Analyzing network traffic with iftop

Slashdot it! Delicious Share on Facebook Tweet! Digg!

Conclusion

The iftop command-line tool captures data traffic on network interfaces and then analyzes which network connections exist and how many data packets are running on each one. In this way, you can quickly determine how much bandwidth each program and service requires and is possibly overloading. Packet filtering is just one of many options that helps.

Table 1

Pcap Filter

Filter Description
dst host 1.2.3.4 All packets with a destination IP address of 1.2.3.4
src port 22 All packets arriving on port 22
dst portrange 22-33 All packets departing in a range of ports from 22 through 33
gateway 1.2.3.5 All packets with the gateway IP address of 1.2.3.5

Acknowledgement

The author thanks Axel Beckert for his help in preparing this article.

The Author

Frank Hofmann (http://www.efho.de/) studied computer science at the Technical University of Chemnitz, Germany. He currently works in Berlin at Buro 2.0, a network of open source experts, as a service provider specializing in printing and typesetting. Frank is also cofounder of the Wizards of FOSS training company and has coordinated meetings of the Linux User Group in the Berlin-Brandenburg region since 2008.

Buy this article as PDF

Express-Checkout as PDF

Pages: 3

Price $0.99
(incl. VAT)

Buy Ubuntu User

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Programs for bandwidth monitoring

    Many programs communicate over the network, and when a bottleneck occurs, these tools can help you determine the cause.

  • Zentyal Server 3.5

    Some users may struggle when setting up various services, such as web servers, email servers, firewalls, and the like. Zentyal simplifies configuration of all those things, thanks to its intuitive user interface.

  • Understanding and using the Tor network

    Given the extent to which intelligence agencies have been tapping data off the Internet, those wanting to protect their privacy need to take action. Tor can help you.

  • Viewing users' system access

    Linux automatically executes protocols on the activities that take place on the system. This article looks at ways to keep track of users who've logged in.

  • Anonymous surfing on the Internet

    Users who want to surf the Internet anonymously need to consider the Tor network. The Tor browser package offers a simple solution for protecting your personal privacy.