Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Situation Awareness
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
Software Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive
Help Center/ Elastic Cloud Server/ User Guide (Paris Regions)/ FAQs/ EIP/ What Should I Do If an EIP Cannot Be Pinged?

What Should I Do If an EIP Cannot Be Pinged?

Updated on 2025-01-27 GMT+08:00

Symptom

After you purchase an EIP and bind it to an ECS, the local host or other cloud servers cannot ping the EIP of the ECS.

Fault Locating

The following fault causes are sequenced based on their occurrence probability.

If the fault persists after you have ruled out a cause, check other causes.

Figure 1 Method of locating the failure to ping an EIP
Table 1 Method of locating the failure to ping an EIP

Possible Causes

Solution

ICMP access rules are not added to the security group.

Add ICMP access rules to the security group. For details, see Checking Security Group Rules.

Ping operations are prohibited on the firewall.

Allow ping operations on the firewall. For details, see Checking Firewall Settings.

Ping operations are prohibited on the ECS.

Allow ping operations on the ECS. For details, see Checking Whether Ping Operations Have Been Disabled on the ECS.

Network ACL is associated.

If the VPC is associated with a network ACL, check the network ACL rules. For details, see Checking Network ACL Rules.

A network exception occurred.

Use another ECS in the same region to check whether the local network is functional. For details, see Checking Whether the Network Is Functional.

Routes are incorrectly configured if multiple NICs are used.

If the network is inaccessible due to an extension NIC, the fault is generally caused by incorrect route configurations. To resolve this issue, see Checking the ECS Route Configuration If Multiple NICs Are Used.

Checking Security Group Rules

ICMP is used for the ping command. Check whether the security group accommodating the ECS allows ICMP traffic.

  1. Log in to the management console.
  2. Under Computing, choose Elastic Cloud Server.
  3. On the Elastic Cloud Server page, click the name of the target ECS.

    The page providing details about the ECS is displayed.

  4. Click the Security Groups tab, expand the information of the security group, and view security group rules.
  5. Click the security group ID.

    The system automatically switches to the Security Group page.

  6. On the Outbound Rules page, click Add Rule. In the displayed dialog box, set required parameters to add an outbound rule.
    Table 2 Security group rules

    Transfer Direction

    Type

    Protocol/Port Range

    Destination

    Outbound

    IPv4

    ICMP/Any

    0.0.0.0/0

    0.0.0.0/0 indicates all IP addresses.

  7. On the Inbound Rules tab, click Add Rule. In the displayed dialog box, set required parameters to add an inbound rule.
    Table 3 Security group rules

    Transfer Direction

    Type

    Protocol/Port Range

    Source

    Inbound

    IPv4

    ICMP/Any

    0.0.0.0/0

    0.0.0.0/0 indicates all IP addresses.

  8. Click OK to complete the security rule configuration.

Checking Firewall Settings

If a firewall is enabled on the ECS, check whether the firewall blocks the ping operations.

Linux
  1. Consider CentOS 7 as an example. Run the following command to check the firewall status:

    firewall-cmd --state

    If running is displayed in the command output, the firewall has been enabled.

  1. Check whether there is any ICMP rule blocking the ping operations.

    iptables -L

    If the command output shown in Figure 2 is displayed, there is no ICMP rule blocking the ping operations.

    Figure 2 Checking firewall rules

    If the ping operations are blocked by an ICMP rule, run the following commands to modify the rule for unblocking:

    iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT

    iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT

Windows
  1. Log in to the Windows ECS, click the Windows icon in the lower left corner of the desktop, and choose Control Panel > Windows Firewall.
  2. Click Turn Windows Firewall on or off.

    View and set the firewall status.

  3. If the firewall is On, go to 4.
  4. Check the ICMP rule statuses in the firewall.
    1. In the navigation pane on the Windows Firewall page, click Advanced settings.
    2. Enable the following rules:

      Inbound Rules: File and Printer Sharing (Echo Request - ICMPv4-In)

      Outbound Rules: File and Printer Sharing (Echo Request - ICMPv4-Out)

      If IPv6 is enabled, enable the following rules:

      Inbound Rules: File and Printer Sharing (Echo Request - ICMPv6-In)

      Outbound Rules: File and Printer Sharing (Echo Request - ICMPv6-Out)

      Figure 3 Inbound Rules
      Figure 4 Outbound Rules

Checking Whether Ping Operations Have Been Disabled on the ECS

Windows

Enable ping operations using the CLI.

  1. Start the Run dialog box. Enter cmd and press Enter.
  2. Run the following command to enable ping operations:

    netsh firewall set icmpsetting 8

Linux

Check the ECS kernel parameters.
  1. Check the net.ipv4.icmp_echo_ignore_all value in the /etc/sysctl.conf file. Value 0 indicates that ping operations are allowed, and value 1 indicates that ping operations are prohibited.
  2. Allow ping operations.
    • Run the following command to temporarily allow the ping operations:

      #echo 0 >/proc/sys/net/ipv4/icmp_echo_ignore_all

    • Run the following command to permanently allow the ping operations:

      net.ipv4.icmp_echo_ignore_all=0

Checking Network ACL Rules

By default, no ACL is configured for a VPC. If a network ACL is associated with a VPC, check the ACL rules.

  1. Check whether the subnet of the ECS has been associated with a network ACL.

    If an ACL name is displayed, the network ACL has been associated with the ECS.

  2. Click the ACL name to view its status.
  3. If the network ACL is enabled, add an ICMP rule to allow traffic.
    NOTE:

    The default network ACL rule denies all incoming and outgoing packets. If a network ACL is disabled, the default rule is still effective.

Checking Whether the Network Is Functional

  1. Use another ECS in the same region to check whether the local network is functional.

    Use another ECS in the same region to ping the affected EIP. If the EIP can be pinged, the VPC is functional. In such a case, rectify the local network fault and ping the affected EIP again.

  2. Check whether the link is accessible.

    A ping failure is caused by packet loss or long delay, which may be caused by link congestion, link node faults, or heavy load on the ECS.

Checking the ECS Route Configuration If Multiple NICs Are Used

Generally, the default route of an OS will preferentially select the primary NIC. If an extension NIC is selected in a route and the network malfunctions, this issue is typically caused by incorrect route configuration.

  • If the ECS has multiple NICs, check whether the default route is available.
    1. Log in to the ECS and run the following command to check whether the default route is available:

      ip route

      Figure 5 Default route
    2. If the route is unavailable, run the following command to add it:

      ip route add default via XXXX dev eth0

      NOTE:

      In the preceding command, XXXX specifies a gateway IP address.

  • If the ECS has multiple NICs and the EIP is bound to an extension NIC, configure policy routing on the ECS for network communication with the extension NIC.

We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback