What Should I Do If an EIP Cannot Be Pinged?
Symptom
After you purchase an EIP and bind it to an ECS, the local host or other cloud servers cannot ping the EIP of the ECS.
Fault Locating
The following fault causes are sequenced based on their occurrence probability.
If the fault persists after you have ruled out a cause, check other causes.
Possible Cause |
Solution |
---|---|
ICMP access rules are not added to the security group. |
Add ICMP access rules to the security group. For details, see Checking Security Group Rules. |
Ping operations are prohibited on the firewall. |
Allow ping operations on the firewall. For details, see Checking Firewall Settings. |
Ping operations are prohibited on the ECS. |
Allow ping operations on the ECS. For details, see Checking Whether Ping Operations Have Been Disabled on the ECS. |
Network ACL is associated. |
If the VPC is associated with a network ACL, check the network ACL rules. For details, see Checking ACL Rules. |
A network exception occurred. |
Use another ECS in the same region to check whether the local network is functional. For details, see Checking Whether the Network Is Functional. |
Routes are incorrectly configured if multiple NICs are used. |
If the network is inaccessible due to an extension NIC, the fault is generally caused by incorrect route configurations. To resolve this issue, see Checking the ECS Route Configuration If Multiple NICs Are Used. |
The domain name is not ICP licensed. |
If the domain name cannot be pinged or cannot be resolved, see Checking Domain Name Resolution If the Domain Name Cannot Be Pinged to resolve this issue. |
Checking Security Group Rules
ICMP is used for the ping command. Check whether the security group accommodating the ECS allows ICMP traffic.
- Under Computing, click Elastic Cloud Server.
- On the Elastic Cloud Server page, click the name of the target ECS.
The page providing details about the ECS is displayed.
- Click the Security Groups tab, expand the information of the security group, and view security group rules.
- Click the security group ID.
The system automatically switches to the Security Group page.
- On the Outbound Rules page, click Add Rule. In the displayed dialog box, set required parameters to add an outbound rule.
Figure 2 Adding an outbound rule
Table 2 Security group rules Transfer Direction
Type
Protocol/Port Range
Source
Outbound
IPv4
ICMP/Any
0.0.0.0/0
0.0.0.0/0 indicates all IP addresses.
- On the Inbound Rules tab, click Add Rule. In the displayed dialog box, set required parameters to add an inbound rule.
Figure 3 Adding an inbound rule
Table 3 Security group rules Transfer Direction
Type
Protocol/Port Range
Source
Inbound
IPv4
ICMP/Any
0.0.0.0/0
0.0.0.0/0 indicates all IP addresses.
- Click OK to complete the security rule configuration.
Checking Firewall Settings
If a firewall is enabled on the ECS, check whether the firewall blocks the ping operations.
- Consider CentOS 7 as an example. Run the following command to check the firewall status:
If running is displayed in the command output, the firewall has been enabled.
- Check whether there is any ICMP rule blocking the ping operations.
If the command output shown in Figure 4 is displayed, there is no ICMP rule blocking the ping operations.
If the ping operations are blocked by an ICMP rule, run the following commands to modify the rule for unblocking:
iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
- Log in to the Windows ECS, click the Windows icon in the lower left corner of the desktop, and choose Control Panel > Windows Firewall.
- Click Turn Windows Firewall on or off.
View and set the firewall status.
- If the firewall is On, go to 4.
- Check the ICMP rule statuses in the firewall.
- In the navigation pane on the Windows Firewall page, click Advanced settings.
- Enable the following rules:
Inbound Rules: File and Printer Sharing (Echo Request - ICMPv4-In)
Outbound Rules: File and Printer Sharing (Echo Request - ICMPv4-Out)
If IPv6 is enabled, enable the following rules:
Inbound Rules: File and Printer Sharing (Echo Request - ICMPv6-In)
Outbound Rules: File and Printer Sharing (Echo Request - ICMPv6-Out)
Figure 5 Inbound Rules
Figure 6 Outbound Rules
Checking Whether Ping Operations Have Been Disabled on the ECS
Windows
Enable ping operations using the CLI.
- Start the Run dialog box. Enter cmd and press Enter.
- Run the following command to enable ping operations:
Linux
- Check the net.ipv4.icmp_echo_ignore_all value in the /etc/sysctl.conf file. Value 0 indicates that ping operations are allowed, and value 1 indicates that ping operations are prohibited.
- Allow ping operations.
Checking ACL Rules
By default, no ACL is configured for a VPC. If a network ACL is associated with a VPC, check the ACL rules.
- Check whether the subnet of the ECS has been associated with a network ACL.
If an ACL name is displayed, the network ACL has been associated with the ECS.
- Click the ACL name to view its status.
- If the network ACL is enabled, add an ICMP rule to allow traffic.
The default network ACL rule denies all incoming and outgoing packets. If a network ACL is disabled, the default rule is still effective.
Checking Whether the Network Is Functional
- Use another ECS in the same region to check whether the local network is functional.
Use another ECS in the same region to ping the affected EIP. If the EIP can be pinged, the VPC is functional. In such a case, rectify the local network fault and ping the affected EIP again.
- Check whether the link is accessible.
A ping failure is caused by packet loss or long delay, which may be caused by link congestion, link node faults, or heavy load on the ECS.
Checking the ECS Route Configuration If Multiple NICs Are Used
Generally, the default route of an OS will preferentially select the primary NIC. If an extension NIC is selected in a route and the network malfunctions, this issue is typically caused by incorrect route configuration.
- If the ECS has multiple NICs, check whether the default route is available.
- If the ECS has multiple NICs and the EIP is bound to an extension NIC, configure policy routing on the ECS for network communication with the extension NIC.
Checking Domain Name Resolution If the Domain Name Cannot Be Pinged
If you can ping the EIP but not the domain name, the possible cause is that an error occurred in domain name resolution.
- Check the domain name resolution.
If the domain name records are incorrectly configured, the domain name may fail to be resolved.
Switch to the DNS management console to view details about the domain name resolution.
- Check the DNS server configuration.
If the system shows no server found after you ping a domain name, this issue may be caused by slow response from the DNS server.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot