Troubleshooting: Why Ping When You Can CryPing?
As a network analyst, you probably use ping every day in your work. The utility is an essential part of the network troubleshooting toolbox. We ping to:
- check if a device is up or reachable
- resolve a host name
- determine if there is a latency issue
- identify packet loss
- test IP Time To Live values
- validate if certain packet sizes are able to traverse your network
Because the protocol used by ping, ICMP, can be exploited by hackers, network administrators in the past few years began blocking or rerouting ICMP traffic.This diminishes ping's effectiveness.
I'm often asked what I use as an ICMP ping replacement. I always point people to CryPing, a free command-line, portable tool that can ping using ICMP, but has a host of additional features. You can perform TCP port checks, test HTTP, POP, SMTP and even NNTP.
In this video, I use Wireshark to demonstrate how CryPing works.
I like to use CryPing to compare response times for TCP 80 port check, HTTP, and ICMP pings.
Recommended For You
Low-Power WANs offer an alternative to 5G for connecting a fast-growing array of basic devices and sensors that transmit small amounts of data.
An effective network visibility strategy requires understanding the technical, financial, political, and legal aspects impacting your network operations.
Emerging organizational structures for IT include placement of IT pros in user areas and departments forming their own "micro IT's."
Comparing a good and bad trace helps identify performance issues. Dynamic baselining can be used when you do not have a good trace to reference.
Combining commodity server platforms and FPGA-based SmartNICs will allow network applications to operate at hundreds of gigabits of throughput with support for millions of simultaneous flows.
SD-WAN implementations are on the rise thanks to the potential cost savings, increased network resiliency, and better application performance they deliver.