Ask Learn
Preview
Please sign in to use this experience.
Sign inThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Ping functionality on Windows Azure VM is blocked by default for security reasons, to be to enable them you can do that from the Windows firewall advanced features on each VM or you can login on the virtual machine and open the command prompt as an administrator and execute this command.
netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" dir=in action=allow enable=yes protocol=icmpv4:8,any
Anonymous
December 14, 2014
The comment has been removed
Anonymous
December 15, 2014
Thanks David , I adjusted it as per your comment :)
Anonymous
March 16, 2015
Unfortunately ... I had nope it would but it didn't work
Anonymous
August 04, 2015
Doesn't Work. This firewall rule could be work if the machine is not inside the Azure infrastructure. There is some sort of block or another firewall layer that is blocking the outside pings.
Anonymous
October 13, 2015
Check : blogs.msdn.com/.../use-port-pings-instead-of-icmp-to-test-azure-vm-connectivity.aspx
Anonymous
November 29, 2016
Works great! Can now ping using PsPing utility version 2.01 (TCP) by specifying a public port. A regular ping still does not work.
Anonymous
February 14, 2017
The comment has been removed
Please sign in to use this experience.
Sign in