Linux网络管理——网络测试命令1、pingping命令用于测试主机之间的网络连通性。执行ping命令将使用ICMP传输协议发送请求响应的消息。如果远程主机的网络功能没有问题,就会响应该消息,从而知道主机运行正常。1、语法ping[选项][域名或IP地址]2、常用选项-c<完成次数>:设置请求响应完成的次数;-i:指定发送和接收消息的时间间隔;-s:设置ICMP数据部分的大小;3.Apply[vagrant@10tmp]$ping-c3-i2-s100www.baidu.comPINGwww.baidu.com(61.135.169.121)100(128)字节数据.108字节来自61.135.169.121(61.135.169.121):icmp_seq=1ttl=56time=11.6ms.169.121(61.135.169.121):icmp_seq=3ttl=56time=6.47ms---www.baidu.comping统计---3包传输,3收到,0%丢包,时间4006msrttmin/avg/max/mdev=6.471/8.487/11.632/2.255ms\解释www.baidu.com(61.135.169.121)目标主机的主机名和IP地址100(128)bytesThesizeoftheICMPdatapartis100bytesplusthe8-byteICMPheaderICMPpacketsizeis108bytesplus20bytesofIPheaderIPpacketsizeis128bytes108bytesICMP数据包大小61.135.169.121目标主机的IP地址icmp_seqICMP数据包序列号ttl剩余生存时间,yes指数据包在被路由器丢弃前允许通过的网段数。TTL由发送主机设置,以防止数据包在IP互联网络上不断循环。路由器在转发IP数据包时需要将TTL至少减少1。time响应时间,时间越小,连接到这个地址越快3packetstransmitted发送的数据包数3接收到的数据包数0%packetloss数据包丢失率time4006ms整个总消耗processTimerttmin/avg/max/mdev最小响应时间/平均响应时间/最大响应时间/响应时间平均差2.telnetTelnet可以用来登录远程主机,管理远程主机。因为telnet使用明文传输消息,安全性不好。很多Linux服务器并没有开启telnet服务,而是改用更安全的ssh方式。这里主要介绍使用telnet检测远程端口是否打开。1、语法telnet[域名或IP地址][端口号]2、应用检测man.linuxde.net的80、22、11211端口是否开放[root@10vagrant]#telnetman.linuxde。净80尝试192.250。198.125...连接到man.linuxde.net。转义符是“^]”。连接被外部主机关闭。[root@10vagrant]#telnetman.linuxde.net22Trying192.250.198.125...连接到man。linuxde.net.Escapecharacteris'^]'.SSH-2.0-OpenSSH_5.3Protocolmismatch.Connectionclosedbyforeignhost.[root@10vagrant]#telnetman.linuxde.net11211Trying192.250.198.125...telnet:连接toaddress192.250.198.125:Connectionrefused可以看到man.linuxde.net已经开放了80和22端口,但是11211端口还没有开放。三、traceroute路由跟踪命令。它用于跟踪数据包在网络上传输时的整个路径。它发送的默认数据包大小为40字节。通过traceroute,我们可以知道信息从你的电脑经过什么路径到达互联网另一端的主机。当然,数据包每次从某个相同的起点(source)到某个相同的目的地(destination),所走的路径可能不同,但基本上大部分时间所走的路由是相同的。Traceroute与ping命令一样,使用ICMP协议。部分节点可能出现故障,此时***1。语法traceroute[选项][域名或IP]2.常用选项-n:直接使用IP地址代替主机名,速度更快3。Application[root@10vagrant]#traceroutewww.google.com到www.google.com(216.58.216.132)的跟踪路由,最多30跳,60字节数据包1ec2-50-112-0-6.us-west-2.compute.amazonaws.com(50.112.0.6)20.061毫秒ec2-50-112-0-26.us-west-2.compute.amazonaws.com(50.112.0.26)22.021毫秒ec2-50-112-0-16.us-west-2.Computeeamazonaws.com(50.112.0.16)13.175毫秒2100.66.8.224(100.66.8.224)16.202毫秒100.66.8.28(100.66.8.28)21.066.8.206(100.66.8.07)100.66.8.07)206)18.7.206)18.7.06.206)。.10.0(100.66.10.0)11.659ms100.66.10.76(100.66.10.76)19.651ms100.66.10.206(100.66.10.206)20.616ms4100.66.7.33(100.66.7.33)18.709ms100.66.6.35(100.66.6.35)14.456ms100.66.6.143(100.66.6.143)13.734ms5100.66.4.155(100.66.4.155)12.962ms100.66.4.101(100.66.4.101)16.822ms100.66.4.43(100.66.4.43)10.394ms6100.65.11.193(100.65.11.193)0.603毫秒100.65.8.193(100.65.8.193)0.315MS100.65.8.97(100.65.8.97)0.829MS752.93.240.26(52.93.240.26)0.605MS52.93.240.42(52.93.240.42ms52.93.12.134(52.93.12.134)25.651ms24.525ms952.93.12.125(52.93.12.125)0.670ms52.93.12.235(52.93.12.235)0.720ms52.93.12.161(52.93.12.161)0.620ms10100.91.25.194(100.91.25.194)9.060MS100.91.25.84(100.91.25.84)8.406MS100.91.25.214(100.91.25.214)8.496MS1154.239.45.126(54.239.45.126)54.239.42.220)7.394MS100.91.139.53(100.91.139.53)7.085MS100.91.139.51(100.91.139.51)7.078MS13MS1352.95.52.196(52.95.52.196)6.49.49.49.9.9.992MS100.9.9.9.9.99.19.19.19.99.19.19.99.99.99.19.99.99.99.999.9999999.in100.91.139.101)9.663MS1452.95.52.13(52.95.52.13)6.416MS52.95.52.232(52.95.52.232)7.480MS52.95.52.157(52.95.52.157))6.107ms52.95.52.47(52.95.52.47)8.358ms8.385ms16108.170.245.97(108.170.245.97)8.150ms8.163ms52.95.216.101(52.95.216.101)8.017ms17209.85.240.253(209.85.240.253)6.260ms6.228ms108.170.245.113(108.170.245.113)7.949ms18sea15s01-in-f132.1e100.net(216.58.216.132)6.928ms209.85.240.253(209.85.240.253)7.060mssea15s01-in-f4.1e100.net(216.58.216.132)6.910ms4.tcpdumptcpdump命令是一个嗅探器工具,可以打印出所有通过网络接口的数据包的包头信息,或者使用-w选项将数据包保存到文件中,以供以后分析一、语法tcpdump[options]二、常用选项-i<网络接口>:使用指定网段发送数据包-nn:将数据包中的域名和服务名转换成IP和端口号-X:使用十六进制和ASCII码显示数据包内容端口<端口号>:指定监听端口3.