xref: /dragonfly/usr.bin/netstat/netstat.1 (revision cc93b0eb)
1.\" Copyright (c) 1983, 1990, 1992, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"	@(#)netstat.1	8.8 (Berkeley) 4/18/94
33.\" $FreeBSD: src/usr.bin/netstat/netstat.1,v 1.22.2.13 2003/05/03 22:10:02 keramida Exp $
34.\" $DragonFly: src/usr.bin/netstat/netstat.1,v 1.8 2008/07/09 09:29:17 thomas Exp $
35.\"
36.Dd September 7, 2001
37.Dt NETSTAT 1
38.Os
39.Sh NAME
40.Nm netstat
41.Nd show network status
42.Sh DESCRIPTION
43The
44.Nm
45command symbolically displays the contents of various network-related
46data structures.
47There are a number of output formats,
48depending on the options for the information presented.
49.Bl -tag -width indent
50.It Xo
51.Bk -words
52.Nm
53.Op Fl AaLlnPSW
54.Op Fl c Ar cpu
55.Op Fl f Ar protocol_family | Fl p Ar protocol
56.Op Fl M Ar core
57.Op Fl N Ar system
58.Ek
59.Xc
60Display a list of active sockets
61(protocol control blocks)
62for each network protocol,
63for a particular
64.Ar protocol_family ,
65or for a single
66.Ar protocol .
67If
68.Fl A
69is also present,
70show the address of a protocol control block (PCB)
71associated with a socket; used for debugging.
72If
73.Fl a
74is also present,
75show the state of all sockets;
76normally sockets used by server processes are not shown.
77If
78.Fl L
79is also present,
80show the size of the various listen queues.
81The first count shows the number of unaccepted connections,
82the second count shows the amount of unaccepted incomplete connections,
83and the third count is the maximum number of queued connections.
84If
85.Fl S
86is also present,
87show network addresses as numbers (as with
88.Fl n )
89but show ports symbolically.
90.It Xo
91.Bk -words
92.Nm
93.Fl i | I Ar interface
94.Op Fl aBbdnt
95.Op Fl f Ar address_family
96.Op Fl M Ar core
97.Op Fl N Ar system
98.Ek
99.Xc
100Show the state of all network interfaces or a single
101.Ar interface
102which have been auto-configured
103(interfaces statically configured into a system, but not
104located at boot time are not shown).
105An asterisk
106.Pq Dq Li *
107after an interface name indicates that the interface is
108.Dq down .
109If
110.Fl a
111is also present, multicast addresses currently in use are shown
112for each Ethernet interface and for each IP interface address.
113Multicast addresses are shown on separate lines following the interface
114address with which they are associated.
115If
116.Fl b
117is also present, show the number of bytes in and out.
118If
119.Fl d
120is also present, show the number of dropped packets.
121If
122.Fl t
123is also present, show the contents of watchdog timers.
124If
125.Fl B
126is also present, the maximum buffer sizes are displayed instead
127of current buffer usage.
128.It Xo
129.Bk -words
130.Nm
131.Fl w Ar wait
132.Op Fl I Ar interface
133.Op Fl d
134.Op Fl M Ar core
135.Op Fl N Ar system
136.Ek
137.Xc
138At intervals of
139.Ar wait
140seconds,
141display the information regarding packet
142traffic on all configured network interfaces
143or a single
144.Ar interface .
145If
146.Fl d
147is also present, show the number of dropped packets.
148.It Xo
149.Bk -words
150.Nm
151.Fl s Op Fl s
152.Op Fl z
153.Op Fl f Ar protocol_family | Fl p Ar protocol
154.Op Fl M Ar core
155.Op Fl N Ar system
156.Ek
157.Xc
158Display system-wide statistics for each network protocol,
159for a particular
160.Ar protocol_family ,
161or for a single
162.Ar protocol .
163If
164.Fl s
165is repeated, counters with a value of zero are suppressed.
166If
167.Fl z
168is also present, reset statistic counters after displaying them.
169.It Xo
170.Bk -words
171.Nm
172.Fl i | I Ar interface Fl s
173.Op Fl f Ar protocol_family | Fl p Ar protocol
174.Op Fl M Ar core
175.Op Fl N Ar system
176.Ek
177.Xc
178Display per-interface statistics for each network protocol,
179for a particular
180.Ar protocol_family ,
181or for a single
182.Ar protocol .
183.It Xo
184.Bk -words
185.Nm
186.Fl m
187.Op Fl M Ar core
188.Op Fl N Ar system
189.Ek
190.Xc
191Show statistics recorded by the memory management routines
192.Pq Xr mbuf 9 .
