![]() Specifies whether or not a series of additional commands appears. The ping is declared successful only if the ECHO REPLY packet is received before this time interval. Number of ping packets that are sent to the destination address. If you have specified a supported protocol other than IP, enter an appropriate address for that protocol here. Prompts for the IP address or host name of the destination node you plan to ping. Enter appletalk, clns, ip, novell, apollo, vines, decnet, or xns. These fields can be modified with the use of the extended ping command. This table lists the ping command field descriptions. You are prompted for the fields as given in the ping Command Field Descriptions section of this document. In order to use this feature, enter ping at the command line and press Return. The normal ping works both in the user EXEC mode and the privileged EXEC mode. The extended ping command works only at the privileged EXEC command line. The extended ping is used to perform a more advanced check of host reachability and network connectivity. If an extended ping command is used, the source IP address can be changed to any IP address on the router. When a normal ping command is sent from a router, the source address of the ping is the IP address of the interface that the packet uses to exit the router. ![]() The ping is successful only if the ECHO REQUEST gets to the destination, and the destination is able to get an ECHO REPLY back to the source of the ping within a predefined time interval. The ping command first sends an echo request packet to an address, and then it waits for a reply. The ping command also measures the amount of time it takes to receive the echo reply. It uses two Internet Control Message Protocol (ICMP) query messages, ICMP echo requests, and ICMP echo replies to determine whether a remote host is active. The ping (Packet InterNet Groper) command is a very common method to troubleshoot the accessibility of devices. Conventionsįor more information on document conventions refer to Cisco Technical Tips Conventions. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |