After you purchase an EIP and bind it to an ECS, the local host or other cloud servers cannot ping the EIP of the ECS.
The following fault causes are sequenced based on their occurrence probability.
If the fault persists after you have ruled out a cause, check other causes.
Possible Causes |
Solution |
---|---|
ICMP access rules are not added to the security group. |
Add ICMP access rules to the security group. For details, see Checking Security Group Rules. |
Ping operations are prohibited on the firewall. |
Allow ping operations on the firewall. For details, see Checking Firewall Settings. |
Ping operations are prohibited on the ECS. |
Allow ping operations on the ECS. For details, see Checking Whether Ping Operations Have Been Disabled on the ECS. |
Network ACL is associated. |
If the VPC is associated with a network ACL, check the network ACL rules. For details, see Checking ACL Rules. |
A network exception occurred. |
Use another ECS in the same region to check whether the local network is functional. For details, see Checking Whether the Network Is Functional. |
Routes are incorrectly configured if multiple NICs are used. |
If the network is inaccessible due to an extension NIC, the fault is generally caused by incorrect route configurations. To resolve this issue, see Checking the ECS Route Configuration If Multiple NICs Are Used. |
ICMP is used for the ping command. Check whether the security group accommodating the ECS allows ICMP traffic.
The page providing details about the ECS is displayed.
The system automatically switches to the Security Group page.
Transfer Direction |
Type |
Protocol/Port Range |
Destination |
---|---|---|---|
Outbound |
IPv4 |
ICMP/Any |
0.0.0.0/0 0.0.0.0/0 indicates all IP addresses. |
Transfer Direction |
Type |
Protocol/Port Range |
Source |
---|---|---|---|
Inbound |
IPv4 |
ICMP/Any |
0.0.0.0/0 0.0.0.0/0 indicates all IP addresses. |
If a firewall is enabled on the ECS, check whether the firewall blocks the ping operations.
If running is displayed in the command output, the firewall has been enabled.
If the command output shown in Figure 2 is displayed, there is no ICMP rule blocking the ping operations.
If the ping operations are blocked by an ICMP rule, run the following commands to modify the rule for unblocking:
iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
View and set the firewall status.
Inbound Rules: File and Printer Sharing (Echo Request - ICMPv4-In)
Outbound Rules: File and Printer Sharing (Echo Request - ICMPv4-Out)
If IPv6 is enabled, enable the following rules:
Inbound Rules: File and Printer Sharing (Echo Request - ICMPv6-In)
Outbound Rules: File and Printer Sharing (Echo Request - ICMPv6-Out)
Windows
Enable ping operations using the CLI.
Linux
By default, no ACL is configured for a VPC. If a network ACL is associated with a VPC, check the ACL rules.
If an ACL name is displayed, the network ACL has been associated with the ECS.
The default network ACL rule denies all incoming and outgoing packets. If a network ACL is disabled, the default rule is still effective.
Use another ECS in the same region to ping the affected EIP. If the EIP can be pinged, the VPC is functional. In such a case, rectify the local network fault and ping the affected EIP again.
A ping failure is caused by packet loss or long delay, which may be caused by link congestion, link node faults, or heavy load on the ECS.
Generally, the default route of an OS will preferentially select the primary NIC. If an extension NIC is selected in a route and the network malfunctions, this issue is typically caused by incorrect route configuration.