193The network manages a private pool of memory buffers.
194.It Xo
195.Bk -words
196.Nm
197.Fl r
198.Op Fl AalnW
199.Op Fl f Ar address_family
200.Op Fl M Ar core
201.Op Fl N Ar system
202.Ek
203.Xc
204Display the contents of all routing tables,
205or a routing table for a particular
206.Ar address_family .
207If
208.Fl A
209is also present,
210show the contents of the internal Patricia tree
211structures; used for debugging.
212If
213.Fl a
214is also present,
215show protocol-cloned routes
216(routes generated by an
217.Dv RTF_PRCLONING
218parent route);
219normally these routes are not shown.
220When
221.Fl W
222or
223.Fl l
224is also present,
225show the path MTU
226for each route.
227.It Xo
228.Bk -words
229.Nm
230.Fl rs
231.Op Fl s
232.Op Fl M Ar core
233.Op Fl N Ar system
234.Ek
235.Xc
236Display routing statistics.
237If
238.Fl s
239is repeated, counters with a value of zero are suppressed.
240.It Xo
241.Bk -words
242.Nm
243.Fl g
244.Op Fl lW
245.Op Fl f Ar address_family
246.Op Fl M Ar core
247.Op Fl N Ar system
248.Ek
249.Xc
250Show information related to multicast (group address) routing.
251By default, show the IP Multicast virtual-interface and routing tables.
252.It Xo
253.Bk -words
254.Nm
255.Fl gs
256.Op Fl s
257.Op Fl f Ar address_family
258.Op Fl M Ar core
259.Op Fl N Ar system
260.Ek
261.Xc
262Show multicast routing statistics.
263If
264.Fl s
265is repeated, counters with a value of zero are suppressed.
266.El
267.Pp
268Some options have the general meaning:
269.Bl -tag -width flag
270.It Fl c Ar cpu
271On SMP systems the route table is replicated.  This option allows
272the route table for a specific cpu to be accessed and exists
273primarily for debugging purposes.
274.It Fl f Ar address_family , Fl p Ar protocol
275Limit display to those records
276of the specified
277.Ar address_family
278or a single
279.Ar protocol .
280The following address families and protocols are recognized:
281.Pp
282.Bl -tag -width ".Cm netgraph , ng Pq Dv AF_NETGRAPH" -compact
283.It Em Family
284.Em Protocols
285.It Cm inet Pq Dv AF_INET
286.Cm divert , icmp , igmp , ip , ipsec , pim , tcp , udp
287.It Cm inet6 Pq Dv AF_INET6
288.Cm icmp6 , ip6 , ipsec6 , rip6 , tcp , udp
289.It Cm pfkey Pq Dv PF_KEY
290.Cm pfkey
291.It Cm atalk Pq Dv AF_APPLETALK
292.Cm ddp
293.It Cm netgraph , ng Pq Dv AF_NETGRAPH
294.Cm ctrl , data
295.It Cm ipx Pq Dv AF_IPX
296.Cm ipx , spx
297.\".It Cm ns Pq Dv AF_NS
298.\".Cm idp , ns_err , spp
299.\".It Cm iso Pq Dv AF_ISO
300.\".Cm clnp , cltp , esis , tp
301.It Cm unix Pq Dv AF_UNIX
302.It Cm link Pq Dv AF_LINK
303.It Cm mpls Pq Dv AF_MPLS
304.El
305.Pp
306The program will complain if
307.Ar protocol
308is unknown or if there is no statistics routine for it.
309.It Fl l
310The
311.Fl l
312option is equivalent to
313.Fl W .
314.It Fl M
315Extract values associated with the name list from the specified core
316instead of the default
317.Pa /dev/kmem .
318.It Fl N
319Extract the name list from the specified system instead of the default,
320which is the kernel image the system has booted from.
321.It Fl n
322Show network addresses and ports as numbers.
323Normally
324.Nm
325attempts to resolve addresses and ports,
326and display them symbolically.
327.It Fl P
328Display additional protocol-specific information.  For TCP the current
329transmit window, unacked sequence space, and RTT is displayed.
330.It Fl W
331In certain displays, avoid truncating addresses even if this causes
332some fields to overflow.
333.El
334.Pp
335The default display, for active sockets, shows the local
336and remote addresses, send and receive queue sizes (in bytes), protocol,
337and the internal state of the protocol.
338Address formats are of the form
339.Dq host.port
340or
341.Dq network.port
342if a socket's address specifies a network but no specific host address.
343When known, the host and network addresses are displayed symbolically
344according to the databases
345.Xr hosts 5
346and
347.Xr networks 5 ,
348respectively.
349If a symbolic name for an address is unknown, or if
350the
351.Fl n
352option is specified, the address is printed numerically, according
353to the address family.
354For more information regarding
355the Internet IPv4
356.Dq dot format ,
357refer to
358.Xr inet 3 .
359Unspecified,
360or
361.Dq wildcard ,
362addresses and ports appear as
363.Dq Li * .
364.Pp
365The interface display provides a table of cumulative
366statistics regarding packets transferred, errors, and collisions.
367The network addresses of the interface
368and the maximum transmission unit
369.Pq Dq mtu
370are also displayed.
371.Pp
372The routing table display indicates the available routes and their status.
373Each route consists of a destination host or network, and a gateway to use
374in forwarding packets.
375The flags field shows a collection of information about the route stored
376as binary choices.
377The individual flags are discussed in more detail in the
378.Xr route 8
379and
380.Xr route 4
381manual pages.
382The mapping between letters and flags is:
383.Bl -column ".Li W" ".Dv RTF_WASCLONED"
384.It Li 1 Ta Dv RTF_PROTO1 Ta "Protocol specific routing flag #1"
385.It Li 2 Ta Dv RTF_PROTO2 Ta "Protocol specific routing flag #2"
386.It Li 3 Ta Dv RTF_PROTO3 Ta "Protocol specific routing flag #3"
387.It Li B Ta Dv RTF_BLACKHOLE Ta "Just discard pkts (during updates)"
388.It Li b Ta Dv RTF_BROADCAST Ta "The route represents a broadcast address"
389.It Li C Ta Dv RTF_CLONING Ta "Generate new routes on use"
390.It Li c Ta Dv RTF_PRCLONING Ta "Protocol-specified generate new routes on use"
391.It Li D Ta Dv RTF_DYNAMIC Ta "Created dynamically (by redirect)"
392.It Li G Ta Dv RTF_GATEWAY Ta "Destination requires forwarding by intermediary"
393.It Li H Ta Dv RTF_HOST Ta "Host entry (net otherwise)"
394.It Li L Ta Dv RTF_LLINFO Ta "Valid protocol to link address translation"
395.It Li M Ta Dv RTF_MODIFIED Ta "Modified dynamically (by redirect)"
396.It Li m Ta Dv RTF_MPLSOPS Ta "MPLS label operations"
397.It Li R Ta Dv RTF_REJECT Ta "Host or net unreachable"
398.It Li S Ta Dv RTF_STATIC Ta "Manually added"
399.It Li U Ta Dv RTF_UP Ta "Route usable"
400.It Li W Ta Dv RTF_WASCLONED Ta "Route was generated as a result of cloning"
401.It Li X Ta Dv RTF_XRESOLVE Ta "External daemon translates proto to link address"
402.El
403.Pp
404Direct routes are created for each
405interface attached to the local host;
406the gateway field for such entries shows the address of the outgoing interface.
407The refcnt field gives the
408current number of active uses of the route.
409Connection oriented
410protocols normally hold on to a single route for the duration of
411a connection while connectionless protocols obtain a route while sending
412to the same destination.
413The use field provides a count of the number of packets
414sent using that route.
415The interface entry indicates the network interface utilized for the route.
416.Pp
417When
418.Nm
419is invoked with the
420.Fl w
421option and a
422.Ar wait
423interval argument, it displays a running count of statistics related to
424network interfaces.
425An obsolescent version of this option used a numeric parameter
426with no option, and is currently supported for backward compatibility.
427By default, this display summarizes information for all interfaces.
428Information for a specific interface may be displayed with the
429.Fl I
430option.
431.Sh SEE ALSO
432.Xr fstat 1 ,
433.Xr nfsstat 1 ,
434.Xr ps 1 ,
435.Xr sockstat 1 ,
436.Xr inet 4 ,
437.Xr route 4 ,
438.Xr unix 4 ,
439.Xr hosts 5 ,
440.Xr networks 5 ,
441.Xr protocols 5 ,
442.Xr services 5 ,
443.Xr iostat 8 ,
444.Xr route 8 ,
445.Xr trpt 8 ,
446.Xr vmstat 8 ,
447.Xr mbuf 9
448.Sh HISTORY
449The
450.Nm
451command appeared in
452.Bx 4.2 .
453.Pp
454IPv6 support was added by WIDE/KAME project.
455.Sh BUGS
456The notion of errors is ill-defined.
457