mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-01-10 22:21:11 +08:00
Merge remote-tracking branch 'LCTT/master'
This commit is contained in:
commit
a973402858
@ -0,0 +1,92 @@
|
||||
[#]: collector: (lujun9972)
|
||||
[#]: translator: ( )
|
||||
[#]: reviewer: ( )
|
||||
[#]: publisher: ( )
|
||||
[#]: url: ( )
|
||||
[#]: subject: (MPLS Migration: How a KISS Transformed the WANs of 4 IT Managers)
|
||||
[#]: via: (https://www.networkworld.com/article/3447383/mpls-migration-how-a-kiss-transformed-the-wans-of-4-it-managers.html)
|
||||
[#]: author: (Cato Networks https://www.networkworld.com/author/Matt-Conran/)
|
||||
|
||||
MPLS Migration: How a KISS Transformed the WANs of 4 IT Managers
|
||||
======
|
||||
WAN transformation is challenging; learning from the experiences of others can help. Here are practical insights from four IT managers who migrated to SD-WAN.
|
||||
flytosky11
|
||||
|
||||
Back in 1960, a Lockheed engineer named Kelly Johnson coined the acronym KISS for “keep it simple stupid.” His wise—and simple—advice was that systems tend to work better when they’re simple than when they’re complex. KISS became an essential U.S. Navy design principle and captures the crux of any WAN transformation initiative.
|
||||
|
||||
So many of the challenges of today’s WANs stem from the sheer number of components involved. Each location may require one or more routers, firewalls, WAN optimizers, VPN concentrators, and other devices just to connect safely and effectively with other locations or the cloud. The result: multiple points of failure and a potential uptime and troubleshooting nightmare. Simply understanding the state of the WAN can be difficult with information spread across so many devices and components. Managing all the updates required to protect the network from new and evolving threats can be overwhelming.
|
||||
|
||||
Simplifying the enterprise backbone addresses those challenges. According to four IT managers, the key is to create a single global enterprise backbone that connects all users–mobile or fixed–and all locations–cloud or physical. The backbone’s software should include a complete security stack and WAN optimization to protect and enhance the performance of all “edges” everywhere. Such an approach avoids the complexity that comes with all the appliances and other solutions forming today enterprise networks.
|
||||
|
||||
The four IT managers did not use every aspect of this approach. Some focused on the global performance benefits and cost savings, others on security. But they all gained from the agility and visibility that result. Here are their stories.
|
||||
|
||||
**Pharmaceutical Firm Improves China Connectivity, Reduced Costs by Eliminating MPLS**
|
||||
|
||||
For [Centrient Pharmaceuticals][1], [SD-WAN][2] looked at first as if it might be just as complex as the company’s tangled Web of global MPLS and Internet VPNs. A global leader in sustainable antibiotics, next-generation statins, and antifungals, Centrient had relied on MPLS to connect its Netherlands data center with nine manufacturing and office locations across China, India, Netherlands, Spain, and Mexico. SAP, VoIP, and other Internet applications had to be backhauled through the data center. Local Internet breakouts secured by firewall hardware provided access to the public Internet, Office 365, and some other SaaS applications. Five smaller global locations had to connect via VPN to India or the Netherlands office.
|
||||
|
||||
Over time, MPLS became congested and performance suffered. “It took a long time for users to open documents,” said Mattheiu Cijsouw, Global IT Manager.
|
||||
|
||||
Agility suffered as well, as it typically took three to four months to move a location. “One time we needed to move a sales office and the MPLS connection was simply not ready in time,” Cijsouw said.
|
||||
|
||||
Cijsouw looked toward SD-WAN to simplify connectivity and cut costs but found that the typical solution of SD-WAN appliances at every location secured by firewalls and Secure Web Gateway (SWGs) was also complex, expensive, and dependent on the fickleness of the Internet middle mile. For him, the simplicity of a global, distributed, SLA-backed network of PoPS interconnected by an enterprise backbone seemed appealing. All it required was a simple, zero-touch appliance at each location to connect to the local PoP.
|
||||
|
||||
Cijsouw went with simple. “We migrated in stages, gaining confidence along the way,” he said.
|
||||
|
||||
The 6 Mbits/s of MPLS was replaced by 20 Mbits/s per site, burstable to 40 Mbits/s, and 50 Mbits/s burstable to 100 Mbits/s at the data center, all at lower cost than MPLS. Immediately applications became more responsive, China connectivity worked as well or better than with MPLS, and the cloud-based SD-WAN solution gave Cijsouw better visibility into the network.
|
||||
|
||||
**Paysafe Achieves Fast Application Access at Every Location**
|
||||
|
||||
Similarly, [Paysafe, a global provider of end-to-end payment solutions][3], had been connecting its 21 globally dispersed locations with a combination of MPLS and local Internet access at six locations and VPNs at the other 15. Depending on where staff members were, Internet connectivity could range from 25 Mbits/s to 500 Mbits/sec.
|
||||
|
||||
“We wanted the same access everywhere,” said Stuart Gall, then PaySafe’s Infrastructure Architect in its Network and Systems Groups. “If I’m in Calgary and go to any other office, the access must be the same—no need to RDP into a machine or VPN into the network.”
|
||||
|
||||
The lack of a fully meshed network also made Active Directory operation erratic, with users sometimes locked out of some accounts at one location but not another. Rolling out new locations took two to three months.
|
||||
|
||||
As with Centrient, a cloud-based SD-WAN solution using global PoPS and an enterprise backbone seemed a much simpler, less expensive, and more secure approach than the typical SD-WAN services offered by competing providers.
|
||||
|
||||
Paysafe has connected 11 sites to its enterprise backbone. “We found latency to be 45 percent less than with the public Internet,” said Gall. “New site deployment takes 30 minutes instead of weeks. Full meshing problems are no longer, as all locations instantly mesh once they connect.”
|
||||
|
||||
**Sanne Group Cleans Up WAN and Reduces Latency in the Process**
|
||||
|
||||
[Sanne Group, a global provider of alternative asset and corporate administrative services][4], had two data centers in Jersey and Guernsey UK connected by two 1Gbits/s fiber links, with seven locations connecting to the data centers via the public Internet. A Malta office connected via an IPsec VPN to Cape Town, which connected to Jersey via MPLS. A business continuity site in HIlgrove and two other UK locations connected to the data centers via dedicated fiber. Access for small office users consisted of a combination of Internet broadband, a small firewall appliance, and Citrix VDI.
|
||||
|
||||
Printing PDFs took forever, according to Nathan Trevor, Sanne Group’s IT Director, and the remote desktop architectures suffered from high latency and packet loss. Traffic from the Hong Kong office took 12 to 15 hops to get to the UK.
|
||||
|
||||
The company tried MPLS but found it too expensive. Deploying a site took up to 120 days. Trevor started looking at SD-WAN, but it was also complex.
|
||||
|
||||
“Even with zero-touch provisioning configuration was complicated,” he said. “IT professionals new to SD-WAN would definitely need handholding.”
|
||||
|
||||
The simplicity of the cloud-based global enterprise backbone solution was obvious. “Just looking at an early screen share I could understand how to connect my sites,” said Trevor.
|
||||
|
||||
Sanne connected its locations big and small to the enterprise backbone, eliminating the mess of Internet and MPLS connections. Performance improved immediately, with latency down by 20 percent. All users have to do to connect is log into their computers, and the solution has saved Sanne “an absolute fortune,” according to Trevor.
|
||||
|
||||
**Humphrey’s Eliminates MPLS and Embraces Freedom Easily**
|
||||
|
||||
As for [Humphrey’s and Partners, an architectural services firm][5], eight regional offices connected to its Dallas headquarters via a hybrid WAN and a ninth connected over the Internet. Three offices ran SD-WAN appliances connected to MPLS and the Internet. Another three connected via MPLS only. Two connected with SD-WAN and the Internet, and an office in Vietnam had to rely on file sharing and transfer to move data across the Internet to Dallas.
|
||||
|
||||
With MPLS, Humphrey’s needed three months to deploy at a new site. Even simple network changes took 24 hours, frequently requiring off-hours work. “Often the process involved waking me up in the middle of the night,” said IT Director Paul Burns.
|
||||
|
||||
Burns had tried deploying SD-WAN appliances in some locations, but “the configuration pages of the SD-WAN appliance were insane,” said Burns, and it was sometimes difficult to get WAN connections working properly. “Sometimes Dallas could connect to two sites, but they couldn’t connect to each other,” he said.
|
||||
|
||||
Burns deployed a global enterprise backbone solution at most locations, including Vietnam. Getting sites up and running took minutes or hours. “We dropped shipped devices to New Orleans, and I flew out to install the stuff. Took less than a day and the performance was great,” said Burns. “We set up Uruguay in less than 10 minutes. [The solution] gave us freedom.”
|
||||
|
||||
MPLS and VPNs can be very complex, but so can an SD-WAN replacement if it’s not architected carefully. For many organizations, a simpler approach is to connect and secure all users and locations with a global private backbone and software providing WAN optimization and a complete security stack. Such an approach fulfills the goals of KISS: performance, agility, and low cost.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: https://www.networkworld.com/article/3447383/mpls-migration-how-a-kiss-transformed-the-wans-of-4-it-managers.html
|
||||
|
||||
作者:[Cato Networks][a]
|
||||
选题:[lujun9972][b]
|
||||
译者:[译者ID](https://github.com/译者ID)
|
||||
校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||||
|
||||
[a]: https://www.networkworld.com/author/Matt-Conran/
|
||||
[b]: https://github.com/lujun9972
|
||||
[1]: https://www.catonetworks.com/customers/pharmaceutical-leader-replaces-mpls-with-cato-cloud-cutting-costs-while-quadrupling-capacity?utm_source=idg
|
||||
[2]: https://www.catonetworks.com/sd-wan?utm_source=idg
|
||||
[3]: https://www.catonetworks.com/customers/paysafe-replaces-global-mpls-network-and-internet-vpn-with-cato-cloud?utm_source=idg
|
||||
[4]: https://www.catonetworks.com/customers/sanne-group-replaces-internet-and-mpls-simplifying-citrix-access-and-improving-performance-with-cato-cloud?utm_source=idg
|
||||
[5]: https://www.catonetworks.com/customers/humphreys-replaces-mpls-sd-wan-appliances-and-mobile-vpn-with-cato-cloud?utm_source=idg
|
@ -0,0 +1,93 @@
|
||||
[#]: collector: (lujun9972)
|
||||
[#]: translator: ( )
|
||||
[#]: reviewer: ( )
|
||||
[#]: publisher: ( )
|
||||
[#]: url: ( )
|
||||
[#]: subject: (How SD-WAN is evolving into Secure Access Service Edge)
|
||||
[#]: via: (https://www.networkworld.com/article/3449136/how-sd-wan-is-evolving-into-secure-access-service-edge.html)
|
||||
[#]: author: (Zeus Kerravala https://www.networkworld.com/author/Zeus-Kerravala/)
|
||||
|
||||
How SD-WAN is evolving into Secure Access Service Edge
|
||||
======
|
||||
SASE, pronounced 'sassy,' combines elements of SD-WAN and network security into a single cloud-based service.
|
||||
Anya Berkut / Getty Images
|
||||
|
||||
SASE, pronounced "sassy," stands for secure access service edge, and it's being positioned by Gartner as the next big thing in enterprise networking. The technology category, which Gartner and other network experts first introduced earlier this year, converges the WAN edge and network security into a cloud-based, as-a-service delivery model. [According to Gartner][1], the convergence is driven by customer demands for simplicity, scalability, flexibility, low latency, and pervasive security.
