
- #Best trace rout application software#
- #Best trace rout application code#
- #Best trace rout application series#
Specifies whether the Don't Fragment (DF) bit is to be set on the ping packet. It is the Internet quality of service selection. The requested ToS is placed in each probe, but there is no guarantee that all routers process the ToS.
#Best trace rout application software#
(The availability of this option differs from the software release used) The DSCP value introduced is placed in each probe.
#Best trace rout application code#
Specifies the Differentiated Services Code Point (DSCP). Note: This is a partial output of the extended ping command. The interface can also be mentioned, but with the correct syntax as shown here:

The router normally picks the IP address of the outbound interface to use. The interface or IP address of the router to use as a source address for the probes. The ingress ping simulates packets received on the specified ingress interface to the target destination.

#Best trace rout application series#
Specifies whether or not a series of additional commands appears. The ping is declared successful only if the ECHO REPLY packet is received before this time interval. Number of ping packets that are sent to the destination address. If you have specified a supported protocol other than IP, enter an appropriate address for that protocol here. Prompts for the IP address or host name of the destination node you plan to ping. Enter appletalk, clns, ip, novell, apollo, vines, decnet, or xns. These fields can be modified with the use of the extended ping command. This table lists the ping command field descriptions. You are prompted for the fields as given in the ping Command Field Descriptions section of this document. In order to use this feature, enter ping at the command line and press Return. The normal ping works both in the user EXEC mode and the privileged EXEC mode. The extended ping command works only at the privileged EXEC command line. The extended ping is used to perform a more advanced check of host reachability and network connectivity.

If an extended ping command is used, the source IP address can be changed to any IP address on the router. When a normal ping command is sent from a router, the source address of the ping is the IP address of the interface that the packet uses to exit the router. The ping is successful only if the ECHO REQUEST gets to the destination, and the destination is able to get an ECHO REPLY back to the source of the ping within a predefined time interval. The ping command first sends an echo request packet to an address, and then it waits for a reply. The ping command also measures the amount of time it takes to receive the echo reply. It uses two Internet Control Message Protocol (ICMP) query messages, ICMP echo requests, and ICMP echo replies to determine whether a remote host is active. The ping (Packet InterNet Groper) command is a very common method to troubleshoot the accessibility of devices. Conventionsįor more information on document conventions refer to Cisco Technical Tips Conventions. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment.
