📄 itrafmon.html
字号:
><DD><P> The connection is done sending data in this direction, and has sent a FIN (finished) packet, but has not yet been acknowledged by the other host.</P></DD><DT><TTCLASS="COMPUTEROUTPUT">CLOSED</TT></DT><DD><P> The FIN has been acknowledged by the other host. When both directions of a connection are marked CLOSED, the entries they occupy become available for new connection entries.</P></DD><DT><TTCLASS="COMPUTEROUTPUT">-</TT></DT><DD><P> The flag is not set</P></DD></DL></DIV></P></DD></DL></DIV><P> Some other pieces of information can be viewed as well. The M key displays more TCP information. Pressing M once displays the MAC addresses of the LAN hosts that delivered the packets (if the <ICLASS="EMPHASIS">Source MAC addrs in trafficmonitor</I> option is enabled in the <ICLASS="EMPHASIS"><AHREF="config.html">Configure...</A></I>menu). <TTCLASS="COMPUTEROUTPUT">N/A</TT> is displayed if no packets have been received from the source yet, or if the interface doesn't support MAC addresses (such as PPP interfaces).</P><P> If the <ICLASS="EMPHASIS">Source MAC addrs in traffic monitor</I> option is not enabled, pressing M simply toggles between the counts and the packet and window sizes.</P><P> By default, only IP addresses are displayed, but if you have access to a name server or host table, you may enable reverse lookup for the IP addresses. Just enable reverse lookupin the <ICLASS="EMPHASIS"><AHREF="config.html">Configure...</A></I> menu.</P><TABLECLASS="SIDEBAR"BORDER="1"CELLPADDING="5"><TR><TD><DIVCLASS="SIDEBAR"><ANAME="AEN679"></A><P><B>The rvnamed Process</B></P><P> The IP traffic monitor starts a daemon called <BCLASS="COMMAND">rvnamed</B> to help speed up reverse lookups without sacrificing too much keyboard control and accuracy of the counts. While reverse lookup is being conducted in the background, IP addresses will be used until the resolution is complete.</P><P> If for some reason <BCLASS="COMMAND">rvnamed</B> cannot start (probably due to improper installation or lack of memory), and you are on the Internet, and you enable reverse lookup, your keyboard control can become very slow. This is because the standard lookup functions do not return until they have completed their tasks, and it can take several seconds for a name resolution in the foreground to complete.</P><P> <BCLASS="COMMAND">rvnamed</B> will spawn up to 200 children to process reverse DNS queries.</P></DIV></TD></TR></TABLE><DIVCLASS="TIP"><P></P><TABLECLASS="TIP"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="./stylesheet-images/tip.gif"HSPACE="5"ALT="Tip"></TD><THALIGN="LEFT"VALIGN="CENTER"><B>Tip</B></TH></TR><TR><TD> </TD><TDALIGN="LEFT"VALIGN="TOP"><P>If you notice unusual SYN activity (too manyinitial (<TTCLASS="COMPUTEROUTPUT">S---</TT>) but frozen SYN entries, or rapidlyincreasing initial SYN packets for a single connection), you maybe under a SYN flooding attack or TCP port scan. Apply appropriate measures, or thetargeted machines may begin denying network services.</P></TD></TR></TABLE></DIV><P> Entries not updated within a user-configurable amount of time may get replaced with new connections. The default time is 15 minutes. This is regardless of whether the connection is closed or not. (Some unclosed connections may be due to extremely slow links or crashes at either end of the connection.) This figure can be changed at the <ICLASS="EMPHASIS"><AHREF="config.html">Configure...</A></I> menu.</P><P> Some early entries may have a > symbol in front of its packet count. This means the connection was already established when the monitor started. In other words, the figures indicated do not reflect the counts since the start of the TCP connection, but rather, since the start of the traffic monitor. Eventually, these > entries will close (or time out) and disappear. TCP entries without the > were initiated after the traffic monitor started, and the counts indicate the totals of the connection itself. Just consider entries with > partial.</P><P> Some > entries may go idle if the traffic monitor was started when these connections were already half-closed (FIN sent by one host, but data still being sent by the other). This is because the traffic monitor cannot determine if a connection was already half-closed when it started. These entries will eventually time out. (To minimize these entries, an entry is not added by the monitor until a packet with data or a SYN packet is received.)</P><P> Direction entries also become available for reuse if an ICMP Destination Unreachable message is received for the connection.</P><P> The lower part of the screen contains a summary line showing the IP, TCP, UDP, ICMP, and non-IP byte counts since the start of the monitor. The IP, TCP, UDP, and ICMP counts include only the IP datagram header and data, not the data-link headers. The non-IP count includes the data-link headers.</P><DIVCLASS="NOTE"><P></P><TABLECLASS="NOTE"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="./stylesheet-images/note.gif"HSPACE="5"ALT="Note"></TD><THALIGN="LEFT"VALIGN="CENTER"><B>Technical note: IP Forwarding and Masquerading</B></TH></TR><TR><TD> </TD><TDALIGN="LEFT"VALIGN="TOP"><P> Previous versions of IPTraf issued a warning if the kernel had IP masquerading enabled due to the way the kernel masqueraded and translated the IP addresses. The new kernels no longer do it as before and IPTraf now gives output properly on masquerading machines. The <TTCLASS="COMPUTEROUTPUT">-q</TT> parameter is no longer required to suppress the warning screen.</P><P> On forwarding (non-masquerading) machines packets and TCP connections simply appear twice, one each for the incoming and outgoing interfaces if all interafaces are being monitored.</P><P> On masquerading machines, packets and connections from the internal network to the external network also appear twice, one for the internal and external interface. Packets coming from the internal network will be indicated as coming from the internal IP address that sourced them, and also as coming from the IP address of the external interface on your masquerading machine. In much the same way, packets coming in from the external network will look like they're destined for the external interface's IP address, and again as destined for the final host on the internal network.</P></TD></TR></TABLE></DIV><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="AEN704">Closed/Idle/Timed Out Connections</A></H2><P> A TCP connection entry that closes, gets reset, or stays idle too long normally get replaced with new connections. However, if these get too many, active connections may become interspersed among closed, reset, or idle entries.</P><P> IPTraf can be set to automatically remove all closed, reset, and idle entries with the <ICLASS="EMPHASIS">TCP closed/idle persistence...</I> configuration option. You can also press the F key to immediately clear them at any time.</P><DIVCLASS="NOTE"><P></P><TABLECLASS="NOTE"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="./stylesheet-images/note.gif"HSPACE="5"ALT="Note"></TD><THALIGN="LEFT"VALIGN="CENTER"><B>Note</B></TH></TR><TR><TD> </TD><TDALIGN="LEFT"VALIGN="TOP"><P>The TCP timeout... option only tellsIPTraf how long it should take before a connection should be consideredidle and open to replacement by new connections. Thisdoes not determine how long it remains on-screen. The <ICLASS="EMPHASIS">TCP closed/idlepersistence...</I> parameter flushes entries that have been idle for thenumber of minutes defined by the <ICLASS="EMPHASIS">TCP timeout...</I> option.</P></TD></TR></TABLE></DIV></DIV><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="AEN714">Sorting TCP Entries</A></H2><P> The TCP connection entries can be sorted by pressing the S key, then by selecting a sort criterion. Pressing S will display a box showing the available sort criteria. Press P to sort by packet count, B to sort by byte count. Pressing any other key will cancel the sort.</P><P> The sort operation compares the larger values in each connection entry pair and sorts the counts in descending order.</P><P> Over time, the entries will go out of order as counts proceed at varying rates. Sorting is not done automatically so as not to degrade performance.</P><DIVCLASS="FIGURE"><ANAME="AEN719"></A><P><IMGSRC="iptraf-iptmsort.png"></P><P><B>Figure 2. The IP traffic monitor sort criteria</B></P></DIV></DIV></DIV></DIV><DIVCLASS="NAVFOOTER"><HRALIGN="LEFT"WIDTH="100%"><TABLEWIDTH="100%"BORDER="0"CELLPADDING="0"CELLSPACING="0"><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top"><AHREF="ifaces.html"><<< Previous</A></TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"><AHREF="manual.html">Home</A></TD><TDWIDTH="33%"ALIGN="right"VALIGN="top"><AHREF="lowerwin.html">Next >>></A></TD></TR><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top">Supported Network Interfaces</TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"> </TD><TDWIDTH="33%"ALIGN="right"VALIGN="top">Lower Window</TD></TR></TABLE></DIV></BODY></HTML>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -