Skip to main content
Version: 1.0.0

Task 08: Enable ICMP (Ping)

Runbook Azure Dell

DOCUMENT CATEGORY: Runbook
SCOPE: Firewall configuration
PURPOSE: Enable ICMP ping on all cluster nodes so that network connectivity can be tested and validated throughout the deployment process
MASTER REFERENCE: Phase 03: OS Configuration

Status: Active Estimated Time: 2 minutes per node / 5 minutes orchestrated (all nodes)


Overview

Windows Server blocks ICMP by default. Enabling the ICMPv4-In and ICMPv6-In firewall rules allows ping-based connectivity validation from the management server and between nodes — required for cluster health checks, network diagnostics, and Azure Local validation tooling.

What the scripts do:

  1. Enable File and Printer Sharing (Echo Request - ICMPv4-In)
  2. Enable File and Printer Sharing (Echo Request - ICMPv6-In)
  3. Verify each rule is enabled and report pass/fail

No configuration variables are required — this task has no values to read from variables.yml.


Prerequisites

RequirementDescriptionSource
Task 07 completeNTP configured on all nodesTask 07: Configure NTP
Local admin rightsRequired to modify firewall rulesNode credentials

Execution Options

On the node console, open SConfig if not already running:

sconfig

Navigate the menu:

  1. Select 4 → Configure Remote Management
  2. Select 3 → Configure Windows Firewall to allow ICMPv4 responses (ping)
  3. Confirm the prompt — ICMP ping is now enabled
  4. Select 4 → Back to main menu
IPv6

SConfig only configures ICMPv4. If ICMPv6 is also required, run the direct script or use the Orchestrated tab to enable both rules.


Validation Checklist

  • ICMPv4-In rule enabled on all nodes (Get-NetFirewallRule -DisplayName "*ICMPv4-In*")
  • ICMPv6-In rule enabled on all nodes (Get-NetFirewallRule -DisplayName "*ICMPv6-In*")
  • Nodes respond to ping from management server (Test-Connection -ComputerName <node-ip> -Count 2)

Variables from variables.yml

VariableConfig PathExample
Firewall Profilecluster.security.firewall.profileDomain
ICMP Rule Namecluster.security.firewall.icmp_ruleAllow-ICMPv4-In

Troubleshooting

IssueRoot CauseRemediation
Rule not foundRule name differs (GPO rename or locale)Run `Get-NetFirewallRule
Rule found but still not enabledGroup Policy overriding local ruleCheck GPO firewall policy; may need to configure via GPO
Orchestrated: node unreachableWinRM not enabled or firewall blockingVerify WinRM configured (Task 01); check firewall allows port 5985/5986
Ping still failing after enableLayer-3 routing or switch ACLVerify network path; check switch ACLs and VLAN routing


Alternatives

The procedures in this task use the scripted methods shown in the tabs above. Additional deployment methods including Azure CLI and Bash scripts are available in the azurelocal-toolkit repository under scripts/deploy/.

MethodDescription
Azure CLIPowerShell-based Azure CLI scripts for Azure resource operations
BashLinux/macOS compatible shell scripts for pipeline environments
Task 07: Configure NTP↑ Phase 03: OS ConfigurationTask 09: Disable Unused Adapters →

Version Control

VersionDateAuthorChanges
1.02026-01-31Azure Local CloudInitial document
2.02026-03-04Azure Local CloudFull rewrite to standards — complete frontmatter, bare-node 2-tab structure (Direct, Orchestrated), Standalone tab removed, full embedded scripts, Get-ClusterNodes helper, no configuration variables required