|
||||
|
||||
### SASE brings together security and networking
|
||||
|
||||
A SASE implementation requires a comprehensive technology portfolio that only a few vendors can currently deliver. The technology is still in its infancy, with less than 1% adoption. There are a handful of existing [SD-WAN][2] providers, including Cato Networks, Juniper, Fortinet and Versa, that are expected to compete in the emerging SASE market. There will be other SD-WAN vendors jumping on this wagon, and the industry is likely to see another wave of startups.
|
||||
|
||||
**READ MORE:** [Gartner's top 10 strategic technology trends for 2020][3]
|
||||
|
||||
When networking and security devices are procured from different vendors, as is typical, the result is a complex network architecture that relies on the data center as the hub for enterprise applications. But with growing digital business and edge computing requirements, organizations are no longer primarily accessing their apps and services from within the data center. This approach is ineffective for organizations that are shifting to cloud services.
|
||||
|
||||
[][4]
|
||||
|
||||
BrandPost Sponsored by HPE
|
||||
|
||||
[Take the Intelligent Route with Consumption-Based Storage][4]
|
||||
|
||||
Combine the agility and economics of HPE storage with HPE GreenLake and run your IT department with efficiency.
|
||||
|
||||
### Existing network and security models to become obsolete? Not so fast
|
||||
|
||||
An architectural transformation of the traditional data center-centric networking and security is underway to better meet the needs of today’s mobile workforces. Gartner predicts that the adoption of SASE will take place over the next five to 10 years, rendering existing network and security models obsolete.
|
||||
|
||||
In my opinion, the term "obsolete" is a bit aggressive, but I do agree there is a need to bring networking and security together. Having them be procured and managed by separate teams is inefficient and leads to inconsistencies and blind spots. SD-WANs enable a number of new design principals, such as direct to cloud or user access, and necessitate the need for a new architecture – enter SASE.
|
||||
|
||||
SASE combines elements of SD-WAN and network security into a single cloud-based service. It supports all types of edges, including WAN, mobile, cloud, and edge computing. So, instead of connecting a branch to the central office, it connects individual users and devices to a centralized cloud-based service. With this model, the endpoint is the individual user, device, or application, not the data center.
|
||||
|
||||
### Cloud delivery benefits
|
||||
|
||||
The cloud delivery-based approach benefits providers with many points of presence. Gartner highlighted a number of advantages of this approach, such as:
|
||||
|
||||
* There are limited endpoint functions like routing and path selection, with the rest delivered as a service from the cloud.
|
||||
* Due to the thinner stack, functions can be provided via software without requiring dedicated hardware.
|
||||
* New endpoints such as pop-up stores can be added quickly.
|
||||
* Since SASE favors cloud-based delivery, vendors can add new services to the stack faster.
|
||||
* Common policies are shared by branch offices and individual devices. The policies are also more consistent and can be managed through a cloud-based console from one vendor.
|
||||
* The overall infrastructure is simpler and less expensive for an organization to manage.
|
||||
* Emerging latency-sensitive apps, such as the IoT edge to edge, can be supported even if the endpoints have minimal local resources.
|
||||
* Malware, decryption, and management is performed within SASE, and organizations can scale up or down based on their needs.
|
||||
|
||||
|
||||
|
||||
### Agility is the biggest benefit SASE brings
|
||||
|
||||
These advantages are all true, but Gartner missed the biggest advantage, and that’s increased agility to accelerate business velocity. SASE makes security intrinsic in the network and, if architected correctly, organizations should not have to hold up the rollout of new apps and services while the security implications are being figured out. Instead, with security being "baked in," companies can be as aggressive as they want and know the environment is secure. Speed is the new currency of business, and SASE lets companies move faster.
