Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows Server » Perform continuous ping on OSes and network Appliances
  • BitLocker34
    BitLocker Back Door: Stolen laptop to inside the company network Security | Vulnerability Scans and Assessment
  • settings app not working featured 800x400 1
    How to search through the Windows registry Windows Server
  • Azure Virtual Desktop
    How to deploy Azure Virtual Desktop in Azure Portal Virtualization
  • Featured image  Install new fonts
    How to install new fonts in Microsoft Office Windows
  • Fix Secure Boot certificate expiration
    Enable Secure Boot: Fix Secure Boot certificates expiration Windows
  • Screenshot 2021 02 01 at 12.25.27
    MySQL Workbench could not connect to MySQL server Oracle/MSSQL/MySQL
  • Steps to upgrade VBR to v12.1
    How to upgrade Veeam Backup and Replication v11 to 12.1 Backup
  • Webp.net resizeimage 4
    Create a Service Fabric Cluster using the Azure Stack Hub portal and the CLI AWS/Azure/OpenShift

Perform continuous ping on OSes and network Appliances

Posted on 16/12/201815/10/2024 Christian By Christian No Comments on Perform continuous ping on OSes and network Appliances
continuous ping

In this article, we shall discuss “Perform continuous ping on OSes and network Appliances (macOS, Linux, Windows, Juniper and Cisco devices)”. Ping is referred to as “Packet Internet Groper”. It is used to troubleshoot the accessibility of devices between two endpoints i.e., to ensure data packet is transmitted to its destination successfully. Please see how to Analyse Disks with Treesize: Defragment and Shrink VMware Workstation VM Disks, and how to Ping from Source IP Address from all environments.

This utility uses a series of Internet Control Message Protocol (ICMP) echo messages to determine whether a remote host is active or inactive. The round-trip delay in communicating with the host, and packet loss. The ping command first sends an echo request packet to an address and then waits for a reply.

Furthermore, the ping is successful only if the echo request gets to the destination. The destination gets an echo reply back to the source within a predetermined time called a timeout.

The ping utility is available to the following platforms such as Windows, Linux, and macOS as a network administration tool. As well as to networking platforms such as Cisco, Cisco ASA, etc.

Also, see Ping request could not find the host: Verify if the name is entered correctly. Here is an article on “what is transit failed, general failure, request timed out and destination host unreachable“.

How to perform a continuous ping on macOS

As System and Network Administrators, it is inevitable that we must test network connectivity. That is, test connectivity between different components of our network or between systems and VMs as well.

This protocol accomplishes this by sending 32 bytes of packet to the destination server. Below is an example of the ping command in action. When you ping a server that is very close to you. The reaction time in (ms) will considerably be lower than a server that is further away. Thereby leading to higher reaction time (ms).

The ping command sends an echo request to a destination server or device and waits for a response, known as the echo reply packet. If the source server, client, or network device does not receive an echo reply within a predefined timeout period, it indicates a connectivity issue. By default, this timeout period is set to two seconds on Cisco routers.

If the ping command successfully receives the echo reply within this timeframe, it confirms that connectivity is intact.

Note: The Time to leave (TTL) value of a ping packet cannot be changed.

macOS
Ping command on a Windows PC.
As you can see. It does not provide data about routing or hops. But it is a very useful metric for gauging the latency between two devices as you can see in the two pings performed in the image above.

Note: The ping utility is a simplified version of traceroute. It will test the speed of the connection between two devices and report how long it takes for the packet to reach its destination and return to the sender’s device as seen in the screenshot above.

What is ICMP and how does it work?

We have referred to ICMP a lot in this article and I will therefore be discussing it in detail. ICMP is a network layer protocol used by network devices to diagnose and report network issues back to the source. It sends control messages such as destination network unreachable, source route failed, and source quench to the source device.

ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. See this guide on how to configure TCP/IP on a Server and other Windows Server properties.

This means, ICMP is used for reporting a service that is not reachable (available) or when a host can not be found on the network. But it can also be used in distributed denial-of-service (DDoS) attacks.

Note: ICMP is not associated with a transport layers protocol such as TCP or UDP, thereby making ICMP a connectionless protocol. No device is required to initiate a connection with another device before sending an ICMP message.

Normal IP traffic is sent using TCP. This means any two devices that exchange data will first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP does not open a connection in this way. The ICMP protocol also does not allow for targeting a specific port on a device.

Here are some related troubleshooting guides: Ansible error: Server unreachable, ssl: auth method ssl requires a password, and the module ping was not found in configured module paths: Additionally core modules are missing.

How to initiate a continuous ping

Continuous ping is a common debugging method to check whether IPv4 and IPv6 network devices are reachable. It uses Internet Control Message Protocol (ICMP) Echo messages to check Whether the remote device is available, the Round-trip delay in communicating with the remote host, and Whether packets are lost. But this can lead to an ICMP flood attack.

ICMP flood also known as Ping flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources.

This causes the target to become inaccessible to normal traffic and will cause legitimate users cannot to receive service. Others types of ICMP request attacks may involve custom tools or code, such as hping and scapy. The image below is an example of software used to perfom ping flood.

Linux
src:researchgate

Please see why can’t I ping the Public IP Address an EC2 instance?, and how to resolve request timed out when pinging and how to create a Firewall rule.

Perform Continuous ping on Windows

Continuous ping can be realized in the following ways. Open Command Prompt and type the command ‘ping’ followed by the IP Address and followed by ‘-t’ flag. To stop the ping, after seeing enough results, press Ctrl + C.

Ping -t 192.168.2.1
or
ping 192.168.2.1 -t
Screenshot-2021-02-24-at-00.52.34
Example of a continuous ping request

For Mac OSX

The command ping is used to test whether your computer can communicate with another device (computer/server/printer) connected to your network or the internet. To initiate a ping test in Mac OS, please follow the steps below.

  • Click on the “Launchpad” and from the search window,
  • Type “Terminal” as shown below. Kindly refer to this how to change the default screen capture format in macOS on the various methods to launch the Terminal on macOS.
  • Double click on the Terminal to launch it.
iterm

In the Terminal window type ping <followed by the server name or IP> that you want to ping. The command should look like the command below and press Enter. A successful ping response is similar to the following:

Ping google.com
Perform continuous ping on Mac

A successful response has a few notable elements: Repeating lines showing that bytes were sent, and the time the trip took (in milliseconds (ms)) and statistics that the packets transmitted were also received, with minimal to no packet loss.

Note: If this is also not continuous by default, simple run it this way for MacOSX

/sbin/ping google.com

For Linux

The Ping command line is configured by default for looping in Linux . To execute the continuous ping command in Linux, proceed as follows. Open the console of your Linux distribution, and search for terminal. When open, simply type as shown below, but your IP 🙂

Linux-terminal

Please run the command below

ping google.com
Screenshot-2021-02-24-at-02.14.44

High count rate can also be indicated for a long period of time. See example below. This example will ping  about 333 times.

ping 192.168.1.1 -c 333

If this continuous ping does not work by default, there is probably an alias for the ping command that changes how you invoke the ping utility. The solution would be to find the ping command by using the command below.

which ping

Next call the ping program from the path and it should be continuous.

/bin/ping 192.168.2.1

For Juniper

This is by default as well. Simply run 

ping 192.168.2.1

For Cisco Devices

Ranging from ASA, Switches and Router, continuous ping is not possible but can be repeated as shown below

ping 192.168.2.1 repeat 333

If this repeat command does not work, simple enter the ping command. To stop or kill the ping session in most environments, please hit the Ctrl + C on your keyboard.

ctrl + c

If you do not see a response when pinging by the hostname of the server, initiate a ping to the IP address. Initiating a ping to the IP address instead allows you to determine if the problem is a result of an issue with hostname resolution.

Below is a table showing the possible lists of ICMP-type values for results on how to perform continuous ping on OSes and network Appliances.

ICMP TypeLiteral
0echo-reply
3destination unreachable code 0 = net unreachable 1 = host unreachable 2 = protocol unreachable 3 = port unreachable 4 = fragmentation needed and DF set 5 = source route failed
4source-quench
5redirect code 0 = redirect datagrams for the network 1 = redirect datagrams for the host 2 = redirect datagrams for the type of service and network 3 = redirect datagrams for the type of service and host
6alternate-address
8echo
9router-advertisement
10router-solicitation
11time-exceeded code 0 = time to live exceeded in transit 1 = fragment reassembly time exceeded
12parameter-problem
13timestamp-request
14timestamp-reply
15information-request
16information-reply
17mask-request
18mask-reply
31conversion-error
32mobile-redirect

Furthermore, I hope you found this blog post on “Perform continuous ping on OSes and network Appliances (macOS, Linux, Windows, Juniper and Cisco devices)” helpful. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Mac, Windows, Windows Server Tags:Windows 10

Post navigation

Previous Post: Ping from Source IP Address from all environments
Next Post: How to Reset a Snom Phone

Related Posts

  • prettier boot image
    How to stop Cisco Webex Meetings from starting up automatically on macOS Mac
  • How to Decrypt Files and Folders Encrypted with EFS in Windows 10
    How to decrypt Files and Folders Encrypted with an Encryption File System (EFS) in Windows Windows
  • task manager not responding thumbnail
    Process Explorer: Replace built-in Task Manager Windows Server
  • Featured image Unblock Microsoft Store
    How to Unblock Microsoft Store on Windows 11 Windows
  • RDlicensePerUser
    RDS client access licenses: How to install a new Per User Remote Desktop Services license Windows Server
  • article 1280x720.192a2586 1 1
    Fix Error 0xc1510111: You do not have permission to mount and modify this image Windows Server

More Related Articles

prettier boot image How to stop Cisco Webex Meetings from starting up automatically on macOS Mac
How to Decrypt Files and Folders Encrypted with EFS in Windows 10 How to decrypt Files and Folders Encrypted with an Encryption File System (EFS) in Windows Windows
task manager not responding thumbnail Process Explorer: Replace built-in Task Manager Windows Server
Featured image Unblock Microsoft Store How to Unblock Microsoft Store on Windows 11 Windows
RDlicensePerUser RDS client access licenses: How to install a new Per User Remote Desktop Services license Windows Server
article 1280x720.192a2586 1 1 Fix Error 0xc1510111: You do not have permission to mount and modify this image Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • BitLocker34
    BitLocker Back Door: Stolen laptop to inside the company network Security | Vulnerability Scans and Assessment
  • settings app not working featured 800x400 1
    How to search through the Windows registry Windows Server
  • Azure Virtual Desktop
    How to deploy Azure Virtual Desktop in Azure Portal Virtualization
  • Featured image  Install new fonts
    How to install new fonts in Microsoft Office Windows
  • Fix Secure Boot certificate expiration
    Enable Secure Boot: Fix Secure Boot certificates expiration Windows
  • Screenshot 2021 02 01 at 12.25.27
    MySQL Workbench could not connect to MySQL server Oracle/MSSQL/MySQL
  • Steps to upgrade VBR to v12.1
    How to upgrade Veeam Backup and Replication v11 to 12.1 Backup
  • Webp.net resizeimage 4
    Create a Service Fabric Cluster using the Azure Stack Hub portal and the CLI AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.