.\" Copyright (c) 1983, 1991 The Regents of the University of California.
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\" must display the following acknowledgement:
.\" This product includes software developed by the University of
.\" California, Berkeley and its contributors.
.\" 4. Neither the name of the University nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" @(#)route.8 6.11 (Berkeley) 3/16/91
.Nd manually manipulate the routing tables (Interim)
is a program used to manually manipulate the network
routing tables. It normally is not needed, as the
system routing table management daemon,
should tend to this task.
Prevent attempts to print host and network names symbolically
(verbose) Print additional details.
.Bl -tag -width Fl -compact
Change aspects of a route (such as its gateway).
Lookup and display the route for a destination.
Continuously report any changes to the routing information base,
routing lookup misses, or suspected network partionings.
The monitor command has the syntax
.Bd -filled -offset indent -compact
The flush command has the syntax
.Bd -filled -offset indent -compact
Where the address family may be specified by any of the
The other commands have the following syntax:
.Bd -filled -offset indent -compact
.Op Fl net No \&| Fl host
is the destination host or network,
is the next-hop gateway to which packets should be addressed.
Routes to a particular host are distinguished from those to
a network by interpreting the Internet address associated with
force the destination to be interpreted as a network or a host, respectively.
has a ``local address part'' of
is the symbolic name of a network, then the route is
assumed to be to a network; otherwise, it is presumed to be a
.Fl host Li 128.32.0.130 ;
If the route is via an interface rather than
modifier should be specified;
the gateway given is the address of this host on the common network,
indicating the interface to be used for transmission.
specify that all subsequent addresses are in the
and the names must be numeric specifications rather than
to achieve the effect of an
redirect with the netmask option.
One specifies an additional ensuing address parameter
(to be interpreted as a network mask).
The implicit network mask generated in the inet case
can be overridden by making sure this option follows the destination parameter.
provide initial values to metrics maintained in the routing entry.
These may be individually locked by preceding each such modifier to
meta-modifier, or one can
specify that all ensuing metrics may be locked by the
command where the destination and gateway are not sufficient to specify
case where several interfaces may have the
modifiers may be used to determine the interface or interface address.
All symbolic names specified for a
are looked up first as a host name using
is then used to interpret the name as that of a network.
uses a routing socket and the new message types
As such, only the super-user may modify
will ``flush'' the routing tables of all gateway entries.
One can choose to flush only those routes whose destinations
are of a given address family, by specifying an optional keyword
describing which address family.
.It Sy "add [host \&| network ] %s: gateway %s flags %x"
The specified route is being added to the tables. The
values printed are from the routing table entry supplied
If the gateway address used was not the primary address of the gateway
(the first one returned by
the gateway address is printed numerically as well as symbolically.
.It Sy "delete [ host &| network ] %s: gateway %s flags %x"
As above, but when deleting an entry.
command is specified, each routing table entry deleted
is indicated with a message of this form.
.It Sy "Network is unreachable"
An attempt to add a route failed because the gateway listed was not
on a directly-connected network.
The next-hop gateway must be given.
A delete operation was attempted for an entry which
wasn't present in the tables.
.It Sy "routing table overflow"
An add operation was attempted, but the system was
low on resources and was unable to allocate memory
The first paragraph may have slightly exaggerated