE                         ERSPAN v2                      Ethernet

<------------> <----------------------------------------> <---------->
16 16 32 4 18 10 32 22 6 1 3 48 48 16
+---+------+---+ +---+---+-------+---------+---+----+---+---+ +---+---+----+
|...| type |seq| |ver|...|session|timestamp|...|hwid|dir|...| |dst|src|type| ...
+---+------+---+ +---+---+-------+---------+---+----+---+---+ +---+---+----+
0x22eb 2 tun_id 0/1

ERSPAN Version Field

Name:tun_erspan_ver
Width:8 bits (only the least-significant 4 bits may be nonzero)
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_ET_ERSPAN_VER (12) since Open vSwitch 2.10

ERSPAN version number: 1 for version 1, or 2 for version 246

ERSPAN Index Field

Name:tun_erspan_idx
Width:32 bits (only the least-significant 20 bits may be nonzero)
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_ET_ERSPAN_IDX (11) since Open vSwitch 2.10

This field is a 20-bit index/port number associated with the ERSPAN traffic's source port and direction (ingress/egress)46 This field is platform dependent46

ERSPAN Direction Field

Name:tun_erspan_dir
Width:8 bits (only the least-significant 1 bits may be nonzero)
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_ET_ERSPAN_DIR (13) since Open vSwitch 2.10

For ERSPAN v2, the mirrored traffic's direction: 0 for ingress traffic, 1 for egress traffic46

ERSPAN Hardware ID Field

Name:tun_erspan_hwid
Width:8 bits (only the least-significant 6 bits may be nonzero)
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_ET_ERSPAN_HWID (14) since Open vSwitch 2.10

A 6-bit unique identifier of an ERSPAN v2 engine within a system46

 

Geneve Fields

These fields provide access to additional features in the Geneve tunneling protocol [Geneve]46 Their names are somewhat generic in the hope that the same fields could be reused for other protocols in the future; for example, the NSH protocol [NSH] supports TLV options whose form is identical to that for Geneve options46

Generic Tunnel Option 0 Field

Name:tun_metadata0
Width:992 bits (124 bytes)
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_METADATA0 (40) since Open vSwitch 2.5

The above information specifically covers generic tunnel option 0, but Open vSwitch supports 64 options, numbered 0 through 63, whose NXM field numbers are 40 through 10346

These fields provide OpenFlow access to the generic type-length-value options defined by the Geneve tunneling protocol or other protocols with options in the same TLV format as Geneve options46 Each of these options has the following wire format:


        header                 body

<-------------------> <------------------>
16 8 3 5 4×(length - 1) bytes
+-----+----+---+------+--------------------+
|class|type|res|length| value |
+-----+----+---+------+--------------------+
0

Taken together, the class and type in the option format mean that there are about 16 million distinct kinds of TLV options, too many to give individual OXM code points46 Thus, Open vSwitch requires the user to define the TLV options of interest, by binding up to 64 TLV options to generic tunnel option NXM code points46 Each option may have up to 124 bytes in its body, the maximum allowed by the TLV format, but bound options may total at most 252 bytes of body46

Open vSwitch extensions to the OpenFlow protocol bind TLV options to NXM code points46 The ovs-ofctl(8) program offers one way to use these extensions, e46g46 to configure a mapping from a TLV option with class 0xffff, type 0, and a body length of 4 bytes:



ovs-ofctl add-tlv-map br0 "{class=0xffff,type=0,len=4}->tun_metadata0"

Once a TLV option is properly bound, it can be accessed and modified like any other field, e46g46 to send packets that have value 1234 for the option described above to the controller:



ovs-ofctl add-flow br0 tun_metadata0=1234,actions=controller

An option not received or not bound is matched as all zeros46

Tunnel Flags Field

Name:tun_flags
Width:16 bits (only the least-significant 1 bits may be nonzero)
Format:tunnel flags
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_TUN_FLAGS (104) since Open vSwitch 2.5

Flags indicating various aspects of the tunnel encapsulation46

Matches on this field are most conveniently written in terms of symbolic names (given in the diagram below), each preceded by either + for a flag that must be set, or - for a flag that must be unset, without any other delimiters between the flags46 Flags not mentioned are wildcarded46 For example, tun_flags=+oam matches only OAM packets46 Matches can also be written as flags/mask, where flags and mask are 16-bit numbers in decimal or in hexadecimal prefixed by 0x46

Currently, only one flag is defined:

oam
The tunnel protocol indicated that this is an OAM (Operations and Management) control packet46

The switch may reject matches against unknown flags46

Newer versions of Open vSwitch may introduce additional flags with new meanings46 It is therefore not recommended to use an exact match on this field since the behavior of these new flags is unknown and should be ignored46

For non-tunneled packets, the value is 046  

METADATA FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







in_port2noyesnoneOVS 1.1+
in_port_oxm4noyesnoneOF 1.2+ and OVS 1.7+
skb_priority4nononone
pkt_mark4yesyesnoneOVS 2.0+
actset_output4nonononeOF 1.3+ and OVS 2.4+
packet_type4nonononeOF 1.5+ and OVS 2.8+

These fields relate to the origin or treatment of a packet, but they are not extracted from the packet data itself46

Ingress Port Field

Name:in_port
Width:16 bits
Format:OpenFlow 1.0 port
Masking:not maskable
Prerequisites:none
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: none
NXM: NXM_OF_IN_PORT (0) since Open vSwitch 1.1

The OpenFlow port on which the packet being processed arrived46 This is a 16-bit field that holds an OpenFlow 1460 port number46 For receiving a packet, the only values that appear in this field are:

1 through 0xfeff (65,279), inclusive46
Conventional OpenFlow port numbers46
OFPP_LOCAL (0xfffe or 65,534)46
The ``local'' port, which in Open vSwitch is always named the same as the bridge itself46 This represents a connection between the switch and the local TCP/IP stack46 This port is where an IP address is most commonly configured on an Open vSwitch switch46
OpenFlow does not require a switch to have a local port, but all existing versions of Open vSwitch have always included a local port46 Future Directions: Future versions of Open vSwitch might be able to optionally omit the local port, if someone submits code to implement such a feature46
OFPP_NONE (OpenFlow 1460) or OFPP_ANY (OpenFlow 1461+) (0xffff or 65,535)46

OFPP_CONTROLLER (0xfffd or 65,533)46
When a controller injects a packet into an OpenFlow switch with a ``packet-out'' request, it can specify one of these ingress ports to indicate that the packet was generated internally rather than having been received on some port46
OpenFlow 1460 specified OFPP_NONE for this purpose46 Despite that, some controllers used OFPP_CONTROLLER, and some switches only accepted OFPP_CONTROLLER, so OpenFlow 1460462 required support for both ports46 OpenFlow 1461 and later were more clearly drafted to allow only OFPP_CONTROLLER46 For maximum compatibility, Open vSwitch allows both ports with all OpenFlow versions46

Values not mentioned above will never appear when receiving a packet, including the following notable values:

0
Zero is not a valid OpenFlow port number46
OFPP_MAX (0xff00 or 65,280)46
This value has only been clearly specified as a valid port number as of OpenFlow 146346346 Before that, its status was unclear, and so Open vSwitch has never allowed OFPP_MAX to be used as a port number, so packets will never be received on this port46 (Other OpenFlow switches, of course, might use it46)
OFPP_UNSET (0xfff7 or 65,527)

OFPP_IN_PORT (0xfff8 or 65,528)
OFPP_TABLE (0xfff9 or 65,529)
OFPP_NORMAL (0xfffa or 65,530)
OFPP_FLOOD (0xfffb or 65,531)
OFPP_ALL (0xfffc or 65,532)
These port numbers are used only in output actions and never appear as ingress ports46
Most of these port numbers were defined in OpenFlow 1460, but OFPP_UNSET was only introduced in OpenFlow 146546

Values that will never appear when receiving a packet may still be matched against in the flow table46 There are still circumstances in which those flows can be matched:

The resubmit Open vSwitch extension action allows a flow table lookup with an arbitrary ingress port46
An action that modifies the ingress port field (see below), such as e46g46 load or set_field, followed by an action or instruction that performs another flow table lookup, such as resubmit or goto_table46

This field is heavily used for matching in OpenFlow tables, but for packet egress, it has only very limited roles:

OpenFlow requires suppressing output actions to in_port46 That is, the following two flows both drop all packets that arrive on port 1:


in_port=1,actions=1
in_port=1,actions=drop
(This behavior is occasionally useful for flooding to a subset of ports46 Specifying actions=1,2,3,4, for example, outputs to ports 1, 2, 3, and 4, omitting the ingress port46)
OpenFlow has a special port OFPP_IN_PORT (with value 0xfff8) that outputs to the ingress port46 For example, in a switch that has four ports numbered 1 through 4, actions=1,2,3,4,in_port outputs to ports 1, 2, 3, and 4, including the ingress port46

Because the ingress port field has so little influence on packet processing, it does not ordinarily make sense to modify the ingress port field46 The field is writable only to support the occasional use case where the ingress port's roles in packet egress, described above, become troublesome46 For example, actions=load:0->NXM_OF_IN_PORT[],output:123 will output to port 123 regardless of whether it is in the ingress port46 If the ingress port is important, then one may save and restore it on the stack:



actions=push:NXM_OF_IN_PORT[],load:0->NXM_OF_IN_PORT[],output:123,pop:NXM_OF_IN_PORT[]

or, in Open vSwitch 2467 or later, use the clone action to save and restore it:



actions=clone(load:0->NXM_OF_IN_PORT[],output:123)

The ability to modify the ingress port is an Open vSwitch extension to OpenFlow46

OXM Ingress Port Field

Name:in_port_oxm
Width:32 bits
Format:OpenFlow 1.1+ port
Masking:not maskable
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_IN_PORT (0) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: none

OpenFlow 1461 and later use a 32-bit port number, so this field supplies a 32-bit view of the ingress port46 Current versions of Open vSwitch support only a 16-bit range of ports:

OpenFlow 1460 ports 0x0000 to 0xfeff, inclusive, map to OpenFlow 1461 port numbers with the same values46
OpenFlow 1460 ports 0xff00 to 0xffff, inclusive, map to OpenFlow 1461 port numbers 0xffffff00 to 0xffffffff46
OpenFlow 1461 ports 0x0000ff00 to 0xfffffeff are not mapped and not supported46

in_port and in_port_oxm are two views of the same information, so all of the comments on in_port apply to in_port_oxm too46 Modifying in_port changes in_port_oxm, and vice versa46

Setting in_port_oxm to an unsupported value yields unspecified behavior46

Output Queue Field

Name:skb_priority
Width:32 bits
Format:hexadecimal
Masking:not maskable
Prerequisites:none
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: none

Future Directions: Open vSwitch implements the output queue as a field, but does not currently expose it through OXM or NXM for matching purposes46 If this turns out to be a useful feature, it could be implemented in future versions46 Only the set_queue, enqueue, and pop_queue actions currently influence the output queue46

This field influences how packets in the flow will be queued, for quality of service (QoS) purposes, when they egress the switch46 Its range of meaningful values, and their meanings, varies greatly from one OpenFlow implementation to another46 Even within a single implementation, there is no guarantee that all OpenFlow ports have the same queues configured or that all OpenFlow ports in an implementation can be configured the same way queue-wise46

Configuring queues on OpenFlow is not well standardized46 On Linux, Open vSwitch supports queue configuration via OVSDB, specifically the QoS and Queue tables (see ovs-vswitchd46conf46db(5) for details)46 Ports of Open vSwitch to other platforms might require queue configuration through some separate protocol (such as a CLI)46 Even on Linux, Open vSwitch exposes only a fraction of the kernel's queuing features through OVSDB, so advanced or unusual uses might require use of separate utilities (e46g46 tc)46 OpenFlow switches other than Open vSwitch might use OF-CONFIG or any of the configuration methods mentioned above46 Finally, some OpenFlow switches have a fixed number of fixed-function queues (e46g46 eight queues with strictly defined priorities) and others do not support any control over queuing46

The only output queue that all OpenFlow implementations must support is zero, to identify a default queue, whose properties are implementation-defined46 Outputting a packet to a queue that does not exist on the output port yields unpredictable behavior: among the possibilities are that the packet might be dropped or transmitted with a very high or very low priority46

OpenFlow 1460 only allowed output queues to be specified as part of an enqueue action that specified both a queue and an output port46 That is, OpenFlow 1460 treats the queue as an argument to an action, not as a field46

To increase flexibility, OpenFlow 1461 added an action to set the output queue46 This model was carried forward, without change, through OpenFlow 146546

Open vSwitch implements the native queuing model of each OpenFlow version it supports46 Open vSwitch also includes an extension for setting the output queue as an action in OpenFlow 146046

When a packet ingresses into an OpenFlow switch, the output queue is ordinarily set to 0, indicating the default queue46 However, Open vSwitch supports various ways to forward a packet from one OpenFlow switch to another within a single host46 In these cases, Open vSwitch maintains the output queue across the forwarding step46 For example:

A hop across an Open vSwitch ``patch port'' (which does not actually involve queuing) preserves the output queue46
When a flow sets the output queue then outputs to an OpenFlow tunnel port, the encapsulation preserves the output queue46 If the kernel TCP/IP stack routes the encapsulated packet directly to a physical interface, then that output honors the output queue46 Alternatively, if the kernel routes the encapsulated packet to another Open vSwitch bridge, then the output queue set previously becomes the initial output queue on ingress to the second bridge and will thus be used for further output actions (unless overridden by a new ``set queue'' action)46
(This description reflects the current behavior of Open vSwitch on Linux46 This behavior relies on details of the Linux TCP/IP stack46 It could be difficult to make ports to other operating systems behave the same way46)

Packet Mark Field

Name:pkt_mark
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_PKT_MARK (33) since Open vSwitch 2.0

Packet mark comes to Open vSwitch from the Linux kernel, in which the sk_buff data structure that represents a packet contains a 32-bit member named skb_mark46 The value of skb_mark propagates along with the packet it accompanies wherever the packet goes in the kernel46 It has no predefined semantics but various kernel-user interfaces can set and match on it, which makes it suitable for ``marking'' packets at one point in their handling and then acting on the mark later46 With iptables, for example, one can mark some traffic specially at ingress and then handle that traffic differently at egress based on the marked value46

Packet mark is an attempt at a generalization of the skb_mark concept beyond Linux, at least through more generic naming46 Like skb_priority, packet mark is preserved across forwarding steps within a machine46 Unlike skb_priority, packet mark has no direct effect on packet forwarding: the value set in packet mark does not matter unless some later OpenFlow table or switch matches on packet mark, or unless the packet passes through some other kernel subsystem that has been configured to interpret packet mark in specific ways, e46g46 through iptables configuration mentioned above46

Preserving packet mark across kernel forwarding steps relies heavily on kernel support, which ports to non-Linux operating systems may not have46 Regardless of operating system support, Open vSwitch supports packet mark within a single bridge and across patch ports46

The value of packet mark when a packet ingresses into the first Open vSwich bridge is typically zero, but it could be nonzero if its value was previously set by some kernel subsystem46

Action Set Output Port Field

Name:actset_output
Width:32 bits
Format:OpenFlow 1.1+ port
Masking:not maskable
Prerequisites:none
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: ONFOXM_ET_ACTSET_OUTPUT (43) since OpenFlow 1.3 and Open vSwitch 2.459 OXM_OF_ACTSET_OUTPUT (43) since OpenFlow 1.5 and Open vSwitch 2.4
NXM: none

Holds the output port currently in the OpenFlow action set (i46e46 from an output action within a write_actions instruction)46 Its value is an OpenFlow port number46 If there is no output port in the OpenFlow action set, or if the output port will be ignored (e46g46 because there is an output group in the OpenFlow action set), then the value will be OFPP_UNSET46

Open vSwitch allows any table to match this field46 OpenFlow, however, only requires this field to be matchable from within an OpenFlow egress table (a feature that Open vSwitch does not yet implement)46

Packet Type Field

Name:packet_type
Width:32 bits
Format:packet type
Masking:not maskable
Prerequisites:none
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_PACKET_TYPE (44) since OpenFlow 1.5 and Open vSwitch 2.8
NXM: none

The type of the packet in the format specified in OpenFlow 1465:


 Packet type

<--------->
16 16
+---+-------+
|ns |ns_type| ...
+---+-------+

The upper 16 bits, ns, are a namespace46 The meaning of ns_type depends on the namespace46 The packet type field is specified and displayed in the format (ns,ns_type)46

Open vSwitch currently supports the following classes of packet types for matching:

(0,0)
Ethernet46
(1,ethertype)
The specified ethertype46 Open vSwitch can forward packets with any ethertype, but it can only match on and process data fields for the following supported packet types:
(1,0x800)
IPv4
(1,0x806)
ARP
(1,0x86dd)
IPv6
(1,0x8847)
MPLS
(1,0x8848)
MPLS multicast
(1,0x8035)
RARP
(1,0x894f)
NSH

Consider the distinction between a packet with packet_type=(0,0), dl_type=0x800 and one with packet_type=(1,0x800)46 The former is an Ethernet frame that contains an IPv4 packet, like this:


   Ethernet            IPv4

<-----------> <--------------->
48 48 16 8 32 32
+---+---+-----+ +---+-----+---+---+
|dst|src|type | |...|proto|src|dst| ...
+---+---+-----+ +---+-----+---+---+
0x800

The latter is an IPv4 packet not encapsulated inside any outer frame, like this:


       IPv4

<--------------->
8 32 32
+---+-----+---+---+
|...|proto|src|dst| ...
+---+-----+---+---+

Matching on packet_type is a pre-requisite for matching on any data field, but for backward compatibility, when a match on a data field is present without a packet_type match, Open vSwitch acts as though a match on (0,0) (Ethernet) had been supplied46 Similarly, when Open vSwitch sends flow match information to a controller, e46g46 in a reply to a request to dump the flow table, Open vSwitch omits a match on packet type (0,0) if it would be implied by a data field match46  

CONNECTION TRACKING FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







ct_state4yesnononeOVS 2.5+
ct_zone2nonononeOVS 2.5+
ct_mark4yesyesnoneOVS 2.5+
ct_label16yesyesnoneOVS 2.5+
ct_nw_src4yesnoCTOVS 2.8+
ct_nw_dst4yesnoCTOVS 2.8+
ct_ipv6_src16yesnoCTOVS 2.8+
ct_ipv6_dst16yesnoCTOVS 2.8+
ct_nw_proto1nonoCTOVS 2.8+
ct_tp_src2yesnoCTOVS 2.8+
ct_tp_dst2yesnoCTOVS 2.8+

Open vSwitch supports ``connection tracking,'' which allows bidirectional streams of packets to be statefully grouped into connections46 Open vSwitch connection tracking, for example, identifies the patterns of TCP packets that indicates a successfully initiated connection, as well as those that indicate that a connection has been torn down46 Open vSwitch connection tracking can also identify related connections, such as FTP data connections spawned from FTP control connections46

An individual packet passing through the pipeline may be in one of two states, ``untracked'' or ``tracked,'' which may be distinguished via the ``trk'' flag in ct_state46 A packet is untracked at the beginning of the Open vSwitch pipeline and continues to be untracked until the pipeline invokes the ct action46 The connection tracking fields are all zeroes in an untracked packet46 When a flow in the Open vSwitch pipeline invokes the ct action, the action initializes the connection tracking fields and the packet becomes tracked for the remainder of its processing46

The connection tracker stores connection state in an internal table, but it only adds a new entry to this table when a ct action for a new connection invokes ct with the commit parameter46 For a given connection, when a pipeline has executed ct, but not yet with commit, the connection is said to be uncommitted46 State for an uncommitted connection is ephemeral and does not persist past the end of the pipeline, so some features are only available to committed connections46 A connection would typically be left uncommitted as a way to drop its packets46

Connection tracking is an Open vSwitch extension to OpenFlow46 Open vSwitch 2465 added the initial support for connection tracking46 Subsequent versions of Open vSwitch added many refinements and extensions to the initial support46 Many of these capabilities depend on the Open vSwitch datapath rather than simply the userspace version46 The capabilities column in the Datapath table (see ovs-vswitchd46conf46db(5)) reports the detailed capabilities of a particular Open vSwitch datapath46

Connection Tracking State Field

Name:ct_state
Width:32 bits
Format:ct state
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_STATE (105) since Open vSwitch 2.5

This field holds several flags that can be used to determine the state of the connection to which the packet belongs46

Matches on this field are most conveniently written in terms of symbolic names (listed below), each preceded by either + for a flag that must be set, or - for a flag that must be unset, without any other delimiters between the flags46 Flags not mentioned are wildcarded46 For example, tcp,ct_state=+trk-new matches TCP packets that have been run through the connection tracker and do not establish a new connection46 Matches can also be written as flags/mask, where flags and mask are 32-bit numbers in decimal or in hexadecimal prefixed by 0x46

The following flags are defined:

new (0x01)
A new connection46 Set to 1 if this is an uncommitted connection46
est (0x02)
Part of an existing connection46 Set to 1 if this is a committed connection46
rel (0x04)
Related to an existing connection, e46g46 an ICMP ``destination unreachable'' message or an FTP data connections46 This flag will only be 1 if the connection to which this one is related is committed46
Connections identified as rel are separate from the originating connection and must be committed separately46 All packets for a related connection will have the rel flag set, not just the initial packet46
rpl (0x08)
This packet is in the reply direction, meaning that it is in the opposite direction from the packet that initiated the connection46 This flag will only be 1 if the connection is committed46
inv (0x10)
The state is invalid, meaning that the connection tracker couldn't identify the connection46 This flag is a catch-all for problems in the connection or the connection tracker, such as:
L3/L4 protocol handler is not loaded/unavailable46 With the Linux kernel datapath, this may mean that the nf_conntrack_ipv4 or nf_conntrack_ipv6 modules are not loaded46
L3/L4 protocol handler determines that the packet is malformed46
Packets are unexpected length for protocol46
trk (0x20)
This packet is tracked, meaning that it has previously traversed the connection tracker46 If this flag is not set, then no other flags will be set46 If this flag is set, then the packet is tracked and other flags may also be set46
snat (0x40)
This packet was transformed by source address/port translation by a preceding ct action46 Open vSwitch 2466 added this flag46
dnat (0x80)
This packet was transformed by destination address/port translation by a preceding ct action46 Open vSwitch 2466 added this flag46

There are additional constraints on these flags, listed in decreasing order of precedence below:

1.
If trk is unset, no other flags are set46
2.
If trk is set, one or more other flags may be set46
3.
If inv is set, only the trk flag is also set46
4.
new and est are mutually exclusive46
5.
new and rpl are mutually exclusive46
6.
rel may be set in conjunction with any other flags46

Future versions of Open vSwitch may define new flags46

Connection Tracking Zone Field

Name:ct_zone
Width:16 bits
Format:hexadecimal
Masking:not maskable
Prerequisites:none
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_ZONE (106) since Open vSwitch 2.5

A connection tracking zone, the zone value passed to the most recent ct action46 Each zone is an independent connection tracking context, so tracking the same packet in multiple contexts requires using the ct action multiple times46

Connection Tracking Mark Field

Name:ct_mark
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_MARK (107) since Open vSwitch 2.5

The metadata committed, by an action within the exec parameter to the ct action, to the connection to which the current packet belongs46

Connection Tracking Label Field

Name:ct_label
Width:128 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_LABEL (108) since Open vSwitch 2.5

The label committed, by an action within the exec parameter to the ct action, to the connection to which the current packet belongs46

Open vSwitch 2468 introduced the matching support for connection tracker original direction 5-tuple fields46

For non-committed non-related connections the conntrack original direction tuple fields always have the same values as the corresponding headers in the packet itself46 For any other packets of a committed connection the conntrack original direction tuple fields reflect the values from that initial non-committed non-related packet, and thus may be different from the actual packet headers, as the actual packet headers may be in reverse direction (for reply packets), transformed by NAT (when nat option was applied to the connection), or be of different protocol (i46e46, when an ICMP response is sent to an UDP packet)46 In case of related connections, e46g46, an FTP data connection, the original direction tuple contains the original direction headers from the master connection, e46g46, an FTP control connection46

The following fields are populated by the ct action, and require a match to a valid connection tracking state as a prerequisite, in addition to the IP or IPv6 ethertype match46 Examples of valid connection tracking state matches include ct_state=+new, ct_state=+est, ct_state=+rel, and ct_state=+trk-inv46

Connection Tracking Original Direction IPv4 Source Address Field

Name:ct_nw_src
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_NW_SRC (120) since Open vSwitch 2.8

Matches IPv4 conntrack original direction tuple source address46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846

Connection Tracking Original Direction IPv4 Destination Address Field

Name:ct_nw_dst
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_NW_DST (121) since Open vSwitch 2.8

Matches IPv4 conntrack original direction tuple destination address46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846

Connection Tracking Original Direction IPv6 Source Address Field

Name:ct_ipv6_src
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_IPV6_SRC (122) since Open vSwitch 2.8

Matches IPv6 conntrack original direction tuple source address46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846

Connection Tracking Original Direction IPv6 Destination Address Field

Name:ct_ipv6_dst
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_IPV6_DST (123) since Open vSwitch 2.8

Matches IPv6 conntrack original direction tuple destination address46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846

Connection Tracking Original Direction IP Protocol Field

Name:ct_nw_proto
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_NW_PROTO (119) since Open vSwitch 2.8

Matches conntrack original direction tuple IP protocol type, which is specified as a decimal number between 0 and 255, inclusive (e46g46 1 to match ICMP packets or 6 to match TCP packets)46 In case of, for example, an ICMP response to an UDP packet, this may be different from the IP protocol type of the packet itself46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846

Connection Tracking Original Direction Transport Layer Source Port Field

Name:ct_tp_src
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_TP_SRC (124) since Open vSwitch 2.8

Bitwise match on the conntrack original direction tuple transport source, when MFF_CT_NW_PROTO has value 6 for TCP, 17 for UDP, or 132 for SCTP46 When MFF_CT_NW_PROTO has value 1 for ICMP, or 58 for ICMPv6, the lower 8 bits of MFF_CT_TP_SRC matches the conntrack original direction ICMP type46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846

Connection Tracking Original Direction Transport Layer Source Port Field

Name:ct_tp_dst
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:CT
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_CT_TP_DST (125) since Open vSwitch 2.8

Bitwise match on the conntrack original direction tuple transport destination port, when MFF_CT_NW_PROTO has value 6 for TCP, 17 for UDP, or 132 for SCTP46 When MFF_CT_NW_PROTO has value 1 for ICMP, or 58 for ICMPv6, the lower 8 bits of MFF_CT_TP_DST matches the conntrack original direction ICMP code46 See the paragraphs above for general description to the conntrack original direction tuple46 Introduced in Open vSwitch 246846  

REGISTER FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







metadata8yesyesnoneOF 1.2+ and OVS 1.8+
reg04yesyesnoneOVS 1.1+
reg14yesyesnoneOVS 1.1+
reg24yesyesnoneOVS 1.1+
reg34yesyesnoneOVS 1.1+
reg44yesyesnoneOVS 1.3+
reg54yesyesnoneOVS 1.7+
reg64yesyesnoneOVS 1.7+
reg74yesyesnoneOVS 1.7+
reg84yesyesnoneOVS 2.6+
reg94yesyesnoneOVS 2.6+
reg104yesyesnoneOVS 2.6+
reg114yesyesnoneOVS 2.6+
reg124yesyesnoneOVS 2.6+
reg134yesyesnoneOVS 2.6+
reg144yesyesnoneOVS 2.6+
reg154yesyesnoneOVS 2.6+
xreg08yesyesnoneOF 1.3+ and OVS 2.4+
xreg18yesyesnoneOF 1.3+ and OVS 2.4+
xreg28yesyesnoneOF 1.3+ and OVS 2.4+
xreg38yesyesnoneOF 1.3+ and OVS 2.4+
xreg48yesyesnoneOF 1.3+ and OVS 2.4+
xreg58yesyesnoneOF 1.3+ and OVS 2.4+
xreg68yesyesnoneOF 1.3+ and OVS 2.4+
xreg78yesyesnoneOF 1.3+ and OVS 2.4+
xxreg016yesyesnoneOVS 2.6+
xxreg116yesyesnoneOVS 2.6+
xxreg216yesyesnoneOVS 2.6+
xxreg316yesyesnoneOVS 2.6+

These fields give an OpenFlow switch space for temporary storage while the pipeline is running46 Whereas metadata fields can have a meaningful initial value and can persist across some hops across OpenFlow switches, registers are always initially 0 and their values never persist across inter-switch hops (not even across patch ports)46

OpenFlow Metadata Field

Name:metadata
Width:64 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes
OXM: OXM_OF_METADATA (2) since OpenFlow 1.2 and Open vSwitch 1.8
NXM: none

This field is the oldest standardized OpenFlow register field, introduced in OpenFlow 146146 It was introduced to model the limited number of user-defined bits that some ASIC-based switches can carry through their pipelines46 Because of hardware limitations, OpenFlow allows switches to support writing and masking only an implementation-defined subset of bits, even no bits at all46 The Open vSwitch software switch always supports all 64 bits, but of course an Open vSwitch port to an ASIC would have the same restriction as the ASIC itself46

This field has an OXM code point, but OpenFlow 1464 and earlier allow it to be modified only with a specialized instruction, not with a ``set-field'' action46 OpenFlow 1465 removes this restriction46 Open vSwitch does not enforce this restriction, regardless of OpenFlow version46

Register 0 Field

Name:reg0
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_REG0 (0) since Open vSwitch 1.1

This is the first of several Open vSwitch registers, all of which have the same properties46 Open vSwitch 1461 introduced registers 0, 1, 2, and 3, version 1463 added register 4, version 1467 added registers 5, 6, and 7, and version 2466 added registers 8 through 1546

Extended Register 0 Field

Name:xreg0
Width:64 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_PKT_REG0 (0) since OpenFlow 1.3 and Open vSwitch 2.4
NXM: none

This is the first of the registers introduced in OpenFlow 146546 OpenFlow 1465 calls these fields just the ``packet registers,'' but Open vSwitch already had 32-bit registers by that name, so Open vSwitch uses the name ``extended registers'' in an attempt to reduce confusion46 The standard allows for up to 128 registers, each 64 bits wide, but Open vSwitch only implements 4 (in versions 2464 and 2465) or 8 (in version 2466 and later)46

Each of the 64-bit extended registers overlays two of the 32-bit registers: xreg0 overlays reg0 and reg1, with reg0 supplying the most-significant bits of xreg0 and reg1 the least-significant46 Similarly, xreg1 overlays reg2 and reg3, and so on46

The OpenFlow specification says, ``In most cases, the packet registers can not be matched in tables, i46e46 they usually can not be used in the flow entry match structure'' [OpenFlow 1465, section 74624634610], but there is no reason for a software switch to impose such a restriction, and Open vSwitch does not46

Double-Extended Register 0 Field

Name:xxreg0
Width:128 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:none
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_XXREG0 (111) since Open vSwitch 2.6

This is the first of the double-extended registers introduce in Open vSwitch 246646 Each of the 128-bit extended registers overlays four of the 32-bit registers: xxreg0 overlays reg0 through reg3, with reg0 supplying the most-significant bits of xxreg0 and reg3 the least-significant46 xxreg1 similarly overlays reg4 through reg7, and so on46  

LAYER 2 (ETHERNET) FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







eth_src aka dl_src6yesyesEthernetOF 1.2+ and OVS 1.1+
eth_dst aka dl_dst6yesyesEthernetOF 1.2+ and OVS 1.1+
eth_type aka dl_type2nonoEthernetOF 1.2+ and OVS 1.1+

Ethernet is the only layer-2 protocol that Open vSwitch supports46 As with most software, Open vSwitch and OpenFlow regard an Ethernet frame to begin with the 14-byte header and end with the final byte of the payload; that is, the frame check sequence is not considered part of the frame46

Ethernet Source Field

Name:eth_src (aka dl_src)
Width:48 bits
Format:Ethernet
Masking:arbitrary bitwise masks
Prerequisites:Ethernet
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes
OXM: OXM_OF_ETH_SRC (4) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ETH_SRC (2) since Open vSwitch 1.1

The Ethernet source address:


   Ethernet

<---------->
48 48 16
+---+---+----+
|dst|src|type| ...
+---+---+----+

Ethernet Destination Field

Name:eth_dst (aka dl_dst)
Width:48 bits
Format:Ethernet
Masking:arbitrary bitwise masks
Prerequisites:Ethernet
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes
OXM: OXM_OF_ETH_DST (3) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ETH_DST (1) since Open vSwitch 1.1

The Ethernet destination address:


   Ethernet

<---------->
48 48 16
+---+---+----+
|dst|src|type| ...
+---+---+----+

Open vSwitch 1468 and later support arbitrary masks for source and/or destination46 Earlier versions only support masking the destination with the following masks:

01:00:00:00:00:00
Match only the multicast bit46 Thus, dl_dst=01:00:00:00:00:00/01:00:00:00:00:00 matches all multicast (including broadcast) Ethernet packets, and dl_dst=00:00:00:00:00:00/01:00:00:00:00:00 matches all unicast Ethernet packets46
fe:ff:ff:ff:ff:ff
Match all bits except the multicast bit46 This is probably not useful46
ff:ff:ff:ff:ff:ff
Exact match (equivalent to omitting the mask)46
00:00:00:00:00:00
Wildcard all bits (equivalent to dl_dst=*)46

Ethernet Type Field

Name:eth_type (aka dl_type)
Width:16 bits
Format:hexadecimal
Masking:not maskable
Prerequisites:Ethernet
Access:read-only
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_ETH_TYPE (5) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ETH_TYPE (3) since Open vSwitch 1.1

The most commonly seen Ethernet frames today use a format called ``Ethernet II,'' in which the last two bytes of the Ethernet header specify the Ethertype46 For such a frame, this field is copied from those bytes of the header, like so:


      Ethernet

<---------------->
48 48 16
+---+---+----------+
|dst|src| type | ...
+---+---+----------+
≥0x600

Every Ethernet type has a value 0x600 (1,536) or greater46 When the last two bytes of the Ethernet header have a value too small to be an Ethernet type, then the value found there is the total length of the frame in bytes, excluding the Ethernet header46 An 802462 LLC header typically follows the Ethernet header46 OpenFlow and Open vSwitch only support LLC headers with DSAP and SSAP 0xaa and control byte 0x03, which indicate that a SNAP header follows the LLC header46 In turn, OpenFlow and Open vSwitch only support a SNAP header with organization 0x00000046 In such a case, this field is copied from the type field in the SNAP header, like this:


    Ethernet           LLC                SNAP

<------------> <------------> <----------------->
48 48 16 8 8 8 24 16
+---+---+------+ +----+----+----+ +--------+----------+
|dst|src| type | |DSAP|SSAP|cntl| | org | type | ...
+---+---+------+ +----+----+----+ +--------+----------+
<0x600 0xaa 0xaa 0x03 0x000000 ≥0x600

When an 802461Q header is inserted after the Ethernet source and destination, this field is populated with the encapsulated Ethertype, not the 802461Q Ethertype46 With an Ethernet II inner frame, the result looks like this:


 Ethernet     802.1Q     Ethertype

<------> <--------> <-------->
48 48 16 16 16
+----+---+ +------+---+ +----------+
|dst |src| | TPID |TCI| | type | ...
+----+---+ +------+---+ +----------+
0x8100 ≥0x600

LLC and SNAP encapsulation look like this with an 802461Q header:


 Ethernet     802.1Q     Ethertype        LLC                SNAP

<------> <--------> <-------> <------------> <----------------->
48 48 16 16 16 8 8 8 24 16
+----+---+ +------+---+ +---------+ +----+----+----+ +--------+----------+
|dst |src| | TPID |TCI| | type | |DSAP|SSAP|cntl| | org | type | ...
+----+---+ +------+---+ +---------+ +----+----+----+ +--------+----------+
0x8100 <0x600 0xaa 0xaa 0x03 0x000000 ≥0x600

When a packet doesn't match any of the header formats described above, Open vSwitch and OpenFlow set this field to 0x5ff (OFP_DL_TYPE_NOT_ETH_TYPE)46  

VLAN FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







dl_vlan2 (low 12 bits)noyesEthernet
dl_vlan_pcp1 (low 3 bits)noyesEthernet
vlan_vid2 (low 12 bits)yesyesEthernetOF 1.2+ and OVS 1.7+
vlan_pcp1 (low 3 bits)noyesVLAN VIDOF 1.2+ and OVS 1.7+
vlan_tci2yesyesEthernetOVS 1.1+

The 802461Q VLAN header causes more trouble than any other 4 bytes in networking46 OpenFlow 1460, 1461, and 1462+ all treat VLANs differently46 Open vSwitch extensions add another variant to the mix46 Open vSwitch reconciles all four treatments as best it can46

 

VLAN Header Format

An 802461Q VLAN header consists of two 16-bit fields:


   TPID        TCI

<-------> <--------->
16 3 1 12
+---------+---+---+---+
|Ethertype|PCP|CFI|VID|
+---------+---+---+---+
0x8100 0

The first 16 bits of the VLAN header, the TPID (Tag Protocol IDentifier), is an Ethertype46 When the VLAN header is inserted just after the source and destination MAC addresses in a Ethertype frame, the TPID serves to identify the presence of the VLAN46 The standard TPID, the only one that Open vSwitch supports, is 0x810046 OpenFlow 1460 explicitly supports only TPID 0x810046 OpenFlow 1461, but not earlier or later versions, also requires support for TPID 0x88a8 (Open vSwitch does not support this)46 OpenFlow 1462 through 1465 do not require support for specific TPIDs (the ``push vlan header'' action does say that only 0x8100 and 0x88a8 should be pushed)46 No version of OpenFlow provides a way to distinguish or match on the TPID46

The remaining 16 bits of the VLAN header, the TCI (Tag Control Information), is subdivided into three subfields:

PCP (Priority Control Point), is a 3-bit 802461p priority46 The lowest priority is value 1, the second-lowest is value 0, and priority increases from 2 up to highest priority 746
CFI (Canonical Format Indicator), is a 1-bit field46 On an Ethernet network, its value is always 046 This led to it later being repurposed under the name DEI (Drop Eligibility Indicator)46 By either name, OpenFlow and Open vSwitch don't provide any way to match or set this bit46
VID (VLAN IDentifier), is a 12-bit VLAN46 If the VID is 0, then the frame is not part of a VLAN46 In that case, the VLAN header is called a priority tag because it is only meaningful for assigning the frame a priority46 VID 0xfff (4,095) is reserved46

See eth_type for illustrations of a complete Ethernet frame with 802461Q tag included46

 

Multiple VLANs

Open vSwitch can match only a single VLAN header46 If more than one VLAN header is present, then eth_type holds the TPID of the inner VLAN header46 Open vSwitch stops parsing the packet after the inner TPID, so matching further into the packet (e46g46 on the inner TCI or L3 fields) is not possible46

OpenFlow only directly supports matching a single VLAN header46 In OpenFlow 1461 or later, one OpenFlow table can match on the outermost VLAN header and pop it off, and a later OpenFlow table can match on the next outermost header46 Open vSwitch does not support this46

 

VLAN Field Details

The four variants have three different levels of expressiveness: OpenFlow 1460 and 1461 VLAN matching are less powerful than OpenFlow 1462+ VLAN matching, which is less powerful than Open vSwitch extension VLAN matching46

 

OpenFlow 1460 VLAN Fields

OpenFlow 1460 uses two fields, called dl_vlan and dl_vlan_pcp, each of which can be either exact-matched or wildcarded, to specify VLAN matches:

When both dl_vlan and dl_vlan_pcp are wildcarded, the flow matches packets without an 802461Q header or with any 802461Q header46
The match dl_vlan=0xffff causes a flow to match only packets without an 802461Q header46 Such a flow should also wildcard dl_vlan_pcp, since a packet without an 802461Q header does not have a PCP46 OpenFlow does not specify what to do if a match on PCP is actually present, but Open vSwitch ignores it46
Otherwise, the flow matches only packets with an 802461Q header46 If dl_vlan is not wildcarded, then the flow only matches packets with the VLAN ID specified in dl_vlan's low 12 bits46 If dl_vlan_pcp is not wildcarded, then the flow only matches packets with the priority specified in dl_vlan_pcp's low 3 bits46
OpenFlow does not specify how to interpret the high 4 bits of dl_vlan or the high 5 bits of dl_vlan_pcp46 Open vSwitch ignores them46

 

OpenFlow 1461 VLAN Fields

VLAN matching in OpenFlow 1461 is similar to OpenFlow 146046 The one refinement is that when dl_vlan matches on 0xfffe (OFVPID_ANY), the flow matches only packets with an 802461Q header, with any VLAN ID46 If dl_vlan_pcp is wildcarded, the flow matches any packet with an 802461Q header, regardless of VLAN ID or priority46 If dl_vlan_pcp is not wildcarded, then the flow only matches packets with the priority specified in dl_vlan_pcp's low 3 bits46

OpenFlow 1461 uses the name OFPVID_NONE, instead of OFP_VLAN_NONE, for a dl_vlan of 0xffff, but it has the same meaning46

In OpenFlow 1461, Open vSwitch reports error OFPBMC_BAD_VALUE for an attempt to match on dl_vlan between 4,096 and 0xfffd, inclusive, or dl_vlan_pcp greater than 746

 

OpenFlow 1462 VLAN Fields

OpenFlow 1.2+ VLAN ID Field

Name:vlan_vid
Width:16 bits (only the least-significant 12 bits may be nonzero)
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:Ethernet
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_VLAN_VID (6) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: none

The OpenFlow standard describes this field as consisting of ``12+1'' bits46 On ingress, its value is 0 if no 802461Q header is present, and otherwise it holds the VLAN VID in its least significant 12 bits, with bit 12 (0x1000 aka OFPVID_PRESENT) also set to 146 The three most significant bits are always zero:


 OXM_OF_VLAN_VID

<------------->
3 1 12
+---+--+--------+
| |P |VLAN ID |
+---+--+--------+
0

As a consequence of this field's format, one may use it to match the VLAN ID in all of the ways available with the OpenFlow 1460 and 1461 formats, and a few new ways:

Fully wildcarded
Matches any packet, that is, one without an 802461Q header or with an 802461Q header with any TCI value46
Value 0x0000 (OFPVID_NONE), mask 0xffff (or no mask)
Matches only packets without an 802461Q header46
Value 0x1000, mask 0x1000
Matches any packet with an 802461Q header, regardless of VLAN ID46
Value 0x1009, mask 0xffff (or no mask)
Match only packets with an 802461Q header with VLAN ID 946
Value 0x1001, mask 0x1001
Matches only packets that have an 802461Q header with an odd-numbered VLAN ID46 (This is just an example; one can match on any desired VLAN ID bit pattern46)

OpenFlow 1.2+ VLAN Priority Field

Name:vlan_pcp
Width:8 bits (only the least-significant 3 bits may be nonzero)
Format:decimal
Masking:not maskable
Prerequisites:VLAN VID
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_VLAN_PCP (7) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: none

The 3 least significant bits may be used to match the PCP bits in an 802461Q header46 Other bits are always zero:


 OXM_OF_VLAN_VID

<------------->
5 3
+--------+------+
| zero | PCP |
+--------+------+
0

This field may only be used when vlan_vid is not wildcarded and does not exact match on 0 (which only matches when there is no 802461Q header)46

See VLAN Comparison Chart, below, for some examples46

 

Open vSwitch Extension VLAN Field

The vlan_tci extension can describe more kinds of VLAN matches than the other variants46 It is also simpler than the other variants46

VLAN TCI Field

Name:vlan_tci
Width:16 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:Ethernet
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: none
NXM: NXM_OF_VLAN_TCI (4) since Open vSwitch 1.1

For a packet without an 802461Q header, this field is zero46 For a packet with an 802461Q header, this field is the TCI with the bit in CFI's position (marked P for ``present'' below) forced to 146 Thus, for a packet in VLAN 9 with priority 7, it has the value 0xf009:


 NXM_VLAN_TCI

<---------->
3 1 12
+----+--+----+
|PCP |P |VID |
+----+--+----+
7 1 9

Usage examples:

vlan_tci=0
Match packets without an 802461Q header46
vlan_tci=0x1000/0x1000
Match packets with an 802461Q header, regardless of VLAN and priority values46
vlan_tci=0xf123
Match packets tagged with priority 7 in VLAN 0x12346
vlan_tci=0x1123/0x1fff
Match packets tagged with VLAN 0x123 (and any priority)46
vlan_tci=0x5000/0xf000
Match packets tagged with priority 2 (in any VLAN)46
vlan_tci=0/0xfff
Match packets with no 802461Q header or tagged with VLAN 0 (and any priority)46
vlan_tci=0x5000/0xe000
Match packets with no 802461Q header or tagged with priority 2 (in any VLAN)46
vlan_tci=0/0xefff
Match packets with no 802461Q header or tagged with VLAN 0 and priority 046

See VLAN Comparison Chart, below, for more examples46

 

VLAN Comparison Chart

The following table describes each of several possible matching criteria on 802461Q header may be expressed with each variation of the VLAN matching fields:

Criteria OpenFlow 1.0 OpenFlow 1.1 OpenFlow 1.2+ NXM
_ _ _ _ _
[1] ????/1,??/? ????/1,??/? 0000/0000,-- 0000/0000
[2] ffff/0,??/? ffff/0,??/? 0000/ffff,-- 0000/ffff
[3] 0xxx/0,??/1 0xxx/0,??/1 1xxx/ffff,-- 1xxx/1fff
[4] ????/1,0y/0 fffe/0,0y/0 1000/1000,0y z000/f000
[5] 0xxx/0,0y/0 0xxx/0,0y/0 1xxx/ffff,0y zxxx/ffff
[6] (none) (none) 1001/1001,-- 1001/1001
[7] (none) (none) (none) 3000/3000
[8] (none) (none) (none) 0000/0fff
[9] (none) (none) (none) 0000/f000
[10] (none) (none) (none) 0000/efff

All numbers in the table are expressed in hexadecimal46 The columns in the table are interpreted as follows:

Criteria
See the list below46
OpenFlow 1460

OpenFlow 1461 wwww/x,yy/z means VLAN ID match value wwww with wildcard bit x and VLAN PCP match value yy with wildcard bit z46 ? means that the given bits are ignored (and conventionally 0 for wwww or yy, conventionally 1 for x or z)46 ``(none)'' means that OpenFlow 1460 (or 1461) cannot match with these criteria46
OpenFlow 1462+
xxxx/yyyy,zz means vlan_vid with value xxxx and mask yyyy, and vlan_pcp (which is not maskable) with value zz46 -- means that vlan_pcp is omitted46 ``(none)'' means that OpenFlow 1462 cannot match with these criteria46
NXM
xxxx/yyyy means vlan_tci with value xxxx and mask yyyy46

The matching criteria described by the table are:

[1]
Matches any packet, that is, one without an 802461Q header or with an 802461Q header with any TCI value46
[2]
Matches only packets without an 802461Q header46
OpenFlow 1460 doesn't define the behavior if dl_vlan is set to 0xffff and dl_vlan_pcp is not wildcarded46 (Open vSwitch always ignores dl_vlan_pcp when dl_vlan is set to 0xffff46)
OpenFlow 1461 says explicitly to ignore dl_vlan_pcp when dl_vlan is set to 0xffff46
OpenFlow 1462 doesn't say how to interpret a match with vlan_vid value 0 and a mask with OFPVID_PRESENT (0x1000) set to 1 and some other bits in the mask set to 1 also46 Open vSwitch interprets it the same way as a mask of 0x100046
Any NXM match with vlan_tci value 0 and the CFI bit set to 1 in the mask is equivalent to the one listed in the table46
[3]
Matches only packets that have an 802461Q header with VID xxx (and any PCP)46
[4]
Matches only packets that have an 802461Q header with PCP y (and any VID)46
OpenFlow 1460 doesn't clearly define the behavior for this case46 Open vSwitch implements it this way46
In the NXM value, z equals (y << 1) | 146
[5]
Matches only packets that have an 802461Q header with VID xxx and PCP y46
In the NXM value, z equals (y << 1) | 146
[6]
Matches only packets that have an 802461Q header with an odd-numbered VID (and any PCP)46 Only possible with OpenFlow 1462 and NXM46 (This is just an example; one can match on any desired VID bit pattern46)
[7]
Matches only packets that have an 802461Q header with an odd-numbered PCP (and any VID)46 Only possible with NXM46 (This is just an example; one can match on any desired VID bit pattern46)
[8]
Matches packets with no 802461Q header or with an 802461Q header with a VID of 046 Only possible with NXM46
[9]
Matches packets with no 802461Q header or with an 802461Q header with a PCP of 046 Only possible with NXM46
[10]
Matches packets with no 802461Q header or with an 802461Q header with both VID and PCP of 046 Only possible with NXM46
 

LAYER 2465: MPLS FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







mpls_label4 (low 20 bits)noyesMPLSOF 1.2+ and OVS 1.11+
mpls_tc1 (low 3 bits)noyesMPLSOF 1.2+ and OVS 1.11+
mpls_bos1 (low 1 bits)nonoMPLSOF 1.3+ and OVS 1.11+
mpls_ttl1noyesMPLSOVS 2.6+

One or more MPLS headers (more commonly called MPLS labels) follow an Ethernet type field that specifies an MPLS Ethernet type [RFC 3032]46 Ethertype 0x8847 is used for all unicast46 Multicast MPLS is divided into two specific classes, one of which uses Ethertype 0x8847 and the other 0x8848 [RFC 5332]46

The most common overall packet format is Ethernet II, shown below (SNAP encapsulation may be used but is not ordinarily seen in Ethernet networks):


    Ethernet           MPLS

<------------> <------------>
48 48 16 20 3 1 8
+---+---+------+ +-----+--+-+---+
|dst|src| type | |label|TC|S|TTL| ...
+---+---+------+ +-----+--+-+---+
0x8847

MPLS can be encapsulated inside an 802461Q header, in which case the combination looks like this:


 Ethernet     802.1Q     Ethertype        MPLS

<------> <--------> <-------> <------------>
48 48 16 16 16 20 3 1 8
+----+---+ +------+---+ +---------+ +-----+--+-+---+
|dst |src| | TPID |TCI| | type | |label|TC|S|TTL| ...
+----+---+ +------+---+ +---------+ +-----+--+-+---+
0x8100 0x8847

The fields within an MPLS label are:

Label, 20 bits46
An identifier46
Traffic control (TC), 3 bits46
Used for quality of service46
Bottom of stack (BOS), 1 bit (labeled just ``S'' above)46
0 indicates that another MPLS label follows this one46
1 indicates that this MPLS label is the last one in the stack, so that some other protocol follows this one46
Time to live (TTL), 8 bits46
Each hop across an MPLS network decrements the TTL by 146 If it reaches 0, the packet is discarded46
OpenFlow does not make the MPLS TTL available as a match field, but actions are available to set and decrement the TTL46 Open vSwitch 2466 and later makes the MPLS TTL available as an extension46

 

MPLS Label Stacks

Unlike the other encapsulations supported by OpenFlow and Open vSwitch, MPLS labels are routinely used in ``stacks'' two or three deep and sometimes even deeper46 Open vSwitch currently supports up to three labels46

The OpenFlow specification only supports matching on the outermost MPLS label at any given time46 To match on the second label, one must first ``pop'' the outer label and advance to another OpenFlow table, where the inner label may be matched46 To match on the third label, one must pop the two outer labels, and so on46

 

MPLS Inner Protocol

Unlike all other forms of encapsulation that Open vSwitch and OpenFlow support, an MPLS label does not indicate what inner protocol it encapsulates46 Different deployments determine the inner protocol in different ways [RFC 3032]:

A few reserved label values do indicate an inner protocol46 Label 0, the ``IPv4 Explicit NULL Label,'' indicates inner IPv446 Label 2, the ``IPv6 Explicit NULL Label,'' indicates inner IPv646
Some deployments use a single inner protocol consistently46
In some deployments, the inner protocol must be inferred from the innermost label46
In some deployments, the inner protocol must be inferred from the innermost label and the encapsulated data, e46g46 to distinguish between inner IPv4 and IPv6 based on whether the first nibble of the inner protocol data are 4 or 646 OpenFlow and Open vSwitch do not currently support these cases46

Open vSwitch and OpenFlow do not infer the inner protocol, even if reserved label values are in use46 Instead, the flow table must specify the inner protocol at the time it pops the bottommost MPLS label, using the Ethertype argument to the pop_mpls action46

 

Field Details

MPLS Label Field

Name:mpls_label
Width:32 bits (only the least-significant 20 bits may be nonzero)
Format:decimal
Masking:not maskable
Prerequisites:MPLS
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_MPLS_LABEL (34) since OpenFlow 1.2 and Open vSwitch 1.11
NXM: none

The least significant 20 bits hold the ``label'' field from the MPLS label46 Other bits are zero:


 OXM_OF_MPLS_LABEL

<--------------->
12 20
+--------+--------+
| zero | label |
+--------+--------+
0

Most label values are available for any use by deployments46 Values under 16 are reserved46

MPLS Traffic Class Field

Name:mpls_tc
Width:8 bits (only the least-significant 3 bits may be nonzero)
Format:decimal
Masking:not maskable
Prerequisites:MPLS
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_MPLS_TC (35) since OpenFlow 1.2 and Open vSwitch 1.11
NXM: none

The least significant 3 bits hold the TC field from the MPLS label46 Other bits are zero:


 OXM_OF_MPLS_TC

<------------>
5 3
+--------+-----+
| zero | TC |
+--------+-----+
0

This field is intended for use for Quality of Service (QoS) and Explicit Congestion Notification purposes, but its particular interpretation is deployment specific46

Before 2009, this field was named EXP and reserved for experimental use [RFC 5462]46

MPLS Bottom of Stack Field

Name:mpls_bos
Width:8 bits (only the least-significant 1 bits may be nonzero)
Format:decimal
Masking:not maskable
Prerequisites:MPLS
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_MPLS_BOS (36) since OpenFlow 1.3 and Open vSwitch 1.11
NXM: none

The least significant bit holds the BOS field from the MPLS label46 Other bits are zero:


 OXM_OF_MPLS_BOS

<------------->
7 1
+--------+------+
| zero | BOS |
+--------+------+
0

This field is useful as part of processing a series of incoming MPLS labels46 A flow that includes a pop_mpls action should generally match on mpls_bos:

When mpls_bos is 1, there is another MPLS label following this one, so the Ethertype passed to pop_mpls should be an MPLS Ethertype46 For example: table=0, dl_type=0x8847, mpls_bos=1, actions=pop_mpls:0x8847, goto_table:1
When mpls_bos is 0, this MPLS label is the last one, so the Ethertype passed to pop_mpls should be a non-MPLS Ethertype such as IPv446 For example: table=1, dl_type=0x8847, mpls_bos=0, actions=pop_mpls:0x0800, goto_table:2

MPLS Time-to-Live Field

Name:mpls_ttl
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:MPLS
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_MPLS_TTL (30) since Open vSwitch 2.6

Holds the 8-bit time-to-live field from the MPLS label:


 NXM_NX_MPLS_TTL

<------------->
8
+---------------+
| TTL |
+---------------+
 

LAYER 3: IPV4 AND IPV6 FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







ip_src aka nw_src4yesyesIPv4OF 1.2+ and OVS 1.1+
ip_dst aka nw_dst4yesyesIPv4OF 1.2+ and OVS 1.1+
ipv6_src16yesyesIPv6OF 1.2+ and OVS 1.1+
ipv6_dst16yesyesIPv6OF 1.2+ and OVS 1.1+
ipv6_label4 (low 20 bits)yesyesIPv6OF 1.2+ and OVS 1.4+
nw_proto aka ip_proto1nonoIPv4/IPv6OF 1.2+ and OVS 1.1+
nw_ttl1noyesIPv4/IPv6OVS 1.4+
ip_frag aka nw_frag1 (low 2 bits)yesnoIPv4/IPv6OVS 1.3+
nw_tos1noyesIPv4/IPv6OVS 1.1+
ip_dscp1 (low 6 bits)noyesIPv4/IPv6OF 1.2+ and OVS 1.7+
nw_ecn aka ip_ecn1 (low 2 bits)noyesIPv4/IPv6OF 1.2+ and OVS 1.4+

 

IPv4 Specific Fields

These fields are applicable only to IPv4 flows, that is, flows that match on the IPv4 Ethertype 0x080046

IPv4 Source Address Field

Name:ip_src (aka nw_src)
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:IPv4
Access:read/write
OpenFlow 1.0:yes (CIDR match only)
OpenFlow 1.1:yes
OXM: OXM_OF_IPV4_SRC (11) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_IP_SRC (7) since Open vSwitch 1.1

The source address from the IPv4 header:


   Ethernet            IPv4

<-----------> <--------------->
48 48 16 8 32 32
+---+---+-----+ +---+-----+---+---+
|dst|src|type | |...|proto|src|dst| ...
+---+---+-----+ +---+-----+---+---+
0x800

For historical reasons, in an ARP or RARP flow, Open vSwitch interprets matches on nw_src as actually referring to the ARP SPA46

IPv4 Destination Address Field

Name:ip_dst (aka nw_dst)
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:IPv4
Access:read/write
OpenFlow 1.0:yes (CIDR match only)
OpenFlow 1.1:yes
OXM: OXM_OF_IPV4_DST (12) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_IP_DST (8) since Open vSwitch 1.1

The destination address from the IPv4 header:


   Ethernet            IPv4

<-----------> <--------------->
48 48 16 8 32 32
+---+---+-----+ +---+-----+---+---+
|dst|src|type | |...|proto|src|dst| ...
+---+---+-----+ +---+-----+---+---+
0x800

For historical reasons, in an ARP or RARP flow, Open vSwitch interprets matches on nw_dst as actually referring to the ARP TPA46

 

IPv6 Specific Fields

These fields apply only to IPv6 flows, that is, flows that match on the IPv6 Ethertype 0x86dd46

IPv6 Source Address Field

Name:ipv6_src
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:IPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_IPV6_SRC (26) since OpenFlow 1.2 and Open vSwitch 1.1
NXM: NXM_NX_IPV6_SRC (19) since Open vSwitch 1.1

The source address from the IPv6 header:


    Ethernet            IPv6

<------------> <-------------->
48 48 16 8 128 128
+---+---+------+ +---+----+---+---+
|dst|src| type | |...|next|src|dst| ...
+---+---+------+ +---+----+---+---+
0x86dd

Open vSwitch 1468 added support for bitwise matching; earlier versions supported only CIDR masks46

IPv6 Destination Address Field

Name:ipv6_dst
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:IPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_IPV6_DST (27) since OpenFlow 1.2 and Open vSwitch 1.1
NXM: NXM_NX_IPV6_DST (20) since Open vSwitch 1.1

The destination address from the IPv6 header:


    Ethernet            IPv6

<------------> <-------------->
48 48 16 8 128 128
+---+---+------+ +---+----+---+---+
|dst|src| type | |...|next|src|dst| ...
+---+---+------+ +---+----+---+---+
0x86dd

Open vSwitch 1468 added support for bitwise matching; earlier versions supported only CIDR masks46

IPv6 Flow Label Field

Name:ipv6_label
Width:32 bits (only the least-significant 20 bits may be nonzero)
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:IPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_IPV6_FLABEL (28) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_IPV6_LABEL (27) since Open vSwitch 1.4

The least significant 20 bits hold the flow label field from the IPv6 header46 Other bits are zero:


 OXM_OF_IPV6_FLABEL

<---------------->
12 20
+--------+---------+
| zero | label |
+--------+---------+
0

 

IPv4/IPv6 Fields

These fields exist with at least approximately the same meaning in both IPv4 and IPv6, so they are treated as a single field for matching purposes46 Any flow that matches on the IPv4 Ethertype 0x0800 or the IPv6 Ethertype 0x86dd may match on these fields46

IPv4/v6 Protocol Field

Name:nw_proto (aka ip_proto)
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:IPv4/IPv6
Access:read-only
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_IP_PROTO (10) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_IP_PROTO (6) since Open vSwitch 1.1

Matches the IPv4 or IPv6 protocol type46

For historical reasons, in an ARP or RARP flow, Open vSwitch interprets matches on nw_proto as actually referring to the ARP opcode46 The ARP opcode is a 16-bit field, so for matching purposes ARP opcodes greater than 255 are treated as 0; this works adequately because in practice ARP and RARP only use opcodes 1 through 446

IPv4/v6 TTL/Hop Limit Field

Name:nw_ttl
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:IPv4/IPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_IP_TTL (29) since Open vSwitch 1.4

The main reason to match on the TTL or hop limit field is to detect whether a dec_ttl action will fail due to a TTL exceeded error46 Another way that a controller can detect TTL exceeded is to listen for OFPR_INVALID_TTL ``packet-in'' messages via OpenFlow46

IPv4/v6 Fragment Bitmask Field

Name:ip_frag (aka nw_frag)
Width:8 bits (only the least-significant 2 bits may be nonzero)
Format:frag
Masking:arbitrary bitwise masks
Prerequisites:IPv4/IPv6
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXM_NX_IP_FRAG (26) since Open vSwitch 1.3

Specifies what kinds of IP fragments or non-fragments to match46 The value for this field is most conveniently specified as one of the following:

no
Match only non-fragmented packets46
yes
Matches all fragments46
first
Matches only fragments with offset 046
later
Matches only fragments with nonzero offset46
not_later
Matches non-fragmented packets and fragments with zero offset46

The field is internally formatted as 2 bits: bit 0 is 1 for an IP fragment with any offset (and otherwise 0), and bit 1 is 1 for an IP fragment with nonzero offset (and otherwise 0), like so:


 NXM_NX_IP_FRAG

<------------>
6 1 1
+----+-----+---+
|zero|later|any|
+----+-----+---+
0

Even though 2 bits have 4 possible values, this field only uses 3 of them:

A packet that is not an IP fragment has value 046
A packet that is an IP fragment with offset 0 (the first fragment) has bit 0 set and thus value 146
A packet that is an IP fragment with nonzero offset has bits 0 and 1 set and thus value 346

The switch may reject matches against values that can never appear46

It is important to understand how this field interacts with the OpenFlow fragment handling mode:

In OFPC_FRAG_DROP mode, the OpenFlow switch drops all IP fragments before they reach the flow table, so every packet that is available for matching will have value 0 in this field46
Open vSwitch does not implement OFPC_FRAG_REASM mode, but if it did then IP fragments would be reassembled before they reached the flow table and again every packet available for matching would always have value 046
In OFPC_FRAG_NORMAL mode, all three values are possible, but OpenFlow 1460 says that fragments' transport ports are always 0, even for the first fragment, so this does not provide much extra information46
In OFPC_FRAG_NX_MATCH mode, all three values are possible46 For fragments with offset 0, Open vSwitch makes L4 header information available46

Thus, this field is likely to be most useful for an Open vSwitch switch configured in OFPC_FRAG_NX_MATCH mode46 See the description of the set-frags command in ovs-ofctl(8), for more details46

IPv4/IPv6 TOS Fields

IPv4 and IPv6 contain a one-byte ``type of service'' or TOS field that has the following format:


 type of service

<------------->
6 2
+--------+------+
| DSCP | ECN |
+--------+------+

IPv4/v6 DSCP (Bits 2-7) Field

Name:nw_tos
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:IPv4/IPv6
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: none
NXM: NXM_OF_IP_TOS (5) since Open vSwitch 1.1

This field is the TOS byte with the two ECN bits cleared to 0:


 NXM_OF_IP_TOS

<----------->
6 2
+------+------+
| DSCP | zero |
+------+------+
0

IPv4/v6 DSCP (Bits 0-5) Field

Name:ip_dscp
Width:8 bits (only the least-significant 6 bits may be nonzero)
Format:decimal
Masking:not maskable
Prerequisites:IPv4/IPv6
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_IP_DSCP (8) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: none

This field is the TOS byte shifted right to put the DSCP bits in the 6 least-significant bits:


 OXM_OF_IP_DSCP

<------------>
2 6
+-------+------+
| zero | DSCP |
+-------+------+
0

IPv4/v6 ECN Field

Name:nw_ecn (aka ip_ecn)
Width:8 bits (only the least-significant 2 bits may be nonzero)
Format:decimal
Masking:not maskable
Prerequisites:IPv4/IPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_IP_ECN (9) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_IP_ECN (28) since Open vSwitch 1.4

This field is the TOS byte with the DSCP bits cleared to 0:


 OXM_OF_IP_ECN

<----------->
6 2
+-------+-----+
| zero | ECN |
+-------+-----+
0
 

LAYER 3: ARP FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







arp_op2noyesARPOF 1.2+ and OVS 1.1+
arp_spa4yesyesARPOF 1.2+ and OVS 1.1+
arp_tpa4yesyesARPOF 1.2+ and OVS 1.1+
arp_sha6yesyesARPOF 1.2+ and OVS 1.1+
arp_tha6yesyesARPOF 1.2+ and OVS 1.1+

In theory, Address Resolution Protocol, or ARP, is a generic protocol generic protocol that can be used to obtain the hardware address that corresponds to any higher-level protocol address46 In contemporary usage, ARP is used only in Ethernet networks to obtain the Ethernet address for a given IPv4 address46 OpenFlow and Open vSwitch only support this usage of ARP46 For this use case, an ARP packet has the following format, with the ARP fields exposed as Open vSwitch fields highlighted:


   Ethernet                      ARP

<-----------> <---------------------------------->
48 48 16 16 16 8 8 16 48 16 48 16
+---+---+-----+ +---+-----+---+---+--+---+---+---+---+
|dst|src|type | |hrd| pro |hln|pln|op|sha|spa|tha|tpa|
+---+---+-----+ +---+-----+---+---+--+---+---+---+---+
0x806 1 0x800 6 4

The ARP fields are also used for RARP, the Reverse Address Resolution Protocol, which shares ARP's wire format46

ARP Opcode Field

Name:arp_op
Width:16 bits
Format:decimal
Masking:not maskable
Prerequisites:ARP
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_ARP_OP (21) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ARP_OP (15) since Open vSwitch 1.1

