User Tools

Site Tools



This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:networking_tools [2020/10/10 10:41]
lstolp [Multipath Network Testing]
public:networking_tools [2020/10/18 13:35] (current)
Line 1: Line 1:
 ====== Linux Network Testing Tools ====== ====== Linux Network Testing Tools ======
 +The green links show examples 
-==== Multipath Network Testing ==== 
-To test different network paths from ship to shore using each WAN option directly.  
-== Hardware Used ==+[[public:multipath |Multipath Network ]]\\ 
 +A brief description to show how to set up multipath WAN testing device. 
-  fitlet2 J3455 Barebone +[[public:tcp_dump|tcpdump]]\\ 
-  16 GB RAM for Fitlet2 +[[]]\\ 
-  512 GB SATA SSD for fitlet2 +**tcpdump** is a data-network packet analyzer computer program that runs under a command line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.
-  FC-M2LAN FACET-Card (2x Gbit Ethernet)+
-===== tcpdump ===== +[[public:nmap|NMAP]]\\ 
- +[[]]\\ 
 +Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X.
-If you ssh into a computer and want to use tcpdump to view traffic, ssh (22) can be excluded +[[public:iftop|iftop]]\\ 
-  tcpdump -I [interface] -n 'port!22' +Can be used to  display bandwidth usage on an interface.\\
-Capture traffic leaving a host +
-  tcpdump -pi [interface] src host [hostname] +
-Watch for traffic leaving one network and entering two other networks +
-  tcpdump -pi [interface] src net [network] and dst net [network2] or [network3] +
-  tcpdump -pi [interface] src net and dst or 192.168.12/24 +
- +
-===== NMAP ===== +
- +
- +
-To see what computers are up, what OS they are running and what ports are open: +
-  nmap -sS -O [network]    ie: nmap -sS -O +
-   +
- +
-===== iftop ===== +
- +
-To look at https traffic on the science network: +
-  iftop -i [interface-f "dst port 443"  +
-===== iPerf ===== +
- +
-Need to setup a server (sender) and client (listener) +
-  On shore just listen +
-         iperf -s -u +
-  On shore listen on a certain port     +
-      iperf -s -u -p 55437 +
- +
-  From ship, send 7 M +
-     iperf -c [shoreip number]  -u -t 120 -b 7M+
 +iPerf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, buffers and protocols (TCP, UDP, SCTP with IPv4 and IPv6). For each test it reports the bandwidth, loss, and other parameters. 
public/networking_tools.1602326474.txt.gz · Last modified: 2020/10/10 10:41 by lstolp