Solved

How to use custom gateway with traceroute/ping?

Posted on 2011-03-10
4
723 Views
Last Modified: 2012-05-11
Hello, I feel like I am unable to do ping and traceroute with my default kernel routing table. Is there a way to put the custom router ip (gateway address) while using ping/traceroute. Thanks!
0
Comment
Question by:beer9
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Sikhumbuzo Ntsada earned 250 total points
ID: 35105534
Try the following, substitute the IP addresses with yours and subnet mask:

route add -net 192.168.98.0 netmask 255.255.255.0 gw 192.168.99.1
0
 
LVL 17

Expert Comment

by:Sikhumbuzo Ntsada
ID: 35105537
Then  ping / traceroute
0
 
LVL 2

Assisted Solution

by:Saikapian_4739
Saikapian_4739 earned 250 total points
ID: 35107197
This is a bit tricky question if you understand. Lets understand it step by step :

You are unable to ping or traceroute using your default routing table, which means that you are unable to connect to particular host you are trying to connect.

So first thing to try out here before changing your router address or default gateway is to test if you are able to ping your Default gateway or  router address, if the ping succeeds that means your router or Default is unable to connect to remote host. But if the ping to Default GAteway also fails it means that there is something wrong at your end since your own system in unable to ping the Gateway.

So in that case you need to check the network connectivity, settings for your network card.

Changing the Default gateway or router will work only if the previous Gateway is not routing the network packets to next destination but it able to recieve packets from your system

I think it will help.
0
 

Author Closing Comment

by:beer9
ID: 35154369
Thank you! :-)
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question