⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 itrafmon.html

📁 一个网络流量分析的完整的程序
💻 HTML
📖 第 1 页 / 共 2 页
字号:
><DD><P>     The connection is done sending data in this direction, and has sent a FIN (finished) packet, but has not yet been acknowledged by the other host.</P></DD><DT><TTCLASS="COMPUTEROUTPUT">CLOSED</TT></DT><DD><P>     The FIN has been acknowledged by the other host. When both directions of a connection are marked CLOSED, the entries they occupy become available for new connection entries.</P></DD><DT><TTCLASS="COMPUTEROUTPUT">-</TT></DT><DD><P>     The flag is not set</P></DD></DL></DIV></P></DD></DL></DIV><P>  Some other pieces of information can be viewed as well. The M key  displays more TCP information. Pressing M once  displays the MAC addresses of the LAN hosts  that delivered the packets (if the <ICLASS="EMPHASIS">Source MAC addrs in trafficmonitor</I>  option is enabled in the <ICLASS="EMPHASIS"><AHREF="config.html">Configure...</A></I>menu). <TTCLASS="COMPUTEROUTPUT">N/A</TT> is displayed if  no packets have been received from the source yet, or if the interface  doesn't support MAC addresses (such as PPP interfaces).</P><P>  If the <ICLASS="EMPHASIS">Source MAC addrs in traffic monitor</I> option is not enabled,  pressing M simply toggles between the counts and the packet and window  sizes.</P><P>  By default, only IP addresses are displayed, but if you have access to a  name server or host table, you may enable reverse lookup for the  IP addresses. Just enable reverse lookupin the <ICLASS="EMPHASIS"><AHREF="config.html">Configure...</A></I> menu.</P><TABLECLASS="SIDEBAR"BORDER="1"CELLPADDING="5"><TR><TD><DIVCLASS="SIDEBAR"><ANAME="AEN679"></A><P><B>The rvnamed Process</B></P><P>  The IP traffic monitor starts a daemon called  <BCLASS="COMMAND">rvnamed</B> to help speed  up reverse lookups without sacrificing too much keyboard control and  accuracy of the counts. While reverse lookup is being conducted in the  background, IP addresses will be used until the resolution is complete.</P><P>  If for some reason <BCLASS="COMMAND">rvnamed</B> cannot start (probably due to  improper installation or lack of memory), and you are  on the Internet, and you enable reverse lookup, your  keyboard control can become very slow. This is because the standard  lookup functions do not return until they have completed their  tasks, and it can take several seconds for a name resolution  in the foreground to complete.</P><P>  <BCLASS="COMMAND">rvnamed</B> will spawn up to 200 children to process reverse DNS queries.</P></DIV></TD></TR></TABLE><DIVCLASS="TIP"><P></P><TABLECLASS="TIP"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="./stylesheet-images/tip.gif"HSPACE="5"ALT="Tip"></TD><THALIGN="LEFT"VALIGN="CENTER"><B>Tip</B></TH></TR><TR><TD>&nbsp;</TD><TDALIGN="LEFT"VALIGN="TOP"><P>If you notice unusual SYN activity (too manyinitial (<TTCLASS="COMPUTEROUTPUT">S---</TT>) but frozen SYN entries, or rapidlyincreasing initial SYN packets for a single connection), you maybe under a SYN flooding attack or TCP port scan. Apply appropriate measures, or thetargeted machines may begin denying network services.</P></TD></TR></TABLE></DIV><P>  Entries not updated within a user-configurable amount of  time may get replaced with new connections. The default time is 15  minutes. This is regardless of whether the connection is closed or  not. (Some unclosed connections may be due to extremely slow links  or crashes at either end of the connection.) This figure can be changed  at the <ICLASS="EMPHASIS"><AHREF="config.html">Configure...</A></I> menu.</P><P>  Some early entries may have a &#62; symbol in front of its packet  count. This means the connection was already established  when the monitor started. In other words, the figures indicated do not  reflect the counts since the start  of the TCP connection, but rather, since the start of the traffic  monitor. Eventually, these &#62; entries will close (or time out) and  disappear. TCP entries without the &#62;  were initiated after the traffic monitor started, and the counts  indicate the totals of the connection itself.  Just consider entries  with &#62; partial.</P><P>  Some &#62; entries may go idle if the traffic monitor was started  when these connections were already half-closed (FIN sent  by one host, but data still being sent by the other). This  is because the traffic monitor cannot determine if a  connection was already half-closed when it started. These entries will  eventually time out. (To minimize these entries, an entry is not added  by the monitor until a packet with data or a SYN packet is received.)