10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Below is what i did to open the firewall port on
# sudo firewall-cmd --zone=public --add-port=27012/tcp --permanent
Warning: ALREADY_ENABLED: 27012:tcp
success
# sudo firewall-cmd --reload
success
# firewall-cmd --list-all
public
target: default
icmp-block-inversion: no
... (10 Replies)
Discussion started by: mohtashims
10 Replies
2. IP Networking
My son does homework on a school laptop. I was thinking about setting up a gateway on my home network, so that I can monitor web traffic and know if he is doing his homework without standing over his shoulder. Ideally I would like to use the Raspberry Pi Model b that I already have. However, I... (15 Replies)
Discussion started by: gandolf989
15 Replies
3. AIX
Hi Friends,
How to do port forwarding in AIX? We would like to re route traffic from port A to port B on AIX LPAR.
for example: my application is using 8080 port on LPAR and would like to use the 8081 instead of 8080. By default application was configured with 8080. But instead of changing... (2 Replies)
Discussion started by: System Admin 77
2 Replies
4. UNIX for Advanced & Expert Users
Hi All
I am resilience testing an application that is spread across multiple servers.
One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond....
I... (3 Replies)
Discussion started by: bbq
3 Replies
5. IP Networking
I am trying to block ALL traffic except when from ports 9100,22,23 to destination network 192.0.0.0 (my WAN): 2 networks 192.0.3.0 with static route to 192.0.0.0
Shouldn't this work?:
iptables -A INPUT -p tcp -d 192.0.0.0/24 --dport 22 -j ACCEPT
iptables -A INPUT -p tcp -d 192.0.0.0/24... (3 Replies)
Discussion started by: herot
3 Replies
6. Solaris
Hi Everyone,
In my environment, I have few T5220. On the iLOM Management Card, I have both Network and Serial port are cabled, I don't have any issues while I try to connect using Network Management port, but when I try to connect the serial port for the same server which is actually connected... (3 Replies)
Discussion started by: bobby320
3 Replies
7. HP-UX
I Colleagues,
Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me.
Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies
8. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
9. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
10. UNIX for Dummies Questions & Answers
there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat
thanks (6 Replies)
Discussion started by: yls177
6 Replies
tcptrack(1) General Commands Manual tcptrack(1)
NAME
tcptrack - Monitor TCP connections on the network
SYNOPSIS
tcptrack [ -dfhvp ] [ -r seconds ] -i interface
[ filter expression ]
DESCRIPTION
tcptrack displays the status of TCP connections that it sees on a given network interface. tcptrack monitors their state and displays
information such as state, source/destination addresses and bandwidth usage in a sorted, updated list very much like the top(1) command.
The filter expression is a standard pcap filter expression (identical to the expressions used by tcpdump(8)) which can be used to filter
down the characteristics of TCP connections that tcptrack will see. See tcpdump(8) for more information about the syntax of this expres-
sion.
OPTIONS
-d Only track connections that were started after tcptrack was started. Do not try to detect existing connections.
-f Enable fast average recalculation. TCPTrack will calculate the average speeds of connections by using a running average. TCPTrack
will use more memory and CPU time, but averages will seem closer to real time and will be updated more than once per second and may
be more accurate under heavy load. The number of times per second that averages will be recalculated in fast mode is a compile-time
setting that defaults to 10 times per second.
-h Display command line help
-i [interface]
Sniff packets from the specified network interface.
-T [pcap file]
Read packets from the specified file instead of sniffing from the network. Useful for testing.
-p Do not put the interface being sniffed into promiscuous mode.
-r [seconds]
Wait this many seconds before removing a closed connection from the display. Defaults to 2 seconds. See also the pause interactive
command (below).
-v Display tcptrack version
INTERACTIVE COMMANDS
The following keys may be pressed while tcptrack is running to change runtime options:
p - Pause/unpause display. No new connections will be added to the display, and all currently displayed connections will remain in the dis-
play.
q - Quit tcptrack.
s - Cycle through the sorting options: unsorted, sorted by rate, sorted by total bytes.
The options for pausing and toggling sorting are useful if you're watching a very busy network and want to look at the display without con-
nections jumping around (due to sorting and new connections being added) and disappearing (due to being closed for a certain time).
When paused (via the p command) no new connections will be displayed, however tcptrack will still monitor and track all connections it sees
as usual. This option affects the display only, not internals. When you unpause, the display will be updated with all current information
that tcptrack has been gathering all along.
EXAMPLES
tcptrack requires only one parameter to run: the -i flag followed by an interface name that you want tcptrack to monitor. This is the most
basic way to run tcptrack:
# tcptrack -i eth0
tcptrack can also take a pcap filter expression as an argument. The format of this filter expression is the same as that of tcpdump(8) and
other libpcap-based sniffers. The following example will only show connections from host 10.45.165.2:
# tcptrack -i eth0 src or dst 10.45.165.2
The next example will only show web traffic (ie, traffic on port 80):
# tcptrack -i eth0 port 80
SEE ALSO
tcpdump(8), pcap(3), http://www.rhythm.cx/~steve/devel/tcptrack
BUGS
When picking up a connection that was already running before tcptrack was started, there is no way tcptrack can know for sure which end of
the connection is the client (ie, which peer started the connection) and which is the server (ie, which peer was listening). tcptrack makes
a crude guess at which is which by looking at the port numbers; whichever end has the lower port number is considered the server side. This
isn't always accurate of course, but future versions may have better heuristics to figure out which end is which.
Currently the interface is not very flexible. Display timing settings (such as the refresh interval) can only be changed by editing the
source code (defs.h in particular). See the TODO file included with the source distribution for further bugs.
tcptrack(1)