0% found this document useful (0 votes)
71 views32 pages

Linux Networking Commands

Uploaded by

louis.rusu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views32 pages

Linux Networking Commands

Uploaded by

louis.rusu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

22 Linux Networking Commands for

Sysadmin
Aaron KiliLast Updated: July 13, 2023 Read Time: 17 minsCategoriesLinux Commands, Networking Commands 10
Comments

885.9K

Apple patent for folding iPhone


A system administrator’s routine tasks include configuring, maintaining,
troubleshooting, and managing servers and networks within data centers. There
are numerous tools and utilities in Linux designed for administrative purposes.

In this article, we will review some of the most used command-line tools and
utilities for network management in Linux, under different categories. We will
explain some common usage examples, which will make network management
much easier in Linux.

On this page
• ifconfig Command
• ip Command
• ifup Command
• ethtool Command
• ping Command
• traceroute Command
• mtr Command
• route Command
• nmcli Command
• netstat Command
• ss Command
• nc Command
• nmap Command
• host Command
• dig Command
• nslookup Command
• tcpdump Command
• Wireshark Utility
• bmon Tool
• iptables Firewall
• firewalld
• UFW Firewall
This list is equally useful to full-time Linux network engineers.

Network Configuration, Troubleshooting, and Debugging


Tools

1. ifconfig Command

ifconfig is a command-line interface tool for network interface configuration and is


also used to initialize interfaces at system boot time. Once a server is up and
running, it can be used to assign an IP Address to an interface and enable or
disable the interface on demand.

It is also used to view the IP Address, Hardware / MAC address, as well as MTU
(Maximum Transmission Unit) size of the currently active interfaces. ifconfig is
thus useful for debugging or performing system tuning.

Here is an example to display the status of all active network interfaces.

$ ifconfig

enp1s0 Link encap:Ethernet HWaddr [Link]

inet addr:[Link] Bcast:[Link] Mask:[Link]

inet6 addr: fe80::8f0c:7825:8057:5eec/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1


RX packets:169854 errors:0 dropped:0 overruns:0 frame:0

TX packets:125995 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:174146270 (174.1 MB) TX bytes:21062129 (21.0 MB)

lo Link encap:Local Loopback

inet addr:[Link] Mask:[Link]

inet6 addr: ::1/128 Scope:Host

UP LOOPBACK RUNNING MTU:65536 Metric:1

RX packets:15793 errors:0 dropped:0 overruns:0 frame:0

TX packets:15793 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1

RX bytes:2898946 (2.8 MB) TX bytes:2898946 (2.8 MB)

To list all interfaces which are currently available, whether up or down, use the -
a flag.

$ ifconfig -a

To assign an IP address to an interface, use the following command.

$ sudo ifconfig eth0 [Link] netmask [Link]


To activate a network interface, type.

$ sudo ifconfig up eth0

To deactivate or shut down a network interface, type.

$ sudo ifconfig down eth0

Note: Although ifconfig is a great tool, it is now obsolete (deprecated), its


replacement is the ip command which is explained below.

2. IP Command

ip command is another useful command-line utility for displaying and


manipulating routing, network devices, interfaces. It is a replacement
for ifconfig and many other networking commands. (Read our article “What’s
Difference Between ifconfig and ip Command” to learn more about it.)

The following command will show the IP address and other information about a
network interface.

$ ip addr show

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group


default qlen 1

link/loopback [Link] brd [Link]

inet [Link]/8 scope host lo

valid_lft forever preferred_lft forever


inet6 ::1/128 scope host

valid_lft forever preferred_lft forever

2: enp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state


UP group default qlen 1000

link/ether [Link] brd [Link]

inet [Link]/24 brd [Link] scope global dynamic enp1s0

valid_lft 5772sec preferred_lft 5772sec

inet6 fe80::8f0c:7825:8057:5eec/64 scope link

valid_lft forever preferred_lft forever

3: wlp2s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default
qlen 1000

link/ether [Link] brd [Link]

...

To temporarily assign IP Address to a specific network interface (eth0), type.

$ sudo ip addr add [Link] dev eth0

To remove an assigned IP address from a network interface (eth0), type.

$ sudo ip addr del [Link]/24 dev eth0

To show the current neighbor table in the kernel, type.

$ ip neigh
[Link] dev enp1s0 lladdr [Link] REACHABLE

3. ifup, ifdown, and ifquery command

ifup command actives a network interface, making it available to transfer and


receive data.

$ sudo ifup eth0

ifdown command disables a network interface, keeping it in a state where it


cannot transfer or receive data.

$ sudo ifdown eth0

ifquery command used to parse the network interface configuration, enabling you
to receive answers to query about how it is currently configured.

$ sudo ifquery eth0

4. Ethtool Command

ethtool is a command-line utility for querying and modifying network interface


controller parameters and device drivers. The example below shows the usage
of ethtool and a command to view the parameters for the network interface.

$ sudo ethtool enp0s3

Settings for enp0s3:


Supported ports: [ TP ]

Supported link modes: 10baseT/Half 10baseT/Full

100baseT/Half 100baseT/Full

1000baseT/Full

Supported pause frame use: No

Supports auto-negotiation: Yes

Advertised link modes: 10baseT/Half 10baseT/Full

100baseT/Half 100baseT/Full

1000baseT/Full

Advertised pause frame use: No

Advertised auto-negotiation: Yes

Speed: 1000Mb/s

Duplex: Full

Port: Twisted Pair

PHYAD: 0

Transceiver: internal

Auto-negotiation: on

MDI-X: off (auto)

Supports Wake-on: umbg


Wake-on: d

Current message level: 0x00000007 (7)

drv probe link

Link detected: yes

5. Ping Command

ping (Packet INternet Groper) is a utility normally used for testing connectivity
between two systems on a network (Local Area Network (LAN) or Wide Area
Network (WAN)). It uses ICMP (Internet Control Message Protocol) to
communicate to nodes on a network.

To test connectivity to another node, simply provide its IP or hostname, for


example.

$ ping [Link]

PING [Link] ([Link]) 56(84) bytes of data.

64 bytes from [Link]: icmp_seq=1 ttl=64 time=0.191 ms

64 bytes from [Link]: icmp_seq=2 ttl=64 time=0.156 ms

64 bytes from [Link]: icmp_seq=3 ttl=64 time=0.179 ms

64 bytes from [Link]: icmp_seq=4 ttl=64 time=0.182 ms

64 bytes from [Link]: icmp_seq=5 ttl=64 time=0.207 ms

64 bytes from [Link]: icmp_seq=6 ttl=64 time=0.157 ms

^C
--- [Link] ping statistics ---

6 packets transmitted, 6 received, 0% packet loss, time 5099ms

rtt min/avg/max/mdev = 0.156/0.178/0.207/0.023 ms

You can also tell ping to exit after a specified number


of ECHO_REQUEST packets, using the -c flag as shown.

$ ping -c 4 [Link]

PING [Link] ([Link]) 56(84) bytes of data.

64 bytes from [Link]: icmp_seq=1 ttl=64 time=1.09 ms

64 bytes from [Link]: icmp_seq=2 ttl=64 time=0.157 ms

64 bytes from [Link]: icmp_seq=3 ttl=64 time=0.163 ms

64 bytes from [Link]: icmp_seq=4 ttl=64 time=0.190 ms

--- [Link] ping statistics ---

4 packets transmitted, 4 received, 0% packet loss, time 3029ms

rtt min/avg/max/mdev = 0.157/0.402/1.098/0.402 ms

6. Traceroute Command

Traceroute is a command-line utility for tracing the full path from your local
system to another network system. It prints a number of hops (router IPs) in that
path you travel to reach the end server. It is an easy-to-use network
troubleshooting utility after the ping command.

