User Tools

Site Tools


public:networking_tools

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
public:networking_tools [2020/10/10 10:28]
lstolp [iftop]
public:networking_tools [2020/10/18 13:35] (current)
lstolp
Line 1: Line 1:
 ====== Linux Network Testing Tools ====== ====== Linux Network Testing Tools ======
 +The green links show examples 
  
  
-===== tcpdump ===== +[[public:multipath |Multipath Network ]]\\ 
- +A brief description to show how to set up multipath WAN testing device. 
  
 +[[public:tcp_dump|tcpdump]]\\
 +[[https://www.tcpdump.org]]\\
 +**tcpdump** is a data-network packet analyzer computer program that runs under a command line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.
  
-If you ssh into a computer and want to use tcpdump to view traffic, ssh (22) can be excluded +[[public:nmap|NMAP]]\\ 
-  tcpdump -I [interface-n 'port!22' +[[https://nmap.org]]\\ 
-Capture traffic leaving a host +Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptimeNmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristicsIt was designed to rapidly scan large networks, but works fine against single hostsNmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X.
-  tcpdump -pi [interface] src host [hostname+
-Watch for traffic leaving one network and entering two other networks +
-  tcpdump -pi [interface] src net [networkand dst net [network2] or [network3] +
-  tcpdump -pi [interface] src net 128.128.252.0/28 and dst 192.168.11.0/24 or 192.168.12/24+
  
-===== NMAP ===== 
  
 +[[public:iftop|iftop]]\\
 +Can be used to  display bandwidth usage on an interface.\\
  
-To see what computers are up, what OS they are running and what ports are open+[[public:iPerf|iPerf]]\\ 
-  nmap -sS -O [network]    ienmap -sS -O 192.168.11.0 +[[https://iperf.fr]]\\ 
-   +iPerf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, buffers and protocols (TCP, UDP, SCTP with IPv4 and IPv6). For each test it reports the bandwidthloss, and other parameters. 
- +
-===== iftop ===== +
- +
-To look at https traffic on the science network: +
-  iftop -i [interface] -f "dst port 443"  +
-===== iPerf ===== +
- +
-Need to setup a server (sender) and client (listener) +
-  On shore just listen +
-         iperf -s -u +
-  On shore listen on a certain port     +
-      iperf -s -u -p 55437 +
- +
-  From shipsend 7 M +
-     iperf -c [shoreip number]  -u -t 120 -b 7M +
public/networking_tools.1602325680.txt.gz · Last modified: 2020/10/10 10:28 by lstolp