Instructions

Please follow these instructions to activate ICMP on devices using Windows Firewall with Advanced Security (Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2012).

Overview

Ping requests are prohibited by default if you have the Windows Firewall Allow Ping option activated. The University Information Security Office’s (ISO) vulnerability scanners are unable to work as a result of this. Follow the procedures below to configure your firewall to allow pings. To complete these tasks, you may be asked for administrator access.

Firewall in Windows

Firewalls from third parties

See Vulnerability Scanners if you use a third-party firewall application or appliance. It’s difficult to hide all conceivable ways of enabling ping on all possible firewalls because each third-party firewall is set differently. However, to fill out the form to configure your firewall, you’ll need the following information:

Many firewalls allow you to whitelist specific IP addresses or ranges. Vulnerability Scanners has the IP ranges for UISO scanners. Some firewalls allow specified protocols or services to pass through. You should enable ping in certain instances. The setting is known as “ping” or “incoming ping” on some firewalls. Others inquire about it using the technical term “ICMP Echo Reply.” Allow this protocol in either case. Many firewalls also include options for allowing specific ports to communicate (do not confuse networking TCP ports with the physical serial, parallel, USB, or Ethernet ports). Don’t worry about those settings for the UISO scanner; only “ping” (ICMP Echo Reply), which doesn’t require ports, has to be enabled. With other reasons, you’ll want to allow or disallow specific ports, but it’s pointless to try to do so for the UISO scanner.