In this example, we are tracing the route packets take from the local system to
one of Google’s servers with IP address [Link].

$ traceroute [Link]

traceroute to [Link] ([Link]), 30 hops max, 60 byte packets

1 gateway ([Link]) 0.487 ms 0.277 ms 0.269 ms

2 [Link] ([Link]) 1.846 ms 1.631 ms 1.553 ms

3 * * *

4 [Link] ([Link]) 3.762 ms 3.683 ms 3.577 ms

5 [Link] ([Link]) 4.666 ms [Link]


([Link]) 4.869 ms [Link] ([Link]) 4.245 ms

6 [Link] ([Link]) 72.443 ms [Link] ([Link])


62.738 ms [Link] ([Link]) 65.809 ms

7 [Link] ([Link]) 128.726 ms 127.506 ms [Link]


([Link]) 127.330 ms

8 [Link] ([Link]) 127.219 ms [Link]


([Link]) 212.544 ms [Link] ([Link]) 127.249 ms

9 [Link] ([Link]) 236.906 ms [Link] ([Link])


254.810 ms 254.735 ms

10 [Link] ([Link]) 252.002 ms [Link]


([Link]) 251.975 ms [Link] ([Link]) 236.343 ms

11 [Link] ([Link]) 251.452 ms [Link] ([Link])


279.650 ms 277.492 ms
12 [Link] ([Link]) 274.521 ms 274.450 ms [Link]
([Link]) 270.558 ms

13 [Link] ([Link]) 269.147 ms [Link] ([Link])


347.046 ms [Link] ([Link]) 285.265 ms

14 [Link] ([Link]) 344.852 ms [Link]


([Link]) 343.786 ms [Link] ([Link]) 345.273 ms

15 [Link] ([Link]) 345.054 ms 345.342 ms [Link]


([Link]) 343.706 ms

16 [Link] ([Link]) 345.610 ms [Link]


([Link]) 344.726 ms [Link] ([Link]) 345.536 ms

17 [Link] ([Link]) 345.382 ms 345.031 ms


344.884 ms

7. MTR Network Diagnostic Tool

MTR is a modern command-line network diagnostic tool that combines the


functionality of ping and traceroute into a single diagnostic tool. Its output is
updated in real-time, by default until you exit the program by pressing q .

The easiest way of running mtr is to provide it a hostname or IP address as an


argument, as follows.

$ mtr [Link]

OR

$ mtr [Link]

Sample Output

[Link] ([Link]) Thu Jul 12 [Link]


2018
First TTL: 1

Host Loss% Snt Last


Avg Best Wrst StDev

1. [Link] 0.0% 41 0.5


0.6 0.4 1.7 0.2

2. [Link] 0.0% 40 1.9


1.5 0.8 7.3 1.0

3. [Link] 23.1% 40 1.9


2.7 1.7 10.5 1.6

4. [Link] 0.0% 40 89.1


5.2 2.2 89.1 13.7

5. [Link] 0.0% 40 3.0


4.1 2.4 52.4 7.8

6. [Link] 0.0% 40 2.9


5.3 2.5 94.1 14.4

7. [Link] 0.0% 40 2.6


6.7 2.3 79.7 16.

You can limit the number of pings to a specific value and exit mtr after those
pings, using the -c flag as shown.

$ mtr -c 4 [Link]

8. Route Command

The route is a command-line utility for displaying or manipulating the IP routing


table of a Linux system. It is mainly used to configure static routes to specific
hosts or networks via an interface.
You can view the Kernel IP routing table by typing.

$ route

Destination Gateway Genmask Flags Metric Ref Use Iface

default gateway [Link] UG 100 0 0


enp0s3

[Link] [Link] [Link] U 100 0 0


enp0s3

[Link] [Link] [Link] U 0 0 0


virbr0

There are numerous commands you can use to configure routing. Here are some
useful ones:

Add a default gateway to the routing table.

$ sudo route add default gw <gateway-ip>

Add a network route to the routing table.