|
||||
|
||||
### SASE is identify driven instead of location driven
|
||||
|
||||
In addition to being cloud native, SASE is identity driven instead of location driven. An identity is attached to every person, application, service, or device within an organization. The convergence of networking and security allows an identity to follow a person or device wherever they need access and makes the experience seamless for the user.
|
||||
|
||||
Think of this scenario: An employee working remotely on an unmanaged laptop needs to connect to Salesforce, which is hosted on its own cloud. Traditionally, an administrator would go through many steps to authenticate a user and connect them to a virtual private network (VPN). But with a single identity, a remote employee could access Salesforce or any other app seamlessly, regardless of their device, location, or network.
|
||||
|
||||
SASE addresses new security demands networks face from a variety of sources. The core capabilities of SASE include multifactor authentication and access to applications and services controlled by firewall policies. Therefore, users can only access authorized applications without entering the general network. SASE can also detect sensitive data and stop it from leaving the network by applying specific data loss prevention rules.
|
||||
|
||||
In the [report][1], Gartner does caution that some vendors will attempt to satisfy customers by combining separate products together or by acquiring appliance-based point products that are then hosted in the cloud, which is likely to result in higher latency and poor performance. This shouldn’t be a surprise as this is how legacy vendors have attacked new markets in the past. Industry people often refer to this as “sheet metal” integration, where a vendor essentially tosses a number of capabilities into a single appliance and makes it looks integrated – but it’s not. Buyers need to ensure the vendor is delivering an integrated, cloud-native set of services to be delivered on demand. Organizations can begin transitioning to SASE with a WAN makeover and by gradually retiring their legacy network security appliance.
|
||||
|
||||
(Gartner defines and discusses demand for SASE in its 2019 [Hype Cycle for Enterprise Networking][1]; this post by [Cato][5] effectively summarizes SASE without having to read the entire Gartner report.)
|
||||
|
||||
Join the Network World communities on [Facebook][6] and [LinkedIn][7] to comment on topics that are top of mind.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: https://www.networkworld.com/article/3449136/how-sd-wan-is-evolving-into-secure-access-service-edge.html
|
||||
|
||||
作者:[Zeus Kerravala][a]
|
||||
选题:[lujun9972][b]
|
||||
译者:[译者ID](https://github.com/译者ID)
|
||||
校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||||
|
||||
[a]: https://www.networkworld.com/author/Zeus-Kerravala/
|
||||
[b]: https://github.com/lujun9972
|
||||
[1]: https://www.gartner.com/doc/3947237
|
||||
[2]: https://www.networkworld.com/article/3031279/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html
|
||||
[3]: https://www.networkworld.com/article/3447401/gartner-top-10-strategic-technology-trends-for-2020.html
|
||||
[4]: https://www.networkworld.com/article/3440100/take-the-intelligent-route-with-consumption-based-storage.html?utm_source=IDG&utm_medium=promotions&utm_campaign=HPE20773&utm_content=sidebar ( Take the Intelligent Route with Consumption-Based Storage)
|
||||
[5]: https://www.catonetworks.com/blog/the-secure-access-service-edge-sase-as-described-in-gartners-hype-cycle-for-enterprise-networking-2019/
|
||||
[6]: https://www.facebook.com/NetworkWorld/
|
||||
[7]: https://www.linkedin.com/company/network-world
|
@ -1,5 +1,5 @@
|
||||
[#]: collector: (lujun9972)
|
||||
[#]: translator: ( )
|
||||
[#]: translator: (geekpi)
|
||||
[#]: reviewer: ( )
|
||||
[#]: publisher: ( )
|
||||
[#]: url: ( )
|
||||
|
@ -0,0 +1,222 @@
|
||||
[#]: collector: (lujun9972)
|
||||
[#]: translator: ( )
|
||||
[#]: reviewer: ( )
|
||||
[#]: publisher: ( )
|
||||
[#]: url: ( )
|
||||
[#]: subject: (Viewing network bandwidth usage with bmon)
|
||||
[#]: via: (https://www.networkworld.com/article/3447936/viewing-network-bandwidth-usage-with-bmon.html)
|
||||
[#]: author: (Sandra Henry-Stocker https://www.networkworld.com/author/Sandra-Henry_Stocker/)
|
||||
|
||||
Viewing network bandwidth usage with bmon
|
||||
======
|
||||
Introducing bmon, a monitoring and debugging tool that captures network statistics and makes them easily digestible.
|
||||
Sandra Henry-Stocker
|
||||
|
||||
Bmon is a monitoring and debugging tool that runs in a terminal window and captures network statistics, offering options on how and how much data will be displayed and displayed in a form that is easy to understand.
|
||||
|
||||
To check if **bmon** is installed on your system, use the **which** command:
|
||||
|
||||
```
|
||||
$ which bmon
|
||||
/usr/bin/bmon
|
||||
```
|
||||
|
||||
### Getting bmon
|
||||
|
||||
On Debian systems, use **sudo apt-get install bmon** to install the tool.
|
||||
|
||||
[][1]
|
||||
|
||||
BrandPost Sponsored by HPE
|
||||
|
||||
[Take the Intelligent Route with Consumption-Based Storage][1]
|
||||
|
||||
Combine the agility and economics of HPE storage with HPE GreenLake and run your IT department with efficiency.
|
||||
|
||||
For Red Hat and related distributions, you might be able to install with **yum install bmon** or **sudo dnf install bmon**. Alternately, you may have to resort to a more complex install with commands like these that first set up the required **libconfuse** using the root account or sudo:
|
||||
|
||||
```
|
||||
# wget https://github.com/martinh/libconfuse/releases/download/v3.2.2/confuse-3.2.2.zip
|
||||
# unzip confuse-3.2.2.zip && cd confuse-3.2.2
|
||||
# sudo PATH=/usr/local/opt/gettext/bin:$PATH ./configure
|
||||
# make
|
||||
# make install
|
||||
# git clone https://github.com/tgraf/bmon.git &&ammp; cd bmon
|
||||
# ./autogen.sh
|
||||
# ./configure
|
||||
# make
|
||||
# sudo make install
|
||||
```
|
||||
|
||||
The first five lines will install **libconfuse** and the second five will grab and install **bmon** itself.
|
||||
|
||||
### Using bmon
|
||||
|
||||
The simplest way to start **bmon** is simply to type **bmon** on the command line. Depending on the size of the window you are using, you will be able to see and bring up a variety of data.
|
||||
|
||||
The top portion of your display will display stats on your network interfaces – the loopback (lo) and network-accessible (e.g., eth0). If you terminal window has few lines, this is all you may see, and it will look something like this:
|
||||
|
||||
[RELATED: 11 pointless but awesome Linux terminal tricks][2]
|
||||
|
||||
```
|
||||
lo bmon 4.0
|
||||
Interfaces x RX bps pps %x TX bps pps %
|
||||
>lo x 4B0 x0 0 0 4B 0
|
||||
qdisc none (noqueue) x 0 0 x 0 0
|
||||
enp0s25 x 244B0 x1 0 0 470B 2
|
||||
qdisc none (fq_codel) x 0 0 x 0 0 462B 2
|
||||
q Increase screen height to see graphical statistics qq
|
||||
|
||||
|
||||
q Press d to enable detailed statistics qq
|
||||
q Press i to enable additional information qq
|
||||
Wed Oct 23 14:36:27 2019 Press ? for help
|
||||
```
|
||||
|
||||
In this example, the network interface is enp0s25. Notice the helpful "Increase screen height" hint below the listed interfaces. Stretch your screen to add sufficient lines (no need to restart bmon) and you will see some graphs:
|
||||
|
||||
```
|
||||
Interfaces x RX bps pps %x TX bps pps %
|
||||
>lo x 0 0 x 0 0
|
||||
qdisc none (noqueue) x 0 0 x 0 0
|
||||
enp0s25 x 253B 3 x 2.65KiB 6
|
||||
qdisc none (fq_codel) x 0 0 x 2.62KiB 6
|
||||
qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqvqqqqqqqqqqqqqqqqqqqqqqqvqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq
|
||||
(RX Bytes/second)
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
1 5 10 15 20 25 30 35 40 45 50 55 60
|
||||
(TX Bytes/second)
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
0.00 ............................................................
|
||||
1 5 10 15 20 25 30 35 40 45 50 55 60
|
||||
```
|
||||
|
||||
Notice, however, that the graphs are not showing values. This is because it is displaying the loopback **>lo** interface. Arrow your way down to the public network interface and you will see some traffic.
|
||||
|
||||
```
|
||||
Interfaces x RX bps pps %x TX bps pps %
|
||||
lo x 0 0 x 0 0
|
||||
qdisc none (noqueue) x 0 0 x 0 0
|
||||
>enp0s25 x 151B 2 x 1.61KiB 3
|
||||
qdisc none (fq_codel) x 0 0 x 1.60KiB 3
|
||||
qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqvqqqqqqqqqqqqqqqqqqqqqqqvqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq
|
||||
B (RX Bytes/second)
|
||||
635.00 ...............................|............................
|
||||
529.17 .....|.........................|....|.......................
|
||||
423.33 .....|................|..|..|..|..|.|.......................
|
||||
317.50 .|..||.|..||.|..|..|..|..|..|..||.||||......................
|
||||
211.67 .|..||.|..||.|..||||.||.|||.||||||||||......................
|
||||
105.83 ||||||||||||||||||||||||||||||||||||||......................
|
||||
1 5 10 15 20 25 30 35 40 45 50 55 60
|
||||
KiB (TX Bytes/second)
|
||||
4.59 .....................................|......................
|
||||
3.83 .....................................|......................
|
||||
3.06 ....................................||......................
|
||||
2.30 ....................................||......................
|
||||
1.53 |||..............|..|||.|...|.|||.||||......................
|
||||
0.77 ||||||||||||||||||||||||||||||||||||||......................
|
||||
1 5 10 15 20 25 30 35 40 45 50 55 60
|
||||
|
||||
|
||||
q Press d to enable detailed statistics qq
|
||||
q Press i to enable additional information qq
|
||||
Wed Oct 23 16:42:06 2019 Press ? for help
|
||||
```
|
||||
|
||||
The change allows you to view a graph displaying network traffic. Note, however, that the default is to display bytes per second. To display bits per second instead, you would start the tool using **bmon -b**
|
||||
|
||||
Detailed statistics on network traffic can be displayed if your window is large enough and you press **d**. An example of the stats you will see is displayed below. This display was split into left and right portions because of its width.
