{"id":194185,"date":"2023-10-07T16:45:40","date_gmt":"2023-10-07T16:45:40","guid":{"rendered":"https:\/\/ded9.com\/?p=194185"},"modified":"2025-10-11T07:02:04","modified_gmt":"2025-10-11T07:02:04","slug":"what-is-icmp","status":"publish","type":"post","link":"https:\/\/ded9.com\/de\/what-is-icmp\/","title":{"rendered":"ICMP: The Network Protocol That Speaks When Things Go Wrong"},"content":{"rendered":"<p>When information is transmitted over the Internet, computer systems send and receive data using the Transmission Control Protocol\/Internet Protocol (TCP\/IP) protocol. If there is a connection problem, error, or connection status, messages are sent using ICMP, part of the Internet Protocol.<\/p>\n<p class=\"card-text\">When a computer connects to another system over the Internet (such as a home computer connecting to a web server to view a website), it may seem like a quick and easy process. While the connection may take a few seconds, there are often many separate connections that must occur for the computers to communicate with each other successfully. If you were to trace the entire process of connecting to the Internet using the traceroute command, you might be surprised that Internet connections are as successful as they are. This is because for each &#8220;hop&#8221; along the way, the network must be functional and able to accept requests from your computer.<\/p>\n<p class=\"card-text\">In cases of connection problems, ICMP can send return codes to it. Your system will explain why the connection failed.<\/p>\n<p class=\"card-text\">These messages may be &#8220;Network Unreachable&#8221; for a system that is down or &#8220;Access Denied&#8221; for a secure, password-protected system. ICMP may also provide routing suggestions to help bypass responding systems. While ICMP can send many messages, most of them are never seen by the user. Even if you get an error message, the software you&#8217;re using, such as a web browser, has most likely already translated the message into plain (hopefully less technical) language you can understand.<\/p>\n<h2 class=\"syn\">What does ICMP stand for?<\/h2>\n<div class=\"summary\">\n<p>Internet Control Message Protocol or &#8220;Internet Control Message Protocol.&#8221;<\/p>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\">\n<div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\">\n<div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\">\n<div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\">\n<div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\">\n<h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"20\" data-lineheight=\"34px\">What is the application of ICMP?<\/h2>\n<\/div>\n<div class=\"fusion-text fusion-text-2\">\n<p>The main use of ICMP is to send error reports. When two devices are connected to each other through the Internet. If the data of any of these devices does not reach the destination, ICMP sends the desired error report to the source. For example, if the data sent is too large for a router, the router drops the packet and sends an ICMP message about the dropped data to the source.<\/p>\n<p>Another use of ICMP is to diagnose and troubleshoot network problems, which is frequently used in the network support process. Common network tools such as ping and traceroute both use the ICMP protocol. The traceroute tool shows the route of the desired information to the destination and the number of routers on the way, the actual physical route of the connected routers that the request must go through before reaching the destination. This command can determine the reason for the delay of the packet sent to the destination.<\/p>\n<p>A <a href=\"https:\/\/ded9.com\/how-to-use-the-linux-ping-command\/\">ping<\/a> tool is a simplified version of Traceroute. Ping tests the connection speed between two devices and reports how long it takes for the desired information to reach the source and then for the destination to respond to the source. Although Ping provides routing information and doesn&#8217;t show the routers between the source and destination, it&#8217;s still a very useful metric for measuring latency between two devices. Echo-request and echo-reply are ICMP messages for ping operations.<\/p>\n<p>Unfortunately, network attacks can exploit this process and cause network disruptions, such as ICMP flood attacks and ping death attacks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\">\n<div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\">\n<div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\">\n<div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\">\n<div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-one\">\n<h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"20\" data-lineheight=\"34px\">How does ICMP work?<\/h2>\n<\/div>\n<div class=\"fusion-text fusion-text-3\">\n<p>Unlike the IP protocol, ICMP is not associated with a transport layer protocol such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Transmission_Control_Protocol\" target=\"_blank\" rel=\"noopener\">TCP<\/a> or UDP. This makes ICMP a connectionless protocol. In other words, a device does not need to open the sent packet to send a message to the destination. Meanwhile, normal traffic is carried out by the IP protocol using the TCP protocol, so that both devices, before communicating and sending information to each other, must handshake to measure the readiness of both devices to send and receive information. Before sending the main information, they share other information with each other. ICMP also does not target a specific port on a device.<\/p>\n<h2>FAQ<\/h2>\n<div id=\"rank-math-rich-snippet-wrapper\"><div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-1\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What purpose does ICMP serve in networks?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>ICMP lets devices send error messages and operational information when IP packets fail to reach their destination.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-2\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Which tools use ICMP?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Ping and traceroute use ICMP messages (echo requests and replies, time exceeded) to test connectivity and trace routes.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-3\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Can ICMP be exploited or blocked?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes \u2014 it\u2019s sometimes used in DDoS attacks (e.g. ICMP floods). Many firewalls block or limit ICMP to enhance security.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>When information is transmitted over the Internet, computer systems send and receive data using the Transmission Control Protocol\/Internet Protocol (TCP\/IP) protocol. If there is a connection problem, error, or connection status, messages are sent using ICMP, part of the Internet Protocol. When a computer connects to another system over the Internet (such as a home [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":194236,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[92],"tags":[10659,1026,10660],"class_list":["post-194185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","tag-icmp","tag-internet","tag-internet-protocol"],"acf":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/194185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/comments?post=194185"}],"version-history":[{"count":3,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/194185\/revisions"}],"predecessor-version":[{"id":263276,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/194185\/revisions\/263276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/media\/194236"}],"wp:attachment":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/media?parent=194185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/categories?post=194185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/tags?post=194185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}