21st November 2024

Responding to Windows Server Ping and ICMP Requests

Ping / ICMP requests are the most common tools used to determine whether a device is active in the network. When installing the Windows Server system, the firewall is turned on for security reasons and does not respond to ping requests. Although the easiest way to respond to ping requests is to turn off the firewall entirely, this situation is never recommended and leaves the system completely vulnerable if done.

The following steps can be followed to answer only ping/ICMP requests through the firewall.

Open the firewall settings by following Start> Windows Administrative Tools> Windows Firewall with Advanced Security.

Start> Windows Administrative Tools> Windows Firewall with Advanced Security
Start> Windows Administrative Tools> Windows Firewall with Advanced Security

 

The screen that opens with the “Inbound Rules” button is displayed on the screen that opens.

Inbound Rules
Inbound Rules

 

In the “Inbound Rules” screen, we switch to the new rule creation screen on the firewall with the “New Rule …” button.

New Rule ...
New Rule …

 

On the “New Inbound Rule Wizard” screen, we select the “Custom” option and move on to the next screen.

New Inbound Rule Wizard
New Inbound Rule Wizard

 

We move to the next screen with the option “All programs” in the “Program” tab of the “New Inbound Rule Wizard” screen.

"Program" tab of the "New Inbound Rule Wizard" screen
New Inbound Rule Wizard > Program

 

On the “New Inbound Rule Wizard” screen, we switch to the screen where we will select the “Protocol type” option “ICMPv4” in the “Protocol and Ports” tab and select which of the ICMP requests will be answered with the “Customize …” button.

Protocol and Ports
Protocol and Ports

 

On the “Customize ICMP Settings” screen, select “Echo Request” on the “Specific ICMP types” tab and click the “OK” button.

Echo Request
Echo-Request

 

After making the settings on the “Protocol and Ports” tab of the “New Inbound Rule Wizard” screen, we click the “Next” button.

LEARN MORE  What is Drvinst.exe? What does it do?
Protocol and Ports
Protocol and Ports

 

On the “New Inbound Rule Wizard” screen, we leave the settings in the “Scope” tab and click the “Next” button.

New Inbound Rule Wizard > Scope
New Inbound Rule Wizard > Scope

 

In the “Action” tab, we leave the settings in the same way and click the “Next” button.

New Inbound Rule Wizard > Action
New Inbound Rule Wizard > Action

 

In the “Profile” tab, we leave the settings in the same way and click the “Next” button.

New Inbound Rule Wizard > Profile
New Inbound Rule Wizard > Profile

After giving a suitable name and explanation to the rule to be created on the “Profile” screen, we have completed the process with the “Finish” button.

New Inbound Rule Wizard > Name
New Inbound Rule Wizard > Name

 

Note: The point to be taken into consideration when performing security-related operations; Rather than allowing the entire system to be stuck, it is only necessary to define sufficient authority.

 

Leave a Reply

Your email address will not be published. Required fields are marked *