Network health overview with mtr, ss, lsof and iperf3

<p>We said many times in the past that personal and home network&nbsp;<a href="https://medium.com/codex/privacy-security-principles-and-practice-f1f7f3934ad3" rel="noopener">security</a>&nbsp;is a&nbsp;<a href="https://raduzaharia.medium.com/privacy-and-security-the-habits-f5948aeea30c" rel="noopener">habit</a>. It&rsquo;s not the operating system you install, it&rsquo;s not how careful you are when browsing the Internet, it&rsquo;s not even about the antivirus choice. You can either trust that your network is not compromised, or you can&nbsp;<a href="https://raduzaharia.medium.com/understanding-the-home-network-security-fda87830f133" rel="noopener">build</a>&nbsp;a few habits that keep you sure. The most important habit would be of course the dreaded continuous log scanning. Logs are weird and scanning them is time consuming, if not sometimes impossible, but taking the time to have a good&nbsp;<code><a href="https://raduzaharia.medium.com/how-to-automate-log-scanning-with-fail2ban-a8771460da3f" rel="noopener">fail2ban</a></code>&nbsp;configuration means we take one worry out of the way.</p> <p>Log scanning allows us to create a few rules that automatically react when something goes wrong. But sometimes the malicious activity is not entirely recognized nor understood from the default Linux logs. Sometimes our Internet connection seems weird, and we don&rsquo;t understand why. We know something is wrong, but we cannot really pinpoint the issue. And other times, there is weird file access that goes undetected simply because we don&rsquo;t know what to look for. In these instances, we have a few tools that Linux provides which help us understand our environment. Let&rsquo;s talk about them one at a time.</p> <p><a href="https://raduzaharia.medium.com/network-health-overview-with-mtr-ss-lsof-and-iperf3-8d0d2d191781"><strong>Website</strong></a></p>
Tags: Network Health