From the course: Cisco CCNP SCOR Security (350-701) Cert Prep: 3 Endpoint Protection and Secure Access
Unlock this course with a free trial
Join today to access over 22,600 courses taught by industry experts.
ICMP
- [Instructor] The internet control message protocol better known as ICMP, is a common tool that we use for diagnosing network communication issues. Most commonly, we use this to determine if data is reaching its intended destination or if a remote device is reachable. We also see this used for distributed denial of service attacks as well through techniques such as ping floods. Ping floods can be used to overwhelm a targeted device with a large number of ICMP echo request packets in an attempt to destabilize or crash a system. Because this is a fundamental protocol used throughout the internet, every IP network device has the capability to process ICMP messages. Although you may maybe most familiar with the 64 byte default ping packet size, ICMP packets do have a variable size data section. When we use a typical ping command to test host reachability over a network, the pinging host will send an ICMP echo request to a target host. This contains some data that will be echoed back by…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Guest services6m 48s
-
(Locked)
Profiling7m 32s
-
(Locked)
BYOD policies5m 52s
-
802.1X11m 11s
-
(Locked)
MAB4m 56s
-
(Locked)
WebAuth7m 43s
-
(Locked)
DNS tunneling3m 15s
-
(Locked)
HTTPS3m 50s
-
(Locked)
Email3m 12s
-
(Locked)
File transfer protocols3m 54s
-
(Locked)
ICMP4m 8s
-
(Locked)
NTP3m 34s
-
Cisco Stealthwatch6m 58s
-
(Locked)
Cisco Stealthwatch cloud5m 53s
-
(Locked)
Cisco pxGrid4m 10s
-
(Locked)
Cisco CTA and ETA6m 23s
-
(Locked)
Cisco AnyConnect Network Visibility Module (NVM)3m 26s
-
(Locked)
-