$ sudo route add -net <network ip/cidr> gw <gateway ip> <interface>

Delete a specific route entry from the routing table.

$ sudo route del -net <network ip/cidr>


9. Nmcli Command

Nmcli is an easy-to-use, scriptable command-line tool to report network status,


manage network connections, and control the NetworkManager.

To view all your network devices, type.

$ nmcli dev status

DEVICE TYPE STATE CONNECTION

virbr0 bridge connected virbr0

enp0s3 ethernet connected Wired connection 1

To check network connections on your system, type.

$ nmcli con show

Wired connection 1 bc3638ff-205a-3bbb-8845-5a4b0f7eef91 802-3-ethernet


enp0s3

virbr0 00f5d53e-fd51-41d3-b069-bdfd2dde062b bridge


virbr0

To see only the active connections, add the -a flag.

$ nmcli con show -a

Network Scanning and Performance Analysis Tools


10. Netstat Command

netstat is a command-line tool that displays useful information such as network


connections, routing tables, interface statistics, and much more, concerning the
Linux networking subsystem. It is useful for network troubleshooting and
performance analysis.

Additionally, it is also a fundamental network service debugging tool used to


check which programs are listening on what ports. For instance, the following
command will show all TCP ports in listening mode and what programs are
listening on them.

$ sudo netstat -tnlp

Active Internet connections (only servers)

Proto Recv-Q Send-Q Local Address Foreign Address State


PID/Program name

tcp 0 0 [Link]:587 [Link]:* LISTEN


1257/master

tcp 0 0 [Link]:5003 [Link]:* LISTEN


1/systemd

tcp 0 0 [Link]:110 [Link]:* LISTEN


1015/dovecot

tcp 0 0 [Link]:143 [Link]:* LISTEN


1015/dovecot

tcp 0 0 [Link]:111 [Link]:* LISTEN


1/systemd

tcp 0 0 [Link]:465 [Link]:* LISTEN


1257/master

tcp 0 0 [Link]:53 [Link]:* LISTEN


1404/pdns_server
tcp 0 0 [Link]:21 [Link]:* LISTEN
1064/pure-ftpd (SER

tcp 0 0 [Link]:22 [Link]:* LISTEN


972/sshd

tcp 0 0 [Link]:631 [Link]:* LISTEN


975/cupsd

tcp 0 0 [Link]:25 [Link]:* LISTEN


1257/master

tcp 0 0 [Link]:8090 [Link]:* LISTEN


636/lscpd (lscpd -

tcp 0 0 [Link]:993 [Link]:* LISTEN


1015/dovecot

tcp 0 0 [Link]:995 [Link]:* LISTEN


1015/dovecot

tcp6 0 0 :::3306 :::* LISTEN


1053/mysqld

tcp6 0 0 :::3307 :::* LISTEN


1211/mysqld

tcp6 0 0 :::587 :::* LISTEN


1257/master

tcp6 0 0 :::110 :::* LISTEN


1015/dovecot

tcp6 0 0 :::143 :::* LISTEN


1015/dovecot

tcp6 0 0 :::111 :::* LISTEN


1/systemd

tcp6 0 0 :::80 :::* LISTEN


990/httpd
tcp6 0 0 :::465 :::* LISTEN
1257/master

tcp6 0 0 :::53 :::* LISTEN


1404/pdns_server

tcp6 0 0 :::21 :::* LISTEN


1064/pure-ftpd (SER

tcp6 0 0 :::22 :::* LISTEN


972/sshd

tcp6 0 0 [Link] :::* LISTEN


975/cupsd

tcp6 0 0 :::25 :::* LISTEN


1257/master

tcp6 0 0 :::993 :::* LISTEN


1015/dovecot

tcp6 0 0 :::995 :::* LISTEN


1015/dovecot

To view the kernel routing table, use the -r flag (which is equivalent to running
the route command above).

