Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Support
Technical Documentation
Content Explorer New
 
Enterprise MIBs
 
EOL Documentation
 
Feature Explorer Login required New
 
File Format Help
 
Glossary
 
Portable Libraries
 
 
Home > Support > Technical Documentation > JunosE Software > Determining Reachability of IP Destinations in the Network
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...
 

Related Documentation

  • Before You Configure IP
  • IP Profiles
  • ping
  • traceroute
 

Determining Reachability of IP Destinations in the Network

You can determine reachability of destinations in the network using the ping and traceroute commands.

  • Sending Echo Request Packets to the IP Address
  • Discovering the Routes Followed by Router Packets when Traveling to the IP Destination

Sending Echo Request Packets to the IP Address

You can send an Internet Control Message Protocol (ICMP) or ICMPv6 echo request packet to a specific IP address using the ping command.

The following characters can appear in the display after issuing the ping command:

  • !—Reply received
  • .—Timed out while waiting for a reply
  • ?—Unknown packet type
  • A—Address mask request message
  • a—Address mask reply message
  • D—Router discovery advertisement message
  • d—Router discovery request message
  • H—Host unreachable
  • I—Information request message
  • i—Information reply message
  • L—TTL expired message
  • M—Could not fragment, DF bit set
  • m—Parameter problem message
  • N—Network unreachable
  • P—Protocol unreachable
  • Q—Source quench
  • r—Redirect message
  • T—Timestamp request message
  • t —Timestamp reply message
  • U—Destination unreachable

To send an ICMP echo request packet to the IP address that you specify:

  • Issue the ping command in Privileged Exec mode.
    host1#ping 172.16.1.1 extended interface serial 5/2:1/1

Discovering the Routes Followed by Router Packets when Traveling to the IP Destination

You can discover routes that router packets follow when traveling to their destination using the traceroute command.

You can specify the following:

  • A VRF context
  • Destination IP or IPv6 address
  • Source interface for each of the transmitted packets
  • Source address for each of the transmitted packets
  • Maximum number of hops of the trace and a timeout value
  • Size of the IP packets (not the ICMP payload) in the range 0–64000 bytes sent with the traceroute command. Including a size might help locate any MTU problems that exist between your router and a particular device.
  • Extended IP header attributes, including the ToS byte (IP only), whether to set the DF bit for the transmitted packets (IP only), the traffic class (IPv6 only), and flow label (IPv6 only).

You can also force transmission of the packets on a specified interface regardless of what the IP address lookup indicates.

To discover the routes that router packets follow when traveling to their destination:

  • Issue the traceroute command in Privileged Exec mode.
    host1#traceroute 172.20.13.1 20 timeout 10
 

Related Documentation

  • Before You Configure IP
  • IP Profiles
  • ping
  • traceroute
 

Published: 2012-06-20

 
  • About Juniper
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Green Networking
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Developers
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out