I. Ping Introduction Ping is a command in windows, which is also available in UNIX and Linux. Ping also belongs to a communication protocol and is part of the TCP/IP protocol. The ping command can be used to check whether the network is connected,
Article No.: 1005-6033 (2006) 18-0230-02
Abstract: A convenient and practical ping command for Network Fault Diagnosis tool is introduced. The working principle, usage method and practical application in Network Fault Elimination are discussed.
Key
1, the basic knowledge of ping
The ping command believes that we are all familiar with but it is not a lot of people who can play the role of Ping, of course, I am not saying that I can let ping play the most functions, I just often use ping this
Document directory
1. Ping 127.0.0.1
2. Ping 192.168.1.10 [if this is the IP address of the Local Machine, use ipconfig to view the result]
3. Ping 192.168.1.38 [assume this is the IP address of a host in the same network segment in the LAN]
4.
Ping is a very frequently used utility that determines whether a local host can exchange (send and receive) datagrams with another host. Based on the information returned, we can infer whether the TCP/IP parameters are set correctly and run
Prohibit the use of PING commands under Linux
Enter the Linux system with root and edit the file Icmp_echo_ignore_allVi/proc/sys/net/ipv4/icmp_echo_ignore_allTo disable ping after changing its value to 1To unblock ping after changing its
ping command and network port:1.Ping 127.0.0.1127.0.0.1 is the local circular address, ping General instructions that the TCP/IP protocol works properly, otherwise TCP/IP is not normal.2.Ping IP address for this computerUse the ipconfig command to
1. Network Tools: ifconfig, ping, netstate, Redhat command and graphical settings of ip, finger, nslookup, ifconfignetstateZookeeper
1 ip ad view Nic ID
2. View Nic information in ifconfig
3. Disable the NIC
4. Start the NIC
5. configure a
When first joining the domain, the client makes general DNS and LDAP queries and gets a list of all the domain controllers In the domain, and it goes down the list, trying LDAP binds, and the first successful DC so it binds to-that is the F Irst DC
Intranet penetration-domain penetration Basics1. Domain environment construction + recognition domain + experiment environment
1. Preface:I have always wanted to penetrate the domain, but unfortunately I have not met a good domain environment. I
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.