$ netstat -r

Destination Gateway Genmask Flags MSS Window irtt


Iface

default gateway [Link] UG 0 0 0


enp0s3

[Link] [Link] [Link] U 0 0 0


enp0s3
[Link] [Link] [Link] U 0 0 0
virbr0

Note: Although Netstat is a great tool, it is now obsolete (deprecated), its


replacement is the ss command which is explained below.

11. ss Command

ss (socket statistics) is a powerful command-line utility to investigate sockets. It


dumps socket statistics and displays information similar to netstat. In addition, it
shows more TCP and state information compared to other similar utilities.

The following example shows how to list all TCP ports (sockets) that are open on
a server.

$ ss -ta

State Recv-Q Send-Q Local


Address:Port Peer
Address:Port

LISTEN 0 100
*:submission *:*

LISTEN 0 128
[Link]:fmpro-internal
*:*

LISTEN 0 100
*:pop3 *:*

LISTEN 0 100
*:imap *:*

LISTEN 0 128
*:sunrpc *:*

LISTEN 0 100
*:urd *:*
LISTEN 0 128
*:domain *:*

LISTEN 0 9
*:ftp *:*

LISTEN 0 128
*:ssh *:*

LISTEN 0 128
[Link]:ipp
*:*

LISTEN 0 100
*:smtp *:*

LISTEN 0 128
*:8090 *:*

LISTEN 0 100
*:imaps *:*

LISTEN 0 100
*:pop3s *:*

ESTAB 0 0
[Link]:ssh
[Link]:36398

ESTAB 0 0
[Link]:34642
[Link]:opsession-prxy

ESTAB 0 0
[Link]:34638
[Link]:opsession-prxy

ESTAB 0 0
[Link]:34644
[Link]:opsession-prxy

ESTAB 0 0
[Link]:34640
[Link]:opsession-prxy
LISTEN 0 80
:::mysql
:::*

...

To display all active TCP connections together with their timers, run the following
command.

$ ss -to

12. NC Command

NC (NetCat) also referred to as the “Network Swiss Army knife”, is a powerful


utility used for almost any task related to TCP, UDP, or UNIX-domain sockets. It
is used to open TCP connections, listen on arbitrary TCP and UDP ports,
perform port scanning plus more.

You can also use it as a simple TCP proxy, for network daemon testing, to check
if remote ports are reachable, and much more. Furthermore, you can
employ nc together with pv command to transfer files between two computers.

[ You might also like: 8 Netcat (nc) Command with Examples ]

The following example will show how to scan a list of ports.

$ nc -zv [Link] 21 22 80 443 3000

You can also specify a range of ports as shown.

$ nc -zv [Link] 20-90

The following example shows how to use nc to open a TCP connection to


port 5000 on [Link], using port 3000 as the source port, with a
timeout of 10 seconds.
$ nc -p 3000 -w 10 [Link] 5000

13. Nmap Command

Nmap (Network Mapper) is a powerful and extremely versatile tool for Linux
system/network administrators. It is used to gather information about a single
host or explores networks an entire network. Nmap is also used to perform
security scans, network audits and finding open ports on remote hosts and so
much more.

You can scan a host using its hostname or IP address, for instance.

$ nmap [Link]

Starting Nmap 6.40 ( [Link] ) at 2018-07-12 09:23 BST

Nmap scan report for [Link] ([Link])

Host is up (0.0036s latency).

rDNS record for [Link]: [Link]

Not shown: 998 filtered ports

PORT STATE SERVICE

80/tcp open http

443/tcp open https

Nmap done: 1 IP address (1 host up) scanned in 4.92 seconds


Alternatively, use an IP address as shown.

$ nmap [Link]

Starting Nmap 6.40 ( [Link] ) at 2018-07-12 09:24 BST

Nmap scan report for [Link]

Host is up (0.000051s latency).

