1Invoking iperf3 2=============== 3 4iperf3 includes a manual page listing all of the command-line options. 5The manual page is the most up-to-date reference to the various flags and parameters. 6 7For sample command line usage, see: 8 9https://fasterdata.es.net/performance-testing/network-troubleshooting-tools/iperf/ 10 11Using the default options, iperf3 is meant to show typical well 12designed application performance. "Typical well designed application" 13means avoiding artificial enhancements that work only for testing 14(such as ``splice()``-ing the data to ``/dev/null``). iperf3 does 15also have flags for "extreme best case" optimizations but they must be 16explicitly activated. These flags include the ``-Z`` (``--zerocopy``) 17and ``-A`` (``--affinity``) options. 18 19iperf3 Manual Page 20------------------ 21 22This section contains a plaintext rendering of the iperf3 manual page. 23It is presented here only for convenience; the text here might not 24correspond to the current version of iperf3. The authoritative iperf3 25manual page is included in the source tree and installed along with 26the executable. 27 28:: 29 30 IPERF3(1) User Manuals IPERF3(1) 31 32 33 34 NAME 35 iperf3 - perform network throughput tests 36 37 SYNOPSIS 38 iperf3 -s [ options ] 39 iperf3 -c server [ options ] 40 41 42 DESCRIPTION 43 iperf3 is a tool for performing network throughput measurements. It 44 can test TCP, UDP, or SCTP throughput. To perform an iperf3 test the 45 user must establish both a server and a client. 46 47 The iperf3 executable contains both client and server functionality. 48 An iperf3 server can be started using either of the -s or --server com- 49 mand-line parameters, for example: 50 51 iperf3 -s 52 53 iperf3 --server 54 55 Note that many iperf3 parameters have both short (-s) and long 56 (--server) forms. In this section we will generally use the short form 57 of command-line flags, unless only the long form of a flag is avail- 58 able. 59 60 By default, the iperf3 server listens on TCP port 5201 for connections 61 from an iperf3 client. A custom port can be specified by using the -p 62 flag, for example: 63 64 iperf3 -s -p 5002 65 66 After the server is started, it will listen for connections from iperf3 67 clients (in other words, the iperf3 program run in client mode). The 68 client mode can be started using the -c command-line option, which also 69 requires a host to which iperf3 should connect. The host can by speci- 70 fied by hostname, IPv4 literal, or IPv6 literal: 71 72 iperf3 -c iperf3.example.com 73 74 iperf3 -c 192.0.2.1 75 76 iperf3 -c 2001:db8::1 77 78 If the iperf3 server is running on a non-default TCP port, that port 79 number needs to be specified on the client as well: 80 81 iperf3 -c iperf3.example.com -p 5002 82 83 The initial TCP connection is used to exchange test parameters, control 84 the start and end of the test, and to exchange test results. This is 85 sometimes referred to as the "control connection". The actual test 86 data is sent over a separate TCP connection, as a separate flow of UDP 87 packets, or as an independent SCTP connection, depending on what proto- 88 col was specified by the client. 89 90 Normally, the test data is sent from the client to the server, and mea- 91 sures the upload speed of the client. Measuring the download speed 92 from the server can be done by specifying the -R flag on the client. 93 This causes data to be sent from the server to the client. 94 95 iperf3 -c iperf3.example.com -p 5202 -R 96 97 Results are displayed on both the client and server. There will be at 98 least one line of output per measurement interval (by default a mea- 99 surement interval lasts for one second, but this can be changed by the 100 -i option). Each line of output includes (at least) the time since the 101 start of the test, amount of data transferred during the interval, and 102 the average bitrate over that interval. Note that the values for each 103 measurement interval are taken from the point of view of the endpoint 104 process emitting that output (in other words, the output on the client 105 shows the measurement interval data for the client. 106 107 At the end of the test is a set of statistics that shows (at least as 108 much as possible) a summary of the test as seen by both the sender and 109 the receiver, with lines tagged accordingly. Recall that by default 110 the client is the sender and the server is the receiver, although as 111 indicated above, use of the -R flag will reverse these roles. 112 113 The client can be made to retrieve the server-side output for a given 114 test by specifying the --get-server-output flag. 115 116 Either the client or the server can produce its output in a JSON struc- 117 ture, useful for integration with other programs, by passing it the -J 118 flag. Because the contents of the JSON structure are only competely 119 known after the test has finished, no JSON output will be emitted until 120 the end of the test. 121 122 iperf3 has a (overly) large set of command-line options that can be 123 used to set the parameters of a test. They are given in the "GENERAL 124 OPTIONS" section of the manual page below, as well as summarized in 125 iperf3's help output, which can be viewed by running iperf3 with the -h 126 flag. 127 128 GENERAL OPTIONS 129 -p, --port n 130 set server port to listen on/connect to to n (default 5201) 131 132 -f, --format 133 [kmgtKMGT] format to report: Kbits/Mbits/Gbits/Tbits 134 135 -i, --interval n 136 pause n seconds between periodic throughput reports; default is 137 1, use 0 to disable 138 139 -F, --file name 140 Use a file as the source (on the sender) or sink (on the 141 receiver) of data, rather than just generating random data or 142 throwing it away. This feature is used for finding whether or 143 not the storage subsystem is the bottleneck for file transfers. 144 It does not turn iperf3 into a file transfer tool. The length, 145 attributes, and in some cases contents of the received file may 146 not match those of the original file. 147 148 -A, --affinity n/n,m 149 Set the CPU affinity, if possible (Linux, FreeBSD, and Windows 150 only). On both the client and server you can set the local 151 affinity by using the n form of this argument (where n is a CPU 152 number). In addition, on the client side you can override the 153 server's affinity for just that one test, using the n,m form of 154 argument. Note that when using this feature, a process will 155 only be bound to a single CPU (as opposed to a set containing 156 potentialy multiple CPUs). 157 158 -B, --bind host 159 bind to the specific interface associated with address host. If 160 the host has multiple interfaces, it will use the first inter- 161 face by default. 162 163 -V, --verbose 164 give more detailed output 165 166 -J, --json 167 output in JSON format 168 169 --logfile file 170 send output to a log file. 171 172 --forceflush 173 force flushing output at every interval. Used to avoid buffer- 174 ing when sending output to pipe. 175 176 -d, --debug 177 emit debugging output. Primarily (perhaps exclusively) of use 178 to developers. 179 180 -v, --version 181 show version information and quit 182 183 -h, --help 184 show a help synopsis 185 186 187 SERVER SPECIFIC OPTIONS 188 -s, --server 189 run in server mode 190 191 -D, --daemon 192 run the server in background as a daemon 193 194 -I, --pidfile file 195 write a file with the process ID, most useful when running as a 196 daemon. 197 198 -1, --one-off 199 handle one client connection, then exit. 200 201 --rsa-private-key-path file 202 path to the RSA private key (not password-protected) used to 203 decrypt authentication credentials from the client (if built 204 with OpenSSL support). 205 206 --authorized-users-path file 207 path to the configuration file containing authorized users cre- 208 dentials to run iperf tests (if built with OpenSSL support). 209 The file is a comma separated list of usernames and password 210 hashes; more information on the structure of the file can be 211 found in the EXAMPLES section. 212 213 --time-skew-threshold seconds 214 time skew threshold (in seconds) between the server and client 215 during the authentication process. 216 217 CLIENT SPECIFIC OPTIONS 218 -c, --client host 219 run in client mode, connecting to the specified server. By 220 default, a test consists of sending data from the client to the 221 server, unless the -R flag is specified. 222 223 --sctp use SCTP rather than TCP (FreeBSD and Linux) 224 225 -u, --udp 226 use UDP rather than TCP 227 228 --connect-timeout n 229 set timeout for establishing the initial control connection to 230 the server, in milliseconds. The default behavior is the oper- 231 ating system's timeout for TCP connection establishment. Pro- 232 viding a shorter value may speed up detection of a down iperf3 233 server. 234 235 -b, --bitrate n[KM] 236 set target bitrate to n bits/sec (default 1 Mbit/sec for UDP, 237 unlimited for TCP/SCTP). If there are multiple streams (-P 238 flag), the throughput limit is applied separately to each 239 stream. You can also add a '/' and a number to the bitrate 240 specifier. This is called "burst mode". It will send the given 241 number of packets without pausing, even if that temporarily 242 exceeds the specified throughput limit. Setting the target 243 bitrate to 0 will disable bitrate limits (particularly useful 244 for UDP tests). This throughput limit is implemented internally 245 inside iperf3, and is available on all platforms. Compare with 246 the --fq-rate flag. This option replaces the --bandwidth flag, 247 which is now deprecated but (at least for now) still accepted. 248 249 --pacing-timer n[KMG] 250 set pacing timer interval in microseconds (default 1000 251 microseconds, or 1 ms). This controls iperf3's internal pacing 252 timer for the -b/--bitrate option. The timer fires at the 253 interval set by this parameter. Smaller values of the pacing 254 timer parameter smooth out the traffic emitted by iperf3, but 255 potentially at the cost of performance due to more frequent 256 timer processing. 257 258 --fq-rate n[KM] 259 Set a rate to be used with fair-queueing based socket-level pac- 260 ing, in bits per second. This pacing (if specified) will be in 261 addition to any pacing due to iperf3's internal throughput pac- 262 ing (-b/--bitrate flag), and both can be specified for the same 263 test. Only available on platforms supporting the SO_MAX_PAC- 264 ING_RATE socket option (currently only Linux). The default is 265 no fair-queueing based pacing. 266 267 --no-fq-socket-pacing 268 This option is deprecated and will be removed. It is equivalent 269 to specifying --fq-rate=0. 270 271 -t, --time n 272 time in seconds to transmit for (default 10 secs) 273 274 -n, --bytes n[KM] 275 number of bytes to transmit (instead of -t) 276 277 -k, --blockcount n[KM] 278 number of blocks (packets) to transmit (instead of -t or -n) 279 280 -l, --length n[KM] 281 length of buffer to read or write. For TCP tests, the default 282 value is 128KB. In the case of UDP, iperf3 tries to dynamically 283 determine a reasonable sending size based on the path MTU; if 284 that cannot be determined it uses 1460 bytes as a sending size. 285 For SCTP tests, the default size is 64KB. 286 287 --cport port 288 bind data streams to a specific client port (for TCP and UDP 289 only, default is to use an ephemeral port) 290 291 -P, --parallel n 292 number of parallel client streams to run. Note that iperf3 is 293 single threaded, so if you are CPU bound, this will not yield 294 higher throughput. 295 296 -R, --reverse 297 reverse the direction of a test, so that the server sends data 298 to the client 299 300 --bidir 301 bidirectional mode, server and client send and receive data. 302 303 -w, --window n[KM] 304 window size / socket buffer size (this gets sent to the server 305 and used on that side too) 306 307 -M, --set-mss n 308 set TCP/SCTP maximum segment size (MTU - 40 bytes) 309 310 -N, --no-delay 311 set TCP/SCTP no delay, disabling Nagle's Algorithm 312 313 -4, --version4 314 only use IPv4 315 316 -6, --version6 317 only use IPv6 318 319 -S, --tos n 320 set the IP type of service. The usual prefixes for octal and hex 321 can be used, i.e. 52, 064 and 0x34 all specify the same value. 322 323 --dscp dscp 324 set the IP DSCP bits. Both numeric and symbolic values are 325 accepted. Numeric values can be specified in decimal, octal and 326 hex (see --tos above). 327 328 -L, --flowlabel n 329 set the IPv6 flow label (currently only supported on Linux) 330 331 -X, --xbind name 332 Bind SCTP associations to a specific subset of links using 333 sctp_bindx(3). The --B flag will be ignored if this flag is 334 specified. Normally SCTP will include the protocol addresses of 335 all active links on the local host when setting up an associa- 336 tion. Specifying at least one --X name will disable this behav- 337 iour. This flag must be specified for each link to be included 338 in the association, and is supported for both iperf servers and 339 clients (the latter are supported by passing the first --X argu- 340 ment to bind(2)). Hostnames are accepted as arguments and are 341 resolved using getaddrinfo(3). If the --4 or --6 flags are 342 specified, names which do not resolve to addresses within the 343 specified protocol family will be ignored. 344 345 --nstreams n 346 Set number of SCTP streams. 347 348 -Z, --zerocopy 349 Use a "zero copy" method of sending data, such as sendfile(2), 350 instead of the usual write(2). 351 352 -O, --omit n 353 Omit the first n seconds of the test, to skip past the TCP slow- 354 start period. 355 356 -T, --title str 357 Prefix every output line with this string. 358 359 --extra-data str 360 Specify an extra data string field to be included in JSON out- 361 put. 362 363 -C, --congestion algo 364 Set the congestion control algorithm (Linux and FreeBSD only). 365 An older --linux-congestion synonym for this flag is accepted 366 but is deprecated. 367 368 --get-server-output 369 Get the output from the server. The output format is determined 370 by the server (in particular, if the server was invoked with the 371 --json flag, the output will be in JSON format, otherwise it 372 will be in human-readable format). If the client is run with 373 --json, the server output is included in a JSON object; other- 374 wise it is appended at the bottom of the human-readable output. 375 376 --repeating-payload 377 Use repeating pattern in payload, instead of random bytes. The 378 same payload is used in iperf2 (ASCII '0..9' repeating). It 379 might help to test and reveal problems in networking gear with 380 hardware compression (including some WiFi access points), where 381 iperf2 and iperf3 perform differently, just based on payload 382 entropy. 383 384 --username username 385 username to use for authentication to the iperf server (if built 386 with OpenSSL support). The password will be prompted for inter- 387 actively when the test is run. Note, the password to use can 388 also be specified via the IPERF3_PASSWORD environment variable. 389 If this variable is present, the password prompt will be 390 skipped. 391 392 --rsa-public-key-path file 393 path to the RSA public key used to encrypt authentication cre- 394 dentials (if built with OpenSSL support) 395 396 397 EXAMPLES 398 Authentication - RSA Keypair 399 The authentication feature of iperf3 requires an RSA public keypair. 400 The public key is used to encrypt the authentication token containing 401 the user credentials, while the private key is used to decrypt the 402 authentication token. An example of a set of UNIX/Linux commands to 403 generate correct keypair follows: 404 405 > openssl genrsa -des3 -out private.pem 2048 406 > openssl rsa -in private.pem -outform PEM -pubout -out public.pem 407 > openssl rsa -in private.pem -out private_not_protected.pem -out- 408 form PEM 409 410 After these commands, the public key will be contained in the file pub- 411 lic.pem and the private key will be contained in the file pri- 412 vate_not_protected.pem. 413 414 Authentication - Authorized users configuration file 415 A simple plaintext file must be provided to the iperf3 server in order 416 to specify the authorized user credentials. The file is a simple list 417 of comma-separated pairs of a username and a corresponding password 418 hash. The password hash is a SHA256 hash of the string "{$user}$pass- 419 word". The file can also contain commented lines (starting with the # 420 character). An example of commands to generate the password hash on a 421 UNIX/Linux system is given below: 422 423 > S_USER=mario S_PASSWD=rossi 424 > echo -n "{$S_USER}$S_PASSWD" | sha256sum | awk '{ print $1 }' 425 426 An example of a password file (with an entry corresponding to the above 427 username and password) is given below: 428 > cat credentials.csv 429 # file format: username,sha256 430 mario,bf7a49a846d44b454a5d11e7acfaf13d138bbe0b7483aa3e050879700572709b 431 432 433 434 AUTHORS 435 A list of the contributors to iperf3 can be found within the documenta- 436 tion located at https://software.es.net/iperf/dev.html#authors. 437 438 439 SEE ALSO 440 libiperf(3), https://software.es.net/iperf 441 442 443 444 ESnet June 2018 IPERF3(1) 445 446The iperf3 manual page will typically be installed in manual 447section 1. 448 449