Solved

Sites or IPs used to execute wan failover

Posted on 2010-08-21
8
1,269 Views
Last Modified: 2012-05-10
I was wondering what other people use to execute their WAN failover?   In the past, in my firewall, I used www.google.com to determine if failover should occur.   After a couple of days, they locked me out and nobody in the company could go to google.com.   I guess they thought I was attacking them.  It took me forever to figure out the problem.  

Will DNS such as 4.2.2.2 lock you out if you ping them every so often?  

Thanks
-Dimitry
0
Comment
Question by:zystemsgo
  • 3
  • 3
  • 2
8 Comments
 
LVL 6

Accepted Solution

by:
DewFreak earned 500 total points
ID: 33492442
I have used 4.2.2.1 and 4.2.2.2 for years and have never been blocked.  How often are you pinging?
0
 

Author Comment

by:zystemsgo
ID: 33492450
We use sonicwall as our firewall so it is set to every 5 seconds.

Thanks
-Dimitry
0
 
LVL 6

Expert Comment

by:DewFreak
ID: 33492465
I would back that down a little since you are using someone else's resources.  Perhaps you should just ping your ISP's gateway.  
0
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

 
LVL 8

Expert Comment

by:jimmyray7
ID: 33493422
Sonicwall runs their own service for this purpose - responder.global.sonicwall.com
0
 

Author Comment

by:zystemsgo
ID: 33493455
I have a voip system that I would like to failover so I was hoping to find sites that I can test it against for failover.

Thanks
-Dimitry
0
 
LVL 8

Expert Comment

by:jimmyray7
ID: 33495767
Right, use responder.global.sonicwall.com instead of www.google.com.  That's what it's there for.
0
 

Author Comment

by:zystemsgo
ID: 33495803
I just wasn't sure if sonicwall checks somehow if the ping is coming from a sonicwall appliance.  

Thanks
-Dimitry
0
 
LVL 8

Expert Comment

by:jimmyray7
ID: 33495866
Ah. I see what you mean. I don't think they do, but I've never tested that.
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question