Back to the main page

HP-UX networking

Examine a current system : determine installed LAN hardware/software

$  lanscan 
Hardware Station        Crd Hdw   Net-Interface  NM  MAC       HP-DLPI DLPI
Path     Address        In# State NamePPA        ID  Type      Support Mjr#
0/0/0/3/0/0/0 0x00215A9165DB 0   UP    lan0 snap0     1   ETHER     Yes     119
0/0/0/3/0/0/1 0x00215A9165DD 1   UP    lan1 snap1     2   ETHER     Yes     119
0/0/0/3/0/0/2 0x00215A9165E3 2   UP    lan2 snap2     3   ETHER     Yes     119
0/0/0/3/0/0/3 0x00215A9165E5 3   UP    lan3 snap3     4   ETHER     Yes     119
0/0/0/3/0/0/4 0x009C022973D2 4   UP    lan4 snap4     5   ETHER     Yes     119
0/0/0/3/0/0/5 0x009C022973D6 5   UP    lan5 snap5     6   ETHER     Yes     119
0/0/0/3/0/0/6 0x009C022973D3 6   UP    lan6 snap6     7   ETHER     Yes     119
0/0/0/3/0/0/7 0x009C022973D7 7   UP    lan7 snap7     8   ETHER     Yes     119
0/0/0/4/0/0/0 0x00215A9165DF 8   UP    lan8 snap8     9   ETHER     Yes     119
0/0/0/4/0/0/1 0x00215A9165E1 9   UP    lan9 snap9     10  ETHER     Yes     119
0/0/0/4/0/0/2 0x00215A9165E7 10  UP    lan10 snap10   11  ETHER     Yes     119
0/0/0/4/0/0/3 0x00215A9165E9 11  UP    lan11 snap11   12  ETHER     Yes     119
0/0/0/4/0/0/4 0x009C022973DA 12  UP    lan12 snap12   13  ETHER     Yes     119
0/0/0/4/0/0/5 0x009C022973DE 13  UP    lan13 snap13   14  ETHER     Yes     119
0/0/0/4/0/0/6 0x009C022973DB 14  UP    lan14 snap14   15  ETHER     Yes     119
0/0/0/4/0/0/7 0x009C022973DF 15  UP    lan15 snap15   16  ETHER     Yes     119
LinkAgg0 0x000000000000 900 DOWN  lan900 snap900 18  ETHER     Yes     119
LinkAgg1 0x000000000000 901 DOWN  lan901 snap901 19  ETHER     Yes     119
LinkAgg2 0x000000000000 902 DOWN  lan902 snap902 20  ETHER     Yes     119
LinkAgg3 0x000000000000 903 DOWN  lan903 snap903 21  ETHER     Yes     119
LinkAgg4 0x000000000000 904 DOWN  lan904 snap904 22  ETHER     Yes     119

$  nwmgr 
Name/          Interface Station          Sub-   Interface      Related
ClassInstance  State     Address        system   Type           Interface
============== ========= ============== ======== ============== =========
lan0           UP        0x00215A9165DB iexgbe   10GBASE-KR
lan1           UP        0x00215A9165DD iexgbe   10GBASE-KR
lan2           UP        0x00215A9165E3 iexgbe   10GBASE-KR
lan3           UP        0x00215A9165E5 iexgbe   10GBASE-KR
lan4           DOWN      0x009C022973D2 iexgbe   10GBASE-KR
lan5           DOWN      0x009C022973D6 iexgbe   10GBASE-KR
lan6           DOWN      0x009C022973D3 iexgbe   10GBASE-KR
lan7           DOWN      0x009C022973D7 iexgbe   10GBASE-KR
lan8           UP        0x00215A9165DF iexgbe   10GBASE-KR
lan9           UP        0x00215A9165E1 iexgbe   10GBASE-KR
lan10          DOWN      0x00215A9165E7 iexgbe   10GBASE-KR
lan11          UP        0x00215A9165E9 iexgbe   10GBASE-KR
lan12          DOWN      0x009C022973DA iexgbe   10GBASE-KR
lan13          DOWN      0x009C022973DE iexgbe   10GBASE-KR
lan14          DOWN      0x009C022973DB iexgbe   10GBASE-KR
lan15          DOWN      0x009C022973DF iexgbe   10GBASE-KR
lan900         DOWN      0x000000000000 hp_apa   hp_apa
lan901         DOWN      0x000000000000 hp_apa   hp_apa
lan902         DOWN      0x000000000000 hp_apa   hp_apa
lan903         DOWN      0x000000000000 hp_apa   hp_apa
lan904         DOWN      0x000000000000 hp_apa   hp_apa


