Please enter search query.
Search <book_title>...
Veritas Velocity™ User's Guide
Last Published:
2017-11-28
Product(s):
Velocity (2.8)
- Getting to know Velocity
- Setting up Velocity
- How to set up the Velocity Storage Server
- How to set up the Velocity Client
- Setting up the Velocity on-premises management server
- Upgrading Velocity
- Velocity Storage Server
- Users and roles
- Oracle database ingestion using Velocity
- How to use copy preparation to mask or sanitize sensitive data
- Oracle database ingestion using NetBackup CoPilot
- Microsoft SQL Server database ingestion using Velocity
- Database sources and copies
- About scheduling ingestions for a database source
- Retention periods for database sources and copies
- Sandboxes
- Database recovery
- Alerts and logs
- Managing the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- About WAN optimization on the Velocity physical appliance
- About the Veritas Remote Management Console on the Velocity physical appliance
- About Velocity physical appliance storage
- About users on the Velocity physical appliance
- About Velocity physical appliance checkpoints
- About factory reset on the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- Monitoring the Velocity physical appliance
- Velocity physical appliance security
- About Velocity physical appliance user account privileges
- About the Velocity physical appliance intrusion detection system
- About Velocity physical appliance operating system security
- Recommended IPMI settings on the Velocity physical appliance
- Best practices
- Troubleshooting
- Glossary
- Context-sensitive topics
- Section I. Velocity shell menu commands
- Introduction
- Appendix A. Main > Manage > Storage
- Appendix B. Main > Manage > Cloud
- Appendix C. Main > Manage > Software
- Appendix D. Main > Monitor
- Appendix E. Main > Network
- Appendix F. Main > Settings
- Appendix G. Main > Support
Name
Main > Network > Ping — An attempt to reach a host or IP address with ICMP ECHO_REQUESTs
SYNOPSIS
Ping Host
DESCRIPTION
This command exists under the Main_Menu > Network view. Use this command to test whether a particular host is reachable across an Internet Protocol (IP) network. The command sends a small packet if information to a hostname or an IP address to test network communications. It then provides information on how long the packet took to come back to its origin.
- Ping Host
Used to send a small packet of ICMP ECHO_REQUESTs to a host name or an IPv4 or IPv6 address of the target computer to test the network communications.
Where Host is the hostname or the IPv4 or IPv6 address of the target computer.