Skip to main content
Version: Next

Task 08: Enable ICMP (Ping)

Runbook Azure Dell

DOCUMENT CATEGORY: Runbook SCOPE: Firewall configuration PURPOSE: Enable ICMP ping on all cluster nodes so that network connectivity can be tested and validated throughout the deployment process MASTER REFERENCE: Phase 03: OS Configuration

Status: Active Estimated Time: 2 minutes per node / 5 minutes orchestrated (all nodes)


Overview

Windows Server blocks ICMP by default. Enabling the ICMPv4-In and ICMPv6-In firewall rules allows ping-based connectivity validation from the management server and between nodes — required for cluster health checks, network diagnostics, and Azure Local validation tooling.

What the scripts do:

  1. Enable File and Printer Sharing (Echo Request - ICMPv4-In)
  2. Enable File and Printer Sharing (Echo Request - ICMPv6-In)
  3. Verify each rule is enabled and report pass/fail

No configuration variables are required — this task has no values to read from variables.yml.


Prerequisites

RequirementDescriptionSource
Task 07 completeNTP configured on all nodesTask 07: Configure NTP
Local admin rightsRequired to modify firewall rulesNode credentials

Execution Options

On the node console, open SConfig if not already running:

sconfig

Navigate the menu:

  1. Select 4 → Configure Remote Management
  2. Select 3 → Configure Windows Firewall to allow ICMPv4 responses (ping)
  3. Confirm the prompt — ICMP ping is now enabled
  4. Select 4 → Back to main menu
IPv6

SConfig only configures ICMPv4. If ICMPv6 is also required, run the direct script or use the Orchestrated tab to enable both rules.


Validation Checklist

  • ICMPv4-In rule enabled on all nodes (Get-NetFirewallRule -DisplayName "*ICMPv4-In*")
  • ICMPv6-In rule enabled on all nodes (Get-NetFirewallRule -DisplayName "*ICMPv6-In*")
  • Nodes respond to ping from management server (Test-Connection -ComputerName <node-ip> -Count 2)

Troubleshooting

IssueRoot CauseRemediation
Rule not foundRule name differs (GPO rename or locale)Run `Get-NetFirewallRule
Rule found but still not enabledGroup Policy overriding local ruleCheck GPO firewall policy; may need to configure via GPO
Orchestrated: node unreachableWinRM not enabled or firewall blockingVerify WinRM configured (Task 01); check firewall allows port 5985/5986
Ping still failing after enableLayer-3 routing or switch ACLVerify network path; check switch ACLs and VLAN routing

Task 07: Configure NTP↑ Phase 03: OS ConfigurationTask 09: Disable Unused Adapters →

Version Control

VersionDateAuthorChanges
1.02026-01-31Azure Local Cloud Azure Local CloudnologyInitial document
2.02026-03-04Azure Local Cloud Azure Local CloudnologyFull rewrite to standards — complete frontmatter, bare-node 2-tab structure (Direct, Orchestrated), Standalone tab removed, full embedded scripts, Get-ClusterNodes helper, no configuration variables required