can't ping dmz zone ip through checkpoint firewall

Posted on 2001-09-18
Last Modified: 2013-11-16
we have a  checkpoint firewall 4.0 running in nt 4.0 ,

and we divid three zone in firewall so dmz , internal ,

and internet external zone . From internet , people can

ping the real ip and access the web server which in dmz ,

but in internal zone , we can't . we have check our

internal zone 's ip have all permission to access anywhere

through the firewall .HOw can we ping and access the real

ip which is in dmz zone .

Question by:adragon218
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 55

Expert Comment

ID: 6490103
Are you trying to ping the servers in the DMZ by name or by IP address? If it works OK by address then probably you will have to put hosts files on all the local PCs or have an internal DNS server.

Expert Comment

ID: 6490226
Can you give us a detailed IP map?

You say that you can't ping, but can you do anything else? Could it be that you need routes set up on the firewall?

Expert Comment

ID: 6490266
you should list a map here of how things are layed out and also post the rule base.  That would make it very easy.  Without them everyone will just be making guesses.
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!


Expert Comment

ID: 6490929
Check your rules, and make sure that ICMP packets are passed from the DMZ BACK to your internal network.
LVL 17

Accepted Solution

mikecr earned 30 total points
ID: 6492145
You should have a rule on your filewall with the source being your network and the destination being either the box in the DMZ that your trying to reach or that whole address range of whatever is in the DMZ. Review your rules carefully and make sure your cleanup rule is not dropping everything.

Expert Comment

ID: 6872502
ADMINISTRATION WILL BE CONTACTING YOU SHORTLY.  Moderators Computer101 or Netminder will return to finalize these if still open in seven days.  Please post closing recommendations before that time.

Question(s) below appears to have been abandoned. Your options are:
1. Accept a Comment As Answer (use the button next to the Expert's name).
2. Close the question if the information was not useful to you. You must tell the participants why you wish to do this, and allow for Expert response.
3. Ask Community Support to help split points between participating experts, or just comment here with details and we'll respond with the process.
4. Delete the question. Again, please comment to advise the other participants why you wish to do this.

For special handling needs, please post a zero point question in the link below and include the question QID/link(s) that it regards.
Please click the Help Desk link on the left for Member Guidelines, Member Agreement and the Question/Answer process.

Please click you Member Profile to view your question history and keep them all current with updates as the collaboration effort continues, to track all your open and locked questions at this site.  If you are an EE Pro user, use the Power Search option to find them.

To view your open questions, please click the following link(s) and keep them all current with updates.

To view your locked questions, please click the following link(s) and evaluate the proposed answer.

------------>  EXPERTS:  Please leave any comments regarding your closing recommendations if this item remains inactive another seven (7) days.  Also, if you are interested in the cleanup effort, please click this link
Thank you everyone.
Moderator @ Experts Exchange

P.S.  For any year 2000 questions, special attention is needed to ensure the first correct response is awarded, since they are not in the comment date order, but rather in Member ID order.

Expert Comment

ID: 6967589
Admin notified of User neglect. Force-accepted by
CS Moderator

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question