Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows Server » Perform continuous ping on OSes and network Appliances
  • PrintButton
    How to add Print Drivers with PowerShell, RUNDLL32, and VBScript in Windows 10 Windows
  • Featured image 10
    Add a Printer Using an IP Address in Windows 11 Network | Monitoring
  • ghm
    Single App Kiosk Mode Configuration using MDM Bridge WMI Provider Windows
  • wingettool
    Install Applications with Winget CLI on Windows Windows Server
  • vmwarefrsd4
    CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability Network | Monitoring
  • maxresdefault 2 6
    How to create an AMI from the Command line AWS/Azure/OpenShift
  • Featured Image
    Remote WMI Connection: How to enable or disable WMI Traffic Using Firewall UI Windows
  • HybridCloudTrust
    WHFB Hybrid Cloud Kerberos Trust Model is now available AWS/Azure/OpenShift

Perform continuous ping on OSes and network Appliances

Posted on 16/12/201815/10/2024 Christian By Christian No Comments on Perform continuous ping on OSes and network Appliances
continuous ping

In this article, we shall discuss “Perform continuous ping on OSes and network Appliances (macOS, Linux, Windows, Juniper and Cisco devices)”. Ping is referred to as “Packet Internet Groper”. It is used to troubleshoot the accessibility of devices between two endpoints i.e., to ensure data packet is transmitted to its destination successfully. Please see how to Analyse Disks with Treesize: Defragment and Shrink VMware Workstation VM Disks, and how to Ping from Source IP Address from all environments.

This utility uses a series of Internet Control Message Protocol (ICMP) echo messages to determine whether a remote host is active or inactive. The round-trip delay in communicating with the host, and packet loss. The ping command first sends an echo request packet to an address and then waits for a reply.

Furthermore, the ping is successful only if the echo request gets to the destination. The destination gets an echo reply back to the source within a predetermined time called a timeout.

The ping utility is available to the following platforms such as Windows, Linux, and macOS as a network administration tool. As well as to networking platforms such as Cisco, Cisco ASA, etc.

Also, see Ping request could not find the host: Verify if the name is entered correctly. Here is an article on “what is transit failed, general failure, request timed out and destination host unreachable“.

How to perform a continuous ping on macOS

As System and Network Administrators, it is inevitable that we must test network connectivity. That is, test connectivity between different components of our network or between systems and VMs as well.

This protocol accomplishes this by sending 32 bytes of packet to the destination server. Below is an example of the ping command in action. When you ping a server that is very close to you. The reaction time in (ms) will considerably be lower than a server that is further away. Thereby leading to higher reaction time (ms).

The ping command sends an echo request to a destination server or device and waits for a response, known as the echo reply packet. If the source server, client, or network device does not receive an echo reply within a predefined timeout period, it indicates a connectivity issue. By default, this timeout period is set to two seconds on Cisco routers.

If the ping command successfully receives the echo reply within this timeframe, it confirms that connectivity is intact.

Note: The Time to leave (TTL) value of a ping packet cannot be changed.

macOS
Ping command on a Windows PC.
As you can see. It does not provide data about routing or hops. But it is a very useful metric for gauging the latency between two devices as you can see in the two pings performed in the image above.

Note: The ping utility is a simplified version of traceroute. It will test the speed of the connection between two devices and report how long it takes for the packet to reach its destination and return to the sender’s device as seen in the screenshot above.

What is ICMP and how does it work?

We have referred to ICMP a lot in this article and I will therefore be discussing it in detail. ICMP is a network layer protocol used by network devices to diagnose and report network issues back to the source. It sends control messages such as destination network unreachable, source route failed, and source quench to the source device.

ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. See this guide on how to configure TCP/IP on a Server and other Windows Server properties.

This means, ICMP is used for reporting a service that is not reachable (available) or when a host can not be found on the network. But it can also be used in distributed denial-of-service (DDoS) attacks.

Note: ICMP is not associated with a transport layers protocol such as TCP or UDP, thereby making ICMP a connectionless protocol. No device is required to initiate a connection with another device before sending an ICMP message.

Normal IP traffic is sent using TCP. This means any two devices that exchange data will first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP does not open a connection in this way. The ICMP protocol also does not allow for targeting a specific port on a device.

Here are some related troubleshooting guides: Ansible error: Server unreachable, ssl: auth method ssl requires a password, and the module ping was not found in configured module paths: Additionally core modules are missing.

How to initiate a continuous ping

Continuous ping is a common debugging method to check whether IPv4 and IPv6 network devices are reachable. It uses Internet Control Message Protocol (ICMP) Echo messages to check Whether the remote device is available, the Round-trip delay in communicating with the remote host, and Whether packets are lost. But this can lead to an ICMP flood attack.

ICMP flood also known as Ping flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources.

This causes the target to become inaccessible to normal traffic and will cause legitimate users cannot to receive service. Others types of ICMP request attacks may involve custom tools or code, such as hping and scapy. The image below is an example of software used to perfom ping flood.

Linux
src:researchgate

Please see why can’t I ping the Public IP Address an EC2 instance?, and how to resolve request timed out when pinging and how to create a Firewall rule.

Perform Continuous ping on Windows

Continuous ping can be realized in the following ways. Open Command Prompt and type the command ‘ping’ followed by the IP Address and followed by ‘-t’ flag. To stop the ping, after seeing enough results, press Ctrl + C.

Ping -t 192.168.2.1
or
ping 192.168.2.1 -t
Screenshot-2021-02-24-at-00.52.34
Example of a continuous ping request

For Mac OSX

The command ping is used to test whether your computer can communicate with another device (computer/server/printer) connected to your network or the internet. To initiate a ping test in Mac OS, please follow the steps below.

  • Click on the “Launchpad” and from the search window,
  • Type “Terminal” as shown below. Kindly refer to this how to change the default screen capture format in macOS on the various methods to launch the Terminal on macOS.
  • Double click on the Terminal to launch it.
iterm

In the Terminal window type ping <followed by the server name or IP> that you want to ping. The command should look like the command below and press Enter. A successful ping response is similar to the following:

Ping google.com
Perform continuous ping on Mac

A successful response has a few notable elements: Repeating lines showing that bytes were sent, and the time the trip took (in milliseconds (ms)) and statistics that the packets transmitted were also received, with minimal to no packet loss.

Note: If this is also not continuous by default, simple run it this way for MacOSX

/sbin/ping google.com

For Linux

The Ping command line is configured by default for looping in Linux . To execute the continuous ping command in Linux, proceed as follows. Open the console of your Linux distribution, and search for terminal. When open, simply type as shown below, but your IP 🙂

Linux-terminal

Please run the command below

ping google.com
Screenshot-2021-02-24-at-02.14.44

High count rate can also be indicated for a long period of time. See example below. This example will ping  about 333 times.

ping 192.168.1.1 -c 333

If this continuous ping does not work by default, there is probably an alias for the ping command that changes how you invoke the ping utility. The solution would be to find the ping command by using the command below.

which ping

Next call the ping program from the path and it should be continuous.

/bin/ping 192.168.2.1

For Juniper

This is by default as well. Simply run 

ping 192.168.2.1

For Cisco Devices

Ranging from ASA, Switches and Router, continuous ping is not possible but can be repeated as shown below

ping 192.168.2.1 repeat 333

If this repeat command does not work, simple enter the ping command. To stop or kill the ping session in most environments, please hit the Ctrl + C on your keyboard.

ctrl + c

If you do not see a response when pinging by the hostname of the server, initiate a ping to the IP address. Initiating a ping to the IP address instead allows you to determine if the problem is a result of an issue with hostname resolution.

Below is a table showing the possible lists of ICMP-type values for results on how to perform continuous ping on OSes and network Appliances.

ICMP TypeLiteral
0echo-reply
3destination unreachable code 0 = net unreachable 1 = host unreachable 2 = protocol unreachable 3 = port unreachable 4 = fragmentation needed and DF set 5 = source route failed
4source-quench
5redirect code 0 = redirect datagrams for the network 1 = redirect datagrams for the host 2 = redirect datagrams for the type of service and network 3 = redirect datagrams for the type of service and host
6alternate-address
8echo
9router-advertisement
10router-solicitation
11time-exceeded code 0 = time to live exceeded in transit 1 = fragment reassembly time exceeded
12parameter-problem
13timestamp-request
14timestamp-reply
15information-request
16information-reply
17mask-request
18mask-reply
31conversion-error
32mobile-redirect

Furthermore, I hope you found this blog post on “Perform continuous ping on OSes and network Appliances (macOS, Linux, Windows, Juniper and Cisco devices)” helpful. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Mac, Windows, Windows Server Tags:Windows 10

Post navigation

Previous Post: Ping from Source IP Address from all environments
Next Post: How to Reset a Snom Phone

Related Posts

  • Featured image   Network Access Permission...
    Fix You Might Not Have Permission to Use This Network Resource Error Network | Monitoring
  • Featured image TeamsGif.
    How to fix Microsoft Teams GIFs or Images not working Windows
  • image 24
    How to Resolve Microsoft RDP Connection Black Screen Windows
  • image 10
    How to use Microsoft SQL Server Management Studio to Export and Import your MsSQL database from Azure to local computer AWS/Azure/OpenShift
  • esd convert wim 1280x720 1
    Differences between Capture image, Discover image, Install and Boot images Windows Server
  • image 41
    INACCESSIBLE BOOT DEVICE: Fix Your PC ran into a problem and needs to restart Windows

More Related Articles

Featured image   Network Access Permission... Fix You Might Not Have Permission to Use This Network Resource Error Network | Monitoring
Featured image TeamsGif. How to fix Microsoft Teams GIFs or Images not working Windows
image 24 How to Resolve Microsoft RDP Connection Black Screen Windows
image 10 How to use Microsoft SQL Server Management Studio to Export and Import your MsSQL database from Azure to local computer AWS/Azure/OpenShift
esd convert wim 1280x720 1 Differences between Capture image, Discover image, Install and Boot images Windows Server
image 41 INACCESSIBLE BOOT DEVICE: Fix Your PC ran into a problem and needs to restart Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • PrintButton
    How to add Print Drivers with PowerShell, RUNDLL32, and VBScript in Windows 10 Windows
  • Featured image 10
    Add a Printer Using an IP Address in Windows 11 Network | Monitoring
  • ghm
    Single App Kiosk Mode Configuration using MDM Bridge WMI Provider Windows
  • wingettool
    Install Applications with Winget CLI on Windows Windows Server
  • vmwarefrsd4
    CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability Network | Monitoring
  • maxresdefault 2 6
    How to create an AMI from the Command line AWS/Azure/OpenShift
  • Featured Image
    Remote WMI Connection: How to enable or disable WMI Traffic Using Firewall UI Windows
  • HybridCloudTrust
    WHFB Hybrid Cloud Kerberos Trust Model is now available AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.