Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Network Troubleshooting Tools
Preface
Audience
Organization
Conventions
Acknowledgments
1. Network Management and Troubleshooting
1.1. General Approaches to Troubleshooting
1.2. Need for Troubleshooting Tools
1.3. Troubleshooting and Management
1.3.1. Documentation
1.3.2. Management Practices
1.3.2.1. Professionalism
1.3.2.2. Ego management
1.3.2.3. Legal and ethical considerations
1.3.2.4. Economic considerations
2. Host Configurations
2.1. Utilities
2.1.1. ps
2.1.2. top
2.1.3. netstat
2.1.4. lsof
2.1.5. ifconfig
2.1.6. arp
2.1.7. Scanning Tools
2.2. System Configuration Files
2.2.1. Basic Configuration Files
2.2.2. Configuration Programs
2.2.3. Kernel
2.2.4. Startup Files and Scripts
2.2.5. Other Files
2.2.5.1. Application files
2.2.5.2. Security files
2.2.5.3. Log files
2.3. Microsoft Windows
3. Connectivity Testing
3.1. Cabling
3.1.1. Installing New Cabling
3.1.2. Maintaining Existing Cabling
3.1.3. Testing Cabling
3.1.3.1. Link lights
3.1.3.2. Cable testers
3.1.3.3. Other cable tests
3.2. Testing Adapters
3.3. Software Testing with ping
3.3.1. ping
3.3.2. How ping Works
3.3.2.1. Simple examples
3.3.2.2. Interpreting results
3.3.2.3. Options
3.3.2.4. Using ping
3.3.3. Problems with ping
3.3.3.1. Security and ICMP
3.3.3.2. Smurf Attacks
3.3.3.3. Ping of Death
3.3.3.4. Other problems
3.3.4. Alternatives to ping
3.3.4.1. fping
3.3.4.2. echoping
3.3.4.3. arping
3.3.4.4. Other programs
3.4. Microsoft Windows
4. Path Characteristics
4.1. Path Discovery with traceroute
4.1.1. Options
4.1.2. Complications with traceroute
4.2. Path Performance
4.2.1. Performance Measurements
4.2.2. Bandwidth Measurements
4.2.2.1. ping revisited
4.2.2.2. pathchar
4.2.2.3. bing
4.2.2.4. Packet pair software
4.2.3. Throughput Measurements
4.2.3.1. ttcp
4.2.3.2. netperf
4.2.3.3. iperf
4.2.3.4. Other related tools
4.2.4. Traffic Measurements with netstat
4.3. Microsoft Windows
5. Packet Capture
5.1. Traffic Capture Tools
5.2. Access to Traffic
5.3. Capturing Data
5.4. tcpdump
5.4.1. Using tcpdump
5.4.2. tcpdump Options
5.4.2.1. Controlling program behavior
5.4.2.2. Controlling how information is displayed
5.4.2.3. Controlling what's displayed
5.4.2.4. Filtering
5.4.2.4.1. Address filtering.
5.4.2.4.2. Protocol and port filtering.
5.4.2.4.3. Packet characteristics.
5.4.2.4.4. Compound filters.
5.5. Analysis Tools
5.5.1. sanitize
5.5.2. tcpdpriv
5.5.3. tcpflow
5.5.4. tcp-reduce
5.5.5. tcpshow
5.5.6. tcpslice
5.5.7. tcptrace
5.5.8. trafshow
5.5.9. xplot
5.5.10. Other Packet Capture Programs
5.6. Packet Analyzers
5.6.1. ethereal
5.6.1.1. Using ethereal
5.6.1.2. Display filters
5.7. Dark Side of Packet Capture
5.7.1. Switch Security
5.7.2. Protecting Yourself
5.8. Microsoft Windows
6. Device Discovery and Mapping
6.1. Troubleshooting Versus Management
6.1.1. Characteristics of Management Software
6.1.2. Discovery and Mapping Tools
6.1.3. Selecting a Product
6.2. Device Discovery
6.2.1. IP Address Management
6.2.2. nmap
6.2.3. arpwatch
6.3. Device Identification
6.3.1. Stack Fingerprinting
6.3.2. queso
6.3.3. nmap Revisited
6.4. Scripts
6.4.1. Tcl/Tk and scotty
6.5. Mapping or Diagramming
6.5.1. tkined
6.5.1.1. Drawing maps with tkined
6.5.1.2. Autodiscovery with tkined
6.6. Politics and Security
6.7. Microsoft Windows
6.7.1. Cyberkit
6.7.2. Other Tools for Windows
7. Device Monitoring with SNMP
7.1. Overview of SNMP
7.2. SNMP-Based Management Tools
7.2.1. NET SNMP (UCD SNMP)
7.2.1.1. snmpget
7.2.1.2. Configuration and options
7.2.1.3. snmpgetnext, snmpwalk, and snmptable
7.2.1.4. snmpset
7.2.1.5. snmptranslate
7.2.1.6. snmpnetstat
7.2.1.7. snmpstatus
7.2.1.8. Agents and traps
7.2.2. scotty
7.2.3. tkined
7.2.3.1. ICMP monitoring
7.2.3.2. SNMP traps
7.2.3.3. Examining MIBs
7.2.3.4. Monitoring SNMP objects
7.2.3.5. Other commands
7.2.3.6. Caveats
7.3. Non-SNMP Approaches
7.4. Microsoft Windows
7.4.1. Windows SNMP Setup
7.4.2. SNMP Tools
7.4.3. Other Options
8. Performance Measurement Tools
8.1. What, When, and Where
8.2. Host-Monitoring Tools
8.3. Point-Monitoring Tools
8.3.1. ntop
8.3.1.1. Interactive mode
8.3.1.2. Web mode
8.4. Network-Monitoring Tools
8.4.1. mrtg
8.4.1.1. mrtg configuration file
8.4.2. rrd and the Future of mrtg
8.4.3. cricket
8.5. RMON
8.6. Microsoft Windows
8.6.1. ntop, mrtg, and cricket on Windows
8.6.2. getif revisited
9. Testing Connectivity Protocols
9.1. Packet Injection Tools
9.1.1. Custom Packets Generators
9.1.1.1. hping
9.1.1.2. nemesis
9.1.1.3. Other tools
9.1.2. Load Generators
9.1.2.1. spray
9.1.2.2. MGEN
9.2. Network Emulators and Simulators
9.2.1. NISTNet
9.2.2. ns and nam
9.3. Microsoft Windows
10. Application-Level Tools
10.1. Application-Protocols Tools
10.1.1. Email
10.1.2. HTTP
10.1.3. FTP and TFTP
10.1.4. Name Services
10.1.4.1. nslookup and dig
10.1.4.2. doc, dnswalk, and lamers
10.1.4.3. Other tools
10.1.4.4. NIS and NIS+
10.1.5. Routing
10.1.6. NFS
10.2. Microsoft Windows
11. Miscellaneous Tools
11.1. Communications Tools
11.1.1. Automating Documentation
11.1.2. vnc
11.1.3. ssh
11.2. Log Files and Auditing
11.2.1. syslog
11.2.1.1. Configuring syslog
11.2.1.2. Remote logging
11.2.2. Log File Management
11.2.3. Other Approaches to Logging
11.2.3.1. tcpwrappers
11.3. NTP
11.4. Security Tools
11.4.1. tripwire
11.5. Microsoft Windows
12. Troubleshooting Strategies
12.1. Generic Troubleshooting
12.2. Task-Specific Troubleshooting
12.2.1. Installation Testing
12.2.1.1. Firewall testing
12.2.2. Performance Analysis and Monitoring
12.2.2.1. General steps
12.2.2.2. Bottleneck analysis
12.2.2.3. Capacity planning
A. Software Sources
A.1. Installing Software
A.1.1. Generic Installs
A.1.2. Solaris Packages
A.1.3. Red Hat Package Manager
A.1.4. FreeBSD Ports
A.2. Generic Sources
A.3. Licenses
A.4. Sources for Tools
B. Resources and References
B.1. Sources of Information
B.2. References by Topic
B.2.1. System Management
B.2.2. TCP/IP
B.2.3. Specific Protocols
B.2.4. Performance
B.2.5. Troubleshooting
B.2.6. Wiring
B.2.7. Security
B.2.8. Scripting
B.2.9. Microsoft Windows
B.3. References
Colophon
← Prev
Back
Next →
← Prev
Back
Next →