Solved

Unable To Ping IP From 1 PC

Posted on 2009-04-14
4
333 Views
Last Modified: 2012-05-06
We have one computer that is located in another office from our main office that is unable to ping 1 IP 192.168.16.205, This machine has a VPN tunnel using a service called Aventail.

This user is able to ping any other machine in the 192.168.16.* range without any issues. We have tested pinging the 192.168.16.205 from my machine at home which works fine, and a few machines from our US locations which all work as well.

So i am stumped as to why this one machine is unable to ping just the 1 IP.
0
Comment
Question by:PesCanada
  • 2
  • 2
4 Comments
 
LVL 2

Expert Comment

by:Deoji
ID: 24142185
Can another machine on the Network Ping the one that cannot be pinged?
If not does that machine have a local firewall blocking ICMP?

Check the Default Gateway on the 192.168.16.205 and make sure it is correct...
Does it point to a different Gateway then the rest of the machines on the network?

What is your network Subnet Mask???
What is the remote location's LAN Network addressing and Subnet Mask???
Is your machine from Home connecting to the Same VPN Tunnel as the Remote Location in Question?

Do a TRACERT form the Machine in Question to the 192.168.16.205 IP.
Is the Path correct???


0
 

Author Comment

by:PesCanada
ID: 24142308
Every other machine on the network here at the office and in the US locations etc can ping the 192.168.16.205 as i stated in the original question.
0
 
LVL 2

Expert Comment

by:Deoji
ID: 24142577
Ok... well there were more than just one question.
Don't stop at that one... Please answer the rest. It will help me or someone else to better troubleshoot the issue.
0
 

Accepted Solution

by:
PesCanada earned 0 total points
ID: 24229273
Turns out it was the aventail causeing the VPN to change the IP for what ever reason.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now