应用程序监听网卡eth1的11211端口传输的数据[root@10tmp]#tcpdump-ieth1-nnXport11211tcpdump:抑制详细输出,使用-v或-vv在eth1上进行完整协议解码侦听,链路类型EN10MB(以太网),捕获大小262144字节08:24:46.381529IP192.168.33.1.11623>192.168.33.88.11211],标志[P.SEQ823138355:823138356,ACK3518529694,Win2052,长度10x0000:450000292B1540064C10C0A82101E..)+.@。...L...!.!X-g+.1..3....0x0020:50180804be500000310000000000P....P..1.....08:24:46.381589IP192.168.33.88.11211>192.168.33.1.11623:标志[.],ack1,win229,长度00x0000:45000028d62940004006a0fcc0a82158E..(.)@.@.....!X0x0010:c0a821012bcb2d67d1b8809e31101834..!.+.-g..1..40x0020:501000e5c3c40000P.......08:24:47.021627IP192.168.33.1.11623>192.168.33.88.11211:Flags[P.],seq1:2,ack1,win2052,长度10x0000:450000292b16400040064c0fc0a82101E..)+.@.@.L...!.0x0010:c0a821582d672bcb31101834d1b8809e..!X-g+.1..4....0x0020:50180804bd4f0000320000000000P....O..2..08:24:47.021690IP192.168.33.88.11211>192.168.33.1.11623:Flags[.],ack2,win229,length00x0000:45000028d62a40004006a0fbc0a82158E.@.(...!X0x0010:c0a821012bcb2d67d1b8809e31101835..!.+.-g....1..50x0020:501000e5c3c40000P......08:24:48.420408IP192.168.33.1.11623>192.168.33.88.11211:Flags[P.],seq2:3,ack1,win2052,length10x0000:450000292b17400040064c0ec0a82101E..)+.@.@.L...!0x0010:c0a821582d672bcb31101835d1b8809e..!X-g+.1..5....0x0020:50180804bc4e0000330000000000P....N..3.....08:24:48.420468IP192.168.33.88.11211>192.168.33.1.11623:Flags[.],ack3,win229,长度00x0000:45000028d62b40004006a0fac0a82158E..(.+@.@.....!X0x0010:c0a821012bcb2d67d1b8809e31101836..!.+.-g....1..60x0020:501000e5c3c40000P.......08:24:50.196671IP192.168.33.1.11623>192.168.33.88.11211:Flags[P.],seq3:4,ack1,win2052,长度10x0000:450000292b18400040064c0dc0a82101E..)+.@.@.L...!.0x0010:c0a821582d672bcb31101836d1b8809e..!X-g+.1..6....0x0020:501808048e4d0000610000000000P....M..a.....08:24:50.196752IP192.168.33.88.11211>192.168.33.1.11623:Flags[.],ack4,win229,length00x0000:45000028d62c40004006a0f9c0a82158E..,@...!X0x0010:c0a821012bcb2d67d1b8809e31101837..!.+.-g..1..70x0020:501000e5c3c40000P.......08:24:52.212906IP192.168.33.1.11623>192.168.33.88.11211:Flags[P.],seq4:5,ack1,win2052,长度10x0000:450000292b19400040064c0cc0a82101E..)+.@.@.L...!.0x0010:c0a821582d672bcb31101837d1b8809e..!X-g+.1..7....0x0020:501808048d4c0000620000000000P....L..b.....08:24:52.212977IP192.168.33.88.11211>192.168.33.1.11623:Flags[.],ack5,win229,length00x0000:45000028d62d40004006a0f8c0a82158E..-@...!X0x0010:c0a821012bcb2d67d1b8809e31101838..!.+.-g....1..80x0020:501000e5c3c40000P......08:24:52.356770IP192.168.33.1.11623>192.168.33.88.11211:Flags[P.],seq5:6,ack1,win2052,length10x0000:450000292b1a400040064c0bc0a82101E..)+.@.@.L...!0x0010:c0a821582d672bcb31101838d1b8809e..!X-g+.1。.8....0x0020:501808048c4b0000630000000000P....K..c.....08:24:52.356827IP192.168.33.88.11211>192.168.33.1.11623:标志[.],ack6,win229,长度00x0000:45000028d62e40004006a0f7c0a82158E..(..@.@.....!X0x0010:c0a821012bcb2d67d1b8809e31101839..!.+.-g....1..90x0020:501000e5c3c40000P......