Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pg3(8) [suse man page]

PG3(8)							 System Manager's Manual: iputils						    PG3(8)

NAME
pg3, ipg, pgset - send stream of UDP packets SYNOPSIS
source ipg pg pgset COMMAND DESCRIPTION
ipg is not a program, it is script which should be sourced to bash. When sourced it loads module pg3 and exports a few of functions acces- sible from parent shell. These macros are pg to start packet injection and to get the results of run; and pgset to setup packet generator. pgset can send the following commands to module pg3: COMMAND
odev DEVICE Name of Ethernet device to test. See warning below. pkt_size BYTES Size of packet to generate. The size includes all the headers: UDP, IP, MAC, but does not account for overhead internal to medium, i.e. FCS and various paddings. frags NUMBER Each packet will contain NUMBER of fragments. Maximal amount for linux-2.4 is 6. Far not all the devices support fragmented buf- fers. count NUMBER Send stream of NUMBER of packets and stop after this. ipg TIME Introduce artificial delay between packets of TIME microseconds. dst IP_ADDRESS Select IP destination where the stream is sent to. Beware, never set this address at random. pg3 is not a toy, it creates really tough stream. Default value is 0.0.0.0. dst MAC_ADDRESS Select MAC destination where the stream is sent to. Default value is 00:00:00:00:00:00 in hope that this will not be received by any node on LAN. stop Abort packet injection. WARNING
When output device is set to some random device different of hardware Ethernet device, pg3 will crash kernel. Do not use it on VLAN, ethertap, VTUN and other devices, which emulate Ethernet not being real Ethernet in fact. AUTHOR
pg3 was written by Robert Olsson <robert.olsson@its.uu.se>. SECURITY
This can be used only by superuser. This tool creates floods of packets which is unlikely to be handled even by high-end machines. For example, it saturates gigabit link with 60 byte packets when used with Intel's e1000. In face of such stream switches, routers and end hosts may deadlock, crash, explode. Use only in test lab environment. AVAILABILITY
pg3 is part of iputils package and the latest versions are available in source form for anonymous ftp ftp://ftp.inr.ac.ru/ip-rout- ing/iputils-current.tar.gz. iputils-021109 09 iINAON 2002 PG3(8)

Check Out this Related Man Page

ARPING(8)						 System Manager's Manual: iputils						 ARPING(8)

NAME
arping - send ARP REQUEST to a neighbour host SYNOPSIS
arping [-AbDfhqUV] [-c count] [-w deadline] [-s source] -I interface destination DESCRIPTION
Ping destination on device interface by ARP packets, using source address source. OPTIONS
-A The same as -U, but ARP REPLY packets used instead of ARP REQUEST. -b Send only MAC level broadcasts. Normally arping starts from sending broadcast, and switch to unicast after reply received. -c count Stop after sending count ARP REQUEST packets. With deadline option, arping waits for count ARP REPLY packets, until the timeout expires. -D Duplicate address detection mode (DAD). See RFC2131, 4.4.1. Returns 0, if DAD succeeded i.e. no replies are received -f Finish after the first reply confirming that target is alive. -I interface Name of network device where to send ARP REQUEST packets. This option is required. -h Print help page and exit. -q Quiet output. Nothing is displayed. -s source IP source address to use in ARP packets. If this option is absent, source address is: o In DAD mode (with option -D) set to 0.0.0.0. o In Unsolicited ARP mode (with options -U or -A) set to destination. o Otherwise, it is calculated from routing tables. -U Unsolicited ARP mode to update neighbours' ARP caches. No replies are expected. -V Print version of the program and exit. -w deadline Specify a timeout, in seconds, before arping exits regardless of how many packets have been sent or received. In this case arping does not stop after count packet are sent, it waits either for deadline expire or until count probes are answered. SEE ALSO
ping(8), clockdiff(8), tracepath(8). AUTHOR
arping was written by Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>. It is now maintained by YOSHIFUJI Hideaki <yoshfuji@skbuff.net>. SECURITY
arping requires CAP_NET_RAWIO capability to be executed. It is not recommended to be used as set-uid root, because it allows user to modify ARP caches of neighbour hosts. AVAILABILITY
arping is part of iputils package and the latest versions are available in source form at http://www.skbuff.net/iputils/iputils-cur- rent.tar.bz2. iputils-101006 12 April 2011 ARPING(8)
Man Page