There are a few key tools used in network troubleshooting that utilize ICMP, such as Ping, Tracert, and Netstat. For this discussion, address each of these tools and how they are used to identify network issues. When would it be appropriate to block the use of ICMP or one of the key tools, and what problems would blocking it on a network generate?

There are a few key tools used in network troubleshooting that utilize ICMP, such as Ping, Tracert, and Netstat. For this discussion, address each of these tools and how they are used to identify network issues. When would it be appropriate to block the use of ICMP or one of the key tools, and what problems would blocking it on a network generate?