Not shown: 994 closed ports

PORT STATE SERVICE

22/tcp open ssh

25/tcp open smtp

902/tcp open iss-realsecure

4242/tcp open vrml-multi-use

5900/tcp open vnc

8080/tcp open http-proxy

MAC Address: [Link] (Lcfc(hefei) Electronics Technology Co.)

Nmap done: 1 IP address (1 host up) scanned in 0.13 seconds

Read our following useful articles on the nmap command.

1. How to Use Nmap Script Engine (NSE) Scripts in Linux


2. A Practical Guide to Nmap (Network Security Scanner) in Kali Linux
3. Find Out All Live Hosts IP Addresses Connected on Network in
Linux
DNS Lookup Utilities

14. host Command

host command is a simple utility for carrying out DNS lookups, it translates
hostnames to IP addresses and vice versa.

$ host [Link]

[Link] has address [Link]

[Link] mail is handled by 20 [Link].

[Link] mail is handled by 30 [Link].

[Link] mail is handled by 40 [Link].

[Link] mail is handled by 50 [Link].

[Link] mail is handled by 10 [Link].

15. dig Command

dig (domain information groper) is also another simple DNS lookup utility, that is
used to query DNS related information such as A Record, CNAME, MX Record
etc, for example:

$ dig [Link]

; <<>> DiG 9.9.4-RedHat-9.9.4-51.el7 <<>> [Link]


;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23083

;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 13, ADDITIONAL: 14

;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 4096

;; QUESTION SECTION:

;[Link]. IN A

;; ANSWER SECTION:

[Link]. 72 IN A [Link]

;; AUTHORITY SECTION:

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].


com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

com. 13482 IN NS [Link].

;; ADDITIONAL SECTION:

[Link]. 81883 IN A [Link]

[Link]. 3999 IN A [Link]

[Link]. 14876 IN A [Link]

[Link]. 85172 IN A [Link]

[Link]. 95861 IN A [Link]

[Link]. 78471 IN A [Link]

[Link]. 5217 IN A [Link]

[Link]. 111531 IN A [Link]

[Link]. 93017 IN A [Link]


[Link]. 93542 IN A [Link]

[Link]. 107218 IN A [Link]

[Link]. 6280 IN A [Link]

[Link]. 2689 IN A [Link]

;; Query time: 4 msec

;; SERVER: [Link]#53([Link])

;; WHEN: Thu Jul 12 [Link] BST 2018

;; MSG SIZE rcvd: 487

16. NSLookup Command

Nslookup is also a popular command-line utility to query DNS servers both


interactively and non-interactively. It is used to query DNS resource records
(RR). You can find out the “A” record (IP address) of a domain as shown.

$ nslookup [Link]

Server: [Link]

Address: [Link]#53

Non-authoritative answer:

Name: [Link]
Address: [Link]

You can also perform a reverse domain lookup as shown.

$ nslookup [Link]

Server: [Link]

Address: [Link]#53

Non-authoritative answer:

[Link].[Link] name = [Link].

[Link].[Link] name = [Link].

Authoritative answers can be found from:

[Link] nameserver = [Link].

[Link] nameserver = [Link].

[Link] nameserver = [Link].

[Link] nameserver = [Link].

[Link] nameserver = [Link].

[Link] nameserver = [Link].

[Link] internet address = [Link]


[Link] internet address = [Link]

[Link] internet address = [Link]

[Link] internet address = [Link]

[Link] internet address = [Link]

[Link] internet address = [Link]

Linux Network Packet Analyzers

17. Tcpdump Command

Tcpdump is a very powerful and widely used command-line network sniffer. It is


used to capture and analyze TCP/IP packets transmitted or received over a
network on a specific interface.

To capture packets from a given interface, specify it using the -i option.

$ tcpdump -i eth1

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

listening on enp0s3, link-type EN10MB (Ethernet), capture size 262144 bytes

[Link].287439 IP [Link] > [Link].36398: Flags [P.], seq


4152360356:4152360552, ack 306922699, win 270, options [nop,nop,TS val
2211778668 ecr 2019055], length 196

[Link].287655 IP [Link].36398 > [Link]: Flags [.], ack 196,


win 5202, options [nop,nop,TS val 2019058 ecr 2211778668], length 0

[Link].288269 IP [Link].54899 > [Link]: 43760+ PTR?


