{"id":9692,"date":"2025-02-25T01:05:00","date_gmt":"2025-02-25T06:05:00","guid":{"rendered":"https:\/\/www.both.org\/?p=9692"},"modified":"2025-02-21T08:34:44","modified_gmt":"2025-02-21T13:34:44","slug":"linux-tools-for-network-administrators","status":"publish","type":"post","link":"https:\/\/www.both.org\/?p=9692","title":{"rendered":"Linux tools for network administrators"},"content":{"rendered":"<div class=\"pld-like-dislike-wrap pld-template-1\">\r\n    <div class=\"pld-like-wrap  pld-common-wrap\">\r\n    <a href=\"javascript:void(0)\" class=\"pld-like-trigger pld-like-dislike-trigger  \" title=\"\" data-post-id=\"9692\" data-trigger-type=\"like\" data-restriction=\"cookie\" data-already-liked=\"0\">\r\n                        <i class=\"fas fa-thumbs-up\"><\/i>\r\n                <\/a>\r\n    <span class=\"pld-like-count-wrap pld-count-wrap\">    <\/span>\r\n<\/div><\/div>\n<p><br>My initial reaction to Linux was that I did not fully understand its range of tools. At that time, I was the technology director for a small K-12 public school district with limited resources but a growing number of classrooms, learning labs, and administrative offices. I came from a social science background, and although I was willing to learn, I was acutely aware of how little I knew. It did not take too long to understand what powerful tools enabled me to discover our network and learn the intricacies of TCP\/IP.<\/p>\n\n\n\n<p>Here\u2019s a list of ten tools that became a significant part of my repertoire. I used them to teach others about network computing and the power of Linux.<\/p>\n\n\n\n<p>The&nbsp;<strong>ping<\/strong>&nbsp;command is one of the most frequently used by sysadmins. It utilizes ICMP packets to verify whether two machines are connected.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ ping 192.168.86.1\n<\/code><\/pre>\n\n\n\n<p>I learned that I could also&nbsp;<strong>ping<\/strong>&nbsp;a domain.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ ping donwatkins.info<\/pre>\n\n\n\n<p>The&nbsp;<strong>traceroute<\/strong>&nbsp;command displays the route from your current machine to the remote server\/system, showing each hop.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ traceroute donwatkins.info<br><\/pre>\n\n\n\n<p>Traceroute can identify the network path, detect latency, locate network issues, and visualize network topology. Here is the result of the&nbsp;<strong>traceroute<\/strong>&nbsp;command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>1   192.168.1.1  1.114ms  0.234ms  0.125ms \n2   67.252.48.1  21.260ms  12.357ms  20.123ms \n3   24.58.217.101  29.425ms  32.921ms  32.608ms \n4   24.58.38.176  10.866ms  11.450ms  10.017ms \n5   24.58.32.62  25.848ms  25.377ms  15.594ms \n6   66.109.6.2  24.275ms  *  30.399ms <\/code><\/pre>\n\n\n\n<p>The&nbsp;<strong>mtr<\/strong>&nbsp;command is a combination of&nbsp;<strong>ping<\/strong>&nbsp;and&nbsp;<strong>traceroute<\/strong>. It is used to track packet loss. MTR is a versatile and dynamic tool that provides sysadmins with valuable insights into network performance and helps them identify and resolve issues efficiently.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ mtr donwatkins.info<\/code><\/pre>\n\n\n\n<p>You can use the&nbsp;<strong>ifconfig<\/strong>&nbsp;tool to find you<strong>r IP address<\/strong>. It provides TCP\/IP information for all your network addresses, including the loopback address.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ ifconfig <\/code><\/pre>\n\n\n\n<p>The&nbsp;<strong>netstat<\/strong>&nbsp;(network statistics) command-line tool provides detailed information about network connections, routing tables, interface statistics, masquerade connections, and multicast memberships on a system. If you want to see your system&#8217;s network activity, consider using the following command.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ netstat -a<\/code><\/pre>\n\n\n\n<p>If you are looking for DNS information,&nbsp;<strong>dig<\/strong>&nbsp;is the tool you should use. It is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers returned from the name server(s) that were queried.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ dig donwatkins.info<\/code><\/pre>\n\n\n\n<p>One of my favorite tools&nbsp;for discovering what traffic is coming across my network is&nbsp;<strong>tcpdump. It<\/strong>&nbsp;is a powerful command-line packet analyzer used for network traffic monitoring and analysis. It captures and displays the packets being transmitted or received over your network. You need administrative privileges to run the command.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo tcpdump <\/code><\/pre>\n\n\n\n<p>The&nbsp;whois&nbsp;command queries databases that store registered domain names and related information. This command is useful if you need information about a specific domain, such as its registrar.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ whois donwatkins.info<\/code><\/pre>\n\n\n\n<p>If you are looking for a powerful and versatile tool for network discovery and security auditing, then Nmap is for you. It can discover devices on a network, identify their IP addresses, and collect information about them, creating a detailed network inventory. Be sure to check the Nmap project website for excellent&nbsp;<a href=\"https:\/\/nmap.org\/docs.html\">documentation<\/a>&nbsp;on its use. I use <strong>nmap<\/strong> to scan my router to see which ports are open. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ nmap 192.168.1.1<\/code><\/pre>\n\n\n\n<p>One of my favorite network monitoring tools is&nbsp;<strong>ntopng<\/strong>. It is a web-based application for monitoring network traffic released under the GPLv3 license.&nbsp;<a href=\"https:\/\/github.com\/ntop\/ntopng\" target=\"_blank\" rel=\"noreferrer noopener\">Ntopng<\/a>&nbsp;is the modern version of the original tool,&nbsp;<strong>ntop,<\/strong>&nbsp;created by<a href=\"https:\/\/github.com\/lucaderi\">&nbsp;Luca Deri<\/a>&nbsp;in 1998. It has been significantly improved in performance, usability, and features.<\/p>\n\n\n\n<p>I am a graphical learner, and&nbsp;<a href=\"https:\/\/etherape.sourceforge.io\/\">Etherape helped me&nbsp;<\/a>visualize TCP\/IP traffic across our network. It is easy to install on .deb or .rpm-based systems.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt install etherape\nor \n$ sudo dnf install etherape<\/code><\/pre>\n\n\n\n<p>Only an administrator can run Etherape, so you must add sudo to your command when executing it.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo etherape<\/code><\/pre>\n\n\n\n<p>Be sure to consult the documentation and Linux manual pages for all these commands to explore all the different options open to you as a Linux system administrator.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>My initial reaction to Linux was that I did not fully understand its range of tools. At that<\/p>\n","protected":false},"author":32,"featured_media":7668,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-9692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux"],"modified_by":"David Both","_links":{"self":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/9692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9692"}],"version-history":[{"count":10,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/9692\/revisions"}],"predecessor-version":[{"id":9704,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/9692\/revisions\/9704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/media\/7668"}],"wp:attachment":[{"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}