Cek ping di run

broken image
broken image

The response has a timer that may expire, indicating the destination is unreachable. The ping command sends a very small packet to the destination, and waits for a response.

broken image

Since you typically use these tools to troubleshoot, you can allow them in the security policies and on interfaces only when you need them, and otherwise keep the ports disabled for added security. If ping does not work, you likely have it disabled on at least one of the interface set- tings, and security policies for that interface.īoth ping and traceroute require particular ports to be open on firewalls, or else they cannot function. This is an added troubleshooting feature that can be useful in determining why particular services, such as email or web browsing, may not be working properly. While both tools can use IP addresses alone, they can also use domain names for devices. In addition to their normal uses, ping and traceroute can tell you if your computer or network device has access to a domain name server (DNS). This combination can be very powerful when locating network problems. However, ping can be used to generate simple network traffic to view with diagnose commands on the FortiGate unit. Alone, either one can determine network connectivity between two points. Ping and traceroute are useful tools in network troubleshooting.