?
Solved

How to use custom gateway with traceroute/ping?

Posted on 2011-03-10
4
Medium Priority
?
745 Views
Last Modified: 2012-05-11
Hello, I feel like I am unable to do ping and traceroute with my default kernel routing table. Is there a way to put the custom router ip (gateway address) while using ping/traceroute. Thanks!
0
Comment
Question by:beer9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Sikhumbuzo Ntsada earned 1000 total points
ID: 35105534
Try the following, substitute the IP addresses with yours and subnet mask:

route add -net 192.168.98.0 netmask 255.255.255.0 gw 192.168.99.1
0
 
LVL 17

Expert Comment

by:Sikhumbuzo Ntsada
ID: 35105537
Then  ping / traceroute
0
 
LVL 2

Assisted Solution

by:Saikapian_4739
Saikapian_4739 earned 1000 total points
ID: 35107197
This is a bit tricky question if you understand. Lets understand it step by step :

You are unable to ping or traceroute using your default routing table, which means that you are unable to connect to particular host you are trying to connect.

So first thing to try out here before changing your router address or default gateway is to test if you are able to ping your Default gateway or  router address, if the ping succeeds that means your router or Default is unable to connect to remote host. But if the ping to Default GAteway also fails it means that there is something wrong at your end since your own system in unable to ping the Gateway.

So in that case you need to check the network connectivity, settings for your network card.

Changing the Default gateway or router will work only if the previous Gateway is not routing the network packets to next destination but it able to recieve packets from your system

I think it will help.
0
 

Author Closing Comment

by:beer9
ID: 35154369
Thank you! :-)
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Fine Tune your automatic Updates for Ubuntu / Debian
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses
Course of the Month9 days, 1 hour left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question