xref: /freebsd/usr.bin/netstat/netstat.1 (revision 2e3507c25e42292b45a5482e116d278f5515d04d)
1.\" Copyright (c) 1983, 1990, 1992, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. Neither the name of the University nor the names of its contributors
13.\"    may be used to endorse or promote products derived from this software
14.\"    without specific prior written permission.
15.\"
16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.Dd August 14, 2023
29.Dt NETSTAT 1
30.Os
31.Sh NAME
32.Nm netstat
33.Nd show network status and statistics
34.Sh SYNOPSIS
35.Bk -words
36.Bl -tag -width "netstat"
37.It Nm
38.Op Fl j Ar jail
39.Op Fl -libxo
40.Op Fl 46AaCLnPRSTWx
41.Op Fl f Ar protocol_family | Fl p Ar protocol
42.It Nm Fl i | I Ar interface
43.Op Fl j Ar jail
44.Op Fl -libxo
45.Op Fl 46abdhnW
46.Op Fl f Ar address_family
47.Op Fl M Ar core
48.Op Fl N Ar system
49.It Nm Fl w Ar wait
50.Op Fl j Ar jail
51.Op Fl -libxo
52.Op Fl I Ar interface
53.Op Fl 46d
54.Op Fl M Ar core
55.Op Fl N Ar system
56.Op Fl q Ar howmany
57.It Nm Fl s
58.Op Fl j Ar jail
59.Op Fl -libxo
60.Op Fl 46sz
61.Op Fl f Ar protocol_family | Fl p Ar protocol
62.Op Fl M Ar core
63.Op Fl N Ar system
64.It Nm Fl i | I Ar interface Fl s
65.Op Fl j Ar jail
66.Op Fl -libxo
67.Op Fl 46s
68.Op Fl f Ar protocol_family | Fl p Ar protocol
69.Op Fl M Ar core
70.Op Fl N Ar system
71.It Nm Fl m
72.Op Fl j Ar jail
73.Op Fl -libxo
74.Op Fl M Ar core
75.Op Fl N Ar system
76.It Nm Fl B
77.Op Fl j Ar jail
78.Op Fl -libxo
79.Op Fl z
80.Op Fl I Ar interface
81.It Nm Fl r
82.Op Fl j Ar jail
83.Op Fl -libxo
84.Op Fl 46nW
85.Op Fl F Ar fibnum
86.Op Fl f Ar address_family
87.It Nm Fl rs
88.Op Fl j Ar jail
89.Op Fl -libxo
90.Op Fl s
91.Op Fl M Ar core
92.Op Fl N Ar system
93.It Nm Fl g
94.Op Fl j Ar jail
95.Op Fl -libxo
96.Op Fl 46W
97.Op Fl f Ar address_family
98.It Nm Fl gs
99.Op Fl j Ar jail
100.Op Fl -libxo
101.Op Fl 46s
102.Op Fl f Ar address_family
103.Op Fl M Ar core
104.Op Fl N Ar system
105.It Nm Fl Q
106.Op Fl j Ar jail
107.Op Fl -libxo
108.El
109.Ek
110.Sh DESCRIPTION
111The
112.Nm
113command shows the contents of various network-related
114data structures.
115The arguments passed determine which of the below output formats the
116command uses.
117.Bl -tag -width indent
118.It Xo
119.Bk -words
120.Nm
121.Op Fl 46AaCLnRSTWx
122.Op Fl f Ar protocol_family | Fl p Ar protocol
123.Op Fl j Ar jail
124.Ek
125.Xc
126Display a list of active sockets
127(protocol control blocks)
128for each network protocol.
129.Pp
130The default display for active sockets shows the local
131and remote addresses, send and receive queue sizes (in bytes), protocol,
132and the internal state of the protocol.
133Address formats are of the form
134.Dq host.port
135or
136.Dq network.port
137if a socket's address specifies a network but no specific host address.
138When known, the host and network addresses are displayed symbolically
139according to the databases
140.Xr hosts 5
141and
142.Xr networks 5 ,
143respectively.
144If a symbolic name for an address is unknown, or if
145the
146.Fl n
147option is specified, the address is printed numerically, according
148to the address family.
149For more information regarding
150the Internet IPv4
151.Dq dot format ,
152refer to
153.Xr inet 3 .
154Unspecified,
155or
156.Dq wildcard ,
157addresses and ports appear as
158.Dq Li * .
159.Bl -tag -width indent
160.It Fl -libxo
161Generate output via
162.Xr libxo 3
163in a selection of different human and machine readable formats.
164See
165.Xr xo_parse_args 3
166for details on command line arguments.
167.It Fl 4
168Show IPv4 only.
169See
170.Sx GENERAL OPTIONS .
171.It Fl 6
172Show IPv6 only.
173See
174.Sx GENERAL OPTIONS .
175.It Fl A
176Show the address of a protocol control block (PCB)
177associated with a socket; used for debugging.
178.It Fl a
179Show the state of all sockets;
180normally sockets used by server processes are not shown.
181.It Fl c
182Show the used TCP stack for each session.
183.It Fl C
184Show the congestion control algorithm and diagnostic information of TCP sockets.
185.It Fl L
186Show the size of the various listen queues.
187The first count shows the number of unaccepted connections,
188the second count shows the amount of unaccepted incomplete connections,
189and the third count is the maximum number of queued connections.
190.It Fl n
191Do not resolve numeric addresses and port numbers to names.
192See
193.Sx GENERAL OPTIONS .
194.It Fl P
195Display the log ID for each socket.
196.It Fl R
197Display the flowid and flowtype for each socket.
198flowid is a 32 bit hardware specific identifier for each flow.
199flowtype defines which protocol fields are hashed to produce the id.
200A complete listing is available in
201.Pa sys/mbuf.h
202under
203.Dv M_HASHTYPE_* .
204.It Fl S
205Show network addresses as numbers (as with
206.Fl n )
207but show ports symbolically.
208.It Fl T
209Display diagnostic information from the TCP control block.
210Fields include the number of packets requiring retransmission,
211received out-of-order, and those advertising a zero-sized window.
212.It Fl W
213Avoid truncating addresses even if this causes some fields to overflow.
214.It Fl x
215Display socket buffer and TCP timer statistics for each
216internet socket.
217.Pp
218The
219.Fl x
220flag causes
221.Nm
222to output all the information recorded about data
223stored in the socket buffers.
224The fields are:
225.Bl -column ".Li R-HIWA"
226.It Li R-HIWA Ta Receive buffer high water mark, in bytes.
227.It Li S-HIWA Ta Send buffer high water mark, in bytes.
228.It Li R-LOWA Ta Receive buffer low water mark, in bytes.
229.It Li S-LOWA Ta Send buffer low water mark, in bytes.
230.It Li R-BCNT Ta Receive buffer byte count.
231.It Li S-BCNT Ta Send buffer byte count.
232.It Li R-BMAX Ta Maximum bytes that can be used in the receive buffer.
233.It Li S-BMAX Ta Maximum bytes that can be used in the send buffer.
234.It Li rexmt Ta Time, in seconds, to fire Retransmit Timer, or 0 if not armed.
235.It Li persist Ta Time, in seconds, to fire Retransmit Persistence, or 0 if not armed.
236.It Li keep Ta Time, in seconds, to fire Keep Alive, or 0 if not armed.
237.It Li 2msl Ta Time, in seconds, to fire 2*msl TIME_WAIT Timer, or 0 if not armed.
238.It Li delack Ta Time, in seconds, to fire Delayed ACK Timer, or 0 if not armed.
239.It Li rcvtime Ta Time, in seconds, since last packet received.
240.El
241.It Fl f Ar protocol_family
242Filter by
243.Ar protocol_family .
244See
245.Sx GENERAL OPTIONS .
246.It Fl p Ar protocol
247Filter by
248.Ar protocol .
249See
250.Sx GENERAL OPTIONS .
251.It Fl j Ar jail
252Run inside a jail.
253See
254.Sx GENERAL OPTIONS .
