curl申请接口
curl -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{"CI_NO":"PWIN2008026"}' 'https://soatest.tp-link.com.cn:7077/TP3CWTEST/GET_TOTAL_TGW_BY_CI_NO'
ping
ping [IP/Host] -- 测试主机连通性测试链路最大MTU值: ping -l 1472 -f -n 1 [IP/Host], 其中,-l : 报文字节数,也即MSS(最大报文长度) , MTU(最大传输单元,通常为1500 byte) = MSS + TCP首部(根本大小为20byte) + IP首部(根本大小为20byte) = 1460-f: 标识IP层不分片(即IP协定中DF标记地位1),若以后通过节点MTU值大于ICMP探测报文大小(ping实质为ICMP探测报文),并且DF标记位为1,则以后节点会间接抛弃该报文,且回答源主机ICMP TYPE 3 CODE 4报文(Fragmentation needs and DF set);但如果DF标记位为0,标识可进行IP层分片,则报文可根据以后节点MTU值进行分片,顺利通过。TCP建设连贯前两次握手时会进行MSS大小商量,以确定后续数据传输时传输层应用的报文最大大小,通常应不大于MSS值且IP层DF标识地位1,应由TCP来保障应用层数据传输数据的分组与重组
traceroute
telnet
netstat
列出连贯信息
-a: 列出以后所有连贯( tcp, udp 和 unix 协定下所有套接字的所有连贯)-at: 列出 TCP 协定的连贯-au: 列出 UDP 协定的连贯-tnl: 只列出监听中的TCP连贯-ant: 默认状况下 netstat 会通过反向域名解析技术查找每个 IP 地址对应的主机名,这会升高查找速度,能够应用 -n 选项禁用域名解析性能
显示过程信息
sudo netstat -nltp应用 -p 选项时,netstat 必须运行在 root 权限之下,不然它就不能失去运行在 root 权限下的过程名,而很多服务包含 http 和 ftp 都运行在 root 权限之下sudo netstat -nltep-ep 选项能够同时查看过程名和用户名
统计网络包收发状况
$ netstat -sIp: 337338596 total packets received 0 forwarded 0 incoming packets discarded 337338562 incoming packets delivered 329444117 requests sent out 36 reassemblies required 17 packets reassembled ok 15 fragments received ok 31 fragments createdIcmp: 37331 ICMP messages received 309 input ICMP message failed. ICMP input histogram: destination unreachable: 5266 timeout in transit: 30 echo requests: 31910 echo replies: 125 116861 ICMP messages sent 0 ICMP messages failed ICMP output histogram: destination unreachable: 82161 echo request: 2790 echo replies: 31910...
显示内核路由信息(与route命令一样)
$ netstat -rnKernel IP routing tableDestination Gateway Genmask Flags MSS Window irtt Iface172.29.41.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0172.17.0.0 0.0.0.0 255.255.0.0 U 0 0 0 docker00.0.0.0 172.29.41.1 0.0.0.0 UG 0 0 0 eth0
打印网络接口信息(ifconfig相似)
$ netstat -ei Kernel Interface tableeth0 Link encap:Ethernet HWaddr 00:50:56:90:B5:20 inet addr:172.29.41.175 Bcast:172.29.41.255 Mask:255.255.255.0 inet6 addr: fe80::250:56ff:fe90:b520/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:107843877 errors:0 dropped:0 overruns:0 frame:0 TX packets:60002144 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:24099140098 (22.4 GiB) TX bytes:117088850527 (109.0 GiB)lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:269720272 errors:0 dropped:0 overruns:0 frame:0 TX packets:269720272 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:39429889451 (36.7 GiB) TX bytes:39429889451 (36.7 GiB)
显示多播组信息
netstat -gIPv6/IPv4 Group MembershipsInterface RefCnt Group--------------- ------ ---------------------lo 1 all-systems.mcast.neteth0 1 224.0.0.251eth0 1 239.77.124.213eth0 1 all-systems.mcast.netdocker0 1 all-systems.mcast.netlo 1 ff02::1eth0 1 ff02::202eth0 1 ff02::1:ff90:b520eth0 1 ff02::1docker0 1 ff02::1:ff08:b3fddocker0 1 ff02::1
搭配grep 打印active状态的连贯netstat -atnp | grep ESTA
查看http,smtp 或 ntp 服务是否在运行sudo netstat -aple | grep ntp
搭配watch 命令监督 active 状态的连贯
watch -d -n0 "netstat -atnp | grep ESTA"
搭配awk查看TCP连贯状态
netstat -n | awk '/^tcp/ {++state[$NF]} END {for (key in state) print key, "\t", state[key]}'