</P><P>  Direction entries also become available for reuse if an ICMP Destination  Unreachable message is received for the connection.</P><P>  The lower part of the screen contains a summary line showing the IP,  TCP, UDP, ICMP, and non-IP byte counts since the start of the  monitor. The IP, TCP, UDP, and ICMP counts include only the IP  datagram header and data, not the data-link headers. The  non-IP count includes the data-link headers.</P><DIVCLASS="NOTE"><P></P><TABLECLASS="NOTE"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="./stylesheet-images/note.gif"HSPACE="5"ALT="Note"></TD><THALIGN="LEFT"VALIGN="CENTER"><B>Technical note: IP Forwarding and Masquerading</B></TH></TR><TR><TD>&nbsp;</TD><TDALIGN="LEFT"VALIGN="TOP"><P>  Previous versions of IPTraf issued a warning if the kernel had  IP masquerading enabled due to the way the  kernel masqueraded and translated the IP addresses. The new kernels no  longer do it as before and IPTraf now gives output properly on  masquerading machines. The <TTCLASS="COMPUTEROUTPUT">-q</TT> parameter is no  longer required to suppress the warning screen.</P><P>  On forwarding (non-masquerading)  machines packets and TCP connections simply appear twice, one  each for the incoming and outgoing interfaces if all interafaces  are being monitored.</P><P>  On masquerading machines, packets and connections from the  internal network to the external network also appear  twice, one for the internal and external interface. Packets coming  from the internal network will be indicated as coming from the internal  IP address that sourced them, and also as coming from the IP address  of the external interface on your masquerading machine. In much the same  way, packets coming in from the external network will look  like they're destined for the external interface's IP address, and again  as destined for the final host on the internal network.</P></TD></TR></TABLE></DIV><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="AEN704">Closed/Idle/Timed Out Connections</A></H2><P>  A TCP connection entry that closes, gets reset, or stays idle too long  normally get replaced with new connections. However,  if these get too many, active connections may become  interspersed among closed, reset, or idle entries.</P><P>  IPTraf can be set to automatically remove all closed, reset, and  idle entries with the <ICLASS="EMPHASIS">TCP closed/idle  persistence...</I> configuration option. You can also press the F key to  immediately clear them at any time.</P><DIVCLASS="NOTE"><P></P><TABLECLASS="NOTE"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="./stylesheet-images/note.gif"HSPACE="5"ALT="Note"></TD><THALIGN="LEFT"VALIGN="CENTER"><B>Note</B></TH></TR><TR><TD>&nbsp;</TD><TDALIGN="LEFT"VALIGN="TOP"><P>The TCP timeout... option only tellsIPTraf how long it should take before a connection should be consideredidle and open to replacement by new connections. Thisdoes not determine how long it remains on-screen. The <ICLASS="EMPHASIS">TCP closed/idlepersistence...</I> parameter flushes entries that have been idle for thenumber of minutes defined by the <ICLASS="EMPHASIS">TCP timeout...</I> option.</P></TD></TR></TABLE></DIV></DIV><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="AEN714">Sorting TCP Entries</A></H2><P>  The TCP connection entries can be sorted by pressing the S key, then  by selecting a sort criterion. Pressing S will display a box showing the  available sort criteria. Press P to sort by packet count, B to sort by  byte count. Pressing any other key will cancel the sort.</P><P>  The sort operation compares the larger values in each connection entry  pair and sorts the counts in descending order.</P><P>  Over time, the entries will go out of order as counts proceed at varying  rates. Sorting is not done automatically so as not to degrade performance.</P><DIVCLASS="FIGURE"><ANAME="AEN719"></A><P><IMGSRC="iptraf-iptmsort.png"></P><P><B>Figure 2. The IP traffic monitor sort criteria</B></P></DIV></DIV></DIV></DIV><DIVCLASS="NAVFOOTER"><HRALIGN="LEFT"WIDTH="100%"><TABLEWIDTH="100%"BORDER="0"CELLPADDING="0"CELLSPACING="0"><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top"><AHREF="ifaces.html">&#60;&#60;&#60; Previous</A></TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"><AHREF="manual.html">Home</A></TD><TDWIDTH="33%"ALIGN="right"VALIGN="top"><AHREF="lowerwin.html">Next &#62;&#62;&#62;</A></TD></TR><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top">Supported Network Interfaces</TD><TDWIDTH="34%"ALIGN="center"VALIGN="top">&nbsp;</TD><TDWIDTH="33%"ALIGN="right"VALIGN="top">Lower Window</TD></TR></TABLE></DIV></BODY></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -