Discover linux sniff network traffic, include the articles, news, trends, analysis and practical advice about linux sniff network traffic on alibabacloud.com
(I) downloadNethogs-0.8.0.tar.gzBefore installation, you may need to install yum install ncurses *(Ii) RoleDifferent from other statistics and monitoring of network card Traffic, NetHogs is a bit special and can monitor the network bandwidth usage of each process(Iii) UseThis program requires the root permission. By default, the eth0 Nic is monitored. If multiple
Basic Network ConfigurationTo connect a Linux host to a network, you need to configure network-related settingsGenerally include the following:Host NameIp/netmaskRouting: Default gatewayDNS ServerPrimary DNS ServerSecondary DNS serverThird-party DNS serversTo modify the NIC naming example:1. Check the driver of the
eth0 indicates the network port to listen
-W log output to the file named log (libpcap format)
The filter_expression parameter is tcp dst port 50000, which only listens to tcp packets whose target port is 50000.
More examples:
/* The monitored destination address is traffic other than the intranet address (192.168.3.1-192.168.3.254 */
# Tcpdump dst net not 192.168.3.0/24
/*
Monitor
others. As with others, Linux has a tool to do this for you. That's what Wondershaper did.Wondershaper is actually a shell script that uses TC to define traffic-tuning commands and uses QoS to handle specific network interfaces. Outbound traffic is designed to limit the rate of outgoing
source and destination hosts and processes
MAC: Local communication: Range: Local LAN any Internet traffic must be switched to local
IP: Define communication host, source and target, range: Internet
Port: Define the process; scope; host
Network configuration:
The Linux host is involved in the network, and
Linux System and Performance Monitoring (Network)Date: 2009.07.21Author: Darren HochTranslation: Tonnyom [AT] hotmail.com
Followed by the first three articles:Linux System and Performance Monitoring (CPU)Linux System and Performance Monitoring (Memory)Linux System and Performance Monitoring (I/O)
8.0
At It's FOSS we are not talking about the "command line aspect" of Linux every day. Basically, I'm more focused on the desktop side of Linux. But some of your readers in-house surveys (It's FOSS newsletter subscribers only) point out that you also want to learn some command-line tricks. The Quick check table is also popular with most readers.To do this, I edited a list of basic
Linux device driversLinux device drivers exist as kernel modules for Linux in Linux. Kernel modules can dynamically scale the system while the system is running. So, we can dynamically install or unload modules in user space, using Insmod and Rmmod.There are a lot of devices in the real world, which vary in electrical characteristics and I/O methods. To simplify
protocol in Linux. The structure is obvious: source Port, dest destination port, len udp length, and check is the verification code.
Icmphdr this is the IP protocol's icmp protocol header
Struct icmphdr{U_int8_t type;U_int8_t code;U_int16_t checksum;Union{Struct{U_int16_t id;U_int16_t sequence;} Echo;U_int32_t gateway;Struct{U_int16_t_unused;U_int16_t mtu;} Frag;} Un;}; This is the icmp protocol in linux's IP protocol. The main parameters here are th
Build a Linux-based VPN Network-Linux Enterprise Application-Linux server application information. The following is a detailed description. Building a VPN is almost one of the most advanced Linux applications. Learning this technology is enough to make you proud of the capit
(I) download
Nethogs-0.8.0.tar.gz
Before installation, you may needYum install ncurses *
(Ii) Role
Different from other statistics and monitoring of network card Traffic, nethogs is a bit special and can monitor eachNetwork bandwidth usage of processes
(Iii) UseThis program requires the root permission. By default, the eth0 Nic is monitored. If multiple NICs exist, you must specifyNethogsNethogs eth1Net
, you can learn some basic information about the eno16777736 NIC, as described below.
Ether: Represents the Physical address (MAC address) of the network interface, such as "00:0c:29:11:47:04". The physical address of the network interface is usually not changed and is the world's only hardware address determined by the NIC at production time.
Inet: Represents the IP address of the
expressed as such a tree. Some key parameters are also marked, which will be explained later.The following uses iptables to classify traffic, according to the destination IP, the corresponding traffic classification to 1:20 1:101 1:1023 class queue. Here are two points to note:1. There are many ways to classify traffic, such as tools such as Cgroup iptables TC f
1. Overview
As one of the five functions of network management, charge management can detect and control the cost and cost of network operation, record the usage of network resources, and after the cernet has determined the principle of paid use of network resources and share the international communication cost, the
be able to know that the hardware is idle in time, that is, after mark_bh, the system will wait for a while before sending. The sending efficiency is very low. The usage of 2 m lines is less than 10%. The kernel version is 2.0.35.
My final implementation is not to set tbusy to 1, so that the system always considers the hardware idle, but the report is not sent successfully. The system will always try again. In this way, the processing will run normally. However, the
network adapter is still a lot of commands, similar to Ifconfig/netstat (click to view the command) is a long time ago the command set, just because the habit of most people still useMany times the network card service restarts when many features do not take effect, this time need to uninstall/reinstall NIC driver moduleQuery NIC module Name:Ethtool-i eth0 #eth0为ifconfig命令查询出来的网卡名Unloading:Modprobe-r Pcnet
Bluetooth devices discussed above, irda-usb.c device drivers support USB IrDa FIR software dogs.
IrLAP is a link access protocol layer responsible for IrDa device discovery, retransmission, and traffic control. The IrLMP link management layer and Tiny transport protocol layer (TinyTP) reside on IrLAP. The IrCOMM and IrLAN layers are above them. IrCOMM (implemented in net/irda/ircomm/) provides serial simulation to enable applications running on seria
, which runs on all UNIX platforms, MacOS x, and Windows.CharacteristicsFrom the Ntopng website, we can see that they say it has many features. Some of them are listed here:
Sort network traffic by various protocols
Active hosts that display network traffic and IPV4/V6
Constant storage of the location
[O M engineer _ 06] uses sniffer to diagnose Linux network faults[O M engineer _ 05] System Security Inspection tool-nmapHttp://www.bkjia.com/ OS /201304/200744.htmlO M personnel, good or false, such as sniffer)Sniffer is a double-edged sword in the field of network security. It can be used as a network attack tool
Linux Network Bridge operations-Linux Enterprise Application-Linux server application information, the following is a detailed description.
I. Settings
1. Obtain ''bridge configuration''
Ftp://shadow.cabi.net/pub/Linux/BRCFG.tgz
2. Obtain and read ''multiple ethernet ''H
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.