Sponsored Content
Full Discussion: monitoring network traffic
Top Forums UNIX for Dummies Questions & Answers monitoring network traffic Post 35251 by TRUEST on Thursday 3rd of April 2003 11:47:14 AM
Old 04-03-2003
QUESTION FOR PERDERABO

concerning testing the traffic from host to host by FTPing a 1 gig byte. can you tell me what you would do if you notice the traffic is kinda slow?? what would you do to fix it???
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

How to capture network traffic

Hi, Can someone give me the clue on how to capture network traffic at gateway. Thanx (2 Replies)
Discussion started by: kayode
2 Replies

2. UNIX for Advanced & Expert Users

Monitoring network traffic using snoop

I want to monitor network traffic. For this purpose i use snoop command. But snoop command only show those packets which are broadcasted or those packets which recieved by host. But I want to examine whole network traffic. Please tell me how to use snoop for monitoring whole network traffic or if... (3 Replies)
Discussion started by: mansoorulhaq
3 Replies

3. Infrastructure Monitoring

Network Traffic

Hi all, Got a strange one here, well not so much strange, different :-) I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies

4. UNIX for Dummies Questions & Answers

NIC card monitoring traffic question

Folks; I have 2 NIC cards on my SUSE Linux server. One of them was reporting receive errors for a while now it's OK, but i'd like to monitor it. Is there any command i can run to tell me the usage in the past or give me a history of traffic and the speed that going on this specific card? I... (1 Reply)
Discussion started by: Katkota
1 Replies

5. Cybersecurity

Monitoring network traffic on wireless router

Hi all, How can I monitor packet traffic on my wireless router? Some info - my wireless router is netgear wgr614 - everyone can connect it i.e. no password required - I would like to see where they connect, how they are using the internet connection I installed wireshark and captured... (3 Replies)
Discussion started by: SaTYR
3 Replies

6. HP-UX

Monitoring traffic in the network

I Colleagues, Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me. Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies

7. Shell Programming and Scripting

Traffic Monitoring Script

Hello All, I have written a script to check for http error code 500 in the logs. here is the code #!/bin/bash ######################################################################################################### # Shellscript : trafficchk.sh -Traffic Monitoring # Version ... (3 Replies)
Discussion started by: Siddheshk
3 Replies

8. Infrastructure Monitoring

How do I know what traffic is in network port?

If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ? ps. because I always found the network is very slow , so I would like what the network port is doing . Thanks Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies

9. UNIX for Advanced & Expert Users

How to throttle network traffic?

Hi All I am resilience testing an application that is spread across multiple servers. One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond.... I... (3 Replies)
Discussion started by: bbq
3 Replies

10. IP Networking

I would like to monitor network traffic for a computer on my network

My son does homework on a school laptop. I was thinking about setting up a gateway on my home network, so that I can monitor web traffic and know if he is doing his homework without standing over his shoulder. Ideally I would like to use the Raspberry Pi Model b that I already have. However, I... (15 Replies)
Discussion started by: gandolf989
15 Replies
ARP(8)							    BSD System Manager's Manual 						    ARP(8)

NAME
arp -- address resolution display and control SYNOPSIS
arp [-n] [-i interface] hostname arp [-n] [-i interface] [-l] -a arp -d hostname [pub] [ifscope interface] arp -d [-i interface] -a arp -s hostname ether_addr [temp] [reject] [blackhole] [pub [only]] [ifscope interface] arp -S hostname ether_addr [temp] [reject] [blackhole] [pub [only]] [ifscope interface] arp -f filename DESCRIPTION
The arp utility displays and modifies the Internet-to-Ethernet address translation tables used by the address resolution protocol (arp(4)). With no flags, the program displays the current ARP entry for hostname. The host may be specified by name or by number, using Internet dot notation. Available options: -a The program displays or deletes all of the current ARP entries. -d A super-user may delete an entry for the host called hostname with the -d flag. If the pub keyword is specified, only the ``published'' ARP entry for this host will be deleted. If the ifscope keyword is specified, the entry specific to the interface will be deleted. Alternatively, the -d flag may be combined with the -a flag to delete all entries. -i interface Limit the operation scope to the ARP entries on interface. Applicable only to the following operations: display one, display all, delete all. -l Show link-layer reachability information. -n Show network addresses as numbers (normally arp attempts to display addresses symbolically). -s hostname ether_addr Create an ARP entry for the host called hostname with the Ethernet address ether_addr. The Ethernet address is given as six hex bytes separated by colons. The entry will be permanent unless the word temp is given in the command. If the word pub is given, the entry will be ``published''; i.e., this system will act as an ARP server, responding to requests for hostname even though the host address is not its own. In this case the ether_addr can be given as auto in which case the interfaces on this host will be examined, and if one of them is found to occupy the same subnet, its Ethernet address will be used. If the only keyword is also specified, this will create a ``published (proxy only)'' entry. This type of entry is created automatically if arp detects that a routing table entry for hostname already exists. If the reject keyword is specified the entry will be marked so that traffic to the host will be discarded and the sender will be notified the host is unreachable. The blackhole keyword is similar in that traffic is discarded but the sender is not notified. These can be used to block external traffic to a host without using a firewall. If the ifscope keyword is specified, the entry will set with an additional property that strictly associate the entry to the inter- face. This allows for the presence of mutiple entries with the same destination on different interfaces. -S hostname ether_addr Is just like -s except any existing ARP entry for this host will be deleted first. -f filename Cause the file filename to be read and multiple entries to be set in the ARP tables. Entries in the file should be of the form hostname ether_addr [temp] [pub [only]] [ifscope interface] with argument meanings as given above. Leading whitespace and empty lines are ignored. A '#' character will mark the rest of the line as a comment. -x Show extended link-layer reachability information in addition to that shown by the -l flag. SEE ALSO
inet(3), arp(4), ifconfig(8), ndp(8) HISTORY
The arp utility appeared in 4.3BSD. BSD
March 18, 2008 BSD
All times are GMT -4. The time now is 02:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy