Troubleshooting: Why Ping When You Can CryPing?
As a network analyst, you probably use ping every day in your work. The utility is an essential part of the network troubleshooting toolbox. We ping to:
- check if a device is up or reachable
- resolve a host name
- determine if there is a latency issue
- identify packet loss
- test IP Time To Live values
- validate if certain packet sizes are able to traverse your network
Because the protocol used by ping, ICMP, can be exploited by hackers, network administrators in the past few years began blocking or rerouting ICMP traffic.This diminishes ping's effectiveness.
I'm often asked what I use as an ICMP ping replacement. I always point people to CryPing, a free command-line, portable tool that can ping using ICMP, but has a host of additional features. You can perform TCP port checks, test HTTP, POP, SMTP and even NNTP.
In this video, I use Wireshark to demonstrate how CryPing works.
I like to use CryPing to compare response times for TCP 80 port check, HTTP, and ICMP pings.
Recommended For You
Most successful IBN deployments focus on the network verification process. Not only is it safe, it also can easily integrate into existing networks and workflows.
Continuous monitoring and baselining of net performance monitoring metrics can reveal problems before users do and prevent complaints on performance degradation.
It's time to move past some common misconceptions and fears about SD-WAN. Here are three common myths you can ignore.
As the routing protocol that runs the Internet, BGP is a key piece of the puzzle that helps you understand how your customers get to you.
From a network planning and design perspective, manually created diagrams drawn by a human architect will continue to be the go-to method for years to come.