The Linkloop also tells if interface is up or down.
$  linkloop 0x00215A9165DB 
Link connectivity to LAN station: 0x00215A9165DB
 -- OK

Editing the /etc/rc.config.d/netconf file allows you to identify the network interface name, IP address, and subnet mask of your LAN card, and add entries to the network routing table.

To restart network:
/sbin/init.d/net stop; /sbin/init.d/net start 

HP-UX Network Performance tuning

LINK LAYER TOOLS

Command: lanscan

Use it to get quick view of all cards (used and not used) installed in a system.
$  lanscan 
Hardware Station        Crd Hdw   Net-Interface  NM  MAC       HP-DLPI DLPI
Path     Address        In# State NamePPA        ID  Type      Support Mjr#
0/0/0/3/0/0/0 0x00215A9C4FDD 0   UP    lan0 snap0     1   ETHER     Yes     119
0/0/0/3/0/0/1 0x00215A9C4FDF 1   UP    lan1 snap1     2   ETHER     Yes     119
0/0/0/3/0/0/4 0x00215A9C4FED 2   UP    lan2 snap2     3   ETHER     Yes     119
0/0/0/3/0/0/5 0x00215A9C4FEF 3   UP    lan3 snap3     4   ETHER     Yes     119
0/0/0/3/0/0/6 0x00215A9C4FFD 4   UP    lan4 snap4     5   ETHER     Yes     119
0/0/0/3/0/0/7 0x00215A9C4FFF 5   UP    lan5 snap5     6   ETHER     Yes     119
0/0/0/4/0/0/0 0x00215A9C4FE1 6   UP    lan6 snap6     7   ETHER     Yes     119
0/0/0/4/0/0/1 0x00215A9C4FE3 7   UP    lan7 snap7     8   ETHER     Yes     119
0/0/0/4/0/0/2 0x00215A9C4FF1 8   UP    lan8 snap8     9   ETHER     Yes     119
0/0/0/4/0/0/3 0x00215A9C4FF3 9   UP    lan9 snap9     10  ETHER     Yes     119
0/0/0/4/0/0/4 0x00215A9C5001 10  UP    lan10 snap10   11  ETHER     Yes     119
0/0/0/4/0/0/5 0x00215A9C5003 11  UP    lan11 snap11   12  ETHER     Yes     119
0/0/0/4/0/0/6 0xF0921C8C0067 12  UP    lan12 snap12   13  ETHER     Yes     119
0/0/0/4/0/0/7 0xF0921C8C006B 13  UP    lan13 snap13   14  ETHER     Yes     119
0/0/0/5/0/0/0 0x00215A9C4FE5 14  UP    lan14 snap14   15  ETHER     Yes     119
0/0/0/5/0/0/1 0x00215A9C4FE7 15  UP    lan15 snap15   16  ETHER     Yes     119
0/0/0/5/0/0/4 0x00215A9C4FF5 16  UP    lan16 snap16   17  ETHER     Yes     119
0/0/0/5/0/0/5 0x00215A9C4FF7 17  UP    lan17 snap17   18  ETHER     Yes     119
0/0/0/5/0/0/6 0x00215A9C5005 18  UP    lan18 snap18   19  ETHER     Yes     119
0/0/0/5/0/0/7 0x00215A9C5007 19  UP    lan19 snap19   20  ETHER     Yes     119
0/0/0/7/0/0/0 0x00215A9C4FE9 20  UP    lan20 snap20   21  ETHER     Yes     119
0/0/0/7/0/0/1 0x00215A9C4FEB 21  UP    lan21 snap21   22  ETHER     Yes     119
0/0/0/7/0/0/4 0x00215A9C4FF9 22  UP    lan22 snap22   23  ETHER     Yes     119
0/0/0/7/0/0/5 0x00215A9C4FFB 23  UP    lan23 snap23   24  ETHER     Yes     119
0/0/0/7/0/0/6 0xF0921CDAF023 24  UP    lan24 snap24   25  ETHER     Yes     119
0/0/0/7/0/0/7 0xF0921CDAF027 25  UP    lan25 snap25   26  ETHER     Yes     119
LinkAgg0 0x000000000000 900 DOWN  lan900 snap900 28  ETHER     Yes     119
LinkAgg1 0x000000000000 901 DOWN  lan901 snap901 29  ETHER     Yes     119
LinkAgg2 0x000000000000 902 DOWN  lan902 snap902 30  ETHER     Yes     119
LinkAgg3 0x000000000000 903 DOWN  lan903 snap903 31  ETHER     Yes     119
LinkAgg4 0x000000000000 904 DOWN  lan904 snap904 32  ETHER     Yes     119

$  lanscan -v lan0 
-------------------------------------------------------------------------------
Hardware        Station     Crd Hdw   Net-Interface  NM  MAC       HP-DLPI DLPI
Path            Address     In# State NamePPA        ID  Type      Support Mjr#
0/0/0/3/0/0/0 0x00215A9C4FDD 0   UP    lan0 snap0     1   ETHER     Yes     119

Extended Station                           LLC Encapsulation
Address                                    Methods
0x00215A9C4FDD                             IEEE HPEXTIEEE SNAP ETHER NOVELL

Driver Specific Information
Iocxgbe


Configuration files that control specific flavor of interface card are located in /etc/rc.config.d/ directory. Example can be file hp_apaportconf (HP Auto-Port Aggregation interfaces).

Command: nwmgr

Use it to get quick view of all cards (used and not used) installed in a system.
$  nwmgr 
Name/          Interface Station          Sub-   Interface      Related
ClassInstance  State     Address(MAC)   system   Type           Interface
============== ========= ============== ======== ============== =========
lan0           UP        0x00215A9C4FDD iocxgbe  10GBASE-KR
lan1           DOWN      0x00215A9C4FDF iocxgbe  10GBASE-KR
lan2           UP        0x00215A9C4FED iocxgbe  10GBASE-KR
lan3           DOWN      0x00215A9C4FEF iocxgbe  10GBASE-KR
lan4           DOWN      0x00215A9C4FFD iocxgbe  10GBASE-KR
lan5           DOWN      0x00215A9C4FFF iocxgbe  10GBASE-KR
lan6           UP        0x00215A9C4FE1 iocxgbe  10GBASE-KR
lan7           DOWN      0x00215A9C4FE3 iocxgbe  10GBASE-KR
lan8           DOWN      0x00215A9C4FF1 iocxgbe  10GBASE-KR
lan9           DOWN      0x00215A9C4FF3 iocxgbe  10GBASE-KR
lan10          DOWN      0x00215A9C5001 iocxgbe  10GBASE-KR
lan11          DOWN      0x00215A9C5003 iocxgbe  10GBASE-KR
lan12          DOWN      0xF0921C8C0067 iocxgbe  10GBASE-KR
lan13          DOWN      0xF0921C8C006B iocxgbe  10GBASE-KR
lan14          DOWN      0x00215A9C4FE5 iocxgbe  10GBASE-KR
lan15          UP        0x00215A9C4FE7 iocxgbe  10GBASE-KR
lan16          DOWN      0x00215A9C4FF5 iocxgbe  10GBASE-KR
lan17          UP        0x00215A9C4FF7 iocxgbe  10GBASE-KR
lan18          DOWN      0x00215A9C5005 iocxgbe  10GBASE-KR
lan19          UP        0x00215A9C5007 iocxgbe  10GBASE-KR
lan20          UP        0x00215A9C4FE9 iocxgbe  10GBASE-KR
lan21          DOWN      0x00215A9C4FEB iocxgbe  10GBASE-KR
lan22          DOWN      0x00215A9C4FF9 iocxgbe  10GBASE-KR
lan23          DOWN      0x00215A9C4FFB iocxgbe  10GBASE-KR
lan24          DOWN      0xF0921CDAF023 iocxgbe  10GBASE-KR
lan25          DOWN      0xF0921CDAF027 iocxgbe  10GBASE-KR
lan900         DOWN      0x000000000000 hp_apa   hp_apa
lan901         DOWN      0x000000000000 hp_apa   hp_apa
lan902         DOWN      0x000000000000 hp_apa   hp_apa
lan903         DOWN      0x000000000000 hp_apa   hp_apa
lan904         DOWN      0x000000000000 hp_apa   hp_apa

Command: lanadmin

#  lanadmin -x 0 
Speed = 10000 Full-Duplex

#  lanadmin 

LOCAL AREA NETWORK ONLINE ADMINISTRATION, Version 1.0
                       Mon, Jun 9,2014  20:57:53
               Copyright 1994 Hewlett Packard Company.
                       All rights are reserved.
Test Selection mode.
        lan      = LAN Interface Administration
        menu     = Display this menu
        quit     = Terminate the Administration
        terse    = Do not display command menu
        verbose  = Display command menu

Enter command:  lan 

LAN Interface test mode. LAN Interface PPA Number = 0
        clear    = Clear statistics registers
        display  = Display LAN Interface status and statistics registers
        end      = End LAN Interface Administration, return to Test Selection
        menu     = Display this menu
        ppa      = PPA Number of the LAN Interface
        quit     = Terminate the Administration, return to shell
        reset    = Reset LAN Interface to execute its selftest
        specific = Go to Driver specific menu

Enter command:  display 

                      LAN INTERFACE STATUS DISPLAY
                       Mon, Jun 9,2014  20:58:04

PPA Number                      = 0
Description                     = lan0 HP 10GBase-KR Release CUP3_IOCXGBE_B.11.31.1303.01_42.49.3
Type (value)                    = ethernet-csmacd(6)
MTU Size                        = 1500
Speed                           = 10000000000
Station Address                 = 0x00215a9c4fdd
Administration Status (value)   = up(1)
Operation Status (value)        = up(1)
Last Change                     = 100
Inbound Octets                  = 2966815736
Inbound Unicast Packets         = 2584719
Inbound Non-Unicast Packets     = 32835644
Inbound Discards                = 0
Inbound Errors                  = 0
Inbound Unknown Protocols       = 30747277
Outbound Octets                 = 2945191736
Outbound Unicast Packets        = 2715047
Outbound Non-Unicast Packets    = 818
Outbound Discards               = 0
Outbound Errors                 = 0
Outbound Queue Length           = 0
Specific                        = 655367
Press  to continue

Ethernet-like Statistics Group
Index                           = 1
Alignment Errors                = 0
FCS Errors                      = 0
Single Collision Frames         = 0
Multiple Collision Frames       = 0
Deferred Transmissions          = 0
Late Collisions                 = 0
Excessive Collisions            = 0
Internal MAC Transmit Errors    = 0
Carrier Sense Errors            = 0
Frames Too Long                 = 0
Internal MAC Receive Errors     = 0

Command: linkloop

It checks connectivity within a LAN by sending data (through a direct Data Link Provider Interface) to the interface card. This is command to be used if IP level connectivity fails. The argument is MAC.
$  linkloop 0x00215A9C4FDD 
Link connectivity to LAN station: 0x00215A9C4FDD
 -- OK

Command: ndd

Kernel parameters are in the file /stand/system and configured with commands like kmtune and mk_kernel.
The networking-related parameters are not configured in this way. They are configured with command ndd.
They affect how various networking software components function as well as how they will react in certain situations. Changes made with ndd are immediate, but they are lost after reboot.
To make a change survive a reboot, configure them in the startup script /etc/rc.config.d/nddconf

To read input from the configuration file /etc/rc.config.d/nddconf and set the tunable parameters, run command:
# ndd -c              

Command: Nettl tracing and logging

Nettl control network tracing and logging.

$  /usr/sbin/nettl -status 
Logging Information:
Log Filename:                           /var/adm/nettl.LOG*
Max Log file size(Kbytes):   1000       Console Logging:        On
User's ID:                   0          Buffer Size:            8192
Messages Dropped:            0          Messages Queued:        0
Subsystem Name:                 Log Class:
NS_LS_LOGGING                                              ERROR DISASTER
NS_LS_NFT                                                  ERROR DISASTER
..
IEXGBE                                                     ERROR DISASTER
HPUXPI                                                     ERROR DISASTER
IOCXGBE                                                    ERROR DISASTER
IQXGBE                                                     ERROR DISASTER
Tracing Information:
Trace Filename:
Max Trace file size(Kbytes): 0
No Subsystems Active

To start tracing in file 'test':
# nettl -tn all -e all -f test

Note:
-traceon (Abbr.: -tn)
-traceoff (Abbr.: -tf)
-entity  (Abbr.: -e)

To stop tracing:
# nettl -tf -e all

Use netfmt to format tracing and logging binary files.

