public:networking_tools
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
public:networking_tools [2020/10/10 11:12] – [Multipath Network Testing] lstolp | public:networking_tools [2020/10/18 13:35] – lstolp | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Linux Network Testing Tools ====== | + | ====== Linux Network Testing Tools ======\\ |
+ | The green links show examples | ||
- | ==== Multipath Network Testing ==== | ||
- | To test different network paths from ship to shore using each WAN option directly. For this test we used a [[https:// | ||
- | == Hardware Used == | + | [[public: |
+ | A brief description to show how to set up multipath WAN testing device. | ||
- | fitlet2 J3455 Barebone | + | [[public: |
- | 16 GB RAM for Fitlet2 | + | [[https:// |
- | 512 GB SATA SSD for fitlet2 | + | **tcpdump** is a data-network packet analyzer computer program that runs under a command line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. |
- | FC-M2LAN FACET-Card (2x Gbit Ethernet) | + | |
- | == Operating System == | + | [[public: |
+ | [[https:// | ||
+ | Nmap (" | ||
- | | ||
- | == Magic Sauce === | + | [[public: |
- | Edit **/// | + | Can be used to |
- | + | ||
- | auto eth0 | + | |
- | iface eth0 inet static | + | |
- | address | + | |
- | | + | |
- | network [[KA network IP]] | + | |
- | broadcast [[KA Broadcast]] | + | |
- | + | ||
- | + | ||
- | Edit **/// | + | |
- | # | + | |
- | # reserved values | + | |
- | # | + | |
- | 255 local | + | |
- | 254 main | + | |
- | 253 default | + | |
- | 0 unspec | + | |
- | # | + | |
- | # local | + | |
- | # Create multipath routing tables for Sealink and KA and Cell if available | + | |
- | # A table can also be created | + | |
- | 1 | + | |
- | 2 ka | + | |
- | 3 | + | |
- | 4 | + | |
- | + | ||
- | === multipath.sh === | + | |
- | The multipath script needs to be run as sudo, so have installed it in /root/bin | + | |
- | + | ||
- | # multipath.sh | + | |
- | # script to add routes out each WAN using tables created above | + | |
- | ip route add default via [[ka static ip]] dev [[ka eth]] table ka | + | |
- | ip route add default via [[sealink static ip]] dev [[sealink eth]] table hsn | + | |
- | ip route add default via [[cell static ip]] dev [[cell eth]] table cell | + | |
- | ip route add default via [[ship static ip]] dev [[cell eth]] table ship | + | |
- | + | ||
- | # Add rules to the rules | + | |
- | ip rule add from [[ka static ip]] table ka | + | |
- | ip rule add from [[sealink static ip]] table hsn | + | |
- | ip rule add from [[cell static ip]] table cell | + | |
- | ip rule add from [[ship static ip]] table ship | + | |
- | ip rule list | + | |
- | + | ||
- | + | ||
- | ===== tcpdump ===== | + | |
- | + | ||
- | + | ||
- | + | ||
- | If you ssh into a computer and want to use tcpdump to view traffic, ssh (22) can be excluded | + | |
- | tcpdump -I [interface] -n ' | + | |
- | Capture traffic leaving a host | + | |
- | tcpdump -pi [interface] src host [hostname] | + | |
- | Watch for traffic leaving one network and entering two other networks | + | |
- | tcpdump -pi [interface] src net [network] and dst net [network2] or [network3] | + | |
- | tcpdump -pi [interface] src net 128.128.252.0/ | + | |
- | + | ||
- | ===== NMAP ===== | + | |
- | + | ||
- | + | ||
- | To see what computers are up, what OS they are running and what ports are open: | + | |
- | nmap -sS -O [network] | + | |
- | + | ||
- | + | ||
- | ===== iftop ===== | + | |
- | + | ||
- | To look at https traffic on the science network: | + | |
- | iftop -i [interface] -f "dst port 443" | + | |
- | ===== iPerf ===== | + | |
- | + | ||
- | Need to setup a server (sender) and client (listener) | + | |
- | On shore just listen | + | |
- | iperf -s -u | + | |
- | On shore listen on a certain port | + | |
- | iperf -s -u -p 55437 | + | |
- | + | ||
- | From ship, send 7 M | + | |
- | iperf -c [shoreip number] | + | |
+ | [[public: | ||
+ | [[https:// | ||
+ | iPerf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, buffers and protocols (TCP, UDP, SCTP with IPv4 and IPv6). For each test it reports the bandwidth, loss, and other parameters. |
public/networking_tools.txt · Last modified: 2024/01/25 03:31 by 127.0.0.1