|
||||
|
||||
##### left side:
|
||||
|
||||
```
|
||||
RX TX │ RX TX │
|
||||
Bytes 11.26MiB 11.26MiB│ Packets 25.91K 25.91K │
|
||||
Collisions - 0 │ Compressed 0 0 │
|
||||
Errors 0 0 │ FIFO Error 0 0 │
|
||||
ICMPv6 2 2 │ ICMPv6 Checksu 0 - │
|
||||
Ip6 Broadcast 0 0 │ Ip6 Broadcast 0 0 │
|
||||
Ip6 Delivers 8 - │ Ip6 ECT(0) Pac 0 - │
|
||||
Ip6 Header Err 0 - │ Ip6 Multicast 0 152B │
|
||||
Ip6 Non-ECT Pa 8 - │ Ip6 Reasm/Frag 0 0 │
|
||||
Ip6 Reassembly 0 - │ Ip6 Too Big Er 0 - │
|
||||
Ip6Discards 0 0 │ Ip6Octets 530B 530B │
|
||||
Missed Error 0 - │ Multicast - 0 │
|
||||
Window Error - 0 │ │
|
||||
```
|
||||
|
||||
##### right side
|
||||
|
||||
```
|
||||
│ RX TX │ RX TX
|
||||
│ Abort Error - 0 │ Carrier Error - 0
|
||||
│ CRC Error 0 - │ Dropped 0 0
|
||||
│ Frame Error 0 - │ Heartbeat Erro -
|
||||
│ ICMPv6 Errors 0 0 │ Ip6 Address Er 0 -
|
||||
│ Ip6 CE Packets 0 - │ Ip6 Checksum E 0 -
|
||||
│ Ip6 ECT(1) Pac 0 - │ Ip6 Forwarded - 0
|
||||
│ Ip6 Multicast 0 2 │ Ip6 No Route 0 0
|
||||
│ Ip6 Reasm/Frag 0 0 │ Ip6 Reasm/Frag 0 0
|
||||
│ Ip6 Truncated 0 - │ Ip6 Unknown Pr 0 -
|
||||
│ Ip6Pkts 8 8 │ Length Error 0
|
||||
│ No Handler 0 - │ Over Error 0 -
|
||||
```
|
||||
|
||||
Additional information on the network interface will be displayed if you press **i**
|
||||
|
||||
##### left side:
|
||||
|
||||
```
|
||||
MTU 1500 | Flags broadcast,multicast,up |
|
||||
Address 00:1d:09:77:9d:08 | Broadcast ff:ff:ff:ff:ff:ff |
|
||||
Family unspec | Alias |
|
||||
```
|
||||
|
||||
##### right side:
|
||||
|
||||
```
|
||||
| Operstate up | IfIndex 2 |
|
||||
| Mode default | TXQlen 1000 |
|
||||
| Qdisc fq_codel |
|
||||
```
|
||||
|
||||
A help menu will appear if you press **?** with brief descriptions of how to move around the screen, select data to be displayed and control the graphs.
|
||||
|
||||
To quit **bmon**, you would type **q** and then **y** in response to the prompt to confirm your choice to exit.
|
||||
|
||||
Some of the important things to note are that:
|
||||
|
||||
* **bmon** adjusts its display to the size of the terminal window
|
||||
* some of the choices shown at the bottom of the display will only function if the window is large enough to accomodate the data
|
||||
* the display is updated every second unless you slow this down using the **-R** (e.g., **bmon -R 5)** option
|
||||
|
||||
|
||||
|
||||
Join the Network World communities on [Facebook][3] and [LinkedIn][4] to comment on topics that are top of mind.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
via: https://www.networkworld.com/article/3447936/viewing-network-bandwidth-usage-with-bmon.html
|
||||
|
||||
作者:[Sandra Henry-Stocker][a]
|
||||
选题:[lujun9972][b]
|
||||
译者:[译者ID](https://github.com/译者ID)
|
||||
校对:[校对者ID](https://github.com/校对者ID)
|
||||
|
||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||||
|
||||
[a]: https://www.networkworld.com/author/Sandra-Henry_Stocker/
|
||||
[b]: https://github.com/lujun9972
|
||||
[1]: https://www.networkworld.com/article/3440100/take-the-intelligent-route-with-consumption-based-storage.html?utm_source=IDG&utm_medium=promotions&utm_campaign=HPE20773&utm_content=sidebar ( Take the Intelligent Route with Consumption-Based Storage)
|
||||
[2]: https://www.networkworld.com/article/2926630/linux/11-pointless-but-awesome-linux-terminal-tricks.html#tk.nww-fsb
|
||||
[3]: https://www.facebook.com/NetworkWorld/
|
||||
[4]: https://www.linkedin.com/company/network-world
|
Loading…
Reference in New Issue
Block a user