What does "TTL expired in transit" mean?

Posted on 2009-02-12
Last Modified: 2013-11-30
We have a T1 line between two sites. Our main office and warehouse. When the line is down and I ping to the router which is an Adtran on the other site, we normally get the answer "Request timed out," but now we get the answer "TTL expired in transit." What does it mean?
they been down for more than 2 hours and ISP says that line seems to be fine but they dont see any traffic on it. Ive rebooted both Adtran devices. Ping did state request timed out till ISP tech started doing some testing.
Question by:eazstream
    LVL 32

    Accepted Solution

    TTL=Time to live
    A packet has a life timer that keeps it from looping forever. It basically mean the time ran out before there was confirmation the packet arrived at its destination.

    Author Comment

    do you think this is an issues with our hardware routing devices or ISP?
    LVL 32

    Assisted Solution

    by:Rodney Barnhardt
    Is it for everything you send? From a command prompt on a computer, type the following:
    This is the IP of a Google server. If you get a reply the first time, that is your gateway, if you get another reply, that is your ISP. This can help you track down the problem. If it gets to your ISP, it may be there problem.

    Author Comment

    thanks but this wont work, main office connect out to the net with a different T1 line, we have 2 T1 lines, one for outgoing to the internet and the other one is in question which connects the warehouse to the main office and provides warehouse access to the net.
    thanks for your patience, im new to this.
    thanks again

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now