Note:
-N = nice formatting
-n = show port, network address
-c = point to filter file
-f = input binary file

Example of filter file:
# cat filterfile
filter ip_saddr 16.216.98.206
filter ip_daddr 16.216.99.1


$  netfmt -N -n -c filterfile -f test.TRC000 

---------------------- SUBSYSTEM FILTERS IN EFFECT -----------------
        ---------------- LAYER  1 -----------------
        ---------------- LAYER  2 -----------------
        ---------------- LAYER  3 -----------------
        filter ip_saddr          16.216.98.206
        filter ip_daddr          16.216.99.1

        ---------------- LAYER  4 -----------------
        ---------------- LAYER  5 -----------------
---------------------- END SUBSYSTEM FILTERS -----------------------


vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvARPA/9000 NETWORKINGvvvvvvvvvvvvvvvvvvvvvvvvvv
  Timestamp            : Wed Jun 11 UTC 2014 22:21:17.900619
  Process ID           : 11874              Subsystem        : NS_LS_TCP
  User ID ( UID )      : 0                  Trace Kind       : PDU OUT TRACE
  Device ID            : -1                 Path ID          : 0
  Connection ID        : 0
  Location             : 00123
-------------------------------- TCP Header ----------------------------------
sport:   12346   -->   dport:  709     flags: PUSH ACK
       seq: 0xbe29c45e  urp: 0x0      chksum: 0x30     data len: 28
       ack: 0xd35c5abe  win: 0x8000   optlen: 0
-------------------------------- PBLOCALD ------------------------------------
   0: 2b 8f 36 00 1b cf 95 90 0e 53 22 62 b6 a4 69 26  +.6......S"b..i&
  16: 30 70 29 06 2a ce 08 2e 18 8f f2 c2 -- -- -- --  0p).*...........


vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvARPA/9000 NETWORKINGvvvvvvvvvvvvvvvvvvvvvvvvvv
  Timestamp            : Wed Jun 11 UTC 2014 22:21:17.900628
  Process ID           : 11874              Subsystem        : NS_LS_IP
  User ID ( UID )      : 0                  Trace Kind       : PDU OUT TRACE
  Device ID            : -1                 Path ID          : 0
  Connection ID        : 0
  Location             : 00123
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
================================ IP Header (outbound -- pid: 11874) ==========
Source:  16.216.98.206(A) Dest:  16.216.192.81(A)
       len:  68      ttl: 64    proto: 6      cksum:  0x59ef      id: 0x9bf5
     flags:  DF      tos: 0x0  hdrlen: 20    offset:  0x0     optlen: 0
-------------------------------- TCP Header ----------------------------------
sport:   12346   -->   dport:  709     flags: PUSH ACK
       seq: 0xbe29c45e  urp: 0x0      chksum: 0x4506   data len: 28
       ack: 0xd35c5abe  win: 0x8000   optlen: 0
-------------------------------- PBLOCALD ------------------------------------
   0: 2b 8f 36 00 1b cf 95 90 0e 53 22 62 b6 a4 69 26  +.6......S"b..i&
  16: 30 70 29 06 2a ce 08 2e 18 8f f2 c2 -- -- -- --  0p).*...........


vvvvvvvvvvvvvvvvvvvvv10 Gigabit Ethernet LAN/9000 Networkingvvvvvvvvvvvvvvvv
  Timestamp            : Wed Jun 11 UTC 2014 22:21:17.900637
  Process ID           : 11874              Subsystem        : IOCXGBE
  User ID ( UID )      : 0                  Trace Kind       : PDU OUT TRACE
  Device ID            : 0                  Path ID          : -1
  Connection ID        : 0
  Location             : 00123
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

=================================== Ethernet ====================================
Source : 00-21-5a-9c-4f-dd [I] [                  ]
Dest   : 00-00-5e-00-01-02 [I] [                  ] TRACED LEN: 82
Date   : Wed Jun 11 22:21:17.900637 0000 2014
================================ IP Header (outbound -- pid: 11874) ==========
Source:  16.216.98.206(A) Dest:  16.216.192.81(A)
       len:  68      ttl: 64    proto: 6      cksum:  0x59ef      id: 0x9bf5
     flags:  DF      tos: 0x0  hdrlen: 20    offset:  0x0     optlen: 0
-------------------------------- TCP Header ----------------------------------
sport:   12346   -->   dport:  709     flags: PUSH ACK
       seq: 0xbe29c45e  urp: 0x0      chksum: 0x4506   data len: 28
       ack: 0xd35c5abe  win: 0x8000   optlen: 0
-------------------------------- PBLOCALD ------------------------------------
   0: 2b 8f 36 00 1b cf 95 90 0e 53 22 62 b6 a4 69 26  +.6......S"b..i&
  16: 30 70 29 06 2a ce 08 2e 18 8f f2 c2 -- -- -- --  0p).*...........

vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvARPA/9000 NETWORKINGvvvvvvvvvvvvvvvvvvvvvvvvvv
  Timestamp            : Wed Jun 11 UTC 2014 22:21:17.900978
  Process ID           : 11783              Subsystem        : NS_LS_TCP
  User ID ( UID )      : 3621               Trace Kind       : PDU OUT TRACE
  Device ID            : -1                 Path ID          : 0
  Connection ID        : 0
  Location             : 00123
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-------------------------------- TCP Header ----------------------------------
sport:   22   -->   dport:  64208     flags: PUSH ACK
       seq: 0x2b1c619   urp: 0x0      chksum: 0x58     data len: 68
       ack: 0x2a90ead8  win: 0x8000   optlen: 0
-------------------------------- User Data -----------------------------------
   0: 96 ef 49 32 4a eb 5d 92 a5 3f b5 b4 db 53 28 ca  ..I2J.]..?...S(.
  16: de 99 1e b1 fe 30 97 c9 ed 9b 92 b3 8f 6c 1c b7  .....0.......l..
  32: 31 9e e1 7c fb 97 ab ec 3e 85 a9 2b 39 c8 a2 a6  1..|....>..+9...
  48: 68 6c 9f e4 db ff 35 77 98 50 13 06 fd 5f 23 a2  hl....5w.P..._#.
  64: 0b d4 fc 48 -- -- -- -- -- -- -- -- -- -- -- --  ...H............

vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvARPA/9000 NETWORKINGvvvvvvvvvvvvvvvvvvvvvvvvvv
  Timestamp            : Wed Jun 11 UTC 2014 22:21:17.900982
  Process ID           : 11783              Subsystem        : NS_LS_IP
  User ID ( UID )      : 3621               Trace Kind       : PDU OUT TRACE
  Device ID            : -1                 Path ID          : 0
  Connection ID        : 0
  Location             : 00123
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
================================ IP Header (outbound -- pid: 11783) ==========
Source:  16.216.98.206(A) Dest:  16.95.146.134(A)
       len:  108     ttl: 64    proto: 6      cksum:  0x2164      id: 0x29d
     flags:  DF      tos: 0x0  hdrlen: 20    offset:  0x0     optlen: 0
-------------------------------- TCP Header ----------------------------------
sport:   22   -->   dport:  64208     flags: PUSH ACK
       seq: 0x2b1c619   urp: 0x0      chksum: 0x16ea   data len: 68
       ack: 0x2a90ead8  win: 0x8000   optlen: 0
-------------------------------- User Data -----------------------------------
   0: 96 ef 49 32 4a eb 5d 92 a5 3f b5 b4 db 53 28 ca  ..I2J.]..?...S(.
  16: de 99 1e b1 fe 30 97 c9 ed 9b 92 b3 8f 6c 1c b7  .....0.......l..
  32: 31 9e e1 7c fb 97 ab ec 3e 85 a9 2b 39 c8 a2 a6  1..|....>..+9...
  48: 68 6c 9f e4 db ff 35 77 98 50 13 06 fd 5f 23 a2  hl....5w.P..._#.
  64: 0b d4 fc 48 -- -- -- -- -- -- -- -- -- -- -- --  ...H............


vvvvvvvvvvvvvvvvvvvvv10 Gigabit Ethernet LAN/9000 Networkingvvvvvvvvvvvvvvvv
  Timestamp            : Wed Jun 11 UTC 2014 22:21:17.900986
  Process ID           : 11783              Subsystem        : IOCXGBE
  User ID ( UID )      : 3621               Trace Kind       : PDU OUT TRACE
  Device ID            : 0                  Path ID          : -1
  Connection ID        : 0
  Location             : 00123
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
=================================== Ethernet ====================================
Source : 00-21-5a-9c-4f-dd [I] [                  ]
Dest   : 00-00-5e-00-01-02 [I] [                  ] TRACED LEN: 122
Date   : Wed Jun 11 22:21:17.900986 0000 2014
================================ IP Header (outbound -- pid: 11783) ==========
Source:  16.216.98.206(A) Dest:  16.95.146.134(A)
       len:  108     ttl: 64    proto: 6      cksum:  0x2164      id: 0x29d
     flags:  DF      tos: 0x0  hdrlen: 20    offset:  0x0     optlen: 0
-------------------------------- TCP Header ----------------------------------
sport:   22   -->   dport:  64208     flags: PUSH ACK
       seq: 0x2b1c619   urp: 0x0      chksum: 0x16ea   data len: 68
       ack: 0x2a90ead8  win: 0x8000   optlen: 0
-------------------------------- User Data -----------------------------------
   0: 96 ef 49 32 4a eb 5d 92 a5 3f b5 b4 db 53 28 ca  ..I2J.]..?...S(.
  16: de 99 1e b1 fe 30 97 c9 ed 9b 92 b3 8f 6c 1c b7  .....0.......l..
  32: 31 9e e1 7c fb 97 ab ec 3e 85 a9 2b 39 c8 a2 a6  1..|....>..+9...
  48: 68 6c 9f e4 db ff 35 77 98 50 13 06 fd 5f 23 a2  hl....5w.P..._#.
  64: 0b d4 fc 48 -- -- -- -- -- -- -- -- -- -- -- --  ...H............

IP/UDP/TCP LAYER TOOLS

Network interfaces are configured in the file /etc/rc.config.d/netconf

To see interface setting use ifconfig
$  ifconfig lan0 
lan0: flags=2000000000001843
        inet 16.216.98.206 netmask fffff800 broadcast 16.216.103.255

Use netstat to see all interface IP assignments.
$  netstat -in 
Name      Mtu  Network         Address         Ipkts       Ierrs Opkts      Oerrs Coll
lan19*    1500 none            none            0           0     0          0     0
lan0      1500 16.216.96.0     16.216.98.206   2885358     0     2705330    0     0
lo0      32808 127.0.0.0       127.0.0.1       425544      0     425545     0     0
lan15*    1500 none            none            0           0     0          0     0
lan6      1500 16.217.100.0    16.217.100.103  570346      0     827732     0     0
lan20     1500 16.219.64.0     16.219.70.93    1207154     0     149        0     0

To see MAC of interface use arp
$  arp g9u1158c 
g9u1158c (16.216.98.206) at 0:21:5a:9c:4f:dd ether permanent published

To see current AMC cashed for local subnet:
$  arp -an 
 (16.216.96.1) at 0:0:5e:0:1:2 ether
 (16.216.99.1) at 0:21:5a:9c:51:9 ether
 (16.217.100.1) at 0:0:5e:0:1:4 ether
 (16.217.100.104) at 0:21:5a:9c:51:d ether

To see routing table
$  netstat -rn 
Routing tables
Destination           Gateway            Flags Refs Interface  Pmtu
127.0.0.1             127.0.0.1          UH    0    lo0       32808
16.216.98.206         16.216.98.206      UH    0    lan0      32808
16.219.70.93          16.219.70.93       UH    0    lan20     32808
16.217.100.103        16.217.100.103     UH    0    lan6      32808
16.217.100.0          16.217.100.103     U     2    lan6       1500
16.216.96.0           16.216.98.206      U     2    lan0       1500
16.219.64.0           16.219.70.93       U     2    lan20      1500
127.0.0.0             127.0.0.1          U     0    lo0       32808
default               16.216.96.1        UG    0    lan0       1500

