1 .\" Copyright (c) 1983, 1990, 1992, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 4. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" @(#)netstat.1 8.8 (Berkeley) 4/18/94
36 .Nd show network status
40 command symbolically displays the contents of various network-related
42 There are a number of output formats,
43 depending on the options for the information presented.
44 .Bl -tag -width indent
49 .Op Fl f Ar protocol_family | Fl p Ar protocol
54 Display a list of active sockets
55 (protocol control blocks)
56 for each network protocol,
64 show the address of a protocol control block (PCB)
65 associated with a socket; used for debugging.
69 show the state of all sockets;
70 normally sockets used by server processes are not shown.
74 show the size of the various listen queues.
75 The first count shows the number of unaccepted connections,
76 the second count shows the amount of unaccepted incomplete connections,
77 and the third count is the maximum number of queued connections.
81 show network addresses as numbers (as with
83 but show ports symbolically.
86 is present, display socket buffer and tcp timer statistics for each internet socket.
89 is present, display information from the TCP control block, including
90 retransmits, out-of-order packets received, and zero-sized windows advertised.
94 .Fl i | I Ar interface
96 .Op Fl f Ar address_family
99 Show the state of all network interfaces or a single
101 which have been auto-configured
102 (interfaces statically configured into a system, but not
103 located at boot time are not shown).
106 after an interface name indicates that the interface is
110 is also present, multicast addresses currently in use are shown
111 for each Ethernet interface and for each IP interface address.
112 Multicast addresses are shown on separate lines following the interface
113 address with which they are associated.
116 is also present, show the number of bytes in and out.
119 is also present, show the number of dropped packets.
122 is also present, print all counters in human readable form.
125 is also present, print interface names using a wider field size.
130 .Op Fl I Ar interface
140 display the information regarding packet
141 traffic on all configured network interfaces
146 is also present, exit after
151 is also present, show the number of dropped packets.
157 .Op Fl f Ar protocol_family | Fl p Ar protocol
162 Display system-wide statistics for each network protocol,
164 .Ar protocol_family ,
169 is repeated, counters with a value of zero are suppressed.
172 is also present, reset statistic counters after displaying them.
176 .Fl i | I Ar interface Fl s
177 .Op Fl f Ar protocol_family | Fl p Ar protocol
182 Display per-interface statistics for each network protocol,
184 .Ar protocol_family ,
195 Show statistics recorded by the memory management routines
197 The network manages a private pool of memory buffers.
203 .Op Fl I Ar interface
206 Show statistics about
209 This includes information like
210 how many packets have been matched, dropped and received by the
211 bpf device, also information about current buffer sizes and device
219 .Op Fl f Ar address_family
224 Display the contents of routing tables.
227 is specified, a routing table for a particular
232 is specified, a routing table with the number
240 the default routing table is displayed.
244 show the contents of the internal Patricia tree
245 structures; used for debugging.
249 show protocol-cloned routes
250 (routes generated by an
253 normally these routes are not shown.
271 Display routing statistics.
274 is repeated, counters with a value of zero are suppressed.
280 .Op Fl f Ar address_family
285 Display the contents of the multicast virtual interface tables,
286 and multicast forwarding caches.
287 Entries in these tables will appear only when the kernel is
288 actively forwarding multicast sessions.
289 This option is applicable only to the
299 .Op Fl f Ar address_family
304 Show multicast routing statistics.
307 is repeated, counters with a value of zero are suppressed.
317 The flags field shows available ISR handlers:
318 .Bl -column ".Li W" ".Dv NETISR_SNP_FLAGS_DRAINEDCPU"
319 .It Li C Ta Dv NETISR_SNP_FLAGS_M2CPUID Ta "Able to map mbuf to cpu id"
320 .It Li D Ta Dv NETISR_SNP_FLAGS_DRAINEDCPU Ta "Has queue drain handler"
321 .It Li F Ta Dv NETISR_SNP_FLAGS_M2FLOW Ta "Able to map mbuf to flow id"
325 Some options have the general meaning:
327 .It Fl f Ar address_family , Fl p Ar protocol
328 Limit display to those records
333 The following address families and protocols are recognized:
335 .Bl -tag -width ".Cm netgraph , ng Pq Dv AF_NETGRAPH" -compact
338 .It Cm inet Pq Dv AF_INET
339 .Cm divert , icmp , igmp , ip , ipsec , pim, sctp , tcp , udp
340 .It Cm inet6 Pq Dv AF_INET6
341 .Cm icmp6 , ip6 , ipsec6 , rip6 , tcp , udp
342 .It Cm pfkey Pq Dv PF_KEY
344 .It Cm atalk Pq Dv AF_APPLETALK
346 .It Cm netgraph , ng Pq Dv AF_NETGRAPH
348 .It Cm ipx Pq Dv AF_IPX
350 .\".It Cm ns Pq Dv AF_NS
351 .\".Cm idp , ns_err , spp
352 .\".It Cm iso Pq Dv AF_ISO
353 .\".Cm clnp , cltp , esis , tp
354 .It Cm unix Pq Dv AF_UNIX
355 .It Cm link Pq Dv AF_LINK
358 The program will complain if
360 is unknown or if there is no statistics routine for it.
362 Extract values associated with the name list from the specified core
363 instead of the default
366 Extract the name list from the specified system instead of the default,
367 which is the kernel image the system has booted from.
369 Show network addresses and ports as numbers.
372 attempts to resolve addresses and ports,
373 and display them symbolically.
375 In certain displays, avoid truncating addresses even if this causes
376 some fields to overflow.
379 The default display, for active sockets, shows the local
380 and remote addresses, send and receive queue sizes (in bytes), protocol,
381 and the internal state of the protocol.
382 Address formats are of the form
386 if a socket's address specifies a network but no specific host address.
387 When known, the host and network addresses are displayed symbolically
388 according to the databases
393 If a symbolic name for an address is unknown, or if
396 option is specified, the address is printed numerically, according
397 to the address family.
398 For more information regarding
406 addresses and ports appear as
409 The interface display provides a table of cumulative
410 statistics regarding packets transferred, errors, and collisions.
411 The network addresses of the interface
412 and the maximum transmission unit
416 The routing table display indicates the available routes and their status.
417 Each route consists of a destination host or network, and a gateway to use
418 in forwarding packets.
419 The flags field shows a collection of information about the route stored
421 The individual flags are discussed in more detail in the
426 The mapping between letters and flags is:
427 .Bl -column ".Li W" ".Dv RTF_WASCLONED"
428 .It Li 1 Ta Dv RTF_PROTO1 Ta "Protocol specific routing flag #1"
429 .It Li 2 Ta Dv RTF_PROTO2 Ta "Protocol specific routing flag #2"
430 .It Li 3 Ta Dv RTF_PROTO3 Ta "Protocol specific routing flag #3"
431 .It Li B Ta Dv RTF_BLACKHOLE Ta "Just discard pkts (during updates)"
432 .It Li b Ta Dv RTF_BROADCAST Ta "The route represents a broadcast address"
433 .It Li C Ta Dv RTF_CLONING Ta "Generate new routes on use"
434 .It Li c Ta Dv RTF_PRCLONING Ta "Protocol-specified generate new routes on use"
435 .It Li D Ta Dv RTF_DYNAMIC Ta "Created dynamically (by redirect)"
436 .It Li G Ta Dv RTF_GATEWAY Ta "Destination requires forwarding by intermediary"
437 .It Li H Ta Dv RTF_HOST Ta "Host entry (net otherwise)"
438 .It Li L Ta Dv RTF_LLINFO Ta "Valid protocol to link address translation"
439 .It Li M Ta Dv RTF_MODIFIED Ta "Modified dynamically (by redirect)"
440 .It Li R Ta Dv RTF_REJECT Ta "Host or net unreachable"
441 .It Li S Ta Dv RTF_STATIC Ta "Manually added"
442 .It Li U Ta Dv RTF_UP Ta "Route usable"
443 .It Li W Ta Dv RTF_WASCLONED Ta "Route was generated as a result of cloning"
444 .It Li X Ta Dv RTF_XRESOLVE Ta "External daemon translates proto to link address"
447 Direct routes are created for each
448 interface attached to the local host;
449 the gateway field for such entries shows the address of the outgoing interface.
450 The refcnt field gives the
451 current number of active uses of the route.
453 protocols normally hold on to a single route for the duration of
454 a connection while connectionless protocols obtain a route while sending
455 to the same destination.
456 The use field provides a count of the number of packets
457 sent using that route.
458 The interface entry indicates the network interface utilized for the route.
466 interval argument, it displays a running count of statistics related to
468 An obsolescent version of this option used a numeric parameter
469 with no option, and is currently supported for backward compatibility.
470 By default, this display summarizes information for all interfaces.
471 Information for a specific interface may be displayed with the
481 option represent the underlying parameters of the bpf peer.
483 represented as a single lower case letter.
484 The mapping between the letters and flags in order of appearance are:
486 .It Li p Ta Set if listening promiscuously
487 .It Li i Ta Dv BIOCIMMEDIATE No has been set on the device
488 .It Li f Ta Dv BIOCGHDRCMPLT No status: source link addresses are being
490 .It Li s Ta Dv BIOCGSEESENT No status: see packets originating locally and
491 remotely on the interface.
492 .It Li a Ta Packet reception generates a signal
493 .It Li l Ta Dv BIOCLOCK No status: descriptor has been locked
496 For more information about these flags, please refer to
503 to output all the information recorded about data
504 stored in the socket buffers.
506 .Bl -column ".Li R-MBUF"
507 .It Li R-MBUF Ta Number of mbufs in the receive queue.
508 .It Li S-MBUF Ta Number of mbufs in the send queue.
509 .It Li R-CLUS Ta Number of clusters, of any type, in the receive
511 .It Li S-CLUS Ta Number of clusters, of any type, in the send queue.
512 .It Li R-HIWA Ta Receive buffer high water mark, in bytes.
513 .It Li S-HIWA Ta Send buffer high water mark, in bytes.
514 .It Li R-LOWA Ta Receive buffer low water mark, in bytes.
515 .It Li S-LOWA Ta Send buffer low water mark, in bytes.
516 .It Li R-BCNT Ta Receive buffer byte count.
517 .It Li S-BCNT Ta Send buffer byte count.
518 .It Li R-BMAX Ta Maximum bytes that can be used in the receive buffer.
519 .It Li S-BMAX Ta Maximum bytes that can be used in the send buffer.
546 IPv6 support was added by WIDE/KAME project.
548 The notion of errors is ill-defined.