Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Perform continuous ping on OSes and network Appliances
  • aptira ansible 1
    The module ping was not found in configured module paths, core modules are missing Configuration Management Tool
  • 1 WeXxkEX0JG3oB781HD8Hrg 1
    Post OS installation: Configure the properties of Windows Server Windows Server
  • Root
    Change your root password: Manage the root user on your macOS Mac
  • veeam
    How to uninstall Veeam Backup and Replication from your server Backup
  • How to create edit save exit file
    Mastering Vim in Linux: How to Create, Edit, Save, and Quit Files Linux
  • Banner
    How to Deploy GitHub Repositories to cPanel using GitHub Actions Automation
  • wine 2 1
    How to install and uninstall WineHQ on Linux Linux
  • MM
    How to install Mattermost on Ubuntu and Debian Linux

Perform continuous ping on OSes and network Appliances

Posted on 16/12/201815/10/2024 Christian By Christian No Comments on Perform continuous ping on OSes and network Appliances
continuous ping

In this article, we shall discuss “Perform continuous ping on OSes and network Appliances (macOS, Linux, Windows, Juniper and Cisco devices)”. Ping is referred to as “Packet Internet Groper”. It is used to troubleshoot the accessibility of devices between two endpoints i.e., to ensure data packet is transmitted to its destination successfully. Please see how to Analyse Disks with Treesize: Defragment and Shrink VMware Workstation VM Disks, and how to Ping from Source IP Address from all environments.

This utility uses a series of Internet Control Message Protocol (ICMP) echo messages to determine whether a remote host is active or inactive. The round-trip delay in communicating with the host, and packet loss. The ping command first sends an echo request packet to an address and then waits for a reply.

Furthermore, the ping is successful only if the echo request gets to the destination. The destination gets an echo reply back to the source within a predetermined time called a timeout.

The ping utility is available to the following platforms such as Windows, Linux, and macOS as a network administration tool. As well as to networking platforms such as Cisco, Cisco ASA, etc.

Also, see Ping request could not find the host: Verify if the name is entered correctly. Here is an article on “what is transit failed, general failure, request timed out and destination host unreachable“.

How to perform a continuous ping on macOS

As System and Network Administrators, it is inevitable that we must test network connectivity. That is, test connectivity between different components of our network or between systems and VMs as well.

This protocol accomplishes this by sending 32 bytes of packet to the destination server. Below is an example of the ping command in action. When you ping a server that is very close to you. The reaction time in (ms) will considerably be lower than a server that is further away. Thereby leading to higher reaction time (ms).

The ping command sends an echo request to a destination server or device and waits for a response, known as the echo reply packet. If the source server, client, or network device does not receive an echo reply within a predefined timeout period, it indicates a connectivity issue. By default, this timeout period is set to two seconds on Cisco routers.

If the ping command successfully receives the echo reply within this timeframe, it confirms that connectivity is intact.

Note: The Time to leave (TTL) value of a ping packet cannot be changed.

macOS
Ping command on a Windows PC.
As you can see. It does not provide data about routing or hops. But it is a very useful metric for gauging the latency between two devices as you can see in the two pings performed in the image above.

Note: The ping utility is a simplified version of traceroute. It will test the speed of the connection between two devices and report how long it takes for the packet to reach its destination and return to the sender’s device as seen in the screenshot above.

What is ICMP and how does it work?

We have referred to ICMP a lot in this article and I will therefore be discussing it in detail. ICMP is a network layer protocol used by network devices to diagnose and report network issues back to the source. It sends control messages such as destination network unreachable, source route failed, and source quench to the source device.

ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. See this guide on how to configure TCP/IP on a Server and other Windows Server properties.

This means, ICMP is used for reporting a service that is not reachable (available) or when a host can not be found on the network. But it can also be used in distributed denial-of-service (DDoS) attacks.

Note: ICMP is not associated with a transport layers protocol such as TCP or UDP, thereby making ICMP a connectionless protocol. No device is required to initiate a connection with another device before sending an ICMP message.

Normal IP traffic is sent using TCP. This means any two devices that exchange data will first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP does not open a connection in this way. The ICMP protocol also does not allow for targeting a specific port on a device.

Here are some related troubleshooting guides: Ansible error: Server unreachable, ssl: auth method ssl requires a password, and the module ping was not found in configured module paths: Additionally core modules are missing.

How to initiate a continuous ping

Continuous ping is a common debugging method to check whether IPv4 and IPv6 network devices are reachable. It uses Internet Control Message Protocol (ICMP) Echo messages to check Whether the remote device is available, the Round-trip delay in communicating with the remote host, and Whether packets are lost. But this can lead to an ICMP flood attack.

ICMP flood also known as Ping flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources.

This causes the target to become inaccessible to normal traffic and will cause legitimate users cannot to receive service. Others types of ICMP request attacks may involve custom tools or code, such as hping and scapy. The image below is an example of software used to perfom ping flood.

Linux
src:researchgate

Please see why can’t I ping the Public IP Address an EC2 instance?, and how to resolve request timed out when pinging and how to create a Firewall rule.

Perform Continuous ping on Windows

Continuous ping can be realized in the following ways. Open Command Prompt and type the command ‘ping’ followed by the IP Address and followed by ‘-t’ flag. To stop the ping, after seeing enough results, press Ctrl + C.