Even though this is a 16-bit field, Open vSwitch does not support ARP opcodes greater than 255; it treats them to zero46 This works adequately because in practice ARP and RARP only use opcodes 1 through 446

ARP Source IPv4 Address Field

Name:arp_spa
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:ARP
Access:read/write
OpenFlow 1.0:yes (CIDR match only)
OpenFlow 1.1:yes
OXM: OXM_OF_ARP_SPA (22) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ARP_SPA (16) since Open vSwitch 1.1

ARP Target IPv4 Address Field

Name:arp_tpa
Width:32 bits
Format:IPv4
Masking:arbitrary bitwise masks
Prerequisites:ARP
Access:read/write
OpenFlow 1.0:yes (CIDR match only)
OpenFlow 1.1:yes
OXM: OXM_OF_ARP_TPA (23) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ARP_TPA (17) since Open vSwitch 1.1

ARP Source Ethernet Address Field

Name:arp_sha
Width:48 bits
Format:Ethernet
Masking:arbitrary bitwise masks
Prerequisites:ARP
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_ARP_SHA (24) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ARP_SHA (17) since Open vSwitch 1.1

ARP Target Ethernet Address Field

Name:arp_tha
Width:48 bits
Format:Ethernet
Masking:arbitrary bitwise masks
Prerequisites:ARP
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_ARP_THA (25) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ARP_THA (18) since Open vSwitch 1.1
 

LAYER 3: NSH FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







nsh_flags1yesyesNSHOVS 2.8+
nsh_ttl1noyesNSHOVS 2.9+
nsh_mdtype1nonoNSHOVS 2.8+
nsh_np1nonoNSHOVS 2.8+
nsh_spi aka nsp4 (low 24 bits)noyesNSHOVS 2.8+
nsh_si aka nsi1noyesNSHOVS 2.8+
nsh_c1 aka nshc14yesyesNSHOVS 2.8+
nsh_c2 aka nshc24yesyesNSHOVS 2.8+
nsh_c3 aka nshc34yesyesNSHOVS 2.8+
nsh_c4 aka nshc44yesyesNSHOVS 2.8+

Service functions are widely deployed and essential in many networks46 These service functions provide a range of features such as security, WAN acceleration, and server load balancing46 Service functions may be instantiated at different points in the network infrastructure such as the wide area network, data center, and so forth46

Prior to development of the SFC architecture [RFC 7665] and the protocol specified in this document, current service function deployment models have been relatively static and bound to topology for insertion and policy selection46 Furthermore, they do not adapt well to elastic service environments enabled by virtualization46

New data center network and cloud architectures require more flexible service function deployment models46 Additionally, the transition to virtual platforms demands an agile service insertion model that supports dynamic and elastic service delivery46 Specifically, the following functions are necessary:

1.
The movement of service functions and application workloads in the network46
2.
The ability to easily bind service policy to granular information, such as per-subscriber state46
3.
The capability to steer traffic to the requisite service function(s)46

The Network Service Header (NSH) specification defines a new data plane protocol, which is an encapsulation for service function chains46 The NSH is designed to encapsulate an original packet or frame, and in turn be encapsulated by an outer transport encapsulation (which is used to deliver the NSH to NSH-aware network elements), as shown below:




+-----------------------+----------------------------+---------------------+
|Transport Encapsulation|Network Service Header (NSH)|Original Packet/Frame|
+-----------------------+----------------------------+---------------------+

The NSH is composed of the following elements:

1.
Service Function Path identification46
2.
Indication of location within a Service Function Path46
3.
Optional, per packet metadata (fixed length or variable)46

[RFC 7665] provides an overview of a service chaining architecture that clearly defines the roles of the various elements and the scope of a service function chaining encapsulation46 Figure 3 of [RFC 7665] depicts the SFC architectural components after classification46 The NSH is the SFC encapsulation referenced in [RFC 7665]46

flags field (2 bits) Field

Name:nsh_flags
Width:8 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_FLAGS (1) since Open vSwitch 2.8

TTL field (6 bits) Field

Name:nsh_ttl
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_TTL (10) since Open vSwitch 2.9

mdtype field (8 bits) Field

Name:nsh_mdtype
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:NSH
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_MDTYPE (2) since Open vSwitch 2.8

np (next protocol) field (8 bits) Field

Name:nsh_np
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:NSH
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_NP (3) since Open vSwitch 2.8

spi (service path identifier) field (24 bits) Field

Name:nsh_spi (aka nsp)
Width:32 bits (only the least-significant 24 bits may be nonzero)
Format:hexadecimal
Masking:not maskable
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_SPI (4) since Open vSwitch 2.8

si (service index) field (8 bits) Field

Name:nsh_si (aka nsi)
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_SI (5) since Open vSwitch 2.8

c1 (Network Platform Context) field (32 bits) Field

Name:nsh_c1 (aka nshc1)
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_C1 (6) since Open vSwitch 2.8

c2 (Network Shared Context) field (32 bits) Field

Name:nsh_c2 (aka nshc2)
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_C2 (7) since Open vSwitch 2.8

c3 (Service Platform Context) field (32 bits) Field

Name:nsh_c3 (aka nshc3)
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_C3 (8) since Open vSwitch 2.8

c4 (Service Shared Context) field (32 bits) Field

Name:nsh_c4 (aka nshc4)
Width:32 bits
Format:hexadecimal
Masking:arbitrary bitwise masks
Prerequisites:NSH
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: NXOXM_NSH_C4 (9) since Open vSwitch 2.8
 

LAYER 4: TCP, UDP, AND SCTP FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







tcp_src aka tp_src2yesyesTCPOF 1.2+ and OVS 1.1+
tcp_dst aka tp_dst2yesyesTCPOF 1.2+ and OVS 1.1+
tcp_flags2 (low 12 bits)yesnoTCPOF 1.3+ and OVS 2.1+
udp_src2yesyesUDPOF 1.2+ and OVS 1.1+
udp_dst2yesyesUDPOF 1.2+ and OVS 1.1+
sctp_src2yesyesSCTPOF 1.2+ and OVS 2.0+
sctp_dst2yesyesSCTPOF 1.2+ and OVS 2.0+

For matching purposes, no distinction is made whether these protocols are encapsulated within IPv4 or IPv646

 

TCP

The following diagram shows TCP within IPv446 Open vSwitch also supports TCP in IPv646 Only TCP fields implemented as Open vSwitch fields are shown:


   Ethernet            IPv4                   TCP

<-----------> <---------------> <------------------->
48 48 16 8 32 32 16 16 12
+---+---+-----+ +---+-----+---+---+ +---+---+---+-----+---+
|dst|src|type | |...|proto|src|dst| |src|dst|...|flags|...| ...
+---+---+-----+ +---+-----+---+---+ +---+---+---+-----+---+
0x800 6

TCP Source Port Field

Name:tcp_src (aka tp_src)
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:TCP
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_TCP_SRC (13) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_TCP_SRC (9) since Open vSwitch 1.1

Open vSwitch 1466 added support for bitwise matching46

TCP Destination Port Field

Name:tcp_dst (aka tp_dst)
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:TCP
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_TCP_DST (14) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_TCP_DST (10) since Open vSwitch 1.1

Open vSwitch 1466 added support for bitwise matching46

TCP Flags Field

Name:tcp_flags
Width:16 bits (only the least-significant 12 bits may be nonzero)
Format:TCP flags
Masking:arbitrary bitwise masks
Prerequisites:TCP
Access:read-only
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: ONFOXM_ET_TCP_FLAGS (42) since OpenFlow 1.3 and Open vSwitch 2.459 OXM_OF_TCP_FLAGS (42) since OpenFlow 1.5 and Open vSwitch 2.3
NXM: NXM_NX_TCP_FLAGS (34) since Open vSwitch 2.1

This field holds the TCP flags46 TCP currently defines 9 flag bits46 An additional 3 bits are reserved46 For more information, see [RFC 793], [RFC 3168], and [RFC 3540]46

Matches on this field are most conveniently written in terms of symbolic names (given in the diagram below), each preceded by either + for a flag that must be set, or - for a flag that must be unset, without any other delimiters between the flags46 Flags not mentioned are wildcarded46 For example, tcp,tcp_flags=+syn-ack matches TCP SYNs that are not ACKs, and tcp,tcp_flags=+[200] matches TCP packets with the reserved [200] flag set46 Matches can also be written as flags/mask, where flags and mask are 16-bit numbers in decimal or in hexadecimal prefixed by 0x46

The flag bits are:


          reserved      later RFCs         RFC 793

<---------------> <--------> <--------------------->
4 1 1 1 1 1 1 1 1 1 1 1 1
+----+-----+-----+-----+--+---+---+---+---+---+---+---+---+
|zero|[800]|[400]|[200]|NS|CWR|ECE|URG|ACK|PSH|RST|SYN|FIN|
+----+-----+-----+-----+--+---+---+---+---+---+---+---+---+
0

 

UDP

The following diagram shows UDP within IPv446 Open vSwitch also supports UDP in IPv646 Only UDP fields that Open vSwitch exposes as fields are shown:


   Ethernet            IPv4              UDP

<-----------> <---------------> <--------->
48 48 16 8 32 32 16 16
+---+---+-----+ +---+-----+---+---+ +---+---+---+
|dst|src|type | |...|proto|src|dst| |src|dst|...| ...
+---+---+-----+ +---+-----+---+---+ +---+---+---+
0x800 17

UDP Source Port Field

Name:udp_src
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:UDP
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_UDP_SRC (15) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_UDP_SRC (11) since Open vSwitch 1.1

UDP Destination Port Field

Name:udp_dst
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:UDP
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_UDP_DST (16) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_UDP_DST (12) since Open vSwitch 1.1

 

SCTP

The following diagram shows SCTP within IPv446 Open vSwitch also supports SCTP in IPv646 Only SCTP fields that Open vSwitch exposes as fields are shown:


   Ethernet            IPv4             SCTP

<-----------> <---------------> <--------->
48 48 16 8 32 32 16 16
+---+---+-----+ +---+-----+---+---+ +---+---+---+
|dst|src|type | |...|proto|src|dst| |src|dst|...| ...
+---+---+-----+ +---+-----+---+---+ +---+---+---+
0x800 132

SCTP Source Port Field

Name:sctp_src
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:SCTP
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_SCTP_SRC (17) since OpenFlow 1.2 and Open vSwitch 2.0
NXM: none

SCTP Destination Port Field

Name:sctp_dst
Width:16 bits
Format:decimal
Masking:arbitrary bitwise masks
Prerequisites:SCTP
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_SCTP_DST (18) since OpenFlow 1.2 and Open vSwitch 2.0
NXM: none
 

LAYER 4: ICMPV4 AND ICMPV6 FIELDS

 

Summary:

NameBytesMaskRW?PrereqsNXM/OXM Support







icmp_type1noyesICMPv4OF 1.2+ and OVS 1.1+
icmp_code1noyesICMPv4OF 1.2+ and OVS 1.1+
icmpv6_type1noyesICMPv6OF 1.2+ and OVS 1.1+
icmpv6_code1noyesICMPv6OF 1.2+ and OVS 1.1+
nd_target16yesyesNDOF 1.2+ and OVS 1.1+
nd_sll6yesyesND solicitOF 1.2+ and OVS 1.1+
nd_tll6yesyesND advertOF 1.2+ and OVS 1.1+
nd_reserved4noyesNDOVS 2.11+
nd_options_type1noyesNDOVS 2.11+

 

ICMPv4


   Ethernet            IPv4             ICMPv4

<-----------> <---------------> <----------->
48 48 16 8 32 32 8 8
+---+---+-----+ +---+-----+---+---+ +----+----+---+
|dst|src|type | |...|proto|src|dst| |type|code|...| ...
+---+---+-----+ +---+-----+---+---+ +----+----+---+
0x800 1

ICMPv4 Type Field

Name:icmp_type
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:ICMPv4
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_ICMPV4_TYPE (19) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ICMP_TYPE (13) since Open vSwitch 1.1

For historical reasons, in an ICMPv4 flow, Open vSwitch interprets matches on tp_src as actually referring to the ICMP type46

ICMPv4 Code Field

Name:icmp_code
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:ICMPv4
Access:read/write
OpenFlow 1.0:yes (exact match only)
OpenFlow 1.1:yes (exact match only)
OXM: OXM_OF_ICMPV4_CODE (20) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_OF_ICMP_CODE (14) since Open vSwitch 1.1

For historical reasons, in an ICMPv4 flow, Open vSwitch interprets matches on tp_dst as actually referring to the ICMP code46

 

ICMPv6


    Ethernet            IPv6            ICMPv6

<------------> <--------------> <----------->
48 48 16 8 128 128 8 8
+---+---+------+ +---+----+---+---+ +----+----+---+
|dst|src| type | |...|next|src|dst| |type|code|...| ...
+---+---+------+ +---+----+---+---+ +----+----+---+
0x86dd 58

ICMPv6 Type Field

Name:icmpv6_type
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:ICMPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_ICMPV6_TYPE (29) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ICMPV6_TYPE (21) since Open vSwitch 1.1

ICMPv6 Code Field

Name:icmpv6_code
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:ICMPv6
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_ICMPV6_CODE (30) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ICMPV6_CODE (22) since Open vSwitch 1.1

 

ICMPv6 Neighbor Discovery


    Ethernet            IPv6              ICMPv6            ICMPv6 ND

<------------> <--------------> <--------------> <--------------->
48 48 16 8 128 128 8 8 128
+---+---+------+ +---+----+---+---+ +-------+----+---+ +------+----------+
|dst|src| type | |...|next|src|dst| | type |code|...| |target|option ...|
+---+---+------+ +---+----+---+---+ +-------+----+---+ +------+----------+
0x86dd 58 135/136 0

ICMPv6 Neighbor Discovery Target IPv6 Field

Name:nd_target
Width:128 bits
Format:IPv6
Masking:arbitrary bitwise masks
Prerequisites:ND
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_IPV6_ND_TARGET (31) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ND_TARGET (23) since Open vSwitch 1.1

ICMPv6 Neighbor Discovery Source Ethernet Address Field

Name:nd_sll
Width:48 bits
Format:Ethernet
Masking:arbitrary bitwise masks
Prerequisites:ND solicit
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_IPV6_ND_SLL (32) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ND_SLL (24) since Open vSwitch 1.1

ICMPv6 Neighbor Discovery Target Ethernet Address Field

Name:nd_tll
Width:48 bits
Format:Ethernet
Masking:arbitrary bitwise masks
Prerequisites:ND advert
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: OXM_OF_IPV6_ND_TLL (33) since OpenFlow 1.2 and Open vSwitch 1.7
NXM: NXM_NX_ND_TLL (25) since Open vSwitch 1.1

ICMPv6 Neighbor Discovery Reserved Field Field

Name:nd_reserved
Width:32 bits
Format:decimal
Masking:not maskable
Prerequisites:ND
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: ERICOXM_OF_ICMPV6_ND_RESERVED (1) since Open vSwitch 2.11

This is used to set the R,S,O bits in Neighbor Advertisement Messages

ICMPv6 Neighbor Discovery Options Type Field Field

Name:nd_options_type
Width:8 bits
Format:decimal
Masking:not maskable
Prerequisites:ND
Access:read/write
OpenFlow 1.0:not supported
OpenFlow 1.1:not supported
OXM: none
NXM: ERICOXM_OF_ICMPV6_ND_OPTIONS_TYPE (2) since Open vSwitch 2.11

A value of 1 indicates that the option is Source Link Layer46 A value of 2 indicates that the options is Target Link Layer46 See RFC 4861 for further details46

 

REFERENCES

Casado
M46 Casado, M46 J46 Freedman, J46 Pettit, J46 Luo, N46 McKeown, and S46 Shenker, ``Ethane: Taking Control of the Enterprise,'' Computer Communications Review, October 200746
ERSPAN
M46 Foschiano, K46 Ghosh, M46 Mehta, ``Cisco Systems' Encapsulated Remote Switch Port Analyzer (ERSPAN),'' <URL: https://tools.ietf.org/html/draft-foschiano-erspan-03 > 46
EXT-56
J46 Tonsing, ``Permit one of a set of prerequisites to apply, e46g46 don't preclude non-Ethernet media,'' <URL: https://rs.opennetworking.org/bugs/browse/EXT-56 > (ONF members only)46
EXT-112
J46 Tourrilhes, ``Support non-Ethernet packets throughout the pipeline,'' <URL: https://rs.opennetworking.org/bugs/browse/EXT-112 > (ONF members only)46
EXT-134
J46 Tourrilhes, ``Match first nibble of the MPLS payload,'' <URL: https://rs.opennetworking.org/bugs/browse/EXT-134 > (ONF members only)46
Geneve
J46 Gross, I46 Ganga, and T46 Sridhar, editors, ``Geneve: Generic Network Virtualization Encapsulation,'' <URL: https://datatracker.ietf.org/doc/draft-ietf-nvo3-geneve/ > 46
IEEE OUI
IEEE Standards Association, ``MAC Address Block Large (MA-L),'' <URL: https://standards.ieee.org/develop/regauth/oui/index.html > 46
NSH
P46 Quinn and U46 Elzur, editors, ``Network Service Header,'' <URL: https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/ > 46
OpenFlow 1460461
Open Networking Foundation, ``OpenFlow Switch Errata, Version 1460461,'' June 201246
OpenFlow 1461
OpenFlow Consortium, ``OpenFlow Switch Specification Version 1461460 Implemented (Wire Protocol 0x02),'' February 201146
OpenFlow 1465
Open Networking Foundation, ``OpenFlow Switch Specification Version 1465460 (Protocol version 0x06),'' December 201446
OpenFlow Extensions 146346x Package 2
Open Networking Foundation, ``OpenFlow Extensions 146346x Package 2,'' December 201346
TCP Flags Match Field Extension
Open Networking Foundation, ``TCP flags match field Extension,'' December 201446 In [OpenFlow Extensions 146346x Package 2]46
Pepelnjak
I46 Pepelnjak, ``OpenFlow and Fermi Estimates,'' <URL: http://blog.ipspace.net/2013/09/openflow-and-fermi-estimates.html > 46
RFC 793
``Transmission Control Protocol,'' <URL: http://www.ietf.org/rfc/rfc793.txt > 46
RFC 3032
E46 Rosen, D46 Tappan, G46 Fedorkow, Y46 Rekhter, D46 Farinacci, T46 Li, and A46 Conta, ``MPLS Label Stack Encoding,'' <URL: http://www.ietf.org/rfc/rfc3032.txt > 46
RFC 3168
K46 Ramakrishnan, S46 Floyd, and D46 Black, ``The Addition of Explicit Congestion Notification (ECN) to IP,'' <URL: https://tools.ietf.org/html/rfc3168 > 46
RFC 3540
N46 Spring, D46 Wetherall, and D46 Ely, ``Robust Explicit Congestion Notification (ECN) Signaling with Nonces,'' <URL: https://tools.ietf.org/html/rfc3540 > 46
RFC 4632
V46 Fuller and T46 Li, ``Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan,'' <URL: https://tools.ietf.org/html/rfc4632 > 46
RFC 5462
L46 Andersson and R46 Asati, ``Multiprotocol Label Switching (MPLS) Label Stack Entry: ``EXP'' Field Renamed to ``Traffic Class'' Field,'' <URL: http://www.ietf.org/rfc/rfc5462.txt > 46
RFC 6830
D46 Farinacci, V46 Fuller, D46 Meyer, and D46 Lewis, ``The Locator/ID Separation Protocol (LISP),'' <URL: http://www.ietf.org/rfc/rfc6830.txt > 46
RFC 7348
M46 Mahalingam, D46 Dutt, K46 Duda, P46 Agarwal, L46 Kreeger, T46 Sridhar, M46 Bursell, and C46 Wright, ``Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks, '' <URL: https://tools.ietf.org/html/rfc7348 > 46
RFC 7665
J46 Halpern, Ed46 and C46 Pignataro, Ed46, ``Service Function Chaining (SFC) Architecture,'' <URL: https://tools.ietf.org/html/rfc7665 > 46
Srinivasan
V46 Srinivasan, S46 Suriy, and G46 Varghese, ``Packet Classification using Tuple Space Search,'' SIGCOMM 199946
Pagiamtzis
K46 Pagiamtzis and A46 Sheikholeslami, ``Content-addressable memory (CAM) circuits and architectures: A tutorial and survey,'' IEEE Journal of Solid-State Circuits, vol46 41, no46 3, pp46 712-727, March 200646
VXLAN Group Policy Option
M46 Smith and L46 Kreeger, `` VXLAN Group Policy Option46'' Internet-Draft46 <URL: https://tools.ietf.org/html/draft-smith-vxlan-group-policy > 46
 

AUTHORS

Ben Pfaff, with advice from Justin Pettit and Jean Tourrilhes46


 

Index

NAME
INTRODUCTION
Fields
Matching
Evolution of OpenFlow Fields
FIELDS REFERENCE
CONJUNCTIVE MATCH FIELDS
Summary:
TUNNEL FIELDS
Summary:
VXLAN Group-Based Policy Fields
ERSPAN Metadata Fields
Geneve Fields
METADATA FIELDS
Summary:
CONNECTION TRACKING FIELDS
Summary:
REGISTER FIELDS
Summary:
LAYER 2 (ETHERNET) FIELDS
Summary:
VLAN FIELDS
Summary:
VLAN Header Format
Multiple VLANs
VLAN Field Details
OpenFlow 1460 VLAN Fields
OpenFlow 1461 VLAN Fields
OpenFlow 1462 VLAN Fields
Open vSwitch Extension VLAN Field
VLAN Comparison Chart
LAYER 2465: MPLS FIELDS
Summary:
MPLS Label Stacks
MPLS Inner Protocol
Field Details
LAYER 3: IPV4 AND IPV6 FIELDS
Summary:
IPv4 Specific Fields
IPv6 Specific Fields
IPv4/IPv6 Fields
LAYER 3: ARP FIELDS
Summary:
LAYER 3: NSH FIELDS
Summary:
LAYER 4: TCP, UDP, AND SCTP FIELDS
Summary:
TCP
UDP
SCTP
LAYER 4: ICMPV4 AND ICMPV6 FIELDS
Summary:
ICMPv4
ICMPv6
ICMPv6 Neighbor Discovery
REFERENCES
AUTHORS