255.El
256.It Xo
257.Bk -words
258.Nm
259.Fl i | I Ar interface
260.Op Fl 46abdhnW
261.Op Fl f Ar address_family
262.Op Fl M Ar core
263.Op Fl N Ar system
264.Op Fl j Ar jail
265.Ek
266.Xc
267Show the state of all network interfaces or a single
268.Ar interface
269which have been auto-configured
270(interfaces statically configured into a system, but not
271located at boot time are not shown).
272An asterisk
273.Pq Dq Li *
274after an interface name indicates that the interface is
275.Dq down .
276.Pp
277When
278.Nm
279is invoked with
280.Fl i
281.Pq all interfaces
282or
283.Fl I Ar interface ,
284it provides a table of cumulative
285statistics regarding packets transferred, errors, and collisions.
286The network addresses of the interface
287and the maximum transmission unit
288.Pq Dq mtu
289are also displayed.
290If both
291.Fl i
292and
293.Fl I
294are specified,
295.Fl I
296overrides any instances of
297.Fl i .
298.Bl -tag -width indent
299.It Fl 4
300Show IPv4 only.
301See
302.Sx GENERAL OPTIONS .
303.It Fl 6
304Show IPv6 only.
305See
306.Sx GENERAL OPTIONS .
307.It Fl a
308Multicast addresses currently in use are shown
309for each Ethernet interface and for each IP interface address.
310Multicast addresses are shown on separate lines following the interface
311address with which they are associated.
312.It Fl b
313Show the number of bytes in and out.
314.It Fl d
315Show the number of dropped packets.
316.It Fl h
317Print all counters in human readable form.
318.It Fl n
319Do not resolve numeric addresses and port numbers to names.
320See
321.Sx GENERAL OPTIONS .
322.It Fl W
323Avoid truncating addresses even if this causes some fields to overflow.
324See
325.Sx GENERAL OPTIONS .
326However, in most cases field widths are determined automatically with the
327.Fl i
328option, and this option has little effect.
329.It Fl f Ar protocol_family
330Filter by
331.Ar protocol_family .
332See
333.Sx GENERAL OPTIONS .
334.It Fl j Ar jail
335Run inside a jail.
336See
337.Sx GENERAL OPTIONS .
338.El
339.It Xo
340.Bk -words
341.Nm
342.Fl w Ar wait
343.Op Fl I Ar interface
344.Op Fl 46d
345.Op Fl M Ar core
346.Op Fl N Ar system
347.Op Fl q Ar howmany
348.Op Fl j Ar jail
349.Ek
350.Xc
351At intervals of
352.Ar wait
353seconds, display the information regarding packet traffic on all
354configured network interfaces or a single
355.Ar interface .
356.Pp
357When
358.Nm
359is invoked with the
360.Fl w
361option and a
362.Ar wait
363interval argument, it displays a running count of statistics related to
364network interfaces.
365An obsolescent version of this option used a numeric parameter
366with no option, and is currently supported for backward compatibility.
367By default, this display summarizes information for all interfaces.
368Information for a specific interface may be displayed with the
369.Fl I Ar interface
370option.
371.Bl -tag -width indent
372.It Fl I Ar interface
373Only show information regarding
374.Ar interface
375.It Fl 4
376Show IPv4 only.
377See
378.Sx GENERAL OPTIONS .
379.It Fl 6
380Show IPv6 only.
381See
382.Sx GENERAL OPTIONS .
383.It Fl d
384Show the number of dropped packets.
385.It Fl M
386Use an alternative core.
387See
388.Sx GENERAL OPTIONS .
389.It Fl N
390Use an alternative kernel image.
391See
392.Sx GENERAL OPTIONS .
393.It Fl q
394Exit after
395.Ar howmany
396outputs.
397.It Fl j Ar jail
398Run inside a jail.
399See
400.Sx GENERAL OPTIONS .
401.El
402.It Xo
403.Bk -words
404.Nm
405.Fl s
406.Op Fl 46sz
407.Op Fl f Ar protocol_family | Fl p Ar protocol
408.Op Fl M Ar core
409.Op Fl N Ar system
410.Op Fl j Ar jail
411.Ek
412.Xc
413Display system-wide statistics for each network protocol.
414.Bl -tag -width indent
415.It Fl 4
416Show IPv4 only.
417See
418.Sx GENERAL OPTIONS .
419.It Fl 6
420Show IPv6 only.
421See
422.Sx GENERAL OPTIONS .
423.It Fl s
424If
425.Fl s
426is repeated, counters with a value of zero are suppressed.
427.It Fl z
428Reset statistic counters after displaying them.
429.It Fl f Ar protocol_family
430Filter by
431.Ar protocol_family .
432See
433.Sx GENERAL OPTIONS .
434.It Fl p Ar protocol
435Filter by
436.Ar protocol .
437See
438.Sx GENERAL OPTIONS .
439.It Fl M
440Use an alternative core.
441See
442.Sx GENERAL OPTIONS .
443.It Fl N
444Use an alternative kernel image
445See
446.Sx GENERAL OPTIONS .
447.It Fl j Ar jail
448Run inside a jail.
449See
450.Sx GENERAL OPTIONS .
451.El
452.It Xo
453.Bk -words
454.Nm
455.Fl i | I Ar interface Fl s
456.Op Fl 46s
457.Op Fl f Ar protocol_family | Fl p Ar protocol
458.Op Fl M Ar core
459.Op Fl N Ar system
460.Op Fl j Ar jail
461.Ek
462.Xc
463Display per-interface statistics for each network protocol.
464If both
465.Fl i
466and
467.Fl I
468are specified,
469.Fl I
470overrides any instances of
471.Fl i .
472.Bl -tag -width indent
473.It Fl 4
474Show IPv4 only
475See
476.Sx GENERAL OPTIONS .
477.It Fl 6
478Show IPv6 only
479See
480.Sx GENERAL OPTIONS .
481.It Fl s
482If
483.Fl s
484is repeated, counters with a value of zero are suppressed.
485.It Fl f Ar protocol_family
486Filter by
487.Ar protocol_family .
488See
489.Sx GENERAL OPTIONS .
490.It Fl p Ar protocol
491Filter by
492.Ar protocol .
493See
494.Sx GENERAL OPTIONS .
495.It Fl M
496Use an alternative core
497See
498.Sx GENERAL OPTIONS .
499.It Fl N
500Use an alternative kernel image
501See
502.Sx GENERAL OPTIONS .
503.It Fl j Ar jail
504Run inside a jail.
505See
506.Sx GENERAL OPTIONS .
507.El
508.It Xo
509.Bk -words
510.Nm
511.Fl m
512.Op Fl M Ar core
513.Op Fl N Ar system
514.Op Fl j Ar jail
515.Ek
516.Xc
517Show statistics recorded by the memory management routines
518.Pq Xr mbuf 9 .
519The network manages a private pool of memory buffers.
520.Bl -tag -width indent
521.It Fl M
522Use an alternative core
523See
524.Sx GENERAL OPTIONS .
525.It Fl N
526Use an alternative kernel image
527See
528.Sx GENERAL OPTIONS .
529.It Fl j Ar jail
530Run inside a jail.
531See
532.Sx GENERAL OPTIONS .
533.El
534.It Xo
535.Bk -words
536.Nm
537.Fl B
538.Op Fl z
539.Op Fl I Ar interface
540.Op Fl j Ar jail
541.Ek
542.Xc
543Show statistics about
544.Xr bpf 4
545peers.
546This includes information like
547how many packets have been matched, dropped and received by the
548bpf device, also information about current buffer sizes and device
549states.
550.Pp
551The
552.Xr bpf 4
553flags displayed when
554.Nm
555is invoked with the
556.Fl B
557option represent the underlying parameters of the bpf peer.
558Each flag is
559represented as a single lower case letter.
560The mapping between the letters and flags in order of appearance are:
561.Bl -column ".Li i"
562.It Li p Ta Set if listening promiscuously
563.It Li i Ta Dv BIOCIMMEDIATE No has been set on the device
564.It Li f Ta Dv BIOCGHDRCMPLT No status: source link addresses are being
565filled automatically
566.It Li s Ta Dv BIOCGSEESENT No status: see packets originating locally and
567remotely on the interface.
568.It Li a Ta Packet reception generates a signal
569.It Li l Ta Dv BIOCLOCK No status: descriptor has been locked
570.El
571.Pp
572For more information about these flags, please refer to
573.Xr bpf 4 .
574.Bl -tag -width indent
575.It Fl z
576Reset statistic counters after displaying them.
577.It Fl j Ar jail
578Run inside a jail.
579See
580.Sx GENERAL OPTIONS .
581.El
582.It Xo
583.Bk -words
584.Nm
585.Fl r
586.Op Fl 46AnW
587.Op Fl F Ar fibnum
588.Op Fl f Ar address_family
589.Op Fl M Ar core
590.Op Fl N Ar system
591.Op Fl j Ar jail
592.Ek
593.Xc
594Display the contents of routing tables.
595.Pp
596When
597.Nm
598is invoked with the routing table option
599.Fl r ,
600it lists the available routes and their status.
601Each route consists of a destination host or network, and a gateway to use
602in forwarding packets.
603The flags field shows a collection of information about the route stored
604as binary choices.
605The individual flags are discussed in more detail in the
606.Xr route 8
607and
608.Xr route 4
609manual pages.
610The mapping between letters and flags is:
611.Bl -column ".Li W" ".Dv RTF_WASCLONED"
612.It Li 1 Ta Dv RTF_PROTO1 Ta "Protocol specific routing flag #1"
613.It Li 2 Ta Dv RTF_PROTO2 Ta "Protocol specific routing flag #2"
614.It Li 3 Ta Dv RTF_PROTO3 Ta "Protocol specific routing flag #3"
615.It Li B Ta Dv RTF_BLACKHOLE Ta "Just discard pkts (during updates)"
616.It Li b Ta Dv RTF_BROADCAST Ta "The route represents a broadcast address"
617.It Li D Ta Dv RTF_DYNAMIC Ta "Created dynamically (by redirect)"
618.It Li G Ta Dv RTF_GATEWAY Ta "Destination requires forwarding by intermediary"
619.It Li H Ta Dv RTF_HOST Ta "Host entry (net otherwise)"
620.It Li L Ta Dv RTF_LLINFO Ta "Valid protocol to link address translation"
621.It Li M Ta Dv RTF_MODIFIED Ta "Modified dynamically (by redirect)"
622.It Li R Ta Dv RTF_REJECT Ta "Host or net unreachable"
623.It Li S Ta Dv RTF_STATIC Ta "Manually added"
624.It Li U Ta Dv RTF_UP Ta "Route usable"
625.It Li X Ta Dv RTF_XRESOLVE Ta "External daemon translates proto to link address"
626.El
627.Pp
628Direct routes are created for each
629interface attached to the local host;
630the gateway field for such entries shows the address of the outgoing interface.
631The refcnt field gives the
632current number of active uses of the route.
633Connection oriented
634protocols normally hold on to a single route for the duration of
635a connection while connectionless protocols obtain a route while sending
636to the same destination.
637The use field provides a count of the number of packets
638sent using that route.
639The interface entry indicates the network interface utilized for the route.
640.Bl -tag -width indent
641.It Fl 4
642Show IPv4 only.
643See
644.Sx GENERAL OPTIONS .
645.It Fl 6
646Show IPv6 only.
647See
648.Sx GENERAL OPTIONS .
649.It Fl n
650Do not resolve numeric addresses and port numbers to names.
651See
652.Sx GENERAL OPTIONS .
653.It Fl W
654Show the path MTU for each route, and print interface names with a
655wider field size.
656.It Fl F
657Display the routing table with the number
658.Ar fibnum .
659If the specified
660.Ar fibnum
661is -1 or
662.Fl F
663is not specified,
664the default routing table is displayed.
665.It Fl f
666Display the routing table for a particular
667.Ar address_family .
668.It Fl M
669Use an alternative core
670See
671.Sx GENERAL OPTIONS .
672.It Fl N
673Use an alternative kernel image
674See
675.Sx GENERAL OPTIONS .
676.It Fl j Ar jail
677Run inside a jail.
678See
679.Sx GENERAL OPTIONS .
680.El
681.It Xo
682.Bk -words
683.Nm
684.Fl rs
685.Op Fl s
686.Op Fl M Ar core
687.Op Fl N Ar system
688.Op Fl j Ar jail
689.Ek
690.Xc
691Display routing statistics.
692.Bl -tag -width indent
693.It Fl s
694If
695.Fl s
696is repeated, counters with a value of zero are suppressed.
697.It Fl M
698Use an alternative core
699See
700.Sx GENERAL OPTIONS .
701.It Fl N
702Use an alternative kernel image
703See
704.Sx GENERAL OPTIONS .
705.It Fl j Ar jail
706Run inside a jail.
707See
708.Sx GENERAL OPTIONS .
709.El
710.It Xo
711.Bk -words
712.Nm
713.Fl g
714.Op Fl 46W
715.Op Fl f Ar address_family
716.Op Fl M Ar core
717.Op Fl N Ar system
718.Op Fl j Ar jail
719.Ek
720.Xc
721Display the contents of the multicast virtual interface tables,
722and multicast forwarding caches.
723Entries in these tables will appear only when the kernel is
724actively forwarding multicast sessions.
725This option is applicable only to the
726.Cm inet
727and
728.Cm inet6
729address families.
730.Bl -tag -width indent
731.It Fl 4
732Show IPv4 only
733See
734.Sx GENERAL OPTIONS .
735.It Fl 6
736Show IPv6 only
737See
738.Sx GENERAL OPTIONS .
739.It Fl W
740Avoid truncating addresses even if this causes some fields to overflow.
741.It Fl f Ar protocol_family
742Filter by
743.Ar protocol_family .
744See
745.Sx GENERAL OPTIONS .
746.It Fl M
747Use an alternative core
748See
749.Sx GENERAL OPTIONS .
750.It Fl N
751Use an alternative kernel image
752See
753.Sx GENERAL OPTIONS .
754.It Fl j Ar jail
755Run inside a jail.
756See
757.Sx GENERAL OPTIONS .
758.El
759.It Xo
760.Bk -words
761.Nm
762.Fl gs
763.Op Fl 46s
764.Op Fl f Ar address_family
765.Op Fl M Ar core
766.Op Fl N Ar system
767.Op Fl j Ar jail
768.Ek
769.Xc
770Show multicast routing statistics.
771.Bl -tag -width indent
772.It Fl 4
773Show IPv4 only
774See
775.Sx GENERAL OPTIONS .
776.It Fl 6
777Show IPv6 only
778See
779.Sx GENERAL OPTIONS .
780.It Fl s
781If
782.Fl s
783is repeated, counters with a value of zero are suppressed.
784.It Fl f Ar protocol_family
785Filter by
786.Ar protocol_family .
787See
788.Sx GENERAL OPTIONS .
789.It Fl M
790Use an alternative core
791See
792.Sx GENERAL OPTIONS .
793.It Fl N
794Use an alternative kernel image
795See
796.Sx GENERAL OPTIONS .
797.It Fl j Ar jail
798Run inside a jail.
799See
800.Sx GENERAL OPTIONS .
801.El
802.It Xo
803.Bk -words
804.Nm
805.Fl Q
806.Op Fl j Ar jail
807.Ek
808.Xc
809Show
810.Xr netisr 9
811statistics.
812The flags field shows available ISR handlers:
813.Bl -column ".Li W" ".Dv NETISR_SNP_FLAGS_DRAINEDCPU"
814.It Li C Ta Dv NETISR_SNP_FLAGS_M2CPUID Ta "Able to map mbuf to cpu id"
815.It Li D Ta Dv NETISR_SNP_FLAGS_DRAINEDCPU  Ta "Has queue drain handler"
816.It Li F Ta Dv NETISR_SNP_FLAGS_M2FLOW Ta "Able to map mbuf to flow id"
817.It Fl j Ar jail
818Run inside a jail.