Ping -t 192.168.2.1
or
ping 192.168.2.1 -t
Screenshot-2021-02-24-at-00.52.34
Example of a continuous ping request

For Mac OSX

The command ping is used to test whether your computer can communicate with another device (computer/server/printer) connected to your network or the internet. To initiate a ping test in Mac OS, please follow the steps below.

  • Click on the “Launchpad” and from the search window,
  • Type “Terminal” as shown below. Kindly refer to this how to change the default screen capture format in macOS on the various methods to launch the Terminal on macOS.
  • Double click on the Terminal to launch it.
iterm

In the Terminal window type ping <followed by the server name or IP> that you want to ping. The command should look like the command below and press Enter. A successful ping response is similar to the following:

Ping google.com
Perform continuous ping on Mac

A successful response has a few notable elements: Repeating lines showing that bytes were sent, and the time the trip took (in milliseconds (ms)) and statistics that the packets transmitted were also received, with minimal to no packet loss.

Note: If this is also not continuous by default, simple run it this way for MacOSX

/sbin/ping google.com

For Linux

The Ping command line is configured by default for looping in Linux . To execute the continuous ping command in Linux, proceed as follows. Open the console of your Linux distribution, and search for terminal. When open, simply type as shown below, but your IP 🙂

Linux-terminal

Please run the command below

ping google.com
Screenshot-2021-02-24-at-02.14.44

High count rate can also be indicated for a long period of time. See example below. This example will ping  about 333 times.

ping 192.168.1.1 -c 333

If this continuous ping does not work by default, there is probably an alias for the ping command that changes how you invoke the ping utility. The solution would be to find the ping command by using the command below.

which ping

Next call the ping program from the path and it should be continuous.

/bin/ping 192.168.2.1

For Juniper

This is by default as well. Simply run 

ping 192.168.2.1

For Cisco Devices

Ranging from ASA, Switches and Router, continuous ping is not possible but can be repeated as shown below

ping 192.168.2.1 repeat 333

If this repeat command does not work, simple enter the ping command. To stop or kill the ping session in most environments, please hit the Ctrl + C on your keyboard.

ctrl + c

If you do not see a response when pinging by the hostname of the server, initiate a ping to the IP address. Initiating a ping to the IP address instead allows you to determine if the problem is a result of an issue with hostname resolution.

Below is a table showing the possible lists of ICMP-type values for results on how to perform continuous ping on OSes and network Appliances.

ICMP TypeLiteral
0echo-reply
3destination unreachable code 0 = net unreachable 1 = host unreachable 2 = protocol unreachable 3 = port unreachable 4 = fragmentation needed and DF set 5 = source route failed
4source-quench
5redirect code 0 = redirect datagrams for the network 1 = redirect datagrams for the host 2 = redirect datagrams for the type of service and network 3 = redirect datagrams for the type of service and host
6alternate-address
8echo
9router-advertisement
10router-solicitation
11time-exceeded code 0 = time to live exceeded in transit 1 = fragment reassembly time exceeded
12parameter-problem
13timestamp-request
14timestamp-reply
15information-request
16information-reply
17mask-request
18mask-reply
31conversion-error
32mobile-redirect

Furthermore, I hope you found this blog post on “Perform continuous ping on OSes and network Appliances (macOS, Linux, Windows, Juniper and Cisco devices)” helpful. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Mac, Windows, Windows Server Tags:Windows 10

Post navigation

Previous Post: Ping from Source IP Address from all environments
Next Post: How to Reset a Snom Phone

Related Posts

  • Hibernation and faststartup
    Enable or Disable hibernation: How to fix the missing fast startup option on Windows Windows
  • ReasonsforBitLockerRecovery
    Reasons for BitLocker Recovery Prompt: Query the number of BitLocker recovery request Windows
  • maxresdefault
    Install and manage IP Address Management on Windows Server Windows
  • image 35
    How to Activate and Press Ctrl+Alt+Del in Anydesk for Remote Access Connection to Windows system Windows
  • Resolvederror MBAM
    MBAM Policy was detected: Verify the OU used for pre-deployment does not apply MBAM policy Windows Server
  • KIOSK AssignedAccess
    Windows Single or Multi App Kiosks Windows

More Related Articles

Hibernation and faststartup Enable or Disable hibernation: How to fix the missing fast startup option on Windows Windows
ReasonsforBitLockerRecovery Reasons for BitLocker Recovery Prompt: Query the number of BitLocker recovery request Windows
maxresdefault Install and manage IP Address Management on Windows Server Windows
image 35 How to Activate and Press Ctrl+Alt+Del in Anydesk for Remote Access Connection to Windows system Windows
Resolvederror MBAM MBAM Policy was detected: Verify the OU used for pre-deployment does not apply MBAM policy Windows Server
KIOSK AssignedAccess Windows Single or Multi App Kiosks Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • aptira ansible 1
    The module ping was not found in configured module paths, core modules are missing Configuration Management Tool
  • 1 WeXxkEX0JG3oB781HD8Hrg 1
    Post OS installation: Configure the properties of Windows Server Windows Server
  • Root
    Change your root password: Manage the root user on your macOS Mac
  • veeam
    How to uninstall Veeam Backup and Replication from your server Backup
  • How to create edit save exit file
    Mastering Vim in Linux: How to Create, Edit, Save, and Quit Files Linux
  • Banner
    How to Deploy GitHub Repositories to cPanel using GitHub Actions Automation
  • wine 2 1
    How to install and uninstall WineHQ on Linux Linux
  • MM
    How to install Mattermost on Ubuntu and Debian Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,825 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.