Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Firewall

Posted on 2014-07-25
4
Medium Priority
?
134 Views
Last Modified: 2014-08-01
Hi All,

All the workstations In one of our classrooms are not able to ping each other.  I turned off the firewall and then was able to ping it from another workstation.  Is there an inbound rule that needs to be set to allow a workstation to be pinged?  If so, please advise.

All the workstations were cloned so if I could fix one that should fix all.

Thank you in advance.
0
Comment
Question by:Reyesrj
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
mrroonie earned 2000 total points
ID: 40219273
you need to allow ICMP in the firewall rules.

is there any particular reason you need them to ping each other?
0
 

Author Comment

by:Reyesrj
ID: 40223212
Thank you.

I'm new at this and was tasked to get ip address, host name and MAC for each workstation in the classrooms.  The way I gather this information is by using the command prompt:

1. net view - gives me a list of computer host name.
2. ping host name   - I get ip
3. arp -a [ip address] - I get MAC.

I do all this from one workstation.  Then, I copy the data into excel and match everything up.  Could you suggest a better faster way without any 3rd party application?
0
 

Author Closing Comment

by:Reyesrj
ID: 40234010
Thanks, the netsh worked for the most part.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question