04-03-2003
QUESTION FOR PERDERABO
concerning testing the traffic from host to host by FTPing a 1 gig byte. can you tell me what you would do if you notice the traffic is kinda slow?? what would you do to fix it???
10 More Discussions You Might Find Interesting
1. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
2. UNIX for Advanced & Expert Users
I want to monitor network traffic. For this purpose i use snoop command. But snoop command only show those packets which are broadcasted or those packets which recieved by host. But I want to examine whole network traffic. Please tell me how to use snoop for monitoring whole network traffic or if... (3 Replies)
Discussion started by: mansoorulhaq
3 Replies
3. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
4. UNIX for Dummies Questions & Answers
Folks;
I have 2 NIC cards on my SUSE Linux server. One of them was reporting receive errors for a while now it's OK, but i'd like to monitor it.
Is there any command i can run to tell me the usage in the past or give me a history of traffic and the speed that going on this specific card?
I... (1 Reply)
Discussion started by: Katkota
1 Replies
5. Cybersecurity
Hi all,
How can I monitor packet traffic on my wireless router?
Some info
- my wireless router is netgear wgr614
- everyone can connect it i.e. no password required
- I would like to see where they connect, how they are using the internet connection
I installed wireshark and captured... (3 Replies)
Discussion started by: SaTYR
3 Replies
6. HP-UX
I Colleagues,
Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me.
Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies
7. Shell Programming and Scripting
Hello All,
I have written a script to check for http error code 500 in the logs.
here is the code
#!/bin/bash
#########################################################################################################
# Shellscript : trafficchk.sh -Traffic Monitoring
# Version ... (3 Replies)
Discussion started by: Siddheshk
3 Replies
8. Infrastructure Monitoring
If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ?
ps. because I always found the network is very slow , so I would like what the network port is doing .
Thanks
Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies
9. UNIX for Advanced & Expert Users
Hi All
I am resilience testing an application that is spread across multiple servers.
One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond....
I... (3 Replies)
Discussion started by: bbq
3 Replies
10. IP Networking
My son does homework on a school laptop. I was thinking about setting up a gateway on my home network, so that I can monitor web traffic and know if he is doing his homework without standing over his shoulder. Ideally I would like to use the Raspberry Pi Model b that I already have. However, I... (15 Replies)
Discussion started by: gandolf989
15 Replies
ARP(8) BSD System Manager's Manual ARP(8)
NAME
arp -- address resolution display and control
SYNOPSIS
arp [-n] [-i interface] hostname
arp [-n] [-i interface] [-l] -a
arp -d hostname [pub] [ifscope interface]
arp -d [-i interface] -a
arp -s hostname ether_addr [temp] [reject] [blackhole] [pub [only]] [ifscope interface]
arp -S hostname ether_addr [temp] [reject] [blackhole] [pub [only]] [ifscope interface]
arp -f filename
DESCRIPTION
The arp utility displays and modifies the Internet-to-Ethernet address translation tables used by the address resolution protocol (arp(4)).
With no flags, the program displays the current ARP entry for hostname. The host may be specified by name or by number, using Internet dot
notation.
Available options:
-a The program displays or deletes all of the current ARP entries.
-d A super-user may delete an entry for the host called hostname with the -d flag. If the pub keyword is specified, only the
``published'' ARP entry for this host will be deleted. If the ifscope keyword is specified, the entry specific to the interface will
be deleted.
Alternatively, the -d flag may be combined with the -a flag to delete all entries.
-i interface
Limit the operation scope to the ARP entries on interface. Applicable only to the following operations: display one, display all,
delete all.
-l Show link-layer reachability information.
-n Show network addresses as numbers (normally arp attempts to display addresses symbolically).
-s hostname ether_addr
Create an ARP entry for the host called hostname with the Ethernet address ether_addr. The Ethernet address is given as six hex
bytes separated by colons. The entry will be permanent unless the word temp is given in the command. If the word pub is given, the
entry will be ``published''; i.e., this system will act as an ARP server, responding to requests for hostname even though the host
address is not its own. In this case the ether_addr can be given as auto in which case the interfaces on this host will be examined,
and if one of them is found to occupy the same subnet, its Ethernet address will be used. If the only keyword is also specified,
this will create a ``published (proxy only)'' entry. This type of entry is created automatically if arp detects that a routing table
entry for hostname already exists.
If the reject keyword is specified the entry will be marked so that traffic to the host will be discarded and the sender will be
notified the host is unreachable. The blackhole keyword is similar in that traffic is discarded but the sender is not notified.
These can be used to block external traffic to a host without using a firewall.
If the ifscope keyword is specified, the entry will set with an additional property that strictly associate the entry to the inter-
face. This allows for the presence of mutiple entries with the same destination on different interfaces.
-S hostname ether_addr
Is just like -s except any existing ARP entry for this host will be deleted first.
-f filename
Cause the file filename to be read and multiple entries to be set in the ARP tables. Entries in the file should be of the form
hostname ether_addr [temp] [pub [only]] [ifscope interface]
with argument meanings as given above. Leading whitespace and empty lines are ignored. A '#' character will mark the rest of the
line as a comment.
-x Show extended link-layer reachability information in addition to that shown by the -l flag.
SEE ALSO
inet(3), arp(4), ifconfig(8), ndp(8)
HISTORY
The arp utility appeared in 4.3BSD.
BSD
March 18, 2008 BSD