[Link].[Link]. (44)
[Link].333763 IP [Link] > [Link].54899: 43760 NXDomain* 0/1/0
(94)

[Link].335311 IP [Link].52036 > [Link]: 44289+ PTR?


[Link].[Link]. (42)

To capture a specific number of packets, use the -c option to enter the desired
number.

$ tcpdump -c 5 -i eth1

You can also capture and save packets to a file for later analysis, use the -w flag
to specify the output file.

$ tcpdump -w [Link] -i eth1

18. Wireshark Utility

Wireshark is a popular, powerful, versatile, and easy-to-use tool for capturing and
analyzing packets in a packet-switched network, in real-time.

You can also save data it has captured to a file for later inspection. It is used by
system administrators and network engineers to monitor and inspect the packets
for security and troubleshooting purposes.
Monitor Local Network Traffic

19. Bmon Tool

bmon is a powerful, command line-based network monitoring and debugging


utility for Unix-like systems, it captures networking-related statistics and prints
them visually in a human-friendly format. It is a reliable and effective real-time
bandwidth monitor and rate estimator.

bmon – Linux Network Bandwidth Monitoring

Linux Firewall Management Tools


20. Iptables Firewall

iptables is a command-line tool for configuring, maintaining, and inspecting the


tables IP packet filtering and NAT ruleset. It is used to set up and manage the
Linux firewall (Netfilter). It allows you to list existing packet filter rules; add or
delete or modify packet filter rules; list per-rule counters of the packet filter rules.

You can learn how to use Iptables for various purposes from our simple yet
comprehensive guides.

1. Basic Guide on IPTables (Linux Firewall) Tips / Commands


2. 25 Useful IPtable Firewall Rules Every Linux Administrator Should
Know
3. How To Setup an Iptables Firewall to Enable Remote Access to
Services
4. How to Block Ping ICMP Requests to Linux Systems
21. Firewalld

Firewalld is a powerful and dynamic daemon to manage the Linux firewall


(Netfilter), just like iptables. It uses “networks zones” instead of INPUT, OUTPUT,
and FORWARD CHAINS in iptables. On current Linux distributions such
as RHEL/CentOS 7 and Fedora 21+, iptables is actively being replaced
by firewalld.

To get started with firewalld, consult these guides listed below:

1. Useful ‘FirewallD’ Rules to Configure and Manage Firewall in Linux


2. How to Configure ‘FirewallD’ in RHEL/CentOS 7 and Fedora 21
3. How to Start/Stop and Enable/Disable FirewallD and Iptables
Firewall in Linux
4. Setting Up Samba and Configure FirewallD and SELinux to Allow
File Sharing on Linux/Windows
Important: Iptables is still supported and can be installed with the YUM package
manager. However, you can’t use Firewalld and iptables at the same time on the
same server – you must choose one.

22. UFW (Uncomplicated Firewall)

UFW is a well-known and default firewall configuration tool


on Debian and Ubuntu Linux distributions. It is used to enable/disable system
firewall, add/delete/modify/reset packet filtering rules, and much more.
To check UFW firewall status, type.

$ sudo ufw status

If the UFW firewall is not active, you can activate or enable it using the following
command.

$ sudo ufw enable

To disable the UFW firewall, use the following command.

$ sudo ufw disable

Read our article How to Setup UFW Firewall on Ubuntu and Debian.

If you want to find more information about a particular program, you can consult
its man pages as shown.

$ man programs_name

That’s all for now! In this comprehensive guide, we reviewed some of the most
used command-line tools and utilities for network management in Linux, under
different categories, for system administrators, and equally useful to full-time
network administrators/engineers.

You might also like