819See
820.Sx GENERAL OPTIONS .
821.El
822.El
823.Ss GENERAL OPTIONS
824Some options have the general meaning:
825.Bl -tag -width flag
826.It Fl 4
827Is shorthand for
828.Fl f
829.Ar inet
830.Pq Show only IPv4
831.It Fl 6
832Is shorthand for
833.Fl f
834.Ar inet6
835.Pq Show only IPv6
836.It Fl f Ar address_family , Fl p Ar protocol
837Limit display to those records
838of the specified
839.Ar address_family
840or a single
841.Ar protocol .
842The following address families and protocols are recognized:
843.Pp
844.Bl -tag -width ".Cm netgraph , ng Pq Dv AF_NETGRAPH" -compact
845.It Em Family
846.Em Protocols
847.It Cm inet Pq Dv AF_INET
848.Cm divert , icmp , igmp , ip , ipsec , pim, sctp , tcp , udp
849.It Cm inet6 Pq Dv AF_INET6
850.Cm icmp6 , ip6 , ipsec6 , rip6 , sctp , tcp , udp
851.It Cm pfkey Pq Dv PF_KEY
852.Cm pfkey
853.It Cm netgraph , ng Pq Dv AF_NETGRAPH
854.Cm ctrl , data
855.It Cm unix Pq Dv AF_UNIX
856.It Cm link Pq Dv AF_LINK
857.El
858.Pp
859The program will complain if
860.Ar protocol
861is unknown or if there is no statistics routine for it.
862.It Fl M
863Extract values associated with the name list from the specified core
864instead of the default
865.Pa /dev/kmem .
866.It Fl N
867Extract the name list from the specified system instead of the default,
868which is the kernel image the system has booted from.
869.It Fl n
870Show network addresses and ports as numbers.
871Normally
872.Nm
873attempts to resolve addresses and ports,
874and display them symbolically.
875.It Fl W
876Wider output; expand address fields, etc, to avoid truncation.
877Non-numeric values such as domain names may still be truncated; use the
878.Fl n
879option if necessary to avoid ambiguity.
880.It Fl j Ar jail
881Perform the actions inside the
882.Ar jail .
883This allows network state to be accessed even if the
884.Cm netstat
885binary is not available in the
886.Ar jail .
887.El
888.Sh EXAMPLES
889Show packet traffic information (packets, bytes, errors, packet drops, etc) for
890interface re0 updated every 2 seconds and exit after 5 outputs:
891.Bd -literal -offset indent
892$ netstat -w 2 -q 5 -I re0
893.Ed
894.Pp
895Show statistics for ICMP on any interface:
896.Bd -literal -offset indent
897$ netstat -s -p icmp
898.Ed
899.Pp
900Show routing tables:
901.Bd -literal -offset indent
902$ netstat -r
903.Ed
904.Pp
905Same as above, but without resolving numeric addresses and port numbers to
906names:
907.Bd -literal -offset indent
908$ netstat -rn
909.Ed
910.Sh SEE ALSO
911.Xr fstat 1 ,
912.Xr nfsstat 1 ,
913.Xr procstat 1 ,
914.Xr ps 1 ,
915.Xr sockstat 1 ,
916.Xr libxo 3 ,
917.Xr xo_parse_args 3 ,
918.Xr bpf 4 ,
919.Xr inet 4 ,
920.Xr route 4 ,
921.Xr unix 4 ,
922.Xr hosts 5 ,
923.Xr networks 5 ,
924.Xr protocols 5 ,
925.Xr services 5 ,
926.Xr iostat 8 ,
927.Xr route 8 ,
928.Xr vmstat 8 ,
929.Xr mbuf 9
930.Sh HISTORY
931The
932.Nm
933command appeared in
934.Bx 4.2 .
935.Pp
936IPv6 support was added by WIDE/KAME project.
937.Sh BUGS
938The notion of errors is ill-defined.
939