{"id":2278,"date":"2015-11-21T13:49:00","date_gmt":"2015-11-21T13:49:00","guid":{"rendered":"https:\/\/jay-miah.co.uk\/?p=2278"},"modified":"2024-11-18T15:13:44","modified_gmt":"2024-11-18T15:13:44","slug":"allow-icmp-ping-on-windows-10-8-server-2012-r2","status":"publish","type":"post","link":"https:\/\/jay-miah.co.uk\/index.php\/allow-icmp-ping-on-windows-10-8-server-2012-r2\/","title":{"rendered":"Allow ICMP \u201cPing\u201d on Windows 10\/8\/Server 2012 R2"},"content":{"rendered":"<p>By default Windows 10\/8.1\/8 and Windows Server 2012\/R2 does not allow ICMP packets through the windows firewall. In this quick step-by-step guide we will\u00a0create an inbound rule on the\u00a0the Windows Firewall to\u00a0allow \u201cPing\u201d ICMP packets through.<\/p>\n<p><strong>Test\u00a0ping to make sure it is blocked<\/strong><\/p>\n<p><strong>1.\u00a0<\/strong>Test that ICMP packets are being blocked on the machine in question by using ping to test connectivity from another machine on the same subnet. Launch \u201cCMD\u201d and type \u201cPing\u201d followed by the IP address of the machine. from the output below we can see that the ping is failing by the response generated \u201cRequest timed out\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"339\" class=\"wp-image-2279\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-1.jpeg\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Create an Inbound Rule to Allow Ping<\/strong><\/p>\n<p><strong>1.\u00a0<\/strong>On the machine you want to allow ping on, click start and launch \u201cWindows Firewall with Advanced Security\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"393\" height=\"623\" class=\"wp-image-2280\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-2.jpeg\" \/><\/p>\n<p><strong>2.\u00a0<\/strong>Select \u201cInbound Rules\u201d from the left pane and under \u201cActions\u201d click \u201cNew Rule\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1043\" height=\"395\" class=\"wp-image-2281\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-3.jpeg\" \/><\/p>\n<p><strong>3.\u00a0<\/strong>At the wizard, select \u201cCustom\u201d and click \u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"579\" class=\"wp-image-2282\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-4.jpeg\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0 Select \u201cAll Programs\u201d and click \u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"579\" class=\"wp-image-2283\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-5.jpeg\" \/><\/p>\n<p><strong>5.<\/strong>\u00a0 From the \u201cProtocol type\u201ddrop down box select \u201cICMPv4\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"579\" class=\"wp-image-2284\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-6.jpeg\" \/><\/p>\n<p><strong>6.<\/strong>\u00a0Click Customize<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"579\" class=\"wp-image-2285\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-7.jpeg\" \/><\/p>\n<p>Make sure \u201cAll ICMP types\u201d is selected and click \u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"505\" class=\"wp-image-2286\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-8.jpeg\" \/><\/p>\n<p><strong>7.<\/strong>\u00a0At the Scope options, you can define\u00a0IP addresses\/Subnets for which you want to allow Ping from. in this case we want to allow it from anywhere. Click \u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"578\" class=\"wp-image-2287\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-9.jpeg\" \/><\/p>\n<p><strong>8.<\/strong>\u00a0Select \u201cAllow the Connection\u201d and click \u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"711\" height=\"579\" class=\"wp-image-2288\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-10.jpeg\" \/><\/p>\n<p><strong>9.<\/strong>\u00a0Select which policy you want to\u00a0apply the rule to, in most cases you would only select \u201cDomain\u201d and \u201cPrivate\u201d in this case we will apply it to all three.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"581\" class=\"wp-image-2289\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-11.jpeg\" \/><\/p>\n<p><strong>10.<\/strong>\u00a0Give the rule a meaningful name and a description, finally click \u201cFinish\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"579\" class=\"wp-image-2290\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-12.jpeg\" \/><\/p>\n<p>The newly created rule will appear in the rules section<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1045\" height=\"249\" class=\"wp-image-2291\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-13.jpeg\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Test ping to make sure ICMP is\u00a0now allowed<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0From another machine on the same subnet, launch CMD and test that ping is now able to reach the configured machine. you should receive a reply which indicates the newly created rule is working<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"339\" class=\"wp-image-2292\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2278-14.jpeg\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By default Windows 10\/8.1\/8 and Windows Server 2012\/R2 does not allow ICMP packets through the windows firewall. In this quick step-by-step guide we will\u00a0create an<\/p>\n","protected":false},"author":1,"featured_media":2293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[151],"tags":[58,146,147],"class_list":["post-2278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-server-endpoint","tag-icmp","tag-ping","tag-windows-firewall"],"_links":{"self":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2278"}],"version-history":[{"count":1,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2278\/revisions"}],"predecessor-version":[{"id":2294,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2278\/revisions\/2294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/media\/2293"}],"wp:attachment":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=2278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=2278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}