10-01-2001
AND.....
Sockets are established by processes. What the 'sockets are doing' (as you ask) depends on what processes the platform is running. Sometimes this is easy to know, when the server-side sockets are 'well known sockets' and the usage is standard. Sometimes, finding out what processes are using which sockets can involve some real detective work.
10 More Discussions You Might Find Interesting
1. IP Networking
Hi
what is the command to see the process name/application name
along with the port number, connection status ...
netstat is not giving process/application name
Is there any way to know which application is holding which port?
Thanks in advance (3 Replies)
Discussion started by: axes
3 Replies
2. UNIX for Advanced & Expert Users
Hi..,
Now, I am reading about the netstat command and its implementation. I have doubts in some options and its functionalities,
natstat - M (Which is described as display masqueraded connections), what it means?
What is Forwarding Information Base.?(--fib)
Thanks in advance,... (3 Replies)
Discussion started by: nagalenoj
3 Replies
3. BSD
For FreeBSD I use this command to determine what ports are listenning
netstat -an | grep LISTEN
is there another way, perhaps another command? (2 Replies)
Discussion started by: edgarvm
2 Replies
4. IP Networking
I can't tell what the output of the netstat command means. Is there anywhere that has this information? I tried the man pages, but they weren't helpful. (3 Replies)
Discussion started by: Ultrix
3 Replies
5. Solaris
Greetings to all,
Here is a line of output from my netstat command
cbp031.904 wdcprodhome.nfsd 98304 0 49640 0 ESTABLISHED
The only thing i recognize is the unix machine "cbp031" but what is .904 and all the other data telling me?
Thanks in advance. (3 Replies)
Discussion started by: Harleyrci
3 Replies
6. Shell Programming and Scripting
Hi,
In my project we use sftp with batch mode (password less) script in parallel for 14 sessions which connects to 2 different servers alternatively i.e. 7 connects to one server say server1 and the other 7 connects to say server 2.
Now the problem is that these 14 sessions are run in... (5 Replies)
Discussion started by: dips_ag
5 Replies
7. UNIX for Advanced & Expert Users
Hi,
I want to list the time for how long a secure connections last to my server/blade. i am using netstat command to get the same, but not sure how to get the time for how long connections is being ESTABLISHED.
netstat -na | grep 'ESTABLISHED' | grep :443 |awk '{print $4}' | cut -d: -f1 |... (1 Reply)
Discussion started by: Siddheshk
1 Replies
8. UNIX for Dummies Questions & Answers
Do I have this command correct to show all current connections/sessions my Solaris box has? It does not seem to do anything.
netstat -an | grep EST (6 Replies)
Discussion started by: SIFT3R
6 Replies
9. Red Hat
Hi
Can any body tell me about TIME_WAIT status meaning in the following command output.
# netstat -anp|grep 5000
tcp 0 0 127.0.0.1:50006 0.0.0.0:* LISTEN 5058/ccsd
tcp 0 0 0.0.0.0:50008 0.0.0.0:* ... (3 Replies)
Discussion started by: mastansaheb
3 Replies
10. OS X (Apple)
When running netstat -i from the Command Terminal,
It returns with 21 different connections..
The addresses all look like this:
::1
fe80:1::1
10:dd:b1:a5:c4:ba
with Network names like
Linke#2
fe80::8e2d
How can I delve deeper into this to clarify what is going on with my network?... (0 Replies)
Discussion started by: dwfiedler
0 Replies
LEARN ABOUT DEBIAN
sctp_test
sctp_test(1) General Commands Manual sctp_test(1)
NAME
sctp_test - Send and receive messages via SCTP
SYNOPSIS
sctp_test -H -P -h -p -l|s
DESCRIPTION
This is a userspace test application for the SCTP Linux kernel reference implementation.
OPTIONS
-H local-addr
-P local-port
-h remote-addr
-p remote-port
-s Act as client
-l Listen for connections (server)
-a assoc_pattern
assoc_pattern in the mixed mode 0 = sequential ascending(default) 1 = random
-d debug
0 = none 1 = min(default) 2 = max
-c testcase
0 = 1 byte packets. 1 = 1352 byte packets.
(fragmentation point for an i/f with 1500 as mtu.) 2 = 1353 byte packets.
(min. size at which fragmentation occurs
for an i/f with 1500 as mtu.) 3 = Sequence of 1, 1353, 32768 byte packets. 4 = Sequence of following size packets.
(1, 1000, 2000, 3000, 5000, 10000,15000, 20000, 25000, 32768) 5 = 32768 byte packets.
(default max receive window size.) 6 = random size packets.
-ve value
Packets of specifed size.
-m msgsize
(1500-65515, default value 32768)
-x number_of_repeats
-o order_pattern
0 = all unordered(default) 1 = all ordered 2 = alternating 3 = random -t stream_pattern
0 = sequential ascending(default)
1 = random -M max_stream (default value 0) -r seed (default 0, use time()) -L num_ports (default value 0). Run the mixed mode -S
num_ports (default value 0). Run the mixed mode -D Drain. If in client mode do a read following send.
USAGE
server: sctp_test -H local_addr -P local_port -l
client: sctp_test -H local_addr -P local_port -h remote_addr
-p remote-port -s
AUTHOR
Michael Biebl <biebl@debian.org>
sctp_test(1)