?
Solved

Cisco Pix 501 showing connections but Ping requests are intermittent

Posted on 2011-03-16
3
Medium Priority
?
739 Views
Last Modified: 2012-05-11
Hi,

I have a Cisco PIX 501 that establishes a IPSec connection to 4 remote offices runing Cisco Pix 501 and 515. The PIX shows that the connections are established and working and all test appear normal to reach each of the sites but one. Running a simple ping results in very intermittent connections.  Each of the other locations are showing good to all the other sites.

Reply from 192.168.5.2: bytes=32 time=35ms TTL=128
Reply from 192.168.5.2: bytes=32 time=35ms TTL=128
Reply from 192.168.5.2: bytes=32 time=35ms TTL=128
Reply from 192.168.5.2: bytes=32 time=34ms TTL=128
Request timed out.
Reply from 192.168.5.2: bytes=32 time=35ms TTL=128
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Reply from 192.168.5.2: bytes=32 time=36ms TTL=128
Reply from 192.168.5.2: bytes=32 time=189ms TTL=128
Reply from 192.168.5.2: bytes=32 time=80ms TTL=128
Request timed out.
Reply from 192.168.5.2: bytes=32 time=37ms TTL=128
Reply from 192.168.5.2: bytes=32 time=37ms TTL=128
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Reply from 192.168.5.2: bytes=32 time=35ms TTL=128
Reply from 192.168.5.2: bytes=32 time=35ms TTL=128
0
Comment
Question by:Forensica
  • 2
3 Comments
 
LVL 18

Expert Comment

by:jmeggers
ID: 35153612
Any chance it's something in the middle that's dropping packets?  If the VPN connection is up, it should stay up.  Unless there's something in the debugs that indicates something's changing.  But it's not what I would expect to see.
0
 

Accepted Solution

by:
Forensica earned 0 total points
ID: 35158025
No, not very likely.  The other offices are all stying connected without any issues and this office is staying connected with all the other offices except the one that has problems.
0
 

Author Closing Comment

by:Forensica
ID: 35196703
Solved on own
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month15 days, 6 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question