- Last edited one year ago ago
Man Page at ping(8)
ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of pad bytes used to fill out the packet.
Please refer to the dedicated page ifconfig
Man page at route(8)
route command is used to show/manipulate the IP routing table. It is primarily used to setup static routes to specific host or networks via an interface.
Man page at traceroute(8)
traceroute is a built-in tool for displaying the route and measuring the delay of packets across a network.
Please refer to the dedicated page netstat
Please refer to the dedicated page ip
Man page at ethtool(8)
ethtool utility is used to view and change the ethernet device parameters.
Man page at iw(8)
iw utility is used to view and change the wireless device parameters.
Man page at wpa_supplicant
wpa_supplicant is a WPA Supplicant for Linux, BSD, Mac OS X, and Windows with support for WPA and WPA2 (IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming as well as IEEE 802.11 authentication/association of the wlan driver.
Man page at brctl(8)
brctl is used to set up, maintain, and inspect the ethernet bridge configuration in the linux kernel. An ethernet bridge is a device commonly used to connect different physical Ethernet networks together, so that these physical networks appear as one unified network to the users.
Man page at iptables(8)
iptables is an administration tool for IPv4 packet filtering and NAT.
It is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains.
Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a 'target', which may be a jump to a user-defined chain in the same table.
Man page at