Use tracroute to map network path.
#  traceroute g1o0001 
traceroute to g1o0001 (16.106.64.58), 30 hops max, 40 byte packets
 1  16.216.96.2 (16.216.96.2)  0.454 ms  0.361 ms  0.390 ms
 2  16.227.7.17  0.509 ms (16.227.7.18)  0.523 ms 16.227.7.17  0.451 ms
 3  16.97.76.17 (16.97.76.17)  0.654 ms 16.97.76.13 (16.97.76.13)  0.625 ms 16.97.76.17 (16.97.76.17)  0.634 ms
 4  ccy01gwb12-ra10-102.core.hpp.net (16.97.76.2)  0.900 ms  0.823 ms  0.801 ms
 5  cce02gwb12-ten3-1-1.core.hpp.net (16.97.24.49)  1.321 ms  1.345 ms  1.289 ms
 6  txe01gwb12-ten9-1-1.core.hpp.net (16.96.42.129)  9.682 ms  9.626 ms  9.624 ms
 7  16.97.124.234 (16.97.124.234)  9.346 ms  9.301 ms  9.306 ms
 8  16.97.124.66 (16.97.124.66)  9.372 ms  9.301 ms  9.305 ms
 9  g1o0001.austin.hpp.com (16.106.64.58)  9.435 ms  9.268 ms  9.311 ms

To see open UDP ports use netstat
$  netstat -an | grep -i udp 
udp        0      0  *.135                  *.*
udp        0      0  *.2148                 *.*
udp        0      0  *.49152                *.*
udp        0      0  *.57923                *.*
udp        0      0  *.*                    *.*
udp        0      0  *.1021                 *.*
udp        0      0  *.111                  *.*
udp        0      0  *.2121                 *.*
udp        0      0  *.1023                 *.*
udp        0      0  *.1022                 *.*
udp        0      0  *.*                    *.*
udp        0      0  127.0.0.1.49153        127.0.0.1.49153
udp        0      0  *.123                  *.*
udp        0      0  127.0.0.1.123          *.*
udp        0      0  16.239.64.77.123       *.*
udp        0      0  16.226.150.92.123      *.*

To list processes that has UDP port open use lsof
$  lsof -n | grep -i udp 
oracle     9046  oraewp   11u  IPv6 0xe00000049c87b380    0t1     UDP [::1]:57592 (Idle)
vxesd      9182    root    5r   STR            125,0x9    0t0    3348 /dev/vx/esd->udpm->ip6
rpcbind    9265    root    3u   STR       124,0x5c0002    0t0     115 /dev/udp->udpm->ip
rpcbind    9265    root    4u   STR       124,0x600001    0t0     115 /dev/udp->udpm->ip
rpcbind    9265    root    5u   STR       124,0x640001    0t0     115 /dev/udp->udpm->ip
rpc.statd  9354  daemon    6u   STR       124,0xa80000    0t0     115 /dev/udp->udpm->ip
rpc.statd  9354  daemon   11u   STR       124,0xb00000    0t0     115 /dev/udp->udpm->ip
ntpd      10575    root   48u  IPv4 0xe000000495936d00    0t0     UDP *:ntp (Idle)
ntpd      10575    root   49u  IPv6 0xe000000495d5da00    0t0     UDP *:ntp (Idle)
ntpd      10575    root   50u  IPv6 0xe000000495936a00    0t0     UDP [::1]:ntp (Idle)
ntpd      10575    root   52u  IPv4 0xe000000496beb080    0t0     UDP 127.0.0.1:ntp (Idle)

Use ttcp (Test TCP) to check throughput between systems. Example, check port 25:
$  ttcp -stp25 g1o0007 
ttcp-t: buflen=8192, nbuf=2048, align=16384/0, port=25  tcp  -> g1o0007
ttcp-t: socket
ttcp-t: connect
ttcp-t: 106496 bytes in 0.08 real seconds = 1228.56 KB/sec +++
ttcp-t: 14 I/O calls, msec/call = 6.19, calls/sec = 165.38
ttcp-t: 0.0user 0.0sys 0:00real 0% 0i+0d 49maxrss 0+0pf 3+0csw

SOCKET/APPLICATION LEVEL TOOLS

Command: glance



Back to the main page